<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: service certificate push from panorama to managed firewalls eg: vpn in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238958#M2981</link>
    <description>&lt;P&gt;Hi Pavel,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response.&lt;/P&gt;
&lt;P&gt;Presently the panorama is provisioned to managed 4 pairs of firewall, each pair is in A-P. What i found is that for each firewall let say FW01-Active has a individual Template and Template stack similarly for FW02-passive has individual T and TS.&lt;/P&gt;
&lt;P&gt;Now with regards to s2s vpn cert based authenticate, i want to know if i generate a csr from each firewall template with similar CN: contoso.abc.com and import it into each firewall Template and Push.&lt;/P&gt;
&lt;P&gt;Will the VPN will work after failover is trigerred? when old passive FW02 becomes new active? Assuming that similar CN will suffice for th tunnel to get establish with no issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 28 Sep 2025 09:55:21 GMT</pubDate>
    <dc:creator>zaidshaikh</dc:creator>
    <dc:date>2025-09-28T09:55:21Z</dc:date>
    <item>
      <title>service certificate push from panorama to managed firewalls eg: vpn</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238667#M2979</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have panorama and few pairs to managed firewalls being managed by panorama,&lt;/P&gt;
&lt;P&gt;Under the Templates, created CSR and imported the signed CA and pushed it to specific template firewall(say FW01-active), the managed firewall local configurations displays the new certificate, however, on the FW02-passive one the certificate did not sync.&lt;/P&gt;
&lt;P&gt;Do we need to separately push to FW02 template, by creating csr and same procedure? since its the vpn service certificate, it should sync from the active-FW01.&lt;/P&gt;
&lt;P&gt;Note: Templates care configured for each firewall separate (eg: FW01-Template ; FW02 Template so on)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 14:08:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238667#M2979</guid>
      <dc:creator>zaidshaikh</dc:creator>
      <dc:date>2025-09-24T14:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: service certificate push from panorama to managed firewalls eg: vpn</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238676#M2980</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/128470"&gt;@zaidshaikh&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on documentation:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/high-availability/reference-ha-synchronization" target="_self"&gt;What Doesn't Sync in Active/Passive HA?&lt;/A&gt;&amp;nbsp;most of the certificates and certificate related configuration does not sync in HA deployment. It specifically does not call out a certificate used for VPN, however personally I believe it is a root cause. I would add the certificate to the Template associated with FW02.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 21:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238676#M2980</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-09-24T21:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: service certificate push from panorama to managed firewalls eg: vpn</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238958#M2981</link>
      <description>&lt;P&gt;Hi Pavel,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response.&lt;/P&gt;
&lt;P&gt;Presently the panorama is provisioned to managed 4 pairs of firewall, each pair is in A-P. What i found is that for each firewall let say FW01-Active has a individual Template and Template stack similarly for FW02-passive has individual T and TS.&lt;/P&gt;
&lt;P&gt;Now with regards to s2s vpn cert based authenticate, i want to know if i generate a csr from each firewall template with similar CN: contoso.abc.com and import it into each firewall Template and Push.&lt;/P&gt;
&lt;P&gt;Will the VPN will work after failover is trigerred? when old passive FW02 becomes new active? Assuming that similar CN will suffice for th tunnel to get establish with no issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Sep 2025 09:55:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1238958#M2981</guid>
      <dc:creator>zaidshaikh</dc:creator>
      <dc:date>2025-09-28T09:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: service certificate push from panorama to managed firewalls eg: vpn</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1239127#M2984</link>
      <description>&lt;P&gt;Hi Pavel,&lt;/P&gt;
&lt;P&gt;I was able to get the answer from TAC after testing it in LAB:&lt;/P&gt;
&lt;P&gt;Each FW template can have separate csr should be generated with the same Common Name in order for the service certificates to work properly during failover. Hence, the peer auth happens based on CN name which is identical in both FW01 and FW02.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 18:53:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/service-certificate-push-from-panorama-to-managed-firewalls-eg/m-p/1239127#M2984</guid>
      <dc:creator>zaidshaikh</dc:creator>
      <dc:date>2025-09-30T18:53:45Z</dc:date>
    </item>
  </channel>
</rss>

