Symantec products

symantec products

SSL Visibility Appliance

SSL decryption/SSL communication security measures

Although SSL communication represented by HTTPS continues to increase year by year, it is difficult to implement sufficient security measures because the contents of communication are encrypted. Some products, such as next-generation firewalls, IPS, and secure gateways (proxy), have a function to decrypt SSL, but because they are not dedicated appliances, their performance is degraded and there are few cases where it is difficult to introduce them in actual operations. There is none. In particular, there are many cases where the performance drops significantly as the SSL key length increases to 512bit, 1024bit, and 2048bit.
On the other hand, in cyber-attacks represented by targeted attacks, there are an increasing number of cases where SSL is used to avoid security measures such as firewalls, Box, and forensics. Countermeasures are urgently needed.

Enables transparent SSL decryption without changing the existing network configuration!

feature

  • Dedicated appliance that operates transparently and decrypts SSL communication
  • Combine decrypted SSL communication with other communication and pass data to an external device
  • Decrypt once and serve data to many devices
  • Supports a variety of inline and passive security appliances/applications
  • URL supports category database Supports Global Intelligence Network, enabling SSL decoding targets to be controlled on a category-by-category basis

Examples of linked devices

Explanation of network diagram

UTM/IPS linkage

Active Inline configuration

Among UTM products, AV, IPS, URL Filter, Sandbox, etc.
Also check SSL communication

It is possible to expand detection targets and understand detailed logs.

  • Communicate with SSL site in https state
  • SSL decoded by SSL-VA and deployed to UTM
  • Return communication after inspection by UTM
  • After re-encrypting, connect to SSL site with https

Sandbox/Forensic linkage

Passive inline configuration

Sandbox and Forensic products installed in the mirror also inspect SSL communication to expand the detection target.

  • Communicate with SSL site in https state
  • SSL decoded by SSL-VA, mirror deployment to Sandbox and Forensic
  • After re-encrypting, connect to SSL site with https

Use cases by industry

Case study ① Financial industry [Box /forensics collaboration]

  • background
    • A Box (FireEye) has been introduced due to high security awareness
    • Forensics (packet capture) has also been implemented in accordance with guidelines from government agencies.
    • There are plans to introduce a web cloud service in the future, and SSL Visibility Appliance will be introduced in order to maintain the functions of the existing environment due to SSL communication between the client and the web cloud service *Cloud service to be introduced Verification required by

Case ② Public sector [UTM/WAF collaboration]

  • background
    • When deploying a large-scale security product all at once, we could not ignore the increasing number of SSL communication measures.
    • Due to the cost, many security functions were covered by UTM, but the performance was not enough to implement SSL communication measures with UTM.
    • By introducing SSL Visibility Appliance, not only many outbound security functions (AV, IPS, Sandbox) but also inbound security WAF (Imperva) can be inspected for SSL communication with one unit while keeping costs down. was able to realize

Case study (3) Manufacturing industry [IPS/ Box collaboration]

  • background
    • I installed FireEye, but I didn't realize until just before installation that I couldn't see the contents of the SSL communication.
    • We were aware that more than 40% of all communications within the company were converted to SSL, so an immediate response was required.
    • Macnica has a proven track record of implementing FireEye and SSL Visibility Appliance together, so we selected the product with confidence.
    • In the future, we plan to simultaneously link with existing IPS products.

Network configuration example

When installing in an internal network (forward environment)

In the forward environment, it is possible to introduce devices inline, decrypt SSL, transfer packets to devices with inline configuration, and copy to devices that are waiting with SPAN/TAP configuration. In this case, the device terminates the SSL handshake once, dynamically generates an SSL certificate (Re-Sign), and communicates with the client side, so the client trusts the CA certificate of the device. must be pre-registered as a registered root certification authority.

A case of creating a new CA certificate or terminating an SSL session using a CA certificate in an existing environment
forward environment

When installing in a data center (reverse environment)

If you have a Web server key and certificate in a reverse environment, install it in either TAP mode or Inline mode.

A case where the Inline mode is installed and the SSL session is terminated using the SSL key and certificate of the Web server
forward environment
In case of installing in TAP mode, decrypting SSL, and copying to standby device in SPAN/TAP configuration * In this case, transfer to Inline device is not possible.
forward environment

Each configuration comparison list (inbound / outbound)

 

Outbound configuration

Inbound configuration

Direction of SSL communication for internet For DMZ, for internal
Installation form inline inline TAP
mode passive inline
active inline
passive inline
active inline
passive tap
Devices that can be combined IPS, IDS, Box, Forensics IPS, IDS, Box, Forensics IPS, IDS, Box, Forensics
CA certificate distribution to client PCs requirement unnecessary
Web server certificate and private key unnecessary requirement
SSL session termination can be can be None

Inquiry/Document request

In charge of Macnica Symantec Co., Ltd.

Mon-Fri 8:45-17:30