<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to SSL Bypass based on application in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/176574#M55203</link>
    <description>&lt;P&gt;This seems like an awesome solution. Any insight into whether it will work for PAN OS 7.1?&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2017 16:18:58 GMT</pubDate>
    <dc:creator>jdrugan</dc:creator>
    <dc:date>2017-09-14T16:18:58Z</dc:date>
    <item>
      <title>How to SSL Bypass based on application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/170692#M54079</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to share a solution I have implemented recntly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bypassing SSL Decryption based on applications was a request I had from many customers.&lt;/P&gt;&lt;P&gt;I know there is an FR for that. but until then, with PAN-OS 8, it is possible to achieve differently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had a specific scenario where one of my customers had to connect to his customer's Pulse Secure SSL VPN device (collaboration feature).&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using SSL Decryption on his PAN NGFW, the connection was failing and he had to manualy add the IP address of his customer to a bypass rule.&lt;/P&gt;&lt;P&gt;when you have hundreds of customers using that solution, and you need to add their IP address manualy, it is becoming problematic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The idea is, dynamically adding the destination address to an SSL Bypass rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is how it goes...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create a tag - Objects --&amp;gt; Tags:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tag.png" style="width: 406px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10711iFACF40686249C7DE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="tag.png" alt="tag.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create a Dynamic Address Group - Objects --&amp;gt; Address Groups&lt;/P&gt;&lt;P&gt;Add the previously created tag's name as a match&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dynamic address group.png" style="width: 465px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10713i30A918A6404F6342/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dynamic address group.png" alt="dynamic address group.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Create a decryption rule with the new Address Group object as a destination with a 'no-decrypt' action. (pay attention to rules order)&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bypass rule.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10712iE3F3A0D81643CCC2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="bypass rule.png" alt="bypass rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Create a Log Forwarding profile with a filter that will catch a specific application ('secure-access' for my scenario). Use Traffic as the log type&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log forwarding.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10715i759FEE96F48D9777/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="log forwarding.png" alt="log forwarding.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add a Built-in Action to tag the destination address&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="built-in action.png" style="width: 480px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10714i98DBE90A037C24F2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="built-in action.png" alt="built-in action.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add the Log forwarding profile to the security rule that permitted the desired application originally.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="security rule.png" style="width: 699px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10717iED043CD82C8A3EF6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="security rule.png" alt="security rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Commit&lt;/P&gt;&lt;P&gt;Access the desired website (application), and verify the address has successfully been dynamically registered to the dynamic address group (click 'more'), and successfully SSL Bypassed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Verify dyn address grp.png" style="width: 404px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10716i5AC4D7F153AF0B74/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Verify dyn address grp.png" alt="Verify dyn address grp.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please share your thoughts..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 09:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/170692#M54079</guid>
      <dc:creator>Ozamir</dc:creator>
      <dc:date>2017-08-09T09:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to SSL Bypass based on application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/170724#M54087</link>
      <description>&lt;P&gt;Another really nice and creative way of using the awesome Log Forwarding Profile feature in PAN-OS 8!&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 10:41:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/170724#M54087</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-09T10:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to SSL Bypass based on application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/176574#M55203</link>
      <description>&lt;P&gt;This seems like an awesome solution. Any insight into whether it will work for PAN OS 7.1?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 16:18:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-ssl-bypass-based-on-application/m-p/176574#M55203</guid>
      <dc:creator>jdrugan</dc:creator>
      <dc:date>2017-09-14T16:18:58Z</dc:date>
    </item>
  </channel>
</rss>

