<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to manage 140+ Firewalls with their certificates... in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206914#M60692</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;That can be a daunting task for sure. What we try to do is internal certificates are generated with the highest level of encryption possible and we generate then for 2+ years depending on their function. External certs are only renewed for 1 year since external service can change but we still go for the highest level of encryption the provier can give us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Mar 2018 15:19:17 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2018-03-22T15:19:17Z</dc:date>
    <item>
      <title>How to manage 140+ Firewalls with their certificates...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206872#M60676</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was wondering how in a "larger scale" environement (140+ branche offices) people are generally managing their certificates?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Take the scenario of Panorama managing thoses 140+ PA firewalls with their corresponding 140+ templates...&lt;/LI&gt;&lt;LI&gt;Then you either import the compagny's Root CA / generate a Sub-Ca to every single 140+ firewall&amp;nbsp; (in our case AD CS) or create 140+ Sub-CA certs from AD-CS for each branch locations and export CRS / import CER etc.&lt;/LI&gt;&lt;LI&gt;Then from each firewall create the required certificates... let's say one for the HTTP management access and one for the SLL Decryption... maybe more to come.&lt;/LI&gt;&lt;LI&gt;By default on PA, the certificate duration is 1 year. I understand one can renew it right away to 5, 10 or even 20 years. But for argument / security sake, let's keep it to its default 1 year.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;How do you guys manage all those certificates? Within a year, you would have to at best renew 280 certificates manually... Are you generating them on longer terms? Is this just a yearly "job" that has to be done?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your kind input.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 13:37:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206872#M60676</guid>
      <dc:creator>Rievax</dc:creator>
      <dc:date>2018-03-22T13:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage 140+ Firewalls with their certificates...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206914#M60692</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;That can be a daunting task for sure. What we try to do is internal certificates are generated with the highest level of encryption possible and we generate then for 2+ years depending on their function. External certs are only renewed for 1 year since external service can change but we still go for the highest level of encryption the provier can give us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 15:19:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206914#M60692</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-03-22T15:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage 140+ Firewalls with their certificates...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206932#M60701</link>
      <description>&lt;P&gt;Thanks Otakar.Klier&amp;nbsp;for the answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For internal certificates, I was thinking of&amp;nbsp;using our AD CS PKI to generate&amp;nbsp;5 year Sub CA certificates (Default template)&amp;nbsp;for each firewall... and then create 2 other 5 year certificates for GUI and SSL Decryption.&lt;/P&gt;&lt;P&gt;Pretty simple, but after 5 years, I'll have to manually renew all those certificates for 140+ templates in Panorama... So I was just hoping for other solutions &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:10:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206932#M60701</guid>
      <dc:creator>Rievax</dc:creator>
      <dc:date>2018-03-22T16:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage 140+ Firewalls with their certificates...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206933#M60702</link>
      <description>&lt;P&gt;Yeah sorry&amp;nbsp;I dont have a better answer. Maybe reach out to your SE and put in a suggestion for Panorama to somehow manage this and hopefully in less than 5 years there will be a solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:12:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206933#M60702</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-03-22T16:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage 140+ Firewalls with their certificates...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206939#M60706</link>
      <description>&lt;P&gt;With that many certificcates to manage, look into third-party Certificate management software, they will typically interface with AD CS and some third party external providers to track certificate expiry and send e-mail alerts as certificates near expiry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The last one I dealt with (unfortunately I have forgotten it's name) coudl also use API calls to renew certificates with AD and from there I would think it would not be too difficult to use API calls to push them into panorama or directly to firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the volume of certificates... While each firewall should have a unique certificate for their HTTP interface, why not use the same certificate for SSL decrypt on all firewalls?&amp;nbsp; that would nearly halve the number of certificates to manage...&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:44:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206939#M60706</guid>
      <dc:creator>JoeAndreini</dc:creator>
      <dc:date>2018-03-22T16:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage 140+ Firewalls with their certificates...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206947#M60708</link>
      <description>&lt;P&gt;I looked it up, the product I used previously was from Venafi - It made tracking easy for management, as well as delegation for engineers&amp;nbsp;and self-service for system administrators&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:47:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-manage-140-firewalls-with-their-certificates/m-p/206947#M60708</guid>
      <dc:creator>JoeAndreini</dc:creator>
      <dc:date>2018-03-22T16:47:20Z</dc:date>
    </item>
  </channel>
</rss>

