<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificates expiration notification in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598447#M3778</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136894843"&gt;@M.Sharma415844&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;No, it's not renewed automatically. Generally best practice is that you would generate a certificate for the management interface through your organizations PKI system. Some people will generate a self-signed certificate and import it into the trust store of the machines that will be used to monitor the firewall if they don't have an internal PKI in place.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like anything else you want to have &lt;EM&gt;some &lt;/EM&gt;sort of unexpired certificate installed on the management interface, whether that's issued by your organization's PKI or self-signed on the firewall and imported into the machines that will be monitoring the system. You don't want to train your firewall administrators to just bypass the certificate warning without validating the certificate as you're essentially training poor behavior. If someone is used to just bypassing a certificate warning it makes it easier to intercept their traffic and proxy the connection as they've already been trained to just bypass the certificate warning that such an attack would present. &lt;/P&gt;</description>
    <pubDate>Sat, 21 Sep 2024 04:06:41 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2024-09-21T04:06:41Z</dc:date>
    <item>
      <title>SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/589742#M3318</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have received an alert "SSL Certificates-HTTPS HTTPS DaysRemaining" for Palo Alto. When I log in to the firewall in the browser, I can see browser shows as Not Secure and when I check the certificate, it shows it will expire in July 14.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the below screenshot, the part which I hide consist the serial number of the device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can some one please help me to understand which certificate is this? How will it get renewed?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MSharma415844_1-1718680977001.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60388iEA40A8A5FF47DDA6/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MSharma415844_1-1718680977001.png" alt="MSharma415844_1-1718680977001.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 03:23:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/589742#M3318</guid>
      <dc:creator>M.Sharma415844</dc:creator>
      <dc:date>2024-06-18T03:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/596512#M3672</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136894843"&gt;@M.Sharma415844&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are seeing the default certificate for management interface.&lt;/P&gt;
&lt;P&gt;Replace it with a custom cert by following below document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/replace-the-certificate-for-inbound-management-traffic" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/replace-the-certificate-for-inbound-management-traffic&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 03:31:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/596512#M3672</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2024-09-02T03:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598441#M3774</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192803"&gt;@akuzhuppilly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your response. I understand the process of creating and attaching custom certificates to the management interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, I am specifically looking for more detailed information about the “default certificate for the management interface.” Do you have any additional details regarding this certificate?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 03:17:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598441#M3774</guid>
      <dc:creator>M.Sharma415844</dc:creator>
      <dc:date>2024-09-21T03:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598442#M3775</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136894843"&gt;@M.Sharma415844&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;It's documented in the article that &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192803"&gt;@akuzhuppilly&lt;/a&gt; linked to directly and is described in the very first sentence of the article. You're using the certificate that the firewall generated itself when you powered it on the first time after it was purchased or after the last time it was factory reset.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 03:25:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598442#M3775</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-09-21T03:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598443#M3776</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your quick reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I overlooked that detail. I appreciate you bringing it to my attention.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 03:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598443#M3776</guid>
      <dc:creator>M.Sharma415844</dc:creator>
      <dc:date>2024-09-21T03:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598444#M3777</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192803"&gt;@akuzhuppilly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One last question with respect to this topic, so this certificate gets renewed automatically?&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 03:34:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598444#M3777</guid>
      <dc:creator>M.Sharma415844</dc:creator>
      <dc:date>2024-09-21T03:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates expiration notification</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598447#M3778</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136894843"&gt;@M.Sharma415844&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;No, it's not renewed automatically. Generally best practice is that you would generate a certificate for the management interface through your organizations PKI system. Some people will generate a self-signed certificate and import it into the trust store of the machines that will be used to monitor the firewall if they don't have an internal PKI in place.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like anything else you want to have &lt;EM&gt;some &lt;/EM&gt;sort of unexpired certificate installed on the management interface, whether that's issued by your organization's PKI or self-signed on the firewall and imported into the machines that will be monitoring the system. You don't want to train your firewall administrators to just bypass the certificate warning without validating the certificate as you're essentially training poor behavior. If someone is used to just bypassing a certificate warning it makes it easier to intercept their traffic and proxy the connection as they've already been trained to just bypass the certificate warning that such an attack would present. &lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 04:06:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-certificates-expiration-notification/m-p/598447#M3778</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-09-21T04:06:41Z</dc:date>
    </item>
  </channel>
</rss>

