<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to configure VPN and Certificates to cut VPN access when the Certificate is revoked. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-vpn-and-certificates-to-cut-vpn-access-when-the/m-p/557883#M113163</link>
    <description>&lt;P&gt;Hello team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to know How to configure VPN and Certificates to cut VPN access when the Certificate is revoked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have revoked a certificate into the Firewall but I can connect anyway from VPN.... I am using on my GlobalProtect connection and the connections are working fine, I need to cut this connection when the certificate is revoked, can anyone help me?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2023 08:04:38 GMT</pubDate>
    <dc:creator>Alpalo</dc:creator>
    <dc:date>2023-09-14T08:04:38Z</dc:date>
    <item>
      <title>How to configure VPN and Certificates to cut VPN access when the Certificate is revoked.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-vpn-and-certificates-to-cut-vpn-access-when-the/m-p/557883#M113163</link>
      <description>&lt;P&gt;Hello team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to know How to configure VPN and Certificates to cut VPN access when the Certificate is revoked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have revoked a certificate into the Firewall but I can connect anyway from VPN.... I am using on my GlobalProtect connection and the connections are working fine, I need to cut this connection when the certificate is revoked, can anyone help me?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 08:04:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-vpn-and-certificates-to-cut-vpn-access-when-the/m-p/557883#M113163</guid>
      <dc:creator>Alpalo</dc:creator>
      <dc:date>2023-09-14T08:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure VPN and Certificates to cut VPN access when the Certificate is revoked.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-vpn-and-certificates-to-cut-vpn-access-when-the/m-p/557892#M113165</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;The certificate are form of authentication. Which means they are used when user is initiating a connection to the firewall.&lt;/P&gt;
&lt;P&gt;Revoking certificate does not affect currently established connection, the&amp;nbsp; same way&amp;nbsp; as disabling user account would disconnect the user if he has connected with username and password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to manually disconnect the GP client from the gateway - if there is currently established session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To prevent the user from connecting again you need to enable CRL or OCSP check in Ceritificate Profile that you assign for your GP Portal/Gateway. Look&amp;nbsp; at section 8.Certificate Profile, step 7 on the following link - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFoCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFoCAK&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;7. (optional) Check CRL or OCSP if the portal/gateway needs to verify the client/machine cert's revocation status using CRL or OCSP. Please use this with caution as it can result in clients failing to connect if used in conjunction with 'Block session if certificate status is unknown'.&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that above is assuming you are&amp;nbsp; using internal PKI, to which firewall has access from its dedicated mgmt interface.&lt;/P&gt;
&lt;P&gt;If you are using self-signed&amp;nbsp; CA that is generated by the firewall you will need to enable OCSP reponder as described here - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIzCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIzCAK&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 08:39:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-vpn-and-certificates-to-cut-vpn-access-when-the/m-p/557892#M113165</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2023-09-14T08:39:32Z</dc:date>
    </item>
  </channel>
</rss>

