About the GlobalProtect Components


GlobalProtect provides a complete infrastructure for managing your mobile workforce to enable secure access for all your users, regardless of what endpoints they are using or where they are located. This infrastructure includes the following components:

GlobalProtect Portal

The GlobalProtect portal provides the management functions for your GlobalProtect infrastructure. Every endpoint that participates in the GlobalProtect network receives configuration information from the portal, including information about available gateways as well as any client certificates that may be required to connect to the GlobalProtect gateway. In addition, the portal controls the behavior and distribution of the GlobalProtect app software to both macOS and Windows endpoints. On mobile endpoints, the GlobalProtect app is distributed through the Apple App Store for iOS endpoints, Google Play for Android endpoints and Chromebooks, and the Microsoft Store for Windows 10 UWP endpoints. If you're using the Host Information Profile (HIP) feature, the portal also defines what information to collect from the host, including any custom information you require. You can Set Up Access to the GlobalProtect Portal on an interface on any Palo Alto Networks Next-Generation Firewall.

GlobalProtect Gateways

GlobalProtect gateways provide security enforcement for traffic from GlobalProtect apps. Additionally, if the HIP feature is enabled, the gateway generates a HIP report from the raw host data the apps submit and can use this information in policy enforcement. You can configure different Types of Gateways to provide security enforcement and virtual private network (VPN) access for your remote users, or to apply security policy for access to internal resources.

You can Configure a GlobalProtect Gateway on an interface on any Palo Alto Networks Next-Generation Firewall. You can run both a gateway and a portal on the same firewall, or you can have multiple distributed gateways throughout your enterprise.

GlobalProtect App

The GlobalProtect app software runs on endpoints and enables access to your network resources through the GlobalProtect portals and gateways that you have deployed.

The GlobalProtect app for Windows and macOS endpoints is deployed from the GlobalProtect portal. You can configure the behavior of the app—for example, which tabs the users can see—in the client configurations that you define on the portal. See Define the GlobalProtect Agent Configurations, Customize the GlobalProtect App, and Deploy the GlobalProtect App Software for details.

The GlobalProtect app for mobile endpoints (iOS, Android, and Windows UWP) is available through the official store for the endpoint—the Apple App Store for iOS, Google Play for Android, and the Microsoft Store for Windows UWP. You can alternatively deploy the GlobalProtect Mobile App Using Workspace ONE or other supported third-party mobile endpoint management systems.

See What OS Versions are Supported with GlobalProtect? for more details.

The following diagram illustrates how the GlobalProtect portals, gateways, and apps work together to enable secure access for all your users, regardless of what endpoints they are using or where they are located.

GlobalProtect Components Diagram

Diagram illustrating the interaction between GlobalProtect Portal, Gateways, and App on various endpoints.

GlobalProtect app features operate as intended only when the integrity of the endpoints and end users is intact. If malicious end users or malware compromise these elements, they may undermine the proper functioning of these features.

About GlobalProtect Licenses


If you want to use GlobalProtect to provide a secure remote access or VPN solution via single or multiple internal/external gateways, you don't need any GlobalProtect licenses. However, to use some of the more advanced features (such as HIP checks and associated content updates, support for the GlobalProtect mobile app , or IPv6 support ) you must purchase an annual GlobalProtect Gateway license . This license must be installed on each firewall running a gateway that:

For GlobalProtect Clientless VPN , you must also install a GlobalProtect gateway license on the firewall that hosts the Clientless VPN from the GlobalProtect portal. You also need the GlobalProtect Clientless VPN dynamic updates to use this feature.

Similarly, for any firewall or GlobalProtect gateway which is acting as HIP redistribution agent or client and collector requires a GlobalProtect Gateway license. The only exception is Panorama.

