<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can this OID notificate the expired certificates for SSL decryption and Global Protect? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/can-this-oid-notificate-the-expired-certificates-for-ssl/m-p/1232173#M124616</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found the below OID in SNMP Trap.&lt;BR /&gt;Can this OID notificate the expired certificates for SSL decryption and Global Protect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBfzCAG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBfzCAG&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;====&lt;BR /&gt;panCryptoCertExpiryTrap&amp;nbsp; .1.3.6.1.4.1.25461.2.1.3.2.0.100&amp;nbsp; Certificate expired&lt;BR /&gt;====&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;MasaW&lt;/P&gt;</description>
    <pubDate>Fri, 20 Jun 2025 04:26:20 GMT</pubDate>
    <dc:creator>MasaW</dc:creator>
    <dc:date>2025-06-20T04:26:20Z</dc:date>
    <item>
      <title>Can this OID notificate the expired certificates for SSL decryption and Global Protect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-this-oid-notificate-the-expired-certificates-for-ssl/m-p/1232173#M124616</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found the below OID in SNMP Trap.&lt;BR /&gt;Can this OID notificate the expired certificates for SSL decryption and Global Protect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBfzCAG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBfzCAG&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;====&lt;BR /&gt;panCryptoCertExpiryTrap&amp;nbsp; .1.3.6.1.4.1.25461.2.1.3.2.0.100&amp;nbsp; Certificate expired&lt;BR /&gt;====&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;MasaW&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2025 04:26:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-this-oid-notificate-the-expired-certificates-for-ssl/m-p/1232173#M124616</guid>
      <dc:creator>MasaW</dc:creator>
      <dc:date>2025-06-20T04:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Can this OID notificate the expired certificates for SSL decryption and Global Protect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-this-oid-notificate-the-expired-certificates-for-ssl/m-p/1232223#M124621</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55776"&gt;@MasaW&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This will not generate alerts for anything other than the device management certificate. You can automate these checks easily through some API calls and have whatever alert interval you wish, I've found this to work better than anything you can do natively.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A brief example of how you would do this, note that I specifically don't give working examples of scripts as someone implementing them needs to be able to maintain them.&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;#Collect the current certificates#
Get_Cert_List = requests.get('https://' + str(myFirewallUrl) + '/api/?type=config&amp;amp;action=get&amp;amp;xpath=/config/shared/certificate',headers=headers)

#Take the return and parse it#
Certificate_Dict = xmltodict.parse(Get_Cert_List.content)

Certificates = Certificate_Dict['response']['result']['certificate']['entry']
for Certificate in Certificates:
    Certificate_Name = Certificate['@name']
    Certificate_Expiration = Certificate['not-valid-after']
    Certificate_ExpiryEpoch = Certificate['expiry-epoch']
    Expiration_Date = datetime.datetime.fromtimestamp(int(Certificate_ExpiryEpoch))
    Current_Date = datetime.datetime.now()
    Date_Delta = Expiration_Date - Current_Date
    Day_Count = Date_Delta.days
    if Day_Count &amp;lt;=30:
        Alert_Certificate_Expiration(Certificate_Name=str(Certificate_Name),Certificate_Expiration=str(Certificate_Expiration),Date_Delta=str(Day_Count),NoAlert=NoAlert)&lt;/LI-CODE&gt;
&lt;P&gt;This should give you enough of an example if you choose to do this through the API that is more adaptable to what you specifically want.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2025 14:12:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-this-oid-notificate-the-expired-certificates-for-ssl/m-p/1232223#M124621</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-06-20T14:12:57Z</dc:date>
    </item>
  </channel>
</rss>

