Verify that your decryption configuration decrypts the
traffic you want to decrypt and doesn’t decrypt the sensitive traffic
that you don’t want to decrypt.
After you configure a best practice decryption
profile and apply it to traffic, check the log files to verify that
the firewall is decrypting the traffic that you intend to decrypt
and that the firewall is not decrypting the traffic that you don’t
want to decrypt. In addition,
follow post-deployment decryption
best practices to maintain the deployment.