01-24-2019 05:24 AM - edited 03-12-2019 07:15 AM
I would like to see if there is any document which has the cons of ssl inspection of firepower module.
Like the effect on resource usage like memory, processing power on the firewall
01-24-2019 05:32 AM - edited 01-24-2019 05:33 AM
we have 5555-X series with firepower SFR we were very intersted to do the SSL decryption but later the recommendation came from cisco if you looking for SSL decryption that use WSA or FTD bigger box.
so long story short if its production network stay out of it, if in the lab purpose yes go and try it.
here is a link
https://routemypacket.blogspot.com/2017/11/ssl-decryption-with-cisco-firepower.html
https://www.a10networks.com/resources/articles/ssl-inspection-decryption-cisco-asa-firepower
01-24-2019 08:09 AM
Thank you. But I am looking for a cisco documentation which at least says that it is a resource intensive task.
01-24-2019 08:22 AM
I never came across where Cisco said it’s a resource incentive.
But runnning in lab environment personally and after even Cisco TAC recommendation is not run ssl decrying on ASA with sfr as it’s spikes the cpu.
This is from the experience even though if you want to try and don’t believe than what else can be say.
ssl decrying work good with FTD 9300 for sure
01-24-2019 08:26 AM
01-24-2019 08:31 AM
Check this link in regards to throughout with IPS and NGIPS
https://www.cisco.com/c/dam/global/th_th/assets/docs/seminar/ASA5500_X.pdf
01-24-2019 01:07 PM - edited 01-24-2019 01:08 PM
I is common knowledge/best practise to do SSL encryption/decryption on a separate box in your DMZ, back in the day, it was called "SSL offloading". all customers i support run this on a F5 Big IP (or radware box)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide