On October 9, 2025 @ 12:30PM UTC (5:30 PM PDT), Broadcom will reissue SSL certificates for VIP endpoints from the DigiCert Global Root G2 CA. Click here for more information.
The following components are affected by this change.
Action is required to avoid a service disruption.
On October 9, 2025 @ 12:30PM UTC (5:30 PM PDT), Symantec VIP will be reissuing SSL certificates from the DigiCert Global Root G2 CA.
VIP EG Version: | Compliant? | Action: |
9.11 or later | Yes | No action is required. The new G2 root CA chain is included. |
9.10.x | No | Install the G2 Import Tool (attached) on the VIP EG server to inject the certificate chain into the root store. |
9.9.2 | No | 9.9.2 support ended on 31 Jan 2025 - upgrade to 9.11. Note: The G2 Import Tool (attached) can be installed on 9.9.x until the server can be upgraded. |
9.9.1, 9.9.0, 9.8.x and older |
No |
Upgrade to version 9.11. (Or, upgrade to 9.10.3 and install the G2 Import Tool (attached)). (See: VIP Enterprise Gateway installation and upgrade guides). |
set "VRSN_MAUTH_HOME=C:\Program Files (x86)\Symantec\VIP_Enterprise_Gateway"
set "VRSN_MAUTH_HOME=C:\Program Files\Symantec\VIP_Enterprise_Gateway"
**Note: A restart of all VIP Enterprise Gateway services is required after importing the Digicert Global Root G2 CA certificate using this utility for the services to register this change.
OPTION 1: USE KEYTOOL TO VERIFY THE ROOT CA WAS ADDED:
keytool -printcert -file "C:/Program Files/Symantec/VIP_Enterprise_Gateway/conf/root.pem" >C:\certs.txtVIP EG 9.9.x: type
keytool -printcert -file "C:/Program Files (x86)/Symantec/VIP_Enterprise_Gateway/conf/root.pem" >C:\certs.txt
OPTION 2: USE OPENSSL TO VERIFY THE ROOT CA CHAIN:
Windows: Open an administrative command prompt and navigate to <VIPEG_install>\tools and run this command:
VIP EG 9.9.x: openssl s_client -connect vip.symantec.com:443 -CAfile "C:\Program Files (x86)\Symantec\VIP_Enterprise_Gateway\conf\root.pem"
test |