- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
In this video, we review the Decryption Rulebase while Interpreting BPA Checks in your Policies.
SSH Proxy enables the firewall to identify inbound and outbound SSH connections and ensures that attackers don't user SSH to tunnel unwanted applications and content. The Decryption Rulebase best practice check ensures that SSH Proxy is configured to detect and block SSH tunneling and to limit user access to SSH Traffic.