<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL decryption is useful for in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-encrytion-decryption-5555-x/m-p/3096887#M1014977</link>
    <description>&lt;P&gt;SSL decryption is useful for incoming traffic where you have the server certificate and key.&lt;/P&gt;
&lt;P&gt;It is not so useful for outgoing traffic as it requires a PKI and all clients must trust the issuing CA. Also, many modern applications and an increasing number of websites have technologies like certificate pinning in place to block man-in-the-middle interception as is done by SSL decryption. That's in addition to the significant (up to 75-80%) performance hit you get when doing SSL decryption.&lt;/P&gt;
&lt;P&gt;A better solution for this latter use case is to use endpoint-based tools like Cisco AMP for Endpoints and/or Cisco Umbrella that provide superior protection after the data comes out of the SSL tunnel.&lt;/P&gt;</description>
    <pubDate>Sat, 29 Jul 2017 14:01:34 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-07-29T14:01:34Z</dc:date>
    <item>
      <title>SSL Encrytion/decryption 5555-X</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytion-decryption-5555-x/m-p/3096886#M1014956</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;
&lt;P&gt;kindly please advise, we doing a firewall project where we are bringing in 5555-X with firepower module. we wanted the SSL encrytion/decryption. but our supplier advise this is not a good idea. better to leave this as it will degrade the perfomance. however, if we do ssl encrytion with selected categories it should not make a difference.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;kindly please advise, if its a good idea to drop SSL on 5555-X. if so than why cisco giving the techonolgy that should not be implement in production network.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytion-decryption-5555-x/m-p/3096886#M1014956</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-03-12T13:28:26Z</dc:date>
    </item>
    <item>
      <title>SSL decryption is useful for</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytion-decryption-5555-x/m-p/3096887#M1014977</link>
      <description>&lt;P&gt;SSL decryption is useful for incoming traffic where you have the server certificate and key.&lt;/P&gt;
&lt;P&gt;It is not so useful for outgoing traffic as it requires a PKI and all clients must trust the issuing CA. Also, many modern applications and an increasing number of websites have technologies like certificate pinning in place to block man-in-the-middle interception as is done by SSL decryption. That's in addition to the significant (up to 75-80%) performance hit you get when doing SSL decryption.&lt;/P&gt;
&lt;P&gt;A better solution for this latter use case is to use endpoint-based tools like Cisco AMP for Endpoints and/or Cisco Umbrella that provide superior protection after the data comes out of the SSL tunnel.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jul 2017 14:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytion-decryption-5555-x/m-p/3096887#M1014977</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-29T14:01:34Z</dc:date>
    </item>
  </channel>
</rss>

