No, this is required: With SSL inbound inspection, the firewall is impersonating the server by handling the ssl handshake. It needs to have the real certificate for the client to trust this connection and not throw an error
I host more than 100+ websites.Do I need to upload certificate of all websites?Will it impact performance of Palo?RegardsMohammed Asik M
If you want to ensure that all SSL inbound traffic is being inspected, then yes, you would want to consider having all certs on the FW.
There is always some impact with decryption, usually 10% hit in CPU utilization. Depending on the size of the FW (better performance with larger sized models of FWs) you may be able to mitigate any CPU degradation or latency.
What size FW are you working with (thinking PA5000 series FW, so please advise)
I have see companies invest in an appliance called an HSM (Hardware Security Module), that offloads all of the decryption functionality onto this appliance, so that it does the heavy math/CPU processing to decrypt/re-encrypt traffic.
The performance impact lies in the total volume of decrypted sessions, not the amount of certificates. Your platform will need to be scaled to acommodate this volume and taking into account decryption.
if nearly all of your sessions are encrypted, it maybe be wise to consider one of the newer platforms (5200 series) with far superior decryption capabilities
the HSM serves as a vault, keeping all the private keys extra private (kinda like a password manager for firewalls)
it handles all ssl handshakes, but it does not take the brunt of the decryption processing, so performance gain is near negligable
Thanks for your valuable infirmation.
What size FW are you working with (thinking PA5000 series FW, so please advise)?
My Answer : We are using PA 3020 firewall model. Please let us know is this model having better performance for decryption? Please advise.
I'm not sure of the SSL decryption inbound performance specs of the 3020, but if you're hosting over 100 sites behind it, I'm not sure it's going to have the HW capabilities you need. Another thing to consider is your encryption ciphers you're using and making sure the PAN-OS version you're running will support the decryption of that cipher.
You can also take a look at this thread which is similar to this topic:
PAN-OS 7.1 - Ciphers
PAN-OS 8.1 - Ciphers
Nobody can answer what size firewall you should invest in if this is something you are looking to do, because we don't have any of the required information. What size firewall you will need to size out depends on a lot of different factors that you will need to determine before purchase; this all depends on bandwidth requirements, session count, session per second average, the number of virtual systems you utilize, and the feature set you are looking to enable.
As others have stated I would doubt you would want to enable inbound inspection on a PA-3020 if those sites see moderate traffic levels; but with that being said they could all be low traffic sites where this would all work perfectly fine. We simply don't know from the information present.
As a side note, is this something that you have communicated to your partners and actually have their sign-off on? Before having that conversation with everyone I wouldn't even worry about sizing anything. Depending on what sort of websites these actually are you have additional considerations in actually breaking this encryption.
As previously stated, there will be a performance impact, no we cannot judge how big it will be. The newer models have their own chipsets that deal with SSL decryption so the load is less, e.g. 32XX and 52XX.
Start small, do one at a time and watch the perfomance of the PAN to see where it is. If it peaks out, you'll need to upgrade, if it doesnt keep going until all sites are done.
Thanks for all to share the valuable infornation.
I will check and let you know the status.
Again thanks very much for all
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!