Configure TLS/SSL Decryption Solutions
The Inline TLS/SSL Decryption solution can be configured based on use cases. Refer to the following topics for various use cases:
| Configure Inline TLS/SSL Decryption Solution with Layer 2 Tools |
| Configure Inline TLS/SSL Decryption Solution with Layer 3 Tools |
| Configure Inline TLS/SSL Decryption Solution with RIA |
| Configure Entrust nShield HSM for TLS/SSL Decryption |
| Configure Thales-Luna HSM for TLS/SSL Decryption |
| Configure ICAP Client for Inline TLS/SSL Decryption Solution |
Inline SSL App—Field References
These are the fields are that you will come across while configuring the Inline SSL APP. The table below provides a list and description of the attributes that define the Flexible Inline Decryption solution.
|
Field |
Description |
||||||||||||||||||||||||||||||||||||
|
Alias |
Enter a unique name for the flexible inline SSL APP. |
||||||||||||||||||||||||||||||||||||
|
Resilient Inline Arrangements |
Enable this to configure a Resilient Inline Arrangement. |
||||||||||||||||||||||||||||||||||||
|
GS engines |
Select the required GigaSMART engines. |
||||||||||||||||||||||||||||||||||||
|
TLS/SSL Monitor Mode |
Select a TLS/SSL Monitor Mode from one of the following options:
|
||||||||||||||||||||||||||||||||||||
|
HSM Group |
Select an HSM Group alias that you have configured from the drop-down list. Select Disable from the drop-down list to disable the HSM Group. Notes:
|
||||||||||||||||||||||||||||||||||||
|
Advanced Session Statistics |
Enable this option to visualize advanced Inline SSL Session dashboards, such as Session Insights and Session Table, in the Fabric Health Analytics dashboard. The basic dashboards are available by default as you configure an Inline SSL session. Refer View Inline TLS/SSL Dashboards to know more. |
||||||||||||||||||||||||||||||||||||
|
Keychain Password |
The keychain password must be configured before installing certificates and keys. To add or reset the Keychain Password:
|
||||||||||||||||||||||||||||||||||||
|
Add new keys |
To configure a certificate-key pair:
|
||||||||||||||||||||||||||||||||||||
|
Deployment Type |
Select one of the following deployment types:
|
||||||||||||||||||||||||||||||||||||
|
Configurations |
|||||||||||||||||||||||||||||||||||||
|
Default Action |
Select one of the following options :
|
||||||||||||||||||||||||||||||||||||
|
URL Cache Miss Action |
Select one of the following options:
|
||||||||||||||||||||||||||||||||||||
|
Tool Fail Action |
The failover action taken in response to a failure of an inline tool. Select one of the following options:
|
||||||||||||||||||||||||||||||||||||
|
Tool Bypass |
Select the required options:
|
||||||||||||||||||||||||||||||||||||
|
High Availability |
Select the check box to detect the link switchover by upstream device that is in active or standby mode. Note: Do not select this check box if the inline network links are in active state. |
||||||||||||||||||||||||||||||||||||
|
Network Group Multiple Entry |
Select this check box to allow the traffic from different inline network to reenter GigaSMART. |
||||||||||||||||||||||||||||||||||||
|
Tool Early Engage |
Select this check box to allow the inline tools to change the MAC address or VLAN IDs. When a connection request is received from the client, GigaSMART establishes the connection with the inline tool first, before connecting with the server. This helps the inline tools to modify the MAC address or VLAN IDs when sending the traffic back to the server. |
||||||||||||||||||||||||||||||||||||
|
HTTP Downgrade |
HTTP 2.0 Downgrade option is enabled by default. HTTP 2.0 traffic is downgraded to HTTP 1.1 for decryption. If the downgrade option is disabled, HTTP 2.0 traffic is forwarded without decryption. |
||||||||||||||||||||||||||||||||||||
|
NAT/PAT mode |
Enable this to perform NAT/PAT (Network/Port Address Translation) in Layer-3 inline tools . |
||||||||||||||||||||||||||||||||||||
|
Tool Early Inspect |
Select this check box to allow the inline tool to inspect the decrypted data first before connecting to the server. This will allow the inline tool to validate the data and ensure that only valid connections are sent to the server. Notes:
|
||||||||||||||||||||||||||||||||||||
|
StartTLS Port |
Enter the required SSL/TLS ports. |
||||||||||||||||||||||||||||||||||||
|
MTU |
The Maximum Transmission Unit (MTU) is the maximum size of each packet that can be transferred as a single entity in a network connection. |
||||||||||||||||||||||||||||||||||||
|
Session Logging |
|||||||||||||||||||||||||||||||||||||
|
Session Logging |
Select the Enable check box to log the Inline TLS/SSL session related information to a remote server. |
||||||||||||||||||||||||||||||||||||
|
IP Version |
Select IPV4 or IPV6 as the IP Version for the Session Logging server. You can select one session logging configuration per GigaSMART group. |
||||||||||||||||||||||||||||||||||||
|
Remote Syslog Server IP |
Enter the IP address of the remote syslog server. |
||||||||||||||||||||||||||||||||||||
|
Associated IP Interface |
