Store Private Keys on an HSM
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
Store Private Keys on an HSM
For added security, you can use a hardware security module (HSM) to secure the private keys used
in SSL/TLS decryption for:
- SSL Forward Proxy—The HSM can store the private key of the Forward Trust certificate that signs certificates in SSL/TLS forward proxy operations. The firewall will then send the certificates that it generates during such operations to the HSM for signing before forwarding the certificates to the client.
- SSL Inbound Inspection—The HSM can store the private keys for the internal servers for which you are performing SSL/TLS inbound inspection.
If you use the DHE or ECDHE key exchange algorithms to enable perfect forward secrecy
(PFS) support for SSL decryption, you can use an HSM to store the private keys for
SSL Inbound Inspection. You can also use an HSM to store ECDSA keys used for SSL
Forward Proxy or SSL Inbound Inspection.
- (PAN-OS 11.1 and earlier) PAN-OS supports SSL Forward Proxy decryption with HSM for TLSv1.3 sessions. SSL Inbound Inspection occurs over TLSv1.2 even if both client and server support TLSv1.3.
- (PAN-OS 11.2) PAN-OS supports SSL Forward Proxy and SSL Inbound Inspection with HSMs for TLSv1.3 sessions. To turn on this support for SSL Inbound Inspection, use the set ssl inbound-inspection tls1.3-with-hsm enable yes CLI command.
- On the HSM, import or generate the certificate and private key used in your decryption deployment.For instructions on importing or generating a certificate and private key on the HSM, refer to your HSM documentation.(nCipher nShield Connect only) Synchronize the key data from the nCipher nShield remote file system to the firewall.Synchronization with the SafeNet Network HSM is automatic.
- Access the firewall web interface and select DeviceSetupHSM.Synchronize with Remote Filesystem (Hardware Security Operations settings).Import the certificate that corresponds to the HSM-stored key.
- Select DeviceCertificate ManagementCertificates, then Device Certificates. Select Import.Enter the Certificate Name.Browse to the Certificate File on the HSM.Select a File Format.Select Private Key resides on Hardware Security Module.Click OK and Commit your changes.(Forward Trust certificates only) Enable the certificate for use in SSL/TLS Forward Proxy.
- Open the certificate you imported in Step 3 for editing.Select Forward Trust Certificate.Click OK and Commit your changes.Verify that you successfully imported the certificate onto the firewall.Locate the certificate you imported in Step 3 and check the icon in the Key column:
- Lock icon—The private key for the certificate is on the HSM.
- Error icon—The private key is not on the HSM or the HSM is not properly authenticated or connected.