<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA 3220 function as a secondary / sub-ca in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528119#M109058</link>
    <description>&lt;P&gt;For GlobalProtect I would buy cert from pubic CA to avoid users seeing cert warning when they access site first time as it teaches them that it is ok to bypass cert warnings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For SSL Forward Proxy you need to sign certificates with CA that users already trust.&lt;/P&gt;
&lt;P&gt;If you have internal CA then you can generate intermediate CA CSR on Palo and sign it with enterprise CA.&lt;/P&gt;
&lt;P&gt;If you don't have internal CA just create CA on Palo and export PUBLIC key of it into workstations (using Group Policy for example).&lt;/P&gt;
&lt;P&gt;You will not import private key of CA cert into workstations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is goal of sub-ca idea? Security in case CA private key leaks out from firewall?&lt;/P&gt;
&lt;P&gt;In this case you would need to generate root CA on Palo.&lt;/P&gt;
&lt;P&gt;Generate intermediate CA on Palo and sign with CA cert.&lt;/P&gt;
&lt;P&gt;Most likely export both of them and then delete both of them (as you can't delete root ca if cert signed by it exists on Palo).&lt;/P&gt;
&lt;P&gt;Then import root CA public key only and then import intermediate CA with private key.&lt;/P&gt;
&lt;P&gt;And when intermediate expires then go through the process again by importing CA with private key to sign intermediate etc?&lt;/P&gt;
&lt;P&gt;Not worth the work if you don't have enterprise CA then just export root CA public key into workstations I think.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jan 2023 05:12:28 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2023-01-23T05:12:28Z</dc:date>
    <item>
      <title>PA 3220 function as a secondary / sub-ca</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528098#M109056</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; We are researching Certificate management and all the certificate management the Firewall can do.&amp;nbsp; It came across as a question&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;- is there a way to have the PA function as a secondary / sub-ca?&amp;nbsp; Our team members our discussing instead of standing of a new CA since everyone should have the root FW cert.&amp;nbsp; My question is at what scale and other problems could arise?&amp;nbsp; I see some docs that state to monitor cpu and it does have a resource cost but I think this would be more than 10 certs which seems to be a basic suggestion:&amp;nbsp; To be clear this is for applications on the FW like SSL Forward Proxy, Captive Portal, Global Protect.&amp;nbsp; This would be about generating self signed certs or public CA for other webservices in the&amp;nbsp; environment.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;PA 3220&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;OS 10.2&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/certificate-deployment" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/certificate-deployment&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Has anyone had experience&amp;nbsp;with this and how did it go?&amp;nbsp; Lessons learned or advice welcome?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2023 21:08:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528098#M109056</guid>
      <dc:creator>sallen</dc:creator>
      <dc:date>2023-01-22T21:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: PA 3220 function as a secondary / sub-ca</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528119#M109058</link>
      <description>&lt;P&gt;For GlobalProtect I would buy cert from pubic CA to avoid users seeing cert warning when they access site first time as it teaches them that it is ok to bypass cert warnings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For SSL Forward Proxy you need to sign certificates with CA that users already trust.&lt;/P&gt;
&lt;P&gt;If you have internal CA then you can generate intermediate CA CSR on Palo and sign it with enterprise CA.&lt;/P&gt;
&lt;P&gt;If you don't have internal CA just create CA on Palo and export PUBLIC key of it into workstations (using Group Policy for example).&lt;/P&gt;
&lt;P&gt;You will not import private key of CA cert into workstations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is goal of sub-ca idea? Security in case CA private key leaks out from firewall?&lt;/P&gt;
&lt;P&gt;In this case you would need to generate root CA on Palo.&lt;/P&gt;
&lt;P&gt;Generate intermediate CA on Palo and sign with CA cert.&lt;/P&gt;
&lt;P&gt;Most likely export both of them and then delete both of them (as you can't delete root ca if cert signed by it exists on Palo).&lt;/P&gt;
&lt;P&gt;Then import root CA public key only and then import intermediate CA with private key.&lt;/P&gt;
&lt;P&gt;And when intermediate expires then go through the process again by importing CA with private key to sign intermediate etc?&lt;/P&gt;
&lt;P&gt;Not worth the work if you don't have enterprise CA then just export root CA public key into workstations I think.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2023 05:12:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528119#M109058</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-01-23T05:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: PA 3220 function as a secondary / sub-ca</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528347#M109099</link>
      <description>&lt;P&gt;Greetings and thank you for the discussion.&amp;nbsp; Let me correct a few items.&amp;nbsp; I made a typing mistake and this should state NOT:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;To be clear this is for applications on the FW like SSL Forward Proxy, Captive Portal, Global Protect.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;To be clear this is NOT for applications on the FW like SSL Forward Proxy, Captive Portal, Global Protect.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For testing purposes we have a CA in a secure environment&amp;nbsp;but this FW is in-between.&amp;nbsp; Can we provide&amp;nbsp;the Firewall with other secure certs from other 3rd party applications?&amp;nbsp; Thinking that the FW can be a CA instead of standing a new separate&amp;nbsp;CA up.&amp;nbsp; The same clients that access the secure portal will have access to the secure certificates on the FW.&amp;nbsp; This situation&amp;nbsp;for testing is because Captive Portal in&amp;nbsp;redirect mode.&amp;nbsp; PA 3220 PANOS 10.2 -TEST&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/certificate-deployment" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certificate-management/certificate-deployment&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJYCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJYCA0&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 15:02:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528347#M109099</guid>
      <dc:creator>sallen</dc:creator>
      <dc:date>2023-01-24T15:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: PA 3220 function as a secondary / sub-ca</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528371#M109102</link>
      <description>&lt;P&gt;Yes you can import certificates from different sources into the firewall and use different certificates for different purposes.&lt;/P&gt;
&lt;P&gt;If you want Palo to sign certificates itself then it needs to either have root CA cert or intermediate signed by your enterprise root CA.&lt;/P&gt;
&lt;P&gt;Public CA's won't sign you trusted intermediate cert.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 16:41:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-3220-function-as-a-secondary-sub-ca/m-p/528371#M109102</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-01-24T16:41:05Z</dc:date>
    </item>
  </channel>
</rss>

