Cisco Systems, Inc.
Endpoint-assisted inspection of encrypted network traffic
Last updated:
Abstract:
In one embodiment, a traffic inspection service executed by an intermediary device obtains, from a monitoring agent executed by an endpoint device, keying information for an encrypted traffic session between the endpoint device and a remote entity. The traffic inspection service provides a notification to the monitoring agent that acknowledges receipt of the keying information. The traffic inspection service uses the keying information to decrypt encrypted traffic from the encrypted traffic session. The traffic inspection service applies a policy to the encrypted traffic session between the endpoint device and the remote entity, based on the decrypted traffic from the session.
Status:
Grant
Type:
Utility
Filling date:
10 Aug 2018
Issue date:
19 Apr 2022