<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Webui cert for HA PA's in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33050#M24218</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran into the same issue and what I found out is that the if you are running an Active/Passvice config you can only have one WEbUI cert per cluster. To get it so you don't have a a cert issue, issue the cert for the HA ip address and use that for your login. You are not able to have a cert per device but one for the cluster. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 May 2015 14:04:24 GMT</pubDate>
    <dc:creator>murphyj</dc:creator>
    <dc:date>2015-05-12T14:04:24Z</dc:date>
    <item>
      <title>Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33045#M24213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am trying to assign a external cert to the webui so I don't get the warning message anymore? I imported my cert to the primary box and the setting did not fully synchronize to the passive box. I noticed there is an import and an import HA, do I have to use import HA to make it synch to both boxes?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 12:45:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33045#M24213</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T12:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33046#M24214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The import HA key function is related to the encryption of your HA trafic. Basically, you have to export the key from one firewall, and import it into the other one and vice-versa. You only need to do that if you enabled encryption in your HA settings (in Device -&amp;gt; High Availability). What is the current status of your HA on your dashboard? Does it say it's synchronized?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 13:47:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33046#M24214</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-05-12T13:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33047#M24215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What we are trying to do is use our local CA to sign the cert the webui. So I generated a CSR, imported it into the active PA and then selected that it be applied to the webui. When I went to the passive side I could see the cert but the use on webui was not selected. Then the sync began to fail and then the cert disappeared and the only way I could bring them back into sync was to do it from the passive side. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 13:51:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33047#M24215</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T13:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33048#M24216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand that you generated the certificate on the firewall but had it signed by your local root CA. That is what we did and it is working for us. Make sure you also import your local root CA so you have the whole chain in your configuration. I can't help you about your synchronization issue, though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:00:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33048#M24216</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-05-12T14:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33049#M24217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So did you import the cert to both the active and passive PA's. Did you have to export or import any of the private keys? What was your process. it appears the sync issues were related to the installation of the cert on the active node.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:04:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33049#M24217</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T14:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33050#M24218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran into the same issue and what I found out is that the if you are running an Active/Passvice config you can only have one WEbUI cert per cluster. To get it so you don't have a a cert issue, issue the cert for the HA ip address and use that for your login. You are not able to have a cert per device but one for the cluster. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:04:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33050#M24218</guid>
      <dc:creator>murphyj</dc:creator>
      <dc:date>2015-05-12T14:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33051#M24219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so I has to be assigned to the HA name and IP&amp;nbsp; not the individual PA box name? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:06:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33051#M24219</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T14:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33052#M24220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We did issue the cert for the HA name and the HA IP address and only imported it to the active node and that didn't work. Then we began to have synch issues and then the cert dissappeared&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:12:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33052#M24220</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T14:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33053#M24221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my case, I generated a certificate for each firewall (I'm also in active-passive mode). The certificate for the web UI are not synchronized but the other certificates are. Maybe you synchronized the firewall before selecting the "Certificate for Secure Web GUI" option?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:12:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33053#M24221</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-05-12T14:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33054#M24222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know but it didn't work till I selected certificate for secure web gui on the passive node and then it went out of sync and the only way to sync it was from the passive side which wiped out the changes on the active side to make them alike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:16:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33054#M24222</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T14:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33055#M24223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So did you create a separate csr for each node and import them? Did the cert from the active side also sync to the passive side and did you end up have two on each box? Did you have to swap any private keys?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:19:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33055#M24223</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-05-12T14:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33056#M24224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ended up making the PA a Sub-CA since I was going to be doing decryption, but you should be able to do a CSR from the active get the cert. Click on the cert and set it as the webui cert and commit. Once you do that it should sync over, but when you do this you will still get an error every time you connect to each system individual and no error when you connect to the cluster address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:44:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33056#M24224</guid>
      <dc:creator>murphyj</dc:creator>
      <dc:date>2015-05-12T14:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Webui cert for HA PA's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33057#M24225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I generated a certificate on active firewall, exported the CSR had it signed, then imported our local root CA and the signed certificate, and finally committed the changes. I then did the same on the passive firewall. I didn't see the web UI certificate of the active firewall in the passive one (and vice-versa).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:46:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webui-cert-for-ha-pa-s/m-p/33057#M24225</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-05-12T14:46:22Z</dc:date>
    </item>
  </channel>
</rss>

