Palo Alto Firewall

Setup

Esxi Steps

“Since I don’t have administrative access to the school server, I had to remove Proxmox from my server and install ESXI to run my tests.”

Server

No imagen

OVF image

No imagen

Storage

No imagen

Network CCDC

No imagen

Network

No imagen

Set the Interface management

            
Admin
admin
 
        
show interface management 
configure
        
set deviceconfig system type static
set deviceconfig system ip-address 192.168.222.240 netmask 255.255.255.0 default-gateway 192.168.222.250

commit



        

My current configuration

CCDC configuration (no gateway)

Now I can access from debian to the configuration management

CCDC 26 Preparation

Palo Alto Steps to Set Up the Interfaces

First, check the current management interface configuration:

show interface management

Enter configuration mode:

configure

Set the device IP address, netmask, and default gateway:

set deviceconfig system type static set deviceconfig system ip-address 172.20.242.150 netmask 255.255.255.0 default-gateway 172.20.242.240

Commit the changes:

commit

Run show interface management and hit Enter.

This lets us verify the configuration change was made successfully. You will notice we included the run command (which we did not before). We only have to do this because we are in the configuration mode (admin@PA-VM#). If we were in the operational mode (admin@PA-VM>), we would not need run.

Palo Alto CCDC configuration Palo Alto CCDC configuration Palo Alto CCDC configuration

Configure Network Interfaces

Click "Interfaces" at the top of the left side menu, then click "ethernet1/1".

Interface Configuration Settings

  • Interface Type: Layer3
  • WHY? We want this to be a routed interface. There are multiple interface types, but those are outside of the scope of this class.
  • Virtual Router: default
  • WHY? We want to use the default, built-in router. You can have multiple virtual routers for a PAN, but that is outside of the scope of this class.
Interface Configuration

Configure IPv4 Settings

Click the "IPv4" tab.

WHY? Since we want this to be a routed interface, we must give the interface an IP address and CIDR mask. The PAN uses objects to assign information to the firewall (more on this later in the class). While single IP addresses do not normally need a CIDR mask (here /24), we must add it because it is associated with a routed interface.

IPv4 Configuration

The configuration should look like the following figure:

Final Configuration View

Objects Configuration

Objects Configuration

Click Commit to apply the changes.


Configure Security Zones

Click "Zones" near the top of the left side menu.

WHY? PAN firewalls use a zone-based approach (this is a grouping of like systems/networks/etc. - more details on this in the coming few weeks), and we need to define at least two zones. Here we will use untrust and trust for simplicity in the lab. In a production environment, there will likely be more than two zones, and it is common practice to give the zone a more descriptive name.

Click the Add button in the bottom left.

Zones Configuration

Configure Virtual Router

Click "Virtual Routers" in the left side menu.

WHY? We will only use a single virtual router in this class. In production, you might find multiple virtual routers that help separate routing tables between different environments with different security needs (this is different than zones).

Click "default", then click "Static Routes".

WHY? We are going to configure a single static route that tells the firewall how to access the "Internet" by using pfSense as its default route.

Static Route Configuration

  • Name: default
  • WHY? We can name this whatever we want, but this is descriptive of its purpose.
  • Interface: ethernet1/1
  • WHY? This is the interface that the firewall uses to route traffic using this static route.
  • Destination: 0.0.0.0/0
  • WHY? This is how you represent a default route with a CIDR mask – this is also known as a quad zero route.
  • Next Hop IP Address: 192.168.10.250 (or 172.16.101.1)
  • WHY? We must define the next hop (next router) that will receive traffic hitting this route. In our case, this is the VyOS firewall.
Static Routes Configuration

Configure Security Policies

Click the "POLICIES" tab at the top center.

WHY? By default, a PAN firewall only allows intra-zone (within a specific zone) traffic. We need to define a rule to allow interzone (between two different zones) traffic. We will talk more about developing and configuring firewall rules in the coming weeks.

Click Add.

General Settings

  • Name: trust-to-untrust
  • WHY? It is common practice to name rules, objects, etc. with something short but descriptive so we do not have to guess the rule's intended purpose. Here we are simply stating this will be traffic going from the trust zone to untrust zone (from the Internal network to the Internet). This is a very broad/open rule, and we will configure more specific (least privilege) rules as we go along in class.

Source Tab Configuration

Click the "Source" tab.

