Configure Revocation Status Verification of Certificates Used for SSL/TLS Decryption (Strata Cloud Manager)
Focus
Focus

Configure Revocation Status Verification of Certificates Used for SSL/TLS Decryption (Strata Cloud Manager)

Table of Contents


Configure Revocation Status Verification of Certificates Used for SSL/TLS Decryption (Strata Cloud Manager)

  1. Define the service-specific timeout intervals for revocation status checks.
    1. Select Manage Configuration NGFW and Prisma Access Security Services Decryption, and edit the Decryption Settings (
      ). A Decryption Settings window appears.
    2. Under the Certificate Settings for proxying an untrusted site, click Advanced. An Advanced Decryption Settings overlay appears.
    3. Perform one or both of the following steps, depending on whether the firewall will use the Online Certificate Status Protocol (OCSP) or Certificate Revocation List (CRL) method to verify the revocation status of certificates.
      If the firewall will use both, it first tries OCSP; if the OCSP responder is unavailable, the firewall then tries the CRL method.
      • In the OCSP section, select Use OCSP to check certificate status, and specify a Receive Timeout (sec) value. This is the interval (1-60 seconds) after which the firewall stops waiting for a response from the OCSP responder.
      • In the CRL section, select Use CRL to check certificate status, and specify a Receive Timeout (sec) value. This is the interval (1-60 seconds) after which the firewall stops waiting for a response from the CRL service.
      Depending on the Certificate Status Timeout value you specify in the next step, the firewall might register a timeout before either or both of the Receive Timeout (sec) intervals pass.
    4. Save the Advanced Decryption settings.
  2. Define the total timeout interval for revocation status requests.
    This is the interval (1-60 seconds) after which the firewall stops waiting for a response from any certificate status service and applies the session-blocking logic you optionally define in step 3.
    1. For Certificate Status Timeout (sec), specify a value between 1-60.
      The Certificate Status Timeout relates to the OCSP/CRL Receive Timeout (sec) as follows:
      • If you enable both OCSP and CRL: The firewall registers a request timeout after the lesser of two intervals passes: the Certificate Status Timeout (sec) value or the aggregate of the two Receive Timeout (sec) values.
      • If you enable only OCSP: The firewall registers a request timeout after the lesser of two intervals passes: the Certificate Status Timeout (sec) value or the OCSP Receive Timeout (sec) value.
      • If you enable only CRL: The firewall registers a request timeout after the lesser of two intervals passes: the Certificate Status Timeout (sec) value or the CRL Receive Timeout (sec) value.
    2. Save the Advanced Decryption Settings.
    3. Save the Decryption Settings.
  3. Define the blocking behavior for a certificate status of “unknown” or a revocation status request timeout.
    1. Select Manage Configuration NGFW and Prisma Access Security Services Decryption, and select an existing Decryption Profile or create a new one.
    2. Edit the Server Certificate Verification settings for SSL/TLS Decryption.
      Select Advanced under the Bypass Checks option. An Advanced SSL Forward Proxy Settings overlay shows the block settings of interest.
      • To block SSL/TLS sessions when the OCSP or CRL service returns a certificate revocation status of “unknown,” select Block sessions with unknown certificate status. Otherwise, the firewall proceeds with the session.
      • To block SSL/TLS sessions after the firewall registers a request timeout, select Block sessions on certificate status check timeout. Otherwise, the firewall proceeds with the session.
    3. Save the Advanced SSL Forward Proxy settings.
    4. Save the Decryption Profile.
  4. To commit your changes, click Push Config.