<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339815#M85317</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149677"&gt;@Jal_963&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In principle:&lt;/P&gt;&lt;UL class="lia-list-style-type-upper-roman"&gt;&lt;LI&gt;you can generate CSRs from the Active Node in HA, Passive Node in HA, or from both - does not matter because they are synced, just have to time and queue the Commits right;&lt;/LI&gt;&lt;LI&gt;you can generate CSRs using external tool, I like working with XCA (&lt;A href="https://hohnstaedt.de/xca/" target="_blank"&gt;https://hohnstaedt.de/xca/&lt;/A&gt;), and import them into PA after signing;&lt;/LI&gt;&lt;LI&gt;you can specify Common Name and Subject Alternative Name to whatever you want, however using the hostname/FQDN makes most sense most of the time as those correspond to the WebUI URL; best practice is to have both&amp;nbsp;Common Name and Subject Alternative Name with equal values;&lt;/LI&gt;&lt;LI&gt;you possibly could use one certificate for WebUI of both HA nodes, however it would require some trickery;&lt;/LI&gt;&lt;LI&gt;Certificates and SSL/TLS Service Profiles are synced in HA as long as they are not used for WebUI.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;More to the point, workflow could be:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Login into Active Node;&lt;/LI&gt;&lt;LI&gt;prepare two CSRs with CN/SAN corresponding to the WebUI URLs on Active Node;&lt;/LI&gt;&lt;LI&gt;import signed by external CA certificates into&amp;nbsp;Active Node;&lt;/LI&gt;&lt;LI&gt;Commit on&amp;nbsp;Active Node;&lt;/LI&gt;&lt;LI&gt;create two SSL/TLS Service Profiles, one for each certificate;&lt;/LI&gt;&lt;LI&gt;use one of the&amp;nbsp;SSL/TLS Service Profiles as WebUI&amp;nbsp;SSL/TLS Service Profile on Active Node;&lt;/LI&gt;&lt;LI&gt;Commit on&amp;nbsp;Active Node;&lt;/LI&gt;&lt;LI&gt;Login into Passive Node;&lt;/LI&gt;&lt;LI&gt;use one of the&amp;nbsp;SSL/TLS Service Profiles as WebUI&amp;nbsp;SSL/TLS Service Profile on Passive Node;&lt;/LI&gt;&lt;LI&gt;Commit on Passive Node;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;It is possible to perform it a bit quicker, but longer way is simpler.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2020 08:33:24 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2020-07-21T08:33:24Z</dc:date>
    <item>
      <title>The SSL Certificate is showing unsecure in one device</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/336619#M84809</link>
      <description>&lt;P&gt;I have installed an SSL certificate on my firewall it is working fine for all of our Palo Alto devices except one device as it is showing it is not secure.&lt;/P&gt;&lt;P&gt;I checked and I found that the device is still using the localhost generated certificate. I don’t know how to force it to use the SSL Certificate I installed.&lt;BR /&gt;&lt;BR /&gt;Note that I set up the SSL/TLS Service Profile and chosen the proper certificate from the list of Certificates. Which is the only certificate available?&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jul 2020 06:18:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/336619#M84809</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-07-05T06:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: The SSL Certificate is showing unsecure in one device</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/336759#M84872</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would say follow the proper setup steps, you could have missed a step.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 20:50:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/336759#M84872</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-07-06T20:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: The SSL Certificate is showing unsecure in one device</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/336853#M84899</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Verify that Commit was successful on the device in question. If it was - reboot and recheck.&lt;/P&gt;&lt;P&gt;Open Support Case if issue persists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that WebUI certificates are not synchronized in a HA pair.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 15:02:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/336853#M84899</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-07-07T15:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: The SSL Certificate is showing unsecure in one device</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/337915#M85028</link>
      <description>&lt;P&gt;I have reinstalled a certificate that was working fine with my firewall, but suddenly I lost access to the GUI of the firewall.&lt;BR /&gt;&lt;BR /&gt;I tried what is mentioned here in the link below with no luck.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cli0CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cli0CAC&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2020 07:20:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/337915#M85028</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-07-12T07:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: The SSL Certificate is showing unsecure in one device</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/338025#M85057</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this point I will suggesting getting in touch with TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 09:17:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/338025#M85057</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-07-13T09:17:44Z</dc:date>
    </item>
    <item>
      <title>WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339660#M85283</link>
      <description>&lt;P&gt;Dear ,&lt;/P&gt;&lt;P&gt;I need to install webui certificate for both the palo alto , CSR will be signed by internal CA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i need to create CSR from each firewall ? like i can generate from Primary firewall or from both ?&lt;/P&gt;&lt;P&gt;Should i incude FQDN of each firewall as the common name while generate CSR ?&lt;/P&gt;&lt;P&gt;I can see the certificate are synchronising each other, but TLS profile not ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please assist me&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&amp;nbsp;@Retired Member&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 17:51:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339660#M85283</guid>
      <dc:creator>Jal_963</dc:creator>
      <dc:date>2020-07-20T17:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339669#M85285</link>
