You are here
SEC0228 - ASA Firepower 6.0 SSL Decryption (Part 2)
Difficulty Level:
Lab Document:
<Please login to see the content>
Category:
Security
The video walks you through configuration on Cisco ASA FirePower 6.0 for traffic decryption. We will look at decrypting traffic for both inbound and outbound. Any certificate generation, public and private key import will be shown. We will test our configuration using executable file inspection and compare the results when Firepower is configured with and without SSL policy.
Part 2 of this video covers outbound traffic decryption
Topic:
-
Inbound Traffic Decryption
- Public and Private Key Import
- Decrypt - Known Key
-
Outbound Traffic Decryption
- OpenSSL CSR Generation
- Certificate Signing
- Decrypt-Resign
- ASA Static Object NAT
- File Policy
- SSL Policy
- Access Control Policy
4 comments
undecrypted
Hi Matha, thanks for all these great video. I am wondering how can FireSight know the HTTPS are for finance without doing any decryption? Is that based on the public IPs? If that is the case, why it requires URL Filtering license? If not based on the public IPs, that means FireSight did try to decrypt?
Thank you so much!
undecrypted
FMC does web category on https session by referencing URL in the common name of the certificate since that's the only thing FMC can use pre-encryption.
thanks a lot!
thanks a lot!
Trusted CA tab in SSL Policy
Hello Admin,
Thank you again for your amazing and helpful tutorials. One thing interests me which is not documented properly is "Trusted CA Certificate" tab in SSL Policy. In docs i could find paragraph telling that it can be used for verifying server certificates. I am not using any one of them as selected in my SSL Policy and I would like to know what will be difference if I use them. It would be amazing if you can first clarify what is that and give extra example from practice.
Thanks in advance!