Addressing SSL Decryption With A10 Thunder SSLi and Cisco Firepower
Addressing SSL Decryption With A10 Thunder SSLi and Cisco Firepower
One situation that comes up every once in a while is the request to use an application layer firewall to decrypt SSL traffic. Usually this is for monitoring and reporting purposes however sometimes it is concerns of attacks happening over encrypted channels that bypass IPS detection and firewall capabilities meaning a user accessing a malicious source over HTTPS. The reality of it is attackers would have to use certificates, which would give away information that they typically don’t want to do. This attack vector is uncommon but a possible risk to consider.The challenge to decrypt SSL on an application layer firewall is it substantially increases the traffic load impacting performance of the security solution. Think of a 1 Gig pipe transforming into a 5 Gig pipe while the hardware passing the traffic is sized for 1 Gig to get an idea of what is going on. One common work around is using selective decryption but even that sometimes only slightly lightens the impact.
Application layer firewall vendors that claim they don’t experience an impact when enabling SSL decryption are either not really decrypting everything or there is another element being removed to make it seem true. The reality is this is an industry challenge for application layer firewall solutions. NSS labs wrote about this a while back HERE.
The best approach to accommodate SSL decryption is to either properly size the application layer firewall when SSL is enabled (assuming the capability is available) or use a dedicated solution for SSL. Many vendors will quickly increase in size and price as the SSL throughput requirements increases sometimes making the final option financially unobtainable. Sometimes considering combining a dedicated SSL solution with the application firewall comes out to less than half of the cost to size up. Obviously pricing and sizing are all very flexible topics however in the end there are times a dedicated SSL appliance is the best option.
There are a handful of vendors in the SSL decryption space. I got to spend some time with one of them, A10 at Cisco live two weeks ago. A10 provided a white paper on their SSL Thunder SSI with Cisco FirePOWER found HERE and demo. Here is a brief overview of the A10 Thunder SSLi offering that compliments an Cisco FirePOWER with SSL decryption requirement.
The first thing to understand is the FirePOWER inline deployment pre SSL enabled. It could look something like this diagram showing traffic passing through the FirePOWER solution.


Cisco FirePOWER can decrypt SSL but at a performance cost. If that cost seems to be out of budget, another option would be using an A10 Thunder SSLi as the SSL decryption solution passing the unencrypted traffic through the Cisco FirePOWER solution for full security evaluation. Other technologies can also send unencrypted traffic as needed making the A10 option a very flexible alternative as shown.




The entire thing can also be configured using the A10 command line which is surprisingly similar to Cisco IOS.

Post a Comment