Uploaded by Vinícius Cordeiro Carvalho

ilide.info-low-level-design-template-pdf-pr 653c596e705d26cf3431aeefc63b7fed

advertisement
Customer
Palo Alto Networks Deployment
Network Integration Low-Level Design Document
Month Year
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
© 2019 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our
trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned
herein may be trademarks of their respective companies.
©2019 Palo Alto Networks, Inc.
2
Proprietary and Confidential
Table of Contents
Introduction ........................................................................................................................................5
Executive Summary ........................................................................................................................5
Platform .............................................................................................................................................8
Foundational Requirements .............................................................................................................8
Procured Systems .......................................................................................................................8
Procured Licensing ......................................................................................................................8
Recommended PAN-OS Version ..................................................................................................8
Panorama Systems .....................................................................................................................9
Network Integration Requirements ...................................................................................................9
Virtual Systems ...........................................................................................................................9
Virtual Router ............................................................................................................................ 13
High Availability ......................................................................................................................... 22
Operational Interf aces................................................................................................................ 23
Management Interf ace ............................................................................................................... 26
Logging Interf ace....................................................................................................................... 27
Security Zones .......................................................................................................................... 28
IPSec VPNs .............................................................................................................................. 30
Panorama ........................................................................................................................................ 34
Management Interf ace................................................................................................................... 34
Templates .................................................................................................................................... 35
Device Groups .............................................................................................................................. 36
Device Group Tree........................................................................................................................ 36
Logging and Reporting Settings ..................................................................................................... 36
Security Prof iles................................................................................................................................ 37
Antivirus Prof iles ........................................................................................................................... 37
Anti-Spyware Prof iles .................................................................................................................... 37
Vulnerability Protection Prof iles...................................................................................................... 38
WildFire Prof iles............................................................................................................................ 39
File Blocking Prof iles ..................................................................................................................... 39
Data Filtering Profiles .................................................................................................................... 40
Denial of Service Protection Prof iles............................................................................................... 41
Security Prof ile Groups.................................................................................................................. 41
User-ID ............................................................................................................................................ 42
User-ID Sources ........................................................................................................................... 42
Group Mapping Prof iles ................................................................................................................. 42
URL Filtering Prof iles .................................................................................................................... 43
©2019 Palo Alto Networks, Inc.
3
Proprietary and Confidential
Reporting, Alerting, and Conf iguration Backup .................................................................................... 52
Report and Alert Settings............................................................................................................... 52
Conf iguration Backup Settings ....................................................................................................... 52
SNMP Settings ............................................................................................................................. 53
SNMPv2 Settings ...................................................................................................................... 53
SNMPv3 Settings ...................................................................................................................... 53
Cloud Services / Integration Pieces.................................................................................................... 54
Cloud Logging Service .................................................................................................................. 54
GlobalProtect Cloud Service .......................................................................................................... 54
Application Framework .................................................................................................................. 54
Traps ........................................................................................................................................... 54
Azure ........................................................................................................................................... 54
AWS ............................................................................................................................................ 54
NSX Plugin ................................................................................................................................... 54
Document Properties ........................................................................................................................ 55
Contributors.................................................................................................................................. 55
Revision History ............................................................................................................................ 55
Palo Alto Networks Resources........................................................................................................... 56
Customer Resources ........................................................................................................................ 56
©2019 Palo Alto Networks, Inc.
4
Proprietary and Confidential
LLD Template Instructions
This template is designed as a tool to help generate Low-Level Design documents for Palo Alto Networks
architects. Each final LLD should be highly customized to meet the specific needs and requirements of
the customer project. To maintain consistency and completeness, however, this template should be used
as a starting point for the LLD.
This templated document contains notes for the consultants to utilize during the course of the document
creation. These notes include items to check, best practices, and other information useful to complete the
engagement. Add, remove, or change any sections of this template when developing your final document
that you feel are appropriate to meet the objectives of the LLD. The more individual detail that can be
added, the more useful the final document will be to the project.
The blue indented italic notes are instructions for each section. Remove all template instruction notes
before generating the final document. The black text in the template is suggested verbiage for the section,
but it is not required to keep any text as is. Replace all instances of [CUSTOMER] with the customer’s
name, and any other capitalized text in brackets with the correct information.
Introduction
Provide a high-level description of the project in 2-3 paragraphs at most. Name the customer and what
they plan to accomplish in the Palo Alto Networks project. Use “find and replace” to substitute
[CUSTOMER] with the value on the Title Page throughout this document. An example could be
something like the following:
The purpose of this document is to detail the specif ic low-level design criteria to integrate the Palo Alto
Networks solution into the [CUSTOMER] environment. The High-Level Design document, previously
developed and agreed to by both parties, will be the ref erence point f or the additional discovery to identif y
and document the conf iguration details herein. Concurent to this document, the buildsheet is used to
capture the specif ic device settings by site.
Executive Summary
The Palo Alto Networks next-generation security platf orm is a f lexible and extensible, natively integrated
and automated platf orm f or the detection and prevention of known and unknown cyber threats. A solid
approach to securing the networks of [CUSTOMER] would be to control all activity across the network.
This next-generation network security design can be achieved through a multi-phase methodology based
on Palo Alto Networks technology.
Organizations must develop security policies (f irewall rules) that whitelist sanctioned business
applications at the network level, allowing only trusted applications to traverse the f irewalls. Network
segmentation, using subnets and VLANs, is desirable as it allows f or the separation of resources based
on application category, line-of -business f unction, and geographic location. Segmentation can help
prevent the unintentional spread of malware. App -ID goes beyond basic port and protocol inspection and
uniquely identif ies applications based on digital f ingerprints in the headers and payloads of traf fic
sessions.
Security prof iles (next-generation f eatures) should be deployed on all security policies that allow traf f ic.
These will enable the detection and prevention of known threats, exploits, and malware.
WildFire can be leveraged to identif y unknown threats via cloud-based, machine learning, and
sandboxing technologies to mitigate and prevent zero-day exploits.
Palo Alto Networks Prof essional Services will work closely with the [CUSTOMER]. team to discover and
document the specif ic configuration details. The resultant document will enable the [CUSTOMER] team to
understand the conf iguration details and continue to perf orm the conf iguration of additional Palo Alto
Networks systems based on the agreed upon criteria.
©2019 Palo Alto Networks, Inc.
5
Proprietary and Confidential
Note: Site specif ic parameters will be provided by the customer during conf iguration build -out in
a supplemental document.
LLD OUTLINE: This section will never change and is contextually for the Low- Level Design
template so you can get a “feel” for documentation flow.
Each bullet/sub-bullet represents a follow-on section with specific detailed configuration
requirements as discussed and agreed to with the customer.
The bullets correspond to a H1, H2, and H3 in subsequent sections of this document. For
example, in the following list: Platform will be a Head 1, Foundational Requirements will be a
Head 2, Procured systems will be a Head 3.
This document will cover the baseline conf iguration requirements established through collaboration with
[CUSTOMER] on these topics:
•
Platf orm
−
•
Foundational Requirements:
▪ Procured systems
▪ Procured licensing
▪ PAN-OS version
− Network Integration Requirements:
▪ Virtual System (vsys)
▪ Virtual Router
▪ High Availability
▪ Operational interf aces
▪ Management interf ace
▪ Logging interf ace
▪ Security Zones
▪ IPSec VPN
▪ GlobalProtect Conf igurations
− Administration Requirements:
▪ Administrative protocols and security model
▪ Local Administrative roles
▪ Local Administrative password/authentication model
▪ Login banner
Panorama
−
Foundational Requirements:
▪ Procured systems
▪ Procured licensing
▪ Conf irm the production version of Panorama
−
Platf orm Management Requirements:
▪ Device Groups
▪ Templates
▪ Security Prof iles
▪ Logging Prof iles
▪ URL Filtering
▪ Conf iguration backups
−
Reporting and Alerting Requirements
©2019 Palo Alto Networks, Inc.
