Decryption Log Errors, Error Indexes, and Bitmasks
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 11.2
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
Decryption Log Errors, Error Indexes, and Bitmasks
Learn, troubleshoot, and remediate certificate, cipher, protocol, version, and other
TLS handshake errors you may find in the Decyption log.
The Error Index and Error columns in the
Decryption log provide information about the decryption error category and details,
respectively. You can also see error and error index information in the Handshake
Details section of the Detailed Log View (click
for any log entry). The decryption log
Error Index indicates one of eight error categories:

If no suitable error category exists for an error, the default message is
General TLS protocol error.
- Certificate—Errors such as invalid certificates, expired certificates, unsupported client certificates, Online Certificate Status Protocol (OCSP) or CRL check revocations and failures, and untrusted issuer CAs (sessions signed by an untrusted root, which includes incomplete certificate chains).When the firewall does not have an intermediate certificate because the site did not send the full certificate chain, you can find and install the missing certificate to repair incomplete certificate chains.
- Cipher—Unsupported cipher errors where:
- The client tries to negotiate a cipher that the firewall supports but that the Decryption profile applied to the traffic doesn’t support.
- The client tries to negotiate a cipher that the firewall doesn’t support.
- (Rare) Inbound Inspection is enabled and the server’s capabilities don’t match the Decryption profile settings.
- The error message includes the supported client cipher bitmask value and the supported Decryption profile cipher bitmask value. You canuse these valuesto identify the cipher the client tried to use and to list the cipher values that the Decryption profile supports as described later in this topic.
- Feature—Errors such as oversized TLS handshakes or unknown handshakes, oversized certificate chains (more than five certificates), and other unsupported features.
- HSM—Hardware storage module (HSM) errors such as unknown requests, items not found in the configuration, request timeouts, and other HSM errors and failures.
- Protocol—Errors such as TLS handshake failures, private and public key mismatches, Heartbleed errors, TLS key exchange failures, and other TLS protocol errors. Protocol errors show when the server doesn’t support the protocols that the client supports, the server uses certificate types that the firewall doesn’t support, and general TLS protocol errors.
- Resource—Errors such as lack of sufficient memory.
- Resume—Session resumption errors concerning resume session IDs and tickets, resume session entries in the firewall cache, and other session resumption errors.
- Version—Errors related to TLS version mismatches between a client and a Decryption profile or a client and server. The error messages include bitmask values that identify the TLS versions supported by the client and Decryption profile. You canuse these valuesto identify the cipher the client tried to use and to list the cipher values that the Decryption profile supports.
The following tables list specific errors from each error category along with additional
information and resources. For some errors, possible remediation steps are shared.
Decryption Error Message | Additional Information and Resources |
---|---|
Invalid (client or server) certificate |
Description: The certificate presented by either a client or
server is not valid or cannot be verified.
Related Documentation:
Remediation:
|
Expired (client or server) certificate |
Description: A certificate has expired or is not currently
valid.
RFC Information: This alert falls under the
certificate_expired error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
Related Documentation:Troubleshoot Expired
Certificates
Remediation:
|
Unsupported client certificate |
Description: The client certificate was of an unsupported
type.
RFC Information: This alert falls under the
unsupported_certificate error defined in RFC 5246, which is
applicable to TLSv1.1-TLSv1.3.
|
OCSP / CRL check: certificate revoked |
Description: A certificate was revoked by its signer.
RFC Information: This alert falls under the
certificate_revoked error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
Related Documentation:
Remediation:
|
OCSP / CRL check failure |
Description: Sent by clients when an invalid or unacceptable
OCSP response is provided by the server through the "status_request"
extension.
RFC Information: This alert falls under the
bad_certificate_status_response error defined in RFC 8446, which applies to
TLSv1.3.
|
Untrusted issuer CA |
Description: A valid certificate chain was received, but the
certificate authority (CA) certificate could not be matched with a
known trust anchor.
