<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound SSL Decryption and monitoring in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14025#M10297</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are probably seeing those ssl decrypted sessions that NOW show up as web browsing. If you were to do a show session id &amp;lt;session #&amp;gt;, you'd probably see that the port used was 443 and the application was web browsing, implying that the ssl session was decrypted to expose the application that is web browsing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Feb 2013 01:07:37 GMT</pubDate>
    <dc:creator>sjamaluddin</dc:creator>
    <dc:date>2013-02-23T01:07:37Z</dc:date>
    <item>
      <title>Inbound SSL Decryption and monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14020#M10292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to setup inbound SSL decryption. It is a pretty basic setup.&amp;nbsp; Two layer 3 interfaces on a PA-500.&amp;nbsp; One interface is in an 'Outside' zone, the other is in a 'DMZ' zone. In the DMZ zone is a web server with a signed SSL certificate.&amp;nbsp; The PA is NATing the server in the DMZ to the appropriate address space Outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have imported the web server's SSL certificate and private key (looks ok...the PA decrypted the key and displays the correct expiration date on the Device-&amp;gt;Certificates page).&lt;/P&gt;&lt;P&gt;I have an appropriate Decryption policy matching the correct source and destination zones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically: when looking at the log details (or from the CLI: 'show session all filter ssl-decrypt yes') there is nothing being decrypted&lt;/P&gt;&lt;P&gt;However: yesterday, when trouble shooting this with tech support, the log detail page had the 'Decrypted' box checked and the CLI command was showing one encrypted session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But - in either case, when running very loud and obvious scans, no alert traffic is ever triggered. I can fill the web log up with directory traversal attempts, /etc/passwd, etc. and the attacks never show up in the Threat Log.&amp;nbsp; When the same attacks are launched against the same server on port 80, the Threat log lights up appropriately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using SSL 3.0 - am I trying to do the impossible?&amp;nbsp; I'm trying to decrypt inbound HTTPS traffic, scan it for attacks and either pass or block it according to policy.&amp;nbsp; So far no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated and thank you in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 13:58:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14020#M10292</guid>
      <dc:creator>whitewolfsecurity</dc:creator>
      <dc:date>2012-10-19T13:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption and monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14021#M10293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the CLI issue, have support look at bug #38936.&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 14:31:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14021#M10293</guid>
      <dc:creator>sbrenner</dc:creator>
      <dc:date>2012-10-19T14:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption and monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14022#M10294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you get anywhere on this. I am having similar issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2013 02:34:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14022#M10294</guid>
      <dc:creator>jtc242</dc:creator>
      <dc:date>2013-01-18T02:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption and monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14023#M10295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you check to see if the certificate has been placed in the exclude cache?&amp;nbsp; Run the following CLI command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show system setting ssl-decrypt exclude-cache&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate is there it is likely because the SSL version or cipher suite being used is not supported for decryption. You can try to remove the certificate from the cache with the CLI command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug dataplane reset ssl-decrypt exclude-cache&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you test again and the certificate is placed back in the exclude cache then support will likely have to investigate the reason for the decryption failing.&amp;nbsp; In that case you will want to open a case and we can investigate further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-- Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2013 04:49:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14023#M10295</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2013-01-18T04:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption and monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14024#M10296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am finding that for inbound SSL decryption, it seems that sessions aren't being decrypted if the App-ID 'ssl' is matching. If the App-ID 'web-browsing' happens to match, the session is decrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dunno if that helps you or not, but it's a pattern I just noticed on my inbound SSL decryption setup that I have.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 17:49:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14024#M10296</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-02-22T17:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption and monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14025#M10297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are probably seeing those ssl decrypted sessions that NOW show up as web browsing. If you were to do a show session id &amp;lt;session #&amp;gt;, you'd probably see that the port used was 443 and the application was web browsing, implying that the ssl session was decrypted to expose the application that is web browsing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Feb 2013 01:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-and-monitoring/m-p/14025#M10297</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2013-02-23T01:07:37Z</dc:date>
    </item>
  </channel>
</rss>

