You are on page 1of 347

Palo Alto Networks

Firewall 10.0 Essentials:


Configuration and Management

Lab Guide
PAN-OS® 10.0
EDU-210
Courseware Version A
Palo Alto Networks, Inc.
https://www.paloaltonetworks.com
© 2017-2020, Palo Alto Networks, Inc.
Palo Alto Networks, PAN-OS, WildFire, RedLock, and Demisto are registered trademarks of
Palo Alto Networks, Inc. All other marks mentioned herein may be trademarks of their
respective companies.

© 2017-2020 Palo Alto Networks, Inc. Page 2


Table of Contents
Table of Contents ............................................................................................................................ 3
Typographical Conventions .......................................................................................................... 12
How to Use This Lab Guide ......................................................................................................... 13
Lab 1: Security Operating Platform and Architecture .................................................................. 14
Lab 2 Scenario: Connect to the Management Network ................................................................ 15
Lab Objectives ........................................................................................................................... 15
Connect to Your Student Firewall ............................................................................................. 15
Apply a Baseline Configuration to the Firewall ........................................................................ 16
Configure the Update Server and DNS Server .......................................................................... 18
Configure a General Settings .................................................................................................... 19
Modify Management Interface .................................................................................................. 20
Check for New PAN-OS Software............................................................................................ 21
Lab 3 Scenario: Working with Firewall Configurations and Log Files........................................ 23
Lab Objectives ........................................................................................................................... 23
Apply a Baseline Configuration to the Firewall........................................................................ 23
Save a Named Configuration Snapshot ..................................................................................... 24
Export a Named Configuration Snapshot.................................................................................. 25
Revert Ongoing Configuration Changes ................................................................................... 26
Preview Configuration Changes ................................................................................................ 29
Examine Log Files .................................................................................................................... 31
Create a Log File Filter ............................................................................................................. 32
Use the Filter Builder ................................................................................................................ 35
Lab 4 Scenario: Working with Firewall Administrator Accounts ................................................ 39
Lab Objectives ........................................................................................................................... 39
Apply a Baseline Configuration to the Firewall ........................................................................ 40
Create a Local Database Authentication Profile ....................................................................... 40
Create a Local User Database Account ..................................................................................... 41
Create an Administrator Account .............................................................................................. 42
Configure LDAP Authentication .............................................................................................. 43

© 2017-2020 Palo Alto Networks, Inc. Page 3


Configure RADIUS Authentication .......................................................................................... 48
Configure an Authentication Sequence ..................................................................................... 51
Lab 5 Scenario: Connecting the Firewall to Production Networks .............................................. 54
Lab Objectives ........................................................................................................................... 55
Apply a Baseline Configuration to the Firewall ........................................................................ 55
Create Layer 3 Network Interfaces ........................................................................................... 55
Create a Layer 3 Interface on ethernet1/1 ................................................................................. 56
Create a Layer 3 Interface on ethernet1/2 ................................................................................. 58
Create a Layer 3 Interface on ethernet1/3 ................................................................................. 59
Create a Virtual Router ............................................................................................................. 62
Segment Your Production Network Using Security Zones....................................................... 64
Commit the Configuration ........................................................................................................ 68
Test Connectivity to Each Zone ................................................................................................ 69
Create Interface Management Profiles ...................................................................................... 71
Test Interface Access before Management Profiles .................................................................. 72
Define Interface Management Profiles...................................................................................... 73
Apply Allow-ping to ethernet1/1 .............................................................................................. 75
Apply Allow-mgt to ethernet1/2 ............................................................................................... 76
Apply Allow-mgt to ethernet1/3 ............................................................................................... 77
Commit the Configuration ........................................................................................................ 78
Test Interface Access after Management Profiles ..................................................................... 78
Lab 6: Cyberattack Lifecycle ........................................................................................................ 80
Lab 7 Scenario: Configuring Security Policy Rules and NAT Policy Rules ................................ 81
Lab Objectives ........................................................................................................................... 82
Apply a Baseline Configuration to the Firewall ........................................................................ 82
Create Security Policy Rule ...................................................................................................... 82
Commit the Configuration ........................................................................................................ 86
Modify Security Policy Table Columns .................................................................................... 87
Test New Security Policy Rule ................................................................................................. 89
Examine Rule Hit Count ........................................................................................................... 90
Reset the Rule Hit Counter........................................................................................................ 91

© 2017-2020 Palo Alto Networks, Inc. Page 4


Examine the Traffic Log ........................................................................................................... 92
Enable Logging for Default Rules............................................................................................. 95
Commit the Configuration ........................................................................................................ 96
Ping A Host on the Internet ....................................................................................................... 96
Create Security Rules for Internet Access ................................................................................. 98
Create Users to Internet Security Policy Rule ........................................................................... 98
Create Extranet to Internet Security Policy Rule .................................................................... 102
Commit the Configuration ...................................................................................................... 105
Ping Internet Host from Client A ............................................................................................ 106
Create a Source NAT Policy ................................................................................................... 107
Commit the Configuration ...................................................................................................... 111
Verify Internet Connectivity ................................................................................................... 111
Create a Destination NAT Policy ............................................................................................ 112
Commit the Configuration ...................................................................................................... 115
Test the Connection ................................................................................................................. 116
Lab 8 Scenario: Blocking Packet- and Protocol-Based Attacks ................................................. 118
Lab Objectives ......................................................................................................................... 118
Apply a Baseline Configuration to the Firewall...................................................................... 118
Generate SYN Flood Traffic ................................................................................................... 119
Configure TCP SYN Flood Zone Protection .......................................................................... 120
Add Zone Protection to Users_Net Zone ................................................................................ 121
Commit the Configuration ...................................................................................................... 121
Test TCP SYN Flood Zone Protection .................................................................................... 121
Add Reconnaissance to Zone Protection Profile ..................................................................... 122
Commit the Configuration ...................................................................................................... 123
Generate a Reconnaissance Port Scan ..................................................................................... 123
Update Zone Protection Profile to Include Traceroute Protection .......................................... 125
Commit the Configuration ...................................................................................................... 125
Generate IP Traceroute Traffic................................................................................................ 126
Configure Spoofed Address Checking Protection .................................................................. 126
Commit the Configuration ...................................................................................................... 127

© 2017-2020 Palo Alto Networks, Inc. Page 5


Test Spoofed IP Address Protection Checking ....................................................................... 127
Remove Your Zone Protection Configuration ........................................................................ 128
Commit the Configuration ...................................................................................................... 129
Open Concurrent Sessions on a Target Host ........................................................................... 129
Configure Maximum Concurrent Sessions DoS Protection .................................................... 130
Commit the Configuration ...................................................................................................... 132
Test Maximum Concurrent Sessions DoS Protection ............................................................. 132
Configure TCP SYN Flood DoS Protection ........................................................................... 133
Commit the Configuration ...................................................................................................... 135
Test SYN Flood DoS Protection ............................................................................................. 135
Lab 9 Scenario: Blocking Threats from Known-Bad Sources.................................................... 137
Lab Objectives ......................................................................................................................... 137
Apply a Baseline Configuration to the Firewall ...................................................................... 137
Test Access to Known Malicious IP Addresses ...................................................................... 138
Block Access to Malicious IP Addresses Using Address Objects .......................................... 138
Test Access to the Blocked IP Address Objects ..................................................................... 142
Block Access to Malicious IP Addresses Using Address Groups .......................................... 142
Test Access to the Blocked IP Address Objects ..................................................................... 144
Block Access to Malicious IP Addresses by Geographic Region ........................................... 145
Test Access to an IP Address in a Blocked Region ................................................................ 146
Block Access to Malicious IP Addresses Using an EDL ........................................................ 146
Add the IP List EDLs to the Security Policy .......................................................................... 149
Test Access to IP Addresses Blocked by EDLs ...................................................................... 151
Block Access to Malicious Domains Using an EDL .............................................................. 152
Add the Domain List EDL to an Anti-Spyware Profile .......................................................... 154
Add the Anti-Spyware Profile to a Security Policy Rule ........................................................ 155
Test Access to Domains Blocked by EDLs ............................................................................ 156
Block Access to Malicious URLs Using the Security Policy ................................................. 156
Test Access to URLs Blocked by the Security Policy ............................................................ 160
Create a Custom URL Category .............................................................................................. 161
Use a Custom URL Category to Block Access to Malicious URLs ....................................... 163

© 2017-2020 Palo Alto Networks, Inc. Page 6


Test Access to Custom URLs Blocked by the Security Policy ............................................... 164
Create an EDL to Block Malicious URL Access .................................................................... 164
Add the URL List EDL to the Security Policy........................................................................ 166
Test Access to URLs Blocked by the EDL ............................................................................. 166
Block Access to a Malicious URL Using a URL Filtering Profile ......................................... 167
Add a URL Filtering Profile to a Security Policy Rule........................................................... 170
Test Access to URLs Blocked by a URL Filtering Profile ..................................................... 172
Lab 10 Scenario: Blocking Threats Using App-ID..................................................................... 174
Lab Objectives ......................................................................................................................... 174
Apply a Baseline Configuration to the Firewall ...................................................................... 174
Create an FTP Service Object ................................................................................................. 175
Create an FTP Port-Based Security Policy Rule ..................................................................... 176
Test the Port-Based Security Policy ........................................................................................ 177
Generate Application Traffic .................................................................................................. 178
Configure an Application Group ............................................................................................. 179
Configure a Security Policy to Allow Update Traffic ............................................................. 181
Test the Allow-PANW-Apps Security Policy Rule ................................................................ 183
Examine the Tasks list to see Shadowed message .................................................................. 184
Modify the Security Policy to Function Properly ................................................................... 186
Test the Modified Security Policy Rule .................................................................................. 187
Lab 11 Scenario: Maintaining Application-Based Policies ........................................................ 189
Lab Objectives ......................................................................................................................... 189
Apply a Baseline Configuration to the Firewall ...................................................................... 189
Create a Custom Service Object for HTTP ............................................................................. 190
Add the New Service to the Security Policy ........................................................................... 190
Test Access to the Web Server on Port 8080 .......................................................................... 192
Revert the Web Server to Port 80............................................................................................ 194
Create an FTP Application-Based Security Policy Rule ......................................................... 195
Test the Application-Based Security Policy............................................................................ 200
Remove the FTP Rules ............................................................................................................ 202
Scheduling App-ID Updates ................................................................................................... 203

© 2017-2020 Palo Alto Networks, Inc. Page 7


Lab 12 Scenario: Blocking Threats Using Custom Applications ............................................... 206
Lab Objectives ......................................................................................................................... 206
Apply a Baseline Configuration to the Firewall ...................................................................... 207
Gather Custom Application Information ................................................................................. 207
Configure a Packet Capture ..................................................................................................... 208
Packet Capture Application Traffic ......................................................................................... 210
Analyze the Packet Capture .................................................................................................... 212
Create a Custom Application with a Signature ....................................................................... 213
Add the Custom Application to the Security Policy ............................................................... 216
Test the Custom Application ................................................................................................... 217
Lab 13 Scenario: Blocking Threats with User-ID ...................................................................... 219
Lab Objectives ......................................................................................................................... 220
Load a Lab Configuration ....................................................................................................... 220
Examine Firewall Configuration ............................................................................................. 221
Generate Traffic from the Acquisition Zone ........................................................................... 223
Enable User-ID on the Acquisition Zone ................................................................................ 224
Modify the Allow-All-Acquisition Security Policy Rule ....................................................... 225
Create Marketing Apps Rule ................................................................................................... 226
Create Deny Rule .................................................................................................................... 230
Generate Traffic from the Acquisition Zone ........................................................................... 232
Examine User-ID Logs ............................................................................................................ 232
Examine Firewall Traffic Log ................................................................................................. 233
Clean Up the Desktop ............................................................................................................. 234
Lab 14: Device-ID ...................................................................................................................... 235
Lab 15 Scenario: Blocking Unknown Malware with WildFire .................................................. 236
Lab Objectives ......................................................................................................................... 237
Load a Lab Configuration ....................................................................................................... 237
Create a WildFire Analysis Profile ......................................................................................... 238
Apply WildFire Profile to Security Rules ............................................................................... 239
Update WildFire Settings ........................................................................................................ 240
Test the WildFire Analysis Profile .......................................................................................... 241

© 2017-2020 Palo Alto Networks, Inc. Page 8


Examine WildFire Analysis Details ........................................................................................ 242
Lab 16 Scenario: Blocking Threats in Encrypted Traffic ........................................................... 244
Lab Objectives ......................................................................................................................... 245
Load a Lab Configuration ....................................................................................................... 245
Test the Firewall Behavior Without Decryption ..................................................................... 246
Create A Self-Signed Certificates for Trusted Connections ................................................... 247
Create A Self-Signed Certificates for Untrusted Connections ................................................ 249
Create a Decryption Policy for Outbound Traffic ................................................................... 251
Test Outbound Decryption Policy ........................................................................................... 255
Export the Firewall Certificate ................................................................................................ 256
Import the Firewall Certificate ................................................................................................ 258
Test Outbound Decryption Policy Again ................................................................................ 261
Review Firewall Logs ............................................................................................................. 262
Exclude URL Categories from Decryption ............................................................................. 265
Test the No-Decryption Rule .................................................................................................. 269
Lab 17 Scenario: Preventing Use of Stolen Credentials ............................................................. 272
Lab Objectives ......................................................................................................................... 272
Starting the Lab ....................................................................................................................... 272
Test the Firewall Behavior Without Credential Detection ...................................................... 272
Apply the Corp-URL-Profile to Security Policy ..................................................................... 276
Provide the Firewall with User-ID Information ...................................................................... 277
Test the Firewall Behavior with Credential Detection ............................................................ 278
Lab 18 Scenario: Implementing Day-One Best Practice Configuration ..................................... 281
Lab Objectives ......................................................................................................................... 281
Apply a Baseline Configuration to the Firewall ...................................................................... 281
Generate Traffic Without Security Profiles............................................................................. 282
Modify Existing Security Profiles ........................................................................................... 284
Create A Corporate Vulnerability Security Profile ................................................................. 286
Create a Corporate File Blocking Profile ................................................................................ 287
Create Data Filtering Profiles .................................................................................................. 288
Create a Security Profile Group .............................................................................................. 290

© 2017-2020 Palo Alto Networks, Inc. Page 9


Apply the Corp-Profiles-Group to Security Policy Rules ....................................................... 291
Generate Attack Traffic with Security Profiles ....................................................................... 292
Create Tags .............................................................................................................................. 296
Apply Tags to Security Policy Rules ...................................................................................... 297
Enforce Rule Tags and Description Requirements ................................................................. 299
Test the Rule Requirements .................................................................................................... 301
Lab Clean-Up .......................................................................................................................... 302
Lab 19 Scenario: Viewing Threat and Application Information ................................................ 303
Lab Objectives ......................................................................................................................... 303
Apply a Baseline Configuration to the Firewall ...................................................................... 303
Generate Traffic ...................................................................................................................... 304
Display Recent Threat Information in the Dashboard............................................................. 304
Display Recent Application Information in the Dashboard .................................................... 308
View Threat Information in the ACC ..................................................................................... 309
View Application Information in the ACC ............................................................................. 312
View Threat Information in the Threat Log ............................................................................ 318
View Application Information in the Traffic Log ................................................................... 322
View Threats Using App Scope Reports................................................................................. 325
View Threat Information Using Predefined Reports .............................................................. 327
View Application Information Using Predefined Reports ...................................................... 329
View Threat and Application Information Using Custom Reports......................................... 331
Lab 20 Scenario: Capstone ......................................................................................................... 336
Load a Lab Configuration ....................................................................................................... 337
Configure Networking ............................................................................................................. 337
Configure Security Zones........................................................................................................ 337
Configure NAT Policy Rules .................................................................................................. 338
Configure Security Policy Rules ............................................................................................. 338
Create and Apply Security Profiles ......................................................................................... 339
Solutions .................................................................................................................................. 341
Firewall Interfaces ............................................................................................................... 341
Virtual Router ...................................................................................................................... 341

© 2017-2020 Palo Alto Networks, Inc. Page 10


Firewall Default Route ........................................................................................................ 342
Allow-ping Interface Management Profile .......................................................................... 342
Allow-ping Interface Management Profile Assigned to ethernet1/2 ................................... 342
Security Zones ..................................................................................................................... 343
NAT Policy Rules ................................................................................................................ 343
Security Policy Rules........................................................................................................... 344
Security Profiles .................................................................................................................. 345

© 2017-2020 Palo Alto Networks, Inc. Page 11


Typographical Conventions
This guide uses the following typographical conventions for special terms and instructions.
Convention Meaning Example

Bolding Names of selectable items in Click Security to open the Security Rule
the web interface Page

Consolas font Text that you enter and Enter the following command:
coding examples a:\setup
The show arp all command yields this
output:
username@hostname> show arp
<output>

Calibri 11 pt. gray Lab step results and A new zone should appear in the web
font explanations interface.

Click Click the left mouse button Click Administrators under the Device
tab

Right-click Click the right mouse button Right-click the number of a rule you want
to copy, and select Clone Rule

< > (text enclosed Denotes a variable parameter. Click Add again and select <Internal
in angle brackets) Actual value to use is defined Interface>
in the Lab Guide document.

© 2017-2020 Palo Alto Networks, Inc. Page 12


How to Use This Lab Guide
The Lab Guide contains exercises that correspond to modules in the Student Guide. Each lab
exercise consists of step-by-step, task-based labs. The final lab is based on a scenario that you
will interpret and use to configure a comprehensive firewall solution.
The following diagram provides a basic overview of the lab environment:

© 2017-2020 Palo Alto Networks, Inc. Page 13


Lab 1: Security Operating Platform and
Architecture

No lab exercise is associated with this module.

© 2017-2020 Palo Alto Networks, Inc. Page 14


Lab 2 Scenario: Connect to the Management
Network
Your organization has just received a new Palo Alto Networks firewall, and you have been
tasked with deploying it. The first steps will be to connect to the firewall’s management interface
address and configure basic settings to provide the firewall with network access.

Lab Objectives
 Connect to the firewall web interface
 Load a starting lab configuration
 Set DNS servers for the firewall
 Set NTP servers for the firewall
 Configure a login banner for the firewall
 Set Latitude and Longitude for the firewall
 Configure permitted IP addresses for firewall management
 Schedule dynamic updates

Connect to Your Student Firewall


Launch the Chromium browser and connect to https://192.168.1.254.
Move past any security warnings until you see the web interface login window.
Log in to the Palo Alto Networks firewall using the following credentials:
Parameter Value
Username admin
Password Pal0Alt0!

© 2017-2020 Palo Alto Networks, Inc. Page 15


Apply a Baseline Configuration to the Firewall
To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot:

A Load Named Configuration dialog box opens.


Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-02.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.

Click OK to close the Load Named Configuration window.


A window should open that confirms that the configuration is being loaded.

© 2017-2020 Palo Alto Networks, Inc. Page 16


Click Close to close the Loading Configuration window.

Click the Commit button at the upper right corner of the web interface:

A Commit window should open.


In the Description field at the bottom of the Commit window, enter Loaded Lab 2
Starting Config.
Leave the remaining settings unchanged and click Commit.

Wait until the Commit process is complete.


A Commit Status window should open that confirms the configuration was committed
successfully.

© 2017-2020 Palo Alto Networks, Inc. Page 17


Click Close to continue.

Configure the Update Server and DNS Server


The DNS server configuration settings are used for all DNS queries that the firewall initiates
in support of FQDN Address objects, logging, and firewall management.
In the web interface, select Device > Setup > Services.

Click the Services gear icon to open the Services window.


Set the Primary DNS Server to 4.2.2.2 and the Secondary DNS Server to
192.168.50.53.
Verify that the Update Server is set to updates.paloaltonetworks.com.

© 2017-2020 Palo Alto Networks, Inc. Page 18


The DNS server settings that you configure do not have to be public servers, but the firewall
needs to be able to resolve hostnames such as updates.paloaltonetworks.com and
wildfire.paloaltonetworks.com to provide various services such as WildFire® or URL filtering.
Select the NTP tab.
Set the Primary NTP Server to 0.pool.ntp.org.
Set the Secondary NTP Server to 1.pool.ntp.org.

Leave the remaining settings unchanged and click OK to close the Services window.

Configure a General Settings


Select Device > Setup > Management.

Click the General Settings gear icon to open the General Settings window.
In the Domain field, enter panw.lab.
In the Login Banner area, enter Authorized Access Only.
In the Latitude field, enter 37.00.

© 2017-2020 Palo Alto Networks, Inc. Page 19


In the Longitude field, enter 122.00.

These coordinates are for Santa Clara, California – headquarters of Palo Alto Networks, Inc.
Leave the remaining settings unchanged and click OK to close the General Settings
window.

Modify Management Interface


Select Device > Setup > Interfaces.
Click the link for Management.

Set the Default Gateway to 192.168.1.1.

© 2017-2020 Palo Alto Networks, Inc. Page 20


Leave the remaining settings unchanged.

At the bottom of the Permitted IP Addresses area, click Add.


In the Permitted IP Addresses field, enter 192.168.0.0/16.
In the Description field, enter Mgt access from these hosts only.

Leave the remaining settings unchanged.


Click OK.

Check for New PAN-OS Software


Select Device > Software.

© 2017-2020 Palo Alto Networks, Inc. Page 21


At the bottom of the window, click the Check Now button.

The firewall will perform a software check with the Palo Alto Networks update servers:

When the process is complete, the firewall displays an updated list of available software
versions:
The list you see will vary from this example. Also, no newer versions of PAN-OS software may be
available at the time you carry out these steps.
Do not upgrade your firewall.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 22


Lab 3 Scenario: Working with Firewall
Configurations and Log Files
Now that you have set up the firewall to allow management access, you need to make certain that
you can save, load, and restore configurations to the device. You also need to familiarize
yourself with the log files available, and with searching through the logs to find specific events.
Because the firewall is not scheduled to be deployed for a few days, you can spend some time on
these tasks without worrying about affecting your production networks.

Lab Objectives
 Load a baseline configuration
 Save a named configuration snapshot
 Export a named configuration snapshot
 Save ongoing configuration changes before a commit
 Revert ongoing configuration changes
 Preview configuration changes
 Examine log files
 Create a log file filter
 Use the Filter Builder

Apply a Baseline Configuration to the Firewall


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.

© 2017-2020 Palo Alto Networks, Inc. Page 23


Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-03.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
Click Close to close the Loading Configuration window.
Click the Commit button at the upper right of the web interface.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Save a Named Configuration Snapshot


In this section, you will save the firewall configuration with a specific filename.
Select Device > Setup > Operations.
Click Save named configuration snapshot.

In the Save Named Configuration window, enter firewall-a-<Today’s Date>.

© 2017-2020 Palo Alto Networks, Inc. Page 24


Click OK.
Click Close in the confirmation window.

Note that this process saved the configuration file to a location on the firewall itself.

Export a Named Configuration Snapshot


You will now export the saved configuration file firewall-a-<Today’s Date> from the
firewall to your workstation.
Under Device > Setup > Operations > Configuration Management, click the link for
Export named configuration snapshot.

© 2017-2020 Palo Alto Networks, Inc. Page 25


In the Export Named Configuration window, use the drop-down list to locate the
firewall-a-<Today’s Date> configuration file.

Click OK.
On the workstation desktop, open the Downloads folder:

The saved file firewall-a-<Today’s Date> appears in the folder.

Close the Downloads folder on the workstation.

Revert Ongoing Configuration Changes


As you work on a firewall configuration, it is theoretically possible to make a mistake. In such a
situation, you may not remember exactly which changes you have made or where the mistake
exists in the configuration, particularly if you have made multiple changes (or multiple
mistakes).
Fortunately, you can revert the firewall to the current running configuration. This process
essentially erases any of the changes you have made to the working configuration and puts the
firewall back at the starting point before you made changes.

© 2017-2020 Palo Alto Networks, Inc. Page 26


In this section, you will change the IP address for one of the firewall’s DNS servers. You will
then use Revert Changes to reset the firewall to the running configuration and remove the
mistake.
In the firewall web interface, select Device > Setup > Services.
Edit the Services section by clicking the gear icon.

Change the value for the Primary DNS Server to 42.2.2.2 (an easy mistake to make).
Click OK to close the Services window.
You can see the mistake in place under the Services section:

In the upper right corner of the web interface, click the Changes button and select Revert
Changes:

© 2017-2020 Palo Alto Networks, Inc. Page 27


In the Revert Changes window, leave the settings unchanged:

The Revert Changes window allows you to select specific elements of the configuration that you
can revert. In this case, because you only made a single change, the Revert Scope shows
device-and-network (which is the portion of the configuration that contains the changes to
the DNS server).
Click Revert.
Click Close in the Message window:

In the Services window, notice that the Primary DNS Server has been reset to the
original value before you mistakenly changed it.

© 2017-2020 Palo Alto Networks, Inc. Page 28


Preview Configuration Changes
Before you commit changes to the firewall, you can compare the impending changes with the
current configuration settings. This process can be useful to make certain you have the right
changes in place before they are implemented on the firewall.
In this section, you will make a minor modification to the firewall and use Preview Changes to
compare the candidate config to the running config.
Modify the SNMP configuration by going to Device > Setup > Operations and clicking
SNMP Setup under the Miscellaneous section:

In the SNMP Setup window, change the Physical Location to Santa Clara, CA,
USA.
For Contact, enter Sherlock Holmes.
For SNMP Community String, enter paloalto42.
Leave the remaining settings unchanged:

Click OK.
Click the Commit button.
In the Commit window, click Preview Changes:

© 2017-2020 Palo Alto Networks, Inc. Page 29


In the Preview Changes window, leave the Lines of Context set to 10:

The Lines of Context setting determines how many lines are displayed before a change and after
a change in the configuration file.
Click OK.
A new browser window appears that displays a side-by-side comparison of the current
running configuration (on the left) and the proposed changes in the candidate
configuration (on the right):

Changes are color coded. Green indicates new elements that have been added. Yellow indicates
existing elements that have been modified. Red indicates existing elements that have been
deleted.
Close the configuration comparison window by clicking the X in the upper right corner.
Click Cancel in the Commit window.

© 2017-2020 Palo Alto Networks, Inc. Page 30


Examine Log Files
Although the information in log files varies, the process of examining and searching log files on
the firewall is the same. In this section, you will examine and navigate the firewall System log.
You can later apply the same tasks and techniques while examining any other log file on the
firewall, such as the Traffic or Threat logs.
Select Monitor > Logs > System:

Hide the Object column by clicking the small drop-down arrow in the right portion of
any column header.
Choose Columns.
Uncheck Object:

The Object column is now hidden:

Hiding and displaying log columns is optional but quite useful. Each log file contains different
columns, some of which you may not need so you can hide them. There may be columns in

© 2017-2020 Palo Alto Networks, Inc. Page 31


certain log tables that are not shown by default, and you can use this process to display hidden
columns that you want to view.
Drag and drop the Severity column to the left-most position in the table:

The table now displays Severity as the first column:

Reordering columns is also optional; however, you may discover that the information in a
specific log file is easier for you to analyze after you customize the columns.

