<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: After Forward Trust certificate is renewed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315550#M81272</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55969"&gt;@NetWright&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I guess if you don't trust what the CLI is telling you can the certificate as specified in your decryption rulebase entires you would need to perform a PCAP and verify that the client is actually getting the correct cert.&lt;/P&gt;&lt;P&gt;Really though as long as the above command is showing you what you need and the actual decryption entries reference the correct certificate I can't think of a reason why you would need to verify it further; but if for some reason you do, a simple PCAP on the client traffic would work perfectly fine.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Mar 2020 21:04:41 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-03-10T21:04:41Z</dc:date>
    <item>
      <title>After Forward Trust certificate is renewed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315379#M81256</link>
      <description>&lt;P&gt;After Forward Trust certificate is renewed is there a way to validate the renewed certificate is working correctly from either GUI or CLI?&lt;BR /&gt;Device &amp;gt; Certificate Management &amp;gt; Certificates &amp;gt; Forward UNTrust Certificate&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 01:01:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315379#M81256</guid>
      <dc:creator>NetWright</dc:creator>
      <dc:date>2020-03-10T01:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: After Forward Trust certificate is renewed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315391#M81257</link>
      <description>&lt;P&gt;You're looking for the following command in the CLI&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;show system setting ssl-decrypt certificate&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 10 Mar 2020 02:17:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315391#M81257</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-03-10T02:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: After Forward Trust certificate is renewed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315398#M81261</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp;&lt;BR /&gt;Ok, yeah I see the cert with that command (&amp;nbsp; show system setting ssl-decrypt certificate ).&lt;BR /&gt;.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;Wondering if there's a way to validate when the cert is being used and that it's being used successfully.&lt;BR /&gt;I know the Untrusted cert will be presented only when the PAN doesn't trust the sites CA but how to see this?&lt;BR /&gt;I see the behavior from the client side using this site -&amp;nbsp;&lt;A href="https://untrusted-root.badssl.com/" target="_blank"&gt;https://untrusted-root.badssl.com/&lt;/A&gt;&lt;BR /&gt;Is there a way to see what cert is being presented for the client from the PAN side?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show system setting ssl-decrypt certificate&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt;snip&amp;gt;&amp;gt;&lt;BR /&gt;global untrusted&lt;BR /&gt;ssl-decryption x509 certificate&lt;BR /&gt;version 2&lt;BR /&gt;cert algorithm 4&lt;BR /&gt;valid 200310033320Z -- 210310033320Z&lt;BR /&gt;cert pki 1&lt;BR /&gt;subject: SSL Decrypt Untrusted 2018&lt;BR /&gt;issuer: SSL Decrypt Untrusted 2018&lt;BR /&gt;serial number(4)&lt;BR /&gt;7b 89 e3 36 {..6&lt;BR /&gt;rsa key size 2048 bits siglen 256 bytes&lt;BR /&gt;basic constraints extension CA 1&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 03:54:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315398#M81261</guid>
      <dc:creator>NetWright</dc:creator>
      <dc:date>2020-03-10T03:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: After Forward Trust certificate is renewed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315550#M81272</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55969"&gt;@NetWright&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I guess if you don't trust what the CLI is telling you can the certificate as specified in your decryption rulebase entires you would need to perform a PCAP and verify that the client is actually getting the correct cert.&lt;/P&gt;&lt;P&gt;Really though as long as the above command is showing you what you need and the actual decryption entries reference the correct certificate I can't think of a reason why you would need to verify it further; but if for some reason you do, a simple PCAP on the client traffic would work perfectly fine.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 21:04:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-forward-trust-certificate-is-renewed/m-p/315550#M81272</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-03-10T21:04:41Z</dc:date>
    </item>
  </channel>
</rss>

