Communication Settings
Table of Contents
9.1 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Communication Settings
- Panorama > Managed Collectors > Communication
To configure custom certificate-based authentication between
Log Collectors and Panorama, firewalls, and other Log Collectors,
configure the settings as described in the following table.
Communication Settings | Description |
---|---|
Secure Server Communication—Enabling Secure
Server Communication validates the identity of client
devices connecting to the Log Collector. | |
SSL/TLS Service Profile | Select a SSL/TLS service profile from the
drop-down. This profile defines the certificate presented by the
Log Collector and specifies the range of SSL/TLS versions acceptable
for communication with the Log Collector. |
Certificate Profile | Select a certificate profile from the drop-down.
This certificate profile defines certificate revocation checking
behavior and root CA used to authenticate the certificate chain
presented by the client. |
Custom Certificate Only | When enabled, the Log Collector only accepts
custom certificates for authentication with managed firewalls and
Log Collectors. |
Authorize Clients Based on Serial Number | The Log Collector authorizes client devices
based on uses a hash of their serial number. |
Check Authorization List | Client devices or device groups connecting
to this Log Collector are checked against the authorization list. |
Disconnect Wait Time (min) | The amount of time the Log Collector waits
before breaking the current connection with its managed devices.
The Log Collector then reestablishes connections with its managed devices
using the configured secure server communications settings. The
wait time begins after the secure server communications configuration
is committed. |
Authorization List | Authorization List—Select
Add and complete the following fields to set criteria.
|
Secure Client Communication—Enabling Secure
Client Communication ensures that the specified client
certificate is used for authenticating the Log Collector over SSL
connections with Panorama, firewalls, or other Log Collectors. | |
Certificate Type | Select the type of device certificate (None,
Local, or SCEP) used for securing communication |
None | If None is selected,
no device certificate is configured and the secure client communication
is not used. This is the default selection. |
Local | The Log Collector uses a local device certificate
and the corresponding private key generated on the Log Collector
or imported from an existing enterprise PKI server. |
Certificate—Select the local device
certificate. This certificate can be a unique to the firewall (based
on a hash of the Log Collector’s serial number) or a common device
certificate used by all Log Collectors connecting to Panorama. | |
Certificate Profile—Select the Certificate
Profile from the drop-down. This certificate profile is used for
defining the server authentication with the Log Collector. | |
SCEP | The Log Collector uses a device certificate
and private key generated Simple Certificate Enrollment Protocol
(SCEP) server. |
SCEP Profile—Select a SCEP Profile
from the drop-down. | |
Certificate Profile— Select the Certificate
Profile from the drop-down. This certificate profile is used for
defining the server authentication with the Log Collector. | |
Check Server Identity | The client device confirms the server’s
identity by matching the common name (CN) with server’s IP address
or FQDN. |