The Right Way To Inspect SSH Connections [securitytheater.phoneboy.com]
When talking with Check Point customers, a common request I hear is for the ability to "decrypt" SSH traffic, see inside of said traffic, and make security decisions based on what it finds, including…