If this is really greenfield, consider taking a tenant approach to your egress traffic handling, you mentioned a "black box with subscription", then consider making that blackbox/traffic path be only available to whatever tenant subscribes to the service, and if they want the SSL/MITM decryption, then their local IT team (or yours) can handle the certificate management and risk of doing such a thing. Then all you need to worry about is managing the egress per tenant, which can all be maintained separately from whatever services you're wrapping up into that security service package. Keep in mind your 80/20s :) -Garrett On Fri, Oct 9, 2020 at 12:28 PM Christopher J. Wolff <cjwolff@nola.gov> wrote:
Dear Nanog;
Hope everyone is getting ready for a good weekend. I’m working on a greenfield service provider network and I’m running into a security challenge. I hope the great minds here can help.
Since the majority of traffic is SSL/TLS, encrypted malicious content can pass through even an “NGFW” device without detection and classification.
Without setting up SSL encrypt/decrypt through a MITM setup and handing certificates out to every client, is there any other software/hardware that can perform DPI and/or ssl analysis so I can prevent encrypted malicious content from being downloaded to my users?
Have experience with Palo and Firepower but even these need the MITM approach. I appreciate any advice anyone can provide.
Best,
CJ