<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Inbound Decryption Failing in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/385254#M90124</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127513"&gt;@RyanJohnstone1144&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Mismatched or unsupported ciphers are the cause of 99.9% of these issues. Verify that all of the ciphers used by the server are actually &lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-9-0/cipher-suites-supported-in-pan-os-9-0-decryption.html" target="_blank" rel="noopener"&gt;supported&lt;/A&gt; by the firewall and that only supported ciphers are being utilized. If you have ciphers checked on your decryption profile that the server doesn't support, or ciphers on the server that the firewall doesn't support, it's not able to proxy that connection properly.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Feb 2021 22:54:41 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-02-10T22:54:41Z</dc:date>
    <item>
      <title>SSL Inbound Decryption Failing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/384788#M90076</link>
      <description>&lt;P&gt;hello, we are setting up SSL Inspection for inbound traffic but it is failing when clients try to access, we are getting unsupported protocol errors.&amp;nbsp; ssl labs shows the following issues around handshaking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RyanJohnstone1144_0-1612884336341.png" style="width: 555px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29861i7B3A94E4E14B2CDD/image-dimensions/555x411/is-moderation-mode/true?v=v2" width="555" height="411" role="button" title="RyanJohnstone1144_0-1612884336341.png" alt="RyanJohnstone1144_0-1612884336341.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with SSL Inspection off we do not see these errors&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RyanJohnstone1144_1-1612884421679.png" style="width: 584px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29862iAC5524672D622896/image-dimensions/584x289/is-moderation-mode/true?v=v2" width="584" height="289" role="button" title="RyanJohnstone1144_1-1612884421679.png" alt="RyanJohnstone1144_1-1612884421679.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can anyone advise what we can do to address this?&amp;nbsp; we are running PAN OS 9.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 15:28:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/384788#M90076</guid>
      <dc:creator>RyanJohnstone1144</dc:creator>
      <dc:date>2021-02-09T15:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Decryption Failing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/385254#M90124</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127513"&gt;@RyanJohnstone1144&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Mismatched or unsupported ciphers are the cause of 99.9% of these issues. Verify that all of the ciphers used by the server are actually &lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-9-0/cipher-suites-supported-in-pan-os-9-0-decryption.html" target="_blank" rel="noopener"&gt;supported&lt;/A&gt; by the firewall and that only supported ciphers are being utilized. If you have ciphers checked on your decryption profile that the server doesn't support, or ciphers on the server that the firewall doesn't support, it's not able to proxy that connection properly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 22:54:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/385254#M90124</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-02-10T22:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Decryption Failing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/385640#M90166</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;looks like issue is to do with EC x25519 being used by our server.&amp;nbsp; i see this is supported on PAN OS 10 with TLS1.3 and is NIST approved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if support for this will be added to PAN OS 9.0?&amp;nbsp; i am reluctant to ask our server team to disable x25519 across our server estate or move up to 10.0 at this current time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2021 10:52:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-failing/m-p/385640#M90166</guid>
      <dc:creator>RyanJohnstone1144</dc:creator>
      <dc:date>2021-02-12T10:52:23Z</dc:date>
    </item>
  </channel>
</rss>

