Network Security
Create a Decryption Profile (Strata Cloud Manager)
Table of Contents
Expand All
|
Collapse All
Network Security Docs
Create a Decryption Profile (Strata Cloud Manager)
Define traffic for your configuration to decrypt and the type of decryption you want
to perform
Follow these steps to create a decryption profile.
- Add a decryption profile.Select,ManageConfigurationNGFW and Prisma AccessSecurity ServicesDecryptionAdd Profileor modify an existing decryption profile, and give the profile a descriptiveName.
- (Optional) Block and control SSL tunneled and/or inbound traffic:Although applying a Decryption profile to decrypted traffic is optional, it's a best practice to always apply a Decryption profile to the security rules to protect your network against encrypted threats. You can’t protect yourself against threats you can’t see.SelectSSL/TLS Decryption:
- SelectHandshake Settingsto configure the settings that control minimum and maximum protocol versions and key exchange, encryption, and authentication algorithms to enforce on decrypted SSL traffic. These settings are active when this profile is attached to decryption security rules that are set to perform either SSL Forward Proxy decryption or SSL Inbound Inspection.
- SelectSSL Forward Proxyto configure the settings to verify certificates, enforce protocol versions and cipher suites, and perform failure checks on SSL decrypted traffic. These settings are active only when this profile is attached to a decryption security rule configured to perform SSL Forward Proxy decryption.
- SelectSSL Inbound Inspectionto configure the settings to enforce protocol versions and cipher suites and to perform failure checks on inbound SSL traffic. These settings are active only when this profile is attached to a decryption security rule that performs SSL Inbound Inspection.
- (Optional) Block and control traffic (for example, a URL category) for which you choose to Create a Security Policy-Based Decryption Exclusion.Although applying a Decryption profile to traffic that you choose not to decrypt is optional, it's a best practice to always apply a Decryption profile to the security rules to protect your network against sessions with expired certificates or untrusted issuers.SelectNo Decryptionto configure the Profile for No Decryption and check theBlock sessions with expired certificatesandBlock sessions with untrusted issuersboxes to validate certificates for traffic that is excluded from decryption. Create policy-based exclusions only for traffic that you choose not to decrypt. If a server breaks decryption for technical reasons, don’t create a Security policy-based exclusion, add the server to the SSL Decryption Exclusion list ().ManageConfigurationNGFW and Prisma AccessSecurity ServicesDecryptionGlobal Decryption ExclusionsThese settings are active only when the decryption profile is attached to a decryption security rule that disables decryption for certain traffic.
- Add the decryption profile when you Create a Decryption Policy Rule.Your configuration applies the decryption profile to and enforces the profile’s settings on the traffic that matches the decryption policy rule.
- Saveyour configuration.
- SelectPush Configto save your configuration and deploy it to your network.