<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inbound inspection wildcard certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/216418#M62690</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32225"&gt;@dkordyban&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does your IIS only accept connections with SNI or does it serve also a default website for connections without SNI? Did you capture traffic between the firewall and the webserver -&amp;gt; does the firewall send the SNI attribute?&lt;/P&gt;&lt;P&gt;Did you open a support case regarding this issue?&lt;/P&gt;</description>
    <pubDate>Sun, 03 Jun 2018 18:39:30 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-06-03T18:39:30Z</dc:date>
    <item>
      <title>SSL inbound inspection wildcard certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/133835#M47266</link>
      <description>&lt;P&gt;Trying to configure ssl inbound inspection for one of my web sites hosted internally. The IIS server has many sites being served thru host headers. All of the SSL bound sites use the same wildcard certificate *.external-domain-name on this server. I export this cert with key and import into pa.&lt;/P&gt;&lt;P&gt;I make decryption policy to match a specific url in url category for the site I am testing with. When I watch the monitor i see&amp;nbsp;session_end_reason eq decrypt-unsupport-param in session end reason. I am not sure what I am doing wrong.&lt;/P&gt;&lt;P&gt;Wildcard certs not supports for inbound inspection maybe?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reading.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 21:59:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/133835#M47266</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2016-12-20T21:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound inspection wildcard certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/133843#M47267</link>
      <description>&lt;P&gt;What version of PAN-OS are you running? &amp;nbsp;If you are using newer crypto on your certificates you will need PAN-OS 7.1 or higher.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 22:26:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/133843#M47267</guid>
      <dc:creator>mlinsemier</dc:creator>
      <dc:date>2016-12-20T22:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound inspection wildcard certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/133963#M47275</link>
      <description>&lt;P&gt;running 7.1.5&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 11:39:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/133963#M47275</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2016-12-21T11:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound inspection wildcard certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/216417#M62689</link>
      <description>&lt;P&gt;We are still looking for a fix with this. We have since upgraded to 8.0.5 and it still doesnt work. Anyone had any success with this?&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jun 2018 18:31:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/216417#M62689</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-06-03T18:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound inspection wildcard certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/216418#M62690</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32225"&gt;@dkordyban&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does your IIS only accept connections with SNI or does it serve also a default website for connections without SNI? Did you capture traffic between the firewall and the webserver -&amp;gt; does the firewall send the SNI attribute?&lt;/P&gt;&lt;P&gt;Did you open a support case regarding this issue?&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jun 2018 18:39:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection-wildcard-certificate/m-p/216418#M62690</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-06-03T18:39:30Z</dc:date>
    </item>
  </channel>
</rss>

