Integrating Security Solutions with F5 BIG-IP SSL Orchestrator

 

 

What are Security Services?

SSL Orchestrator supports a wide variety of Security Services.  A “Service” is defined as a device that SSL Orchestrator passes decrypted traffic to.  A Service can be Layer 2 or 3. It can be unidirectional (TAP). It can be an ICAP server. It can be an Explicit or Transparent HTTP proxy.

Security Services need to inspect content that is not encrypted.  SSL Orchestrator handles the decryption so the Service can inspect it for threats, enforce certain policies, prevent sensitive data from leaving the network and much more.

A Next Generation Firewall, or NGFW, is a common Service type.  A NGFW is a network security device that extends traditional firewall capabilities by incorporating features like deep packet inspection, intrusion prevention, and application control to protect against advanced cyber threats.  A NGFW is commonly deployed as a Layer 2 or 3 device.

A sandbox is another common Service type.  Sandboxes look for malware and other threats by analyzing potentially malicious content in a controlled environment.  A sandbox is a secure, isolated environment where suspicious code or applications can be executed and observed without the risk of infecting the host or network.  A Sandbox is commonly deployed as a Layer 2 device.

A Secure Web Gateway (SWG) is a network security solution that acts as a central point of control for all web traffic, filtering and inspecting it to protect against malware, phishing, and other web-based threats, while enforcing security policies.  This solution has evolved over the years and may also be referred to as a Secure Access Service Edge (SASE) or Security Service Edge (SSE).  A SWG is often deployed as an HTTP Proxy.

Data Loss Prevention (DLP) is a cybersecurity solution designed to prevent the unauthorized access, use, or transmission of sensitive data.  DLP is often deployed as an ICAP server.

A network TAP device is a passive component that allows non-intrusive access to data flowing across a network, enabling monitoring and analysis of network traffic without disruption.  A TAP receives a copy of the decrypted traffic so it can analyze it in the background.

An HTTP proxy is commonly used as a SWG solution but is flexible and can be used for other purposes.  An HTTP proxy may be used to cache web content, authenticate users and log all connections.  An HTTP proxy may also be used for what is called “Web Isolation” or “Browser Isolation”.  This security solution acts as an intermediary between users and web content.  Offering a virtualized “view” of web content that is completely safe to users and the network itself.

Which vendors or products?

SSL Orchestrator supports all leading NGFW vendors and has generic support for any NGFW that is not specifically supported.  Vendors/products supported include Palo Alto Networks NGFW, Check Point Security, Cisco Firepower, Fortinet FortiGate, McAfee/Trellix, Trend Micro and more.

SSL Orchestrator also supports all leading Sandbox vendors and has generic support for any Sandbox that is not specifically supported.  Vendors/products supported include FireEye/Trellix, Symantec and more.

Most Secure Web Gateway (SWG) solutions are supported by SSL Orchestrator.  Vendors/products supported include Cisco WSA, Forcepoint, Fortinet, McAfee/Trellix, Symantec/Broadcom ProxySG and many more.

SSL Orchestrator supports all leading Data Loss Prevention (DLP) vendors and has generic support for any DLP solution that is not specifically supported.  Vendors/products supported include Digital Guardian, McAfee/Trellix, Opswat, Symantec/Broadcom and more.

Some of the TAP vendors supported by SSL Orchestrator are Palo Alto, McAfee/Trellix, RSA Netwitness, Trend Micro and Netscout.

SSL Orchestrator supports HTTP proxies from the following vendors: Cisco, Forcepoint, Fortinet, McAfee/Trellix, Symantec/Broadcom and Squid.

Service Deployment type 

Services can be deployed in a variety of different ways.  SSL Orchestrator supports most, if not all of these deployment types.  The common deployments are listed and described below:

A Layer 2 device (bridging/bump-in-wire) refers to connectivity without IP Address configuration.  Layer 2 devices pass all traffic from one interface to another interface.

A Layer 3 device (typical NAT) refers to IP Address to IP Address connectivity.  Layer 3 devices must be specifically configured to work in a network.

An Explicit Proxy device also utilizes IP Address to IP Address connectivity.  However, in this case, web applications have to be specifically configured to use an Explicit Proxy.

A Transparent Proxy device also utilizes IP Address to IP Address connectivity.  In this case, web applications DO NOT need to be configured to use a Proxy.

Other type of devices are supported, like an ICAP server or TAP device.  An ICAP server is often used for Data Loss Prevention (DLP).  A TAP device is often used for passive visibility as it receives an exact copy of the decrypted traffic.

Service Creation

Services can be added, removed or edited from the Services tab of the SSL Orchestrator configuration utility.

Services are divided into the different Service deployment types.        

Layer 2

The following Layer 2 Services are available:

Layer 3

The following Layer 3 Services are available:

Inline HTTP

The following Inline HTTP Services are available:

ICAP

The following ICAP Services are available:

TAP

The following TAP Services are available:

F5

SSL Orchestrator also supports F5 Solutions as Services.  The following F5 Services are available:

Examples

Here’s an example of a Cisco Firepower Service deployed in Layer 3 mode:

An IP Address and VLAN are selected for connectivity to the Service.

The IP Address of the Cisco Firepower is specified.

An IP Address and VLAN are selected for connectivity from the Service.

Here’s an example of a Palo Alto NGFW Service deployed in Layer 2 mode:

A From and To VLAN is specified for connectivity from/to the Service.

Note: IP addressing is not used with a Layer 2 Service

Here’s an example of an Opswat MetaDefender ICAP Service:

An IP Address and port are specified for connectivity To/From the ICAP server.

Some ICAP server specific settings are also needed.

Here’s an example of a Netscout TAP Service:

The mac address of the Netscout is specified.

The VLAN and interface for connectivity to the Netscout is also specified.

Creating a Service Chain

Service Chains are user-defined groupings of one or more Services.  Multiple Service Chains are supported.  There are no restrictions on the type of Services that can be in a Service Chain.  For example: a Service Chain can consist of one or more Layer 2 devices, and one or more Layer 3 devices, and so on.

Service Chains can be added, removed or edited from the Service Chains tab of the SSL Orchestrator configuration utility.

Available Services will be listed on the left.  One or more Services can be moved into the Service Chain.  The Service Chain Order is easily configurable.

Demo Video

 

Conclusion

F5 BIG-IP SSL Orchestrator makes it easy to simplify and deploy your security stack.  SSL Orchestrator supports virtually all available security and visibility solutions.  It is able to seamlessly integrate security solutions whether they are deployed as Layer 2, Layer 3, Inline HTTP, ICAP or TAP.

Related Articles

Introduction to BIG-IP SSL Orchestrator

Updated Apr 24, 2025
Version 2.0
No CommentsBe the first to comment