IPS tab
This screen will allow you to confirm the activation of the SSL protocol through the firewall.
Certain options allow reinforcing this protocol’s security. For example, negotiations of cryptographic algorithms that are deemed weak can be prohibited, or software applications that use SSL to bypass filter policies can be detected (SKYPE, HTTPS proxy, etc).
Automatically detect and inspect the protocol | If this protocol is enabled, the inspection function will automatically apply to discover corresponding traffic that filter rules allow. |
TLS v1.3
Allow 0-RTT |
When this checkbox is selected, the IPS engine allows TLS requests that use 0-RTT (Zero Round Trip Time), which reduces the handshake to zero exchanges in order to improve performance for TLS traffic. |
Unknown values/extensions |
Select the type of TLS values or extensions to allow:
|
Enable server certificate analysis |
When this option is selected, the intrusion prevention engine will attempt to retrieve the server certificate for every TLS v1 traffic stream that passes through the firewall so that any potential security flaws relating to this certificate can be analyzed. NOTE
|
When the certificate type is wrong |
Select the action applied to analyzed TLS traffic when the retrieved server certificate displays an anomaly:
|
When the SNI is missing |
Select the action applied to analyzed TLS traffic when the certificate does not have an SNI (Server Name Indication):
|
When the CA is not trustworthy |
Select the action applied to TLS traffic when the CA that signed the server certificate is not in the list of trusted CAs:
|
When the certificate is self-signed |
These certificates are used internally and signed by your local server. They allow guaranteeing the security of your exchanges and authenticating users, among other functions.
|
When the validity date is wrong |
The certificates to which this field applies have a validity date before or after the current date, and are therefore not “valid”.
|
When the CRL verification fails |
Select the action to perform when the automatic verification of the CRL is unsuccessful.
|
When the CRL is invalid |
Select the action to perform when the CRL to verify has expired:
|
Address used for certificate verification |
Select the object that represents the IP address of the firewall to be used for submitting certificate verification requests. If no objects are selected, time the IP address of the interface Firewall_out will be used. |
SSL negotiation
Allow unsupported encryption methods | Select this option if the encryption algorithm that you wish to use is not supported by the SSL protocol. |
Allow unencrypted data after an SSL negotiation | This option allows sending data in plaintext after an SSL negotiation. WARNING |
Authorize signaling cipher (SCSV) | TLS fallback attacks consist of intercepting communications and imposing the weakest cryptographic variant possible. By enabling this option, the firewall will announce a cryptographic pseudo-algorithm that would allow reporting an attempt to launch a fallback attack (RFC 7507). |
Encryption levels allowed | The stronger the encryption algorithm used and the more complex the password, the higher the level of security. EXAMPLE Three choices of encryption levels can be authorized:
|
Manage SSL extensions
Named extensions tab
This table makes it possible to allow/prohibit the named TLS v1.3 protocol extensions.
All known named extensions (see the IANA’s list of TLS extensions) are listed by default: a line in the table therefore contains the ID (between 0 and 56 inclusive), the name of the extension and the action applied to it.
You can:
- Allow or prohibit extensions individually by clicking on their associated action,
- Allow or prohibit a selection of extensions (hold down the Shift key and select consecutive lines or hold down the Ctrl key and select separated lines) and apply a common action to them using Allow selection and Prohibit selection.
- Select all extensions with the Select all button and apply a common action to them using Allow selection and Prohibit selection.
A search field also makes it possible to filter the display of extensions.
Blacklisted extension ranges tab
This table contains the known TLS v1.3 extensions to prohibit other than the ones defined in the Named extensions tab. The ID of these extensions must be between 57 and 65535 inclusive.
Defined extensions can be added (Add button) or deleted (Delete button after selecting the line concerned) individually using their IDs (e.g. 59) or extension ranges (e.g. 59-62, 92-1001).
A search field also makes it possible to filter the display of blacklisted IDs.
Unencrypted data detection (plaintext traffic)
Detection method |
|
Support
Disable IPS | When this option is selected, the scan of the SSL protocol will be disabled and traffic will be authorized if the filter policy allows it |
Log every SSL query | Enables or disables the logging of SMTP requests. |
Application-Layer Protocol Negotiation (ALPN)
Application-Layer Protocol Negotiation (ALPN) is an extension of the Transport Layer Security (TLS) protocol, which negotiates the protocol of the application layer during the TLS handshake.
IANA ALPN tab
In this grid, protocols registered with the IANA and included in the ALPN extension as described in RFC 7301 can be allowed/prohibited.
You can:
- Allow or prohibit protocols individually by clicking on their associated action,
- Select all protocols with the Select all button and apply a common action to them using Allow and Block.
A search field also makes it possible to filter the display of protocols.
ALPN EXCEPTIONS tab
In this grid, ALPN extension protocols that must be excluded from the SSL/TLS protocol analysis can be defined.
You can:
- Add a protocol to be deleted by using the Add button.
- Select all excluded protocols and delete them from the grid by using the Select all then Remove buttons.
A search field also makes it possible to filter the display of protocols.