<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decrypt on Virtual Wire deployment Certificate Issue (Chrome) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-on-virtual-wire-deployment-certificate-issue-chrome/m-p/320319#M82050</link>
    <description>&lt;P&gt;So, to confirm, you are able to get SSL Decryption working on your firewall with some sites?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way the SSL Decryption can work properly if the Firewall is the CA, and it generates SSL certificates on the fly for the client machine, in a "man in the middle" function.&amp;nbsp; That CA (Certificate Authority) then is trusted by the client machine, allowing the traffic coming from the Firewall to be trusted, and the Firewall acts as the client to the Public site.&lt;/P&gt;
&lt;P&gt;But this gets really muddy, really fast when the firewall is in VirtualWire mode with no IP.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Apr 2020 15:06:31 GMT</pubDate>
    <dc:creator>jdelio</dc:creator>
    <dc:date>2020-04-02T15:06:31Z</dc:date>
    <item>
      <title>SSL Decrypt on Virtual Wire deployment Certificate Issue (Chrome)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-on-virtual-wire-deployment-certificate-issue-chrome/m-p/318604#M81783</link>
      <description>&lt;P&gt;I have my PA-200 on virtual wire mode with Captive Portal using SSL Decrypt for all users with Self Signed Certificate.&lt;/P&gt;&lt;P&gt;When the users try to navigate on crhrome browser to internet they receive NET::ERR_CERT_COMMON_NAME_INVALID that doesn't permit to bypass for go to untrust site. When i manually enter a site that support http or another certificate method, is possible to navigate to the the unsafe site and Captive Portal works very well (Also I have Decryption profile and it also works)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read that it is common issue on Google, So I manually put a Subject Alternate name on attributes (host, ip, alt-email) to the Certificate, after export to the PC user like a root trust certificate but it doesn't works&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my case, all trust users takes DHCP IPs of the Router above the FW so default gateway is the router IP (virtual wire doesn't provide a FW IP) . I manually generate a certificate with the router IP but still doesn't works &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Idea or suggestion?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WhatsApp Image 2020-03-25 at 19.20.07.jpeg" style="width: 924px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24670i6972C9BF50CFCFF3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="WhatsApp Image 2020-03-25 at 19.20.07.jpeg" alt="WhatsApp Image 2020-03-25 at 19.20.07.jpeg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WhatsApp Image 2020-03-25 at 19.43.51.jpeg" style="width: 668px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24671i4B4F1ED70A0246BD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="WhatsApp Image 2020-03-25 at 19.43.51.jpeg" alt="WhatsApp Image 2020-03-25 at 19.43.51.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 22:45:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-on-virtual-wire-deployment-certificate-issue-chrome/m-p/318604#M81783</guid>
      <dc:creator>RPerez11</dc:creator>
      <dc:date>2020-03-25T22:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decrypt on Virtual Wire deployment Certificate Issue (Chrome)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-on-virtual-wire-deployment-certificate-issue-chrome/m-p/320319#M82050</link>
      <description>&lt;P&gt;So, to confirm, you are able to get SSL Decryption working on your firewall with some sites?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way the SSL Decryption can work properly if the Firewall is the CA, and it generates SSL certificates on the fly for the client machine, in a "man in the middle" function.&amp;nbsp; That CA (Certificate Authority) then is trusted by the client machine, allowing the traffic coming from the Firewall to be trusted, and the Firewall acts as the client to the Public site.&lt;/P&gt;
&lt;P&gt;But this gets really muddy, really fast when the firewall is in VirtualWire mode with no IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 15:06:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-on-virtual-wire-deployment-certificate-issue-chrome/m-p/320319#M82050</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2020-04-02T15:06:31Z</dc:date>
    </item>
  </channel>
</rss>

