Lab Guide - Pan-Edu-210 10.2 Version A - Lab
Lab Guide - Pan-Edu-210 10.2 Version A - Lab
Lab Guide - Pan-Edu-210 10.2 Version A - Lab
PAN-OS® 10.2
www.paloaltonetworks.com/education
© 2022 Palo Alto Networks, Inc.
Palo Alto Networks
Firewall 10.2 Essentials:
Configuration and Management
Lab Guide
PAN-OS® 10.2
EDU-210
Courseware Version A
Palo Alto Networks, Inc.
https://www.paloaltonetworks.com
© 2017-2022, Palo Alto Networks, Inc.
Palo Alto Networks, PAN-OS, WildFire, RedLock, and Demisto are registered trademarks of
Palo Alto Networks, Inc. All other marks mentioned herein may be trademarks of their
respective companies.
Bolding Names of selectable items in Click Security to open the Security Rule
the web interface Page
Consolas font Text that you enter and Enter the following command:
coding examples a:\setup
The show arp all command yields this
output:
username@hostname> show arp
<output>
Calibri 11 pt. gray Lab step results and A new zone should appear in the web
font explanations interface.
Click Click the left mouse button Click Administrators under the Device
tab
Right-click Click the right mouse button Right-click the number of a rule you want
to copy, and select Clone Rule
< > (text enclosed Denotes a variable parameter. Click Add again and select <Internal
in angle brackets) Actual value to use is defined Interface>
in the Lab Guide document.
Lab Guidance
There are two sections for each lab in this guide:
• High-Level Lab Steps
• Detailed Lab Steps
The High-Level Lab Steps section provides only general guidance and information about how to
accomplish the lab objectives. This section is more challenging and is suited for students who
have a working knowledge of Palo Alto Networks firewalls. If you have never worked with a
Palo Alto Networks firewall, we strongly encourage you to use the Detailed Lab Steps section.
The instructions in the Detailed Lab Steps section provide guided, detailed steps and screenshots
to accomplish the lab objectives.
You do not need to complete both the High-Level Lab Guide and the Detailed Lab Guide for
each lab. Use either one or the other.
Lab Objectives
Connect to the firewall web interface
Load a starting lab configuration
Set DNS servers for the firewall
Set NTP servers for the firewall
Configure a login banner for the firewall
Set Latitude and Longitude for the firewall
Configure permitted IP addresses for firewall management
Click the Commit button at the upper right corner of the web interface:
The DNS server settings that you configure do not have to be public servers, but the
firewall needs to be able to resolve hostnames such as
updates.paloaltonetworks.com and wildfire.paloaltonetworks.com to provide
various services such as WildFire® or URL filtering.
Select the NTP tab.
Set the Primary NTP Server to 0.pool.ntp.org.
Set the Secondary NTP Server to 1.pool.ntp.org.
Leave the remaining settings unchanged and click OK to close the Services window.
Click the General Settings gear icon to open the General Settings window.
In the Domain field, enter panw.lab.
In the Login Banner area, enter Authorized Access Only.
In the Latitude field, enter 37.00.
In the Longitude field, enter 122.00.
These coordinates are for Santa Clara, California – headquarters of Palo Alto
Networks, Inc.
Leave the remaining settings unchanged and click OK to close the General Settings
window.
Verify that you have entered the correct address range in the Permitted IP
Addresses field. If you make a mistake and enter the wrong information, you can
lose network connectivity to your firewall.
The firewall will perform a software check with the Palo Alto Networks update servers:
When the process is complete, the firewall displays an updated list of available software
versions:
The list you see will vary from this example. Also, no newer versions of PAN-OS software may be
available at the time you carry out these steps.
Lab Objectives
Load a baseline configuration
Save a named configuration snapshot
Export a named configuration snapshot
Save ongoing configuration changes before a commit
Revert ongoing configuration changes
Preview configuration changes
Examine System and Configuration log files
Create a log file filter
Use the Filter Builder
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
Click Close in the confirmation window.
This process saves the configuration file to a location on the firewall itself.
In the Export Named Configuration window, use the drop-down list to locate the
firewall-a-<Today’s Date>.xml configuration file.
Click OK.
On the workstation desktop, open the Downloads folder:
In the upper right corner of the web interface, click the Changes button and select
Revert Changes:
Click Revert.
Click Close in the Message window:
In the Services window, notice that the Primary DNS Server has been reset to the
original value before you mistakenly changed it.
Click OK.
Click the Commit button.
In the Commit window, click Preview Changes:
In the Preview Changes window, leave the Lines of Context set to 10:
The Lines of Context setting determines how many lines are displayed before and
after a change in the configuration file.
Click OK.
A new browser window appears that displays a side-by-side comparison of the current
running configuration (on the left) and the proposed changes in the candidate
configuration (on the right):
Close the configuration comparison window by clicking the X in the upper right corner.
Click Cancel in the Commit window.
Hiding and displaying log columns is optional but quite useful. Each log file contains
different columns, some of which you may not need so you can hide them. There
may be columns in certain log tables that are not shown by default, and you can use
this process to display hidden columns that you want to view.
Drag and drop the Severity column to the left-most position in the table:
The web interface will automatically build a filter statement with the appropriate syntax
to search for all entries that contain informational in the Severity field:
Click the Apply Filter button in the upper right corner of the window:
Click the Apply Filter button in the upper right corner of the window:
Remove the filter by clicking the Clear Filter button in the upper right corner of the
window:
A good practice is to clear any filters from log file displays before you move to other
portions of the web interface. The next time you examine the same log, it will
display all results instead of only ones you have previously filtered.
Click the Add Filter button in the upper right corner of the window:
With the same window open, build the second part of the filter:
A. Under the Connector column, select and.
B. Under the Attribute column, select Time Generated.
C. Under Operator, select greater than or equal to.
D. Under the Value column, use the first drop-down list to select today.
E. Under the Value column, use the second drop-down list to select a time
approximately sixty minutes ago (round up or down if you need to).
F. Click Add.
The time and date for your filter will differ from the example shown here.
Click the Apply Filter button in the upper right corner of the window:
Although you used the System log as the basis for this exercise, the process of
creating filters is the same throughout all Palo Alto Networks firewall log databases.
