<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Decryption with Wildcard SSL-certificate? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231494#M66470</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/479"&gt;@pivvre&lt;/a&gt;&lt;/P&gt;&lt;P&gt;The firewall does not only rely on the CM in order to decide if the connection needs to be decrypted. In most connections (everything from a browser that is not older than about 4 years) the TLS handshake client hello packet contains the Server Name Indicator extension. In this field the client specifies the required FQDN and this is also checked by the firewall. So even the server has a wildcard cert the exclusion can normally still be configured with the FQDN - if the client sends a handshake packet WITH this extension.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Sep 2018 16:17:41 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-09-19T16:17:41Z</dc:date>
    <item>
      <title>Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231385#M66432</link>
      <description>&lt;P&gt;Does Palo Alto support decryption with Wildcard SSL-cert?&lt;BR /&gt;&lt;BR /&gt;Ref.:&lt;BR /&gt;&lt;EM&gt;In order to determine if a connection needs to be decrypted or not, the firewall relies on the (CN) common name configured within the certificate and compares that to the security policy. ( &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/SSL-Decryption-Rules-Not-Matching-FQDN/ta-p/62199" target="_self"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/SSL-Decryption-Rules-Not-Matching-FQDN/ta-p/62199&lt;/A&gt; )&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 06:43:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231385#M66432</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2018-09-19T06:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231456#M66450</link>
      <description>&lt;P&gt;Inbound or outbound decryption?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 11:57:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231456#M66450</guid>
      <dc:creator>markus_w</dc:creator>
      <dc:date>2018-09-19T11:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231458#M66451</link>
      <description>&lt;P&gt;Hi, for outbound decryption&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 12:03:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231458#M66451</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2018-09-19T12:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231485#M66463</link>
      <description>&lt;P&gt;is it possible to tell me the url? and which one do you want to decrypt or not to decrypt?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;short answer: it will decrpyt. but if you want to exclude a specific host / subdomain, there could be a problem. you also need to look at the decryption rule.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 14:50:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231485#M66463</guid>
      <dc:creator>markus_w</dc:creator>
      <dc:date>2018-09-19T14:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231494#M66470</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/479"&gt;@pivvre&lt;/a&gt;&lt;/P&gt;&lt;P&gt;The firewall does not only rely on the CM in order to decide if the connection needs to be decrypted. In most connections (everything from a browser that is not older than about 4 years) the TLS handshake client hello packet contains the Server Name Indicator extension. In this field the client specifies the required FQDN and this is also checked by the firewall. So even the server has a wildcard cert the exclusion can normally still be configured with the FQDN - if the client sends a handshake packet WITH this extension.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 16:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231494#M66470</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-19T16:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231572#M66487</link>
      <description>&lt;P&gt;There are no external URL, this is between two internal zones.&lt;BR /&gt;Problem is we are not able to decrypt the traffic using our own wildcard SSL-certificate..&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 05:57:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231572#M66487</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2018-09-20T05:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231580#M66491</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/479"&gt;@pivvre&lt;/a&gt;&lt;/P&gt;&lt;P&gt;If you try to use a wildcard cert AS decryption cert -&amp;gt; this is not gonna work. You need to either configure a CA certificate or use inbound decryption if you are only talking about one or a few servers.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 07:50:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231580#M66491</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-20T07:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231589#M66499</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/479"&gt;@pivvre&lt;/a&gt;&lt;/P&gt;&lt;P&gt;ok maybe i dont get it. you talking about outbound decryption, but between two internal zones?&lt;/P&gt;&lt;P&gt;can you tell me where is the wildcard certificate installed? on the server you which to connect to, right?&lt;/P&gt;&lt;P&gt;if so, this normally could be possible to decrypt if:&lt;/P&gt;&lt;P&gt;- you have an ca certifiacte installed and checked it under certificates as your trusted forward certificate (as vsys_remo mentioned)&lt;/P&gt;&lt;P&gt;- you have an adequate decprytion rule for your "outbound" connection, where "outbound" means from one zone to the other&lt;/P&gt;&lt;P&gt;- the server is using a protocol (no proprietary encryption) and cipher suite which is supported by your PANOS Version&lt;BR /&gt;(&lt;A href="https://www.paloaltonetworks.com/documentation/global/compatibility-matrix/supported-cipher-suites" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/global/compatibility-matrix/supported-cipher-suites&lt;/A&gt;)&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 09:28:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/231589#M66499</guid>
      <dc:creator>markus_w</dc:creator>
      <dc:date>2018-09-20T09:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233153#M66875</link>
      <description>&lt;P&gt;Sorry guys - I gave an wrong answer earlier on, this is for inbound sessjons, not outbound...&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 07:41:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233153#M66875</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2018-10-01T07:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233158#M66877</link>
      <description>&lt;P&gt;Ahhh, ok. For inbound i think it will work. I can check it on a Lab Unit the next days if you want?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 08:10:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233158#M66877</guid>
      <dc:creator>markus_w</dc:creator>
      <dc:date>2018-10-01T08:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233169#M66880</link>
      <description>&lt;P&gt;Problem is - we can't make it work....&amp;nbsp;&lt;BR /&gt;So if anyone have a better description than the whitepaper, that would be a good start for me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 09:15:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233169#M66880</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2018-10-01T09:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233172#M66883</link>
      <description>&lt;P&gt;And you are sure, that your server didn't use any unsupported ciphers??&lt;/P&gt;&lt;P&gt;Check it here: &lt;A href="https://www.paloaltonetworks.com/documentation/global/compatibility-matrix/supported-cipher-suites" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/global/compatibility-matrix/supported-cipher-suites&lt;/A&gt;&lt;/P&gt;&lt;P&gt;And check it on your servers or the best way is to take a packet&amp;nbsp;capture and analyse the ssl handshake to see if there are any unsupported ciphers in use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For a quick check use the global counters. Here is an article that maybe help:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cle3CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cle3CAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 10:21:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233172#M66883</guid>
      <dc:creator>markus_w</dc:creator>
      <dc:date>2018-10-01T10:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption with Wildcard SSL-certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233250#M66901</link>
      <description>&lt;P&gt;"Problem is - we can't make it work...."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can supply any more details than that, it would be very helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What isn't working?&lt;/P&gt;&lt;P&gt;Can you not assign the certificate to the decryption rule?&lt;/P&gt;&lt;P&gt;Did you import the private key when you imported your wildcard?&lt;/P&gt;&lt;P&gt;Does everything appear correctly but the traffic just isn't decrypted?&lt;/P&gt;&lt;P&gt;What PAN-OS version are you using?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some more details will help people trying to assist. The answers to the questions above can help narrow down where to help you troubleshoot.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 22:45:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-with-wildcard-ssl-certificate/m-p/233250#M66901</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2018-10-01T22:45:44Z</dc:date>
    </item>
  </channel>
</rss>

