<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Gateway fails to authenticate clients with new certificate uploaded in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-gateway-fails-to-authenticate-clients-with-new-certificate/m-p/1238006#M125139</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1339137399"&gt;@m.shah.alizada2000&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see you mentioned you had combined the&amp;nbsp;&lt;SPAN&gt;main cert the two intermediate certs, the root cert and the private key into one pfx (pkcs12) file. However, in your screenshot, I see the root cer, int certs, and wildcard is separate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Are you saying your SEC360 wildcard cert is the result of this? You already look to have the cert chain imported individually and that looks correct as the root ca is at the top with the intermediate certs within the root ca.&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try splitting the bundle so your wildcard is its own cert with the private key.&amp;nbsp;Once that’s done, attach the wildcard cert to your SSL/TLS service profile that you use for the Portal/GW config.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Sep 2025 01:00:38 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2025-09-16T01:00:38Z</dc:date>
    <item>
      <title>VPN Gateway fails to authenticate clients with new certificate uploaded</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-gateway-fails-to-authenticate-clients-with-new-certificate/m-p/1237670#M125100</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a Palo Alto VPN gateway at our office, where our clients and customer’s Palo Alto connects to!&lt;/P&gt;
&lt;P&gt;Our certificate at one of our customers site has expired and the vpn connection is down and hence to the isp!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I have generated a private key, using that I have generated a CSR sent the CSR to the CA and they have returned the public cert back to me!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I used OpenSSL to combine the main cert the two intermediate certs, the root cert and the private key into one pfx (pkcs12) file!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then I uploaded the certs (pfx cert, root and intermediate certs) into the Palo Alto.&lt;/P&gt;
&lt;P&gt;Now this is what I did. I uploaded the cert into the vpn gateway and client can’t connect ( I wanted to test and see if this works in the gateway then should be working in the client Palo Palo).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But this completely failed.&lt;/P&gt;
&lt;P&gt;can any one help me figure this out please???&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are two attachment I have uploaded one of them is the client expired cert and the other one is the my machine failing to authenticate with the vpn gateway!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;please help I need it by this Friday!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#paloalto&lt;/P&gt;
&lt;P&gt;#certificate&lt;/P&gt;
&lt;P&gt;#vpngateway&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 17:14:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-gateway-fails-to-authenticate-clients-with-new-certificate/m-p/1237670#M125100</guid>
      <dc:creator>m.shah.alizada2000</dc:creator>
      <dc:date>2025-09-10T17:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Gateway fails to authenticate clients with new certificate uploaded</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-gateway-fails-to-authenticate-clients-with-new-certificate/m-p/1238006#M125139</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1339137399"&gt;@m.shah.alizada2000&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see you mentioned you had combined the&amp;nbsp;&lt;SPAN&gt;main cert the two intermediate certs, the root cert and the private key into one pfx (pkcs12) file. However, in your screenshot, I see the root cer, int certs, and wildcard is separate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Are you saying your SEC360 wildcard cert is the result of this? You already look to have the cert chain imported individually and that looks correct as the root ca is at the top with the intermediate certs within the root ca.&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try splitting the bundle so your wildcard is its own cert with the private key.&amp;nbsp;Once that’s done, attach the wildcard cert to your SSL/TLS service profile that you use for the Portal/GW config.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 01:00:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-gateway-fails-to-authenticate-clients-with-new-certificate/m-p/1238006#M125139</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-09-16T01:00:38Z</dc:date>
    </item>
  </channel>
</rss>

