How to update default exclusions for Client DPI SSL manually in closed environments?
11/30/2023 10 People found this article helpful 477,968 Views
Description
Since 6.5.2.x, the default common name exclusions for client DPI SSL is hosted on the cloud at mysonicwall.com. The firewall fetches the list from the cloud over a secure connection. It checks periodically for updates and download them upon availability.
Resolution
Resolution for SonicOS 7.X
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
If you work in a closed environment or behind a proxy installation, these exclusions are supposed to be manually added on the firewall. The firewall will then calculate the run-time exclusion list by compiling new default white list with user-defined exclusions.
You can use the following steps to import the list manually:
- Login to https://mysonicwall.com and navigate to Product Management | My Products and select the Serial number for which you wish to import the list manually.
- Expand the Manual Upgrade button and you would see the option to download the DPI-SSL Whitelist file.
- Once you click on that link, it would download the file ‘Dpi-Ssl’ and you can save that on your computer locally.
- Log in to the firewall UI and navigate to Policy | DPI-SSL | Client SSL | Common Name tab.
- If you scroll down on the page, you will see the section ‘Update Default Exclusions Manually’ where this file can be manually imported.
- Click on the IMPORT EXCLUSIONS button and select the file downloaded earlier.
- A success message will pop up as below. You would be able to see the built-in exclusions post that.
SonicWall keeps updating this list dynamically based on the feedback with respect to applications/URLs that fail with DPI SSL in place. Those get added to the default built-in exclusions as they are found to be incompatible.
NOTE: If you have a closed environment, it would be advisable to keep updating this list at regular intervals.
If you are not seeing the default exclusions hosted on cloud although the Internet connectivity is available on the firewall, you should check the connectivity to mysonicwall.com from Device | Diagnostics | Check Network Settings tab as below
Resolution for SonicOS 6.5
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
If you work in a closed environment or behind a proxy installation, these exclusions are supposed to be manually added on the firewall. The firewall will then calculate the run-time exclusion list by compiling new default white list with user-defined exclusions.
You can use the following steps to import the list manually:
- Login to https://mysonicwall.com and navigate to Product Management | My Products and select the Serial number for which you wish to import the list manually.
- Expand the Manual Upgrade button and you would see the option to download the DPI-SSL Whitelist file.
- Once you click on that link, it would download the file ‘Dpi-Ssl’ and you can save that on your computer locally.
- Log in to the firewall UI and navigate to MANAGE | Decryption Services | DPI-SSL/TLS Client | Common Name tab.
- If you scroll down on the page, you will see the section ‘Update Default Exclusions Manually’ where this file can be manually imported.
- Click on the IMPORT EXCLUSIONS button and select the file downloaded earlier.
- A warning message will pop up as below. Click on OK.
- You would be able to see the built-in exclusions post that.
SonicWall keeps updating this list dynamically based on the feedback with respect to applications/URLs that fail with DPI SSL in place. Those get added to the default built-in exclusions as they are found to be incompatible.
NOTE: If you have a closed environment, it would be advisable to keep updating this list at regular intervals.
If you are not seeing the default exclusions hosted on cloud although the Internet connectivity is available on the firewall, you should check the connectivity to mysonicwall.com from INVESTIGATE | System Diagnostics | Check Network Settings tab as below
Related Articles
Categories