we have PA7050 managed by panorama. We dont have SSL decryption but we want to serve users a block url response page for https traffic. For that I followed following link:
But this doesn't seem to work with 7.1.18.
I have 2 doubts:
1. For the fwd-trust and untrust certificates - I just created them and ticked the approrpiate check box by clicking on the certificates. Do I need to do any additional step?
2. Since I cannot give the command "# set deviceconfig setting ssl-decrypt url-proxy yes" on panorama, I logged on to the FW CLI and then gave this command and then committed from the firewall CLI itself. Is this wrong?
1. After you create the certificates and checked the boxes, you will need to commit
2. This setting does need to be set on the firewall locally, so that should be good.
I have the same issue with Panorama and 2 PA7050 with 8.1.9-h4.
In logs, I see the Session End Reason as a decrypt-error.
This error is caused, according to documentation:
"Decrypt Error. The session terminated because the firewall was configured to block SSL forward proxy decryption or SSL inbound inspection when firewall resources or the hardware security module (HSM) were unavailable. This session end reason is also displayed when the firewall is configured to block SSL traffic that has SSH errors or that produced any fatal error alert other than those listed for the decrypt-cert-validation and decrypt-unsupport-param end reasons."
I can't believe that a PA7050 can have resource problems to cause this problem.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!