<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificates CA Verisign in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29201#M21354</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Netmaster,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Decryption can be done only by self signed Root CA or Sub-ordinate CA. The reason is this certificate signs, another certificate for the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you generate a.crt self signed certificate on the firewall. Now traffic comes for bankofamerica.com on firewall. Now a.cert will sign a certificate for bankofamerica.com and forwards it to user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only self signed cert and subordinate cert has this capability to sign another certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as I know verisign will not provide you subordinate certificate. Let me know if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Aug 2014 14:46:31 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2014-08-27T14:46:31Z</dc:date>
    <item>
      <title>SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29199#M21352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have import the CA Certificate from Verisign and want to activate the Antivirus function (policies).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But only the &lt;/P&gt;&lt;P&gt;"Trusted Root CA"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is available in the "Certificate Information"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the option "Forward Trust Certificate" is gray and not available.&lt;/P&gt;&lt;P&gt;But that the function what we need.&lt;/P&gt;&lt;P&gt;We will check upload traffic to the servers&amp;nbsp; in the trust lan of the paloalto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;System: PaloAlto 500 v5.0.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone knows this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Info: when we make a self signed CA we can choose the option "Trusted Root CA".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2014 12:30:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29199#M21352</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-08-27T12:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29200#M21353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please read last reply by Gwesson&amp;nbsp; from &lt;A href="https://live.paloaltonetworks.com/message/41428"&gt;Re: Decryption certificate&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and follow this doc &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1412" title="https://live.paloaltonetworks.com/docs/DOC-1412"&gt;https://live.paloaltonetworks.com/docs/DOC-1412&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that will explain You enought.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2014 12:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29200#M21353</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-08-27T12:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29201#M21354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Netmaster,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Decryption can be done only by self signed Root CA or Sub-ordinate CA. The reason is this certificate signs, another certificate for the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you generate a.crt self signed certificate on the firewall. Now traffic comes for bankofamerica.com on firewall. Now a.cert will sign a certificate for bankofamerica.com and forwards it to user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only self signed cert and subordinate cert has this capability to sign another certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as I know verisign will not provide you subordinate certificate. Let me know if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2014 14:46:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29201#M21354</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-27T14:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29202#M21355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the two answers, thats help to understand how it works in the firewall.&lt;/P&gt;&lt;P&gt;Now we have make a &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px; background-color: #f6f6f6;"&gt;self signed Root CA and a decrypt like this doc:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="loading" href="https://live.paloaltonetworks.com/docs/DOC-1412" style="font-size: 10pt; line-height: 1.5em;" title="https://live.paloaltonetworks.com/docs/DOC-1412"&gt;https://live.paloaltonetworks.com/docs/DOC-1412&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it doesnt work. We want to make Inbound SSL decryption!&lt;/P&gt;&lt;P&gt;The traffic were not decrypted, we don´t see a decrypt flag in the logs of the packets (policies).&lt;/P&gt;&lt;P&gt;And when we make a openssl question from outside to the server we see the ssl cert from the server and not self signed from the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shared {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl-decrypt {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl-exclude-cert;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trusted-root-CA [ int_test_com int_test];&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; forward-trust-certificate int_test_com;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; forward-untrust-certificate int_test_com;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int_test_com {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subject-hash fc08871a;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; issuer-hash fc08871a;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; not-valid-before "Aug 27 14:16:26 2014 GMT";&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; issuer "/C=DE/ST=Bayern/L=Ismaning/O=test AG/CN=int.test.com";&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; not-valid-after "Aug 27 14:16:26 2015 GMT";&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; common-name int.test.com;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; expiry-epoch 1440684986;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ca yes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subject "/C=DE/ST=Bayern/L=Ismaning/O=test AG/CN=int.test.com";&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; public-key "-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;decryption {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rules {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int_test_antivirus {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl-inbound-inspection int_test_com;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from untrust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to trust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-user any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; negate-source no;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; negate-destination no;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action decrypt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from untrust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to trust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination int_test_com;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-user any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application [ ssl web-browsing];&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service [ service-http service-https];&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hip-profiles any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log-start yes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log-end yes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; negate-source no;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; negate-destination no;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 06:45:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29202#M21355</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-08-28T06:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29203#M21356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Netmaster, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Inbound Decryption, you get original certificate of the server, its different than outbound decryption. So, you always get server cert, its expected behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration looks good, can I get same configuration in GUI format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Provide certificat in GUI&lt;/P&gt;&lt;P&gt;2. Provide Decryption policy in GUI&lt;/P&gt;&lt;P&gt;3. Provide Traffic log in GUI, which says its not decrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 14:00:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29203#M21356</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-28T14:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29204#M21357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when we import the server certificate, no CA flag is set and we dont can choose "Forward .... Certificate" and "Trusted Root CA" in the informations.