Next-Generation Firewall
Configure an SSL/TLS Service Profile
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Configure an SSL/TLS Service Profile
Specify the certificate, TLS protocol versions, and cipher suites used to secure
connections to various Palo Alto Networks services.
Where Can I Use This? | What Do I Need? |
---|---|
|
For cloud-managed NGFWs:
|
Palo Alto Networks firewalls and Panorama appliances use SSL/TLS to secure
connections to the Authentication Portal, GlobalProtect portals and gateways, the
management interface, HTTPS websites that require password access (URL Admin Override), and the User-ID™
syslog listening service. You can create an SSL/TLS service profile to define the
server certificate, SSL/TLS protocol versions, and ciphers supported for connections
to these services. Cipher suites are automatically selected based on the protocol
versions chosen. However, you can disable individual ciphers as needed. If a service
request involves a protocol version outside the specified range, the firewall or
Panorama appliance downgrades or upgrades the connection to a supported version. To
activate an SSL/TLS service profile, attach the profile to the settings for a
specific service.
In the client systems that request firewall services, the certificate trust list
(CTL) must include the certificate authority (CA) certificate that issued the
certificate specified in the SSL/TLS service profile. Otherwise, users will see
a certificate error when requesting firewall services. Most third-party CA
certificates are present by default in client browsers. If an enterprise or
firewall-generated CA certificate is the issuer, you must deploy that CA
certificate to the CTL in client browsers.
TLSv1.3 support is limited to administrative access to
management interfaces and GlobalProtect portals and gateways. You can only attach
SSL/TLS service profiles that allow TLSv1.3 to the settings for these
services.
Configure an SSL/TLS Service Profile (Strata Cloud Manager)
Configure an SSL/TLS service profile on Strata Cloud Manager.
- Log in to Strata Cloud Manager.For each desired service, generate or import a certificate.
- Select ManageConfigurationNGFW and Prisma AccessObjectsCertificate Management.In the Custom Certificates pane, Generate or Import a certificate.Save the certificate.Configure an SSL/TLS service profile.
- Select ManageConfigurationNGFW and Prisma AccessObjectsCertificate Management.In the SSL/TLS Service Profiles pane, click Add Profile.Enter a Name for the profile.Select or Import a Certificate.For Protocol Settings, define the range of TLS versions that the service can use.TLSv1.3 support is limited to administrative access to management interfaces and GlobalProtect portals and gateways. You can only attach SSL/TLS service profiles that allow TLSv1.3 to the settings for these services.Administrative Access and GlobalProtect Portals and Gateways:Set the Min Version and Max Version to TLSv1.3.
- For the Min Version, select the earliest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or TLSv1.3.
- For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or TLSv1.3.
All Other Services:Set the Min Version and Max Version to TLSv1.2.- For the Min Version, select the earliest allowed TLS version: TLSv1.0, TLSv1.1, or TLSv1.2.
- For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, or TLSv1.2.
(Optional) Select any Key Exchange Algorithms, Encryption Algorithms, or Authentication Algorithms.The RSA, DHE, and ECDHE key exchange algorithms are enabled by default.Save the profile.To commit your changes, click Push ConfigPush.Configure an SSL/TLS Service Profile (PAN-OS & Panorama)
PAN-OS: Specify a certificate, TLS protocol versions, and ciphers that you want connections to various Palo Alto Networks services support.- For each desired service, generate or import a certificate on the firewall (see Obtain Certificates).Use only signed certificates, not CA certificates, in SSL/TLS service profiles.Select DeviceCertificate ManagementSSL/TLS Service Profile.If the firewall has more than one virtual system (vsys), select the Location (vsys or Shared) where the profile is available.Click Add and enter a Name to identify the profile.Select the Certificate you obtained in step one.Under Protocol Settings, define the range of TLS versions that the service can use.TLSv1.3 support is limited to administrative access to management interfaces and GlobalProtect portals and gateways. You can only attach SSL/TLS service profiles that allow TLSv1.3 to the settings for these services.
- Administrative Access and GlobalProtect Portals and Gateways:Set the Min Version and Max Version to TLSv1.3.
- For the Min Version, select the earliest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or TLSv1.3.
- For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or TLSv1.3.
- All Other Services:Set the Min Version and Max Version to TLSv1.2.
- For the Min Version, select the earliest allowed TLS version: TLSv1.0, TLSv1.1, or TLSv1.2.
- For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, or TLSv1.2.
(Optional) Select or deselect any Key Exchange Algorithms, Encryption Algorithms, or Authentication Algorithms.The RSA, DHE, and ECDHE key exchange algorithms are enabled by default.Click OK and Commit your changes.