Pan Os 6.0 GSG
Pan Os 6.0 GSG
Contact Information
Corporate Headquarters:
Palo Alto Networks
4401 Great America Parkway
Santa Clara, CA 95054-1211
http://www.paloaltonetworks.com/contact/contact/
For the latest release notes, go to the Software Updates page at https://
support.paloaltonetworks.com/Updates/SoftwareUpdates.
This guide provides procedures for configuring the firewall using the web
interface on the device. It does not provide procedures for deploying firewalls
using Panorama. For more information on using Panorama, refer to the
Panorama Administrators Guide.
To provide feedback on the documentation, please write to us at:
[email protected].
Palo Alto Networks, Inc.
www.paloaltonetworks.com
2014 Palo Alto Networks. All rights reserved.
Palo Alto Networks, PAN-OS, and Panorama are trademarks of Palo Alto
Networks, Inc. All other trademarks are the property of their respective owners.
P/N 810-000137-00B
Revision Date: June 23, 2014
ii
Table of Contents
Palo Alto Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .i
Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
About this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
iii
Table of Contents
88
88
88
89
90
90
iv
Reduce the complexity and administrative overhead in managing configuration, policies, software and
dynamic content updates. Using device groups and templates on Panorama, you can effectively manage
device specific configuration locally on a device and enforce shared policies across all devices or device
groups.
Aggregate data from all managed firewalls and gain visibility across all the traffic on your network. The
Application Command Center (ACC) on Panorama provides a single glass pane for unified reporting across
all the firewalls, allowing you to centrally analyze, investigate and report on network traffic, security incidents
and administrative modifications.
The procedures in this document describe how to manage the firewall using the local web interface. If you want
to use Panorama for centralized management, after you complete the instructions in the Perform Initial
Configuration section of this guide and verify that the firewall can establish a connection to Panorama, refer to
the Panorama Administrators Guide for further instructions on configuring your firewall centrally.
Step 1
Step 2
Step 3
Step 4
1.
Select Device > Setup > Management and then click the Edit
icon in the Management Interface Settings section of the screen.
Enter the IP Address, Netmask, and Default Gateway.
2.
3.
Step 5
4.
Click OK.
1.
Select Device > Setup > Management and click the Edit
in the General Settings section of the screen.
2.
3.
4.
Click OK.
icon
1.
Step 6
Note
Step 7
Step 8
Note
Step 9
Select Device > Setup > Services and click the Edit icon
the Services section of the screen.
in
4.
1.
2.
3.
4.
1.
2.
Step 10 Open an SSH management session to the Using a terminal emulation software, such as PuTTY, launch an SSH
firewall.
session to the firewall using the new IP address you assigned to it.
Step 11 Verify network access to external services
required for firewall management, such as
the Palo Alto Networks Update Server, in
one of the following ways:
If you do not want to allow external
network access to the MGT interface,
you will need to set up a data port to
retrieve required service updates.
Continue to Set Up Network Access
for External Services.
If you do plan to allow external
network access to the MGT interface,
verify that you have connectivity and
then proceed to Activate Firewall
Services.
If you cabled your MGT port for external network access, verify that
you have access to and from the firewall by using the ping utility from
the CLI. Make sure you have connectivity to the default gateway,
DNS server, and the Palo Alto Networks Update Server as shown in
the following example:
admin@PA-200> ping host updates.paloaltonetworks.com
PING updates.paloaltonetworks.com (67.192.236.252) 56(84)
bytes of data.
64 bytes from 67.192.236.252 : icmp_seq=1 ttl=243 time=40.5 ms
64 bytes from 67.192.236.252 : icmp_seq=1 ttl=243 time=53.6 ms
64 bytes from 67.192.236.252 : icmp_seq=1 ttl=243 time=79.5 ms
Note
Step 1
Step 2
Step 3
2.
3.
To delete the default trust and untrust zones, select Network >
Zones, select each zone and click Delete.
4.
5.
Step 4
1.
2.
3.
4.
In the Zone dialog, define a Name for new zone, for example
L3-trust, and then click OK.
5.
Select the IPv4 tab, select the Static radio button, and click Add
in the IP section, and enter the IP address and network mask to
assign to the interface, for example 192.168.1.254/24.
6.
7.
8.
Step 5
3.
4.
Repeat steps 2-3 above for each service route you want to
modify.
5.
Step 6
Configure an external-facing interface and an associated zone and then create security and NAT policy rules to
allow the firewall to send service requests from the internal zone to the external zone:
1. Select Network > Interfaces and then select your external-facing interface. Select Layer3 as the Interface
Type, Add the IP address (on the IPv4 or IPv6 tab), and create the associated Security Zone (on the Config
tab), such as l3-untrust. You do not need to set up management services on this interface.
2. To set up a security rule that allows traffic from your internal network to the Palo Alto Networks update server
and external DNS servers, select Policies > Security and click Add. For the purposes of initial configuration,
you can create a simple rule that allows all traffic from l3-trust to l3-untrust as follows:
Launch the CLI and use the ping utility to verify that you have
connectivity. Keep in mind that by default pings are sent from the
MGT interface, so in this case you must specify the source interface
for the ping requests as follows:
admin@PA-200> ping source 192.168.1.254 host
updates.paloaltonetworks.com
PING updates.paloaltonetworks.com (67.192.236.252) from
192.168.1.254 : 56(84) bytes of data.
64 bytes from 67.192.236.252: icmp_seq=1 ttl=242 time=56.7 ms
64 bytes from 67.192.236.252: icmp_seq=2 ttl=242 time=47.7 ms
64 bytes from 67.192.236.252: icmp_seq=3 ttl=242 time=47.6 ms
^C
After you have verified connectivity, press Ctrl+C to stop the pings.
Activate Licenses
Step 1
Step 2
Locate your serial number and copy it to On the Dashboard, locate your Serial Number in the General
the clipboard.
Information section of the screen.
Step 3
Step 4
Register the device. The way you register If this is the first Palo Alto Networks device you are registering and
depends on whether you already have a
you do not yet have a login, click Register on the right side of the
login to the support site.
page. To register, you must provide your email address and the
serial number of your firewall (which you can paste from your
clipboard). You will also be prompted to set up a username and
password for access to the Palo Alto Networks support
community.
Activate Licenses
Before you can start using your firewall to secure the traffic on your network, you must activate the licenses for
each of the services you purchased. Available licenses and subscriptions include the following:
Threat PreventionProvides antivirus, anti-spyware, and vulnerability protection. For more information
about threat prevention, see Set Up Antivirus, Anti-Spyware, and Vulnerability Protection.
Decryption Port MirrorProvides the ability to create a copy of decrypted traffic from a firewall and send
it to a traffic collection tool that is capable of receiving raw packet captures-such as NetWitness or Solera-for
archiving and analysis.
URL FilteringIn order to create policy rules based on dynamic URL categories, you must purchase and
install a subscription for one of the supported URL filtering databases: PAN-DB or BrightCloud. For more
information about URL filtering, see Control Access to Web Content.
Virtual SystemsThis license is required to enable support for multiple virtual systems on PA-2000 and
PA-3000 Series firewalls. In addition, you must purchase a Virtual Systems license if you want to increase the
number of virtual systems beyond the base number provided by default on PA-4000 Series, PA-5000 Series,
and PA-7050 firewalls (the base number varies by platform). The PA-500, PA-200, and VM-Series firewalls
do not support virtual systems.
WildFireAlthough basic WildFire support is included as part of the Threat Prevention license, the
WildFire subscription service provides enhanced services for organizations that require immediate coverage
for threats, enabling sub-hourly WildFire signature updates, advanced file type forwarding (APK, PDF,
Microsoft Office, and Java Applet), as well as the ability to upload files using the WildFire API. A WildFire
subscription is also required if your firewalls will be forwarding files to a private WF-500 WildFire appliance.
For more information about WildFire, see Enable WildFire.
GlobalProtectProvides mobility solutions and/or large-scale VPN capabilities. By default, you can
deploy a single GlobalProtect portal and gateway (without HIP checks) without a license. However, if you
want to deploy multiple gateways, you must purchase a portal license (one-time, permanent license). If you
want to use host checks you will also need gateway licenses (subscription) for each gateway. For more
information on GlobalProtect, refer to the GlobalProtect Administrators Guide.
Activate Licenses
Step 1
Step 2
Step 3
1.
Note
2.
If your firewall does not have Internet
access from the management port, you
can manually download your license files 3.
from the support site and upload them to
your firewall using the Manually upload
license key option.
10
AntivirusIncludes new and updated antivirus signatures, including signatures discovered by the WildFire
cloud service. You must have a Threat Prevention subscription to get these updates. New antivirus signatures
are published daily.
