<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Revoked Machine Certificate still able to Connect Global Protect Gateway in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/394150#M91082</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59122"&gt;@Sec101&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I had the same question I did some investigation &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You need to:&lt;/P&gt;&lt;P&gt;- Enable OCSP checking in Device &amp;gt; Session =&amp;gt; Decryption Settings&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_1-1616744655859.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30582i693759DCD4355DA9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_1-1616744655859.png" alt="tomdevos-D09_1-1616744655859.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Create an HTTP OCSP Service Management Profile under Network Profiles &amp;gt; Interface Management&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_0-1616744614718.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30581iAFCD5BC201B989C1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_0-1616744614718.png" alt="tomdevos-D09_0-1616744614718.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- Create An OCSP Responder under Device &amp;gt; Certificate Management &amp;gt; OCSP Responder&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_2-1616744790792.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30583i1A972D3D2EAF5D33/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_2-1616744790792.png" alt="tomdevos-D09_2-1616744790792.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Create Client Certificates with this Responder as OCSP Responder&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_3-1616744923074.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30584i26C5DE776C68F239/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_3-1616744923074.png" alt="tomdevos-D09_3-1616744923074.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- make sure OCSP checking is enabled on the Certificate profile used for GP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_4-1616745066050.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30585iA4BDD08CE9C74F43/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_4-1616745066050.png" alt="tomdevos-D09_4-1616745066050.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_5-1616745129080.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30586i5BF813487F65A1C1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_5-1616745129080.png" alt="tomdevos-D09_5-1616745129080.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next to that:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pay attention that if you revoke the certificate in the Certificate store it isn't automatically and immediatly revoked for the GP service as OCSP is cached on the FW:&amp;nbsp;&lt;/P&gt;&lt;P&gt;To immediatly have affect you need to execute the following commands in CLI&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;debug sslmgr delete ocsp all (or instead of all tab comlete with your OCSP URL&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;debug dataplane reset ssl-decrypt certificate-status&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now the certificate will be revoked and if the client tries to (re)connect it will get that message.&lt;/P&gt;</description>
    <pubDate>Fri, 26 Mar 2021 07:58:43 GMT</pubDate>
    <dc:creator>tomdevos-D09</dc:creator>
    <dc:date>2021-03-26T07:58:43Z</dc:date>
    <item>
      <title>Revoked Machine Certificate still able to Connect Global Protect Gateway</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/317573#M81632</link>
      <description>&lt;P&gt;It appears possible to configure the firewall to be an OCSP responder to itself/clients from the posts below? Is that correct? (Specifically referring to self-signed certificates generated on the firewall)&amp;nbsp; &amp;nbsp;If so, is there any risk to having this service run on an external interface, in order to control/revoke machine certificates?&amp;nbsp; If the need arises for a certificate revocation, is the firewall responding to itself and not letting the client connect to the portal/gateway, or is the client ultimately making that decision?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm finding the GP agent will still connect to the Gateway even if I have revoked a generic machine certificate used in the profile for the Gateway.&amp;nbsp; The CA certificate is still good, but If I revoke the machine certificate, and it shows revoked in the firewall, the client can still connect.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIzCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIzCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClteCAC" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClteCAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2020 13:59:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/317573#M81632</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2020-03-20T13:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Revoked Machine Certificate still able to Connect Global Protect Gateway</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/393843#M91052</link>
      <description>&lt;P&gt;Same question here. How to get GP to check for revoked certs if there is no CRL or OCSP because it's self signed by the PA&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 13:27:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/393843#M91052</guid>
      <dc:creator>tomdevos-D09</dc:creator>
      <dc:date>2021-03-25T13:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Revoked Machine Certificate still able to Connect Global Protect Gateway</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/394150#M91082</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59122"&gt;@Sec101&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I had the same question I did some investigation &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You need to:&lt;/P&gt;&lt;P&gt;- Enable OCSP checking in Device &amp;gt; Session =&amp;gt; Decryption Settings&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_1-1616744655859.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30582i693759DCD4355DA9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_1-1616744655859.png" alt="tomdevos-D09_1-1616744655859.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Create an HTTP OCSP Service Management Profile under Network Profiles &amp;gt; Interface Management&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_0-1616744614718.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30581iAFCD5BC201B989C1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_0-1616744614718.png" alt="tomdevos-D09_0-1616744614718.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- Create An OCSP Responder under Device &amp;gt; Certificate Management &amp;gt; OCSP Responder&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_2-1616744790792.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30583i1A972D3D2EAF5D33/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_2-1616744790792.png" alt="tomdevos-D09_2-1616744790792.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Create Client Certificates with this Responder as OCSP Responder&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_3-1616744923074.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30584i26C5DE776C68F239/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_3-1616744923074.png" alt="tomdevos-D09_3-1616744923074.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- make sure OCSP checking is enabled on the Certificate profile used for GP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_4-1616745066050.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30585iA4BDD08CE9C74F43/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_4-1616745066050.png" alt="tomdevos-D09_4-1616745066050.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tomdevos-D09_5-1616745129080.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30586i5BF813487F65A1C1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tomdevos-D09_5-1616745129080.png" alt="tomdevos-D09_5-1616745129080.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next to that:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pay attention that if you revoke the certificate in the Certificate store it isn't automatically and immediatly revoked for the GP service as OCSP is cached on the FW:&amp;nbsp;&lt;/P&gt;&lt;P&gt;To immediatly have affect you need to execute the following commands in CLI&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;debug sslmgr delete ocsp all (or instead of all tab comlete with your OCSP URL&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;debug dataplane reset ssl-decrypt certificate-status&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now the certificate will be revoked and if the client tries to (re)connect it will get that message.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 07:58:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/revoked-machine-certificate-still-able-to-connect-global-protect/m-p/394150#M91082</guid>
      <dc:creator>tomdevos-D09</dc:creator>
      <dc:date>2021-03-26T07:58:43Z</dc:date>
    </item>
  </channel>
</rss>