The Filter Builder is available to use in all log tables.
Clear the filter by clicking the Clear Filter button in the upper right corner of the
window:
Lab Objectives
Load a baseline configuration
Create a local firewall administrator account
Configure an LDAP Server Profile
Configure a RADIUS Server Profile
Configure an LDAP Authentication Profile
Configure a RADIUS Authentication Profile
Configure an Authentication Sequence
Create non-local firewall administrator accounts
Use the information in the table below to create an LDAP Authentication Profile.
Name LDAP-Auth-Profile
Type LDAP
Server Profile LDAP-Server-Profile
Allow List (Advanced Tab) all
Use the information in the table below to create a new administrator account that will be
authenticated by LDAP
Name adminSally
Authentication Profile LDAP-Auth-Profile
Use the information in the table below to create an RADIUS Authentication Profile
Name RADIUS-Auth-Profile
Type RADIUS
Server Profile RADIUS-Server-Profile
Allow List (Advanced Tab) all
Use the information in the table below to create a new administrator account that will be
authenticated by RADIUS
Name adminHelga
Authentication Profile RADIUS-Auth-Profile
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
Click OK.
When you select Local-database for the Authentication Profile, there is no option to
enter a Password for the administrator. The password information for this account
is maintained in the Local-database on the firewall.
Click OK.
Log back into the firewall with adminBob as the Username and Pal0Alt0! as the
Password.
Close any Welcome windows that appear.
Select Monitor > System.
If you do not see an entry in the System log indicating a successful authentication
for adminBob, you can create and apply a filter with ( subtype eq auth ) as
the syntax.
Note that the entry in the firewall system log indicates that adminBob was successfully
authenticated against the Local-database.
Log out of the firewall.
Log back into the firewall with the admin/Pal0Alt0! credentials.
Click OK.
Create a new administrator by selecting Device > Administrators.
Click Add.
For Name, enter adminSally.
For Authentication Profile, use the drop-down list to select LDAP-Auth-Profile.
Leave the remaining settings unchanged.
Click OK.
If you do not see an entry in the System log indicating a successful authentication
for adminSally, you can use a filter ( subtype eq auth ) as the syntax.
Note that the entry in the firewall system log indicates that adminSally was
successfully authenticated against the LDAP-Auth-Profile.
Log out of the firewall.
Log back into the firewall with the admin/Pal0Alt0! credentials.
Note: Never use CHAP in a production environment because it is not secure. We are
using it in the lab for the sake of simplicity.
Click OK.
Create an administrator account for adminHelga (who has recently joined your team
from the acquired company) by selecting Device > Administrators.
Click Add.
For Name, enter adminHelga.
For Authentication Profile, select RADIUS-Auth-Profile.
Leave the remaining settings unchanged.
If you do not see an entry in the System log indicating a successful authentication
for adminHelga, you can use a filter ( subtype eq auth ) as the syntax.
Note that the entry in the firewall system log indicates that adminHelga was
successfully authenticated against the RADIUS-Auth-Profile.
Log out of the firewall.
Log back into the firewall with the admin/Pal0Alt0! credentials.
Note the Move Up and Move Down buttons. These allow you to change the order
of the Authentication Profiles if necessary. In this example, the firewall will use the
LDAP-Auth-Profile first when an administrator logs in to attempt authentication; if
the user account does not exist in LDAP (or if the LDAP server is unavailable), the
firewall will use the RADIUS-Auth-Profile to attempt authentication.
Click OK.
Name Allow-mgt
Enabled Administrative Management HTTPS
Services
SSH
Enabled Network Services Ping
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
Click OK.
Click OK.
When complete, your Ethernet table will have three entries:
Note that the Link State indicator icons will remain gray until you commit the configuration.
The order in which you add these interfaces to the list is not important. You could
start by adding ethernet1/3 and the result will be the same. You are simply adding
the appropriate interfaces to this virtual router.
In the Virtual Router window, click the link on the side for Static Routes.
This entry is the default route for the firewall. Like all other network hosts, the
firewall needs a default gateway in order to send traffic to unknown networks. The
firewall has local connections to 192.168.1.0, 192.168.50.0 and 203.0.113.0
networks, so it can forward packets to hosts on those networks directly. However,
Zone names are case-sensitive! Make sure you are consistent throughout your
configuration process.
Click OK.
In the Zones window, create the Extranet Zone by clicking Add.
At the bottom of the window, click the Add button.
For Name, enter Extranet.
For Type, select Layer3.
Under the Interfaces section, click Add.
Select ethernet1/3.
Click OK.
You should now have three security zones:
In the CLI connection to the firewall, use the ping command to check network
connectivity to a host in the Users_Net Security Zone by using the following command
at the admin@firewall-a> prompt:
Note the syntax for this command. 192.168.1.1 is the IP address of ethernet1/2 on
the firewall. The command instructs the firewall to use that IP address on
ethernet1/2 to ping the host 192.168.1.20. If you do not use the source option, the
firewall uses its management interface address as the source IP.
Allow the ping to continue for three or four seconds and then use Ctrl+C to interrupt the
command:
Allow the ping to continue for three or four seconds and then use Ctrl+C to interrupt the
command:
Allow the ping to continue for three or four seconds and then use Ctrl+C to interrupt the
command:
After you have successfully tested network access from the firewall to each network
segment, close the Remmina SSH connection to the firewall by typing exit <Enter>.
Close the Remmina desktop application window.
Attempt to open an SSH connection to the firewall through 192.168.1.1 by issuing the
following command:
C:\home\lab-user\Desktop\Lab-Files> ssh admin@192.168.1.1 <Enter>
After a few seconds, use Ctrl+C to stop the connection because it will not succeed.
Leave the Terminal window open on the client because you will perform these same
tests after applying an Interface Management Profile to ethernet1/2.
Click OK.
In the Interface Management section, click Add again to create another entry.
For Name, enter Allow-mgt.
Under the Administrative Management Services section, check the boxes for HTTPS
and SSH.
Under the section for Network Services, check Ping, SNMP and Response Pages.
Click OK.
Click OK.
Click OK.
Read the Warning message and click Yes.
If you are prompted to accept an RSA key fingerprint, type yes <ENTER>.
For password, enter Pal0Alt0! <Enter>.
