Set Up Connectivity with a SafeNet Network HSM
To set up connectivity between the Palo Alto Networks firewall (HSM client) and a SafeNet Network HSM server, you must specify the IP address of the server, enter a password for authenticating the firewall to the server, and register the firewall with the server. Before starting the configuration, make sure you created a partition for the firewall on the HSM server. To ensure the SafeNet Network client version on the firewall is compatible with your SafeNet Network server, see Set up Connectivity with an HSM.
Before the HSM and firewall connect, the HSM authenticates the firewall based on the firewall IP address. Therefore, you must configure the firewall to use a static IP address, not a dynamic address assigned through DHCP. Operations on the HSM would stop working if the firewall IP address changed during runtime.
HSM configurations are not synchronized between high availability (HA) firewall peers. Consequently, you must configure the HSM separately on each peer. In active/passive HA deployments, you must manually perform one failover to individually configure and authenticate each HA peer to the HSM. After this initial manual failover, user interaction is not required for the failover function.
- Define connection settings for each SafeNet Network
- Log in to the firewall web interface and select DeviceSetupHSM.
- Edit the Hardware Security Module Provider section and set the Provider Configured to SafeNet Network HSM.
- Add each HSM server as follows.
A high availability (HA) HSM configuration requires two servers.
- Enter a Module Name for the HSM server. This can be any ASCII string of up to 31 characters.
- Enter an IPv4 address for the HSM Server Address.
- (HA only) Select High Availability,
specify the Auto Recovery Retry value, and
enter a High Availability Group Name.If two HSM servers are configured, the best practice is to enable High Availability. Otherwise the second HSM server is not used.
- Click OK and Commit.
- (Optional) Configure a service
route to connect to the HSM if you don’t want the firewall to connect
through the Management interface (default).If you configure a service route for the HSM, running the clear session all CLI command clears all existing HSM sessions, bringing all HSM states down and then up again. During the several seconds required for HSM to recover, all SSL/TLS operations will fail.
- Select DeviceSetupServices and click Service Route Configuration.
- Customize a service route. The IPv4 tab is active by default.
- Click HSM in the Service column.
- Select a Source Interface for the HSM.
- Click OK and Commit.
- Configure the firewall to authenticate to the HSM.
- Select DeviceSetupHSM and Setup Hardware Security Module.
- Select the HSM Server Name.
- Enter the Administrator Password to authenticate the firewall to the HSM.
- Click OK.The firewall tries to authenticate to the HSM and displays a status message.
- Click OK.
- Register the firewall as an HSM client with the HSM server
and assign the firewall to a partition on the HSM server.If the HSM already has a firewall with the same <cl-name> registered, you must first remove the duplicate registration by running the client delete -client <cl-name> command, where <cl-name> is the name of the client (firewall) registration you want to delete.
- Log in to the HSM from a remote system.
- Register the firewall using the client register -c <cl-name> -ip <fw-ip-addr> command, where <cl-name> is a name that you assign to the firewall for use on the HSM and <fw-ip-addr> is the firewall IP address.
- Assign a partition to the firewall using the client assignpartition -c <cl-name> -p <partition-name> command, where <cl-name> is the name assigned to the firewall in the client register command and <partition-name> is the name of a previously configured partition that you want to assign to the firewall.
- Configure the firewall to connect to the HSM partition.
- Select DeviceSetupHSM and click the Refresh icon.
- Setup HSM Partition in the Hardware Security Operations section.
- Enter the Partition Password to authenticate the firewall to the partition on the HSM.
- Click OK.
- (HA only) Repeat the previous authentication,
registration, and partition connection steps to add another HSM
to the existing HA group.If you remove an HSM from your configuration, repeat the previous partition connection step to remove the deleted HSM from the HA group.
- Verify firewall connectivity and authentication with
- Select DeviceSetupHSM and
check the authentication and connection Status:
- Green—The firewall is successfully authenticated and connected to the HSM.
- Red—The firewall failed to authenticate to the HSM or network connectivity to the HSM is down.
- View the following columns in the Hardware Security
Module Status section to determine the authentication status:
- Serial Number—The serial number of the HSM partition if the firewall successfully authenticated to the HSM.
- Partition—The partition name on the HSM that is assigned on the firewall.
- Module State—The current state of the HSM connection. The value is always Authenticated if the Hardware Security Module Status section displays the HSM.
- Select DeviceSetupHSM and check the authentication and connection Status:
Hardware Security Module Status
Hardware Security Module Status The Hardware Security Module Status section provides the following information about HSMs that have been successfully authenticated. The display is different ...
Set Up Connectivity with a Thales nShield Connect HSM
Set Up Connectivity with a Thales nShield Connect HSM You must set up a remote filesystem (RFS) as a hub to synchronize key data for ...
Hardware Security Module Provider Configuration and Status
Hardware Security Module Provider Configuration and Status The Hardware Security Module Provider section shows the HSM configuration settings and the connectivity status of the HSM. ...
HSM Authentication Select Setup Hardware Security Module and configure the following settings to authenticate the firewall to the HSM. HSM Module Authentication Server Name Select ...
Hardware Security Module Provider Settings
Hardware Security Module Provider Settings To configure a Hardware Security Module (HSM) on the firewall, edit the Hardware Security Module Provider settings: Hardware Security Module ...
Store Private Keys on an HSM
Store Private Keys on an HSM For added security, you can use an HSM to secure the private keys used in SSL/TLS decryption for: SSL ...
Secure Keys with a Hardware Security Module
Secure Keys with a Hardware Security Module A hardware security module (HSM) is a physical device that manages digital keys. An HSM provides secure storage ...
Device > Setup > HSM
Device > Setup > HSM Select Device Setup HSM to configure a Hardware Security Module (HSM) and to view HSM status. What are you looking ...
Device > Master Key and Diagnostics
Device > Master Key and Diagnostics Select Device Master Key and Diagnostics or Panorama Master Key and Diagnostics to configure the master key that encrypts ...