Feature Gateway License Required?
Single external gateway (Windows and macOS)
Single or multiple internal gateways
Multiple external gateways
Internet of things (IoT) devices
HIP Checks
Identification of managed devices using the endpoint serial number on gateways
HIP-based policy enforcement based on the endpoint status
App for endpoints running Windows and macOS
Mobile app for endpoints running iOS, Android, Chrome OS, and Windows 10 UWP
App for endpoints running Linux
App for endpoints running IoT
IPv6 for external gateways
IPv6 for internal gateways
(change to default behavior—starting with GlobalProtect app 4.1.3, a GlobalProtect subscription isn't required for this use case)
Clientless VPN
(Not supported on multi-VSYS firewalls if the traffic must traverse multiple virtual systems)
Split tunneling based on destination domain, client process, and video streaming application
Split DNS
Adding a compromised device to the quarantine list
GlobalProtect App Log Collection for Troubleshooting
(Panorama appliance running 9.0 or later and PAN-OS 8.1 or later)
Enforces GlobalProtect connections with FQDN exclusions
Redistribute HIP Reports
DHCP Based IP Address Assignment and Management for GlobalProtect

Table summarizing GlobalProtect features and whether a Gateway License is required.

See Activate Licenses for information on installing licenses on the firewall.

In order for GlobalProtect™ to run, you must set up the infrastructure that allows all components to communicate. At a basic level, this means setting up the interfaces and zones to which the GlobalProtect end users connect to access the portal and the gateways to the network. Because the GlobalProtect components communicate over secure channels, you must acquire and deploy the required SSL certificates to the various components. The following sections guide you through the GlobalProtect infrastructure setup:

Create Interfaces and Zones for GlobalProtect


You must configure the following interfaces and zones for your GlobalProtect infrastructure:

For tips on how to use a loopback interface to provide access to GlobalProtect on different ports and addresses, refer to Can GlobalProtect Portal Page be Configured to be Accessed on any Port?

For more information about portals and gateways, see About the GlobalProtect Components.

  1. Configure a Layer 3 interface for each portal and/or gateway you plan to deploy.

If the gateway and portal are on the same firewall, you can use a single interface for both.

As a best practice, use static IP addresses for the portal and gateway.

Don't attach an interface management profile that allows HTTP, HTTPS, Telnet, or SSH on the interface where you have configured a GlobalProtect portal or gateway because this enables access to your management interface from the internet. Follow the Adminstrative Access Best Practices to ensure that you're securing administrative access to your firewalls in a way that will prevent successful attacks.

    1. Select Network > Interfaces > Ethernet or Network > Interfaces > Loopback , and then select the interface you want to configure for GlobalProtect. In this example, we are configuring ethernet1/1 as the portal interface.
    2. ( Ethernet only ) Set the Interface Type to Layer3 .
    3. On the Config tab, select the Security Zone to which the portal or gateway interface belongs, as follows:
      • Place portals and external gateways in an untrust zone for access by hosts outside your network, such as l3-untrust .
      • Place internal gateways in an internal zone , such as l3-trust .
      • If you have not yet created the zone, add a New Zone . In the Zone dialog, define a Name for the new zone and then click OK .
    4. Select the default Virtual Router .
    5. Assign an IP address to the interface:
      • For an IPv4 address, select IPv4 and Add the IP address and network mask to assign to the interface, for example 203.0.11.100/24 .
      • For an IPv6 address, select IPv6 , Enable IPv6 on the interface , and Add the IP address and network mask to assign to the interface, for example 2001:1890:12f2:11::10.1.8.160/80 .
    6. Click OK to save the interface configuration.
  1. On the firewall(s) hosting GlobalProtect gateway(s), configure the logical tunnel interface that will terminate VPN tunnels established by the GlobalProtect apps.

IP addresses are not required on the tunnel interface unless you require dynamic routing. In addition, assigning an IP address to the tunnel interface can be useful for troubleshooting connectivity issues.

Be sure you enable User-ID in the zone where the VPN tunnels terminate.

    1. Select Network > Interfaces > Tunnel , and Add a tunnel interface.
    2. In the Interface Name field, enter a numeric suffix, such as .2 .
    3. On the Config tab, select the Security Zone for VPN tunnel termination, as follows:
      • To use your trust zone as the termination point for the tunnel, select the zone from the drop-down.
      • ( Recommended ) To create a separate zone for VPN tunnel termination, add a New Zone . In the Zone dialog, define a Name for new zone (for example, corp-vpn ), Enable User Identification , and then click OK .
    4. Set the Virtual Router to None .
    5. Assign an IP address to the interface:
      • For an IPv4 address, select IPv4 and Add the IP address and network mask to assign to the interface, for example 203.0.11.100/24 .
      • For an IPv6 address, select IPv6 , Enable IPv6 on the interface , and Add the IP address and network mask to assign to the interface, for example 2001:1890:12f2:11::10.1.8.160/80 .
    6. Click OK to save the interface configuration.
  1. If you created a separate zone for tunnel termination of VPN connections, create a security policy to enable traffic flow between the VPN zone and your trust zone.

