Chapter 18
Traffic Decryption Policy
This chapter provides an overview of the following topics:
Traffic Decryption Essentials: This section describes different techniques to decrypt traffic using Secure Firewall. It summarizes the evolution of encryption protocols and explains the TLS handshakes.
Best Practices for Traffic Decryption: This section shares the best practices for positioning the decryption rules in an SSL policy.
Configuring a Decryption Policy: This section demonstrates the steps to configure an SSL policy to decrypt network traffic and then enable a next-generation security policy to analyze the decrypted traffic further.
Verification: In this section, you learn how to use the management center event viewer and dashboard to ...
Get CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.