<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL forward trust option in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237585#M68071</link>
    <description>&lt;P&gt;We want to do this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;(Recommended Best Practice)&amp;nbsp;&lt;STRONG&gt;Enterprise CA-signed Certificates&lt;/STRONG&gt;—An enterprise CA can issue a signing certificate that the firewall can use to sign the certificates for sites which require SSL decryption. When the firewall trusts the CA that signed the certificate of the destination server, the firewall can send a copy of the destination server certificate to the client, signed by the enterprise CA. This is a best practice because usually all network devices already trust the Enterprise CA (it is usually already installed in the devices’ CA Trust storage), so you don’t need to deploy the certificate on the endpoints, so the rollout process is smoother.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;SSL-decrypt with a certificate signed by RAPIDSSL. Any procedure for that. We only see the procedure generating CA in Palo Alto.&lt;/P&gt;</description>
    <pubDate>Mon, 29 Oct 2018 14:24:29 GMT</pubDate>
    <dc:creator>BigPalo</dc:creator>
    <dc:date>2018-10-29T14:24:29Z</dc:date>
    <item>
      <title>SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237561#M68057</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a certificate generated by RapidSSL as CA. but we can NOT set this certificate as a forward trust certificate to use in Decyption SSL, the option shows disable. Roots is in the list "default trsuted certificate authorities".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why the option is disbled???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 310px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17343i0735D717543057B6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 11:42:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237561#M68057</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-10-29T11:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237569#M68059</link>
      <description>&lt;P&gt;Because it is only a servercertificate and not a CA certificate&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 11:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237569#M68059</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-10-29T11:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237585#M68071</link>
      <description>&lt;P&gt;We want to do this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;(Recommended Best Practice)&amp;nbsp;&lt;STRONG&gt;Enterprise CA-signed Certificates&lt;/STRONG&gt;—An enterprise CA can issue a signing certificate that the firewall can use to sign the certificates for sites which require SSL decryption. When the firewall trusts the CA that signed the certificate of the destination server, the firewall can send a copy of the destination server certificate to the client, signed by the enterprise CA. This is a best practice because usually all network devices already trust the Enterprise CA (it is usually already installed in the devices’ CA Trust storage), so you don’t need to deploy the certificate on the endpoints, so the rollout process is smoother.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;SSL-decrypt with a certificate signed by RAPIDSSL. Any procedure for that. We only see the procedure generating CA in Palo Alto.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:24:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237585#M68071</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-10-29T14:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237594#M68073</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can either generate a CA cert on your firewall or use a cert sygned/generated by an enterprise CA, but you will not get a CA cert from any of the public trusted certificate authorities.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:31:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237594#M68073</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-10-29T14:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237599#M68076</link>
      <description>&lt;P&gt;To do SSL Proxy Decryption, you must have a Forward Trust certificate.&amp;nbsp; To mark a certificate as a Forward Trust certificate, it must have an attribute that marks it as a Certificate Authority.&amp;nbsp; Commercial Certificate Authorities, such as RapidSSL, do not typically sign CA certs for customers - because this will allow a customer to issue certificates under their trust chain, which could be for anything (e.g. you could issue a certificate for live.paloaltonetworks.com that you generate yourself, and anyone that trusts RapidSSL will trust your certificate as valid.)&amp;nbsp; They would rather A.) that you not issue certificates signed by them, and B.) pay money for any certificates that you use that are signed by them.&amp;nbsp; It's kind of their entire business model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To do what you want to do, you can generate a self-signed certificate that is a Certificate Authority, and mark it as your Forward Trust certificate.&amp;nbsp; Or you can generate a CSR (Certificate Signing Request) for a Certificate Authority, and have &lt;A title="Microsoft Active Directory Certificate Services - Server Certificate Deployment Overview" href="https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/server-certificate-deployment-overview" target="_blank"&gt;an internal CA&lt;/A&gt; sign that request.&amp;nbsp; Once you import the signed certificate, it will be valid for marking as a Forward Trust certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have an Internal CA, it is likely to be trusted by your clients and is the better choice.&amp;nbsp; If you do not have an internal CA, the CA certificate generated by the firewall is probably the faster option, but you still need to make sure it is trusted as a Trusted Root CA certificate by all of your clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:44:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237599#M68076</guid>
