<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN with Client Certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-client-certificate/m-p/24266#M17687</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to use SSL VPN with Client Certificate.&lt;/P&gt;&lt;P&gt;I will install CA server on MS Window 2008.&lt;/P&gt;&lt;P&gt;I know CA server is installed 'Enterprise CA mode" or "Standalone CA mode".&lt;/P&gt;&lt;P&gt;The Enterprise mode deliver Certificate to assist AD server.&lt;/P&gt;&lt;P&gt;The Standalone mode deliver Certificate by 'Web enrollment'.&lt;/P&gt;&lt;P&gt;I have questions.&lt;/P&gt;&lt;P&gt;Is PaloAlto imported each Certificates possible? &lt;/P&gt;&lt;P&gt;Can PA connect each mode CA server by OCSP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Mar 2013 15:44:03 GMT</pubDate>
    <dc:creator>KiCheon.Lee</dc:creator>
    <dc:date>2013-03-27T15:44:03Z</dc:date>
    <item>
      <title>SSL VPN with Client Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-client-certificate/m-p/24266#M17687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to use SSL VPN with Client Certificate.&lt;/P&gt;&lt;P&gt;I will install CA server on MS Window 2008.&lt;/P&gt;&lt;P&gt;I know CA server is installed 'Enterprise CA mode" or "Standalone CA mode".&lt;/P&gt;&lt;P&gt;The Enterprise mode deliver Certificate to assist AD server.&lt;/P&gt;&lt;P&gt;The Standalone mode deliver Certificate by 'Web enrollment'.&lt;/P&gt;&lt;P&gt;I have questions.&lt;/P&gt;&lt;P&gt;Is PaloAlto imported each Certificates possible? &lt;/P&gt;&lt;P&gt;Can PA connect each mode CA server by OCSP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 15:44:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-client-certificate/m-p/24266#M17687</guid>
      <dc:creator>KiCheon.Lee</dc:creator>
      <dc:date>2013-03-27T15:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN with Client Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-client-certificate/m-p/24267#M17688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="T_Text"&gt;&lt;A name="1653273"&gt;Use the &lt;/A&gt;&lt;SPAN style="font-weight: bold;"&gt;OCSP Responder&lt;/SPAN&gt; (Online Certificate Status Protocol Responder) page to define a server that will be used to verify the revocation status of certificates issues by the PAN-OS device. When generating new certificates, you can specify the OCSP Responder that will be used.&lt;/P&gt;&lt;P class="T_Text"&gt;&lt;A name="1653487"&gt;To enable OCSP, go to &lt;/A&gt;&lt;SPAN style="font-weight: bold;"&gt;Device &amp;gt; Setup &amp;gt; Sessions&lt;/SPAN&gt; and under &lt;SPAN style="font-weight: bold;"&gt;Sessions Features&lt;/SPAN&gt; click &lt;SPAN style="font-weight: bold;"&gt;Decryption Certificate Revocation Settings&lt;/SPAN&gt;.&lt;/P&gt;&lt;P class="T_Text"&gt;&lt;A name="1653274"&gt; &lt;/A&gt;&lt;/P&gt;&lt;TABLE cellspacing="0" class="TW_TableWide" style="text-align: left;" summary=""&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 2.0pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TH_TableHeading"&gt;&lt;A name="1653505"&gt;Field&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 2.0pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TH_TableHeading"&gt;&lt;A name="1653507"&gt;Description&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.5pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading"&gt;&lt;A name="1653509"&gt;Name&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.5pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody"&gt;&lt;A name="1653511"&gt;Enter a name to identify the OCSP responder server (up to &lt;/A&gt;&lt;SPAN class="Bold" style="font-weight: normal;"&gt;31&lt;/SPAN&gt; characters). The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading"&gt;&lt;A name="1653513"&gt;Host Name&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody"&gt;&lt;A name="1653515"&gt;Enter the host name of the OCSP responder server that will be used to check certificate revocation status for your devices.&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 16:24:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-client-certificate/m-p/24267#M17688</guid>
      <dc:creator>das</dc:creator>
      <dc:date>2013-03-27T16:24:19Z</dc:date>
    </item>
  </channel>
</rss>