For example, the following policy rule enables traffic between the corp-vpn zone and the l3-trust zone.

Security Policy Example

Example Security Policy allowing traffic between the VPN zone (corp-vpn) and the trusted zone (l3-trust).

  1. Commit the configuration.

Enable SSL Between GlobalProtect Components: About Deployment


All interaction between the GlobalProtect components occurs over an SSL/TLS connection. Therefore, you must generate and install the required certificates before configuring each component so that you can reference the appropriate certificate in the configurations. The following sections describe the supported methods of certificate deployment, descriptions and best practice guidelines for the various GlobalProtect certificates, and provide instructions for generating and deploying the required certificates:

There are three basic approaches to Deploy Server Certificates to the GlobalProtect Components:

Certificate Deployment Options Flow

graph LR
    A[Certificate Deployment Options] --> B(Recommended: Third-Party + Self-Signed);
    A --> C(Enterprise CA);
    A --> D(Self-Signed);
    B --> B1(Third-Party Cert for Portal);
    B --> B2(Self-Signed Certs for Gateways);
    C --> C1(Internal CA issues Certs);
    C1 --> C2(Deploy CA Root to Endpoints);
    D --> D1(Generate CA Root on Firewall/Portal);
    D1 --> D2(Issue Certs for Portal/Gateways);
    D2 --> D3(Manually Deploy CA Root to Endpoints);
             

Flowchart illustrating the three main approaches for deploying GlobalProtect certificates.

Enable SSL Between GlobalProtect Components: Best Practices


The GlobalProtect components must have valid certificates to establish connection using SSL/TLS. The connection fails if you have invalid or expired certificates.

The following table summarizes the SSL/TLS certificates you will need, depending on which features you plan to use:

