<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Clark, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899691#M1030839</link>
    <description>&lt;P&gt;Hi Clark,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes if the url is not blocked by either SI or URL filtering or malware based DNS signatures , the connection will be allowed.&lt;/P&gt;
&lt;P&gt;SSL decryption should not be enabled for all the traffic. It does have performance impact on firepower. Almost 80% reduction in throughput so use it only for specific traffic and also depends on what model you use.&lt;/P&gt;
&lt;P&gt;Use URL filtering and SI to block most of the malware categories.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200202-Configuration-of-an-SSL-Inspection-Polic.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
    <pubDate>Tue, 10 May 2016 17:36:46 GMT</pubDate>
    <dc:creator>yogdhanu</dc:creator>
    <dc:date>2016-05-10T17:36:46Z</dc:date>
    <item>
      <title>SSL Encrytped packets</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899688#M1030836</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;I have some question below please answer,&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;firepower does antivirus blocking ??&lt;/LI&gt;
&lt;LI&gt;do&amp;nbsp;https/ssl&amp;nbsp;packets are inspected by firepower&amp;nbsp;IPS without ssl policy enabled, if anybody is sending a encrypted packets with virus or spyware are they will blocked by ips rules ??&lt;/LI&gt;
&lt;LI&gt;if a file is downloaded by the https:// site which is encrypted and contains&amp;nbsp;malware&amp;nbsp;such types of malware affected files will be blocked&amp;nbsp;by malware file policy??&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899688#M1030836</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2019-03-12T13:00:34Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899689#M1030837</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;Yes firepower does anti-virus blocking using IPS signatures.&lt;/P&gt;
&lt;P&gt;&amp;gt;All the traffic is inspected by firepower if configured. its just that encrypted content will be inspected but firepower ( or any other device for that matter) won't be able to see anything in there without decryption it. If there is virus which is encrypted and there is no SSL policy , its likely to pass.&lt;/P&gt;
&lt;P&gt;&amp;gt;Again the same answer if the download is using encrypted method and there is no SSL policy to decrypt the traffic , file will pass.&lt;/P&gt;
&lt;P&gt;Please also note there are some websites which are https but when files are downloaded , they are server over regular http connection which firepower would be able to see and take action. But if its encrypted connection then SSL policy is required.&lt;/P&gt;
&lt;P&gt;Rate if helps.&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 16:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899689#M1030837</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-10T16:25:46Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899690#M1030838</link>
      <description>&lt;P&gt;Dear yogdhanu,&lt;/P&gt;
&lt;P&gt;thanks for the replies&lt;/P&gt;
&lt;P&gt;So from your replies what I understand is most of the urls&amp;nbsp;on the internet&amp;nbsp;are https and&amp;nbsp;most of the user is accessing the https url on the internet so without SSL policy&amp;nbsp;enabled their traffic is passed and if they&amp;nbsp;try to access a&amp;nbsp;HTTPS urls which is malicious website then It will&amp;nbsp;open the webpage&amp;nbsp; which can affect&amp;nbsp;my PC, if that URL is&amp;nbsp;not&amp;nbsp;identified by security intelligence. Please correct me if I m wrong.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I enable a SSL decryption what will be impact on the performance ??? &amp;nbsp;and as per design perspective&amp;nbsp;which SSL traffic should be decrypted if&amp;nbsp;i decrypt every internet traffic (https) it will affect the performance of the firepower ???? and it is good design ???&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 17:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899690#M1030838</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-05-10T17:20:24Z</dc:date>
    </item>
    <item>
      <title>Hi Clark,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899691#M1030839</link>
      <description>&lt;P&gt;Hi Clark,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes if the url is not blocked by either SI or URL filtering or malware based DNS signatures , the connection will be allowed.&lt;/P&gt;
&lt;P&gt;SSL decryption should not be enabled for all the traffic. It does have performance impact on firepower. Almost 80% reduction in throughput so use it only for specific traffic and also depends on what model you use.&lt;/P&gt;
&lt;P&gt;Use URL filtering and SI to block most of the malware categories.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200202-Configuration-of-an-SSL-Inspection-Polic.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 17:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899691#M1030839</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-10T17:36:46Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899692#M1030840</link>
      <description>&lt;P&gt;Dear yogdhanu,&lt;/P&gt;
&lt;P&gt;I have ASA 5525-X with firepower SSD, I was planning to use ssl decryption &amp;nbsp;for the below please suggest on which I should enabled.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;SSL decryption for users internet traffic&lt;/LI&gt;
&lt;LI&gt;Outlook Web Access server (OWA)&amp;nbsp;which is access from outside for the corporate users it I will be use when the users will upload a attachment to the OWA server so that it will be decrypted scanned and uploaded to the server, is it make sense. ???&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;apart from the above any suggestion that can be a best practice from cisco.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 19:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899692#M1030840</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-05-10T19:53:53Z</dc:date>
    </item>
    <item>
      <title>Hi Clark,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899693#M1030841</link>
      <description>&lt;P&gt;Hi Clark,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would suggest to enable SSL in a phased manner so you know what effect it has on your network.&lt;/P&gt;
&lt;P&gt;Enable the ssl on OWA traffic for a start and monitor the performance.&lt;/P&gt;
&lt;P&gt;If there is encrypted backup which does not need to be inspected , bypass it from firepower or create a trust rule to save resources.&lt;/P&gt;
&lt;P&gt;If all goes fine and there is no high CPU or memory alerts , then enable SSL for user traffic as well and monitor.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2016 04:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899693#M1030841</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-11T04:27:46Z</dc:date>
    </item>
    <item>
      <title>Hi Yogesh,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899694#M1030842</link>
      <description>&lt;P&gt;Hi Yogesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can we share with us, what usually do you configure on your ssl policy? Do you enable for all HTTPS traffic, or normally for application only, like OWA?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tks&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2016 01:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-encrytped-packets/m-p/2899694#M1030842</guid>
      <dc:creator>crusier2015</dc:creator>
      <dc:date>2016-11-17T01:58:25Z</dc:date>
    </item>
  </channel>
</rss>

