<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42691#M31347</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/22709"&gt;cpkaiser&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Welcome to forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you will need outbound SSL decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use any type of certificate that is either CA or subordinate CA. Common name of the certificate does not matter (so it can be wildcard), just the CA which issued the certificate or the certificate itself (if self signed) should be imported in the trusted root store other wise they will get warnings and some websites might not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Oct 2014 16:37:29 GMT</pubDate>
    <dc:creator>bat</dc:creator>
    <dc:date>2014-10-14T16:37:29Z</dc:date>
    <item>
      <title>SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42689#M31345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have quite a few students using hotspot shield and other tunneling apps to get around our filter. I've been successful in block a majority of them by blocking the hotspot shield app. However there are still a number of them getting though by creating tunnels on port 443. In this case we would want to do outbound ssl decryption correct? Is there a specific type of certificate required for that or just buy a regular SSL cert.? Would a wildcard certificate work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:25:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42689#M31345</guid>
      <dc:creator>cpkaiser</dc:creator>
      <dc:date>2014-10-14T16:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42690#M31346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi CPKaiser,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need CA on the device. This can be a self signed cert from the PA box itself or if you have PKI infrastucture you can generate a CA from there and import it to Palo Alto device. This way firewall is able to look through SSL traffic as the CA cert would have both public and private key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please keep in mind that since this certificate might not be trusted by student browser, they will get an browser error if they try to access SSL sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround is to install the certificate in their trusted root store. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:31:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42690#M31346</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-10-14T16:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42691#M31347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/22709"&gt;cpkaiser&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Welcome to forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you will need outbound SSL decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use any type of certificate that is either CA or subordinate CA. Common name of the certificate does not matter (so it can be wildcard), just the CA which issued the certificate or the certificate itself (if self signed) should be imported in the trusted root store other wise they will get warnings and some websites might not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:37:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42691#M31347</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-14T16:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42692#M31348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect. Thank you both, that is exactly what I needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:41:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42692#M31348</guid>
      <dc:creator>cpkaiser</dc:creator>
      <dc:date>2014-10-14T16:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42693#M31349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad we could help. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:48:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42693#M31349</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-10-14T16:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42694#M31350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just short question, how you tunneled traffic is seem from app point of view ?&lt;/P&gt;&lt;P&gt;Most of case, is seen as unknown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, just block unknown, it's lees intrusive as decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 08:45:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/42694#M31350</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2014-10-15T08:45:36Z</dc:date>
    </item>
  </channel>
</rss>

