Big Ip Orchestrator and Menlo Security Remote Browser Isolation
Big Ip Orchestrator and Menlo Security Remote Browser Isolation
3
The F5 and Menlo Security Integrated Solution
6 Topologies
6 License Components
7 Sizing
9 Certificate Requirements
9 IP Addressing
10 Initial Setup
10
Import a CA Certificate and Private Key
10
Update the BIG-IP SSL Orchestrator Version
11
Back Up Your F5 System Configuration
12 Guided Configuration
13
Guided Configuration Workflow
28 Appendix
An integrated F5 and Menlo Security solution solves these two SSL/TLS challenges.
F5® BIG‑IP® SSL Orchestrator® centralizes SSL/TLS inspection across complex security
architectures, enabling flexible deployment options for decrypting and re-encrypting user
traffic. It also provides intelligent traffic orchestration using dynamic service chaining and
policy-based management. The decrypted traffic is then inspected by one or more Menlo
Security Remote Browser Isolation, which can prevent previously hidden threats and block
zero-day exploits. This solution eliminates the blind spots introduced by SSL/TLS and closes
any opportunity for adversaries.
This overview of the joint F5 and Menlo Security solution describes different deployment
modes with reference to service chain architectures, recommends practices, and offers
guidance on how to handle enforcement of corporate Internet use policies.
• Flexible deployment modes that easily integrate into even the most complex
architectures, consolidate the security stack to reduce complexity, and deliver SSL/TLS
visibility across the security infrastructure.
• Built-in health monitors that detect security service failures and shifts or bypasses
loads in real time to provide reliability and fault tolerance.
• Full cipher support, including support for the perfect forward secrecy (PFS)-enabled
ciphers, to ensure full traffic visibility.
S S L / T L S V I S I B I L I T Y: H O W D O W E D O I T ?
F5’s industry-leading full proxy architecture enables BIG-IP SSL Orchestrator to install a
decryption/clear text zone between the client and web server, creating an aggregation
(and disaggregation) visibility point for security services. The F5 system establishes two
independent SSL/TLS connections—one with the client and the other with the web server.
When a client initiates an HTTPS connection to the web server, BIG-IP SSL Orchestrator
intercepts and decrypts the client-encrypted traffic and steers it to a pool of Menlo Security
Remote Browser Isolation for inspection before re-encrypting the same traffic to the web
server. The return HTTPS response from the web server to the client is likewise intercepted
and decrypted for inspection before being sent on to the client.
F5 System
Server Hello Server Hello
Client Side Secure Data Inspection Zone Server Side Secure Data
Exchange Exchange
A typical security stack often consists of more than advanced anti-malware protection
systems, with additional components such as a firewall, intrusion detection or prevention
systems (IDSs/IPSs), web application firewalls (WAFs), malware analysis tools, and more.
To solve specific security challenges, administrators are accustomed to manually chaining
these point security products. In this model, all user sessions are provided the same level of
security, as this “daisy chain” of services is hard-wired.
BIG-IP SSL Orchestrator not only decrypts the encrypted traffic, but it also load balances,
monitors, and dynamically chains security services, including next-generation firewalls
(NGFWs), data loss prevention (DLP), IDSs/IPSs, WAFs, and anti-virus/anti-malware systems. It
does this by matching user-defined policies, which determine what to intercept and whether
to send data to one set of security services or another based on context. This policy-based
traffic steering enables better utilization of existing security investments and helps reduce
administrative costs.
USERS/DEVICES
BIG-IP SSL
Orchestrator Firewall Internet
• IP geolocation • Protocol
TOPOLOGIES
Different environments call for different network implementations. While some can easily
support SSL/TLS visibility at layer 3 (routed), others may require these devices to be inserted
at layer 2. BIG-IP SSL Orchestrator can support all these networking requirements with the
following topology options:
LICENSE COMPONENTS
The BIG-IP SSL Orchestrator product line—the i2800, r2800, i4800, r4800, i5800, r5800,
i10800, r10800, r10900, i11800, i15800, and Virtual Edition High Performance (HP)—supports
this joint solution. The F5® VIPRION® platform and the F5® VELOS® platform are also
supported. BIG-IP SSL Orchestrator devices ship with an installed base module that provides
both SSL/TLS interception and service chaining capabilities. Please contact your local F5
representative to further understand the licensing and deployment options.
Unless otherwise noted, references to BIG-IP SSL Orchestrator and the F5® BIG-IP® system
in this document (and some user interfaces) apply equally regardless of the F5 hardware or
virtual edition (VE) used. The solution architecture and configuration are identical.
• A network hardware security module (HSM) to safeguard and manage digital keys
for strong authentication.
• F5® BIG-IP® Access Policy Manager® (APM) to authenticate and manage user access.
• F5® BIG-IP® Advanced WAF® to protect against common vulnerabilities (CVEs) and
web exploits, targeted attacks, and advanced threats.
• An F5® BIG-IP® Local Traffic Manager™ (LTM) add-on software license mode. This
solution’s supported on all F5® BIG-IP® iSeries® and older F5 hardware platforms and
has no specific restrictions on additional F5 software modules (including the above
software services). This option’s suited for environments that need to deploy BIG-IP
SSL Orchestrator on an existing BIG-IP device or have other functions that must run on
the same device.
SIZING
The main advantage of deploying BIG-IP SSL Orchestrator in the corporate security
architecture is that the wire traffic now can be classified as “interesting” traffic, which needs
to be decrypted by BIG-IP SSL Orchestrator for inspection by Menlo Security Remote Browser
Isolation, and “uninteresting” traffic, which is allowed to pass through or be processed
differently according to other corporate policy requirements. This selective steering of only
the interesting traffic to Menlo Security Remote Browser Isolation conserves its valuable
resources (as it need not inspect the entire wire traffic), maximizing performance.
As a result, it’s important to consider the entire wire traffic volume to calculate the appropriate
F5 system size. Menlo Security Remote Browser Isolation will require one interface on the F5
system to allow traffic flow through logical inbound and outbound service interfaces.
Refer to the BIG-IP SSL Orchestrator data sheet and consider the following factors when
sizing the F5 system for the integrated solution:
• Port density.
• System resources.
• Guest VLANs.
• Trusted software update sources such as those for Microsoft Windows updates.
You can also exempt traffic based on domain names and URL categories. The policy rules
of BIG-IP SSL Orchestrator enable administrators to enforce corporate Internet use policies,
preserve privacy, and meet regulatory compliance.
Traffic exemptions based on URL category might include bypasses (and thus no decryption)
for traffic from known sources of these types of traffic:
• Financial
• Healthcare
• Government services
• Deploy inline. Any SSL/TLS visibility solution must be inline to the traffic flow to decrypt
PFS cipher suites such as elliptic curve Diffie-Hellman encryption (ECDHE).
• Deploy BIG-IP SSL Orchestrator in a device sync/failover device group (S/FDG) that
includes the high-availability (HA) pair with a floating IP address.
C E R T I F I C AT E R E Q U I R E M E N T S
IP ADDRESSING
Initial Setup
Complete these initial steps before performing detailed configuration of BIG‑IP
SSL Orchestrator.
For deployment in a layer 3 (routed or explicit proxy) topology, the F5 system must be
configured with appropriate client-facing, outbound-facing VLANs and self-IPs and routes.
The VLANs define the connected interfaces, and the self-IPs define the respective IPv4 and/
or IPv6 subnets. Refer to the F5 Routing Administration Guide for configuration steps to set
up the VLANs and self-IPs.
I M P O R T A C A C E R T I F I C AT E A N D P R I VAT E K E Y
For SSL/TLS orchestration in an outbound traffic topology, a local CA certificate and private
key are required to re-sign the remote server certificates for local (internal) clients. For an
inbound traffic topology, remote clients terminate their SSL/TLS sessions at the F5 system, so
it must possess the appropriate server certificates and private keys. Refer to the F5 support
article on managing SSL/TLS certificates for F5 systems to understand the procedure.
U P D AT E T H E B I G - I P S S L O R C H E S T R AT O R V E R S I O N
Periodic updates are available for BIG-IP SSL Orchestrator. To download the latest:
3. Scroll to the Security product family, select SSL Orchestrator, and click the link.
5. Read the appropriate Release Notes before attempting to use the file.
6. Log into the F5 system. On the F5 web UI in the Main menu, navigate to SSL
Orchestrator > Configuration and click Upgrade SSL Orchestrator in the upper right.
7. Click Choose File and navigate to the .rpm file you downloaded. Select it and click Open.
B A C K U P Y O U R F 5 S Y S T E M C O N F I G U R AT I O N
Before beginning detailed BIG-IP SSL Orchestrator configuration, we strongly recommend you
back up the F5 system configuration using the following steps. This enables you to restore
the previous configuration in case any issues arise.
1. From the main tab of the F5 management interface, click System > Archives.
2. To initiate the process of creating a new UCS archive (backup), click Create.
4. Optional:
• If you want to encrypt the UCS archive file, from the Encryption menu, select Enabled
and enter a passphrase. You must supply the passphrase to restore the encrypted UCS
archive file.
• If you want to exclude SSL/TLS private keys from the UCS archive, from the Private
Keys menu, select Exclude.
To restore the configuration from a UCS archive, navigate to System > Archives. Select
the name of the UCS file you want to restore and click Restore. For details and other
considerations for backing up and restoring the F5 system configuration, see this article on
MyF5: K13132: Backing up and restoring BIG-IP configuration files with a UCS archive.
G U I D E D C O N F I G U R AT I O N
The BIG-IP SSL Orchestrator guided configuration presents a completely new and streamlined
user experience. This workflow-based architecture provides intuitive, reentrant configuration
steps tailored to a selected topology. These steps walk through the guided configuration to
build a simple transparent forward proxy:
1. Once logged into the F5 system, on the F5 web UI Main menu, click SSL Orchestrator >
Configuration.
3. (Optional.) Satisfy any of the DNS, NTP, and Route prerequisites from this initial
configuration page. Keep in mind, however, that the BIG-IP SSL Orchestrator guided
configuration will provide an opportunity to define DNS and route settings later in the
workflow. Only NTP isn’t addressed later.
G U I D E D C O N F I G U R AT I O N W O R K F L O W
Topology properties
SSL configuration
This section defines the specific SSL/TLS settings for the selected topology (a forward proxy
in this example) and controls both client-side and server-side SSL/TLS options. If existing
SSL/TLS settings are available from a previous workflow, they can be selected and reused.
Otherwise, the SSL Configuration section creates new SSL/TLS settings.
SSL/TLS PROFILE
CLIENT-SIDE SSL/TLS
The cipher type can be a Cipher Group or Cipher String. The latter’s
recommended.
• For Cipher Group, select a previously defined cipher group (which
can be defined if necessary by navigating to Local Traffic > Ciphers >
CIPHER TYPE Groups).
• When Cipher String is selected, a field will be populated with the
DEFAULT option, which is optimal for most environments. (Otherwise,
users could also enter a cipher string that appropriately represents the
client-side SSL/TLS requirement.)
The certificate key chain represents the certificate and private key used
as the template for forged server certificates. While reissuing server
certificates on the fly is generally easy, private key creation tends to be a
CPU-intensive operation. For that reason, the underlying SSL/TLS forward
proxy engine forges server certificates from a single defined private
key. This setting gives administrators the opportunity to apply their own
CERTIFICATE KEY CHAINS template private key and to optionally store that key in a FIPS-certified
HSM for additional protection. The built-in default certificate and private
key uses 2K RSA and is generated from scratch when the F5 system is
installed.
Select the default.crt certificate, default.key key, and default.crt chain and
leave the Passphrase field empty, then click Add.
SERVER-SIDE SSL/TLS
CIPHER TYPE Select Cipher String for the default cipher list.
EXPIRED CERTIFICATE RESPONSE Select whether to Drop or Ignore the connection even if the specified
CONTROL Certificate Response Control (CRL) file’s expired.
UNTRUSTED CERTIFICATE Select drop or ignore the connection even if the specified CRL file
RESPONSE CONTROL isn’t trusted.
The service catalog also provides “generic” security services. (It may be necessary to scroll
down to see additional services.)
2. In the service catalog, double click Menlo Security service. (If the version of BIG-IP SSL
Orchestrator you’re using doesn’t have this option, then use the generic HTTP service.)
The Service Properties page displays.
3. Configure the service using the guidance below. To configure either as an L3 or TAP
service, refer to the next two sections of this document.
SERVICE SETTINGS
Enter a Name for the Menlo Security service. This name can contain 1-15
NAME alphanumeric or underscore characters but must start with a letter. Letters
aren’t case sensitive.
Click Add.
Then, create the From VLAN and To VLAN pairs (these are often the
same for explicit proxy) by entering a name and selecting the interface.
These VLAN pairs and the associated interfaces define the network
connectivity between BIG-IP SSL Orchestrator and the Menlo Security
device.
NETWORK CONFIGURATION
If you have configured BIG-IP SSL Orchestrator systems in a sync/failover
device group for HA, then the VLAN pairs must be connected to the
same layer 2 virtual network from every device.
If multiple Menlo Security devices are involved, choose the respective
VLAN pair and click Add. Enter the desired ratio for every Menlo Security
in the pool to control the load it receives.
Specify how the system should handle a failure of the explicit proxy
service or times when it’s otherwise unavailable.
• Ignore: Specifies that the traffic to the service is ignored and is sent to
the next service in the chain.
SERVICE DOWN ACTION • Drop: Specifies that the system initiates a close on the client
connection.
• Reset: Specifies that the system immediately sends an RST on the
client connection for TCP traffic. For UDP traffic, this action is the
same.
BIG-IP SSL Orchestrator allows for the insertion of additional F5® iRules®
logic at different points, but additional iRules aren’t required. An iRule
defined at the service only affects traffic flowing across this service. It’s
important to understand, however, that these iRules mustn’t be used
IRULES to control traffic flow (for example, pools, nodes, or virtual servers),
but rather should be used to view/modify application layer protocol
traffic. For example, an iRule assigned here could be used to view and
modify HTTP traffic flowing to/from the service. Leave this field empty to
configure without iRules.
4. Click Save to return to the Service List section. To configure additional services, click
Add Service to access the service catalog again.
5. Once all the desired services are created, click Save & Next to move on to the service
chain setup.
Each service chain is linked to service chain classifier rules and processes specific
connections based on those rules, which look at protocol, source, and destination addresses.
Service chains can include each of the three types of services (inline, ICAP, or receive-only), as
well as decryption zones between separate ingress and egress devices.
To create a new service chain containing all the configured security services:
1. Under Services List, click Add Service. Make selections using this guidance:
Security policy
Security policies are the set of rules that govern how traffic’s processed in BIG-IP SSL
Orchestrator. The actions a rule can require include:
3. Click Add again to create more rules or click Save & Next.
By default, BIG-IP SSL Orchestrator defines a single egress pool for transparent proxy traffic.
For an upstream explicit proxy (that is, a “proxy chain”), however, BIG-IP SSL Orchestrator
inserts two proxy select agents in the visual policy. Proxy chaining is configurable in the BIG-IP
SSL Orchestrator security policy UI by enabling the Proxy Connect option and then defining
the IP and port of the upstream proxy.
3. Add the IP address and port number for Menlo Security. Click + to add multiple IP
addresses.
Proxy Connect creates two proxy select agents in the visual policy. This will enable F5 proxy
chaining with Menlo Security.
This setting, which displays when configuring an explicit proxy, defines the
BIG-IP SSL Orchestrator explicit proxy listening IP address and proxy port.
PROXY SERVER SETTINGS
For explicit proxy authentication, this section also allows for the selection of
a BIG-IP APM SWG-explicit access policy.
INGRESS NETWORK
This defines the VLANs through which traffic will enter. For a forward
VLANS
proxy topology (outbound), this would be the client-side VLAN (intranet).
Egress setting
The Egress Setting section defines topology-specific egress characteristics.
MANAGE SNAT SETTINGS Define if and how source NAT (SNAT) is used for egress traffic.
Enter the IP address of the next hop route for traffic. For an outbound
GATEWAYS
configuration, this is usually a next hop upstream router.
1. To review the details for any given setting, click the corresponding arrow icon on the
far right.
2. To edit any given setting, click the corresponding pencil icon. Clicking the pencil icon
will display the selected settings page in the workflow.
3. When you’re satisfied with the defined settings, click Deploy. Upon successfully
deployment of the configuration, BIG-IP SSL Orchestrator will display a dashboard.
See Figure 17.
4. Click the Interception Rules tab to display the listeners created per the selected
topology.
This completes configuration of BIG-IP SSL Orchestrator as a forward proxy. At this point an
internal client should be able to browse to external (Internet) resources, and decrypted traffic
will flow across the security services.
Note: This is just one sample use case in which manual URL categorization passes traffic through or around proxy select
agents in the visual policy. Directly evaluating against a client/server IP or port can be achieved within the visual policy
without using iRules. For any other case requiring categorization, some version of the iRule configuration below will be
necessary.
iRules configuration
1. Create an iRule called iRule-GW that will collect the shared variable and perform a
manual category lookup. If the category matches, a per-flow variable will be assigned.
The object of the sample iRule below is to manually query a single or set of URL
categories, and if matched, set a per-flow variable. The per-flow variable is read within
the visual policy to direct traffic through or around proxy select agents. See Figure 19.
