F5 BIG-IP SSL Orchestrator Training Lab > [v8] SSLO 101: Essential SSL Visibility with SSL Orchestrator (Agility 2021 | 2 hours) > 3. Create a Transparent Forward Proxy SSLO Source | Edit on
3.15. Configure and test selective decryption by URL category¶
This test will demonstrate that traffic to select URLs (Financial and Medical) are no longer decrypted.
3.15.1. Enable SSL bypass¶
- Return to SSL Orchestrator Guided Configuration.
- Click on the sslo_demoL3 topology.
- In the configuration summary, find the row labeled Security Policy and click on the pencil at the far right.
Here, you will create a an additional rule for "Financial Data and Services" and "Health and Medicine" URL categories.
Click Add to create a new rule.
Name - provide a unique name for the rule (ex. "urlf_bypass").
Conditions - Select Category Lookup (All) from the drop-down list and then add the Financial Data and Services and Health and Medicine URL categories. Start typing the category name to narrow the list.
The Category Lookup (All) condition provides categorization for TLS SNI, HTTP Connect and HTTP Host information.
Action - select Allow.
SSL Forward Proxy Action - select Bypass.
Service Chain - select the ssloSC_all_services service chain.
- Click Save & Next.
- Pause for a few seconds and the yellow banner shown below will appear at the very top of the Interception Rule settings.
- Click Deploy.
3.15.2. Financial and medical site test¶
- Return to your Ubuntu client RDP session.
- Open Chromium web browser on the outbound client system and navigate to https://bcbs.com.
- Once the site opens in the browser, check the server certificate of the site.
Notice that it now shows it is issued by a public CA (not SSL Orchestrator). This means that this traffic is not decrypted because it belongs to the Health and Medicine URL category.
- Try the same test for https://wellsfargo.com. This certificate should also be signed by a public CA, and therefore not decrypted, as it belongs to the Financial Data and Services URL category.
This certificate should also be signed by a public CA, and therefore not decrypted, as it belongs to the Financial Data and Services URL category.
In the next section, you will review the SSL Orchestrator Dashboard.