ApplicationsIncludes new and updated application signatures. This update does not require any
additional subscriptions, but it does require a valid maintenance/support contract. New application updates
are published weekly.
Applications and ThreatsIncludes new and updated application and threat signatures. This update is
available if you have a Threat Prevention subscription (and you get it instead of the Applications update).
New Applications and Threats updates are published weekly.
GlobalProtect Data FileContains the vendor-specific information for defining and evaluating host
information profile (HIP) data returned by GlobalProtect agents. You must have a GlobalProtect portal and
GlobalProtect gateway license in order to receive these updates. In addition, you must create a schedule for
these updates before GlobalProtect will function.
BrightCloud URL FilteringProvides updates to the BrightCloud URL Filtering database only. You must
have a BrightCloud subscription to get these updates. New BrightCloud URL database updates are published
daily. If you have a PAN-DB license, scheduled updates are not required as devices remain in-sync with the
servers automatically.
WildFireProvides near real-time malware and antivirus signatures created as a result of the analysis done
by the WildFire cloud service. Without the subscription, you must wait 24 to 48 hours for the signatures to
roll into the Applications and Threat update.
If your firewall does not have Internet access from the management port, you can download
content updates from the Palo Alto Networks Support Site (https://support.paloaltonetworks.com)
and then Upload them to your firewall.
Step 1
11
Step 2
Note You cannot download the antivirus database until you have installed the Application and Threats database.
UpgradeIndicates that there is a new version of the BrightCloud database available. Click the link to begin
the download and installation of the database. The database upgrade begins in the background; when
completed a check mark displays in the Currently Installed column. Note that if you are using PAN-DB as
your URL filtering database you will not see an upgrade link because the PAN-DB database automatically
stays in sync with the server.
Tip: To check the status of an action, click Tasks (on the lower right-hand corner of the window).
RevertIndicates that the corresponding software version has been downloaded previously. You can choose
to revert to the previously installed version of the update.
Step 3
Note
12
Click the Install link in the Action column. When the installation
completes,
a check mark displays in the Currently Installed column.
Installation can take up to 20 minutes on
a PA-200, PA-500, or PA-2000 device and
up to two minutes on a PA-3000 Series,
PA-4000 Series, PA-5000 Series, PA-7050,
or VM-Series firewall.
Install the updates.
Step 4
1.
Set the schedule of each update type by clicking the None link.
2.
Specify the Time and (or, minutes past the hour in the case of
WildFire), if applicable depending on the Recurrence value you
selected, Day of the week that you want the updates to occur.
4.
5.
6.
7.
Step 1
Step 2
Click Check Now to check for the latest updates. If the value in the
Action column is Download it indicates that an update is available.
13
Step 3
Note
Step 4
Locate the version you want and then click Download. When the
download completes, the value in the Action column changes to
Install.
1.
Click Install.
2.
If you are not prompted to reboot, select Device > Setup >
Operations and click Reboot Device in the Device
Operations section of the screen.
14
The following sections describe the various ways you can set up administrative accounts and provide procedures
for setting up basic administrative access:
Administrative Roles
Administrative Authentication
Administrative Roles
The way you configure administrator accounts depends on the security requirements within your organization,
whether you have existing authentication services you want to integrate with, and how many different
administrative roles you require. A role defines the type of access the associated administrator has to the system.
There are two types of roles you can assign:
Dynamic RolesBuilt-in roles that provide Superuser, Superuser (read-only), Device administrator,
Device administrator (read-only), Virtual system administrator, and Virtual system administrator (read-only)
access to the firewall. With dynamic roles, you dont have to worry about updating the role definitions as new
features are added because the roles automatically update.
Admin Role ProfilesAllow you to create your own role definitions in order to provide more granular
access control to the various functional areas of the web interface, CLI and/or XML API. For example, you
could create an Admin Role Profile for your operations staff that provides access to the device and network
configuration areas of the web interface and a separate profile for your security administrators that provides
access to security policy definition, logs, and reports. Keep in mind that with Admin Role Profiles you must
update the profiles to explicitly assign privileges for new features/components that are added to the product.
Administrative Authentication
There are four ways you can authenticate administrative users:
Local administrator account with local authenticationBoth the administrator account credentials and
the authentication mechanisms are local to the firewall. You can further secure the local administrator
account by creating a password profile that defines a validity period for passwords and by setting device-wide
password complexity settings.
15
Local administrator account with SSL-based authenticationWith this option, you create the
administrator accounts on the firewall, but authentication is based on SSH certificates (for CLI access) or
client certificates/common access cards (for the web interface). Refer to the article How to Configure
Certificate-based Authentication for the WebUI for details on how to configure this type of administrative access.
Local administrator account with external authenticationThe administrator accounts are managed
on the local firewall, but the authentication functions are offloaded to an existing LDAP, Kerberos, or
RADIUS service. To configure this type of account, you must first create an authentication profile that
defines how to access the external authentication service and then create an account for each administrator
that references the profile.
handled by an external RADIUS server. To use this option, you must define Vendor Specific Attributes
(VSAs) on your RADIUS server that map to the admin role and, optionally, the virtual system objects you
have defined on the Palo Alto Networks device. Refer to the Radius Vendor Specific Attributes (VSA) article
for details on how to configure this type of administrative access.
16
Step 1
Complete the following steps for each role you want to create:
1. Select Device > Admin Roles and then click Add.
2.
3.
On the Web UI, Command Line and/or XML API tabs, specify
the access to allow for each management interface:
On the Web UI and/or XML API tabs, set the access levels for
each functional area of the interface by clicking the icon to
toggle it to the desired setting: Enable , Read Only , or
Disable .
On the Command Line tab, specify the type of access to
allow to the CLI: superreader, deviceadmin, or
devicereader (for Device roles); vsysadmin or vsysreader
(for Virtual System roles); or None to disable CLI access
entirely.
4.
For example, allow an admin full access to a device using the XML
API, with the exception of importing or exporting files:
17
Step 2
Step 3
Step 4
18
2.
3.
4.
5.
1.
Click Commit.
19
View Reports
20
View Reports
The firewall also uses the log data to generate reports (Monitor > Reports) that display the log data in a tabular
or graphical format.
21
To forward log data to an external service you must complete the following tasks:
Configure the firewall to access the remote services that will be receiving the logs. See Define Remote
Logging Destinations.
Configure each log type for forwarding. See Enable Log Forwarding.
For immediate notification about critical system events or threats that require your attention, you can
generate SNMP traps or send email alerts. See Set Up Email Alerts and/or Set Up SNMP Trap Destinations.
For long-term storage and archival of data and for centralized device monitoring, you can send the log data
to a Syslog server. See Define Syslog Servers. This enables integration with third-party security monitoring
tools, such as Splunk! or ArcSight.
If you do not have a Syslog collector or if you do not require real-time updates, you can instead
schedule exports of logs and save them to a File Transfer Protocol (FTP) server in CSV format
or use Secure Copy (SCP) to securely transfer data between the firewall and a remote host. For
more information, refer to the Reports and Logging section of the PAN-OS 6.0 Administrators
Guide.
For aggregation and reporting of log data from multiple Palo Alto Networks firewalls, you can forward logs
to a Panorama Manager or Panorama Log Collector. See Forward Logs to Panorama.
You can define as many Server Profiles as you need. For example, you could use separate Server Profiles to send
traffic logs to one Syslog server and system logs to a different one. Or, you could include multiple server entries
in a single Server Profile to enable you to log to multiple Syslog servers for redundancy.
22
By default, all log data is forwarded over the MGT interface. If you plan to use an interface other
than MGT, you will need to configure a Service Route for each service to which you plan to
forward logs as described in Step 5 of the procedure to Set Up a Data Port for Access to
External Services.
Step 1
1.
2.
3.
4.
Click Add to add a new email server entry and enter the
information required to connect to the Simple Mail Transport
Protocol (SMTP) server and send email (you can add up to four
email servers to the profile):
NameName to identify the mail server (1-31 characters).
This field is just a label and does not have to be the host name
of an existing SMTP server.
Email Display NameThe name to show in the From field
of the email.
FromThe email address where notification emails will be
sent from.
ToThe email address to which notification emails will be
sent.
Additional RecipientIf you want the notifications sent to
a second account, enter the additional address here. You can
only add one additional recipient. To add multiple recipients,
add the email address of a distribution list.
Email GatewayThe IP address or host name of the SMTP
gateway to use to send the emails.
5.
Step 2
Select the Custom Log Format tab. For details on how to create
custom formats for the various log types, refer to the Common
Event Format Configuration Guide.
Step 3
1.
2.