In the Associated IP interface drop-down list, select the IP interface that you assigned to the GigaSMART group. |
||||||||||||||||||||||||||||||||||||
|
Remote Syslog Port Number |
Enter the port number of the remote syslog server. |
||||||||||||||||||||||||||||||||||||
|
Log Level |
In the Log Level drop-down list, select the severity log level of the events that you want to send to the inline TLS/SSL session logging server. |
||||||||||||||||||||||||||||||||||||
|
Traffic Path |
|||||||||||||||||||||||||||||||||||||
|
Single VLAN Tag |
Enable the check box to deploy flexible inline TLS/SSL solution with a single VLAN tag. If an inline tool is involved in an inline TLS/SSL map, the inline tool can be supported across multiple maps with different single VLAN tags. Note: Deploying a flexible Inline SSL solution with SVT is optional, and you can choose to enable or disable the Single VLAN Tag option. If you choose to enable the Single VLAN Tag option in the iSSL solution, you should also enable the Single VLAN Tag configuration in the flex map deployed in that solution. Note: If you enable the Single VLAN tag option in the Flexible Inline SSL solution, you should also enable the Single VLAN Tag configuration in the inline-ssl app profile deployed in the solution |
||||||||||||||||||||||||||||||||||||
|
Tool Side VLAN Tag |
Enter the required tool side VLAN tag for the inline network. |
||||||||||||||||||||||||||||||||||||
|
TPID |
Select the TPID for the Tool Side VLAN Tag. The default value of TPID is 0x8100. You can select the other supported values 0x9100 and 0x88a8 from the drop-down list. |
||||||||||||||||||||||||||||||||||||
|
Traffic Path |
Select one of the following options:
Note: You can select the Monitoring option only if you have set the SSL Monitor Mode to either Enable or Inline.
|
||||||||||||||||||||||||||||||||||||
|
Inline Failover Action |
Select one of the following options:
|
||||||||||||||||||||||||||||||||||||
|
Security Exceptions |
You can choose to either decrypt or drop the traffic for the following certificates:
You can also choose to configure the security exceptions for certificate revocation validation based on OCSP or CRL on an inline decryption profile. Select one of the following options:
|
||||||||||||||||||||||||||||||||||||
|
No-decrypt list/Decrypt list |
Select the following check boxes:
Select from the below operations that can be performed on an uploaded list:
If you select Append/Replace, you can enter the list using any of the following options: • Copy and Paste • Install from URL • Install from Local Directory |
||||||||||||||||||||||||||||||||||||
|
Policy Rules |
Add the required policy rules for the inline decryption profile. Click Add a Rule. In the Condition field, Select one of the following options from the drop-down list:
Select one of the following options:
|
||||||||||||||||||||||||||||||||||||
|
Network Access |
Network access configuration is used to get URL categorization updates To configure the network access for the GigaSMART engine ports:
Notes:
|
||||||||||||||||||||||||||||||||||||
|
Decryption Port Mapping |
The TCP destination port for decrypted traffic sent to inline tools can be configured as part of the inline decryption profile. Configure the required Priority 1 map, which is user configurable and Priority 2 map, which is the default out port. |
||||||||||||||||||||||||||||||||||||
|
Trust Store |
The trust store contains a trusted certificate authority (CA) for server validation. You can choose to either append or replace the trust store. |
||||||||||||||||||||||||||||||||||||
|
TCP Settings |
Configure the required TCP settings as follows:
|
||||||||||||||||||||||||||||||||||||
|
Split-Proxy Settings |
|||||||||||||||||||||||||||||||||||||
|
Split-Proxy |
Select the check box to enable the split proxy settings for the inline decryption solution. The TLS connection between the server and client is divided into two independent connections, and the security parameters are kept separate. |
||||||||||||||||||||||||||||||||||||
|
Non-PFS Ciphers (Server) |
Select the check box to enable the non-PFS ciphers settings for the inline decryption solution that has the split proxy settings enabled. This setting is to indirectly force the server to use protocols that are lower than TLS 1.3 with non-PFS ciphers. This means that the ciphers with DHE/ECDHE key-exchange will not be used on the server side. |
||||||||||||||||||||||||||||||||||||
|
Miscellaneous (Global Settings) |
|||||||||||||||||||||||||||||||||||||
|
SSL/TLS Version |
Select the minimum and maximum SSL/TLS version. |
||||||||||||||||||||||||||||||||||||
|
Connection Reset Action |
Select one of the following options for the minimum SSL/TLS version:
Select one of the following options for the maximum SSL/TLS version:
|
||||||||||||||||||||||||||||||||||||
|
Caching persistence |
Select this check box to allow the information to be saved on the node in the control card’s persistent storage so that it can be retrieved in case of reboots. |
||||||||||||||||||||||||||||||||||||
|
DHE Cipher Suites |
Enable this use DHE Cipher suites. |
||||||||||||||||||||||||||||||||||||



