<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring Incoming SSL Inspection for email in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562547#M113945</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69630"&gt;@CCummings&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to use the exact certificate that is currently used on the server.&lt;/P&gt;
&lt;P&gt;Currently, I'm uncertain about the specific issue with the certificate. Running an SSL debug may provide more insights.&lt;/P&gt;
&lt;P&gt;I would suggest opening a TAC case to further troubleshoot the issue. Without additional logs, I'm unable to make specific suggestions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 20 Oct 2023 09:54:12 GMT</pubDate>
    <dc:creator>akuzhuppilly</dc:creator>
    <dc:date>2023-10-20T09:54:12Z</dc:date>
    <item>
      <title>Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561351#M113745</link>
      <description>&lt;P&gt;So, We have an on-premise Exchange server that is inside our firewall, so incoming and outgoing external email goes throught the firewall. We are having issues with file blocking on emails. We do have SSL inspection set on the traffic from outside to inside for email, but right now it is set to Forward Proxy and we receive no errors, the email is delivered. BUT, file blocking does not work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PA Support is telling me to configure inbound inspection. When I do that, I get decrypt-error and the email is not delivered. We have a wildcard certificate from GoDaddy that we use for everything. That is the certificate that I set when I set inbound inspection and it is the certificate on the email server. But since the firewall is showing decrypt-error, I don't think it is ever getting to the email server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do I determine what is causing the decrypt-error (and hopefully fix it).&lt;/P&gt;
&lt;P&gt;Thank in advance,&lt;/P&gt;
&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 00:26:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561351#M113745</guid>
      <dc:creator>CCummings</dc:creator>
      <dc:date>2023-10-12T00:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561368#M113749</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69630"&gt;@CCummings&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on your description, the current setting is 'forward-proxy', which is to decrypt the outbound traffic.&lt;/P&gt;
&lt;P&gt;With that setting, do you see any traffic getting decrypted? I guess you have applied this to the traffic from your mail server to external parties.&lt;/P&gt;
&lt;P&gt;For the inbound traffic (to the mail server), you need to make sure all the required certificates (cert-chain) are added to the Firewall.&lt;/P&gt;
&lt;P&gt;Taking debug logs from Firewall will be able to give a better understanding of what is causing the failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 03:53:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561368#M113749</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-10-12T03:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561668#M113783</link>
      <description>&lt;P&gt;So, no, It is set to SSL Inbound Inspection (It WAS forward proxy, but I changed that). Now, I get "Private key does not match public key". Nothing on the firewall is telling me that there's anything wrong with my certificate. I've attached a screen shot of my cert page, decrypt profile and decrypt policy options. I've been searching for a solution, but to no avail.&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 15:50:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561668#M113783</guid>
      <dc:creator>CCummings</dc:creator>
      <dc:date>2023-10-13T15:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561778#M113818</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69630"&gt;@CCummings&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;"Private key does not match public key" indicates a certificate issue. The traffic arriving at the firewall, encrypted with the public key, cannot be decrypted by the firewall using the certificate with the private key.&lt;/P&gt;
&lt;P&gt;Please ensure you have uploaded the correct certificates.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 03:58:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561778#M113818</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-10-16T03:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561922#M113839</link>
      <description>&lt;P&gt;So, yes. It's the certificate from GoDaddy. I have the bundle certificate loaded as well. So, the CA Cert is there as well as our cert. Please see attached. I included the GoDaddy File names as well as the certificate page from the FW. I'm sorry I'm not as up on certificates and their parts and functions as I would like to be. I thank you for your assistance.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 20:06:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561922#M113839</guid>
      <dc:creator>CCummings</dc:creator>
      <dc:date>2023-10-16T20:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561967#M113851</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69630"&gt;@CCummings&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I accessed the URL (shown in the CN screenshot), I noticed that the certificate was issued by ISRG Root X1 (attached).&lt;/P&gt;
&lt;P&gt;However, on the firewall, you are using a GoDaddy certificate.&lt;/P&gt;
&lt;P&gt;You might want to perform a packet capture on the original URL to confirm which certificate is being used during the SSL handshake.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cert" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54459i16BD7DA9BAEFB096/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Cert_Issues.png" alt="Cert" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Cert&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 02:15:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/561967#M113851</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-10-17T02:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562271#M113887</link>
      <description>&lt;P&gt;That is our website. It is hosted at a different company and they provide the certificate for that. Our mail server is at mail.muskogeeonline.org and we use a wildcard cert *.muskogeeonline.org for it and our firewall and everything else that is hosted on premise.&lt;/P&gt;
&lt;P&gt;So, when I follow the instructions and export the certificate from our email server to import into the firewall, I get a duplicate certificate error since they both use the same cert. Do I need to use a self-signed certificate on the mail server and export that to the firewall?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 14:06:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562271#M113887</guid>
      <dc:creator>CCummings</dc:creator>
      <dc:date>2023-10-18T14:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562547#M113945</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69630"&gt;@CCummings&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to use the exact certificate that is currently used on the server.&lt;/P&gt;
&lt;P&gt;Currently, I'm uncertain about the specific issue with the certificate. Running an SSL debug may provide more insights.&lt;/P&gt;
&lt;P&gt;I would suggest opening a TAC case to further troubleshoot the issue. Without additional logs, I'm unable to make specific suggestions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 09:54:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562547#M113945</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-10-20T09:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Incoming SSL Inspection for email</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562582#M113954</link>
      <description>&lt;P&gt;Thanks for your insights. I do have a TAC case opened and they are so far not very helpful. I'm taking the troubleshooting class next week and maybe that will help me pinpoint the problem. It's using the exact same cert on the firewall and the mail server (Godaddy wildcard cert), so not sure.&lt;/P&gt;
&lt;P&gt;Again, thank you for your help with this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 13:52:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-incoming-ssl-inspection-for-email/m-p/562582#M113954</guid>
      <dc:creator>CCummings</dc:creator>
      <dc:date>2023-10-20T13:52:24Z</dc:date>
    </item>
  </channel>
</rss>

