How to configure SonicWall DPI-SSL

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024

Комментарии • 56

  • @lowellabraham6966
    @lowellabraham6966 3 года назад

    Recently picked up the new TZ570 for my home lab. Looking forward to more videos from you!

  • @amstergav
    @amstergav 3 года назад

    It was crisp & clear to understand

  • @chadmarkley
    @chadmarkley 2 года назад +1

    great video!! And damn, that is a SERIOUS MONITOR!!!

  • @rubenalvarez1979
    @rubenalvarez1979 5 месяцев назад

    Hi Jean-Pier. Thanks for the video. I used it to get us up-and-running with DPI-SSL and CFS! In the process, I also learned about UDP 443, Quic protocol. It appears our NSA-4700 is not capable at the moment of inspecting UDP 443. As a result, content filtering was not working on those sites. For example, web sites hosted on Cloudflare. As a workaround, we are now blocking UDP 443 outbound forcing sites to switch to TCP 443. Do you know about this and do you know what Sonicwall's plans are to include UDP 443 in DPI-SSL?

    • @JeanPierTalbot
      @JeanPierTalbot  4 месяца назад

      Il not aware of any firewall capable of inspecting Google quic. So yeah, block udp443 and you are good to go!

  • @peterjohnson4013
    @peterjohnson4013 2 года назад +1

    Excellent video. Thanks.

  • @Asanka4you
    @Asanka4you 7 месяцев назад

    Connection problem with ANYDESK DPI-SSL solution please

  • @MarkusE-og8lb
    @MarkusE-og8lb Год назад

    The former root CA is recorded in the browser cache. If you switch to a private CA like the built in DPI SSL CA the connection will not be trusted until every user clears their browser cache. I wonder if others can confirm. We had no special browser security hardening and DPI SSL was not working without clearing the browser cache (testing with private mode works also).

  • @johntiter2825
    @johntiter2825 Год назад +1

    Hi JP! Could you perhaps make a video on configuring SonicWall Analytics? My organization is interested in using it for report generation.

  • @camilo_dias_rodrigues
    @camilo_dias_rodrigues 3 года назад

    Amazing video! Please do another one about DPI-SSL Server side. Thank you

  • @tommckeown6970
    @tommckeown6970 4 месяца назад

    Followed the steps but when I web browse on the test computer (with the certificate installed) it never uses the sonicwall cert, so I don't think it's working on my nsa4700.

    • @JeanPierTalbot
      @JeanPierTalbot  3 месяца назад

      If all set peoperly, 2 possibilities comes to mind:
      1: the browsing is cashed. Clear the cash and try again.
      2: the web site you try is using Google QUIC. Block UDP/443 in the firewall and try again.

  • @kellybrady4229
    @kellybrady4229 Год назад +1

    Excellent video. Does having enterprise endpoint AV with Network Protection essentially eliminate the benefits of the firewall-level inspection? After following your steps, when testing certs in browsers as you did, it shows the business anti-virus software's cert not the Sonicwall cert. This is a major enterprise endpoint AV product, and it provides endpoint "Network Protection" and by default "Scan SSL" is enabled. The firewall does show current & peak DPI-SSL counts. Does this mean the firewall is still inspecting, even though the enterprise AV is also doing this at the endpoint?

    • @JeanPierTalbot
      @JeanPierTalbot  Год назад +2

      Thanks Kelly.
      I would never, ever, remove the firewall due to a good antivirus. To me, your AV is your last layer of defence. And keep in mind, your AV is not installed in every network enabled device. Those are just a couple reason to keeping firewall.
      For your DPI-SSL question, I suspect the firewall perform inspection and re-encrypt everything with the sonicwall cert. then your endpoint AV perform the same.
      Easy way to try it: block “cars” website with CFS on the firewall and try going to www.ford.com
      If you get the CFS deny web page, DPI-SSL is working. If you get a time out in your browser, DPI-SSL is probably not working. Reason been: CFS blockage on https will simply drop packets if you do not have DPISSL, and will give you a deny message if you do have DPI-SSL.

    • @kellybrady4229
      @kellybrady4229 Год назад

      @@JeanPierTalbot Wow - thanks for the quick and detailed reply! So it seems from what you are saying that it is still a good idea/ok to include DPI-SSL scanning on workstations that also have SSL inspection happening at their endpoint? I like having both the firewall (with all of its capabilities) scanning in addition to the endpoint AV unless that is crazy.... thanks again!

