cancel
Showing results for 
Search instead for 
Did you mean: 
Login & Join the DevCentral Connects Group to watch the Recorded LiveStream (May 12) on Basic iControl Security - show notes included.
ltwagnon
Legacy Employee
Legacy Employee

Over 80% of all Internet traffic is encrypted, and attackers use this encryption to hide malware. Inspecting this traffic is imperative for companies today. Properly inspecting this traffic takes several security devices, each with their own function.

F5 has created the SSL Orchestrator to serve as a single point of entry/exit for all encrypted traffic.

Traffic arrives at the F5 SSL Orchestrator where it is decrypted and sent to security devices for inspection based on classification decisions taking place on the SSL Orchestrator. Once the traffic has been routed through all the security devices, it comes back to the SSL Orchestrator where it is encrypted again and sent to its destination.

When you connect the Cisco Firepower Threat Defense into the F5 SSL Orchestrator you get a very powerful inspection solution for encrypted traffic.
Check out the video to learn more!

Related Resources:

Version history
Last update:
‎31-May-2019 13:00
Updated by:
Contributors