Certificate Usage Issuing Process and Best Practices
CA certificate Used to sign certificates issued to the GlobalProtect components. If you plan on using self-signed certificates, generate a CA certificate using your dedicated CA server or Palo Alto Networks firewall, and then issue GlobalProtect portal and gateway certificates signed by the CA or an intermediate CA.
Portal server certificate Enables GlobalProtect apps to establish an HTTPS connection with the portal.
  • This certificate is identified in an SSL/TLS Service Profile. You assign the portal server certificate by selecting its associated service profile in a portal configuration.
  • Use a certificate from a well-known, third-party CA. This is the most secure option and ensures that the user endpoints can establish a trust relationship with the portal and without requiring you to deploy the root CA certificate.
  • If you don't use a well-known, public CA, you should export the root CA certificate used to generate the portal server certificate to all endpoints that run the GlobalProtect app. Exporting this certificate prevents the end users from seeing certificate warnings during the initial portal login.
  • The Common Name (CN) and Subject Alternative Name (SAN) fields of the certificate must match the IP address or FQDN of the interface that hosts the portal.
  • In general, a portal must have its own server certificate. However, if you're deploying a single gateway and portal on the same interface, you must use the same certificate for both the gateway and the portal.
  • If you configure a gateway and portal on the same interface, we recommend that you use the same certificate profile and SSL/TLS Service Profile for both the gateway and portal. If they don't use the same certificate profile and SSL/TLS Service Profile, the gateway configuration takes precedence over the portal configuration during the SSL handshake.
Gateway server certificate Enables GlobalProtect apps to establish an HTTPS connection with the gateway.
  • This certificate is identified in an SSL/TLS Service Profile. You assign the gateway server certificate by selecting its associated service profile in a gateway configuration.
  • Generate a CA certificate on the firewall or CA server and use that CA certificate to generate all gateway certificates.
  • The CN and the SAN fields of the certificate must match the FQDN or IP address of the interface where you plan to configure the gateway.
  • The portal can distribute the gateway root CA certificate to the GlobalProtect app based on the configuration (Trusted Root CA list in the Portal configuration Agent tab). However, it's not mandatory for the gateway root CA certificate to be preinstalled in the user's trusted certificate store or for the gateway certificate to be issued by a public CA.
  • In general, each gateway must have its own server certificate. However, if you're deploying a single gateway and portal on the same interface for basic VPN access, you must use a single server certificate for both components. As a best practice, use a certificate signed by a public CA.
  • If you configure a gateway and portal on the same interface, we recommend that you use the same certificate profile and SSL/TLS Service Profile for both the gateway and portal. If they don't use the same certificate profile and SSL/TLS Service Profile, the gateway configuration takes precedence over the portal configuration during the SSL handshake.
( Optional ) Client certificate Used to enable mutual authentication when establishing an HTTPS session between the GlobalProtect apps and the gateways and portal. This ensures that only endpoints with valid client certificates are able to authenticate and connect to the network.
  • For simplified deployment of client certificates, configure the portal to deploy the client certificate to the apps upon successful login using either of the following methods:
    • Use a single client certificate across all GlobalProtect apps that receive the same configuration. Assign the Local client certificate by uploading the certificate to the portal, and then selecting it in a portal agent configuration.
    • Use simple certificate enrollment protocol (SCEP) to enable the GlobalProtect portal to deploy unique client certificates to your GlobalProtect apps. Enable this by configuring a SCEP profile, and then selecting that profile in a portal agent configuration.
  • Use one of the following digest algorithms when you generate client certificates for GlobalProtect endpoints: sha1, sha256, sha384, or sha512 .
  • You can use other mechanisms to deploy unique client certificates to each endpoint when authenticating the end user.
  • Consider testing your configuration without the client certificate first, and then add the client certificate after you're sure that all other configuration settings are correct.
( Optional ) Machine certificates A machine certificate is a client certificate that is issued to an endpoint that resides in the local machine store or system keychain. Each machine certificate identifies the endpoint in the subject field (for example, CN=laptop1.example.com ) instead of the user. The certificate ensures that only trusted endpoints can connect to gateways or the portal. Machine certificates are required for users configured with the pre-logon connect method .
  • Use one of the following digest algorithms when you generate client certificates for GlobalProtect endpoints: sha1, sha256, sha384, or sha512 .
  • If you plan on using the pre-logon feature, use your own PKI infrastructure to deploy machine certificates to each endpoint prior to enabling GlobalProtect access. This approach is important for ensuring security.

For more information, see Remote Access VPN with Pre-Logon.

Table outlining various GlobalProtect certificates, their usage, and best practices.

For details about the types of keys for secure communication between the GlobalProtect endpoint and the portals and gateways, see Reference: GlobalProtect App Cryptographic Functions.

Enable SSL Between GlobalProtect Components: Deploy Server Certificates


The GlobalProtect components must have valid certificates to establish connection using SSL/TLS. The connection fails if you have invalid or expired certificates.

The following are the best practice steps for deploying SSL/TLS certificates to the GlobalProtect components:

Import a Server Certificate from a Well-known, Third-party CA

Use a server certificate from a well-known, third-party CA for the GlobalProtect portal. This practice ensures that the end users are able to establish an HTTPS connection without seeing warnings about untrusted certificates.

The CN and, if applicable, the SAN fields of the certificate must match the FQDN or IP address of the interface where you plan to configure the portal or the device check-in interface on a third-party mobile endpoint management system. Wildcard matches are supported.

Before you import a certificate, make sure the certificate and key files are accessible from your management system and that you have the passphrase to decrypt the private key.

  1. Select Device > Certificate Management > Certificates > Device Certificates and Import a new certificate.
  2. Use the Local certificate type (default).
  3. Enter a Certificate Name .
  4. Enter the path and name to the Certificate File received from the CA, or Browse to find the file.
  5. Set the File Format to Encrypted Private Key and Certificate (PKCS12) .
  6. Enter the path and name to the PKCS#12 file in the Key File field or Browse to find it.
  7. Enter and reenter the Passphrase that was used to encrypt the private key.
  8. Click OK to import the certificate and key.

Create Root CA Certificate for Issuing Self-signed Certificates for GlobalProtect Components

Create the root CA certificate on the portal and use it to issue server certificates for the gateways and, optionally, for clients.