23
You can also use SNMP to monitor the firewall. In this case, your SNMP manager must be
configured to get statistics from the firewall rather than (or in addition to) having the firewall send
traps to the manager. For more information, see Monitor the Firewall Using SNMP.
Step 1
Note
24
In order to find out the firewalls engine ID, you must configure the
firewall for SNMP v3 and send a GET message from your SNMP
manager or MIB browser as follows:
1. Enable the interface to allow inbound SNMP requests:
If you will be receiving SNMP GET messages on the MGT
interface, select Device > Setup > Management and click the
Edit icon in the Management Interface Settings section of
the screen. In the Services section, select the SNMP check
box and then click OK.
If you will be receiving SNMP GET messages on a different
interface, you must associate a management profile with the
interface and enable SNMP management.
2.
3.
Step 2
Create a Server Profile that contains the information for connecting and authenticating to the SNMP manager(s).
1. Select Device > Server Profiles > SNMP Trap.
2. Click Add and then enter a Name for the profile.
3. (Optional) Select the virtual system to which this profile applies from the Location drop-down.
4. Specify the version of SNMP you are using (V2c or V3).
5. Click Add to add a new SNMP Trap Receiver entry (you can add up to four trap receivers per server profile).
The required values depend on whether you are using SNMP V2c or V3 as follows:
SNMP V2c
NameName to identify the SNMP manager (1-31 characters). This field is just a label and does not have
to be the host name of an existing SNMP server.
SNMP ManagerThe IP address of the SNMP manager to which you want to send traps.
CommunityThe community string required to authenticate to the SNMP manager.
SNMP V3
NameName to identify the SNMP manager (1-31 characters). This field is just a label and does not have
to be the host name of an existing SNMP server.
SNMP ManagerThe IP address of the SNMP manager to which you want to sent traps.
UserThe username required to authenticate to the SNMP manager.
EngineIDThe engine ID of the firewall, as identified in Step 1. This is a hexadecimal value from 5 to 64
bytes with a 0x prefix. Each firewall has a unique engine ID.
Auth PasswordThe password to be used for authNoPriv level messages to the SNMP manager. This
password will be hashed using Secure Hash Algorithm (SHA-1), but will not be encrypted.
Priv PasswordThe password to be used for authPriv level messages to the SNMP manager. This
password be hashed using SHA and will be encrypted using Advanced Encryption Standard (AES 128).
6. Click OK to save the server profile.
Step 3
By default, SNMP traps are sent over the MGT interface. If you want
to use a different interface for SNMP traps, you must edit the service
route to enable the firewall to reach your SNMP manager. See Set Up
Network Access for External Services for instructions.
Step 4
Step 5
Load the PAN-OS MIB files into your SNMP management software
and compile them. Refer to the documentation for your SNMP
manager for specific instructions on how to do this.
25
There are five log types that PAN-OS can export to a Syslog server: traffic, threat, HIP match, config, and
system. For more details about the fields in each log type, refer to the PAN-OS Syslog Integration Tech Note. For
a partial list of log messages and their severity levels, refer to the System Log Reference.
Syslog messages are sent in clear text and cannot be directly encrypted. However, if you need
encryption, you can send the Syslog messages through a tunnel interface, which will force the
Syslog packets to be encrypted. You will also need to create a new service route for Syslog.
Step 1
26
5.
6.
Step 2
Step 3
1.
Select Device > Setup > Management and click the Edit
in the Logging and Reporting Settings section.
icon
2.
3.
Click OK.
Traffic LogsEnable forwarding of Traffic logs by creating a Log Forwarding Profile (Objects > Log
and adding it to the security policies you want to trigger the log forwarding. Only traffic that
matches a specific rule within the security policy will be logged and forwarded.
Forwarding)
Threat LogsEnable forwarding of Threat logs by creating a Log Forwarding Profile (Objects > Log
Forwarding) that specifies which severity levels you want to forward and then adding it to the security policies
for which you want to trigger the log forwarding. A Threat log entry will only be created (and therefore
forwarded) if the associated traffic matches a Security Profile (Antivirus, Anti-spyware, Vulnerability, URL
Filtering, File Blocking, Data Filtering, or DoS Protection). The following table summarizes the threat
severity levels:
27
Severity
Description
Critical
High
Threats that have the ability to become critical but have mitigating factors;
for example, they may be difficult to exploit, do not result in elevated
privileges, or do not have a large victim pool.
Medium
Low
Informational
Suspicious events that do not pose an immediate threat, but that are
reported to call attention to deeper problems that could possibly exist.
URL Filtering log entries with a benign verdict are logged as
Informational.
Config LogsEnable forwarding of Config logs by specifying a Server Profile in the log settings
configuration. (Device > Log Settings > Config Logs).
System LogsEnable forwarding of System logs by specifying a Server Profile in the log settings
configuration. (Device > Log Settings > System Logs). You must select a Server Profile for each severity level
you want to forward. For a partial list of system log messages and their corresponding severity levels, refer
to the System Log Reference. The following table summarizes the system log severity levels:
28
Severity
Description
Critical
High
Medium
Low
Informational
WildFire LogsEnable forwarding of WildFire logs that contain information about files that are
forwarded from the firewall to WildFire for analysis. You can configure the firewall to forward logs for the
verdict Benign and/or Malicious.
Step 1
Step 2
1.
From the web interface on the firewall,
configure the settings to allow the SNMP 2.
agent on the firewall to respond to
incoming GET requests from the SNMP
3.
manager.
4.
5.
29
Step 3
Load the PAN-OS MIB files into your SNMP management software
and, if necessary, compile them. Refer to the documentation for your
SNMP manager for specific instructions on how to do this.
Step 4
Using a MIB browser, walk the PAN-OS MIB files to identify the
object identifiers (OIDs) that correspond to the statistics you want
to monitor. For example, suppose you want to monitor Session
Utilization Percentage on the firewall. Using a MIB browser you will
see that this statistic corresponds to OID
1.3.6.1.4.1.25461.2.1.2.3.1.0 in the PAN-COMMON-MIB.
Step 5
Step 6
After you complete the configuration on The following is an example of how an SNMP manager displays
both the firewall and the SNMP manager, real-time session utilization percentage statistics for a monitored
PA-500 firewall:
you can begin monitoring the firewall
from your SNMP management software.
30
31
The following sections describe the components of the security perimeter and provide steps for configuring the
firewall interfaces, defining zones, and setting up a basic security policy that allows traffic from your internal
zone to the Internet and to the DMZ. By initially creating a basic policy like this, you will be able to analyze the
traffic running through your network and use this information to define more granular policies for safely
enabling applications while preventing threats.
Firewall Deployments
Firewall Deployments
All Palo Alto Networks next-generation firewalls provide a flexible networking architecture that includes
support for dynamic routing, switching, and VPN connectivity, enabling you to deploy the firewall into nearly
any networking environment. When configuring the Ethernet ports on your firewall, you can choose from
virtual wire, Layer 2, or Layer 3 interface deployments. In addition, to allow you to integrate into a variety of
network segments, you can configure different types of interfaces on different ports. The following sections
provide basic information on each type of deployment. For more detailed deployment information, refer to
Designing Networks with Palo Alto Networks Firewalls.
32
Layer 2 Deployments
In a Layer 2 deployment, the firewall provides switching between two or more interfaces. Each group of
interfaces must be assigned to a VLAN object in order for the firewall to switch between them. The firewall will
perform VLAN tag switching when Layer 2 subinterfaces are attached to a common VLAN object. Choose this
option when switching is required.
For more information on Layer 2 deployments, refer to the Layer 2 Networking Tech Note and/or the Securing
Inter VLAN Traffic Tech Note.
Layer 3 Deployments
In a Layer 3 deployment, the firewall routes traffic between ports. An IP address must be assigned to each
interface and a virtual router must be defined to route the traffic. Choose this option when routing is required.
You must assign an IP address to each physical Layer 3 interface you configure. You can also create logical
subinterfaces for each physical Layer 3 interface that allows you to segregate the traffic on the interface based
on VLAN tag (when VLAN trunking is in use) or by IP address, for example for multi-tenancy.
In addition, because the firewall must route traffic in a Layer 3 deployment, you must configure a virtual router.
You can configure the virtual router to participate with dynamic routing protocols (BGP, OSPF, or RIP) as well
as adding static routes. You can also create multiple virtual routers, each maintaining a separate set of routes that
are not shared between virtual routers, enabling you to configure different routing behaviors for different
interfaces.
The configuration example in this chapter illustrates how to integrate the firewall into your Layer 3 network
using static routes. For information on other types of routing integrations, refer to the following documents:
33
34
Required
Fields
Optional
Fields
Field
Description
Name
Source Zone
Destination Zone
The zone at which the traffic terminates. If you use NAT, make sure
to always reference the post-NAT zone.
