<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure FMC Policy Trace SSL Decryption? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5151264#M1114647</link>
    <description>&lt;P&gt;I do have a TAC case open. I was able to demonstrate the problem with the Unified Event viewer missing log data. Connection Events and Syslog data are fine. At the moment not depending on Unified Events viewer for troubleshooting.&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jul 2024 19:02:56 GMT</pubDate>
    <dc:creator>davparker</dc:creator>
    <dc:date>2024-07-25T19:02:56Z</dc:date>
    <item>
      <title>Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5141545#M1114105</link>
      <description>&lt;P&gt;I've got a weird issue. Per policy, I've got a list of categories/URLs for web sites to do not decrypt. In my SSL Policy I created rules for each classification so I can track which rule gets hit for DND. Every rule has logging enabled, even the Default action, do not decrypt. I test a web site from each category/rule to be sure it gets hit properly. I monitor using the Unified Events viewer. Some web sites never log the connection. Example, &lt;A href="http://www.sed.gov" target="_blank"&gt;https://www.sec.gov&lt;/A&gt; never gets logged even though it is in a Gov't Law category. I'm not sure why none of the rules log the traffic, even the default rule, I was hoping I could figure out a method to policy trace the traffic flow to see which SSL Decryption rule applies. I tried packet-tracer but it doesn't seem to include this section of flow. Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks - David&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 16:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5141545#M1114105</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-08T16:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5141945#M1114128</link>
      <description>&lt;P&gt;You could try "system support firewall-engine-debug". Run that with the source and destination specified to see details on how the ACP and associated policies (IPS, SSL decrypt etc.) are handling a given flow.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214577-firepower-data-path-troubleshooting-phas.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214577-firepower-data-path-troubleshooting-phas.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2024 07:33:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5141945#M1114128</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-07-09T07:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143092#M1114186</link>
      <description>&lt;P&gt;Thanks, I may try that. Still trying to wrap my head around TLS1.3 and certificate pinning. Seems like all the missing log entries are for sites using TLS1.3 encryption. But I do see entries for some TLS 1.3 sites. I'm at 7.2x. I was reading that 7.3x has much improved EVE. That, and I very much like the fact you can save filters in the Unified Event Viewer.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 20:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143092#M1114186</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-10T20:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143147#M1114188</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I try help here I dont have a lot ack&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tls 1.2 send sni not crypt and hence ftd can read it and hence run ssl policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tls 1.3 send sni encrypt so ONLY snort 3 and after you enable tls 1.3 decrypt option in advance tab of ssl policy after that ftd can read sni and run ssl policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 22:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143147#M1114188</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-10T22:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143173#M1114190</link>
      <description>&lt;P&gt;Thanks, yes, I do have that option set.I also have TLS Server Identity Discovery enabled on the ACP.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 00:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143173#M1114190</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-11T00:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143650#M1114218</link>
      <description>&lt;P&gt;I'm beginning to suspect that the SSL Decrypt connection event log entries are generated for the first lookup but not subsequent requests. I had a test URL for DND I hadn't tried yet for the Federal Reserve. The first time I tried the URL it showed up in the connection log, including embedded URLs, and was decrypted, even though I had an SSL rule to DND with a wildcard DN specifying *.federalreserve.gov. Susbsequent visits to the site showed no log entries whatsoever, including those embedded URLs. Makes it tough to t-shoot an SSL Decryption policy without a full on debug.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 14:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5143650#M1114218</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-11T14:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5144192#M1114247</link>
      <description>&lt;P&gt;I'm starting to lean towards this problem being a logging issue. Our FMC is an an external data center. I've git a TAC case open.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 13:14:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5144192#M1114247</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-12T13:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5144282#M1114249</link>
      <description>&lt;P&gt;Still waiting on TAC but I can confirm I see the log entries on a syslog server. I then checked the Connections Events log and can see the events logged there. The Unified Events viewer seems to be the problem.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 14:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5144282#M1114249</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-12T14:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5151264#M1114647</link>
      <description>&lt;P&gt;I do have a TAC case open. I was able to demonstrate the problem with the Unified Event viewer missing log data. Connection Events and Syslog data are fine. At the moment not depending on Unified Events viewer for troubleshooting.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 19:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5151264#M1114647</guid>
      <dc:creator>davparker</dc:creator>
      <dc:date>2024-07-25T19:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FMC Policy Trace SSL Decryption?</title>
      <link>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5151273#M1114650</link>
      <description>&lt;P&gt;thanks a lot for update us&lt;/P&gt;
&lt;P&gt;have a nice summer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 19:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-fmc-policy-trace-ssl-decryption/m-p/5151273#M1114650</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-25T19:12:42Z</dc:date>
    </item>
  </channel>
</rss>

