Server Certificate Verification Bypass for SSL Forward Proxy
Focus
Focus
What's New in the NetSec Platform

Server Certificate Verification Bypass for SSL Forward Proxy

Table of Contents

Server Certificate Verification Bypass for SSL Forward Proxy

Enable decryption of SSL traffic to servers with certificate validation issues by bypassing server certificate verification, improving user experience while maintaining visibility
Server certificate verification ensures users connect to legitimate servers, protects sensitive data, and mitigates the risk of attacks like meddler-in-the-middle (MITM) and phishing. However, certificate verification can block business-critical websites and applications that fail authentication due to certificate issues such as an incomplete certificate chain. Workarounds consume time and result in security gaps.
PAN-OS® 12.1 introduces the Bypass Server Certificate Verification setting to decryption profiles for SSL Forward Proxy. When enabled, your Next-Generation Firewall (NGFW) ignores certificate issues and completes the TLS handshake by presenting a Forward Trust certificate. This allows the session to be decrypted without disruption, ensuring the availability of critical services.
Enabling this option disables all other server certificate verification settings.
Bypassing server certificate verification may introduce risks, such as regulatory noncompliance or connection vulnerabilities. It is a temporary solution that enables you to gradually address underlying certificate issues. Decryption logs help you identify servers requiring attention by recording if certificate validation was bypassed for a session.