<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Outbound SSL Decryption Quirk in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239459#M6374</link>
    <description>&lt;P&gt;Have you checked the decrypt logs to see if something odd is happening the moment you notice a failed connection?&lt;/P&gt;
&lt;P&gt;How did you configure your decryption profile, did you limit your SSL Protocol Settings ?&lt;/P&gt;</description>
    <pubDate>Mon, 06 Oct 2025 12:00:08 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2025-10-06T12:00:08Z</dc:date>
    <item>
      <title>Outbound SSL Decryption Quirk</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239365#M6368</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have established an outbound SSL decrypt policy that I have enabled for only myself as I test functionality. Over the past few months, I've noticed a quirk that I'm unsure of the reasoning behind. With the policy enabled, sometimes connections to certain destinations will require a reload of the webpage to establish connection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to a knowledgebase for a vendor - failed to establish connection upon first attempt&lt;/LI&gt;
&lt;LI&gt;Reload the webpage - successfully establish connection&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This behavior is exclusive to when I have the decrypt policy enabled so I'm fairly certain that I am pointing the finger at the correct culprit. It seems a problematic destination is random, as it's not always the same sites and varies between days/weeks on occurrence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The work around of simply refreshing the page is easy enough, my concern is when I enable this for the company and users flood my inbox with this issue for various sites and I have to tell them all to refresh... seems half-baked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is - Is this normal behavior for SSL decryption, or am I missing something within the configuration? I followed the best-practice guide released by Palo Alto.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 17:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239365#M6368</guid>
      <dc:creator>RH747</dc:creator>
      <dc:date>2025-10-03T17:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Outbound SSL Decryption Quirk</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239459#M6374</link>
      <description>&lt;P&gt;Have you checked the decrypt logs to see if something odd is happening the moment you notice a failed connection?&lt;/P&gt;
&lt;P&gt;How did you configure your decryption profile, did you limit your SSL Protocol Settings ?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 12:00:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239459#M6374</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-10-06T12:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: Outbound SSL Decryption Quirk</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239467#M6376</link>
      <description>&lt;P&gt;I have checked the logs when it has happened in the past and don't see anything that consistently shows each time and it's a somewhat rare occurrence, so I don't have much to go off of with only 1 user testing. Initially I thought maybe it was an OCSP/CRL delay, but that's uncertain without logs to correlate the thought. I was hoping someone has experienced this and narrowed their findings to something specific I could check!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The profile is mostly configured to PA recommended best practice; the minimum protocol is set to 1.2 with maximum set to max. I do not have the failure checks or strip APLN enabled. Certificate used is firewall generated.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 14:53:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-ssl-decryption-quirk/m-p/1239467#M6376</guid>
      <dc:creator>RH747</dc:creator>
      <dc:date>2025-10-06T14:53:23Z</dc:date>
    </item>
  </channel>
</rss>

