<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Performance Degradation for SSL Decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238106#M68204</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wanted to let you know that PA TAC team has asisted us in resolving the issue.&lt;/P&gt;&lt;P&gt;Browsing speed is now back to normal.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Device &amp;gt;Session&amp;gt; Decryption Settings, select Certificate Revocation Checking&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Uncheck CRL and OCSP.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Commit.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Oct 2018 22:51:12 GMT</pubDate>
    <dc:creator>FarzanaMustafa</dc:creator>
    <dc:date>2018-10-31T22:51:12Z</dc:date>
    <item>
      <title>Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232357#M66656</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The issues we are experiencing are with SSL decrypt. When this setting is enabled we are experiencing significantly degraded internet performance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We understand that this would have an overhead but the current overhead makes it almost unusable. The symptoms are worse on pages such as youtube.com due to the ads.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have tested with SSL decrypt disabled and performance is as expected however as soon SSL decrypt is enabled an significant performance decrease is notice.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the hope to resolve we have tested on the following versions however the issue is present on both versions.&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Reproduced issue on PAN-OS 7.1.8&lt;/LI&gt;&lt;LI&gt;Reproduced issue on PAN-OS 8.0.12&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Any advice would be appreciated.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 23:48:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232357#M66656</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2018-09-25T23:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232375#M66659</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45418"&gt;@Farzana&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;What is the device utilization when you're seeing this and what platform are you doing this on. The only time I've really seen issues with enabling decryption like what you're seeing is when the firewall is hitting its limits with the additional overhead of SSL Decryption being enabled.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 03:02:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232375#M66659</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-26T03:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232412#M66665</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45418"&gt;@Farzana&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a follow up to&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;'s message, you can use the command "&lt;SPAN&gt;show session all filter ssl-decrypt yes count yes" to see the number of current decrypted sessions and compare this with your firewall models maximum value. In combination to this, you should use the command "show running resource-monitor" to monitor the dataplane utilization if you notice "func_ssl_proxy_proc" hogging all the CPU, decryption may be maxing out your box and you would either need to limit what you're decrypting if you want to continue using your current hardware - or otherwise consider an upgrade.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Luke.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 09:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232412#M66665</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-09-26T09:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232507#M66686</link>
      <description>&lt;P&gt;Try disabling "ECDHE" in your decryption profile for your decryption policy, or figure out how you can streamline your decryption policy. You will lose Perfect Forward Secrecy ability though.&amp;nbsp; Like a few other have indicated you are probably pushing the limit on you r platforms decrypt seesions.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 18:44:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/232507#M66686</guid>
      <dc:creator>aayoung</dc:creator>
      <dc:date>2018-09-26T18:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/233517#M66952</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using PA-3060 and decrpyting most traffic due to network requirement. I ran the commands as you suggested but could not locate func_ssl-proxy_proc. When ran the command&amp;nbsp;&amp;gt; show counter global filter packet-filter yes delta yes&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is what we see below. Any idea if SSL decryption is causing the performance issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;st in ssl proxy&lt;BR /&gt;proxy_url_category_unknown 10 0 info proxy pktproc Number of sessions checked by proxy with unknown url category&lt;BR /&gt;proxy_wait_pkt_drop 1088 3 drop proxy pktproc The number of packets get dropped because of waiting status in ssl proxy&lt;BR /&gt;proxy_l2hdr_extended 28322 100 info proxy pktproc Layer 2 header extended than original length&lt;BR /&gt;ssl_cert_cache_miss 9 0 info ssl pktproc Number of SSL certificate cache miss&lt;BR /&gt;ssl_cert_verify 39 0 info ssl pktproc Number of SSL certificates that need to do verify&lt;BR /&gt;ssl_rsa_key_cache_hit 9 0 info ssl pktproc Number of SSL RSA key cache hit&lt;BR /&gt;ssl_client_sess_ticket 55 0 info ssl pktproc Number of ssl session with client sess ticket ext&lt;BR /&gt;ssl_extended_master_secret 5 0 info ssl pktproc Number of ssl session created using extended master extension&lt;BR /&gt;url_db_request 13 0 info url pktproc Number of URL database request&lt;BR /&gt;zip_process 21 0 info zip resource The outstanding zip processes&lt;BR /&gt;zip_process_total 21 0 info zip pktproc The total number of zip engine decompress process&lt;BR /&gt;zip_process_stop 4 0 info zip pktproc The number of zip decompress process stops lack of output buffer&lt;BR /&gt;zip_hw_in 84805 300 info zip pktproc The total input data size to hardware zip engine&lt;BR /&gt;zip_hw_out 276073 976 info zip pktproc The total output data size from hardware zip engine&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 05:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/233517#M66952</guid>
      <dc:creator>FarzanaMustafa</dc:creator>
