<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249516#M70960</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So here's the thing with what you are asking, it breaks the app-id for anyone that isn't decrypting traffic. So say for example the app-id is updated to allow tcp/443 in addition to the standard of tcp/80, for anyone that isn't decrypting traffic seeing web-browsing on tcp/443 would be a concern.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of that, the guide for enabling SSL-Decryption specifically calls out the fact that you'll see web-browsing on tcp/443. As you have to actively enable SSL-Decryption, it makes sense to break things for people who are actively enabling a new feature versus breaking things for everybody else.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Feb 2019 21:08:01 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-02-08T21:08:01Z</dc:date>
    <item>
      <title>SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248679#M70735</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;Nowadays I am playing with a PA-VM (no license) and decryption policy. Basically there are many articles and that explain how Decryption policy works and how to set it up. I have checked and double checked my setting and I cannot make facebook.com for instance work when I enable the Decryption.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the rules:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Decryption Rules" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18577iD50652A6CE82A5B2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PaloForum-Decryption.JPG" alt="Decryption Rules" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Decryption Rules&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Security Rules" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18578i7B0B7BA61337A8DE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PaloForum-Security.JPG" alt="Security Rules" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Security Rules&lt;/span&gt;&lt;/span&gt;Can you guys see any mistake on my settings?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Danilo&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 11:17:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248679#M70735</guid>
      <dc:creator>DaniloBarbosa</dc:creator>
      <dc:date>2019-02-04T11:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248687#M70737</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76701"&gt;@DaniloBarbosa&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Am I missing something because I don't see you allowing the facebook app in your policy which is what you're trying to achieve in your example ... correct ? &amp;nbsp;I see you only allowing ssl and web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also your policy order seems incorrect as you have a block all rule in front of your allow ssl and web-browsing rule as far as I see it, preventing you from ever hitting your allow rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers !&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 11:40:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248687#M70737</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2019-02-04T11:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248804#M70770</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class="login-bold"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943" target="_self"&gt;kiwi&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="login-bold"&gt;Basically I was&amp;nbsp;using "User ID" before remove the users from&amp;nbsp;user tab and take a screen shot for this post. So the Rule number 3 was blocking Internet access for a specific user and the rule 4 was allowing access to everyone else inside the windows domain. I did remove the users but I forgot to disable rule 3. Check the new screen shot. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="login-bold"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule 3 disabled and rule 4 allowing HTTP and HTTPS" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18593i88E4E0D7769BF361/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PaloForum-Security02.JPG" alt="Rule 3 disabled and rule 4 allowing HTTP and HTTPS" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Rule 3 disabled and rule 4 allowing HTTP and HTTPS&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="login-bold"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="login-bold"&gt;Another think that I haven't explained. I am allowing full Internet access, but I want to see the Palo decrypting facebook page. So on the Decryption rule 1 (OUTBOUND) I am olny decrypting "social-networking" that included Facebook.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="login-bold"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Decryption Solical-networking" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18591i61A3549975658A46/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PaloForum-Decryption02.JPG" alt="Decryption Solical-networking" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Decryption Solical-networking&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="login-bold"&gt;The main goal here is just to see the PALO working as Man-in-the-middle, decrypting traffic between user and facebook page.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 20:24:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248804#M70770</guid>
      <dc:creator>DaniloBarbosa</dc:creator>
      <dc:date>2019-02-04T20:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248806#M70771</link>
      <description>&lt;P&gt;You will need to remove the "application-default" on that rule,&amp;nbsp;because once the SSL is stripped and the underlying application is seen, it's still on port 443 which is not in the list of default ports on 'web-browsing'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logic may seem odd, but it follows this flow:&lt;/P&gt;&lt;P&gt;1. Traffic is identified as SSL when the Client Hello is seen.&lt;/P&gt;&lt;P&gt;2. Decryption starts here, and when the TLS handshake is completed the app-id switches from "SSL" to "Web-browsing".&lt;/P&gt;&lt;P&gt;3. Because the app has changed, it is re-evaluated in security policy. Since the app is web-browsing, but it's not on port 80 as defined in the app, rule 4 will be skipped.&lt;/P&gt;&lt;P&gt;4. The application has no matching rules, so it falls to the Interzone-default which denies the rest of that session.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 20:35:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/248806#M70771</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-04T20:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249502#M70954</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76701"&gt;@DaniloBarbosa&lt;/a&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think they should release an application list update, which add working port 443 for web-browsing application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also notice that once you decrypt traffic on 443-SSL it becomes 443-web-browsing, so policy rule that allow web-browsing on application-default will not work, because the application-default is 80.