<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177639#M55382</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;is correct. If you are using a self-signed cert or a cert signed by an internal CA the device needs to trust this cert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively you could modify the Agent configuration within the App tab to set "Allow User to Continue with Invalid Portal Server Certificate" to yes instead of the default No. This will trigger an alert but still allow the user to connect.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Sep 2017 16:27:24 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2017-09-19T16:27:24Z</dc:date>
    <item>
      <title>Global Protect Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177526#M55352</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured global protect, but when clients try to connect through the agent, they got "Gateway "name":The server certificate is invalid, please contact your IT administrator".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the configured certificates, I configured self-signed certificate as a certificate authority, and then configured Global-protect certificate signed by the created self-signed certificate, but the common name for the self-signed cert was the firewall private IP and the common name for the global-protect certicate was the firewall public IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any wrong certificate settings?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 09:14:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177526#M55352</guid>
      <dc:creator>myasin</dc:creator>
      <dc:date>2017-09-19T09:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177555#M55361</link>
      <description>&lt;P&gt;i have never used self signed for portal address but i'm sure you need to copy the self signed root cert to the devices, it will be placed with all your other trusted cert authorities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from PA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Self-Signed Certificates —You can generate a self-signed CA certificate on the portal and use it to issue certificates for all of the GlobalProtect components. However, this solution is less secure than the other options and is therefore not recommended. If you do choose this option, end users will see a certificate error the first time they connect to the portal. To prevent this, you can deploy the self-signed root CA certificate to all end user systems manually or using some sort of centralized deployment, such as an Active Directory Group Policy Object (GPO).&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 10:32:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177555#M55361</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-09-19T10:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177639#M55382</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;is correct. If you are using a self-signed cert or a cert signed by an internal CA the device needs to trust this cert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively you could modify the Agent configuration within the App tab to set "Allow User to Continue with Invalid Portal Server Certificate" to yes instead of the default No. This will trigger an alert but still allow the user to connect.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 16:27:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/177639#M55382</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-09-19T16:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/238014#M68196</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;I'm having the same issue but not on self signed certificate and on linux ( Fedora 29)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Global Protect is configured with the certificate signed by the Authorized CA.&lt;/P&gt;&lt;P&gt;The Chain is:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;DigiCert Global Root CA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;DigiCert SHA2 Secure Server CA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Server certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It works perfect on Windows.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;On Linux, Fedora.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I get the error&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Error: Gateway exgw: The server certificate is invalid. Please contact your IT administrator.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked if certificate is trusted&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;xxx\Downloads]$ trust list | grep Digi&lt;BR /&gt;l&lt;STRONG&gt;abel: DigiCert Global Root CA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;label: DigiCert SHA2 Secure Server CA&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The first two are the exactly the ones that are trusted.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I am puzzled. Did anybody have issues with Global Protect on linux ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 18:06:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-certificate/m-p/238014#M68196</guid>
      <dc:creator>PiankaMariusz</dc:creator>
      <dc:date>2018-10-31T18:06:11Z</dc:date>
    </item>
  </channel>
</rss>