6
Proprietary and Confidential
▪
▪
▪
−
−
Reporting
SNMP settings
Alerting settings
Administration Requirements:
▪ Role Based Administration
▪ Administrative password/authentication model
Cloud Services / Integration Pieces
▪ Logging Service
▪ GlobalProtect cloud service
▪ Application Framework
▪ Traps
▪ Azure
▪ AWS
▪ NSX Plugin
©2019 Palo Alto Networks, Inc.
7
Proprietary and Confidential
Platform
In this section, provide detail of the platform specific low-level design decisions/criteria as agreed
to by the customer.
This section should clearly and succinctly represent the objectives that have been communicated
by the customer. Provide as much detail about each as is appropriate for this customer, but this
section should be no longer than an executive summary.
This section of the document provides details of the specif ic low-level design criteria to integrate the Palo
Alto Networks platf orm into the [CUSTOMER] environment. The inf ormation contained herein will be
reviewed with [CUSTOMER] and become the basis f or all platf orm conf igurations to f acilitate adherence
to Palo Alto Networks best practices, as well as consistency across the environment to simplif y
operational activities.
Foundational Requirements
All data in the following tables are examples. Fill in with appropriate customer level information.
This section describes the Palo Alto Networks platf orms, physical and virtual, that have been procured
and will be deployed at the [CUSTOMER] location identif ied.
Procured Systems
Table 1 shows the security appliances with their corresponding locations, operating systems, and serial
number inf ormation.
Table 1 – Procured Systems
Item
ID
Platform
Model
High
Availability
Location to be Deployed
Serial Number(s)
1A
PA-5220
Corporate datacenter – Phoenix,
AZ
A/P with 1B
01234567890123456
1B
PA-5220
Corporate datacenter – Phoenix,
AZ
A/P with 1A
01234567890123457
2
PA-3060
Regional site – Denver, CO
N/A
01234567890654321
N
<etc…>
<etc…>
<etc…>
<etc…>
Procured Licensing
Table 2 shows the security appliances with their corresponding locations, operating systems, and serial
number inf ormation.
Table 2 – Procured Licensing
Item
ID
Platform Model
Threat Auth Code
URL Auth Code
WildFire Auth Code
1A
PA-5220
abc0123456
def654321
ghi789012
1B
PA-5220
abc0123457
def654322
ghi789013
2
PA-3060
abc0123458
def654323
ghi789014
N
<etc…>
Recommended PAN-OS Version
Table 3 shows the recommended version of PAN-OS to be deployed based upon Palo Alto Networks
experience and as recommended by ETAC at the time of install.
©2019 Palo Alto Networks, Inc.
8
Proprietary and Confidential
Table 3 – Recommended PAN-OS Version
Recommended
Version
PAN-OS 8.0.12
Recommendation Note(s)
ETAC recommended release, stability and field experience
Table 4 shows the version of PAN-OS to be deployed based upon balancing the recommendation above
and specif ic [CUSTOMER] f eedback.
Table 4 – To Be Deployed PAN-OS Version
Version to be
deployed
PAN-OS 8.1.3
Specific Version Reason(s)
[CUSTOMER] requires Panorama Configuration Variables as part of
deployment. This feature is in 8.1.x only, and 8.1.3 is current stable of 8.1.3.
Panorama Systems
This section describes the Palo Alto Networks Panorama systems, physical and virtual, that have been
procured and will be deployed at the [CUSTOMER] location identif ied.
Table 5 – Procured Systems
Item
Platform
Model
Location to be Deployed
Role
Serial Number(s)
1
M-500
Corporate data center – City,
State
Primary Mgt
01234567890123456
2
M-500
Corporate data center – City,
State
Secondary Mgt
01234567890123654
3
M-100
Regional site – City, State
Log Collector
01234567890654321
n
<etc…>
<etc…>
<etc…>
<etc…>
Network Integration Requirements
This section describes the specif ic low-level requirements to be used f or standardization of the platf orm
conf iguration. There will be a separate “build” document to annotate site specif ic configuration inf ormation
based on the requirements documented here.
Virtual Systems
A virtual system (vsys) is an independent (virtual) f irewall instance that can be separately managed within
a physical f irewall. Each vsys can be an independent f irewall with its own Security policy, interf aces, and
administrators. A vsys enables segmentation of the administration of all policies, reporting, and visibility
f unctions that the f irewall provides. To optimize policy administration, you can maintain separate
administrator accounts f or overall f irewall and network f unctions while creating vsys administrator
accounts that allow access to individual vsys. This restricts the vsys administrator to their assigned vsys.
Networking f unctions, including static and dynamic routing, pertain to an entire f irewall and all its vsy s;
vsys do not control f irewall and network-level f unctions. Each vsys can have a def ined collection of
physical and logical f irewall interf aces (including VLANs and virtual wires) and security zones. If you
require routing segmentation f or each vsys, you must create/assign additional virtual routers and assign
interf aces, VLANs, and virtual wires as needed.
If you use a Panorama template to def ine vsys, you can set one vsys as the def ault. The def ault vsys and
Multiple Virtual System Mode determine whether f irewalls accept vsys-specif ic configurations during a
template commit:
©2019 Palo Alto Networks, Inc.
9
Proprietary and Confidential
Firewalls that are in Multiple Virtual System Mode accept vsys-specif ic configurations f or all vsys that are
def ined in the template. Firewalls that are not in Multiple Virtual System Mode accept vsys-specif ic
conf igurations only f or the def ault vsys. If you do not set a vsys as the def ault, these f irewalls accept no
vsys-specif ic conf igurations.
<High Level Design Defined VSYS Requirements>
Bef ore enabling multiple vsys, consider the f ollowing:
•
•
•
•
•
•
A vsys administrator creates and manages all items needed f or policies.
Zones, interf aces, virtual routers, and v-wires become vsys-specif ic when multi-vsys is enabled.
Bef ore def ining a policy or policy object, select the Virtual System f rom the drop-down on
the Policies or Objects tab.
You can set remote logging destinations (SNMP, syslog, and email), applications, services, and
prof iles to be available to all vsys (shared) or to a single vsys.
You can conf igure Global (to all vsys on a f irewall) or vsys-specif ic service routes.
Virtual systems are supported on the PA-3000 Series, PA-5000 Series, PA-5200 Series, and
PA-7000 Series f irewalls. Multiple virtual systems are not supported on the PA-200, PA-220,
PA-500, PA-800 Series, or VM-Series f irewalls.
Table 6 – VSYS
VSYS Settings
Requirements
Setting Details
ID
Enter an integer identif ier f or the vsys. Ref er to the data sheet f or your
f irewall model f or inf ormation on the number of supported vsys.
Note: If you use a Panorama template to conf igure the vsys, this f ield
does not appear.
In this section are
examples of VSYS
settings. Delete prior
to presenting to
customer. Copy the
table for multiple vsys
as each will contain
unique configuration
settings.
1
Name
Enter a name (up to 31 characters) to identif y the vsys. The name is
case-sensitive and must be unique. Use only letters, numbers, spaces,
hyphens, and underscores.
Note: If you use a Panorama template to push vsys conf igurations, the
vsys name in the template must match the vsys name on the f irewall.
PHXDC_CustA
Allow
Forwarding of
Decrypted
Content
Select this option to allow the virtual system to f orward decrypted
content to an outside service when port mirroring or sending WildFire
f iles f or analysis.
No
Sessions Limit
Maximum number of sessions.
•
•
600,000 – vsys can
only limit session
count at this time. No
limits on CPU and
memory. Always
remember that vsys is
administrative and
logical traffic
separation only.
Security Rules
Maximum number of security rules
3000
NAT Rules
Maximum number of NAT rules
500
©2019 Palo Alto Networks, Inc.
