Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

About the Decrypt Profiles Page

To access this page, click Security Subscriptions > Decrypt > Decrypt Profiles.

Use the Decrypt Profiles page to view and to manage decrypt profiles.

Tasks You Can Perform

You can perform the following tasks from this page:

  • Create an decrypt profile—See Create a Decrypt Profile.

  • Edit, clone, or delete an decrypt profile—See Edit, Clone, and Delete a Decrypt Profile.

  • View the details of an decrypt profile—Select the decrypt profile for which you want to view the details and from the More or right-click menu, select Detailed View. The View decrypt profile Details page appears. Table 2 describes the fields on this page.

  • Search for decrypt profiles using keywords—Click the search icon and enter the search term in the text box and press Enter. The search results appear on the same page.

Widget Descriptions

Table 1 describes the fields on the decrypt Profiles page.

Table 1: Fields on the Decrypt Profiles Page

Field

Description

Name

Name of the decrypt profile.

Preferred Cipher

Preferred cipher associated with the profile.

Custom Ciphers

The set of ciphers, if the preferred cipher is Custom, which the SSH server uses to perform the encryption and the decryption functions.

Exempted Address

Addresses that are exempted from decrypt processing.

Description

Description of the decrypt profile.

Root Certificate

Root certificate associated with the decrypt profile.

Table 2: View Decrypt Profile Details Page Fields

Field

Description

General Information

Name

Name of the decrypt profile.

Description

Description of the decrypt profile.

Preferred Cipher

Preferred cipher associated with the proxy profile.

Custom Ciphers

The set of ciphers, if the preferred cipher is Custom, which the SSH server uses to perform the encryption and the decryption functions.

Flow Trace Enabled

Indicates whether flow tracing is enabled or disabled.

Certificates

Displays the root certificate and the trusted certificate authorities associated with the root certificate.

Exempted Address

Addresses that are exempted from decrypt processing.

Exempted URL Categories

URL categories that are exempted from decrypt processing.

Actions

Ignore

Indicates whether server authentication failure is ignored (Enabled) or not (Disabled).

Session Resumption

Indicates whether session information is cached to enable session resumption (Enabled) or not (Disabled).

Logging

If logging is enabled, indicates the type of events that are logged.

Renegotiation

Indicates the type of renegotiation required for a change in SSL parameters after creating a session and establishing the SSL tunnel transport.