<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL/TLS decryption in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-tls-decryption/m-p/520445#M551</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for the post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In short, this is the right scenario:&lt;/P&gt;
&lt;P&gt;"F&lt;SPAN&gt;or Inbound, I use the *.company.com provided by tbs to decrypt inbound traffic and for outbound, I use à certificate provided by our internal cert authority to decrypt outbound traffic&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Inbound decryption, the Firewall must have loaded the certificate used on server:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For outbound decryption, you should use a certificate issued by your internal CA. All your company managed computers should are part of the same PKI therefore will trust certificate issued by internal CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Sun, 06 Nov 2022 12:16:39 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2022-11-06T12:16:39Z</dc:date>
    <item>
      <title>SSL/TLS decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-tls-decryption/m-p/520444#M550</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to configure my Palo Alto to decrypt SSL/TLS inbound/outbound traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Inbound, it's to control the traffic from Internet to our internal Web servers. Our internal Web servers is based on Apache or IIS with SSL. The certificate deployed on our Web servers are a wildcard&amp;nbsp; *.compagne.com and provided by external public authority (tbs-certificate). For in inbound,&amp;nbsp; does I import and configure my Palo Alto with this certificate (*.company.com) or can I use a certificate provided by our internal cert authority (but not recognized by public auth) ? And for outbound, I need to use the *.company.com certificate provided by our public certificate authority or in this case, it's recommanded to use certificate provided by our internal authority ? And in this case, for Inbound, I use the *.company.com privided by tbs to decrypt inbound traffic and for outbound, I use à certificate provided by our internal cert authority to decrypt outbound traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Sun, 06 Nov 2022 11:13:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-tls-decryption/m-p/520444#M550</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2022-11-06T11:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-tls-decryption/m-p/520445#M551</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for the post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In short, this is the right scenario:&lt;/P&gt;
&lt;P&gt;"F&lt;SPAN&gt;or Inbound, I use the *.company.com provided by tbs to decrypt inbound traffic and for outbound, I use à certificate provided by our internal cert authority to decrypt outbound traffic&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Inbound decryption, the Firewall must have loaded the certificate used on server:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For outbound decryption, you should use a certificate issued by your internal CA. All your company managed computers should are part of the same PKI therefore will trust certificate issued by internal CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Sun, 06 Nov 2022 12:16:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-tls-decryption/m-p/520445#M551</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-11-06T12:16:39Z</dc:date>
    </item>
  </channel>
</rss>