Before deploying self-signed certificates, you must create the root CA certificate that signs the certificates for the GlobalProtect components:

  1. Select Device > Certificate Management > Certificates > Device Certificates and Generate a new certificate.
  2. Use the Local certificate type (default).
  3. Enter a Certificate Name , such as GlobalProtect_CA . The certificate name can't contain spaces.
  4. Don't select a value in the Signed By field. Without a selection for Signed By , the certificate is self-signed.
  5. Enable the Certificate Authority option.
  6. Click OK to generate the certificate.

Use Root CA on the Portal to Generate a Self-signed Server Certificate

Generate server certificates for each gateway you plan to deploy and optionally for the management interface of the third-party mobile endpoint management system (if this interface is where the gateways retrieve HIP reports).

In the gateway server certificates, the values in the CN and SAN fields must be identical. If the values differ, the GlobalProtect agent detects the mismatch and does not trust the certificate. Self-signed certificates contain a SAN field only if you add a Host Name attribute.

Alternatively, you can use the Simple Certificate Enrollment Protocol (SCEP) to request a server certificate from your enterprise CA.

  1. Select Device > Certificate Management > Certificates > Device Certificates and Generate a new certificate.
  2. Use the Local certificate type (default).
  3. Enter a Certificate Name . This name can't contain spaces.
  4. In the Common Name field, enter the FQDN ( recommended ) or IP address of the interface where you plan to configure the gateway.
  5. In the Signed By field, select the GlobalProtect_CA you created.
  6. In the Certificate Attributes area, Add and define the attributes that uniquely identify the gateway. Keep in mind that if you add a Host Name attribute (which populates the SAN field of the certificate), it must be the same as the value you defined for the Common Name .
  7. Configure cryptographic settings for the server certificate, including the encryption Algorithm , key length ( Number of Bits ), Digest algorithm, and Expiration (days).
  8. Click OK to generate the certificate.

Use Simple Certificate Enrollment Protocol (SCEP) to Request a Server Certificate from Your Enterprise CA

Configure separate SCEP profiles for each portal and gateway you plan to deploy. Then use the specific SCEP profile to generate the server certificate for each GlobalProtect component.

In portal and gateway server certificates, the value of the CN field must include the FQDN ( recommended ) or IP address of the interface where you plan to configure the portal or gateway and must be identical to the SAN field.

To comply with the U.S. Federal Information Processing Standard (FIPS), you must also enable mutual SSL authentication between the SCEP server and the GlobalProtect portal. (FIPS-CC operation is indicated on the firewall login page and in its status bar.)

After you commit the configuration, the portal attempts to request a CA certificate using the settings in the SCEP profile. If successful, the firewall hosting the portal saves the CA certificate and displays it in the list of Device Certificates .

  1. Configure a SCEP Profile for each GlobalProtect portal or gateway:
    1. Enter a Name that identifies the SCEP profile and the component to which you deploy the server certificate. If this profile is for a firewall with multiple virtual systems capability, select a virtual system or Shared as the Location where the profile is available.
    2. ( Optional ) Configure a SCEP Challenge , which is a response mechanism between the PKI and portal for each certificate request. Use either a Fixed challenge password that you obtain from the SCEP server or a Dynamic password where the portal-client submits a username and OTP of your choice to the SCEP Server. For a Dynamic SCEP challenge, this can be the credentials of the PKI administrator.
    3. Configure the Server URL that the portal uses to reach the SCEP server in the PKI (for example, http://10.200.101.1/certsrv/mscep/ ).
    4. Enter a string (up to 255 characters in length) in the CA-IDENT Name field to identify the SCEP server.
    5. Enter the Subject name to use in the certificates generated by the SCEP server. The subject must include a common name (CN) key in the format CN=<value> where <value> is the FQDN or IP address of the portal or gateway.
    6. Select the Subject Alternative Name Type . To enter the email name in a certificate’s subject or Subject Alternative Name extension, select RFC 822 Name . You can also enter the DNS Name to use to evaluate certificates, or the Uniform Resource Identifier to identify the resource from which the client will obtain the certificate.
    7. Configure additional cryptographic settings, including the key length ( Number of Bits ), and the Digest algorithm for the certificate signing request.
    8. Configure the permitted uses of the certificate, either for signing ( Use as digital signature ) or encryption ( Use for key encipherment ).
    9. To ensure that the portal is connecting to the correct SCEP server, enter the CA Certificate Fingerprint . Obtain this fingerprint from the SCEP server interface in the Thumbprint field.
    10. Enable mutual SSL authentication between the SCEP server and the GlobalProtect portal.
    11. Click OK and then Commit the configuration.
  2. Select Device > Certificate Management > Certificates > Device Certificates and then click Generate .
  3. Enter a Certificate Name . This name can't contain spaces.
  4. Select the SCEP Profile to use to automate the process of issuing a server certificate that is signed by the enterprise CA to a portal or gateway, and then click OK to generate the certificate. The GlobalProtect portal uses the settings in the SCEP profile to submit a CSR to your enterprise PKI.