Application
Action
Specifies an Allow or Deny action for the traffic based on the criteria
you define in the rule.
Tag
Description
Source Address
Destination Address
The location or destination for the traffic. If you use NAT, make sure
to always refer to the original IP addresses in the packet (i.e. the
pre-NAT IP address).
Source User
The user or group of users for whom the policy applies. You must
have User-ID enabled on the zone. See Configure User
Identification for details.
35
Field
Description (Continued)
URL Category
Service
Optional
Fields
Security Profiles
GlobalProtect)
Options
36
Allow you to define logging for the session, log forwarding settings,
change Quality of Service (QoS) markings for packets that match the
rule, and schedule when (day and time) the security rule should be in
effect.
If you have two or more zones with identical security requirements, combine them into one security rule.
The ordering of rules is crucial to ensure the best match criteria. Because policy is evaluated top down, the
more specific policy must precede the ones that are more general, so that the more specific rule is not
shadowed. The term shadow refers to a rule that is not evaluated or is skipped because it is placed lower in
the policy list. When the rule is placed lower, it is not evaluated because the match criteria was met by
another rule that preceded it, thereby shadowing the rule from policy evaluation.
To restrict and control access to inbound applications, in the security policy, explicitly define the port that
the service/application will be listening on.
Logging for broad allow rulesfor example access to well known servers like DNScan generate a lot of
traffic. Hence it is not recommended unless absolutely necessary.
By default, the firewall creates a log entry at the end of a session. However, you can modify this default
behavior and configure the firewall to log at the start of the session. Because this significantly increases the
log volume, logging at session start is recommended only when you are troubleshooting an issue. Another
alternative for troubleshooting without enabling logging at session start is to use the session browser
(Monitor > Session Browser) to view the sessions in real time.
37
Policy Object
Description
Address/Address Group,
Region
Allow you to group specific source or destination addresses that require the same
policy enforcement. The address object can include an IPv4 or IPv6 address (single IP,
range, subnet) or the FQDN. Alternatively, a region can be defined by the latitude and
longitude coordinates or you can select a country and define an IP address or IP range.
You can then group a collection of address objects to create an address group object.
You can also use dynamic address groups to monitor changes and dynamically
update IP addresses in environments where host IP addresses change
frequently.
User/User Group
Allow you to create a list of users from the local database or an external database and
group them. For information on creating user groups, refer to the User-ID section in
the PAN-OS Administrators Guide.
An Application Filter allows you to filter applications dynamically. It allows you to filter,
and save a group of applications using the attributes defined in the application database
on the firewall. For example, you can filter by one or more attributescategory,
sub-category, technology, risk, characteristicsand save your application filter. With
an application filter, when a PAN-OS content update occurs, any new applications that
match your filter criteria are automatically added to your saved application filter.
An Application Group allows you to create a static group of specific applications that you
wish to group together for a group of users or for a particular service.
Service/Service Groups
Allows you to specify the source and destination ports and protocol that a service can
use. The firewall includes two pre-defined servicesservice-http and service-https
that use TCP ports 80 and 8080 for HTTP, and TCP port 443 for HTTPS. You can
however, create any custom service on any TCP/UDP port of your choice to restrict
application usage to specific ports on your network (in other words, you can define the
default port for the application).
Note
Some examples of address and application policy objects are shown in the security policies that are included in
Create Security Rules. For information on the other policy objects, see Protect Your Network Against Threats
and for more in-depth information refer to the PAN-OS Administrators Guide.
The different types of security profiles that can be attached to security policies are: Antivirus, Anti-spyware,
Vulnerability Protection, URL Filtering, File Blocking, and Data Filtering. The firewall provides default security
profiles that you can use out of the box to begin protecting your network from threats. See Create Security Rules
38
for information on using the default profiles in your security policy. As you get a better understanding about the
security needs on your network, you can create custom profiles. See Scan Traffic for Threats for more
information.
39
The following table shows the information we will use to configure the Layer 3 interfaces and their
corresponding zones as shown in the sample topology.
Zone
Deployment Type
Interface(s)
Configuration Settings
Untrust
L3
Ethernet1/3
IP address: 208.80.56.100/24
Virtual router: default
Default route: 0.0.0.0/0
Next hop: 208.80.56.1
Trust
L3
Ethernet1/4
IP address: 192.168.1.4/24
Virtual router: default
DMZ
L3
Ethernet1/13
IP address: 10.1.1.1/24
Virtual router: default
40
Step 1
Step 2
1.
Select Network > Virtual Router and then select the default
link to open the Virtual Router dialog.
2.
Click Add and select the Static Routes tab. Click Add on either
the IPv4 or IPv6 tab, enter a Name for the route and enter the
route in the Destination field (for example, 0.0.0.0/0).
3.
Select the IP Address radio button in the Next Hop field and
then enter the IP address for your Internet gateway (for
example, 208.80.56.1).
4.
1.
Select Network > Interfaces and then select the interface you
want to configure. In this example, we are configuring
ethernet1/3 as the external interface.
2.
3.
4.
On the Config tab, select New Zone from the Security Zone
drop-down. In the Zone dialog, define a Name for new zone,
for example Untrust, and then click OK.
5.
6.
7.
41
1.
Step 3
Note
Step 4
Select Network > Interfaces and select the interface you want
to configure. In this example, we are configuring Ethernet1/4 as
the internal interface.
Select Layer3 from the Interface Type drop down.
On the Config tab, expand the Security Zone drop-down and
select New Zone. In the Zone dialog, define a Name for new
zone, for example Trust, and then click OK.
Select the same Virtual Router you used in Step 2.
5.
6.
7.
1.
2.
3.
4.
5.
6.
7.
Step 5
Click Commit.
Step 6
Step 7
From the web interface, select Network > Interfaces and verify that
icon in the Link State column is green. You can also monitor link
state from the Interfaces widget on the Dashboard.
42
To enable the clients on the internal network to access resources on the Internet, the internal 192.168.1.0
addresses will need to be translated to publicly routable addresses. In this case, we will configure source
NAT, using the egress interface address, 203.0.113.100, as the source address in all packets that leave the
firewall from the internal zone. See Translate Internal Client IP Addresses to your Public IP Address for
instructions.
To enable clients on the internal network to access the public web server in the DMZ zone, we will need to
configure a NAT rule that redirects the packet from the external network, where the original routing table
lookup will determine it should go based on the destination address of 203.0.113.11 within the packet, to
the actual address of the web server on the DMZ network of 10.1.1.11. To do this you must create a NAT
rule from the trust zone (where the source address in the packet is) to the untrust zone (where the original
destination address is) to translate the destination address to an address in the DMZ zone. This type of
destination NAT is called U-Turn NAT. See Enable Clients on the Internal Network to Access your Public Servers
for instructions.
To enable the web serverwhich has both a private IP address on the DMZ network and a public-facing
address for access by external usersto both send and receive requests, the firewall must translate the
incoming packets from the public IP address to the private IP address and the outgoing packets from the
private IP address to the public IP address. On the firewall, you can accomplish this with a single
bi-directional static source NAT policy. See Enable Bi-Directional Address Translation for your Public-Facing
Servers.
43
Step 1
From the web interface, select Objects > Addresses and then
click Add.
2.
3.
Select IP Netmask from the Type drop down and then enter the
IP address and netmask of the external interface on the firewall,
208.80.56.100/24 in this example.
4.
Best practice:
Although you do not have to use address objects in your policies, it
is a best practice because it simplifies administration by allowing you
to make updates in one place rather than having to update every
policy where the address is referenced.
Step 2
44
Step 3
Click Commit.
Step 1
Step 2
1.
From the web interface, select Objects > Addresses and then
click Add.
2.
3.
Select IP Netmask from the Type drop-down and then enter the
public IP address and netmask of the web server,
208.80.56.11/24 in this example.
4.
45
Step 3
Click Commit.
Step 1
1.
From the web interface, select Objects > Addresses and then
click Add.
2.
3.
Select IP Netmask from the Type drop down and then enter the
IP address and netmask of the web server on the DMZ network,
10.1.1.11/24 in this example.
4.
Note
46
If you did not already create an address object for the public
address of your web server you should also create that
object now.
Step 2
Step 3
Click Commit.
47
48
Step 1
Note
Permit Internet access for all users on the To safely enable applications that are required for day-to-day
business operations we will create a simple rule that allows access to
enterprise network.
the Internet. To provide basic threat protection, we will attach the
Zone: Trust to Untrust
default security profiles available on the firewall.
