- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Content translations are temporarily unavailable due to site maintenance. We apologize for any inconvenience.
01-18-2016 07:53 AM - edited 01-18-2016 11:39 AM
Hi all,
I want to renew the expiration date of the certificates for my globalprotect devices. The firewall is the CA that issued the certificates.
My question is whether I have to export and import the certificates after renewing them by following the steps on this article:
I don´t know if the certificates renewal requires any installation or the changes will be reflected in the devices without installation.
Many thanks in advance,
Marcos
01-18-2016 08:37 AM
Hi Marcos,
There are two possibilities for which you may be using the Device (locally) generated certificate :
1. Server Certificate for Portal and Gateway : In this case the signing CA cert is still the same and has not changed.
Hence the end users would still be able to validate the new server certificates as they have the signing CA cert.
2. Client Certificate for Authentication of End users : If this certificate has expired and renewed then it needs to be imported
on the local devices (clients). If not, they would not authenticate the local machine due to expiry.
01-18-2016 10:51 AM - edited 01-18-2016 10:57 AM
Hello Syadav,
Many thanks for your answer.
Just two last questions:
1) In the end users can the new certificate overwrite the old one or is it necessary to remove the old certificate before installing the new one??
2) If I want to renew the expiration date of the CA root certificate which signed the server and client certificates I guess that I need to export this one to the end users as well, right??
Thanks and Regards,
Marcos.
01-18-2016 06:55 PM - edited 01-19-2016 05:39 AM
Hi Marcos,
Please find the answers to your questions below :
1) I would recommend you to remove the older certificate from the personal store and add the new one. Certificate management is usually done with GPO, you may use the same to deploy/withdraw the certs.
2) Yes, in case the signing CA certificate is renewed, it needs to be imported on the client machines and added in the Trusted Root CA store.
Please mark as a solution if it resolves your problem.
01-19-2016 07:44 AM
Hi Syadav,
Thanks a lot for your help.
Regards,
Marcos.
01-19-2016 07:51 AM
Hi Marcos,
Thanks for your response.
Also make sure that if the Client certificate is generated on firewall you export it in format PKCS12.
If this advice helps your case, please mark it as a solution so that it may help others.
05-22-2020 04:27 PM
Hey @Carracido
I know it's been a while since you've made this post, so I hope this message finds you well.
Since the certificates were generated on the firewall, we have the ability to renew them directly from the PAN-OS without having to re-deploy them.
I've included the document explaining this in further detail below for your reference.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POioCAG
Stay safe and have a great day!
-Cheers
03-17-2021 06:10 AM
If we renewed self-signed cert , will be able to connect GP with expired self-signed cert already installed in user machine ?
We are able to get certificate warning while connecting GP on new machine.
But on already installed machine its giving server certificate not found error. Also we have enabled installed certificate in trusted root store in Global Protect Portal > Agent but no luck.
Do we require to remove gateway address from GP client and need to reconnect ? in order to get certificate warning or to get renewed cert automatically installed on user machine.
If we install renewed certificate on user machine then we are able to connect GP.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!