<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo alto HTTPS decryption? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238186#M68223</link>
    <description>&lt;P&gt;Not that I'm aware of.&amp;nbsp; If these are non-AD-joined, you probably won't have User-ID learned.&amp;nbsp; If your AD computers are in User-ID OK, you could potentially use a custom captive portal to indicate you need to trust a certificate...but I'd usually plan on captive portals over SSL too, so I'm not certain that will help unless you get a publicly trusted certificate issued for the captive portal, just to point them to a page where they can install/trust your CA certificate (which feels a little kludgy to me, but maybe could work in your situation.)&lt;/P&gt;&lt;P&gt;I don't know of an elegant way to distribute the certificates from within the Palo Alto framework.&amp;nbsp; I'm used to distributing those through other means of endpoint management.&amp;nbsp; Even in Windows AD-joined environments, you still need system endpoint management to get certain browsers (e.g. Firefox) or the keystores for Java JRE's to trust your CA.&amp;nbsp; The firewall is not the best approach to do this distribution, IMHO.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Nov 2018 13:08:04 GMT</pubDate>
    <dc:creator>JW6224</dc:creator>
    <dc:date>2018-11-01T13:08:04Z</dc:date>
    <item>
      <title>Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238135#M68211</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using PA-850. I configure to decrypt HTTPS, and use AD group policy to install certificates on client, it works well with AD users. but we have other situation that client is not AD users. do we have any ways to redirect client to the URL if client is not trusted certificates with firewall? then they must install the certificate if they want to install the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 01:56:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238135#M68211</guid>
      <dc:creator>Chivas</dc:creator>
      <dc:date>2018-11-01T01:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238186#M68223</link>
      <description>&lt;P&gt;Not that I'm aware of.&amp;nbsp; If these are non-AD-joined, you probably won't have User-ID learned.&amp;nbsp; If your AD computers are in User-ID OK, you could potentially use a custom captive portal to indicate you need to trust a certificate...but I'd usually plan on captive portals over SSL too, so I'm not certain that will help unless you get a publicly trusted certificate issued for the captive portal, just to point them to a page where they can install/trust your CA certificate (which feels a little kludgy to me, but maybe could work in your situation.)&lt;/P&gt;&lt;P&gt;I don't know of an elegant way to distribute the certificates from within the Palo Alto framework.&amp;nbsp; I'm used to distributing those through other means of endpoint management.&amp;nbsp; Even in Windows AD-joined environments, you still need system endpoint management to get certain browsers (e.g. Firefox) or the keystores for Java JRE's to trust your CA.&amp;nbsp; The firewall is not the best approach to do this distribution, IMHO.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 13:08:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238186#M68223</guid>
      <dc:creator>JW6224</dc:creator>
      <dc:date>2018-11-01T13:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238195#M68225</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no simple solution to this issuer.&lt;/P&gt;&lt;P&gt;The first thing you should consider is not having 3rd party computers on your trusted&amp;nbsp;network. Typically machines that are not part of your domain are not corporate assets and should be restricted to a guest network, and the guest network will not have SSL decrytion. If this 3rd party needs access to an internal resource, there are VDI solutions from companies like Citrix and vmware. So the 3rd party would connect to the guest network, then access a VDI which has all the certificates and access they would need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are also onboarding technologies that can push a trusted root certificate to a machine that is not part of the domain.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also look at a NAC solution that will determine if the machine is a corporate asset or not. If it is a corporate asset, it gets put into vlan X and SSL decryption applies to vlan X. If not a coporate asset, it gets put into vlan Y which doesn't have ssl decryption.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 13:29:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238195#M68225</guid>
      <dc:creator>mrzepa2</dc:creator>
      <dc:date>2018-11-01T13:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238306#M68258</link>
      <description>&lt;P&gt;Hi Mrzepa2,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured one VLAN for guest that client is non-AD-users. and configured without SSL decryption for that VLAN, then client could go internet without SSL errors. but if we do like that, we couldnot monitor if client go to https website.&amp;nbsp; so we are thinking about the other soluction for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you please give me some more information about "&lt;SPAN&gt;There are also onboarding technologies that can push a trusted root certificate to a machine that is not part of the domain."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 06:50:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238306#M68258</guid>
      <dc:creator>Chivas</dc:creator>
      <dc:date>2018-11-02T06:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238307#M68259</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97490"&gt;@Chivas&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi Mrzepa2,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we couldnot monitor if client go to https website.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Are you talking here about antivirus/vulnerability scanning or would URL filtering be enough? If URL filtering is enough, then URL filtering is still possible without decryption based on the domainname.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 07:22:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238307#M68259</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-02T07:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238308#M68260</link>
      <description>&lt;P&gt;yes, I am talking about virus, malware,.. if the client download the file from https, then palo alto could not detect it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 07:33:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238308#M68260</guid>
      <dc:creator>Chivas</dc:creator>
      <dc:date>2018-11-02T07:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto HTTPS decryption?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238413#M68301</link>
      <description>&lt;P&gt;Chivas,&lt;/P&gt;&lt;P&gt;You may want to look into producrts like ForeScout's CounterAct or Aruba Clearpass to deal with 3rd party machines. These are both NAC solutions so they are going to be a lot more involved to set up. But I still say the best solution is to not allow 3rd party machines onto your internal network for the exact reason you are giving. Besides the SSL decryption issue, how do you know they have malware protection installed? Or how do you know if their system is properly patched? The best solution is to isolate them into a guest security zone, and then you don't have to worry about SSL decryption for 3rd party devices.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 19:48:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-https-decryption/m-p/238413#M68301</guid>
      <dc:creator>mrzepa2</dc:creator>
      <dc:date>2018-11-02T19:48:28Z</dc:date>
    </item>
  </channel>
</rss>

