Certificate is expired and is shown in the browser

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Certificate is expired and is shown in the browser

L1 Bithead

Good Morning,

 

System: PA-3020

SW Ver: 8.0.6

 

we are trying to implement a certificate on our Test Firewall and have encountered the an expired certificate.

We have created the certificate (self-signed); however, when I go to the Palo Alto GUI, the browser says 'Not secure.'

 

Certificate Error.png

The information from the certificate shows that the certificate was valid from 16 December to 18 December 2017. It does not show up under Device->Certificates. I have implemented a new certificate; but all browsers that I use become the certificate shown above.

 

After creating the new certificate, a 'commit' was executed, but we are still getting the old certificate.

My Questions are:

    1. Why is this certificate being selected?

    2. How can I delete this certificate.

 

Thank you for your help.

 

Jasper Freeman

1 accepted solution

Accepted Solutions

Hi

 

This is the default factory certificate, it is not listed in the certificate store

 

To replace it with a different certificate, you will need to first import one with it's intermediary or root, then go to the Device > setup > management > general settings option, and set an SSL/TLS Service profile containing your new certificate

certificate mgmt int.png

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

View solution in original post

4 REPLIES 4

L1 Bithead

Correction: The certificate is not expired, 

Apperently it is a support certificate that expires in 2027.

The problem is still that it doesn't show up under Device->Certificate.

Hi

 

This is the default factory certificate, it is not listed in the certificate store

 

To replace it with a different certificate, you will need to first import one with it's intermediary or root, then go to the Device > setup > management > general settings option, and set an SSL/TLS Service profile containing your new certificate

certificate mgmt int.png

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Hi reaper,

 

Thank you that really helped.

 

Question:

 

will the certificate config be synchronized in a HA configuration. Or, do I have to repeat the process on the Partner HA device?

 

I'm assuming that the certificates are hardware dependent, because I don't see the self-signed certificate from the master device.

 

Certificates are virgin territory for me.

 

Thanks in advance.

Community Team Member

Hi @jasfree,

 

Here you will find which settings do and don't sync exactly :

 

Reference-ha-synchronization

 

Cheers !

-Kiwi

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 1 accepted solution
  • 3526 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!