Upload files to "5 Firewall/Palo Alto"
This commit is contained in:
301
5 Firewall/Palo Alto/PA_Notes.txt
Normal file
301
5 Firewall/Palo Alto/PA_Notes.txt
Normal file
@ -0,0 +1,301 @@
|
||||
# Shortcuts
|
||||
# q - Quit
|
||||
# ctl + c = run job in background
|
||||
# z = clear screen
|
||||
|
||||
|
||||
Reboot from Factory Reset
|
||||
# Connect the PA via the console cable
|
||||
# Power on
|
||||
# When asked to exit the ZTP mode and configur eyour firewall in standard mode, type YES
|
||||
|
||||
# System Will Reboot, wait 5min
|
||||
|
||||
# Default Creds: admin:admin
|
||||
|
||||
console@PaloAlto> configure
|
||||
|
||||
console@PaloAlto# set deviceconfig system hostname FW-19
|
||||
console@PaloAlto# set deviceconfig system ip-address 192.168.1.19 netmask 255.255.255.0
|
||||
console@PaloAlto# set deviceconfig system default-gateway 192.168.1.1
|
||||
console@PaloAlto# set deviceconfig system dns-setting servers primary 8.8.8.8
|
||||
console@PaloAlto# set deviceconfig system dns-setting servers secondary 1.1.1.1
|
||||
console@PaloAlto# set deviceconfig system primary-ntp-server ntp-server-address 1.2.3.4
|
||||
|
||||
console@PaloAlto# commit
|
||||
|
||||
# Connect the MGT Cable to the PC
|
||||
# SSH AND HTTPS now should be open
|
||||
|
||||
ssh@PaloAlto> show system info
|
||||
|
||||
# HTTPS
|
||||
# Configure Widgets in Dashboard
|
||||
# Device tab > Setup
|
||||
# Configure this as needed
|
||||
# Enable SSH and HTTPS and PING
|
||||
|
||||
# Device tab > Licences
|
||||
# apply the licenses
|
||||
|
||||
# Device tab > Dynamic Updates
|
||||
# Check Now
|
||||
# Download and Install Applications and Threats update
|
||||
# Download and Install other updates needed
|
||||
# After the updates install, the "Antivirus Tab" will reveal after a "Check Now" refresh
|
||||
|
||||
|
||||
ZONES AND L3 INTERFACES
|
||||
Zones
|
||||
# Network tab > Zones
|
||||
# Add
|
||||
# Name: Inside
|
||||
# Type: Layer3
|
||||
# OK
|
||||
|
||||
# Add
|
||||
# Name: Outside
|
||||
# Type: Layer3
|
||||
# OK
|
||||
|
||||
Interfaces
|
||||
# Network tab > Interfaces
|
||||
# ethernet1/1
|
||||
# Interface Type: Layer3
|
||||
# Config
|
||||
# Virtual Router: default
|
||||
# Security Zone: Inside
|
||||
# IPv4
|
||||
# Add
|
||||
# 10.10.0.19/24
|
||||
# OK
|
||||
|
||||
# ethernet1/4
|
||||
# Interface Type: Layer3
|
||||
# Config
|
||||
# Virtual Router: default
|
||||
# Security Zone: Outside
|
||||
# IPv4
|
||||
# Add
|
||||
# 23.1.2.19/24
|
||||
# OK
|
||||
|
||||
# ethernet1/1
|
||||
# Interface Type: Layer3
|
||||
# Config
|
||||
# Virtual Router: default
|
||||
# Security Zone: Outside
|
||||
# IPv4
|
||||
# Add
|
||||
# 24.1.2.19/24
|
||||
# OK
|
||||
|
||||
|
||||
# CLICK COMMIT
|
||||
|
||||
# Plug in the appropriate cables to the appropriate ports
|
||||
