Firewall, Palo Alto

Configure Palo Alto to allow inside DMZ (FTP server)

So DMZ
In earlier Blog Palo Alto to Internet we configure how to Allow users to go to the Internet. so today i will show you how to allow your customer to come  inside to your FTP Server
first i Configure my Ethernet 1/1 with the Public IP Address 37.76.249.42
Go to Networks – Interface – Ethernet Edit
Change type to Layer 3, Configure Virtual Router and Zone (Outside)0
Then go to IPv4 and configure an IP Address of 37.76.249.42/270aThen Configure Ethernet 1/2 for DMZ gateway
Change type to Layer 3, Configure Virtual Router and Zone (DMZ)1
Then go to IPv4 and configure an IP Address of 192.168.250.250/242
Now the most important step is to configure NAT Policy
Go to Policies – NAT – Add new
I choose name : NatMyFTPServer3
Choose your
Source Zone (DMZ)
Destination Zone (Outside)
Destination interface (Ethernet 1/1)
then i have to add my Source Address so Click on Address4
Choose a name (MyFTPServer)
Type : IP Netmask
Put the Local IP Address (192.168.250.16)5
And it’s added6
Now go to Translated Packet
Translated type: static IP
and Type the translated Address which is the public IP Address i Configure Earlier and to make sure translation go both way check  the box Bi-directional7
Now Finally let’s configure Security Policy Rule
Go to Policies – Security policy – Add new
Choose a Name and Rule Type as (interzone)8
Select the Source as Outside since the traffic coming from outside9
Configure the Destination as (DMZ) zone and Destination Address is your Public IP Address
10
You can custom the Application and Service/URL Category to Allow FTP Service only but since this is a Lab just select any
Select Any in Application11
Also select Any in Service/URL Category Tab12
Then select Allow as an action for this traffic13
Now in my laptop i install 3CDaemon which a great FTP server and Choose the Upload/Download Directory in my D:\IOS\ which contain my files.
I also configure a profile (Aysar) so i can use this as my login instead of anonymous13b
And now for the BIG Test
from any Customer PC i open cmd and go to ftp to the public IP Address of the FTP Server
and as you see Authentication went well14
Just type
dir
which list all the file under my D:\IOS\15

;D

 

Standard
Palo Alto

Palo Alto HA Sync Issue & APP and Threat Mismatch

Just when i think everything okay a Nice View Such as Below Appear
1
I Checked All my HA Configuration and it’s Fine SO
i Define this as Two Issue
Synchronize
App and Threat Mismatch

First lets Solve the Synchronized and it’s a simple Step
Just Next to Running Config Press (Sync to Peer) so it Push the Configuration to the Passive HA
2
It will Ask you to Overwrite Peer Configuration Just press yes
3
Now it Start as you See (Synchronization in Progress)4
And as you can see now it finished and now its Synchronized 5
and now here in the Passive HA and Also show the Same 6
Now Lets Move to Next step which is the APP & Threat Mismatch
Lets Check the Version of the Application First
Go to Device – Dynamic updates – and Check the Applications and threats
7
so Go to 654-3805 which is my Latest Update also you can See in the lower of screen (Check Update)
Then Press Install on Right Side of the Application8
Check to Synch to HA Peer
press Continue Installation
9
Now it will Progress
10
And Automatically will Transfer a copy to HA Peer11
As you See now a Copy Transferred and Installed in HA Peer12
And Finally the all your HA Item in the Active Peer  is Green14

;D

Standard
Firewall, Palo Alto, Security

Palo Alto to Internet

TOP 10 Next Generation Firewalls
Palo Alto
After Spending Many Years in Cisco Security ASA and Worked with microsoft TMG the Company Decided to go to New technology
After Reading About it I realized that Gartner  agree that Palo Alto  Consider to be the leader when it comes to Next Generation Firewall appliances
So let me guide you with the First Step of Initial Setup and Configure it to Internet Access for users

Well first Let start Login to the ESXI host1
Then Choose to Deploy the OVA File
2
Browse to my Folder were i Save the OVA3
Press Next4
Type a Name of your Choice5
I Prefer to Select Thin Provision is i will not Reserve the Whole Size6
Select the Network7
Now Press Finish8
The Deploying Procedure Start9Now we Finished with The Installation of the OVA
10

Depend on your Scenario and how many Network Card you Need
in my Scenario i Need 4 (Management, WAN, LAN and DMZ)
in my ESXI i have this Already Configured as you see in the Picture

a.png
Now i will Edit My Virtual Machine
Configure the Network Adapter 2 to be my Outside
11
Click Add  and Select my Third Network Card for LAN12
Choose the Network Label (Inside) Which Represent the LAN Also DO the Same for Server Side whch Represent by (DMZ)13
Press Finish and Its Created14

15
Now Start the Machine16
Username: admin
Password:admin
and Set your IP Address for the Machine17
Now Set the Default Gateway and Save it (Commit)18
Now Go to the Web Page Https://192.168.208.222
Enter the Default username and Password19
normal Warning Regard the Default username and Password20
Go to the Device – Setup – Management – Management Interface Settings and you Can Edit the Service or IP Address21
Second Go to Device – Setup – Service – Services and Configure the DNS and NTP22

23
Second Go to Network – Zones and Add the Zones (Outside, Inside and DMZ) Repeat the Same Step Below to Create Each
25

26
Now Go to Network – Virtual Router and Create New One and Name it27
Second Go to Network – Interfaces – Edit Each interface (Ethernet 1/1, 1/2 and 1/3)
Outside, inside and DMZ
Type of Layer 3
Select the virtual Router and Security Zone28
then Go to IPv4 tab and Add the IP Address29
Second go to Advanced Tab – Other info – Management profile and press new 30
Select Name and Edit the Service Permitted31
And Then Select the Management profile32
Repeat the Same Step to Each Interface (LAN and DMZ)
here the Zone is Different for inside33
and Add the LAN IP Address : 192.168.250.250
34

35
Now  Go back to Virtual Router and Add a Static Routes to Default Route to your internet ISP Router in my Case : 37.76.249.9136
Now time to Configure your Security Rule
Go to Policies – Security and Add one
Name : Allow-Net
Type: Interzone37
Choose the Source to be Inside38
Choose the Destination: Outside39
Select the Service/ URL category : Any40
Select the Action : Allow
Log Setting Enable Log at Session Start and END41
42
Now Go to to Configure the PAT (Port Address Translation)
Policies – NAT add new
Choose Name 43
Choose your Security Zone:Inside
Destination Zone: outside
Destination interface: Ethernet 1/1 (My WAN Network)
44
Then Select the Translated Packet and Configure it As below
Dynamic IP and Port for PAT
45
46
Now i go to my Client and I too IP from DHCP47
Test the PING and Now the ping is working perfectly to IP Address 8.8.8.848
and i Test the Web browsing and It’s Working Perfectly49

;D

Standard