<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Marvin, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523854#M206405</link>
    <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Have you heard any work yet for SSL decryption on the ASA's yet.&amp;nbsp; I still can't find anything on it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Austin&lt;/P&gt;</description>
    <pubDate>Fri, 13 Nov 2015 15:15:51 GMT</pubDate>
    <dc:creator>Austin Clark</dc:creator>
    <dc:date>2015-11-13T15:15:51Z</dc:date>
    <item>
      <title>ASA Firepower ssl decryption</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523827#M206369</link>
      <description>&lt;P&gt;hi everyone&lt;/P&gt;&lt;P&gt;is Firepower support ssl decryption or should have&amp;nbsp;sourcefire beside ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523827#M206369</guid>
      <dc:creator>Vahid Tavajjohi</dc:creator>
      <dc:date>2019-03-12T04:52:16Z</dc:date>
    </item>
    <item>
      <title>I believe if you want to</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523828#M206370</link>
      <description>&lt;P&gt;I believe if you want to inspect SSL (https) traffic, you will still need to use an SSL decryption appliance.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2014 11:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523828#M206370</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-10-07T11:42:08Z</dc:date>
    </item>
    <item>
      <title>thanks Marvinif i use ASA CX</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523829#M206371</link>
      <description>&lt;P&gt;thanks Marvin&lt;/P&gt;&lt;P&gt;if i&amp;nbsp;use ASA CX with ssd Drives, then i dont need to ssl decryption appliance?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2014 12:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523829#M206371</guid>
      <dc:creator>Vahid Tavajjohi</dc:creator>
      <dc:date>2014-10-07T12:18:38Z</dc:date>
    </item>
    <item>
      <title>That's true. The CX can do on</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523830#M206372</link>
      <description>&lt;P&gt;That's true. The CX can do on-board decryption (albeit at a lower throughput rate than the&amp;nbsp;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;SSL decryption appliance). &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;Also, the WSE and AVC inspection services&amp;nbsp;are not quite as mature and doing a thorough a job as the FirePOWER products.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2014 23:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523830#M206372</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-10-07T23:49:36Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,Can you help me to</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523831#M206373</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Can you help me to understand the Cisco offering which provides Firepower services (threat prevention) and the ability to inspect encrypted data streams. Ideally on a single platform.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 22:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523831#M206373</guid>
      <dc:creator>dylan.webb</dc:creator>
      <dc:date>2015-01-07T22:58:59Z</dc:date>
    </item>
    <item>
      <title>As of the current FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523832#M206374</link>
      <description>&lt;P&gt;As of the current FirePOWER software (Release 5.3.1), onboard SSL decryption for inspection of traffic is not supported. I've heard it may be coming in 5.4 (possibly later this quarter) but that's not yet available. When is is available, it will have a performance cost since line rate SSL decryption is computationally intensive.&lt;/P&gt;&lt;P&gt;So for now you would have to use a &lt;A href="http://www.cisco.com/c/en/us/products/security/ssl-appliances/models-comparison.html"&gt;Cisco&amp;nbsp;SSL appliance&lt;/A&gt;. They have purpose-built hardware for SSL decryption.&lt;/P&gt;&lt;P&gt;In either case, the inline device that's opening and inspecting the SSL traffic would need to have a special certificate that's allowed to issue child certificates and be trusted by all your clients. That typically means you need to have (or establish) an Enterprise PKI.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2015 00:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523832#M206374</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-01-08T00:28:53Z</dc:date>
    </item>
    <item>
      <title>Hi Dylan, at the moment,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523833#M206375</link>
      <description>&lt;P&gt;Hi Dylan, at the moment, there isn't a Cisco with FirePOWER offering that provides ssl decryption on the same box. That is true weather you get the FirePOWER for ASA or the standalone FirePOWER appliances. Both solutions would require a separate, dedicated SSL decryption appliance:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.sourcefire.com/products/next-generation-network-security"&gt;http://www.sourcefire.com/products/next-generation-network-security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I believe this will change in future releases of the Sourcefire but for now you will need a dedicated SSL appliance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2015 00:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523833#M206375</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-01-08T00:39:00Z</dc:date>