By default, the firewall includes a security 1. Select Policies > Security and click Add.
rule named rule1 that allows all traffic
2. Give the rule a descriptive name in the General tab.
from Trust zone to Untrust zone. You can
either delete the rule or modify the rule to 3. In the Source tab, set the Source Zone to Trust.
reflect your zone-naming convention.
4. In the Destination tab, Set the Destination Zone to Untrust.
Note
5.
6.
Step 2
Note
7.
1.
2.
3.
4.
If using IP addresses for configuring
access to the servers in the DMZ, make 5.
sure to always refer to the original IP
addresses in the packet (i.e. the pre-NAT
6.
addresses), and the post-NAT zone.
7.
49
Step 3
Restrict access from the Internet to the To restrict inbound access to the DMZ from the Internet, configure
servers on the DMZ to specific server IP a rule that allows access only to specific servers IP addresses and on
the default ports that the applications use.
addresses only.
1. Click Add to add a new rule, and give it a descriptive Name.
For example, you might only allow users
2. In the Source tab, set the Source Zone to Untrust.
to access the webmail servers from
outside.
3. In the Destination tab, set the Destination Zone to DMZ.
Zone: Untrust to DMZ
Step 4
4.
5.
6.
7.
1.
2.
3.
4.
5.
6.
50
Step 5
Step 6
5.
6.
7.
Click Commit.
51
For example, to verify the policy rule that will be applied for a
server on the DMZ with the IP address 208.90.56.11 when it
accesses the Microsoft update server, you will try the following
command:
test security-policy-match source 208.80.56.11
destination 176.9.45.70 destination-port 80
protocol 6
"Updates-DMZ to Internet" {
from dmz;
source any;
source-region any;
to untrust;
destination any;
destination-region any;
user any;
category any;
application/service[ dns/tcp/any/53
dns/udp/any/53 dns/udp/any/5353
ms-update/tcp/any/80 ms-update/tcp/any/443];
action allow;
terminal yes;
52
In the ACC, review the most used applications and the high-risk applications on your network. The ACC
graphically summarizes the log information to highlight the applications traversing the network, who is using
them (with User-ID enabled), and the potential security impact of the content to help you identify what is
happening on the network in real time. You can then use this information to create appropriate security
policies that block unwanted applications, while allowing and enabling applications in a secure manner.
Determine what updates/modifications are required for your network security rules and implement the
changes. For example:
Review the URL filtering logs to scan through alerts, denied categories/URLs. In order to generate a URL
log, you must have a URL profile attached to the security rule and the action must be set to alert, continue,
override or block.
53
54
Enable WildFire
55
Enable WildFire
Enable WildFire
The WildFire service is included as part of the base product. The WildFire service enables the firewall to
forward attachments to a sandbox environment where applications are run to detect any malicious activity. As
new malware is detected by the WildFire system, malware signatures are automatically generated and are made
available within 24-48 hours in the antivirus daily downloads. Your threat prevention subscription entitles you
for antivirus signature updates that include signatures discovered by WildFire.
Consider purchasing the WildFire subscription service for these additional benefits:
Advanced file type forwarding (APK, PDF, Microsoft Office, and Java Applet)
Enable WildFire
Step 1
Step 2
Go to the Palo Alto Networks Support Site, log in, and select My
Devices.
3.
1.
2.
3.
Note
56
(Optional) If you want to change the maximum file size that the
firewall can forward for a specific type of file, modify the value
in the corresponding field.
5.
Enable WildFire
Step 3
Step 4
1.
Select Objects > Security Profiles > File Blocking and click
Add.
2.
3.
4.
5.
Leave the other fields set to any to forward any supported file
type from any application.
6.
1.
2.
3.
Click Commit.
Step 5
Step 6
3.
View the WildFire logs by selecting Monitor > Logs > WildFire
Submissions. If new WildFire logs appear, the firewall is
successfully forwarding files to WildFire and WildFire is
returning file analysis reports.
For more information on WildFire, refer to the Palo Alto Networks WildFire Administrators Guide.
57
As you monitor the traffic on your network and expand your policy rulebase, you can design more granular
profiles to address your specific security needs. All Anti-Spyware and Vulnerability Protection signatures have a
default action defined by Palo Alto Networks. You can view the default action by navigating to Objects > Security
Profiles > Anti-Spyware or Objects > Security Profiles >Vulnerability Protection and then selecting a profile. Click
the Exceptions tab and then click Show all signatures and you will see a list of the signatures with the default
action in the Action column. To change the default action, you must create a new profile and then create rules
with a non-default action, and/or add individual signature exceptions in the Exceptions tab of the profile.
Set up Antivirus/Anti-Spyware/Vulnerability Protection
Step 1
Verify that you have a Threat Prevention The Threat Prevention license bundles the Antivirus,
license.
Anti-Spyware, and the Vulnerability Protection features in one
license.
Select Device > Licenses to verify that the Threat Prevention
license is installed and valid (check the expiration date).
Step 2
58
1.
Select Device > Dynamic Updates and click Check Now at the
bottom of the page to retrieve the latest signatures.
2.
Step 3
1.
From Device > Dynamic Updates, click the text to the right of
Schedule to automatically retrieve signature updates for
Antivirus and Applications and Threats.
2.
Specify the frequency and timing for the updates and whether
the update will be downloaded and installed or only
downloaded. If you select Download Only, you would need to
manually go in and click the Install link in the Action column to
install the signature. When you click OK, the update is scheduled.
No commit is required.
3.
4.
Active/Passive HAIf the MGT port is used for antivirus signature downloads, you should configure a schedule on
both devices and both devices will download/install independently. If you are using a data port for downloads, the
passive device will not perform downloads while it is in the passive state. In this case you would set a schedule on both
devices and then select the Sync To Peer option. This will ensure that whichever device is active, the updates will occur
and will then push to the passive device.
Active/Active HAIf the MGT port is used for antivirus signature downloads on both devices, then schedule the
download/install on both devices, but do not select the Sync To Peer option. If you are using a data port, schedule the
signature downloads on both devices and select Sync To Peer. This will ensure that if one device in the active/active
configuration goes into the active-secondary state, the active device will download/install the signature and will then
push it to the active-secondary device.
59
Step 4
Step 5
1.
2.
Click Commit.
Step 1
1.
Select Objects > Security Profiles > File Blocking and click
Add.
2.
60
Step 2
1.
2.
3.
4.
5.
6.
Step 3
Step 4
7.
1.
2.
3.
1.
Enable Response Pages in the
management profile for each interface on
which you are attaching file blocking
profile with a continue action.
2.
Select Network > Network Profiles > Interface Mgmt and then
select an interface profile to edit or click Add to create a new
profile.
Select Response Pages, as well as any other management
services required on the interface.
3.
4.
5.
6.
61
Step 5
To test the file blocking configuration, access a client PC in the trust zone of the firewall and attempt to
download a .exe file from a website in the untrust zone. A response page should display. Click Continue to
download the file. You can also set other actions, such as alert only, forward (which will forward to WildFire), or
block, which will not provide a continue page to the user. The following shows the default response page for
File Blocking:
62
Step 1
Step 2
Step 3
1.
2.
Select Device > Licenses and verify that the URL Filtering
license is valid.
2.
3.
1.
2.
Select the default profile and then click Clone. The new profile
will be named default-1.
63
Step 4
1.
For each category that you want visibility into or control over,
select a value from the Action column as follows:
If you do not care about traffic to a particular category (that
is you neither want to block it nor log it), select Allow.
Step 5
Step 6
64
2.
1.
2.
Select the desired policy to modify it and then click the Actions
tab.
3.
If this is the first time you are defining a security profile, select
Profiles from the Profile Type drop-down.
4.
In the Profile Settings list, select the profile you just created
from the URL Filtering drop-down. (If you dont see
drop-downs for selecting profiles, select Profiles from the
Profile Type drop-down.)
5.
6.
Select Network > Network Profiles > Interface Mgmt and then
select an interface profile to edit or click Add to create a new
profile.
2.
3.
4.
5.
6.
Step 7
Click Commit.
Step 8
To test URL filtering, access a client PC from the zone where the security policy is applied and attempt to access
a site in a blocked category. You should see a URL Filtering response page that indicates that the page has been
blocked:
ApplipediaProvides details on the applications that Palo Alto Networks can identify.
Threat VaultLists threats that Palo Alto Networks products can identify. You can search by Vulnerability,
Spyware, or Virus. Click the Details icon next to the ID number for more information about a threat.
65
66
67
LDAP
Novell eDirectory
To be able to create policy based on user and group, the firewall must have a list of all available users and their
corresponding group mappings that you can select from when defining your policies. It gets this group mapping
information by connecting directly to your LDAP directory server. See About Group Mapping for more
information.
