Add a Certificate to Cloud NGFW for AWS
Table of Contents
Expand all | Collapse all
-
- About Cloud NGFW for AWS
- Getting Started from the AWS Marketplace
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for AWS Pricing
- Cloud NGFW Credit Distribution and Management
- Cloud NGFW for AWS Free Trial
- Cloud NGFW for AWS Limits and Quotas
- Subscribe to Cloud NGFW for AWS
- Locate Your Cloud NGFW for AWS Serial Number
- Cross-Account Role CFT Permissions for Cloud NGFW
- Invite Users to Cloud NGFW for AWS
- Manage Cloud NGFW for AWS Users
- Deploy Cloud NGFW for AWS with the AWS Firewall Manager
- Enable Programmatic Access
- Terraform Support for Cloud NGFW AWS
- Provision Cloud NGFW Resources to your AWS CFT
- Configure Automated Account Onboarding
- Usage Explorer
- Create a Support Case
- Cloud NGFW for AWS Certifications
- Cloud NGFW for AWS Privacy and Data Protection
-
-
- Prepare for Panorama Integration
- Link the Cloud NGFW to Palo Alto Networks Management
- Unlink the Cloud NGFW from Palo Alto Networks Management
- Associate a Linked Panorama to the Cloud NGFW Resource
- Use Panorama for Cloud NGFW Policy Management
- View Cloud NGFW Logs and Activity in Panorama
- View Cloud NGFW Logs in Strata Logging Service
- Tag Based Policies
- Configure Zone-based Policy Rules
- Enterprise Data Loss Prevention (E-DLP) Integration with Cloud NGFW for AWS
-
- Strata Cloud Manager Policy Management
Add a Certificate to Cloud NGFW for AWS
Learn how to add a certificate to the Cloud NGFW for AWS.
Cloud NGFW uses certificates to access an intelligent feed and to enable inbound and outbound
decryption. These certificates are stored in the AWS Secrets Manager.
There are three type of certificates used in a typical deployment.
- Intermediate CA Certificate (CA Certificate)—A Certificate Authority (CA) is a trusted organization that issues SSL certificates. These digital certificates are files used to link an entity to a public key. Web browsers use these certificates to authenticate content sent from web servers. Web browsers normally come with lists of CAs that they implicitly trust to identify hosts. The purpose of CA is to verify the authenticity of the website, domain, or organizations.
- Server Certificate—A certificate associated with a specific domain name.
If a website has a valid certificate, it means that a certificate authority has
taken steps to verify that the web address actually belongs to that
organization. When you type a URL your browser checks the certificate to make
sure that the website address matches the address on the certificate. It also
makes sure the certificate is signed by a trusted certificate authority.You may occasionally connect to a server with an untrusted certificate. Cloud NGFW for AWS will drop the connection as if the server terminated the connection.
- Root CA Certificate—A certificate authority can issue multiple certificates in the form of a tree structure. A root certificate is the top-most certificate of the tree.
When adding certificate to the AWS Secrets Manager for use with Cloud NGFW, the
following prerequisites must be met.
- Certificate added as a key/value pair, with two keys—private-key and public-key. For the private key, the value should be the actual key and, for the public-key, the value should be the actual certificate body.
- A tag with the key PaloAltoCloudNGFW and value of true.
- You must import the Root CA certificate and Intermediate CA certificate(s) to trust store of the client.
- If you are using end-entity certificates for decrypting traffic, only the end-entity certificates (both private and public keys) must be stored in the AWS Secrets Manager.
- PKCS8 private key format is supported. PKCS1 private key format is not supported.
Supported PKCS format:
-----BEGIN PRIVATE KEY----- -----END PRIVATE KEY-----
Unsupported PKCS1 format:
-----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY-----
Complete the following
procedure to add a certificate for use with Cloud NGFW for AWS.
- Add your certificate to the AWS Secrets Manager.
- Log in to the AWS console, navigate to the AWS Secrets Manager, and click Store a new secret.Select Other type of secret.Under Key/value pairs, create a key called private-key and another called public-key.Paste your entire private key and entire public key in the corresponding field.Click Next.Enter a descriptive Secret Name.Add a tag with the Key PaloAltoCloudNGFW and Value true.Click Next, Next again, and Store to finishing adding your certificate.Select Rulestacks and select a previously-created rulestack on which to configure a certificate.Select ObjectsCertificate ListAdd Certificate.Enter a descriptive Name for your certificate.(optional) Enter a description for your certificate.Select certificate.
- Enter the Certificate ARN if you want Cloud NGFW to download the certificate from AWS Secrets Manager.
- Check Self Signed Certificate if you want Cloud NGFW to create a self-signed certificate.
Click Save.