<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Certificates in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24704#M17998</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopeing you can answer a couple of questions I have regarding SSL certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) How does the Palo Alto device itself handle SSL when it is doing interception? Can you set that it would block traffic when for example, an online banking sites certificate has expired, force OCSP, etc.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2) How does the Palo Alto maintain its own list of CAs, can we remove CAs from the list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this make sence&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Jun 2011 11:50:01 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2011-06-08T11:50:01Z</dc:date>
    <item>
      <title>SSL Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24704#M17998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopeing you can answer a couple of questions I have regarding SSL certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) How does the Palo Alto device itself handle SSL when it is doing interception? Can you set that it would block traffic when for example, an online banking sites certificate has expired, force OCSP, etc.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2) How does the Palo Alto maintain its own list of CAs, can we remove CAs from the list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this make sence&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jun 2011 11:50:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24704#M17998</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-06-08T11:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24705#M17999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pan handles encrypted&amp;nbsp; traffic as the man in the middle, however we do not give you the option of blocking based on certificate expiration.&lt;/P&gt;&lt;P&gt;List of CA's&amp;nbsp; is normally maintained by software release, CA,s cannot be removed from this list as far as I know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jun 2011 01:54:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24705#M17999</guid>
      <dc:creator>gsamuels</dc:creator>
      <dc:date>2011-06-09T01:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24706#M18000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAN provides you with the option to set OCSP, in the admin guide (Page 34, PANOS v4) it says you have the option to "Block Unknown Certificates" &lt;/P&gt;&lt;P&gt;What does this option actually do?&lt;/P&gt;&lt;P&gt;Would it not block traffic if the certificate had expired or was unknown ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jun 2011 05:31:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24706#M18000</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-06-09T05:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24707#M18001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No this option does not take the expiration of the certificate as part of he decision making process, this would normally be caught by the client browser.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jun 2011 00:57:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates/m-p/24707#M18001</guid>
      <dc:creator>gsamuels</dc:creator>
      <dc:date>2011-06-10T00:57:49Z</dc:date>
    </item>
  </channel>
</rss>

