ON THIS PAGE
About the Decrypt Profiles Page
Use the Decrypt Profiles page to view and to manage decrypt profiles.
Tasks You Can Perform
You can perform the following tasks from this page:
-
Create an decrypt profile—See Create a Decrypt Profile.
-
Edit, clone, or delete an decrypt profile—See Edit, Clone, and Delete a Decrypt Profile.
-
View the details of an decrypt profile—Select the decrypt profile for which you want to view the details and from the More or right-click menu, select Detailed View. The View decrypt profile Details page appears. Table 2 describes the fields on this page.
-
Search for decrypt profiles using keywords—Click the search icon and enter the search term in the text box and press Enter. The search results appear on the same page.
Widget Descriptions
Table 1 describes the fields on the decrypt Profiles page.
Field |
Description |
---|---|
Name |
Name of the decrypt profile. |
Preferred Cipher |
Preferred cipher associated with the profile. |
Custom Ciphers |
The set of ciphers, if the preferred cipher is Custom, which the SSH server uses to perform the encryption and the decryption functions. |
Exempted Address |
Addresses that are exempted from decrypt processing. |
Description |
Description of the decrypt profile. |
Root Certificate |
Root certificate associated with the decrypt profile. |
Field |
Description |
---|---|
General Information |
|
Name |
Name of the decrypt profile. |
Description |
Description of the decrypt profile. |
Preferred Cipher |
Preferred cipher associated with the proxy profile. |
Custom Ciphers |
The set of ciphers, if the preferred cipher is Custom, which the SSH server uses to perform the encryption and the decryption functions. |
Flow Trace Enabled |
Indicates whether flow tracing is enabled or disabled. |
Certificates |
Displays the root certificate and the trusted certificate authorities associated with the root certificate. |
Exempted Address |
Addresses that are exempted from decrypt processing. |
Exempted URL Categories |
URL categories that are exempted from decrypt processing. |
Actions |
|
Ignore |
Indicates whether server authentication failure is ignored (Enabled) or not (Disabled). |
Session Resumption |
Indicates whether session information is cached to enable session resumption (Enabled) or not (Disabled). |
Logging |
If logging is enabled, indicates the type of events that are logged. |
Renegotiation |
Indicates the type of renegotiation required for a change in SSL parameters after creating a session and establishing the SSL tunnel transport. |