Next-Generation Firewall
Generate a Certificate
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Generate a Certificate
Learn how to generate certificates to authenticate client, servers, users, and
devices.
Palo Alto Networks firewalls and Panorama use certificates to authenticate
clients, servers, users, and devices in several applications, including SSL/TLS
decryption, Authentication Portal, GlobalProtect™, site-to-site IPSec VPN, and web
interface access to the firewall or Panorama. Generate certificates for each usage:
for details, see Keys and
Certificates.
To generate a certificate, first create a self-signed
root CA certificate or import one (Import a Certificate
and Private Key) to sign it. To use the Online Certificate Status
Protocol (OCSP) to verify certificate revocation status, configure an OCSP
responder before generating the certificate.
Generate Certificate (Strata Cloud Manager)
- Log in to Strata Cloud Manager.Select ConfigurationNGFW and Prisma AccessObjectsCertificate Management.In the Custom Certificates pane, click Generate.Enter a Certificate Name. The name is case-sensitive and can have up to 63 characters. It must be unique and use only letters, numbers, hyphens, and underscores.For Common Name, enter the FQDN (recommended) or IP address of the interface where you will configure the service that uses this certificate.For Signed By, select the root CA certificate that will issue the certificate.To allow the NGFW to issue the certificate, enable Certificate Authority.Marking this certificate as a CA grants it the ability to sign other certificates.For Certificate Use for, select Forward Trust Certificate, Forward UnTrust Certificate, or Trusted Root CA.Configure the Cryptographic Settings.
- Select a key generation Algorithm: RSA (default) or Elliptic Curve DSA (ECDSA). ECDSA is recommended for client browsers and operating systems that support it.The Thales CipherTrust Manager integration with PAN-OS doesn't support ECDSA keys.Select the Number of Bits to define the certificate key length.Higher numbers are more secure but require more processing time.
- For RSA, select 512 bits, 1024 bits, 2048 bits, 3072 bits, or 4096 bits.If the NGFW is in FIPS-CC mode, the RSA keys generated must be either 2048 or 3072 bits.
- For Elliptic Curve DSA, select either 256 bits or 384 bits.
Select a Digest algorithm.From most to least secure, the options are: sha512, sha384, sha256 (default), sha1, and md5.If you use client certificates for firewall services that rely on TLSv1.2 (such as administrative access to the web interface), do not select the sha512 digest algorithm. Use sha384 or lower, or set Max Version to TLSv1.1 in the SSL/TLS service profiles for these services.- For RSA, select md5, sha1, sha256, sha384, or sha512.If the NGFW is in FIPS-CC mode, you must select sha256, sha384, or sha512.
- For Elliptic Curve DSA, select sha256, sha384, or sha512.
For Expiration, enter the number of days (default is 365) for which the certificate is valid.(Optional) Add Certificate Attributes to uniquely identify the firewall and the service that uses the certificate.If you add a Host Name (DNS name) attribute, match it to the Common Name, because the hostname populates the Subject Alternate Name (SAN) field of the certificate and some browsers require the SAN to specify the domains the certificate protects; in addition, the Host Name matching the Common Name is mandatory for GlobalProtect.(Optional) Select an OCSP Responder.Save the certificate.The certificate displays in the Custom Certificates list.To commit your changes, click Push ConfigPush.Generate Certificate (PAN-OS and Panorama)
- Select DeviceCertificate ManagementCertificates, then Device Certificates (PAN-OS 11.2 and earlier) or Custom Certificates (PAN-OS 12.1.0 and later).For Certificate Type, select Local (default) unless you want to deploy .Enter a unique Certificate Name. Names are case-sensitive and can use up to 63 characters on the firewall or 31 characters on Panorama. Use only letters, numbers, hyphens, and underscores.If the firewall has more than one virtual system (vsys), select a Location (vsys or Shared) for the certificate.To share the certificate across all vsys, enable Shared.For Common Name, enter the FQDN (recommended) or IP address of the interface where you configure the service using this certificate.For Signed By, select the root CA certificate that will issue the certificate.To allow the firewall to issue the certificate, enable Certificate Authority.Marking this certificate as a CA grants it the ability to sign other certificates on the firewall.(Optional) Enable Block Private Key Export.Enable this setting to prevent the private key from being exported when you export the certificate.If you enable this setting, you must manually import the associated private key if you import the certificate to Panorama or to other firewalls. For firewalls managed by Panorama, the private key is required to successfully push configuration changes to managed firewalls that you imported the certificate to.(Optional) Select an OCSP Responder.Select a key generation Algorithm:
- RSA (default)
- Elliptic Curve DSA (ECDSA)ECDSA is recommended for client browsers and operating systems that support it.The Thales CipherTrust Manager integration with PAN-OS doesn't support ECDSA keys.
- (PAN-OS 12.1 only) ML-DSA
- (PAN-OS 12.1 only) SLH-DSA
(PAN-OS 12.1 only) For SLH-DSA only, select Algorithm Parameters for the hash-based signature scheme.The parameters reflect the hashing algorithm (sha or SHAKE), NIST security level (128 bits, 192 bits, or 256 bits of security), and the digital signature size of the scheme.Select the Number of Bits to define the certificate key length.Higher numbers are more secure but require more processing time.SLH-DSA bits are preselected based on the selected Algorithm Parameters.- For RSA, select 512 bits, 1024 bits, 2048 bits, 3072 bits, or 4096 bits.If the NGFW is in FIPS-CC mode, the RSA keys generated must be either 2048 or 3072 bits.
- For Elliptic Curve DSA, select either 256 bits or 384 bits.
- (PAN-OS 12.1 only) For ML-DSA, select 10496 bits, 15616 bits, or 20736 bits.
Select a Digest algorithm.From most to least secure, the options are: sha512, sha384, sha256 (default), sha1.If you use client certificates for firewall services that rely on TLSv1.2 (such as administrative access to the web interface), do not select the sha512 digest algorithm. Use sha384 or lower, or set Max Version to TLSv1.1 in the SSL/TLS service profiles for these services.- For RSA, select sha1, sha256, sha384, or sha512.If the NGFW is in FIPS-CC mode, you must select sha256, sha384, or sha512.
- For Elliptic Curve DSA, select sha256, sha384, or sha512.
- (PAN-OS 12.1 only) For ML-DSA and SLH-DSA, select sha256, sha384, or sha512.
For Expiration, enter the number of days (default is 365) for which the certificate is valid.(Optional) Add the Certificate Attributes to uniquely identify the firewall and the service that uses the certificate.If you add a Host Name (DNS name) attribute, match it to the Common Name, because the hostname populates the Subject Alternate Name (SAN) field of the certificate and some browsers require the SAN to specify the domains the certificate protects; in addition, the Host Name matching the Common Name is mandatory for GlobalProtect.Click Generate and, in the Device Certificates page, click the certificate Name.Regardless of the time zone on the firewall, it always displays the corresponding Greenwich Mean Time (GMT) for certificate validity and expiration dates and times.Specify the intended use of the certificate.For example, if the firewall will use this certificate to secure forwarding of syslogs to an external syslog server, select the Certificate for Secure Syslog check box.Click OK and Commit.