<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inspection on Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787572#M991651</link>
    <description>&lt;P&gt;I is common knowledge/best practise to do SSL encryption/decryption on a separate box in your DMZ, back in the day, it was called "SSL offloading". all customers i support run this on a F5 Big IP (or radware box)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jan 2019 21:08:39 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2019-01-24T21:08:39Z</dc:date>
    <item>
      <title>SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787229#M991639</link>
      <description>&lt;P&gt;I would like to see if there is any document which has the cons of ssl inspection of firepower module.&lt;/P&gt;
&lt;P&gt;Like the effect on resource usage like memory, processing power on the firewall&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787229#M991639</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2019-03-12T14:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787233#M991641</link>
      <description>&lt;P&gt;we have 5555-X series with firepower SFR we were very intersted to do the SSL decryption but later the recommendation came from cisco if you looking for SSL decryption that use WSA or FTD bigger box.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so long story short if its production network stay out of it, if in the lab purpose yes go and try it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; here is a link&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-firepower-services/200577-Configure-the-SSL-decryption-on-FirePOWE.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-firepower-services/200577-Configure-the-SSL-decryption-on-FirePOWE.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://routemypacket.blogspot.com/2017/11/ssl-decryption-with-cisco-firepower.html" target="_blank"&gt;https://routemypacket.blogspot.com/2017/11/ssl-decryption-with-cisco-firepower.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.a10networks.com/resources/articles/ssl-inspection-decryption-cisco-asa-firepower" target="_blank"&gt;https://www.a10networks.com/resources/articles/ssl-inspection-decryption-cisco-asa-firepower&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 13:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787233#M991641</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-24T13:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787397#M991643</link>
      <description>&lt;P&gt;Thank you. But I am looking for a cisco documentation which at least says that it is a resource intensive task.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 16:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787397#M991643</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2019-01-24T16:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787412#M991646</link>
      <description>&lt;P&gt;I never came across where Cisco said it’s a resource incentive.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But runnning in lab environment personally and after even Cisco TAC recommendation is not run ssl decrying on ASA with sfr as it’s spikes the cpu.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is from the experience even though if you want to try and don’t believe than what else can be say.&lt;/P&gt;&lt;P&gt;ssl decrying work good with FTD 9300 for sure&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 16:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787412#M991646</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-24T16:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787417#M991648</link>
      <description>Thank You once again. I am looking at a 5525-X box with AMP, IPS enabled and on top of this will be doing SSL decryption.&lt;BR /&gt;There are around 400 users behind the network with around 15 IPSEC tunnels terminated in the box.&lt;BR /&gt;I want a reason to convince my management not to do SSL inspection on the same box.&lt;BR /&gt;</description>
      <pubDate>Thu, 24 Jan 2019 16:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787417#M991648</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2019-01-24T16:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787420#M991649</link>
      <description>&lt;P&gt;Check this link in regards to throughout with IPS and NGIPS&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/dam/global/th_th/assets/docs/seminar/ASA5500_X.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/global/th_th/assets/docs/seminar/ASA5500_X.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 16:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787420#M991649</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-24T16:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787572#M991651</link>
      <description>&lt;P&gt;I is common knowledge/best practise to do SSL encryption/decryption on a separate box in your DMZ, back in the day, it was called "SSL offloading". all customers i support run this on a F5 Big IP (or radware box)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 21:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-inspection-on-cisco-asa/m-p/3787572#M991651</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2019-01-24T21:08:39Z</dc:date>
    </item>
  </channel>
</rss>

