Logging Decryptable Connections with TLS/SSLDecryption Rules
Procedure
1 |
In the decryption policy editor, click Edit ( If View ( |
2 |
Click Logging. |
3 |
Check the Log at End of Connection check box. For monitored traffic, end-of-connection logging is required. |
4 |
Specify where to send connection events. Send events to the event viewer if you want to perform Firewall Management Center-based analysis on these connection events. For monitored traffic, this is required. |
5 |
Click Save to save the rule. |
6 |
Click Save to save the decryption policy. |
What to do next
-
Deploy configuration changes.