<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound SSL decryption in vWire and Tap mode in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14908#M10936</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like I need some additional help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me first briefly describe my setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet - PAN vWire - SSG5 - SA2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an incoming NAT rule forwarding traffic to port 443 directed to the SSG5 to the SA2000&lt;/P&gt;&lt;P&gt;I'd like to control the incoming traffic to the SA2000.&lt;/P&gt;&lt;P&gt;The SA 2000 is used for SSL VPN (Network Connect) and Activesync from mobile devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I loaded the certificate of the SA2000 to the PAN and started to decrypt inbound SSL traffic.&lt;/P&gt;&lt;P&gt;Originally I allowed only ssl and activesync to the SSG5. This didn't work.&lt;/P&gt;&lt;P&gt;When I checked the logs I saw that there was incoming web-browsing blocked to port 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like PAN first detects incoming SSL, next it sees the traffic as web-browsing and next as activesync.&lt;/P&gt;&lt;P&gt;My policy on the PAN has application default for the incoming services.&lt;/P&gt;&lt;P&gt;web-browsing on port 443 is blocked in this case.&lt;/P&gt;&lt;P&gt;I ended up adding an additional rule allowing web-browsing to port 443&lt;/P&gt;&lt;P&gt;After that activesync and network connect worked&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this is not what I want.&lt;/P&gt;&lt;P&gt;I'd like to allow only activesync and network connect (looks like there is no appID for Juniper Network Connect BTW)&lt;/P&gt;&lt;P&gt;Allowing web-browsing to port 443 leaves the door wide open for any sort of attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second question concerning outbound SSL decryption:&lt;/P&gt;&lt;P&gt;When I commit my config I get a warning that there is no untrust cert configured and therefore the trust cert will be used.&lt;/P&gt;&lt;P&gt;Any hint how to generate and load an untrusted cert to be used for outbound SSL decryption?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Andreas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: I know that I probably could replace the SSG5 and SA2000 with the PAN but curently I'm missing the support for dynamic DNS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Feb 2012 02:19:29 GMT</pubDate>
    <dc:creator>AndreasB</dc:creator>
    <dc:date>2012-02-20T02:19:29Z</dc:date>
    <item>
      <title>Inbound SSL decryption in vWire and Tap mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14904#M10932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Short question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is inbound SSL decryption possible in vWire and/or Tap mode?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Andreas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 00:28:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14904#M10932</guid>
      <dc:creator>AndreasB</dc:creator>
      <dc:date>2012-02-18T00:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption in vWire and Tap mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14905#M10933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andreas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL Decryption is indeed possible in VWire, in both directions.&lt;/P&gt;&lt;P&gt;SSL Decryption is possible in TAP - but only for inbound, where you have the server certs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 00:32:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14905#M10933</guid>
      <dc:creator>James</dc:creator>
      <dc:date>2012-02-18T00:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption in vWire and Tap mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14906#M10934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the quick reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have outbound decryption working fine in vWire.&lt;/P&gt;&lt;P&gt;I didn't expect to get outbound decryption working in tap mode but I was hoping that it should work for inbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to debug then a bit more to get it working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Andreas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 00:39:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14906#M10934</guid>
      <dc:creator>AndreasB</dc:creator>
      <dc:date>2012-02-18T00:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption in vWire and Tap mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14907#M10935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Luck!&lt;/P&gt;&lt;P&gt;Let us know if you need any further help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 23:20:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14907#M10935</guid>
      <dc:creator>James</dc:creator>
      <dc:date>2012-02-18T23:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption in vWire and Tap mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14908#M10936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like I need some additional help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me first briefly describe my setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet - PAN vWire - SSG5 - SA2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an incoming NAT rule forwarding traffic to port 443 directed to the SSG5 to the SA2000&lt;/P&gt;&lt;P&gt;I'd like to control the incoming traffic to the SA2000.&lt;/P&gt;&lt;P&gt;The SA 2000 is used for SSL VPN (Network Connect) and Activesync from mobile devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I loaded the certificate of the SA2000 to the PAN and started to decrypt inbound SSL traffic.&lt;/P&gt;&lt;P&gt;Originally I allowed only ssl and activesync to the SSG5. This didn't work.&lt;/P&gt;&lt;P&gt;When I checked the logs I saw that there was incoming web-browsing blocked to port 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like PAN first detects incoming SSL, next it sees the traffic as web-browsing and next as activesync.&lt;/P&gt;&lt;P&gt;My policy on the PAN has application default for the incoming services.&lt;/P&gt;&lt;P&gt;web-browsing on port 443 is blocked in this case.&lt;/P&gt;&lt;P&gt;I ended up adding an additional rule allowing web-browsing to port 443&lt;/P&gt;&lt;P&gt;After that activesync and network connect worked&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this is not what I want.&lt;/P&gt;&lt;P&gt;I'd like to allow only activesync and network connect (looks like there is no appID for Juniper Network Connect BTW)&lt;/P&gt;&lt;P&gt;Allowing web-browsing to port 443 leaves the door wide open for any sort of attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second question concerning outbound SSL decryption:&lt;/P&gt;&lt;P&gt;When I commit my config I get a warning that there is no untrust cert configured and therefore the trust cert will be used.&lt;/P&gt;&lt;P&gt;Any hint how to generate and load an untrusted cert to be used for outbound SSL decryption?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Andreas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: I know that I probably could replace the SSG5 and SA2000 with the PAN but curently I'm missing the support for dynamic DNS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Feb 2012 02:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14908#M10936</guid>
      <dc:creator>AndreasB</dc:creator>
      <dc:date>2012-02-20T02:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption in vWire and Tap mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14909#M10937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andreas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regarding the outbound SSL decr. cert. Optionally you can generate an untrust-cert like below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="20.02.jpg" class="jive-image-thumbnail jive-image" onclick="" src="https://live.paloaltonetworks.com/legacyfs/online/2651_20.02.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="20.02-2.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/2652_20.02-2.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the inbound SSL part I always recommend not to use APP-ID exclusively. From a security perspective this can be a bit problematic, because PA needs to pass a certain amount of traffic before it can decide on an APP-ID. This leaves a kind of an exposure.Therefore it is adviseable to use at least a service port together with an APP-ID for inbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;But this is not what I want.&lt;/P&gt;&lt;P&gt;I'd like to allow only activesync and network connect (looks like there is no appID for Juniper Network Connect BTW)&lt;/P&gt;&lt;P&gt;Allowing web-browsing to port 443 leaves the door wide open for any sort of attacks.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you terminate SSL on the PA Firewall you can use Threat Prevention to further protect your environment for inbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Feb 2012 07:54:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-in-vwire-and-tap-mode/m-p/14909#M10937</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-20T07:54:34Z</dc:date>
    </item>
  </channel>
</rss>

