SSL/SSH Inspection
Secure sockets layer (SSL) content scanning and inspection allows you to apply antivirus scanning, web filtering, and email filtering to encrypted traffic. You can apply SSL inspection profiles to firewall policies.
Deep inspection (also known as SSL/SSH inspection) is typically applied to outbound policies where destinations are unknown. Depending on your policy requirements, you can configure the following:
- Which CA certificate will be used to decrypt the SSL encrypted traffic
- Which SSL protocols will be inspected
- Which ports will be associated with which SSL protocols for inspection
- Whether or not to allow invalid SSL certificates
- Whether or not SSH traffic will be inspected
- Which addresses or web category allowlists can bypass SSL inspection
SSL/SSH inspection profile
To view the available SSL/SSH inspection profiles, go to Security Profiles > SSL/SSH Inspection.
Hover over the leftmost edge of the column heading to display the Configure Table icon, which you can use to select the columns to display or to reset all the columns to their default settings. You can also drag column headings to change their order.
The following options are available:
Create New |
Create an SSL/SSH inspection profile. See Create or edit an SSL/SSH inspection profile. |
Edit |
Modify the selected SSL/SSH inspection profile. See Create or edit an SSL/SSH inspection profile. |
Clone |
Make a copy of the selected SSL/SSH inspection profile. |
Delete |
Remove the selected SSL/SSH inspection profile. |
Search |
Enter a search term to find in the SSL/SSH inspection profile list. |
Name |
The name of the SSL/SSH inspection profile. |
Read Only |
The |
Comments |
An optional description of the SSL/SSH inspection profile. |
Ref. |
Displays the number of times the object is referenced to other objects. To view the location of the referenced object, select the number in Ref.; the Object Usage window opens and displays the various locations of the referenced object. |