Palo Alto Basic Setup
Palo Alto Basic Setup
To deal with the IP address that is causing suspicious probes we can block
the entire IP address and/or configure other options. To do this:
CONFIGURE RECONNAISSANCE PROTECTION to BLOCK SUSPICIOUS
URL THAT HAD BEEN PROBING THE NETWORK
There are 4 options to choose from:
o ALLOW – The firewall allows the port scan or host to continue to
sweep reconnaissance
o ALERT – The firewall generates an alert each time the port scan
or sweept takes place ( this is the default action)
o BLOCK – The firewall drops all subsequent packets from the
source to the destination for the remainder of a specified time
interval
o BLOCK IP – The firewall drops all subsequent for the specified
DURATION,(specified in 1-3,600 seconds). Track by determines
whether the firewall blocks source or source and destination
traffic.
By Default, when a security policy Group is created a ‘Deny ALL’ Rule will be
created, therefore all other traffic except that which is allowed by security
policy rules will be denied.
To allow DNS traffic from your servers and LAN
hosts only
Allow only DNS (port 53) traffic from 192.168.1.10 & 192.168.1.11 to the Lan
Host.
To do this create another Security Policy Rule as outlined above except
‘allow’ the specific URLs, ‘allow’ DNS(port 53) under the applications tab, and
block ‘Any’ other traffic and allow logging. Then add a ‘DENY ANY’ to the rule
(or as an additional rule ) to block all other traffic.
BEST PRACTICE: It’s also best practice to shut down all unused interfaces
on your switch hardware!
BEST PRACTICE:
To Prevent malicious DNS queries on a global basis, it is
recommended that to setup a DNS Sinkhole External list. There are a
number available dynamically through palo alto subscriptions. Otherwise, if
you have your own list in a text file, it should be hosts in the DNS zone where
it can be referenced. You can set up your sinkhole as follows with
screenshots from my previous homework assignment - Netlab NDG 5 from
the netdevgroup.com in the Green River IT 340 Firewalls class.
NOTE: Palo Alto also has lists of domains that you can add to your
DNS sinkhole list – these are updated regularly and should be added
to your lists!
3. In the External Dynamic Lists window, configure the following and then click
OK.
Parameter Value
Name lab-dns-sinkhole
6. In the External Dynamic List window, click the Test Source URL button.
7. Confirm that the firewall reports that the source URL is accessible and
click Close. If the firewall reports a “URL access error”, check the source
address, correct any errors, and rerun the test.
8. Back on the External Dynamic Lists window, click Cancel to close it.
9. Leave the firewall web interface open to continue with the next task
3. Verify that the Action on DNS Queries column for lab-dns-sinkhole is set to
sinkhole.
4. Verify that the Sinkhole IPv4 is set to Palo Alto Networks Sinkhole IP
(sinkhole.paloaltonetworks.com) in the DNS Sinkhole Settings box. Click OK to close
the Anti-Spyware Profile configuration window.