10
Proprietary and Confidential
Decryption
Rules
Maximum number decryption rules.
500
QoS Rules
Maximum number of QoS rules.
500
Application
Override Rules
Maximum number of application override rules.
500
Policy Based
Forwarding
Rules
Maximum number of policy based f orwarding (PBF) rules.
500
Captive Portal
Rules
Maximum number of Captive Portal rules.
100
DoS Protection
Rules
Maximum number of denial of service (DoS) rules.
100
Site to Site VPN
Tunnels
Maximum number of site-to-site VPN tunnels.
100
Concurrent
GlobalProtect
Tunnels
Maximum number of concurrent remote GlobalProtect users.
©2019 Palo Alto Networks, Inc.
11
100
Proprietary and Confidential
Table 7 - VSYS (2)
VSYS Settings
Requirements
Setting Details
ID
Enter an integer identif ier f or the vsys. Ref er to the data sheet f or your
f irewall model f or inf ormation on the number of supported vsys.
Note: If you use a Panorama template to conf igure the vsys, this f ield
does not appear.
In this section are
examples of VSYS
settings. Delete prior
to presenting to
customer. Copy the
table for multiple vsys
as each will contain
unique configuration
settings.
2
Name
Enter a name (up to 31 characters) to identif y the vsys. The name is
case-sensitive and must be unique. Use only letters, numbers, spaces,
hyphens, and underscores.
Note: If you use a Panorama template to push vsys conf igurations, the
vsys name in the template must match the vsys name on the f irewall.
PHXDC_CustB
Allow
Forwarding of
Decrypted
Content
Select this option to allow the virtual system to f orward decrypted
content to an outside service when port mirroring or sending WildFire
f iles f or analysis.
No
Sessions Limit
Maximum number of sessions.
•
•
300,000
Security Rules
Maximum number of security rules
3000
NAT Rules
Maximum number of NAT rules
500
Decryption
Rules
Maximum number decryption rules.
500
QoS Rules
Maximum number of QoS rules.
500
Application
Override Rules
Maximum number of application override rules.
500
Policy Based
Forwarding
Rules
Maximum number of policy based f orwarding (PBF) rules.
500
Captive Portal
Rules
Maximum number of Captive Portal rules.
100
DoS Protection
Rules
Maximum number of denial of service (DoS) rules.
100
Site to Site VPN
Tunnels
Maximum number of site-to-site VPN tunnels.
100
Concurrent
GlobalProtect
Tunnels
Maximum number of concurrent remote GlobalProtect users.
100
©2019 Palo Alto Networks, Inc.
12
Proprietary and Confidential
Virtual Router
The f irewall uses virtual routers to direct traf f ic. Virtual routers support static routes and the f ollowing
dynamic routing protocols: RIP, OSPFv2, OSPFv3, and BGP . The routes that the f irewall obtains through
these methods populate the f irewall’s IP routing inf ormation base (RIB). When a packet is destined f or a
dif f erent subnet than the one it arrived on, the virtual router obtains the best route f rom the RIB, places it
in the f orwarding inf ormation base (FIB) and f orwards the packet to t he next hop router def ined in the FIB.
The f irewall uses Ethernet switching to reach other devices on the same IP subnet.
The Ethernet, VLAN, and tunnel interf aces def ined on the f irewall receive and f orward Layer 3 packets.
The destination zone is derived f rom the outgoing interf ace based on the f orwarding criteria, and the
f irewall consults the policy-base to identif y the action that it applies to each session. In addition to routing
to other network devices, virtual routers can route to other virtual ro uters within the same f irewall if a next
hop is specif ied to point to another virtual router.
Firewalls conf igured with Layer 3 interf aces can support multiple virtual routers, each maintaining a
separate set of routes that are not shared between virtual routers, supporting dif ferent routing behaviors
f or dif ferent interf aces assigned to the virtual router.
Each Layer 3 Ethernet, loopback, VLAN, and tunnel interf ace def ined on the f irewall must be associated
with only one virtual router. A virtual router can be conf igured with any combination of static routes and
dynamic routing protocols.
Set Administrative Distances f or types of routes as required f or your network. When the virtual router has
two or more dif f erent routes to the same destination, it uses administrative distance to choose the best
path f rom dif ferent routing protocols and static routes, by pref erring a lower distance.
•
•
•
•
•
•
OSPF Internal – Range is 10-240; def ault is 30.
OSPF External – Range is 10-240; def ault is 110.
IBGP – Range is 10-240; def ault is 200.
EBGP – Range is 10-240; def ault is 20.
RIP – Range is 10-240; def ault is 120.
Static – Range is 10-240; def ault is 10.
General dynamic routing settings
•
BFD - To enable Bidirectional Forwarding Detection (BFD) globally f or the virtual router on a
PA-3000 Series, PA-5000 Series, PA-7000 Series, or VM-Series f irewall, select one of the
f ollowing:
−
−
−
−
•
•
Def ault (def ault BFD settings
a BFD prof ile that you have created on the f irewall
New BFD prof ile to create a new BFD prof ile
Select None (Disable BFD) to disable BFD f or all OSPF interf aces on the virtual router;
you cannot enable BFD f or a single OSPF interf ace
Reject Default Route – Def ault setting. Select this option if you do not want to learn any default
routes.
Router ID - Specif y the router ID associated with the OSPF instance in this virtual router. The
OSPF protocol uses the router ID to uniquely identif y the OSPF or BGP instance.
•
Passive Interface - (OSPF-only) Select this option if you do not want the virtual router interfaces to
send or receive LSAs. The network associated with the passive interface will be advertised to the
areas with Type 2 LSAs (native routes.) This will prevent suppression in stubby areas and
NSSAs.
•
Auth Profiles – Create an authentication prof ile to ensure that peers must have a pre-shared key
bef ore establishing relationships. OSPF and BGP each have their own auth prof iles . BGP
supports MD5 pre-shared key while OSPF supports passphrase in addition to MD5.
©2019 Palo Alto Networks, Inc.
13
Proprietary and Confidential
o
(OSPF) If you select MD5 , enter one or more password entries, including Key-ID (0255), Key , and optional Preferred status. Click Add f or each entry, and then click OK. To
specif y the key to be used to authenticate outgoing message, select the Preferred option.
Each virtual router will have a set of general conf iguration settings to be applied to all routing conf igured
within it. Table 8 identif ies these settings and the design details to be applied.
Make one table per vsys if your customer is using multiple virtual systems. Each virtual router, and by
extension each network interface and security zone, must belong to a vsys.
Table 8 – Virtual Routers General Settings
Virtual Router
Settings
General Virtual
Router Conf ig
Routing
Protocols to be
Deployed
Administrative
Distances
Requirements
Setting Details
Virtual router naming convention
•
PHXDC-CustAVR1
Vsys ID
•
1
OSPF Internal
•
Area 0.0.0.0
OSPF External
•
N/A
iBGP
•
N/A
eBGP
•
N/A
RIP
•
N/A
Static
•
Yes, multiple
OSPF Internal
•
30
OSPF External
•
110
iBGP
•
200
eBGP
•
20
RIP
•
120
Static
•
10
OSPF
Open Shortest Path First (OSPF) is an interior gateway protocol (IGP) that is most of ten used to
dynamically manage network routes within a large enterprise network. It determines routes dynamically
by obtaining inf ormation f rom other routers and advertising routes to other routers by way of Link State
Advertisements (LSAs). The inf ormation gathered f rom the LSAs is used to construct a topology map of
the network. This topology map is shared across routers in the network and used to populate the IP
routing table with available routes.
Changes in the network topology are detected dynamically and used to generate a new topology map
within seconds. A shortest path tree is computed of each route. Metrics associated with each routing
interf ace are used to calculate the best route. These can include distance, network throughput, link
availability etc. Additionally, these metrics can be conf igured statically to direct the outcome of the OSPF
topology map.
