08-03-2018 08:01 AM - edited 02-21-2020 08:03 AM
Hello , a company is acquiring a cisco firepower to protect their ebanking website (SSL encrypted).
IPS signatures will be activated to protect the Ebanking website , but all traffic going through the firepower will already be encrypted.
Question : Will the Cisco firepower be able to block any attacks happening inside the SSL packets? Or will it just act like a dumb forwarding device ? :)
Solved! Go to Solution.
08-06-2018 02:22 AM
You cannot decrypt incoming traffic properly without the server's certificate AND private key.
Once you have those in place (along with a properly configured SSL Policy), the decryption and end user experience will be seamless.
08-04-2018 05:41 AM
You can install the server certificate on the Firepower appliance and create a decryption policy for that destination. The appliance will then be able to decrypt and inspect all of the connections as plain text. It will re-encrypt them and send them on (assuming they haven't been blocked as malicious).
08-05-2018 05:33 AM
Thanks for your message.
Quick question, if i don't install the certificate my users will get a certificate error right?
Also , once i generate the crc file for my ebanking web server (apache in this case) ,my certificate will be generated based on that. Won't this cause any issues to install the same certificate on the firepower afterwards?
Thanks
08-06-2018 02:22 AM
You cannot decrypt incoming traffic properly without the server's certificate AND private key.
Once you have those in place (along with a properly configured SSL Policy), the decryption and end user experience will be seamless.
08-06-2018 07:57 AM
thanks Marvin
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide