<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling PFS for GP VPN Portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/266503#M74443</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42784"&gt;@hshawn&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;How exactly are you terminating the GP Portal interface on the firewall? Do you have it configured on a Loopback interface or an actual layer3 interface on the firewall?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jun 2019 23:07:54 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-06-04T23:07:54Z</dc:date>
    <item>
      <title>Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/261987#M74245</link>
      <description>&lt;P&gt;Has anyone configured PFS on their Global Protect Portal?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any snags? Is this even possible for the inbound connections to the portal?&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 20:29:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/261987#M74245</guid>
      <dc:creator>hshawn</dc:creator>
      <dc:date>2019-05-22T20:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/262095#M74271</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42784"&gt;@hshawn&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;PFS is enabled by default for Forward Proxy in anything above/at 7.1, and with Inbound Inspection this was activated by default in 8.0 and above.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2019 18:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/262095#M74271</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-23T18:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/262115#M74283</link>
      <description>&lt;P&gt;We are not doing inbound inspection I guess I was wondering if it could be done just for the GP VPN portal or if it had to be on everything. which then makes me wonder what type of issues we may run into with inbound inspection&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2019 20:38:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/262115#M74283</guid>
      <dc:creator>hshawn</dc:creator>
      <dc:date>2019-05-23T20:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/262118#M74285</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42784"&gt;@hshawn&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Ahh okay got it. Inbound inspection can be configured fairly specifically to only include one resource such as GP, but you would really want to test it to verify that you have everything working correctly before enabling it for all external traffic. The good news is you can test by including a simple external IP as the source, so testing is certaintly do-able.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additional SSL Inbound Inspection documentation can be found &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/decryption/configure-ssl-inbound-inspection.html" target="_self"&gt;HERE&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2019 21:16:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/262118#M74285</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-23T21:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/266318#M74441</link>
      <description>&lt;P&gt;So I gave this a shot, pretty straight forward but it does not look like it will work for something that terminates at the firewall itself (such as the GP VPN portal) the inbound decrypt rule never gets hit and the ssllabs scan still shows no PFS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 15:08:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/266318#M74441</guid>
      <dc:creator>hshawn</dc:creator>
      <dc:date>2019-06-04T15:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/266503#M74443</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42784"&gt;@hshawn&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;How exactly are you terminating the GP Portal interface on the firewall? Do you have it configured on a Loopback interface or an actual layer3 interface on the firewall?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 23:07:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/266503#M74443</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-06-04T23:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/303045#M78917</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;: I am working on this with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42784"&gt;@hshawn&lt;/a&gt;&amp;nbsp;We are using a loopback address on the Firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 20:45:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/303045#M78917</guid>
      <dc:creator>charlesk</dc:creator>
      <dc:date>2019-12-10T20:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling PFS for GP VPN Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/340900#M85533</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you solve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We launched ssllabs to a GP portal website and it shows this:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This server does not support Forward Secrecy with the reference browsers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there any way to support PFS for GP portal web?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 17:17:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enabling-pfs-for-gp-vpn-portal/m-p/340900#M85533</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2020-07-27T17:17:40Z</dc:date>
    </item>
  </channel>
</rss>

