<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GP certificate differences in 2.3 and 3.1 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/gp-certificate-differences-in-2-3-and-3-1/m-p/140566#M48294</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an internal CA, we have a certificate generated and it is used for GP portal/gateway only, clients are authenticating via usual credentials. Nothing fancy overall. So there are external clients who do not have CA cert installed, so they are getting "untrusted certificate" warning when connecting to the GP gateway. But the GP agent behavior differs between versions 2.3 and 3.1 wen connecting to the gateway.&lt;/P&gt;&lt;P&gt;2.3 - click continue, accept the untrusted cert and roll on - login succeeds.&lt;/P&gt;&lt;P&gt;3.1 - click continue, login (because reject happens if invalid credentials are entered), but that is when connection fails with the message: "Gateway 1: Server certificate verification failed". Won't expand on tshoot logs and everything, but is that&amp;nbsp;way it goes? Is there a workaround other than installing CA cert to trust the issuer? Because if there is trusted cert installed for the issuer CA on the client/agent computer, connection happens fine with both versions.&lt;/P&gt;&lt;P&gt;I've found this: &lt;A href="https://www.paloaltonetworks.com/documentation/23/globalprotect-agent-rns/globalprotect-agent-2-3-release-information/changes-to-default-behavior#99749" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/23/globalprotect-agent-rns/globalprotect-agent-2-3-release-information/changes-to-default-behavior#99749&lt;/A&gt;, but as far as I understand, this should already happen on 2.3 according to this document. Can't seem to find anything related to 3.1 and what specifically changed there.&lt;/P&gt;&lt;P&gt;Any expierence with this?&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
    <pubDate>Wed, 01 Feb 2017 21:34:32 GMT</pubDate>
    <dc:creator>nikoo</dc:creator>
    <dc:date>2017-02-01T21:34:32Z</dc:date>
    <item>
      <title>GP certificate differences in 2.3 and 3.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gp-certificate-differences-in-2-3-and-3-1/m-p/140566#M48294</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an internal CA, we have a certificate generated and it is used for GP portal/gateway only, clients are authenticating via usual credentials. Nothing fancy overall. So there are external clients who do not have CA cert installed, so they are getting "untrusted certificate" warning when connecting to the GP gateway. But the GP agent behavior differs between versions 2.3 and 3.1 wen connecting to the gateway.&lt;/P&gt;&lt;P&gt;2.3 - click continue, accept the untrusted cert and roll on - login succeeds.&lt;/P&gt;&lt;P&gt;3.1 - click continue, login (because reject happens if invalid credentials are entered), but that is when connection fails with the message: "Gateway 1: Server certificate verification failed". Won't expand on tshoot logs and everything, but is that&amp;nbsp;way it goes? Is there a workaround other than installing CA cert to trust the issuer? Because if there is trusted cert installed for the issuer CA on the client/agent computer, connection happens fine with both versions.&lt;/P&gt;&lt;P&gt;I've found this: &lt;A href="https://www.paloaltonetworks.com/documentation/23/globalprotect-agent-rns/globalprotect-agent-2-3-release-information/changes-to-default-behavior#99749" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/23/globalprotect-agent-rns/globalprotect-agent-2-3-release-information/changes-to-default-behavior#99749&lt;/A&gt;, but as far as I understand, this should already happen on 2.3 according to this document. Can't seem to find anything related to 3.1 and what specifically changed there.&lt;/P&gt;&lt;P&gt;Any expierence with this?&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 21:34:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gp-certificate-differences-in-2-3-and-3-1/m-p/140566#M48294</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-02-01T21:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: GP certificate differences in 2.3 and 3.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gp-certificate-differences-in-2-3-and-3-1/m-p/140758#M48307</link>
      <description>&lt;P&gt;Server certificate verification failed usually points to the new check that was added where the Palo Alto will check the CN of the certificate used and the Global Protect Gateway FQDN/IP. These HAVE to match, either both as an IP or both as an FQDN. The gateway IP&amp;nbsp;is where you set an external or internal gateway options.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/GlobalProtect-Gateway-Certificate-Error-When-Trying-to-Use/ta-p/57043" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/GlobalProtect-Gateway-Certificate-Error-When-Trying-to-Use/ta-p/57043&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Peter&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 16:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gp-certificate-differences-in-2-3-and-3-1/m-p/140758#M48307</guid>
      <dc:creator>sullivanpj2</dc:creator>
      <dc:date>2017-02-02T16:15:26Z</dc:date>
    </item>
  </channel>
</rss>