The firewall will present the CLI interface.
Use the information below to create another Security Policy rule to block traffic from
known bad IP addresses provided by Palo Alto Networks. Place this rule at the top of the
Security Policy, just below the Block-to-Known-Bad-Addresses rule.
Rule Name Block-from-Known-Bad-Addresses
Description Blocks traffic from known bad IP addresses
to Users and Extranet
Source Zone Internet
Source Address • Palo Alto Networks – Bulletproof IP
addresses
• Palo Alto Networks – High risk IP
addresses
• Palo Alto Networks – Known malicious
IP addresses
Destination Zone Users_Net
Extranet
Application Any
Service application-default
URL Category Any
Action Deny
Can you explain why your ping session from the client to the Internet host did not get a
reply even though the firewall is allowing the traffic?
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Later in this course, we will cover Applications and how to use them in Security
Policy rules.
When you create a new Security Policy rule, the Action is automatically set to
Allow. If you are creating a rule to block traffic, make sure you select the Actions
tab and change the Action before you commit the rule.
The rule appears above the two preconfigured entries intrazone-default and
interzone-default. These two rules always appear at the bottom of the ruleset.
Choose Columns and note the available columns that you can hide or display in this
table.
Note: These changes are optional. You do not have to show or hide columns or
rearrange items in any of the firewall tables. However, you may find that there are
certain columns in certain tables that you never use, and you can hide them to
provide more room in the table. You may also find that there are certain columns
that you scan frequently, and you can move those to locations that are easier to
see. You can use these same steps to show, hide or move columns in all firewall
tables.
This action will resize the displayed columns to best fit in the browser window.
If you see a reply from 192.168.50.80, then your Security Policy rule is configured
correctly! If not, review the previous steps and try this test again.
Return to the firewall web interface and update the Security Policy rules table by
clicking the Refresh button in the upper right corner of the window.
From the terminal window on the desktop, ping an address on the internet by issuing the
following command:
C:\home\lab-user\Desktop\Lab-Files> ping 8.8.8.8<Enter>
You will not get a reply, so after several seconds, use Ctrl+C to stop the ping.
Examine the traffic log again and use a simple filter to see if there are any entries for this
session that failed.
Select Monitor >Logs > Traffic.
In the filter field, enter the following text exactly as it appears here:
( addr.dst eq 8.8.8.8 )
Filters are case sensitive so be precise! Also, note that there is a space after the first
parentheses mark and right before the last parentheses mark.
The Traffic log will update the display but there are no matching entries.
Click OK.
You will not get a reply, so after several seconds, use Ctrl+C to stop the ping.
Click the Apply Filter button in the upper right corner of the window (or you can press
the Enter key).
The Traffic log will update the display and you should see entries matching the filter.
You can see that the sessions are hitting the interzone-default rule.
Click the X icon to clear the filter from the log filter text box.
Note that you are adding both internal zones to the Source Zone section of the rule.
When creating deny rules, Palo Alto Networks recommends setting the Service to
any instead of using application-default.
Note that you are adding both internal zones to the Destination Zone section of the
rule.
You will not get a reply, so after several seconds, use Ctrl+C to stop the ping.
Click the Apply filter button in the upper right corner of the window (or you can press
the Enter key).
The Traffic log will update the display and you should see entries matching the filter.
You can see that the sessions are hitting the Users_to_Internet rule.
Lab Objectives
Configure source NAT
Configure destination NAT
Parameter Value
Source Zone Users_Net
Destination Zone Users_Net
Destination Interface ethernet1/2
Service any
Destination Address 192.168.1.80
Translated Packet tab (Destination Address Translation section)
Parameter Value
Destination Address Static IP
Translation
Translation Type
Translated Address 192.168.50.80
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Parameter Value
Name Inside_Nets_to_Internet
NAT Type Verify that ipv4 is selected
Description Translates traffic from Users_Net and
Extranet to 203.0.113.20 outbound to
Internet
Parameter Value
Source Zone Click Add and select the Users_Net zone
Click Add and select the Extranet zone
Destination Zone Select Internet from the drop-down list
Destination Interface Select ethernet1/1 from the drop-down list
Service Verify that the any is selected
Source Address Verify that the Any check box is selected
Destination Address Verify that the Any check box is selected
This section defines what the packet will look like when it reaches the firewall. Note
that we are using a single NAT rule to translate both source zones to the same
interface on the firewall. You could accomplish this same task by creating two
separate rules – one for each source zone – and using the same external firewall
interface.
Click the Translated Packet tab and configure the following under the section for
Source Address Translation:
Parameter Value
Translation Type Select Dynamic IP And Port from the drop-down list
Address Type Select Interface Address from the drop-down list
This section defines how the firewall will translate the packet.
Note: You are configuring only the Source Address Translation part of this window.
Leave the destination address translation Translation Type set to None.
Verify that there is allowed traffic that matches the Security Policy rule
Users_to_Internet:
Parameter Value
Name Type Dest_NAT_To_Webserver
Description Translates traffic to web server at
192.168.50.80
NAT Type Verify that ipv4 is selected
Parameter Value
Source Zone Click Add and select Users_Net
Destination Zone Select Users_Net from the drop-down list
Destination Interface Select ethernet1/2 from the drop-down list
Service Select any from the drop-down list
Destination Address Click Add and manually enter 192.168.1.80
Parameter Value
Destination Address Select Static IP from the drop-down list
Translation
Translation Type
Translated Address Type 192.168.50.80 (address of the Extranet web
server)
This process opens the Traffic log and applies a filter automatically to display only
those entries that match the Security Policy rule “Users_to_Extranet.”
Click the X icon to clear the filter from the log filter text box.
Lab Objectives
Load a baseline configuration
Generate application traffic
Configure an application group
Configure a Security Policy to allow update traffic
Test the Allow-PANW-Apps Security Policy rule
Identify shadowed rules
Modify the Security Policy to function properly
Test the modified Security Policy rule
What risk level has Palo Alto Networks assigned to the application?
What are some of the characteristics of this application that might make you want
to block its use on your network?
