<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ssl inbound inspection in a  reverse proxy scenario in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508078#M192</link>
    <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to configure ssl inboud inspection in a scenario with 5 web services running behind a reverse proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The flow of traffic is as follow:&lt;/P&gt;&lt;P&gt;Internet (same_public_ip) =&amp;gt;&amp;gt; PA ==(nat)=&amp;gt;&amp;gt; Reverse Proxy =&amp;gt;&amp;gt; Web Services&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since PA will not be able to peek into the sll traffic to grasp which one is the aimed internal service to apply the right certificate (and open the traffic), I guess that in this scenario I would have only two choices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Attribute one public ip for each single internal services (and NAT them back into the same reverse proxy)&lt;/P&gt;&lt;P&gt;2) Remove reverse proxy (since PA would be much more efficient on analyzing the traffic than our reverse proxy)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I right on these considerations?&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jul 2022 13:36:28 GMT</pubDate>
    <dc:creator>LeonardoMachado</dc:creator>
    <dc:date>2022-07-06T13:36:28Z</dc:date>
    <item>
      <title>ssl inbound inspection in a  reverse proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508078#M192</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to configure ssl inboud inspection in a scenario with 5 web services running behind a reverse proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The flow of traffic is as follow:&lt;/P&gt;&lt;P&gt;Internet (same_public_ip) =&amp;gt;&amp;gt; PA ==(nat)=&amp;gt;&amp;gt; Reverse Proxy =&amp;gt;&amp;gt; Web Services&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since PA will not be able to peek into the sll traffic to grasp which one is the aimed internal service to apply the right certificate (and open the traffic), I guess that in this scenario I would have only two choices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Attribute one public ip for each single internal services (and NAT them back into the same reverse proxy)&lt;/P&gt;&lt;P&gt;2) Remove reverse proxy (since PA would be much more efficient on analyzing the traffic than our reverse proxy)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I right on these considerations?&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 13:36:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508078#M192</guid>
      <dc:creator>LeonardoMachado</dc:creator>
      <dc:date>2022-07-06T13:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection in a  reverse proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508208#M197</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/148820"&gt;@LeonardoMachado&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I haven't personally tested (and at the moment I don't have the resources to do it), but I believe you should be able to have separe Decryption rules and applying different certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you know Decryption policies/rule are working pretty much like normal firewall rule - firewall evaluating the rules top to bottom search for first match based on given information - source/dest IP, dest port, and custom URL category.&lt;/P&gt;
&lt;P&gt;I would assume that you can do the following:&lt;/P&gt;
&lt;P&gt;- Let say we have three servers behind the reverse proxy - a.example.com, b.example.com and c.example.com&lt;/P&gt;
&lt;P&gt;- Create three SSL decryption rules matching destination IP the public IP of the reverse proxy (before the NAT)&lt;/P&gt;
&lt;P&gt;- For each rule define dedicate custom URL category that will match only the FQDN for the specific site - (one URL category for "a.example.com/", one url category for "b.example.com/" and one url category for "c.example.com/")&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am imagine that when inbound connection is received it will probably match the first decryption rule (based on destination IP). When client send the "Client Hello" message during SSL negotiation, firewall will use the SNI to identify the actual requested URL and will use it as URL category match, which will trigger new policy evaluation and with the new information it should match only the one with the correct custom URL category and reply to the custmer with the corresponding certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But as I mentioned, this is what would expect to happen, but not able to confirm. So it will be intersting if you have any way to test it and share the results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another approach - simpler but costlier - consider the use of wildcard certificate. In this case you can have single decryption rule (without the need of URL category, only dest ip and port) applying certificate *.example.com. So no matter which of the three services the user is requesting they will receive the same wildcard certificate.&lt;/P&gt;
&lt;P&gt;The advantage of this approach is that it simplies your certificate management - you only need to renew single certificate and you don't have to make any changes on the FW when introducing new services behind the proxy&lt;/P&gt;
&lt;P&gt;The disadvantage is that wildcard certificate could cost more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2022 12:01:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508208#M197</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-07-07T12:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection in a  reverse proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508316#M207</link>
      <description>&lt;P&gt;I'll try to use the SNI field from the TSL Hello Package to create a new application. Then, I will use this new "application" to differentiate traffic and create a specific decrypt policy.&lt;/P&gt;
&lt;P&gt;I'll let you know if it works.&lt;/P&gt;
&lt;P&gt;Thank you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2022 12:55:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508316#M207</guid>
      <dc:creator>LeonardoMachado</dc:creator>
      <dc:date>2022-07-08T12:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection in a  reverse proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508396#M210</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/148820"&gt;@LeonardoMachado&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Defining custom application using the SNI is actually really great idea. It should have the same effect as using default ssl application and custom URL, but this probably will provide better overview.&lt;/P&gt;
&lt;P&gt;Just don't forget to add the custom applications to the allow security rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am interested in the final result, keep us posted.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jul 2022 14:24:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508396#M210</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-07-09T14:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection in a  reverse proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508566#M214</link>
      <description>&lt;P&gt;This solution to segregate the inbound traffic using a custom application based on do SNI field of the TSL Client Hello cannot be configured.&lt;/P&gt;
&lt;P&gt;The Decryption Policy configuration window does not have the Application tab which would allow me to specify only the newly created application to be decrypted. I wonder why PA does not allow decryption policies to be further limited to specific inbound applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 14:15:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508566#M214</guid>
      <dc:creator>LeonardoMachado</dc:creator>
      <dc:date>2022-07-12T14:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection in a  reverse proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508614#M215</link>
      <description>&lt;P&gt;The solution is quite easy: Decryption Policy accepts URL Category. I have created a custom category with my URL and voilà!! No application needed.&lt;/P&gt;
&lt;P&gt;THnks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 21:52:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-inbound-inspection-in-a-reverse-proxy-scenario/m-p/508614#M215</guid>
      <dc:creator>LeonardoMachado</dc:creator>
      <dc:date>2022-07-12T21:52:35Z</dc:date>
    </item>
  </channel>
</rss>

