the device certificate is going to expire end of march.
My PA trys to renew it and comes up with the following error:
Failed to renew device certificate.Failed to send request to CSP server.Error: No OCSP response received(dest => 22.214.171.124)
I have no telemetry enabled.
Just activated the certificate with OTP on 2020/12/29 after upgrading to PanOS 9.1.7.
Now it´s the first try of my PA to renew it.
The only thing i found relates to PanOS 9.1.8 wich seems to fix another error with device certificate:
Fixed an issue where the firewall returned the following error message when attempting to request a device certificate using a one-time password (OTP):
Any ideas where to look for?
Last traffic to ( url eq 'certificate.paloaltonetworks.com' ) was on 12/29 when the certificate was installed the first time.
No block / deny or other traffic to this url or ip since then.
Seems the PA ist trying to connect to 126.96.36.199 and there is no deny for it.
The mgmt interface has an allow rule but the renew is not working.
This was the traffic from the last 2 days to https://certificatetrusted.paloaltonetworks.com/
The Root CA Palo Alto Networks Inc.-Root-CA G1 that signed the cert for certificatetrusted.paloaltonetworks.com
is not trusted if you browse to the url. But that should not be the problem.
My cert expires in 31 days and I see no way to renew it. I don't have a way to track the firewalls attempts since this happens via the mgmt interface. All I see is the graphic below and it doesn't look like it's tried to connect to the server since the cert was issued.
How do I renew it?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!