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
Parameter Value
Name paloalto-apps
Applications paloalto-dns-security
paloalto-updates
paloalto-userid-agent
paloalto-wildfire-cloud
pan-db-cloud
Note that we are only adding a few of the Palo Alto Networks entries to this group
as an example of how to create an Application Group. The list you are building here
is not necessarily inclusive of all Palo Alto Networks applications that you might
need to allow in a production environment.
You can also use the Browse button in the Application Group window to add these
entries.
Click OK to close the Application Group window.
Parameter Value
Source Zone Users_Net
Source Address 192.168.1.254
Parameter Value
Destination Zone Internet
Destination Address Any
Click the Application tab and configure the following:
Parameter Value
Applications paloalto-apps
To locate your paloalto-apps Application Group, start typing in the first few
letters of the group name, and the interface will display only those entries that
match. Application Groups appear at the very end of the Application list.
Parameter Value
Action Allow
Log Setting Log at Session End
This tab only appears when you have a rule that shadows other rules. You will fix
the rule shadow issue in a later section of the lab.
This action instructs the firewall to check for Dynamic Content updates. The
application used by the firewall is called paloalto-updates and is one that you
included in the Application Group called paloalto-apps.
In the Tasks Manager – All Tasks window, scroll down to locate the most recent entry
for Commit under Type.
Click the link for Commit.
The value under the Count column indicates the number of rules that are
shadowed. The Shadowed Rule column shows you details about which rule is
shadowed.
You can use this detailed information to modify your Security Policy rule order to
make certain traffic hits rules in the correct manner.
Close the Job Status Commit window.
Close the Task Manager – All Tasks window.
You may drag and drop the Allow-PANW-Apps entry to the correct location, or you
can use the Move button at the bottom to place the rule in the right spot.
Note that several columns have been hidden or rearranged in the example shown here.
Press ENTER in the opened window and allow the script to complete.
Allow the script to complete and then press ENTER to close the window.
Examine the Traffic log by selecting Monitor > Logs > Traffic.
Clear any filters you may have in place.
Create and apply a filter to display sessions from your client workstation (192.168.1.20)
that do not include the application dns:
( addr.src in 192.168.1.20 ) and ( app neq dns )
Excluding the dns application from the display will make it easier for you to see
other applications in use on the network.
Note the information under the Application, Action and Rule columns:
You should see entries for a variety of applications. Some of the entries will be
recognizable and others will be for applications you may never have heard of.
Use the information in the columns for Application, Action and Rule to answer the
following questions. You can also use filters to help you find the answers from the
Traffic log.
Are there any applications being denied from the Users_Net zone that you should allow?
Another trick question!
The answer depends on your organization and the applications that are necessary for
employees to do their jobs. Although you may not think it appropriate to use social media
applications during work, organizations like sales and marketing often use those types of
applications to drive awareness and branding. Your company may rely on Dropbox as the
sanctioned cloud storage application, so should you be concerned that someone is using
boxnet? Or sharefile? What is dailymotion and who uses it?
You cannot answer these kinds of questions intelligently without additional information.
Fortunately, Palo Alto Networks provides that kind of information within the firewall itself.
Note that you can use the navigation buttons at the bottom of the window, or you
can create and apply a filter to locate the application entries.
Use the Applications database to find details about the application you have chosen to
research.
Select Objects > Applications.
In the Search field, enter the name of the application as it appears in the Traffic log.
Click the magnifying glass icon to search.
Answer the following questions about the application you have chosen to research.
What category does the application fall into?
In the bottom left corner of the window under the Classification section, you can see the entry
for Category.
What risk level has Palo Alto Networks assigned to the application?
Note – when you add the dropbox application, the web interface adds an entry to
the Depends On column for the google-base application.
ms-office365
Note – when you add ms-office365, the web interface adds additional applications
to the Depends On list.
When complete, the Applications list should have seven entries and the Depends On
list should have multiple entries.
Note that the list of applications in the Depends On column may differ from the
example shown here. Palo Alto Networks updates application definitions
frequently, and in many cases an existing application will require additional
applications to work correctly.
Place the check box next to Depends On to select all items in that column.
Click Add to Current Rule.
This filter will allow you to see the applications that have been blocked.
Many of the applications are now being blocked by the interzone-default rule. Remember that
any application that is not explicitly allowed in a Security Policy rule will be blocked by the
interzone-default rule.
The entries you see will differ from the example shown here.
Clear the filter in the Traffic log.
Note: Be sure to type in the URL as shown above – include http as the protocol for
the request.
The browser will not be able to connect and will eventually time out (note that you do
not have to wait until you receive the time out message before continuing to the next
step).
Close the Firefox browser.
In the firewall web interface, select Device > Response Pages.
Under the Action column in the row for Application Block Page, click the link for
Disabled.
The firewall will present a web page indicating that the application has been blocked.
Note: Response Pages must also be enabled on the Interface Management Profile
assigned to the firewalls interface that is required to respond. This was completed
in an earlier lab.
Note that there are limitations to the Application Block Page. The firewall cannot
present the page to a user when the browser session is encrypted using HTTPS.
Doing so would interrupt the secure communication between the client and the
destination server and violate the rules of encryption.
However, you can configure and enable decryption on the firewall (which we cover
in a later module). With decryption enabled, the firewall can present the
Application Block Page to a web browser when a user attempts to access a blocked
application.
The firewall has a Security Policy rule that allows users in the Acquisition zone to access any
application on the Internet.
In this lab, you will build and apply a set of Security Profiles that will watch for and block
known threats from the users in this Acquisition zone.
Lab Objectives
Load a baseline configuration
Generate traffic without Security Profiles and examine logs
Create Security Profiles
Create a Security Profile Group
Apply the Security Profile Group to existing Security Policy rules
Generate traffic with Security Profiles and examine logs
Leave the Terminal Emulator window open because you will use it again later in this lab
In the firewall web interface, examine the Threat Log
You should have no significant entries in the Threat Log
Parameter Value
Name US-SSNs
Description US Social Security Numbers
Pattern Type Predefined Pattern
First Pattern Social Security Numbers
Second Pattern Social Security Numbers (without dash
separator)
Leave the URL Filtering Profile and the WildFire Analysis Profile set to none for this
lab. We will examine both of those Security Profiles in more detail later in the
course.