Palo Alto Networks implementation of OSPF f ully supports the f ollowing RFCs:
•
•
RFC 2328 (f or IPv4)
RFC 5340 (f or IPv6)
OSPF Settings
•
•
Enable - Select this option to enable the OSPF protocol
Area ID - Conf igure the area over which the OSPF parameters can be applied
©2019 Palo Alto Networks, Inc.
14
Proprietary and Confidential
•
•
•
•
•
Enter an identif ier f or the area in x.x.x.x f ormat. This is the identif ier that each neighbor must
accept to be part of the same area. Area 0.0.0.0 is the Backbone, or core area necessary f or all
other areas to communicate.
Type - Select one of the following options:
•−
−
•
−
Normal—There are no restrictions; the area can carry all types of routes.
Stub — Stubs do not receive routes f rom externally advertised sources. Specif ically, they
reject LSA type 5. To reach a destination outside of the stub area it is necessary to go
through the border. There are two options in a stub area.
o Accept Summary – If this option is enabled, the stub area will accept LSA’s f rom other
areas in the OSPF Domain. If this option is disabled, the stub area will behave as a
“Totally Stubby Area” and reject LSA type 3 packets (inter-area LSAs) and block the
propagation of summary LSAs.
o Advertise Default Route - Def ault route LSAs will be included in advertisements to the
stub area along with the associated metric value (1-255).
NSSA (Not-So-Stubby Area) – In a NSSA, it is possible to leave the area directly but only by
routes other than OSPF routes. Specif ically, it advertises externally learned routes as LSA
Type 7 instead of LSA type 5. NSSA still block LSA type 5. If you select this option,
conf igure Accept Summary and Advertise Default Route as if this were a stub area. In
addition, conf igure the Type (Ext1 or Ext2) to advertise the def ault LSA. Also conf igure
Ext-Ranges to enable or suppress the advertisement of specif ic external routes.
•
Link Type – The link type should be specif ic to the type of network that OSPF LSAs will need to
traverse. These are Broadcast, Point-to-Point, and Point-to-Multipoint.
−
Broadcast – LSAs are sent in broadcast mode out the interf ace. This means that if the router
is connected to a switch, the switch will multiply the LSA and send it out all ports. Any
listening devices attached to the switch will accept the LSA and in turn respond with their own
LSA’s to f orm adjacency. Broadcasting is ef f icient when you need to connect a large quantity
of devices. Broadcast mode elects a Designated Router and a Backup Designated Router
(DR/BDR)
−
Choose p2p (point-to-point) if the OSPF interf ace is directly connected to a single OSPF
neighbor. LSA’s are unicasted out the conf igured interf ace and a neighbor is automatically
added if conf igured in the same area.
−
Choose p2mp (point-to-multipoint) when multiple OSPF neighbors exist but you cannot use
broadcast mode. LSAs are sent via multi-cast, and theref ore neighbors must be def ined
manually. Manually def ining neighbors is allowed only f or p2mp mode. No DR/BDR are
necessary here since you are manually def ining the scope of the OSPF area.
•
Priority - Enter the OSPF priority f or this interf ace (0-255). It is the priority f or the router to be
elected as a designated router (DR) or as a backup DR (BDR) according to the OSPF protocol.
When the value is zero, the router will not be elected as a DR or BDR.
•
Hello Interval - Interval, in seconds, at which the OSPF process sends hello packets to its directly
connected neighbors (range is 0-3600; def ault is 10).
•
Dead Count - Number of times the hello interval can occur f or a neighbor without OSPF receiving
a hello packet f rom the neighbor, bef ore OSPF considers that neighbor down. The Hello Interval
multiplied by the Dead Counts equals the value of the dead timer (range is 3-20; def ault is 4).
•
Retransmit Interval - Length of time, in seconds, that OSPF waits to receive a link -state
advertisement (LSA) f rom a neighbor bef ore OSPF retransmits the LSA (range is 0-3600; def ault
is 10).
•
Transmit Delay - Length of time, in seconds, that an LSA is delayed bef ore it is sent out of an
interf ace (range is 0-3600; def ault is 1).
©2019 Palo Alto Networks, Inc.
15
Proprietary and Confidential
•
Gracef ul Restart - Applies to an OSPF interf ace when active/passive high availability is
conf igured. Graceful Restart Hello Delay is the length of time during which the f irewall sends
Grace LSA packets at 1-second intervals. During this time, no hello packets are sent f rom the
restarting f irewall. During the restart, the dead timer (which is the Hello Interval multiplied by
the Dead Counts) is also counting down. If the dead timer is too short, the adjacency will go
down during the gracef ul restart because of the hello delay. Theref ore, it is recommended that the
dead timer be at least f our times the value of the Graceful Restart Hello Delay . For example,
a Hello Interval of 10 seconds and a Dead Counts of 4 yield a dead timer of 40 seconds. If
the Graceful Restart Hello Delay is set to 10 seconds, that 10-second delay of hello packets is
comf ortably within the 40-second dead timer, so the adjacency will not time out during a gracef ul
restart (range is 1-10; def ault is 10).
©2019 Palo Alto Networks, Inc.
16
Proprietary and Confidential
Table 9 identif ies the standardized OSPF conf iguration settings f or this environment.
Table 9 – OSPF Settings
OSPF Settings
Setting Details
Enable
Yes
Reject Def ault Route
•
Yes
Router ID
•
10.20.20.1 – Typically use router IP address
BFD
•
No
Area ID
•
0.0.0.0
Type
•
Normal
Range
•
•
•
10.20.20.0/24 – Advertise
10.20.30.0/24 – Advertise
172.16.0.0/16 – Suppress
Interf ace
•
Ethernet 1/2
Passive
•
No
Link type
•
Broadcast
Metric
•
10
Priority
•
1
Auth Prof ile
•
Yes – See below
Hello Interval (sec)
•
10
Dead Counts
•
4
Retransmit Interval (sec)
•
5
Transit Delay (sec)
•
1
Gracef ul Restart Hello Delay (sec) •
10
Virtual Link – Neighbor
•
N/A
Virtual Link – Transit area
•
N/A
Virtual Link - Enable
•
N/A
Virtual Link - Timing
•
N/A
Virtual Link – Auth prof ile
•
N/A
Auth Prof ile Name
•
PHXDCAuth
Auth Prof ile Password
•
N/A – It is recommended to store this in a password manager
instead of plain text in case this document is ever compromised.
BGP
BGP f unctions between Autonomous Systems (AS) via exterior BGP (eBGP). It f unctions within an AS
with interior BGP (iBGP) to exchange routing and reachability inf ormation with BGP speakers. The f irewall
provides a complete BGP implementation, which includes the f ollowing f eatures:
•
•
Specif ication of one BGP routing instance per virtual router.
BGP settings per virtual router, which include basic parameters such as local route ID and local
AS, and advanced options such as path selection, route ref lector, AS conf ederation, route f lap
dampening, and gracef ul restart.
©2019 Palo Alto Networks, Inc.
17
Proprietary and Confidential
•
•
•
•
•
Peer group and neighbor settings, which include neighbor address and remote AS, and
advanced options such as neighbor attributes and connections.
Route policies to control route import, export, and advertisement; pref ix-based f iltering; and
address aggregation.
IGP-BGP interaction to inject routes to BGP using redistribution prof iles.
Authentication prof iles, which specif y the MD5 authentication key f or BGP connect ions.
Authentication helps prevent route leaking and successf ul DoS attacks.
Multiprotocol BGP (MP-BGP) to allow BGP peers to carry IPv6 unicast routes and IPv4 multicast
routes in Update packets, and to allow the f irewall and a BGP peer to communicate wi th each
other using IPv6 addresses.
