Hi @tisc Inbound inspection actually also is kind of a proxy, but for client and server a transparent one. Beacause of this fact from a technical view inbound inspection is (like forward inspection) a MitM (Man in the Middle) attack. Between client and server ther is no longer only one decrypted session. Instead there are two: one from the client to the firewall and one from the firewall to the server. This way the firewall is able to inspect the traffic as it is cleartext on the firewall. So back to your question: there is no need for the firewall to gain the encryption keys from somewhere, as the firewall itself generates them. Hope this helps. Regards, Remo
... View more