Leveraging SSL decryption to look inside encrypted sessions
Secure Sockets Layer/Transport Layer Security (SSL/TLS) and Secure Socket Shell (SSH) decryption perform a man-in-the-middle attack, but for good instead of evil—an encrypted session is intercepted, then, through the use of trusted certificates, the session is deciphered and the payload is made visible for content inspection and App-ID to take a look at. There are three modes of decryption currently available:
- SSH proxy
- SSL forward proxy
- SSL inbound inspection
Let’s look at each of them in detail.
SSH proxy
SSH proxy allows the interception of SSH sessions. The SSH connection will be proxied, meaning that the client connects to the firewall and the firewall establishes a new session to the server. This allows you to control (allow or block) tunneling over the SSH session by setting a security policy for the ssh-tunnel
application.
SSL forward proxy
SSL forward...