    • @kellybrady4229
      @kellybrady4229 Год назад

      @@JeanPierTalbot So I tested as you suggested: Enabled a couple CFS categories to block on a host PC whose IP is included in DPI-SSL. It did not block anything, although the DPI-SSL status indicates sessions were being processed. So I guess the decision to make is: Do I exclude my PC's from DPI-SSL since my endpoint AV is handling it, but let everything else go thru DPI-SSL, *OR* do I remove the SSL scan feature in the endpoint AV so that I have full visibility/Sonicwall features via DPI-SSL? I don't know there is a "right" answer but it appears I can't perform DPI-SSL on a PC that already has endpoint software that is doing it and replacing the cert.... thanks again for any comments!

  • @danmiller8586
    @danmiller8586 Год назад

    Every time we have tried to implement this, it has created periodic problems. For example, some government / state websites (Attorneys) or financial websites (Accountants), or even logging into banks, or using their web based credit card processing systems will not work. The certificate import into browsers can be (False positive) seen by the web host as a "Man In The Middle" attack and deny connection. Also what about printers / copiers that need to scan to email? Devices / peripherals that connect to vendor sites for firmware updates? So many issues with using the DPI SSL I would love to have solutions for.

    • @JeanPierTalbot
      @JeanPierTalbot  Год назад

      There is no magic. Dpi-ssl can be difficult to turn on. It WILL create issues. That’s why I mentioned in the video to try with one employee in one département and to move on with more people.
      There is no magic, we are trying to break something encryption has been designed to prevent…. It’s doing the be the same challenge with any firewall vendor. I love the « show connection failure » button sonicwall has. Make this implementation less painful.

  • @williamschellhaas8900
    @williamschellhaas8900 3 года назад +1

    Another great video. I use DPI-SSL at my sites but to confirm, without the security subscriptions being active - does DPI really check anything useful without GAV, IPS, etc being licensed?

  • @Asanka4you
    @Asanka4you Год назад

    Another Great Video .. Thanks Brother

  • @Jota_R31
    @Jota_R31 Год назад

    Love this video! Tanks!

  • @salmanmahajan5417
    @salmanmahajan5417 3 года назад +1

    Great content

  • @RossDunham
    @RossDunham 2 года назад

    Great video. Excellent pacing. I'm assuming FireFox has changed their default behavior regarding windows certs, as I didn't need to do anything special for that browser to use the manually installed cert.

    • @JeanPierTalbot
      @JeanPierTalbot  2 года назад

      Hum. Good to know. So Firefox would now use the windows cert like IE and chrome. Cool

  • @HerikSilva_tech
    @HerikSilva_tech Год назад

    Hi Jean!
    Is it good practice enable DPI for an Guest Zone?
    Or is recommended to enable just for LAN zones?
    Excellent video!

    • @JeanPierTalbot
      @JeanPierTalbot  Год назад +2

      I would not do DPI-SSL on a guest wifi. Will be a nightmare to ask all customers to install a cert

  • @Vijay-iz3ee
    @Vijay-iz3ee 3 года назад

    after Enable the DPI SSL , there is No Packet Inspect its show the Status like
    Current DPI-SSL connections (cur/peak/max) 0 / 0 / 200000, any think i need to do NSA 3700

  • @rinconmike
    @rinconmike 3 года назад +1

    Helpful videos - Thanks. What SonicWall are you using it this video? I just went from a 2650 to a TZ670 and see max DPI-SSL on the 670 is 30,000. On the 2650 is it 60,000. What is it on the 2700? The one in this video shows 75,000

    • @JeanPierTalbot
      @JeanPierTalbot  3 года назад

      I’m using a tz670.
      Here is the data sheet for the new tz. www.sonicwall.com/medialibrary/en/datasheet/sonicwall-tz-series-gen-7.pdf

    • @rinconmike
      @rinconmike 3 года назад

      @@JeanPierTalbot thanks. I am using a 670 and my max connection is shown as 30,000 where yours is the 75,000 (time 18:30). Could this be a firmware setting?

    • @rinconmike
      @rinconmike 3 года назад

      @@JeanPierTalbot What firmware were you running? I have SonicOS 7.0.1-R1262 and it shows 30000. Maybe it is a bug in the latest FW. If you are running the latest, can you check? I submitted a ticket too.

  • @Asanka4you
    @Asanka4you 11 месяцев назад

    How about DPI SSH ?

