Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

About the SSL Proxy Page

 

You are here: Security Services > SSL Profiles > SSL Proxy.

You can create, add, edit, and delete SSL proxy or global policy configurations.

Tasks You Can Perform

You can perform the following tasks from this page:

  • Configure global policy. To do this, click Global Config at the upper right of the table and enter the session cache timeout in seconds.

  • Add an SSL proxy profile. See Add an SSL Proxy Profile.

  • Edit an SSL proxy profile. See Edit an SSL Proxy Profile.

  • Delete SSL proxy profile. See Delete SSL Proxy Profile.

  • Clone an SSL proxy profile. See Clone an SSL Proxy Profile.

  • View the details of an SSL proxy profile—To do this, select the SSL proxy profile for which you want to view the details and follow the available options:

    • Click More and select Detailed View.

    • Right-click on the selected SSL proxy profile and select Detailed View.

    • Mouse over to the left of the selected SSL proxy profile and click Detailed View.

  • Deselect the selected SSL proxy profiles. To do this, click More and select Clear All Selections.

  • Show or hide columns in the SSL Proxy Profiles table. To do this, click the Show Hide Columns icon in the top right corner of the custom objects table and select the options you want to view or deselect the options you want to hide on the page.

  • Advance search for SSL proxy profiles. To do this, use the search text box present above the table grid. The search includes the logical operators as part of the filter string. In the search text box, when you hover over the icon, it displays an example filter condition. When you start entering the search string, the icon indicates whether the filter string is valid or not.

    For an advanced search:

    1. Enter the search string in the text box.

      Based on your input, a list of items from the filter context menu appears.

    2. Select a value from the list and then select a valid operator based on which you want to perform the advanced search operation.Note

      Press Spacebar to add an AND operator or OR operator to the search string. Press backspace at any point of time while entering a search criteria, only one character is deleted.

    3. Press Enter to display the search results in the grid.

Field Descriptions

Table 1 describes the fields on the SSL Proxy page.

Table 1: Fields on the SSL Proxy Page

Field

Description

Name

Displays the name of the SSL Proxy profile.

Protection Type

Displays the type of protection the profile provides. One is client protection and the other one is server protection. Client protection is for SSL forward proxy and server protection is for reverse proxy.

Preferred Cipher

Displays the category of the profile depending on their key strength.

Custom Cipher

Displays the custom cipher which the SSH server uses to perform encryption and decryption function.

Flow Tracing

Displays whether flow trace is enabled or disabled for troubleshooting policy-related issues.

Exempted Addresses

Displays the addresses to allowlists that bypass SSL forward proxy processing.

Server Auth Failure

Displays the action that will be performed if errors are encountered during the server certificate verification process (such as CA signature verification failure, self-signed certificates, and certificate expiry).

Session Resumption

Displays whether the session resumption is disabled or not.

Interface

Displays the name of the interface associated with the VLAN.

MAC Address

Displays the MAC address associated with the VLAN.

Related Documentation