How to Implement and Maintain the SSL Decryption Policy
You can use SSL decryption policies to turn encrypted traffic into plain text traffic, so that you can then apply URL filtering, intrusion and malware control, and other services that require deep packet inspection. If your policies allow the traffic, the traffic is re-encrypted before it leaves the device.
The SSL decryption policy applies to encrypted traffic only. No unencrypted connections are evaluated against SSL decryption rules.
Unlike some other security policies, you need to monitor and actively maintain the SSL decryption policy, because certificates can expire or even be changed on destination servers. Additionally, changes in client software might alter your ability to decrypt certain connections, because the decrypt re-sign action is indistinguishable from a man-in-the-middle attack.
The following procedure explains the end-to-end process of implementing and maintaining the SSL decryption policy.