End-of-Life (EoL)
SSL/TLS service profiles specify a server certificate and a protocol version or range of versions for firewall services that use SSL/TLS. By defining the protocol versions, the profiles enable you to restrict the cipher suites that are available for securing communication with the client systems requesting the services.
In the client systems that request firewall services, the certificate trust list (CTL) must include the certificate authority (CA) certificate that issued the certificate specified in the SSL/TLS service profile. Otherwise, users will see a certificate error when requesting firewall services. Most third-party CA certificates are present by default in client browsers. If an enterprise or firewall-generated CA certificate is the issuer, you must deploy that CA certificate to the CTL in client browsers.
To add a profile, click Add, complete the fields in the following table, and then click OK. To clone a profile, select it, click Clone, and then click OK. To delete a profile, select it and click Delete.
The following table describes SSL/TLS service profile settings.
SSL/TLS Service Profile Setting Description
Name Enter a name to identify the profile (up to 31 characters). The name is case-sensitive. It must be unique and use only letters, numbers, spaces, hyphens, and underscores.
Shared If the firewall has more than one virtual system (vsys), you can select this option to make the profile available on all virtual systems. By default, this option is cleared and the profile is available only in the vsys selected in the Device tab, Location drop-down.
Certificate Select, import, or generate a server certificate to associate with the profile. See Manage Firewall and Panorama Certificates. Do not use certificate authority (CA) certificates for SSL/TLS services; use only signed certificates.
Min Version Select the earliest ( Min Version) and latest ( Max Version) version of TLS that services can use: TLSv1.0, TLSv1.1, TLSv1.2, or Max (the latest available version). Client certificates that are used when requesting firewall services that rely on TLSv1.2 cannot have SHA384 (in releases before PAN-OS 7.1.8) or SHA512 as a digest algorithm. The client certificates must use a lower digest algorithm or you must limit the Max Version to TLSv1.1 for the services.
Max Version

Recommended For You