<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27149#M19815</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Didnt some appid's look in the CN part of the certs being used (or was it the url-filtering that did this?) so the PA could somewhat inspect ssl traffic even if there is no ssl termination (decryption) setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Oct 2012 19:45:20 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-10-01T19:45:20Z</dc:date>
    <item>
      <title>Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27143#M19809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the PAN still inspect secured traffic for all threats if it's not decrypting it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2012 19:49:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27143#M19809</guid>
      <dc:creator>jorge</dc:creator>
      <dc:date>2012-06-07T19:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27144#M19810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean if a particular threat item isnt evaluated because the traffic happens to be ssl or ssh or similar?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this would be true in order to lower number of false positivies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand there are many threats where it doesnt matter if the payload is encrypted or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2012 20:35:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27144#M19810</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-06-07T20:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27145#M19811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; If you can't decrypt, you can't do anvivirus and such , traffic will be seen as SSL application, so there not much to do ....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 13:03:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27145#M19811</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-06-12T13:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27146#M19812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;However the IPS will still function but of course not be able to inspect the content of the payload but be able to inspect the payload itself (for example if you have an IPS rule that says generate alert if SSLv1 handshake is seen or such).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 06:29:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27146#M19812</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-06-13T06:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27147#M19813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you guys for the information. I'm now working on the ssl decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:smileygrin:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 05:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27147#M19813</guid>
      <dc:creator>HartkentlyNua</dc:creator>
      <dc:date>2012-10-01T05:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27148#M19814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="sfdc_richtext" id="j_id0:j_id6:j_id7:j_id239:j_id241:1:j_id242:j_id243j_id0:j_id6:j_id7:j_id239:j_id241:1:j_id242:j_id243_00N70000002b7LP_div" style="color: #000000; font-family: Arial, Helvetica, sans-serif;"&gt;Hello,&lt;/P&gt;&lt;P class="sfdc_richtext" style="color: #000000; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;/P&gt;&lt;P class="sfdc_richtext" style="color: #000000; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif;"&gt;Just to add, say for example To block facebook by application in a rule , SSL decryption needs to be configured on the PAN, so that the PAN can proxy the outbound SSL sessions and get visibility into the traffic enabling it to identify the application correctly as 'facebook' and enforce app-ID based rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence, without SSL decryption the app-id in traffic logs will appear as 'ssl' for the facebook session. Once SSL decryption is configured, the app-id in monitor logs should show as 'facebook'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A technote on how to configure SSL decryption can be found at :&lt;BR /&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1412" style="color: #015ba7;" target="_blank"&gt;https://live.paloaltonetworks.com/docs/DOC-1412&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 06:45:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27148#M19814</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-10-01T06:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27149#M19815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Didnt some appid's look in the CN part of the certs being used (or was it the url-filtering that did this?) so the PA could somewhat inspect ssl traffic even if there is no ssl termination (decryption) setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 19:45:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27149#M19815</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-01T19:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27150#M19816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think it varies by app-id signature. I've created a custom app-id that looks at the cn part of the cert.&amp;nbsp; If a match is present, then the application is called "my custom app" instead of SSL.&amp;nbsp; At that point, I can create a security rule that blocks "my custom app" while still permitting SSL.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 20:27:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption/m-p/27150#M19816</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2012-10-01T20:27:02Z</dc:date>
    </item>
  </channel>
</rss>

