Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Captive Portal Example: Create a Decryption Policy with an Outbound Rule

This part of the procedure discusses how to create adecryption policy to decrypt and resign traffic before the traffic reaches the captive portal. The captive portal can authenticate traffic only after it has been decrypted.

Before you begin

You must have an internal certificate authority (CA) for your outbound server; in other words, the managed device that decrypts the traffic for captive portal users to authenticate. This certificate must be different from the internal certificate you use to authenticate the captive portal with the managed device.

Procedure

1

Click Policies > Access Control heading > Decryption.

2

Click New Policy.

3

Give the policy a unique Name and, optionally, a Description.

4

Click the Outbound Connections tab.

Create a decryption policy with an outbound rule (also referred to as a Decrypt-Resign rule)

5

Upload or choose certificates for the rules.

The system creates one rule per combination of CA and networks/ports.

6

(Optional.) Choose networks and ports.

7

Click Save.

8

Click Edit (edit icon) next to the decryption policy you just created.

9

Click Edit (edit icon) next to the decryption rule for captive portal.

10

Click Users.

11

Above the Available Realms list, click Refresh (refresh icon).

12

In the Available Realms list, click Special Identities.

13

In the Available Users list, click Unknown.

14

Click Add to Rule.

The following figure shows an example. Set up a decryption rule to search your realms for the Special Identity user Unknown
15

(Optional.) Set other options as discussed in Decryption Rule Conditions.

16

Click Add.

What to do next

Configure Captive Portal Part 6: Associate Identity and Decryption Policies with the Access Control Policy