03 - Zone Security, Security and NAT Policies

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Zone Security, Security and NAT

Policies

PCNSA Training By Vintcom Myanmar


Security Zones

• Palo Alto Networks firewalls use the


concept of security zones to secure
and manage your networks.
• Security zones group devices and
users with similar security needs.
• Security zones often align to network
segmentation.
• To create a security zone, navigate to
Network > Zones
Zone Types

• An interface on the firewall must be assigned to a security zone before the interface can process traffic.
• A zone can have multiple interfaces of the same type assigned to it (for example, tap, Layer 2, or Layer 3
interfaces), but an interface can belong to only one zone.
1. Tap - A Tap interface monitors traffic that is connected to a network switch's MIRROR/SPAN port. This
mirrored traffic is forwarded by a switch port to a firewall’s Tap interface and is analyzed for App-ID, User-
ID, Content-ID, and other traffic.
2. Virtual Wire - A Virtual Wire interface is used to pass traffic through a firewall by binding two Ethernet
interfaces and allowing traffic to pass between them.
3. Layer 2 - Layer 2 interfaces are used to switch traffic between other Layer 2 interfaces.
4. Layer 3 - Layer 3 zone is used when routing between two or more networks.
5. Tunnel - A Tunnel interface is a logical (virtual) interface used with VPN tunnels to deliver encrypted traffic
between two endpoints.
Network Interfaces

All firewall models include in-band interfaces that are used to control network traffic flowing across an enterprise.
• Physical Interfaces - The firewall supports two types of media; copper and fiber-optic. You can configure Ethernet
interfaces as various types: Tap, High Availability (HA), Virtual Wire (interface and subinterface), Layer 2 (interface
and subinterface), Layer 3 (interface and subinterface), SDWAN and Aggregate Ethernet (AE). The available
interface types and transmission speeds vary according to the hardware model.
• Logical Interfaces - These include VLAN interfaces, loopback interfaces, and tunnel interfaces. You must set up
the physical interface before defining a VLAN or a tunnel interface.
Deployment Options

Tap Mode Virtual Wire Mode Layer 3 Mode

Tap Mode requires no changes to The firewall can be inserted into an With Layer 3 interfaces, the
the existing network design. In this existing topology without firewall can replace any current
mode, the firewall cannot block requiring any re-allocation of enterprise firewall deployment.
any traffic. network addresses or redesign on
the network topology.
Tap Interface Configuration

• The firewall can use a tap interface to connect to a switch’s SPAN or mirror
port.
• A tap interface passively collects and logs monitored traffic to the firewall’s
Traffic log.

• To configure a tap interface, browse to Network > Interfaces > Ethernet


> <select_interface>.
• Select Tap Interface Type
To enable logging, you must configure a Security policy rule with the source and
destination zones set to the zone that contains the tap interface.

• Select a Tap Type Security Zone


The Security Zone drop-down list will list only zones of the type tap.
Virtual Wire Interface Configuration

• A virtual wire configuration is defined in two steps: creating the virtual


wire object and configuring the virtual wire interfaces that the object
connects.
• The virtual wire object provides the data path between the two virtual
wire interfaces.

• Step 1: Create a Virtual Wire Type Security Zone


Network > Zones
• Step 2: Configure a Virtual Wire Object
Network > Virtual Wires
• Step 3: Configure Virtual Wire Interfaces
Network > Interfaces > Ethernet
Layer 3 Interface Configuration

• A Layer 3 deployment enables routing traffic between multiple Layer 3


interfaces.
• Because each Layer 3 interface consumes at least one IP address, a
Layer 3 deployment can require network reconfiguration in your
enterprise. Routing between Layer 3 interfaces requires a router.

• Step 1: Create a Layer 3 Type Security Zone


Network > Zones
• Step 2: Configure a Virtual Router
Network > Virtual Routers
• Step 3: Configure Layer 3 Interfaces
Network > Interfaces > Ethernet
• Step 4: Assign an IP Address
• Step 5: Assign a Management Profile (Optional)
Interface Management Profile

• By default, the out-of-band MGT port is designed to support firewall


management functions and services.
• You can apply an Interface Management Profile to a Layer 3 interface to
enable it to carry management traffic.
• To configure an Interface Management Profile, browse to Network >
Network Profiles > Interface Mgmt > Add.
• Apply the interface management profile to the configured layer 3
interface(s).
Loopback Interface Configuration

• A loopback interface is a logical interface that can be reached though a


physical interface or subinterface.
• Each loopback interface is assigned an IP address and behaves as a host
interface.

