No video

21. Cisco Firepower Threat Defense 6 2 2: SSL/TLS Decrypt

  Рет қаралды 14,509

Jason Maynard

Jason Maynard

Күн бұрын

Cisco Firepower Threat Defense doing SSL/TLS Decryption. In this video we will perform decryption using resign method, known key. We will build policies using AD integration and we will accommodate health and finance websites that should not be decrypted based on HR policy. Lots of testing including to see the outcome of our policies.

Пікірлер: 34
@aussietramp
@aussietramp 11 ай бұрын
Damn! I learned SO MUCH in just 51 mins! Thanks Jason!
@yazeedfataar835
@yazeedfataar835 6 жыл бұрын
Hi Jason I attended the live session and thank you for sharing this as it was very helpful!
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks for attending and appreciate the comments. Cheers Yazeed
@ICEMAN_96
@ICEMAN_96 4 жыл бұрын
Great video Jason! I've been working with Firepower for over a year and this is the best resource I've found on the SSL policy feature. The current cisco press books provide very little information, hopefully that is changing with the new cert refresh.
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Thanks for the feedback Celeb Beaver
@vaibhavparlekar5645
@vaibhavparlekar5645 6 жыл бұрын
Great video jason. Would be great to see similar detailed video on the malware analysis checks on firepower i.e. fireamp, clamav, dynamic analysis. Keep more videos coming :)
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks Vaibhav, I will create a couple using FMC shortly. In the meantime I do have some on the endpoint side - Check out the following playlist - kzbin.info/aero/PLyf18hdY22ERMGwsca4ZpHYWBC_7zQkZ9
@sergeileshchinsky
@sergeileshchinsky 6 жыл бұрын
Awesome video. Thanks a lot for sharing!
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Thanks Sergei!
@felixsummer4130
@felixsummer4130 5 жыл бұрын
Great tutorial and clear speech! like it.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks for the feedback Felix
@vikaspotadar
@vikaspotadar 5 жыл бұрын
Very much informative!
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks Vikas!
@ameersabbah6407
@ameersabbah6407 4 жыл бұрын
Great video... Thanks a lot
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Thanks for the feedback Ameer!
@TechnicalUstad
@TechnicalUstad 5 жыл бұрын
Awesome video.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks for the comment Technical Ustad!
@majusae
@majusae 5 жыл бұрын
Hi. Great video. I have 2 questions. Can i use a self Signed certificate? All this works if my sensor is in inline mode? (I mean layer 2)
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks Marcela! Check out the following in regards to supported and unsupported features (latest version) www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/getting_started_with_ssl_rules.html?bookSearch=true#id_103862 TLS/SSL Rule Unsupported Features: RC4 cipher suite is unsupported - The Rivest Cipher 4 (also referred to as RC4 or ARC4) cipher suite is known to have vulnerabilities and is considered insecure. SSL policies identify the RC4 cipher suite as unsupported; you should configure the Unsupported Cipher Suite action in the policy's Undecryptable Actions tab page to match your organization’s requirements. For more information, see Default Handling Options for Undecryptable Traffic. -Passive and inline tap mode interfaces not supported
@iamregin
@iamregin 4 жыл бұрын
Great videos all around as I've been looking to tweak the security settings of my FP deployment. I deployed for testing, currently with my own user account, i noticed that Chrome seems to override the SSL policy for anything related to Google, KZbin, Etc. i assume there is a way to prevent this within the policy settings, potentially in the list of undecryptable actions? but i'm also assuming that'll cause the browser to throw errors. Is there a work around for this? or is that going to be a standard expected behavior for browsers going forward?
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Hi Karl, can you expand on this? If you are saying that Chrome is switching to QUIC you can block it on Firepower and force it to drop down to TLS. You can look into GPO to invoke your will on the windows asset.
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Thanks for the comments as well :)
@Bormanb23
@Bormanb23 4 жыл бұрын
Thanks Jason, on the certificate subject, wanted to confirm that it would it be the same or similar process when generating and installing 3rd party SSL Certificates for external access?
@jasonmaynard8773
@jasonmaynard8773 4 жыл бұрын