BGP Settings
•
AS Number - Enter the number of the AS to which the virtual router belongs, based on the router
ID (range is 1-4294967295).
•
Install Route - Select this option to install BGP routes in the global routing tab le.
•
Aggregate MED - Select to enable route aggregation even when routes have dif f erent Multi-Exit
Discriminator (MED) values.
•
Default Local Preference - Specif ies a value than can be used to determine pref erences among
dif f erent paths.
•
AS Format - Select the 2-byte (def ault) or 4-byte f ormat. This setting is conf igurable f or
interoperability purposes.
•
Always Compare MED - Enable MED comparison f or paths f rom neighbors in dif ferent
autonomous systems.
•
Deterministic MED Comparison - Enable MED comparison to choose between routes that are
advertised by IBGP peers (BGP peers in the same autonomous system).
•
Graceful Restart - Local Restart Time - Specif y the length of time, in seconds, that a route can
stay in the stale state (range is 1-3600; def ault is 120).
•
Graceful Restart - Max Peer Restart Time - Specif y the maximum length of time, in seconds, that
the f irewall accepts as a grace period restart time f or peer devices (range is 1-3600; def ault is
120).
•
Reflector Cluster ID - Specif y an IPv4 identif ier to represent the ref lector cluster.
•
Confederation ID - Specif y the identif ier f or the AS conf ederation to be presented as a single AS
to external BGP peers.
•
Dampening Prof ile Inf ormation
−
−
Profile Name - Enter a name to identif y the prof ile.
Cutoff - Specif y a route withdrawal threshold above which a route advertisement is
suppressed (range is 0.0-1000.0; def ault is 1.25).
Reuse - Specif y a route withdrawal threshold below which a suppressed route is used
again (range is 0.0-1000.0; def ault is 5).
− Max Hold Time - Specif y the maximum length of time, in seconds, that a route can be
suppressed, regardless of how unstable it has been (range is 0-3600; def ault is 900).
− Decay Half Life Reachable - Specif y the length of time, in seconds, af ter which a route’s
stability metric is halved if the route is considered reachable (range is 0-3600; def ault is
300).
− Decay Half Life Unreachable - Specif y the length of time, in seconds, af ter which a
route’s stability metric is halved if the route is considered unreachable (range is 0-3600;
def ault is 300).
Peer Group - Enter a name to identify the peer.
−
•
©2019 Palo Alto Networks, Inc.
18
Proprietary and Confidential
•
Aggregated Confed AS Path - Select this option to include a path to the configured aggregated
confederation AS.
•
Soft Reset with Stored Info - Select this option to perf orm a sof t reset of the f irewall af ter
updating the peer settings.
•
Type - Specify the type of peer or group and configure the associated settings (see below in this
table for descriptions of Import Next Hop and Export Next Hop ).
− IBGP - Specif y Export Next Hop
− EBGP - Specif y Export Next Hop
− IBGP Confed - Specif y Export Next Hop
− EBGP - Specif y Import Next Hop
− Export Next Hop - Remove Private AS (select if you want to force BGP to remove
private AS numbers)
•
Import Next Hop
− Original - Use the Next Hop address provided in the original route advertisement. Use
Peer - Use the peer's IP address as the Next Hop address. Resolve - Resolve the Next
Hop address using the local f orwarding table. Use Self - Replace the Next Hop address
with this router's IP address to ensure that it will be in the f orwarding path. Table 10
identif ies the standardized BGP conf iguration settings f or this environment.
Table 10 – BGP Settings
BGP settings
Setting Details
Enable
Not enabled for this customer but filling with example settings anyway
Router ID
PHXDC-VR1
AS Number
12345
BFD
N/A
Reject Def ault Route
Yes
Install Route
Yes
Aggregate MED
Yes
Def ault Local Pref erence
100
AS Format
4 Byte
Always Compare MED
No
Deterministic MED Comparison
Yes
Auth Prof iles
Yes – Store passwords in a password manager
Gracef ul Restart - Stale Route
120
Gracef ul Restart - Local Restart
120
Gracef ul Restart - Max Peer
120
Ref lector Cluster ID
None
Conf ederation Member AS
Yes
Dampening Prof iles – Name
N/A
Dampening Prof iles – Cutof f
N/A
Time
Time
Restart Time
©2019 Palo Alto Networks, Inc.
19
Proprietary and Confidential
Dampening Prof iles – Reuse
N/A
Dampening Prof iles – Max Hold
N/A
Dampening Prof iles – Decay
Half Lif e Reachable
N/A
Dampening Prof iles – Decay
Half Lif e Unreachable
N/A
Peer Group Name
N/A
Aggregated Confed AS Path
N/A
Soft Reset with Stored Info
N/A
Type
N/A
Inport Next Hop
N/A
Export Next Hop
N/A
©2019 Palo Alto Networks, Inc.
20
Proprietary and Confidential
RIP
Routing Inf ormation Protocol (RIP) is an interior gateway protocol (IGP) that was designed f or small IP
networks. RIP relies on hop count to determine routes; the best routes have the f ewest number of hops.
RIP is based on UDP and uses port 520 f or route updates. By limiting routes to a maximum of 15 hops,
the protocol helps prevent the development of routing loops, but also limits the supported network size.
If more than 15 hops are required, traf f ic is not routed. RIP also can take longer to converge than OSPF
and other routing protocols. Palo Alto Networks f irewalls only supports RIP v2.
RIP is an old dynamic routing protocol and is rare to see in production environments. OSPF is much more
common to see. Most environments will not configure RIP, thus N/ A is pre-populated below.
RIP General Settings
Advertise - Select to enable advertisement of a default route to RIP peers with the specified
•
metric value.
Metric - Specify a metric value for the router advertisement. This field is visible only if you enable
Advertise.
Mode - normal, passive, or send-only .
Interval Seconds - Define the length of the timer interval in seconds. This duration is used for the
•
•
•
remaining RIP timing fields (range is 1-60).
Update Intervals - Enter the number of intervals between route update announcements (range is
•
1-3600).
Expire Intervals - Enter the number of intervals between the time that the route was last updated
•
to its expiration (range is 1-3600).
Delete Intervals - Enter the number of intervals between the time that the route expires to its
•
deletion (range is 1-3600).
Table 11 identif ies the standardized RIP conf iguration settings f or this environment.
Table 11 – RIP Settings
RIP settings
Setting Details
Reject Default Route •
N/A
BFD
•
N/A
Interface
•
N/A
Advertise
•
N/A
Metric
•
N/A
Mode
•
N/A
Interval Seconds
•
N/A
Update Intervals
•
N/A
Expire Intervals
•
N/A
Delete Intervals
•
N/A
Auth Profile Name
•
N/A
Auth Password Type •
N/A
©2019 Palo Alto Networks, Inc.
21
Proprietary and Confidential
High Availability
A Palo Alto Networks best practice is to deploy all f irewalls in pairs conf igured with active/passive highavailability. With active/passive, one f irewall will be the primary (active) f irewall that passes all traf f ic. The
secondary (passive) f irewall will have a synchronized conf iguration and session table but not pass traf f ic.
In the event of a f irewall f ailover, the secondary f irewall will b ecome active and begin passing traf f ic.
Because the session table will have already been synchronized, existing traf f ic sessions will not be
interrupted.
When the primary f irewall comes back into operation, the f irewalls can be conf igured to leave the
secondary as the active with the primary staying in passive mode. HA can also be conf igured so the
primary can preempt ownership and become the active f irewall again af ter a short time has passed af ter
coming back online.
Active/passive HA on Palo Alto Networks devices requires two links minimum f or operation: HA1 f or
control plane synchronization, and HA2 f or data plane synchronization. There are two dedicated
hardware links on each of the f irewalls f or this f unction (PA-3000 Series and larger). It is also a best
practice to conf igure backup links f or each of those f unctions, if there are available operational interf aces
on the X0Y0 (3020, 5050, etc.) Series f irewalls. The PA X2Y0 (3220, 5260, etc.) Series f irewalls have
dedicated hardware interf aces f or HA1, HA1 backup, and HA2. HA2B still needs to be a dataplane
interf ace on these models.
