<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildcard certificate for management interface access in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471525#M103118</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181759"&gt;@Ben-Price&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Have you inspected the certificate and actually verified that the rollback didn't somehow break the firewall's service profile association? I can't say I've ever used a wildcard for our firewalls, I just issue them their own certificates through internal PKIs instead, but it should work perfectly fine just testing it out in my lab. I would expect to have additional information detailed in the certificate (Country, State, Org is generally the minimum I've seen referenced), but as long as it's signed by your internal CA that shouldn't matter.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The error that you have in your screenshot though points to an issue with the actual issuing certificate authority trust. That makes me think that it either wasn't signed, it's presenting an unexpected certificate versus what the customer is expecting, or it's reverted back to the default and removed the specified SSL/TLS service profile that used to be specified while it was working.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Mar 2022 04:20:32 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2022-03-09T04:20:32Z</dc:date>
    <item>
      <title>Wildcard certificate for management interface access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471061#M103084</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A client is trying to install a wildcard certificate on their firewall for management access, but is receiving a certificate error in the browser.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the below the correct way to generate the required CSR for the firewall for a wildcard certificate?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BenPrice_0-1646699239332.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39519i4FA2D6D8FD992B20/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="BenPrice_0-1646699239332.png" alt="BenPrice_0-1646699239332.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Can a certificate with the attributes shown be uploaded to the firewall and work, without a CSR being generated on the firewall?&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 00:30:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471061#M103084</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-03-08T00:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard certificate for management interface access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471345#M103085</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181759"&gt;@Ben-Price&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In order to get better traction for this, I have moved your post to the General Topics area, as the Feedback area is only for feedback to the LIVE community.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I would recommend that you visit the General Topics area to see and follow up on your discussion.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Kiwi.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 15:08:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471345#M103085</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-03-08T15:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard certificate for management interface access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471382#M103091</link>
      <description>&lt;P&gt;What's the error they get?&lt;/P&gt;&lt;P&gt;If you use a PKCS12 certificate that includes a private key, you can upload a certificate without a CSR being generated on the PA.&lt;/P&gt;&lt;P&gt;Why would you use a wildcard for a device management certificate?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 16:14:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471382#M103091</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2022-03-08T16:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard certificate for management interface access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471501#M103108</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55733"&gt;@rmfalconer&lt;/a&gt;&amp;nbsp;Thanks for the feedback. Client is using the wildcard for GP and Management interface. Wildcard cert is working for GP. Client said the Wildcard certificate was working for the Mgmt Interface, when they were on PAN OS 10.0.9, they rolled back to 10.0.8 as they were having commit issues on 10.0.9 and now on 10.0.8 the certificate is broken. I don't see any known issues for this type of thing in PAN OS 10.0.8.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BenPrice_0-1646775945791.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39539iBB4E642A392D8719/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="BenPrice_0-1646775945791.png" alt="BenPrice_0-1646775945791.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 21:46:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471501#M103108</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-03-08T21:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard certificate for management interface access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471525#M103118</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181759"&gt;@Ben-Price&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Have you inspected the certificate and actually verified that the rollback didn't somehow break the firewall's service profile association? I can't say I've ever used a wildcard for our firewalls, I just issue them their own certificates through internal PKIs instead, but it should work perfectly fine just testing it out in my lab. I would expect to have additional information detailed in the certificate (Country, State, Org is generally the minimum I've seen referenced), but as long as it's signed by your internal CA that shouldn't matter.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The error that you have in your screenshot though points to an issue with the actual issuing certificate authority trust. That makes me think that it either wasn't signed, it's presenting an unexpected certificate versus what the customer is expecting, or it's reverted back to the default and removed the specified SSL/TLS service profile that used to be specified while it was working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 04:20:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/471525#M103118</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-03-09T04:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard certificate for management interface access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/478153#M103725</link>
      <description>&lt;P&gt;Deleted the wildcard certificate and re-imported and that has fixed the issue.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 00:14:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcard-certificate-for-management-interface-access/m-p/478153#M103725</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-04-05T00:14:13Z</dc:date>
    </item>
  </channel>
</rss>

