<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;TLS Server Identity Discovery&amp;quot; and &amp;quot;Encrypted Visi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4784297#M1098248</link>
    <description>&lt;P&gt;Thanks. But is "TLS Server Identity Discovery" supported for the FTD running in transparent mode with interface inline pair (no tap)?&lt;/P&gt;</description>
    <pubDate>Tue, 28 Feb 2023 18:16:47 GMT</pubDate>
    <dc:creator>SIMMN</dc:creator>
    <dc:date>2023-02-28T18:16:47Z</dc:date>
    <item>
      <title>"TLS Server Identity Discovery" and "Encrypted Visibility Engine"</title>
      <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4777684#M1097926</link>
      <description>&lt;P&gt;A quick validation question: Will Enabling and Deploying "TLS Server Identity Discovery" and/or "Encrypted Visibility Engine" features in FMC/FTD be impactful for data traffic?&lt;/P&gt;
&lt;P&gt;Will it matter if the FTD is in routed or transparent mode?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 21:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4777684#M1097926</guid>
      <dc:creator>SIMMN</dc:creator>
      <dc:date>2023-02-17T21:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: "TLS Server Identity Discovery" and "Encrypted Visibility Engine"</title>
      <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4784277#M1098246</link>
      <description>&lt;P&gt;Hello ,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;TLS Server Identity Discovery&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The latest version of the Transport Layer Security (TLS) protocol 1.3, defined by &lt;A href="https://tools.ietf.org/html/rfc8446" target="_blank"&gt;RFC 8446&lt;/A&gt;, is the preferred protocol for many web servers to provide secure communications. Because the TLS 1.3 protocol encrypts the server's certificate for additional security, and the certificate is needed to match application and URL filtering criteria in access control rules, the Firepower System provides a way to extract the server certificate &lt;I&gt;without&lt;/I&gt; decrypting the entire packet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can enable this feature, referred to as &lt;I&gt;TLS server identity discovery&lt;/I&gt;, when you either:&lt;/P&gt;
&lt;P&gt;Associate an SSL policy with an access control policy&lt;/P&gt;
&lt;P&gt;Configure advanced settings for an access control policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;**Because the certificate is decrypted, TLS server identity discovery can reduce performance depending on the hardware platform.&lt;/P&gt;
&lt;P&gt;** TLS server identity discovery is not supported in inline tap mode or passive mode deployments.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Encrypted Visibility Engine&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(56,66,72);font-size:15px;"&gt;EVE is a new means of identifying client applications and processes utilizing TLS encryption. It enables visibility and allows administrators to take actions and enforce policy within their environments. EVE works by fingerprinting the Client Hello packet in the TLS handshake. By identifying specific application fingerprints in TLS session establishment, the system can identify the client process and take appropriate action (allow/block).&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ref : &lt;A href="https://secure.cisco.com/secure-firewall/docs/encrypted-visibility-engine" target="_blank"&gt;https://secure.cisco.com/secure-firewall/docs/encrypted-visibility-engine&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Deployment&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;The GUI page lists the devices with out-of-date configurations having the pending status.&lt;/P&gt;
&lt;P&gt;The &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Inspect Interruption&lt;/STRONG&gt;&lt;/SPAN&gt; column indicates if traffic inspection interruption may be caused in the device during deployment.&lt;/P&gt;
&lt;P&gt;See &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/policy_management.html#id_65425" target="_blank"&gt;Restart Warnings for the FTD Devices&lt;/A&gt; for information to help you identify configurations that interrupt traffic inspection and might interrupt traffic when deployed to FTD devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the entry is blank in this column for a device, then it indicates that there will be no traffic inspection interruptions on that device during deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For both the features you can check the deployment details to make sure traffic interruption is not caused.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;-----------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;If you find my reply solved your question or issue, kindly click the 'Accept as Solution' button and vote it as helpful.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;You can also learn more about Secure Firewall (formerly known as NGFW) through our live Ask the Experts (ATXs) session. Check out Cisco Network Security ATXs Resources [&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493&lt;/A&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;-----------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;
&lt;P&gt;Divya Jain&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 17:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4784277#M1098246</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2023-02-28T17:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: "TLS Server Identity Discovery" and "Encrypted Visi</title>
      <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4784297#M1098248</link>
      <description>&lt;P&gt;Thanks. But is "TLS Server Identity Discovery" supported for the FTD running in transparent mode with interface inline pair (no tap)?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 18:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4784297#M1098248</guid>
      <dc:creator>SIMMN</dc:creator>
      <dc:date>2023-02-28T18:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: "TLS Server Identity Discovery" and "Encrypted Visi</title>
      <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4788436#M1098418</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;TLS server identity discovery is not supported in inline tap mode or passive mode deployments.&lt;BR /&gt;ref link : &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/getting_started_with_access_control_policies.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/getting_started_with_access_control_policies.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Divya Jain&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 07:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4788436#M1098418</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2023-03-07T07:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: "TLS Server Identity Discovery" and "Encrypted Visi</title>
      <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4863768#M1102089</link>
      <description>&lt;P&gt;I don't use SSL policy. So I am wondering If i disable this feature, would that impact the URL categorization ?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 10:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/4863768#M1102089</guid>
      <dc:creator>AminRamadan</dc:creator>
      <dc:date>2023-06-28T10:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: "TLS Server Identity Discovery" and "Encrypted Visi</title>
      <link>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/5254645#M1119212</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;TLS Server Identity Discovery&lt;/EM&gt; can have a painful effect until the&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwj82736?rfs=qvlogin" target="_self"&gt;TLS 1.3 Hybridized Kyber Support bug&lt;/A&gt; is resolved in FTD.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;See&amp;nbsp;&lt;A href="http://tldr.fail" target="_self"&gt;tldr.fail&lt;/A&gt;&amp;nbsp;page.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 09:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-tls-server-identity-discovery-quot-and-quot-encrypted/m-p/5254645#M1119212</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2025-01-30T09:18:55Z</dc:date>
    </item>
  </channel>
</rss>

