This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Cisco VPN outgoing connection on SFVH (SFOS 17.5.0 GA) with https scanning & decrypting

My general outgoing policy is working with the Cisco VPN client if I do not decrypt and scan https ... My other general policy where https scanning / decrypting is working and the certificates are installed on the clients is also working well on the client for normal and https web traffic. If I turn on https and scanning the Cisco VPN then fails to connect on either policy.

Are there any idea on how to get this functioning with https scanning and decrypting active?

 

Thanks



This thread was automatically locked due to age.
Parents Reply
  • I was assuming this was the case and though the client may have the proper cert built into the config there's not much chance the VPN endpoint would allow the secondary cert to setup a proper tunnel as it is expecting the client cert to verify the identity... 

Children
No Data