f5 SSL Orchestrator and Opswat Metadefender Integration Guide
f5 SSL Orchestrator and Opswat Metadefender Integration Guide
3
The F5 and OPSWAT MetaDefender Integrated Solution
5
Dynamic Service Chaining
6
Topologies
6
License Components
7
Sizing
7
Traffic Exemptions for SSL/TLS Inspection
8
Best Practices for the Joint Solution
8
Architecture Best Practices
8
Security Best Practices
9
Certificate Requirements
9
IP Addressing
10
Initial Setup
10
Update the BIG-IP SSL Orchestrator Version
11 Guided Configuration
12
Guided Configuration Workflow
19
Testing the Solution
However, performing decryption of SSL/TLS traffic on the security inspection devices, with
native decryption support, can tremendously degrade the performance of those devices,
especially given the demands of stronger, 2048-bit certificates.
An integrated F5 and OPSWAT MetaDefender solution solves these two SSL/TLS challenges.
F5® BIG-IP® SSL Orchestrator® centralizes SSL/TLS inspection across complex security
architectures, enabling flexible deployment options for decrypting and re-encrypting user
traffic. It also provides intelligent traffic orchestration using dynamic service chaining and
policy-based management. The decrypted traffic is then inspected by one or more OPSWAT
MetaDefender ICAP Servers, which can prevent previously hidden threats and block zero-
day exploits. This solution eliminates the blind spots introduced by SSL/TLS and closes any
opportunity for adversaries.
This overview of the joint F5 and OPSWAT solution describes different deployment modes
with reference to service chain architectures, recommends practices, and offers guidance on
how to handle enforcement of corporate Internet use policies.
• Flexible deployment modes that easily integrate into even the most complex
architectures, consolidate the security stack to reduce complexity, and deliver SSL/TLS
visibility across the security infrastructure.
• Built-in health monitors that detect security service failures and shifts or bypasses
loads in real time to provide reliability and fault tolerance.
• Full cipher support, including support for the PFS-enabled ciphers, to ensure full
traffic visibility.
S S L / T L S V I S I B I L I T Y: H O W D O W E D O I T ?
F5’s industry-leading full proxy architecture enables BIG-IP SSL Orchestrator to install a
decryption/clear text zone between the client and web server, creating an aggregation
(and disaggregation) visibility point for security services. The F5 system establishes two
independent SSL/TLS connections—one with the client and the other with the web server.
When a client initiates an HTTPS connection to the web server, BIG-IP SSL Orchestrator
intercepts and decrypts the client-encrypted traffic and steers it to a pool of OPSWAT
MetaDefender ICAP Servers for inspection before re-encrypting the same traffic to the web
server. The return HTTPS response from the web server to the client is likewise intercepted
and decrypted for inspection before being sent on to the client.
F5 System
Server Hello Server Hello
OPSWAT
Change CipherSpec, Finished MetaDefender Change CipherSpec, Finished
Client Side Secure Data Inspection Zone Server Side Secure Data
Exchange Exchange
A typical security stack often consists of more than advanced anti-malware protection
systems, with additional components such as a firewall, intrusion detection or prevention
systems (IDSs/IPSs), web application firewalls (WAFs), malware analysis tools, and more.
To solve specific security challenges, administrators are accustomed to manually chaining
these point security products. In this model, all user sessions are provided the same level of
security, as this “daisy chain” of services is hard-wired.
BIG-IP SSL Orchestrator not only decrypts the encrypted traffic, but it also load balances,
monitors, and dynamically chains security services, including next-generation firewalls
(NGFWs), data loss prevention (DLP), IDSs/IPSs, WAFs, and anti-virus/anti-malware systems.
It does this by matching user-defined policies, which determine what to intercept and whether
to send data to one set of security services or another based on context. This policy-based
traffic steering enables better utilization of existing security investments and helps reduce
administrative costs.
USERS/DEVICES
BIG-IP SSL
Orchestrator Firewall Internet
The powerful classification engine of BIG-IP SSL Orchestrator applies different service chains
based on context derived from:
• IP geolocation • Protocol
Different environments call for different network implementations. While some can easily
support SSL /TLS visibility at layer 3 (routed), others may require these devices to be
inserted at layer 2. BIG-IP SSL Orchestrator can support all these networking requirements
with the following topology options:
LICENSE COMPONENTS
The BIG-IP SSL Orchestrator product line—the i2800, r2800, i4800, r4800,i5800, r5800,
i10800, r10800, r10900, i11800, i15800, and Virtual Edition High Performance (HP)—supports
this joint solution. The F5® VIPRION® platform and the F5® VELOS® platform are also
supported. BIG-IP SSL Orchestrator devices ship with an installed base module that provides
both SSL/TLS interception and service chaining capabilities. Please contact your local F5
representative to further understand the licensing and deployment options.