# Test the connectivity with a ping (make sure the source is defined because default is the MGT port)
|
||||
|
||||
ssh@PaloALto> ping source 24.1.2.19 host 24.1.2.1
|
||||
PASSED
|
||||
|
||||
ssh@PaloAlto> ping host 24.1.2.1
|
||||
FAILED
|
||||
|
||||
|
||||
|
||||
DEFAULT IP ROUTES
|
||||
|
||||
# Display current IP Routes
|
||||
ssh@PaloAlto> show routing route
|
||||
|
||||
# HTTPS
|
||||
# Network tab > Virtual Routers
|
||||
# Click on default
|
||||
# Router Settings
|
||||
# Name: Virtual_Router
|
||||
# Static Routes
|
||||
# Add
|
||||
# Name: Default Route A
|
||||
# Destination: 0.0.0.0/0
|
||||
# Interface: ethernet1/4
|
||||
# Next Hop: IP ADDRESS : 23.1.2.1
|
||||
# Admin Distance: 10
|
||||
# Metric: 10
|
||||
# OK
|
||||
|
||||
# Add
|
||||
# Name: Default Route B
|
||||
# Destination: 0.0.0.0/0
|
||||
# Interface: ethernet1/5
|
||||
# Next Hop: IP ADDRESS : 24.1.2.1
|
||||
# Admin Distance: 20
|
||||
# Metric: 20
|
||||
# OK
|
||||
|
||||
# CLICK COMMIT
|
||||
|
||||
# Verify the Route was added
|
||||
|
||||
ssh@PaloAlto> show routing route
|
||||
ssh@PaloAlto> ping source 23.1.2.19 host 8.8.8.8
|
||||
|
||||
# HTTP
|
||||
# Device tab > Troubleshooting
|
||||
# Test Configuration
|
||||
# Select Test: Ping
|
||||
# Source: 23.1.2.19
|
||||
# Host: 8.8.8.8
|
||||
# EXECUTE
|
||||
|
||||
|
||||
|
||||
8
|
||||
DHCP Services
|
||||
|
||||
# HTTPS
|
||||
# Network Tab > DHCP
|
||||
# Interface: ethernet1/1
|
||||
# Mode: Auto
|
||||
# Lease
|
||||
# 🗹 Ping IP when...
|
||||
# IP Pools
|
||||
# Add
|
||||
# 10.10.0.51-10.10.0.99
|
||||
# Options
|
||||
# Gateway: 10.10.0.19
|
||||
# Subnet Mask: 255.255.255.0
|
||||
# Primary DNS: 10.10.0.100
|
||||
# OK
|
||||
|
||||
# CLICK COMMIT
|
||||
|
||||
|
||||
|
||||
SOURCE NAT CONFIGURATION
|
||||
# HTTPS
|
||||
# Policies tab > NAT
|
||||
# Add
|
||||
# General
|
||||
# Name: SNAT_in_to_out
|
||||
# Original Packet
|
||||
# Source Zone: inside
|
||||
# Destination Zone: Outside
|
||||
# Destination Interface: ethernet1/4
|
||||
# Source Address:
|
||||
# Name: Subnet 10.10
|
||||
# Type: IP Netmask : 10.10.0.0/24
|
||||
# Translated Packet
|
||||
# Translation Type: Dynamic IP and Port
|
||||
# Address Type: Interface Address
|
||||
# Interface: ethernet1/4
|
||||
# IP Address: 23.1.2.19/24
|
||||
# OK
|
||||
|
||||
# Test the rule
|
||||
ssh@PaloAlto> test nat-policy-match from inside to outside source 10.10.0.51 destination 8.8.8.8 protocol 1
|
||||
|
||||
# HTTP
|
||||
# Policies tab > Test Policy Match
|
||||
# From: Inside
|
||||
# To: Outside
|
||||
# Source: 10.10.0.51
|
||||
# Destination: 8.8.8.8
|
||||
# EXECUTE
|
||||
|
||||
|
||||
|
||||
|
||||
INITIAL SECURITY POLICY
|
||||
# HTTPS
|
||||
# Policies tab > Security
|
||||
# Add
|
||||
# General
|
||||
# Name: Inside to Outside
|
||||
# Source
|
||||
# Source Zone: inside
|
||||
# Source Address: Subnet 10.10
|
