Palo Alto Configure Master Key with HA (Active/Passive)
When you enter a private key or a password on a Palo Alto Networks firewall, it is encrypted with a master key. Out of the box, all Palo Alto firewalls use the same default master key, which used to be p1a2l3o4a5l6t7o8.
If your Palo Alto firewall uses the default master key and someone gets a copy of your firewall configuration, they may be able to decrypt the private keys and passwords stored in it. Fortunately, you can prevent this easily by configuring the master key to something unique.
In this post, I will show you step by step how to set your own master key on a Palo Alto Networks firewall in an Active/Passive High Availability Pair using the GUI and the CLI.
The Process
- Backup your Palo Alto firewall config.
For more information on how to back up your Palo Alto firewall config, my blog post, Palo Alto Config Backup, goes into detail.
- Disable HA Config Sync via the GUI or CLI.
- Configure Master Key via the GUI or CLI.
- Enable HA Config Sync via the GUI or CLI.
Disable HA Config Sync
We need to disable HA configuration synchronization on both firewalls while we configure the master key on each firewall.
Disable HA Config Sync GUI
- On the Primary firewall, click on the Device tab.
- Click on High Availability.
- Click on the General tab.
- In the HA Pair Settings, click on the gear icon in the Setup box.
- Uncheck Enable Config Sync and click OK.
- Commit the change.
- Repeat the process on the Secondary firewall.
Disable HA Config Sync CLI
- SSH into the Primary firewall.
- Enter configuration mode with the command
configure
- Run the following command to check your current HA config sync settings
show deviceconfig high-availability group configuration-synchronization
If enabled is set to yes, we need to disable it.
…



