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to create another policy to allow web-browsing application on 443 port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 19:22:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249502#M70954</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2019-02-08T19:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249516#M70960</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So here's the thing with what you are asking, it breaks the app-id for anyone that isn't decrypting traffic. So say for example the app-id is updated to allow tcp/443 in addition to the standard of tcp/80, for anyone that isn't decrypting traffic seeing web-browsing on tcp/443 would be a concern.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of that, the guide for enabling SSL-Decryption specifically calls out the fact that you'll see web-browsing on tcp/443. As you have to actively enable SSL-Decryption, it makes sense to break things for people who are actively enabling a new feature versus breaking things for everybody else.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 21:08:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249516#M70960</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-08T21:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249522#M70964</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for the users who decrypting the traffic, do we need to create custom application for web-browsing on 443?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because with the current situation I need to create another policy rule to allow web-browsing on 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think it will be better to create new application like: Secure web-browsing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 22:08:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249522#M70964</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2019-02-08T22:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249540#M70968</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That would be more of a personal preference. If you want to build out a new application signature and create a new app-id for identifying traffic you can certaintly do so; however, with that being said most environments would bypass that and simply allow web-browsing on tcp/443 via a seperate policy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Feb 2019 04:51:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249540#M70968</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-09T04:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249652#M70995</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did follow you advice and changes the service from "application-default" to "any" but it did not work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the Any on service tab for SSL and web-browsing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL with Any on service tab." style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18713i25A939A7CCDFC077/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="SSl with any.PNG" alt="SSL with Any on service tab." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;SSL with Any on service tab.&lt;/span&gt;&lt;/span&gt;Then, I enabled the rule 5 (any application) but service TCP/443. Facebook access allowed like picture below. The rule basically says, any application on port 443 (TCP) is allowed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HTTPS with TCP/443 service only." style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18714iC178F6C0DB20E194/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="HTTPS with serice.PNG" alt="HTTPS with TCP/443 service only." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;HTTPS with TCP/443 service only.&lt;/span&gt;&lt;/span&gt;Another interesting point, the decryption rule is enable and very simple, but the certificate that I am getting is from facebook.com not the self generated by the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Decryption rule" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18715iBCE397A037B4D42A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Decrytion Rule.PNG" alt="Decryption rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Decryption rule&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL certificate for decryption rule" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18718i958CBCC5F7CE40A1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Certificate.PNG" alt="SSL certificate for decryption rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;SSL certificate for decryption rule&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The decryption rule is not working because I should see the certificate from the firewall not from facebook. But let's not&amp;nbsp;discuss this issue now, let's go back to the SSL/HTTPS issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My goal is create a rule that allow HTTPS (application) on its default port (443) and protocol (TCP) only, any other application on tcp/443 will be blocked or if https on any port that is not 443 will be blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't want a generic rule allowing TCP on port 443, that would match any application.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Danilo&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 09:06:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249652#M70995</guid>
      <dc:creator>danilo.padula</dc:creator>
      <dc:date>2019-02-11T09:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249653#M70996</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I will try that. Maybe you gave me the answer and I didn't noticed...lol&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 09:07:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249653#M70996</guid>
      <dc:creator>danilo.padula</dc:creator>
      <dc:date>2019-02-11T09:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249655#M70997</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not yet SShnap, I cannot see what I am missing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you created an rule with application web-browsing and service-https that worked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="web-browsing with service-https" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18719iB31650845A599890/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="HTTPS with tcp-443.PNG" alt="web-browsing with service-https" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;web-browsing with service-https&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 09:20:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249655#M70997</guid>
      <dc:creator>danilo.padula</dc:creator>
