Forum Discussion
SWG Evaluation
- Aug 19, 2014
In fact, you can do SSL interception with embedded certificates (ex: "default" for F5).
You have to make sure of two things : - the Certificate is trusted by users, - the certificate is able to sign child certificates (keyring).
Please find below two links : - generating certificates for SSL interception : http://communicationsfinance.com/wp-content/uploads/2013/04/SSL-Interception-on-Proxy-SG.pdf - Configuring SSL Forward Proxy on F5 : http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-implementations-11-5-1/16.htmlconceptid
In fact, you can do SSL interception with embedded certificates (ex: "default" for F5).
You have to make sure of two things : - the Certificate is trusted by users, - the certificate is able to sign child certificates (keyring).
Please find below two links : - generating certificates for SSL interception : http://communicationsfinance.com/wp-content/uploads/2013/04/SSL-Interception-on-Proxy-SG.pdf - Configuring SSL Forward Proxy on F5 : http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-implementations-11-5-1/16.htmlconceptid
- Son_of_Tom_1379Aug 19, 2014
Nimbostratus
Thanks Yann now that's great information ! Thanks again
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com