Create a Log File Filter


Scanning through log files row-by-row is tedious. If you are looking for specific information,
you can create filters quickly to display only entries that match certain criteria. All log files
support filters.
In the System log file, click any entry under the Severity column that contains
informational:

© 2017-2020 Palo Alto Networks, Inc. Page 32


The web interface will automatically build a filter statement with the appropriate syntax
to search for all entries that contain informational in the Severity field:

Click the Apply Filter button in the upper right corner of the window:

The System log display will update to show only those entries that contain informational
as the Severity level.
Note that your firewall may only have informational entries in the System log at this point.
Under the Type column, click any entry that contains the word general:

The interface will update the syntax to create a combined filter:

© 2017-2020 Palo Alto Networks, Inc. Page 33


Click the Apply Filter button in the upper right corner of the window:

The interface will update the log file to display only those entries that match both
conditions:

Remove the filter by clicking the Clear Filter button in the upper right corner of the
window:

A good practice is to clear any filters from log file displays before you move to other portions of
the web interface. The next time you examine the same log, it will display all results instead of
only ones you have previously filtered.

© 2017-2020 Palo Alto Networks, Inc. Page 34


Use the Filter Builder
Clicking the link for a specific entry in a log file will automatically create a simple filter. You
can create more complex filters by clicking multiple conditions; however, there are some
situations in which this process will not provide you with the kind of criteria you need to
complete a search. For long or sophisticated searches, you can use the Filter Builder.
In this section, you will use the Filter Builder to search the System log for all entries that have
occurred in the last 10 minutes.
Note the current time on the firewall by selecting the Dashboard tab.
Under the General Information section, scroll to the bottom and locate the Time:

In this example, the firewall time is 20:27:31.


Write the current time down so you do not forget it.
Select Monitor > Logs > System.
Clear any filters you may have in place by clicking the Clear Filter button in the upper
right corner of the window:

Click the Add Filter button in the upper right corner of the window:

© 2017-2020 Palo Alto Networks, Inc. Page 35


In the Add Log Filter window:
A. Under the Connector column, click and.
B. Under the Attribute column, click Severity.
C. Under the Operator column, click equal.
D. Under the Value column, click informational.
E. Click Add.
F. Note that the filter field at the top of the window updates to display the correct syntax
for this filter:

Do not close this window yet!


With the same window open, build the second part of the filter:
A. Under the Connector column, select and.
B. Under the Attribute column, select Time Generated.
C. Under Operator, select greater than or equal to.
D. Under the Value column, use the first drop-down list to select today.
E. Under the Value column, use the second drop-down list to select a time
approximately ten minutes ago (round up or down if you need to).
F. Click Add.

© 2017-2020 Palo Alto Networks, Inc. Page 36


G. Note that the filter is updated to reflect the additional syntax:

In the Add Log Filter window, click Apply.


Your filter will appear in the System log syntax field:

The time and date for your filter will differ from the example shown here.
Click the Apply Filter button in the upper right corner of the window:

© 2017-2020 Palo Alto Networks, Inc. Page 37


The System log display will update to show you only entries that have been generated
after the time you specified.
Although you used the System log as the basis for this exercise, the process of creating filters is
the same throughout all Palo Alto Networks firewall log files. The Filter Builder also is available
to use in all log file tables.
Clear the filter by clicking the Clear Filter button in the upper right corner of the
window:

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 38


Lab 4 Scenario: Working with Firewall
Administrator Accounts
When you deploy the firewall into your production network, you need to make sure that other
members of your team have administrative access to the device. You want to leverage an existing
LDAP server that maintains account and password information for members of your team.
However, your organization recently merged with another company whose administrative
accounts are maintained in a RADIUS database.
No one has had time yet to migrate all the accounts from RADIUS into LDAP, so you need to
configure the firewall to check both LDAP and RADIUS to authenticate an account when an
administrator logs in.

Lab Objectives
 Load a baseline configuration
 Create a local firewall administrator account
 Configure an LDAP Server Profile
 Configure a RADIUS Server Profile
 Configure an LDAP Authentication Profile
 Configure a RADIUS Authentication Profile
 Configure an Authentication Sequence
 Create non-local firewall administrator accounts

© 2017-2020 Palo Alto Networks, Inc. Page 39


Apply a Baseline Configuration to the Firewall
To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-04.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
Click Close to close the Loading Configuration window.
Click the Commit button at the upper right of the web interface.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Create a Local Database Authentication Profile


Create a Local Database Authentication Profile by selecting Device > Authentication
Profile.
Click Add at the bottom of the window.
Under the Authentication tab, enter Local-database for the Name.
For Type, use the drop-down list to select Local Database.
Leave the remaining settings unchanged.

© 2017-2020 Palo Alto Networks, Inc. Page 40


Select the tab for Advanced.
In the Allow List section, click Add.
Select all.
Leave the remaining settings unchanged.

The Allow List entries allow you to select individual members of the local database if you wish to
limit access to the firewall by specific administrators. By selecting all, you allow any
administrator accounts in the local database to access the firewall.
Click OK.

Create a Local User Database Account


In this section, you will create a new entry in the Local User Database on the firewall. This entry
will be for a new team member, adminBob.
Select Device > Local User Database > Users.
In the bottom left corner of the window, click Add.
For Name, enter adminBob.
Enter Pal0Alt0! for Password and Confirm Password.

© 2017-2020 Palo Alto Networks, Inc. Page 41


Leave the remaining settings unchanged.

Click OK.

Create an Administrator Account


In this section, you will create an administrator account for adminBob. The adminBob
account will use the Local-database Authentication Profile.
Create an Administrator Account from a Local Database user by selecting Device >
Administrators.
Click Add at the bottom of the window.
For Name, enter adminBob.
For Authentication Profile, use the drop-down list to select Local-database.
Leave the remaining settings unchanged.

Note that when you select Local-database for the Authentication Profile, there is no option to
enter a Password for the administrator. The password information for this account is maintained
in the Local-database on the firewall.
Click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 42


Click the Commit button at the upper right of the web interface:

A Commit window should open.


In the Description field at the bottom of the Commit window, enter Configured new
local admin account – by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Log out of the firewall web interface by clicking the Logout button in the bottom left
corner of the window.

Log back into the firewall with adminBob as the Username and Pal0Alt0! as the
Password.
Close any welcome messages that appear.
Select Monitor > System.
Look for an entry with Type auth.

If you do not see an entry in the System log indicating a successful authentication for adminBob,
you can use a filter ( subtype eq auth ) as the syntax.
Note that the entry in the firewall system log indicates that adminBob was successfully
authenticated against the Local-database.
Log out of the firewall.
Log back into the firewall with the admin/Pal0Alt0! credentials.

Configure LDAP Authentication


Your organization uses an LDAP server to maintain a database of users, including network
administrators. Your team of security personnel is growing each month and you want to
leverage the existing LDAP server to authenticate administrators when they attempt to log
into the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 43


The first step in this process is to define an LDAP server profile which contains specific
information that the firewall can use when sending queries for authentication.
Select Device > Server Profiles > LDAP.
At the bottom of the window, click Add.
For Profile Name, enter LDAP-Server-Profile.
Under the Server List section, click Add.
In the Name field, enter ldap.panw.lab.
In the LDAP Server field, enter 192.168.50.89.
Leave the Port field set to 389.
Under the Server Settings section, set the Type to other.
Enter dc=panw,dc=lab for Base DN.
Enter cn=admin,dc=panw,dc=lab for Bind DN.
Enter Pal0Alt0! for Password and Confirm Password.
Uncheck the option for Require SSL/TLS secured connection.
Leave the remaining settings unchanged.

Click OK to create the LDAP Server Profile.


With your LDAP Server Profile in place, you will now create an Authentication Profile and
reference the LDAP Server Profile you just created.

© 2017-2020 Palo Alto Networks, Inc. Page 44


Select Device > Authentication Profile.
Click the Add button at the bottom of the window.
For Name, enter LDAP-Auth-Profile.
Under the Authentication tab, use the Type drop-down list to select LDAP.
Under Server Profile, use the drop-down list to select LDAP-Server-Profile.

Select the Advanced tab.


Under the Allow List section, click Add.
Select all.

© 2017-2020 Palo Alto Networks, Inc. Page 45


Leave the remaining settings unchanged.

Click OK.
Create a new administrator by selecting Device > Administrators.
Click Add.
For Name, enter adminSally.
For Authentication Profile, use the drop-down list to select LDAP-Auth-Profile.
Leave the remaining settings unchanged.

The adminSally account is one which exists in the LDAP server.

© 2017-2020 Palo Alto Networks, Inc. Page 46


Click OK.
Click the Commit button at the upper right of the web interface:

A Commit window should open.


In the Description field at the bottom of the Commit window, enter Configured LDAP
Server and Auth Profile – by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Log out of the firewall by clicking the Logout button in the bottom left corner of the
window.
Log back into the firewall with adminSally as the Username and Pal0Alt0! as the
Password.
Close any Welcome windows that appear.
Select Monitor > System.
Look for an entry with Type auth.

If you do not see an entry in the System log indicating a successful authentication for
adminSally, you can use a filter ( subtype eq auth ) as the syntax.
Note that the entry in the firewall system log indicates that adminSally was
successfully authenticated against the LDAP-Auth-Profile.
Log out of the firewall.
Log back into the firewall with the admin/Pal0Alt0! credentials.

© 2017-2020 Palo Alto Networks, Inc. Page 47


Configure RADIUS Authentication
Your organization has recently acquired another company. The newly acquired company
maintains all network administrator accounts in a RADIUS server. You need to incorporate
RADIUS authentication for the firewall so the new network administrators who have joined
your team can access the firewall for management purposes.
Create a RADIUS server profile by selecting Device > Server Profiles > RADIUS.
Click Add.
For Name, enter RADIUS-Server-Profile.
For Authentication Protocol, use the drop-down list to select CHAP.
Note: Never use CHAP in a production environment because it not secure. We are using it in the
lab for the sake of simplicity.
Under the Servers section, click Add.
For the server Name field, enter radius.panw.lab.
For the RADIUS Server field, enter 192.168.50.150.
Enter Pal0Alt0! for Secret and Confirm Secret.
Leave the Port set to 1812.
Leave the remaining settings unchanged.

© 2017-2020 Palo Alto Networks, Inc. Page 48


Click OK.
Create a RADIUS Authentication Profile by selecting Device > Authentication
Profile.
Click Add.
For Name, enter RADIUS-Auth-Profile.
For Type, select RADIUS.
For Server Profile, select RADIUS-Server-Profile.
Leave the remaining settings unchanged.

Select the Advanced tab.


Under the Allow List section, click Add.
Select all.

© 2017-2020 Palo Alto Networks, Inc. Page 49


Leave the remaining settings unchanged.

Click OK.
Create an administrator account for adminHelga (who has recently joined your team from
the acquired company) by selecting Device > Administrators.
Click Add.
For Name, enter adminHelga.
For Authentication Profile, select RADIUS-Auth-Profile.
Leave the remaining settings unchanged.

© 2017-2020 Palo Alto Networks, Inc. Page 50


Click OK.
Click the Commit button at the upper right of the web interface:

A Commit window should open.


In the Description field at the bottom of the Commit window, enter Configured
RADIUS Server and Auth Profile – by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Log out of the firewall by clicking the Logout button in the bottom left corner of the
window.
Log back into the firewall with adminHelga as the Username and Pal0Alt0! as the
Password.
Close any Welcome windows that appear.
Select Monitor > System.
Look for an entry with Type auth.

If you do not see an entry in the System log indicating a successful authentication for
adminHelga, you can use a filter ( subtype eq auth ) as the syntax.
Note that the entry in the firewall system log indicates that adminHelga was
successfully authenticated against the RADIUS-Auth-Profile.
Log out of the firewall.
Log back into the firewall with the admin/Pal0Alt0! credentials.

Configure an Authentication Sequence


Since the acquisition, some administrator accounts exist in LDAP and other accounts exist in
RADIUS. With administrator accounts in these two different systems, you need to configure
the firewall so that it can check both external databases when an administrator attempts to
log in.
You will accomplish this by creating an Authentication Sequence. The sequence will instruct
the firewall to check an account against LDAP first and then against RADIUS if the account
does not exist in LDAP (or if the LDAP server is unavailable).

© 2017-2020 Palo Alto Networks, Inc. Page 51


Select Device > Authentication Sequence.
Click Add.
For Name, enter LDAP-then-RADIUS.
Under the Authentication Profiles section, click Add.
Select LDAP-Auth-Profile.
Click Add again.
Select RADIUS-Auth-Profile.
Leave the remaining settings unchanged.

Note the Move Up and Move Down buttons. These allow you to change the order of the
Authentication Profiles if necessary. In this example, the firewall will use the LDAP-Auth-Profile
first when an administrator logs in to attempt authentication; if the user account does not exist
in LDAP (or if the LDAP server is unavailable), the firewall will use the RADIUS-Auth-Profile to
attempt authentication.
Click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 52


Click the Commit button at the upper right of the web interface:

A Commit window should open.


In the Description field at the bottom of the Commit window, enter Configured
authentication sequence – by <Your Initials>.
Leave the remaining settings unchanged and click Commit.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 53


Lab 5 Scenario: Connecting the Firewall to
Production Networks
In preparation for deployment, you need to connect the firewall to the appropriate production
networks. You already have cabled the firewall interfaces to the appropriate switch ports in the
data center. In this section, you will configure the firewall with Layer 3 IP addresses and a
virtual router. You also will create security zones that divide your network into separate logical
areas so that you have more control over traffic from one segment to another.
When you have the configuration in place on the firewall, you will use ping from different
devices to verify connectivity between all the segments.

© 2017-2020 Palo Alto Networks, Inc. Page 54


Lab Objectives
 Load a baseline configuration
 Create Layer 3 interfaces
 Create a virtual router
 Segment your production network using security zones
 Test connectivity from firewall to hosts in each security zone
 Create Interface Management Profiles

Apply a Baseline Configuration to the Firewall


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-05.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
Click Close to close the Loading Configuration window.
Click the Commit button at the upper right of the web interface.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Create Layer 3 Network Interfaces


In the following sections, you will create Layer 3 interfaces on the firewall that will provide
basic network connectivity to your production networks. You have a network with users
(192.168.1.0/24), a network with production servers (192.168.50.0/24) and a network connecting
the firewall to an upstream internet router (203.0.113.0/24). The following diagram provides
details.

© 2017-2020 Palo Alto Networks, Inc. Page 55


Create a Layer 3 Interface on ethernet1/1
This interface will provide network connectivity to the internet.
Select Network > Interfaces > Ethernet.
Click the link for ethernet1/1.

For Comment, enter Internet connection.


For Interface Type, select Layer3.

© 2017-2020 Palo Alto Networks, Inc. Page 56


Leave the other settings unchanged but do not close this window.

Select the tab for IPv4.


Leave the Type set to Static.
Under the IP heading, click Add.
Enter 203.0.113.20/24
Leave the remaining settings unchanged.

© 2017-2020 Palo Alto Networks, Inc. Page 57


Click OK.

Create a Layer 3 Interface on ethernet1/2


This interface will provide network connectivity to the Users network.
Select Network > Interfaces > Ethernet.
Click the link for ethernet1/2.

For Comment, enter Users network connection.


For Interface Type, select Layer3.
Leave the other settings unchanged but do not close this window.

Select the tab for IPv4.


Leave the Type set to Static.
Under the IP heading, click Add.
Enter 192.168.1.1/24

© 2017-2020 Palo Alto Networks, Inc. Page 58


Leave the remaining settings unchanged.

Click OK.

Create a Layer 3 Interface on ethernet1/3


This interface will provide network connectivity to the Extranet network.
Select Network > Interfaces > Ethernet.
Click the link for ethernet1/3.

© 2017-2020 Palo Alto Networks, Inc. Page 59


For Comment, enter Extranet servers connection.
For Interface Type, select Layer3.
Leave the other settings unchanged but do not close this window.

Select the tab for IPv4.


Leave the Type set to Static.
Under the IP heading, click Add.
Enter 192.168.50.1/24

© 2017-2020 Palo Alto Networks, Inc. Page 60


Leave the remaining settings unchanged.

Click OK.
When complete, your Ethernet table will have three entries:

Note that the Link State indicator icons will remain grey until you commit the configuration.

© 2017-2020 Palo Alto Networks, Inc. Page 61


Create a Virtual Router
In this section, you will create a virtual router and connect your Layer 3 interfaces to it. You also
will define a default gateway for the virtual router itself.
Select Network > Virtual Routers.
Click Add.
For Name, enter VR-1.
Under the General section, click the Add button at the bottom.
Select ethernet1/1.

Click Add again.


Select ethernet1/2.
Click Add again.
Select ethernet1/3.
Leave this window open.

© 2017-2020 Palo Alto Networks, Inc. Page 62


When complete all three interfaces should be listed under the General tab:

The order in which you add these interfaces to the list is not important. You could start by
adding ethernet1/3 and the result will be the same. You are simply adding the appropriate
interfaces to this virtual router.
In the Virtual Router window, click the link on the side for Static Routes.
Under the tab for IPv4, click Add at the bottom of the window.

© 2017-2020 Palo Alto Networks, Inc. Page 63


For Name, enter Firewall-Default-Gateway.
For Destination, enter 0.0.0.0/0.
For Interface, select ethernet1/1.
Leave the Next Hop field set to IP Address.
Below the Next Hop field, enter 203.0.113.1.
Leave the remaining settings unchanged.

This entry is the default route for the firewall. Like all other network hosts, the firewall needs a
default gateway in order to send traffic to unknown networks. The firewall has local connections
to 192.168.1.0, 192.168.50.0 and 203.0.113.0 networks, so it can forward packets to hosts on
those networks directly. However, for any other destination IP addresses (such as 4.2.2.2 for
DNS), this route statement instructs the firewall to forward packets to 203.0.113.1, which is the
internet router.
Click OK on the Virtual Router – Static Route – Ipv4 window.
Click OK on the Virtual Router window.

Segment Your Production Network Using Security Zones


With your network interfaces and virtual router in place, you can now create security zones. You
will create three security zones:

© 2017-2020 Palo Alto Networks, Inc. Page 64


Create the Internet Zone by selecting Network > Zones.

At the bottom of the window, click the Add button.


For Name, enter Internet.

© 2017-2020 Palo Alto Networks, Inc. Page 65


For Type, select Layer3.
Under the Interfaces section, click Add.
Select ethernet1/1.
Leave the remaining settings unchanged.

Zone names are case-sensitive! Make sure you are consistent throughout your configuration
process.
Click OK.
In the Zones window, create the Users_Net Zone by clicking Add.
At the bottom of the window, click the Add button.
For Name, enter Users_Net.
For Type, select Layer3.
Under the Interfaces section, click Add.
Select ethernet1/2.
Notice that ethernet1/1 is no longer listed in the available interfaces. You have assigned
ethernet1/1 to another zone so the firewall will not allow you to assign the same interface to
any other zone.

© 2017-2020 Palo Alto Networks, Inc. Page 66


Leave the remaining settings unchanged.

Click OK.
In the Zones window, create the Extranet Zone by clicking Add.
At the bottom of the window, click the Add button.
For Name, enter Extranet.
For Type, select Layer3.
Under the Interfaces section, click Add.
Select ethernet1/3.
All other Layer 3 interfaces have been assigned to zones so you can choose only ethernet1/3.

© 2017-2020 Palo Alto Networks, Inc. Page 67


Leave the remaining settings unchanged.

Click OK.
You should now have three security zones:

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Created interfaces, virtual router and zones by
<Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 68


Test Connectivity to Each Zone
To verify network connectivity from the firewall to hosts in each zone, you will use an SSH
connection and ping hosts on each network.
On the client desktop, open the Remmina application:

Double-click the entry for Firewall-A:

The Firewall-A connection in Remmina has been pre-configured to provide login credentials to
the firewall so that you do not have to log in each time. This is for convenience in the lab only.
In the CLI connection to the firewall, use the ping command to check network
connectivity to a host in the User_Net Security Zone by using the following command at
the admin@firewall-a> prompt:

admin@firewall-a> ping source 192.168.1.1 host 192.168.1.20

Note the syntax for this command. 192.168.1.1 is the IP address of ethernet1/2 on the firewall.
The command instructs the firewall to use that IP address on ethernet1/2 to ping the host
192.168.1.20. If you do not use the source option, the firewall uses its management interface
address as the source IP.

© 2017-2020 Palo Alto Networks, Inc. Page 69


Allow the ping to continue for three or four seconds and then use Ctrl+C to interrupt the
command:

Use the ping command to check connectivity to a host in the Extranet zone by using the
following command at the admin@firewall-a> prompt :

admin@firewall-a> ping source 192.168.50.1 host 192.168.50.150

192.168.50.1 is the IP address on ethernet1/3 which is assigned to the Extranet security zone.
192.168.50.150 is a server in the Extranet zone.
Allow the ping to continue for three or four seconds and then use Ctrl+C to interrupt the
command:

© 2017-2020 Palo Alto Networks, Inc. Page 70


Use the ping command to check connectivity to a Click the link for ethernet1/1.
host on the Internet by using the following command at the admin@firewall-a> prompt:
admin@firewall-a> ping source 203.0.113.20 host 4.2.2.2

203.0.113.20 is the IP address on ethernet1/1 which is assigned to the Internet security zone.
4.2.2.2 is a DNS server on the Internet zone.
Allow the ping to continue for three or four seconds and then use Ctrl+C to interrupt the
command:

After you have successfully tested network access from the firewall to each network
segment, close the Remmina SSH connection to the firewall by typing exit <Enter>.

Create Interface Management Profiles


Management interface profiles allow you to enable specific network services on individual
firewall interfaces.
Often, your team members need to manage the firewall but do not always have network
connectivity to the management network. In this exercise, you will define two management
interface profiles. One profile will allow ping. You will apply this allow-ping profile to the
Internet interface so that your SecOps team members can ping the external firewall interface for
troubleshooting from outside your organization’s network.
You will create a second management interface profile that allows ping and secure management
traffic including SSH and HTTPS. You will apply this Allow-mgt profile to the User_Net
interface and to the Extranet interface. This profile will allow your SecOps team to manage the
firewall from those networks if they need to.

© 2017-2020 Palo Alto Networks, Inc. Page 71


Test Interface Access before Management Profiles
To illustrate the default behavior of firewall interfaces, you will ping 192.168.1.1 from the client
workstation. You will also attempt to access the firewall CLI by SSH through 192.168.1.1.
Without any Interface Management Profiles in place, both ping and SSH will fail.
Open the Terminal Emulator on the client desktop.

Issue the following command:


C:\home\lab-user\Desktop\Lab-Files> ping 192.168.1.1 <Enter>

You will not get a response.

© 2017-2020 Palo Alto Networks, Inc. Page 72


Wait a few seconds and use Ctrl+C to stop the command.

Attempt to open an SSH connection to the firewall through 192.168.1.1 by issuing the
following command:
C:\home\lab-user\Desktop\Lab-Files> ssh admin@192.168.1.1 <Enter>

After a few seconds, use Ctrl+C to stop the connection because it will not succeed.

Leave the Terminal window open on the client because you will perform these same tests
after applying an Interface Management profile to ethernet1/1.

Define Interface Management Profiles


Select Network > Network Profiles > Interface Management.
Click Add at the bottom of the window.
For Name, enter Allow-ping.
Under the Network Services section, check the box for Ping.

© 2017-2020 Palo Alto Networks, Inc. Page 73


Leave the remaining settings unchanged.

Click OK.
In the Interface Management section, click Add again to create another entry.
For Name, enter Allow-mgt.
Under the Administrative Management Services section, check the boxes for HTTPS
and SSH.
Under the section for Network Services, check Ping, SNMP, Response Pages and
User-ID.

© 2017-2020 Palo Alto Networks, Inc. Page 74


Leave the remaining settings unchanged.

Click OK.

Apply Allow-ping to ethernet1/1


Select Network > Interfaces > Ethernet.
Edit the entry for ethernet1/1.
Select the tab for Advanced.
Under the Other Info section, use the drop-down list for Management Profile to select
Allow-ping.

© 2017-2020 Palo Alto Networks, Inc. Page 75


Leave the other settings unchanged.

This action applies the Allow-ping interface management profile to ethernet1/1. As a result,
ethernet1/1 will answer ping requests.
Note that in a production environment, you may not want to apply an Internet-facing interface
to reply to any type of traffic. Applying this profile in the lab allows you to see how different
profiles can be applied to different interfaces.
Click OK.

Apply Allow-mgt to ethernet1/2


Select Network > Interfaces > Ethernet.
Edit the entry for ethernet1/2.
Select the tab for Advanced.
Under the Other Info section, use the drop-down list for Management Profile to select
Allow-mgt.

© 2017-2020 Palo Alto Networks, Inc. Page 76


Leave the other settings unchanged.

Click OK.
Read the Warning message and click Yes.

Because this interface is connected to one of your internal networks (Users_Net), the risk of
applying this profile is acceptable.

Apply Allow-mgt to ethernet1/3


Select Network > Interfaces > Ethernet.
Edit the entry for ethernet1/3.
Select the tab for Advanced.
Under the Other Info section, use the drop-down list for Management Profile to select
Allow-mgt.
Leave the other settings unchanged.
Click OK.
Click Yes on the Warning message.

© 2017-2020 Palo Alto Networks, Inc. Page 77


When you complete these steps, your interface table should have an entry under the
management profile column for each interface.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Created interface mgt profiles by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Test Interface Access after Management Profiles


With the Allow-mgt Interface Management Profile in place on ethernet1/2, both ping and SSH
will succeed.
From the Terminal Emulator on the client desktop, issue the following command:
C:\home\lab-user\Desktop\Lab-Files> ping 192.168.1.1 <Enter>

The interface will now respond.


Wait a few seconds and use Ctrl+C to stop the command.

© 2017-2020 Palo Alto Networks, Inc. Page 78


Attempt to open an SSH connection to the firewall through 192.168.1.1 by issuing the
following command:

C:\home\lab-user\Desktop\Lab-Files> ssh admin@192.168.1.1 <Enter>

When prompted to accept the RSA key fingerprint, type yes <Enter>.
For password, enter Pal0Alt0! <Enter>.
The firewall will present the CLI interface.

Close the SSH connection to the firewall by typing exit <Enter>.


Close the Terminal window by typing exit <Enter>.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 79


Lab 6: Cyberattack Lifecycle

No lab exercise is associated with this module


.

© 2017-2020 Palo Alto Networks, Inc. Page 80


Lab 7 Scenario: Configuring Security Policy
Rules and NAT Policy Rules
You have the firewall deployed and connected to all the appropriate networks. The next step is to
create Security policy rules and NAT policy rules. You must allow hosts in the Users_Net zone
to communicate with hosts in the Extranet zone and with hosts in the Internet zone.
You also need to allow hosts in the Extranet zone to communicate with hosts in the Internet
zone.
You also will create Network Address Translation rules to allow hosts in the private network
spaces (192.168.1.0/24 and 192.168.50.0/24) to reach hosts on the internet. You will use an
interface IP address on the firewall as the source for outbound NAT.
After you have all these components in place, you will generate test traffic and examine firewall
logs.

© 2017-2020 Palo Alto Networks, Inc. Page 81


Lab Objectives
 Configure a Security policy rule to allow access from Users_Net to Extranet
 Test access from client to Extranet servers
 View the Traffic log
 Examine policy Rule Hit Count
 Reset rule hit counts
 Customize policy tables
 Manage the Policy Ruleset
 Enable intrazone and interzone logging
 Configure source NAT
 Configure destination NAT

Apply a Baseline Configuration to the Firewall


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-07.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
Click Close to close the Loading Configuration window.
Click the Commit button at the upper right of the web interface.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Create Security Policy Rule


You need to allow network traffic from the Users_Net security zone to the Extranet security
zone so that employees can access various business applications. In this section, you will
create a Security Policy rule to allow access between these two zones.

