EDU 110 80a Lab Guide
EDU 110 80a Lab Guide
EDU 110 80a Lab Guide
Lab Guide
PAN-OS® 8.0
EDU-110
Courseware Version A
Bolding Names of selectable items Click Security to open the Security Rule
in the web interface Page
Courier font Text that you enter and Enter the following command:
coding examples a:\setup
The show arp all command yields this
output:
username@hostname> show arp
<output>
Click Click the left mouse button Click Administrators under the Device
tab
Right-click Click the right mouse Right-click the number of a rule you want
button to copy, and select Clone Rule
< > (text enclosed Parameter in the Lab Click Add again and select <Internal
in angle brackets) Settings Handout Interface>
3. Click the drop-down list next to the Name text box and select edu-210-lab-01.
4. Click OK. After some time, a confirmation that the configuration has been loaded
appears.
5. Click Close.
6. Click the Commit link at the top right of the WebUI. Click Commit and wait until the
commit process is complete. Click Close to continue.
5. Click the XML API tab and verify that all items are disabled.
6. Click the Command Line tab and verify that the selection is none.
7. Click to continue.
2. Click in the lower-left corner of the panel to open the Administrator configuration
window.
3. Configure the following:
Parameter Value
Name policy-admin
Authentication Profile None
Password paloalto
Profile policy-admins-profile
Password Profile None
4. Click OK.
5. all changes.
The role assigned to this account is allowed CLI access, so the connection should succeed.
The PuTTY window closes because the admin role assigned to this account denies CLI
access.
Profile policy-admins-profile
Password Profile None
Note: The user that took the lock or any superuser can remove a lock.
16. Click OK and the lock is removed from the list.
17. Click Close.
18. all changes. You can now commit the changes.
19. Select the test-lock user and then click to delete the test-lock user.
20. Click Yes to confirm the deletion.
21. all changes.
3. Verify that 4.2.2.2 is the Primary DNS Server and that 8.8.8.8 is the Secondary DNS
Server.
4. Verify that updates.paloaltonetworks.com is the Update Server.
5. Click OK.
4. Click OK.
5. Locate and click the hyperlink on the far right of Application and Threats. The
scheduling window opens. Application and Threat signatures are released weekly.
6. Configure the following:
7. Click OK.
8. Locate and click the hyperlink on the far right of WildFire. The scheduling window
opens. WildFire signatures can be available within five minutes.
9. Configure the following:
Parameter Value
Recurrence Every Minute
Action download-and-install
Lab Objectives
Create Security zones two different ways and observe the time saved.
Create Interface Management Profiles to allow ping and responses pages.
Create a virtual router and attach configured Ethernet interfaces.
Test connectivity with automatic default route configuration and static configuration.
4. Click OK to close the Zone configuration window. The outside zone is the only zone
created in this task. You will add an Ethernet interface to this zone in a later lab step.
4. Click the Security Zone drop-down list and select New Zone:
14. Click the Security Zone drop-down list and select New Zone. The Zone configuration
window opens.
15. Configure the following:
Parameter Value
Name dmz
Type Layer3 should be selected
26. Click the Security Zone drop-down list and select New Zone. The Zone configuration
window opens.
27. Configure the following:
Parameter Value
Name danger
Type Virtual Wire should be selected
28. Click OK twice to close the Zone and Ethernet Interface configuration windows.
29. Click to open ethernet1/5.
30. Configure the following:
Parameter Value
Comment vWire danger
Interface Type Virtual Wire
Virtual Wire None
Security Zone danger
3. Click OK.
Note: This step also can be completed via each Ethernet Interface configuration window.
5. Click OK.
6. all changes.
Parameter Value
Name default-route
Destination 0.0.0.0/0
Interface ethernet1/1
Next Hop IP Address
Next Hop IP Address 203.0.113.1
12. Click OK to add the static route and then click OK again to close the Virtual Router –
lab-vr configuration window.
13. all changes.
Lab Objectives
Create tags for later use with Security policy rules.
Create a basic source NAT rule to allow outbound access and an associated Security
policy rule to allow the traffic.
Create a destination NAT rule for FTP server and an associated Security policy rule to
allow the traffic.
By default, Security policy rules are always in effect (all dates and times). To limit a
Security policy to specific times, you can define schedules and then apply them to the
appropriate policy rules.
11. Configure the following:
Parameter Value
Name internal-dmz-ftp
Recurrence Daily
Start Time 5 minutes from the time annotated in Step 2.
