Firewall Installation, Configuration, and Management: Essentials I Lab Manual
Firewall Installation, Configuration, and Management: Essentials I Lab Manual
Firewall Installation, Configuration, and Management: Essentials I Lab Manual
Management:
Essentials I
Lab Manual
PAN-OS 7.0
PAN-EDU-101CS rev 3
For CloudShare
Lab Manual
Page 2
Table of Contents
How to Use This Lab Guide .................................................................................................. 6
Lab Guide Objectives ........................................................................................................... 6
Obtain Lab Access ............................................................................................................. 10
Access the Lab................................................................................................................... 11
Scenario Initial Configuration ......................................................................................... 12
Scenario .........................................................................................................................................................................12
RequiredInformation......................................................................................................................................................12
Lab Manual
Page 3
Solution AppID............................................................................................................... 25
Verify Internet Connectivity and Application Blocking ................................................................................................... 26
Solution ContentID......................................................................................................... 29
Configure a Custom URL Filtering Category ....................................................................................................................29
Configure a URL Filtering Profile .....................................................................................................................................29
Configure an Antivirus Profile .........................................................................................................................................29
Configure an AntiSpyware Profile ..................................................................................................................................30
Assign Profiles to a Policy ...............................................................................................................................................30
Test the Antivirus Profile ................................................................................................................................................30
Modify the Antivirus Profile ...........................................................................................................................................31
Test the New Antivirus Profile.........................................................................................................................................31
Test the URL Filtering Profile ..........................................................................................................................................32
Configure a Security Profile Group .................................................................................................................................32
Assign the Security Profile Group to a Policy .................................................................................................................32
Lab Scenario: File Blocking ............................................................................................................................................33
Lab Manual
Page 4
Lab Manual
Page 5
Lab Manual
Page 6
3. Select the Essentials 1 Labs popup. The Essentials 1 Labs Training Details page appears, with a list of
available sessions with dates.
Lab Manual
Page 10
2. Then you should receive an email from CloudShare inviting you to start the lab session. This invitation
is good for 3 days.
3. Click on the link to CloudShare in the email to access the lab environment. The environment will be
available for 24 hours after your initial access. A CloudShare admin can extend the access time up to 3
days.
Lab Manual
Page 11
Scenario
You have been tasked with integrating a new firewall into your environment. The firewall has the default
192.168.1.1 MGT IP address and admin administrator account.
In preparation for the new deployment, create a role for an assistant administrator that allows access to
all firewall functionality through the WebUI except Monitor, Network, Privacy, and Device. The account
should have no access to the XML API or the CLI. Create an account using this role. Also change the
password of the admin account to disable the warnings about using default credentials.
Required Information
New Administrator Role name
New Administrator Account name
New Administrator Account password
New password for the admin account
Lab Manual
Policy Admins
ip-admin
paloalto
paloalto
Page 12
Select the View VM button for the Windows Desktop VM. A Windows Desktop screen appears.
If necessary, press the Ctrl+Alt+Del button.
Select the Student1 account.
Enter the password 9Lp2AjsE.
Open a command prompt on the Windows Desktop.
Enter ipconfig. Notice that the address of the Windows Desktop VM is 192.168.1.100/24.
Verify that you can ping the Firewall MGT port IP address 192.168.1.1 from the Windows Desktop.
Enter ip-admin
Enter paloalto
Select Role Based
Select Policy Admins
PANOS 7.0 Rev A.CS
Page 13
Lab Manual
Page 14
Scenario
The POC went well and the decision was made to use the Palo Alto Networks firewall in the network.
You are to create two zones, UntrustL3 and TrustL3. The externalfacing interface in UntrustL3 will be
assigned an IP address of 172.16.1.1/24. The internalfacing interface inTrustL3 will be given the IP
address 192.168.2.1/24. Internal clients will connect to the firewall on the interface in TrustL3, so DHCP
addresses will be provided on this interface. The DHCP server you configure in the TrustL3 zone will use
DNS settings of 10.30.11.60. Both the internal and external interfaces on the firewall must route traffic
through the externalfacing interface by default. The interface in UntrustL3 must be configured to
respond to pings and the interface in TrustL3 must be able to provide management services.
