- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Traffic that has been encrypted using the protocols SSL and SSH can be decrypted to ensure that these protocols are being used for the intended purposes only, and not to conceal unwanted activity or malicious content.
Palo Alto Networks firewalls decrypt encrypted traffic by using keys to transform strings (passwords and shared secrets) from ciphertext to plaintext (decryption) and from plaintext back to ciphertext (re-encrypting traffic as it exits the device).
Views | Replies |
---|---|
91 | 0 |
240 | 3 |
172 | 1 |
238 | 2 |
235 | 1 |