<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implementing SSL Forward Proxy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343379#M85967</link>
    <description>&lt;P&gt;Active Directory and use the CA to issue subordinate CA that the firewall uses, all domain joined machines will trust it.&amp;nbsp; Doesn't work for your guests, you'll have to have a portal for them to get the certificate so they will trust your firewall. Otherwise it looks like a man-in-the-middle attack to the end user machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Global Protect client (again you own or at least manage the machine) can also push a certificate to the local store.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Aug 2020 21:11:04 GMT</pubDate>
    <dc:creator>GlennSJ</dc:creator>
    <dc:date>2020-08-11T21:11:04Z</dc:date>
    <item>
      <title>Implementing SSL Forward Proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343365#M85965</link>
      <description>&lt;P&gt;I have a problem!!, I'm implementing SSL Forward Proxy, all the guides say I have to install the certificate in all the clients, isn't there an alternative to this? I have a lot of visitors and I shouldn't have to install a certificate.&lt;/P&gt;&lt;P&gt;I used to have pfSense and this made it transparent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PanOS 9.1&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 20:47:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343365#M85965</guid>
      <dc:creator>aaltamirano</dc:creator>
      <dc:date>2020-08-11T20:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing SSL Forward Proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343378#M85966</link>
      <description>&lt;P&gt;Installing a Certificate generated on the Palo Alto Networks device is a required step, otherwise the clients will get error messages when trying to browse out to the internet as the Firewall will be using that Certificate to re-encrypt the data, and if that certificate is not installed on the client machine,&amp;nbsp; it will not work.&lt;/P&gt;
&lt;P&gt;I cannot comment on how pfSense works.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 21:08:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343378#M85966</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2020-08-11T21:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing SSL Forward Proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343379#M85967</link>
      <description>&lt;P&gt;Active Directory and use the CA to issue subordinate CA that the firewall uses, all domain joined machines will trust it.&amp;nbsp; Doesn't work for your guests, you'll have to have a portal for them to get the certificate so they will trust your firewall. Otherwise it looks like a man-in-the-middle attack to the end user machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Global Protect client (again you own or at least manage the machine) can also push a certificate to the local store.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 21:11:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343379#M85967</guid>
      <dc:creator>GlennSJ</dc:creator>
      <dc:date>2020-08-11T21:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing SSL Forward Proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343380#M85968</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134871"&gt;@GlennSJ&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Very good point. You can use an Internal CA for that, as long as the firewall uses that Subordinate CA, then that should work without installing certificates on client machines.&lt;/P&gt;
&lt;P&gt;Also about GP Client.. good one.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 21:19:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343380#M85968</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2020-08-11T21:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing SSL Forward Proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343472#M85981</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/135773"&gt;@aaltamirano&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The installation of the certificate is required to avoid certificate warnings in the browsers. For visitors I know this could be complicated. But when you do require to decrypt also this traffic there is no way without this step. You could configure captive portal where you would write some information for the visitors about how to do this.&lt;/P&gt;
&lt;P&gt;Also with pfsense, cryptographically there is no way to implement TLS decryption "transparently" without this step (except when you have the power of CIA, NSA or some other intelligence agency - but also if they do this with an official CA certificate I would assume they will get caught pretty fast).&lt;/P&gt;
&lt;P&gt;For basic URL filtering you do not have to install the certificate on the clients as the firewall sees the domainname in cleartext in the TLS handshake when a client connects to a https website.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 07:08:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/implementing-ssl-forward-proxy/m-p/343472#M85981</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-12T07:08:50Z</dc:date>
    </item>
  </channel>
</rss>