Lab Manual
Page 15
Required Information
Interface Management profile names
External-facing IP address
External-facing interface
Internal-facing interface
Internal-facing IP address
DHCP server: gateway
DHCP server: primary DNS
DHCP server: IP address range
Virtual router name
Lab Manual
allow all
allow_ping
172.16.1.1/24
Ethernet1/1
Ethernet1/2
192.168.2.1/24
192.168.2.1
10.30.11.60
192.168.2.50-192.168.2.60
Student-VR
Page 16
Page 17
Configure DHCP
19. Click Network > DHCP > DHCP Server.
20. Click Add to define a new DHCP Server:
Interface Name
Select ethernet1/2
Lease tab
IP Pools
Click Add and then enter 192.168.2.50-192.168.2.60
Options tab
Gateway
Enter 192.168.2.1
Ippool Subnet
255.255.255.0
Primary DNS
4.2.2.2
21. Click OK to close the DHCP Server Configuration window.
Page 18
General tab
Name
Interfaces
Enter Student-VR
Click Add and then select ethernet1/1
Click Add again and then select ethernet1/2
Name
Destination
Interface
0.0.0.0/0
Next Hop
IP Address
172.16.1.254
ethernet1/1
Lab Manual
Page 19
At this point, the firewall is configured but is unable to pass traffic between zones. NAT and security policies
must be defined before traffic will flow between zones. In this lab, you will create a source NAT policy using
the UntrustL3 IP address as the source address for all outgoing traffic. Then you will create a security policy
to allow traffic from the TrustL3 Zone to the UntrustL3 Zone, so that your workstation can access the
outside world.
Lab Manual
Page 20
Page 21
Lab Manual
Page 22
Scenario AppID
In this lab you will:
Now that you have confirmed that your workstation has connectivity to the Internet, you will delete the
Allow All Out Security Rule and replace it with a more restrictive Security Rule. By default, the PAN
Firewall will block any traffic between different Security Zones. You will create a Security Policy to
selectively enable specific applications to pass from the TrustL3 to the UntrustL3 Zone. All other
applications will be blocked.
Create a Rule named General Internet which allows users in the TrustL3 zone to use a set of commonly
used applications to access the internet. The applications should only be permitted on an applications
default port. All other traffic (inbound and outbound) between Zones will be blocked and logged so that
you can identify what other applications are being used.
Next, you will configure the firewall to notify users when applications are blocked by a Rule.
Lab Manual
Page 23
Required Information
General Internet
dns
flash
ftp
paloalto-updates
ping
web-browsing
ssl
Lab Notes
Test your connectivity by connecting to the site http//www.depositfiles.com (login paneduc,
password paloalto). Because you have not specified depositfiles as an allowed application, the firewall
should block the application, even if you attempt to use a proxy.
Lab Manual
Page 24
Solution AppID
Create an Application Group
1. Click Objects > Application Groups.
2. Click Add to define the KnownGood application group:
Name
Applications
Enter Known-Good
Click Add and select each of the following:
dns
flash
ftp
paloaltoupdates
ping
ssl
webbrowsing
Page 25
9. Click the Actions tab. Note that both Log at Session Start and Log at Session End are unchecked.
10. Click Cancel.
11. Select the interzonedefault policy row, without opening the policy, and click Override. The Security
Policy Rule predefined window opens.
12. Click the Actions tab.
13. Check Log at Session End.
14. Click OK.
21. Go to Monitor > Logs > Traffic to review the traffic logs. Find the entries where the depositfiles
application has been blocked. You may want to put ( app eq depositfiles ) in the filter
text box. The site has been blocked because the depositfiles application is not listed in the allowed
applications in the General Internet Policy.
Lab Manual
Page 26
Scenario ContentID
In this lab you will:
Scenario
Now that traffic is passing through the firewall, you decide to further protect the environment with
Security Profiles. The specific security requirements for general internet traffic are:
Log all URLs accessed by users in the TrustL3 zone. In particular, you need to track access to a set
of specific technology websites.
Log, but do not block, all viruses detected and maintain packet captures of these events for
analysis.
Log spyware of severity levels medium, critical, and high detected in the traffic. Ignore all other
spyware.
Lab Manual
Page 27
After all of these profiles are configured, send test traffic to verify that the protection behaves as
expected.
After the initial testing is complete, you are asked to change the antivirus protection to resetboth for
viruses. Make the changes and verify the difference in behavior.
Once the individual profiles are created and tested, combine the profiles into a single group for ease of
management. Attach the group to the appropriate security policies.
Required Information
Custom Technology sites to track
www.newegg.org
www.cnet.com
www.zdnet.com
1.
2.
3.
4.
Browse to http://www.eicar.org.
Click Anti-Malware Testfile.
Click Download.
Download any of the files using HTTP only.
Do not use the SSL links.