© 2017-2020 Palo Alto Networks, Inc. Page 82


Select Policies > Security.
Click Add at the bottom of the window.
Under the tab for General, in the Name field, enter Users_to_Extranet.
For Description, enter Allows hosts in Users_Net zone to access servers
in Extranet zone.
Leave the other settings unchanged:

© 2017-2020 Palo Alto Networks, Inc. Page 83


Descriptions are optional but highly recommended. It may take you a few extra moments to
enter an accurate Description during these labs, but if you adhere to the practice in the labs, you
will be more likely to carry out this best practice when you return to work.
Select the tab for Source.
Under the Source Zone section, click Add.
Select Users_Net.
Leave the remaining settings unchanged.

Select the tab for Destination.


Under the section for Destination Zone, click Add.
Select Extranet.
Leave the other settings unchanged.

© 2017-2020 Palo Alto Networks, Inc. Page 84


Select the tab for Application.
Do not make any changes to these settings but note that the Any box is checked.

Later in this course, we will cover Applications and how to use them in Security policy rules.
Select the tab for Service/URL Category.
Do not make any changes to the settings in this tab but note that the Service is set to
application-default.

The application-default setting instructs the firewall to allow an application such as web-
browsing as long as that application is using the predefined service (or destination port). For an
application like web-browsing, the application default service is TCP 80; for an application such
as SSL, the application default service is TCP 443. We will spend a great deal of time later in the
course discussing Applications and the application-default setting.
Select the tab for Actions.

© 2017-2020 Palo Alto Networks, Inc. Page 85


You do not need to make any changes in this section but note that the Action is set to
Allow by default.

When you create a new Security policy rule, the Action is automatically set to Allow. If you are
creating a rule to block traffic, make sure you select the Actions tab and change the Action
before you commit the rule.
Click OK on the Security Policy Rule window.
The new Security policy rule appears in the table:

The rule appears above the two preconfigured entries intrazone-default and interzone-default.
These two rules always appear at the bottom of the ruleset.

Commit the Configuration


Click the Commit button at the upper right of the web interface.

© 2017-2020 Palo Alto Networks, Inc. Page 86


For Description, enter Created sec rule Users_Net to Extranet by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Modify Security Policy Table Columns


You can customize the information presented in the Security Policy table to fit your needs. In
this section, you will hide some of the columns and display others that may be of more
interest. You will also move columns around and use the Adjust Column feature.
Click the small drop-down icon next to the Name column in the Security Policy table.

This icon is available next to all column headers.


Choose Columns and note the available columns that you can hide or display in this
table.

© 2017-2020 Palo Alto Networks, Inc. Page 87


Note that the column list in this image has been cropped and wrapped to make it clearer in the
lab guide.
Uncheck the following item:
• Options
Drag and drop the Action column from its current location so that it appears between the
Name column and the Tag column.

Note: These changes are optional. You do not have to show or hide columns or rearrange items
in any of the firewall tables. However, you may find that there are certain columns in certain
tables that you never use, and you can hide them to provide more room in the table. You may
also find that there are certain columns that you scan frequently, and you can move those to
locations that are easier to see. You can use these same steps to show, hide or move columns in
all firewall tables.
At the top of the Name column, click the drop-down icon again and choose Adjust
Columns.

This action will resize the displayed columns to best fit in the browser window.

© 2017-2020 Palo Alto Networks, Inc. Page 88


Test New Security Policy Rule
To make certain your security Policy rule functions, open a terminal window on the client
host.
Use the following command to ping 192.168.50.80, which is the IP address of a web
server in the Extranet zone.

C:\home\lab-user\Desktop\Lab-Files> ping 192.168.50.80 <Enter>

After several replies, use Ctrl+C to stop the ping.

If you see a reply from 192.168.50.80, then your Security policy rule is configured correctly! If
not, review the previous steps and try this test again.
On the client workstation, open the Firefox browser.
Use the bookmark bar to choose Extranet > Extranet:

© 2017-2020 Palo Alto Networks, Inc. Page 89


You should see a webpage displayed by the server.

Close the Firefox web browser.

Examine Rule Hit Count


With your rule successfully in place, you can now examine hit counters in the Security policy
rule table. These counters can be useful for troubleshooting. If a rule is not being hit, you may
need to modify it.
In the firewall web interface, select Policies > Security.
Scroll to the right and locate the column for Hit Count.

Note: This image has been cropped to fit better on the page. The Hit Count column in your
firewall Security policy rule list will be further to the right than is displayed here.

© 2017-2020 Palo Alto Networks, Inc. Page 90


Note the number of Hits on this rule.
Return to the terminal window on the desktop of your client.
Ping the server again by issuing the following command:
C:\home\lab-user\Desktop\Lab-Files> ping 192.168.50.80 <Enter>

After several replies, use Ctrl+C to stop the ping.

Return to the firewall web interface and update the Security policy rules table by clicking
the Refresh button in the upper right corner of the window.

Note the increase in the Hit Count for your Security policy rule.

Reset the Rule Hit Counter


Rule hit counts are very useful to track whether or not a rule is configured correctly. You can
reset the counters for all Security policy rules or for a single rule. In this section, you will reset
the counters for the Users_to_Extranet rule.
Select Policies > Security.
Highlight the entry for Users_to_Extranet but do not open it.

© 2017-2020 Palo Alto Networks, Inc. Page 91


At the bottom of the window, select Reset Rule Hit Counter > Selected rules.

This action does not require a commit


The Rule Usage Hit Count is set to 0.

Examine the Traffic Log


The Traffic Log contains information about sessions that the firewall allows or blocks. In this
section, you will examine the Traffic Log to locate entries for sessions between the Users_Net
zone and the Extranet zone.
Select Monitor > Logs > Traffic.

Click the drop-down icon next to Receive time and choose Columns.
Uncheck the following items to hide their columns:
• Type
• Source Dynamic Address Group
• Destination Dynamic Address Group
• Dynamic User Group

© 2017-2020 Palo Alto Networks, Inc. Page 92


This is not a requirement, but we will not be using information from these columns in any lab for
this course.
From the terminal window on the desktop, ping an address on the internet by issuing the
following command:
C:\home\lab-user\Desktop\Lab-Files> ping 4.2.2.2 <Enter>

You will not get a reply, so after several seconds, use Ctrl+C to stop the ping.

Examine the traffic log again and use a simple filter to see if there are any entries for this
session that failed.
Select Monitor > Traffic.

© 2017-2020 Palo Alto Networks, Inc. Page 93


In the filter field, enter the following text exactly as it appears here:
( addr.dst in 4.2.2.2 )

Filters are case sensitive so be precise! Also, note that there is a space after the first
parentheses mark and right before the last parentheses mark.
Click the Apply filter button in the upper right corner of the window (or you can press
the Enter key).

The Traffic log will update the display but there are no matching entries.

© 2017-2020 Palo Alto Networks, Inc. Page 94


Answer the following question:
Why there are no entries in the Traffic log for your ping session to 4.2.2.2?

Write down your answer in the field shown or on notepaper in class.

Enable Logging for Default Rules


If you were unable to explain why the firewall did not log your ping session to an external
address, you are not alone. Most of the students in class probably did not figure it out either.
There are two reasons:
• First, you do not have a Security policy rule in place to allow traffic from the Users_Net
zone to the Internet zone. As the firewall examines the ping session, the only rule that
matches is the interzone-default, which denies any traffic from one zone to another. The
ping session matches this rule; however, there are no entries in the Traffic log indicating
the match.
• Second, remember that traffic that hits the interzone-default rule is not automatically
logged. You must manually change a setting on this rule to see entries in the Traffic log.
You will enable this setting now and perform the test again.

Select Policies > Security.


Highlight the interzone-default entry in the Policy list but do not open it.
Click the Override button at the bottom of the window.
Select the Actions tab.
Place a check in the box for Log at session end.
Leave the remaining settings unchanged.

Click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 95


Commit the Configuration
Click the Commit button at the upper right of the web interface.
For Description, enter Enabled log at session end on default rule by
<Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Ping A Host on the Internet


Now that you have enabled Log at session end for the default Security policy rules, ping a host
on the internet and examine the Traffic log to see the results.
From the Terminal window on the client desktop, ping an address on the Internet by
issuing the following command:
C:\home\lab-user\Desktop\Lab-Files> ping 4.2.2.2 <Enter>

You will not get a reply, so after several seconds, use Ctrl+C to stop the ping.

Examine the traffic log again and use a simple filter to see if there are any entries for this
session that failed.
Select Monitor > Traffic.

© 2017-2020 Palo Alto Networks, Inc. Page 96


In the filter field, enter the following text exactly as it appears here:
( addr.dst in 4.2.2.2 )

Your filter may already be in place from early.


Click the Apply Filter button in the upper right corner of the window (or you can press
the Enter key).

The Traffic log will update the display and you should see entries matching the filter.
You can see that the sessions are hitting the interzone-default rule.

With Log at session end enabled, the firewall records hits on the intranet-default rule so that
you can see information about sessions which miss all previous rules.
Click the X icon to clear the filter from the log filter text box.

© 2017-2020 Palo Alto Networks, Inc. Page 97


Create Security Rules for Internet Access
In this section, you will create Security policy rules to allow hosts in your network to access the
Internet. You need to create a rule for hosts in the Users_Net security zone to access hosts in the
Internet security zone. You also need to create a rule to allow hosts in the Extranet security zone
to access hosts in the Internet security zone.

Create Users to Internet Security Policy Rule


Select Policies > Security.
Click Add at the bottom of the window.
Under the tab for General, in the Name field, enter Users_to_Internet.
For Description, enter Allows hosts in Users_Net zone to access
Internet zone.

© 2017-2020 Palo Alto Networks, Inc. Page 98


Leave the other settings unchanged:

Select the tab for Source.


Under the Source Zone section, click Add.
Select Users_Net.
Leave the remaining settings unchanged.

Select the tab for Destination.


Under the section for Destination Zone, click Add.
Select Internet.

© 2017-2020 Palo Alto Networks, Inc. Page 99


Leave the other settings unchanged.

Select the tab for Application.


Do not make any changes to these settings but note that the Any box is checked.

Select the tab for Service/URL Category.

© 2017-2020 Palo Alto Networks, Inc. Page 100


Do not make any changes to the settings in this tab but note that the Service is set to
application-default.

Select the tab for Actions.


Make certain that the Action is set to Allow.

Click OK on the Security Policy Rule window.

© 2017-2020 Palo Alto Networks, Inc. Page 101


The new Security policy rule appears in the table:

Create Extranet to Internet Security Policy Rule


You also need to create a Security policy rule to allow servers in the Extranet security zone to
access hosts in the Internet security zone.
Select Policies > Security.
Click Add at the bottom of the window.
Under the tab for General, in the Name field, enter Extranet_to_Internet.
For Description, enter Allows hosts in Extranet zone to access Internet
zone.
Leave the other settings unchanged:

Select the tab for Source.


Under the Source Zone section, click Add.
Select Extranet.

© 2017-2020 Palo Alto Networks, Inc. Page 102


Leave the remaining settings unchanged.

Select the tab for Destination.


Under the section for Destination Zone, click Add.
Select Internet.
Leave the other settings unchanged.

Select the tab for Application.

© 2017-2020 Palo Alto Networks, Inc. Page 103


Do not make any changes to these settings but note that the Any box is checked.

Select the tab for Service/URL Category.


Do not make any changes to the settings in this tab but note that the Service is set to
application-default.

Select the tab for Actions.

© 2017-2020 Palo Alto Networks, Inc. Page 104


Make certain that the Action is set to Allow.

Click OK on the Security Policy Rule window.


The new Security policy rule appears in the table:

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Created security policy rules by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 105


Ping Internet Host from Client A
To verify that your Security Policy rule is allowing traffic, you will ping an Internet host from
the client workstation and examine the Traffic log to see the results.
From the Terminal window on the client desktop, ping an address on the internet by
issuing the following command:

C:\home\lab-user\Desktop\Kab-Files> ping 4.2.2.2 <Enter>

You will not get a reply, so after several seconds, use Ctrl+C to stop the ping.

Examine the traffic log again and use a simple filter to see if there are any entries for this
session that failed.
Select Monitor > Traffic.
In the filter field, update the syntax to include the application ping::
( addr.dst in 4.2.2.2 ) and ( app eq ping )

© 2017-2020 Palo Alto Networks, Inc. Page 106


Click the Apply filter button in the upper right corner of the window (or you can press
the Enter key).

The Traffic log will update the display and you should see entries matching the filter.
You can see that the sessions are hitting the Users_to_Internet rule.

Answer the following question:


Can you explain why your ping session from the client to the Internet host did not get a
reply even though the firewall is allowing the traffic?

For a hint, look at the title of the next section.


Write down your answer in the field shown or on notepaper in class.

Create a Source NAT Policy


You must create entries in the firewall’s NAT Policy table in order to translate traffic from
internal hosts (often on private networks) to a public, routable address (often an interface on
the firewall itself). NAT rules provide address translation and are different from Security
policy rules, which allow and deny packets. You can configure a NAT policy rule to match a
packet’s source and destination zone, destination interface, source and destination address,
and service.
In your previous ping test to an Internet host, the ping traffic from your client is allowed by
the Security Policy rule, but the packets leave the firewall with a non-routable source IP
address from the private network of 192.168.1.0/24.

© 2017-2020 Palo Alto Networks, Inc. Page 107


In this section, you will create a NAT policy rule to translate traffic from the private networks
in the Users_Net and Extranet security zones to a routable address. You will use the same
interface IP address on the firewall (203.0.113.20) as the source IP for outbound traffic from
both Users_Net and Extranet hosts.

In the web interface, select Policies > NAT.


Click Add to define a new source NAT policy.
The NAT Policy Rule configuration window should open.
Configure the following:

Parameter Value
Name Type Inside_Nets_to_Internet
NAT Type Verify that ipv4 is selected
Description Type Translates traffic from Users_Net and
Extranet to 203.0.113.20 outbound to
Internet

© 2017-2020 Palo Alto Networks, Inc. Page 108


Click the Original Packet tab and configure the following:

Parameter Value
Source Zone Click Add and select the Users_Net zone
Click Add and select the Extranet zone
Destination Zone Select Internet from the drop-down list
Destination Interface Select ethernet1/1 from the drop-down list
Service Verify that the any is selected
Source Address Verify that the Any check box is selected
Destination Address Verify that the Any check box is selected

This section defines what the packet will look like when it reaches the firewall. Note that we are
using a single NAT rule to translate both source zones to the same interface on the firewall. You
could accomplish this same task by creating two separate rules – one for each source zone – and
using the same external firewall interface.

© 2017-2020 Palo Alto Networks, Inc. Page 109


Click the Translated Packet tab and configure the following under the section for
Source Address Translation:

Parameter Value
Translation Type Select Dynamic IP And Port from the drop-down list
Address Type Select Interface Address from the drop-down list
Interface Select ethernet1/1 from the drop-down list
IP Address Select 203.0.113.20/24 from the drop-down list. (Make sure
that you select the interface IP address from the drop-down
list and do not type it.)

This section defines how the firewall will translate the packet.
Note: You are configuring only the Source Address Translation part of this window. Leave the
destination address translation Translation Type set to None.
Click OK to close the NAT Policy Rule configuration window.
Verify that your configuration is like the following:

Note that some columns have been hidden in the image.

© 2017-2020 Palo Alto Networks, Inc. Page 110


Commit the Configuration
Click the Commit button at the upper right of the web interface.
For Description, enter Created NAT policy rules by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Verify Internet Connectivity


In this section, you will test the configuration of your NAT and Security policies.
From the Terminal window on the client desktop, ping an address on the internet by
issuing the following command:
C:\home\lab-user\Desktop\Lab-Files> ping 4.2.2.2 <Enter>

You should now receive a reply:

After several seconds, use Ctrl+C to stop the ping.


Open the Firefox browser and connect to www.paloaltonetworks.com.
Browse to several other websites to verify that you can establish connectivity to the
Internet security zone.
Close the Firefox browser.
In the Chromium browser, examine the firewall Traffic log by selecting Monitor > Logs
> Traffic.

© 2017-2020 Palo Alto Networks, Inc. Page 111


Clear any filters you have in place by clicking the Clear Filter button in the upper right
corner of the window.

Verify that there is allowed traffic that matches the Security policy rule
Users_to_Internet:

Traffic log entries should be present based on the internet test. A minute or two may elapse for
the log files to be updated. If the entries are not present, click the refresh icon:

Create a Destination NAT Policy


In this section, you will create a NAT address on the firewall using an IP address on the
Users_Net network. The firewall will translate traffic which hits this address to the destination IP
address of the web server in the Extranet Zone.
You will connect from the client host (192.168.1.20) to the NAT IP address on the firewall
(192.168.1.80). The firewall will translate this connection to the DMZ server at 192.168.50.10.

© 2017-2020 Palo Alto Networks, Inc. Page 112


This exercise will help you see how to configure Destination NAT rules.

In the web interface, select Policies > NAT.


Click Add to define a new destination NAT policy rule.
The NAT Policy Rule configuration window should open.
Configure the following:

Parameter Value
Name Type Dest_NAT_To_Web
NAT Type Verify that ipv4 is selected

© 2017-2020 Palo Alto Networks, Inc. Page 113


Click the Original Packet tab and configure the following:

Parameter Value
Source Zone Click Add and select Users_Net
Destination Zone Select Users_Net from the drop-down list
Destination Interface Select ethernet1/2 from the drop-down list
Service Select any from the drop-down list
Destination Address Click Add and manually enter 192.168.1.80

The Original Packet tab defines how the packet will look when it reaches the firewall. When
selecting the Destination Zone, remember that the IP address we are using (192.168.1.80) is one
that resides on the firewall in the Users_Net security zone.
Click the Translated Packet tab and configure the following:

Parameter Value
Destination Address Select Static IP from the drop-down list
Translation
Translation Type
Translated Address Type 192.168.50.80 (address of the Extranet web server)

© 2017-2020 Palo Alto Networks, Inc. Page 114


The Translated Packet tab defines how the firewall will translate a matching packet. Leave the
Source Address Translation section set to None because we are performing only destination
translation in this exercise.
Click OK to close the NAT Policy Rule configuration window.
A new NAT policy rule should display in the web interface.
Verify that your configuration matches the following:

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Created Destination NAT rule by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 115


Test the Connection
In this section you will test the destination NAT policy rule by opening a browser connection to
the NAT IP address 192.168.1.80.
Open the Firefox browser and connect to http://192.168.1.80.
Verify that you can view the web page for the Extranet server:

Close the Firefox browser window:


In the web interface, select Monitor > Logs > Traffic.
Use a filter to locate the entry for Destination IP 192.168.1.80:
( addr.dst in 192.168.1.80 )

Note the Security policy rule that was matched: Users_to_Extranet.


As an alternate method to access the Traffic log in the web interface, select Policies >
Security.

© 2017-2020 Palo Alto Networks, Inc. Page 116


From the drop-down icon next to the Rule name, select Log Viewer:

This process opens the Traffic log and applies a filter automatically to display only those entries
that match the Security policy rule “Users_to_Extranet.”

Click the X icon to clear the filter from the log filter text box.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 117


Lab 8 Scenario: Blocking Packet- and Protocol-
Based Attacks
You want to make certain that the Palo Alto Networks firewall provides protection against Layer
3 and Layer 4 attacks and network probes such as port scans.
You will create a Zone Protection Profile that you can assign to security zones. You also will
create a DoS Protection Profile and DoS policy rules to make certain that you are taking
advantage of all the tools that the firewall has available to block packet-based floods and probes.

Lab Objectives
 Load a baseline configuration
 Configure a Zone Protection Profile to detect and control SYN floods
 Configure a Zone Protection Profile to detect and control reconnaissance scans
 Configure a Zone Protection Profile to detect and control specific IP header options
 Configure a Zone Protection Profile to perform spoofed IP address checking
 Configure a DoS Protection Profile to protect firewall and node resource consumption
 Configure a DoS Protection Profile to detect and control SYN floods

Apply a Baseline Configuration to the Firewall


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-08.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
Click Close to close the Loading Configuration window.
Click the Commit button at the upper right of the web interface:
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 118


Generate SYN Flood Traffic
In this section, you will use a script on the client host in the Users_Net zone to send numerous
TCP SYN packets to a target server in the Extranet zone.
On the client desktop, double-click the folder for Class-Scripts:

Open the folder for EDU-210:

Double-click the icon for SYN Flood:

This script uses the nmap tool to send multiple SYN packets to a server in the Extranet zone.
nping --tcp-connect -p 80 --rate 10000 -c 50 -1 192.168.50.80
Allow the script to complete.
In the web interface, select Monitor > Logs > Traffic.
Do you see the connection attempts? Refresh the web interface, if necessary. Use the
filter (addr.src in 192.168.1.20), if necessary.
You should see incomplete connection attempts from 192.168.1.20 to 192.168.50.80 and port
80 in the Traffic log.

In the web interface, select Monitor > Logs > Threat.


Click the X icon to clear any filters from the log filter text box.
Do you see any threats listed in the log?
Nothing should be logged to the Threat log because no threat protections have been configured
on the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 119


Configure TCP SYN Flood Zone Protection
A Zone Protection Profile can detect and block flood attacks, including a TCP SYN flood.
You will configure a very low SYN flood protection threshold that quickly will trigger flood
events, even with a limited amount of traffic. You will see how flood protection operates.
In the web interface, select Network > Network Profiles > Zone Protection.
Click Add to create a new Zone Protection Profile.
A Zone Protection Profile window should open.
Type User_Net_Profile as the Name of the profile.
On the Flood Protection tab, configure the following:

Parameter Value
SYN check box Select it
Action SYN Cookies
Alarm Rate 5
Activate 10
Maximum 20

Leave the remaining settings unchanged.

These settings are artificially low so that the firewall will implement Zone Protection during the
testing part of the lab.
Click OK to close the Zone Protection Profile window.

© 2017-2020 Palo Alto Networks, Inc. Page 120


Add Zone Protection to Users_Net Zone
After you define the settings for a Zone Protection Profile, you must apply it to the security
zone.
In the web interface, select Network > Zones.
Click Users_Net to edit the zone.
A Zone window should open.
In the bottom left corner of the window, select User_Net_Profile under the Zone
Protection Profile drop-down list:

Click OK to close the Zone window.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Created Zone Protection Profile by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Test TCP SYN Flood Zone Protection


Generate TCP SYN flood traffic again to determine how the flood threshold settings in the
Zone Protection Profile operate. The flood packets will arrive at the firewall’s inside zone,
which is protected by the Zone Protection Profile.
Run the SYN Flood script again, by double-clicking the icon:

Allow the script to complete.


Select Monitor > Logs > Threat.

© 2017-2020 Palo Alto Networks, Inc. Page 121


You should see entries for TCP Flood threat recorded in the log.

Note that in the previous example image, the Severity column has been moved and several
other default columns have been hidden.

Add Reconnaissance to Zone Protection Profile


In this section, you will modify the existing Zone Protection Profile to include protection
against port scans and ping sweeps. An attacker often will use these techniques against hosts
to determine open ports, the version of the services running on the open ports, or the host’s
operating system. The attacker can use this information to plan further attacks.
Select Network > Network Profiles > Zone Protection.
Edit the existing entry for User_Net_Profile.
Go back to the Flood Protection tab and unselect SYN
Select the tab for Reconnaissance Protection.
Modify the TCP Port Scan with the following settings:
Parameter Value
Enable check box Select it
Action Select Block-IP
Note that when you select block-IP as the action, you will
see an overlay menu that allows you to select Track By and
Duration.
For Track By, select source
For Duration, type 2
Interval (sec) 2
Threshold (events) 2

© 2017-2020 Palo Alto Networks, Inc. Page 122


Leave the remaining settings unchanged.

Click OK.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Updated Zone Protection Profile by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Generate a Reconnaissance Port Scan


An attacker often will probe a host to determine its open ports, the version of the services
running on the open ports, or the host’s operating system. The attacker can use this
information to plan attacks.
On the client desktop, double-click the folder for Class-Scripts:

Open the folder for EDU-210:

© 2017-2020 Palo Alto Networks, Inc. Page 123


Double-click the icon for TCP Scan:

This script runs the nmap command to scan 192.168.50.80 for open ports.
The exact syntax for the command is:
nmap –v1 –Pn –T4 --max-retries 1 192.168.50.80
Allow the script to complete.
The scan process will stall, and you will see indications that the scan packets are not
getting through.

After 30 seconds, use Ctrl+C to stop the scan script.


Select Monitor > Logs > Threat.
You should see many SCAN: TCP Port Scan entries recorded in the log.

© 2017-2020 Palo Alto Networks, Inc. Page 124


Update Zone Protection Profile to Include Traceroute
Protection
A Zone Protection Profile can detect and block packet-based attacks, including the use of
specific IP header options such as Record Route.
In the web interface, select Network > Network Profiles > Zone Protection.
Click User_Net_Profile to open the profile.
Click the Packet Based Attack Protection tab.
Click the IP Drop tab, if necessary.
Select the Record Route option on the IP Option Drop panel:

Click OK to close the Zone Protection Profile window.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Updated Zone Protection Profile by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 125


Generate IP Traceroute Traffic
An attacker sometimes can use specific IP header options to perform reconnaissance as a
precursor to an attack. The firewall can be configured to detect and drop IP packets with
specific header options.
On the client desktop, double-click the folder for Class-Scripts:

Open the folder for EDU-210:

Double-click the icon for IP Record Route Ping:

This option in the IP header records the network path from the source host to the destination
host. The Record Route option is not commonly used, and an attacker could use such
information for network reconnaissance.
Allow the script to complete.
The script will stall with 100% packet loss.
In the web interface, select Monitor > Logs > Threat.

Several columns have been hidden in the example.


You should see threat entries named IP Option Record Route generated by the IP packets
containing the Record Route header option.

Configure Spoofed Address Checking Protection


An attacker sometimes can use an unexpected or abnormal IP address as part of an attack.
You can configure the firewall to detect and drop abnormal IP addresses. A Zone Protection

© 2017-2020 Palo Alto Networks, Inc. Page 126


Profile can detect and block packet-based attacks, including the use of spoofed or abnormal IP
addresses.
In the web interface, select Network > Network Profiles > Zone Protection.
Click User_Net_Profile to open the profile.
Click the Packet Based Attack Protection tab.
Click the IP Drop tab, if necessary.
Select the Spoofed IP address check box.

Click OK to close the Zone Protection Profile window.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Updated Zone Protection Profile by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Test Spoofed IP Address Protection Checking


You now will generate traffic with a spoofed source IP address. The Zone Protection Profile
should help the firewall to detect and drop the packets.

© 2017-2020 Palo Alto Networks, Inc. Page 127


On the client desktop, double-click the folder for Class-Scripts:

Open the folder for EDU-210:

Double-click the icon for Spoofed Packets:

This script uses nmap to send a packet to 192.168.50.80 with a source IP address of
192.168.50.10. Because the source IP address does not belong in the Users_Net security zone,
the firewall will drop the packet.
Allow the script to complete.
In the web interface, select Monitor > Logs > Traffic.
This time you should see no log entries from the spoofed source IP traffic because the traffic
was dropped before a session was created
Select Monitor > Logs > Threat.
Although the traffic was dropped by the profile, spoofed address checking is not logged to the
Threat log.

