Decryption Rulebase BPA Checks

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Retired Member
Not applicable
No ratings

Decryption Rulebase - SSH Proxy/SSH Tunnel - Interpreting BPA Checks - Policies

 

 

In this video, we review the Decryption Rulebase while Interpreting BPA Checks in your Policies.

 

SSH Proxy enables the firewall to identify inbound and outbound SSH connections and ensures that attackers don't user SSH to tunnel unwanted applications and content. The Decryption Rulebase best practice check ensures that SSH Proxy is configured to detect and block SSH tunneling and to limit user access to SSH Traffic.

 

For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.
Rate this article:
  • 6057 Views
  • 0 comments
  • 0 Likes
Register or Sign-in
Contributors
Article Dashboard
Version history
Last Updated:
‎07-09-2020 01:15 PM
Updated by: