Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How to create a Decryption Policy in SonicOSX 7.0?

04/08/2021 0 People found this article helpful 93,544 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Decryption policies are used to create groups of rules defining which traffic should be decrypted. This decision is based on match criteria such as source IPs and destination IPs. Each decryption policy can have its own match criteria, along with an associated action. Once the match is done, we can decide whether we need to decrypt or bypass.

    In SonicOSX 7.0, the HTTPS content filtering is no longer present. So, if we want to allow HTTPS websites, we need Client DPI SSL and a corresponding decryption policy to inspect them.

    Resolution

    Decryption policy rules define what type of traffic needs to be decrypted. There are three types of rules that can be added, each with its own parameters that can be used for the match.

    • DPI-SSL Client Rules
    • DPI-SSL Server Rules
    • DPI-SSH Rules

    The match criteria for these rules can contain the following traffic parameters:

    Client-side SSL Rules:

    • Source IP address
    • Destination IP address
    • Destination service (port/IP type)
    • User
    • Websites
    • Web category
    • Geo location
    • Schedule

    Server-side SSL Rules:

    • Source IP address
    • Destination IP address
    • Destination service (port/IP type)
    • User
    • Geo location
    • Schedule

    SSH Rules:

    • Source IP address
    • Destination IP address
    • Destination service (port/IP type)
    • User
    • Geo location
    • Schedule

    Before we can create a decryption policy, these features should be enabled globally.


    To Enable Client DPI-SSL:

    1. Navigate to the  Policy | Rules and Policies | Settings and Decryption (DPI-SSL) tab.
    2. Under the General tab, use the toggle button to enable SSL Client Inspection, then click Accept at the bottom.
      Image

    3. The DPI-SSL certificate should be installed on all end user machines for which this decryption policy is being created. You can either install the certificates manually or use a group policy to push the certificates to all machines that are part of the domain. You can download the DPI-SSL certificate by navigating to Policy | Rules and Policies | Settings | Decryption (DPI-SSL) and  selecting the Certificate tab.
      Image

    To enable Server DPI-SSL:

    1. Navigate to the Policy | Rules and Policies | Settings and Decryption (DPI-SSL) tab.
    2. Under the General tab, use the toggle button to turn on Enable SSL Server Inspection and then click Accept at the bottom.
      Image


    3. The certificate and the server address object can be added by navigating to the Policy | Rules and Policies | Settings | Decryption (DPI-SSL) tab, then selecting the SSL Servers tab. Click Add.
      Image

    4. The following options should be selected:
    • In the Address Object/Group pulldown menu, select the address object or group for the server or servers you want to apply DPI-SSL inspection to.
    • In the SSL Certificate pulldown menu, select the certificate that will be used to sign the traffic for the server.
    • The cleartext option indicates that the portion of the TCP connection between the UTM appliance and the local server will be in the clear without the SSL layer, thus allowing SSL processing to be offloaded from the server by the appliance. If you'd like to enable this, you will need to create a PAT rule to remap the encrypted service such as HTTPS to unencrypted service HTTP. Once selected, click Add.

      Image


    To enable DPI-SSH

    1. Navigate to Policy | Rules and Policies | Settings and Decryption (DPI-SSH) tab.
    2. Use the toggle button to turn on Enable SSH Inspection, then click Accept at the bottom.
      Image



    To create a Client SSL Decryption Policy

    1. Navigate to the Policy | Rules and Policies | Decryption Policy tab. Make sure that the drop-down option at the top of the screen is set to Client SSL.
      Image



    2. Click Top at the bottom of the screen. If you have multiple policies it is very important to properly prioritize them in order to make sure that the decryption policy is getting applied to the correct traffic.
      Image


    3. Select the appropriate source/destination/service, or leave it set to Any to decrypt all traffic.
      Image



    4. Under the URL tab, you can select the Web Category and  Website lists as well. In the Action section choose whether you'd like to Decrypt or Bypass.
    5. Click Save.
      Image



    To Create a Server SSL/SSH Decryption Policy

    • Navigate to the Policy | Rules and Policies | Decryption Policy tab. Make sure that the drop-down option at the top of the screen is set to  Server SSL or SSH.
      Image

    • From here, you'll follow the same steps outlined above to create rules .

    Related Articles

    • SSL Control and DPI-SSL Compatibility
    • FIPS Mode: Radius protected with IPSEC VPN
    • Maximum DHCP Leases

    Categories

    • Firewalls > NSv Series > Client/Server DPI-SSL

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
      Scroll to top
      Trace:bc25ceab620983726ed9b9f9e3bc8474-80