<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248901#M70806</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We went ahead and did a packet capture on the server.&amp;nbsp; I'm not seeing any communication between it and the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see the following, all between my desktop and the server:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Initial SYN from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from server&lt;/LI&gt;&lt;LI&gt;Client Hello on TLSv1.2 from my desktop&lt;/LI&gt;&lt;LI&gt;Server Hello, Certificate, Certificate Status, Server Key Exchange, Server Hello Done from server&lt;/LI&gt;&lt;LI&gt;RST, ACK from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from my desktop&lt;/LI&gt;&lt;LI&gt;TCP Retransmission from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from server&lt;/LI&gt;&lt;LI&gt;RST, ACK from desktop&lt;/LI&gt;&lt;LI&gt;RST, ACK from server&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Tue, 05 Feb 2019 17:41:24 GMT</pubDate>
    <dc:creator>jsalmans</dc:creator>
    <dc:date>2019-02-05T17:41:24Z</dc:date>
    <item>
      <title>Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248768#M70762</link>
      <description>&lt;P&gt;Greetings all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I feel like I'm probably missing something simple here, but I'm running into a decrypt-error issue on 8.1.3 in regards to a server that is negotiating DHE or ECDHE ciphers with the client.&amp;nbsp; On Chrome I get:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ERR_SSL_VERSION_OR_CIPHER_MISMATCH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And on Firefox I get:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SSL_ERROR_NO_CYPHER_OVERLAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I turn off decryption for this or set it to RSA only, the traffic goes through (albeit not decrypted) so the client and server do indeed have shared ciphers they can negotiate to.&amp;nbsp; A packet capture from my machine and an SSL Labs scan of the server seems to back this up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know DHE and ECDHE wasn't supported on Inbound Decryption before but the warning is no longer on the configuration GUI and I see newer documentation that it has been supported since an 8.0 version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas on what I might be doing wrong or how I should proceed with troubleshooting?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 18:31:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248768#M70762</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-04T18:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248791#M70765</link>
      <description>&lt;P&gt;The Firefox error is better in terms of what it's saying: no cipher overlap.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When your client sends the Client Hello, it will specify some number of cipher suites that it supports. When the server (your firewall in this case) gets that list, it tries to match with the highest security cipher in that list. But if the firewall doesn't have any that match the client's list, you will get the error that you got.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check a&amp;nbsp;few things:&lt;/P&gt;&lt;P&gt;1. Your decryption profile on the firewall should include at least one cipher that the client is sending. Go to Objects &amp;gt; Decryption &amp;gt; Decryption Profile and hit the SSL Protocol Settings on the profile you use in your decrypt rule for this traffic.&lt;/P&gt;&lt;P&gt;2. While you're there, make sure that the "Protocol Versions" is set with the max version of "Max". Chrome has recently stopped supporting TLS 1.0, and others (Firefox, Edge, Opera, Safari, etc.) may have as well or will be soon), so if you're maxing that out at TLS 1.0 or 1.1, you'll be out of luck for most browsers.&lt;/P&gt;&lt;P&gt;3. Make sure that your browsers are configured to send all the DHE and ECDHE ciphers it should, and that they haven't been artificially limited by some setting on your end.&lt;/P&gt;&lt;P&gt;4. Run a TLS check (&lt;A href="https://www.ssllabs.com/ssltest" target="_blank"&gt;Qualys&lt;/A&gt;&amp;nbsp;has a popular one for free) to see what you're supporting if the site is publicly accessible.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 18:58:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248791#M70765</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-04T18:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248799#M70769</link>
      <description>&lt;P&gt;Very good Explanation.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 20:16:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248799#M70769</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-02-04T20:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248850#M70775</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I believe I've done that.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18601iD3B794D6176DF2F8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="firewall.png" alt="firewall.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;I've tried this as Max and also setting TLS 1.2 as the max.&lt;/LI&gt;&lt;LI&gt;As far as I know, Firefox and Chrome are both using whatever the defaults are.&amp;nbsp; If I turn off decryption, I can see it negotiating successfully with the server wiht an ECDHS cipher.&amp;nbsp; Here is what the packet capture is seeing my client offer.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="client.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18602i67011ACB86B1584B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="client.png" alt="client.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Here is the SSL Labs results for TLS 1.2:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="server.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18603i4D4D4302DA34A5F9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="server.png" alt="server.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 02:59:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248850#M70775</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-05T02:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248879#M70792</link>
      <description>&lt;P&gt;This is as far as I understand it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For decrypting inbound connections whereby RSA is used, the firewall doesn't have to proxy the connection since it has the private key, it can decrypt the traffic on the fly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For DHE and ECDHE traffic, since there is a new public/private key pair for each session the firewall cannot simply decrypt the traffic as it passes through, it instead needs to proxy with the server. Perhaps if you do a packet capture on the server side of things you should see traffic from there to the firewall with the SSL handshake failing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Luke.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 13:43:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248879#M70792</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-02-05T13:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248900#M70805</link>
      <description>&lt;P&gt;Thanks for providing the screenshots!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With that data, it looks like it should work without issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Decryption was enabled when you did the Qualys scan right?If no, you'll need to re-enable it and re-run it to ensure it still matches. If decryption was enabled when you ran it, my next recommendation would actually be to open a support case unless you're comfortable posting the details here.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 17:39:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248900#M70805</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-05T17:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248901#M70806</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We went ahead and did a packet capture on the server.&amp;nbsp; I'm not seeing any communication between it and the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see the following, all between my desktop and the server:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Initial SYN from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from server&lt;/LI&gt;&lt;LI&gt;Client Hello on TLSv1.2 from my desktop&lt;/LI&gt;&lt;LI&gt;Server Hello, Certificate, Certificate Status, Server Key Exchange, Server Hello Done from server&lt;/LI&gt;&lt;LI&gt;RST, ACK from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from my desktop&lt;/LI&gt;&lt;LI&gt;TCP Retransmission from my desktop&lt;/LI&gt;&lt;LI&gt;ACK from server&lt;/LI&gt;&lt;LI&gt;RST, ACK from desktop&lt;/LI&gt;&lt;LI&gt;RST, ACK from server&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 05 Feb 2019 17:41:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248901#M70806</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-05T17:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248902#M70807</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I only have decryption enabled between my client and the server right now.&amp;nbsp; The scan from SSL Labs would have not gone through any decryption process on the firewall.&amp;nbsp; I wasn't sure if the scan would work since my browsers don't seem to get very far into the process when it is enabled and I didn't want to break anything for Internet traffic hitting the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll see if I can find an IP range they use so I can enable it just for that traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 17:43:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248902#M70807</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-05T17:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248908#M70810</link>
      <description>&lt;P&gt;&amp;gt; I'm not seeing any communication between it and the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you've got decryption enabled between your desktop and the server, then those packets should be the firewall. The IP will still be the client's public IP unless you're doing source NAT for that traffic to the server. I filled in what the bits I think are most relevant to the flow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; SYN --&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;lt;-- SYN,ACK&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; ACK --&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; Client Hello --&amp;gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;lt;-- ACK&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;lt;-- Server Hello (+cert, etc.)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; RST/ACK --&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most likely that is actually from the firewall, and the RST you're seeing is because the firewall is denying the traffic based on Server Hello. The most common reasons I see when it happens at the Server Hello are a URL category block or&amp;nbsp;an aggressive&amp;nbsp;narrowly-defined application policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also check your session on the firewall to see the state when that RST happens. Assuming the client IP is 192.0.2.1, trigger the reset then in CLI:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; show session all filter source 192.0.2.1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you see the session that matches your client it should be in DISCARD state. Then, take the session ID and do:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; show session id 12345678&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That should show you more details for the reason.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 18:00:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248908#M70810</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-05T18:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248910#M70811</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my session output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Session&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 35433597&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c2s flow:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desktop IP [CampusCore]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server IP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proto:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 64022&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DISCARD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FLOW&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src user:&amp;nbsp;&amp;nbsp; jsalmans&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst user:&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; offload:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Yes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ecmp id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8001&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s2c flow:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server IP [DataCenter]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desktop IP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proto:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 64022&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DISCARD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FLOW&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src user:&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst user:&amp;nbsp;&amp;nbsp;&amp;nbsp; jsalmans&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; offload:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Yes&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Slot&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; index(local):&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1879165&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; start time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Tue Feb&amp;nbsp; 5 12:03:56 2019&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 90 sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; time to live&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 28 sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; total byte count(c2s)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1797&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; total byte count(s2c)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 5445&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; layer7 packet count(c2s)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; layer7 packet count(s2c)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 7&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vsys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : vsys1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : ssl&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Allow Dept Anywhere&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service timeout override(index)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session to be logged at end&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : True&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session in session ager&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : True&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session updated by HA peer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; layer7 processing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL filtering enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : True&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL category&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : educational-institutions&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session via syn-cookies&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session terminated on host&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session traverses tunnel&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; captive portal session&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ingress interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : ae1.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; egress interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : ae1.4001&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session QoS rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : N/A (class 4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tracker stage firewall&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : proxy decrypt failure&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; end-reason&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : decrypt-error&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 18:08:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248910#M70811</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-05T18:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248915#M70812</link>
