<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL decryption and Carbonite in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10149#M7448</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;as you know, applications use various degrees of SSL.&lt;/P&gt;&lt;P align="left"&gt;Some are not implemented to standards or use capabilities in the standards that are not compatible with Palo Alto Networks SSL decryption capability. In addition, SSL decryption cannot be used when servers require client certi&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;You have to avoid SSL decryption if:&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; font-family: SabonLTStd-Roman; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;• Server requires client certi&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cates&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;• Non-standard implementations of SSL used&lt;/P&gt;&lt;SPAN style="font-family: SabonLTStd-Roman; "&gt;&lt;P align="left"&gt;• New certi&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cate authorities can’t be added to the client application&lt;SPAN style="font-family: SabonLTStd-Roman; "&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;• Client software requires speci&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;c server certi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cates&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I suggest you to make an exception per Carbonite URLs or Dst IP Address/es.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Mar 2011 13:47:47 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2011-03-16T13:47:47Z</dc:date>
    <item>
      <title>SSL decryption and Carbonite</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10148#M7447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SSL decryption seems to interfere with Carbonite.&amp;nbsp; When the policy is enabled, the Carbonite client reports "waiting for connecton to carbonite pro backup server...".&amp;nbsp; I assume I could add a rule to not touch anything in category "online-personal-storage", but I'd rather not just guess until I get it right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone had the same experience?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Mar 2011 13:32:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10148#M7447</guid>
      <dc:creator>tcjnole64</dc:creator>
      <dc:date>2011-03-16T13:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and Carbonite</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10149#M7448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;as you know, applications use various degrees of SSL.&lt;/P&gt;&lt;P align="left"&gt;Some are not implemented to standards or use capabilities in the standards that are not compatible with Palo Alto Networks SSL decryption capability. In addition, SSL decryption cannot be used when servers require client certi&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;You have to avoid SSL decryption if:&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; font-family: SabonLTStd-Roman; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;• Server requires client certi&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cates&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;• Non-standard implementations of SSL used&lt;/P&gt;&lt;SPAN style="font-family: SabonLTStd-Roman; "&gt;&lt;P align="left"&gt;• New certi&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cate authorities can’t be added to the client application&lt;SPAN style="font-family: SabonLTStd-Roman; "&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;• Client software requires speci&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;c server certi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;fi&lt;/SPAN&gt;&lt;SPAN style="font-family: SabonLTStd-Roman;"&gt;cates&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I suggest you to make an exception per Carbonite URLs or Dst IP Address/es.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Mar 2011 13:47:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10149#M7448</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-03-16T13:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and Carbonite</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10150#M7449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That will work.&amp;nbsp; In case anyone stumbles onto this, I contacted Carbonite.&amp;nbsp; The IP addresses to exclude are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;38.97.103.128/26&lt;/P&gt;&lt;P&gt;38.111.3.192/26&lt;/P&gt;&lt;P&gt;38.97.75.1/25&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Mar 2011 14:54:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-carbonite/m-p/10150#M7449</guid>
      <dc:creator>tcjnole64</dc:creator>
      <dc:date>2011-03-16T14:54:38Z</dc:date>
    </item>
  </channel>
</rss>

