<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can firewalls inspect the payload of a packet with HTTPs? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263468#M1119706</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - FYI :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-ssl-decryption.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-ssl-decryption.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2025 11:58:17 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2025-02-21T11:58:17Z</dc:date>
    <item>
      <title>How can firewalls inspect the payload of a packet with HTTPs?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263463#M1119705</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A lot of resources say that firewalls can read more than just the traditional L3&lt;/SPAN&gt;&lt;SPAN&gt;/L4 headers&lt;/SPAN&gt;&lt;SPAN&gt;. They mention that they can read the L7 data and the payload itself&lt;/SPAN&gt;&lt;SPAN&gt;. My question is&lt;/SPAN&gt;&lt;SPAN&gt;, how exactly is this accomplished if the protocol that&lt;/SPAN&gt;&lt;SPAN&gt;'s being used is HTTPs&lt;/SPAN&gt;&lt;SPAN&gt;? This means that the payload and the L7 data are encrypted, so the firewall shouldn't be able to decrypt it, or is there a workaround to this?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 11:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263463#M1119705</guid>
      <dc:creator>Mitrixsen</dc:creator>
      <dc:date>2025-02-21T11:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: How can firewalls inspect the payload of a packet with HTTPs?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263468#M1119706</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - FYI :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-ssl-decryption.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-ssl-decryption.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 11:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263468#M1119706</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-02-21T11:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: How can firewalls inspect the payload of a packet with HTTPs?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263476#M1119707</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1297969"&gt;@Mitrixsen&lt;/a&gt;&amp;nbsp;hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;there is many methods used by different vendors.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cisco have ETA -&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-eta-feature-encrypted-traffic-analysis-at-glance/ta-p/4783197" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-eta-feature-encrypted-traffic-analysis-at-glance/ta-p/4783197&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;generally all firewalls which support SSL inspection, do decrypt and re-encrypt the packet to inspect content flowing through the firewalls.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 12:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263476#M1119707</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2025-02-21T12:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: How can firewalls inspect the payload of a packet with HTTPs?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263486#M1119708</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1297969"&gt;@Mitrixsen&lt;/a&gt; aside from the SSL decryption that has already been mentioned. The FTD software image (not ASA) supports EVE (Encrypted Visibility Engine), which works by fingerprinting the Client Hello packet in the TLS handshake and does not need to implement full main-in-the-middle (MITM) decryption. EVE uses the fingerprints to identify thousands of applicationts and even known malicious processes and can also be used to identify and stop malware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/v7.2/docs/encrypted-visibility-engine" target="_blank"&gt;https://secure.cisco.com/secure-firewall/v7.2/docs/encrypted-visibility-engine&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 12:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263486#M1119708</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-21T12:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: How can firewalls inspect the payload of a packet with HTTPs?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263493#M1119709</link>
      <description>&lt;P&gt;David,&lt;/P&gt;
&lt;P&gt;Modern firewalls can inspect L7 data, even in encrypted HTTPS traffic, through methods like SSL/TLS interception (Man in the Middle), which allows them to decrypt and inspect encrypted payloads. This process involves the firewall acting as a "man in the midle" between the client and server. It installs a trusted root certificate on the client, enabling it to decrypt traffic from the client, inspect the content, and then re-encrypt the traffic before forwarding it to the server. This way, the firewall can analyze the application layer data, detect threats, and apply policies based on the content of the encrypted traffic.&lt;/P&gt;
&lt;P&gt;Another technique is SNI inspection, which allows firewalls to inspect the hostname in the TLS handshake without fully decrypting the payload. This is useful for making decisions based on destination URLs or blocking specific sites, even in encrypted sessions. While SSL/TLS interception is the most comprehensive method, it requires careful management of certificates and can introduce privacy concerns since the firewall can decrypt all traffic unless protections like perfect forward secrecy are in place...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 12:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-firewalls-inspect-the-payload-of-a-packet-with-https/m-p/5263493#M1119709</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2025-02-21T12:51:07Z</dc:date>
    </item>
  </channel>
</rss>

