Certificate Error in Global Protect Portal

Showing results for 
Show  only  | Search instead for 
Did you mean: 

Certificate Error in Global Protect Portal

Not applicable

Hi All,

I'm trying to setup the Globalprotect VPN and have followed the (only partially helpful) GlobalProtect-Configuration-4.1.pdf to create certs and set everything up. When I try to connect to the portal site with my browser I get a certificate error - "Error code: sec_error_bad_signature".

It doesn't matter if I conect to the host name or the IP that I defined in the cert, I still get this error.

Does anyone know what the problem could be. Also, is there a way to actually see the certificates?




Hi Kamish,

Thanks very much. I've been working away on this for hours before seeing you post. My last issue was the temptation to select a value for Client Certificate Profile in the Portal Config. Please also note that after I recreated all the certs and started again, I emptied my test client browser cache and purged the certs from the cert personal store.

Works nicely now with PA based CA cert.

@kamish do you then manually copy the certificates to the browsers on the machines that need to connect to the portal?


Palo Alto Networks Guru

Using GlobalProtect with an external CA could be documented better I suppose. The most common mistake is that the certificate that is issued by the external CA is not imported back into PANOS together with the corresponding private key and certificate chain. Usually you'd import it as a PKCS12 file.

@mwalter my initial problems were not with a third-party CA. I was using the PA as the CA exactly as per the instructions and it still didn't work, even after sitting down with an SE. It wasn't until we did the single cert solution as documented in this thread that we were able to get it working.

@jambulo: Thanks!  Works for me...

I wonder if PaloAlto is willing to change the documentation if its wrong or outdated.  Otherwise, we are all following the wrong documentations.

Following these changes sorted the issue for me. Thanks.


I'm trying to use a certificate from our Corporate CA (Windows 2003) with GlobalConnect Gateway and Portal

I've loaded the certificate, the private key  and the root certificate. I've marked the root certifcate as Trusted Root CA.

PaloAlto Corporate CA.png

I've configured the gateway with the server certificate, but I get this error:

Error GlobalConnect.PNG

What kind of certificate should I issue ?

SistemasCajamar - Your MS PKI certificate template may not have the proper attributes set, such as client authentication, or IPSec.

Hi Kanish,

I followed your examples for creating certificates for Global Protect..  But for some reason the portal or connecting via the Global Protect Client do not work..  The Portal just times out and client doesn't produce any errors or authentication window..

It only seems to work when l use the "web-server" local host device certificate within the Firewall..  But l don't want to use this as it is generating CN Host mismatch errors from the Global Protect Client..

We are using PAN OS " 5.0.3  and Global Protect Client 1.2.4

Thanks any help would be appreciated..


  • 23 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!