    </item>
    <item>
      <title>Like in case of CWSA,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523834#M206376</link>
      <description>&lt;P&gt;Like in case of CWSA, customer can upload their own certificate and private key or have the appliance generate itself or there is an option of CSR which can be signed by a root CA. Why not follow same model as CWSA? Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 13:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523834#M206376</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2015-08-01T13:47:35Z</dc:date>
    </item>
    <item>
      <title>It is the same model.The</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523835#M206377</link>
      <description>&lt;P&gt;It is the same model.&lt;/P&gt;&lt;P&gt;The enterprise PKI I mentioned is what the Root CA is part of. Public Root CAs will not issue certificates that can be used like a "man in the middle" which is how the WSA and FirePOWER appliance both are able to proxy your SSL sessions.&lt;/P&gt;&lt;P&gt;Most organizations who go to the trouble to deploy this do it with a full-fledged PKI rather than using the self-signed certificate the device is capable of generating as the enterprise approach provides&amp;nbsp;tools to manage a certificate-based infrastructure.&lt;/P&gt;&lt;P&gt;Update on my earlier post - 5.4 did introduce SSL decryption but only for the FirePOWER hardware appliance. The ASA FirePOWER (software) modules should be getting it in Version 6.0.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 14:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523835#M206377</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-01T14:25:17Z</dc:date>
    </item>
    <item>
      <title>Agreed, but most</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523836#M206378</link>
      <description>&lt;P&gt;Agreed, but most organizations are not wiling to pursuit PKI just for focus of ssl termination and inspection alone. The big motivators is UAM/IM technologies or setup.&lt;/P&gt;&lt;P&gt;You mentioned , root CA'S will not issues certificate to be used in MITM manner but what about option of CSR, can that be signed by CA external to organization and used there-after?&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 14:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523836#M206378</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2015-08-01T14:36:34Z</dc:date>
    </item>
    <item>
      <title>True most won't do it ONLY</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523837#M206379</link>
      <description>&lt;P&gt;True most won't do it ONLY for SSL inspection. But the ones who care enough about security to want to decrypt the SSL leaving the enterprise usually have other security initiatives such as the ones you mention so it's all related to the need for a&amp;nbsp;PKI.&lt;/P&gt;&lt;P&gt;Re CSRs, when a public CA issues a certificate, there are&amp;nbsp;various purposes that are assigned in the body of the certificate. Most commonly the purpose is "server". Less common options are "client", "S/MIME&amp;nbsp;signing" etc.&lt;/P&gt;&lt;P&gt;To represent itself as the end host you are trying to get to for SSL/TLS purposes, the certificate purpose must include the ability to do so. One issued by a public CA in response to your CSR will not have that ability.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 15:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523837#M206379</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-01T15:14:37Z</dc:date>
    </item>
    <item>
      <title>hi marvin,i'm currently</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523838#M206380</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;i'm currently evaluating CWS using an ASA connector. does this mean i can't block HTTPS website on a granular or application level basis? i was only able to block facebook on a domain name level (blacklist) only. i wasn't able to block facebook messenger and games.&lt;/P&gt;&lt;P&gt;the cisco security engineer told me to generate the CWS self-signed cert or do CSR with a third party CA in order to do HTTPS decryption and their proxy/scansafe server can do MITM proxy.&lt;/P&gt;&lt;P&gt;i'll be doing firewpower soon. is the same logic applied?&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 15:27:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523838#M206380</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-08-01T15:27:49Z</dc:date>
    </item>
    <item>
      <title>John, What about inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523839#M206381</link>
      <description>&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What about inspection is the connector outside the CWS or in one box? Who is responsible for layer 7 inspection, also can the same setup be used as incoming ssl decryption instead of outbound? thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 15:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523839#M206381</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2015-08-01T15:42:22Z</dc:date>
