PCNSE Exam QuestionsBrowse all questions from this exam

PCNSE Exam - Question 27


In the image, what caused the commit warning?

Exam PCNSE Question 27
Show Answer
Correct Answer: A

The warning message 'cannot find complete certificate chain for certificate FWDtrust' suggests that the firewall is unable to establish a complete chain of trust for the FWDtrust certificate. This usually happens when the firewall does not have the necessary CA (Certificate Authority) certificates to verify the FWDtrust certificate. In this case, the FWDtrust certificate is likely signed by an intermediate CA certificate, which in turn must be signed by a root CA certificate. Therefore, the CA certificate that signed the FWDtrust certificate has not been imported into the firewall, causing the inability to complete the certificate chain.

Discussion

24 comments
Sign in to comment
AdamLolzSmith
AdamLolzSmith
May 8, 2021

Option A. The FWDtrust is a CA certificate type capable of signing other certificates. That means either it's a Root Certificate or Intermediate certificate. If it was a Root Certificate, then you wouldn't get that warning. That means the certificate is an intermediate and you need to import its Root Certificate.

Prutser2
Prutser2
Jun 29, 2021

correct, in addition, the CA for FWDtrust is some LAB CA, says it under issuer, so definitely not root

trashboat
trashboat
Apr 29, 2021

The answer is D. When importing a CA certificate, the full certificate chain must be present in the certificate information for proper identification/verification. A can't be true because the certificate in question is imported is a CA cert. B can't be true because the certificate in question is imported as a trusted root CA. C can't be true because SSL Forward proxy can be set up using self-signed certs. https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/configure-ssl-forward-proxy.html

kerberos
kerberos
Oct 18, 2021

correct!

homersimpson
homersimpson
Dec 22, 2021

Agreed

homersimpson
homersimpson
Dec 22, 2021

Agreed

myname_1
myname_1
Dec 15, 2022

The certificate in the screenshot is a CA, because it has to be a CA for forward trust. The issue is that FWDTrust's (Which is CN = "Lab-SRV2016...") does not have its CA imported. If it were the CA of its chain, the subject would match the issuer.

bluejl
bluejl
Jun 26, 2021

A. Tested in lab.

Jared28
Jared28Option: A
Mar 23, 2022

A - Tested in lab

Qintao
Qintao
Apr 25, 2021

A is inacurate, no need to be a Trust root CA

evdw
evdw
May 5, 2021

I think answer is A : is not self-signed-certificate -> so other certificate signed this certificate, if that is not imported there is no chain of trust

Joey456
Joey456
May 8, 2021

A: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains.html

FS68
FS68
Oct 7, 2021

A. because FWDtrust has a chain but it's not present in the firewall.

Biz90
Biz90
Oct 29, 2021

Hi Team to add It is A as other users have done I tested this as well. If you're using an External/Internal PK, you need to ensure to import the Root CA, in which once you create, generate your CSR, and reimport the Trust cert into the Firewall. The Turst cert should fall into the COC. If this was a self-signed cert (as I have also labbed) you can simple have that on the FW without a COC.

Kane002
Kane002
Nov 17, 2021

D. The problem, as it says itself, is that it does not have a complete chain of trust. The solution would be to add in any intermediate CAs that the NGFW doesn't have as root CAs to restore the chain, but the problem is the chain.

myname_1
myname_1
Dec 15, 2022

D is ambiguous. D is saying that there is no certificate chain for that cert, but there is because the issuer for the FWDTrust is not the same CN as the subject of FWDTrust

hcir
hcir
Jun 12, 2024

D is the answer. It is a simple warning that states that there is no chain

Forces12
Forces12
Sep 24, 2024

D here aslo, FWDtrust cert has been imported but the firewall could not verify it and asks for the Cert Chain (import either Root or Intermediate that validates FWDtrust)

j4v13rh4ack
j4v13rh4ackOption: D
Nov 20, 2024

D is the answer because the image show us the CA and Key checkboxes, telling us that is a self signed Root CA without a certificate, in other words without a chain and according to warning show in screen.

CarlosDV06
CarlosDV06Option: A
Jan 6, 2025

If you look at the subject, you will see that there's another certificate which signs the FWDtrust. In fact, it is not a self signed certificate because of that statement, so D is ambigous compared to A, because the FWDtrust does has a certificate chain, just that it's not -imported- into the fw.

keto3812
keto3812
Mar 28, 2021

I think it should be B,

Paul_great
Paul_great
Apr 4, 2021

The answer is A. The issuer of the cert was not imported in the firewall and the firewall could not build a chain because of it.

unknid
unknidOption: A
Jan 29, 2022

A. because FWDtrust has a chain but it's not present in the firewall.

455_qq
455_qq
Jul 26, 2022

Option A.

Micutzu
Micutzu
Oct 13, 2023

I think the correct answer is B.

Micutzu
MicutzuOption: B
Oct 13, 2023

I think the correct answer is B.

JRKhan
JRKhanOption: A
Jan 9, 2024

Under issuer, it tells us which root CA signed the FWDTrust certificate. Correct answer is A. FWDTrust needs to be a CA (intermediate in this case) in order for it to be able to sign the server certs so that clients accessing an external server or website can tell if the firewall trusts those server certs or not.

evdw
evdwOption: D
Dec 30, 2024

Subject CN and issuer CN are different, therefore this certificate is signed by someone else and need to be present in order to complete the chain

eca4765
eca4765Option: A
Jan 6, 2025

Look at Usage Tab, we are missing Root CA, First cert is used as Forward Trust and 2nd one is used for Forward untrust

kabuelenain
kabuelenainOption: A
Feb 9, 2025

Answer A is correct: It is only best practice, not mandatory, to import the full certificate chain for a forward trust certificate, and hence only a warning, not a commit failure. Answer D is incorrect: The certifictae DOES have an issuer - see the "Issuer" field.

Djonzi
DjonziOption: A
Mar 12, 2025

Both A and D are correct if there are no intermediate CAs between FWDTrust and Root CA. However if there is one or more Intermediate CA-s between them then only D is correct.