RFC Information: This alert falls under the unknown_ca
error defined in RFC 5246, which applies
TLSv1.1-TLSv1.3.
Related Documentation:
Identify Untrusted CA
Certificates
Remediation: This error may be due to a configuration issue.
Make sure your firewall certificate uses a trusted external CA
(rather than an untrusted or self-signed CA). See Obtain a Certificate from an
External CA.
|
Received fatal alert <error name> from (client or server) |
Description: The variable error has caused the connection to
fail.
|
Server and firewall's certificate mismatch |
Description: The sender was unable to negotiate an acceptable
set of security parameters with the receiver. A few possible causes
are incorrect certificates, a missing client certificate, an
untrusted server certificate, or a missing server certificate.
RFC Information: This alert falls under the
handshake_failure error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
Remediation:
|
SNI didn't match with subject name or SAN |
Related Documentation:
SSL Decryption and Subject
Alternative Names (SAN)
|
General (client or server) certificate error | This message indicates that an error does not meet the criteria for any of the aforementioned certificate errors. |
Decryption Error Message | Additional Information and Resources |
---|---|
Unsupported cipher |
Description: The sender was unable to negotiate an acceptable
set of security parameters with the receiver, likely due to
incompatible cipher suites.
RFC Information: This alert falls under the
handshake_failure error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
Remediation:
|
Cipher log errors include bitmask values that you can convert to actual values using
operational CLI commands:
- Cipher error bitmask values identify encryption and other mismatches between the client and the Decryption profile applied to the traffic.
admin@vm1>debug dataplane show ssl-decrypt bitmask-cipher <bitmask-value>
The command returns the cipher that matches the bitmask.Filter the decryption log to find cipher errors, plug the bitmask values for sessions with errors into the appropriate CLI command, obtain the values of the cipher that caused the error, and use the information to update the decryption policy rule or Decryption profile if you want to allow access to the site in question.
Decryption Error Message | Additional Information and Resources |
---|---|
Client certificate received |
Related Documentation:
|
Oversized chain (>5 certificates) received |
Description: The certificate chain contains more than five
certificates.
Remediation:
|
Oversized handshake received | |
Unknown handshake message received |
Description: A field in the handshake was incorrect or
inconsistent with other fields (albeit conforms to the formal
protocol syntax), likely causing an unrecognizable handshake
message.
RFC Information: This alert falls under the
illegal_parameter error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
|
Unsupported feature | This message indicates that an error does not meet the criteria for any of the aforementioned feature errors. |
Decryption Error Message | Additional Information and Resources |
---|---|
Unknown request | |
Certificate not found in configuration |
Remediation:
|
Private key not found on HSM |
Remediation:
|
Request to HSM timed out |
Troubleshooting:
Remediation:
|
HSM is down |
Related Documentation:
|
Could not send request to HSM |
Related Documentation:
Remediation: Restart the HSM.
|
HSM server not found in configuration |
Related Documentation:
|
General HSM failure | This message indicates that an error does not meet the criteria for any of the aforementioned HSM errors. |
Decryption Error Message | Additional Information and Resources |
---|---|
TLS Handshake Failure |
Description: The sender was unable to negotiate an acceptable
set of security parameters with the receiver. A few possible causes
are incompatible cipher suites, incompatible SSL/TLS versions,
incorrect certificates, a missing client certificate, untrusted
server certificate, or a missing server certificate.
RFC Information: This alert falls under the
handshake_failure error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
Remediation:
|
Private key does not match public key |
Related Documentation:
|
TLS Key Exchange Failure |
Description: The client and server are unable to exchange the
keys needed to secure communication. A few possible causes are
incompatible cipher suites, incompatible SSL/TLS versions, or an
incomplete certificate chain.
Remediation:
|
OpenSSL Error |
Description: An OpenSSL error was detected.
|
Client only supports Post Quantum Algorithms |
Description: The TLS handshake failed because the client does
not support classical algorithms.