Remove Your Zone Protection Configuration


Remove your Zone Protection Profile configuration to ensure that it does not interfere while
you test a DoS Protection policy and profile.
In the web interface, select Network > Zones.
Click Users_Net to edit the zone.
Select None as the Zone Protection Profile:

© 2017-2020 Palo Alto Networks, Inc. Page 128


Click OK to close the Zone window.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Removed Zone Protection Profile by <Your
Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Open Concurrent Sessions on a Target Host


In this section, you will run a script that uses nmap to open multiple, concurrent sessions from
the client host in the Users_Net zone to a target server in the Extranet zone. The script will
test whether the firewall will allow 10 concurrent sessions to the target host. You will monitor
the results using the Traffic and Threat logs.
On the client desktop, double-click the folder for Class-Scripts:

Open the folder for EDU-210:

Clear the firewall log files by double-clicking on the icon for Clear Firewall Logs:

This script uses the XML API to clear the Threat, Traffic and URL Filtering log files. We are
clearing the log files to make it easier to identify traffic and threats blocked by DoS Protection.
When the script is complete, you can verify that the logs have been cleared by navigating
to Monitor > Threat. The table should be empty.

© 2017-2020 Palo Alto Networks, Inc. Page 129


From the Class-Scripts/EDU-210 folder on the client desktop, double-click the icon for
Concurrent Connections:

The exact syntax for this command is:


nmap --script http-slowloris --max-parallelism 10 192.168.50.80
The command can take 30 minutes to complete. Allow the command to run for at least 3
minutes and then press Ctrl+C to stop command execution.
In the web interface, select Monitor > Logs > Traffic.
Clear any filters you may have in place.
As the command execution progressed, you should see multiple web-browsing log entries for
traffic to multiple ports, but especially to port 80 and 443. The traffic was not blocked by any
Security Profiles or Security policy rules.
Select Monitor > Logs > Threat.
There should be no Threat log entries because nothing has been configured to monitor traffic
for the number of concurrent sessions to a specific target host.

Configure Maximum Concurrent Sessions DoS Protection


A DoS Protection policy and profile can detect when the number of concurrent sessions to a
host has exceeded a specified limit. You will configure a maximum concurrent session limit
for a host in the Extranet zone.
In the web interface, select Objects > Security Profiles > DoS Protection.
Click Add to create a new DoS Protection Profile and configure the following:

Parameter Value
Name protect-session-max
Classified Select it
Resources Protection Click it
tab
Sessions check box Select it
Maximum Concurrent 9
Sessions

© 2017-2020 Palo Alto Networks, Inc. Page 130


Click OK to close the DoS Protection Profile window.
Select Policies > DoS Protection.
Click Add to create a new policy rule and configure the following:

Parameter Value
General tab Click it, if necessary
Name internal-protection
Source tab Click it
Zone Select Users_Net
Destination tab Click it
Zone Select Extranet
Option/Protection tab Click it
Action Select Protect
Classified check box Select it
Profile Select protect-session-max
Address Select destination-ip-only

© 2017-2020 Palo Alto Networks, Inc. Page 131


Click OK to close the DoS Rule window:

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Configured DoS Protection by <Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Test Maximum Concurrent Sessions DoS Protection


You will use the lorisNmap script again to generate multiple, concurrent sessions to the
Linux host in the dmz zone. The host is protected by a DoS Protection policy rule and profile
that should drop any connection requests that exceed the configured maximum number of nine
concurrent sessions to the Linux host.
From the client desktop, double-click the Concurrent Connections icon again:

Allow the command to run for at least three minutes and then press Ctrl+C to stop
command execution.

© 2017-2020 Palo Alto Networks, Inc. Page 132


Select Monitor > Logs > Threat.
You should see Session Limit Event entries in the Threat log because the number of concurrent
connection requests to the protected host has exceeded the configured session maximum limit.

Periodically click the refresh button if the table is initially empty.


Select Objects > Security Profiles > DoS Protection.
Click protect-session-max to edit the profile.
Click the Resources Protection tab and configure the following:

Parameter Value
Sessions check box Deselect it

Click OK to close the DoS Protection Profile window.

Configure TCP SYN Flood DoS Protection


A DoS Protection Profile can detect and block flood attacks to a zone, to a subset of hosts in a
zone, or to a specific host in a zone. You will configure flood protection in both a Zone
Protection Profile and a DoS Protection Profile so that you can see how they interact. You will
configure a higher TCP SYN flood protection threshold in a Zone Protection Profile and a
lower TCP SYN flood protection threshold in the DoS Protection Profile.
In the web interface, select Network > Network Profiles > Zone Protection.
Click User_Net_Profile to edit the profile.
On the Flood Protection tab, configure the following:

Parameter Value
SYN check box Verify that it is selected
Action SYN Cookies
Alarm Rate 1000
Activate 1100
Maximum 1300

The threshold values here are configured with high values to ensure that the lower DoS
Protection Profile thresholds are reached first during testing in a later lab section.

© 2017-2020 Palo Alto Networks, Inc. Page 133


Click the Reconnaissance Protection tab.
For TCP Port Scan, deselect the Enable check box.
This action ensures that you will see TCP Flood events rather than SCAN: TCP Port Scan events in
the Threat log when you test the flood protection settings in a later lab section.

Click OK to close the Zone Protection Profile window.


Select Network > Zones.
Click the Users_Net zone.
On the Zone Protection Profile menu, select User_Net_Profile.

Click OK to close the Zone window.


In the web interface, select Objects > Security Profiles > DoS Protection.
Click protect-session-max and configure the following:

Parameter Value
Flood Protection tab Verify that the tab is selected
SYN Flood check box Select it
Action SYN Cookies

© 2017-2020 Palo Alto Networks, Inc. Page 134


Parameter Value
Alarm Rate 5
Activate Rate 10
Max Rate 20

Click OK to close the DoS Protection Profile window.

Commit the Configuration


Click the Commit button at the upper right of the web interface.
For Description, enter Updated DoS Protection and Zone Protection by
<Your Initials>.
Leave the remaining settings unchanged and click Commit.
Wait until the Commit process is complete.
Click Close to continue.

Test SYN Flood DoS Protection


Use the nmap command to generate multiple, concurrent sessions to the target server in the
Extranet zone. The host is protected by both a Zone Protection Profile and a DoS Protection
Profile that should drop any connection requests that exceed the lowest configured flood
threshold settings. The lower DoS Protection Profile thresholds should be reached first.
From the client desktop, double-click the icon for Concurrent Connections again:

© 2017-2020 Palo Alto Networks, Inc. Page 135


Allow the command to run for at least 3 minutes and then press Ctrl+C to stop command
execution.
Select Monitor > Logs > Threat.
You should see TCP Flood Threat log entries because the number of connection requests to the
target host has exceeded the configured flood threshold maximum in the DoS Protection Profile.
The flood threshold in the DoS Protection Profile is lower than the Zone Protection Profile, so it
should have been triggered first.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 136


Lab 9 Scenario: Blocking Threats from Known-
Bad Sources
You need to make certain that the firewall blocks traffic to and traffic from known malicious IP
addresses, hostnames and domain names. There are numerous external block lists that you may
want to implement on the Palo Alto Networks firewall. You also need to implement your own
custom lists of IP addresses, hostnames and domain names to block traffic based on various
corporate policies.
Upper management is also concerned that some users have been accessing inappropriate web
content from their corporate devices. You need to configure the firewall to block browsing to
certain categories of web traffic including adult and nudity.
You are concerned about users accessing websites that are often the source of malicious files and
content such as viruses and spyware.
In this section, you will explore the options available on the firewall that allow you to block
individual addresses, groups of addresses and lists of addresses. You will also configure the
firewall to block certain categories of websites.

Lab Objectives
 Load a baseline configuration
 Block access to malicious IP addresses using Address objects
 Block access to malicious IP addresses using Address Groups
 Block access to malicious IP addresses using geographic regions
 Block access to malicious IP addresses using an External Dynamic List (EDL)
 Block access to malicious domains using an EDL
 Block access to malicious URLs using the Security policy
 Block access to a malicious URL using a URL Filtering Profile

Apply a Baseline Configuration to the Firewall


To start this lab exercise, load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down list next to the Name text box and select edu-210-10.0-lab-09.xml.
Note the edu-210 portion in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.

© 2017-2020 Palo Alto Networks, Inc. Page 137


Click the Commit link at the upper right of the web interface.
Click Commit again and wait until the commit process is complete.
Click Close to continue.

Test Access to Known Malicious IP Addresses


You can use Security policy rules to block access to known malicious IP addresses. Because
the list of malicious IP addresses can quickly change, you will treat two legitimate IP
addresses as though they are malicious and block access to them.
Note: Although you can block access to specific IP addresses, Palo Alto Networks
recommends that you use a positive enforcement model whenever possible. Use of a positive
enforcement model means that you configure a Security policy to pass what is allowed rather
than what should be blocked, with the assumption that anything not specifically allowed is
blocked by default.
On the client desktop in a Terminal window, type:
nslookup 2600.org
Write down the IP address or copy and paste it into a text document on the Desktop.
This IP address is not malicious.
In the same CMD window, type:
nslookup www.breakthesecurity.com
Write down the IP address or copy and paste it into a text document on the Desktop.
This IP address is not malicious.
In the same CMD window, verify connectivity to the websites by typing:
ping 2600.org
ping www.breakthesecurity.com
You may not get a response to both ping commands, but that will not be a problem.
Type exit <Enter> to close the Terminal window.

Block Access to Malicious IP Addresses Using Address


Objects
In this section, you will create an Address object that contains a list of malicious IP addresses.
You will use this Address object in the Security policy to block access to the malicious IP
addresses.
Be aware that the list of malicious IP addresses quickly changes, so keeping your Address
objects current could be problematic. For this reason, later lab exercises will illustrate more
automated methods to block the current list of malicious IP addresses.

© 2017-2020 Palo Alto Networks, Inc. Page 138


In the web interface, select Objects > Addresses.
Click Add and configure the following:

Parameter Value
Name malicious-ip-address-1
Description 2600.org IP address
Type IP Netmask
(address text box) <IP_address_of_2600.org>

Note that the IP address you enter may be different from the previous example.
Click OK to close the Address window.
Click Add again and configure the following:

Parameter Value
Name malicious-fqdn-1
Type FQDN
(FQDN text box) www.breakthesecurity.com

© 2017-2020 Palo Alto Networks, Inc. Page 139


Click Resolve to verify the correct address list. The IP address might take 2 to 20 seconds
to display. (If the domain does not resolve to an IP address, click OK to close the
window, then re-open the window and click Resolve again.)
This action should display the IP address of www.breakthesecurity.com.
Click OK to close the Address window.
Select Policies > Security.
Click Add to create a new Security policy rule.
On the General tab, type Block-Known-Bad-IPs as the Name.
For Description, enter Blocks traffic to malicious address objects.
Click the Source tab and configure the following:

Parameter Value
Source Zone Users_Net
Extranet
Source Address Any
Click the Destination tab and configure the following:

Parameter Value
Destination Zone Internet
Destination Address Select malicious-fqdn-1 and malicious-ip-address-1

Click the Application tab and verify that Any is selected.


Click the Service/URL Category tab and verify that application-default and Any are
selected.
Click the Actions tab and configure the following:

Parameter Value
Action Deny
Log Setting Log at Session End

Click OK to close the Security Policy Rule window.


A new rule should be added to the Security policy.

© 2017-2020 Palo Alto Networks, Inc. Page 140


Select, but do not open, the Block-Known-Bad-IPs rule in the Security policy.
The rule should be highlighted after it has been selected.

At the bottom of the window, select Move > Move Top to move the rule to the top of the
Security policy.

Verify that the “Block-Known-Bad-IPs” rule is rule number 1.

Commit your configuration changes to the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 141


Test Access to the Blocked IP Address Objects
Test access to the IP addresses contained in the Address objects.
On the desktop in the Terminal Emulator window, type:
ping 2600.org
Use Ctrl+C to stop the ping command after a few seconds.
Next, type:
ping www.breakthesecurity.com
The ping commands should fail with timed-out messages because access to the IP addresses
was blocked by the Address objects in the Security policy.
Use Ctrl+C to stop the ping command after a few seconds.
Navigate to Monitor > Logs > Traffic.
Create and apply a filter to look for traffic that has been denied:
( action eq deny )

You should see two entries indicating that your Block-Known-Bad-IPs Security policy
rule has denied traffic to each host.

Block Access to Malicious IP Addresses Using Address


Groups
You can use Address Groups in Security policy rules to control access to IP addresses. You
can group multiple Address objects in an Address Group and then use just the Address Group
in your Security policy rules. Address Groups are used to shorten and simplify a policy or a
policy rule.

© 2017-2020 Palo Alto Networks, Inc. Page 142


You will create a static Address Group, add two Address objects to the group, and then
modify the Security policy to use the Address Group.
In the web interface, select Objects > Address Groups.
Click Add and configure the following:

Parameter Value
Name Malicious-IP-Group
Description Contains malicious IP address objects
Type Static
Addresses Add malicious-fqdn-1 and malicious-ip-address-1

Click OK to close the Address Group window.


Select Policies > Security.
Click Block-Known-Bad-IPs to edit the rule.
Click the Destination tab.
Select the malicious-fqdn-1 and malicious-ip-address-1 check boxes.
Click Delete.

© 2017-2020 Palo Alto Networks, Inc. Page 143


Click Add and select Malicious-IP-Group:

Click OK to close the Security Policy Rule window.


Commit your configuration changes.

Test Access to the Blocked IP Address Objects


Test access to the IP addresses contained in the Address objects.
On the desktop in the Terminal Emulator window, type:
ping 2600.org
Use Ctrl+C to stop the ping command after a few seconds.
Next, type:
ping www.breakthesecurity.com
Use Ctrl+C to stop the ping command after a few seconds.
Navigate to Monitor > Logs > Traffic.
Apply the same filter your used earlier to look for traffic that has been denied:
( action eq deny )

You should see two more entries indicating that your Block-Known-Bad-IPs Security
policy rule has denied traffic to each host.

© 2017-2020 Palo Alto Networks, Inc. Page 144


Block Access to Malicious IP Addresses by Geographic
Region
You can block access to IP addresses associated with specific geographic regions. This ability
is useful for reducing your attack surface by prohibiting traffic from countries where you have
no legitimate business contacts.
On the client desktop in a Terminal window, type:
nslookup nic.ir
The nic.ir domain is in Iran.
Note the IP address returned in the command.
In the same CMD window, type:
ping nic.ir
Use Ctrl+C to stop the ping command after a few seconds. You may not get a response to the
ping but that will not affect this lab.
Leave the Terminal window open.
In the web interface, select Policies > Security.
Click Block-Known-Bad-IPs to edit the rule.
Update the Description to Blocks traffic to malicious addresses and
regions.
Click the Destination tab and configure the following:

Parameter Value
Destination Address Add IR to the list.

Note that you will need to scroll down the list of available addresses to locate the entry for IR.
Click OK to close the Security Policy Rule window.
Commit your configuration changes to the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 145


Test Access to an IP Address in a Blocked Region
In this section, you will test access to the blocked geographic region configured in the
previous lab section. After you have tested access, you will restore access to the blocked
region.
On the client desktop in the Terminal window, type:
ping nic.ir
The ping will fail.
Use Ctrl+C to stop the ping.
Note the destination IP address.
In the Terminal window, type exit <Enter> to close the window.
Select Monitor > Logs > Traffic.
Clear any filters you currently have in place.
Create and apply a filter using the following syntax to search for traffic to the IP address
of nic.ir:
( addr.dst in 194.225.70.16 )
The IP address in this example may be different from the IP address you must use.
You should see entries indicating that the Security policy rule Block-Known-Bad-IPs
has denied traffic to this IP address.

Block Access to Malicious IP Addresses Using an EDL


You can add a list of malicious IP addresses to a file on an external web server and configure
the firewall to access the list as an EDL. The advantage of this approach is that the malicious
IP address list can be regularly updated without the need to recommit the firewall
configuration, as you would have to do if you updated an Address object or Address Group.
EDLs simplify maintenance of a current list of IP addresses.

© 2017-2020 Palo Alto Networks, Inc. Page 146


In the web interface, select Objects > External Dynamic Lists. Note the three
predefined EDLs contain known malicious and high-risk IP address lists:

Palo Alto Networks maintains and provides these lists.


Click Palo Alto Networks – High risk IP addresses.
The External Dynamic Lists (Read only) window should open.
In the window that opened, read the Description of this list.

© 2017-2020 Palo Alto Networks, Inc. Page 147


Click the List Entries And Exceptions tab. In the space that follows (or on notepaper),
write down three IP addresses on the current list of IP addresses. You will try to ping
these addresses later in this lab exercise.

Note that you can also copy and paste these addresses into a text file on the client Desktop.

Click Cancel to close the External Dynamic Lists (Read Only) window.
Click Add to create another EDL and configure the following:

Parameter Value
Name custom-malicious-ips-edl
Type IP List
Description Contains manually entered IP address list on
web server.
Source http://192.168.50.80/malicious-ips.txt
(The EDL contains only the IP address 192.168.50.11.)
Check for updates Five Minute

The malicious-ips-txt file resides on a web server in the lab environment. This file contains
a single IP address as an example of how the list can be used. You can create a file with dozens
or hundreds of IP addresses to block and use the file as the Source for an External Dynamic List.

© 2017-2020 Palo Alto Networks, Inc. Page 148


Click the Test Source URL button.
The firewall should present a Test Source URL window indicating that it can access the
URL.

Click Close.
Click OK to close the External Dynamic Lists window.

Add the IP List EDLs to the Security Policy


In this section, you will update the Security policy to include External Dynamic Lists.
In the web interface, select Policies > Security.
Click Block-Known-Bad-IPs to edit the rule.
Click the Destination tab and configure the following:

Parameter Value
Destination Zone Internet
Destination Address Add the following to the list:
Palo Alto Networks – Bulletproof IP addresses
Palo Alto Networks – High risk IP addresses
Palo Alto Networks – Known malicious IP addresses

© 2017-2020 Palo Alto Networks, Inc. Page 149


Click OK to close the Security Policy Rule window.
The “Block-Known-Bad-IPs” rule now is configured to block access to the three IP addresses you
wrote down in lab Step 80.
Click Users_to_Extranet to edit the rule.
Click the Destination tab and configure the following:

Parameter Value
Destination Zone Extranet
Destination Address custom-malicious-ips-edl
Negate check box Select it

The malicious-ips-edl EDL contains the IP address of a host in the Extranet zone (192.168.50.11).
When the destination address is used in conjunction with the Negate option, the rule matches
and allows any address in the Extranet zone except the address listed in the EDL.

© 2017-2020 Palo Alto Networks, Inc. Page 150


Click OK to close the Security Policy Rule window.
Notice in the “Users_to_Extranet” rule that “custom-malicious-ips-edl” has a line through it. This
line indicates that the Negate option has been employed for addresses in the list.

Commit your configuration changes to the firewall.

Test Access to IP Addresses Blocked by EDLs


Now you will test access to IP addresses that are listed in the predefined and custom EDLs to
verify that the firewall is blocking the traffic.
On the client desktop, open a Terminal window and type:
ping 192.168.50.11
After 5 seconds, use Ctrl+C to stop the ping.
The ping should fail because the IP address is listed in the custom EDL.

© 2017-2020 Palo Alto Networks, Inc. Page 151


Use ping again, but this time try one of the three IP addresses that you wrote down
earlier in lab Step 60.
These IP addresses were in one of the EDLs predefined by Palo Alto Networks.
After 5 seconds, use Ctrl+C to stop the ping.
Type exit <Enter> to close the Terminal window.
In the firewall web interface, select Policies > Security.
Click Users_to_Extranet to edit the rule.
Click the Destination tab and configure the following:

Parameter Value
Destination Zone Extranet
Destination Address Delete custom-malicious-ips-edl
Negate check box Deselect it

This change will re-enable access to the IP address (192.168.50.11) after the configuration is
committed.

Click OK to close the Security Policy Rule window.


Commit your configuration changes.

Block Access to Malicious Domains Using an EDL


You can add a list of malicious domains to a file on an external web server and then configure
the firewall to access the list as an EDL. The advantage of this approach is that the malicious
domain list can be updated regularly without the need to recommit the firewall configuration.
In the web interface, select Objects > External Dynamic Lists.

© 2017-2020 Palo Alto Networks, Inc. Page 152


Click Add and configure the following:

Parameter Value
Name malicious-domains-edl
Type Domain List
Source http://192.168.50.80/malicious-domains.txt
(The EDL contains the domains quora.com and
producthunt.com.)
Automatically expand Select it
to include subdomains
Check for updates Five Minute

This EDL will be used to block access to the quora.com and producthunt.com domains.

Click OK to close the External Dynamic Lists window.


Click malicious-domains-edl.
The External Dynamic Lists window should open again.

© 2017-2020 Palo Alto Networks, Inc. Page 153


Click Test Source URL to verify that the firewall can access the EDL URL.
A message window should open and state that the source URL is accessible.
Click Close to close the Test Source URL window.
Click OK to close the External Dynamic Lists window.

Add the Domain List EDL to an Anti-Spyware Profile


You can add an EDL containing a domain list to an Anti-Spyware Profile to block access to
malicious domains. You must attach the Anti-Spyware Profile to a Security policy rule that
allows network access. Although the Security policy rule might allow the traffic, the attached
Anti-Spyware Profile will block access to any domains listed in the EDL.
In the web interface, select Objects > Security Profiles > Anti-Spyware.
Select the check box next to the strict Anti-Spyware Profile.
The profile should be highlighted after it has been selected.
Click Clone to clone the profile.

A Clone window should open.


Click OK to close the Clone window.
A new strict-1 Anti-Spyware Profile should have been created.
Click strict-1 to edit the profile.
The Anti-Spyware Profile window should open.
Rename the profile outbound-as.
Click the DNS Policies tab.

© 2017-2020 Palo Alto Networks, Inc. Page 154


Under the External Dynamic Lists section, change the Policy Action drop-down list to
block.

Palo Alto Networks typically recommends the “sinkhole” action, which will be discussed and
used in another lab exercise.
Leave the remaining settings unchanged.
Click OK to close the Anti-Spyware Profile window.

Add the Anti-Spyware Profile to a Security Policy Rule


In this section, you will add the outbound-as Anti-Spyware Profile to the Security policy.
The configuration of the profile will enable the firewall to use malicious domain signatures to
block access to malicious domains.
In the web interface, select Policies > Security.
Click Users_to_Internet to edit the rule.
Click the Actions tab and configure the following:

Parameter Value
Profile Type Profiles
Anti-Spyware outbound-as

© 2017-2020 Palo Alto Networks, Inc. Page 155


Leave the remaining settings unchanged.
Click OK to close the Security Policy Rule window.
Commit your configuration changes.

Test Access to Domains Blocked by EDLs


You will test access to the domains that are listed in the custom EDL. Access should be
denied.
On the client desktop, open a Terminal window and type:
ping quora.com
ping producthunt.com
Use Ctrl+C after a few seconds to halt the ping command.
The ping commands should fail because the domains are listed in the custom EDL and the
custom EDL was added to the outbound-as Anti-Spyware Profile and configured with the “block”
action.
In the Terminal, type exit <Enter> to close the window.

Block Access to Malicious URLs Using the Security Policy


Next you will block access to known-malicious URLs by configuring the firewall’s URL
Filtering feature. You will add URL categories to a Security policy rule configured to block
traffic.
Note: Although you can configure the Security policy to control access to URLs, the URL Filtering
Profile more commonly is used to configure the action that a firewall should take when it
detects a URL. You will configure a URL Filtering Profile in a later lab section.

© 2017-2020 Palo Alto Networks, Inc. Page 156


Clear the firewall log files by double-clicking on the icon for Clear Firewall Logs in the
Class-Scripts/EDU-210 folder:

On the client desktop, open Firefox and browse to hacker9.com, which belongs to the
URL category hacking.
The browser should display a valid webpage.
In Firefox, browse to hidester.com, which belongs to the URL category proxy-
avoidance-and-anonymizers.
The browser should display a valid webpage.
Close the Firefox browser window.
In the web interface, select Policies > Security.
If the URL Category column is not displayed, click the down-arrow menu that appears
next to any column header (hover your pointer over a header to see the Down arrow) and
select Columns > URL Category.
The URL Category column should appear in the web interface.

Click Add to create a new Security policy rule.


On the General tab, type block-known-bad-urls as the Name.
For Description, enter Blocks bad URL categories.

Click the Source tab and configure the following:

© 2017-2020 Palo Alto Networks, Inc. Page 157


Parameter Value
Source Zone Users_Net
Source Address Any

© 2017-2020 Palo Alto Networks, Inc. Page 158


Click the Destination tab and configure the following:
Parameter Value
Destination Zone Internet
Destination Address Any

Click the Application tab and verify that Any is selected.


Click the Service/URL Category tab and configure the following:

Parameter Value
Service application-default
URL Category Add the following:
adult
command-and-control
extremism
hacking
high-risk
malware
nudity
parked
peer-to-peer
phishing
proxy-avoidance-and-anonymizers
questionable
Click the Actions tab and configure the following:

Parameter Value
Action Deny
Log Setting Log at Session End

Click OK to close the Security Policy Rule window.


The new “block-known-bad-urls” rule should be added to the Security policy.

© 2017-2020 Palo Alto Networks, Inc. Page 159


Select, but do not open, the block-known-bad-urls rule in the Security policy.
The rule should be highlighted after it has been selected.

Select Move > Move Top to move the “block-known-bad-urls” rule to the top of the
Security policy:

Commit your configuration changes.

Test Access to URLs Blocked by the Security Policy


In this section, you will test access to URLs that belong to URL categories prohibited by the
Security policy.
On the client desktop, open the Firefox browser and browse to evilzone.org, which
belongs to the URL category hacking.
The browser should display an error message similar to the following example because the URL
category hacking is blocked in the Security policy. If you get a browser window, it was likely a
version cached locally by the browser. Refresh the browser window and access should be
blocked.

© 2017-2020 Palo Alto Networks, Inc. Page 160


In the Firefox browser, browse to hidester.com, which belongs to the URL category
proxy-avoidance-and-anonymizers.
The browser should display an error message because the URL category proxy-avoidance-and-
anonymizers is blocked in the Security policy. If you see a valid page, then refresh your browser
to avoid seeing the locally cached webpage.
Close the Firefox browser window.
Navigate to Monitor > Logs > URL Filtering.
Create and apply a filter to locate entries that have been blocked by the firewall:
( action eq block-url )
You should see multiple entries that have been blocked:

Note that several default columns have been hidden in the example URL Filtering log file shown
here.

Create a Custom URL Category


You can add specific URLs to a Custom URL Category and then use the Custom URL
Category to block access to the specific URLs. In this section, you will test access to a URL
and then create a Custom URL Category that includes that URL along with a few other URLs.
On the client desktop, open the Firefox browser and browse to www.nbcnews.com.
The browser should display a valid webpage.

© 2017-2020 Palo Alto Networks, Inc. Page 161


Close the browser window.
In the firewall web interface, select Objects > Custom Objects > URL Category.
Click Add and configure the following:

Parameter Value
Name block-per-company-policy
Description URLs that are blocked by company policy.
Sites Add the following:
*.nbcnews.com
*.theguardian.com

Click OK to close the Custom URL Category window.

© 2017-2020 Palo Alto Networks, Inc. Page 162


Use a Custom URL Category to Block Access to Malicious
URLs
In this section, you will add your Custom URL Category to a Security policy rule that has a
“deny” action.
In the web interface, select Policies > Security.
Click block-known-bad-urls to edit the rule.
Click the Service/URL Category tab and configure the following:

Parameter Value
URL Category Add the following to the list:
block-per-company-policy

Click OK to close the Security Policy Rule window.


