Which is the difference between exclusions to SSL/TLS inspection rules under rules and policies and under Web Menu?

Exclusions to SSL/TLS inspection rules

XG Firewall provides default exclusion rules for websites and applications. These rules are positioned at the top of the SSL/TLS inspection rule table and are evaluated first. You can’t change their sequence in the rule table.

To the default exclusion rules, add only applications and websites that you don’t want to decrypt in any SSL/TLS inspection rule.

To exclude traffic from decryption using other criteria, you can create additional rules with action set to Do not decrypt and place them immediately below the default rules.

Exclusions by website or category: Contains the following exclusion lists:
  • Local TLS exclusion list: The list is empty by default. You can’t delete it from the exclusion rule. You can add domains to this list based on troubleshooting outcomes. Websites excluded through the control center or the log viewer are also added to this list. To edit this list, go to Web > URL groups.
  • Managed TLS exclusion list: Contains domains known to be incompatible with SSL/TLS inspection and is updated through firmware updates. You can, however, remove the list from the exclusion rule.

Exclusions by application: The list is empty by default. To add to the list, select the exclusion rule and add the Synchronized Security applications. Applications excluded through the control center are also added to the list.

 

Please document the differences between this new tab/option from exceptions available in Web > exceptions. Which one takes precedence?

Thanks

Parents
  • The TLS exclusion lists only apply to SSL/TLS Inspection rules and not to Web Proxy.

  • Can you explain a little bit deeper?

    For example, at the moment, I have web proxy exceptions for Skype, otherwise with decrypt and scan and application control where SKYPE is allowed, skype calls do not work. Do I need to move these exceptions to new SSL/TLS exceptions?

    Also, make sure to document in the PDF or online doc.

    Thanks

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • Not really. I am confused.

    To use the new SSL/TLS, in the firewall rule > web section, I do not need to select any web proxy options?

    Sorry but maybe it's me!

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • No, the new XSTREAM SSL engine is always active, and controlled by the rules. The option for Content Scanning adds additional capabilities for detection of malware if you want to do so.

     

    If you leave the web proxy options unticked then decryption of SSL/TLS traffic will be handled according to the SSL/TLS rules. If you have no rules, then no decryption will be attempted.

     

    For testing or initial deployment purpose it might be helpful to create a TLS Inspection rule that implements a 'do not decrypt' action, but still logs the connections - this way you get visibility under TLS/SSL Inspection in the logviewer and Control Center.

  • Stuart Hatto said:

    No, the new XSTREAM SSL engine is always active, and controlled by the rules. The option for Content Scanning adds additional capabilities for detection of malware if you want to do so.

     

    If you leave the web proxy options unticked then decryption of SSL/TLS traffic will be handled according to the SSL/TLS rules. If you have no rules, then no decryption will be attempted.

     

    Ahh! - That would be so great, if you could hint that, just like you do now in Notification Settings:

    ----

    Best regards Martin ;-)

    Sophos UTM Certified Engineer 9.5
    Sophos  XG  Certified Engineer 17.1
    Homelab: 1 x SG210 XG v18 - 3xAPX530 - 1 x SG210 v9.7 - 1 x UTM 220 v9.7 - 1 x SG135 v9.7 (All Fullguard Plus licenses)

  • The Firewall Part of SSLx / web Proxy is not final yet.

     can maybe show some more inputs here. 

    __________________________________________________________________________________________________________________

  •  

    please provide some examples with proper firewall rules, what to tick inside the firewall rule for both web proxy and ssl/tls decryption.

    Thanks

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • I put some time into this, because it could be confusing in the current state for new people in V18. 

     

    It is quite easy, if you understand the underlaying services. 

     

    The firewall rule will simply "allow" the service. In the firewall Rule you can activate the Web proxy (of V17.5). This proxy is acting on Port 443/80.

    The new SSLx Engine is working on all Ports, so to speak it can actually scan all applications, ports etc. 

     

    If you decrypt all ports with SSLx (the third part), it will do it on all ports. 

    If some traffic is decrypted on port 443, it will "automatically" give this traffic to the build in proxy and all configuration matching in proxy will take care of this traffic (can i open google.de etc.).

    If you activate the configuration on the right of the firewall policy, it will activate the proxy and prioritize the traffic for 443/80. It will not be stream based, instead it is a actual proxy.

     

    So most likely: create a SSLx rule for LAN to WAN.

    Set your Web proxy rule (allow traffic etc.) in the drop done rule and allow the traffic - You should be fine. 

     

    If you observe a application / service / etc. not working with decryption, start to investigate the log viewer (new option --> TLS). 

    __________________________________________________________________________________________________________________

  • Here is my very simple setup. 2 Global Exclusion rules, 2 Do Not Decrypt rules for devices that cant import the appliance cert, and 2 decryption rules for everything else.

    My Firewall does not have any web proxy selected, but I am scanning for Malware in the web streams.

     

  • Much better with a real example!

    Thanks.

    I guess you should better document in the doc and somewhere else, because for me, it was not clear at all!

    Let's see other users' feedbacks.

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  •  

    Here the test I did:

    Linkedin does not open at all.

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • Exclude from decryption did not help!

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

Reply Children
  • Can you give a bit more detail:

    - How are you trying to access LinkedIn? From a browser on a PC or Mac, or from an iPhone or mobile device?

    - Are you sure that the device/browser/app is trusting the re-signing CA on your firewall?

    - Are you sure it's not being blocked by your web policy "Deny ADS"?

    - What entries do you see in the Log Viewer relating to linked in - using the detailed view of the log viewer, you should see Firewall, SSL/TLS and Web filter logs relating to the application definition "LinkedIn Website"?

  • Sure:

    MAC where XG Certificate is installed since v16 I guess. I am using decrypt and scan for almost 3 years now.

    Deny ADS includes only ADS. If I tick web proxy in the same firewall rule, Linkedin opens  without any problem.

    Nothing in the log.

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • With Safari, Linkedin works with no issue.

    With Firefox, Linkedin does not open. I did not even receive the 404 page but browser keeps trying to opening it. FF 69.0.2 and 69.0.3

    Hope this helps!

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • Luk, you should open another Thread for this issue. 

    It is easier to track for the Sophos Support guys to keep a one issue per Thread discussion. 

    So to speak, lets discuss the Exception tab here, and open a new Thread with your issue about Access Linkin in another thread. 

    I highly assume, there is some configuration issue. Hope this is fine. 

    __________________________________________________________________________________________________________________

  • Just to come back on the original thread, DOCUMENT HOW THE NEW DPI can be configured with some KB and pros and cons of using DPI or Web Protection.

    Thanks

    Luk

    Security Architect

    UTM Certified Architect - XG Certified Architect

  • Agree, if you not spend some minutes with the SSLx, it could be quite confusing. But this is still in progress to "improve" this until GA. 

    Please keep in Mind, the GUI and other stuff like the Documentation are not complete right now. So basically there will be more input. 

    If you see some lacking in documentation, please keep putting input into the Community / Threads to inform the Sophos Stuff. 

    __________________________________________________________________________________________________________________

  • As  said the documentation is not fully complete yet. In addition we will shortly release some videos on how to configure both the new DPI functionality and also NAT.