<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Policy question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-policy-question/m-p/3032972#M1017428</link>
    <description>&lt;P&gt;I have a Firepower virtual management server that is managing about 12 devices.&lt;/P&gt;
&lt;P&gt;(2-5516s, 2-5508s, and the rest 5506s)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'd like to have an SSL policy so i can inspect https traffic, but I'm not sure if this is going to degrade system performance too much.&lt;/P&gt;
&lt;P&gt;since I'm using firepower manager, is the SSL work offloaded to it?&lt;/P&gt;
&lt;P&gt;I have plenty of room on my virtual environment to give the server all the CPU and memory it would ever want.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:15:43 GMT</pubDate>
    <dc:creator>Lee Dress</dc:creator>
    <dc:date>2019-03-12T13:15:43Z</dc:date>
    <item>
      <title>SSL Policy question</title>
      <link>https://community.cisco.com/t5/network-security/ssl-policy-question/m-p/3032972#M1017428</link>
      <description>&lt;P&gt;I have a Firepower virtual management server that is managing about 12 devices.&lt;/P&gt;
&lt;P&gt;(2-5516s, 2-5508s, and the rest 5506s)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'd like to have an SSL policy so i can inspect https traffic, but I'm not sure if this is going to degrade system performance too much.&lt;/P&gt;
&lt;P&gt;since I'm using firepower manager, is the SSL work offloaded to it?&lt;/P&gt;
&lt;P&gt;I have plenty of room on my virtual environment to give the server all the CPU and memory it would ever want.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-policy-question/m-p/3032972#M1017428</guid>
      <dc:creator>Lee Dress</dc:creator>
      <dc:date>2019-03-12T13:15:43Z</dc:date>
    </item>
    <item>
      <title>I would not recommend doing</title>
      <link>https://community.cisco.com/t5/network-security/ssl-policy-question/m-p/3032973#M1017433</link>
      <description>&lt;P&gt;I would not recommend doing SSL decryption with the ASA Firepower devices as this reduces the performance by 30-40% at a minimum. The ASA hardware was not built for such heavy processing - especially lower end models. You should really look at doing SSL decryption on a separate box capable of handling the traffic processing. And no, SSL is not offloaded to the FMC for decryption.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 23:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-policy-question/m-p/3032973#M1017433</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-20T23:47:56Z</dc:date>
    </item>
  </channel>
</rss>

