1. What is it Link to heading

Palo Alto has the capabilities to match traffic based on Application (Layer7).
However most internet traffic is now encrypted with SSL, this means that Palo Alto dont see the underlying application on encrypted traffic.
Decrypting trafic has an impact on how we configure AppID.

Also, We will see in this post the impact decryption has on security profile: URL filtering, Antivirus and other profiles.

2. Why do this Link to heading

One of the main goal of doing decryption is to get visibilty on encrypted trafffic.
This visibility help us to control, understand and apply ngfw features on it.

Using decryption will helps us to see the underlying application on encrypted traffic and to enforce more granular security policies.

Decryption with also helps us to analyze and block threat that are hidden behind encrypted traffic.

3. Diagram Link to heading

This is the same Lab as created in the other video previously.

diagram

The default route for W10 and AD is the Trust NIC of the Palo Alto in Azure.
To follow me with this lab, you can go to my other post that show how to deploy that lab in Azure with Terraform: Lab Deployment Post

To configure decryption uses one of the following:

4. Lab Link to heading

4.1 AppID impact Link to heading

In this lab I will show you a simple usecase of the kind of granularity you can get with AppID using decryption.

First we will start without using decryption and we will try to block the applicaiton: Twitter-Posting.
I create a security policy to block that specific AppID and put it above my general outbound security policy.
Also, I will disable my decryption policy, making sure there is no decryption happening.
appid_4

Now Ill get on Twitter and try to post something.
Its working
appid_6

lets check the Palo Alto traffic logs
We can see that Palo recognize the app as being twitter-base, but unable to dig deeper to see whats the underlying application.
appid_7


Now, lets enable decryption and test again.
appid_8

We are unable to post, lets check the Palo.
We see that Palo is now able to recognize the application: Twitter-Posting, and blocking the session.
appid_9

We can conclude that using decryption allow us to create more granluar security policies based on application filtering.

4.2 Security profile impact Link to heading

4.2.1 URL filtering Link to heading

Palo Alto behaviour when dealing with URL is different with and without decryption.
With encrypted traffic: Palo will use the SNI in the certificate to decide to allow/block.
With decrypted traffic: Palo will use the HTTP host and URL path.

Lookup differences

Lets test this by creating a custom URL category with a URL Path in it.

jeremypageitcompany.com/posts/palo/posts/decryption_profile/

urlfiltering_1

We can then use URL as a destination matching criteria or as a security profile.
Ill test it as a destination matching criteria of a security policy with an action of Deny.
urlfiltering_6

If I open a browser and go to this exact URL, with decryption enable, Palo block the site.
urlfiltering_3 We can check the URL filtering logs
urlfiltering_4

Now if I disable decryption and test again, I can go to the webpage, Palo is unable to block the recognize the full path and apply the correct sec policy.
urlfiltering_5

4.2.2 Antivirus Link to heading

Now we will test the default Antivirus profile.
This profile will be apply to the outbound security policy.
secprofile_4

First lets try to download an Anti-Malware test file on eicar Without Decryption, Palo Alto is unable to apply the Antivirus profile on encrypted traffic.

Note
Also had to disable Microsoft Defender

secprofile_5

Lets enable decryption and try again.
secprofile_3 Palo Alto is blocking the session and inserting a response page to the user.

We can see in the Threat logs that the session was decrypted and blocked.
secprofile_1

4.2.3 Other profiles Link to heading
Vulnerability protection Link to heading

This profile can be really usefull to block attack against known exploit.
A good way to leverage this is to use this profile on Inbound (DNAT) connections coming from the internet on exposed server.
However, to be effective on TCP443 for a web server, it require Inbound Decryption to be able to analyze the traffic.

Note
I will do a post on Inbound Decryption in this serie
Wildfire Link to heading

Wildfire is a great tool to analyze file and stop malware.
There is an option to forward decrypted traffic to Wildfire engine for inspection.

wildfire

DNS Security Link to heading

This is one of the profile that does not need decryption to works as DNS traffic is not encrypted by default.

Misc Link to heading

Basically all other profile dealing with SSL will require decryption to be effective.