<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to import a certificate used for DPI non-domain machine in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010764#M1010283</link>
    <description>Hi,&lt;BR /&gt;Chrome doesn't check the Windows local Certificate store, you will need to import the certificate into Chrome application via it's security settings options, the same applies to Firefox.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Mon, 13 Jan 2020 21:13:14 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-01-13T21:13:14Z</dc:date>
    <item>
      <title>How to import a certificate used for DPI non-domain machine</title>
      <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010760#M1010281</link>
      <description>&lt;P&gt;What is the procedure to use to import a certificate to be trusted for DPI for a Windows 10 machine that is not on the domain? I tried exporting the root-ca from our CA as x509 format and imported that to local computer trusted root authorities, but that didn't work. I get&amp;nbsp;NET::ERR_CERT_AUTHORITY_INVALID in Chrome when testing. My policy is working for a domain connected PC on my FTD appliances. They all share the same SSL/ACP policy.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 21:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010760#M1010281</guid>
      <dc:creator>ryan14</dc:creator>
      <dc:date>2020-01-13T21:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to import a certificate used for DPI non-domain machine</title>
      <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010764#M1010283</link>
      <description>Hi,&lt;BR /&gt;Chrome doesn't check the Windows local Certificate store, you will need to import the certificate into Chrome application via it's security settings options, the same applies to Firefox.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 13 Jan 2020 21:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010764#M1010283</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-13T21:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to import a certificate used for DPI non-domain machine</title>
      <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010770#M1010285</link>
      <description>&lt;P&gt;Thanks for the reply. Are you sure about that? I didn't have to import anything on my domain connected PCs for the cert to be recognized by any browser (Chrome, FF, Edge, IE).&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 21:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010770#M1010285</guid>
      <dc:creator>ryan14</dc:creator>
      <dc:date>2020-01-13T21:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to import a certificate used for DPI non-domain machine</title>
      <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010782#M1010287</link>
      <description>Yes, sorry it seems I was incorrect, Chrome does use the underlying OS certificate store.&lt;BR /&gt;Does it work if you add the certificate to the local user trusted certificate store?</description>
      <pubDate>Mon, 13 Jan 2020 21:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4010782#M1010287</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-13T21:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to import a certificate used for DPI non-domain machine</title>
      <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4011213#M1010291</link>
      <description>&lt;P&gt;Yes it does. Very strange. Any idea why it would work for Current User but not Local Computer?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 14:16:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4011213#M1010291</guid>
      <dc:creator>ryan14</dc:creator>
      <dc:date>2020-01-14T14:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to import a certificate used for DPI non-domain machine</title>
      <link>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4011217#M1010292</link>
      <description>At a guess (not being a Microsoft expert) but I imagine it is because if the computer is not joined to an AD domain the local computer certificate store is not used.</description>
      <pubDate>Tue, 14 Jan 2020 14:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-import-a-certificate-used-for-dpi-non-domain-machine/m-p/4011217#M1010292</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-14T14:22:29Z</dc:date>
    </item>
  </channel>
</rss>