||||
# Destination
|
||||
# Destination Zone: outside
|
||||
# Destination Address: 🗹 ANY
|
||||
# Application
|
||||
# 🗹 ANY
|
||||
# Service/URL Category
|
||||
# 🗹 ANY
|
||||
# Actions
|
||||
# Action Setting: Action : Allow
|
||||
# Log Setting: 🗹 Log at Session End
|
||||
# OK
|
||||
|
||||
# CLICK COMMIT
|
||||
|
||||
# TEST IT on the host machine by connecting to the internet
|
||||
# HTTPS
|
||||
# Monitor tab > Traffic
|
||||
# Monitor tab > Session Browser
|
||||
|
||||
|
||||
|
||||
|
||||
DECRYPTION (SSL Forward Proxy)
|
||||
# HTTPS
|
||||
# Device tab > Certificate Management > Certificates > Device Certificates
|
||||
# Export your .cer file from your Certificate Authority Server
|
||||
# Import the file (bottom of screen)
|
||||
# name the Certificate ( Enterprise_CA )
|
||||
# File Format: Base64 (or whatever it is encoded in)
|
||||
# Click on the cert
|
||||
# 🗹 Trusted Root CA
|
||||
# Generate
|
||||
# Name: Cert_Fwd_Proxy
|
||||
# Common Name: Cert_For_Forward_Proxy
|
||||
# Signed by: External Authority
|
||||
# 🗹 Certificate Authority
|
||||
# GENERATE
|
||||
# Click on the generated cert
|
||||
# Export Certificate (Bottom)
|
||||
# Upload it to the CA Server
|
||||
# Generate the Certificate on the CA server
|
||||
# Download cert from CA server
|
||||
# Copy the name from the request on the PA HTTPS client
|
||||
# IMPORT
|
||||
# Upload the new .cer file
|
||||
# Name: Same name as above
|
||||
# Click on the name
|
||||
# 🗹 Forward Trust Certificate
|
||||
|
||||
# Redo above steps to regenerate an "Untrust" Cert
|
||||
|
||||
# Objects tab > Decryption > Decription Profile
|
||||
# Add
|
||||
# Name: Decryption_Profile1
|
||||
# SSL Decryption
|
||||
# 🗹 Block sessions with expired certificates
|
||||
# 🗹 Block sessions with untristed issuers
|
||||
# 🗹 Block sessions with unspported versions
|
||||
# 🗹 Block sessions with unsupported cipher suites
|
||||
# 🗹 Block sessions with client authentication
|
||||
# SSL Protocol Settings
|
||||
# Configure this as needed
|
||||
|
||||
# Policies Tab > Decryption
|
||||
# Add
|
||||
# General
|
||||
# Name: Decrypt
|
||||
# Source
|
||||
# Source Zone: inside
|
||||
# Source Address: Subnet 10.10
|
||||
# Destination
|
||||
# Destination Zone: outside
|
||||
# Destination Address: 🗹 Any
|
||||
# Service/URL Category
|
||||
# Service: service-https
|
||||
# Options
|
||||
# Action: Decrypt
|
||||
# Type : SSL Forward Proxy
|
||||
# Decryption Profile: Dcryption_Profile1
|
||||
# 🗹 Log Successful SSL Handshake (may slow down system)
|
||||
# 🗹 Log Unsuccessful SSL Handshake
|
||||
# OK
|
||||
|
||||
# CLICK COMMIT
|
BIN
5 Firewall/Palo Alto/Palo alto install and Setup SOP.pdf
Normal file
BIN
5 Firewall/Palo Alto/Palo alto install and Setup SOP.pdf
Normal file
Binary file not shown.
Reference in New Issue
Block a user