TippingPoint devices inspect all traffic as long as it is NOT encrypted. By definition, SSL traffic is encrypted, so while the device cannot inspect encrypted traffic, it will attempt to do so, thus causing additional load on the system. It is recommended to utilize Inspection Bypass rules to bypass encrypted traffic.
If SSL traffic inspection is required, TippingPoint offers the Threat Protection System (TPS) family of devices. The TPS devices (with appropriate SSL license) decrypt SSL traffic between clients and site servers and send decrypted traffic to the device for analysis. After inspection, the SSL traffic is re-encrypted and sent on its way.
Device support - the following TPS devices support SSL inspection:
- T-Series (2200T)
- TX-Series (5500TX, 8200TX, 8400TX, 8600TXE, 9200TXE
- Virtual Threat Protection System (vTPS) (performance mode only)