Palo Alto Configure Master Key with HA (Active/Passive)

Palo Alto Configure Master Key with HA (Active/Passive)

When you enter a private key or a password on a Palo Alto Networks firewall, it is encrypted with a master key. Out of the box, all Palo Alto firewalls use the same default master key, which used to be p1a2l3o4a5l6t7o8.

If your Palo Alto firewall uses the default master key and someone gets a copy of your firewall configuration, they may be able to decrypt the private keys and passwords stored in it. Fortunately, you can prevent this easily by configuring the master key to something unique.

In this post, I will show you step by step how to set your own master key on a Palo Alto Networks firewall in an Active/Passive High Availability Pair using the GUI and the CLI.

The Process

For more information on how to back up your Palo Alto firewall config, my blog post, Palo Alto Config Backup, goes into detail.

Disable HA Config Sync

We need to disable HA configuration synchronization on both firewalls while we configure the master key on each firewall.

Disable HA Config Sync GUI

Disable HA Config Sync CLI

If enabled is set to yes, we need to disable it.

Configure Master Key

With HA config sync disabled, we can safely set the master key on both firewalls. The master key must be exactly 16 characters.

Configure Master Key GUI

In this example, I will set the master key’s lifetime to 730 days and set the reminder to change the master key to 90 days.

As soon as you click OK, an automatic commit task should start.

Configure Master Key CLI

In my example, I want to use 90 days for the reminder (2160 hours) and 730 days for the lifetime (17520 hours).

In my example, my command will look like this request master-key reminder 2160 lifetime 17520 new-master-key paloalto12345678

Enable HA Config Sync

Once the master key is configured to the same master key on both firewalls, we can safely enable HA configuration synchronization.

Enable HA Config Sync GUI

Enable HA Config Sync CLI

If enabled is set to no, we need to enable it.

Closing

That’s all it takes to configure a master key to uniquely encrypt all the private keys and passwords in the Palo Alto firewall configuration.

If you want to read more about configuring a master key, here is the Palo Alto Networks documentation.

Exit mobile version