<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption for ASA 5516x with firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230331#M1010987</link>
    <description>&lt;P&gt;What do you mean with 3rd party? It can *not* be done with a certificate that you purchase from a public CA. You need a certificate that has the basic constraints set so that you can issue certificates. You only get this with a self-signed certificate or from&amp;nbsp;a private CA. In both cases, the local self-signed or the private root-certificate needs to be trusted by the clients. These certificates are completely unrelated to your AD.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Dec 2017 19:00:30 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2017-12-11T19:00:30Z</dc:date>
    <item>
      <title>SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230194#M1010656</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Is it possible to configure SSL decryption to inspect the traffic using 3rd party certificate ? I aim having 6 different AD trees behind this firewall with about 500 users.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also is this unit good enough support SSL decryption?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Charles&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230194#M1010656</guid>
      <dc:creator>charles_nana</dc:creator>
      <dc:date>2020-02-21T14:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230240#M1010660</link>
      <description>&lt;P&gt;You can use 3rd party certificate for SSL decryption on the firepower.&lt;/P&gt;
&lt;P&gt;SSL decryption on an ASA with firepower can have a performance decrease of up to 80%, because it is done in software.&lt;/P&gt;
&lt;P&gt;The new Firepower models 4100 and 9000 do it in hardware and should have a much better performance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2017 16:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230240#M1010660</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2017-12-11T16:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230245#M1010662</link>
      <description>&lt;P&gt;Thank you for your reply.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2017 16:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230245#M1010662</guid>
      <dc:creator>charles_nana</dc:creator>
      <dc:date>2017-12-11T16:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230331#M1010987</link>
      <description>&lt;P&gt;What do you mean with 3rd party? It can *not* be done with a certificate that you purchase from a public CA. You need a certificate that has the basic constraints set so that you can issue certificates. You only get this with a self-signed certificate or from&amp;nbsp;a private CA. In both cases, the local self-signed or the private root-certificate needs to be trusted by the clients. These certificates are completely unrelated to your AD.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2017 19:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230331#M1010987</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-12-11T19:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230685#M1010989</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;Thank you for pointing that out. I usually hear &lt;SPAN&gt;3rd party certificate&amp;nbsp;&lt;/SPAN&gt;when referring to certificates issued by private CAs and my above answer was based on that.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 10:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230685#M1010989</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2017-12-12T10:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230830#M1010990</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What I wanted to know was whether I can use a certificate purchased from a CA like Godaddy. As I don't want to maintain a CA in house.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Charles&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 14:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230830#M1010990</guid>
      <dc:creator>charles_nana</dc:creator>
      <dc:date>2017-12-12T14:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230842#M1010991</link>
      <description>As already mentioned: No, you can't!</description>
      <pubDate>Tue, 12 Dec 2017 14:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230842#M1010991</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-12-12T14:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230868#M1010993</link>
      <description>&lt;P&gt;Public CAs, like Godaddy will not sign certificates that can be used in man in the middle SSL decryption.&lt;/P&gt;
&lt;P&gt;The options for certificates used for SSL decryption are self-signed or&amp;nbsp;enterprise CA-signed certificate.&lt;/P&gt;
&lt;P&gt;Sorry for misunderstanding your original question.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 14:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3230868#M1010993</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2017-12-12T14:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3231012#M1010996</link>
      <description>&lt;P&gt;Hi Bogdan,&lt;/P&gt;
&lt;P&gt;Thanks for your reply. If I have to use self-signed or enterprise CA-signed certificate, those will not be trusted by the non-domain devices like phones and tablets. Any suggestions on how to deliver these certificates to non-domain devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 17:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3231012#M1010996</guid>
      <dc:creator>charles_nana</dc:creator>
      <dc:date>2017-12-12T17:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption for ASA 5516x with firepower</title>
      <link>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3231020#M1010999</link>
      <description>That is typically done with the mobile device management.</description>
      <pubDate>Tue, 12 Dec 2017 18:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-decryption-for-asa-5516x-with-firepower/m-p/3231020#M1010999</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-12-12T18:12:54Z</dc:date>
    </item>
  </channel>
</rss>

