How to disable SSL ciphers for SSL/TLS Service Profile from Panorama Template using CLI

How to disable SSL ciphers for SSL/TLS Service Profile from Panorama Template using CLI

3789
Created On 06/29/22 23:43 PM - Last Modified 08/22/24 03:12 AM


Objective


  • There are scenarios when SSL/TLS Profile has been configured in Panorama and not locally in Firewall
  • Modifying ciphers can only be accomplished using CLI
  • Since it is not possible to modify ciphers from SSL/TLS Profile to the local Firewall when Panorama Template has been pushed, then modification needs to be done using Panorama CLI and push modifications to Firewall


Environment


  • Panorama
  • All Palo Alto Networks Firewall
  • PANOS 9.0.x and higher versions


Procedure


NOTE
  • Santa-Clara-PVE = Template Name
  • management = ssl-tls-service profile name
  1. Access to configure mode in Panorama CLI
> configure
  1. Type the following command and press the tab key at the end to see the SSL ciphers options
# set template Santa-Clara-PVE config shared ssl-tls-service-profile management protocol-settings
+ auth-algo-sha1         Allow authentication SHA1
+ auth-algo-sha256       Allow authentication SHA256
+ auth-algo-sha384       Allow authentication SHA384
+ enc-algo-3des          Allow algorithm 3DES
+ enc-algo-aes-128-cbc   Allow algorithm AES-128-CBC
+ enc-algo-aes-128-gcm   Allow algorithm AES-128-GCM
+ enc-algo-aes-256-cbc   Allow algorithm AES-256-CBC
+ enc-algo-aes-256-gcm   Allow algorithm AES-256-GCM
+ enc-algo-rc4           Allow algorithm RC4
+ keyxchg-algo-dhe       Allow algorithm DHE
+ keyxchg-algo-ecdhe     Allow algorithm ECDHE
+ keyxchg-algo-rsa       Allow algorithm RSA
+ max-version            max-version 
+ min-version            min-version 
  <Enter>                Finish input
  1. Select the SSL cipher, and then select "no"
# set template Santa-Clara-PVE config shared ssl-tls-service-profile management protocol-settings keyxchg-algo-ecdhe no
  1. Commit changes
# commit
  1. Verify from Panorama
# show template Santa-Clara-PVE config shared ssl-tls-service-profile management protocol-settings
protocol-settings {
  min-version tls1-0;
  max-version max;
  keyxchg-algo-ecdhe no;
 }
[edit]                                                                                                                                                                                   
# 
  1. Push configuration using GUI 
  2. Verify from Firewall's CLI under configuration mode
> configure
# show template shared ssl-tls-service-profile <name of the SSL-TLS profile> protocol-setting
ex
# show template shared ssl-tls-service-profile management protocol-setting
protocol-settings {   
  min-version tls1-0;
  max-version max; 
  keyxchg-algo-ecdhe no; 
 } 
[edit]                                                                                                                                # 


 


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqH9CAK&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language