Top Banner
| ©2018 F5 NETWORKS 1 Introduction to SSL Orchestrator
24

Introduction to SSL Orchestrator

Jan 16, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS1

Introduction to SSL Orchestrator

Page 2: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS2

of page loads are now encrypted with SSL / TLS

Encryption is now the norm

89%

SOURCE: F5.COM/LABS

Page 3: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS3

What’s Driving Encrypted Traffic

Heavy adoption of Office 365 and other online productivity suites

Google Search result rankings

Increased focus on user and data privacy

Continued growth of social networks

Compliance with government privacy regulations (ex. GDPR)

Chrome browser warnings

Certificate Authorities offering free SSL / TLS certs (Let’s Encrypt)

Page 4: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS4

RSA, most common

Key Exchange

Diffie-Hellman (Ephemeral)

Key Agreement

Perfect Forward SecrecyEphemeral keys used to encrypt and decrypt information for each session, exposing only a small portion of sensitive user data if the latest key is compromised. 88% of hosts prefer

forward secrecy

Source: 2017 F5 TLS Telemetry Report

Page 5: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS5

TLS 1.3 ratifiedDesigned to be easy to deploy

Mandatory use of PFS Ciphers

Shorter handshake to reduce latency and lower CPU usage

Improved performance with 0-RTT

The Transport Layer Security (TLS) Protocol Version 1.3

Request for Comments: 8446August 2018

Page 6: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS6

F5 SSL Orchestrator

Page 7: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS7

Traditional SSL Daisy-Chain Network DesignSSL Visibility

Web Gateway DLP/ICAP IDS/TAP IPS/NGFW

decrypt encrypt decrypt encrypt decrypt encrypt decrypt encrypt

inspect inspect inspect inspect

%

• Multiple Intercept Points• Multiple Points of Failure• Increased Latency• Increased Complexity • Complicated troubleshooting• Performance Impacts

Challenges & Realities of Daisy-Chaining• Impacts “Perfect” Forward Secrecy• Reduced Security ROI• Must go through every service• Over-subscribing services• Complicated Mesh HA Designs• Bypass on failure (added Hardware)

Page 8: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS8

If done correctly, SSL visibility is the best line of defense against encrypted malware.

Page 9: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS9

SSL OrchestratorEvolution

• Dynamic service chaining• Traffic classification• L3 Outbound• L2/L3, ICAP, TAP services

• Guided configuration• L2 inbound/outbound• Existing application• Topologies• Service catalog • Captive portal auth

• Chassis support• TLS 1.3 support• On-box analytics • Stability enhancements

• HA enhancements• L2 enhancements

• Access v2 refactor• L3 inbound• HTTP services• Explicit proxy auth• ICAP filtering• vCMP support• Email and FTP support• Certificate revocation• iRule injection

4.0

5.0

6.0

7.0

Page 10: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS10

SSL Orchestrator ArchitectureGuided Configuration: Topologies

Page 11: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS11

A Functional OverviewSSL Orchestrator

• IP Reputation• Source IP• Destination IP • IP Geolocation

• Destination Port• Domain Name/SNI• URL Filtering Category• Protocol

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

Cla

ssifi

catio

n

SSL

Encr

pytio

n

The proxy architecture allows for independent control of client-side and server-sideciphers and protocols, and is impervious to mismatch conditions.

Cipher Diversity

SSL Orchestrator

client-side server-side

Ingress (inbound) & Egress (outbound) flow support.

SSLO Flow Support

SSL Decryption occurs based on classification Service Chain assigned. Action is either to

Intercept (decrypt) or Bypass.

Page 12: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS12

Cla

ssifi

catio

n

A Functional OverviewSSL Orchestrator

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

Web Gateway IDS/TAP

DLP/ICAP IPS/NGFW

SSL Orchestrator supports:• Inline HTTP (Web Proxy) • Inline Layer 3• Inline Layer 2• DLP/ICAP• TAP Security Devices.

Dynamic Device Support

Page 13: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS13

Cla

ssifi

catio

n

A Functional OverviewSSL Orchestrator

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

SSL

Encr

pytio

n

Web Gateway IDS/TAP

DLP/ICAP IPS/NGFW

IDS/TAP IPS/NGFWOtherDecryption[Intercept]

Re-Encryption

Web Gateway DLP/ICAP IDS/TAP IPS/NGFWHTTPDecryption[Intercept]

Re-Encryption

IPS/NGFWFinanceDecryption[BYPASS]

Classification

Context-based classification policies allow different types of traffic to flow through different chains of reusable security services

Dynamic Service Chaining

Dynamic Service Chain

Page 14: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS14

Cla

ssifi

catio

n

A Functional OverviewSSL Orchestrator

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

SSL

Encr

pytio

n

Web Gateway IDS/TAP

DLP/ICAP IPS/NGFW

IDS/TAP IPS/NGFW Re-Encryption

Web Gateway DLP/ICAP IDS/TAP IPS/NGFWHTTPDecryption[Intercept]

Re-Encryption

IPS/NGFWFinanceDecryption[BYPASS]