  • Source Zone:
  • WHY? We need to define the zone from which traffic will be originating.
  • Click Add and select "trust"
  • Source Address:
  • WHY? We need to define a new network object that represents the full Class C of the internal network.
  • Click Add
  • Click New (at the bottom)
  • Name: dot1-trust-lan
  • IP Netmask: 172.20.242.0/24
  • Click "OK"

Destination Tab Configuration

Click the "Destination" tab.

  • Destination Zone:
  • WHY? We need to define the zone to which the traffic is going.
  • Click Add and select "untrust"
  • Destination Address:
  • WHY? We need to define where we are going to allow the traffic to go (destination).
  • Click Add
  • Under the "Address" section, choose "dot1-trust-lan"
  • Put a check in "Negate"
  • WHY? This tells the firewall that anything EXCEPT what shows under Destination Address.

Service/URL Category Configuration

Click "Service/URL Category".

  • Click the dropdown above the "Service" column, and select "any"
  • WHY? We allow any (all) services for lab simplicity to start. In production, you want to make all rules least privilege (as little access as necessary to function as needed).

Actions Configuration

Click "Actions".

  • Put a check in "Log at Session Start"
  • WHY? With only "Log at Session End", we would not see a log until the connection finishes – some systems have connections that stay up for minutes, hours, days, weeks, and beyond. This can make troubleshooting more difficult; so, we add the "Log at Session Start".

Click "OK".

Security Policy Configuration Security Policy Details

Create External IP Object

Click the "OBJECTS" tab at the top center.

WHY? We are going to make a host object (reference to a single device) manually (instead of part of building a rule), we will need this address for the NAT rule we are going to write next.

Click Add.

  • Name: untrust-ext-ip
  • IP Netmask: 172.16.101.240

Click "OK".


Configure NAT Policy

Click the "POLICIES" tab at the top center, then click NAT in the left menu.

WHY? When using RFC1918 (private) addressing, we must use Network Address Translation (NAT) to get a routable IP to get out to the Internet. This is not technically necessary for our lab environment (since the pfSense firewall does the communication to/from the Internet), we want to set up the lab as you would in production – thus, we need NAT!

Click Add.

Original Packet Tab

Click the "Original Packet" tab.

WHY? This defines the rules the firewall will use to determine if it is going to translate the packet to a different IP address. Remember, NAT rules are separate and different than firewall rules. For this NAT rule, we are going to tell the firewall if it sees a Source Zone of trust and Destination Zone of untrust going to the ethernet1/1 interface from any source to any destination, translate the source IP address to the untrust IP of the firewall (192.168.10.240) and leave all other fields the same. Again, more on this as we go along in class.

  • Source Zone:
  • Click Add and select "trust"
  • Destination Zone: untrust
  • Destination Interface: ethernet1/1

Translated Packet Tab

Click the "Translated Packet" tab.

  • Source Address Translation - Translation Type: Dynamic IP and Port
  • Address Type: Interface Address
  • Interface: ethernet1/1

Click "OK".

NAT Policy Configuration

Configuration Complete

That should be everything needed to get the interface up and running!

Interface Configuration Complete
Success! Your Palo Alto firewall interface is now properly configured and operational.

Personal Notes

Network Configuration

  • dot10 - pfSense - net1
  • PA-v10-1 - Palo Alto Firewall

Palo Alto 3 Interfaces

  • dotM - Management - Palo-interna26
  • dot10 - pfSense 192.168.10.250/24 | VyOS net1 172.20.x.x
  • dot1 - Network - Palo-interna26

Initial Configuration Commands

configure
set deviceconfig system type static

set deviceconfig system ip-address 172.20.242.240 netmask 255.255.255.0 default-gateway 172.20.242.250
commit

Interface Assignments

  • dot10 untrust - ethernet1/1 192.168.10.240/24
    • My configuration: 172.16.101.240/24 (VyOS)
  • dot1 trust - ethernet1/2 192.168.1.240/24
    • My configuration: 172.20.242.240/24 (inside26)

Zone Configuration

  • untrust - ethernet1/1 (My setup: ethernet1/1)
  • trust - ethernet1/2

Palo Alto to Cisco FTD Connection

For connecting Palo Alto to Cisco FTD, first verify that all object definitions match between both appliances to ensure consistent policy enforcement.

Verify Objects

Next, modify the security policies to allow traffic flow between the requested zones and services.

Modify Policies

Then, configure the NAT rules to handle address translation for the connection.

NAT Rules

In the case of CCDC, the virtual route must be pointed to the VyOS instance.

Virtual Routes