Lab Notes
Only test the antivirus profile using HTTP, not HTTPS. HTTPS connections will prevent the firewall from
seeing the packet contents so the viruses contained will not be detected by the profile. Decryption will
be covered in a later module.
Lab Manual
Page 28
Solution ContentID
Configure a Custom URL Filtering Category
1. Go to the WebUI and click Objects > Custom Objects > URL Category.
2. Click Add to create a custom URL category:
Name
Sites
Enter TechSites.
Click Add and add each of the following URLs:
www.newegg.org
www.cnet.com
www.zdnet.com
3. Click OK to close the Custom URL Category profile window.
Enter student-url-filtering.
Click the right side of the Action header to access the dropdown list.
Click Set All Actions > Alert.
Search the Category field for the following categories and set the Action
to block for each of them:
adult (or adult and pornography)
government
hacking
questionable
TechSites
Set the unknown category to continue.
6. Click OK to close the URL Filtering profile window.
Page 29
Name
Antivirus tab
Packet Capture
Decoders
Enter student-antivirus
Check the Packet Capture box
Set the Action column to Alert for all decoders
Enter student-antispyware
Click Add and create a rule with the parameters:
Rule Name: Enter rule-1
Action: Select Allow
Severity: Check the boxes for Medium, Low, and
Informational only
Click OK to save the rule.
Click Add and create another rule with the parameters:
Rule Name: Enter rule-2
Action: Select Alert
Severity: Check the boxes for Critical and High only
Click OK to save the rule.
Page 30
20. Download any of the Eicar test files listed under the banner Download area using the standard
protocol http:
a. Do not use the SSLencrypted downloads. The firewall will not be able to detect the viruses in
an HTTPS connection unless decryption is configured.
b. The browser or the OS may detect the virus and delete the file.
21. Click Monitor > Logs > Threat to display the threat log. Find the log messages that detect the Eicar
files. Scroll to the Action column to verify the alerts for each file download.
22. Click the green down arrow at on the left side of the line for the Eicar file detection to display the
packet capture (PCAP). Here is an example of what a PCAP might look like:
Captured packets can be exported in PCAP format and examined with a protocol analyzer offline
for further investigation.
Page 31
Select Group
Group Profile
Select studentprofilegroup
Page 32
Add the Security Profile to the Security Profile Groups associated with the security policy rule.
Now that traffic is passing through the firewall, you decide to further protect the environment with some
more Security Profiles. The additional security requirements for general Internet traffic are:
Lab Manual
Page 33
Enter student-file-block.
Click Add and create a rule with the parameters:
Rule Name: Enter blockPDF
File Types: Add pdf
Action: Select block
3. Click OK to close the File Blocking Profile window.
Return to the WebUI and click Objects > Security Profile Groups.
Open studentprofilesgroup.
Choose studentfileblocking as the file blocking profile.
Click OK.
7. Select Monitor > Logs > Data Filtering and find the entry for the PDF file that has been
blocked.
Lab Manual
Page 34
Scenario Decryption
In this lab you will:
Scenario
Your security team is concerned about the results of the testing performed as part of the Security Profile
configurations. The team observed that the antivirus profile only identified virus that were not SSL encrypted.
The concern is that files transferred from encrypted sources (e.g., https://www.facebook.com) could escape
detection and cause issues.
You want to evaluate using a forwardproxy configuration on the Palo Alto Networks firewall. Only traffic
from TrustL3 to UntrustL3 needs to be decrypted. Because you are not deploying a production network,
you decide to use selfsigned SSL certificates generated on the firewall for this implementation.
Once an application is decrypted and identified by the PAN firewall, it may be denied if you have set the
security policy to allow only applications that arrive on their standard default ports. For example, if FTP
traffic encrypted by SSL is decrypted and recognized by the firewall, the firewall will see it as FTP traffic
arriving on Port 443. Because this is not the standard FTP port, the traffic may be denied. Therefore, in
this exercise, when you are using decryption, you will set your security rules to allow any port instead of
using applicationdefault.
The legal department has advised you that certain traffic should not be decrypted for liability reasons.
Specifically, you may not decrypt traffic from healthrelated, shopping, or financial websites.
Test the decryption two ways:
Attempt to download test files from www.eicar.org using HTTPS and verify that they are detected by
the firewall
Lab Manual
Page 35
Connect to various websites using HTTPS and use the logs to verify that the correct URL categories
are being decrypted
You will receive certificate errors when browsing after decryption is enabled. This behavior is expected
because the selfsigned certificates have not been added to the Trusted certificates of the client browser.
