<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connecting to my customer's GP vpn, most of my browsers display NET::ERR_CERT_AUTHORITY_INVALID in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518005#M3305</link>
    <description>&lt;P&gt;In the not too distant past, I could fire up my customer's vpn allowing me to access their network while maintaining my own.&amp;nbsp; In other words, I could surf my development sites, get my business' email, and basically function while working.&amp;nbsp; Something changed, and now when I enable their VPN, 95+% of my network connections report:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Your connection is not private&lt;/P&gt;
&lt;P&gt;Attackers might be trying to steal your information from globalprotect.customer.com&lt;/P&gt;
&lt;P&gt;NT::ERR_CERT_AUTHORITY_INVALID"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I only see this behavior on any machine that is not a member of their domain.&amp;nbsp; In fact, I have seen this coming from their globalprotect.customer.com.&amp;nbsp; My support ticket with corporate IT has been open for 2+ months.&amp;nbsp; I'm not hopeful of a resolution.&amp;nbsp; I've spoken to others in local IT support, and they have the same issue, but they just shrug their shoulders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anything I can check?&amp;nbsp; It smells like a configuration in the back end, but I'm looking for some suggestions I can feed back to them.&lt;/P&gt;</description>
    <pubDate>Sat, 15 Oct 2022 20:58:26 GMT</pubDate>
    <dc:creator>charliegil</dc:creator>
    <dc:date>2022-10-15T20:58:26Z</dc:date>
    <item>
      <title>Connecting to my customer's GP vpn, most of my browsers display NET::ERR_CERT_AUTHORITY_INVALID</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518005#M3305</link>
      <description>&lt;P&gt;In the not too distant past, I could fire up my customer's vpn allowing me to access their network while maintaining my own.&amp;nbsp; In other words, I could surf my development sites, get my business' email, and basically function while working.&amp;nbsp; Something changed, and now when I enable their VPN, 95+% of my network connections report:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Your connection is not private&lt;/P&gt;
&lt;P&gt;Attackers might be trying to steal your information from globalprotect.customer.com&lt;/P&gt;
&lt;P&gt;NT::ERR_CERT_AUTHORITY_INVALID"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I only see this behavior on any machine that is not a member of their domain.&amp;nbsp; In fact, I have seen this coming from their globalprotect.customer.com.&amp;nbsp; My support ticket with corporate IT has been open for 2+ months.&amp;nbsp; I'm not hopeful of a resolution.&amp;nbsp; I've spoken to others in local IT support, and they have the same issue, but they just shrug their shoulders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anything I can check?&amp;nbsp; It smells like a configuration in the back end, but I'm looking for some suggestions I can feed back to them.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2022 20:58:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518005#M3305</guid>
      <dc:creator>charliegil</dc:creator>
      <dc:date>2022-10-15T20:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting to my customer's GP vpn, most of my browsers display NET::ERR_CERT_AUTHORITY_INVALID</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518616#M3351</link>
      <description>&lt;P&gt;I knew this would happen.&amp;nbsp; Company puts up LIVEcommunity as a teaser.&amp;nbsp; No support whatsoever.&amp;nbsp; VMware is just as bad.&amp;nbsp; Please, God, give me PulseSecure.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2022 21:35:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518616#M3351</guid>
      <dc:creator>charliegil</dc:creator>
      <dc:date>2022-10-20T21:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting to my customer's GP vpn, most of my browsers display NET::ERR_CERT_AUTHORITY_INVALID</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518660#M3352</link>
      <description>&lt;P&gt;This is the community support forum, which is monitored by some PA support employees, but is not support. Simple facts... yes first line PA support sucks... If you have opened a ticket with PA support and it hasn't been answered in months then harass support/your sales person and get it escalated. If you don't have a support contract then they aren't going to respond to you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for your particular question... It sounds like you are on someone else's business network who is running a PA firewall and your laptop is not part of their domain/not managed by them. It also sounds like they have enabled SSL decryption on the firewall. This decrypts most/all SSL traffic passing thru the firewall, between the client and server, so the PA can inspect the data for URL/content filtering, threats, malware/viruses, etc. It does this by breaking the SSL between you and the server and re-encrypting it with a SSL certificate generated by the PaloAlto. Your browser correctly identifies that the SSL certificate does not have a valid CA authority because your laptop only has known public CAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL decryption on the PaloAlto is done by creating (or using an existing) corporate root CA. This internal CA is then distributed to all the PCs as a trusted root CA authority (usually via the AD domain). When the client makes a connection to "&lt;A href="http://www.example.com" target="_blank"&gt;www.example.com&lt;/A&gt;" the&amp;nbsp;PA intercepts the connection, initiates a SSL connection to the destination server itself, and then re-encrypts the internal connection between the client and firewall with the corporate CA. The client trusts this connection because it knows this internal CA, but your laptop does not because you only have public CAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can verify this by examining the SSL cert delivered to your PC when you go to "&lt;A href="http://www.example.com" target="_blank"&gt;www.example.com&lt;/A&gt;" on the internal network. The certificate signer will be something like "ExampleCorpCA", instead of a well known CA like DigiCert/Entrust/NetworkSolutions/etc. If so then Example should be able to provide you with their corporate root CA certificate (and possibly intermediaries CA) to load into your own trusted certificate store. If Example is choosing to decrypt traffic passing thru their firewall... then that is on them.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2022 23:08:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/connecting-to-my-customer-s-gp-vpn-most-of-my-browsers-display/m-p/518660#M3352</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-10-20T23:08:56Z</dc:date>
    </item>
  </channel>
</rss>

