SSL/TLS Service Profile in Palo Alto Networks

The SSL/TLS Service Profile in Palo Alto Networks devices defines the certificate and SSL/TLS protocol settings used for securing various services. It ensures encrypted communication and plays a pivotal role in mutual authentication between devices.

Purpose and Usage

The SSL/TLS Service Profile is utilized in the following scenarios:

Reference: Configure an SSL/TLS Service Profile

Configuration Steps

To configure an SSL/TLS Service Profile:

  1. Navigate to Device > Certificate Management > SSL/TLS Service Profile .
  2. Click Add to create a new profile.
  3. Enter a descriptive Name for the profile.
  4. Select a valid Certificate (should be a server certificate, not a CA certificate).
  5. Define the Protocol Settings :
  6. Optionally, customize cipher suites as per security requirements.
  7. Click OK and commit the changes.

Reference: Configure an SSL/TLS Service Profile

Role in Mutual Authentication with Panorama

When establishing secure connections between Panorama and managed firewalls or log collectors, mutual SSL/TLS authentication is employed. This involves:

The SSL/TLS Service Profile defines the certificate and protocol settings used during this handshake.

Reference: How Are SSL/TLS Connections Mutually Authenticated?

Interaction with Certificate-Based Authentication

In scenarios where certificate-based authentication is required (e.g., GlobalProtect, admin access), the SSL/TLS Service Profile works in conjunction with Certificate Profiles:

Together, they ensure that both server and client certificates are appropriately validated during the SSL/TLS handshake.

Reference: Configure a Certificate Profile

Additional Use Cases

Beyond the primary uses, SSL/TLS Service Profiles are also applied in:

Reference: WildFire Appliance Mutual SSL Authentication

Best Practices