      <dc:date>2019-02-11T09:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249712#M71008</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74769"&gt;@danilo.padula&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check the logs if the traffic is being decrypted,&lt;/P&gt;&lt;P&gt;Pay attention, for Facebook site palo alto identify the application as facebook-base that's why it being blocked, for Facebook site you should add facebook-base for allowing it.&lt;/P&gt;&lt;P&gt;See my attachment, regular sites that palo alto identifies applicaiton as web-browsing will be match to that policy rule, if the site uses other application you need to allow that specific application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18731i836703F7FE531795/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="firewall.jpg" alt="firewall.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 16:15:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249712#M71008</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2019-02-11T16:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249740#M71019</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's still being blocked because you're only allowing 'web-browsing' and 'ssl'. Facebook has a large number of unique app-id definitions depending on what you're doing. From &lt;A href="https://applipedia.paloaltonetworks.com/" target="_blank"&gt;Applipedia&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="facebook-apps.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18733iEBBDF10513362002/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="facebook-apps.png" alt="facebook-apps.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Start with a rule allowing all apps for yourself, then use the traffic log to see the list of apps seen by the firewall when you hit that rule. Then, you can create a more complete rule to allow only what you want.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 19:42:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249740#M71019</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-11T19:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249775#M71027</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I cannot chekc the logs because it is a VM without license. I am testing the solution before invest some money on it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2mCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2mCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 00:12:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249775#M71027</guid>
      <dc:creator>DaniloBarbosa</dc:creator>
      <dc:date>2019-02-12T00:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249776#M71028</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I thought the main facebook page would pass on the web-browsing rule (without login into facebook), then if I log in all the extra "Apps" would need another rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will give a try.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 00:13:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249776#M71028</guid>
      <dc:creator>DaniloBarbosa</dc:creator>
      <dc:date>2019-02-12T00:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249882#M71061</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;&amp;nbsp;wrote:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#339966"&gt;&amp;gt;&amp;nbsp;I think they should release an application list update, which add working port 443 for web-browsing application.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#339966"&gt;&amp;gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#339966"&gt;&amp;gt; I also notice that once you decrypt traffic on 443-SSL it becomes 443-web-browsing, so policy rule that allow web-browsing on application-default will not work, because the application-default is 80.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#339966"&gt;&amp;gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#339966"&gt;&amp;gt; You need to create another policy to allow web-browsing application on 443 port.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had to hold my tongue (well, fingers) because 9.0 hadn't been released yet, but now that it is available I can share this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/app-default-strict.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/app-default-strict.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, in PAN-OS 9.0, if an application has a known secure port like web-browsing, your app-based allow rule will work with application-default when decrypting. Currently the app list is&amp;nbsp;&lt;SPAN&gt;web-browsing, SMTP, FTP, LDAP, POP3, and IMAP. Palo Alto Networks can update that list as well via a content update.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 20:06:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249882#M71061</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-12T20:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249883#M71062</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&amp;nbsp;Do not hold your fingers. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Great news! Tks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 21:28:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249883#M71062</guid>
      <dc:creator>DaniloBarbosa</dc:creator>
      <dc:date>2019-02-12T21:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249894#M71067</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PANOS 9.0 will be great with this and policy optimization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 21:45:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249894#M71067</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2019-02-12T21:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249939#M71086</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76701"&gt;@DaniloBarbosa&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The web-browsing application is like last resort application. web-browsing will be used only if the firewall fail to match any other application, while the traffic contain HTTP protocol. See below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18772i55CA947C4588D086/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo Alto firewall will match facebook application even if the traffic is not decrypted (in my personal limited observations), so I am guessing it is using the SNI from the server certificate. Without decryption the firewall will may fail to match the more specfic facebook apps, but it still will know that it is facebook related.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same goes for google, dropbox, twitter and many more well known services that Palo Alto has create application for it.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 08:34:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption/m-p/249939#M71086</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-02-13T08:34:11Z</dc:date>
    </item>
  </channel>
</rss>

