Troubleshoot Version Errors
Focus
Focus
Network Security

Troubleshoot Version Errors

Table of Contents

Troubleshoot Version Errors

Identify and fix version errors in various ways.
Where Can I Use This?What Do I Need?
No separate license required for decryption when using NGFWs or Prisma Access.
Note: The features and capabilities available to you in Strata Cloud Manager depend on your active license(s).
Version errors arise when there are mismatches between the TLS protocol versions that the client and server use or between the TLS protocol versions that the client and the Decryption profile applied to the traffic use. The error messages includes bitmask values that identify the supported client and Decryption profile versions. You can use these values to identify the cipher the client tried to use and the cipher values that the Decryption profile supports. The CLI command to convert version error bitmasks is: debug dataplane show ssl-decrypt bitmask-version <bitmask-value>. For more information and remediation, see Decryption Log Errors and Error Indexes.
Key Steps for Converting Bitmask Values and Turning Them Into Something Useful
  1. Filter the Decryption logs for version errors using a query.
  2. Plug the bitmask value into the appropriate CLI command to identify the protocol versions that caused the error.
  3. Use the cipher information to update the Decryption profile if you want to allow access to the site in question.
  1. Identify version errors in the Decryption logs.
    1. Select Monitor Logs Decryption.
    2. Filter Decryption logs using the following queries:
      • To find all instances where the error is related to protocol versions: (err_index eq Version). The highlighted values are bitmask values.
        Error Index = Version
      • To find all instances where the protocol versions supported by the client and in the Decryption profile attached to the policy rule don't match: (error contains ‘Client and decrypt profile mismatch’).
        Error contains 'client and decrypt profile version mismatch'
    You can filter Decryption logs in many ways.
    For example, to see only TLSv1.3 version errors, specify the error index and the TLS version you're looking for in the query as follows: (err_index eq Version) and (tls_version eq TLS1.3).
    To find all Decryption sessions that experienced the same error, click an error message to add it to the query and remove the original query, for example:
    The hexadecimal codes or bitmasks identify the exact version that the client supports and the exact version that the Decryption profile supports.
  2. Log in to the CLI to look up the bitmask values.
    To identify the TLS versions that a bitmask corresponds to, use the debug dataplane show ssl-decrypt bitmask-version <bitmask-value> CLI command.
    Example screens of this lookup:
      Expand all
      Collapse all
    • Example 1 (first screenshot)
    • Example 2 (third screenshot)
  3. Decide what action to take.
    How you fix this error depends on the TLS versions supported by the client and server and your business needs.
    • Evaluate if you need access to the server for business or another important purpose.
    • Confirm the TLS versions that the server supports. You can use Wireshark or another packet analysis tool to find out which TLS versions the server supports.
    • You could update the client or server to support a stronger version.
    • If the client only supports a weaker TLS version, and cannot support a more secure protocol, as in Example 1, you can:
      • Let the NGFW continue to block the traffic.
      • (Not Recommended) Update the Decryption profile to allow certain TLS traffic.
        Continue to step 4
        . This option allows traffic of a specific TLS version when it matches the decryption policy rules that the profile is attached to, which is why it's not recommended.
        Don't allow access to all servers that use less secure TLS versions. Create more specific rules for cases like this.
        This may be a good course of action in a case like Example 2, where the server supports a more secure TLS protocol than the client. Then, you'd be updating the client so that it accepts a more secure TLS version, which is good for security.
      • (Most Secure option) Configure a Decryption profile that allows the weaker TLS version, but apply it to a decryption policy rule for the particular server that controls the sites, user, device, or source address (and to any similar users, devices, or source addresses so that one policy rule and profile control all of this traffic) that must use this server.
  4. Identify and modify the Decryption profile associated with the policy rule that controls the session traffic.
    1. Identify the decryption policy rule that control the session traffic.
      1. Check the Policy Name column in the log (or click the magnifying glass
        next to a Decryption log entry to see the information in the General section of the Detailed Log View).
      2. Select PoliciesDecryption. Then, select the policy rule with the Policy Name above. In the examples, the policy rule is Big Brother.
    2. Identify the Decryption profile.
      Select the Options tab. Decryption profile displays the name of the Decryption profile.
    3. Edit the protocol versions supported in the Decryption profile.
      • Select ObjectsDecryptionDecryption Profile, and select the appropriate Decryption profile.
      • Select SSL Decryption SSL Protocol Settings, and then select the Min Version and Max Version that you need.
      • Click OK.
  5. Commit your changes.