Unless otherwise noted, references to BIG-IP SSL Orchestrator and the F5® BIG-IP® system
in this document (and some user interfaces) apply equally regardless of the F5 hardware or
virtual edition (VE) used. The solution architecture and configuration are identical.
• A network hardware security module (HSM) to safeguard and manage digital keys for
strong authentication.
• F5® Secure Web Gateway Services to filter and control outbound web traffic using a
URL database.
• F5® BIG-IP® Access Policy Manager® (APM) to authenticate and manage user access.
• F5® BIG-IP® Advanced WAF® to protect against common vulnerabilities (CVEs) and web
exploits, targeted attacks, and advanced threats.
• An F5® BIG-IP® Local Traffic Manager™ (LTM) add-on software license mode. This
solution’s supported on all F5 ® BIG-IP® iSeries® and older F5 hardware platforms and
has no specific restrictions on additional F5 software modules (including the above
software services). This option’s suited for environments that need to deploy BIG-IP
SSL Orchestrator on an existing BIG-IP device or have other functions that must run
on the same device.
• An OPSWAT License.
Refer to the OPSWAT technical documentation for complete guidance. (Administrators may
need to be registered with appropriate privileges to access this resource.)
SIZING
The main advantage of deploying BIG-IP SSL Orchestrator in the corporate security
architecture is that the wire traffic now can be classified as “interesting” traffic, which needs
to be decrypted by BIG-IP SSL Orchestrator for inspection by an OPSWAT MetaDefender
ICAP Server, and “uninteresting” traffic, which is allowed to pass through or be processed
differently according to other corporate policy requirements. This selective steering of only
the interesting traffic to the OPSWAT MetaDefender ICAP Server conserves its valuable
resources (as it need not inspect the entire wire traffic), maximizing performance.
As a result, it’s important to consider the entire wire traffic volume to calculate the appropriate
F5 system size. The OPSWAT MetaDefender ICAP Server will require one interface on the F5
system to allow ICAP traffic to flow between them.
Refer to the BIG-IP SSL Orchestrator data sheet and consider the following factors when
sizing the F5 system for the integrated solution:
• Port density.
• System resources.
• Guest VLANs.
• Trusted software update sources like those for Microsoft Windows updates.
Administrators can also exempt traffic based on domain names and URL categories. The
policy rules of BIG-IP SSL Orchestrator enable administrators to enforce corporate Internet
use policies, preserve privacy, and meet regulatory compliance.
Traffic exemptions based on URL category might include bypasses (and thus no decryption)
for traffic from known sources of these types of traffic:
• Financial
• Health care
• Government services
Several best practices can help optimize the performance, reliability, and security.
F5 recommendations include:
• Deploy inline. Any SSL/TLS visibility solution must be inline to the traffic flow to decrypt
PFS cipher suites such as elliptic curve Diffie-Hellman encryption (ECDHE).
• Deploy BIG-IP SSL Orchestrator in a device sync/failover device group (S/FDG) that
includes the high-availability (HA) pair with a floating IP address.
• Achieve further interface redundancy with the Link Aggregation Control Protocol
(LACP). LACP manages the connected physical interfaces as a single virtual interface
(aggregate group) and detects any interface failures within the group.
SSL/TLS orchestration generally presents a new paradigm in the typical network architecture.
Previously, client/server traffic passed encrypted to inline security services, which then
had to perform their own decryption if they needed to inspect that traffic. When BIG-IP SSL
Orchestrator is integrated into the security architecture, all traffic to a security device is
decrypted—including usernames, passwords, and social security and credit card numbers. It’s
therefore highly recommended that security services be isolated within a private, protected
C E R T I F I C AT E R E Q U I R E M E N T S
IP ADDRESSING
For example, an ICAP Server can be configured to use the IP address [Link]/25 VLAN
on the Service VLAN pointing to the BIG-IP SSL Orchestrator-connected interface. The table
below explains the necessary IP addresses to configure when deploying multiple ICAP
Servers in the service pool.
For deployment in a layer 3 (routed or explicit proxy) topology, the F5 system must be
configured with appropriate client-facing, outbound-facing VLANs plus self-IPs and routes.
The VLANs define the connected interfaces, and the self-IPs define the respective IPv4 and/
or IPv6 subnets. Refer to the F5 Routing Administration Guide for configuration steps to set
up the VLANs and self-IPs.
