<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does a PA know which forward trust certiticate to use for a given decryption profile/policy in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/421108#M1245</link>
    <description>&lt;P&gt;The decryption certificate is global, you cannot choose one per decryption profile. Whatever certificate you mark for Forward Trust, will be used for SSL Forward Proxy when the firewall verifies that the root CA that signed the server certificate is in the Trusted Root CA list, or present as Trusted Root CA in the certificate store. If the firewall cannot find it, it will instead use the certificate marked as Forward Untrust Certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, it is a BAD IDEA to mark both Forward Trust and Forward Untrust in the same certificate, because you will push this certificate to workstations as a certificate that your devices should trust. That means that if the firewall finds a server certificate that is not trusted, it will present the device with a certificate it trusts, and therefore make it seem to the end user that anything out in the internet is trusted, even when they browse to websites or use applications that present with invalid SSL certificates.&lt;/P&gt;</description>
    <pubDate>Wed, 21 Jul 2021 16:59:43 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2021-07-21T16:59:43Z</dc:date>
    <item>
      <title>How does a PA know which forward trust certiticate to use for a given decryption profile/policy</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/420347#M1239</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a&amp;nbsp; Palo Alto 8.1.18 firewall that is already configured with a SSL Forward Proxy setup for a a current set of traffic.&amp;nbsp; There is only one signed certificate that is configured as the Forwarding Trust and Forwarding Untrust certificate (odd I know), let's call it cert X.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a new set of traffic that requires SSL Forward Proxy treatment.&amp;nbsp; Does the PA only allow the use of one Forward Trust/Untrust Certificate or can multiple certs be used?&amp;nbsp; if so how does the PA know which certificate to call upon as I see no reference to a cert in the decryption profile, so does it cycle through say cert x, cert y and cert z until one matches?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Struggling to find anything useful on the PA site, so advice is greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 14:46:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/420347#M1239</guid>
      <dc:creator>GrantCampbell4</dc:creator>
      <dc:date>2021-07-19T14:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: How does a PA know which forward trust certiticate to use for a given decryption profile/policy</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/421108#M1245</link>
      <description>&lt;P&gt;The decryption certificate is global, you cannot choose one per decryption profile. Whatever certificate you mark for Forward Trust, will be used for SSL Forward Proxy when the firewall verifies that the root CA that signed the server certificate is in the Trusted Root CA list, or present as Trusted Root CA in the certificate store. If the firewall cannot find it, it will instead use the certificate marked as Forward Untrust Certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, it is a BAD IDEA to mark both Forward Trust and Forward Untrust in the same certificate, because you will push this certificate to workstations as a certificate that your devices should trust. That means that if the firewall finds a server certificate that is not trusted, it will present the device with a certificate it trusts, and therefore make it seem to the end user that anything out in the internet is trusted, even when they browse to websites or use applications that present with invalid SSL certificates.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 16:59:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/421108#M1245</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-07-21T16:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: How does a PA know which forward trust certiticate to use for a given decryption profile/policy</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/421222#M1248</link>
      <description>&lt;P&gt;Mivaldi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's great feedback, thank you.&amp;nbsp; That was my suspicion too but little PA clarity on their documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree a single cert for both i not best practice, but we have inherited this as is.&amp;nbsp; Look forward to putting it all right.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 07:42:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-does-a-pa-know-which-forward-trust-certiticate-to-use-for-a/m-p/421222#M1248</guid>
      <dc:creator>GrantCampbell4</dc:creator>
      <dc:date>2021-07-22T07:42:53Z</dc:date>
    </item>
  </channel>
</rss>

