Skip to content

Latest commit

 

History

History
159 lines (87 loc) · 10 KB

paloalto.md

File metadata and controls

159 lines (87 loc) · 10 KB

Palo Alto (PA)

PA-800 Series {: #pa800 }

  • PA-800 Firewall Overview

    • The Palo Alto Networks® PA-800 Series next-generation firewalls are designed for DATA CENTER and INTERNET GATEWAY deployments. This series is comprised of PA-820 and PA-850 firewalls.

      These models provide flexibility in performance and REDUNDANCY to help you meet your deployment requirements. All models in this series provide next-generation security features to help you secure your organization through advanced visibility and control of applications, users, and content.

    • First Supported Software Release: PAN-OS® 8.0 -- 也就是 Web 管理介面的版本

  • PA-800 Front Panel #ril

    The following image shows the front panel of the PA-800 Series firewall and the table describes each front panel component. The only differences between the PA-820 (shown) and PA-850 front panel is the model name and the Ethernet port speeds as described in the table.

    1. Ethernet ports 1 through 4

      Four RJ-45 10/100/1000Mbps ports for network traffic. You can set the link speed and duplex or choose auto-negotiate.

    2. SFP ports 5 through 8

      Four small form-factor pluggable (SFP) ports for network traffic. ??

    3. SFP/SFP+ ports 9 through 12

      These ports are for network traffic and their speed varies depending on your firewall and configuration. #ril

    4. HA1 and HA2 ports

      Two RJ-45 10/100/1000Mbps ports for high-availability control (HA1) and synchronization (HA2).

    5. MGT port

      Use this Ethernet 10/100/1000Mbps port to access the management web interface and perform administrative tasks. The firewall also uses this port for management services, such as retrieving licenses and updating the threat and application signatures.

      Web UI 從這個 port 對外提供。

    6. CONSOLE port (RJ-45)

      Use this port to connect a management computer to the firewall using a 9-pin serial to RJ-45 cable and terminal emulation software.

      The console connection provides access to firewall boot messages, the Maintenance Recovery Tool (MRT), and the command line interface (CLI).

      用 CLI 的好處是容易跟他人分享 session。

      If your management computer does not have a serial port, use a USB-to-serial converter. 也就是 USB -> serial -> RJ-45,不過下面還有個 Micro USB 的 console port。

      Use the following settings to configure your terminal emulation software to connect to the console port:

      • Data rate: 9600
      • Data bits: 8
      • Parity: none
      • Stop bits: 1
      • Flow control: None
    7. USB port

      Use the USB port to bootstrap the firewall. 什麼時候要做 bootstrap??

      Bootstrapping enables you to provision the firewall with a specific PAN-OS configuration and then license it and make it operational on your network.

    8. CONSOLE port (Micro USB)

      Use this port to connect a management computer to the firewall using a standard Type-A USB-to-micro USB cable.

      The console connection provides access to firewall boot messages, the Maintenance Recovery Tool (MRT), and the command line interface (CLI).

      Refer to Micro USB Console Port #ril for more information and to download the Windows driver or to learn how to connect from a Mac or Linux computer.

    9. LED status indicators

      Six LEDs that indicate the status of the firewall hardware components (see Interpret the LEDs on a PA-800 Series Firewall). #ril

  • PA-800 Back-Panel #ril

Security Zone {: #zone }

  • Security Zone Overview

    • Security zones are a logical way to group physical and virtual interfaces on the firewall to control and log the traffic that traverses specific interfaces on your network. An interface on the firewall must be assigned to a security zone before the interface can process traffic. A zone can have multiple interfaces of the same type assigned to it (such as tap, layer 2, or layer 3 interfaces), but an interface can belong to only one zone.

NAT

  • Destination NAT

    • Destination NAT is performed on INCOMING packets when the firewall translates a destination address to a different destination address; for example, it translates a public destination address to a private destination address.

      Destination NAT also offers the option to perform port forwarding or port translation.

      其實就是 virtual server。

  • Enable Clients on the Internal Network to Access your Publi...

    • When a user on the internal network sends a request for access to the corporate web server in the DMZ, the DNS server will resolve it to the public IP address.

      When processing the request, the firewall will use the original destination in the packet (the public IP address) and route the packet to the EGRESS INTERFACE for the UNTRUST ZONE. In order for the firewall to know that it must translate the public IP address of the web server to an address on the DMZ network when it receives requests from users on the TRUST ZONE??, you must create a destination NAT rule that will enable the firewall to send the request to the egress interface for the DMZ zone as follows.

Traffic Filtering

  • Traffic Log Fields 看來,PAN-OS 10.0 才開始支援 source/destination MAC address?

  • Basics of Traffic Monitor Filtering - Knowledge Base - Palo Alto Networks

    • When Trying to search for a log with a source IP, destination IP or any other flags, Filters can be used. The filters need to be put in the search section under GUI: Monitor > Logs > Traffic (or other logs).
    • This document demonstrates several methods of filtering and looking for specific types of traffic on Palo Alto Networks firewalls.Categories of filters include host, zone, port, or date/time. At the end of the list, we include a few examples that combine various filters for more comprehensive searching.
  • How to Increase the maximum number of rows in a CSV Export - Knowledge Base - Palo Alto Networks

    • The default maximum rows in CSV export is 65536. If an increase is needed for the maximum export limit follow the instructions below.

    • From the GUI:

      1. navigate to Device > Setup > Management
      2. Click the Edit icon for the Logging and Reporting Setting box and navigate to Log Export and Reporting tab.
      3. The second option down is Max Rows in CSV Export
      4. Set the value to the desired number (1 - 1048576).
  • Unable to export Traffic log to CSV via WebGUI, due to "No such query job" error (2020-11-13) -- 調降 GUI 的 refresh 頻率

    • Symptom: When an administrator exported Traffic log to CSV file via WebGUI, "No such query job" error is appered on the screen like below.

    • Cause: It might be caused when huge amount of logs is exported, because this job will take a long time.

    Resolution

    1. From WebGUI, go to Monitor > Logs > Traffic.
    2. Check the upper right of the screen. If "10 seconds", "30 seconds" or "60 seconds" is selected as refresh timer, change Refresh timer to "Manual".
    3. Export logs again, and monitor how it works.
    4. If the issue is not restored, check "Alarm" icon is appeared. If "Alarm" is appeared on the lower right of the screen, click the icon.
    5. From drop-down list, select "Refresh every hour", and click Close.
    6. Export logs again, and monitor how it works.

PAN-OS

  • 目前安裝的版本,可以在 Device > Software 看 Current Installed 的版本。

  • PAN-OS

    • PAN‑OS® is the software that runs all Palo Alto Networks® next-generation firewalls.

      By leveraging the key technologies that are built into PAN‑OS natively—App‑ID, Content‑ID, Device-ID, and User‑ID—you can have complete visibility and control of the applications in use across all users and devices in all locations all the time.

      可以針對 application、content、device、user 做不同維度的管控。

    • And, because inline ML and the application and threat signatures automatically reprogram your firewall with the latest intelligence, you can be assured that all traffic you allow is free of known and UNKNOWN threats.

  • Getting Started #ril

參考手冊 {: #reference }