<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deep Packet Inspection and SSL Certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000127#M122753</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1069418869"&gt;@N.MANTUA&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, this is correct understanding. Once Exchange server administrator renews certificate you will have to export that certificate from server and import it to Firewall to ensure inbound decryption works after server certificate renewal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is video tutorial for setup of inbound SSL decryption: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPGqCAO" target="_self"&gt;Video Tutorial: How to Configure SSL Inbound Inspection on the Palo Alto Networks Firewall&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After you have certificate imported in Firewall you can easily replace certificate by selecting it from drop down list under: Options &amp;gt; Certificate. Alternatively if you can have certificate in advance you can pre-prepare by cloning existing decryption policy and use new certificate, then you can position the policy below existing one and flip the order after server admin renews certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jan 2025 00:54:55 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2025-01-06T00:54:55Z</dc:date>
    <item>
      <title>Deep Packet Inspection and SSL Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/999620#M122649</link>
      <description>&lt;P&gt;Hello, newbie here. One of our clients asked me:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"We have an exchange server&lt;SPAN data-teams="true"&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&amp;nbsp;which is on site.&amp;nbsp; We need to renew the ssl certificate, I was told that if the Palo Alto firewall performs deep packet inspection, we need to supply the ssl certificate to the firewall.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;if it is so, we need to coordinate with my local admin to install the ssl certificate on the server and you will need to do your setup on the firewall, we need to plan a meeting..."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I read the SSL Inbound Inspection document, the client is right.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I know the thoughts of those who actually configured a Deep Packet Inspection on their Palo Alto firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 13:33:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/999620#M122649</guid>
      <dc:creator>N.MANTUA</dc:creator>
      <dc:date>2024-12-26T13:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Packet Inspection and SSL Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/999769#M122665</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would first check to see if its enabled for that traffic. Go to&amp;nbsp; Policies on the Top menu then Decryption on the Left Menu. Check here to see if inbound inspection is enabled. It would be something like Source Zone Untrust, Destination zone Trust. Could also be listed by IP address or Object name of the Exchange server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_1-1735323479134.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64965iD56D0778F3174DF4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_1-1735323479134.png" alt="OtakarKlier_1-1735323479134.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 18:18:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/999769#M122665</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-12-27T18:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Packet Inspection and SSL Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000127#M122753</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1069418869"&gt;@N.MANTUA&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, this is correct understanding. Once Exchange server administrator renews certificate you will have to export that certificate from server and import it to Firewall to ensure inbound decryption works after server certificate renewal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is video tutorial for setup of inbound SSL decryption: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPGqCAO" target="_self"&gt;Video Tutorial: How to Configure SSL Inbound Inspection on the Palo Alto Networks Firewall&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After you have certificate imported in Firewall you can easily replace certificate by selecting it from drop down list under: Options &amp;gt; Certificate. Alternatively if you can have certificate in advance you can pre-prepare by cloning existing decryption policy and use new certificate, then you can position the policy below existing one and flip the order after server admin renews certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 00:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000127#M122753</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-01-06T00:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Packet Inspection and SSL Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000188#M122761</link>
      <description>&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 17:36:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000188#M122761</guid>
      <dc:creator>N.MANTUA</dc:creator>
      <dc:date>2025-01-06T17:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Packet Inspection and SSL Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000189#M122762</link>
      <description>&lt;P&gt;Thanks for the advice. That's a good place to check.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 17:40:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deep-packet-inspection-and-ssl-certificate/m-p/1000189#M122762</guid>
      <dc:creator>N.MANTUA</dc:creator>
      <dc:date>2025-01-06T17:40:39Z</dc:date>
    </item>
  </channel>
</rss>

