Learn how to add a certificate to the Cloud NGFW for AWS.
Where Can I Use This? | What Do I Need? |
|
- Cloud NGFW subscription
- Palo Alto Networks Customer Support Account (CSP)
- AWS Marketplace account
- User role (either tenant or administrator)
|
Cloud NGFW uses certificates to access an intelligent feed and to enable inbound and
outbound decryption. These certificates are stored in the
AWS Secrets Manager.
There are three types of certificates used in a typical deployment.
When adding a certificate to the AWS Secrets Manager for use with Cloud NGFW, the
following prerequisites must be met.
Certificate added as a key or value pair, with two
keys—private-key and
public-key. For the private key, the value should
be the actual key and, for the public-key, the value should be the actual
certificate body.
A tag with the key PaloAltoCloudNGFW and value of
true.
Import the root CA certificate and Intermediate CA certificates to the trust
store of the client.
If you're using end-entity certificates for decrypting traffic, only the
end-entity certificates (both private and public keys) must be stored in the
AWS Secrets Manager.
PKCS8 private key format is supported. PKCS1 private key format isn't
supported.
Supported PKCS format:
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
Unsupported PKCS1 format:
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
Complete the following procedure to add a certificate for use with Cloud NGFW for
AWS.