Skip to main content

 

 

Cisco Defense Orchestrator

Firepower Threat Defense SSL Decryption Policy

Some protocols, such as HTTPS, use Secure Sockets Layer (SSL) or its follow-on version, Transport Layer Security (TLS), to encrypt traffic for secure transmissions. Because the system cannot inspect encrypted connections, you must apply SSL decryption policy to decrypt them if you want to apply access rules that consider higher-layer traffic characteristics to make access decisions.

Caution: Keep in mind that decrypting and then re-encrypting traffic adds a processing load on the device, which will reduce overall system performance. 

Continue with these topics:

 
  • Was this article helpful?