• To configure a loopback interface, browse to Network >


Interfaces > Loopback and click Add.
• The IP address assigned to a loopback interface must have no
netmask or a /32 netmask.
Security Policy

• All traffic traversing the data plane of the


Palo Alto Networks firewall is matched
against a Security policy.
• Rule Types
• Intrazone
• Interzone
• Universal
• By default, the firewall implicitly allows
intrazone traffic and implicitly denies
interzone traffic.
• The policy rule hit count feature enables you
to identify rules that are used frequently and
to determine which rules are unused and
could be removed.
Security Policy Configuration

• To create a new Security policy rule, browse to Policies > Security


• Policy elements:
• Source Zone/ Address/ User/ Device
• Destination Zone/ Address/ User/ Device
• Service
• Application
• Service/ URL Category
• Actions
• Allow
• Deny
• Drop
• Reset client
• Reset server
• Reset both client and server
Rule Shadowing

• If a traffic can match two rules, the first rule that matches is said to shadow the rule below it.
Finding Unused Security Policy Rules

• Administrators periodically should remove unused rules in their Security policy rulebase.
• Removal of unused rules increases firewall operational efficiency and simplifies rule management.
• The firewall tracks rules unused since the last time the data plane restarted.
• You can perform cleanup quickly and easily by using the Highlight Unused Rules option.
• To find unused rules, navigate to Policies > Security.
Rule Usage Filter

• Firewall administrators need to periodically check for rules that are out of date or unused.
• To filter the rules displayed, navigate to Policies > Security > Policy Optimizer > Rule Usage.
Tags

• Tags enable you to group objects using keywords or phrases.


• Tags can be assigned a color, which makes a visual search for a tag easier in the web interface.

Add Tag Assign Tags Filter for Tag Require Tag on Policies
Objects > Tags > Add Assign your Security policy Filter security policy using Device > Setup > Management
to a tag group tag and select the Require Tag on
policies
Test Policy Functionality

• You can test policy rules and managed device configurations to ensure that candidate configurations appropriately secure your
network and maintain connectivity to important network resources.
• The Test Security Policy Match window enables you to enter a set of criteria directly from the web interface rather than from the
CLI.
• Device > Troubleshooting
NAT Types

• Source NAT
• to translate the address of outbound traffic, that
is, traffic originating on a private network and
being forwarded out toward the internet.

• Destination NAT
• to translate the address of inbound traffic, that
is, traffic coming from the internet into the
local private network.
Source NAT

• Source NAT is commonly used to allow host devices configured with a private IP address to send and receive traffic on the internet.
• Source NAT Types
• Static IP
• 1-to-1 fixed translations
• Changes the source IP address while leaving the source port unchanged
• Supports the implicit bidirectional rule feature
• Dynamic IP
• 1-to-1 translations of a source IP address only (no port number)
• The private source address translates to the next available address in the range
• By default, if the source address pool is larger than the translated address pool, new IP addresses seeking translation are blocked while the translated address pool is fully
used
• Dynamic IP and Port
• Allows multiple clients to use the same public IP addresses with different source port numbers
• The assigned address can be set to the interface address or to a translated address .
Source NAT and Security Policies

• To configure source NAT, first create a NAT policy rule. Then create a security policy rule to allow the traffic.
• Policies > NAT
• A NAT policy rule matches the packet based on the original pre-NAT source and destination addresses and the pre-NAT destination zone.

• Policies > Security


• The Security policy rule is enforced after the NAT policy rule is evaluated but before the NAT translation is applied.
Destination NAT

• Destination NAT is commonly used to make a server within a private network reachable from the public internet.
• Destination NAT Types
• Static IP
• 1-to-1 translation of inbound traffic
• Changes the destination IP address while leaving the destination port unchanged
• Dynamic IP (with session distribution)
• Translate the original destination address to a destination host or server that has a dynamic IP address, meaning an address object that uses an FQDN, which can return
multiple addresses from DNS
• If the translated destination address resolves to more than one address, the firewall distributes incoming NAT sessions among the multiple addresses to provide improved
session distribution.
• Distribution is based on one of several methods: round-robin (the default method), source IP hash, IP modulo, IP hash, or least sessions.

• Destination Use Cases


• Port Forwarding
• Can translate a public destination address and port number to a private destination address but keeps the same port number
• Port Translation
• Can translate a public destination address and port number to a private destination address and a different port number
Destination NAT and Security Policies

• To configure destination NAT, first create a NAT policy rule. Then create a security policy rule to allow the traffic.
• Policies > NAT
• A NAT policy rule matches the packet based on the original pre-NAT source and destination addresses and the pre-NAT destination zone. Use
the Translated Packet tab to specify the desired translation of packets that meet the Original Packet criteria.

• Policies > Security


• The Security policy rule is enforced after the NAT policy rule is evaluated but before the NAT translation is applied.
Thank You

You might also like