Manage Firewall and Panorama Certificates
Table of Contents
9.1 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Manage Firewall and Panorama Certificates
- Device > Certificate Management > Certificates > Device Certificates
- Panorama > Certificate Management > Certificates
Select DeviceCertificate
ManagementCertificatesDevice
Certificates or PanoramaCertificate ManagementCertificatesDevice Certificates to display
the certificates that the firewall or Panorama uses for tasks such
as securing access to the web interface, SSL decryption, or LSVPN.
The following are some uses for certificates. Define the usage
of the certificate after you generate it (see Manage
Default Trusted Certificate Authorities).
- Forward Trust—The firewall uses this certificate to sign a copy of the server certificate that the firewall presents to clients during SSL Forward Proxy decryption
- Forward Untrust—The firewall uses this certificate to sign a copy of the server certificate the firewall presents to clients during SSL Forward Proxy decryption
- Trusted Root CA—The firewall uses this certificate as a trusted CA for SSL Forward Proxy decryption
- SSL Exclude—The firewall uses this certificate if you configure decryption exceptions
- Certificate for Secure Syslog—The firewall uses this certificate to secure the delivery of logs as syslog messages
To generate a certificate, click Generate and specify the following
fields:
After a certificate is generated, the page displays Other
Supported Actions to Manage Certificates.
Settings to Generate
a Certificate | Description |
---|---|
Certificate Type | Select the entity that generates the certificate: Local—The
firewall or Panorama generates the certificate. SCEP—A
Simple Certificate Enrollment Protocol (SCEP) server generates the
certificate and sends it to the firewall or Panorama. |
Certificate Name | (Required) Enter a name (up to
63 characters on the firewall or up to 31 characters on Panorama)
to identify the certificate. The name is case-sensitive and must
be unique. Use only letters, numbers, spaces, hyphens, and underscores. |
SCEP Profile | (SCEP certificates only) Select
a SCEP Profile to define how the firewall
or Panorama communicates with a SCEP server and to define settings
for the SCEP certificate. For details, see Device
> Certificate Management > SCEP. You can configure a firewall
that serves as a GlobalProtect portal to request SCEP certificates on demand and automaticallydeploy The remaining fields in the Generate Certificate
dialog do not apply to SCEP certificates. After specifying the Certificate
Name and SCEP Profile, click Generate. |
Common Name | (Required) Enter the IP address
or FQDN that will appear on the certificate. |
Shared | On a firewall that has more than one virtual
system (vsys), select Shared if you want
the certificate to be available to every vsys. |
Signed By | To sign the certificate, you can use a certificate
authority (CA) certificate that you imported into the firewall.
The certificate can also be self-signed, in which case the firewall
is the CA. If you are using Panorama, you also have the option of
generating a self-signed certificate for Panorama. If you
imported CA certificates or issued any on the firewall (self-signed),
the drop-down includes the CAs available to sign the certificate
that you are creating. To generate a certificate signing request
(CSR), select External Authority (CSR). After
the firewall generates the certificate and the key pair, you can
export the CSR and send it to the CA for signing. |
Certificate Authority | Select this option if you want the firewall
to issue the certificate. Marking this certificate as a CA
allows you to use this certificate to sign other certificates on
the firewall. |
OCSP Responder | Select an OCSP responder profile from the
drop-down (see Device
> Certificate Management > OCSP Responder). The corresponding
host name appears in the certificate. |
Algorithm | Select a key generation algorithm for the
certificate: RSA or Elliptic Curve DSA (ECDSA). ECDSA
uses smaller key sizes than the RSA algorithm and, therefore, provides
a performance enhancement for processing SSL/TLS connections. ECDSA
also provides equal or greater security than RSA. ECDSA is recommended
for client browsers and operating systems that support it but you
may be required to select RSA for compatibility with legacy browsers
and operating systems. Firewalls running
PAN-OS 6.1 or earlier releases will delete any ECDSA certificates
that you push from Panorama and any RSA certificates signed by an
ECDSA certificate authority (CA) will be invalid on those firewalls. You
cannot use a hardware security module (HSM) to store
private ECDSA keys used for SSL Forward Proxy or Inbound Inspection
decryption. |
Number of Bits | Select the key length for the certificate. If
the firewall is in FIPS-CC mode and the key generation Algorithm is RSA, the
RSA keys generated must be 2048 or 3027 bits.
If the Algorithm is Elliptic Curve DSA,
both key length options (256 and 384) work. |
Digest | Select the Digest algorithm
for the certificate. The available options depend on the key generation Algorithm:
If
the firewall is in FIPS-CC mode and the key generation Algorithm is RSA, you
must select SHA256, SHA384,
or SHA512 as the Digest algorithm.
If the Algorithm is Elliptic Curve DSA,
both Digest algorithms (SHA256 and SHA384)
work. Client certificates that are used when requesting firewall
services that rely on TLSv1.2 (such as administrator access to the
web interface) cannot have SHA512 as a digest
algorithm. The client certificates must use a lower digest algorithm
(such as SHA384) or you must limit the Max
Version to TLSv1.1 when you configure
SSL/TLS service profiles for the firewall services (see Device
> Certificate Management > SSL/TLS Service Profile). |
Expiration (days) | Specify the number of days (default is 365)
that the certificate will be valid. If
you specify a Validity Period in a GlobalProtect
satellite configuration, that value will override the value entered
in this field. |
Certificate Attributes | Add additional Certificate Attributes to
identify the entity to which you are issuing the certificate. You
can add any of the following attributes: Country, State, Locality, Organization, Department,
and Email. In addition, you can specify one
of the following Subject Alternative Name fields: Host Name (SubjectAltName:DNS), IP (SubjectAltName:IP),
and Alt Email (SubjectAltName:email). To
add a country as a certificate attribute, select Country from
the Type column and then click into the Value column
to see the ISO 6366 Country Codes. |
If you configured a hardware security module (HSM), the
private keys are stored on the external HSM storage, not on the
firewall.