<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption - Enterprise CA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/213085#M62039</link>
    <description>&lt;P&gt;Hi Peter, Just going through your solution . So , If I want to use&amp;nbsp; internal PKI infra , then there is no need to generate CSR on firewall ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do I tell my customer like , to directly provide me the CA certificate ? I mean they dont need my CSR ? Because when I am providing CSR and importing certificate , then that forward trust option is greyed out ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 May 2018 06:23:37 GMT</pubDate>
    <dc:creator>kchopra01</dc:creator>
    <dc:date>2018-05-04T06:23:37Z</dc:date>
    <item>
      <title>SSL Decryption - Enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/140513#M48285</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recently a decision was made to implement SSL Decryption for outbound inspection.&amp;nbsp; We work within a Microsoft PKI environment and are experiencing issues in signing the CSR generated by the firewall.&amp;nbsp; I create the CSR based on the "how to implement and test ssl decryption" document I found via the Live Community (&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Implement-and-Test-SSL-Decryption/ta-p/59719).&amp;nbsp;" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Implement-and-Test-SSL-Decryption/ta-p/59719).&amp;nbsp;&lt;/A&gt; So, the CSR is designated as a CA and set to Signed by External Authority (CSR).&amp;nbsp; Unfortunately, each time I receive the certificate, the Forward Trust Certificate is greyed out.&amp;nbsp; We've tried both - CA box checked and CA box unchecked, the result is the same.&amp;nbsp; We did find that our SubCA's were under constraints and cannot sign, so we used the Root to perform the signing but the result is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wondering if anyone has a suggestion or if we need to review and follow the workaround I found here: &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Implement-Certificates-Issued-from-Microsoft-Certificate/ta-p/56757" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Implement-Certificates-Issued-from-Microsoft-Certificate/ta-p/56757&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Carter&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:48:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/140513#M48285</guid>
      <dc:creator>cafowler</dc:creator>
      <dc:date>2017-02-01T16:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - Enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/140521#M48287</link>
      <description>&lt;P&gt;I don't believe you will have to generate a CSR for this. You can either do a self-signed CA on the firewall or import a Subordinate CA (from your own PKI infrastructure).&amp;nbsp; Steps 1-4 are all done within the Microsoft Certificate Server while steps 5-6 are when you import the certificate into the firewall. Try generating a cert from within your environment and import that generated certificate into the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Generating and Importing a Certificate from Microsoft Certificate Server&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;On the Microsoft Certificate Server for your organization, request an advanced certificate using certificate template “subordinate CA”. Download the cert.&lt;/LI&gt;&lt;LI&gt;After downloading, export the certificate from the local certificate store. In IE, access the Internet Options dialog, select the Content tab, then click the Certificates button. The new certificate can be exported from the Personal certificates store. Select “Certificate Export Wizard”, export the private key, then select the format. Enter a passphrase and a file name and location for the resulting file. The certificate will be in a PFX format (PKCS #12).&lt;/LI&gt;&lt;LI&gt;To extract the certificate, use this openSSL[4] command:&lt;BR /&gt;&lt;SPAN&gt;openssl pkcs12 –in pfxfilename.pfx –out cert.pem –nokeys&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;To extract the key, use this openSSL command:&lt;BR /&gt;&lt;SPAN&gt;openssl pkcs12 –in pfxfilename.pfx –out keyfile.pem -nocerts&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Import the cert.pem file and keyfile.pem file into the Palo Alto Networks firewall on the Device tab &amp;gt; Certificates screen.&lt;/LI&gt;&lt;LI&gt;In the case of a High Availability (HA) Pair, also load these files into the second Palo Alto Networks firewall, or copy the certificate and key via the High Availability widget on the dashboard.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Peter&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:57:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/140521#M48287</guid>
      <dc:creator>sullivanpj2</dc:creator>
      <dc:date>2017-02-01T16:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - Enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/142119#M48492</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the repsonse Peter, greatly appreciated.&amp;nbsp; What we ended up doing is what you suggested in your first paragraph, we asked for a certificate to be issued which is a Subordinate CA.&amp;nbsp; Problem solved.&amp;nbsp; When I suggested the article "&lt;SPAN class="lia-link-navigation blog-article-link lia-link-disabled"&gt;How to Implement Certificates Issued from Microsoft Certificate Services&lt;/SPAN&gt;" it was met with hesitation, so haivng a certificate created which is a Subordinate worked out nicely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Carter&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 13:58:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/142119#M48492</guid>
      <dc:creator>cafowler</dc:creator>
      <dc:date>2017-02-09T13:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - Enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/213085#M62039</link>
      <description>&lt;P&gt;Hi Peter, Just going through your solution . So , If I want to use&amp;nbsp; internal PKI infra , then there is no need to generate CSR on firewall ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do I tell my customer like , to directly provide me the CA certificate ? I mean they dont need my CSR ? Because when I am providing CSR and importing certificate , then that forward trust option is greyed out ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 May 2018 06:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/213085#M62039</guid>
      <dc:creator>kchopra01</dc:creator>
      <dc:date>2018-05-04T06:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - Enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/213179#M62047</link>
      <description>&lt;P&gt;You have many options.&lt;/P&gt;&lt;P&gt;- Generate CA cert on firewall and push it to domain member computers with Group policy&lt;/P&gt;&lt;P&gt;- Import existing CA into firewall and use this&lt;/P&gt;&lt;P&gt;- Use&amp;nbsp;&lt;SPAN&gt;Subordinate CA signed by existing internal CA&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 May 2018 15:13:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-enterprise-ca/m-p/213179#M62047</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-05-04T15:13:37Z</dc:date>
    </item>
  </channel>
</rss>

