<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Push to devices failed reason SSL handshake fail in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/549445#M1517</link>
    <description>&lt;P&gt;Followed this doc &amp;amp; issue was resolved :&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wlJpCAI" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wlJpCAI&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However, this might not be scalable solution if you have to do this for large number of managed firewalls via Panorama. Expecting some better &amp;amp; easy resolution in future&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 16 Jul 2023 01:43:48 GMT</pubDate>
    <dc:creator>PS007</dc:creator>
    <dc:date>2023-07-16T01:43:48Z</dc:date>
    <item>
      <title>Push to devices failed reason SSL handshake fail</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529052#M825</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;recently we are unable to push config changes to devices from Panorama (version 10.1.6-h6), it fails with this error message: Panorama connectivity check failed. SSL handshake failed, reverting configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestion?&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2023 02:12:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529052#M825</guid>
      <dc:creator>Jbergill1</dc:creator>
      <dc:date>2023-01-29T02:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: Push to devices failed reason SSL handshake fail</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529076#M827</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139350"&gt;@Jbergill1&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Recent Panorama OS versions have a feature which tell the firewall to check connectivity with Panorama immaterially after the config push is completed. The purpose of this check is to verify if your last commit is not causing any issues with communication between firewall and Panorama, which will makes your firewall unmanageable (and probably unreachable).&lt;/P&gt;
&lt;P&gt;If the check is success is successful - firewall can connect to Panorama, config is considered completely installed&lt;/P&gt;
&lt;P&gt;If the check fails - firewall cannot reach Panorama, firewall will automatically start reverting your last push.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately the error message in the commit is very generic - it just tells you that firewall cannot establish HTTPS connection with Panorama, but the real reason could be anything, really depends on what configuration you are trying to push and what is the difference between the new and the currently running config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In nutshell your last commit breaks the communication between firewall and Panorama. You need to figure out what and fix it, before pushing to the device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently experienced something similar - modified one rule on remote firewall from using any service to application-default. PAN FW have app-id for traffic to panorama - the app is called "panorama", but it is depending on ssl (because the real traffic is https based). The problem is that this traffic use specific port, which is not default for ssl, so my rule no longer was matching. For that reason when pushing the config to FW, it immediately start blocking the traffic from FW to Panorama.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my advise is:&lt;/P&gt;
&lt;P&gt;- Check your traffic/unified logs and see if you have any block traffic from FW mgmt to Panorama IP.&lt;/P&gt;
&lt;P&gt;- Review your config push? Are you changing anything related to Panorama config? Panorama IP, FW mgmt, SSL certificates&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2023 21:35:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529076#M827</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2023-01-29T21:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: Push to devices failed reason SSL handshake fail</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529282#M832</link>
      <description>&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Thanks for your answer.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Regarding your advice: there was no denied traffic between fw and panorama, and there was no configuration change to justify it.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Investigating the issue, the key was the secure connection between panorama and the fw, in fact the error was seeing the traffic capture, a tls handshake issue.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Enabling and configuring secure communication between fw and panorama has solved the problem.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Palo Alto support can't explain to me how it has been working before without that configuration.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Thanks and regards.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 11:08:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529282#M832</guid>
      <dc:creator>Jbergill1</dc:creator>
      <dc:date>2023-01-31T11:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Push to devices failed reason SSL handshake fail</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529373#M837</link>
      <description>&lt;P&gt;I still remember the issue when people upgraded their globalprotect app and firewall they saw the error ""Could not verify the server certificate of the gateway" &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004O5iCAE" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004O5iCAE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This issue was caused because the newer versions had stronger security checks, so this could be the same case.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 21:14:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/529373#M837</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-01-31T21:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Push to devices failed reason SSL handshake fail</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/549445#M1517</link>
      <description>&lt;P&gt;Followed this doc &amp;amp; issue was resolved :&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wlJpCAI" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wlJpCAI&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However, this might not be scalable solution if you have to do this for large number of managed firewalls via Panorama. Expecting some better &amp;amp; easy resolution in future&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2023 01:43:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/push-to-devices-failed-reason-ssl-handshake-fail/m-p/549445#M1517</guid>
      <dc:creator>PS007</dc:creator>
      <dc:date>2023-07-16T01:43:48Z</dc:date>
    </item>
  </channel>
</rss>

