<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo-hosted EDL empty when using certificate profile in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566266#M623</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68933"&gt;@VTQNetwork&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check and see if you have certificate profile errors under Monitor &amp;gt; Logs &amp;gt; System with the filter ( subtype eq tls ).&amp;nbsp; I have seen an undocumented bug where the EDL server certificate authentication fails with various versions of PAN-OS.&amp;nbsp; I am currently on 10.2.4 and 5, which works fine.&amp;nbsp; There is also a chance where the certificate profile fails because the wrong certificates or an incomplete chain are in the profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Sun, 19 Nov 2023 10:26:58 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-11-19T10:26:58Z</dc:date>
    <item>
      <title>Palo-hosted EDL empty when using certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566239#M622</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;I can’t use my SaaS EDLs in Prisma. It works fine on-prem, but in Prisma the list contains 0.0.0.0/0 entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I remove certificate profile, it work well.&lt;/P&gt;
&lt;P&gt;I configured decryption exclusion for Prisma Infra subnet as I had decryption errors for Palo SaaS URL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i did not configure any security policy from infra subnet to internet (but EDL without cert profile works).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I use the EDL in security &amp;amp; decryption policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;</description>
      <pubDate>Sat, 18 Nov 2023 21:56:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566239#M622</guid>
      <dc:creator>VTQNetwork</dc:creator>
      <dc:date>2023-11-18T21:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-hosted EDL empty when using certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566266#M623</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68933"&gt;@VTQNetwork&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check and see if you have certificate profile errors under Monitor &amp;gt; Logs &amp;gt; System with the filter ( subtype eq tls ).&amp;nbsp; I have seen an undocumented bug where the EDL server certificate authentication fails with various versions of PAN-OS.&amp;nbsp; I am currently on 10.2.4 and 5, which works fine.&amp;nbsp; There is also a chance where the certificate profile fails because the wrong certificates or an incomplete chain are in the profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 19 Nov 2023 10:26:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566266#M623</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-11-19T10:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-hosted EDL empty when using certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566368#M624</link>
      <description>&lt;P&gt;Thank you for reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Indeed, I had cert errors in System logs until Saturday:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EDL server certificate authentication failed. A local copy of associated external dynamic list will be used, so it won't impact your policy. EDL Name: SaaS-EDL-Microsoft-Defender-EU-URL, EDL Source URL: &lt;A href="https://saasedl.paloaltonetworks.com/feeds/msdefender/eu/microsoftdefenderforendpointeu/url" target="_blank" rel="noopener"&gt;https://saasedl.paloaltonetworks.com/feeds/msdefender/eu/microsoftdefenderforendpointeu/url&lt;/A&gt;, CN: saasedl.paloaltonetworks.com, Reason: self signed certificate in certificate chain&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since I've configured decryption exclusion for Prisma's Infrastructure subnet, I don't have these errors, but EDLs still does not work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note my issue is in Prisma Access. The same certificate profile works fine for my on-prem firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Root CA I use and the procedure I've followed is described here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/configure-the-firewall-to-access-an-external-dynamic-list-from-the-edl-hosting-service/convert-the-globalsign-root-r1-certificate-to-pem-format#id247b0a73-8aa1-4e0e-a3f8-6dbe8d4f9033" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/configure-the-firewall-to-access-an-external-dynamic-list-from-the-edl-hosting-service/convert-the-globalsign-root-r1-certificate-to-pem-format#id247b0a73-8aa1-4e0e-a3f8-6dbe8d4f9033&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm on Panorama managed Prisma, my Panorama versionn is&amp;nbsp;11.0.2-h2 and the plugin&amp;nbsp;cloud_services-4.1.0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;Kacper&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2023 11:53:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566368#M624</guid>
      <dc:creator>VTQNetwork</dc:creator>
      <dc:date>2023-11-20T11:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-hosted EDL empty when using certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566465#M625</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68933"&gt;@VTQNetwork&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the information!&amp;nbsp; The message that concerns me is "Reason: self signed certificate in certificate chain."&amp;nbsp; That may indicate that the certificate profile in Prisma Access is different than the one on your on-prem firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 10:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566465#M625</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-11-21T10:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-hosted EDL empty when using certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566482#M626</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yeah, I was also surprised when saw this message. I suppose there is some decryption for Prisma Infra. I've configured decryption exclusion. Now I do not have the error anymore, but my EDL with cert profile still does not work as expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to Palo's manual, the same cert should be used for both on-prem &amp;amp; Prisma, but maybe additional policies/cert is required for Prisma Infra network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm waiting for the TAC and update this thread. So far we've reinstalled certificate twice (I use cert from Palo), they suggested to change url (I use url from Palo).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;Kacper&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 13:04:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/566482#M626</guid>
      <dc:creator>VTQNetwork</dc:creator>
      <dc:date>2023-11-21T13:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-hosted EDL empty when using certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/1252862#M1288</link>
      <description>&lt;P&gt;I'm having the same issue where the EDL works for on-prem firewalls, but not in Prisma Access. The same certificate profile is configured in both locations. Did you ever resolve this issue?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:44:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/palo-hosted-edl-empty-when-using-certificate-profile/m-p/1252862#M1288</guid>
      <dc:creator>automator</dc:creator>
      <dc:date>2026-04-23T13:44:09Z</dc:date>
    </item>
  </channel>
</rss>