Commit your configuration changes to the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 163


Test Access to Custom URLs Blocked by the Security Policy
Now you will test access to URLs that belong to the Custom URL Category that you added to
a Security policy deny rule.
On the client desktop, open Firefox and browse to www.nbcnews.com.
The browser should display an error message because the Custom URL Category in the Security
policy blocks access to the webpage.

In Firefox, browse to www.theguardian.com.


The browser should display an error message because the Custom URL Category in the Security
policy blocks access to the webpage.
Close Firefox.

Create an EDL to Block Malicious URL Access


You can add a list of malicious URLs to a file on an external web server and then configure
the firewall to access the list as an EDL. The advantage of this approach is that you can
regularly update the malicious URL list without the need to recommit the firewall
configuration each time, as you would have to do if you updated a Security policy rule with a
new URL.
In the web interface, select Objects > External Dynamic Lists.
Click Add and configure the following:

Parameter Value
Name malicious-urls-edl
Type URL List
Source http://192.168.50.80/malicious-urls.txt
(The EDL contains only the URL www.popurls.com)
Check for updates Five Minute

© 2017-2020 Palo Alto Networks, Inc. Page 164


The malicious-urls.txt file contains an entry for popurls.com.
Click OK to close the External Dynamic Lists window.
Click malicious-urls-edl.
The External Dynamic Lists window should open again.
Click Test Source URL to verify that the firewall can access the EDL URL.
A message window should open and state that the source URL is accessible.

Click Close to close the message window.


Click OK to close the External Dynamic Lists window.

© 2017-2020 Palo Alto Networks, Inc. Page 165


Add the URL List EDL to the Security Policy
Now you will add the EDL containing the malicious URL list to a Security policy rule with a
“deny” action.
In the web interface, select Policies > Security.
Click block-known-bad-urls to edit the rule.
Click the Service/URL Category tab and configure the following:

Parameter Value
URL Category Add malicious-urls-edl to the list.
This EDL will block access to www.popurls.com.

Click OK to close the Security Policy Rule window.


Commit your configuration changes.

Test Access to URLs Blocked by the EDL


In this section, you will test access to a URL that is contained in the EDL that you added to a
Security policy rule with a “deny” action.
On the client Desktop, open Firefox and browse to http://www.popurls.com.

© 2017-2020 Palo Alto Networks, Inc. Page 166


The browser displays a block page because the EDL in the Security policy blocks access to the
popurls.com webpage.
Close the Firefox browser.

Block Access to a Malicious URL Using a URL Filtering


Profile
Now you will configure a URL Filtering Profile to control access to URLs. You must add the
URL Filtering Profile to a Security policy rule with an “allow” action. The use of a URL
Filtering Profile to block access to URLs typically is easier to maintain over time compared to
addition of URLs to a Security policy block rule.
In the firewall web interface, select Device > Response Pages.
Locate the entry for Application Block Page and click the link for Disabled under the
Action column.
Place a check in the box for Enable Application Block Page.

Click OK.
Commit your configuration changes to the firewall.
On the client desktop, open Firefox and browse to http://www.hacker9.com.
The browser should display a block page because the URL belongs to the URL category hacking,
which is blocked by a Security policy rule. You will continue to block access to this website but
will use another method.

© 2017-2020 Palo Alto Networks, Inc. Page 167


Close the Firefox browser.
In the firewall web interface, select Objects > Security Profiles > URL Filtering.
Click Add to create a new profile.
A URL Filtering Profile window should open.
Type Corp-URL-Profile as the Name of the profile.
For Description, enter Company URL Filtering profile.
On the Categories tab, configure the following:

Parameter Value
Site Access Configure the block action for the following URL categories:
block-per-company-policy* (your Custom URL Category)
malicious-urls-edl+ (your custom URL list)
adult
command-and-control
extremism
hacking
high-risk
malware
nudity
parked
peer-to-peer
phishing
proxy-avoidance-and-anonymizers
questionable

© 2017-2020 Palo Alto Networks, Inc. Page 168


These categories are the same ones you set to block earlier using the URL Category as part of
the Security Policy rule. In this configuration, the firewall will use the URL Filtering profile to
block these categories.
Select the tab for Inline ML.
For Phishing Detection, set the Policy Action to block.

© 2017-2020 Palo Alto Networks, Inc. Page 169


For Javascript Exploit Detection, set the Policy Action to block.

Click OK to close the URL Filtering Profile window.


Note: You can configure other features using the URL Filtering Profile. Some of these features
are explored in later lab exercises.

Add a URL Filtering Profile to a Security Policy Rule


In this section, you will add the Corp-URL-Profile URL Filtering Profile to the Security
policy to enable the firewall to block access to known-malicious URLs.
In the web interface, select Policies > Security.
Click Users_to_Internet to edit the rule.
Click the Actions tab and configure the following:

Parameter Value
Action Allow
Log Setting Log at Session End
Profile Type Profiles
URL Filtering Corp-URL-Profile

© 2017-2020 Palo Alto Networks, Inc. Page 170


Click OK to close the Security Policy Rule window.
Select, but do not open, the block-known-bad-urls Security policy rule.
The rule should be highlighted after it has been selected.
Click Delete to remove the block-known-bad-urls rule.
This rule no longer will be used to block access to the URLs. Instead, the “Users_to_Internet”
rule with its attached URL Filtering Profile will control URL access.
Click Yes to confirm the deletion.
You should be left with six Security policy rules.

Commit your configuration changes.

© 2017-2020 Palo Alto Networks, Inc. Page 171


Test Access to URLs Blocked by a URL Filtering Profile
In this section, you will perform tests to ensure that access to malicious URLs is blocked by
the firewall using the URL Filtering Profile.
Open Firefox and browse to www.evilzone.org.
You should get a block page because you do not have access to this website. It belongs to the
URL category hacking, which is blocked by the URL Filtering Profile.

Browse to hidester.com.
You should get a block page because you do not have access to this website. It belongs to the
URL category proxy-avoidance-and-anonymizers, which is blocked by the URL Filtering category.
You might have to refresh the browser to avoid using the browser’s locally cached copy.

Close the Firefox browser window.


Examine the URL Filtering Log under Monitor > Logs > URL Filtering.

© 2017-2020 Palo Alto Networks, Inc. Page 172


Create and apply a filter to show entries in which the Action is block-url.
Note that your existing filter may still be in place.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 173


Lab 10 Scenario: Blocking Threats Using App-ID
The old firewalls in your network only allowed you to block or allow traffic using Layer 3 and
Layer 4 characteristics. With the deployment of the new Palo Alto Networks firewall, your
control over traffic now includes which applications are allowed or blocked into and out of your
network.
Some skeptics on your security team still do not fully believe that the Palo Alto Networks
firewall actually can recognize applications beyond their Layer 4 characteristics.
To illustrate application awareness, you will create a Layer 4 object for FTP and use that in a
Security policy rule. In a later lab, you will convert this Security policy rule to use the FTP
application instead of the Layer 4 port-based object.
The list of applications that Palo Alto Networks maintains is long, but you already know some of
the applications that you must allow from and to your security zones. You will create an
Application Group and include individual applications that the Palo Alto Networks devices use.
You will then use this Application Group as part of Security policy rule. This process will give
you practice in create Security policy rules that take advantage of applications instead of simply
Layer 3 and Layer 4 traffic characteristics.

Lab Objectives
 Load a baseline configuration
 Create an FTP Service object and an FTP port-based Security policy rule
 Test the port-based Security policy
 Generate application traffic
 Configure an application group
 Configure a Security policy to allow update traffic
 Test the Allow-PANW-Apps Security policy rule
 Examine the tasks list to see shadowed message
 Modify the Security policy to function properly
 Test the modified Security policy rule

Apply a Baseline Configuration to the Firewall


To start this lab exercise, load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down list next to the Name text box and select edu-210-10.0-lab-10.xml.
Note the edu-210 portion in the filename because the drop-down list might contain lab
configuration files for other course numbers:

© 2017-2020 Palo Alto Networks, Inc. Page 174


Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.

Create an FTP Service Object


At the end of this lab you will use the Policy Optimizer tool to migrate an FTP port-based rule
to an FTP application-based rule. However, to prepare for that part of the lab exercise you
will configure and use an FTP port-based Security policy rule now. You will perform this
activity now because the Policy Optimizer tool processes logged traffic only at the beginning
of each hour. By generating port-based traffic now, you maximize the time that the Policy
Optimizer tool has to populate data by the time you get to that portion of the lab.
In this section, you will start by creating an FTP Service object that defines the FTP port. You
will use this Service object in the FTP port-based Security policy rule that you will create in
the next lab section.
In the firewall web interface, select Objects > Services.
Click Add and configure the following:

Parameter Value
Name service-ftp
Protocol TCP
Destination Port 21

Click OK to close the Service window.

© 2017-2020 Palo Alto Networks, Inc. Page 175


Create an FTP Port-Based Security Policy Rule
In this section, you will create a port-based Security policy rule that will enable you to
simulate part of the process of migrating from a legacy, port-based Security policy to a next-
generation, application-based Security policy.
In the web interface, select Policies > Security.
Click Add to create a new Security policy rule.
On the General tab, type migrated-ftp-port-based as the Name.
You are creating a rule that simulates a port-based rule that was migrated from another
vendor’s firewall.
For Description, enter Migrated from legacy firewall.
Click the Source tab and configure the following:

Parameter Value
Source Zone Users_Net
Source Address Any

Click the Destination tab and configure the following:


Parameter Value
Destination Zone Extranet
Destination Address Any
Click the Application tab and verify the following:

Parameter Value
Applications Any
Click the Service/URL Category tab and configure the following:

Parameter Value
Service service-ftp
Click the Actions tab and verify the following:

Parameter Value
Action Allow
Log Setting Log at Session End

Click OK to close the Security Policy Rule window:

© 2017-2020 Palo Alto Networks, Inc. Page 176


Use your mouse pointer to drag-and-drop the migrated-ftp-port-based rule to just above
the Users_to_Extranet rule:

Commit your configuration changes.

Test the Port-Based Security Policy


In this section, you will generate FTP traffic from the client host to an FTP server in the
Extranet zone. Then you will examine the Traffic log to view how the firewall processed the
FTP traffic. After you complete this section, you will move on to other tasks related to App-
ID. At the end of this lab you will return to the task of migrating the FTP port-based rule to an
application-based rule. If the beginning of the next hour passes by the time you reach the end
of this lab, the Policy Optimizer tool will have been populated with information about the FTP
port-based rule.
On the client desktop, open a Terminal window.
In the Terminal window, type:
ftp 192.168.50.21
You should be connected to the FTP server.
Log in with the username paloalto42 and Pal0Alt0! as the password.
The login should succeed.

© 2017-2020 Palo Alto Networks, Inc. Page 177


Type bye at the FTP command prompt.
This command should end the FTP session. An FTP session will be logged on the firewall even
though no file was transferred.
Close the Terminal window by typing exit <Enter>.
In the web interface, select Monitor > Logs > Traffic.
Clear any filters you may already have in place.
Create and apply a filter to locate traffic from your client workstation:
( addr.src in 192.168.1.20 )
Leave this filter in place.
Locate the log entry for the FTP session. Which Security policy rule matched and
allowed the FTP traffic?
It should be the “migrated-ftp-port-based” rule.

Generate Application Traffic


In this section, you will run a short script which generates application traffic from your client
workstation to hosts in the Internet and Extranet security zones.
On the client desktop, double-click the folder for Class-Scripts:

Open the folder for EDU-210:

Generate application traffic by double-clicking on the icon for App Generator:

© 2017-2020 Palo Alto Networks, Inc. Page 178


Allow the script to complete.
Examine the Traffic log by selecting Monitor > Logs > Traffic.
Reapply the filter you created earlier to display sessions from your client workstation
(192.168.1.20):
( addr.src in 192.168.1.20 )
Note the entries under the Application column:

You should see entries for ftp, dns, google-base, ssl, web-browsing, facebook-base and ping.
Use the refresh button to update the entries if necessary.

Configure an Application Group


In this section, you will configure an application group called paloalto-apps that includes
some Palo Alto Networks applications. These applications are used to label and control access
to the content update network and other Palo Alto Networks products and features. You will
add the application group to a Security policy rule later in this lab exercise.

© 2017-2020 Palo Alto Networks, Inc. Page 179


In the web interface, select Objects > Application Groups.
Click Add and configure the following:

Parameter Value
Name paloalto-apps
Applications paloalto-dns-security
paloalto-updates
paloalto-userid-agent
paloalto-wildfire-cloud
pan-db-cloud

© 2017-2020 Palo Alto Networks, Inc. Page 180


Click OK to close the Application Group window.

Configure a Security Policy to Allow Update Traffic


In this section, you will create a specific Security policy rule to enable access to Palo Alto
Networks content updates. This configuration is an example of the positive enforcement
model where you configure what the firewall should allow rather than specify only what
should be blocked.
Select Policies > Security.
Click Add to create a new Security policy rule.
On the General tab, type Allow-PANW-Apps as the Name.
For Description, enter Allows PANW apps for firewall.
Click the Source tab and configure the following:

Parameter Value
Source Zone Users_Net
Source Address 192.168.1.254
Note that 192.168.1.254 is the IP address of the management interface on the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 181


Click the Destination tab and configure the following:

Parameter Value
Destination Zone Internet
Destination Address Any
Click the Application tab and configure the following:

Parameter Value
Applications paloalto-apps
To locate your paloalto-apps Application Group, start typing in the first few letters of the
group name, and the interface will display only those entries which match. Application Groups
appear at the very end of the Application list.

Click the Service/URL Category tab and verify that application-default and Any are
selected.
Click the Actions tab and verify the following:

Parameter Value
Action Allow
Log Setting Log at Session End

Click OK to close the Security Policy Rule window.


The “Allow-PANW-Apps” rule should be listed just above the “intrazone-default” rule in the
Security policy rule list.

© 2017-2020 Palo Alto Networks, Inc. Page 182


Some of the columns in the Security Policy table shown here have been hidden or rearranged.

Commit your configuration.


When the commit process completes, notice that there is an additional tab available for
Rule Shadow.

This tab only appears when you have a rule that shadows other rules. You will fix the rule
shadow issue in a later section of the lab.
Close the Commit window.

Test the Allow-PANW-Apps Security Policy Rule


In this section, you will test the new Security policy rule for Allow-PANW-Apps to see how
it is working.

© 2017-2020 Palo Alto Networks, Inc. Page 183


In the web interface, select Device > Dynamic Updates.
Click Check Now:

This action instructs the firewall to check for Dynamic Content updates. The application used by
the firewall is called paloalto-updates and is one that you included in the Application Group
called paloalto-apps.
Select Monitor > Logs > Traffic.
Clear any filters you have in place.
Create and apply a filter to search for log entries that contain the application paloalto-
updates:
( app eq paloalto-updates )

Leave this filter in place for later testing in this lab.


Which rule allowed the application traffic to pass through the firewall?
It should be the Users_to_Internet rule.
Why did the firewall traffic not hit the Allow-PANW-Apps rule?
Because the Users_to_Internet rule ‘shadows’ the Allow-PANW-Apps rule. Traffic matched the
Users_to_Internet rule and the firewall carried out the allow action. There is no reason for the
firewall to continue comparing packet characteristics to any following rules after it has found a
match. Remember: Rule order is important!

Examine the Tasks list to see Shadowed message


The firewall provides notification when you have a rule shadowing one or more other rules. The
Rule Shadow tab appears at the end of the Commit process.
However, you might not always notice the Rule Shadow tab, so in this section, you will use the
Task list to examine your earlier Commit messages.

© 2017-2020 Palo Alto Networks, Inc. Page 184


In the bottom right corner of the web browser, click the Tasks button.

In the Tasks Manager – All Tasks window, scroll down to locate the most recent entry
for Commit under Type.
Click the link for Commit.

Select the Rule Shadow tab.


The interface shows you which rule is shadowing other rules.
Click the number under Count (in this example, the value is 1).

The value under the Count column indicates the number of rules that are shadowed. The
Shadowed Rule column shows you details about which rule is shadowed.

© 2017-2020 Palo Alto Networks, Inc. Page 185


You can use this detailed information to modify your Security policy rule order to make certain
traffic hits rules in the correct manner.
Close the Job Status Commit window.
Close the Task Manager – All Tasks window.

Modify the Security Policy to Function Properly


In this section, you will modify your Security policy to ensure that only the Allow-PANW-
Apps rule allows Palo Alto Networks content update traffic. This configuration is another
example of the positive enforcement model where you configure what the firewall should
allow rather than specify only what should be blocked.
In the web interface, select Policies > Security.
Click Users_to_Internet to edit the rule.
Click the Application tab and use the Add button to configure the following:

Parameter Value
Applications dns
ping
ssl
web-browsing

Click OK to close the Security Policy Rule window.


Commit your configuration.

© 2017-2020 Palo Alto Networks, Inc. Page 186


Did you get any commit warnings on a Rule Shadow tab about one rule shadowing
another rule?
You should not receive any commit warnings.

Test the Modified Security Policy Rule


In this section, you will test the modified Security policy to verify that it is working as
expected. You want to verify that Dynamic Update traffic from the firewall uses the Allow-
PANW-Apps rule.
In the web interface, select Device > Dynamic Updates.
Click Check Now:

Select Monitor > Logs > Traffic.


If your filter is still in place, click the Apply Filter button, or create a filter to search for
update traffic:
( app eq paloalto-updates )
Look for the log entries for the application paloalto-updates. Which rule allowed the
application traffic to pass through the firewall?
It should be the “Allow-PANW-Apps” rule.

Open Firefox and browse to www.paloaltonetworks.com.


The webpage should open.
Close the Firefox browser window.
Select Monitor > Logs > Traffic.
Clear the filter you have in place for paloalto-updates.
Create and apply a filter to search for traffic from your client workstation:
( addr.src eq 192.168.1.20 )

© 2017-2020 Palo Alto Networks, Inc. Page 187


How did App-ID identify the traffic to the website? Which Security policy rule allowed
the traffic to the website?
The application initially should have been identified as ssl to port 443. The “Users_to_Internet”
rule should have allowed the traffic for both applications.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 188


Lab 11 Scenario: Maintaining Application-Based
Policies
Your organization runs several common application servers on non-standard ports. For example,
there are several web servers in your network that use TCP port 8080 instead of the default TCP
port 80. You need to make certain that you configure the firewall to allow web-browsing traffic
even when that traffic is using TCP port 8080. To accomplish this task, you will configure a new
service object and incorporate it into a Security policy rule for web-browsing.
You will also use the Policy Optimizer utility on the firewall to migrate the port-based FTP rule
to an application-based rule.
In the last section, you will make certain that your firewall is consistently up to date with the
latest signatures and information from Palo Alto Networks. You need to make sure that the
firewall downloads and incorporates these updates automatically, so you will schedule the
process.

Lab Objectives
 Load a baseline configuration
 Create a custom Service object for HTTP
 Add the new service to the Security policy
 Test Access to the web server on port 8080
 Revert the web server to port 80
 Create an FTP application-based Security policy rule
 Test the application-based Security policy
 Remove the FTP rules
 Scheduling App-ID updates

Apply a Baseline Configuration to the Firewall


To start this lab exercise, load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down list next to the Name text box and select edu-210-10.0-lab-11.xml.
Note the edu-210 portion in the filename because the drop-down list might contain lab
configuration files for other course numbers:
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface.

© 2017-2020 Palo Alto Networks, Inc. Page 189


Click Commit again and wait until the commit process is complete.
Click Close to continue.

Create a Custom Service Object for HTTP


In some networks, servers run common applications on non-standard ports: for example,
running a web server on TCP port 8080 instead of TCP port 80. Palo Alto firewalls expect to
see HTTP traffic running on the standard TCP port 80 and will block HTTP traffic that is not
running on the application default port. In order to allow this type of non-standard port traffic,
you can create a service object and use it as part of your Security policy rule definition.
In this section, you will create a custom service for TCP port 8080. You will add this custom
service to the Security policy later in this lab exercise.
In the web interface, select Objects > Services.
Click Add and configure the following:

Parameter Value
Name service-http8080
Description Alternate web service port.
Protocol TCP
Destination Port 8080

Click OK to close the Service window.

Add the New Service to the Security Policy


In this section, you will add a Security policy rule to enable the firewall to match and pass
web-browsing traffic using the non-standard TCP port 8080.
In the web interface, select Policies > Security.
Click Add to create a new Security policy rule.
On the General tab, type allow-non-standard-web as the Name.

© 2017-2020 Palo Alto Networks, Inc. Page 190


For Description, enter Allows web traffic on 8080.
Click the Source tab and configure the following:

Parameter Value
Source Zone Users_Net
Source Address Any
Click the Destination tab and configure the following:

Parameter Value
Destination Zone Extranet
Destination Address 192.168.50.80
Click the Application tab and configure the following:

Parameter Value
Applications web-browsing
Click the Service/URL Category tab and configure the following:

Parameter Value
Service service-http8080
Click the Actions tab and verify the following:

Parameter Value
Action Allow
Log Setting Log at Session End

Click OK to close the Security Policy Rule window.


Select, but do not open, the allow-non-standard-web rule in the Security policy.
The rule should be highlighted after you select it.

© 2017-2020 Palo Alto Networks, Inc. Page 191


At the bottom of the window, select Move > Move Up as many times as necessary to
move the rule to just above the Users_to_Extranet rule:

Note that you can also drag and drop rule entries.
Commit your configuration changes.

Test Access to the Web Server on Port 8080


In this section, you will test whether the Security policy allows access to the web server
running on the non-standard TCP port 8080.
On the Windows desktop, open Firefox and browse to http://192.168.50.80:8080
The connection will fail because the web server is not using port 8080.

© 2017-2020 Palo Alto Networks, Inc. Page 192


Close the Firefox browser window.
From your client workstation, open the Remmina application:

Double-click the entry for Server-Extranet.


This action will connect you to the Extranet lab server using SSH.
Run the following command to change the HTTP service port from 80 to 8080:
/tg/http8080.sh <Enter>

This script changes the lab web server to listen on TCP port 8080 instead of TCP port 80.
Leave the Remmina connection to the Extranet server open.
On the Windows desktop, open Firefox and browse to 192.168.50.80:8080

You should be connected to the server now that the service port has been changed to 8080.

© 2017-2020 Palo Alto Networks, Inc. Page 193


Close the Firefox browser.
In the firewall web interface, select Monitor > Logs > Traffic.
Clear any filters you have in place.
Find the log entries for the web traffic to port 8080. You can use the filter (port.dst
eq 8080) to find the log entry.
Which Security policy rule allowed the traffic?
It should be the “allow-non-standard-web” rule.

Revert the Web Server to Port 80


In this section, you will run a script on the Extranet host to configure the web server to listen
on its standard TCP port 80. You also will remove the Security policy rule that enabled web
server access on the non-standard port.
In the Remmina SSH connection to the Extranet server, run the following command:
/tg/http80.sh

This script will cause the web server to listen on TCP port 80 rather than on TCP port 8080.
Close your Remmina connection to the Extranet server by typing exit <Enter>.
Close the Remmina application window.
In the firewall web interface, select Policies > Security.

© 2017-2020 Palo Alto Networks, Inc. Page 194


Select, but do not open, the allow-non-standard-web rule in the Security policy.
The rule should be highlighted after you select it.

At the bottom of the window, click Delete to remove the rule:

Click Yes to confirm the rule removal.


Commit your configuration changes.

Create an FTP Application-Based Security Policy Rule


The goal of this exercise is to simulate the process of migrating from a port-based rule to an
application-based rule. In the previous lab, you created a port-based rule that allowed FTP
traffic from the Users_Net zone to the Extranet zone and then opened a session to the FTP
server.
By now the beginning of the hour should have passed so the Policy Optimizer tool should
have recorded the FTP traffic through the port-based FTP rule, which will enable you to use
the Policy Optimizer tool to migrate from the port-based rule to an application-based rule.
In this section, you will use the Policy Optimizer tool’s cloning method to create an
application-based rule to match and allow FTP traffic from the Users_Net zone to the Extranet
zone.
In the web interface, select Policies > Security.

© 2017-2020 Palo Alto Networks, Inc. Page 195


If necessary, open the Policy Optimizer panel by clicking the Up arrow beneath the list
of policies on the left side of the web interface.

Click the tiny Up arrow to open Policy Optimizer.


Select Policy Optimizer > No App Specified.
The No App Specified window should open.

Note: If you do not see an entry for migrated-ftp-port-based in the list, wait until the top of the hour
has passed. The firewall updates these statistics every hour, on the hour.

© 2017-2020 Palo Alto Networks, Inc. Page 196


How many applications have been seen by the migrated-ftp-port-based rule?
The number 1 in the Apps Seen column indicates that only a single application has been seen by
this port-based rule. However, this window does not tell you which application.
Click Compare in the migrated-ftp-port-based rule’s row.
The Applications & Usage – migrated-ftp-port-based window should open.
Which application has been seen by the “migrated-ftp-port-based” rule?
It should have been the ftp application.

Select the ftp check box to select the application:

Click Create Cloned Rule to create an application-based FTP rule:

A Create Cloned Rule window should open.


In the Clone window, type ftp-application-based as the Name of the new rule.

© 2017-2020 Palo Alto Networks, Inc. Page 197


Leave the remaining settings unchanged.

Click OK to close the Create Cloned Rule window.


In the No App Specified window, the migrated-ftp-port-based rule is removed.

The firewall has moved the ftp application from the “migrated-ftp-port-based” rule to the new
“ftp-application-based” rule.
Select Policies > Security to redisplay the Security policy.
The No App Specified window should close.
The new ftp-application-based rule been added to your Security policy.

© 2017-2020 Palo Alto Networks, Inc. Page 198


Where in the Security policy rule hierarchy did the Policy Optimizer tool move the new
ftp-application-based rule?
It should directly precede the migrated-ftp-port-based rule and match FTP traffic before the
“migrated-ftp-port-based” rule.

Which service is listed in the Service column of the ftp-application-based rule?


It should be the service service-ftp.
On the ftp-application-based rule, click service-ftp in the Service column.
A Service window should open.

Select the service-ftp check box and then click Delete to delete the service.

© 2017-2020 Palo Alto Networks, Inc. Page 199


Which service now is listed?
It should be application-default.

Click OK to close the Service window.


Commit your configuration changes.

Test the Application-Based Security Policy


In this section, you will generate FTP traffic from your client host to the FTP server in the
Extranet zone. Then you will examine the Traffic log to view how the firewall processed the
FTP traffic. The FTP traffic should match the application-based rule and not the port-based
rule.
In the Security Policy, note that the Hit Count for your new ftp-application-based rule
is 0:

Highlight the entry for the migrated-ftp-port-based rule.

© 2017-2020 Palo Alto Networks, Inc. Page 200


At the bottom of the window, click Reset Rule Hit Counter > Selected rules.

This action will reset the counter for the selected rule to 0, allowing you to determine whether
traffic is hitting this rule during the test.
On the client desktop, open a Terminal window.
In the Terminal window, type:
ftp 192.168.50.21
You should be connected to the FTP server.
Log in with the username paloalto42 and the password Pal0Alt0!.
The login should succeed.

Type bye <Enter> at the FTP command prompt.


This command should end the FTP session. An FTP session will be logged on the firewall even
though no file was transferred.
Close the Terminal window by typing exit <Enter>.
In the web interface, select Monitor > Logs > Traffic.
Clear any filters you have in place.

© 2017-2020 Palo Alto Networks, Inc. Page 201


Locate the log entry for the FTP session. Apply the filter (app eq ftp) to help you
find it. Which Security policy rule matched and allowed the FTP traffic?
It should be the ftp-application-based rule.

