-
TLS Decryptor
- An SSL appliance designed to decrypt secure socket layer (SSL) traffic and send it to security and network appliances for inspection.
-
Installation
- SSL/TLS decryption of all traffic is very resource intensive.
- In enterprise environments, SSL/TLS appliances may be standalone appliances.
- In SOHO or single campus networks, if these devices are deployed, they are typically on-box, and share the resources of the machine on which it is installed.
-
Operation
- Depending on your installation, SSL/TLS appliances may allow only inbound or outbound inspection at a given time. This depends on the compute given to the decryptor.
-
Other interface options may also exist, such as:
- Fail-open capability
- Traffic bypass filters
- Port monitoring (mirroring)
- Logging
- Transparent proxy
- Detection of SSL/TLS sessions on ports other than 443
- Support for both passive and inline configurations
-
Typical Security Functions
-
Encryption:
-
SSL
- SSL3
- SSL2
-
TLS
- TLS 1.0
- TLS 1.1
- TLS 1.2
- TLS 1.3
-
Notes:
- TLS v1.1 and above are typically only found on standalone devices.
- TLS v1.2 and above are only found on high-end standalone devices.
-
Proxy Mode:
- Transparent
-
Hashing Algorithms:
- MD5
- SHA-1
-
Hardware-Dependent:
-
Public Key Algorithms:
- RSA
- DSA
- DH
-
Symmetric Key Algorithms:
- AES
- 3DES
- DES
- RC4
-
RSA Keys:
- 512 bits
- 1024 bits
- 2048 bits
- 4096 bits
- 8172 bits