<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Response pages in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/407124#M92202</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the already proposed solutions you should be good to go without a performance impact. Aso you wrote correctly, it is a global setting so if you want to be absolutely sure about what you are going to implement, then test the setup on a lab firewally. According to the knowledgebase article you also need to enable response pages (&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0&lt;/A&gt; ).&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;wrote you should consider enabling the decryption feature as this will dramatically improve the security and visibility in your network.&lt;/P&gt;</description>
    <pubDate>Sun, 16 May 2021 16:19:18 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2021-05-16T16:19:18Z</dc:date>
    <item>
      <title>HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406318#M92090</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that there are many threads here about this.&amp;nbsp;We would like to show the response pages for https.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We saw this link but i have several doubts:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This command is enabled globally: "set deviceconfig setting ssl-decrypt url-proxy yes". So, is this command decrypting all SSL? or just injecting response pages? This would impact a lot in the CPU.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to limit the decrypt ssl for several users i understand we need to use decryption policy like usual.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is the best way?&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 10:36:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406318#M92090</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2021-05-12T10:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406496#M92111</link>
      <description>&lt;P&gt;Hello there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, pretty much, the only way for a response page to be seen, is to enable decryption, so the FW can "see" web-browsing (application) on port 443, and then issue the response page.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is not pretty, but it is a necessary requirement to set the expectation that end user traffic MUST be decrypted (else, how does one propose to catch PII, HIPPA, company trade secrets, credit cards, social secuirty, etc)... The FW cannot block what it cannot see.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 00:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406496#M92111</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-05-13T00:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406665#M92138</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are not doing ssl decryption of the traffic and you want response page enabled then you use below command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;enabled globally: "set deviceconfig setting ssl-decrypt url-proxy yes"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It will&amp;nbsp;inject the response page. This will not cause Spike in CPU or actually decrypt the traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 00:06:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406665#M92138</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-14T00:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406827#M92163</link>
      <description>&lt;P&gt;So we need to add this command "&lt;SPAN&gt;&amp;nbsp;"set deviceconfig setting ssl-decrypt url-proxy yes"" and also a decryption policy?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 17:54:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406827#M92163</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2021-05-14T17:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406842#M92166</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You only need cli command no decryption policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 18:55:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406842#M92166</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-14T18:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406964#M92175</link>
      <description>&lt;P&gt;OK, but this command will be to decrypt all traffic https passing the FW? what is the impact?&lt;/P&gt;&lt;P&gt;We are scared about showing the certificate not trusted web for everyone. Althoug we put the CA root PA certificate in browser, but like this is a global config....any way to filter by user?&lt;/P&gt;</description>
      <pubDate>Sat, 15 May 2021 09:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406964#M92175</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2021-05-15T09:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406975#M92179</link>
      <description>&lt;P&gt;The FW will only decrypt enough to read the URL category and provide the response page as needed.&amp;nbsp; There is not complete decryption of the traffic.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That being said, I think we all should provide consistent messaging that decryption is a feature set that all customers should be researching/testing, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My suggestion is to run the command, and then ONLY use your IP as a test machine, so it is not impactful to everyone.&amp;nbsp; Test the feature, get comfortable with the feature, and then slowly rollout this to your network.&amp;nbsp; Again, this is for getting the response page.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you fell comfortable, I would recommend that you research the entire Decryption function, learn what is needed, how to configure it, and continue to proceed with the feature set.&amp;nbsp; As we have recently seen, there in an influx in the amount of malicious traffic inbound and laterally, due to SSL encrypted files.&amp;nbsp; A better security posture is to utilize all the features.&amp;nbsp; It is generally stated that 65% to 80% of the Internet is TLS encrypted.&amp;nbsp; So, by not implementing an important feature set, you are really getting 20 to 35% protection of ContentID (and that does not include loss of intellectual property or sensitive data loss)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any other questions/concerns we can assist with?&lt;/P&gt;</description>
      <pubDate>Sat, 15 May 2021 14:36:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406975#M92179</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-05-15T14:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406998#M92186</link>
      <description>&lt;P&gt;OK, but this command is applied by CLI ad its global. How can we limit the decrypt for just one user and testing purposes?&lt;/P&gt;&lt;P&gt;is it neccesary a decryption policy for that? im not sure if enabling anything global apply for everyone and cpu issue will happen.&lt;/P&gt;</description>
      <pubDate>Sat, 15 May 2021 16:57:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/406998#M92186</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2021-05-15T16:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/407003#M92187</link>
      <description>&lt;P&gt;Good Day again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have provided you information about resolving your issue.&amp;nbsp; It will now be up to you to decide how you would like to use this information.&amp;nbsp; Both myself and MP18 stated that no decryption rules are used, and minimal CPU increase.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 May 2021 21:21:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/407003#M92187</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-05-15T21:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Response pages</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/407124#M92202</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the already proposed solutions you should be good to go without a performance impact. Aso you wrote correctly, it is a global setting so if you want to be absolutely sure about what you are going to implement, then test the setup on a lab firewally. According to the knowledgebase article you also need to enable response pages (&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0&lt;/A&gt; ).&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;wrote you should consider enabling the decryption feature as this will dramatically improve the security and visibility in your network.&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 16:19:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-response-pages/m-p/407124#M92202</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-05-16T16:19:18Z</dc:date>
    </item>
  </channel>
</rss>

