<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is the PA-3020 adequate for SSL Decryption (and other features)? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254287#M72171</link>
    <description>&lt;P&gt;Looks like you had a little over 3GB of traffic...Now I'm not sure how much of that you'd actually decrypt...If you can try to find that number (would it match your proposed decryption policy).&amp;nbsp; Given how much other throughput is probably going through your appliance and everything else you'd want to do, it might be best not to decrypt SSL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That being said I think more needs to be done to investigate fully.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Mar 2019 20:36:20 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2019-03-19T20:36:20Z</dc:date>
    <item>
      <title>Is the PA-3020 adequate for SSL Decryption (and other features)?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254224#M72164</link>
      <description>&lt;P&gt;My company has 2 PA-3020 firewalls in Active/Passive configuration. They were purchased way before I started working here, so I had no input on the model that was selected. We have about 500 users in our network, and about 800 devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our environment, these firewalls sit at the perimeter edge, and there are no internal firewalls (for network segmentation). We are not running ACI or VMware NSX either.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Up until about a year ago, the company was using this as a state full firewall, but had purchased all of the licenses. Since I've been here, we've been tacking on more things to the firewall such as Network Segmentation (16 security zones), and GlobalProtect VPN (for about 5 users).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would like to start using some of the IPS features such as WildFire, Zone Based Protection, and last but not least, SSL decryption. I've been told from one source that the PA-3020's are not great at SSL decryption, and I would like to ask You, The Palo Alto community, if you think that is the case. I would like to know if getting a beff-ier firewall would be best, or if we can still use the PA-3020. Any insight you can offer would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 17:17:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254224#M72164</guid>
      <dc:creator>Fr4nk4</dc:creator>
      <dc:date>2019-03-19T17:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Is the PA-3020 adequate for SSL Decryption (and other features)?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254237#M72165</link>
      <description>&lt;P&gt;What's the current BW throughput on the firewalls?&amp;nbsp; What's your average sessions&amp;nbsp;per second?&amp;nbsp; Can you run an ACC "SSL" application query and see how much SSL you're doing daily?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 17:39:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254237#M72165</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-03-19T17:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is the PA-3020 adequate for SSL Decryption (and other features)?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254284#M72169</link>
      <description>&lt;P&gt;I'd say the total sessions average is somewhere between 6-10K sessions concurrently.&lt;BR /&gt;&lt;BR /&gt;This is from the last 24 hours:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssl graph.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19144i5E888C566E2A5C86/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ssl graph.PNG" alt="ssl graph.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 19:28:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254284#M72169</guid>
      <dc:creator>Fr4nk4</dc:creator>
      <dc:date>2019-03-19T19:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Is the PA-3020 adequate for SSL Decryption (and other features)?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254287#M72171</link>
      <description>&lt;P&gt;Looks like you had a little over 3GB of traffic...Now I'm not sure how much of that you'd actually decrypt...If you can try to find that number (would it match your proposed decryption policy).&amp;nbsp; Given how much other throughput is probably going through your appliance and everything else you'd want to do, it might be best not to decrypt SSL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That being said I think more needs to be done to investigate fully.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 20:36:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254287#M72171</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-03-19T20:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Is the PA-3020 adequate for SSL Decryption (and other features)?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254443#M72216</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would say go ahead and enable it, but be ready to disable it if needed. The 3020 is a stout box and it doenst look like you have a lot of sessions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 20:47:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254443#M72216</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-03-20T20:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Is the PA-3020 adequate for SSL Decryption (and other features)?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254453#M72219</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/81988"&gt;@Fr4nk4&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;While the ACC graph gives a rough idea of what your stats look like over a time period, it doesn't give us the full picture needed to really make the determination for you at all. For example, if those spikes were long-running sessions closing it doesn't actually give us an insight into what your peak is at all.&lt;/P&gt;&lt;P&gt;Overall you need to look at a number of criteria across your firewall and determine if that's in-line with what the PA-3020 can actually handle. We would need a bunch more numbers to make this call on your behalf. One option of course is to enable it selectively for a small group of people and scale up from their.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind that your PA-3020 is only able to push 2 Gbps with App-ID enabled, and can only do 1 Gbps with threat prevention enabled. The 3020 as a whole can only support 7,936 concurrent decrypted sessions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One place to start would be the&amp;nbsp;&lt;EM&gt;show system statistics session&lt;/EM&gt; and&amp;nbsp;&lt;EM&gt;show system statistics application&lt;/EM&gt; CLI commands. The first will tell you the number of active sessions, a breakout of session type, current throughput, and what your packet rate is. The second will display the top 20 applications currently on the firewall. Look for ssl and monitor both throughout the day to see if your 3020 will handle your traffic flow.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 23:23:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-the-pa-3020-adequate-for-ssl-decryption-and-other-features/m-p/254453#M72219</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-03-20T23:23:48Z</dc:date>
    </item>
  </channel>
</rss>

