How To Connect Palo Alto Next Generation Firewall VM To GNS 3
How To Connect Palo Alto Next Generation Firewall VM To GNS 3
How To Connect Palo Alto Next Generation Firewall VM To GNS 3
In this guide I will show how to connect VMware running Palo Alto Next Generation Firewall image to
GNS3 and configure some of the basic functions.
First things first, we need to install VMware Workstation(Virtual Box will not work with Palo Alto coz
we need to use VMXNET 3 drivers)
After successful instalation of VMware, we need to add some local host adapters. My configuration
will be based on the network topology shown below:
Now we can login into our device(default username and password admin/admin. But If it will not
work try to set some random values to ethernetx.VirtualDev this will force the VM to start in some
kind of same mode and then you can restore the default settings.
After successful login we need to set up our management interface.
Ip address 172.168.1.150
Default-gateway 172.168.1.2 (in my case this is ip address of Router 2 interface)
Dns server 8.8.8.8
After configuration we need to use command commit to save configuration.
Now we need to match MAC addresses used by PA interfaces with our VM adapters;
Ethernet1/1 = VMnet 1
Ethernet1/2 = VMnet 2
Ethernet1/3 = VMnet 3
We need to create 3 zones. Under Network chose Zones and then Add.
Next we need to configure Interface management profile. We can define what kind of services will
be allowed.
Under Network chose Network Profiles -> Interface Mgmt -> Add.
Once everything is up and running the Link State should have green colour.
Now we can go to configuration some static routes (to subnet 10.0.0.0 and internet)
Under Virtual router chose default Static Routes and Add
Next we need to select translation type and interface which is facing the internet.
In case of static NAT I cannot show the right way to do this, so mb someone else would explain it ;)
Now we can configure some security policies to allow or deny connections between two zones.
Under Policies chose Security and Add.
Now we need to name our security policy.
Select applications.
Now we can chose whether we want to allow or deny connections through selected applications
between zone INSIDE and OUTSIDE.
Sample of traffic logs (you need to have licensed version of PA to check logs)