ProSecure Unified Threat Management (UTM) Appliance

Configure HTTPS Scanning and SSL Certificates

How HTTPS Scanning Works

Configure the HTTPS Scan Settings

Manage SSL Certificates for HTTPS Scanning

Specify Trusted Hosts for HTTPS Scanning

Configure the SSL Settings for HTTPS Scanning

How HTTPS Scanning Works

HTTPS traffic is encrypted traffic that cannot be scanned or the data stream would not be secure. However, the UTM can scan HTTPS traffic that is transmitted through an HTTP proxy. The UTM can break up the SSL connection between the HTTPS server and the HTTP client, scan the HTTPS traffic, and then rebuild the SSL connection. The following figure shows the HTTPS scanning traffic flow.

Figure 123.

The HTTPS scanning process functions with the following principles:

The UTM breaks up an SSL connection between an HTTPS server and an HTTP client in two parts:

-A connection between the HTTPS client and the UTM

-A connection between the UTM and the HTTPS server

The UTM simulates the HTTPS server communication to the HTTPS client, including the SSL negotiation, certificate exchange, and certificate authentication. In effect, the UTM functions as the HTTPS server for the HTTPS client.

The UTM simulates the HTTPS client communication to the HTTPS server, including the SSL negotiation, certificate exchange, and certificate authentication. In effect, the UTM functions as the HTTPS client for the HTTPS server.

Content Filtering and Optimizing Scans

228

Page 228
Image 228
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual Configure Https Scanning and SSL Certificates, How Https Scanning Works, 228