- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
09-25-2014 12:54 AM
Hi all,
There is a topology like below.Clients using Cisco vpn and they are enforced to use some proxies(enforced from Active Directory)
There is a Local Websense but it cannot be used because of that enforcement.
Can Paloalto firewall decrypt that SSL traffic and make websense available to use ?
is that possible ?
Cisco Any Connect Client--------------(No PAloalto at this time ,bu will be here) -------------------------INTERNET------------------------Cisco ASA
|
|
Websense
09-25-2014 01:28 AM
Hi
A Palo Alto Firewall would be able to decrypt the tunnel if it is ssl based and perform URL filtering with our built-in URL filtering, but this cannot be achieved with a 3rd party URL filtering solution.
We do have a feature called "decryption port mirror" which allows you to export decrypted data which you could get analysed by a 3rd party URL filtering solution, but only for logging purposes
How to Configure a Decrypt Mirror Port on PAN-OS 6.0
09-25-2014 06:27 AM
Thanks but the thing is we need to forward decrytped data and get back it to PAN to forward.I think this will not be possible as I see.
09-25-2014 10:29 AM
Hi PAN-OS,
This feature is just like SPAN in Cisco world. But you can say its decrypt-SPAN.
So you get the information, but can not take any action on it. So, its not possible to force websense to take any action on decrypted data.
Let me know if this helps.
Regards,
Hardik Shah
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!