11-26-2021 04:11 AM
Hello everyone
I have a weird problem with configuring SSL inspection In Cisco FTD , every time I enable SSL policy In ACP all ssh session that go through FTD will be drop after 10 to 20 seconds .
even configuring all SSL Rule to do not decrypt still have the problem !
also I select "inherit Default Action" in Undecryptable encryption tab which is do not Decrypt.
thanks
11-26-2021 04:23 AM - edited 11-26-2021 04:35 AM
Generally an SSL decryption policy should apply to SSL traffic which is specified via a combination of the application ("SSL"), port (tcp/443) and address sections of the rule(s). Can you share more details on how you have yours configured?
11-26-2021 04:36 AM
At the beginning I define a simple rule like :
src-zone=inside dst-zone= outside network=my-pc action >>> Decrypt-Resign
Default action : do not decrypt
After Enable SSL policy in ACP all SSH traffic from any zone to other zone Will be drop .
after getting problem define a rule at the top of SSL Policy to do not decrypt any packet that dst-port=22
but nothing change !
11-26-2021 04:32 AM
SSL policy should use port 443, SSH uses port 22, so there may be something missing in the ACP.
11-26-2021 04:45 AM
Before applying SSL policy to ACP everything is fine and there is no problem with ssh Connection.
I'm not sure, but is there any possibility that SSH use some sort of TLS protocol that ssl inspection deny it ?
11-26-2021 05:00 AM
Your SSL policy should be built so that it ONLY selects SSL traffic.
i.e., make the application "SSL Client" and the destination port HTTPS.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide