- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-18-2019 08:54 PM
Hi
myeverythingdisc.com
my PA's use the unsecure CA..
tring to work out why.
Last I checked there was no log so ...
07-27-2019 01:25 PM
From what I can see (without troubleshooting this deeply on a PA), it could be because of something called "Extended Master Secret". As the webserver behind your mentionned website is a windows server this might be the reason as I have seen this reason for failed decryptions only on windows servers so far. Other things that might be a reason I cannot see in the webservers TLS configuration.
But to be sure you probably need to dig deeper (or open a support case and let PaloAlto do this work 😉
07-27-2019 02:04 PM
I have been down this route before - capturing packets etc ... they haven't been helpful.
The point I was trying to make was there is not enough logging around this.
Thanks
07-27-2019 02:11 PM
In the traffic logs or default packet captures, yes there is not enough information. But on the CLI you will be able to see what you want to.
debug dataplane packet-diag set log feature proxy all debug dataplane packet-diag set log feature ssl all
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!