01-06-2020 11:40 PM - edited 02-21-2020 09:49 AM
can anyone tell me the summarized steps on how to self generate a CA and self sign a certificate to use in ssl decryption rules?
01-07-2020 12:23 AM
01-07-2020 01:01 AM
01-07-2020 06:38 PM
While one CAN follow the steps outlined in the article @Dinesh Moudgil shared, it is not generally recommended to follow that approach. Decrypting all outbound traffic will severely constrain the throughput of a Firepower device (on the order of 80-90%).
Also, many sites and applications employ techniques (HSTS, certificate pinning etc.) to be resistant to such "man-in-the-middle" decryption, even from a client-trusted CA.
A better approach is to use decryption policies only for incoming traffic to organization-owned servers for which you have the server's private key.
Protect against malicious secure sites with a combination of Cisco Umbrella and AMP for Endpoints, in addition to the basic URL- and IP-based Security Intelligence blacklisting capabilities in Firepower.
01-07-2020 08:02 PM
Also, if you want to see a walk through of setting up FMC as a subordinate CA and implementing an SSL Policy, have a look at this Youtube video:
https://www.youtube.com/watch?v=6-egmsc8Egg
(Friday Firepower Hour - SSL Policy)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide