You can use Forefront TMG to inspect inside outbound HTTPS traffic, to protect your organization from security risks such as:
- Viruses, and other malicious content that
could utilize Secure Sockets Layer (SSL) tunnels to infiltrate the
organization undetected.
- Users who bypass the organization’s access
policy by using tunneling applications over a secure channel (for
example, peer-to-peer applications).
Note: |
---|
|
The following sections provide information to help you plan for HTTPS inspection:
- How
HTTPS inspection works
- Considerations for
enabling HTTPS inspection
- About
certificate validation in HTTPS inspection
- Privacy
issues
How HTTPS inspection works
To provide HTTPS protection, Forefront TMG acts as an intermediary, or a "man in the middle", between the client computer that initiates the HTTPS connection, and the secure Web site. When a client computer initiates a connection to a secure Web site, Forefront TMG intercepts the request and does the following:
- Establishes a secure connection (an SSL tunnel) to the
requested Web site and validates the site’s server certificate.
- Copies the details of the Web site's certificate, creates a new
SSL certificate with those details, and signs it with a
Certification Authority certificate called the HTTPS inspection
certificate.
- Presents the new certificate to the client computer, and
establishes a separate SSL tunnel with it.
Because the HTTPS inspection certificate was previously placed in the client computer’s Trusted Root Certification Authorities certificate store, the computer trusts any certificate that is signed by this certificate. By cutting the connection and creating two secure tunnels, the Forefront TMG server can decrypt and inspect all communication between the client computer and the secure Web site during this session.
Considerations for enabling HTTPS inspection
When enabling HTTPS inspection, consider the following:
- In multiple-array deployments, you generate
an HTTPS inspection certificate for each of the arrays.
- Extended Validation (EV) SSL is not supported
with HTTPS inspection. When Forefront TMG performs HTTPS inspection
on a site that uses an EV SSL certificate, the EV visibility that
is offered by some Web browsers, such as Internet Explorer 7
causing the URL address bar to turn green, will not be displayed in
users’ browsers. To maintain a site’s EV visibility, you must
exclude it from HTTPS inspection.
- HTTPS inspection is incompatible with
connections to external SSTP servers, and servers that require
client certificate authentication. If you are aware of such a
server, it is recommended that you exclude it from HTTPS
inspection.
- To deploy the HTTPS inspection trusted root
certification authority (CA) certificate to client computers using
Active Directory, Forefront TMG must be deployed in a domain
environment.
Note: |
---|
For information about excluding sites from HTTPS inspection, see Excluding sources and destinations from HTTPS inspection. |
About certificate validation in HTTPS inspection
The following table summarizes the certificate validation that Forefront TMG performs when HTTPS inspection is enabled. For sites that are excluded from HTTPS inspection, you can select to exclude with or without validation when you configure destination exceptions. For information about excluding sites from HTTPS inspection, see Excluding sources and destinations from HTTPS inspection.
Validation type | Inspected traffic | Sites that are excluded from HTTPS inspection with certificate validation | Sites that are excluded from HTTPS inspection without certificate validation |
---|---|---|---|
Eligible for server authentication |
Yes |
Yes |
Yes |
Expiration, revocation |
Yes |
No |
No |
Name mismatch, trust |
Yes |
Yes |
No |
Privacy issues
Because the user of the client computer is unaware that Forefront TMG is breaking the connection and inspecting the traffic, for privacy and legal reasons, you might want to do the following:
- Notify clients that their HTTPS traffic is
being inspected. You can do this for client computers running
Forefront TMG Client. For information, see Notifying users that
HTTPS traffic is being inspected.
- Exclude specific URLs or URL categories, such
as financial and health sites, from inspection. For information,
see Excluding
sources and destinations from HTTPS inspection.