Procedure
Procedure
Step 1 | If you will implement Decrypt Re-sign rules, create the required internal CA certificate. You must use an internal Certificate Authority (CA) certificate. You have the following options. Because users must trust the certificate, either upload a certificate client browsers are already configured to trust, or ensure that the certificate you upload is added to the browser trust stores.
|
Step 2 | If you will implement Decrypt Known Key rules, collect the certificate and key from each of the internal servers. You can use Decrypt Known Key only with servers that you control, because you must obtain the certificate and key from the server. Upload these certificates and keys as internal certificates (not internal CA certificates). See Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager > Reusable Objects > Certificates > Uploading Internal and Internal CA Certificates. |
Step 3 | Enable the SSL Decryption Policy. When you enable the policy, you also configure some basic settings. |
Step 4 | Configure the Defaullt SSL Decryption Action. If in doubt, select Do Not Decrypt as the default action. Your access control policy can still drop traffic that matches the default SSL decryption rule if appropriate. |
Step 5 | Configure SSL Decryption Rules. Identify traffic to decrypt and the type of decryption to apply. |
Step 6 | If you configure known key decryption, edit the SSL decryption policy settings to include those certificates. See Configure Certificates for Known Key and Re-Sign Decryption. |
Step 7 | If necessary, download the CA certificate used for Decrypt Re-sign rules and upload it to the browser on client workstations. For information on downloading the certificate and distributing it to clients, see Downloading the CA Certificate for Decrypt Re-Sign Rules. |
Step 8 | Periodically, update re-sign known key certificates.
|
Step 9 | Upload missing trusted CA certificates for external servers. The system includes a wide range of trusted CA root and intermediate certificates issued by third parties. These are needed when negotiating the connection between FDM-managed devices and the destination servers for decrypt re-sign rules. Upload all certificates within a root CA's chain of trust to the list of trusted CA certificates, including the root CA certificate and all intermediate CA certificates. Otherwise, it is more difficult to detect trusted certificates issued by intermediate CAs. Upload certificates on the Objects > Certificates page. See See Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager > Reusable Objects > Certificates > Uploading Trusted CA Certificates. |