SonicWall DPI-SSL
Deep Packet Inspection of Secure Socket Layer (DPI-SSL) extends SonicWall’s Deep Packet Inspection technology to allow for the inspection of encrypted HTTPS traffic and other SSL-based traffic. The SSL traffic is decrypted transparently, scanned for threats and then re-encrypted and sent along to its destination if no threats or vulnerabilities are found. DPI-SSL provides additional security, application control, and data leakage prevention for analyzing encrypted HTTPS and other SSL-based traffic.
The following security services and features are capable of utilizing DPI-SSL:
SERVER DPI-SSL
Server DPI-SSL is one of two deployment scenarios, the other being Client DPI-SSL, used to inspect SSL-based traffic. Server DPI-SSL deployment scenario is typically used to inspect HTTPS traffic when remote clients
connect over the WAN to access content located on the SonicWall security appliance’s LAN (or DMZ).
ServerDPI-SSL is able to decrypt SSL-based traffic in the following manner:
In this deployment scenario the owner of the SonicWall UTM owns the certificates and private keys of the origin content servers. Administrators will have to import the server's original certificate into the UTM appliance and create appropriate server IP address to server certificate mappings in the Server DPI-SSL UI.
Further, the pairing of internal address objects with certificates can be either encrypted or "Cleartext". If the pairing is not defined to be cleartext, then an SSL connection to the server is negotiated. This allows for end-to-end encryption of the connection. If the pairing defines the server to be 'cleartext' then a standard TCP connection is made to the server on the original (post NAT remapping) port.
This article illustrates the procedure to configure Server DPI-SSL in the SonicWall UTM.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
The following NAT Policy and Access Rule requires to be in place before beginning the confguration process.
Importing the Server Certificate
In order for the SonicWall to be able to act as a re-signing authority, the administrator have to import the Server's certificate along with private key. This would be a PKCS-12 formatted certificate file. Exporting (or creating) a certificate with public and private keys is explained in Exporting the Server Certificate along with Private Key section.
You will be required to restart the SonicWall.
The cleartext option indicates that the portion of the TCP connection between the UTM appliance and the local server will be in the clear without SSL layer, thus allowing SSL processing to be offloaded from the server by the appliance.
In order for such configuration to work properly, the NAT policy should translated from an SSL port to a non-SSL port. For example, in case of HTTPS traffic being used with SSL offloading, an inbound NATpolicy remapping traffic from port 443 to another port needs to be created in order for things to work properly. A port other than port 80 should be used, because port 80 is used for clear text data inbound to the server.
Exporting or creating a PKCS-12 Formatted Certificate File
As mentioned in the Importing Certificate section, Server DPI-SSL deployment requires the administrator to import the server's certificate with private key. This section illustrates the example of creating and/or exporting a PKCS-12 formatted certificate file (.pfx) using Linux and Windows 2008.
The private key and certificate is located in the following locations: /etc/httpd/conf/ssl.key/server.key and /etc/httpd/conf/ssl.crt/server.crt. With these 2 files available, run the following command:
openssl pkcs12 -export -out out.p12 -inkey server.key -in server.crt
Where out.p12 will become PKCS-12 formatted certificate file and server.key and server.crt are PEM formatted private key and certificate file respectively. After the above command, one would be prompted for the password to
protect/encrypted the file. After the password is chosen, the creation of PKCS-12 formatted certificate file is complete and it can be imported into the UTM appliance.
In Microsoft Windows, the PKCS-12 formatted certificate file can be exported either from Internet Information Services (IIS) Manager under Certificates. The following screenshots show the export process:
Based on the above configuration, the following test website was hosted with links to download files of type exe, zip, pdf etc.
The following logs are displayed when user tries to download any one of the file above because App Control Advanced has been configured to block download of file types exe, zip and pdf.
GAV Block Message and log
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
The following NAT Policy and Access Rule requires to be in place before beginning the confguration process.
Importing the Server Certificate
In order for the SonicWall to be able to act as a re-signing authority, the administrator have to import the Server's certificate along with private key. This would be a PKCS-12 formatted certificate file. Exporting (or creating) a certificate with public and private keys is explained in Exporting the Server Certificate along with Private Key section.
You will be required to restart the SonicWall.
The cleartext option indicates that the portion of the TCP connection between the UTM appliance and the local server will be in the clear without SSL layer, thus allowing SSL processing to be offloaded from the server by the appliance.
In order for such configuration to work properly, the NAT policy should translated from an SSL port to a non-SSL port. For example, in case of HTTPS traffic being used with SSL offloading, an inbound NATpolicy remapping traffic from port 443 to another port needs to be created in order for things to work properly. A port other than port 80 should be used, because port 80 is used for clear text data inbound to the server.
Exporting or creating a PKCS-12 Formatted Certificate File
As mentioned in the Importing Certificate section, Server DPI-SSL deployment requires the administrator to import the server's certificate with private key. This section illustrates the example of creating and/or exporting a PKCS-12 formatted certificate file (.pfx) using Linux and Windows 2008.
The private key and certificate is located in the following locations: /etc/httpd/conf/ssl.key/server.key and /etc/httpd/conf/ssl.crt/server.crt. With these 2 files available, run the following command:
openssl pkcs12 -export -out out.p12 -inkey server.key -in server.crt
Where out.p12 will become PKCS-12 formatted certificate file and server.key and server.crt are PEM formatted private key and certificate file respectively. After the above command, one would be prompted for the password to
protect/encrypted the file. After the password is chosen, the creation of PKCS-12 formatted certificate file is complete and it can be imported into the UTM appliance.
In Microsoft Windows, the PKCS-12 formatted certificate file can be exported either from Internet Information Services (IIS) Manager under Certificates. The following screenshots show the export process:
Based on the above configuration, the following test website was hosted with links to download files of type exe, zip, pdf etc.
The following logs are displayed when user tries to download any one of the file above because App Control Advanced has been configured to block download of file types exe, zip and pdf.
GAV Block Message and log