Select Policies > Security.


Examine the Hit Count values for the ftp-application-based rule and the migrated-ftp-
port-based rule.

Note: In a real migration, you would disable the port-based rule for a while and wait to see if
any FTP sessions are affected. After you are confident that the new application-based rule is
matching all required FTP traffic, you would delete the port-based rule.

Remove the FTP Rules


In this section, you will remove the application-based and port-based FTP rules from the
Security policy. The existing Users_to_Extranet rule will match any FTP traffic that might
be required in other lab exercises.
In the web interface, select Policies > Security.
Use your Shift-key and mouse pointer to select both the ftp-application-based and
migrated-ftp-port-based rules.
Click Delete to remove the rules.
Click Yes to confirm the rule removal.
Commit your configuration changes.

© 2017-2020 Palo Alto Networks, Inc. Page 202


Scheduling App-ID Updates
Keeping the firewall updated with new signatures for threats, viruses and applications is
critical. You can perform the update tasks manually, but a far more efficient method is to
schedule the process.
In this section, you will configure the firewall to check for and retrieve any new content
updates for Anti-Virus, Vulnerabilities, Threats and Applications.
Select Device > Dynamic Updates.
In the row for Antivirus, click the link for None beside Schedule.

Set the Recurrence to Weekly.


Set the Day to Sunday.
Set the Time to 03:00.
Set the Action to download-only.

Note that in the lab, you are setting the Action to download-only. This action means that the
firewall will check for new signatures and download them but will not install them. In a
production environment, you should use download-and-install for the Action.

© 2017-2020 Palo Alto Networks, Inc. Page 203


Click OK.
Scroll down and locate the section for Applications and Threats.
Click the link for the existing schedule.

You do not need to make any changes to this entry so click OK.
Scroll down and locate the section for WildFire.
Click None next to Schedule.
Set the Recurrence to Every Minute.
Set the Action to download-only.

In a production environment, you should set the Action to download-and-install.

© 2017-2020 Palo Alto Networks, Inc. Page 204


Click OK.
Commit your changes to the firewall.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 205


Lab 12 Scenario: Blocking Threats Using
Custom Applications
Your company uses a very old application that was written long ago and provides critical
information to the accounting department. This application has not been upgraded yet. There
are plans to have a new version developed but no one seems to have the time to take on the
task. You must isolate and secure this application so that the firewall can identify it. However,
the application developer (who no longer works for the company) designed the application to
run on TCP port 80 and to use the HTTP protocol. Because the application is so similar to
general web-browsing, you need to identify unique characteristics of this application traffic so
that you can create a custom signature for it.

Lab Objectives
 Load a baseline configuration
 Gather custom application information
 Configure a packet capture
 Capture application traffic
 Analyze the packet capture
 Create a custom application with a signature
 Add the custom application to the Security policy
 Test the custom application signature

© 2017-2020 Palo Alto Networks, Inc. Page 206


Apply a Baseline Configuration to the Firewall
To start this lab exercise, load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down list next to the Name field and select edu-210-10.0-lab-12.xml.
Note the edu-210 portion in the filename because the drop-down list might contain lab
configuration files for other course numbers:
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.

Gather Custom Application Information


You will gather information about the traffic that this application uses so that you can create a
custom application signature.
On the client desktop, open the Class Scripts / EDU-210 folder.
Double-click the Custom-App-1 icon:

© 2017-2020 Palo Alto Networks, Inc. Page 207


The application will launch in a Terminal window.

In the firewall web interface, select Monitor > Logs > Traffic.
Clear any filters you may have in place.
Locate the log entry for the company custom application. You can use the log filter
(addr.dst eq 192.168.50.22) to help find the log entry. Write down the source IP
address, the destination port number, and the IP protocol. If the IP Protocol column is
not displayed, place your mouse pointer over any column header and select Columns >
IP Protocol.
Keep the source and destination IP addresses, the destination port number, and the IP protocol
information readily available because you will use this information to configure a packet
capture.

Configure a Packet Capture


In this section, you will configure a packet capture on the firewall’s data plane. The goal of
the packet capture is to identify a unique bit pattern that can be used to create a custom
application signature.
In the web interface, select Monitor > Packet Capture.
Click Clear All Settings. You might have to scroll down to see the link:

© 2017-2020 Palo Alto Networks, Inc. Page 208


Click Yes to confirm your choice, then click OK on the confirmation message.
Click Manage Filters to configure the packet capture.
The Packet Capture Filter window should open.
Click Add and configure the following:

 Parameter  Value
 Id  1
 Ingress Interface  ethernet1/2
 Source  192.168.1.20
 Destination  192.168.50.22
 Dest Port  80
 Proto  6 (This number is assigned to TCP.)
 Non-IP  exclude

Click OK to close the Packet Capture Filter window.


Click Filtering OFF to toggle filtering to ON.

Under the section for Configure Capturing, click Add to configure a file for the receive
stage on the firewall.
A Packet Capture Stage window should open.
Configure the following:

Parameter Value
Stage receive
File receive-file.pcap

© 2017-2020 Palo Alto Networks, Inc. Page 209


Leave the remaining settings unchanged.

Click OK to close the Packet Capture Stage window.

Packet Capture Application Traffic


In this section, you will take a packet capture on the firewall while using the Custom
Application on the client host.
In the web interface, select Monitor > Packet Capture.
Click Packet Capture OFF to toggle it to ON:

Read the warning message about Packet Captures.

© 2017-2020 Palo Alto Networks, Inc. Page 210


Click OK.
The firewall is now actively capturing packets that match the filter you created. The packets are
being stored on the firewall in the receive-file.pcap you designated.
From the client desktop, double-click the icon for the Custom-App-1 again.

Let the Custom-App-1 process complete.


In the web interface, select Monitor > Packet Capture.
Click Packet Capture ON to toggle it to OFF:
Refresh the web interface display to view the receive-file listed in the Captured Files
panel:

Click receive-file.pcap to open it in Wireshark.

© 2017-2020 Palo Alto Networks, Inc. Page 211


Analyze the Packet Capture
In this section, you will use Wireshark to analyze the packet capture to discover a unique bit
pattern that identifies traffic to the Custom Application.
In the Wireshark window, find and highlight the first entry for GET:

In the Wireshark window, click Hypertext Transfer Protocol to expand the display and
notice that the HTTP request header included a GET /custom-app.txt entry and the Host
192.168.50.22:

You will use the HTTP GET method, and the URI path customapp.txt to build a custom
application signature for the Custom Application.
Close the Wireshark window.
In the firewall web interface, select Monitor > Packet Capture.
Click Clear All Settings:

A confirmation window should open.


Click Yes in the confirmation window, and then click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 212


Select the check box next to the receive-file:

Scroll to the bottom of the window and click Delete to delete the receive-file.
Click Yes to confirm the deletion.

Create a Custom Application with a Signature


In this section, you will use the information discovered in the packet capture to create a
unique signature that can identify HTTP traffic to the Internal Company Custom Application.
In the web interface, select Objects > Applications.
At the bottom of the window, click Add.
The Application window should open.
On the Configuration tab, configure the following:

Parameter Value
Name Custom-App-1
Category business-systems
Subcategory office-programs
Technology client-server
Parent App None
Risk 1
Click the Advanced tab and configure the following:
Parameter Value
Port radio button Select it
Port Click Add and type tcp/80
Click the Signatures tab.
Click Add and configure the following:

Parameter Value
Signature Name Signature-1
Scope Transaction
Ordered Condition Leave selected (Neither choice affects the signature.)
Match

© 2017-2020 Palo Alto Networks, Inc. Page 213


Click Add Or Condition and configure the following:
 Parameter  Value
 Operator  Patten Match
 Context  http-req-uri-path
 Pattern  customapp.txt

At the bottom of the Or Condition window, click Add to create a new Qualifier and
configure the following:
Parameter Value
Qualifier http-method
Value GET

Click OK to close the Qualifier window.


Click OK to close the New And Condition - Or Condition window.

© 2017-2020 Palo Alto Networks, Inc. Page 214


The signature should look like the following:

Click OK to close the Signature window.


Click OK to close the Application window.
A new entry for Custom-App-1 appears at the top of the Application list.
To display only custom applications, select Custom applications on the filter drop-down
menu:

To display all applications again, select All from the filter drop-down menu or click
Clear Filters.
All applications should be listed again.

© 2017-2020 Palo Alto Networks, Inc. Page 215


Add the Custom Application to the Security Policy
In this section, you will create a Security policy rule that allows hosts in the Users_Net to access
the Custom Application in the Extranet zone.
Select Policies > Security.
Click Add.
Under the General tab, enter Allow_Custom_App for Name.
For Description, enter Allows users to access custom application in Extranet zone.
Select the tab for Source.
Under the Source Zone section, click add and select Users_Net.
Select the tab for Destination.
Under the Destination Zone section, click add and select Extranet.
Select the Application tab.
Click add and enter the first few letters of the Custom-App-1 name to locate the entry.
Select Custom-App-1.
Select the Actions tab and verify that the Action Setting is set to Allow.
Click OK to create the Security policy rule.

Highlight the Allow_Custom_App entry without opening it.

© 2017-2020 Palo Alto Networks, Inc. Page 216


Use the Move > Move up button at the bottom of the window to relocate this rule just
above Users_to_Extranet.

Note that you can also drag and drop the rule into the new position.
Commit your changes to the firewall.

Test the Custom Application


In this section, you will run the Custom Application to determine whether the firewall
correctly identifies the traffic.
From the client desktop, double-click the icon for the Custom-App-1 again.

© 2017-2020 Palo Alto Networks, Inc. Page 217


In the web interface, select Monitor > Logs > Traffic.
Clear any existing filters you have in place.
Locate the log entries for the Custom Application traffic to the server. You can create and
apply a filter to help find the log entry:
(addr.dst in 192.168.50.22 )
Which application label did App-ID assign to the traffic?
It should be Custom-App-1. Notice how the custom application enables more granular logging of
application traffic. The traffic no longer was generically identified as web-browsing.

Note that you may need to use the refresh button several times in order to see the new entry in the
Traffic Log. The sessions must end before the firewall writes an entry to the Traffic log.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 218


Lab 13 Scenario: Blocking Threats with User-ID
Your organization recently acquired another company, and you have been tasked to create
appropriate security policy rules for traffic generated by these new users.
Your firewall has been configured with a vWire that allows traffic to the internet from the users
in the newly acquired company. The firewall also has a new security zone in place called
Acquisition that contains all new users.
The firewall has an existing Security policy rule that allows all users in the Acquisition zone to
access any application on the internet. Your task is to restrict users in this new organization to
approved corporate applications only.

The approved corporate applications include DNS, web-browsing, and SSL.


You also need to ensure that only users in the marketing group are allowed to use social media
applications such as Facebook, Instagram, and others.
Another firewall administrator has created the appropriate Application Groups for you.
The firewall receives User-ID and Group membership information about users in this new
company from an XML upload sent by network authentication devices. (Note that this is
simulated in this lab and outside the scope of this course).

© 2017-2020 Palo Alto Networks, Inc. Page 219


You also need to create a Security policy rule that explicitly denies any other traffic generated by
users in the Acquisition zone. Although the interzone-default rule will deny any traffic not
expressly allowed, creation of an explicit deny rule will allow you to examine the kinds of
applications users in the Acquisition zone are attempting to access.

Lab Objectives
 Examine current configuration
 Enable User-ID technology on the Acquisition zone.
 Generate traffic
 Modify Security policy to meet requirements

Load a Lab Configuration


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot:
A Load Named Configuration dialog box opens.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-13.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
A window should open that confirms that the configuration is being loaded.
Click Close to close the Loading Configuration window.

© 2017-2020 Palo Alto Networks, Inc. Page 220


Click the Commit link at the upper right of the web interface:
A Commit window should open.
Click Commit and wait until the commit process is complete.
A Commit Status window should open that confirms the configuration was committed
successfully.
Click Close to continue.

Examine Firewall Configuration


In this section, you will review the settings that another administrator has configured for
Application Groups and Security policy rules.
Select Policies > Security.
Edit the entry for Allow-All-Acquisition.
Select the Source tab.

Note that the Source Zone is set to Acquisition.


Select the Destination tab.
Note that the Destination Zone is set to any.

© 2017-2020 Palo Alto Networks, Inc. Page 221


Select the Application tab.

Note that the Application is set to Any.


Select the Actions tab.

Note that the Action is set to Allow.


Click OK to close the Security Policy Rule window.

This Security policy rule allows any host in the Acquisition security zone to access any
application anywhere.
Clear the counters for all Security policy rules by clicking Reset Rule Hit Counter > All
rules at the bottom of the window.

This action will allow you to see how many times the rules are accessed from this point forward.

© 2017-2020 Palo Alto Networks, Inc. Page 222


Click Yes in the Reset window.
Select Objects > Application Groups.
Note the two new Application Groups:

You will configure the firewall to allow all users in the Acquisition zone to use the Allowed-Corp-
Apps. However, only users in the Marketing group will be able to use applications in the
Allowed-Mktg-Apps group.

Generate Traffic from the Acquisition Zone


On the client workstation, open Remmina.
Open the connection to the Server-Extranet.
Enter the following command to change directories:
cd /home/paloalto42/pcaps92019/app.pcaps <Enter>

Run the following command to start generating traffic in the Acquisition Zone:
./Appgenerator-2.sh <Enter>

While the script is running, examine the firewall Traffic log under Monitor > Logs >
Traffic.
Clear any filters you may have in place.

© 2017-2020 Palo Alto Networks, Inc. Page 223


Note that almost all traffic is hitting the Allow-All-Acquisition Rule.

Add the Source User column to the table by clicking the small triangle in any header and
choosing Columns > Source User.

Drag and drop the Source User column between the Source and Destination columns

This action will make it easier for you to locate Source User information later in this lab.

Enable User-ID on the Acquisition Zone


In this section you will enable User-ID on the Acquisition security zone as part of the process of
enabling User-ID on a firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 224


In the web interface, select Network > Zones.
Click Acquisition to open the zone.
The Zone configuration window should open.
Select the Enable User Identification check box:

Click OK to close the Zone configuration window.

Modify the Allow-All-Acquisition Security Policy Rule


You will now change the set of applications that Acquisition users are allowed to access by
modifying the existing Allow-All-Acquisition rule.
Select Policies > Security.
Edit the entry for Allow-All-Acquisition.
Under the General tab, change the Name of this rule to Allow-Corp-Apps.
For Description, change the entry to Allows only approved apps for
Acquisition users.

© 2017-2020 Palo Alto Networks, Inc. Page 225


Select the Application tab.
Uncheck the option for Any.
Click Add and enter the first few letters of the Allowed-Corp-Apps to display the
Application Groups available:
Select Allowed-Corp-Apps.

Click OK to close this Security Policy Rule window.

Create Marketing Apps Rule


Create a new Security policy rule to allow only Marketing users to access the Allowed-Mktg-
Applications.
In Policies > Security, click Add.
Under the General tab, enter Allow-Mktg-Apps for the Name.
For Description, enter Allows only users of marketing group to access
Mktg apps.

© 2017-2020 Palo Alto Networks, Inc. Page 226


Select the Source tab.
Under Source Zone, click Add.
Select Acquisition.
Under the Source User column, click Add and enter marketing.

Select the Destination tab.


Use the drop-down list at the top to select any.

Select the Application tab.


Uncheck the option for Any.

© 2017-2020 Palo Alto Networks, Inc. Page 227


Click Add and enter the first few letters of the Allowed-Mktg-Apps to display the
Application Groups available:

Select Allowed-Mktg-Apps.

© 2017-2020 Palo Alto Networks, Inc. Page 228


In the right side of the Application window, place a check box beside DEPENDS ON:

This action will select all the individual applications under the DEPENDS ON column.
Click Add to Current Rule to add these applications to this Security policy rule.

Select the Action tab.


Verify that the Action is set to Allow.

When you create a new Security policy rule, the default setting for Action is Allow. However, it is
always a good practice to verify this setting before closing the window.
Click OK to close this Security Policy Rule window.

© 2017-2020 Palo Alto Networks, Inc. Page 229


Create Deny Rule
Create a new Security policy rule which will deny any other application traffic for users in the
Acquisition zone.
In the Security policy table, click Add.
Select the tab for General.
For Name, enter Deny-All-Others.
For Description, enter Denies non-approved applications for users in
Acquisition zone.

Select the tab for Source.


Under the Source Zone column, click Add and select Acquisition.

Note that you do not need to specify any users or user groups under the Source User column.
Because the drop-down list is set to any, this rule will deny traffic to any user, regardless of
group membership.
Select the tab for Destination.

© 2017-2020 Palo Alto Networks, Inc. Page 230


Use the drop-down list at the top to select any.

Select the tab for Application and verify that Any is checked.

Select the tab for Action.


Change the Action to Deny.

Click OK to close this Security Policy Rule window.


Verify that the Deny-All-Others rule appears at the bottom of the Security policy.
If the “Deny-All-Others” rule does not appear at the bottom of the ruleset, use the Move
Down button to place the rule just above the “intrazone-default” rule.
Commit these changes to the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 231


Generate Traffic from the Acquisition Zone
On the client workstation, select the window for the Remmina application.
Select the tab for Extranet-Server connection.
Use the up arrow key to retrieve the previous command:
./Appgenerator-2.sh

Press Enter to launch the script again.


While the script is running, move to the next section in which you will examine the
firewall logs.

Examine User-ID Logs


You can see information about User-ID through the firewall CLI or in the web interface. In this
section, you will use both tools to examine User-ID entries.
In the firewall web interface, select Monitor > Logs > User-ID.
The firewall should have numerous entries with username-to-ip-address mappings:

On the client desktop, locate the main window for the Remmina application.
Double-click the Firewall-A connection.
This action will open a second tab and connect you to the firewall.
In the firewall CLI, enter the following command to display entries for User-ID:
show user ip-user-mapping all <Enter>

© 2017-2020 Palo Alto Networks, Inc. Page 232


The firewall will display User-ID information:

When you have finished examining the User-ID information, type exit <Enter> to
close the firewall SSH connection.

Examine Firewall Traffic Log


Create and apply filters in the Traffic log to answer the questions in this section.
In the firewall web interface, select Monitor > Logs > Traffic.
Write down your answers to the following questions in the space provided or on
notepaper:
Which rule does the firewall use when it encounters youtube-base traffic?
Hint: Use the filter ( app eq youtube-base )
Deny-All-Others

Which rule does the firewall use when it encounters dns traffic?
Hint: Use the filter ( app eq dns )
Allow-Corp-Apps

Which rule does the firewall use when it encounters facebook-base?


Hint: Use the filter ( app eq facebook-base )
Allow-Mktg-Apps and Deny-All-Others (depending on the Source User)

© 2017-2020 Palo Alto Networks, Inc. Page 233


Which users are allowed access to facebook-base?
Hint: Use the filter ( app eq facebook-base ) and ( action eq allow )
chicago\hpoirot
chicago\sholmes
chicago\vhelsing
Is the user sholmes allowed to access instagram-base?
Hint: Use the filter ( app eq Instagram-base ) and ( user.src eq
‘chicago\sholmes’ )
Yes

Is the user bbart allowed to access Instagram?


Hint: Use the filter ( app eq Instagram-base ) and ( user.src eq
‘chicago\bbart )
No

Clean Up the Desktop


In the Traffic log window on the firewall, clear any filters you have in place.
In the Remmina window on the client workstation, select the tab for the Server-
Extranet.
Close the SSH connection by typing exit <Enter>.
Close the main Remmina application window.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 234


Lab 14: Device-ID

No lab exercise is associated with this module.

© 2017-2020 Palo Alto Networks, Inc. Page 235


Lab 15 Scenario: Blocking Unknown Malware
with WildFire
Your company has recently seen an increase in malicious files that users are downloading. You
have sent out informational emails explaining how much damage these types of files can do, and
you have told people not to download files from sketchy sources.
Fortunately, you have deployed the Palo Alto Networks firewall, and you can set up a Security
Profile that will send any unknown files to the WildFire cloud for analysis.
To test the Security Profile after you have configured it, you will download a test file from Palo
Alto Networks. This test file is not actually malicious, but WildFire will identify it as such.
You will then examine a detailed report from WildFire with information about the file that was
analyzed.

© 2017-2020 Palo Alto Networks, Inc. Page 236


Lab Objectives
 Create a WildFire Analysis Profile
 Apply WildFire Profile to security rules
 Test the WildFire Analysis Profile
 Examine WildFire analysis details

Load a Lab Configuration


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot:
A Load Named Configuration dialog box opens.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-15.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
A window should open that confirms that the configuration is being loaded.
Click Close to close the Loading Configuration window.
Click the Commit link at the upper right of the web interface:
A Commit window should open.
Click Commit and wait until the commit process is complete.
A Commit Status window should open that confirms the configuration was committed
successfully.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 237


Create a WildFire Analysis Profile
In this section you will create a WildFire Analysis Security Profile that you can attach to
Security policy rules to test files and URLs for malware.
In the web interface, select Objects > Security Profiles > WildFire Analysis.
Click Add to create a new profile.
A WildFire Analysis Profile window should open.
Configure the following:

Parameter Value
Name Type Corp-WF
Description Type WildFire profile for Corp security
rules.
Click Add in the bottom left corner and configure the following:

Parameter Value
Name Type All_Files
Applications Verify that any is selected
File Types Verify that any is selected
Direction Verify that both is selected
Analysis Verify that public-cloud is selected

Click OK to close the window.


The new WildFire Analysis Profile now should be listed.

© 2017-2020 Palo Alto Networks, Inc. Page 238


Apply WildFire Profile to Security Rules
Select Policies > Security.
Edit the Users_to_Internet rule.
Select the tab for Actions.
Under Profile Settings, use the drop-down list to select Profiles.
For WildFire Analysis, select Corp-WF.
Leave the remaining settings unchanged.

Click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 239


Update WildFire Settings
Select Device > Setup > WildFire.
Click the gear icon to edit the General Settings.
Check the boxes for Report Benign Files and Report Grayware Files.
Leave the remaining settings unchanged.

Click OK.
Commit all changes.

© 2017-2020 Palo Alto Networks, Inc. Page 240


Test the WildFire Analysis Profile
Open the Firefox browser and connect to:
http://wildfire.paloaltonetworks.com/publicapi/test/pe.
There is a bookmark on the toolbar called Wildfire File that you can use.

When Firefox prompts you, select Save File.

This site generates an attack file with a unique signature that simulates a zero-day attack. A
wildfire-test-pe-file.exe file automatically is downloaded to the Downloads directory.
Click OK.
Close the Firefox browser.
On the client desktop, open the Remmina application.
Open the Firewall-A connection.
From the CLI, enter the command debug wildfire upload-log show.
The command should display the output log: 0, filename: wildfire-test-pe-
file.exe processed…. This output verifies that the file was uploaded to the WildFire public
cloud. The message might take a minute or two to display.

© 2017-2020 Palo Alto Networks, Inc. Page 241


Note that the details of the entry you see will differ from the example shown here.
Type exit <Enter> to close the SSH session to the firewall.
Close the Remmina application window.

Examine WildFire Analysis Details


In the firewall web interface, select Monitor > Logs > WildFire Submissions:
Analysis takes 5 to 15 minutes, and the table will remain empty until WildFire has reached a
verdict about the file.

Periodically use the Refresh button in the upper right corner of the window until
you see a new entry for the wildfire-test-pe-file.exe.

Note that in this example several default columns have been hidden, and the details of the entry
you see will differ.
Click the magnifying glass icon next to the entry to open the Detailed Log View of the
entry.

© 2017-2020 Palo Alto Networks, Inc. Page 242


Under the General section, note the Verdict:

Note that the details of the entry you see will differ from this example.
Click Close to close the Detailed Log View window.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 243


Lab 16 Scenario: Blocking Threats in Encrypted
Traffic
As an astute a network security professional, you have noticed the dramatic increase of HTTPS
secure traffic over the past few years. Correspondingly, you have noticed that very few websites
even use unencrypted HTTP traffic anymore. Virtually all network traffic is now encrypted.
You know that HTTPS protects privacy and sensitive data in transit between hosts, but you have
begun to realize that HTTPS also hides potentially damaging data as well. Encrypted traffic into
and out of your network might contain viruses, spyware, vulnerability exploits and other
damaging types of data.
You need to make certain that the Palo Alto Networks firewall can inspect even encrypted
traffic, so you have decided to implement decryption. This process will allow the firewall to
decrypt HTTPS traffic, inspect it and then block any sessions that contain malicious content.

© 2017-2020 Palo Alto Networks, Inc. Page 244


Right now, you do not have budget funds available to request a decryption certificate from a CA
(certificate authority). However, you can generate a self-signed certificate on the Palo Alto
Networks firewall and deploy that for decryption.
HR has also told you that there are certain types of traffic from employees that should not be
decrypted because those transactions might contain personally identifiable information (PII).
You need to exclude certain categories of websites (such as finance and healthcare) from
decryption. You will create a No-Decrypt rule to prevent the firewall from decrypting traffic to
and from these kinds of websites.

Lab Objectives
 Load a lab configuration
 Test the firewall without decryption
 Create a self-signed certificates for trusted connections
 Create A self-signed certificates for untrusted connections
 Create and test a Decryption policy rule for outbound traffic
 Test outbound Decryption policy rule
 Export the firewall certificate and import to Firefox
 Test outbound Decryption policy again
 Review firewall logs
 Exclude URL categories from decryption using a No-Decrypt rule
 Test the No-Decrypt rule

Load a Lab Configuration


To start this lab exercise, you will load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot:
A Load Named Configuration dialog box opens.
Click the drop-down arrow next to the Name field and select edu-210-10.0-lab-16.xml.
Note: Look for edu-210 in the filename because the drop-down list might contain lab
configuration files for other course numbers.
Click OK to close the Load Named Configuration window.
A window should open that confirms that the configuration is being loaded.
Click Close to close the Loading Configuration window.
Click the Commit link at the upper right of the web interface:
A Commit window should open.
Click Commit and wait until the commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 245


Test the Firewall Behavior Without Decryption
On the client desktop, open the Firefox browser in private/incognito mode and browse to
http://192.168.50.80/eicar.com
There is a bookmark on the toolbar for this site.

You should get a block page:

Because the connection between the client and the server is not encrypted, the firewall is able
to examine the traffic and block malicious content.
In Firefox, browse to www.eicar.org.
You can use the bookmark on the toolbar for this site.

Click the link for Download Anti Malware Testfile:

Scroll down and locate the section Download area.

© 2017-2020 Palo Alto Networks, Inc. Page 246


Click the link to for the eicar.com file download:

When you are prompted to save the file, click Cancel.

Notice that the download is not blocked because the connection is encrypted, and the virus is
hidden. This exercise proves that without Decryption, the firewall is unable to examine the
contents of a secure connection to scan for malicious content.
Close the Firefox browser.

Create A Self-Signed Certificates for Trusted Connections


In this section, you will generate a certificate on the firewall that will be used when clients
connect to HTTPS websites that have certificates issued by trusted certificate authorities.
The firewall will use this certificate as part of the decryption process between clients and
trusted HTTPS websites.
In the web interface, select Device > Certificate Management > Certificates:
Click Generate at the bottom of the page to create a new CA certificate:

© 2017-2020 Palo Alto Networks, Inc. Page 247


Configure the following:

Parameter Value
Certificate Name Type trusted-cert
Common Name Type 192.168.1.1
Certificate Authority Select the Certificate Authority check box

Leave the remaining settings unchanged and click Generate to create the certificate.
A Generate Certificate status window should open that confirms that the certificate and key
pair were generated successfully.
Click OK to close the Generate Certificate success window.
You should have a new entry in the Device Certificates table:

Edit the entry for trusted-cert by clicking it.


