<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA firepower SSL decryption rule behavior not as expected in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption-rule-behavior-not-as-expected/m-p/4538160#M1086739</link>
    <description>&lt;P&gt;Update:&amp;nbsp; even when using a pre-filter fastpath rule for the Java16 host the SSL traffic to this machine breaks.&amp;nbsp; Looks like I will have to open a TAC case.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jan 2022 13:40:35 GMT</pubDate>
    <dc:creator>tato386</dc:creator>
    <dc:date>2022-01-25T13:40:35Z</dc:date>
    <item>
      <title>ASA firepower SSL decryption rule behavior not as expected</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption-rule-behavior-not-as-expected/m-p/4536133#M1086669</link>
      <description>&lt;P&gt;I have several servers that use the same wildcard cert so I created a network group object that includes all these servers.&amp;nbsp; In the SSL policy I reference the group object in a "decrypt - known key" rule.&amp;nbsp; &amp;nbsp;This worked pretty well until one of the servers was upgraded to Java 16.&amp;nbsp; ASA firepower decryption does not seem to work on Java 16 and SSL connections to this server broke.&amp;nbsp; So I thought I would just pull that host from the group until the Java 16 issue was resolved but the decryption rule kept breaking the traffic to the Java 16 server.&amp;nbsp; The I added a rule specifically for this server with "do not decrypt" and it still breaks traffic.&amp;nbsp; I ended up having to remove the SSL policy from the ACP.&amp;nbsp; So why is the firepower still messing with this flow if the destination does not match any rule and/or the matching rule is a "do not decrypt' rule?&amp;nbsp; Please see attachments for SSL policy and events associated with the issue&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 22:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption-rule-behavior-not-as-expected/m-p/4536133#M1086669</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2022-01-21T22:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firepower SSL decryption rule behavior not as expected</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption-rule-behavior-not-as-expected/m-p/4538160#M1086739</link>
      <description>&lt;P&gt;Update:&amp;nbsp; even when using a pre-filter fastpath rule for the Java16 host the SSL traffic to this machine breaks.&amp;nbsp; Looks like I will have to open a TAC case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 13:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption-rule-behavior-not-as-expected/m-p/4538160#M1086739</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2022-01-25T13:40:35Z</dc:date>
    </item>
  </channel>
</rss>

