<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forcing TLS/SSL decryption to cipher suite PAN can decrypt? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158721#M51965</link>
    <description>&lt;P&gt;You could use a decryption profile which you have to attach to your decryption rule:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/objects/objects-decryption-profile" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/objects/objects-decryption-profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in 7.1.x your very limited with the use of strong ciphers. Beginning with PAN-OS 8 PaloAlto also supports PFS for TLS Inbound inspection:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/decryption-features/perfect-forward-secrecy-pfs-for-inbound-ssl-sessions#_92861" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/decryption-features/perfect-forward-secrecy-pfs-for-inbound-ssl-sessions#_92861&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 30 May 2017 17:55:06 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2017-05-30T17:55:06Z</dc:date>
    <item>
      <title>Forcing TLS/SSL decryption to cipher suite PAN can decrypt?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158718#M51964</link>
      <description>&lt;P&gt;We're on 7.1.x and use SSL decryption on traffic coming in to sites we host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to &lt;EM&gt;&lt;STRONG&gt;force&lt;/STRONG&gt;&lt;/EM&gt; the SSL traffic to a (strong) cipher suite(s) that the PAN can decrypt please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this KB but I'm not entirely clear if this&amp;nbsp;lets you mandate &lt;STRONG&gt;&lt;EM&gt;only&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;cipher suites that can be decrypted?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/PAN-OS-Supported-ciphers/ta-p/71969" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/PAN-OS-Supported-ciphers/ta-p/71969&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2017 17:16:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158718#M51964</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2017-05-30T17:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing TLS/SSL decryption to cipher suite PAN can decrypt?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158721#M51965</link>
      <description>&lt;P&gt;You could use a decryption profile which you have to attach to your decryption rule:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/objects/objects-decryption-profile" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/objects/objects-decryption-profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in 7.1.x your very limited with the use of strong ciphers. Beginning with PAN-OS 8 PaloAlto also supports PFS for TLS Inbound inspection:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/decryption-features/perfect-forward-secrecy-pfs-for-inbound-ssl-sessions#_92861" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/decryption-features/perfect-forward-secrecy-pfs-for-inbound-ssl-sessions#_92861&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2017 17:55:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158721#M51965</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-30T17:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing TLS/SSL decryption to cipher suite PAN can decrypt?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158722#M51966</link>
      <description>&lt;P&gt;I meant to post this link&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Cipher-suite-enforcement-in-decryption-rules/ta-p/74291" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Cipher-suite-enforcement-in-decryption-rules/ta-p/74291&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess I'm not sure how a decryption profile interacts to force the traffic to something that can be decrypted.&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2017 17:57:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158722#M51966</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2017-05-30T17:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing TLS/SSL decryption to cipher suite PAN can decrypt?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158730#M51969</link>
      <description>&lt;P&gt;Create a decryption profile with the following settings:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ashampoo_Snap_2017.05.30_21h55m14s_016_.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9461i4E068E2418307851/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Ashampoo_Snap_2017.05.30_21h55m14s_016_.png" alt="Ashampoo_Snap_2017.05.30_21h55m14s_016_.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ashampoo_Snap_2017.05.30_21h55m55s_017_.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9460i7C27270DE590464E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Ashampoo_Snap_2017.05.30_21h55m55s_017_.png" alt="Ashampoo_Snap_2017.05.30_21h55m55s_017_.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After that you simply attach this profile to your decryption rule and your done. The firewall will only allow ciphers which it is able to decrypt and everything else will be dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(these are screenshots from PAN-OS 8. in PAN-OS 7.1 you HAVE TO SELECT RSA as Key Exchange Algorithm because DHE and ECDHE are not supported for inbound inspection)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2017 20:04:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forcing-tls-ssl-decryption-to-cipher-suite-pan-can-decrypt/m-p/158730#M51969</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-30T20:04:49Z</dc:date>
    </item>
  </channel>
</rss>

