<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD decryption TLS 1.3 - Flushing certificates in cache in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5150241#M1114599</link>
    <description>&lt;P&gt;Your best course of action is to either open a Cisco TAC case or contact your Cisco account manager. I know this is not helpful but thats the only way to get their attention on this matter. &lt;/P&gt;</description>
    <pubDate>Wed, 24 Jul 2024 20:28:26 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2024-07-24T20:28:26Z</dc:date>
    <item>
      <title>FTD decryption TLS 1.3 - Flushing certificates in cache</title>
      <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5149789#M1114558</link>
      <description>&lt;P&gt;On FTD, with TLS decryption enabled, "&lt;EM&gt;the managed device caches server certificate data, which allows faster handshake processing in subsequent sessions that use the same certificate&lt;/EM&gt;" (&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/730/management-center-device-config-73/encrypted-traffic-overview.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/730/management-center-device-config-73/encrypted-traffic-overview.html&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;"&lt;EM&gt;A cached TLS server's certificate is available to all Snort instances on a particular&amp;nbsp;&lt;SPAN class="ph"&gt;threat defense&lt;/SPAN&gt;.&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;The cache can be cleared with a CLI command&lt;/STRONG&gt; and is automatically cleared when the device is rebooted.&lt;/EM&gt;"&amp;nbsp; (&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/730/management-center-device-config-73/decryption-policies.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/730/management-center-device-config-73/decryption-policies.html&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;However, the doc doesn't mention which command to use to flush the certificates accumulated in cache by the FTD SSL decryption process.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would it be:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;clear crypto ca trustpool&lt;/FONT&gt;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&lt;FONT face="courier new,courier"&gt;crypto ca trustpool remove&lt;/FONT&gt;&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 11:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5149789#M1114558</guid>
      <dc:creator>cpaquet</dc:creator>
      <dc:date>2024-07-24T11:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTD decryption TLS 1.3 - Flushing certificates in cache</title>
      <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5149951#M1114567</link>
      <description>&lt;P&gt;Regarding the SSL/TLS server certificate cache on Firepower Threat Defense (FTD) devices with TLS decryption enabled. You're correct that the documentation mentions the ability to clear this cache but doesn't specify the exact command to do so. Based on the current documentation and available FTD commands, there isn't a straightforward, documented method to manually clear this cache. The commands you mentioned (clear crypto ca trustpool and crypto ca trustpool remove) are related to the certificate trustpool and not to this specific SSL decryption cache. Given this situation, here are the current options and recommendations:&lt;/P&gt;
&lt;P&gt;Automatic clearing: As mentioned in the documentation, the cache is automatically cleared when the device is rebooted. This is the only confirmed method of clearing the cache.&lt;BR /&gt;Policy redeployment: While not guaranteed, redeploying the SSL policy from Firepower Management Center (FMC) might potentially refresh the certificate cache.&lt;BR /&gt;Natural expiration: The cache likely has some form of expiration or rotation mechanism, though details on this are not provided in the public documentation.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 13:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5149951#M1114567</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-07-24T13:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD decryption TLS 1.3 - Flushing certificates in cache</title>
      <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5150213#M1114594</link>
      <description>&lt;P&gt;Thanks Sheraz for your thorough answer.&lt;/P&gt;
&lt;P&gt;Anyone knows how to get Cisco (the firewall Business Unit I guess) amend the FTD documentation by either adding the command (if such command exists) or by removing the phrase in the doc that says that a command exist for flushing certs acquired during SSL decryption?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 19:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5150213#M1114594</guid>
      <dc:creator>cpaquet</dc:creator>
      <dc:date>2024-07-24T19:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD decryption TLS 1.3 - Flushing certificates in cache</title>
      <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5150241#M1114599</link>
      <description>&lt;P&gt;Your best course of action is to either open a Cisco TAC case or contact your Cisco account manager. I know this is not helpful but thats the only way to get their attention on this matter. &lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 20:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5150241#M1114599</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-07-24T20:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD decryption TLS 1.3 - Flushing certificates in cache</title>
      <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5152454#M1114695</link>
      <description>&lt;P&gt;you can see some info about SSL policy&amp;nbsp;&lt;BR /&gt;in FTD &amp;gt;&amp;nbsp;&lt;BR /&gt;run this command&amp;nbsp;&lt;BR /&gt;ftd &amp;gt; system support ssl-? &amp;lt;&amp;lt;- this will give you alot option to see SSL statistic&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 13:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5152454#M1114695</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-28T13:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD decryption TLS 1.3 - Flushing certificates in cache</title>
      <link>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5156637#M1114913</link>
      <description>&lt;P&gt;&amp;gt; system support ssl-cache-clear all&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 19:36:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-decryption-tls-1-3-flushing-certificates-in-cache/m-p/5156637#M1114913</guid>
      <dc:creator>bcoverstone</dc:creator>
      <dc:date>2024-08-06T19:36:30Z</dc:date>
    </item>
  </channel>
</rss>