      <dc:creator>JW6224</dc:creator>
      <dc:date>2018-10-29T14:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237601#M68077</link>
      <description>&lt;P&gt;We have this certificate, signed by RapidSSL. But we can not use it for SSL decrypt. I think it has all requisites.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17348i4F9CD53C32E3533E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.jpg" alt="2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:48:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237601#M68077</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-10-29T14:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237603#M68078</link>
      <description>&lt;P&gt;As mentionned by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99005"&gt;@JW6224&lt;/a&gt;, to use a certigicate as ssl forward trust cert it needs to have the CA flag set ... your cert does not have this flag set (as you can see in the CA column kn your screenshot/cert list)&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:52:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237603#M68078</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-10-29T14:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237607#M68079</link>
      <description>&lt;P&gt;I hear you...I doubt that it's a CA cert, but I believe you have the certificate.&amp;nbsp; I just think it's the wrong type of certificate.&lt;/P&gt;&lt;P&gt;Let's look at it.&amp;nbsp; Here are the certificates for live.paloaltonetworks.com.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="PAChain.png" style="width: 453px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17349iD7B63295D9B68E33/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PAChain.png" alt="PAChain.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;This is Palo Alto's wildcard certificate, signed by DigiCert.&amp;nbsp; So let's look at the CA Certificate, and then inspect the Basic Constraints:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="DigiCertSHA2SecureServerCA.png" style="width: 405px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17350iB2372E17238051CB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DigiCertSHA2SecureServerCA.png" alt="DigiCertSHA2SecureServerCA.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that the Subject Type is listed as a CA.&amp;nbsp; This certificate can be used to sign other certificates as part of their Public Key Infrastructure.&amp;nbsp; Compare that to the actual certificate used by the website:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="paloaltonetworkscom.png" style="width: 405px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17351iA038CF418A9DE922/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paloaltonetworkscom.png" alt="paloaltonetworkscom.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;This certificate is for an End Entity.&amp;nbsp; It can't sign other certificates.&amp;nbsp; It is good to identify/authenticate anything that matches the subject name, which is a wildcard for anything on the paloaltonetworks.com domain.&amp;nbsp; But it can't be marked as a Forward Trust certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you export your public certificate (the one you're trying to use as a Forward Trust) and inspect it, which does it look like?&amp;nbsp; Does it identify as a CA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237607#M68079</guid>
      <dc:creator>JW6224</dc:creator>
      <dc:date>2018-10-29T14:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237616#M68083</link>
      <description>&lt;P&gt;SO how customer can create CA certificate company in order to import in PA?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 16:48:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237616#M68083</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-10-29T16:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL forward trust option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237618#M68084</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99005"&gt;@JW6224&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To do what you want to do, you can generate a self-signed certificate that is a Certificate Authority, and mark it as your Forward Trust certificate.&amp;nbsp; Or you can generate a CSR (Certificate Signing Request) for a Certificate Authority, and have &lt;A title="Microsoft Active Directory Certificate Services - Server Certificate Deployment Overview" href="https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/server-certificate-deployment-overview" target="_blank"&gt;an internal CA&lt;/A&gt; sign that request.&amp;nbsp; Once you import the signed certificate, it will be valid for marking as a Forward Trust certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have an Internal CA, it is likely to be trusted by your clients and is the better choice.&amp;nbsp; If you do not have an internal CA, the CA certificate generated by the firewall is probably the faster option, but you still need to make sure it is trusted as a Trusted Root CA certificate by all of your clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;- this was from my earlier post and addresses the two options you have.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 16:50:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-forward-trust-option/m-p/237618#M68084</guid>
      <dc:creator>JW6224</dc:creator>
      <dc:date>2018-10-29T16:50:18Z</dc:date>
    </item>
  </channel>
</rss>

