<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption and Application Default in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9594#M7028</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Now the simplest workaround is to create a policy to allow web-browsing over port 80 and 443.&lt;/P&gt;&lt;P&gt;That should help.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jones&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Oct 2011 05:30:11 GMT</pubDate>
    <dc:creator>jleung</dc:creator>
    <dc:date>2011-10-17T05:30:11Z</dc:date>
    <item>
      <title>SSL Decryption and Application Default</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9592#M7026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Best practice for building security policy is.&amp;nbsp; For allow traffic always define the service as application-default, that way you only create session for applications on there default port and only perform application ID for those session this reducing the load on the unit from both a session and application id perspective.&lt;/P&gt;&lt;P&gt;This works great, untill you switch on SSL decryption.&amp;nbsp; At these point all your traffic starts failing as the traffic is now not on the default port of the application but more than likely on port 443.&amp;nbsp; So far the only solution to this problem is to change all the services to all, which increases the session count and increases the load on the app id processor.&lt;/P&gt;&lt;P&gt;What is the solution to this problem?&amp;nbsp; I feel this problem can only be resolved by one of two ways.&lt;/P&gt;&lt;P&gt;1. Set all applications default ports to include 443&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;2. Allow the ability to define application default and additional services in the service column.&lt;/P&gt;&lt;P&gt;Can someone please advise, is there a feature request for this feature, without it I don't see the SSL decryption functionality to be much more than a tick in the box rather than a feasible solution to larger deployments?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 18:25:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9592#M7026</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-10-12T18:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption and Application Default</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9593#M7027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With ssl-d enabled, apps with default port of 80 running through the ssl tunnel will not match the app-default for service. Web-Browsing on app-default allowed and ssl on app-default allowed, PAN device will not allow web-browsing over ssl that has been decrypted. You'll need to explicitly allow web-browsing on 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Renato&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Oct 2011 00:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9593#M7027</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-10-17T00:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption and Application Default</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9594#M7028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Now the simplest workaround is to create a policy to allow web-browsing over port 80 and 443.&lt;/P&gt;&lt;P&gt;That should help.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jones&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Oct 2011 05:30:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-application-default/m-p/9594#M7028</guid>
      <dc:creator>jleung</dc:creator>
      <dc:date>2011-10-17T05:30:11Z</dc:date>
    </item>
  </channel>
</rss>

