Workflow for Security Gateway, or Cluster in Gateway mode:
To enable the HTTPS Inspection:
Step |
Description |
---|---|
1 |
In SmartConsole, from the left Navigation Panel, click Gateways & Servers. |
2 |
Open the object of the Security Gateway, or Cluster. |
3 |
From the navigation tree, click HTTPS Inspection. |
4 |
View and export the certificate. |
5 |
Check Enable HTTPS Inspection. |
6 |
Click OK. |
To configure the HTTPS Inspection Rule Base:
Step |
Description |
---|---|
1 |
In SmartConsole, from the left Navigation Panel, click Security Policies. |
2 |
In the Shared Policies section, click HTTPS Inspection. |
3 |
In the middle of the page, click Open HTTPS Inspection Policy in SmartDashboard. The Legacy SmartDashboard opens. |
4 |
Configure the HTTPS Inspection Rule Base. For details, see Configuring HTTPS Inspection. |
5 |
From the top toolbar, click Update (or press Ctrl+S) to save the changes in the database. |
6 |
Close the SmartDashboard. |
To activate the Mirror and Decrypt:
Step |
Description |
---|---|
1 |
In SmartConsole, open the object of the Security Gateway, or Cluster. |
2 |
Configure the topology settings of the designated Mirror and Decrypt interface. |
2A |
From the navigation tree of the gateway object, click Network Management. |
2B |
From the top toolbar, click Get Interfaces Without Topology. |
2C |
Make sure the interface designated for Mirror and Decrypt is listed with the dummy IP address. |
2D |
Select the interface designated for Mirror and Decrypt and click Edit. |
2E |
From the navigation tree, click General. |
2F |
In the General section: In the Network Type field, select Private. Note - This field shows only in Cluster objects. |
2G |
In the Topology section: Click Modify. Topology Settings window opens. |
2H |
In the Leads To section:
|
2I |
In the Security Zone section:
|
2J |
In the Anti-Spoofing section: Make sure to clear the Perform Anti-Spoofing based on interface topology. |
2K |
Click OK to save the changes and close the Topology Settings window. |
3 |
Enable the Mirror and Decrypt. |
3A |
From the navigation tree of the Security Gateway, or Cluster object, click the [+] near the Other and click Mirror and Decrypt. |
3B |
Check Mirror gateway traffic to interface. Mirror and Decrypt - User Disclaimer window opens.
|
3C |
In the Mirror gateway traffic to interface field, select the designated physical interface. |
3D |
Click OK to save the changes and close the Security Gateway, or Cluster properties window. |
To configure the Mirror and Decrypt rules:
Best Practice:
We recommend you to configure a new separate Access Control Layer to contain Mirror and Decrypt rules. Alternatively, you can configure the Mirror and Decrypt rules in the regular Rule Base.
Important:
When you configure the Mirror and Decrypt rules, these limitations apply:
The Name column of these rules cannot contain these strings: <M&D>, <M&d>, <m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate Access Control Layer:
Step |
Description |
---|---|
1 |
In SmartConsole, from the left Navigation Panel, click Security Policies. |
2 |
Create a new Access Control Layer in the Access Control Policy. |
2B |
In SmartConsole top left corner, click Menu > Manage policies and layers. |
2C |
Select the existing policy and click Edit (the pencil icon). Alternatively, create a new policy. |
2D |
From the navigation tree of the Policy window, click General. |
2E |
In the Policy Types section, make sure you select only the Access Control. |
2F |
In Access Control section, click on the + (plus) icon. A pop up window opens. |
2G |
In the top right corner of this pop up window, click New Layer. Layer Editor window opens. |
2H |
From the navigation tree of the Layer Editor window, click General. |
2I |
In the Blades section, make sure you select only the Firewall. |
2J |
On other pages of the Layer Editor window, configure additional applicable settings and click OK. |
2K |
In the Access Control section, you see the Network Layer and the new Access Control Layer. |
2L |
Click OK to save the changes and close the Policy window. |
3 |
In SmartConsole, at the top, click the tab of the applicable policy. |
4 |
In the Access Control section, click the new Access Control Layer. In the default rule, you must change the
|
5 |
Above the existing Cleanup rule, add the applicable rules for the traffic you wish to Mirror and Decrypt. You must configure the Mirror and Decrypt rules as follows:
Important:
|
6 |
Publish the session and install the Access Control Policy. |
7 |
If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for this rule by the Access Rule Name, which contains the configured string: <M&D>, <M&d>, <m&D>, or <m&d>. |