Handling encrypted traffic
Failed to execute the [bmc-contextid] macro.
A web application uses encryption to protect sensitive data that travels between the client and the server. Without the proper deciphering mechanism, the system cannot decrypt the intercepted traffic.
For the system to decipher encrypted traffic, the Security role user uploads cryptographic keys to the
and maps them to the particular IP addresses and port numbers.The following topics provide information and instructions about handling the encrypted traffic:
Monitor the flow of encrypted traffic by reviewing the following information:
- Traffic-capture statistics (the Home page of )
Traffic-status analysis (
> Administration > Security settings > Key management)
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*