&lt;/P&gt;&lt;P&gt;Thats a Certificate from Verisign. And wehn we load any other public root certficates from Verisign and import this ones, its the same....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For what you need it in GUI Format, its the same informations as about cli.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone a Idee?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regard&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Sep 2014 16:01:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29204#M21357</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-09-01T16:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29205#M21358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The certificate what we used in the upper config was created in the firewall, i think thats the problem why this one not matched, thats for your info guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Sep 2014 16:03:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29205#M21358</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-09-01T16:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29206#M21359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Netmaster,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually its pretty simple configuration and work for most of the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most likely this is issue with the Certificate provided by Verisign. Verisign will not provide root certificate, they will provide sub-ordinate certificate. Make sure that sub-ordinate certificate has private key. If certificate matches this condition, you should be able to select "Trust/untrsuted Forward" Parameters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Self Signed Cert Follow bellow mentioned two steps. and it will work.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Self_Signed.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15234_Self_Signed.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Forward.png" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15235_Forward.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should work just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Sep 2014 16:35:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29206#M21359</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-01T16:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29207#M21360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now we have made a self signed certificate from the firewall, thats not working.&lt;/P&gt;&lt;P&gt;For the test we have change the Server cert in a self signed too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We don´ see any encrypted packets. (in the traffic log or in the cli like: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1386"&gt;How to View SSL Decryption Information from the CLI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have make all the steps for inbound ssl decrypt from: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1412"&gt;How to Implement SSL Decryption&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but it doesnt works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any special thinks what we must do in the decryption and security policies?&lt;/P&gt;&lt;P&gt;Or any other points we must do? enabling decryption on a single tab or so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cert:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Bildschirmfoto 2014-09-02 um 18.22.56.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15270_Bildschirmfoto 2014-09-02 um 18.22.56.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy decry:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Bildschirmfoto 2014-09-02 um 18.23.21.png" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15271_Bildschirmfoto 2014-09-02 um 18.23.21.png" style="height: 42px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy sec:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Bildschirmfoto 2014-09-02 um 18.23.31.png" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/15272_Bildschirmfoto 2014-09-02 um 18.23.31.png" style="height: 21px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 16:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29207#M21360</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-09-02T16:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29208#M21361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Netmaster,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does server uses certificate SSL_Test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most likely answer is NO, thats why inbound SSL decryption is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are supposed to upload same certificate to firewall which is used by server. If you dont get option for "Forward Trust/Untrust" than its fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 17:05:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29208#M21361</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-02T17:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29209#M21362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,ok i understand we need the same certificate in Firewall as on the server, that we can make on the test Server.But the live Server had the verisign certificate. And we dont can change it. On all certificate we have downloaden From verisign we dont Have the choose to aktivate trust/untrust&lt;/P&gt;&lt;P&gt;On the der. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 17:29:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29209#M21362</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-09-02T17:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29210#M21363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Netmaster,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think for inbound encryption you need forward trust/untrust option. All you need is certificate and its private key to upload. Let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Forward trust/untrust" is for outbound SSL decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REgards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 17:33:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29210#M21363</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-02T17:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29211#M21364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sry i think so. In the decryption policy is the last point "ssl inbound" and When we choose it we must choose a certificate. And Here is the Only certificate what we can choose the&amp;nbsp; self signed with the Option &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Forward trust/untrust". Oh er certificate Here Are Not listed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 18:16:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29211#M21364</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-09-02T18:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29212#M21365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you uploaded cert with private key ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 18:25:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29212#M21365</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-02T18:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29213#M21366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now we have uploaded whit key and make a policy and it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But 1 point, the documentation is here a little bit confuse!&lt;/P&gt;&lt;P&gt;There is the info that you need " forward trust/untrust option" and a CA but for this case is this not the point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"1. The first thing we would like to do is to install and manage the certificate we would like to use. Navigate&amp;nbsp; Device &amp;gt; Certificates and generate a new self signed Certificate, be sure to activate CA,Forward Trust Certificate, Untrust and Trusted Root CA:"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2014 11:37:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29213#M21366</guid>
      <dc:creator>netmaster</dc:creator>
      <dc:date>2014-09-03T11:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates CA Verisign</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29214#M21367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Hello Netmaster,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad I was useful to you and finally we found correct answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually document is not easy to understand, only first time its difficult. Nowonwards you should be able to understand. Thing is when we say self signed cert, we assume user knows he is supposed to check "certirficate" box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2014 14:12:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-ca-verisign/m-p/29214#M21367</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-03T14:12:49Z</dc:date>
    </item>
  </channel>
</rss>

