SSL Orchestrator (SSLO)
I
didn’t know anything about Network
Packet Broker (NPB)
till I took a webinar about Gigamon and I understood all the uses
cases where this product fits. It was nearly one year ago. Later on,
Ariadnex
organized talks in Mérida (Spain) to speak about NPB. Since
then, I’ve read about NPBs. Gigamon
and FireEye
are two NPB manufacturers which are able to decrypt SSL traffic,
redirect it, and encrypt it again. They work from Layer 1 to Layer 7.
However, there is another product, similar to NPBs, which works from
layer 2 and it’s able to improve
SSL
visibility and management. It is SSL
Orchestrator (SSLO)
by F5 Networks.
A
few years ago, nobody read the newspaper online with SSL because all
of
these
websites were HTTP instead of HTTPS. However, today, most newspapers,
and also most websites, work with SSL. Therefore, SSL is increasingly
used in the Internet. It’s
important to highlight SSL
is used for privacy. We have to know SSL traffic is encrypted for
privacy and not for security. Nobody will see the content of that
traffic even when the content is malicious traffic. We
need to watch out what's going on even when the traffic is encrypted
with SSL.
SSL Adoption |
Companies
should know what kind of traffic is inside SSL packets. Companies
need SSL Visibility
to know if there are malware inside SSL packets or if there are data
leaks. Security engineers need to know what kind of traffic they can
decrypt and what kind of traffic is forbidden to decrypt. Most
companies, which are worry about this matter, have a daisy-chain of
products to decrypt and encrypt again and
again SSL
traffic regarding what they want to know and what they want to do.
Today,
the daisy-chain architecture is already deprecated.
Traditional SSL daisy-chain network design |
Network
Packet Brokers such as Gigamon and FireEye, and SSL Orchestrators
like F5 SSLO are able to decrypt SSL traffic, classify
the traffic, redirect the traffic to another security appliance, such
as a Web Gateway, IDS/TAP, DLP/ICAP or IPS/NGFW, to be analysed, and
finally re-encrypt the traffic for outgoing. This architecture is
easier to configure. We can add and delete security appliances
easily. In addition, if one security appliance fails, we can even
bypass the failed appliance quickly.
High performance decryption and SSL Orchestration |
This new
architecture is called Dynamic
Service Chain
because it’s really simple to
add appliances dynamically. It allows Dynamic
Scaling.
For instance, when there is a bottleneck in the IPS/NGFW appliance,
it’s easy to add more IPS/NGFW appliances. We only have to
configure a pool of appliances with more devices. What’s more, we
can also choose what kind of traffic we are going to redirect for
analysing with the IDS/TAP and what kind of traffic we don’t want
to redirect to any security appliance.
SSL Orchestrator - A functional Overview |
I
think, technologies such as NPB and SSLO are disruptive because we
can analyse and we can know the content of SSL traffic. I mean, we
have more SSL visibility which is really important for most companies
to detect malware, attacks, data leaks, etc.
Have
a nice day my friends!
Commentaires
Enregistrer un commentaire