PANv11 FE Lab 14
PANv11 FE Lab 14
PANv11 FE Lab 14
0 ESSENTIALS
Palo Alto Networks, PAN-OS, WildFire, RedLock, and Demisto are registered trademarks of Palo Alto Networks, Inc. All other marks mentioned herein may
be trademarks of their respective companies.
Lab 14: Capstone
Contents
Introduction ................................................................................................................................................ 3
Objective ..................................................................................................................................................... 3
Lab Topology ............................................................................................................................................... 4
Lab Settings ................................................................................................................................................. 5
1 Capstone ............................................................................................................................................. 6
1.1 Apply a Baseline Configuration to the Firewall .......................................................................... 6
1.2 Configure Networking ................................................................................................................. 6
1.3 Configure Security Zones ............................................................................................................ 6
1.4 Configure NAT Policy Rules ......................................................................................................... 7
1.5 Configure Security Policy Rules................................................................................................... 7
1.6 Create and Apply Security Profiles.............................................................................................. 8
Introduction
This comprehensive lab is meant to provide you with additional hands-on firewall experience and to
enable you to test your new knowledge and skills. You can refer to your student guide and previous lab
exercises.
In this scenario, you are a network administrator and recently received a new Palo Alto Networks VM-
Series firewall. The firewall’s management IP address is 192.168.1.254. You can log in with the
username admin and Pal0Alt0! as the password. Take special care to use the exact spelling and
capitalization for the items you are asked to configure.
Objective
You are being asked to meet multiple configuration objectives. These objectives are listed in the lab
exercise sections that follow.
Lab Topology
Lab Settings
The information in the table below will be needed in order to complete the lab. The task sections
below provide details on the use of this information.
1 Capstone
You are being asked to meet multiple configuration objectives. These objectives are listed in the lab
exercise sections that follow.
You can consider this objective complete when the following tests are successful:
• The client host can ping 8.8.8.8 and google.com.
• The client host can access www.paloaltonetworks.com.
• The client host can browse to the Extranet web server at http://192.168.50.80.
• The client host can use SSH to access the Extranet host at 192.168.50.150 using the login name
paloalto42 and the password Pal0Alt0!.
• The Extranet host can ping 8.8.8.8 and google.com.
• The internal host cannot access hacker9.com.
Create Security Profiles and a Security Profile Group to meet the following requirements:
• A Corporate URL Filtering Security Profile called Corp-URL to log access to all web categories.
You can use the existing default Profile as the basis for your own.
• A Corporate File Blocking Security Profile called Corp-FB to block dangerous file types.
You can use the existing strict Profile as the basis for your own.
• A Corporate Antivirus Security Profile called Corp-AV to block vulnerabilities.
You can use the existing default Profile as the basis for your own.
• A Corporate Anti-Spyware Security Profile called Corp-AS to block spyware.
You can use the existing strict Profile as the basis for your own.
• A Corporate Vulnerability Protection Security Profile called Corp-Vuln to block viruses.
You can use the existing strict Profile as the basis for your own.
• A Corporate WildFire Profile called Corp-WF to send all file types to the public cloud for
inspection.
You can use the existing default Profile as the basis for your own.
• Create a Security Profile Group called Corp-Profiles and assign the appropriate Security Profiles
to it.
Note: You can leave the Data Filtering Profile set to None.
• Apply the Corp-Profiles Group to all applicable Security Policy rules.
You can consider this objective complete when the following tests are successful:
• The internal host cannot download a test virus file from http://192.168.50.80 using HTTP.
• The internal host cannot download the badtarfile.tar from
http://192.168.50.80/badtarfile.tar.
• A URL log file entry appears when the client host browses to
https://www.paloaltonetworks.com.