<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic As of the current FirePOWER in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067973#M1123</link>
    <description>&lt;DIV class="views-field views-field-comment-body cor-content"&gt;
&lt;DIV class="field-content"&gt;
&lt;P&gt;As of the current FirePOWER software (Release 5.3.1), onboard SSL decryption for inspection of traffic is not supported. I've heard it may be coming in 5.4 (possibly later this quarter) but that's not yet available. When is is available, it will have a performance cost since line rate SSL decryption is computationally intensive.&lt;/P&gt;
&lt;P&gt;So for now you would have to use a &lt;A href="http://www.cisco.com/c/en/us/products/security/ssl-appliances/models-comparison.html"&gt;Cisco&amp;nbsp;SSL appliance&lt;/A&gt;. They have purpose-built hardware for SSL decryption.&lt;/P&gt;
&lt;P&gt;In either case, the inline device that's opening and inspecting the SSL traffic would need to have a special certificate that's allowed to issue child certificates and be trusted by all your clients. That typically means you need to have (or establish) an Enterprise PKI.&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 30 May 2017 10:39:52 GMT</pubDate>
    <dc:creator>Farhan Mohamed</dc:creator>
    <dc:date>2017-05-30T10:39:52Z</dc:date>
    <item>
      <title>Firepower SSH decryption?</title>
      <link>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067972#M1110</link>
      <description>&lt;P&gt;I understand that cisco Firepower decrypts SSL. But it does not have a seperate option for SSH decryption ( like PaloAlto). My question is.. does it decrypt it by in the same policy ( SSL decryption policy that is) or it does not ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067972#M1110</guid>
      <dc:creator>mobashersheikh87</dc:creator>
      <dc:date>2020-02-21T05:04:13Z</dc:date>
    </item>
    <item>
      <title>As of the current FirePOWER</title>
      <link>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067973#M1123</link>
      <description>&lt;DIV class="views-field views-field-comment-body cor-content"&gt;
&lt;DIV class="field-content"&gt;
&lt;P&gt;As of the current FirePOWER software (Release 5.3.1), onboard SSL decryption for inspection of traffic is not supported. I've heard it may be coming in 5.4 (possibly later this quarter) but that's not yet available. When is is available, it will have a performance cost since line rate SSL decryption is computationally intensive.&lt;/P&gt;
&lt;P&gt;So for now you would have to use a &lt;A href="http://www.cisco.com/c/en/us/products/security/ssl-appliances/models-comparison.html"&gt;Cisco&amp;nbsp;SSL appliance&lt;/A&gt;. They have purpose-built hardware for SSL decryption.&lt;/P&gt;
&lt;P&gt;In either case, the inline device that's opening and inspecting the SSL traffic would need to have a special certificate that's allowed to issue child certificates and be trusted by all your clients. That typically means you need to have (or establish) an Enterprise PKI.&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 30 May 2017 10:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067973#M1123</guid>
      <dc:creator>Farhan Mohamed</dc:creator>
      <dc:date>2017-05-30T10:39:52Z</dc:date>
    </item>
    <item>
      <title>Firepower 5.4.1 and above is</title>
      <link>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067974#M1134</link>
      <description>&lt;P&gt;Firepower 5.4.1 and above is capable of doing SSL decryption, and the SSL decryption policy is way more granular with many different options.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200202-Configuration-of-an-SSL-Inspection-Polic.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jawad&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 20:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/firepower-ssh-decryption/m-p/3067974#M1134</guid>
      <dc:creator>Jawad Al Akrabawi</dc:creator>
      <dc:date>2017-07-03T20:10:50Z</dc:date>
    </item>
  </channel>
</rss>

