<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Which Cert For IPS? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188591#M1040611</link>
    <description>&lt;P&gt;You will need to provide the IPS the certificates and private keys used on each of the servers in order to decrypt, inspect and resign the traffic. Of course if they are using a single certificate with SANs or a wildcard certificate then you would need only that one certificate and key pair.&lt;/P&gt;</description>
    <pubDate>Sun, 24 Sep 2017 08:51:30 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-09-24T08:51:30Z</dc:date>
    <item>
      <title>Which Cert For IPS?</title>
      <link>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188585#M1040610</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;We have a requirement to provide IPS services on a HA pair of 4100 series FTDs. Specifically there is one flow we need this for. Two clients (servers) need to talk to four servers. The end-to-end path is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients &amp;gt; FTD/IPS &amp;gt; F5 load balancer &amp;gt; Servers&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The F5 in this scenario will not perform any SSL offload but will simply provide a VIP and load balance the request to one of the four servers. The SSL handshake will take place directly between the client and server.&lt;/P&gt;&lt;P&gt;I have zero experience with the FTD product so excuse my ignorance. The question I have is that I understand I need to provide the FTD with the private key of the server in order for it to be able to decrypt the flow and run it through the SNORT engine; which private key in this situation do I provide? All four? One bundled?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:21:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188585#M1040610</guid>
      <dc:creator>Devlin Thornicroft</dc:creator>
      <dc:date>2020-02-21T14:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: Which Cert For IPS?</title>
      <link>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188591#M1040611</link>
      <description>&lt;P&gt;You will need to provide the IPS the certificates and private keys used on each of the servers in order to decrypt, inspect and resign the traffic. Of course if they are using a single certificate with SANs or a wildcard certificate then you would need only that one certificate and key pair.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 08:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188591#M1040611</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-24T08:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Which Cert For IPS?</title>
      <link>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188598#M1040612</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the swift &amp;amp; clear&amp;nbsp;response. This has given me food for thought. The SAN method in particular is a nifty little suggestion which I will ask the customer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A further question - if they come back say we can't use a SAN certificate, each server must use a unique cert, is it fairly straightforward to create an IPS policy that utilises more than one cert/key?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 09:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188598#M1040612</guid>
      <dc:creator>Devlin Thornicroft</dc:creator>
      <dc:date>2017-09-24T09:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Which Cert For IPS?</title>
      <link>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188607#M1040613</link>
      <description>&lt;P&gt;Yes - technically it's an SSL Policy which is called out in an Access Control Policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While I havent had a use case to do so myself, I know you can select and add multiple certificates in a given SSL policy.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 10:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188607#M1040613</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-24T10:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Which Cert For IPS?</title>
      <link>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188622#M1040615</link>
      <description>&lt;P&gt;Brill,&amp;nbsp;thank you Marvin. I'll search that function out now.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2017 13:03:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/which-cert-for-ips/m-p/3188622#M1040615</guid>
      <dc:creator>Devlin Thornicroft</dc:creator>
      <dc:date>2017-09-24T13:03:12Z</dc:date>
    </item>
  </channel>
</rss>