Related Documentation:
|
General TLS Protocol Error |
This message indicates that an error doesn't meet the criteria for
any of the aforementioned protocol errors.
If no suitable error category exists for any error, this is the
default error message. |
Decryption Error Message | Additional Information and Resources |
---|---|
Out of the firewall resources: memory |
Description: An internal error unrelated to the peer or
SSL/TLS protocol correctness (such as a memory allocation error)
makes it impossible to continue.
RFC Information: This alert falls under the
internal_errors error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
|
Out of the firewall resources (general) | This message indicates that an error doesn't meet the criteria for any of the aforementioned resource errors. |
Decryption Error Message | Additional Information and Resources |
---|---|
No resume entry in firewall cache |
Description: The firewall tried to resume a session for which
a cache entry doesn't exist.
|
General sessions resumption error | This message indicates that an error doesn't meet the criteria for any of the aforementioned resume errors. |
Decryption Error Message | Additional Information and Resources |
---|---|
Client and decrypt profile version mismatch |
Description: The sender was unable to negotiate an acceptable
set of security parameters with the receiver given the available
options. This is likely due to incompatibility between the SSL/TLS
versions supported by the client and the Decryption profile.
RFC Information: This alert falls under the
handshake_failure error defined in RFC 5246, which applies to
TLSv1.1-TLSv1.3.
Related Documentation:
Troubleshoot Unsupported Cipher
Suites
Remediation:
|
Client and server version mismatch |
Description: The sender was unable to negotiate an acceptable
set of security parameters with the receiver given the available
options. This is likely due to incompatibility between the SSL/TLS
versions supported by the client and server.
RFC Information: This alert falls under the
handshake_failure error defined in RFC 5246, which is
applicable to TLSv1.1-TLSv1.3.
Related Documentation:
Troubleshoot Unsupported Cipher
Suites
The troubleshooting topic uses the "Client
and decrypt profile version mismatch" search query. For this error,
use the (error contains ‘Client and server version
mismatch’) query. Remediation:
|
Version log errors include bitmask values that you can convert to actual values using
operational CLI commands:
- Version error bitmask values identify mismatches between the TLS protocol versions that the client and server use and also identify TLS protocol mismatches between the client and the Decryption profile applied to the traffic. The CLI command to convert version error bitmasks is debug dataplane show ssl-decrypt bitmask-version <bitmask-value>.The command returns the TLS version that matches the bitmask.Filter the decryption log to find version errors, plug the bitmask values into the appropriate CLI command, obtain the values of the protocol version that caused the error, and use the information to update the decryption policy rule or Decryption profile if you want to allow access to the site in question.
Version Errors
To
identify and fix version mismatch errors:
- Use the (err_index eq Version) query to filter by version errors. The bitmask values are highlighted.You can filter decryption logs in many ways. For example, to see only TLSv1.3 version errors, use the (err_index eq Version) and (tls_version eq TLS1.3) query.
- Log in to the CLI and look up the bitmask values using the debug dataplane show ssl-decrypt bitmask-version <bitmask-value> command.
admin@vm1> debug dataplane show ssl-decrypt bitmask-version 0x08 TLSv1.0
This output shows that the client supports only TLSv1.0.admin@vm1> debug dataplane show ssl-decrypt bitmask-version 0x70 TLSv1.1 TSLv1.2 TLSv1.3
This output shows that the Decryption profile supports TLSv1.1, TLSv1.2, and TLSv1.3, but not TLSv1.0. The issue is that the client supports a version of the TLS protocol that the Decryption profile attached to the decryption policy rule controlling the traffic blocks.The next step is to decide what action to take. You could update the client so that it accepts a more secure TLS version. However, if the client requires TLSv1.0 for some reason, you can:- Let the firewall continue to block the traffic.
- Update the Decryption profile to allow all TLSv1.0 traffic (not recommended).
- Create a decryption policy rule and profile that allows TLSv1.0 and apply it only to the client devices that must use TLSv1.0 and cannot support a more secure protocol—the most secure option for allowing the traffic.