Assign Server Certificate You Imported or Generated to a SSL/TLS Service Profile

Where Can I Use This? What Do I Need?
GlobalProtect™ Subscription For TLSv1.3 :
  • PAN-OS 11.1 (or a later PAN-OS version).
  • GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.1, or later GlobalProtect app versions.
  • GlobalProtect endpoints running a minimum of Windows 11, macOS, Android, iOS, or Linux (Ubuntu 20) version. Supported browsers are Chrome, Firefox, or Safari.
  • TLSv1.3 isn't supported in FIPS-CC mode.

Table summarizing requirements for using TLSv1.3 with GlobalProtect.

GlobalProtect supports SSL/TLS service profiles with a maximum TLS version as TLSv1.3. You can create SSL/TLS service profiles on the firewall that is hosting the portal or gateway by specifying the range of supported SSL/TLS versions (from minimum supported version to maximum supported version) for communication between GlobalProtect components.

Configure SSL/TLS service profiles with TLSv1.3 to provide enhanced security and faster TLS handshake while establishing connection between GlobalProtect components. TLSv1.3 is the maximum version supported and, when used, delivers increased security by removing the weak ciphers supported in the earlier TLS versions and adding more secure cipher suites.

  1. To enable SSL connection between GlobalProtect components, you need to generate or import a certificate.
  2. On the firewall that is hosting the GlobalProtect portal and gateway, select Device > Certificate Management > SSL/TLS Service Profile and Add a new SSL/TLS service profile.
  3. Specify a Name for the new profile.
  4. Select the Certificate you imported.
  5. In Protocol Settings, define the range of SSL/TLS versions ( Min Version to Max Version ) for communication between GlobalProtect components. The maximum supported TLS version is TLSv1.3.

To provide the strongest security, set both the Min Version and the Max Version as TLSv1.3.

The Encryption Algorithms and Authentication Algorithms are populated automatically from the available ciphers based on your TLS protocol settings.

The TLSv1.3 aes-chacha20-poly1305 cipher isn't enabled by default on devices running Windows 11. You must manually enable the cipher on GlobalProtect endpoints running Windows 11.

  1. Optional Modify the ciphers in the Encryption Algorithms and Authentication Algorithms section as needed.
SSL/TLS Service Profile Configuration

Screenshot showing the configuration options for an SSL/TLS Service Profile.

  1. Click OK and Commit your changes.

Deploy the Self-Signed Server Certificates

  1. Export the certificate from the portal:
    1. Select Device > Certificate Management > Certificates > Device Certificates .
    2. Select the gateway certificate you want to deploy, and then click Export Certificate .
    3. Set the File Format to Encrypted Private Key and Certificate (PKCS12) .
    4. Enter and confirm a Passphrase to encrypt the private key.
    5. Click OK to download the PKCS12 file to a location of your choice.
  2. Import the certificate on the gateway:
    1. Select Device > Certificate Management > Certificates > Device Certificates and Import the certificate.
    2. Enter a Certificate Name .
    3. Browse to find and select the Certificate File you downloaded in the previous step.
    4. Set the File Format to Encrypted Private Key and Certificate (PKCS12) .
    5. Enter and confirm the Passphrase you used to encrypt the private key when you exported it from the portal.
    6. Click OK to import the certificate and key.
    7. Commit the changes for the gateway.

