- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
09-21-2022 01:10 AM
We have problem with SMTPS configuration on Palo alto Firewall
so we have the SMTPS Certificate and already inject to the firewall
Our users says that the certificate is the certificate CA and when we test the email connection, the firewall shows error 'SSL Connect Error', we try on port 465 and using TLS 1.2
We have another brand network device, and the tac support on that brand said their device require the parameter 'extended key usage server authentication' in the certificate to setup the SMTPS.
Are in the palo alto firewall need this too in the certificate so we can config the SMTPS?
or is there any docs about how to troubleshoot the certificate like this?
09-21-2022 04:45 PM
Hi @DennyChanditya ,
What type of email server do you use?
09-21-2022 09:39 PM
i not familiar with the smtp/email servers type, how to identified that server type?
i only get the certificate file from our customer, they said it was the email server certificate CA.
i still search about certificate requirement for setup the SMTP over TLS.
09-22-2022 10:39 AM
Hello,
Have you tried either of the following:
Try sending without TLS
Use port 25
Regards,
09-26-2022 09:18 PM
Hello,
We've request open tac to troubleshoot this case, since our users not recommend to use smtp on port 25, so we should use the smtps instead. if the tac says it cannot use smtps so we go through with smtp.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!