cancel
Showing results for 
Search instead for 
Did you mean: 

Who rated this post

Very disappointing that I cannot use Palo for SSL inspection any more due to our load balancer AVI, is using OpenSSL v1.1.1 which defaults to X25519 curve for ECDEH and DHE PFS ciphers using TLS1.2/1.1 so the only option I have is to use the RSA-AES-256-GCM or CBC ciphers which then caps you SSL security rating to B vs A+ with ECDHE ciphers.

 

Come on Palo, fix the issue and support the curve x25519, you need that curve for TLS1.3 support.

Who rated this post