The 2018 Threat Report details the advanced threats that evade traditional security mechanisms that are not using DPI-SSL. Please review this short video for the DPI-SSL use cases.
DPI-SSL is a very powerful service offered by SonicWall to provide Deep Packet Inspection (DPI) on Secure Socket Layer (SSL) traffic. This article is going to provide strategies for deploying DPI-SSL. These are generic solutions to be used. If a more specific and complex configuration is required please reach out to the SonicWall Partner Enabled Services (PES) team for guidance.
Enabling DPI-SSL service on the SonicWall without preparing the environment is going to result in catastrophic failure within the organization. There are several phases of preparing the environment to deploy DPI-SSL. These phases include:
Not enabling DPI-SSL will create a major security vulnerability within the infrastructure. Please review the 2018 Threat Report from the above link.
All partners who are in the PES program have access to specialized tools and processes that solve the root causes of deploying DPI-SSL. This is a specialized service within the SonicWall platform and the PES program partners can use their experience and tools to greatly reduce the time of the overall project and the success of the deployment. The following methods are only some of the options available in deploying DPI-SSL, and are mainly focused in providing general guidelines.
There are many types of implementation (or deployment) options, but cutover and phased are the most common. Both have their benefits and drawbacks. When deciding on the type of deployment one should consider several topics:
The cutover strategy is designed for less complex environments that have a low number of clients. The general recommendation is less than 50 clients would be acceptable for a cutover migration. The cutover migration should not take longer than 40 hours to deploy. Often in the smaller environments. The number of applications and services that are affected by DPI-SSL is significantly reduced due to the number of users. The level of acceptable user interruption is going to be higher in the cutover strategy. Establishing user interruption thresholds is important for this deployment style. The number of unique devices will also be significantly less in these environments.
The phased migration would be used in mostly in environments larger than 50 clients. The phased migrations approach consumes more time deploying, but lowers the total risk of impact on the client. The total length of a phased migration should vary from 80-120 hours. The environments will need a prior assessment or documentation to determine number of applications/services and unique devices in the infrastructure. The number of unique devices is going to be significantly higher in these environments. Testing is going to be paramount in this procedure.
Cutover Migration Process
Phased Migration
Conclusion
The most important component of DPI SSL implementation is communication. When using either cutover or phased migration ensuring the clients are notified before and after maintenance is critical to the success of the project. Perception is reality when deploying services. Users don’t care about the complications of deploying an in depth security feature. Users are only going to remember what the impact to their work cycle. Ensure to set expectations accordingly.
Contact Partner Enabled Services with any further questions.