End time 2 hours from the current firewall time.
Lab Objectives
Create an application-aware Security policy rule.
Enable interzone logging.
Enable the application block page for blocked applications.
Test application blocking with different applications
Understand what the signature web-browsing really matches.
Migrate older port-based rule to application-aware.
Review logs associated with the traffic and browse the Application Command Center
(ACC).
4. With the interzone-default policy rule selected but not opened, click . The
Security Policy Rule – predefined window opens.
5. Click the Actions tab.
6. Select Log at Session End.
7. Click OK.
5. all changes.
Based on the information from your log, Shutterfly and phproxy are denied by the
interzone-default Security policy rule.
Note: If the logging function of your interzone-default rule is not enabled, no information
would be provided via the Traffic log.
Selecting application-default does not change the service behavior because, in the
application database, FTP is allowed only on ports 20 and 21 by default.
6. Click OK.
7. all changes.
8. Open a new Chrome browser window in private mode and browse to
ftp://192.168.1.1.
9. At the prompt for login information, enter the following (Credentials may be cached from
previous login):
Notice that the connection succeeds and that you can log in to the FTP server with the
updated Security policy rule.
2. Note that the upper-right corner of the ACC displays the total risk level for all traffic that
has passed through the firewall thus far:
3. On the Network Activity tab, the Application Usage pane shows application traffic
generated so far (because log aggregation is required, 15 minutes might pass before the
ACC displays all applications).
Notice that the Application Usage pane updates to present only google-base information.
Notice that the WebUI generated the appropriate log filter and jumped to the applicable log
information for the google-base application:
Lab Objectives
Configure and test an Antivirus Security Profile.
Configure and test an Anti-Spyware Security Profile.
Configure and test the DNS sinkhole feature with an External Dynamic List.
Configure and test a Vulnerability Security Profile.
Configure and test a File Blocking Security Profile.
Use the Virtual Wire mode and configure the danger zone.
Generate threats and observe the actions taken.
4. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using standard HTTP and not SSL-enabled
HTTPS. The firewall will not be able to detect the viruses in an HTTPS connection until
decryption is configured.
3. Click the icon on the left side of the entry for the Eicar Test File to display the
packet capture (pcap):
13. Click .
14. all changes.
4. At the nslookup command prompt, type reddit.com. and press the Enter key:
Notice that the reply for reddit.com is 71.19.152.112. The request has been sinkholed.
Severity
6. Click OK twice.
7. Select Policies > Security.
8. Click to open the internal-inside-dmz Security policy rule.
9. Click the Actions tab and configure the following:
Parameter Value
Profile Type Profiles
2. Double-click .
Note: This action launches an FTP brute force attack at the DMZ FTP server. The script
is expected to take about 10 minutes to complete.
3. Click the icon to the left of any log entry to open the packet capture.
4. Click OK twice.
5. all changes.
6. Rerun and review the logs to confirm that the new FTP brute force
attempts are reset.
4. Click OK.
5. Select Policies > Security.
12. Click the Service/URL Category tab and verify that is selected.
13. Click the Actions tab and configure the following:
Parameter Value
Action Setting Allow
Log Setting Log at Session End
Profile Setting
1. In the WebUI select Objects > Security Profiles > File Blocking.
4. Click OK.
5. all changes.
Note: The Action column is located on the far right. The column can be moved via drag-
and-drop using the mouse cursor.
5.18 Multi-Level-Encoding
Multi-Level-Encoding can be used to block content that is not inspected by the firewall because
of the file being encoded five or more times.
1. In the WebUI select Objects > Security Profiles > File Blocking.
2. Click to open the lab-file-blocking File Blocking Profile.
2. The file is blocked in accordance with the new file blocking rule.
8. all changes.
4. Click OK.
5. all changes.
Lab Objectives
Create a custom URL category and use it as a Security policy rule match criterion and as
part of a URL Filtering Profile.
Configure and use an External Dynamic List as a URL block list.
Create a URL Filtering Profile and observe the difference between using url-categories in
a Security policy versus a profile.
Review firewall log entries to identify all actions and changes.
15. Click the Service/URL Category tab and configure the following:
Parameter Value
URL Category
Profile Setting
19. Expand the Columns menu using the right-arrow and select the URL Category check
box. The URL Category column is displayed.
20. Enable the rule egress-outside.
21. all changes.