Place a check in the box for Forward Trust Certificate.

© 2017-2020 Palo Alto Networks, Inc. Page 248


Leave the remaining settings unchanged.

This action instructs the firewall to use this certificate to decrypt traffic between clients and
trusted HTTPS sites.
Click OK.

Create A Self-Signed Certificates for Untrusted Connections


In this section, you will generate a certificate on the firewall that will be used when clients
connect to HTTPS websites that DO NOT have certificates issued by trusted certificate
authorities - for example, sites that use self-signed certificates or certificates that have expired.
The firewall will use this certificate as part of the decryption process between clients and
untrusted HTTPS websites.
Click at the bottom of the page to create a second CA certificate.
Configure the following:
Parameter Value
Certificate Name Type untrusted-cert
Common Name Type untrusted
Certificate Authority Select the Certificate Authority check box

© 2017-2020 Palo Alto Networks, Inc. Page 249


Click Generate to create the certificate.
A Generate Certificate status window should open that confirms that the certificate and key
pair were generated successfully.
Click OK to close the Generate Certificate success window.
You should have two entries in the Device Certificate table:

Edit the entry for untrusted-cert by clicking it.

© 2017-2020 Palo Alto Networks, Inc. Page 250


Place a check in the box for Forward Untrust Certificate.
Leave the remaining settings unchanged.

This action instructs the firewall to use this certificate to decrypt traffic between clients and
HTTPS sites that are not trustworthy (expired certificates, self-signed certificates, etc.).
Click OK.

Create a Decryption Policy for Outbound Traffic


In this section, you will create a Decryption Policy to decrypt HTTPS traffic from the
Users_Net security zone to the Internet security zone.
In the web interface, select Policies > Decryption.
Click Add to create a decryption policy rule.
A Decryption Policy Rule window should open.
Configure the following:
Parameter Value
Name Decrypt_User_Traffic
Description Decrypts web traffic from Users_Net.

© 2017-2020 Palo Alto Networks, Inc. Page 251


Click the Source tab and configure the following:
Parameter Value
Source Zone Click Add and select Users_Net from the drop-down list
Source Address Verify that the Any check box is selected
Source User Verify that any is selected

Click the Destination tab and configure the following:


Parameter Value
Destination Zone Click Add and select Internet from the drop-down list
Click Add again and select Extranet from the drop-down
list
Destination Address Verify that the Any check box is selected

© 2017-2020 Palo Alto Networks, Inc. Page 252


Click the Service/URL Category tab and verify that the Service is set to Any and that
the box for Any above URL Category is checked:

Note that the Any setting for URL category instructs the firewall to decrypt all HTTPS traffic,
regardless of the type of website users are accessing. Decrypting traffic from users to website
categories such as Health and Medicine, Shopping or Government can expose Personally
Identifiable Information (PII). In a production environment, you will need to make sure you only
decrypt traffic which is appropriate.
Later in this lab, you will exclude several categories of websites as an illustration.
Click the Options tab and configure the following:

Parameter Value
Action Select the Decrypt radio button
Type Verify that SSL Forward Proxy is selected
Decryption Profile Verify that None is selected

© 2017-2020 Palo Alto Networks, Inc. Page 253


Leave the remaining settings unchanged.
Click OK to close the Decryption Policy Rule configuration window.
The Decryption Policy Rule window should close.
Verify that your configuration matches the following:

Commit all changes.

© 2017-2020 Palo Alto Networks, Inc. Page 254


Test Outbound Decryption Policy
In Firefox, browse to www.eicar.org.
You can use the bookmark on the toolbar for this site.
The browser presents a warning message.

Note: The endpoint (client workstation) does not trust the certificate generated by the firewall
(192.168.1.1).
Click the button for Advanced.
Click the link for View Certificate.

© 2017-2020 Palo Alto Networks, Inc. Page 255


Under the section for secure.eicar.org, note the Issuer Name section contains
192.168.1.1:

This certificate has been issued on behalf of www.eicar.org by the firewall (192.168.1.1) using
the Trusted Certificate you created earlier. The client browser does not trust this certificate
because it is “self-signed” by the firewall. In the next section, you will fix this issue so that the
Firefox browser trusts certificates issued by the firewall.
Close the Firefox browser.

Export the Firewall Certificate


To make users’ web browsing experience seamless while implementing decryption, you will
export the trusted certificate from the firewall and import the certificate into Firefox on the
Client host.

© 2017-2020 Palo Alto Networks, Inc. Page 256


In the firewall web interface, select Device > Certificate Management > Certificates.
Highlight but do not open trusted-cert.
At the bottom of the window, click Export Certificate to open the Export Certificate
configuration window.
Leave all setting unchanged and click OK to export the trust-ca certificate.

The file will be saved to the workstation’s Downloads folder.

© 2017-2020 Palo Alto Networks, Inc. Page 257


Import the Firewall Certificate
Open the Firefox web browser.
In the upper right corner of the window, click the “hamburger” button and choose
Preferences:

On the left side of the Preferences screen, select Privacy & Security:

Scroll to the bottom of the screen and locate the Certificates section.

© 2017-2020 Palo Alto Networks, Inc. Page 258


Click the button for View Certificates.

Under the Authorities tab, click Import.

Select the Downloads folder.


Highlight the entry for cert_trusted-cert.crt.

© 2017-2020 Palo Alto Networks, Inc. Page 259


Click Open.

In the Downloading Certificate window, places checks in both boxes for Trust this CA

Click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 260


The firewall trusted-cert entry appears in the list of certificate authorities:

The Firefox browser will trust any certificate issued by the entities in this Authorities list. By
adding the firewall certificate to this list, the Firefox browser will trust any certificates issued by
the firewall. Note that the process of importing certificates to client workstations varies based
on the browser type and the operating system.
Click OK to close the Certificate Manager window.
Close the tab for Preferences in Firefox.

Test Outbound Decryption Policy Again


With the firewall trusted-cert certificate imported to Firefox on the client workstation, try
downloading the virus file using HTTPS again.
In Firefox, browse to www.eicar.org.
You can use the bookmark on the toolbar for this site.
Click the link for Download Anti Malware Testfile:

© 2017-2020 Palo Alto Networks, Inc. Page 261


Scroll down and locate the section for Download area.
Click the link to for the eicar.com file download:

You will receive a warning page from the firewall indicating that it has detected and
blocked the malicious file download:

Note that the kind of message a client receives will vary depending on the browser.
Close the Firefox browser.

Review Firewall Logs


In this section, you will examine information in the firewall Logs to see more details about the
decryption process.
In the firewall web interface, select Monitor > Logs > Traffic.

© 2017-2020 Palo Alto Networks, Inc. Page 262


Add the Decrypted column to the table by selecting Columns > Decrypted.

Drag and drop the Session End Reason column from the right side of the table to the
beginning of the table:

This is not a requirement, but placing this column at the beginning of the table will make it
easier for you to locate entries that have ended because of unusual actions taken by the firewall
(such as detecting a threat).
Create and apply a filter to display entries that have been decrypted from the client
workstation and that have been terminated because of a detected threat in the traffic:
( flags has proxy ) and ( session_end_reason eq threat )

The Decrypted column will display either yes or no and this filter will display only those entries
that contain yes. The value proxy yes indicates that the firewall carried out a proxy connection
for decryption.

© 2017-2020 Palo Alto Networks, Inc. Page 263


Click the magnifying glass next to the entry listed to see details about the session.

The details you see will differ from the example shown, but you should see similar information
indicating that the firewall detected the eicar.com file and used a “reset-both” action to
terminate the session. Note that several columns have been hidden in the lower section of this
example window.
Click Close in the Detailed Log View.
Select Monitor > Logs > Threat.
The entry for virus indicates that the firewall detected and blocked the eicar.com file.

Note that this image has been wrapped to better fit the page.

© 2017-2020 Palo Alto Networks, Inc. Page 264


Exclude URL Categories from Decryption
The existing Decryption policy rule you created instructs the firewall to decrypt all traffic,
regardless of the URL category. In this section, you will configure a No-Decrypt rule that
instructs the firewall to exclude sensitive categories of web traffic from decryption in order to
avoid exposing PII (Personally Identifiable Information).

In the firewall web browser, select Policies > Decryption.


Click Add.
Under the General tab, enter No-Decryption for Name.

© 2017-2020 Palo Alto Networks, Inc. Page 265


For Description, enter Do not decrypt URLs in gov, shopping and finance.

Select the tab for Source.


Under the Source Zone section, click Add and select Users_Net.

Select the Destination tab.


Under the Destination Zone section, click Add and select Internet.

Select the tab for Service/URL Category.


Leave the Service set to any.

© 2017-2020 Palo Alto Networks, Inc. Page 266


Under the URL Category, use the Add button to add government, financial-services,
and shopping.

Select the tab for Options.


Verify that the Action is set to No Decrypt.

Click OK to create this entry.


You should have two entries in the Decryption policy.

© 2017-2020 Palo Alto Networks, Inc. Page 267


Before you proceed, answer the following question:
Is there anything wrong with these Decryption policy rules?

The answer is yes. They are in the wrong order. All traffic will match the first rule
Decrypt_Users_Traffic because the URL category is set to any. The firewall will therefore never
proceed beyond that first rule to implement the second rule, which instructs the firewall to
exclude financial-services, government and shopping websites from decryption.
Highlight the No-Decryption rule entry (but do not open it).
At the bottom of the window, click Move > Move Top.

The rules now should be in the correct order:

© 2017-2020 Palo Alto Networks, Inc. Page 268


Always place no-decrypt rules at the beginning of the Decryption policy table.
Commit all changes.

Test the No-Decryption Rule


With your No-Decryption rule in place, browse to a website which falls into one of the
excluded categories.
Open the Firefox browser.
Connect to https://texas.gov.
Click the padlock icon just in front of the URL:

Click the arrow next to Connection secure:

Click More information.

© 2017-2020 Palo Alto Networks, Inc. Page 269


Click View Certificate:

Note that the Issuer Name is not 192.168.1.1.

© 2017-2020 Palo Alto Networks, Inc. Page 270


If the firewall had decrypted this website, the Issuer Name would be displayed as 192.168.1.1.
Because you excluded government websites from Decryption, the firewall has not decrypted
this site. The issuer name you see may be different from the example shown here.
Close the Firefox browser.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 271


Lab 17 Scenario: Preventing Use of Stolen
Credentials
Numerous uses in your organization have received phishing emails recently. Most employees
have wisely ignored and deleted emails from unrecognized senders; however, an alarming
number of people continue to open suspicious emails and click included links.
You suspect that several users have supplied their work credentials to phishing websites, so you
will implement Credential Protection on the Palo Alto Networks firewall.
With Credential Protection in place, the firewall will block employees' attempts to enter work
usernames into external websites.

Lab Objectives
 Test the firewall behavior without credential detection
 Provide the firewall with User-ID information
 Test the firewall behavior with credential detection

Starting the Lab


For this lab, you will not load a starting configuration file.
To start this lab exercise, you will continue from the configuration you completed in the
previous lab on Decryption. This action will allow you to use the certificate you created on the
firewall and imported to the Firefox browser.
If you have not completed the previous lab on Decryption, please do so before starting this
lab. Otherwise, this exercise will not work correctly.

Test the Firewall Behavior Without Credential Detection


In this section you will connect to an Internet web site and enter a fictitious user’s domain
credentials. This action will allow you to see how the firewall behaves without Credential
Detection configured.
On the client workstation, open the Firefox browser.
Browse to https://login.paloaltonetworks.com.

© 2017-2020 Palo Alto Networks, Inc. Page 272


For Username, enter sholmes:

This username is one which belongs to our fictitious domain.


Click Next.
At the next window, enter 1234 in the password field.

Click Sign In.

© 2017-2020 Palo Alto Networks, Inc. Page 273


Because there is no account for sholmes, the site will present you with the following
message:

Note that you are not trying to log into the paloaltonetworks.com site. We are only testing
whether the firewall allows you to submit domain credentials to a website.
Close the Firefox web browser.
In the firewall web interface, select Network > Zones.
Click the entry for Users_Net to edit it.
Place a check in the box for Enable User Identification.

Leave the remaining settings unchanged.


Click OK.
Select Objects > Profiles > URL Filtering.
Click the entry for Corp-URL-Profile to edit it.
Select the tab for User Credential Detection.

© 2017-2020 Palo Alto Networks, Inc. Page 274


Under User Credential Detection, use the drop-down list to select Use IP User
Mapping.
In the section Under Log Severity, change the drop-down for Valid Username
Detected Log Severity to critical.

Under the tab for Categories, select Set All Credential Submission Actions to Block.
Click the small triangle next to the column header for User Credential Submission.
Select Set All Credential Submission Actions.
Select Block.

© 2017-2020 Palo Alto Networks, Inc. Page 275


Note that setting all URL categories to block credential submissions is not a good idea in a
production environment because no users would be able to submit any credentials to any
website. In this lab, you will use this setting so that you do not have to select individual
categories and change the option.
Click OK to close the Corp-URL-Profile window.

Apply the Corp-URL-Profile to Security Policy


In this section, you will apply the Corp-URL-Profile to the Security policy rule which allows
user traffic to reach the Internet.
In the firewall web interface, select Policies > Security.
Click the entry for Users_to_Internet.
Select the Action tab.
In the Profile Setting section, use the drop-down list for URL Filtering to select
Corp_URL_Profile.

Leave the remaining settings unchanged.


Click OK.
Commit the changes to the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 276


Provide the Firewall with User-ID Information
In this section, you will use a script to upload User-ID information to the firewall. This method
simulates an external device such as a wireless access point sending information to the firewall
using the XML API.
On the client desktop, double-click the icon for Class-Scripts:

Open the folder for EDU-210:

Double-click the icon for User-ID Data.

This script uses the XML API to send a list of users, IP addresses and groups to the firewall.
Select Monitor > User-ID.
You should see numerous entries indicating that the firewall has User-to-IP mappings:

© 2017-2020 Palo Alto Networks, Inc. Page 277


Test the Firewall Behavior with Credential Detection
Open Firefox.
Browse to https://login.paloaltonetworks.com
At the Sign In window, enter sholmes.
The user sholmes is a member of our fictional domain.
Click Next.
The firewall will present a window indicating that you have submitted your credentials to
a blocked site.

Recall that before configuring Credential Detection, the firewall allowed you to submit the
username and even a password to the website. With Credential Detection enabled, the firewall
blocks the session when you submit a username which belongs to the domain.
Close the Firefox browser.
In the firewall web interface, select Monitor > URL Filtering.
Modify the URL Filtering table by adding the Credential Detected column.
Add the Decrypted column.
Remove the URL Category List.
Clear any filters you may have in place.
In the filter field, enter the following text to display only entries that have been blocked:
( action eq block-url )

© 2017-2020 Palo Alto Networks, Inc. Page 278


Press Enter or use the Apply filter button.

This image has been cut and wrapped for better visibility in the Lab Guide.
Note the information displayed under the Credential Detected column.
Click the magnifying glass icon to see more detailed information about this entry.
In the Detailed Log View window that appears, scroll down and locate the Flags section
on the right-side of the window.

Note the check box for Decrypted which indicates that the firewall decrypted this traffic
and was able to detect an attempted credential submission.
Click Close in the Detailed Log View window.
Clear the filter.

© 2017-2020 Palo Alto Networks, Inc. Page 279


Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 280


Lab 18 Scenario: Implementing Day-One Best
Practice Configuration
You intend to cut over all production networks to use the Palo Alto Networks firewall this
weekend during a maintenance window. Before the change, you want to implement as many of
the best practices from Palo Alto Networks as you can before the firewall cut over. You realize
that maintaining a secure network is a continuous process and that you will need to review logs,
alerts and reports each day to help you fine-tune the configuration.
Nevertheless, there are a number of tasks that you can complete before the firewall goes into
production so that you start with a solid, secure network.

Lab Objectives
 Load a baseline configuration
 Generate traffic without profiles and examine logs
 Create Security Profiles
 Create a Security Group
 Apply the Security Group to existing Security policy rules
 Generate traffic with profiles and examine logs
 Create tags
 Enable policy rulebase settings and observe behavior

Apply a Baseline Configuration to the Firewall


To start this lab exercise, load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down list next to the Name text box and select edu-210-10.0-lab-18.xml.
Note the edu-210 portion in the filename because the drop-down list might contain lab
configuration files for other course numbers:
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 281


Generate Traffic Without Security Profiles
In this section, you will generate traffic that contains threats and malicious content. You will do
so from the client workstation and from the Extranet server. Because you have not yet configured
Security Profiles for your Security policy, the firewall will allow this harmful traffic.
After the testing, you will examine the Threat Log to verify that this traffic was passed.
On the client desktop, open the Remmina application by double-clicking the icon:

In the Remmina Remote Desktop Client window, double-click the entry for Server-
Extranet:

This action will open an SSH connection to the server and automatically log you in with
appropriate credentials.
Enter the following command to change the working directory:
cd pcaps92019/attack.pcaps/ <Enter>
Run the simulated attacks:
./malwareattacks.sh <Enter>
This script takes about 6 minutes to complete.
Allow the script to run uninterrupted.
Minimize the Remmina connection window and move to the next step.
On the client workstation, open the Firefox browser.
Connect to the following URI:
http://192.168.50.80/badtarfile.tar

© 2017-2020 Palo Alto Networks, Inc. Page 282


This filetype is one which you will block when you configure the firewall with a File Blocking
Profile.
When prompted, select Save File and click OK.

This action saves the malicious tar file to the client Downloads folder.
In Firefox, open a new tab.
Browse to the following URI:
http://192.168.50.80/companyssns.txt
The browser will display the file:

© 2017-2020 Palo Alto Networks, Inc. Page 283


Close the Firefox browser.
On the client workstation, open a Terminal Emulator window.
Enter the following command to generate a DNS query using dig to resolve a URL to an
IP address:
dig @4.2.2.2 www.quora.com <Enter>
Quora.com is one of the entries included in the malicious domains external dynamic list you
configured in an earlier lab.
The command returns a public IP address, indicating that the URL is accessible.

Note that the IP address you see may differ from this example.
Leave the Terminal Emulator window open because you will use it again later in this lab.
In the firewall web interface, select Monitor > Threats.
You should have no significant entries in the Threat Log.

Modify Existing Security Profiles


In previous labs, you created Security Profiles to inspect traffic for spyware and virus
signatures. You created a Security Profile for WildFire that forwards unknown executable
files to the WildFire cloud for inspection. And you created a URL Filtering Profile to prevent
users from browsing to potentially harmful categories of websites.
In this section, you will review these profiles.

© 2017-2020 Palo Alto Networks, Inc. Page 284


In the web interface, select Objects > Security Profiles > Antivirus.
Click the entry for Corp-AV.
Check the box for Enable Packet Capture.
For Description, enter Standard antivirus profile for all security
policy rules.

Enabling this setting instructs the firewall to take very small packet captures (more like packet
snippets) that contains patterns in traffic which match the signatures used in the profile.
Leave the remaining settings unchanged.
Click OK.
Select Objects > Security Profiles > Anti-Spyware.
Click the entry for outbound-as to edit it.
Change the name to Corp-AS.
Select the tab for DNS Policies.
For the malicious-domains-edl entry, change the Action to sinkhole.
Change the Packet Capture to single-packet.

© 2017-2020 Palo Alto Networks, Inc. Page 285


For Description, enter Standard anti-spyware profile for all security
policy rules.

Leave the remaining settings unchanged.


Click OK.

Create A Corporate Vulnerability Security Profile


In this section, you will create a vulnerability Security Profile. Palo Alto Networks provides two
vulnerability profiles which you can use as the basis for your own – strict and default.
You will clone the strict profile and modify it to function as your Corp-Vuln profile.
Select Objects > Security Profiles > Vulnerability Protection.
Place a check in the box beside strict.
At the bottom of the window, click Clone.
In the Clone window which appears, leave the settings unchanged and click OK.
A new Vulnerability Protection profile appears called strict-1.
Click the entry for strict-1 to open it.
Change the Name to Corp-Vuln.

© 2017-2020 Palo Alto Networks, Inc. Page 286


For Description, enter Standard vulnerability profile for all security
policy rules.

Leave the remaining settings unchanged and click OK.

Create a Corporate File Blocking Profile


In this section, you will configure a File Blocking Security Profile that the firewall will use to
help detect, report, and block attempts to download potentially harmful filetypes. Palo Alto
Networks provides two file blocking profiles which you can use as the basis for your own –
basic file blocking and strict file blocking.
You will clone the strict file blocking profile and modify it to function as your Corp-FileBlock
profile.
Select Objects > Security Profiles > File Blocking.
Place a check beside the entry for strict file blocking.
At the bottom of the window, click the Clone button.
In the Clone window which appears, leave the settings unchanged and click OK.
A new File Blocking profile appears called strict file blocking-1.
Click the entry for strict file blocking-1 to open it.
Change the Name to Corp-FileBlock.

© 2017-2020 Palo Alto Networks, Inc. Page 287


For Description, enter Standard file blocking profile for all security
policy rules.

Leave the remaining settings unchanged and click OK.

Create Data Filtering Profiles


Create a data filtering profile to detect and block the transfer of files which contain more than
three US social security numbers. Data Filtering Profiles are based on one or more Data Patterns,
so you will need to first configure a Data Pattern that matches variations of US social security
numbers.
Select Objects > Custom Objects > Data Patterns.
Click Add.
For Name, enter US-SSNs.
For Description, enter US Social Security Numbers.
Change the Pattern Type to Predefined Pattern.
Click Add.
Scroll down the available list and select Social Security Numbers.
Click Add again.

© 2017-2020 Palo Alto Networks, Inc. Page 288


Scroll down the list and select Social Security Numbers (without dash separator).

Leave the remaining settings unchanged and click OK.


Select Objects > Security Profiles > Data Filtering.
Click Add.
For Name, enter Corp-DataFilter.
For Description, enter Standard data filtering profile for all security
rules.
Click Add and select the US-SSNs data pattern that you defined.
Click in the Alert Threshold field and change the value to 1.
Click in the Block Threshold field and change the value to 3.
Change the Log Severity to critical.

© 2017-2020 Palo Alto Networks, Inc. Page 289


Leave the remaining settings unchanged.

Click OK.

Create a Security Profile Group


In order to simplify the process of applying Security Profiles to Security policy rules, you can
create a Security Profile Group which contains individual Security Profiles.
You can then apply the Security Profile Group to a Security policy rule, rather than individually
selecting each profile for each rule.
In this section, you will create a Security Profile Group called Corp-Profiles-Group. You will
add each of your Corp-* Security Profiles to the group.

© 2017-2020 Palo Alto Networks, Inc. Page 290


Select Objects > Security Profile Groups.
Click Add.
For Name, enter Corp-Profiles-Group.
For each of the available Profiles, use the drop-down list to select the Corp-* entry you
have created.

Click OK.

Apply the Corp-Profiles-Group to Security Policy Rules


With the Security Profiles in place, you can modify your Security policy rules to use these
protections.
Select Policies > Security.

© 2017-2020 Palo Alto Networks, Inc. Page 291


Individually edit each Security Policy rule which allows traffic and change the Profile
Setting under the Action tab to use the Corp-Profiles Group:

Be sure to edit and modify each of these rules:


• Users_to_Extranet
• Users_to_Internet
• Extranet_to_Internet
• Extranet_to_Users_Net
• Allow-PANW-Apps
• Acquisition-Allow-All
Commit your changes to the firewall.

Generate Attack Traffic with Security Profiles


On the client desktop, locate the Remmina SSH connection to Server-Extranet.
Enter the following command to change the working directory:
cd pcaps9209/attack.pcaps/ <Enter>
Run the simulated attacks script again:
./malwareattacks.sh <Enter>
This script takes about 6 minutes to complete.
Allow the script to run uninterrupted.

© 2017-2020 Palo Alto Networks, Inc. Page 292


Minimize the Remmina connection window and move to the next step.
On the client workstation, open the Firefox browser.
Connect to the following URI:
http://192.168.50.80/badtarfile.tar
You should receive a File Transfer Blocked page from the firewall.

This page indicates that the firewall has blocked the file using the File Blocking profile you
defined.
In Firefox, open a new tab.
Browse to the following URI:
http://192.168.50.80/companyssns.txt

© 2017-2020 Palo Alto Networks, Inc. Page 293


You should receive a Data Transfer Blocked page from the firewall.

This page indicates that the firewall has blocked the transfer using the Data Filtering Profile and
Data Pattern you defined for Social Security Numbers.
Close the Firefox browser.
On the client workstation, locate the open Terminal Emulator window you used earlier in
this lab.
Run the dig command again to resolve a URL to an IP address:
dig @4.2.2.2 www.quora.com <Enter>

© 2017-2020 Palo Alto Networks, Inc. Page 294


This time, the command returns sinkhole.paloaltonetworks.com instead of an IP address
for the domain.

This indicates that the firewall has intercepted and sinkholed the DNS query using the DNS
Sinkholing function in your Anti-Spyware profile.
In the firewall web interface, select Monitor > Logs > Threat.
The Threat Log should contain numerous entries for spyware and vulnerabilities:

These entries indicate that the firewall has blocked malicious traffic using the Vulnerability and
Anti-Spyware profiles that you defined. Note that the entries you see in the Threat Log may
differ from the example shown here. The table may not contain very many entries until the
malwareattacks script is finished. Use the refresh button periodically to update the table. Also,
several Threat Log columns have been hidden in this example.

© 2017-2020 Palo Alto Networks, Inc. Page 295


Select Monitor > Logs > URL Filtering.
Note the numerous entries for blocked URLs:

These entries indicate that the firewall has blocked access to dangerous URL categories using
the URL Filtering profile you defined. Note that several default columns have been hidden in this
example.

Create Tags
You can create color-coded labels for use in various places within the firewall web
configuration. These labels can be visual aids which help you more quickly locate information.
In this section you will create Tags to use with your Security policy rules.
Select Objects > Tags.
Click Add.
For Name, enter Allow.
For Color, select Lime.
For Comments, enter Tag for allowed traffic.

Click OK.

© 2017-2020 Palo Alto Networks, Inc. Page 296


Click Add.
For Name, enter Block.
For Color, select Red.
For Comment, enter Tag for blocked traffic.

Click OK.

Apply Tags to Security Policy Rules


With the Tags defined, you can assign them to your security rules. You will assign the Allow tag
to all rules which have an action of Allow. You will assign the Blocked tag to all rules which
have an action of Deny.
Select Policies > Security.
Add the Tags column to the display.
A. Click the small triangle in the column header for Name.
B. Select Columns.
C. Check the box for Tags.

Note that if you have already displayed the Tags column in the Security Policy Rule table, you
can drag and drop it beside the Name column.

© 2017-2020 Palo Alto Networks, Inc. Page 297


For each rule in the list, you will apply either a Block or Allow tag, based on the Rule
Action.
In the row for Block-Known-Bad-IPs, click the link for none under the Tags column.

In the Tagging window which appears, click the small drop-down triangle.

Select Block from the list.

Click OK to close the Tagging window for this rule.


Repeat this process for each remaining rule in the list, applying the appropriate Allow or
Blocked tag, depending on the rule action.
Note that you will need to use the Override button for the intrazone-default rule.

