Book Image

Mastering Palo Alto Networks - Second Edition

By : Tom Piens aka Piens aka 'reaper'
Book Image

Mastering Palo Alto Networks - Second Edition

By: Tom Piens aka Piens aka 'reaper'

Overview of this book

Palo Alto Networks’ integrated platform makes it easy to manage network and cloud security along with endpoint protection and a wide range of security services. This book is an end-to-end guide to configure firewalls and deploy them in your network infrastructure. You will see how to quickly set up, configure and understand the technology, and troubleshoot any issues that may occur. This book will serve as your go-to reference for everything from setting up to troubleshooting complex issues. You will learn your way around the web interface and command-line structure, understand how the technology works so you can confidently predict the expected behavior, and successfully troubleshoot any anomalies you may encounter. Finally, you will see how to deploy firewalls in a cloud environment, and special or unique considerations when setting them to protect resources. By the end of this book, for your configuration setup you will instinctively know how to approach challenges, find the resources you need, and solve most issues efficiently.
Table of Contents (18 chapters)
16
Other Books You May Enjoy
17
Index

Leveraging SSL decryption to look inside encrypted sessions

SSL/TLS and SSH decryption perform a man-in-the-middle attack, but for good instead of evil—an encrypted session is intercepted then, through the use of trusted certificates, the session is deciphered and the payload is made visible for content inspection and App-ID to take a look at. There are three modes of SSL decryption currently available:

  • SSH proxy
  • SSL forward proxy
  • SSL inbound inspection

Let’s look at each of them in detail.

SSH proxy

SSH proxy allows the interception of SSH sessions. The SSH connection will be proxied, meaning that the client connects to the firewall and the firewall establishes a new session to the server. This allows you to control (allow or block) tunneling over the SSH session by setting a security policy for the ssh-tunnel application.

SSL forward proxy

SSL forward proxy is used for all outbound sessions. There are two distinct directions...