Palo Alto Networks Knowledgebase: How to Use a Wildcard SSL Cert with Subject Alternative Names for GlobalProtect Portal/Gateway.
How to Use a Wildcard SSL Cert with Subject Alternative Names for GlobalProtect Portal/Gateway.
Created On 02/08/19 00:01 AM - Last Updated 02/08/19 00:01 AM
GlobalProtect cloud service
This document describes how to use a wildcard (multi-domain) certificate with one common name and Subject Alternative Names (SAN) for other protected domains. The DNS names for GlobalProtect Portal and each GlobalProtect Gateway are assumed to be listed as SANs.
Create a CA root certificate.
Create a new certificate and have it signed by the above generated CA root certificate. This will be the wildcard certificate that will be used for the GlobalProtect Portal and Gateway. For example: Name: GP-Cert Common Name: *.example.com Subject Alternative Name: DNS Name=vpn1.example.com, DNS Name=vpn2.example.com
Associate the hostnames for the GlobalProtect Portal and Gateway IP addresses. For example: GlobalProtect Portal IP address: vpn2.example.com GlobalProtect Gateway IP address: vpn1.example.com Note: If GlobalProtect Portal and Gateway share the same IP address (i.e. Palo Alto Networks firewall interface is configured as both portal and gateway), a single hostname can be used for the shared IP address. For this example, the portal and gateway hostname would be: vpn2.example.com.
Import the certificates under the certificate cache of the GlobalProtect Portal firewall and each GlobalProtect Gateway firewalls (in a multi-gateway setup)
In PAN-OS 4.0 and 4.1, the certificates are located at Device > Certificates
In PAN-OS 5.0, the certificates are located at Device > Certificate Management > Certificates