Obtain a Certificate from an External CA
The advantage of obtaining a certificate from an external certificate authority (CA) is that the private key does not leave the firewall. To obtain a certificate from an external CA, generate a certificate signing request (CSR) and submit it to the CA. After the CA issues a certificate with the specified attributes, import it onto the firewall. The CA can be a well-known, public CA or an enterprise CA.
To use Online Certificate Status Protocol (OCSP) for verifying the revocation status of the certificate, Configure an OCSP Responder before generating the CSR.
Obtain a Certificate from an External CA
Request the certificate from an external CA. Select Device > Certificate Management > Certificates > Device Certificates. If the firewall has more than one virtual system (vsys), select a Location (vsys or Shared) for the certificate. Click Generate. Enter a Certificate Name. The name is case-sensitive and can have up to 31 characters. It must be unique and use only letters, numbers, hyphens, and underscores. In the Common Name field, enter the FQDN (recommended) or IP address of the interface where you will configure the service that will use this certificate. If the firewall has more than one vsys and you want the certificate to be available to every vsys, select the Shared check box. In the Signed By field, select External Authority (CSR). If applicable, select an OCSP Responder. ( Optional ) Add the Certificate Attributes to uniquely identify the firewall and the service that will use the certificate. If you add a Host Name attribute, it is a best practice for it to match the Common Name (this is mandatory for GlobalProtect). The host name populates the Subject Alternative Name field of the certificate. Click Generate. The Device Certificates tab displays the CSR with a Status of pending.
Submit the CSR to the CA. Select the CSR and click Export to save the .csr file to a local computer. Upload the .csr file to the CA.
Import the certificate. After the CA sends a signed certificate in response to the CSR, return to the Device Certificates tab and click Import. Enter the Certificate Name used to generate the CSR. Enter the path and name of the PEM Certificate File that the CA sent, or Browse to it. Click OK. The Device Certificates tab displays the certificate with a Status of valid.
Configure the certificate. Click the certificate Name. Select the check boxes that correspond to the intended use of the certificate on the firewall. For example, if the firewall will use this certificate to secure forwarding of syslogs to an external syslog server, select the Certificate for Secure Syslog check box. Click OK and Commit.

Related Documentation