To be able to enforce the user- and group-based policies, the firewall must be able to map the IP addresses in
the packets it receives into user names. It gets this user mapping informationeither directly or from a User-ID
agent installed on a Windows serverby monitoring Microsoft Exchange Server or domain controller event
logs for logon events, monitoring Novell eDirectory for login information, or by directly probing the client
systems. See About User Mapping for more information.
68
Monitoring the security event logs for your Microsoft Exchange Servers, domain controllers, or Novell
eDirectory servers for logon events. For example, in an AD environment, the agent will monitor the security
logs for Kerberos ticket grants or renewals, Exchange server access (if configured), and file and print service
connections (for monitored servers). Keep in mind that in order for these events to be recorded in the
security log, the AD domain must be configured to log successful account logon events. See Configure User
Mapping for details.
In a Microsoft Windows environment, the agent can be configured to probe client systems using Windows
Management Instrumentation (WMI) or NetBIOS (not supported on the PAN-OS integrated User-ID
agent). If probing is enabled, the agent will probe each learned IP address periodically (every 20 minutes by
default, but this is configurable) to verify that the same user is still logged in. In addition, when the firewall
encounters an IP address for which it has no user mapping it will send the address to the agent for an
immediate probe. See Configure User Mapping for details.
In environments with existing network services that authenticate userssuch as wireless controllers, 802.1x
devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC)
mechanismsthe firewall User-ID agent (either the Windows agent or the PAN-OS integrated agent on the
firewall) can now listen for authentication syslog messages from those services. Syslog filters, which are
provided by a content update (integrated User-ID agent only) or configured manually, allow the User-ID
agent to parse and extract usernames and IP addresses from authentication syslog events generated by the
external service, and add the information to the User-ID IP address to username mappings maintained by
the firewall. Refer to Configure User-ID to Receive User Mappings from a Syslog Sender in the PAN-OS
Administrators Guide for configuration details.
For mobile or roaming users, the GlobalProtect client provides the user mapping information to the firewall
directly. For more information on setting up GlobalProtect, refer to For more information on setting up
GlobalProtect, refer to the GlobalProtect Administrators Guide.
If the firewall or the User-ID agent are unable to map an IP address to a userfor example if the user is not
logged in or is using an operating system such as Linux that is not supported by your domain serversyou
can configure Captive Portal. When configured, any web traffic (HTTP or HTTPS) matching your Captive
69
Portal policy requires user authentication, either transparently via an NT LAN Manager (NTLM) challenge
to the browser, or actively by redirecting the user to a web authentication form for authentication against a
RADIUS, LDAP, Kerberos, or local authentication database or using client certificate authentication.
For other types of user access that cannot be mapped using standard user mapping or Captive Portal
methodsfor example, to add mappings of users connecting from a third-party VPN solution or users
connecting to a 802.1x enabled wireless network. Refer to the PAN-OS XMLAPI Usage Guide.
The following diagram illustrates the different methods that are used to identify users and groups on your
network:
70
71
Step 1
Create an LDAP Server Profile that specifies how to connect to the directory servers you want the firewall to
use to obtain group mapping information.
1. Select Device > Server Profiles > LDAP.
2. Click Add and then enter a Name for the
profile.
3. (Optional) Select the virtual system to
which this profile applies from the
Location drop-down.
4. Click Add to add a new LDAP server
entry and then enter a Server name to
identify the server (1-31 characters) and
the IP Address and Port number the
firewall should use to connect to the
LDAP server (default=389 for LDAP;
636 for LDAP over SSL). You can add up to four LDAP servers to the profile, however, all the servers you
add to a profile must be of the same type. For redundancy you should add at least two servers.
5. Enter the LDAP Domain name to prepend to all objects learned from the server. The value you enter here
depends on your deployment:
If you are using Active Directory, you must enter the NetBIOS domain name; NOT a FQDN (for example,
enter acme, not acme.com). Note that if you need to collect data from multiple domains you will need to
create separate server profiles.
If you are using a global catalog server, leave this field blank.
6. Select the Type of LDAP server you are connecting to. The correct LDAP attributes in the group mapping
settings will automatically be populated based on your selection. However, if you have customized your LDAP
schema you may need to modify the default settings.
7. In the Base field, select the DN that corresponds to the point in the LDAP tree where you want the firewall
to begin its search for user and group information.
8. Enter the authentication credentials for binding to the LDAP tree in the Bind DN, Bind Password, and
Confirm Bind Password fields. The Bind DN can be in either User Principal Name (UPN) format
(i.e. [email protected]) or it can be a fully qualified LDAP name
(i.e. cn=administrator,cn=users,dc=acme,dc=local).
9. If you want the firewall to communicate with the LDAP server(s) over a secure connection, select the SSL
check box. If you enable SSL, make sure that you have also specified the appropriate port number.
72
Step 2
Add the LDAP server profile to the User-ID Group Mapping configuration.
1. Select Device > User Identification > Group
Mapping Settings and click Add.
2. Select the Server Profile you created in
Step 1.
3. Make sure the Enabled check box is selected.
4. (Optional) If you want to limit which groups
are displayed within security policy, select the
Group Include List tab and then browse
through the LDAP tree to locate the groups
you want to be able to use in policy. For each
group you want to include, select it in the
Available Groups list and click the add icon
to move it to the Included Groups list. Repeat
this step for every group you want to be able
to use in your policies.
5. Click OK to save the settings.
Step 3
Click Commit.
To map clients that are logged in to your monitored Exchange servers, domain controllers, or eDirectory
servers, or Windows clients that can be directly probed see Configure User Mapping.
If you have users with client systems that are not logged into your domain serversfor example, users
running Linux clients that do not log in to the domainsee Map IP Addresses to User Names Using
Captive Portal.
If you have clients running multi-user systems such as Microsoft Terminal Server or Citrix Metaframe
Presentation Server or XenApp, refer Configure User Mapping for Terminal Server Users in the
PAN-OS Administrators Guide for configuration details.
For other clients that you are unable to map using the previous methods, you can use the XML-based
REST API to add user mappings directly to the firewall. Refer to the PAN-OS XML API Usage Guide for
instructions.
73
However, in smaller environments (although this will vary depending on deployment, as a general rule you
should use the on-device agents in environments where you will be monitoring ten or fewer directory servers),
you can use the on-device agent that resides on the firewall without the need to install separate agent software
on your network servers. In addition, if you are using the on-device agent, you can configure it to redistribute
user mapping information to other firewalls.
For information about the system requirements for installing the Windows-based User-ID agent, refer to the
User-ID Agent Release Notes, which are available on the Palo Alto Networks Software Updates page.
The following procedure shows how to configure the PAN-OS integrated User-ID agent on the firewall for
monitoring Active Directory domain controllers. For instructions on installing and configuring the
Windows-based User-ID agent, refer to Configure User Mapping Using the Windows User-ID Agent in the
PAN-OS Administrators Guide.
Map IP Addresses to Users Using the PAN-OS Integrated User-ID Agent
Step 1
74
Map IP Addresses to Users Using the PAN-OS Integrated User-ID Agent (Continued)
Step 2
1.
2.
3.
4.
5.
Keep in mind that in order to collect all of
the required mappings, you must connect 6.
to all servers that your users log in to so
that the firewall can monitor the security
log files on all servers that contain logon
events.
Make sure the Enabled check box is selected and then click OK
(Optional) To enable the firewall to automatically discover
domain controllers on your network using DNS lookups, click
Discover.
Note
7.
8.
Step 3
75
Map IP Addresses to Users Using the PAN-OS Integrated User-ID Agent (Continued)
1.
Step 4
Note
Step 5
Step 6
Note
3.
1.
2.
1.
2.
To add the list of user accounts for which you do not want the
firewall to perform mapping, run the following command:
set user-id-collector ignore-user <value>
3.
Step 7
1.
2.
On the Device > User Identification > User Mapping tab in the
web interface, verify that the Status of each server you
configured for server monitoring is Connected.
76
Authentication Method
Description
NTLM Authentication
Web Form
Requests are redirected to a web form for authentication. You can configure
Captive Portal to use a local user database, RADIUS, LDAP, or Kerberos to
authenticate users. Although users will always be prompted for credentials, this
authentication method works with all browsers and operating systems.
Prompts the browser to present a valid client certificate for authenticating the user.
To use this method, you must provision client certificates on each user system and
install the trusted CA certificate used to issue those certificates on the firewall. This
is the only authentication method that enables transparent authentication for Mac
OS and Linux clients.
