<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA-VM not recognizing SSL and denying traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248021#M70560</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What about not ssl decrypting the forcepoint traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Jan 2019 18:16:58 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-01-29T18:16:58Z</dc:date>
    <item>
      <title>PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247518#M70416</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are implementing SSL Decryption to PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of this forcepoint agent (that is installed on theworkstation), the return traffic from the Internet (ie: facebook.com, etc) will be denied by the firewall as the SSL certificate has been changed by forcepoint and it is considered untrusted by the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any recommendation for this kind of setup?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 03:42:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247518#M70416</guid>
      <dc:creator>FarzanaMustafa</dc:creator>
      <dc:date>2019-01-25T03:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247576#M70426</link>
      <description>&lt;P&gt;Is the forcepoint&amp;nbsp;certificate selfsigned?&lt;/P&gt;
&lt;P&gt;you could generate a certificate from the same rootCA as the one you're using for decryption&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 12:53:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247576#M70426</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-25T12:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247612#M70444</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also if you are using Applications to identify traffic, you will need to specify the 'Services/Ports' as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i.e.&lt;/P&gt;&lt;P&gt;ssl is port 443 and web-browsing is port 80. With ssl decryption enabled, you will now see web-browsing traffic over port 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you now have to adjust some of your policies as follows:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 531px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18456iE7EB095212EB26B1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check the logs and see whay the traffic is getting blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 17:56:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247612#M70444</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-01-25T17:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247630#M70456</link>
      <description>&lt;P&gt;To make it work, just take the CA certificate that your forcepoint system is using to create the certs for users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device tab &amp;gt; Certificate Management &amp;gt; Certificates &amp;gt; Import. Select the forcepoint CA's public key. Once that's done, click the cert name in the UI and click the "Trusted Root CA" checkbox. Hit ok, then commit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall should trust any future connections from that cert.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 19:42:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247630#M70456</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-01-25T19:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247906#M70534</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the responses.&amp;nbsp;We have been talking to Forcepoint regarding this. IF it is possible then the problem solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is whether forcepoint will allow for installation of SSL cert. If that’s not possible what solution do we have?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another solution is to bypass certain URL from using forcepoint. This is possible from Forcepoint perspective as it allows you to bypass certain URL (using domain name and wildcards).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, this is not ideal solution.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 02:47:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/247906#M70534</guid>
      <dc:creator>FarzanaMustafa</dc:creator>
      <dc:date>2019-01-29T02:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248021#M70560</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What about not ssl decrypting the forcepoint traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 18:16:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248021#M70560</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-01-29T18:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248053#M70565</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We implemented SSL decryption to certain URL category. It didn’t work due to the workstation has forcepoint agent.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We tried the same to workstation that has no forcepoint agent and SSL decryption work fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If there’s forcepoint agent, forcepoint will intercept the traffic and perform its own encryption and then contact forcepoint cloud service to perform URL Filtering anf malware scanning before passing the traffic to destination.&lt;/P&gt;&lt;P&gt;The return traffic follows the same path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In summary, firewall could not perform SSL Decryption due to it thought the client didn’t have SSL certificate.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 21:31:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248053#M70565</guid>
      <dc:creator>FarzanaMustafa</dc:creator>
      <dc:date>2019-01-29T21:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM not recognizing SSL and denying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248077#M70570</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Closing this thread, as TAC has suggested a workaround for the time being...i.e. disable&amp;nbsp;&lt;SPAN&gt;"block session with untrusted issuers "&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;in decryption profile. FW will not deny the traffic even if we don't trust forcepoint CA and forward certificate to client.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jan 2019 02:43:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-not-recognizing-ssl-and-denying-traffic/m-p/248077#M70570</guid>
      <dc:creator>FarzanaMustafa</dc:creator>
      <dc:date>2019-01-30T02:43:46Z</dc:date>
    </item>
  </channel>
</rss>

