Leveraging SSL decryption to look inside encrypted sessions
SSL/TLS and SSH decryption perform a man-in-the-middle attack, but for good instead of evil—an encrypted session is intercepted then, through the use of trusted certificates, the session is deciphered and the payload is made visible for content inspection and App-ID to take a look at. There are three modes of SSL decryption currently available:
- SSH proxy
- SSL forward proxy
- SSL inbound inspection
Let’s look at each of them in detail.
SSH proxy
SSH proxy allows the interception of SSH sessions. The SSH connection will be proxied, meaning that the client connects to the firewall and the firewall establishes a new session to the server. This allows you to control (allow or block) tunneling over the SSH session by setting a security policy for the ssh-tunnel
application
.
SSL forward proxy
SSL forward proxy is used for all outbound sessions. There are two distinct directions...