    </item>
    <item>
      <title>hi,i just set this up this</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523840#M206382</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i just set this up this week running on CWS eval license, so apologies as this is quite new to me.&lt;/P&gt;&lt;P&gt;what i did was, i've applied the service policy map (HTTP and HTTPS) on the 'inside' interface. below is a snippet of what i did. the ASA isn't on production yet and i have only 1 PC behind the inside interface.&lt;/P&gt;&lt;P&gt;what i want is to have granular control especially on SSL/TLS traffic and since most websites are running on HTTPS.&lt;/P&gt;&lt;P&gt;going back to my original question, do i need CA cert or PKI in this case?&lt;/P&gt;&lt;P&gt;# sh run scansafe&lt;BR /&gt;!&lt;BR /&gt;scansafe general-options&lt;BR /&gt;&amp;nbsp;server primary fqdn proxy2332.scansafe.net port 8080&lt;BR /&gt;&amp;nbsp;server backup fqdn access615.cws.sco.cisco.com port 8080&lt;BR /&gt;&amp;nbsp;retry-count 5&lt;BR /&gt;&amp;nbsp;license UqSGYa8xyWWqJ5x1 encrypted&lt;/P&gt;&lt;P&gt;# sh service-policy inspect scansafe&lt;/P&gt;&lt;P&gt;Global policy:&lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;/P&gt;&lt;P&gt;Interface inside:&lt;BR /&gt;&amp;nbsp; Service-policy: PMAP-WEBTRAFFIC&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: CMAP-HTTP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: scansafe HTTP-PMAP fail-open, packet 38799, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;Number of whitelisted connections: 0&lt;BR /&gt;Number of connections allowed without scansafe inspection because of "fail-open" config: 0&lt;BR /&gt;Number of connections dropped because of "fail-close" config: 0&lt;BR /&gt;Number of HTTP connections inspected: 626&lt;BR /&gt;Number of HTTPS connections inspected: 0&lt;BR /&gt;Number of HTTP connections dropped because of errors: 0&lt;BR /&gt;Number of HTTPS connections dropped because of errors: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: CMAP-HTTPS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: scansafe HTTPS-PMAP fail-open, packet 86686, lock fail 0, drop 80, reset-drop 240, v6-fail-close 0&lt;BR /&gt;Number of whitelisted connections: 0&lt;BR /&gt;Number of connections allowed without scansafe inspection because of "fail-open" config: 0&lt;BR /&gt;Number of connections dropped because of "fail-close" config: 0&lt;BR /&gt;Number of HTTP connections inspected: 0&lt;BR /&gt;Number of HTTPS connections inspected: 1658&lt;BR /&gt;Number of HTTP connections dropped because of errors: 0&lt;BR /&gt;Number of HTTPS connections dropped because of errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 15:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523840#M206382</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-08-01T15:55:06Z</dc:date>
    </item>
    <item>
      <title>You are great help.Really I</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523841#M206383</link>
      <description>You are great help.Really I wish there were more cooperating tech profoessionals like you.:)

On cisco docs it said WAS wouldn't not support "server cert" on appliance, only "root" it makes sense if setup is for outgoing connections for which there are far many ssl connection points, in my case I have only web server / application and concern is from clients coming externally should the server certificate option be more viable.</description>
      <pubDate>Sat, 01 Aug 2015 17:02:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523841#M206383</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2015-08-01T17:02:27Z</dc:date>
    </item>
    <item>
      <title>John,While the Scansafe</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523842#M206384</link>
      <description>&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;While the Scansafe product is a bit outside my primary area of expertise, it works similarly. The difference in this case is that the certificate(s)&amp;nbsp;the clients need to trust resides in Cisco's Scansafe "towers" (their cloud-based scanning complexes).&lt;/P&gt;&lt;P&gt;I found this older (but I believe still accurate) quote on &lt;A href="http://www.cisco.com/web/about/doing_business/legal/service_descriptions/docs/Cisco_ScanSafe_Web_Security_Service_Description.pdf"&gt;a Cisco document from 2010&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;"Where enabled, HTTPS Inspection allows the administrator to set a policy determining which domains and categories of HTTPS traffic are decrypted and inspected on the scanning infrastructure. Data is encrypted from the Web server to the scanning tower in the normal way; however, for sites which the customer wishes to be inspected, the scanning tower will terminate the SSL-based connection, inspect the data in the same way as for HTTP traffic, and then re-encrypt the traffic from the scanning towers to the end user using a different certificate. The corresponding certificate authority will need to be rolled out to the Customer’s Web browsers as a trusted certificate authority to prevent domain mismatch warnings appearing to end users. HTTPS Inspection can be used for both malware detection and enhanced Web filtering actions such as Outbound Content Control.&amp;nbsp;"&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2015 17:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523842#M206384</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-01T17:31:57Z</dc:date>