Classification OtherDecryption[Intercept]

Context-based classification policies allow different types of traffic to flow through different chains of reusable security services

Dynamic Service Chaining

Dynamic Service Chain

Page 15: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS15

Cla

ssifi

catio

n

A Functional OverviewSSL Orchestrator

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

SSL

Encr

pytio

n

Web Gateway IDS/TAP

DLP/ICAP IPS/NGFW

IDS/TAP IPS/NGFW Re-Encryption

Web Gateway DLP/ICAP IDS/TAP IPS/NGFWHTTPDecryption[Intercept]

Re-Encryption

IPS/NGFWFinanceDecryption[BYPASS]

Classification OtherDecryption[Intercept]

Context-based classification policies allow different types of traffic to flow through different chains of reusable security services

Dynamic Service Chaining

Dynamic Service Chain

Page 16: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS16

Cla

ssifi

catio

n

A Functional OverviewSSL Orchestrator

SSL

Encr

pytio

n

Web Gateway IDS/TAP

DLP/ICAP IPS/NGFW

IDS/TAP IPS/NGFWOtherDecryption[Intercept]

Re-Encryption

Web Gateway DLP/ICAP IDS/TAP IPS/NGFWHTTPDecryption[Intercept]

Re-Encryption

IPS/NGFWFinanceDecryption[BYPASS]

Classification

A full proxy architecture provides for robust load balancing, monitoring and independent scaling of any number of security devices.

Dynamic Scaling

Dynamic Service Chain

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

%

Page 17: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS17

Cla

ssifi

catio

n

A Functional OverviewSSL Orchestrator

SSL

Dec

rypt

ion

[Inte

rcep

t/Byp

ass]

SSL

Encr

pytio

n

Web Gateway IDS/TAP

DLP/ICAP IPS/NGFW

IDS/TAP IPS/NGFWOtherDecryption[Intercept]

Re-Encryption

Web Gateway IDS/TAP IPS/NGFWHTTPDecryption[Intercept]

Re-Encryption

IPS/NGFWFinanceDecryption[BYPASS]

Classification

The ability to dynamically introduce and evaluate new services and service chains with test traffic before altering production designs.

Dynamic Evaluation

Dynamic Service Chains

DLP/ICAPTest TrafficDecryption[Intercept]

Re-EncryptionWeb Gateway IDS/TAP IPS/NGFW

Page 18: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS18

Dynamic ScalingDynamic Device Support

Dynamic Service Chaining

Cipher Diversity

A full proxy architecture provides for robust load balancing, monitoring and independent scaling of any number of security devices.

SSL Orchestrator supports:• Inline HTTP• Inline Layer 3• Inline Layer 2• DLP/ICAP• TAP security

devices.

Context-based policies allow different types of traffic to flow through different chains of reusable security services.

The proxy architecture allows for independent control of client side and server side ciphers and protocols, and is impervious to mismatch conditions.

Dynamic Evaluation

The ability to dynamically introduce and evaluate new services and service chains with test traffic before altering production designs.

Technology AdvantagesSSL Orchestrator

Page 19: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS19

SSL Orchestrator Guided Configuration: Dashboard

Page 20: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS20

SSL Orchestrator Guided Configuration: Topologies

Page 21: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS21

SSL OrchestratorGuided Configuration: Service Catalog (Expanding)

Page 22: Introduction to SSL Orchestrator

| ©2018 F5 NETWORKS22

Let’s walk through an SSLO Demo

Page 23: Introduction to SSL Orchestrator
Page 24: Introduction to SSL Orchestrator

F5 DoD Virtual User Group (DoDVUG) ScheduleDate Title F5 DoDVUG Topic

Apr 9th Thursday@ 1500 F5 DoD Virtual User Group #1F5 Access Policy Manager with remote access, network tunneling, and CAC/PIV Authentication.

April 23rd Thursday@ 1500 F5 DoD Virtual User Group #2 Get Your SaaS in Gear Enterprise Application StrategyMay 7th Thursday@ 1500 F5 DoD Virtual User Group #3 Advanced Security - F5 ASM

May 21st Thursday@ 1500 F5 DoD Virtual User Group #4 Automation/Orchestration - F5 A/O Toolchain

June 4th Thursday@ 1500 F5 DoD Virtual User Group #5 SCCA / SACA

June 18th Thursday@ 1500 F5 DoD Virtual User Group #6 SSLO Orchestrator

July 9th Thursday@ 1500 F5 DoD Virtual User Group #7 Advanced Web Application Firewall (AWAF) and App Protect

July 30th Thursday@ 1500 F5 DoD Virtual User Group #8 How To Series – Preso & Hands on Lab – Cooking with iRulesAugust 20th Thursday@ 1500 F5 DoD Virtual User Group #9 How To Series – Preso & Hands on Lab – CloudSeptember 17th Thursday@ 1500 F5 DoD Virtual User Group #10 How To Series – Preso & Hands on Lab – SSL EssentialsOctober 15th Thursday@ 1500 F5 DoD Virtual User Group #10 How To Series – Preso & Hands on Lab – TBD