      <dc:date>2018-10-03T05:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/233524#M66954</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98673"&gt;@FarzanaMustafa&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies for the confusion. The&amp;nbsp;&lt;SPAN&gt;ssl_proxy_proc counters I was referring to can be found in the dp-monitor log. (less dp-log dp-monitor.log)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you then have any access to any resources such as PANTS or AutoAssistant then you can correlate these counters to build graphs and compare this to the timestamps of when you notice your issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 08:28:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/233524#M66954</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-03T08:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/233734#M67007</link>
      <description>&lt;P&gt;What is your Internet circuit or the BW you're trying to push through the FW?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How many current sessions is the 3060 processing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you estimate how many of these sessions are SSL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How much of the total throughput is SSL traffic?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 17:54:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/233734#M67007</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-10-03T17:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238106#M68204</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wanted to let you know that PA TAC team has asisted us in resolving the issue.&lt;/P&gt;&lt;P&gt;Browsing speed is now back to normal.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Device &amp;gt;Session&amp;gt; Decryption Settings, select Certificate Revocation Checking&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Uncheck CRL and OCSP.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Commit.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 22:51:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238106#M68204</guid>
      <dc:creator>FarzanaMustafa</dc:creator>
      <dc:date>2018-10-31T22:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238181#M68221</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98673"&gt;@FarzanaMustafa&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interesting, glad you got to the bottom of it; although I believe these options are in fact&amp;nbsp;unchecked by default.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 10:17:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238181#M68221</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-11-01T10:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238212#M68234</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;&amp;nbsp;is right, these options are unchecked by default but are recommended to check for a secure tls proxy configurarion:&lt;A href="https://www.paloaltonetworks.com/documentation/80/best-practices/best-practices-decryption/decryption-best-practices/follow-deployment-decryption-best-practices" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/best-practices/best-practices-decryption/decryption-best-practices/follow-deployment-decryption-best-practices&lt;/A&gt; (and Paloalto also recommends to be careful with them as they will have a performance impact). But because of the (really) extreme performance degradation primarily the OCSP option is usless - unless you can live with unhappy users and a lot of complaints of them...&lt;/P&gt;&lt;P&gt;Only with the CRL option the performance is good, thats why we are only using this. Without any of them you accept the risk that users connect to websites with revoked certificates (for example if a cert is stolen and used by attackers even after the actual owner revoked the stolen cert)&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 15:10:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238212#M68234</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-01T15:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238272#M68248</link>
      <description>&lt;P&gt;i also checked my PA agree it is uncheck by default.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 22:21:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238272#M68248</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-11-01T22:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238273#M68249</link>
      <description>&lt;P&gt;Also can you please confirm if we can enable the&amp;nbsp;&lt;SPAN&gt;e CRL option and will have no impact on the performance?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 22:24:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238273#M68249</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-11-01T22:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238380#M68290</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Enabling either the CRL or OCSP options to check certificate status&amp;nbsp;&lt;EM&gt;will&lt;/EM&gt; have an effect on performance. CRL is much easier on the firewall and has a minimal impact, most people can enable this without a huge performance impact; while OCSP has a pretty massive performance hit and would really only be recommended if you need it for regulatory&amp;nbsp;reasons.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 17:11:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238380#M68290</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-02T17:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238382#M68292</link>
      <description>&lt;P&gt;Thanks for confirming that.&lt;/P&gt;&lt;P&gt;Good to learn from you&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 17:45:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/238382#M68292</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-11-02T17:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Performance Degradation for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/463621#M102394</link>
      <description>&lt;P&gt;I read the entire thread. I wanted to fact the VM size, considering this as design principal that, SSL decryption consume high CPU, is there any SSL decryption sessions Vs throughput which could help to choose VM size(however due to this flexi consumption no more VM 3/5/700 but wanted to factor with rough estimate)&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Feb 2022 14:47:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/performance-degradation-for-ssl-decryption/m-p/463621#M102394</guid>
      <dc:creator>Ramakrishnan</dc:creator>
      <dc:date>2022-02-05T14:47:07Z</dc:date>
    </item>
  </channel>
</rss>