  • @arthurpenstone694
    @arthurpenstone694 2 года назад

    Any advice for someone trying to turn on DPI-SSL for a small network without active directory? What would be your best suggestion for getting the self signed certificate to all machines?

  • @DavidHeckel
    @DavidHeckel 2 года назад

    How do you handle DPI-SSL for guest wifi networks where they don't download a SW cert?

    • @JeanPierTalbot
      @JeanPierTalbot  2 года назад +1

      I personally suggest having your guest wifi on a different network and ensure they have no access to any of your internal networks. Because you are right, you can’t do DPI-SSL on what wifi… so yes, they might infect themselves, but they are not your corporate devices and don’t have any access to your networks… so no issues :-)

  • @gcdcpakmbs
    @gcdcpakmbs Год назад

    When I check certificate on a website, it shows their certificate not mine. Not set up right? Really appreciate the videos, Jean-Pier.

    • @JeanPierTalbot
      @JeanPierTalbot  Год назад +1

      Could be a few things.
      1: website cashed in your browser. Try a browser you never ever use, like edge :-) or try a website you never visited.
      2: some website use the protocol QUIC which is working on UDP/443 and that bypass DPISSL. (Often seen on Google stuff, like RUclips) try a none-Google website. Like ford.com. See if the issue is resolved. If so, in the firewall, block outbound traffic on UDP/443. That will force your browser to use TCP/443 and go through DPISSL
      3: yes you might have set it up wrong :-) if the above 2 don’t solve it. Then you can call sonicwall support

  • @ThomasJSweet
    @ThomasJSweet Год назад

    Do you have any recommendations for companies using Azure Active Directory only? Smaller companies may select to use Azure AD instead of dedicated domain controllers. Would Azure AD Domain Services fill that need?

    • @JeanPierTalbot
      @JeanPierTalbot  Год назад +1

      Yes :-)

    • @ThomasJSweet
      @ThomasJSweet Год назад

      @@JeanPierTalbot I need to 'buy a vowel' here - can you share them or point me in the right direction?

  • @reneversteeg157
    @reneversteeg157 3 года назад

    @ time stamp 4:52 you see it says tz500 with the gen 7 GUI???

    • @JeanPierTalbot
      @JeanPierTalbot  3 года назад

      Yes, it’s one of the great features of centrally managing firewalls through NSM. It offers the same UI no matter what generation of firewall people are managing

  • @zbebu
    @zbebu Год назад

    Hi, great video, but how can i export the exclusion list, on the tab Common Name?

    • @JeanPierTalbot
      @JeanPierTalbot  Год назад

      If there are no export button, you can probably export them in CLI.
      But why do you want to export them?

  • @danraveromero9812
    @danraveromero9812 3 года назад

    Hi Sir Jean,
    How about for phones/mobiles? Do we also need to install this in phones?
    Thank you Sir.

    • @JeanPierTalbot
      @JeanPierTalbot  2 года назад

      Generally speaking phones are not corporate device. So you don’t have control of their security. I would personally advice keeping them off of your network by creating another SSID and putting them on a separate VLAN.
      Reason is that most iPhone apps I tested don’t work even if I imported the certificate, they want their certificate or they just don’t work.
      So if the devices are not yours, they are on a different vlan with no access your your network, I would not be worried of not having DPI-SSL…

  • @totootot5924
    @totootot5924 2 года назад

    Hi, followed every single instruction, exported and installed DPI-SSL cert but it doesn't show up in chrome or any other browser. can you please help
    UPDATE: it worked after I selected all categories under CFS Category-based inclusion/Exclusion.

    • @JeanPierTalbot
      @JeanPierTalbot  2 года назад

      If you excluded all categories you pretty much disabled all DPI-SSL.
      If the cert does not show up in your browser, that means the cert import didn’t work. If you used GPO like I showed, you might have an AD issue where GPO don’t get pushed.

    • @totootot5924
      @totootot5924 2 года назад

      @@JeanPierTalbot Cert got fixed after i pushed gpo. thank you

  • @mujahidhussain9994
    @mujahidhussain9994 Год назад

    why you mention your contact if don't have time to reply back people

    • @JeanPierTalbot
      @JeanPierTalbot  11 месяцев назад

      I don’t think I got an email from you.

  • @garchafpv
    @garchafpv 2 года назад

    dude is completely out of H's cant give an H even if he wanted, all out..