<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inbound inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/516580#M107278</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you try or test for inbound decryption, I suggest you should try.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1- import password protected pkcs12 file (sertificate+key) to Firewall&lt;/P&gt;
&lt;P&gt;Device&amp;gt;Certificate&lt;/P&gt;
&lt;P&gt;2-Create Certificate decrytpion profile&lt;/P&gt;
&lt;P&gt;Objects&amp;gt;Decryption&amp;gt;Decryption Profile&lt;/P&gt;
&lt;P&gt;3-Create related Decryption policy&lt;/P&gt;
&lt;P&gt;Policy&amp;gt;Decryption&amp;gt;Add&lt;/P&gt;
&lt;P&gt;Source zone internet zone&lt;/P&gt;
&lt;P&gt;Source ip any&lt;/P&gt;
&lt;P&gt;Source user any&lt;/P&gt;
&lt;P&gt;Destinatination zone (İf Static-NAT rule is bi-directional) inner zone of ip&lt;/P&gt;
&lt;P&gt;Destinatination ip real ip address which you assingned for static NAT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Before taking this action for testing you config, you can assing your test real internet access ip address as source ip so you can see result without service outage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Oct 2022 06:19:03 GMT</pubDate>
    <dc:creator>upelister</dc:creator>
    <dc:date>2022-10-03T06:19:03Z</dc:date>
    <item>
      <title>SSL inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/512443#M107020</link>
      <description>&lt;P&gt;We want to apply inbound SSL inspection and our certificate from Digitcert and based on this document &lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0&lt;/A&gt;&lt;BR /&gt;there is a note says "Because SSL certificate providers such as Entrust, Verisign, Digicert, and GoDaddy do not sell CAs, they are not supported in SSL Decryption." &lt;BR /&gt;Now can we apply the inbound SSL inspection and if it's not is there any workaroud&lt;/P&gt;</description>
      <pubDate>Sun, 21 Aug 2022 07:00:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/512443#M107020</guid>
      <dc:creator>Saleh-Alfurayh</dc:creator>
      <dc:date>2022-08-21T07:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/516580#M107278</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you try or test for inbound decryption, I suggest you should try.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1- import password protected pkcs12 file (sertificate+key) to Firewall&lt;/P&gt;
&lt;P&gt;Device&amp;gt;Certificate&lt;/P&gt;
&lt;P&gt;2-Create Certificate decrytpion profile&lt;/P&gt;
&lt;P&gt;Objects&amp;gt;Decryption&amp;gt;Decryption Profile&lt;/P&gt;
&lt;P&gt;3-Create related Decryption policy&lt;/P&gt;
&lt;P&gt;Policy&amp;gt;Decryption&amp;gt;Add&lt;/P&gt;
&lt;P&gt;Source zone internet zone&lt;/P&gt;
&lt;P&gt;Source ip any&lt;/P&gt;
&lt;P&gt;Source user any&lt;/P&gt;
&lt;P&gt;Destinatination zone (İf Static-NAT rule is bi-directional) inner zone of ip&lt;/P&gt;
&lt;P&gt;Destinatination ip real ip address which you assingned for static NAT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Before taking this action for testing you config, you can assing your test real internet access ip address as source ip so you can see result without service outage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 06:19:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/516580#M107278</guid>
      <dc:creator>upelister</dc:creator>
      <dc:date>2022-10-03T06:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/538217#M110521</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have already tried this. i've managed to get SSL inspection working with a test server. i followed the same setup for our production environment but it doesn't work. It's not an issue with the certificates or keys, as i've tried them on the test server and they worked fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Upon further checking, i noticed that the client doesn't get a "Server Hello" back from the server, which may explain why the connection attempt seems to just hang.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are no reported errors in the Decryption log, and there's no traffic logged between the two after it's been decrypted. Am pretty sure my security policies are OK -- everything works every time i disable the decryption policy.&lt;/P&gt;
&lt;P&gt;Any suggestions on what to check? Are there any specific settings needed on the web server(IIS)? Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2023 08:58:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/538217#M110521</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2023-04-11T08:58:24Z</dc:date>
    </item>
  </channel>
</rss>

