<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apple Laptop/Desktop Able to Bypass an Application Deny Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/apple-laptop-desktop-able-to-bypass-an-application-deny-policy/m-p/2651#M1983</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Enable ssl termination in the PA should handle this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without ssl termination the PA can only look at the public info of the cert (CN and stuff) which the site sends to the client in order to guess which site this is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps your apple boxes uses TLS1.1 or newer which I think isnt (yet) compatible with PA ability to inspect the flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Aug 2012 22:56:05 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-08-20T22:56:05Z</dc:date>
    <item>
      <title>Apple Laptop/Desktop Able to Bypass an Application Deny Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-laptop-desktop-able-to-bypass-an-application-deny-policy/m-p/2650#M1982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a policy setup to deny gmail and if a user has an Apple laptop or desktop they can get to gmail via https.&amp;nbsp; On a Windows laptop/desktop the deny policy prevents it, even when using Safari on Windows.&amp;nbsp; Anyone seen this and is there a way to prevent this loophole? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 15:59:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-laptop-desktop-able-to-bypass-an-application-deny-policy/m-p/2650#M1982</guid>
      <dc:creator>helpdesk_houston</dc:creator>
      <dc:date>2012-08-14T15:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Apple Laptop/Desktop Able to Bypass an Application Deny Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-laptop-desktop-able-to-bypass-an-application-deny-policy/m-p/2651#M1983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Enable ssl termination in the PA should handle this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without ssl termination the PA can only look at the public info of the cert (CN and stuff) which the site sends to the client in order to guess which site this is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps your apple boxes uses TLS1.1 or newer which I think isnt (yet) compatible with PA ability to inspect the flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 22:56:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-laptop-desktop-able-to-bypass-an-application-deny-policy/m-p/2651#M1983</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-08-20T22:56:05Z</dc:date>
    </item>
  </channel>
</rss>