I M P O R T A C A C E R T I F I C AT E A N D P R I VAT E K E Y
For SSL/TLS orchestration in an outbound traffic topology, a local CA certificate and private
key are required to re-sign the remote server certificates for local (internal) clients. For an
inbound traffic topology, remote clients terminate their SSL/TLS sessions at the F5 system, so
it must possess the appropriate server certificates and private keys. Refer to the F5 support
article on managing SSL certificates for F5 systems to understand the procedure.
U P D AT E T H E B I G - I P S S L O R C H E S T R AT O R V E R S I O N
Periodic updates are available for BIG-IP SSL Orchestrator. To download the latest:
3. Scroll to the Security product family, select SSL Orchestrator, and click the link.
4. Select and download the latest version of the BIG-IP SSL Orchestrator .rpm file.
5. Read the appropriate Release Notes before attempting to use the file.
6. Log into the F5 system. On the F5 web UI in the Main menu, navigate to SSL
Orchestrator > Configuration and click Upgrade SSL Orchestrator in the upper right.
SERVICE CHAINS
Figure 4: A sample inline deployment
Inspection Mirrored-traffic
architecture Devices Monitors
Corporate
Office Users
BIG-IP SSL
Orchestrator
Internet Internet Users
Corporate
Data Center OPSWAT
MetaDefender
G U I D E D C O N F I G U R AT I O N
The BIG-IP SSL Orchestrator 10.1 guided configuration presents a completely new and
streamlined user experience. This workflow-based architecture provides intuitive, reentrant
configuration steps tailored to a selected topology.
These steps walk through the guided configuration to build a simple transparent forward proxy.
1. Once logged into the F5 system, on the F5 web UI Main menu, click SSL Orchestrator >
Configuration.
3. (Optional.) Satisfy any of the DNS, NTP, and Route prerequisites from this initial
configuration page. Keep in mind, however, that the BIG-IP SSL Orchestrator guided
configuration will provide an opportunity to define DNS and route settings later in the
workflow. Only NTP isn’t addressed later.
G U I D E D C O N F I G U R AT I O N W O R K F L O W
Topology properties
BIG-IP SSL ORCHESTRATOR • L2 outbound: Provides a transparent path for outbound traffic flows,
TOPOLOGIES inserting BIG-IP SSL Orchestrator as a bump-in-the-wire in an existing
routed path, where BIG-IP SSL Orchestrator presents no IP addresses
on its outer edges.
• Existing application: Designed to work with existing BIG-IP LTM
applications that already perform their own SSL/TLS handling and
client-server traffic management. The existing application workflow
proceeds directly to service creation and security policy definition,
then exits with a BIG-IP SSL Orchestrator-type access policy and
per-request policy that can easily be consumed by a BIG-IP LTM virtual
server.
The sample configuration presented here deploys BIG-IP SSL
Orchestrator as an L3 explicit proxy for decrypting outbound SSL/TLS
traffic. See Figure 7.
SSL configuration
This section defines the specific SSL/TLS settings for the selected topology (a forward proxy
in this example) and controls both client-side and server-side SSL/TLS options. If existing
SSL/TLS settings are available from a previous workflow, they can be selected and reused.
Otherwise, the SSL Configuration section creates new SSL/TLS settings.
SSL/TLS PROFILE
The cipher type can be a Cipher Group or Cipher String. The latter’s
recommended.
• For Cipher Group, select a previously defined cipher group (which
can be defined if necessary by navigating to Local Traffic > Ciphers
CIPHER TYPE > Groups).
• When Cipher String is selected, a field will be populated with the
DEFAULT option, which is optimal for most environments. (Otherwise,
users could also enter a cipher string that appropriately represents the
client-side SSL/TLS requirement.)
The certificate key chain represents the certificate and private key used
as the template for forged server certificates. While reissuing server
certificates on the fly is generally easy, private key creation tends to be a
CPU-intensive operation. For that reason, the underlying SSL/TLS forward
proxy engine forges server certificates from a single defined private
key. This setting gives administrators the opportunity to apply their own
CERTIFICATE KEY CHAINS template private key and to optionally store that key in a FIPS-certified
HSM for additional protection. The built-in default certificate and private
key uses 2K RSA and is generated from scratch when the F5 system is
installed.
Select the [Link] certificate, [Link] key, and [Link] chain and
leave the Passphrase field empty, then click Add.
SERVER-SIDE SSL/TLS
CIPHER TYPE Select Cipher String for the default cipher list.
EXPIRED CERTIFICATE RESPONSE Select whether to Drop or Ignore the connection even if the specified
CONTROL Certificate Response Control (CRL) file’s expired.
