Forefront Threat Management Gateway - SSL Decryption

Posted on 2011-03-03
Last Modified: 2013-11-16
Does the Microsoft Forefront Threat Management Gateway (and other ISA version) have SSL decryption (interception) abilities that allows one to drop other equipment into the SSL decrypted zone?

Thank you for your insight.
Question by:NYGiantsFan
  • 3
  • 2
LVL 51

Expert Comment

by:Keith Alabaster
ID: 35027731
ISA does not - FTMG does - the service is called https inspection.
I am not clear though on what you mean by 'that allows one to drop other equipment into the SSL decrypted zone' - can you explain further?

For reference, https inspection is a double-edged sword. What it does is allow FTMG to inspect SSL traffic by terminating the SSL connection and then the FTMG creates its own SSL connection to the destination in effect making two SSL bridges. However, this can also have legal ramifications.... For example, one of your users makes an SSL connection to his bank to transfer funds and you are breaking that SSL connection to 'inspect' traffic.... think about it.

Also, a number of ssl sites will cease to operate if https inspection is applied to them, Microsoft's own update sites are included in this list.

LVL 51

Expert Comment

by:Keith Alabaster
ID: 35027758
As an extra, https inspection is just being amended in FTMG 2010. A new update has just been released (rollup 3 for SP1), you may want to get this installed as well.


Author Comment

ID: 35035994

What I mean in dropping additional equipment, lets say we wanted to drop an IDS or malaware detector into the decrypted zone?  Appliances exist that just decrypts traffic so you can plug such devices into it.  Blue Coat does not allow you to plug additional hardware into the decrypted stream, Netanome does.  I was wondering if FTMG does.

As for laws, we don't need no stinking laws.  (Just kidding, it is covered)
LVL 51

Accepted Solution

Keith Alabaster earned 500 total points
ID: 35036022
I see - No FTMG would not do that. The break in the https stream is within the FTMG application where it is terminated, inspected and then recreated by FTMG using its own copy of the certificate through to the destination.


Author Closing Comment

ID: 35036069

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

A few customers have recently asked my thoughts on Password Managers.  As Security is a big part of our industry I was initially very hesitant and sceptical about giving a program all of my secret passwords.  But as I was getting asked about them mo…
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now