Enable SSL Between GlobalProtect Components: Replace Expired Certificates


If your GlobalProtect portal or gateway certificate has expired or is about to expire, you have several options to replace it.

For Prisma Access deployments, the portal and gateway certificates and their renewals are managed automatically as part of the infrastructure, so you don't have to do anything to replace an expired certificate.

If you're using third-party certificates for your portal or gateway, you will need to manage and renew your certificates when they expire.

If the firewall is the certificate authority (CA) that issued the certificate for your portal and gateways, the firewall replaces the expired certificate with a new certificate that has the same attributes as the old certificate but with a different serial number. From the web interface that is hosting the portal or gateway, Renew the Certificate, and commit the changes to push the certificate to the portal or the gateway.

For on-premises deployments that use third party CA-issued SSL certificates, you must import the renewed certificate that you downloaded from your CA using the following procedure:

  1. Note the name and expiration date of the portal or gateway certificate.
    1. From the firewall that is hosting the gateway or portal with the expiring certificate, log on to the web interface.
    2. Select Device > Certificate Management > Certificates .
    3. Locate the certificate in the Device Certificates tab and note the name of the certificate and expiration date.
Locating Certificate in WebUI

Screenshot showing how to locate Device Certificates in the Palo Alto Networks firewall WebUI.

  1. Download the renewed certificate from your third-party CA. As an example, the following steps show how to download the renewed certificate from GoDaddy:
    1. Log in to the godaddy.com portal.
    2. Go to the Certificates tab.
    3. Select the certificate and click Download .
Downloading Certificate from GoDaddy

Screenshot showing the option to download a certificate from the GoDaddy portal.

    1. In the Download Certificate window, for Server type , select Other and download the certificate in .crt format.

The certificate is saved to your downloads folder.

  1. Import the downloaded certificate on the firewall that is hosting your portal or gateway.

If you deployed two firewalls in an HA pair in an active/passive deployment, you must import the certificate on each firewall.

    1. From the web interface, go to Device > Certificate Management > Certificates > Device Certificates > Import .
    2. Enter the exact Certificate Name for the portal or gateway certificate that you're replacing.
    3. For the Certificate File , browse to and select the certificate that you downloaded from the CA.
    4. For the File Format , select Base64 Encoded Certificate (PEM) .
Importing Certificate into Firewall

Screenshot showing the options for importing a Device Certificate into the Palo Alto Networks firewall WebUI.

    1. Click OK .

After the certificate has been imported, you will see the new expiration date for the certificate.

    1. Commit your changes to push the certificate to the portal or gateway.

Interactive Quiz


Test your knowledge on GlobalProtect components and certificate management.