Note: Because you created a rule that resets traffic, you need to enable the egress-outside
rule to allow everything else.
3. The URL Category column can be added to the Traffic log to provide additional
information.
4. Select the URL Filtering log.
5. Notice that URL Filtering log includes the Category and URL columns by default:
3. Locate the text file in the right window pane named block-list.txt.
4. Right-click the block-list.txt file and select Edit.
5. Verify that the following URLs exist, each followed by a line break:
gizmodo.com
lifehacker.com
avsforum.com
reddit.com
shopping
government
hacking
6. Search for url-block-list and tech-sites. Notice that your custom URL categories are also
listed and they are set to a Site Access of “allow.” Leave them set to “allow.”
7. Click OK to close the URL Filtering Profile window.
8. Select Device > Licenses.
9. Under the PAN-DB URL Filtering header, click Download Now (or Re-Download). A
warning might appear; click Yes.
10. Select the region nearest the location of your firewall and click OK.
After the download completes, a Download Successful window appears.
11. Click Close to close the download status window. The WebUI should now show a
message similar to the following:
4. Click OK.
5. Select Policies > Security.
6. Select the egress-outside-content-id Security policy rule without opening it.
7. Click .
8. Select the egress-outside-url Security policy rule without opening it.
9. Click .
10. all changes.
Lab Objectives
Observe firewall behavior without decryption.
Create Forward Trust and Untrust certificates.
Create a custom decryption category.
Create a Decryption policy.
Observe firewall behavior after decryption is enabled.
Review logs.
9. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using the standard HTTP protocol and not the
SSL-encrypted HTTPS protocol. The firewall will not be able to detect the viruses in an
HTTPS connection until decryption is configured.
10. If prompted, Save the file. Do not open or run the file.
12. Notice that the download is not blocked because the connection is encrypted and the virus
is hidden.
13. Close all browser windows except for the firewall WebUI.
12. Click untrusted-ca in the list of certificates to edit the certificate information.
13. Select the Forward Untrust Certificate check box and click OK:
1. In the WebUI select Objects > Custom Objects > URL Category.
2. Click to open the Custom URL Category configuration window.
3. Configure the following:
Parameter Value
Name lab-decryption
Sites
Type
4. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using HTTPS:
Note: The endpoint (Windows desktop) does not trust the certificate generated by the
firewall.
5. Close all browser windows except for the firewall WebUI.
6. Click Next.
7. Verify that the following is configured:
8. Click Next, click Finish, and then click OK in the status window.
9. Notice that the trusted-ca certificate is now imported:
10. Close the Microsoft Management Console. Click No when asked to save console settings.
4. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using HTTPS:
The Eicar Test File is detected and the connection gets reset.
11. Notice that a certificate warning is now displayed. Choose to continue to the website.
12. Click the icon near the URL and then click View Certificates:
5. Click OK.
6. all changes.
7. Open Internet Explorer in private mode and browse to https://engadget.com.
Engadget is now blocked.
Lab Objectives
Configure and test WildFire Analysis Security Profile.
Note: The file type pe includes both .exe and .dll file types.
5. Click OK to close the WildFire Analysis Profile configuration window.
7. On the Log Info tab, check the information within the General, Details, and Destination
panels. Then look at the information in the WildFire Analysis Report tab.
8. Log out and close the PuTTY session.
Lab Objectives
Enable User-ID technology on the inside zone.
Configure the LDAP Server Profile to be used in group mapping.
Configure group mapping for User-ID.
Configure and test the PAN-OS® integrated User-ID agent.
Leverage User-ID information in a Security policy rule.
4. Click OK.
3. Locate the server list on the left side of the window and click .
4. Configure the following:
Parameter Value
Name lab-client
Port 389
5. Locate Server Settings on the right side of the window and configure the following:
Parameter Value
Type active-directory
Base DN DC=lab,DC=local
Bind DN [email protected]
Password Pal0Alt0
Name lab-group-mapping
5. Click OK.
Password Pal0Alt0
Windows Server
Monitoring
Enable User
Identification Timeout
Note: Ensure that the timeout option is not enabled. You do not need to time out the IP
address associated with the lab-user-id because the IP never changes. In a production
environment the timeout is recommended to be half the DHCP lease time.
8. Click the Ignore User List tab.
9. Click and configure the following:
Parameter Value
Ignore User
Name lab-client
Enabled
2. On the Windows desktop, double-click the lab folder and then double-click the bat files
folder.
references could take up to three minutes. Click refresh to update the log entries:
Lab Objectives
Create and configure a subinterface.
