Hi all,
As I am getting more familiar with my new XG firewall, I am naturally wanting to do more and more things. I've started looking at the deep-packet inspection/HTTPS Decrypt and Scan functionality. I've seen the discussions on this board about the invalid certificate warning that you get because the XG is essentially performing a "man-in-the-middle" attack to decrypt and inspect the content, and the guidance seems to be "install the CA as a trusted CA on your computer" to make it go away. While I know that would work, and while I know this can be automated to some extent with Group Policy in a Windows domain, it strikes me that the best way would just be to obtain and use a legit 3rd party certificate that everybody would trust out of the gate, that way even non-domain connected, non-Windows devices would not display any complaints about the certificate. So I searched the knowledgebase and I found an article that seems to suggest this is possible and explains how to do it, located here: https://community.sophos.com/kb/en-us/123003
Unfortunately, this seems to have been written for v15 and I am not sure if this is still applicable in v16. In particular, even though I have added an external CA, it does not show up in the list as shown in step 2 of the guide. So I went back to step 1 and referenced this URL https://community.sophos.com/kb/en-us/123036. Again, this seems to be stale content and not up to date for v16, as I do not have the ability to add a CA passphrase which it says must be specified for this to work.
At this point I am unsure how to proceed. The documentation seems to indicate it is possible, but the content is stale and doesn't seem applicable to v16.
Has anybody achieved success using a 3rd party certificate for HTTPS decryption? Thanks in advance.
This thread was automatically locked due to age.