1. Which GlobalProtect component provides management functions and distributes client software for Windows/macOS?
Correct Answer: c
The GlobalProtect Portal is responsible for management, configuration distribution, and deploying the app software to Windows and macOS endpoints. Relevance: PCNSE/PCNSA, Important Concept
2. Which GlobalProtect component provides security enforcement for traffic and can generate HIP reports?
Correct Answer: b
GlobalProtect Gateways enforce security policies on traffic from endpoints and process HIP reports. Relevance: PCNSE/PCNSA, Important Concept
3. Which of the following features requires a GlobalProtect Gateway license?
Correct Answer: c
HIP checks are listed as an advanced feature requiring a GlobalProtect Gateway license. Basic external/internal/multiple gateway access for Windows/macOS typically do not. Relevance: PCNSE/PCNSA, Licensing Detail
4. Which interface type is required for a GlobalProtect portal?
Correct Answer: c
GlobalProtect portals and gateways require a Layer 3 or loopback interface to receive connections from endpoints. Relevance: PCNSE/PCNSA, Configuration Detail
5. Where should an external GlobalProtect gateway interface be placed?
Correct Answer: b
External gateways must be accessible from outside the network, so they should be placed in an untrust zone like a DMZ. Relevance: PCNSE/PCNSA, Configuration Detail
6. What is the recommended best practice for assigning IP addresses to GlobalProtect portal and gateway interfaces?
Correct Answer: b
Using static IP addresses for portals and gateways is recommended as a best practice for stability and predictability. Relevance: Important, Configuration Detail
7. What type of interface is required on a firewall hosting an external GlobalProtect gateway to terminate VPN tunnels?
Correct Answer: c
Logical tunnel interfaces are used to terminate VPN tunnels established by the GlobalProtect apps when connecting to a gateway. Relevance: PCNSE/PCNSA, Configuration Detail
8. Why is it important to enable User-ID in the zone where GlobalProtect VPN tunnels terminate?
Correct Answer: b
Enabling User-ID allows the firewall to identify users connected via the VPN, enabling the application of user-based security policies. Relevance: Important, Configuration Detail
9. What is the primary reason for using SSL/TLS connections between GlobalProtect components?
Correct Answer: b
All interaction between GlobalProtect components occurs over SSL/TLS for secure communication. Relevance: Important Concept
10. Which certificate type is MOST recommended for the GlobalProtect portal server certificate?
Correct Answer: c
Using a certificate from a well-known third-party CA is recommended for the portal because it is accessed by endpoints before configuration is received, ensuring the certificate is trusted by default browsers/OSes. Relevance: PCNSE/PCNSA, Important Best Practice
11. If you use a self-signed certificate for the GlobalProtect portal, what extra step is typically required to prevent certificate warnings on end-users' browsers/apps?
Correct Answer: c
Browsers and operating systems do not inherently trust self-signed certificates. To avoid warnings, the self-signed root CA certificate must be distributed to the trusted certificate store on the endpoints. Relevance: Important, Gotcha
12. For a GlobalProtect gateway server certificate, what fields must typically match the FQDN or IP address of the interface?
Correct Answer: c
The CN and SAN fields in a server certificate must match the name or IP address the client is using to connect to the server (gateway or portal). Relevance: PCNSE/PCNSA, Certificate Detail
13. What is the purpose of an optional client certificate in a GlobalProtect setup?
Correct Answer: c
Client certificates enable mutual authentication, where the server (gateway/portal) authenticates the client (endpoint) based on a trusted certificate. Relevance: Important Concept
14. Which protocol can be used to automatically deploy unique client certificates from an enterprise PKI via the GlobalProtect portal?
Correct Answer: c
Simple Certificate Enrollment Protocol (SCEP) allows the portal to act as an intermediary to request and deploy unique certificates to endpoints from an enterprise CA. Relevance: PCNSE/PCNSA, Configuration Detail
15. For which specific GlobalProtect connection method are machine certificates REQUIRED?
Correct Answer: c
Machine certificates are required for the pre-logon feature to identify and authenticate the endpoint itself before a user logs in. Relevance: PCNSE/PCNSA, Configuration Detail, Important
16. When using a self-signed CA on the firewall to issue server certificates, what option must be enabled for the self-signed root certificate?
Correct Answer: b
To function as a CA and sign other certificates, the "Certificate Authority" option must be enabled when generating the self-signed root certificate on the firewall. Relevance: Important, Configuration Detail
17. When generating a self-signed server certificate for a gateway using a self-signed CA, which field must contain the FQDN or IP and match the SAN field (if present)?
Correct Answer: d
The Common Name (CN) field contains the primary identifier for the certificate's subject, which should be the FQDN or IP address for a server certificate. The SAN should also match this for compatibility. Relevance: PCNSE/PCNSA, Certificate Detail
18. What is the maximum TLS version supported in GlobalProtect SSL/TLS Service Profiles?
Correct Answer: d
GlobalProtect supports TLSv1.3, which offers enhanced security and faster handshakes compared to earlier versions. Relevance: PCNSE/PCNSA, Configuration Detail, Important
19. If you configure an SSL/TLS Service Profile for GlobalProtect, which minimum and maximum versions should you set for the strongest security?
Correct Answer: c
Setting both minimum and maximum versions to TLSv1.3 ensures that only the strongest available protocol version is used, eliminating compatibility with weaker versions. Relevance: Important, Best Practice
20. When replacing an expired third-party portal or gateway certificate on an on-premises firewall, which file format is typically used for the certificate file downloaded from the CA and imported into the firewall?
Correct Answer: c
The procedure describes downloading the renewed certificate from the CA (like GoDaddy) in .crt format and importing it into the firewall using the "Base64 Encoded Certificate (PEM)" file format option. PKCS12 is used when exporting/importing *with* the private key. Relevance: Configuration Detail