Skip to main content
Version: 2.7.0 (Current)

PaloAlto Panorama

SecTrail CM enables automatic deployment and renewal of SSL certificates to all managed firewall devices by establishing agentless connections to the Palo Alto Panorama central management platform.

Connection Requirements​

RequirementDetailDescription
ProtocolXML API (HTTPS)Panorama's native XML API is used
Port443Standard HTTPS port or custom management port
AuthenticationUsername and PasswordAuthentication via Username and Password
User PermissionAdmin or Certificate Manager roleCertificate upload and configuration permission

Automated Operations​

SecTrail CM automatically performs the following operations on Palo Alto Panorama:

  1. Certificate and Key Upload: Secure transfer of SSL certificate and private key
  2. Certificate Import: Importing certificate and key to devices managed through Panorama
  3. SSL Profile Update: Updating SSL decryption profiles
  4. Configuration Commit: Committing and making configuration persistent

Configuration Steps​

1. Creating Panorama User​

Navigate to Automation > Device Users and create a user for Panorama.

2. Adding Panorama Device to SecTrail CM​

Click Automation > Devices > Add New Device button and enter the following information:

Panorama Device Creation

  • Name: Provide a descriptive name for the device
  • Device Users: Select the user created in Step 1
  • IP: Enter the Panorama management IP address
  • Device Type: Select Panorama from the dropdown menu
  • Deployment Type: Select deployment type
    • Append: Adds new certificate to existing decryption rule (existing certificates are preserved)
    • Replace: Replaces existing certificate with new one (old certificate is deleted)
  • Skip Commit: Should changes be committed? (Disabled/Enabled)
  • Skip Push: Should the certificate be pushed to the target device? (Disabled/Enabled)
Automatic Discovery and Monitoring

After the Panorama device is added to SecTrail CM, all certificates on devices managed by Panorama are automatically included in the discovery period and scanned regularly. Automatic alarms are created for certificates that are about to expire or have issues.

3. Viewing Device Information​

After the device is added, it will be displayed in the Automation > Devices list. Click on the row to view device details:

Panorama Device Details and Virtual Server List

  • Rule Name: Name of the rule defined on Panorama
  • Device Group: Device group the certificate belongs to
  • Template: Panorama template name the certificate is associated with
  • Template Stack: Template stack name the certificate belongs to
  • Rule Type: Type of the rule (e.g. decryption rule)
  • Cert Name: Name of the certificate defined on the device
  • Common Name: Common Name (CN) information of the certificate
  • Not After: Certificate expiration date
  • Deploy: For certificate deployment

Certificate Deployment​

Step 1: Virtual Server and Certificate Selection​

  1. Select your Panorama device from Automation > Devices
  2. In the device details, find the Virtual Server where you want to deploy the certificate
  3. Click the Deploy button on the relevant row
  4. In the Deploy Certificate window that opens:
    • Virtual Servers: Target Virtual Server information is displayed (Name/Destination/Subject format)
    • Certificate: Select the certificate you want to deploy from the dropdown menu

Certificate Deployment Screen

Step 2: Starting the Deployment Process​

Click the Deploy button to start the certificate deployment process.

Step 3: Process Tracking​

The deployment process can be tracked from Automation > Processes:

Panorama Deployment Operations

Operation Details​

The following steps are performed during deployment:

StepOperation Description
1Certificate is successfully updated
2Decryption rules are configured
3Configuration is committed
4Configuration is successfully completed
Commit

When Skip Commit is disabled, SecTrail CM commits the configuration changes after deployment and makes them persistent.

Rollback Operation​

The Manual Rollback feature can be used in case of issues after certificate deployment.

Automatic Rollback

If an error occurs at any step during the deployment process, the system automatically performs a rollback and all changes are reverted.

Rollback Steps​

  1. Navigate to Automation > Processes
  2. Find the operation you want to rollback
  3. Use the Manual-Rollback option in the Status column
  4. Confirm

Operations During Rollback​

StepOperation
1Newly uploaded certificate is deleted
2Previous configuration is restored
3Decryption rules are reverted to their previous state
4Rollback operation is successfully completed