<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Offloading for inbound connection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201841#M59610</link>
    <description>&lt;P&gt;Thanks for your response. I thought the same but was curious if Palo can do it.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2018 20:07:09 GMT</pubDate>
    <dc:creator>ganees</dc:creator>
    <dc:date>2018-02-22T20:07:09Z</dc:date>
    <item>
      <title>SSL Offloading for inbound connection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201812#M59605</link>
      <description>&lt;P&gt;We have few legacy internal applications listening on a various TCP ports. Now we have a requirement to connect to these applications from a cloud vendor externally. There is no option to setup a site-to-site IPSec VPN tunnel to the cloud so we need to expose this server to internet securly. Can Palo alto act as a proxy for inbound traffic hosting the CA cerificate for the internal applications, decrypt and and send the decrypted packet to the internal server? Any documentation with configuration steps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 17:58:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201812#M59605</guid>
      <dc:creator>ganees</dc:creator>
      <dc:date>2018-02-22T17:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Offloading for inbound connection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201820#M59607</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38763"&gt;@ganees&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This does not sound like a job for paloalto. The better choice would be a reverse proxy like a Citrix Netscaler. Of course also an Apache or nginx webserver can be configured to do this job. Or a Kemp Loadmaster which (depending ond the bandwith you need) is also available for free:&amp;nbsp;&lt;A href="https://freeloadbalancer.com" target="_blank"&gt;https://freeloadbalancer.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 18:09:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201820#M59607</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-02-22T18:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Offloading for inbound connection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201837#M59609</link>
      <description>&lt;P&gt;Not sure if the SSL Decryption Broker feature coming in PanOS 8.1 will allow this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm intrigued to find out myself, especially if there is a simple load balancer feature in it.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 19:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201837#M59609</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2018-02-22T19:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Offloading for inbound connection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201841#M59610</link>
      <description>&lt;P&gt;Thanks for your response. I thought the same but was curious if Palo can do it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 20:07:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201841#M59610</guid>
      <dc:creator>ganees</dc:creator>
      <dc:date>2018-02-22T20:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Offloading for inbound connection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201843#M59611</link>
      <description>The decryption broker feature is intended to share decrypted content with other appliances (e.g. for DLP). But the idea is to keep the content encrypted as it goes through the network and not to terminate the decryption and forward the connection unencrypted.&lt;BR /&gt;Edit: between the palo and the third party appliance the traffic is sent back ond forth in cleartext. But this does not change the fact that after the traffic gets back to the palo firewall it will be re-encrypted.</description>
      <pubDate>Thu, 22 Feb 2018 20:33:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-offloading-for-inbound-connection/m-p/201843#M59611</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-02-22T20:33:19Z</dc:date>
    </item>
  </channel>
</rss>

