Add an SSL Proxy Profile
You are here: Security Services > SSL Profiles > SSL Proxy.
To add an SSL proxy profile:
Field |
Action |
---|---|
General Information | |
Name |
Enter a name of the SSL proxy profile. The string must contain alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed; maximum length is 63 characters. |
Preferred Cipher |
Specifies the cipher depending on their key strength. Select a preferred cipher from the list:
|
Custom Ciphers |
Specifies the set of ciphers the SSH server can use to perform encryption and decryption functions. If this option is not configured, the server accepts any supported suite that is available. Select the set of ciphers from the list:
|
Flow Trace |
Select the check box to enable flow trace for troubleshooting policy-related issues. Else leave it blank. |
Certificate Type |
Specifies whether the certificate that you want to associate with this profile is a root CA or server certificate. Server certificate is used for SSL reverse proxy. If you choose server certificate, the trusted CA, CRL, and server auth failure options will not be available. For forward proxy profile, choose the root CA In a public key infrastructure (PKI) hierarchy, the root CA is at the top of the trust path. The root CA identifies the server certificate as a trusted certificate. |
Certificate |
Select the certificate that you want to associate with this SSL proxy profile from the list. Specifies the certificate that you created in the Administration > Certificate Management page of J-Web. In a public key infrastructure (PKI) hierarchy, the CA is at the top of the trust path. The CA identifies the server certificate as a trusted certificate. |
Trusted Certificate Authorities |
Select the trusted CA that are available on the device from the following options: All, None, Select specific. If you choose Select specific, you need to select the Certificate Authorities from the Available column and move it to the Selected column. |
Exempted Addresses |
Specifies addresses to create whitelists that bypass SSL forward proxy processing. Select the addresses from the from the Available column and move it to the Selected column. Because SSL encryption and decryption are complicated and expensive procedures, network administrators can selectively bypass SSL proxy processing for some sessions. Such sessions mostly include connections and transactions with trusted servers or domains with which network administrators are very familiar. There are also legal requirements to exempt financial and banking sites. Such exemptions are achieved by configuring the IP addresses or domain names of the servers under whitelists. |
Exempted URL Categories |
Specifies URL categories to create whitelists that bypass SSL forward proxy processing. Select URL categories from the from the Available column and move it to the Selected column. These URL categories are exempted during SSL inspection. Only the predefined URL categories can be selected for the exemption. |
Actions | |
Server Auth Failure |
Select the check box to ignore server authentication completely. In this case, SSL forward proxy ignores errors encountered during the server certificate verification process (such as CA signature verification failure, self-signed certificates, and certificate expiry). We do not recommend this option for authentication, because configuring it results in websites not being authenticated at all. However, you can use this option to effectively identify the root cause for dropped SSL sessions. |
Session Resumption |
Select the check box if you do not want session resumption. To improve throughput and still maintain an appropriate level of security, SSL session resumption provides a session caching mechanism so that session information, such as the pre-master secret key and agreed-upon ciphers, can be cached for both the client and server. |
Logging |
Select an option from the list to generate logs. You can choose to log All events, Warning, Info, Errors, or different sessions (whitelisted, Allowed, Dropped, or Ignored). |
Renegotiation |
After a session is created and SSL tunnel transport has been established, a change in SSL parameters requires renegotiation. SSL forward proxy supports both secure (RFC 5746) and nonsecure (TLS v1.0 and SSL v3) renegotiation. You can specify whether to Allow nonsecure renegotiation, Allow-secure renegotiation, or Drop renegotiation. When session resumption is enabled, session renegotiation is useful in the following situations:
Select if a change in SSL parameters requires renegotiation. The options are: None (selected by default), Allow, Allow-secure, and Drop. |
Certificate Revocation |
Select the check box if you want to revoke the certificate. |
If CRL info not present |
Specifies if you want to allow or drop if CRL info is not present. Select the following actions from the list if CRL info is not present : Allow session, Drop session, or None. |
Hold Instruction Code |
Select Ignore if you want to keep the instruction code on hold. |
Mirror Decrypt Traffic | |
Interface |
Select an SSL decryption port mirroring interface from the list. This is an Ethernet interface on SRX Series device through which the copy of the SSL decrypted traffic is forwarded to a mirror port. |
Only after Security Policies Enforcement |
Select the check box to enable forwarding the copy of the decrypted traffic to the external mirror traffic collector after enforcing the Layer 7 security services through a security policy. |
MAC Address |
Enter the MAC address of the external mirror traffic collector port. |