Lab Clean-Up
Close the SSH connection to the firewall
Close the Remmina desktop application window
Close the Terminal Emulator window on the workstation desktop
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
Note that you may receive messages in the Commit window about App
Dependencies. In a production environment, you should examine the messages and
use the information provided to add the missing applications to the appropriate
rules. These dependencies result from changes in Application definitions that are
released each month.
In the Remmina Remote Desktop Client window, double-click the entry for Server-
Extranet:
The download should succeed. This filetype is one that you will block when you
configure the firewall with a File Blocking Profile.
This action saves the malicious tar file to the client Downloads folder.
In Firefox, open a new tab.
Browse to the following URI:
http://192.168.50.80/companyssns.txt
The browser will display the file:
The command returns a public IP address, indicating that the URL is accessible.
Note that the IP address you see may differ from this example.
Leave the Terminal Emulator window open because you will use it again later in this
lab.
In the firewall web interface, select Monitor > Threats.
You should have no significant entries in the Threat Log.
Click OK.
A new entry called default-1 will appear in the Antivirus list.
Click the entry for default-1 to edit it.
Change the Name to Corp-AV.
Click OK.
Click OK.
Parameter Value
Name malicious-domains-edl
Type Domain List
Description Custom list of bad domains maintained on
Extranet server
Click OK.
This page indicates that the firewall has blocked the file using the File Blocking
Profile you defined.
This page indicates that the firewall has blocked the transfer using the Data Filtering
Profile and Data Pattern you defined for Social Security Numbers.
This indicates that the firewall has intercepted and sinkholed the DNS query using
the DNS Sinkholing function in your Anti-Spyware Profile.
In the firewall web interface, select Monitor > Logs > Threat.
The Threat Log should contain numerous entries for spyware and vulnerabilities:
These entries indicate that the firewall has blocked malicious traffic using the Vulnerability and
Anti-Spyware Profiles that you defined. Note that the entries you see in the Threat Log may
differ from the example shown here. Also, several Threat Log columns have been hidden in this
example.
Lab Clean-Up
On the workstation desktop, locate the Remmina SSH connection to the Extranet server.
Type exit <Enter> to close the session.
Close the Remmina desktop application window.
Locate the open Terminal Emulator window on the workstation desktop.
Type exit <Enter> to close the window.
Lab Objectives
Test access to inappropriate web content without URL blocking in place
Create a Security Policy rule to block inappropriate web content using the URL Category
Test the Security Policy rule and examine the results
Disable the Security Policy rule
Create and apply a URL Filtering Profile to block access to a malicious URL
Test the Security Profile and examine the results
Block Access to the the URL List with a Security Policy Rule
Add the malicious-urls-edl to the URL Category of the Block-Bad-URLs Security
Policy rule.
Enable the Block-Bad-URLs Security Policy rule
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
On the client desktop, open Firefox and browse to hacker9.com, which belongs to the
URL category hacking.
Parameter Value
Source Zone Users_Net
Source Address Any
Parameter Value
Service application-default
URL Category Add the following:
adult
command-and-control
extremism
hacking
high-risk
malware
nudity
parked
peer-to-peer
phishing
proxy-avoidance-and-anonymizers
questionable
Note: you can type in the first few letters of a category to locate each one more
quickly.
Parameter Value
Action Deny
Log Setting Log at Session End
Select Move > Move Top to move the Block-Bad-URLs rule to the top of the Security
Policy:
In the Firefox browser, browse to hidester.com, which belongs to the URL category
proxy-avoidance-and-anonymizers.
The browser should display the same kind of block page
Close the Firefox browser window.
In the firewall web interface, navigate to Monitor > Logs > Traffic.
Add the URL Category column to the display by clicking the small arrow next to the
Application column heading and choosing URL Category:
The Traffic log does not list the specific URL that a user attempted to visit; however,
the URL filtering log does. Note that the default columns for the URL Filtering log
table have been rearranged in this example.
This shortcut allows you to change the setting for all categories in the list rather
than changing each one entry at a time. Setting the action to alert instructs the
firewall to allow access to the category and to write an entry to the URL Filtering
log. When the action is set to allow, the firewall allows access but does not write an
entry to the URL Filtering log.
Parameter Value
Site Access Configure the block action for the following URL categories:
adult
command-and-control
copyright-infringement
extremism
hacking
high-risk
malware
Note that several columns have been hidden or rearranged in the example shown here.
The entry will change to italics to indicate that the rule is now Disabled.
Note that several columns have been hidden or rearranged in the example shown here.
Notice that the information provided in this page provides more details than what
the firewall displayed when it blocked the same website using the Block-Bad-URLs
Security Policy rule.
This block page includes the actual URL and the Category that the site belongs to.
Browse to hacker9.com.
Notice that the Security Policy rule listed is Users_to_Internet and that the Action
for each entry is allow.
The Security Policy rule is not blocking the URL category of hacking. The blocking
process happens as part of the URL Filtering Profile inspection.
Clear the filter from the Traffic Log.
Examine the URL Filtering Log under Monitor > Logs > URL Filtering.
Clear any filters you have in place.
Create and apply a filter to show entries in which the URL Category is hacking:
( category eq hacking )
Parameter Value
Name Block-Per-Company-Policy
Description URLs that are blocked by company policy.
Type URL List
Sites Add the following:
*.nbcnews.com
*.theguardian.com
Parameter Value
URL Category Add the following to the list:
Block-Per-Company-Policy
Note that several default columns have been hidden in the example URL Filtering log file shown
here.
Notice that the Category listed for each of the entries is the Block-Per-Company-
Policy.
Note that you are disabling this rule so that it does not interfere with the
Users_to_Internet rule which allows traffic but applies the URL Filtering Profile.
Parameter Value
URL Category Add malicious-urls-edl to the list.
This EDL will block access to www.popurls.com.
Note that several default columns have been hidden in the example URL Filtering log file shown
here.
In the web interface, select Policies > Security.
Highlight the entry for Block-Bad-URLs but do not open it.
Click Disable at the bottom of the window.
Click Add in the bottom left corner and configure the following:
Profile Details Value
Name All_Files
Applications any
File Types any
Direction Both
Analysis public-cloud
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
Parameter Value
Name Corp-WF
Description WildFire profile for Corp security rules.
