I have a third party (Network Soluitions SSL cert that expires in 2023 but validation not past July 22nd of 2022. What is the process from start to finish with the cert and on the firewall? I'm assuming I need to have NS reissue another cert with another request and then follow this article but just wanted to confirm these are the steps? https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/certificate-management/obtain-certificates...
Depending on how you issue your certificates for GlobalProtect (there are 3 sources, but only 2 are discussed here), if the old certificate is expiring you will need generate a signing request and have an external authority (i.e. Network Solutions) or your internal CA sign it. The document you listed is the general procedure, but 7.1 is a very old version of PANOS. Is that what you are actually running on your device? You can check the running version from the Dashboard tab ("Software Version" line) or from Device tab -> Software. On the listed page you can go to instructions for other versions by selecting/changing the drop-down box "CURRENT VERSION: 7.1 (EoL)".
General steps are:
1) Generate a new certificate. Give it a unique Certificate Name, I would suggest something like "GlobalProtect_2022" to differentiate it from the previous/future versions of the same use. Set the Common Name to be your GP FQDN. Set "Signed by:" to be "External Authority". Important part - under Certificate Attribute be sure to set a "Host Name" value to be the same as your GP FQDN and any other FQDNs you will be connecting as (this will appear in a Subject Alternative Name tag in the final certificate, which is what browsers/etc. use now instead of Common Name). Your certificate provider may restrict what names you can use. Also fill out the Country, State, Locality, and Organization values as your cert provider will probably require those as well. Generate the certificate and then select/export it. You will get a CSR (Certificate Signing Request), to send to your CA.
2) After you CA has generated your certificate, import the file from the same page. Important - from the import page use the exact same "Certificate Name" you created above. This will match the certificate to the CSR you generated before and convert the CSR into a private/public certificate pair that can be used on the VPN Portal/Gateway.
3) When you are ready to switch to the new certificate, go to your Portal and Gateway configurations and determine which SSL/TLS Service Profile they are currently using:
Network -> GlobalProtect -> Portals -> [config] -> Authentication -> SSL/TLS Service Profile
Network -> GlobalProtect -> Gateways -> [config] -> Authentication -> SSL/TLS Service Profile
Depending on how you have the Portal/Gateway setup, these may be the same or separate profiles. Update the profile to use the new certificate. After commiting it may take a few minutes for the VPN/web services to restart using the new certificate.
Device -> Certificate Management -> SSL/TLS Service Profiles -> [config] -> Certificate:
It's telling you that that keys do not match. What cert types do you have the option of downloading from your CA? Try to get a cert that contains all of the cert files including the key. You may have to do some evaluation of the cert with OPENSSL to determine why the key is a mismatch. Your CA could potentially help with that as well.
As @danoman2 says, the private key you generated in step #1 does not match the public key you received back from the CA in step #2. I am not exactly sure why that happened and you would probably have to investigate the certs to determine why they mismatched. Some causes could be (but not limited to):
You may need to inquire with the CA as to why you are getting the error.
Turns out that when I downloaded the cert, it was the old (expiring this month) one from Network Solutions. For some reason the download link was not updated for the newest cert. Followed your instructions and all is working with the new certificate! Thank You for all your assistance. I'm guessing I can either delete or revoke the old certificates?
That would do it...
Once you have changed the SSL/TLS Certificate Profile to use the new certificate, you can delete the old certificates. It may take several minutes for the profile changes to take effect and your web management interface/etc may be temporarily unreachable while the web services restart. Once it has changed over you can delete the old certificate. If the old certificate is used somewhere else in the config the PA won't let you delete it until it has been fully remove.
Here is a good resource for all things global protect related. Resource List: GlobalProtect Configuring and Troubleshooting - Knowledge Base - Palo Alto Networks
This is the guide I would follow for your use case. Found it in the cert section of the above link. I hope this helps. How to Generate a CSR (Certificate Signing Request) & Import th... - Knowledge Base - Palo Alto Netw...
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!