<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD/FMC SSL Decrypt Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458366#M1083269</link>
    <description>&lt;P&gt;I kinda wondered about that.&amp;nbsp; Was just trying to make it so I didn't have to worry about having a PKI environment to do the testing.&amp;nbsp; THanks!!!&lt;/P&gt;</description>
    <pubDate>Wed, 01 Sep 2021 16:20:31 GMT</pubDate>
    <dc:creator>stamperbrian</dc:creator>
    <dc:date>2021-09-01T16:20:31Z</dc:date>
    <item>
      <title>FTD/FMC SSL Decrypt Issue</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458346#M1083267</link>
      <description>&lt;P&gt;I am doing some testing in a lab environment with the SSL Decryption.&amp;nbsp; Because its lab and I don't have an internal CA that the machines trust I ended up using a public signed certificate so all the clients would trust it.&amp;nbsp; The FTD appears to be doing the re-assign just fine.&amp;nbsp; However, every site I go to in any browser I get NET:ERR_CERT_INVALID.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.nfl.com" target="_blank" rel="noopener"&gt;www.nfl.com&lt;/A&gt;&amp;nbsp;normally uses encryption to protect your information.&amp;nbsp; When Microsoft Edge tried to connect to &lt;A href="http://www.nfl.com" target="_blank" rel="noopener"&gt;www.nfl.com&lt;/A&gt;&amp;nbsp;this time, the website sent back unusual and incorrect credentials....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WHen I look at the certs in the browser:&lt;/P&gt;&lt;P&gt;I see my public cert that I put in and it states:&lt;/P&gt;&lt;P&gt;This certificate does not appear to be valid for the selected purpose.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rest of the cert path is fine and in tact/trusted.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm probably trying to do something that doesn't work at all but figured it shouldn't matter what cert I use to resign with as long as the client machines trust it?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 15:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458346#M1083267</guid>
      <dc:creator>stamperbrian</dc:creator>
      <dc:date>2021-09-01T15:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC SSL Decrypt Issue</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458365#M1083268</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/369402"&gt;@stamperbrian&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using a Public signed certificate, then that won't work. For SSL decryption you'll need a CA certficate which can re-sign certificates on the fly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once configured and SSL decryption is working correctly, when you checked the certificate issued to a site, you'd see it was issued by your CA rather than the actual public CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A public CA that signed your identity certificate is not going to give you a CA certificate, otherwise you'd be able to spoof any domain. You'd need to use an Internal CA (i.e Microsoft Windows Server CA).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/623/fdm/fptd-fdm-config-guide-623/fptd-fdm-certificates.html" target="_self"&gt;this link&lt;/A&gt; for certificate types by feature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And &lt;A href="https://integratingit.wordpress.com/2019/02/16/firepower-ssl-decryption/" target="_self"&gt;this link&lt;/A&gt; to use Microsoft CA to issue the CA certificate to FMC for SSL decryption.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 16:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458365#M1083268</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T16:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC SSL Decrypt Issue</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458366#M1083269</link>
      <description>&lt;P&gt;I kinda wondered about that.&amp;nbsp; Was just trying to make it so I didn't have to worry about having a PKI environment to do the testing.&amp;nbsp; THanks!!!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 16:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ssl-decrypt-issue/m-p/4458366#M1083269</guid>
      <dc:creator>stamperbrian</dc:creator>
      <dc:date>2021-09-01T16:20:31Z</dc:date>
    </item>
  </channel>
</rss>

