Today, over 90% of internet traffic uses TLS (HTTPS). While this protects confidentiality, it also prevents traditional firewalls from seeing whatβs inside the traffic.
Thatβs where TLS inspection in AWS Network Firewall becomes critical.
In this article, weβll cover:
- Why TLS inspection is required
- How TLS normally works
- How AWS Network Firewall performs TLS decryption & inspection
- Architecture design (EC2 β Firewall β NAT β IGW)
- Certificate requirements
- Common deployment mistakes
- Best practices
π¨ Why TLS Inspection Is Required
Without TLS inspection, a firewall can only see:
- Source IP
- Destination IP
- Port (443)
- Limited SNI/domain info
But it cannot see:
- Malware downloads
- Command & Control traffic
- Data exfiltration
- Exploit payloads
- Unauthorized SaaS usage
Encrypted traffic becomes a blind spot.
TLS inspection restores visibility.
π How TLS Normally Works
Before encryption begins, two steps happen:
1οΈβ£ TCP 3-Way Handshake
Client β SYN β Server
Server β SYN-ACK β Client
Client β ACK β Server
TCP session established.
2οΈβ£ TLS Handshake
ClientHello
ServerHello
Certificate exchange
Key negotiation
Encrypted session established
After this, traffic becomes encrypted:
Client β Encrypted β Server
A traditional firewall cannot inspect payload contents.
π How TLS Inspection Works in AWS Network Firewall
When TLS inspection is enabled, the firewall becomes a proxy.
Instead of:
EC2 β Google
We now have:
EC2 β Firewall β Google
The firewall acts as:
- Server toward EC2
- Client toward Google
Packet Flow Example (Outbound HTTPS)
Architecture:
Private Subnet (EC2)
β
AWS Network Firewall
β
NAT Gateway
β
Internet Gateway
β
Internet (google.com)
Return traffic:
Internet β IGW β NAT β Firewall β EC2
Step-by-Step Flow
1οΈβ£ EC2 sends HTTPS request
EC2 β Firewall
2οΈβ£ Firewall intercepts TLS handshake
- Receives ClientHello
- Creates second TLS session to Google
3οΈβ£ Firewall validates certificate
- OCSP / CRL check
- Certificate inspection
4οΈβ£ Firewall decrypts traffic
- Applies IPS rules
- Applies domain filtering
- Checks for malware
5οΈβ£ Firewall re-encrypts traffic
Firewall β NAT β Internet
π Certificate Requirements
TLS inspection requires:
1οΈβ£ Inspection Certificate
- Stored in AWS Certificate Manager
- Presented by firewall to clients
- Must be trusted by EC2/workloads
2οΈβ£ Revocation Policy
Best practice:
GOOD β Allow
UNKNOWN β Allow
REVOKED β Reject
Strictly rejecting UNKNOWN often causes outages.
Cloudwatch logs for Unknown revocation -> passed traffic.

π§± Required Configuration Building Blocks
To make TLS inspection work correctly:
β 1) Routing (Symmetric)
Private subnet:
0.0.0.0/0 β Firewall endpoint
NAT subnet:
Private subnet CIDR β Firewall endpoint
Return traffic must pass through firewall.
β 2) Layer 4 Rule (TCP 443)
You must allow TCP first:
pass tcp $HOME_NET any -> $EXTERNAL_NET 443
TLS runs on top of TCP.
β 3) TLS Rule (Layer 7)
Then allow TLS:
pass tls $HOME_NET any -> $EXTERNAL_NET 443
β 4) Default Action
Recommended:
Drop everything else
So for an HTTPS connection:
- TCP session is established (port 443)
- Then TLS handshake happens inside that TCP session
- Then encrypted data flows
β οΈ Common Deployment Mistakes
β Asymmetric Routing
Return traffic bypasses firewall β TLS resets
β Revocation Policy Too Strict
UNKNOWN β REJECT
Causes unexpected connection resets.
β Missing TCP Rule
Allowing TLS but blocking TCP 443 breaks handshake.
β Inspecting All Ports
Only inspect required ports (usually 443).
π Performance Considerations
TLS inspection adds:
- CPU overhead
- Latency
- Reduced throughput
Best practice:
- Inspect only necessary traffic
- Bypass trusted domains
- Monitor firewall capacity
π’ Enterprise Deployment Model
For multi-VPC environments:
Spoke VPCs
β
Transit Gateway
β
Inspection VPC
β
AWS Network Firewall
β
Internet
Centralized inspection reduces cost and improves control.
π― When TLS Inspection Is Most Valuable
TLS inspection is especially important for:
- Developer environments
- Outbound internet access
- SaaS-heavy organizations
- Data exfiltration protection
- Compliance environments
π§ Final Thoughts
TLS encryption protects data β but it also hides threats.
AWS Network Firewall TLS inspection allows organizations to:
β
Regain visibility
β
Detect malware in encrypted traffic
β
Prevent data exfiltration
β
Enforce SaaS policies
β
Maintain compliance
When deployed with proper routing, policy design, and certificate handling, TLS inspection becomes a powerful security control without disrupting business operations.

Top comments (0)