I read from the WSA design guide, that decryption with authentication should be avoided.
"Often times, Decryption policies use identities with authentication. While this is not wrong and is sometimes needed, the use of an identity with authentication referenced in the Decryption policy means that all transactions that match the Decryption policy are decrypted in order for authentication to take place. The decryption action might be dropped or passed through, but since there is an identity with authentication, the decryption takes place in order to later drop or pass through the traffic. This is expensive and should be avoided."
So, if we're avoiding authentication on the decryption policies, I can just create a new identity without authentication, then match it on the decryption policy. But, what happens if the traffic is decrypted? In my understanding, it will be forwarded to access policies for evaluation, and performs configured action once a match is found.
From that point, how will the WSA do accounting on the traffic if authentication is not in place initially? Will it use surrogate? Or will it require reauthentication on the client?
Thanks a lot.
... View more
Hi Everyone, I am currently setting up a custom access for a particular subnet. What I did is to create a new identity for them, then allowed only specific URL categories for them. Note that the subnet is already allowed to access the internet through Global access policy. What will be the difference if I rather created a new Access Policy for the subnet? And technically, what's the difference of an Access Policy and an Identity?
... View more