      <description>&lt;P&gt;Just the one should do. Dont need the firewall names since the certificate is just being used between the PAN and the client.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:16:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339669#M85285</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-07-20T18:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339672#M85287</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; thanks for the quick reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so What should i include in Common name while generating CSR ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once i uploaded the signed certificate and root CA to the firewall , I need to create ssl/tls profile in both the Palo alto firewall right ?&lt;/P&gt;&lt;P&gt;Then i will add this profile in&amp;nbsp; general setting in both the firewall ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Correct me if am wrong ?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:20:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339672#M85287</guid>
      <dc:creator>Jal_963</dc:creator>
      <dc:date>2020-07-20T18:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339675#M85288</link>
      <description>&lt;P&gt;Just the name of the certificate. Its either going to be a self signed CA or a subordinate CA cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;A id="ensure_proper_certificate" name="ensure_proper_certificate" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;Ensuring the Proper Certificate Authority on the Firewall and Exporting the CA to Clients&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Loading or generating a CA certificate on the Palo Alto Networks firewall is needed, because a Certificate Authority (CA) is required to decrypt traffic properly by generating SSL certificates on the fly. Either create a self-signed CA on the firewall or import a subordinate CA from your own PKI infrastructure. Select&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Forward Trust Certificate&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Forward Untrust Certificate&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;on one or more certificates to enable the firewall to decrypt traffic.&amp;nbsp;Because SSL Certificate providers like Entrust, Verisign, Digicert, and GoDaddy do not sell CAs, they are not supported in SSL Decryption.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgHCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgHCAS&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cheers!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:27:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339675#M85288</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-07-20T18:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339677#M85289</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;thanks for the response .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am asking for the WebUI certificate , which will be signed by our internal CA (Microsoft CA )&lt;/P&gt;&lt;P&gt;we are not using the public signed certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For Webui, one Certificate is enough for both Palo alto ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;certificate is synronising between the Active/Passive HA , however SSL/Tls profile not ?&lt;/P&gt;&lt;P&gt;i need to create seperate SSL/TLS profile for both the PA ?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:35:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339677#M85289</guid>
      <dc:creator>Jal_963</dc:creator>
      <dc:date>2020-07-20T18:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339678#M85290</link>
      <description>&lt;P&gt;Sorry, my bad. You will need one cert per device.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:37:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339678#M85290</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-07-20T18:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339679#M85291</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;yea , but while generating CSR what should i added in Common name ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;should i generate CSR from both the Firewall or i can generate two CSR from Primary Firwewall added different Common name ?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:46:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339679#M85291</guid>
      <dc:creator>Jal_963</dc:creator>
      <dc:date>2020-07-20T18:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339680#M85292</link>
      <description>&lt;P&gt;csr for each...&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 18:47:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339680#M85292</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-07-20T18:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: WEBUI_CERTIFICATE FOR THE PALO ALTO HA DEVICES</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339815#M85317</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149677"&gt;@Jal_963&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In principle:&lt;/P&gt;&lt;UL class="lia-list-style-type-upper-roman"&gt;&lt;LI&gt;you can generate CSRs from the Active Node in HA, Passive Node in HA, or from both - does not matter because they are synced, just have to time and queue the Commits right;&lt;/LI&gt;&lt;LI&gt;you can generate CSRs using external tool, I like working with XCA (&lt;A href="https://hohnstaedt.de/xca/" target="_blank"&gt;https://hohnstaedt.de/xca/&lt;/A&gt;), and import them into PA after signing;&lt;/LI&gt;&lt;LI&gt;you can specify Common Name and Subject Alternative Name to whatever you want, however using the hostname/FQDN makes most sense most of the time as those correspond to the WebUI URL; best practice is to have both&amp;nbsp;Common Name and Subject Alternative Name with equal values;&lt;/LI&gt;&lt;LI&gt;you possibly could use one certificate for WebUI of both HA nodes, however it would require some trickery;&lt;/LI&gt;&lt;LI&gt;Certificates and SSL/TLS Service Profiles are synced in HA as long as they are not used for WebUI.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;More to the point, workflow could be:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Login into Active Node;&lt;/LI&gt;&lt;LI&gt;prepare two CSRs with CN/SAN corresponding to the WebUI URLs on Active Node;&lt;/LI&gt;&lt;LI&gt;import signed by external CA certificates into&amp;nbsp;Active Node;&lt;/LI&gt;&lt;LI&gt;Commit on&amp;nbsp;Active Node;&lt;/LI&gt;&lt;LI&gt;create two SSL/TLS Service Profiles, one for each certificate;&lt;/LI&gt;&lt;LI&gt;use one of the&amp;nbsp;SSL/TLS Service Profiles as WebUI&amp;nbsp;SSL/TLS Service Profile on Active Node;&lt;/LI&gt;&lt;LI&gt;Commit on&amp;nbsp;Active Node;&lt;/LI&gt;&lt;LI&gt;Login into Passive Node;&lt;/LI&gt;&lt;LI&gt;use one of the&amp;nbsp;SSL/TLS Service Profiles as WebUI&amp;nbsp;SSL/TLS Service Profile on Passive Node;&lt;/LI&gt;&lt;LI&gt;Commit on Passive Node;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;It is possible to perform it a bit quicker, but longer way is simpler.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 08:33:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-ssl-certificate-is-showing-unsecure-in-one-device/m-p/339815#M85317</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-07-21T08:33:24Z</dc:date>
    </item>
  </channel>
</rss>

