|
|
10.0.0
|
Decryption policies
|
You have the choice of the following types of decryption policies:
-
Decryption policy: Also referred to as a standard decryption policy: We recommend the standard decryption policy type because it's easy to set up with a wizard-like appearance, enabling
you to easily pick security zones, users and networks, and other objects to use in your policy. A standard decryption policy
is particularly suited for anyone who is not proficient at understanding the ins and outs of decryption policies.
-
Rule-based decryption policy: Decryption policy you create using a wizard that steps you through the available options for inbound decryption,
outbound decryption, or both. After you create the rule-based decryption policy, you can add more rules to it, reorder rules,
or make other changes to suit your needs. A rule-based decryption policy is the most flexible but also the most potentially
complicated. You can convert a standard decryption policy to a rule-based policy at any time.
New/modified screens:
|
|
Hardware DTLS 1.2 crypto acceleration for
the Secure Firewall 3100/4200.
|
7.6.0
|
7.6.0
|
The Secure Firewall 3100/4200 now supports DTLS 1.2
cryptographic acceleration and egress
optimization, which
improves throughput of DTLS-encrypted and decrypted traffic.
This is automatically enabled on new and upgraded devices.
To disable, use FlexConfig.
New/modified FlexConfig commands: flow-offload-dtls , flow-offload-dtls egress-optimization , show flow-offload-dtls
|
|
QUIC decryption.
|
10.0.0 (beta)
7.7.0 (experimental)
7.6.0 (experimental)
|
7.6.0 with Snort 3
|
You can configure the decryption policy to apply to sessions
running on the QUIC protocol. QUIC decryption is disabled by
default. You can selectively enable QUIC decryption per
decryption policy and write decryption rules to apply to
QUIC traffic. By decrypting QUIC connections, the system can
then inspect the connections for intrusion, malware, or
other issues. You can also apply granular control and
filtering of decrypted QUIC connections based on specific
criteria in the access control policy.
We modified the decryption policy Advanced Settings to
include the option to enable QUIC decryption.
|
|
Easily bypass decryption for sensitive and
undecryptable traffic.
|
7.6.0
|
7.6.0
|
It is now easier to bypass decryption for sensitive and
undecryptable traffic, which protects users and improves
performance.
New decryption policies now include predefined rules that, if
enabled, can automatically bypass decryption for sensitive
URL categories (such as finance or medical), undecryptable
distinguished names, and undecryptable applications.
Distinguished names and applications are undecryptable
typically because they use TLS/SSL certificate pinning,
which is itself not decryptable.
For outbound decryption, you enable/disable these rules as
part of creating the policy. For inbound decryption, the
rules are disabled by default. After the policy is created,
you can edit, reorder, or delete the rules entirely.
New/modified screens:
|
|
Decryption policy.
|
7.3.0
|
7.3.0
|
Feature renamed to decryption policy to better reflect
what it does. We now enable you to configure a decryption policy
with one or more Decrypt - Resign or
Decrypt - Known Key rules at the same
time.
New/modified screens:
-
(create new decryption
policy)
-
The Create Decryption Policy dialog box now has two tab
pages: Outbound Connections and
Inbound Connections.
Use the Outbound Connections tab
page to configure one or more decryption rules with a
Decrypt - Resign rule action.
(You can either upload or generate certificate
authorities at the same time). Each combination of a CA
with networks and ports results in one decryption
rule.
Use the Inbound Connections tab page to configure one or
more decryption rules with a Decrypt - Known Key rule
action. (You can upload your server's certificate at the
same time.) Each combination of a server certificate
with networks and ports results in one decryption
rule.
-
(edit a decryption rule) Advanced Settings has new options discussed in TLS 1.3 decryption best practices.
-
(edit an access control policy), click the word Decryption to associate a decryption policy with an access control policy.
|
|
TLS 1.3 decryption.
|
7.2.0
|
7.2.0
|
You can now enable TLS 1.3 decryption in an SSL policy's advanced
actions. TLS 1.3 decryption requires the managed device run
Snort 3.
Other options are available as well; for
more information, see TLS 1.3 decryption best practices.