Link and Path monitoring are available on the HA settings in PAN-OS as well to manage how the platf orm
f ails over f or non-hardware-specif ic reasons. Link monitoring will trigger a f ailover event if it detects
monitored link f ailures. A f ailover can be conf igured to trigger if a single link is down, or if a combination of
links is brought down. Path monitoring will monitor an upstream or downstream IP address or group of
addresses and trigger a f ailover if they are not reachable af ter a conf igurable threshold.
Requirements from HLD
<HLD defined HA requirements>
[CUSTOMER] will be deploying several Palo Alto Networks platf orms in an active/passive conf iguration
with the remainder of the platf orms deployed as standalone systems (see Table 12).
Table 12 – Active/Passive HA Firewall Deployment
Firewall
Name
HA Mode
HA1 IP
HA1B IP
HA2 IP
HA2B IP
PHXDCEFW01
Active/Passive
10.254.250.1
10.254.251.1
10.254.252.1
10.254.253.1
PHXDCEFW02
Active/Passive
10.254.250.2
10.254.251.2
10.254.252.2
10.254.253.2
©2019 Palo Alto Networks, Inc.
22
Proprietary and Confidential
Customer Specific Requirements
<LLD specifics for this customer use case(s)>
Table 13 shows the recommended and agreed upon high availability (HA) settings to be standardized
across all HA active/passive and active/active deployments in the [CUSTOMER] environment.
Table 13 – Standardized HA Settings
A/P HA Settings
Recommendation
Passive Link State
Shutdown
Monitor Fail Hold Down
Time
1 min
Device Priority
50/100
Preemptive
Disabled
Heartbeat backup
Enabled
HA Timer Settings
Default
Backup Links
Enabled
Link Monitoring
Enabled on all
interfaces
Path Monitoring
Disabled
A/A HA Settings
Enabled, customer desires that FW1 is
always active if it is available f or service f or
Perimeter f irewalls, def ault f or datacenter
f irewalls..
Recommendation
Device Priority
50/100
Preemptive
Disabled
Heartbeat backup
Enabled
HA Timer Settings
Recommended
Backup Links
Enabled
Link Monitoring
Enabled on all
interfaces
Path Monitoring
Disabled
Recommendation Override/Reason
Recommendation Override/Reason
Operational Interfaces
Interfaces Overview
The interf ace conf igurations of f irewall data ports enable traf f ic to enter and exit the f irewall. The f irewall
supports the f ollowing interf ace types on the dataplane:
•
Physical Interf aces - Depending on the model, the f irewall supports copper and f iber optic
interf aces. Copper interf aces take standard RJ45 compatible CATX cable, while the f iber
interf aces range f rom SFP+ f or 1 to 10Gbit ethernet, to QSFP+ f or 40 to 100Gbit Ethernet.
Dataplane interf aces can be conf igured as the f ollowing types: tap, high availability (HA), log
card*, decryption mirror, virtual wire*, Layer 2*, Layer 3*, and Aggregate Ethernet*. Interf aces
marked with a * can be conf igured in logical sub -interf ace mode.
©2019 Palo Alto Networks, Inc.
23
Proprietary and Confidential
•
Logical Interf aces - These include virtual local area network (VLAN) interf aces, loopback
interf aces, and tunnel interf aces. You must set up the physical interf ace bef ore def ining a VLAN
or a tunnel interf ace.
General Interface Settings
Interf ace names are predef ined and cannot be changed. A description f ield can be used to “name” the
interf ace if desired. Interf aces that require a numeric suf f ix are: aggregate interf aces, logical subinterf aces, VLAN interf aces, loopback interf aces, and tunnel interf aces.
•
Interface Types
− Tap
− HA
− Decrypt Mirror (PA-3000 Series f irewalls and above only)
− Virtual Wire
− Layer 2
− Layer 3
− Log Card (PA-7000 Series f irewall only)
− Aggregate Ethernet
All interf aces should be conf igured with the f ollowing settings. Settings marked with * are required f or
the interf ace to pass traf f ic.
•
Management Profile - Def ines the protocols allowed on the interf ace. Ping, SSH, HTTPS, SNMP,
and more are available options here. Ping must be enabled f or the interf ace to directly respond to
ICMP echo requests.
•
IP Address - (Optional) Conf igure the IPv4 or IPv6 address of the Ethernet, VLAN, loopback, or
tunnel interf ace. For an IPv4 address, you can also select the addressing mode (Type) f or the
interf ace: Static , DHCP Client, or PPPoE .
•
Virtual Router* - Assign a virtual router to the interf ace (Layer 3 interf aces)
•
Tag - Enter the VLAN tag (1-4,094) f or the subinterf ace.
VLAN - To enable switching between Layer 2 interf aces, or to enable routing through a VLAN
•
interf ace, you must conf igure a VLAN object. A VLAN object must have an IP address.
•
Vwire - Assign a vwire to the interf ace (vwire interf aces only).
•
Virtual System - If the f irewall supports multiple virtual systems and that capability is enabled,
select a virtual system (vsys) f or the interf ace or click Virtual System to def ine a new vsys.
•
Zone* - Def ine a security zone f or the interf ace
Comment - A description of the interf ace f unction or purpose.
•
©2019 Palo Alto Networks, Inc.
24
Proprietary and Confidential
Table 14 – General Interface Settings
Interface
Type
Mgmt
Profile
Virtual
Router
IP
VLAN
vSys
Zone
Ethernet1/1
L3
Ping Only
123.125.22.15
PHXDCCustAVR1
N/A
Vsys1
Internet
Ethernet1/2
L3
Ping Only
192.168.15.1
PHXDCCustAVR1
N/A
Vsys1
UserLAN
<HLD defined operational interface requirements>
Use this section to outline Operation Interface requirements.
<LLD specifics for this customer use case(s)>
Use this section to outline customer specific needs.
Tables f or each of these are shown above with an example of the inf ormation required to conf igure.
©2019 Palo Alto Networks, Inc.
25
Proprietary and Confidential
Management Interface
By def ault, the f irewall is managed via the Management interf ace (MGT). The f irewall also uses the MGT
interf ace to access remote services, such as DNS servers, content updates, and license retrieval. If you
do not want to enable external network access to your management network, you must set up a data port
to provide access to these required external services.
General Management Interface Settings
•
Services – Def ines the services permitted f or management access.
−
−
−
−
−
−
−
−
−
•
•
•
HTTP (Not recommended)
HTTP OCSP
HTTPS
Telnet (not recommended)
SSH
Ping
SNMP
User-ID
User-ID Syslog listener – SSL
Permitted IP – Def ines the IP addresses or ranges allowed to access the f irewall f or
management.
Services - Def ines the DNS and NTP conf iguration.
User-ID Syslog Listener - UDP
Table 15 – MGT Port Settings
MGT Port Settings
Settings
Override/Reason
IP Address
192.168.25.200
Mask
255.255.255.0
Gateway
192.168.25.1
IPv6 address
N/A
Speed
1Gbps
MTU
1500
Services
HTTPS, SSH, Ping, User-ID,
SNMP
Permitted IP’s
192.168.25.0/24
Update Server
Updates.paloaltonetworks.com
Do not change the Update Server
unless instructed by Technical Support
<HLD defined operational interface requirements>
Use this section to outline Operation Interface requirements.
<LLD specifics for this customer use case(s)>
Use this section to outline customer specific needs.
©2019 Palo Alto Networks, Inc.