Create certificates for the GlobalProtect Portal, internal gateway, and external gateway.
Attach certificates to a SSL-TLS Service Profile.
Configure the Server Profile and Authentication Profile to be used when authenticating
users.
Create and configure the tunnel interface to be used with the external gateway.
Configure the internal gateway, external gateway, and portal.
Host the GlobalProtect agent on the portal for download.
Create a No-NAT policy rule to ensure that portal traffic is not subjected to network
address translation.
Test the external gateway and internal gateway.
9. Click the Advanced tab and select ping for the Management Profile.
10. Click OK.
3. Click .
4. Click OK to dismiss the successful status window.
6. Click .
7. Click OK to dismiss the successful status window.
3. Click OK.
5. Click OK.
3. Locate the Server list on the left side of the window and click .
4. Configure the following:
Parameter Value
Name lab-client
Port 389
5. Locate Server settings on the right-side of the window and configure the following:
Parameter Value
Type active-directory
Base DN DC=lab,DC=local
Bind DN [email protected]
Password Pal0Alt0
5. Click OK.
5. Locate the Client Authentication list box. Click and configure the following:
Parameter Value
Name lab-ad
OS Any
Authentication Profile auth-gp
6. Click OK.
4. Locate the Client Authentication list box. Click and configure the following:
Parameter Value
Name lab-ad
5. Locate the Client Authentication list box. Click and configure the following:
Parameter Value
Name lab-ad
OS Any
Authentication Profile auth-gp
7. Locate the Agent list box and click to open the Configs window and configure
the following:
Parameter Value
Name portal-agent-config
11. Locate the Internal Gateways list box and click to open the Internal Gateway
configuration window.
15. Locate the External Gateways list box and click to open the External Gateway
configuration window.
16. Configure the following:
Parameter Value
Name ext-gw-1
Address IP
IPv4 203.0.113.20
17. Locate the Source Region list box and click and configure the following:
Parameter Value
Source Region Any
Priority Highest
18. Click OK three times to close the External Gateway, Configs, and GlobalProtect Portal
configuration windows.
4. Click Download next to the latest version of the GlobalProtect that does not have a, b, or
c in its name.
5. Activate the GlobalProtect agent that you have just downloaded:
5. Log in using the following information, and then click Connect. Click Continue if you
receive another certificate warning:
10. On the Windows desktop, right-click the CMD icon and select Run as
administrator.
11. Type the command ipconfig /all.
12. Verify that the current DNS server is 192.168.1.1:
Note: Do not continue if the DNS server is otherwise. Contact the instructor.
4. On the Windows desktop, right-click the CMD icon, and select Run as
administrator.
5. Type the command ipconfig /all.
6. Verify that the current DNS server is 127.0.0.1:
Note: Do not continue if the DNS server is otherwise. Contact the instructor.
Lab Objectives
Create and configure a tunnel interface to use in the site-to-site VPN connection.
Configure the IKE gateway and IKE Crypto Profile.
Configure the IPSec Crypto Profile and IPsec tunnel.
Test connectivity.
Security Zone Create and assign a new Layer 3 zone named VPN
IP 172.16.2.10/24
6. Click OK twice to close the IKE Crypto Profile and the IKE Gateway window.
6. Click OK twice to close the Proxy IDs and IPsec Tunnel windows:
7. all changes.
1. Select Monitor > Session Browser to see any current sessions. You
might be able to see simulated sessions from the generated traffic. Notice that there is no
Source User column.
2. Click the icon at the top-right of the window to open the Filters pane.
3. Type lab\jamie in the From User field.
4. Click .
5. Notice that, even though there is not a Source User column, there is an ability to search
for the From User. Note: You can also search for a To User.
6. Locate a salesforce-base entry and click the Plus icon on the left to expand the display.
Notice the three sections labeled Detail, Flow 1, and Flow 2.
7. In the Detail section, you can see various items of information.
Important items that can help when troubleshooting are Session ID, Application, Security
Rule, QoS Rule, and Class:
Notice c2s (Client to Server) and s2c (Server to Client) in Flow 1 and Flow 2:
7. The time period can be changed to the Last 6 hours, 12 hours, 24 hours, 7 days, or 30
days.
8. Select Monitor > App Scope > Threat Map.
The Threat Map report shows a geographical view of threats, including severity.
