This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Cookie Policy. Click Preferences to customize your cookie settings.
Hi MP18, Thank you for the clarifications, actually that the same understanding but one of the Palo Alto documents confused me, when talking about using sort of External certificate to avoid installing the certificate on the end users' hosts! My aim was to avoid installing anything on the PCs and Smart Phones, iPad used by the users. Regards,
... View more
Hello, I want o start setting using Decryption Policy, to Decrypt & Intercept SSL (443) traffic from users when connecting to Internet. I am wondering, can I use one of the well known Certificate Trusted, e.g., Global Sign by installing it on the Palo Alto without installing the certificate manually on the users' computers?! Thank you ...
... View more
Hi Kiwi, Thank you .. Actually, I have setup/added an application under Applications tab, to the same, so since I am not using this application to connect to the internet, then the conditions were never met, i.e., the traffic was not matching this rule and the traffic was intercepted by next rule! Now everything is fine, after removing the Application and kept the URL Profile. Thank you ...
... View more
Hello, I have configured a new Security Rule on top (#9 in the picture down) to Block traffic intended to a Custom URL configured in the profile Block_Files * TOP RULE * Source Zone: any Source Address: any Destination Zone: any Destination Address: any * NEXT RULE * Source Zone: Trust Source Address: 10.10.10.10 Destination Zone: Internet Destination Address: any But the problem when I try to connect to the Custom URL defined in Block_Files the request goes through the next Security Rule set for 10.10.10.10, i.e., although the traffic or URL is matching the Custom URL defined in Block_Files, but it does not go through nor blocked by the Security Rule on top!! Is the above Rule valid/correct Thank you ...
... View more