Next-Generation Firewall
Certificate Management Features
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Certificate Management Features
Learn about new Certificate Management features in PAN-OS 12.1.
The following section describes new certificate management features introduced in PAN-OS
12.1.
Automatic Certificate Renewal for Passive HA Devices
|
September 2025
|
Previously, in HA Active/Passive pairs with service routes configured for
Palo Alto Networks services or DNS servers, it was impossible to renew device
certificates on the passive device because the passive device's dataplane functions
are down. Starting with this PAN-OS® release, the passive device can have service
routes configured and receive certificate updates and renewals through
its HA interface connected to the active device. You do not have to configure or
change your network security policy to perform this function; the process happens
automatically when a certificate is near its expiry date. This allows your HA pair
to maintain up to date and secure connections with Palo Alto Networks licenses and
services even after a failover event.
You can verify if the passive device has successfully renewed a certificate
using the following CLI command:
show device-certificate statusIt's recommended that you enable encryption on the HA link, otherwise
you will receive the following system log during the renewal process:
HA1 link is used without encryption.
Entrust nShield HSM Client Software Upgrade
|
August 2025
|
Entrust nShield hardware security modules (HSMs) integrate
with Next-Generation Firewalls to securely generate and store master keys and
private keys. As the nShield client-side software for PAN-OS® 11.2 and earlier
versions approaches its end-of-support date, organizations face compliance and
service continuity issues. To address these issues, PAN-OS 12.1 upgrades the legacy
Security World software to version 13.6.3. Security World 13.6.3 ensures FIPS 140-3
compliance and is compatible with both older and newer nShield HSM models integrated
with Palo Alto Networks. This compatibility ensures that nShield HSM operations
remain uninterrupted and modernizes your HSM infrastructure through security and
functionality enhancements.
PAN-OS System Certificates
|
August 2025
|
Gaining comprehensive visibility into all internal firewall certificates can be a
challenge, often requiring manual checks across various system components and
increasing the risk of human error. The Firewall Web Interface addresses this by
displaying a centralized list of all internal Palo Alto
Networks® certificates under DeviceCertificate ManagementCertificatesPAN-OS System Certificates.
This new feature provides a single, unified location for managing critical assets.
You can easily review certificate details, check expiration dates, and track the
overall status of system certificates without navigating to multiple sections of the
firewall. By consolidating this information, this feature reduces the time and
effort needed for audits and compliance checks.
Along with these enhancements, new cryptographic dynamic updates ensure that your
Certificate Authority Trust Store and PAN-issued certificates remain up to date.
Quantum-Resistant TLSv1.3 for the Management Plane
|
August 2025
|
Future quantum computers will break today's encryption. Adversaries are
taking advantage by stealing encrypted data today to decrypt once a
cryptographically relevant quantum computer (CRQC) is available. This "Harvest Now,
Decrypt Later" strategy requires a proactive response. Management connections are
prime targets for adversaries because the encrypted traffic contains sensitive,
long-lived data such as login credentials and configuration details. To defend
against the quantum computing threat, PAN-OS® 12.1 now
supports post-quantum cryptography (PQC) for administrative access to
Next-Generation Firewalls (NGFWs) and Panorama®. This feature protects TLSv1.3
management connections using quantum-resistant algorithms standardized by the
National Institute of Standards and Technology (NIST).
SSL/TLS service profiles now offer ML-KEM
(Module-Lattice-based Key-Encapsulation Mechanism), the post-quantum key exchange
algorithm specified in FIPS 203. The NGFW or Panorama ensures
interoperability by automatically negotiating a supported classical algorithm if a
web browser doesn't support PQC. You can also enable hybrid post-quantum key
exchange, which combines a classical algorithm like ECDH with a post-quantum
algorithm to generate a shared key. Hybrid key exchange secures your organization
from attacks by today's classical computers and future CRQCs. These capabilities
prevent disruption to critical operations and ease your transition to PQC.
You can also generate certificates using the
NIST-approved digital signatures: ML-DSA (Module-Lattice-based Digital Signature
Algorithm) and SLH-DSA (Stateless Hash-based Digital Signature Algorithm). These
algorithms are specified in FIPS-204 and FIPS-205, respectively. PQC certificates are for testing only while
industry standards are under development.