Showing results for 
Show  only  | Search instead for 
Did you mean: 


L1 Bithead

Hi paloalto community,


we're currently still testing ssl decryption and discovered a new error, which I can't google to find a solution.


If we're visiting the following site, we get an "ERR_HTTP2_INADEQUATE_TRANSPORT_SECURITY" error. Site:


See attached our configuration and ssl information without decryption enabled.


Firmware and Specs:

PA 850 - FW 9.0.5



2020-01-13 11_42_30-pa-1.png2020-01-13 11_42_39-pa-1.png


Decryption disabled:

2020-01-13 11_42_56-Anhängerkupplung M240i _ M140i.png


Decryption enabled:




IE doesn't care if you are using a weak cipher suite, which is why it's working in IE but not Firefox or Chrome. The bigger issue is why the decryption process isn't negotiating to the strongest available cipher unless the site has been configured with a cipher preference that makes it utilize the strongest cipher suites by default (such as Chrome). It appears through additional troubleshooting that the firewall is using the first matching cipher, which in the case of these example sites isn't strong enough to meet the requirements of the browser.

In fairness to PAN, the HTTP/2 connection shouldn't be attempting to use a questionable cipher suite such as in the example. The vast majority of the HTTP/2 enabled websites will work perfectly fine, because the site owner is specifying the preferred order with strong to weak ciphers. In the examples listed so far the server is providing no preference order, which could be causing the firewall to negotiate to one of the weaker cipher suites being offered by the server. 


Sounds like a feature which the PA team should consider? For my point of view it's more like a bug. If browsers can view the page, the PA should do it too.


For our users the current state is very bad - they will assume the page (e.g. of a customer) is not working, but instdead we have to whitelist it to exclude it from decryption.

Hello together,


same issue applies for us (PANOS 9.0.5 & 9.0.6, incl. Prisma Access) and a solution would be very appreciated.


Best regards

The same issues also applies to the site:

L0 Member

We are seeing the same issue with  did support provided a bug id? or any info?

Struggling with this as well. Found that ticking Strip ALPN on the Decryption profile helps, but doing so breaks the Safe Search functionality. When a single safe search block occurs, all traffic begins to be safe search blocked. 

Lol i'm having issues with


sigh !


is there a bug id or a work around ?

L2 Linker

Same issue on PA-850 with FW 9.1.2-h1
Tested with

I tried the workaround (Objects - Decryption - Decryption Profile - ENABLE/CHECK 'Strip ALPN')

BUT to disable HTTP/2 inspection wouldn't/shouldn't be the solution I think. In future HTTP/2 sites will increase - so Palo Alto should get a solution in the software.

Palo - is there any roadmap when this issue is solved without workaround?

Why is it causing an issue ?

Would be better if there was some (even any ) decrypt logs.


I spend sooo much time trying to guess why a decrypt didn't work 


whats is the down side to disabling this ?



Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!