The version error in the second screenshot shows a different issue: a client and server version mismatch. The error indicates the supported client bitmask as 0x20:admin@vm1> debug dataplane show ssl-decrypt bitmask-version 0x20 TLSv1.2
The output shows that the client supports only TLSv1.2, which means that the server doesn't support this version. The server might only support TLSv1.3 or it might support only TLSv1.1 or lower (less secure protocols). You can use Wireshark or another packet analysis tool to find out which TLS versions the server supports. How you fix this error depends on the supported TLS versions and your business needs:- If the server only supports TLSv1.3, you could edit the Decryption profile to support TLSv1.3.
- If the server only supports TLSv1.1 or lower, evaluate whether you need to access that server for business purposes. If not, consider blocking the traffic to increase security. If you need to access the server for business purposes, create or add the server to a decryption policy rule that applies only to the servers and sites you need to access for business; don’t allow access to all servers that use less secure TLS versions.
- To find the decryption policy rule that controls the session traffic, check the Policy Name column in the log (or click the magnifying glass iconGo to ObjectsDecryptionDecryption Profile, select the appropriate profile, and edit it to address the version issue.
Cipher Errors
Hunting
down cipher errors is similar to hunting down version errors–you filter the
Decryption Log for a specific error and obtain error bitmasks. Then, you use a CLI
to convert the bitmasks to error values and take appropriate corrective measures.
The following steps illustrate this process.
- Use the (err_index eq Cipher) query to filter by cipher errors. Let’s examine a session with the following error message: Unsupported cipher. Supported client cipher bitmask: 0x80000000. Supported decrypt profile cipher bitmask 0x60f79980.
- Log in to the CLI and look up the bitmask values:
admin@vm1> debug dataplane show ssl-decrypt bitmask-cipher 0x80000000 CHACHA_PLY1305_SHA256
This output shows that the client tried to negotiate a cipher that the supports. When the firewall doesn't support a cipher, the bitmask is all zeros (0x0000000).admin@vm1> debug dataplane show ssl-decrypt bitmask-cipher 0x60f79980 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS13_WITH_AES_256_GCM_SHA384 TLS13_WITH_AES_128_GCM_SHA256
This output shows that the Decryption profile that controls the traffic supports many ciphers, but does not support the cipher the client is trying to use. To fix this issue so that the firewall allows and decrypts the traffic, you need to add support for the missing cipher to the Decryption profile. - Check the decryption log or the Policy Name in the Detailed Log View to get the name of the decryption policy rule that controls the traffic. Go to PoliciesDecryption and select the rule. On the Options tab, look up the name of the Decryption profile. Next, go to ObjectsDecryptionDecryption Profile, select the appropriate profile, and edit it to address the version issue.In this example, the Decryption profile does not support the TLS13_WITH_CHACHA_POLY1305_SHA256 cipher, so the client can’t connect.To fix the issue, select the CHACHA20-POLY1305 encryption algorithm option (the Max Version setting of Max means that the profile already supports TLSv1.3 and the Authentication Algorithm setting already includes SHA256, so only the encryption algorithm support was missing) and then Commit the configuration. After you commit the configuration, the Decryption profile supports the missing cipher and the decryption sessions for the traffic succeed.If the firewall does not support a cipher suite and you need to allow the traffic for business purposes, create a decryption policy rule and profile that applies only to that traffic. In the Decryption profile, disable the Block sessions with unsupported cipher suites option.
Root Status “Uninspected”
In some cases, the Root Status column
displays the value uninspected. There are several reasons why
the firewall could not inspect the root status, including:
- Session resumption.
- Traffic was not decrypted because a No Decryption policy rule controlled the traffic.
- A decryption failure occurred before the firewall could inspect the server certificate.
Filter the decryption log (root_status eq uninspected) and
(tls_version eq TLS1.3) to see Decryption sessions for which the
Root Status is uninspected:
