Hi @Jan_Linhart ,
Is below document addresses your query?
Added to above, As of my knowledge, PA will be doing proxy by default for all connections matching with forward proxy rule,
But inbound inspection is different, it was passive eveasdropping till PanOS 8.0, so if key exchange is DH/ECDH, the decryption fails before 8.0. But after 8.0 they changed the behaviour, so that PA will be active in MITM. if key exchange is RSA, PA wont be proxying the connection, but if key exchange is DH/ECDH, PA will involk the proxy module.
unfortunately, there is no answer for my question. PAN-OS has support for TLS1.3 now, but not support for decryption.
Please look at this link:
Most important part is:
With TLS 1.3, this passive mode decryption (the one PANW is using - transparent for clients) will no longer be possible since the RSA key exchange has been removed.
Dear valued Palo Alto Networks customer,
Please take the action recommended below if you have enabled SSL decryption forward proxy. This is required for users to access Gmail and other websites and applications using web browsers that implement strict TLS 1.3 compliance. We have been informed that Google Chrome is planning to implement strict TLS 1.3 compliance in their upcoming version 72. The stable build of Google Chrome version 72 may be available in January 2019, and if your users use a pre-stable build of Google Chrome, they will experience the issue outlined below earlier.
All supported PAN-OS releases
If you run PAN-OS 8.1:
@Abdul_Razaq @Chacko42 I think what @Jan_Linhart is asking is not so much about the ability for PAN-OS to just merely support the protocol, but rather the ability to actually DECRYPT the TLS1.3 session.
I think that it something that is being targeted for PAN-OS 9.1, but who knows if it'll actually make it in the release...
BTW this is another reason I bet Palo came out with the X2XX hardware. I doubt the legacy HW would have been able to handle TLS1.3 decryption.
So it's important to note here the difference between supporting the protocol and actively being able to decrypt TLS 1.3.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!