What is an SSL termination?

SSL termination, also known as SSL offloading or SSL decryption, is a security technique used in networks to monitor and secure data traffic. SSL termination involves de-encrypting or "terminating" SSL/TLS connections at an intermediate point in network communications. This intermediate point is often a Web Application Firewall (WAF) or a load balancer.

In a typical SSL termination configuration, the WAF or load balancer receives encrypted HTTPS requests from the clients (e.g. web browsers). The WAF or load balancer then decrypts the SSL/TLS traffic and checks the content for threats, vulnerabilities or anomalies. This allows security infrastructure such as WAF to monitor and analyze unencrypted traffic and, if necessary, take appropriate security measures to detect and block attacks.

After analyzing and checking the data traffic, it may be encrypted again and forwarded to the target server. This process ensures that the security and integrity of the transferred data is maintained during transport, while allowing comprehensive security monitoring and analysis to be carried out.

Airlock Secure Access Hub offers powerful gateway functionality that supports SSL termination. The SSL termination feature allows Airlock Secure Access Hub to decrypt, monitor and analyze encrypted traffic to detect and block attacks. Find out more about the gateway component of Airlock Secure Access Hub at the following link: Airlock Secure Access Hub - Gateway.

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge