Forefront Threat Management Gateway - SSL Decryption

Posted on 2011-03-03
Medium Priority
Last Modified: 2013-11-16
Does the Microsoft Forefront Threat Management Gateway (and other ISA version) have SSL decryption (interception) abilities that allows one to drop other equipment into the SSL decrypted zone?

Thank you for your insight.
Question by:NYGiantsFan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 51

Expert Comment

by:Keith Alabaster
ID: 35027731
ISA does not - FTMG does - the service is called https inspection.
I am not clear though on what you mean by 'that allows one to drop other equipment into the SSL decrypted zone' - can you explain further?

For reference, https inspection is a double-edged sword. What it does is allow FTMG to inspect SSL traffic by terminating the SSL connection and then the FTMG creates its own SSL connection to the destination in effect making two SSL bridges. However, this can also have legal ramifications.... For example, one of your users makes an SSL connection to his bank to transfer funds and you are breaking that SSL connection to 'inspect' traffic.... think about it.

Also, a number of ssl sites will cease to operate if https inspection is applied to them, Microsoft's own update sites are included in this list.

LVL 51

Expert Comment

by:Keith Alabaster
ID: 35027758
As an extra, https inspection is just being amended in FTMG 2010. A new update has just been released (rollup 3 for SP1), you may want to get this installed as well.


Author Comment

ID: 35035994

What I mean in dropping additional equipment, lets say we wanted to drop an IDS or malaware detector into the decrypted zone?  Appliances exist that just decrypts traffic so you can plug such devices into it.  Blue Coat does not allow you to plug additional hardware into the decrypted stream, Netanome does.  I was wondering if FTMG does.

As for laws, we don't need no stinking laws.  (Just kidding, it is covered)
LVL 51

Accepted Solution

Keith Alabaster earned 2000 total points
ID: 35036022
I see - No FTMG would not do that. The break in the https stream is within the FTMG application where it is terminated, inspected and then recreated by FTMG using its own copy of the certificate through to the destination.


Author Closing Comment

ID: 35036069

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses
Course of the Month8 days, 6 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question