Correct. Additional Details www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/decryption_tuning_using_ssl_rules.html#ID-2255-00000582 Trusting External Certificate Authorities www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/decryption_tuning_using_ssl_rules.html#ID-2255-00000623 External Certificate Objects www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/reusable_objects.html#ID-2243-00000d4a
@jameshofsisscissp6812
@jameshofsisscissp6812 6 жыл бұрын
What's the performance impact on the Firepower device from using it for SSL/TLS decryption and inspection?
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Hi James, that depends on whether you leverage software or hardware based decryption. I would recommend that you reach out to your local Cisco Security CSE for specific details.
@josecolonii7742
@josecolonii7742 6 жыл бұрын
What other use cases would you decrypt with known key?
@jasonmaynard8773
@jasonmaynard8773 6 жыл бұрын
Decrypt-Known Key method is used to perform inbound SSL/TLS decryption. The core use case is for inbound SSL/TLS traffic to an internal Web Server or device. This allows Firepower to detects malicious content, threats, malware flowing over this secure channel.
@justinmanship5431
@justinmanship5431 5 жыл бұрын
How would you get inspection on PC's on your network that are not part of the domain? Like a guest user or someone with their phone joined to the wireless network. Since they would not have your CA in their trusted root CA's they would receive cert errors correct?
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Hi Justin, not a use case I see often especially when decrypting guest traffic - alot of privacy elements to consider when doing so. You are correct, there are challenges around cert warnings when you do not have the cert signed by a trusted CA. You may consider when onboarding the device to push the cert into the trusted store - perhaps MDM or things like ByoD and ISE. I would have to peal the onion back on this a little more but hope this gives you things to consider.
@justinmanship5431
@justinmanship5431 5 жыл бұрын
@@jasonmaynard8773 That does give me some things to consider. So far I have only set this up for Social Networking sites and it is being applied only to a Security Group with the majority of the domain users in it. Seems to be working but they are getting cert errors in Chrome and Firefox, IE works fine. I created a GPO to add the CA to the PC's and even added it to Firefox on one PC but it still gets the errors. Not sure I really like this very much so far. My other question is don't we basically need to decrypt everything for inspection because they may just connect to a random https site and get malware, if it isn't being inspected. How would you setup that policy?
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
You should not get cert warnings if you followed the setup in the video the first bit talks about the creation of the certificates using MS enterprise CA - I am using Chrome in the example. Look at the example on the client at 16:25 - you can see that no warning as the certificate is trusted. If you continue to have issues I would open a TAC case. In regards to what to decrypt - that depends on the security and HR policy. HR may state that health and finance cannot be decrypted. Also, you may block sites that are bad earlier on in the connection such as through security intelligence or web reputation. Again, it comes down to your security policy and acceptable risk. Hope this helps.
@mikecvirgilio
@mikecvirgilio 5 жыл бұрын
@@justinmanship5431 Check the Hashing algorithm of your root CA.. If it's SHA1, Chrome/Firefox will have issues. You'll need to migrate to SHA256 OR rebuild with SHA256. Once that's done, you need to regen all certificates to get them also to SHA256 (like the subordinate FMC). I ran into this recently and was what I needed to do. yes IE worked with SHA1.. for now.
@jasonmaynard8773
@jasonmaynard8773 5 жыл бұрын
Thanks MIke! Please note: @ 1:43 ish I talk about what the environment looks like and it is a default installation with nothing more but confirm what Mike provided just in case your environment is slightly different. Let us know how it goes and thanks again MIke for the support!!
Firepower Threat Defense - Common Practice Guide Walkthrough
50:28
Jason Maynard
Рет қаралды 32 М.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 87 М.
这是王子儿子吗
00:27
落魄的王子
Рет қаралды 20 МЛН
How to DECRYPT HTTPS Traffic with Wireshark
8:41
Chris Greer
Рет қаралды 373 М.
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 474 М.
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
27:59
Practical Networking
Рет қаралды 112 М.
Understanding Prefilter policy in FTD
16:35
Securing Networks with Cisco Firepower Threat Defense
Рет қаралды 20 М.
Stop, Intel’s Already Dead! - AMD Ryzen 9600X & 9700X Review
13:47
Linus Tech Tips
Рет қаралды 1,1 МЛН