<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Inbound Inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40231#M29513</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup a decryption policy to decrypt inbound SSL traffic for the Exchange web mail server. However, when I check the logs I see only some traffic as decrypted and some arnn't. Refer below screenshots,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="decrypted.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11598_decrypted.JPG.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="notdecrypted.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11599_notdecrypted.JPG.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why isn't the policy not decrypting all the traffic?&lt;/P&gt;&lt;P&gt;I'm trying to decommission the Microsoft ISA server used as reverse proxy for Exchnage Web mail. Is it safe to use inbound SSL inspection and NAT the traffic into the internal exchnage sever?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shayan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Feb 2014 08:51:18 GMT</pubDate>
    <dc:creator>Shayan</dc:creator>
    <dc:date>2014-02-13T08:51:18Z</dc:date>
    <item>
      <title>SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40231#M29513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup a decryption policy to decrypt inbound SSL traffic for the Exchange web mail server. However, when I check the logs I see only some traffic as decrypted and some arnn't. Refer below screenshots,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="decrypted.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11598_decrypted.JPG.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="notdecrypted.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11599_notdecrypted.JPG.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why isn't the policy not decrypting all the traffic?&lt;/P&gt;&lt;P&gt;I'm trying to decommission the Microsoft ISA server used as reverse proxy for Exchnage Web mail. Is it safe to use inbound SSL inspection and NAT the traffic into the internal exchnage sever?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shayan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Feb 2014 08:51:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40231#M29513</guid>
      <dc:creator>Shayan</dc:creator>
      <dc:date>2014-02-13T08:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40232#M29514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems normal to me.&amp;nbsp; In the same way that not every thing is fully inspected in normal traffic streams but goes through the fast path, ssl decryption is similarly situated.&amp;nbsp; Enough needs to be seen for app-id and threat scans to do their job and the rest is fast path through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure I follow your comment on MS ISA server.&amp;nbsp; The Palo Alto is a firewall, NOT a reverse proxy.&amp;nbsp; In some ways a reverse proxy is better but in other ways the Palo Alto inspections are a big improvement.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to reverse proxy and/or load balance the traffic you would still need another appliance to replace the ISA.&amp;nbsp; This would sit behind the Palo Alto so all the inspection and firewall protection would be in place, but the traffic is buffered by the reverse proxy towards the servers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Feb 2014 02:33:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40232#M29514</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-02-14T02:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40233#M29515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;maybe one of the clients used an unsupported SSL chiper suite because they are selected by clients&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Feb 2014 13:54:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40233#M29515</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2014-02-14T13:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40234#M29516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below document show the support cipher suite.&lt;/P&gt;&lt;P&gt; &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1212"&gt;Which Ciphers are Supported by PAN-OS and Panorama?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Like kdd mentioned it is possible it that they used unsupported cipher suite.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Feb 2014 17:28:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40234#M29516</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2014-02-14T17:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40235#M29517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the response. It make sense. I'm not specifically looking for reverse proxy solution. If I can achive similar security by SSL inspection that would be suffient.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 06:01:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/40235#M29517</guid>
      <dc:creator>Shayan</dc:creator>
      <dc:date>2014-02-15T06:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/99226#M44172</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the same situation with inbound inspection.&lt;/P&gt;&lt;P&gt;same source and destination ip addresses on logs&amp;nbsp;but sometimes ssl(not-decrypted), sometimes web-browsing(decrypted)&lt;/P&gt;&lt;P&gt;what can be the reason for that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 19:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/99226#M44172</guid>
      <dc:creator>PanIst</dc:creator>
      <dc:date>2016-07-21T19:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/99258#M44173</link>
      <description>&lt;P&gt;The same thing is still true today; PAN doesn't support the full cipher suite, additonally as long as the PA can get the applicaiton ID and do a threat scan it lets other traffic through on the fast path becuase of processing restrictions. It's also important to note that if you are using a smaller device it's very possible that you are hitting the session limit on your PA, anything over that limit will not be decrypted because the PA can not spare the system resources required to process the request and keep the traffic flowing through the firewall. Without a little more back story and actually looking at the logs on the device it's pretty impossible to say if you are encountering normal behavior or if something with your decryption policy doesn't sit right with your setup.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 20:41:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/99258#M44173</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-07-21T20:41:10Z</dc:date>
    </item>
  </channel>
</rss>