9. Click Last 30 Days:
13. Click the icon to display the information by Session Count and not Bytes:
Note: As is standard in all App-Scope graph items, you can click an application color,
which switches your view in the WebUI to the ACC tab.
14. Select Monitor > App Scope > Traffic Map.
3. Explore the information available on the Network Activity tab. This tab displays an
overview of traffic and user activity on your network. It focuses on the top applications
being used; the top users who generate traffic with detailed information about the bytes,
content, threats, or URLs accessed by the user; and the most used security rules against
which traffic matches occur.
users:
4. Select the users option.
Notice how the application use seems more consistent across all colors versus bytes:
This information indicates that one application does not supersede any other application in
overall use by users.
5. Select threats in the Application Usage pane:
From the graph in the example, you can see that Jamie has consumed the most
bandwidth. Your user might be different.
7. Focus your attention on the bottom-right Rule Usage pane.
8. Select sessions. Which Security policy rule has been used the most?
This tab displays an overview of the threats on the network. It focuses on the top threats:
vulnerabilities, spyware, viruses, hosts visiting malicious domains or URLs, top WildFire
submissions by file type and application, and applications that use non-standard ports:
Notice that the graph updates to display only critical and medium severities.
11. Scroll down to the bottom-right and notice the Rules Allowing Apps On Non Standard
Ports pane.
This pane is good for identifying rules that need to enforce the application-default service
setting.
Notice that all window panes have updated to show only information based on sally:
10. Scroll down to the Rule Usage pane. Notice that only one rule allowed this traffic. If this
were a production environment, inspection should be done to ensure that this rule is
operating effectively. For example, should the rule allow SMTP? If not, is this a rogue
SMTP relay?
Notice that the WebUI switched views to the Traffic log with a predefined filter.
13. Select the icon. Notice at the bottom you can see the associated threat entries:
Notice that you now see both Traffic and Threat logs in one unified display, which can
help with correlation.
8. Click Run Now to run the report again, this time with the query:
3. Click OK.
3. The Email Server Profile window is now displayed. Configure the following:
4. Click OK twice to close the Email Server Profile and Email Scheduler windows.
5. Click . A test email will be sent to the address you provided. Wait for and
confirm its arrival.
Note: Check your SPAM folder.
6. Click OK twice.
Lab Objectives
Display the Dashboard HA widget.
Configure a dedicated HA interface.
Configure active/passive HA.
Configure HA monitoring.
Observe the HA widget.
6. Select the Auto radio button. When Auto is selected, the links that have physical
connectivity remain physically up but in a disabled state. They do not participate in ARP
or packet forwarding. This configuration helps reduce convergence times during failover
because no time is required to activate the links. To avoid network loops, do not select
this option if the firewall has any Layer 2 interfaces configured.
Netmask 255.255.255.0
Failure Condition
Name traffic-links
Enabled
Enabled
Name lab-vr
Enabled
2. If a peer was configured and was operating in passive mode, the High Availability widget
on the Dashboard would appear as follows. In order to avoid overwriting the wrong
firewall configuration, the firewalls are not automatically synchronized. You must
manually synchronize a firewall to the firewall with the “valid” configuration by clicking
Sync to peer.
You can consider this objective complete when the following tests are successful:
Three URL Filtering configurations have been created and applied to the appropriate
Security policy rule(s).
The DMZ host can ping box.net.
The internal host can access box.net.
The internal host cannot download an Eicar test virus using HTTP.
A WildFire test file gets reported to the WildFire cloud when downloaded to the internal
host.
A DNS request to phproxy.org initiated by an nslookup command on the internal host
results in a sinkhole event recorded in the Threat log.
14.4 GlobalProtect
Configure GlobalProtect to meet the requirements listed in the following objectives:
User access is provided through an external gateway.
The GlobalProtect Portal and external gateway can authenticate users using either LDAP
or a local user group configured on the firewall.
The external gateway provides an IP address pool in the range 172.16.5.200 to
172.16.5.250.
The Tunnel interface must be assigned to a new and separate Security zone.
A Security policy rule must allow internet access for hosts using the external gateway IP
pool.
The external gateway requires the use of IPsec.
One or more certificates are required for the portal and external gateway.
Create a Security policy rule to allow the internal host access to the portal and external
gateway. This access might require the use of a no-NAT rule.
You can consider this objective complete when the following tests are successful:
The internal host can successfully connect to the portal and external gateway.
The internal host receives an IP pool address when connected to the external gateway.