© 2017-2020 Palo Alto Networks, Inc. Page 298


When complete, your rules should match the following example:

Note that this is a simple illustration of how to create and apply Tags to your Security policy
rules. You can also apply more than one Tag to your rules.
Commit your changes to the firewall.

Enforce Rule Tags and Description Requirements


You can force firewall administrators to supply information in the Description field of Security
policy rules and to apply a Tag as well. This additional information can help you determine why
a rule has been created and what it was meant to accomplish.
Select Device > Setup > Management.
Scroll down and locate the section for Policy Rulebase Settings.
Click the gear icon to edit these settings.

© 2017-2020 Palo Alto Networks, Inc. Page 299


Check the boxes for each of the following items:
 Require description on policies
 Fail commit if policies have no tags or description

Note: If you check the option for Require Tag on policies, you will need to modify your NAT
Policy rules and assign a Tag to each of them.
Leave the remaining settings unchanged and click OK.
Commit your changes to the firewall.
You should see a message indicating that one of the rules does not have a Description:

Click Close.
Open the Acquisition-Allow-All rule.

© 2017-2020 Palo Alto Networks, Inc. Page 300


Enter the following Description for the rule:
Allows traffic from acquisition zone.

Click OK.
Commit the changes to the firewall.
This time the commit process will succeed.

Test the Rule Requirements


In this section, you will create a new Security policy rule and attempt to leave out the
Description. This will let you see what happens when an administrator does not provide
adequate information when creating a rule.
Select Policies > Security.
Under the General tab, enter Test-Policy for the Name.
Click inside the Description field and note the pop-up indicator:

© 2017-2020 Palo Alto Networks, Inc. Page 301


Click Cancel.
You do not need to complete the process of creating a rule.

Lab Clean-Up
On the workstation desktop, locate the Remmina SSH connection to the Extranet server.
Type exit <Enter> to close the session.
Close the Remmina desktop application window.
Locate the open Terminal Emulator window on the workstation desktop.
Type exit <Enter> to close the window.

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 302


Lab 19 Scenario: Viewing Threat and Application
Information
Having worked with the new Palo Alto Networks firewall for almost a week, you have
discovered how much information the device provides about traffic that it processes. You have
already worked with the Traffic, Threat, URL and System log files and learned how to create
filters to locate specific information. But before you roll the firewall into production, you want to
spend some time looking at some of the other resources, graphs, reports and tools that are
available.
You will also need to show your colleagues where to find different kinds of information in the
firewall web interface so that they can assist you in keeping your network as secure as possible.

Lab Objectives
 View threat information using the Dashboard
 View application information using the Dashboard
 View threat information using the ACC
 View application information using the ACC
 View threat information using the Threat log
 View application information using the Traffic log
 View threat information using App Scope reports
 View threat information using predefined reports
 View application information using predefined reports
 View threat and application information using custom reports

Apply a Baseline Configuration to the Firewall


To start this lab exercise, load a preconfigured firewall configuration file.
In the Palo Alto Networks firewall web interface, select Device > Setup > Operations.
Click Load named configuration snapshot.
Click the drop-down list next to the Name text box and select edu-210-10.0-lab-19.xml.
Note the edu-210 portion in the filename because the drop-down list might contain lab
configuration files for other course numbers:
Click OK.
A window should open that confirms that the configuration is being loaded.
Click Close.
Click the Commit link at the upper right of the web interface:
Click Commit again and wait until the commit process is complete.
Click Close to continue.

© 2017-2020 Palo Alto Networks, Inc. Page 303


Generate Traffic
In this section, you generate simulated attacks, web browsing and application traffic to populate
firewall logs.
On the client workstation, open the Remmina application.
Double-click the entry for Server-Extranet.
At the prompt, enter the following command:
./UsingLogs-V1.sh <Enter>
Allow the script to run uninterrupted, but you can minimize the Remmina connection
window.
Minimize the Remmina application window.

Display Recent Threat Information in the Dashboard


You will use the Dashboard to view threats detected by the firewall in the last hour. Because
you can configure the Dashboard to periodically refresh, the displayed threats will change,
depending on the most recent information available. The Dashboard information is sourced
from the Threat, URL Filtering, and Data Filtering logs.
In the web interface, click the Dashboard tab.
Click Widgets and select Logs > Threat Logs:

Note that if Threat Logs is greyed-out, it means that the widget is already displayed on the
Dashboard.

© 2017-2020 Palo Alto Networks, Inc. Page 304


Are any threats displayed in the Threats Logs widget? It can display the 10 most recent
threats detected by the firewall in the last hour.
Depending on activity in your lab environment in the last hour, you might not see threat entries.
This widget is useful for viewing only the most recent threats detected by the firewall. Here is an
example:

You can use the refresh button in the upper right corner of any widget to update the displayed
items.

© 2017-2020 Palo Alto Networks, Inc. Page 305


Click Widgets and select Logs > URL Filtering Logs.
A URL Filtering Logs widget should appear on the Dashboard. Note that if URL Filtering Logs is
greyed-out, it means that the widget is already displayed on the Dashboard.

You can use the refresh button in the upper right corner of any widget to update the displayed
items.
Are any URLs displayed in the URL Filtering Logs widget? It can display the 10 most
recent URLs seen by the firewall in the last hour.
Depending on activity in your lab environment in the last hour, you might see URL entries. This
widget is useful for viewing only the most recent URLs seen by the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 306


Click Widgets and select Logs > Data Filtering Logs.
A Data Logs widget should appear on the Dashboard. Note that if Data Filtering Logs is greyed-
out, it means that the widget is already displayed on the Dashboard.

Are any files displayed in the Data Logs widget? It can display the 10 most recent files
detected by the firewall in the last hour.
Depending on activity in your lab environment in the last hour, you might not see file entries.
This widget is useful for viewing only the most recent file transfers seen by the firewall.

© 2017-2020 Palo Alto Networks, Inc. Page 307


Display Recent Application Information in the Dashboard
In this section, you will display the Dashboard and view applications identified by the
firewall in the last hour. Because you can configure the Dashboard to periodically refresh,
the displayed applications will change depending on the most recent information available.
You also will use the Dashboard to display those applications identified by the firewall in the
last hour that have the most risk associated with them.
In the web interface, click the Dashboard tab.
Click Widgets and select Application > Top Applications.
A Top Applications widget should appear on the Dashboard.
Look at the applications displayed in the Top Applications widget. It displays the
applications seen by the firewall in the last hour.
Some applications should be listed because some “housekeeping” traffic nearly always traverses
the network, even in the lab environment. This widget is useful for viewing only the recent
application traffic seen in the last hour by the firewall. Here is an example:

Click Widgets and select Application > Top High Risk Applications.
A Top High Risk Applications widget should appear on the Dashboard.

© 2017-2020 Palo Alto Networks, Inc. Page 308


Notice the applications displayed in the Top High Risk Applications widget. It displays
the high-risk applications seen by the firewall in the last hour.
Some applications should be listed because some “housekeeping” traffic nearly always traverses
the network. This widget is useful for quickly viewing only the recent application traffic seen by
the firewall in the last hour. Here is an example:

Applications with a risk level of 4 are shown in orange. Applications with a risk level of 5 are
shown in red. These rankings come from Palo Alto Networks.

View Threat Information in the ACC


In this section, you will view a few ACC widgets on the Threat Activity tab to become
familiar with widgets that display threats against your environment. Spend time examining
each widget so that you can determine which information is presented that might be most
useful to you back in your environment.
In the web interface, click the ACC tab.

© 2017-2020 Palo Alto Networks, Inc. Page 309


On the left side of the ACC page, look at Global Filters for any configured global filters.
If there are filters, click Clear all:

Click the Threat Activity tab:

On the left side of the ACC window, click the Time drop-down menu and select Last 7
Days. This value configures all the widgets to display threat information for the last
seven days:

Do you see any threats listed in the Threat Activity widget?


You should see some combination of flood, scan, spyware, packet, vulnerability, and virus
threats displayed in a graph. Next to each entry should be the number of occurrences of these
threat types that the firewall has seen in the last seven days. More detail about the threats
should be displayed in a table below the graph:

© 2017-2020 Palo Alto Networks, Inc. Page 310


In the Threat Activity widget’s table below the graph, click the small arrow icon next to
one of the critical severity level entries.

This action adds critical severity level as a Global filter for the ACC. Global filters are applied to
every widget on the ACC. Global filters are useful for quickly pivoting your search on a specific
piece of information, thus causing all widgets to display only information that is relevant to a
specific object or threat.
Did the widget’s table change to display only threats that have a critical severity level?
The widget should have changed to display only critical severity level threats. The graph will also
change to display only threats which match the filter.
Find the global filter on the left side of the ACC window. Was critical added as a global
filter condition?

You should see a global filter for critical.

© 2017-2020 Palo Alto Networks, Inc. Page 311


Note that the Threat Activity graph and the table of Threat Names are updated to reflect
only items with a Severity level of Critical.

In the Global Filters area, click Clear all to remove the global filter.
The global filter should be removed, and all widgets should be refreshed to include all threats
detected in the last seven days.
On the Threat Activity tab, which widgets would you use to see which hosts have either
visited or resolved a malicious DNS domain? Make a guess based on the widget names.
The answer is: Hosts Visiting Malicious URLs and Hosts Resolving Malicious Domains.

View Application Information in the ACC


In this section, you will view two widgets on the Network Activity tab. The goal is for you to
gain familiarity with some of the widgets available for viewing application and traffic
information.
In the web interface, click the ACC tab and then the Network Activity tab.

© 2017-2020 Palo Alto Networks, Inc. Page 312


Hide the sidebar to make more room for the widgets by clicking the very small arrow
shown:

Resize the Application column to display the entries:

© 2017-2020 Palo Alto Networks, Inc. Page 313


The top section of the Application Usage widget is a graph that illustrates how much of
the traffic a specific application represents:

Think of this as a sort of square pie-chart.


Hover your pointer over the section for web-browsing.

This action displays a summary window with information about that application.

© 2017-2020 Palo Alto Networks, Inc. Page 314


In the table below the graph, hover your pointer over the web-browsing application until
the global filter Left arrow appears. Then click the Left arrow to promote the web-
browsing application to a global filter:

Unhide the sidebar by clicking the tiny arrow again:

© 2017-2020 Palo Alto Networks, Inc. Page 315


Scroll down in the Network Activity tab until you reach the Rule Usage widget.
Select the radio button at the top for Bytes.

Which Security policy rules have allowed web-browsing traffic?


The widget should display only those rules that have allowed web-browsing traffic in the last
seven days because the widget is filtered by the web-browsing application in the global filter
and the ACC time range setting.

© 2017-2020 Palo Alto Networks, Inc. Page 316


In the upper right corner of the Rule Usage widget, click the Jump to Logs button and
select Traffic Log icon to open the logs menu.

Which log is displayed in the web interface?


It should be the Traffic log.
Which log filters have been applied automatically to the Traffic log?

There should be a time range filter and an application filter for web-browsing. The time range
filter is derived from the time specified in the ACC.
Note that the entries displayed in the Traffic log match the filter:

© 2017-2020 Palo Alto Networks, Inc. Page 317


Clear the filter in the Traffic log.
Click the ACC tab.
In the Global Filters area, click Clear all to remove the global filter:

View Threat Information in the Threat Log


In this section, you will apply different filters to the Threat log. You will use the filters to
determine whether all critical-severity and high-severity threats detected by the firewall have
been blocked. You also will use a log filter to determine which threats have been detected that
come from a specific security zone.
In the web interface, select Monitor > Logs > Threat.
In the upper right corner of the window, click the X icon in the filter area to remove any
existing log filter:

Click the + icon in the filter area to open the Add Log Filter window:

The Add Log Filter window should open.

© 2017-2020 Palo Alto Networks, Inc. Page 318


In the Add Log Filter window, select the following:

Parameter Value
Connector and
Attribute Severity
Operator greater than or equal
Value high

This configuration filters the log to display only critical-severity and high-severity threats.

Click Add to add the in-progress filter to the top pane of the Add Log Filter’s window:

Click Apply to add the filter to the Threat log filter text box.
The Add Log Filter window should close.

As you become more familiar with filter syntax, you can simply type the filter directly into the
filter field and forgo using the filter builder.

© 2017-2020 Palo Alto Networks, Inc. Page 319


With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Threat log:

Has the Threat log been filtered to display only threats of high severity or greater?
It should be filtered. You can scan the Action column to determine how the threats have been
handled by the firewall. You could, for example, use this information to help you determine the
Security Profile configuration required to control threats found in legitimate traffic.

Click the X icon in the filter area to remove any existing log filter:

Click the + icon in the filter area to re-open the Add Log Filter window.

© 2017-2020 Palo Alto Networks, Inc. Page 320


In the Add Log Filter window, select the following:

Parameter Value
Connector and
Attribute Source User
Operator equal
Value chicago\escrooge

This configuration filters the log to display threats coming from only this user.

Click Add and then click Apply to add the filter to the Threat log filter text box.
The Add Log Filter window should close, and the filter should have been added to the Threat
log’s filter text box.

With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Threat log.
Has the Threat log been filtered to display only threats coming from the specified user?
You may need to add the Source User column to the Threat Log display if it is not already
present.

© 2017-2020 Palo Alto Networks, Inc. Page 321


Click the X icon to clear the filter from the log filter text box.
Note: URL Filtering, WildFire Submissions, and Data Filtering logs are available to display traffic
and threats detected by the firewall but are not shown in this section. You also can use filters to
view these logs.

View Application Information in the Traffic Log


In this section, you will apply different filters to the Traffic log. You will use a filter to
determine which applications are being seen in a specific zone.
In the web interface, select Monitor > Logs > Traffic.
Click the X icon in the filter area to remove any existing log filter
Click the + icon in the filter area to open the Add Log Filter window:
The Add Log Filter window should open.
In the Add Log Filter window, select the following:

Parameter Value
Connector and
Attribute Source Zone
Operator equal
Value Acquisition

This configuration filters the log to display only application traffic that is sourced from the
Acquisition zone. You could use this information, for example, to help you to determine how to
configure your Security policy rules. You easily could modify the filter to display application
traffic sourced from any zone and use that information to help you improve your Security policy
configuration.

© 2017-2020 Palo Alto Networks, Inc. Page 322


Click Add and then click Apply to add the filter to the Traffic log filter text box.
The Add Log Filter window should close.

With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Traffic log
Has the Traffic log been filtered to display only traffic sourced from the Acquisition
zone?
It should be. You could use this information to help you determine the Security policy rules
required to control legitimate traffic sourced from devices in the dmz zone.

Click the + icon in the filter area to again open the Add Log Filter window.
The Acquisition source zone filter still should appear in the open Add Log Filter window.

© 2017-2020 Palo Alto Networks, Inc. Page 323


In the Add Log Filter window in the top pane, modify the existing source zone filter to
filter on the User_Net zone instead of the Acquisition zone. The completed filter should
read (zone.src eq Users_Net):

In the open Add Log Filter window, also add the following selections:

Parameter Value
Connector and
Attribute Application
Operator equal
Value web-browsing

Click Add and then click Apply to add the filter to the Traffic log filter text box.
The Add Log Filter window should close.

© 2017-2020 Palo Alto Networks, Inc. Page 324


With the filter string in the log filter text box, click the right arrow icon to apply the
filter to the Traffic log.
Has the Traffic log been filtered to display only web-browsing traffic sourced from the
Users_Net zone?
It should be filtered.

View Threats Using App Scope Reports


In this section, you will view threat information using App Scope’s Threat Monitor and Threat
Map reports.
In the web interface, select Monitor > App Scope > Threat Monitor.
At the bottom of the window, click Last 7 days:

© 2017-2020 Palo Alto Networks, Inc. Page 325


The window should update to display the top 10 threats detected by the firewall in the last
seven days.

Note that the image you see will differ from the example shown here.
At the top of the window, click Top 10 and select Top 25 from the menu:

This configuration enables you to see the top 25 threats within the selected time range.
At the top of the window, click Threat and choose Source User:

© 2017-2020 Palo Alto Networks, Inc. Page 326


At the top of the window, hover your pointer over each Filter icon to see how to display
specific types of threats:

Select Show all threat types.


Hover your pointer over the top section of any bar on the bar chart. What appears on the
page?
You should see a popup window that shows the threat name and number of detections.

The information you see may differ from the example here.

View Threat Information Using Predefined Reports


In this section, you will open and view two of the more than 40 predefined reports available
on the firewall. Your efficient use of the predefined reports depends on your spending time
with each report, discovering and determining which information might be useful to you in
your own environment. Your familiarity with the reports will help you to find the reports that
are most useful to you.

© 2017-2020 Palo Alto Networks, Inc. Page 327


In the web interface, select Monitor > Reports.
Click Traffic Reports to expand the list of available Traffic Reports:

Click Sources to view a report.


A Sources report should be displayed in the web interface. The report displays which source IP
addresses were detected by your firewall on the previous day. It should have a format like the
following example, but your data will be different.

© 2017-2020 Palo Alto Networks, Inc. Page 328


In the calendar below the report column, click various dates from the past week to see
information about traffic logged by the firewall on other days:

Note that days which are greyed-out do not have any data available.

View Application Information Using Predefined Reports


In this section, you will open and view two reports from the more than 40 predefined reports
available on the firewall. After you have learned to open and view a single report, you have
the knowledge to open and view any report. Your efficient use of the predefined reports
depends on your spending time with each report, discovering and determining which
information in which reports might be most useful to you.
In the web interface, select Monitor > Reports.
Click Application Reports to expand the list of available application reports:

© 2017-2020 Palo Alto Networks, Inc. Page 329


Click Applications to view the Applications report.
An Applications report should be displayed in the web interface. The report displays the
applications that were detected by your firewall on the previous day. It should have a format
like the following example, but your application data will be different. You can use this
information to update your Security policy rules, as necessary.

Click URL Filtering Reports to expand the list of available URL Filtering reports:

Click Web Sites to view the report. Click each date until you see a report with data.
A Web Sites report should be displayed in the web interface. The report displays the websites
that were seen by your firewall on a given day. It should have a format like the following

© 2017-2020 Palo Alto Networks, Inc. Page 330


example, but your data will be different. You can use this information to update your Security
policy rules or a URL Filtering Profile, as necessary.

View Threat and Application Information Using Custom


Reports
In this section, you will create two custom reports. The custom reports feature enables you to
build reports that include only the information that you consider useful to you in your
environment. The first custom report will list the applications that the firewall has detected in
each of your internal security zones. The second custom report will list the applications that
the firewall has detected in the outside zone, which in the lab environment is associated with
the internet. Such information can help you to improve the configuration of your Security
policy.
In the web interface, select Monitor > Manage Custom Reports.
Click Add and configure the following in the Custom Report window:

Parameter Value
Name Apps Used by Internal Zones
Database Traffic Summary
Scheduled check box Select it
Time Frame Last 7 Days
Sort By Select Sessions and Top 100
Group By Select Source Zone and 5 Groups
Selected Columns In top-down order, select Source Zone, Application, Bytes,
and Action

© 2017-2020 Palo Alto Networks, Inc. Page 331


The report will list each internal zone along with the applications seen coming from each zone.
Because only four zones are available in the lab environment, grouping of the data into a
maximum of five groups is enough to display all zones. Sorting the applications list in each zone
by the top 100 sessions should display all applications associated with a source zone.

In the bottom right corner of the Custom Report window, click the Filter Builder link:

The Add Log Filter window should open.


Configure the following:

Parameter Value
Connector and
Attribute Source Zone
Operator not equal
Value Internet

© 2017-2020 Palo Alto Networks, Inc. Page 332


In the Add Log Filter window, click Add and then Apply.
A filter should be added to the custom report. The Internet zone is outside of your network, and
this filter ensures that the custom report does not include applications that are coming from
outside your network.

Click OK to close the Custom Report window.


The new custom report should be added to the list of custom reports in the web interface.

Click Apps Used by Internal Zones to open the custom report.


Click Run Now to run the custom report:

The report should run, and the results should be displayed in a tab that is added and opened in
the Custom Report window.

© 2017-2020 Palo Alto Networks, Inc. Page 333


View the results of the custom report.
You can scroll down through the report to see information about the Extranet and the
Acquisition zones along with details about the applications which the firewall processed in each
one.

When you are finished viewing the report, close it by clicking the X on the Apps Used
by Internal Zones (100%) tab:

Click Cancel to close the Custom Report window.

© 2017-2020 Palo Alto Networks, Inc. Page 334


Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. Page 335


Lab 20 Scenario: Capstone
This comprehensive lab is meant to provide you with additional hands-on firewall experience
and to enable you to test your new knowledge and skills. You can refer to your student guide and
previous lab exercises.
In this scenario, you are a network administrator and recently received a new Palo Alto Networks
VM-Series firewall. The firewall’s management IP address is 192.168.1.254. You can log in with
the username admin and Pal0Alt0! as the password. Take special care to use the exact
spelling and capitalization for the items you are asked to configure.
You are being asked to meet multiple configuration objectives. These objectives are listed in the
lab exercise sections that follow.

© 2017-2020 Palo Alto Networks, Inc. Page 336


Load a Lab Configuration
1. In the web interface, select Device > Setup > Operations.
2. Click Load named configuration snapshot:
3. Select edu-210-10.0-lab-20-start.xml and click OK.
4. Click Close.
5. Commit all changes.

Configure Networking
Complete the following objectives:
 Configure three firewall interfaces using the following values:
 Ethernet 1/1: 203.0.113.20/24 - Layer 3
 Ethernet 1/2: 192.168.1.1/24 - Layer 3
 Ethernet 1/3: 192.168.50.1/24 - Layer 3
 Create a virtual router called VR-1 for all configured firewall interfaces.
 Create a default route for the firewall called Default-Route
 Create an Interface Management Profile called Allow-ping that allows ping
 Assign the Allow-ping Interface Management Profile to ethernet1/2
Verify network connectivity from the firewall to other hosts.
 Your internal host can ping 192.168.1.1 and receive a response
 From the firewall CLI, the following commands are successful:
 ping source 203.0.113.20 host 203.0.113.1
 ping source 203.0.113.20 host 8.8.8.8
 ping source 192.168.1.1 host 192.168.1.20
 ping source 192.168.50.1 host 192.168.50.150

Configure Security Zones


Complete the following objectives:
 Create a Security Zone called Internet and assign ethernet1/1 to the zone
 Create a Security Zone called Users and assign ethernet1/2 to the zone:
 Configure the Users Zone for User-ID
 Create a Security Zone called Extranet and assign ethernet1/3 to the zone
 Create Tags for each Security Zone using the following names and colors:
 Extranet – orange
 Internet – black
 Users – green

© 2017-2020 Palo Alto Networks, Inc. Page 337


Configure NAT Policy Rules
Create Source NAT rules to meet the following requirements:
 Rule Name = Users_to_Internet
 From Source Zone Users to Destination Zone Internet
 Use ethernet1/1 on the firewall as the source translation address
 Tag = Users
 Rule Name = Extranet_to_Internet
 From Source Zone Extranet to Destination Zone Internet
 Use ethernet1/1 on the firewall as the source translation address
 Tag = Extranet
 All NAT rules must include a helpful Description

Configure Security Policy Rules


Create Security policy rules to meet the following requirements:
 For all Security policy rules, enter a helpful Description.
 Create and apply the following Tags to the Security policy rules as appropriate:
 Allow – Lime
 Block – Red
 Modify the interzone-default Security policy rule so that traffic is logged at session end.
 Create a Security policy rule called Block_Bad_URLs with the following characteristics:
 For all outbound traffic, the URL categories hacking, phishing, malware, and
unknown must be blocked by a Security policy rule match criterion.
 From the User zone to the Extranet zone, create a Security policy rule called
Users_to_Extranet to allow the following applications:
 ping
 ssl
 ssh
 dns
 web-browsing
 From the User zone to the Internet zone, create a Security policy rule called
Users_to_Internet to allow the following applications:
 ping
 dns
 web-browsing
 ssl

© 2017-2020 Palo Alto Networks, Inc. Page 338


 From the Extranet zone to the Internet zone, create a Security policy rule called
Extranet_to_Internet to allow the following applications:
 ping
 dns
 web-browsing
 ssl
You can consider this objective complete when the following tests are successful:
 The client host can ping 8.8.8.8 and google.com
 The client host can access www.paloaltonetworks.com
 The client host can browse to the Extranet web server at http://192.168.50.80
 The client host can use SSH to access the Extranet host at 192.168.50.150 using the login
name paloalto42 and the password Pal0Alt0!
 The Extranet host can ping 8.8.8.8 and google.com
 The internal host cannot access hacker9.com

Create and Apply Security Profiles


Create Security Profiles and a Security Profile Group to meet the following requirements:
 A Corporate URL Filtering Security Profile called Corp-URL to log access to all web
categories
You can use the existing default profile as the basis for your own

 A Corporate File Blocking Security Profile called Corp-FB to block dangerous file
types
You can use the existing strict profile as the basis for your own

 A Corporate Antivirus Security Profile called Corp-AV to block viruses


You can use the existing default profile as the basis for your own

 A Corporate Anti-Spyware Security Profile called Corp-AS to block viruses


You can use the existing strict profile as the basis for your own

 A Corporate Vulnerability Protection Security Profile called Corp-Vuln to block


viruses
You can use the existing strict profile as the basis for your own

 A Corporate WildFire Profile called Corp-WF to send all file types to the public cloud
for inspection
You can use the existing default profile as the basis for your own

© 2017-2020 Palo Alto Networks, Inc. Page 339


 Create a Security Profile Group called Corp-Profiles and assign the appropriate
Security Profiles to it
Note: You can leave the Data Filtering Profile set to None.

 Apply the Corp-Profiles Group to all applicable Security policy rules


You can consider this objective complete when the following tests are successful:
 The internal host cannot download a virus file from www.eicar.org using HTTP. (ignore)
 The internal host cannot download the badtarfile.tar from
http://192.168.50.80/badtarfile.tar
 A URL log file entry appears when the client host browses to
https://www.paloaltonetworks.com

© 2017-2020 Palo Alto Networks, Inc. Page 340


Solutions
You can use the following screenshots to determine how to accomplish the requirements for this
lab. You are encouraged to attempt meeting the requirements BEFORE you use these
screenshots.

Firewall Interfaces
Network > Interfaces > Ethernet

Virtual Router
Network > Virtual Routers

© 2017-2020 Palo Alto Networks, Inc. Page 341


Firewall Default Route
Network > Virtual Routers > VR-1 > Static Routes

Allow-ping Interface Management Profile


Network > Network Profiles > Interface Mgmt

Allow-ping Interface Management Profile Assigned to ethernet1/2


Network > Interfaces > Ethernet > ethernet1/2 > Advanced

© 2017-2020 Palo Alto Networks, Inc. Page 342


Security Zones
Network > Zones

NAT Policy Rules


Policies > NAT

© 2017-2020 Palo Alto Networks, Inc. Page 343


Security Policy Rules
Policies > Security

© 2017-2020 Palo Alto Networks, Inc. Page 344


Security Profiles
Objects > Security Profiles
 Corporate URL Filtering Profile

 Corporate File Blocking Profile

 Corporate Antivirus Profile

© 2017-2020 Palo Alto Networks, Inc. Page 345


 Corporate Anti-Spyware Profile

 Corporate Vulnerability Profile

 Corporate WildFire Profile

© 2017-2020 Palo Alto Networks, Inc. Page 346


 Security Profile Group

 Security policy rules with Profile Group


Policies > Security > [Rule] > Actions

Stop. This is the end of the lab.

© 2017-2020 Palo Alto Networks, Inc. PAN-EDU-210 10.0 Version A Page 347

You might also like