Recommended Policy and Rule Settings

Recommended Policy and Rule Settings

We recommend the following policy settings:

  • Decryption policy:

    • Default action Do Not Decrypt.

    • Enable logging.

    • Set Undecryptable Actions to Block for both SSL v2 Session and Compressed Session.

    • Enable TLS 1.3 decryption and adaptive TLS server identity probe in the policy's advanced settings.

  • Decryption rules: Enable logging for every rule except those with a Do Not Decrypt rule action. (It's up to you; if you want to see information about traffic that isn't decrypted, enable logging for those rules also.)

  • Access control policy:

    • Associate your decryption policy with an access control policy. (If you fail to do this, your decryption policy and rules have no effect.)

    • Set the default policy action to Intrusion Prevention: Balanced Security and Connectivity.

    • Enable logging.

Decryption Policy Settings

How to configure recommended the following best practice settings for your decryption policy:

  • Default action Do Not Decrypt.

  • Enable logging.

  • Set Undecryptable Actions to Block for both SSL v2 Session and Compressed Session.

  • Enable TLS 1.3 decryption and adaptive TLS server identity probe in the policy's advanced settings.

Procedure


Step 1

Click Policies > Access Control > Decryption.

Step 2

Click Edit (edit icon) next to your decryption policy.

Step 3

From the Default Action list at the bottom of the page, click Do Not Decrypt.

The following figure shows an example.

Step 4

At the end of the row, click Logging (logging icon).

Step 5

Select the Log at End of Connection check box.

The following figure shows an example.

Step 6

Click OK.

Step 7

Click Save.

Step 8

Click the Undecryptable Actions tab.

Step 9

We recommend setting the action for SSLv2 Session and Compressed Session to Block.

You shouldn't allow SSL v2 on your network and compressed TLS/SSL traffic is not supported so you should block that traffic as well.

See Default Handling Options for Undecryptable Traffic in the Cisco Secure Firewall Management Center Device Configuration Guide for more information about setting each option.

The following figure shows an example.

This sample SSL policy blocks all traffic that uses either the unsupported SSL v2 protocol or the unsupported compression sessions.

Step 10

Click the Advanced Settings tab page.

Step 11

Select the Enable TLS 1.3 Decryption check box.

decryption policy advanced options enable you to set version-dependent options such as enabling the TLS server identity probe

Step 12

For more information about QUIC decryption, see Decryption Policy Advanced Options in the Cisco Secure Firewall Management Center Device Configuration Guide .

Step 13

At the top of the page, click Save.


What to do next

Configure decryption rules and set each one as discussed in Decryption Rule Settings.

Access Control Policy Settings

How to configure recommended the following best practice settings for your access control policy:

  • Associate your decryption policy with an access control policy. (If you fail to do this, your decryption policy and rules have no effect.)

  • Set the default policy action to Intrusion Prevention: Balanced Security and Connectivity.

  • Enable logging.

Procedure


Step 1

Click Policies > Access Control.

Step 2

Click Edit (edit icon) next to your access control policy.

Step 3

(If your decryption policy is not set up yet, you can do this later.)

  1. Click the Decryption link at the top of the page as the following figure shows.

    For your decryption policy to have any effect, you must associate it with an access control policy.

  2. From the list, click the name of your decryption policy.

  3. Click Apply.

  4. At the top of the page, click Save.

Step 4

From the Default Action list at the bottom of the page, click Intrusion Prevention: Balanced Security and Connectivity.

The following figure shows an example.

Step 5

Click Logging (logging icon).

Step 6

Select the Log at End of Connection check box and click OK.

Step 7

Click Save.


What to do next

See Decryption Rule Examples.