Use the AES-256-GCM or AES-256-CBC encryption algorithm to encrypt and secure the
master key.
You configure the master key encryption algorithm level and whether to
re-encrypt all currently encrypted data with a new encryption algorithm level using
the CLI. Depending on the order of the keywords, you can change the encryption level
or you can change the encryption level and also specify whether to re-encrypt
previously encrypted data.
The following operational CLI command changes the
encryption level and automatically re-encrypts all currently encrypted data with the
specified encryption
level:
admin@PA-NGFW>request encryption-level level <0|1|2>
The
following operational CLI command changes the encryption level and specifies whether
to re-encrypt all currently encrypted data with the new encryption
level:
admin@PA-NGFW>request encryption-level re-encrypt <yes|no> level <0|1|2>
Keyword | Options |
level | 0 = Use the default
algorithm (AES-256-CBC) to encrypt
data 1 = Use the AES-256-CBC
algorithm to encrypt data 2 = Use
the AES-256-GCM algorithm to encrypt data The firewall
re-encrypts all currently encrypted data and encrypts new
sensitive data using the specified algorithm. If you don’t want
to re-encrypt existing encrypted data with the new algorithm,
specify re-encrypt no in the command
string. This prevents the firewall from automatically
re-encrypting data that the firewall has already
encrypted.
Only use AES-256-GCM when Panorama
and all of its managed devices (or both devices in an HA
pair) run PAN-OS 11.1 or greater and configure all of the
devices to use AES-256-GCM. Managed or paired devices that
use different encryption levels may become out of
sync.
|
re-encrypt | no = Do not re-encrypt
currently encrypted data. The firewall does not re-encrypt
currently encrypted data. Currently encrypted data remains
encrypted with whichever algorithm the firewall originally used
to encrypt the data. The firewall uses the specified algorithm
only to encrypt sensitive data in the
future. yes = Re-encrypt
currently encrypted data with the specified algorithm and use
that algorithm to encrypt sensitive data in the
future. |
Use the operational CLI command show system
masterkey-properties to verify the encryption algorithm (level)
currently configured on the device, for
example:
admin@PA-NGFW>show system masterkey-properties
Master key expires at: unspecified
Reminders will begin at: unspecified
Master key on hsm: no
Automatically renew master key lifetime: 0
Encryption Level: 1
The output shows that the current encryption
level is 1, which is AES-256-CBC.
If you downgrade to an earlier version of
PAN-OS, the device automatically reverts the encryption algorithm to a level that
the downgraded PAN-OS version supports and automatically re-encrypts encrypted data
using that level so that the device can decrypt and use the data as needed. For
example, if your device is on PAN-OS 11.1 and uses AES-256-GCM as the encryption
algorithm (which is not supported on earlier versions of PAN-OS), and you downgrade
to PAN-OS 9.1, then the device re-encrypts the encrypted data to AES-256-CBC, which
is supported in PAN-OS 9.1.