UNTRUSTED CERTIFICATE Select drop or ignore the connection even if the specified CRL file isn’t
RESPONSE CONTROL trusted.
Note: SSL/TLS settings minimally require an RSA-based template and CA certificates but can also support elliptic curve
(ECDSA) certificates. In this case, BIG-IP SSL Orchestrator would forge an EC certificate to the client if the SSL/TLS
handshake negotiated an ECDHE_ECDSA cipher. To enable EC forging support, add both an EC template certificate
and key, and an EC CA certificate and key.
The service catalog also provides “generic” security services. (It may be necessary to scroll
down to see additional services.)
2. In the service catalog, double click OPSWAT MetaDefender ICAP service. (If the
version of BIG-IP SSL Orchestrator you’re using doesn’t have this option, then use the
generic ICAP service.) This option is available from the ICAP tab in newer versions.
The Service Properties page displays.
3. Configure the service using the guidance below, which shows ICAP service configuration.
SSL/TLS PROFILE
Enter a Name for the OPSWAT MetaDefender service. This name can
NAME contain 1-15 alphanumeric or underscore characters but must start with a
letter. Letters aren’t case sensitive.
Under ICAP Devices click Add. Enter the IP address of the ICAP server
ICAP DEVICES and click Done. Repeat this step if multiple OPSWAT MetaDefenders are
involved.
Specify how the system should handle a failure of the ICAP service or
times when it’s otherwise unavailable.
• Ignore: Specifies that the traffic to the service is ignored and is sent to
the next service in the chain.
SERVICE DOWN ACTION • Drop: Specifies that the system initiates a close on the client
connection.
• Reset: Specifies that the system immediately sends an RST on
the client connection for TCP traffic. For UDP traffic, this action is
the same.
5. Once all the desired services are created, click Save & Next to move on to the service
chain setup.
Each service chain is linked to service chain classifier rules and processes specific
connections based on those rules, which look at protocol, source, and destination addresses.
Service chains can include each of the three types of services (inline, ICAP, or receive-only),
as well as decryption zones between separate ingress and egress devices.
To create a new service chain containing all the configured security services:
1. Under Services List, click Add Service. Make selections using this guidance:
Select any number of desired services from the Services Available list
SERVICES and move them into the Selected Service Chain Order column. Optionally,
order them as required.
Security policy
Security policies are the set of rules that govern how traffic’s processed in BIG-IP SSL
Orchestrator. The actions a rule can require include:
3. Click Add again to create more rules or click Save & Next.
Interception rules
Interception rules are based on the selected topology and define the listeners (analogous
to BIG-IP LTM virtual servers) that accept and process different types of traffic, such as
TCP, UDP, or other. The resulting BIG-IP LTM virtual servers will bind the SSL/TLS settings,
VLANs, IPs, and security policies created in the topology workflow.
INGRESS NETWORK
This defines the VLANs through which traffic will enter. For a forward proxy
VLANS
topology (outbound), this would be the client-side VLAN (intranet).
MANAGE SNAT SETTINGS Define if and how source NAT (SNAT) is used for egress traffic.
Enter the IP address of the next hop route for traffic. For an outbound
GATEWAYS
configuration, this is usually a next hop upstream router.
1. To review the details for any given setting, click the corresponding arrow icon on the
far right.
2. To edit any given setting, click the corresponding pencil icon to display the settings
page in the workflow.
3. When the desired settings have been defined, click Deploy. Upon successful
deployment of the configuration, BIG-IP SSL Orchestrator will display a dashboard.
See Figure 16.
• Server certificate test: Open a browser on the client system and navigate to an HTTPS
site, for example, [Link] Once the site opens in the browser, check
the server certificate of the site and verify that it’s been issued by the local CA set up
on the F5 system. This confirms that the SSL/TLS forward proxy functionality enabled
by BIG-IP SSL Orchestrator is working correctly.
• Decrypted traffic analysis on the F5 system: Perform a TCP dump on the F5 system
to observe the decrypted clear text traffic. This confirms SSL/TLS interception by the
F5 device.
tcpdump –lnni eth<n> -Xs0
• Decrypted traffic analysis on the OPSWAT MetaDefender ICAP Server: From the
web UI, go to Monitoring > Packet Capture > Create, and enable a Packet Filter.
Create stages to capture packets, specify file names, and then click OK. Download the
captured file(s) and analyze the HTTP packets. The packet header and payload should
be in clear text, indicating SSL/TLS decryption. It’s very important to turn off packet
capture once the job completes.
©2023 F5, Inc. All rights reserved. F5, and the F5 logo are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at [Link].
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5, Inc.
DC 04.2023 | GUIDE-SEC-1083857230