![]() Determine which inspection method will be applied to Secure Shell (SSH) / SSL traffic.Identify how to treat invalid, unsupported or untrusted SSL certificates.Configure which websites or website categories will be exempt from SSL inspection.Configure which ports will be associated with which SSL protocols for the purpose of inspection. ![]() Configure whether a specific SSL protocol will be inspected, blocked or bypassed.Configure which Certificate Authority (CA) certificate will be used to decrypt the Secure Sockets Layer (SSL) encrypted traffic.Depending on the inspection profile selected, you can: Individual deep inspection security profiles can be created depending on the requirements of the policy.
0 Comments
Leave a Reply. |