1 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Live Online Q&A Session! We are excited to continue the live online Q&A session immediately.

Slides:



Advertisements
Similar presentations
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Advertisements

Staying in Sync with Cloud 2 Device Messaging. About Me Chris Risner Twitter: chrisrisner.
Palo Alto Networks Jay Flanyak Channel Business Manager
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Bradley Cowie, Barry Irwin and Richard Barnett Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING.
Michael Mauch Worldwide Solution Architect - Security
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP.
Faith Allington Program Manager Microsoft Corporation Session Code: WSV304.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
IPv6 end client measurement George Michaelson
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
CRMUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Implementing CRM 2011 Claims-Based Authentication, ADFS and IFD Best Practices and Tips.
© 2006 Jupitermedia Corporation Webcast TitleSuccessful Rollout Planning 1 January 19, :00pm EST, 11:00am PST George Spafford, President Spafford.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING AND.
© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Senior Network Architect.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
A Proxy-based Real-time Protection Mechanism for Social Networking Sites Presented by Omar Alzahrani A Proxy-based Real-Time Protection Omar Alzahrani.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
TACTEAM -- Dallas 1 Whacking Spam with ISA Server 2000 Thomas W Shinder MD.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
Module 5: Configuring Internet Explorer and Supporting Applications.
Alaska Measures of Progress Educators Webinar September 9, 2014 James Herynk.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
WEBCAST SCHEDULE Today’s event will run one-hour long. Here are the expected times for each segment of the Webcast:  :00 – :05: Moderator introduces the.
Integrating and Troubleshooting Citrix Access Gateway.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Encrypted traffic management
Can SSL and TOR be intercepted? Secure Socket Layer.
Module 10: Windows Firewall and Caching Fundamentals.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Draft-carpenter-v6ops-label-balance-02 Brian Carpenter Sheng Jiang (Speaker) Willy Tarreau March 2012 IPv6 Flow Label for Server Load Balancing - update.
SSL Visibility Solution
Proxysg policy optimization and troubleshooting
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. PROXYSG POLICY BEST PRACTICES  Thank you for joining today’s Blue Coat Customer Support.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MANAGING SSL ON PROXYSG  Thank you for joining today’s Blue Coat Customer Support Technical.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential – Internal Use Only COMPLETE LIFECYCLE APPROACH TO ADVANCED THREAT.
SSL Interception Planning and Implementation Best Practices Stephen Watkins, CISSP (a.m. webcast) Matthew Lange, CISSP (p.m. webcast), Blue Coat Americas.
Q&A Platform for Live Events Make it super easy for anyone in your audience to ask their questions and vote up the ones they like.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
1Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential PROXYSG SSL CRYPTO PROTOCOLS AND ALGORITHMS  Thank you for joining.
Public Tech Instruction: Internet Safety March 26, 2014.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
ArcGIS for Server Security: Advanced
勒索軟體事件分析與SSL流量可視性.
Implementing CRM 2011 Claims-Based Authentication, ADFS and IFD
Modernizing your Remote Access
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
NSE4-5.4 Dumps
Web Security for Field Engineers practice-questions.html.
What’s New in Fireware v12.1.1
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Decrypted Encrypted Web Server Client-side Secure Tunnel
Presentation transcript:

1 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Live Online Q&A Session! We are excited to continue the live online Q&A session immediately following today’s webcast Visit the Blue Coat Customer Forums (forums.bluecoat.com) to post your questions and today’s presenter, Dennis Pike, will be available to answer live and in person. A link to the Q&A discussion thread will be provided at the conclusion of today’s webcast. Important: A Blue Coat Customer Forums account is required to post questions. Don’t have an account? Simply visit forums.bluecoat.com and register now Post a question for a chance to win a Blue Coat swag package!

2 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SSL Decryption Best Practices Hello and thank you for joining today’s Blue Coat Customer Support Technical Webcast! The Webcast will begin just a minute or so after the top of the hour to allow today’s very large audience sufficient time to join You may join the teleconference through the numbers provided in your invite, or listen through your computer speakers Audio broadcast will only go live when the Webcast begins – there will be silence until then The Presentation will run approximately 60 minutes There will be a 30-minute Q/A session thereafter Please submit questions using the Webex Q/A feature!

