<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect OCSP URL location with Offline Root CA and Enterprise Subordinate CA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/158896#M52042</link>
    <description>I don't know 100% if this information is still valid but in the past I think only http url's were supported. I also searched in the documentation and so far I was not able to find something about an ldap url.&lt;BR /&gt;If the url is included in your certificate then it will be enough if you simply click the checkboses for "Use OCSP" and "Use CRL". OCSP is always the preferred one.&lt;BR /&gt;In the url's you only need the url for your intermediate CA, because this is the one which signs your client/user certificates.&lt;BR /&gt;Ok, the inermediate can be revoked too but if you ever run into a problem with this one revoked then you need to manually change the cert on the firewall anyway. But if you simply import the root cert to your fw cert store, the fw will also get revocation information for that cert and likely mark your inermediate as invalid if it is revoked, but I did never test this.</description>
    <pubDate>Thu, 01 Jun 2017 17:22:12 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2017-06-01T17:22:12Z</dc:date>
    <item>
      <title>GlobalProtect OCSP URL location with Offline Root CA and Enterprise Subordinate CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/158838#M52007</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using Certificate Authentication Profile for Pre-Logon and then Username and Password before VPN can be established.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;GP is working fine and we would like to validate when certificate is revoked, it will stop the machine from connecting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our environment we have an Standalone Root CA and Enterprise Subordinate CA and the URL locations for OCSP and CDP are pointing to LDAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CDP&lt;/P&gt;&lt;P&gt;[1]CRL Distribution Point&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Distribution Point Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Full Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL=ldap:///CN=Ent-CA,CN=ServerName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=X,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint (ldap:///CN=Ent-CA,CN=ServerName,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=X,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AIA (OCSP?)&lt;/P&gt;&lt;P&gt;[1]Authority Info Access&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Access Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Alternative Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL=ldap:///CN=Ent-CA,CN=AIA,CN=Public Key Services,CN=Services,CN=Configuration,DC=X,DC=local?cACertificate?base?objectClass=certificationAuthority (ldap:///CN=Ent-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=X,DC=local?cACertificate?base?objectClass=certificationAuthority)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which URL do i need to set up under the Certification Profile Default OCSP URL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i also need to enter the Root CA OCSP URL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the input.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 02:20:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/158838#M52007</guid>
      <dc:creator>ESutedy</dc:creator>
      <dc:date>2017-06-01T02:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect OCSP URL location with Offline Root CA and Enterprise Subordinate CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/158896#M52042</link>
      <description>I don't know 100% if this information is still valid but in the past I think only http url's were supported. I also searched in the documentation and so far I was not able to find something about an ldap url.&lt;BR /&gt;If the url is included in your certificate then it will be enough if you simply click the checkboses for "Use OCSP" and "Use CRL". OCSP is always the preferred one.&lt;BR /&gt;In the url's you only need the url for your intermediate CA, because this is the one which signs your client/user certificates.&lt;BR /&gt;Ok, the inermediate can be revoked too but if you ever run into a problem with this one revoked then you need to manually change the cert on the firewall anyway. But if you simply import the root cert to your fw cert store, the fw will also get revocation information for that cert and likely mark your inermediate as invalid if it is revoked, but I did never test this.</description>
      <pubDate>Thu, 01 Jun 2017 17:22:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/158896#M52042</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-01T17:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect OCSP URL location with Offline Root CA and Enterprise Subordinate CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/159106#M52064</link>
      <description>&lt;P&gt;thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have simply checked the Use OCSP and Use CRL Checkboxes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have since revoked a certificate, and Delta CRL is set to be updated everyday. Is there a way to check if GP is checking the CRL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just also noticed that the Default OCSP URL must start with http or https&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OCSP.PNG" style="width: 738px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9510i283C3AC37CC2A8AA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="OCSP.PNG" alt="OCSP.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 03:56:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/159106#M52064</guid>
      <dc:creator>ESutedy</dc:creator>
      <dc:date>2017-06-02T03:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect OCSP URL location with Offline Root CA and Enterprise Subordinate CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/159224#M52072</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Search in your system logs: (description contains 'CRL')&lt;/LI&gt;&lt;LI&gt;Try to connect with a computer which has a revoked certificate&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/View-Delete-CRL-and-OCSP-cache/ta-p/59286" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/View-Delete-CRL-and-OCSP-cache/ta-p/59286&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;less mp-log sslmgr.log&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 02 Jun 2017 16:26:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/159224#M52072</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-02T16:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect OCSP URL location with Offline Root CA and Enterprise Subordinate CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/165703#M53216</link>
      <description>&lt;P&gt;I confirm that LDAP CRL works as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I revoked a certificate from CA and deny re-enrollment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When trying to connect to the GP Portal with the revoked cert - the client is showing "Required client certificate is not found"&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 00:59:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ocsp-url-location-with-offline-root-ca-and/m-p/165703#M53216</guid>
      <dc:creator>ESutedy</dc:creator>
      <dc:date>2017-07-11T00:59:12Z</dc:date>
    </item>
  </channel>
</rss>