Click Add in the bottom left corner and configure the following:
Parameter Value
Name All_Files
Applications Verify that any is selected
File Types Verify that any is selected
Direction Verify that both is selected
Doing this ensures that the firewall will only use Wildfire and no other Security Profiles such as
Anti-Virus or Inline Machine Learning.
In a production environment, you definitely want to apply all the Security Profiles for your
Group. In this lab, we only want to test WildFire to see how it operates alone.
Click OK.
This site generates an attack file with a unique signature that simulates a zero-day attack. A
wildfire-test-pe-file.exe file is automatically downloaded to the Downloads directory.
Click OK.
Close the Firefox browser.
On the client desktop, open the Remmina application.
Open the Firewall-A connection.
From the CLI, enter the command debug wildfire upload-log show.
The command should display the output log: 0, filename: wildfire-test-pe-
file.exe processed…. This output verifies that the file was uploaded to the WildFire public
cloud. The message might take a minute or two to display.
Note that the details of the entry you see will differ from the example shown here.
Periodically use the Refresh button in the upper right corner of the window until
you see a new entry for the wildfire-test-pe-file.exe.
Note that in this example several default columns have been hidden, and the details of the entry
you see will differ.
Click the magnifying glass icon next to the entry to open the Detailed Log View of the
entry.
Under the General section, note the Verdict:
Note that the details of the entry you see will differ from this example.
Click the tab labeled Wildfire Analysis Report at the top of the Detailed Log View.
This action will open a PDF version of the Wildfire Analysis Report in another tab of
the Chromium browser.
Note that the information you see in your report may vary from the example shown here.
Scroll through the report to view detailed information about the Wildfire analysis of the
file.
Lab Objectives
Examine current configuration
Enable User-ID technology on the Acquisition zone.
Generate traffic
Modify Security Policy to meet requirements
Which rule does the firewall use when it encounters dns traffic?
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
This Security Policy rule allows any host in the Acquisition security zone to access any
application anywhere.
Clear the counters for all Security Policy rules by clicking Reset Rule Hit Counter >
All rules at the bottom of the window.
This action will allow you to see how many times the rules are accessed from this point forward.
Click Yes in the Reset window.
Select Objects > Application Groups.
Note the two new Application Groups:
Run the following command to start generating traffic in the Acquisition Zone:
./Appgenerator-2.sh <Enter>
While the script is running, examine the firewall Traffic log under Monitor > Logs >
Traffic.
Clear any filters you may have in place.
Note that almost all traffic is hitting the Acquisition-Allow-All Rule.
If the Source User column is not already displayed, add it to the table by clicking the
small triangle in any header and choosing Columns > Source User.
This action will make it easier for you to locate Source User information later in this lab. Note
that the Source User column will be empty because you have not yet enabled User-ID.
Select Allowed-Mktg-Apps.
This action will select all the individual applications under the DEPENDS ON column. Note that
the list of applications in the Depends On column may differ from the example here.
Click Add to Current Rule to add these applications to this Security Policy rule.
When you create a new Security Policy rule, the default setting for Action is Allow. However, it is
always a good practice to verify this setting before closing the window.
Note that you do not need to specify any users or user groups under the Source User column.
Because the drop-down list is set to any, this rule will deny traffic to any user, regardless of
group membership.
Select the tab for Destination.
Select the tab for Application and verify that Any is checked.
Note that the entries you see will differ from this example.
On the client desktop, locate the main window for the Remmina application.
Double-click the Firewall-A connection.
This action will open a connection to the firewall CLI.
In the firewall CLI, enter the following command to display entries for User-ID:
When you have finished examining the User-ID information, type exit <Enter> to
close the firewall SSH connection.
Answer: Deny-All-Others
Question: Which rule does the firewall use when it encounters dns traffic?
Hint: Use the filter ( app eq dns )
Answer: Allow-Corp-Apps (in some cases, you may also see Users_to_Extranet)
Question: Which rule does the firewall use when it encounters facebook-base?
Hint: Use the filter ( app eq facebook-base )
Answer: Yes
Question: Is the user bbart allowed to access instagram-base?
Hint: Use the filter ( app eq instagram-base ) and ( user.src eq ‘chicago\bbart )
Answer: No
Right now, you do not have budget funds available to build a corporate PKI infrastructure to
generate a decryption certificate from a CA (certificate authority). However, you can generate a
self-signed CA certificate on the Palo Alto Networks firewall and deploy that for decryption
Lab Objectives
Load a lab configuration
Test the firewall without decryption
Create a self-signed certificates for trusted connections
Create A self-signed certificates for untrusted connections
Create and test a Decryption Policy rule for outbound traffic
Test outbound Decryption Policy rule
Export the firewall certificate and import to Firefox
Test outbound Decryption Policy again
Review firewall logs
Exclude URL categories from decryption using a No-Decrypt rule
Test the No-Decrypt rule
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
In the firewall web interface, navigate to Monitor > Logs > Threat.
You should see one or more entries for vulnerability indicating that the firewall blocked
the Eicar file download:
The web server is using a self-signed SSL certificate, which is why Firefox presents this warning.
Notice that the download is not blocked because the connection is encrypted, and the virus is
hidden. This exercise proves that without Decryption, the firewall is unable to examine the
contents of a secure connection and cannot scan for malicious content.
Close the Firefox browser.
Parameter Value
Certificate Name trusted-cert
Common Name 192.168.1.1
Certificate Authority Select the Certificate Authority check box
This action instructs the firewall to use this certificate to decrypt traffic between clients and
sites which have a trusted HTTPS certificate.
Click OK.
Parameter Value
Certificate Name untrusted-cert
Common Name DO NOT TRUST
Certificate Authority Select the Certificate Authority check box
This action instructs the firewall to use this certificate when it encounters a site that is not
trusted – one that has a self-signed certificate, for example.
Click the Service/URL Category tab and verify that the Service is set to Any and that
the box for Any above URL Category is checked:
Parameter Value
Action Decrypt
Type Verify that SSL Forward Proxy is selected
Decryption Profile Select default
Note that several columns have been hidden or rearranged in the example shown here.
Note: The Firefox browser on the client workstation does not trust the certificate generated by
the firewall (192.168.1.1).
Click the button for Advanced.