New/modified screens:
|
|
SSL policy advanced settings.
|
7.2.0
|
7.1.0
|
SSL policy advanced settings
New/modified screens:
|
|
Ability to specify handling of URLs having unknown
reputation.
|
6.7.0
|
6.7.0
|
For details, see About URL Filtering with Category and Reputation.
|
|
ClientHello modification for Decrypt -
Known key rules.
|
6.7.0
|
6.7.0
|
For details, see ClientHello message handling.
|
|
Ability to extract the certificate in TLS 1.3 traffic to enable
traffic to match URL and application criteria in access control
rules.
|
6.7.0
|
6.7.0
|
New/modified screens: link.
For details, see Decryption policy advanced options.
|
|
Changes to category and reputation-based URL Filtering.
|
6.7.0
|
6.5.0
|
For details, see About URL Filtering with Category and Reputation.
|
|
TLS crypto acceleration cannot be disabled.
|
6.4.0
|
6.4.0
|
TLS crypto acceleration is enabled on all supported devices.
On a managed device with native interfaces, TLS crypto acceleration cannot be disabled.
Support for TLS crypto acceleration on Firewall Threat
Defense container instances is limited as discussed in the next row of this table.
Removed commands:
-
system support ssl-hw-accel
enable
-
system support ssl-hw-accel
disable
-
system support ssl-hw-status
|
|
Support for TLS crypto acceleration on one Firewall Threat
Defense container instance on a Firepower 4100/9300 module/security engine.
|
6.4.0
|
6.4.0
|
You can now enable TLS crypto acceleration for one Firewall Threat
Defense container instance on a module/security engine. TLS crypto acceleration is disabled for other container instances, but enabled for
native instances.
New/modified commands:
|
|
TLS/SSL hardware acceleration is now referred to as TLS crypto acceleration.
|
6.4.0
|
6.4.0
|
The name change reflects that TLS/SSL encryption and decryption
acceleration is supported on more devices. Depending on the
device, acceleration might be performed in software or in
hardware.
New/modified screens:
|
|
Extended Master Secret extension supported (see RFC 7627).
|
6.3.0.1
|
6.3.0.1
|
The TLS Extended Master Secret extension is supported for SSL
policies; specifically, policies with a rule action of
Decrypt - Resign or
Decrypt - Known Key.
|
|
Extended Master Secret extension not supported.
|
6.3.0
|
6.3.0
|
The extension is stripped during ClientHello modification for
Decrypt - Resign rules.
|
|
TLS/SSL hardware acceleration enabled by default.
|
6.3.0
|
6.3.0
|
TLS/SSL hardware acceleration is enabled by default on all supported devices but can be disabled if desired.
|
|
Extended Master Secret extension supported (see RFC 7627).
|
6.2.3.9
|
6.2.3.9
|
The TLS Extended Master Secret extension is supported for SSL
policies; specifically, policies with a rule action of
Decrypt - Resign or
Decrypt - Known Key.
|
|
Aggressive TLS 1.3 downgrade.
|
6.2.3.7
|
6.2.3.7
|
Using the system support ssl-client-hello-enabled
aggressive_tls13_downgrade {true|false}
CLI command, you can determine the behavior for downgrading TLS
1.3 traffic to TLS 1.2. For details, see the Cisco Secure Firewall Threat Defense
Command Reference.
|
|
TLS/SSL hardware acceleration introduced.
|
6.2.3
|
6.2.3
|
Certain managed device models perform TLS/SSL encryption and
decryption in hardware, improving performance. By default, the
feature is enabled.
Affected screen: To view the status of TLS/SSL hardware acceleration, , General page.
|
|
Category and reputation conditions supported.
|
6.2.2
|
6.2.2
|
Access control rules or SSL rules with category/reputation
conditions.
|
|
SafeSearch supported.
|
6.1.0
|
6.1.0
|
The system displays an HTTP response page for connections
decrypted by the SSL policy, then blocked (or interactively
blocked) either by access control rules or by the access control
policy default action. In these cases, the system encrypts the
response page and sends it at the end of the reencrypted SSL
stream.
SafeSearch filters objectionable content and stops people from
searching adult sites.
|
|
TLS/SSL policy.
|
6.0.0
|
6.0.0
|
Feature introduced.
|