Description
Transparent
The firewall intercepts the browser traffic per the Captive Portal rule and
impersonates the original destination URL, issuing an HTTP 401 to invoke
authentication. However, because the firewall does not have the real certificate for
the destination URL, the browser will display a certificate error to users attempting
to access a secure site. Therefore you should only use this mode when absolutely
necessary, such as in Layer 2 or virtual wire deployments.
Redirect
The firewall intercepts unknown HTTP or HTTPS sessions and redirects them to
a Layer 3 interface on the firewall using an HTTP 302 redirect in order to perform
authentication. This is the preferred mode because it provides a better end-user
experience (no certificate errors). However, it does require additional Layer 3
configuration. Another benefit of the Redirect mode is that it provides for the use
of session cookies, which enable the user to continue browsing to authenticated
sites without requiring re-mapping each time the time outs expire. This is especially
useful for users who roam from one IP address to another (for example, from the
corporate LAN to the wireless network) because they will not need to
re-authenticate upon IP address change as long as the session stays open. In
addition, if you plan to use NTLM authentication, you must use Redirect mode
because the browser will only provide credentials to trusted sites.
77
Step 1
Step 2
Step 3
1.
78
2.
3.
Configure Captive Portal Using the PAN-OS Integrated User-ID Agent (Continued)
Step 4
Note
Step 5
3.
Best Practices:
If using RADIUS to authenticate users
from the web form, be sure to enter a
RADIUS domain. This will be used as
the default domain if users dont
supply one upon login.
2.
If using AD to authenticate users from
the web form, make sure to enter
sAMAccountName as the
LogonAttribute.
79
Configure Captive Portal Using the PAN-OS Integrated User-ID Agent (Continued)
Step 6
Note
4.
Create the client certificate profile that you will use when you
configure Captive Portal.
a. Select Device > Certificates > Certificate Management >
Certificate Profile and click Add and enter a profile Name.
b. In the Username Field drop-down, select the certificate field
that contains the users identity information.
c. In the CA Certificates field, click Add, select the Trusted
Root CA certificate you imported in Step 3 and then click OK.
1.
Step 7
Note
80
Select Device > User Identification > User Mapping and click
the Edit
icon in the Palo Alto Networks User ID Agent
Setup section of the screen.
On the NTLM tab, select the Enable NTLM authentication
processing check box.
Configure Captive Portal Using the PAN-OS Integrated User-ID Agent (Continued)
Step 8
81
Step 1
Enable User-ID on the source zones that contain the users that will be sending requests that require user-based
access controls.
1. Select Network > Zones.
2. Click on the Name of the zone in
which you want to enable User-ID to
open the Zone dialog.
3. Select the Enable User Identification
check box and then click OK.
Step 2
1.
Best Practice:
82
Step 3
Step 4
Click Commit.
83
Step 1
Step 2
If you are using the on-device User-ID agent, you can verify this
from the CLI using the following command:
admin@PA-200>show user ip-user-mapping-mp all
IP
Vsys From
User
Timeout (sec)
-------------------------------------------------------------192.168.201.1
vsys1 UIA
acme\louis
210
192.168.201.11 vsys1 UIA
acme\eileen
210
192.168.201.50 vsys1 UIA
acme\kimberly
210
192.168.201.10 vsys1 UIA
acme\administrator
210
192.168.201.100 vsys1 AD
acme\administrator
748
Total: 5 users
*: WMI probe succeeded
Step 3
84
Step 4
1.
2.
3.
Log in using the correct credentials and confirm that you are
redirected to the requested page.
4.
You can also test your Captive Portal policy using the
test cp-policy-match command as follows:
test cp-policy-match from corporate to internet source
192.168.201.10 destination 8.8.8.8
Matched rule: 'captive portal' action: web-form
Step 5
Verify that user names are displayed in the log files (Monitor > Logs).
85
Step 6
86
Verify that user names are displayed in reports (Monitor > Reports). For example, when drilling down into the
denied applications report, you should be able to see a list of the users who attempted to access the applications
as in the following example.
HA Overview
Configuration Guidelines
Verify Failover
87
HA Overview
HA Overview
On Palo Alto Networks firewalls, you can set up two devices as an HA pair. HA allows you to minimize
downtime by making sure that an alternate device is available in the event that the primary device fails. The
devices use dedicated or in-band HA ports on the firewall to synchronize datanetwork, object, and policy
configurationsand to maintain state information. Device specific configuration such as management port IP
address or administrator profiles, HA specific configuration, log data, and the Application Command Center
(ACC) information is not shared between devices. For a consolidated application and log view across the HA
pair, you must use Panorama, the Palo Alto Networks centralized management system.
When a failure occurs on the active device and the passive device takes over the task of securing traffic, the event
is called a failover. The conditions that trigger a failover are:
One or more of the destinations specified on the device cannot be reached. (Path Monitoring)
HA Modes
You can set up the firewalls for HA in two modes:
Active/Passive One device actively manages traffic while the other is synchronized and ready to
transition to the active state, should a failure occur. In this configuration, both devices share the same
configuration settings, and one actively manages traffic until a path, link, system, or network failure occurs.
When the active device fails, the passive device takes over seamlessly and enforces the same policies to
maintain network security. Active/passive HA is supported in the virtual wire, Layer 2 and Layer 3
deployments. For information on setting up your devices in an active/passive configuration, see Configure
an Active/Passive Pair.
The PA-200 and the VM-Series firewalls support a lite version of active/passive HA. HA lite provides configuration
synchronization and some runtime data synchronization such as IPSec security associations. It does not support
any session synchronization, and therefore, HA Lite does not offer stateful failover.
Active/Active Both the devices in the pair are active and processing traffic, and work synchronously to
handle session setup and session ownership. The active/active deployment is supported in virtual wire and Layer
3 deployments, and is only recommended for networks with asymmetric routing. For information on setting up
the devices in an active/active configuration, refer to the Active/Active High Availability Tech Note.
88
HA Overview
On devices with dedicated HA ports (HA1 and HA2) such as the PA-3000 Series, PA-4000 Series, PA-5000
Series, and PA-7050 firewalls, the dedicated HA ports allow for a direct connection between the management
plane and dataplane of the two HA devices. Use these dedicated ports to manage communication and
synchronization between the devices. For devices without dedicated HA ports such as the PA-200, PA-500, and
PA-2000 Series firewalls, use the management port for the HA1 link, to allow for a direct connection between
the management planes on the devices, and an in-band port for the HA2 link.
Control Link: The HA1 link is used to exchange hellos, heartbeats, and HA state information, and
management plane sync for routing, and User-ID information. This link is also used to synchronize
configuration changes on either the active or passive device with its peer. The HA1 link is a Layer 3 link and
requires an IP address.
Ports used for HA1: TCP port 28769 and 28260 for clear text communication; port 28 for encrypted
communication (SSH over TCP).
Data Link: The HA2 link is used to synchronize sessions, forwarding tables, IPSec security associations and
ARP tables between devices in an HA pair. Data flow on the HA2 link is always unidirectional (except for
the HA2 keep-alive); it flows from the active device to the passive device. The HA2 link is a Layer 2 link,
and it uses ether type 0x7261 by default.
Ports used for HA2: The HA data link can be configured to use either IP (protocol number 99) or UDP
(port 29281) as the transport, and thereby allow the HA data link to span subnets.
Note: Active/Active deployments also use an HA3 link for packet forwarding.
Backup Links: Provide redundancy for the HA1 and the HA2 links. In-band ports are used as backup links
for both HA1 and HA2. Consider the following guidelines when configuring backup HA links:
The IP addresses of the primary and backup HA links must not overlap each other.
HA1-backup and HA2-backup ports must be configured on separate physical ports. The HA1-backup
link uses port 28770 and 28260.
Palo Alto Networks recommends enabling heartbeat backup (uses port 28771 on the MGT interface) if you use
an in-band port for the HA1 or the HA1 backup links.
89
HA Overview
Failover Triggers
When a failure occurs on the active device and the passive device takes over the task of securing traffic, the event
is called a failover. A failover is triggered when a monitored metric on the active device fails. The metrics that
are monitored for detecting a device failure are:
Heartbeat Polling and Hello messagesThe firewalls use hello message and heartbeats to verify that
the peer device is responsive and operational. Hello messages are sent from one peer to the other at the
configured Hello Interval to verify the state of the device. The heartbeat is an ICMP ping to the HA peer over
the control link, and the peer responds to the ping to establish that the devices are connected and responsive.
By default, the interval for the heartbeat is 1000 milliseconds. For details on the HA timers that trigger a
failover, see HA Timers.
Link MonitoringThe physical interfaces to be monitored are grouped into a link group and their state
(link up or link down) is monitored. A link group can contain one or more physical interfaces. A device
failure is triggered when any or all of the interfaces in the group fail. The default behavior is failure of any
one link in the link group will cause the device to change the HA state to non-functional to indicate a failure
of a monitored object.
