12-04-2023 02:49 AM - edited 12-04-2023 02:54 AM
I am trying to create a policy that blocks all SSL traffic to/from a particular host. I am using https curl to the host from a test client to prove this.
I have tried adding an SSL policy which has the host and test client (both are in src/dst) with all the other filters set to 'any' and an action of Block with reset. The default policy action is do not decrypt as I do not want to interfere with other tfc just this specific use case.
Access policy using application 'HTTPS' also does not match. The only way I have successfully blocked tfc. is using dst. port tcp/443 but obviously this is easily circumvented with a port change.
Can anyone help advise? Thanks
12-04-2023 09:05 AM
Ftd must detect encrypt data how it detects it
Using port
Or use app (used cloud or use database).
So in your case you use port not app.
MHM
12-04-2023 10:56 PM
Hmm OK, I don't want it to decrypt any traffic, I just want it to block ALL SSL of any kind, from a specific host - can the FTD not detect encrypted tfc. or the SSL handshake CLIENT HELLO etc. without actually decrypting?
12-08-2023 05:24 PM
Source/Destination Criteria for SSL Decryption Rules
The default is any zone, address, geographical location, and any TCP port. TCP is the only protocol matched to SSL decryption rules.
Application Criteria for SSL Decryption Rules
The default is any application that has the SSL Protocol tag.
URL Criteria for SSL Decryption Rules
User Criteria for SSL Decryption Rules
Advanced Criteria for SSL Decryption Rules
after all above which one is simple, sure it Src/Des & TCP Port
all HTTPS is TCP but not all TCP is HTTP
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide