<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Captive Portal SSL Certificate? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9626#M7049</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anyone have a recommendation on where we can get an SSL certificate that works with the Captive Portal and will be fully trusted by the most commonly used browsers.&amp;nbsp; Or.. perhaps some guidance on how this situation is best tackled...&amp;nbsp; Our situation is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) We want a certificate that will not generate an error of any sort when digested by the browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Our certificate needs to be issued to an IP address. We do not control the DNS server so we are unable to get the required reverse DNS entry implemented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) We tried a COMODO Certificate.&amp;nbsp; It worked in some browsers but on a fresh install of Windows 7 w/ IE 8 we get an certificate error.&amp;nbsp; If we download and install the COMODO root and intermediate certificates all is well.&amp;nbsp; COMODO support recommends that we install these on the PAN (PAN 2050 for us), but I do not see this as an option on the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Research and COMODO support recommended a unchained certificate but it seems they are no longer being offered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any and all replies!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Oct 2010 23:49:09 GMT</pubDate>
    <dc:creator>tjcarter</dc:creator>
    <dc:date>2010-10-11T23:49:09Z</dc:date>
    <item>
      <title>Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9626#M7049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anyone have a recommendation on where we can get an SSL certificate that works with the Captive Portal and will be fully trusted by the most commonly used browsers.&amp;nbsp; Or.. perhaps some guidance on how this situation is best tackled...&amp;nbsp; Our situation is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) We want a certificate that will not generate an error of any sort when digested by the browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Our certificate needs to be issued to an IP address. We do not control the DNS server so we are unable to get the required reverse DNS entry implemented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) We tried a COMODO Certificate.&amp;nbsp; It worked in some browsers but on a fresh install of Windows 7 w/ IE 8 we get an certificate error.&amp;nbsp; If we download and install the COMODO root and intermediate certificates all is well.&amp;nbsp; COMODO support recommends that we install these on the PAN (PAN 2050 for us), but I do not see this as an option on the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Research and COMODO support recommended a unchained certificate but it seems they are no longer being offered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any and all replies!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Oct 2010 23:49:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9626#M7049</guid>
      <dc:creator>tjcarter</dc:creator>
      <dc:date>2010-10-11T23:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9627#M7050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To install the root and intermediate certs you will need to open both in notepad. Paste all of the text from the intermedite certificate to the bottom of the root certificate. Then import this new certificate into the PAN device. This can be used for both Captive Portal and SSL-VPN certificates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 02:20:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9627#M7050</guid>
      <dc:creator>pantac</dc:creator>
      <dc:date>2010-10-12T02:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9628#M7051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So there is a way!&amp;nbsp; One last question and I think I am home free.&amp;nbsp; Where should the combined certificate be imported?&amp;nbsp; Client OCSP Verfiy CA Certificate?&amp;nbsp; Trusted CA Certificate? or Client CA Certificate?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 14:09:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9628#M7051</guid>
      <dc:creator>tjcarter</dc:creator>
      <dc:date>2010-10-12T14:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9629#M7052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under "Certificates on the "Device" tab:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="300.png" class="jive-image" src="https://live.paloaltonetworks.com/servlet/JiveServlet/downloadImage/1944/300.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 16:25:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9629#M7052</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2010-10-13T16:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9630#M7053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The previous advice was to combine the required root and intermediate certificates.&amp;nbsp; Such a certificate will not load in the area you suggest since we have neither the required key or passphrase. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 17:30:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9630#M7053</guid>
      <dc:creator>tjcarter</dc:creator>
      <dc:date>2010-10-13T17:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9631#M7054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt; To clarify the earlier response from pantac - some certificate providers are using Intermediate certificates.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;This means that your server certificate is signed by an intermediate certificate, and that intermediate certificate is signed by a root certificate.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;This is a certificate in between the root certificate and your server certificate.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;This intermediate certificate is not generally included in your browser so it needs to be served with the server certificate.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Some Certificate authorities already bundle the intermediate certificate with your certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; font-family: Calibri; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;But, when they do not, &lt;SPAN style="mso-spacerun: yes;"&gt; &lt;/SPAN&gt;you'll need to get a copy of&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;the intermediate certificate first.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Then, you'll need to open the server certificate and the intermediate certificate in notepad, and paste all of the text from the intermediate certificate to the bottom of the server certificate.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;Then import this new certificate into the certificate section labeled “SSL VPN/SSL Inbound Inspection/Captive Portal Certificate”&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 22:25:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9631#M7054</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2010-10-13T22:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9632#M7055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, We had a similar issue with a Comodo cert. Have you resolved this as we have fixed this after having a problem with the cert and the warning in internet explorer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 08:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9632#M7055</guid>
      <dc:creator>Billy_G</dc:creator>
      <dc:date>2010-10-18T08:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9633#M7056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are making progress but are still struggling to get things working just right.&amp;nbsp; The previous advise was very helpful and did work.&amp;nbsp; We can load both certificates and they are both propagated to the client browser without a problem.&amp;nbsp; Our latest challenge is that the COMODO root is not installed on some systems.&amp;nbsp; Specifically Window 7 PC's. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems Microsoft is not longer shipping certificates as part of their OS.&amp;nbsp; Instead they provide a service that takes a new root certificate and checks windows update to see if it has been certified by them.&amp;nbsp; Since we are blocking all traffic until a user is authenticated this transaction is blocked and a certificate error reported. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What it seems we need now is a policy to allow the transaction.&amp;nbsp; I have yet to dive into trying to craft one and have a few questions about it.&amp;nbsp; For example...&amp;nbsp; what interface would we apply this policy to.&amp;nbsp; At this stage we are talking with the L3 interface that only exists to provide the captive portal.&amp;nbsp; Do we need to flesh that out so that traffic can flow through it?&amp;nbsp; Or do we keep the policy on the transparent interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guidance would be most appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 16:34:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9633#M7056</guid>
      <dc:creator>tjcarter</dc:creator>
      <dc:date>2010-10-18T16:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9634#M7057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to create a rule from the inside zone to to the outside zone , Source user = unknown and then permit traffic either by application or by destination IP address. Many captive portals need to do this for App = DNS as well becasue the DNS server is often on the other side of the firewall. Hopefully we are able to identify the application. Put this rule near the top of&amp;nbsp; the list so it gets evaluated before any rules permitting known users or dropping unkniwn users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Oct 2010 00:16:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9634#M7057</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2010-10-19T00:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9635#M7058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had to create a rule under "Captive Portal Rules" Below is what we have...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name=Comodo Certificate Rule&lt;/P&gt;&lt;P&gt;Source Zone=Trusted Network&lt;/P&gt;&lt;P&gt;Destination Zone=Untrusted Network&lt;/P&gt;&lt;P&gt;Source Adress=Any&lt;/P&gt;&lt;P&gt;Destination Address= &lt;/P&gt;&lt;P&gt;216.191.247.139&lt;BR /&gt;216.191.247.227&lt;BR /&gt;217.118.26.135&lt;BR /&gt;65.55.21.250&lt;BR /&gt;69.58.183.143&lt;BR /&gt;85.13.204.99&lt;BR /&gt;91.209.196.174&lt;BR /&gt;149.5.128.174&lt;BR /&gt;91.199.212.174&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Method=no-captive-portal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This needs to be at the top of the rules. This will allow any user requesting the captive portal to reach the comodo servers to authenticate the certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps as this is what we had to do, and it works like a charm.....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Oct 2010 07:27:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9635#M7058</guid>
      <dc:creator>Billy_G</dc:creator>
      <dc:date>2010-10-19T07:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9636#M7059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is exactly what I was looking for!&amp;nbsp; Many thanks for laying it out so clearly. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Oct 2010 17:43:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9636#M7059</guid>
      <dc:creator>tjcarter</dc:creator>
      <dc:date>2010-10-19T17:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9637#M7060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi nrice,&lt;/P&gt;&lt;P&gt;when and how we use "Client CA Certificate" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 23:26:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9637#M7060</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-02-17T23:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal SSL Certificate?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9638#M7061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Hi Iceman,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;The&amp;nbsp; Device &amp;gt; Client CA Certificate&amp;nbsp; allows you to import one or more certificates to be used for authentication for an administrator or&amp;nbsp; SSL VPN login.&amp;nbsp; Once CA certs are imported, the Device&amp;gt; Client Certificate Profile allows you to choose a CA cert, which will become part of the profile attached to the admin or ssl vpn login.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 18:11:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ssl-certificate/m-p/9638#M7061</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2011-02-18T18:11:11Z</dc:date>
    </item>
  </channel>
</rss>