3 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SSL Decryption Best Practices Dennis Pike == Principal Systems Engineer

4 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG and SSLV SSL Feature Overview and Comparison SG SSL Decryption Best Practices General SSL Proxy SSL Policy SSLV Decryption Best Practices General Policy Certificate Deployment Rollout Methodology Common Issues & Troubleshooting Agenda

5 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SSL visibility and full Proxy policy control for web traffic (HTTP / HTTPS) Selective decrypt maintains privacy via Blue Coat Intelligent Services (BCIS) Feeds decrypted traffic to AV, DLP solutions via ICAP Single output stream – Encrypted TAP (license-based) Automatic visibility and policy control for all SSL/TLS traffic Selective decryption maintains privacy via Host Categorization (license-based) Standalone, high-performance appliance – 9 Gbps SSL inspection & decryption Multiple output streams Enhances IDS/IPS, NGFW, DLP, SWG, security analytics / forensics, compliance, malware analysis / sandbox, etc. ProxySG ApplianceSSL Visibility Appliance SG SSL Decrypt Best Practices SG and SSLV SSL Feature Overview and Comparison

6 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices Don’t Run Defaults!!! Load Concerns ~10-15% CPU Baseline increase Higher % HTTPS (>20%) More demanding Cipher Suites (DHE, larger keys) Low Cert Cache hit rate SG == ASG General

7 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices Tunnel on Protocol Error i.e. non-HTTPS on 443 Benefit: Non-conforming applications will work (Skype) Risk: Big security problem. Major reason for running SSL proxy is to prevent non-HTTPS traffic from burrowing through on port 443. With Tunnel on Protocol Error enabled that traffic will be allowed out. Alternative – Bypass traffic at service (L3) or SSL Intercept level (SSL). SSL Proxy

8 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices SSL Intercept Policy – Splash Text for Wildcard Certs

9 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices What to Bypass Client Cert Non-protocol compliant Pinned Privacy Concern SSL Intercept Policy

10 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices SSL Intercept Policy How to Bypass Recommendations Service Level Bypass IP only Only Transparent / Not Explicit Complete Bypass Disable “Detect Protocol” Service and/or CPL Typically Explicit TCP Tunnel Service Level TCP Tunnel Typically Transparent SSL Intercept “Do Not Intercept” Still SSL Proxied but not Decrypted Access to Certificate information

11 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices Intercept On Exception Policy denial Certificate error Error with the SSL handshake. Careful of Default Behavior!!! Can be used to only Intercept to block traffic but user gets Untrusted Issuer message unless certificate distributed SSL Intercept Policy

12 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices Category Some only available for Explicit since exposed in CONNECT Certificate data is available as long as Service is Intercepting traffic SSL Intercept Policy

13 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SG SSL Decrypt Best Practices SSL Access Policy Cert Validation Start with Server Certificate Validation Enabled -> Very rare for a site to have a bad cert and if it does you want to know about it. Careful with Internal Sites Trust Packages Make sure this is update to the latest. CRL/OCSP Avoid

14 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SSLV Decrypt Best Practices Defaults are good! General

15 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. SSLV Decrypt Best Practices Default Bypass Privacy Concerns Policy

16 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Certificate Deployment Internal CA Methods to push Trusted CA GPO/WSUS/SCCM JAMF MDM IE / Chrome vs Firefox

17 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Rollout Methodology Whitelist vs Blacklist Controlled Friends and Family Departmental Building / Floor

18 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Common Issues and Troubleshooting HTTP issues exposed Auth, Policy, ICAP CPL troubleshooting hootingWebSites PCAP (proxy vs ICAP) Fiddler ETAP

19 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Common Issues and Troubleshooting Policy Trace Debug SSL :8082/sslproxy/Debug HTTP :8082/HTTP/Debug

20 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Thank You

21 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Blue Coat Customer Forums Community where you can learn from and share your valuable knowledge and experience with other Blue Coat customers Research, post and reply to topics relevant to you at your own convenience Blue Coat Moderator Team ready to offer guidance, answer questions, and help get you on the right track Access at forums.bluecoat.com and register for an account today!forums.bluecoat.com

22 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Thank You for Joining Today! Please provide feedback on this webcast and suggestions for future webcasts to: Webcast replay and slide deck found here within 48 hours: webcasts (Requires BTO log-in)

23 Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Quick Survey We are truly committed to continuous improvement for these Technical Webcasts. At the end of the event you will be re- directed to a very short survey about satisfaction with this Program. Please help us out by taking two minutes to complete it. Thank you! Questions for Dennis?