26
Proprietary and Confidential
Logging Interface
The log interf ace is specif ic to the PA-7000 Series f irewall chassis. The capability of supporting multiple
NPC cards with multiple 10Gbps interf aces in a single unit creates a scenario where logs can be
generated at a rate greater than the def ault 1Gbps RJ45 management interf ace can handle. Theref ore, a
dedicated logging interf ace needs to be created to f orward logs f rom the PA -7000 Series f irewalls with
enough bandwidth to handle the f orwarding of the aggregate logs. Log data on the PA -7000 Series is
stored on an LPC card. In PAN-OS 7.1 and earlier, logs cannot be f orwarded f rom the LPC to Panorama.
This limitation was corrected in PAN-OS 8.x and above. The Logging interf ace is conf igured as a
dataplane interf ace, selectable f rom the Type drop -down menu at creation.
Table 16 – Log Interface Settings
Log Interface
Settings
Interf ace Name
Ethernet3/14
IP Address
IP goes here
Mask
Mask goes here
Gateway
Gateway goes here
IPv6 address
N/A
Speed
10Gbps
MTU
1500
Notes
10 Gbps GBIC slot
Configure Panorama to Use Multiple Interfaces
In a large-scale network, you can improve security and reduce congestion by implementing network
segmentation, which involves segregating the subnetworks based on resource usage, user roles, and
security requirements. Panorama supports network segmentation by enabling you to use multiple
M-Series appliance interf aces f or managing devices (f irewalls, Log Collectors, and WildFire appliances
and appliance clusters) and collecting logs; you can assign separate interf aces to the devices on
separate subnetworks. Using multiple interf aces to collect logs also provides the benef it of load
balancing, which is particularly usef ul in environments where the f irewalls f orward logs at high rates to th e
Log Collectors.
Because administrators access and manage Panorama over the MGT interf ace, securing that interf ace is
especially important. One method f or improving the security of the MGT interf ace is to of fload Panorama
services to other interf aces. In addition to device management and log collection, you can also of f load
Collector Group communication and deployment of software and content updates to f irewalls, Log
Collectors, and WildFire appliances and appliance clusters. By of f loading these services, you can reserve
the MGT interf ace f or administrative traf f ic and assign it to a secure subnetwork that is segregated f rom
the subnetworks where your f irewalls, Log Collectors, and WildFire appliances and appliance clusters
reside.
Multiple Interfaces for Network Segmentation
•
•
•
•
Panorama management network - To protect the Panorama web interf ace, CLI, and XML API
f rom unauthorized access, the MGT interf ace on Panorama should be connected to a
subnetwork that only administrators can access.
Internet - Panorama uses the MGT interf ace to communicate with external services such as the
Palo Alto Networks Update Server.
Perimeter Gateway and Data Center - Panorama can use separate interf ace(s) to manage
f irewalls and Log Collectors.
Managing f irewalls typically generates less traf f ic than querying Log Collectors f or report
inf ormation. Theref ore, Panorama can use 1Gbps interf aces (Eth1 and Eth2) f or managing the
©2019 Palo Alto Networks, Inc.
27
Proprietary and Confidential
•
f irewalls and use 10Gbps interf aces (Eth4 and Eth5) f or querying and managing the Log
Collectors.
− Each Log Collector then uses its MGT interf ace to respond to the queries but uses its
Eth4 and Eth5 interf aces f or the heavier traf f ic associated with collecting logs from the
f irewalls.
Sof tware and content updates - The f irewalls and Log Collectors can retrieve sof tware and
content updates over a dedicated interf ace on Panorama.
Security Zones
<description of security zone functionality>
Security zones are a logical way to group physical and virtual interf aces on the f irewall to control and log
the traf f ic that traverses specif ic interf aces on your network. An interf ace on the f irewall must be assigned
to a security zone bef ore the interf ace can process traf f ic. A zone can have multiple interf aces of the
same type assigned to it (such as tap, Layer 2, or Layer 3 interf aces), but an interf ace can belong to only
one zone.
Policy rules on the f irewall use security zones to identif y where the traf f ic comes f rom and where it is
going. Traf f ic can f low f reely within a zone, but traf f ic cannot f low between dif f erent zones until you def ine
a Security policy rule that allows it. To allow or deny interzone traf f ic, Securit y policy rules must ref erence
a source zone and destination zone (not interf aces) and the zones must be of the same type; that is, a
Security policy rule can allow or deny traf f ic f rom one Layer 2 zone only to another Layer 2 zone.
<HLD defined security zone requirements>
<LLD specifics for this customer use case(s)>
General Security Zone Settings
•
•
•
•
•
•
•
•
Name - Enter a zone name (up to 31 characters). This name appears in the list of zones when
def ining security policies and conf iguring interf aces. The name is case-sensitive and must be
unique within the virtual system. Use only letters, numbers, spaces, hyphens, periods, and
underscores.
Location - This f ield is present only if the f irewall supports multiple virtual systems (vsys) and that
capability is enabled. Select the vsys to which this zone applies.
Type - The External zone is used to control traf f ic between multiple vsys on a single f irewall. It
displays only on f irewalls that support multiple vsys and only if the Multi vsys is enabled. An
interf ace can belong to only one zone.
− Tap
− Virtual Wire
− Layer 2
− Layer 3
− External
− Tunnel
Log Setting - Select a Log Forwarding prof ile f or f orwarding zone protection logs to an external
system. If you have a Log Forwarding prof ile named def ault, that prof ile will be automatically
selected f or this drop-down when def ining a new security zone. You can override this def ault
setting at any time by continuing to select a dif f erent Log Forwarding prof ile when setting up a
new security zone.
Interf ace - Add one or more interf aces. Interf aces can only belong to one zone.
USER-ID - Enable on trusted zones only to allow user-id mapping.
USER-ID ACL Include - By def ault the f irewall applies all user mapping inf ormation discovered to
all the traf f ic of this zone f or use in lo gs, reports, and policies.
USER-ID ACL Exclude - To exclude user mapping inf o included in the Include List.
©2019 Palo Alto Networks, Inc.
28
Proprietary and Confidential
Table 17 – Security Zones
Zone
Name
Type
Zone
Protection
Ethernet1/1
L3
Ping Only
No
Vsys1
N/A
N/A
Ethernet1/2
L3
Ping Only
192.168.15.1
Vsys1
Leave blank
for all
N/A
©2019 Palo Alto Networks, Inc.
User-ID
Vsys
29
User Include
User Exclude
Proprietary and Confidential
IPSec VPNs
IPSec tunnels f acilitate encrypted business to business (site-to-site) connections over the public internet.
Two sites negotiate an IKE connection, and once established, negotiate an IPSec tunnel between the two
IKE Gateways. Palo Alto Networks f irewalls support route-based VPN natively, whereby a route entry is
made in the virtual router that is associated with the tunnel interf ace. These route entries ensure that
traf f ic sent to the specif ied destinations will egress through the conf igured IPSec tunnel interf ace(s).
IPSec tunnels also support proxy IDs. Proxy IDs are necessary f or third -party (Cisco, Juniper, etc.) IKE
peers that route traf f ic based on policy only. Routes conf igured in the Proxy ID’s tab are advertised to the
IKE peer as being permissible through the tunnel – both ingress and egress. Be aware when conf iguring
IPSec tunnels that if the peer is policy based and the IPSec tunnel(s) are not conf igured with proxy ID’s,
the f irewall will attempt to advertise 0.0.0.0/0 over any port to the peer. This results in a f ailed IPSec
tunnel establishment.
<HLD defined IPSec VPN requirements>
<LLD specifics for this customer use case(s)>
General IPSEC Settings
•
Name - Enter a Name to identif y the prof ile (up to 31 characters). The name is case-sensitive and
must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
•
DH Group - Def ines the Dif f ie-Helmen key exchange group. For higher security, choose the group
with the highest number. If you do not want to renew the key that the f irewall creates during IKE
phase 1, select no-pfs (no perf ect f orward secrecy); the f irewall reuses the current key f or the
IPSec security association (SA) negotiations. Key re-use is not recommended as PFS is
desirable in most circumstances.
