Configure an SSL/TLS Service Profile (PAN-OS & Panorama)
Focus
Focus
Next-Generation Firewall

Configure an SSL/TLS Service Profile (PAN-OS & Panorama)

Table of Contents


Configure an SSL/TLS Service Profile (PAN-OS & Panorama)

PAN-OS: Specify a certificate, TLS protocol versions, and ciphers that you want connections to various Palo Alto Networks services support.
  1. For each desired service, generate or import a certificate on the firewall (see Obtain Certificates).
    Use only signed certificates, not CA certificates, in SSL/TLS service profiles.
  2. Select DeviceCertificate ManagementSSL/TLS Service Profile.
  3. If the firewall has more than one virtual system (vsys), select the Location (vsys or Shared) where the profile is available.
  4. Click Add and enter a Name to identify the profile.
  5. Select the Certificate you obtained in step one.
    PQC certificates are not available for selection.
  6. Under Protocol Settings, define the range of TLS versions that the service can use.
    TLSv1.3 support is limited to administrative access to management interfaces and GlobalProtect portals and gateways. You can only attach SSL/TLS service profiles that allow TLSv1.3 to the settings for these services.
    • Administrative Access and GlobalProtect Portals and Gateways:
      Set the Min Version and Max Version to TLSv1.3.
      • For the Min Version, select the earliest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or TLSv1.3.
      • For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or TLSv1.3.
    • All Other Services:
      Set the Min Version and Max Version to TLSv1.2.
      • For the Min Version, select the earliest allowed TLS version: TLSv1.0, TLSv1.1, or TLSv1.2.
      • For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, or TLSv1.2.
  7. (Optional) Select or deselect any Key Exchange Algorithms, Encryption Algorithms, or Authentication Algorithms.
    (PAN-OS 12.1 only) For Key Exchange Algorithms, select the Classical or Post-quantum Cryptography (PQC) tab.
    The RSA, DHE, and ECDHE classical key exchange algorithms are enabled by default.
    (TLSv1.3 only) To specify PQC key exchange algorithms, click Add, and then configure the following settings:
    1. For Algorithm, select ML-KEM.
    2. For each algorithm, select at least one Security Level: Level 1, Level 3, Level 5.
      These levels are based on NIST standards of security strength. The higher the security level, the greater the security provided.
    3. For each algorithm, define the PQC Supported Groups by selecting one or more curve groups.
      The curve groups available for selection differ based on the selected Algorithm and Security Level.
  8. Click OK and Commit your changes.