Automatic Certificate Renewal for Passive HA Devices
Focus
Focus
What's New in the NetSec Platform

Automatic Certificate Renewal for Passive HA Devices

Table of Contents

Automatic Certificate Renewal for Passive HA Devices

Automatically renew critical device certificates on your passive HA device.
Previously, in HA Active/Passive pairs with service routes configured for Palo Alto Networks services or DNS servers, it was impossible to renew device certificates on the passive device because the passive device's dataplane functions are down. Starting with this PAN-OSĀ® release, the passive device can have service routes configured and receive certificate updates and renewals through its HA interface connected to the active device. You do not have to configure or change your network security policy to perform this function; the process happens automatically when a certificate is near its expiry date. This allows your HA pair to maintain up to date and secure connections with Palo Alto Networks licenses and services even after a failover event.
You can verify if the passive device has successfully renewed a certificate using the following CLI command:
show device-certificate status
.
It's recommended that you enable encryption on the HA link, otherwise you will receive the following system log during the renewal process: HA1 link is used without encryption.