Resolve this issue by adding the firewall certificate to the clients as a Trusted Root Certificate.
After your initial testing of the forwardproxy, the penetration testing team calls you to request an
exception to the decryption rules. The team asks that www.eicar.org be excluded from decryption so that
the team will still be able to download the files that it needs to perform its evaluations. Change the
implementation to allow this exception.
Required Information
Self-Signed Certificate name
Common Name of the SSL Certificate
Decryption Policies
CA-ssl-cert
192.168.2.1
no-decrypt-traffic
decrypt-all-traffic
Lab Notes
Sequence order matters with policies: make sure that the decrypt and nodecrypt rules are evaluated in
the correct order.
To find URLs to test the nodecrypt rule, go to https://urlfiltering.paloaltonetworks.com/testASite.aspx
and enter various URLs that you think will fall into the categories that you are testing.
Lab Manual
Page 36
Solution Decryption
Verify Firewall Behavior Without Decryption
For this lab, we will use the Internet Explorer browser. Chrome has its own virus detection system,
and Firefox has its own certificate repository.
1. From the desktop, open an Internet Explorer browser and browse to www.eicar.org/85-0Download.html.
2. Scroll to the bottom of the page and use HTTP to download one of the test files. The file will be
blocked and a warning page appears.
3. Click the Back button and use HTTPS to download one of the files. The file will download (but may be
deleted by the browser or the OS).
4. Go to the WebUI and click Monitor > Logs > Threat to display the log. Notice that SSL decryption hid
the contents of the firewall and so the second test file was not detected as a threat.
Enter CA-ssl-cert
Enter 192.168.2.1
Check the box
7. Click Generate to create the certificate. Click OK to close the certificate generation success window.
8. Click CAsslcert in the list of certificates to edit the certificate properties.
9. Check the boxes for Forward Trust Certificate and Forward Untrust Certificate.
10. Click OK to confirm the changes.
Page 37
Options tab
Action
Select nodecrypt
Page 38
27. In the WebUI, examine the Threat logs under Monitor > Logs > Threat. The virus should have been
detected, because the SSL connection was decrypted.
28. Click the magnifying glass icon at the beginning of the line to show the Log Details window. Verify
that the Decrypted box has a check mark.
32. In a separate browser window, browse to the following URLs using HTTPS:
financialservices: www.bankofamerica.com
healthandmedicine: www.deltadental.com
shopping: www.macys.com
33. Now use https:// to browse to sites such as bing.com or yahoo.com, which are not excluded. Notice
that you are prompted to correct a certificate error.
34. Return to the traffic log at Monitor > Traffic > Logs.
35. If the URL Category column is not displayed, click the dropdown arrow next to one of the
columns and select URL Category.
36. Find an entry for one of the excluded categories by looking at the value in the URL Category
column.
37. Click the magnifying glass icon at the beginning of the entry to show the Log Details window. Verify
that the Decrypted box in the Misc panel is unchecked.
38. Find an entry for one of the nonexcluded categories by looking at the value in the URL Category
column.
39. Click the magnifying glass icon at the beginning of the entry to show the Log Details window. Verify
that the Decrypted box in the Misc panel is checked.
Lab Manual
Page 39
Page 40
51. Choose Trusted Root Certificate Authorities and click OK. The window closes.
52. Click Next. The Completing the Certificate Import window appears.
53. Click Finish. A Security Warning appears.
54. Click Yes. A box indicates that the import was successful. Click OK.
55. Close the certificate by clicking OK.
56. Doubleclick the certificate to open it. A Security Warning appears.
57. Click Open. The certificate opens.
58. In the certificate, click the Certification Path tab. Notice that the Certificate Status says This
certificate is OK.
59. Close the certificate by clicking OK.
60. Use a new window in Chrome or Internet Explorer (not Firefox, which uses its own Certificate Store)
to browse HTTPS sites. Notice that you no longer receive the Certificate errors.
configure
set shared ssl-decrypt ssl-exclude-cert *.eicar.org
show shared ssl-decrypt
commit
Lab Manual
Page 41
Lab Manual
Page 42
Generate reports
Your manager wants to see daily reports that detail the threats encountered by the firewall. Configure a
custom report to show a threat summary for all traffic allowed in the past 24 hours. It should include the
threat name, the application (including technology and subcategory for reference), and the number of
times that threat was encountered. Export the file as a PDF.
Lab Manual
Page 43
Query Builder
Page 44
to generate the report. The report will appear in a new tab in the window.
17. Click OK to close the Custom Report window.
Lab Manual
Page 45