<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can PA be possible for content inspection after ssh decryption? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/can-pa-be-possible-for-content-inspection-after-ssh-decryption/m-p/47851#M35174</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The statement means that you cannot identify the actual application that is using the ssh tunnel nor you can scan the content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA can identify if the traffic send in the tunnel is pure ssh (e.g. CLI of a device using ssh) and differentiate when an application is using ssh to sneak through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As conclusion, you can block applications that use ssh tunnel but you cannot identify which app is actually tunneling within ssh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Mar 2015 13:40:14 GMT</pubDate>
    <dc:creator>gbogojevic</dc:creator>
    <dc:date>2015-03-10T13:40:14Z</dc:date>
    <item>
      <title>Can PA be possible for content inspection after ssh decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pa-be-possible-for-content-inspection-after-ssh-decryption/m-p/47850#M35173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can PA be possible for content inspection after ssh decryption?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked the below document.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4498"&gt;Details on Port Forwarding Inside SSH&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This document mentioned the following comment.&lt;/P&gt;&lt;P&gt;"Content and threat inspection is not done on the SSH tunnel session"&lt;/P&gt;&lt;P&gt;I don't know that It means whether only 'ssh-tunnel' application or both 'ssh' &amp;amp; "ssh-tunnel' after ssh decryption.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;I need your help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;SC Hong &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Mar 2015 13:23:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pa-be-possible-for-content-inspection-after-ssh-decryption/m-p/47850#M35173</guid>
      <dc:creator>schong</dc:creator>
      <dc:date>2015-03-10T13:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: Can PA be possible for content inspection after ssh decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pa-be-possible-for-content-inspection-after-ssh-decryption/m-p/47851#M35174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The statement means that you cannot identify the actual application that is using the ssh tunnel nor you can scan the content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA can identify if the traffic send in the tunnel is pure ssh (e.g. CLI of a device using ssh) and differentiate when an application is using ssh to sneak through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As conclusion, you can block applications that use ssh tunnel but you cannot identify which app is actually tunneling within ssh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Mar 2015 13:40:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pa-be-possible-for-content-inspection-after-ssh-decryption/m-p/47851#M35174</guid>
      <dc:creator>gbogojevic</dc:creator>
      <dc:date>2015-03-10T13:40:14Z</dc:date>
    </item>
  </channel>
</rss>