    </item>
    <item>
      <title>hi marvin,thanks for this</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523843#M206385</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;thanks for this info! +5&lt;/P&gt;&lt;P&gt;i guess the cisco engineer i worked with was right.&lt;/P&gt;&lt;P&gt;anyways, it's just a POC and i'm just getting output data to present to management.&lt;/P&gt;&lt;P&gt;i'll do firepower probably next month. i hope you guys would be around if i post any questions.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2015 00:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523843#M206385</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-08-02T00:04:00Z</dc:date>
    </item>
    <item>
      <title>Asad,For inspection of</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523844#M206386</link>
      <description>&lt;P&gt;Asad,&lt;/P&gt;&lt;P&gt;For inspection of &lt;STRONG&gt;incoming&lt;/STRONG&gt; https traffic, it's a different story. Assuming you own the server and its certificate, you can put a copy on your inspection engine (&lt;DEL&gt;WSA or&lt;/DEL&gt; FirePOWER appliance).&lt;/P&gt;&lt;P&gt;In that use case, it has the legitimate certificate of the target server and can, for the purposes of terminating SSL session to inspect the content, act as if it is the server itself.&lt;/P&gt;&lt;P&gt;This is not unlike what we do with Application Delivery controllers (aka load balancers such as Citrix Netscaler or F5 BigIP) when they front for an SSL server farm. In those cases we often&amp;nbsp;pass the traffic to the real servers unencrypted (this is desirable as the modern ADCs have purpose-built hardware and optimized software for SSL offload thus allowing the backend servers to devote more resources to application server tasks vs. encryption/decryption);&amp;nbsp;but they all have the option of re-encrypting as well.&lt;/P&gt;&lt;P&gt;(EDIT - note this feature is for IPS only, e.g. FirePOWER appliances.)&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2015 09:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523844#M206386</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-02T09:42:27Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin,That's</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523845#M206388</link>
      <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;&lt;P&gt;That's interesting you mentioned the big-names in load-balancing tech e.g F5 and others, I researched F5 for a few hours and the term they used to describe the concept of "decrypt-inspect-re-encrypt" as ssl-bridging. Now, what I know it requires two profile at least client and server side to ensure complete end-to-end encryption.&lt;/P&gt;&lt;P&gt;In your last post, you mentioned for incoming ssl inspection a copy of server certificate and key would be fine, but it was my mistake I forgot to ask what about the need to re-encrypt once it is done with inspection like does the concept of ssl-briding holds true on WCSA and firepower as well. I remember you said in another post that "YES it does that", but then it makes me confused about use of certificates, for CWSA to act as ssl client to target server it needs a certificate / key as well. Where would that comes from? The certificate from server /key we copied on appliance would do fine to act as "client profile" allowing to act like a server but what about the other half of journey (appliance to target server)&lt;/P&gt;&lt;P&gt;Sorry for confusion&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2015 09:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523845#M206388</guid>
      <dc:creator>asad ali</dc:creator>
      <dc:date>2015-08-02T09:42:28Z</dc:date>
    </item>
    <item>
      <title>Asad,For the "appliance to</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523846#M206391</link>
      <description>&lt;P&gt;Asad,&lt;/P&gt;&lt;P&gt;For the "appliance to target server" use case, you don't need a certificate-key pair on the appliance for that backend communications link. The target server(s) have the necessary pair. Remember for that link, the appliance is the client and no more needs its own certificate than you do when you browse to any "https" URL via SSL/TLS.&lt;/P&gt;&lt;P&gt;Netscaler (which I'm most familiar with) calls&amp;nbsp;this "&lt;A href="http://docs.citrix.com/en-us/netscaler/11/traffic-management/ssl/end-to-end-encrypt.html"&gt;SSL Offloading with End-to-End Encryption&lt;/A&gt;". SSL bridging is something else - not decrypting the SSL at all. As &lt;A href="http://docs.citrix.com/en-us/netscaler/11/traffic-management/ssl/ssl-bridging.html"&gt;described here&lt;/A&gt;, it doesn't require a certificate on the appliance at all.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2015 13:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-ssl-decryption/m-p/2523846#M206391</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-02T13:22:52Z</dc:date>
    </item>
  </channel>
</rss>