      <description>&lt;P&gt;I found the SSL Labs IP range.&amp;nbsp; Some of the traffic does appear to be decrypted while some of it hits a decrypt-error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also see "This server's certificate chain is incomplete. Grade capped to B. "&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssllabs1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18609i68F334B2CAC9B81C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ssllabs1.png" alt="ssllabs1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssllabs2.png" style="width: 521px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18611iC87E7BE83D9F3BC5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ssllabs2.png" alt="ssllabs2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the current decryption profile for reference&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="object.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18612i5B848F35430CF302/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="object.png" alt="object.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 18:10:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248915#M70812</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-05T18:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248922#M70813</link>
      <description>&lt;P&gt;The chain warning just means that the server (firewall in this case) isn't sending the intermediate CAs. It's not usually a problem and will not cause the issue you're seeing, but also has a way to totally eliminate it. Here's an article I wrote that goes into the details:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClkoCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClkoCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the handshake_failure warnings seen, those are the real problem. That the Qualys scan shows it failing Chrome 69 and 70 echoes what you see.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can tell you that the firewall is the one causing this, but whether it's configuration or something else would probably need to be investigated further using the firewall logs and some debugs. I won't suggest that here, it's too dangerous to do unless you're very familiar with the debugging process for proxy-based decryption.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would recommend opening a support ticket, and would suggest pointing the engineer who gets your ticket to this thread as well.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 18:26:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248922#M70813</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-05T18:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248924#M70815</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;not sure how I missed that with the Intermediary cert but thanks!&amp;nbsp; I had it uploaded for on Panorama but not in the Device Group that pushed to the firewall... I added it and it immediately changed the Wildcard to be a sub-cert.&amp;nbsp; I did another scan and it hows correct now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm opening a TAC case for the SSL decryption issue and I'll reply again when I have a solution in case someone else runs into this as well.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 18:59:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/248924#M70815</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-05T18:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/249973#M71093</link>
      <description>&lt;P&gt;So an update.. it was determined the server and client are trying to use X25519 which is an ECDHE curve that Palo Alto doesn't support (definitely would be nice to see this as a note on the supported ciphers page... TLSv1.3 uses it as a standard and I know that isn't supported yet but TLSv1.2 uses it as well).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The workaround is to disable ECDHE but that doesn't seem like a great call given that we're talking about lowering server security to apply SSL Decryption for additional server security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this for Windows Server 2016 and it seems to work:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nsgp.net/2018/09/how-to-disable-curve25519-x25519-key-exchange-on-windows-server-2016/" target="_blank"&gt;https://www.nsgp.net/2018/09/how-to-disable-curve25519-x25519-key-exchange-on-windows-server-2016/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for similar instructions for Apache and Tomcat.&amp;nbsp; I'm not a server expert and I'm having trouble finding methods to do this on those platforms.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 16:24:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/249973#M71093</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-02-13T16:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/250002#M71108</link>
      <description>&lt;P&gt;With my (limited) Apache knowledge, you don't strictly exclude specific curves but rather include only the ones you want. You would put a line in your httpd.conf (or apache.conf, or whatever your site uses). It will probably wrap when I post this, but it will all be on one line. I stole this from &lt;A href="https://www.apachelounge.com/viewtopic.php?p=35784" target="_blank"&gt;Apache Lounge&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;SSLOpenSSLConfCmd Curves sect571r1:sect571k1:secp521r1:sect409k1:sect409r1:secp384r1:sect283k1:sect2...&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also use the &lt;FONT face="courier new,courier"&gt;SSLCipherSuite&lt;/FONT&gt; directive to exclude entire suites as needed.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 18:47:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/250002#M71108</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-13T18:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/261959#M74238</link>
      <description>&lt;P&gt;Did you get any further? I am struggling with &amp;nbsp;similar issue and have been debugging for two days now getting further and further. In case of Apache I can say there seems to be a lot of requirements to get decryption &amp;nbsp;working on latest version 2.4.39 (which i haven't managed to get fully working yet)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 17:02:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/261959#M74238</guid>
      <dc:creator>benjamins</dc:creator>
      <dc:date>2019-05-22T17:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/301688#M78703</link>
      <description>&lt;P&gt;Very disappointing that I cannot use Palo for SSL inspection any more due to our load balancer AVI, is using OpenSSL v1.1.1 which defaults to&amp;nbsp;&lt;SPAN&gt;X25519 curve for ECDEH and DHE PFS ciphers using TLS1.2/1.1 so the only option I have is to use the&amp;nbsp;RSA-AES-256-GCM or CBC ciphers which then caps you SSL security rating to B vs A+ with ECDHE ciphers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Come on Palo, fix the issue and support the curve x25519, you need that curve for TLS1.3 support.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 18:07:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/301688#M78703</guid>
      <dc:creator>smc007</dc:creator>
      <dc:date>2019-12-02T18:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt-error with Inbound Decryption  DHE or ECDHE on 8.1.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/408800#M92387</link>
      <description>&lt;P&gt;You will need to feature request that...&lt;BR /&gt;For Apache and nginx this requires a specific configuration and order (actually x25519 does not seem to be needed for tls1.3 but rsa_pss signature algorithm is and that is also not supported for tls1.2) to work... but it does work!&lt;BR /&gt;So if you do feature request this with your SE, make sure you also request support for rsa_pss signature algorithm &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 20:02:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-error-with-inbound-decryption-dhe-or-ecdhe-on-8-1-3/m-p/408800#M92387</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2021-05-24T20:02:56Z</dc:date>
    </item>
  </channel>
</rss>