Click the link for View Certificate.
In the firewall web interface, select Device > Certificate Management > Certificates.
Highlight but do not open trusted-cert.
At the bottom of the window, click Export Certificate to open the Export Certificate
configuration window.
Leave all settings unchanged and click OK to export the trusted-ca CA certificate.
On the left side of the Preferences screen, select Privacy & Security:
Scroll to the bottom of the screen and locate the Certificates section.
In the Downloading Certificate window, place checks in both boxes for Trust this CA
to …
Click OK.
The Firefox browser will trust any certificate issued by the entities in this Authorities list. By
adding the firewall certificate to this list, the Firefox browser will trust any certificates issued by
the firewall. Note that the process of importing certificates to client workstations varies based
on the browser type and the operating system.
Click OK to close the Certificate Manager window.
Close Firefox.
Open Firefox and browse to https://www.paloaltonetworks.com.
Notice that you do not get any warning messages about certificates.
You can tell that the firewall has intervened in this connection and presented the Forward
Untrust certificate you created.
Close the tab for Certificate for 192.168.50.80:
You will see the default page for the web server in the Extranet:
Note that the kind of message a client receives will vary depending on the browser.
Close the Firefox browser.
Drag and drop the Session End Reason column from the right side of the table to the
beginning of the table:
The filter syntax “flags has proxy” displays entries that have been decrypted (the value will show
as yes in the Decrypted column). Entries that match the filter indicate that the firewall carried
out a proxy connection for decryption.
Note that several columns have been removed and rearranged in the preceding example.
The details you see will differ from the example shown, but you should see similar information
indicating that the firewall detected the eicar.com file and used a “reset-both” action to
terminate the session. Note that several columns have been hidden in the lower section of this
example window.
In the bottom of the window, highlight an entry with Type vulnerability to see more
information about why the firewall terminated this connection.
Note the ID number 39040 and the link View in Threat Vault. The ID number is a unique value
assigned to each threat by Palo Alto Networks. Threat Vault is an online database maintained by
Palo Alto Networks with extensive information about each threat. Access to Threat Vault
requires a support account.
Click Close in the Detailed Log View.
Note that this image has been wrapped to better fit the page.
Note that in a production environment, the URL Categories which you exclude from decryption
will depend on many factors. Company policy, national privacy laws, HR concerns, destination
country – all of these can dictate what types of traffic you should or should not decrypt. The
examples we use here simple ones to illustrate how to exclude URL categories from decryption.
In the firewall web browser, select Policies > Decryption.
Click Add.
Under the General tab, enter No-Decryption for Name.
The answer is yes. They are in the wrong order. All traffic will match the first rule
Decrypt_Users_Traffic because the URL category is set to any. The firewall will therefore never
proceed beyond the first rule to implement the second rule, which instructs the firewall to
exclude financial-services, government and shopping websites from decryption.
Highlight the No-Decryption rule entry (but do not open it).
At the bottom of the window, click Move > Move Top.
The Certificate details you see may vary from this example because we are testing with live
websites that may change.
Click View Certificate:
Lab Objectives
View threat information using the Dashboard
View application information using the Dashboard
View threat information using the ACC
View application information using the ACC
View threat information using the Threat log
View application information using the Traffic log
View threat information using App Scope reports
View threat information using predefined reports
View application information using predefined reports
View threat and application information using custom reports
Generate Traffic
Use the Remmina application to connect to the Server-Extranet host
Run the traffic generating script by entering the following commands:
cd ~ <ENTER>
./UsingLogs-V1.sh <Enter>
Allow the script to run uninterrupted
In the Global Filters area, click Clear all to remove the global filter
On the Threat Activity tab, determine what widgets you would use to see which hosts
have either visited or resolved a malicious DNS domain
In the Rule Usage widget, use the Jump to Logs button to open the Traffic Log
Note the log filters that have been applied automatically to the Traffic log
This configuration filters the log to display only application traffic that is sourced from the
Acquisition zone.
Use the Add Log Filter to modify the existing source zone filter to filter on the
Users_Net zone instead of the Acquisition zone.
Use the Add Log Filter to update the filter to include the following information:
Parameter Value
Connector and
Attribute Application
Operator equal
Value web-browsing
Expand the list of URL Filtering Reports and select the entry for Web Sites
Note that you may need to click different dates until you see a report with data
The report will list each internal zone along with the applications seen coming from each zone.
Because only four zones are available in the lab environment, grouping of the data into a
Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.
Generate Traffic
In this section, you generate simulated attacks, web browsing and application traffic to populate
firewall logs.
On the client workstation, open the Remmina application.
Double-click the entry for Server-Extranet.
At the prompt, enter the following command:
./UsingLogs-V1.sh <Enter>
Press Enter again to begin the process.
Allow the script to run uninterrupted.
Minimize the Remmina application window.
Depending on activity in your lab environment in the last hour, you might not see threat entries.
This widget is useful for viewing only the most recent threats detected by the firewall. Here is an
example:
Depending on activity in your lab environment in the last hour, you might see URL entries. This
widget is useful for viewing only the most recent URLs seen by the firewall.
The entries you see will differ from the examples shown here.
Are any files displayed in the Data Logs widget? It can display the 10 most recent files
detected by the firewall in the last hour.
Depending on activity in your lab environment in the last hour, you might not see file entries.
This widget is useful for viewing only the most recent file transfers seen by the firewall.
The information you see will differ from the examples shown here.
Click Widgets and select Application > Top High Risk Applications.
A Top High Risk Applications widget should appear on the Dashboard.
Applications with a risk level of 4 are shown in orange. Applications with a risk level of 5 are
shown in red. These rankings come from Palo Alto Networks. The information you see will differ
from the examples shown here.
On the left side of the ACC window, click the Time drop-down menu and select Last 7
Days. This value configures all the widgets to display threat information for the last
seven days:
The entries you see will differ from the examples shown here.
This action adds the critical severity level as a Global filter for the ACC. Global filters are applied
to every widget on the ACC. Global filters are useful for quickly pivoting your search on a specific
piece of information, thus causing all widgets to display only information that is relevant to a
specific object or threat.
Did the widget’s table change to display only threats that have a critical severity level?