Path MonitoringMonitors the full path through the network to mission-critical IP addresses. ICMP
pings are used to verify reachability of the IP address. The default interval for pings is 200ms. An IP address
is considered unreachable when 10 consecutive pings (the default value) fail, and a device failure is triggered
when any or all of the IP addresses monitored become unreachable. The default behavior is any one of the
IP addresses becoming unreachable will cause the device to change the HA state to non-functional to
indicate a failure of a monitored object.
In addition to the failover triggers listed above, a failover also occurs when the administrator places the device
is a suspended state or if preemption occurs.
On the PA-3000 Series, PA-5000 Series, and PA-7050 firewalls, a failover can occur when an internal health
check fails. This health check is not configurable and is enabled to verify the operational status for all the
components within the firewall.
HA Timers
High Availability (HA) timers are used to detect a firewall failure and trigger a failover. To reduce the complexity
in configuring HA timers, you can select from three profiles: Recommended, Aggressive and Advanced. These
profiles auto-populate the optimum HA timer values for the specific firewall platform to enable a speedier HA
deployment.
Use the Recommended profile for typical failover timer settings and the Aggressive profile for faster failover
timer settings. The Advanced profile allows you to customize the timer values to suit your network requirements.
The following table describes each timer included in the profiles and the current preset values across the
different hardware models; these values are for current reference only and can change in a subsequent release.
90
Timers
Description
HA Overview
PA-7050
PA-2000 Series
Panorama VM
PA-5000 Series
PA-500
M-100
PA-4000 Series
PA-200
PA-3000 Series
VM-Series
0/0
0/0
0/0
Preemption hold
time
1/1
Time a passive or
active-secondary device will
wait before taking over as the
active or active-primary device.
1/1
1/1
Heartbeat interval
2000/1000
2000/1000
2000/500
2000/500
1000/1000
2000/500
Promotion hold time Time that the passive device
(in active/passive mode) or the
active-secondary device (in
active/active mode) will wait
before taking over as the active
or active-primary device after
communications with the HA
peer have been lost. This hold
time will begin only after the
peer failure declaration has
been made.
91
HA Overview
Timers
Description
PA-7050
PA-2000 Series
Panorama VM
PA-5000 Series
PA-500
M-100
PA-4000 Series
PA-200
PA-3000 Series
VM-Series
Additional master
hold up time
500/500
7000/5000
Hello interval
8000/8000
The time interval in
milliseconds between the hello
packets that are sent to verify
that the HA functionality on
the other firewall is
operational. The range is
8000-60000 ms with a default
of 8000 ms for all platforms.
8000/8000
8000/8000
Maximum no. of
flaps
3/3
A flap is counted when the
firewall leaves the active state
within 15 minutes after it last
left the active state. This value
indicates the maximum
number of flaps that are
permitted before the firewall is
determined to be suspended
and the passive firewall takes
over (range 0-16, default 3).
3/3
Not Applicable
92
The same modelboth the devices in the pair must be of the same hardware model or virtual machine
model.
The same PAN-OS versionboth the devices should be running the same PAN-OS version and must
each be up-to-date on the application, URL, and threat databases. They must also both have the same
multiple virtual systems capability (single or multi vsys).
The same type of interfacesdedicated HA links, or a combination of the management port and in-band
ports that are set to interface type HA.
Determine the IP address for the HA1 (control) connection between the device pair. The HA1 IP
address for both peers must be on the same subnet if they are directly connected or are connected to
the same switch.
For devices without dedicated HA ports, you can use the management port for the control connection.
Using the management port provides a direct communication link between the management planes on
both devices. However, because the management ports will not be directly cabled between the devices,
make sure that you have a route that connects these two interfaces across your network.
If you use Layer 3 as the transport method for the HA2 (data) connection, determine the IP address
for the HA2 link. Use Layer 3 only if the HA2 connection must communicate over a routed network.
The IP subnet for the HA2 links must not overlap with that of the HA1 links or with any other subnet
assigned to the data ports on the firewall.
Use a crossover cable to connect the HA ports if the devices are directly connected. If the connection
is set up using a switch or a router, use a straight through cable.
The same set of licensesLicenses are unique to each device and cannot be shared between the devices.
Therefore, you must license both devices identically. If both devices do not have an identical set of licenses,
they cannot synchronize configuration information and maintain parity for a seamless failover.
If you have an existing firewall and you want to add a new firewall for HA purposes and the new firewall has an
existing configuration, it is recommended that you perform a factory reset on the new firewall. This will ensure
that the new firewall has a clean configuration. After HA is configured, you will then sync the configuration on the
primary device to the newly introduced device with the clean config.
93
Configuration Guidelines
Configuration Guidelines
To set up an active (PeerA) passive (PeerB) pair in HA, you must configure some options identically on both
devices and some independently (non-matching) on each device. These HA settings are not synchronized
between the devices. For details on what is/is not synchronized, see HA Synchronization.
To proceed with the instructions on configuring the devices in HA, see Configure an Active/Passive Pair.
The following table lists the settings that you must configure identically on both devices:
Identical Configuration Settings on PeerA and PeerB
The following table lists the settings that must be configured independently on each device:
94
Configuration Guidelines
Independent
Configuration
Settings
PeerA
PeerB
Control Link
For devices without dedicated HA ports, use the management port IP address for the control
link.
Data Link
95
Step 1
Step 2
Step 3
96
1.
Select Device > Setup > Management and then click the Edit
icon in the Management Interface Settings section of the screen.
2.
Step 4
1.
1.
In Device > High Availability > General, edit the Control Link
(HA1) section.
Select the interface that you have cabled for use as the HA1 link
in the Port drop down menu. Set the IP address and netmask.
Enter a Gateway IP address only if the HA1 interfaces are on
separate subnets. Do not add a gateway if the devices are directly
connected.
Export the HA key from a device and import it into the peer
device.
a. Select Device > Certificate Management > Certificates >
Device Certificates.
Step 6
2.
Select Device > High Availability > General, edit the Control
Link (HA1) section.
3.
1.
In Device > High Availability > General, edit the Control Link
(HA1 Backup) section.
2.
Select the HA1 backup interface and set the IP address and
netmask.
97
Step 7
In Device > High Availability > General, edit the Data Link
(HA2) section.
Select the interface for the data link connection.
3.
4.
5.
6.
Note
Step 8
98
7.
Edit the Data Link (HA2 Backup) section, select the interface,
and add the IP address and netmask.
1.
2.
Step 9
1.
This setting is only required if you wish to 2. Set the numerical value in Device Priority. Make sure to set a
lower numerical value on the device that you want to assign a
make sure that a specific device is the
higher priority to.
preferred active device. For information,
see Device Priority and Preemption.
Note If both firewalls have the same device priority value, the
firewall with the lowest MAC address on the HA1 control
link will become the active device.
3.
Select Preemptive.
You must enable preemptive on both the active and the passive
device.
1.
Note
Step 11 (Optional, only configured on the passive Setting the link state to Auto allows for reducing the amount of time
device) Modify the link status of the HA it takes for the passive device to take over when a failover occurs and
it allows you to monitor the link state.
ports on the passive device.
Note
To enable the link status on the passive device to stay up and reflect
the cabling status on the physical interface:
1. In Device > High Availability > General, edit the Active Passive
Settings section.
2.
Note
99
1.
Select Device > High Availability > General, edit the Setup
section.
2.
3.
4.
5.
6.
Click Commit.
100
101
Step 1
Step 2
Select Device > High Availability > Link and Path Monitoring.
In the Link Group section, click Add.
Name the Link Group, Add the interfaces to monitor, and select
the Failure Condition for the group. The Link group you define
is added to the Link Group section.
In the Path Group section of the Device > High Availability >
Link and Path Monitoring tab, pick the option for your setup:
Add Virtual Wire Path, Add VLAN Path, Add Virtual Router
Path.
Select the appropriate item from the drop-down list for the
Name and Add the IP addresses (source and/or destination, as
prompted) that you wish to monitor. Then select the Failure
Condition for the group. The path group you define is added to
the Path Group section.
Step 4
102
Click Commit.
Verify Failover
Verify Failover
To test that your HA configuration works properly trigger a manual failover and verify that the devices transition
states successfully.
Verify Failover
Step 1
Click the Suspend local device link on the Device > High
Availability > Operational Commands tab.
Step 2
On the Dashboard, verify that the state of the passive device changes
to active in the High Availability widget.
Step 3
1.
Restore the suspended device to a
functional state. Wait for a couple
minutes, and then verify that preemption
has occurred, if preemptive is enabled.
2.
103
Verify Failover
104