<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to protect an https webserver in the dmz with vulnerability protection ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32422#M23757</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the vulnerability protection is a really nice feature of the PA.If the PA is able to take a look at the traffic&lt;/P&gt;&lt;P&gt;this should work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But how does it work if the webserver in the dmz only accepts https connections ? So the possible attacker connects with https to the webserver.&lt;/P&gt;&lt;P&gt;I guess i need to terminate the ssl tunnel at the pa to be able to use the vulnerability protection in this case ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Christian &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2012 14:25:22 GMT</pubDate>
    <dc:creator>cfpa</dc:creator>
    <dc:date>2012-05-24T14:25:22Z</dc:date>
    <item>
      <title>How to protect an https webserver in the dmz with vulnerability protection ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32422#M23757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the vulnerability protection is a really nice feature of the PA.If the PA is able to take a look at the traffic&lt;/P&gt;&lt;P&gt;this should work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But how does it work if the webserver in the dmz only accepts https connections ? So the possible attacker connects with https to the webserver.&lt;/P&gt;&lt;P&gt;I guess i need to terminate the ssl tunnel at the pa to be able to use the vulnerability protection in this case ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Christian &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 14:25:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32422#M23757</guid>
      <dc:creator>cfpa</dc:creator>
      <dc:date>2012-05-24T14:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to protect an https webserver in the dmz with vulnerability protection ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32423#M23758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you need to enable SSL termination in your PA device in order to inspect the encrypted https traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL termination can work in (currently) two modes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL-proxy or SSL-intercept (if I remember correctly).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL-proxy is mostly used when you have a bunch of clients you wish to protect (like against bad things at Internet). The clients will then have the cert the PA will use for termination as a trusted CA and accept that the https is made up by the PA instead of the real server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL-proxy will setup one SSL session from PA to destination and one SSL from PA to client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL-intercept is mostly used when you have one (or more) servers which you wish to protect against (for example) bad things from Internet. In this case you have the private key of the server and can import this to your PA device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL-intercept will then be able to sniff the traffic but the client will have its session directly with the server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 18:50:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32423#M23758</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-24T18:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to protect an https webserver in the dmz with vulnerability protection ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32424#M23759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the name is "SSL Inbound Inspection" &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; ..many thanks for your hints which directed me in this direction ! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 12:06:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32424#M23759</guid>
      <dc:creator>cfpa</dc:creator>
      <dc:date>2012-05-25T12:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to protect an https webserver in the dmz with vulnerability protection ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32425#M23760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am wanting to do this.&amp;nbsp; So I assume I upload certs and keys for our web servers to the FW.&amp;nbsp; What do you do if there is an intermediate cert for those certs.&amp;nbsp; Do you upload that as well? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 23:03:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32425#M23760</guid>
      <dc:creator>cmateam</dc:creator>
      <dc:date>2012-07-05T23:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to protect an https webserver in the dmz with vulnerability protection ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32426#M23761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think you need to upload the intermediate or CA certs because they are only used to verify the ssl. The PA doesnt verify the ssl when you do ssl inbound inspection - it will just sit there and sniff the ssl traffic and decrypt it using the serverkey.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 12:12:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-protect-an-https-webserver-in-the-dmz-with-vulnerability/m-p/32426#M23761</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-07-06T12:12:05Z</dc:date>
    </item>
  </channel>
</rss>

