<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Send HTTPS/SSL traffic to Firesight IPS sensors with no decryption? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049386#M1017422</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;I'm not interested in doing SSL decryption. However, I believe if I send https traffic to the Firesight IPS sensors, the sensors can still stop certain vulnerabilities from being exploited (ie Heartbleed) WITHOUT decryption.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Am I wrong? Do most people not even send encrypted HTTPS/SSL traffic to the sensors?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:15:48 GMT</pubDate>
    <dc:creator>Ralphy006</dc:creator>
    <dc:date>2019-03-12T13:15:48Z</dc:date>
    <item>
      <title>Send HTTPS/SSL traffic to Firesight IPS sensors with no decryption?</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049386#M1017422</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;I'm not interested in doing SSL decryption. However, I believe if I send https traffic to the Firesight IPS sensors, the sensors can still stop certain vulnerabilities from being exploited (ie Heartbleed) WITHOUT decryption.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Am I wrong? Do most people not even send encrypted HTTPS/SSL traffic to the sensors?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049386#M1017422</guid>
      <dc:creator>Ralphy006</dc:creator>
      <dc:date>2019-03-12T13:15:48Z</dc:date>
    </item>
    <item>
      <title>The common procedure is to</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049387#M1017423</link>
      <description>&lt;P&gt;The common procedure is to send all traffic (https included) to the sensor. Even if you do not want to decrypt SSL, there are a bunch of other checks that it does, for example destination ip address in Global Blacklist (Security intelligence). I guess this adds some layer of protection to the traffic even if you can't see all parts of it.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 21:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049387#M1017423</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-24T21:06:48Z</dc:date>
    </item>
    <item>
      <title>Ralphy, you're correct.</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049388#M1017424</link>
      <description>&lt;P&gt;Ralphy, you're correct.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Even with encrypted traffic, the base URL is extracted from the SSL flow so you'll be able to have URL based Access Control, have granularity on the HTTPS access based on users, apply SSL vulnerability rules on the SSL flows and more.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The device is smart enough to have the HTTPS portion of the traffic, which is encrypted, to not be analyzed and thus minimizing the CPU impact of this traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2017 14:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049388#M1017424</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-01-25T14:00:08Z</dc:date>
    </item>
    <item>
      <title>Thanks Claudia.</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049389#M1017425</link>
      <description>&lt;P&gt;Thanks Claudiu.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you have this documented anywhere? "&lt;SPAN&gt;The device is smart enough to have the HTTPS portion of the traffic, which is encrypted, to not be analyzed and thus minimizing the CPU impact of this traffic."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 08:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049389#M1017425</guid>
      <dc:creator>Ralphy006</dc:creator>
      <dc:date>2017-01-31T08:42:36Z</dc:date>
    </item>
    <item>
      <title>It's Claudiu, not Claudia :)</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049390#M1017432</link>
      <description>&lt;P&gt;It's Claudiu, not Claudia &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Application_Layer_Preprocessors.html#ID-2244-00000cfc&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;See&lt;/P&gt;
&lt;H4 class="sectiontitle"&gt;Stop inspecting encrypted traffic.&lt;/H4&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By default, the option is set to not inspect encrypted data.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 08:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049390#M1017432</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-01-31T08:42:37Z</dc:date>
    </item>
    <item>
      <title>Thanks Claudiu.</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049391#M1017436</link>
      <description>&lt;P&gt;Thanks Claudiu.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So indeed have the SSL preprocessor enabled and the "Stop inspecting encrypted traffic"/"Server side data is trusted" checked within my network analysis policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, I'm confused whether or not the non-encrypted portion will be inspected for intrusions and URL filtering. ie the stuff you mentioned:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Even with encrypted traffic, the base URL is extracted from the SSL flow so you'll be able to have URL based Access Control, have granularity on the HTTPS access based on users, apply SSL vulnerability rules on the SSL flows and more.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The device is smart enough to have the HTTPS portion of the traffic, which is encrypted, to not be analyzed and thus minimizing the CPU impact of this traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Also, I'm guessing it's recommended to enable the "&lt;SPAN style="font-size: 12pt;"&gt;SSL Preprocessor Rules" GID 137?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please confirm, thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 18:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049391#M1017436</guid>
      <dc:creator>Ralphy006</dc:creator>
      <dc:date>2017-01-31T18:49:13Z</dc:date>
    </item>
    <item>
      <title>Non-encrypted portion is not</title>
      <link>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049392#M1017439</link>
      <description>&lt;P&gt;Non-encrypted portion is not actually non-encrypted. If it's part of the SSL protocol, the SSL preprocessor will analyze it and URL filtering is performed based on the URL generated from the SNI from the Client Hello or CN of the Server Cert.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you need those rules active, you can enable them as well. It solely depends on your use case.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 14:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/send-https-ssl-traffic-to-firesight-ips-sensors-with-no/m-p/3049392#M1017439</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-01T14:30:03Z</dc:date>
    </item>
  </channel>
</rss>

