Some protocols, such as HTTPS, use Secure Sockets Layer (SSL) or its follow-on version, Transport Layer Security (TLS), to encrypt traffic for secure transmissions. Because the system cannot inspect encrypted connections, you must apply SSL decryption policy to decrypt them if you want to apply access rules that consider higher-layer traffic characteristics to make access decisions.
Caution: Keep in mind that decrypting and then re-encrypting traffic adds a processing load on the device, which will reduce overall system performance.
Continue with these topics:
- About SSL Decryption
- How to Implement and Maintain the SSL Decryption Policy
- Configuring SSL Decryption Policies
- Configure Certificates for Known Key and Re-Sign Decryption
- Downloading the CA Certificate for Decrypt Re-Sign Rules
- Troubleshooting SSL Decryption Issues