- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-14-2021 01:27 AM
Hi Folks,
I am getting the below alert in the panorama every day. I found the below article for resolving the issue.
My concern is
1. Why is this necessary? I've never had the issue before v9.1.x
2. Do I need to do this every 3 months from now on?
Issue: Alarm “Device certificate status expired: it cannot be renewed”
Article: https://live.paloaltonetworks.com/t5/general-topics/device-certificate-where-to-find-otp/td-p/328427
Thanks,
Robin
03-18-2021 07:20 AM
hi Robin
Upon closer inspection several of my firewals are displaying the same issue, PANW may be having an issue with their OCSP server
03-16-2021 06:57 AM
Hi Robin
if the firewall is able to connect to the update server it should be able to renew the certificate by itself. there may be something being blocked or somthing may not be resolving in DNS (check logs for any dropped connections)
the device certificate is used to connect the firewall to cloud services like cortex data lake, but they made it pretty annoying to not have a certificate even if you don't need one as it keeps spawning error messages as long as the certificate is not 'green'
03-17-2021 11:55 PM
Dear @reaper ,
Thanks for the response. In my panorama, the last time I manually renewed the certificate and showed not valid after 3 months.
Now(after 3 months ) showing the error "Device certificate status expired: it cannot be renewed" so it will renew automatically after every 3 months if the required communications are allowed? I mean for certificate check OSCP should be allowed?
03-18-2021 02:38 AM
On our FW's in many different configs we get error:
Failed to renew device certificate. Failed to send request to CSP server. Error: No OCSP response received(dest => 35.238.43.180)
They are able to resolve DNS and nothing is blocked, so it seems there is some error on the OCSP server?
03-18-2021 06:30 AM
Same problem here.
A single PA3020 did not renew the cert.
I opened 2 days ago another thread.
Today i requested a new cert with OTP as a workaround. Will see what happens in 3 Months or if there comes up another solution.
03-18-2021 07:20 AM
hi Robin
Upon closer inspection several of my firewals are displaying the same issue, PANW may be having an issue with their OCSP server
03-18-2021 07:27 AM
As i mentioned in my post Failed to renew device certificate :
The Root CA Palo Alto Networks Inc.-Root-CA G1 that signed the cert for certificatetrusted.paloaltonetworks.com is not trusted if you browse to the url. But i do not see any deny or block or other errors concerning this.
I did not find any other clues for the problem.
01-10-2022 08:06 AM
I resolved this today by removing my zone protection profile from my management network. I believe SYN Cookies (or something else) may have been interfering with this renewal process.
01-11-2023 05:17 PM
Hi @kbe ,
Did it get auto renewed? if not, what steps did you take or how did the issue get resolved?
Thanks
01-12-2023 06:35 AM
I did a manual renew with an OTP.
After that it renewed the next time after 3 months.
But right now since last night i have the same problem on a new PA that tried it for the first time last night.
But the URL for renew is not answering at the moment so i do not want to go the manual way and revoke the actual cert which is still valid for a few days.
Maybe Palo has a problem at the moment. I will wait till tomorrow.
01-12-2023 01:51 PM
hey @kbe ,
Thanks for your response.
We are facing the same issue. Do let us know if it gets auto renewed.
Many Thanks,
01-12-2023 10:32 PM
Hi
no good news.
Renew failed again.
But the URL certificatetrusted.paloaltonetworks.com is answering.
I have a TAC session today for another problem and will aks if there is a known problem.
I guess i have to use the manual method with OTP and then wait for the next autorenew to see if it works the next time.
Will let you know when i have news.
cu
01-13-2023 12:22 AM - edited 01-13-2023 12:23 AM
Hi @Pras
I decided to give it a try before the TAC session for my other problem.
I requested the OTP on the support portal.
I klicked the "Get Certificate" under Setup-Management-Device Certificate, pasted the OTP and got the following error
I gave it a second try by ssh to the Palo, issued a
request certificate fetch otp <value>
where <value> is the copied OTP and recieved an "invalid syntax" error.
So i just fired a
request certificate fetch
in the ssh session and it worked. Cert was renewed.
Hope this helps you.
cu
01-15-2023 02:27 PM
Hi @kbe ,
Thanks for letting me know. So the issue seems to be from PA side. FWs are not auto renewing the Device Certs as they normally would. My FW is PA-440, which one is yours?
Either way, I am glad a manual fetching worked.
01-15-2023 10:24 PM
It´s a 3410.
When i had this problem the first time it was on a 3020 after the 9.1.x OS release came out which brought this certificate up for the first time.
Maybe it´s only a problem the first time the autorenew runs after the first 3 months passed.
How old ist your 440? Was it also the first autorenew after bringing the device up?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!