Decryption Policy and Setting up the Decryption Policy Table in SONICOSX 7

Description

Decryption policies are used to create groups of rules that define which traffic should be decrypted based on match criteria such as source IPs and destination IPs. Each decryption policy could have its own match criteria, along with an associated action. The actions are defined by action profiles.

BEHAVIOR

Decryption rules are applied in order of priority (rule order). The rules are created at a certain priority, without any rule auto-priority. All rules are created manually, with no system or default rules available.

DECRYPTION POLICY TYPES

Decryption policy rules define what type of traffic needs to be decrypted. You can specify this as the “match criteria.” This type of traffic includes:

  • DPI-SSL Client Rules
  • DPI-SSL Server Rules
  • DPI-SSH Rules

Client-side SSL Rules

The Match Criteria for DPI-SSL Client Rules can contain the following traffic parameters:

  • Source IP Address
  • Destination IP Address
  • Destination Service (port/iptype)
  • User
  • Websites
  • Web Category
  • Geo location
  • Schedule

 Server-side SSL Rules

The Match Criteria for DPI-SSL Server Rules can contain the following traffic parameters:

  • Source IP Address
  • Destination IP Address
  • Destination Service (port/IPType)
  • User
  • Geo Location
  • Schedule

SSH Rules

The Match Criteria for DPI-SSH Rules can contain the following traffic parameters:

  • Source IP Address
  • Destination IP Address
  • Destination Service (port/IPType)
  • User
  • Geo Location
  • Schedule

    How to configure/enable  Client DPI-SSL and Client DPI-SSL refer to: Enable Client DPI-SSL and Server DPI-SSL

Setting up the Decryption Policy Table

To configure the Decryption Policy table: 

  1. Navigate to POLICY | Rules and Policies > Decryption Policy.

     

    The Decryption Policy table displays.

    Image

  2. Define the Grid Settings by clicking Grid Settings in the upper right corner.
    The Grid Settings dialog displays.

    Image
    You can modify the order of the columns within a group adjust the order of the Group columns, and add new columns depending on your requirements.

  3. In the Column Selection tab, click the arrows on the left to show column options that you can choose to help display Decryption Policy data.

    Image

  4. Click the Preferences tab for additional options for setting up the appearance of your table.

    Image

  5. Click Apply after selecting the desired options to save your configuration

Related Articles

  • How to export and import connection profiles in NetExtender
    Read More
  • Unable access High availability idle device using monitoring IP address
    Read More
  • SSL Control enabled with "Detect Certificate signed by an Untrusted CA" causes Windows Update to fail.
    Read More
not finding your answers?
was this article helpful?