The widget should have changed to display only critical severity level threats. The graph will also
change to display only threats that match the filter.
Find the global filter on the left side of the ACC window. Was critical added as a global
filter condition?
The entries you see will differ from the examples shown here.
In the Global Filters area, click Clear all to remove the global filter.
The global filter should be removed, and all widgets should be refreshed to include all threats
detected in the last seven days.
On the Threat Activity tab, which widgets would you use to see which hosts have either
visited or resolved a malicious DNS domain? Make a guess based on the widget names.
The answer is: Hosts Visiting Malicious URLs and Hosts Resolving Malicious Domains.
Think of this as a sort of square pie-chart. The entries you see will differ from the examples
shown here.
Hover your pointer over the section for web-browsing.
This action displays a summary window with information about that application. The
information you see will differ from the examples shown here.
The entries you see will differ from the examples shown here.
Which Security Policy rules have allowed web-browsing traffic?
The widget should display only those rules that have allowed web-browsing traffic in the last
seven days because the widget is filtered by the web-browsing application in the global filter
and the ACC time range setting.
There should be a time range filter and an application filter for web-browsing. The time range
filter is derived from the time specified in the ACC. The entry you see will differ from the
example shown here.
Note that the entries displayed in the Traffic log match the filter:
Click the + icon in the filter area to open the Add Log Filter window:
Parameter Value
Connector and
Attribute Severity
Operator greater than or equal
Value high
This configuration filters the log to display only critical- and high-severity threats.
Click Add to add the in-progress filter to the top pane of the Add Log Filter’s window:
As you become more familiar with filter syntax, you can simply type the filter directly into the
filter field and forego using the filter builder.
With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Threat log:
Has the Threat log been filtered to display only threats of high severity or greater?
It should be filtered. You can scan the Action column to determine how the threats have been
handled by the firewall. You could, for example, use this information to help you determine the
Security Profile configuration required to control threats found in legitimate traffic.
Click the + icon in the filter area to re-open the Add Log Filter window.
In the Add Log Filter window, select the following:
Parameter Value
Connector and
Attribute Source User
Operator equal
Value chicago\escrooge
This configuration filters the log to display threats coming from only this user.
With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Threat log.
Has the Threat log been filtered to display only threats coming from the specified user?
You may need to add the Source User column to the Threat Log display if it is not already
present.
Parameter Value
Connector and
Attribute Source Zone
Operator equal
Value Acquisition
This configuration filters the log to display only application traffic that is sourced from the
Acquisition zone. You could use this information, for example, to help you to determine how to
configure your Security Policy rules. You easily could modify the filter to display application
traffic sourced from any zone and use that information to help you improve your Security Policy
configuration.
With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Traffic log
Has the Traffic log been filtered to display only traffic sourced from the Acquisition
zone?
It should be. You could use this information to help you determine the Security Policy rules
required to control legitimate traffic sourced from devices in the Acquisition zone.
In the Add Log Filter window, also add the following selections:
Parameter Value
Connector and
Attribute Application
Operator equal
Value web-browsing
Click Add and then click Apply to add the filter to the Traffic log filter text box.
The Add Log Filter window should close.
It should be filtered.
Note that several columns have been hidden or rearranged in the example shown here.
Click the X icon to clear the filter from the log filter text box.
Note that the image you see will differ from the example shown here.
At the top of the window, click Top 10 and select Top 25 from the menu:
This configuration enables you to see the top 25 threats within the selected time range.
At the top of the window, click Threat and choose Source User:
The information you see may differ from the example here.
Note that days that are grayed out do not have any data available.
Click Web Sites to view the report. Click each date until you see a report with data.
A Web Sites report should be displayed in the web interface. The report displays the websites
that were seen by your firewall on a given day. It should have a format like the following
example, but your data will be different. You can use this information to update your Security
Policy rules or a URL Filtering Profile, as necessary.
Parameter Value
Name Apps Used by Internal Zones
Database Traffic Summary
Scheduled check box Select it
Time Frame Last 7 Days
Sort By Select Sessions and Top 100
Group By Select Source Zone and 5 Groups
Selected Columns In top-down order, select Source Zone, Application, Bytes,
and Action
The report will list each internal zone along with the applications seen coming from each zone.
Because only four zones are available in the lab environment, grouping of the data into a
maximum of five groups is enough to display all zones. Sorting the applications list in each zone
by the top 100 sessions should display all applications associated with a source zone.
Parameter Value
Connector and
Attribute Source Zone
Operator not equal
Value Internet
The report should run, and the results should be displayed in a tab that is added and opened in
the Custom Report window.
Ensure that you explore all pages of the report, as other zones may be listed on subsequent
pages.
When you are finished viewing the report, close it by clicking the X on the Apps Used
by Internal Zones (100%) tab:
Configure Networking
Complete the following objectives:
Configure three firewall interfaces using the following values:
Ethernet 1/1: 203.0.113.20/24 - Layer 3
Ethernet 1/2: 192.168.1.1/24 - Layer 3
Ethernet 1/3: 192.168.50.1/24 - Layer 3
Create a virtual router called VR-1 for all configured firewall interfaces.
Create a default route for the firewall called Default-Route
Create an Interface Management Profile called Allow-ping that allows ping
Assign the Allow-ping Interface Management Profile to ethernet1/2
Verify network connectivity from the firewall to other hosts.
Your internal host can ping 192.168.1.1 and receive a response
From the firewall CLI, the following commands are successful:
ping source 203.0.113.20 host 203.0.113.1
ping source 203.0.113.20 host 8.8.8.8
ping source 192.168.1.1 host 192.168.1.20
ping source 192.168.50.1 host 192.168.50.150
A Corporate File Blocking Security Profile called Corp-FB to block dangerous file
types
You can use the existing strict Profile as the basis for your own
A Corporate WildFire Profile called Corp-WF to send all file types to the public cloud
for inspection
You can use the existing default Profile as the basis for your own
Firewall Interfaces
Network > Interfaces > Ethernet
Virtual Router
Network > Virtual Routers
© 2017-2022 Palo Alto Networks, Inc. PAN-EDU-210 10.2 Version A Page 347
PAN-EDU-210 10.2 Version A
www.paloaltonetworks.com/education
© 2022 Palo Alto Networks, Inc.