paloaltonetworks:configuration:certificates
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| paloaltonetworks:configuration:certificates [2020/08/03 10:31] – bstafford | paloaltonetworks:configuration:certificates [2022/11/23 12:49] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Certificates ====== | ====== Certificates ====== | ||
| - | You can test ciphers being used with the foloowing | + | You can test ciphers being used with the following |
| < | < | ||
| + | ===== Free Certificates with Lets Encrypt ===== | ||
| + | You can get free certificates for Palo Alto Networks devices using Lets Encrypt. | ||
| + | |||
| + | Details are [[networking: | ||
| ===== Certificate Chains ===== | ===== Certificate Chains ===== | ||
| If you have a publicly signed certificate for GlobalProtect, | If you have a publicly signed certificate for GlobalProtect, | ||
| ===== Secure SSL Ciphers ===== | ===== Secure SSL Ciphers ===== | ||
| - | When using SSL Certificate Profiles for managment | + | When using SSL Certificate Profiles for management |
| - | You can also restrict certain ciphers | + | You can also restrict certain ciphers |
| For Firewall local config: | For Firewall local config: | ||
| - | < | + | < |
| - | For Panorama | + | For Panorama |
| < | < | ||
| For Panorama templates: | For Panorama templates: | ||
| Line 36: | Line 40: | ||
| **Note**: PuTTY requires either the CBC or CRT ciphers. So, for PuTTY to work, you need at least once CBT or at least one CRT cipher | **Note**: PuTTY requires either the CBC or CRT ciphers. So, for PuTTY to work, you need at least once CBT or at least one CRT cipher | ||
| This is for firewalls and Panorama management. | This is for firewalls and Panorama management. | ||
| + | From [[https:// | ||
| < | < | ||
| - | set deviceconfig system ssh ciphers mgmt aes256-cbc | + | delete deviceconfig system ssh |
| - | set deviceconfig system ssh ciphers mgmt aes256-gcm</ | + | set deviceconfig system ssh ciphers mgmt aes256-ctr |
| + | set deviceconfig system ssh ciphers mgmt aes256-gcm | ||
| + | set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256 | ||
| + | set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256 | ||
| + | set deviceconfig system ssh session-rekey mgmt interval 3600 | ||
| + | set deviceconfig system ssh mac mgmt hmac-sha2-256 | ||
| + | set deviceconfig system ssh mac mgmt hmac-sha2-512</ | ||
| Longer list | Longer list | ||
| Line 64: | Line 75: | ||
| After setting the cipher suite, you will need to run the following command. Or, you can type '' | After setting the cipher suite, you will need to run the following command. Or, you can type '' | ||
| < | < | ||
| + | ===== Test SSH NMAP ===== | ||
| + | < | ||
| + | |||
paloaltonetworks/configuration/certificates.1596450712.txt.gz · Last modified: (external edit)