2. Create an iRule called iRule-Explicit that will grab the explicit proxy request URL from
the client and save it to a shared variable. See Figure 20.
1. Navigate to SSL Orchestrator > Configuration and click Interception Rules (see
Figure 22).
2. Set the L7 Profile Type to HTTP. Set the L7 Profile to sslo_[appname]-xp-http. Set the
iRule to iRule-Explicit (see Figure 23).
3. Modify the -in-t interception rule to the following setting: iRules: add iRule-GW (see
Figure 24).
4. Click Security Policies and disable strictness by clicking the lock to unlock it. Keep in
mind that with strictness disabled, the topology configuration is read-only from the
BIG-IP SSL Orchestrator UI (see Figure 25).
• A proxy-select agent, Proxy Chaining (Connect), at the beginning of the policy that
creates the initial outbound path.
• A separate proxy-select agent, Proxy Chaining (URI Rewrite), at the end of the policy
that appropriately rewrites the request to an upstream explicit proxy.
As the decision for the initial proxy selection must happen before any VPE categorization,
manual categorization must be handled in an iRule based on the HTTP Connect URL entering
the BIG-IP SSL Orchestrator explicit proxy listener.
1. Navigate to Access > Policies/Profiles > Per-Request Policies and click Edit for the
appropriate policy row to launch the visual policy editor (see Figure 26).
2. Click Add New Macro and create a new macro called Proxy Chain (Stage 1).
3. Insert an iRule event agent with the following settings (see Figure 27):
• Set the ID to URLCAT. Set Expect Data to Client Accepted. Set the Branch Rule Name
to urlmatch. Click Advanced and, per Figure 27, enter expr { [mcget {perflow.
scratchpad}] == "urlmatch" }.
6. Insert an Empty agent (found on the General Purpose tab) with the following settings:
7. Include the Proxy Chaining (URI Rewrite) macro on the empty agent's fallback branch
(see Figure 29).
8. Replace the Proxy Chaining (Connect) macro in the main policy with the new Proxy
Chain (Stage 1) agent.
9. Replace all the Proxy Chaining (URI Rewrite) macros in the main policy with the new
Proxy Chain (Stage 2) agent (see Figure 30).
• The client's explicit proxy request enters the -xp-4 virtual server, and the associated
iRule re-formats the URL and stores it in a shared variable.
• After the TCP tunnel is created, the client's SSL/TLS handshake enters the -in-t virtual
server and activates the BIG-IP SSL Orchestrator security policy.
• At the end of each “allow” branch, the Proxy Chain (Stage 2) agent issues a simple
branch condition to test for the per-flow variable (urlmatch). If the variable exists, it
follows the branch without the proxy select. If it doesn't match, it follows the branch
with the proxy select.
• Therefore, if the URL captured in the explicit proxy connect request matches the edu
custom category match, it sets a variable. In the security policy, if the variable exists,
proxy select agents are skipped and traffic egresses via a standard routed path. If
the variable does not exist, the proxy select agents are engaged and BIG-IP SSL
Orchestrator directs egress via proxy chaining to the upstream gateway.
• Server certificate test: Open a browser on the client system and navigate to an HTTPS
site, for example, https://www.google.com. Once the site opens in the browser, check
the server certificate of the site and verify that it’s been issued by the local CA set up
on the F5 system. This confirms that the SSL/TLS forward proxy functionality enabled
by BIG-IP SSL Orchestrator is working correctly.
• Decrypted traffic analysis on the F5 system: Perform a TCP dump on the F5 system to
observe the decrypted clear text traffic. This confirms SSL/TLS interception by the F5
device.
iRule-GW
when CLIENT_ACCEPTED {
sharedvar XPHOSTLOCAL
}
when ACCESS_PER_REQUEST_AGENT_EVENT {
sharedvar XPHOSTLOCAL
switch [ACCESS::perflow get perflow.irule_agent_id] {
"URLCAT" {
if { [info exists XPHOSTLOCAL] } {
set res [CATEGORY::lookup ${XPHOSTLOCAL} request_default_
and_custom]
log local0. "res=$res"
## The below can be a single, list or array of built-in
and/or custom categories.
if { ${res} contains "/Common/Educational_Institutions" } {
log local0. "res=Educational_Institutions"
ACCESS::perflow set perflow.scratchpad "urlmatch"
}
}
}
}
}
©2023 F5, Inc. All rights reserved. F5, and the F5 logo are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5, Inc.
DC 09.2023 | GUIDE-SEC-1168801978