<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Forward Proxy Problems in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-forward-proxy-problems/m-p/564414#M2051</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;I'm seeking some guidance from those who have configured this, and have it working.&lt;/P&gt;
&lt;P&gt;I'm trying to configure the SSL forward proxy feature, to decrypt web traffic.&lt;/P&gt;
&lt;P&gt;I can get this working no problems using a self signed certificate, but this is problematic for devices such as phones and tablets.&amp;nbsp; I can certainly push the certificate to computers using group policy, but need to support visiting people with BYODs and also portable devices.&lt;/P&gt;
&lt;P&gt;I have purchased a certificate, from a public CA.&lt;/P&gt;
&lt;P&gt;However, when installing said certificate on the firewall, it sees it as "trusted" and says it's ok, but the option to use it as the forward trust certificate is greyed out. &lt;BR /&gt;I've had a tac case and even tac don't seem to know why.&lt;/P&gt;
&lt;P&gt;They have suggested I make a combined certificate which includes the intermediate certificates from the CA, which I have done, and it made no difference.&lt;/P&gt;
&lt;P&gt;TAC can't seem to work out how to make this feature work, and neither can I. &lt;BR /&gt;Is there anyone using a public CA signed certificate for this purpose? How did you make it work? &lt;BR /&gt;TAC have assured me that the version of PanOS I am using does not have a bug, and it should just work.&lt;/P&gt;
&lt;P&gt;Please help.&amp;nbsp; Thankyou in advance.&lt;/P&gt;</description>
    <pubDate>Sun, 05 Nov 2023 10:54:47 GMT</pubDate>
    <dc:creator>JDavis36</dc:creator>
    <dc:date>2023-11-05T10:54:47Z</dc:date>
    <item>
      <title>SSL Forward Proxy Problems</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-forward-proxy-problems/m-p/564414#M2051</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;I'm seeking some guidance from those who have configured this, and have it working.&lt;/P&gt;
&lt;P&gt;I'm trying to configure the SSL forward proxy feature, to decrypt web traffic.&lt;/P&gt;
&lt;P&gt;I can get this working no problems using a self signed certificate, but this is problematic for devices such as phones and tablets.&amp;nbsp; I can certainly push the certificate to computers using group policy, but need to support visiting people with BYODs and also portable devices.&lt;/P&gt;
&lt;P&gt;I have purchased a certificate, from a public CA.&lt;/P&gt;
&lt;P&gt;However, when installing said certificate on the firewall, it sees it as "trusted" and says it's ok, but the option to use it as the forward trust certificate is greyed out. &lt;BR /&gt;I've had a tac case and even tac don't seem to know why.&lt;/P&gt;
&lt;P&gt;They have suggested I make a combined certificate which includes the intermediate certificates from the CA, which I have done, and it made no difference.&lt;/P&gt;
&lt;P&gt;TAC can't seem to work out how to make this feature work, and neither can I. &lt;BR /&gt;Is there anyone using a public CA signed certificate for this purpose? How did you make it work? &lt;BR /&gt;TAC have assured me that the version of PanOS I am using does not have a bug, and it should just work.&lt;/P&gt;
&lt;P&gt;Please help.&amp;nbsp; Thankyou in advance.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Nov 2023 10:54:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-forward-proxy-problems/m-p/564414#M2051</guid>
      <dc:creator>JDavis36</dc:creator>
      <dc:date>2023-11-05T10:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forward Proxy Problems</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-forward-proxy-problems/m-p/564417#M2052</link>
      <description>&lt;P&gt;For SSL decrypt/encrypt you need a CA (certificate authority), a certificate does not suffice.&lt;/P&gt;
&lt;P&gt;With this CA the firewall signs a new certificate which has almost all parameters copied from the "original" web site certificate.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Nov 2023 17:35:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-forward-proxy-problems/m-p/564417#M2052</guid>
      <dc:creator>joergsch1</dc:creator>
      <dc:date>2023-11-05T17:35:15Z</dc:date>
    </item>
  </channel>
</rss>

