Enable
SSL Between GlobalProtect LSVPN Components
    
    Establish a secure SSL/TLS connections between GlobalProtect portal, gateway(s), and
        satellite(s) using an internal CA or a self-signed root CA certificate generated on the
        firewall.
    
  
    
  
| Where Can I Use This? | What Do I Need? | 
    
| 
                            
                         | 
                            - No separate license required for LSVPN when using NGFWs
  
                         | 
 
  
 
  
All interaction between the GlobalProtect components occurs over an SSL/TLS connection.
            Therefore, you must generate and/or install the required certificates before configuring
            each component so that you can reference the appropriate certificate(s) and/or
            certificate profiles in the configurations for each component. This section describes
            the supported methods of certificate deployment, descriptions and best practice
            guidelines for the various GlobalProtect certificates, and provide instructions for
            generating and deploying the required certificates.
    
    About Certificate Deployment
    There are two basic approaches to deploying certificates for GlobalProtect LSVPN:
Enterprise Certificate Authority—If you already have your own
                        enterprise certificate authority, you can use this internal CA to issue an
                        intermediate CA certificate for the GlobalProtect portal to enable it to
                        issue certificates to the GlobalProtect gateways and satellites. You can
                        also configure the GlobalProtect portal to act as a Simple Certificate
                        Enrollment Protocol (SCEP) client to issue client certificates to
                        GlobalProtect satellites.
Self-Signed Certificates—You can generate a self-signed root CA
                        certificate on the firewall and use it to issue server certificates for the
                        portal, gateway(s), and satellite(s). When using self-signed root CA
                        certificates, as a best practice, create a self-signed root CA certificate
                        on the portal and use it to issue server certificates for the gateways and
                        satellites. This way, the private key used for certificate signing stays on
                        the portal.