−
−
−
−
−
−
•
•
Authentication - For highest security, change the order (top to bottom) as f ollows:
−
−
−
−
sha512
sha384
sha256
sha1
−
md5
Encryption - For highest security, change the order (top to bottom) as f ollows:
−
−
−
−
−
•
group1
group2
group5
group14
group19
group20
aes-256-cbc
aes-192-cbc
aes-128-cbc
3des
des
KEY Lif etime - Select unit of time and enter the length of time that the negotiated IKE Phase 1
key will be ef f ective (def ault is 8 hours).
−
IKEv2—Bef ore the key lif etime expires, the SA must be re-keyed or else, upon expiration,
the SA must begin a new Phase 1 key negotiation.
−
IKEv1—Will not actively do a Phase-1 re-key bef ore expiration. Only when the IKEv1
IPSec SA expires will it trigger IKEv1 Phase 1 re-key.
©2019 Palo Alto Networks, Inc.
30
Proprietary and Confidential
•
IKEv2 Auth - Specif y a value (range is 0-50; def ault is 0) that is multiplied by the Key Lif etime to
determine the authentication count. The authentication count is the number of times that the
gateway can perf orm IKEv2 IKE SA re-key bef ore the gateway must start over with IKEv2
re-authentication. A value of 0 disables the re-authentication f eature.
IPSEC Profile
•
•
ESP - Encapsulating Security Payload protocol encrypts the data, authenticates the source, and
verif ies data integrity.
AH - Authentication Header protocol authenticates the source and verif ies data integrity.
•
Encryption (ESP protocol only)
−
−
−
−
−
−
−
−
•
•
•
aes-256-gcm
aes-256-cbc
aes-192-cbc
aes-128-gcm
aes-128-ccm (the VM-Series f irewall does not support this option)
aes-128-cbc, 3des
des
Null (no encryption)
DH Group - For highest security, choose the group with the highest number. If you do not want to
renew the key that the f irewall creates during IKE phase 1, select no-pf s (no perf ect f orward
secrecy). The f irewall reuses the current key f or the IPSec security association (SA) negotiations.
− group1
− group2
− group5
− group14
− group19
− group20
Lif etime - Select units and enter the length of time (def ault is one hour) that the negotiated key
will stay ef f ective.
Lif esize - Select optional units and enter the amount of data that the key can use f or encryption.
©2019 Palo Alto Networks, Inc.
31
Proprietary and Confidential
Table 18 – IKE Profile
IPSEC Settings
Name
BusinessPeer
DH Group
Group14
Authentication
Sha256
Encryption
AES-256-cbc
Key Lif etime
8 hours
IKEv2
Authentication
Multiple
0
Settings
Override/Reason
Settings
Override/Reason
Table 19 – IPSec Profile
IPSec Settings
Name
IPSec Protocol
AES256_Sha256
ESP
Encryption (ESP
protocol only)
Aes-256-gcm
Authentication
Sha256
DH Group
Group14
Lif etime
1 hour
Lif esize
©2019 Palo Alto Networks, Inc.
32
Proprietary and Confidential
GlobalProtect Configurations
GlobalProtect is the Palo Alto Networks VPN / baked-in User-ID solution. It can serve as a remote access
VPN and/or a source User-ID and Host Inf ormation. Remote Access VPN extends the protections of the
f irewall rulebase to the clients connecting to the external gateways in tunnel mode, while internal
gateways can transparently identif y users on the local network. The f irewall can use this User-ID / HIP
data to enf orce access in security policy.
Portals
Table 20 – GlobalProtect Portal Information
Interface
Auth Profile
Ethernet1/2
LDAP
IP Address
120.111.15.7
FQDN
Agent
Profiles
Portal.company.com
Gateways /
Agent Profile
Windows
ExtGW1 /
MSF
MacOS
ExtGW1 /
MAC
Gateways
Table 21 - GlobalProtect Gateway Information
Interface
Loopback.1
Auth
Profile
LDAP
IP Address
FQDN
Agent
Profiles
Client DHCP
Pool
192.168.254.254
Extgw.company.com
Windows
10.254.0.0/16
MacOS
10.253.0.0/16
Tunnel
Mode?
Yes
Yes
HIP Profile Information
Table 22 - HIP Profile Information
HIP Name
AV_OS_CHECK
Parameters
Palo Alto Networks Traps version X.Y, Windows 10
©2019 Palo Alto Networks, Inc.
33
Proprietary and Confidential
Panorama
This section of the document will detail out the specif ic low-level design criteria to integrate the Palo Alto
Networks Panorama, if procured, into the [CUSTOMER] environment. The inf ormation contained herein
will be reviewed with [CUSTOMER] and become the basis f or all platf orm conf igurations to facilitate
adherence to Palo Alto Networks best practices as well as consistency across the environment to simplif y
operational activities.
Management Interface
<description of management interface functionality>
By def ault, the f irewall is managed via the Management interf ace (MGT). The f irewall also uses the MGT
interf ace to access remote services, such as DNS servers, content updates, and license retrieval. If you
do not want to enable external network access to your management network, you must set up a data port
to provide access to these required external services.
Table 23 – MGT Port Settings
MGT Port Settings
Settings
Override/Reason
IP Addres
192.168.25.200
Mask
255.255.255.0
Gateway
192.168.25.1
IPv6 address
N/A
Speed
1Gbps
MTU
1500
Services
HTTPS, SSH, Ping, User-ID,
SNMP
Permitted IP
192.168.25.0/24
Update Server
Updates.paloaltonetworks.com
©2019 Palo Alto Networks, Inc.
34
Do not change the Update Server
unless instructed by Technical Support
Proprietary and Confidential
Templates
A template def ines the collection of all settings in the Device and Network tabs of managed f irewalls
assigned to the template. Through the Device and Network tabs, Panorama can deploy a common base
conf iguration to multiple f irewalls that require similar settings using a template or a template stack (a
combination of templates). Templates are “cookie-cutter” collections of configuration settings and do not
exhibit any type of hierarchical behavior when combined in a stack. The stack has a conf igurable inte rnal
pref erence order when two conf licting settings are detected. The template which is highest in the stack
has priority in the conf ig. For example, a stack consists of Template A and Template B. Both templates
have ethernet1/1 conf igured with two dif f erent IP addresses. If Template A is above Template B in the
stack, Template A’s ethernet1/1 IP address will take precedence.
In addition to the settings available f rom the dialogs f or creating Templates or Template Stacks:
•
•
Type—Identif ies the listed entries as templates or template stacks.
Stack—Lists the templates assigned to a template stack.
Panorama supports up to 1,024 templates.
Table 24 - Panorama Templates
Template Name
Stack
Stack Members
Master Device
US-DeviceConfig
EastCoast-Network
WestCoastNetwork
WestCoast
US-DeviceConfig
WestCoast-Network
WestFW1
EastCoast
US-DeviceConfig
EastCoast-Network
EastFW1
Japan
APAC-DeviceConfig
Japan-Network
Osaka-FW1
Korea
APAC-DeviceConfig
Korea-Network
Seoul-FW1
APAC-DeviceConfig
Japan-Network
Korea-Network
©2019 Palo Alto Networks, Inc.
35
Proprietary and Confidential
Device Groups
A Device Group is a collection of all settings in the Policies and Objects tabs of a managed f irewall.
Device groups are hierarchical in nature and objects created in a parent will propagate down to children.
Panorama treats these groups as single units when applying policies. Firewalls can belong to only one
device group. However, because virtual systems are distinct entities in Panorama you can assign virtual
systems within a f irewall to dif ferent device groups.
You can nest device groups in a tree hierarchy of up to f our levels under the Shared location to
implement a layered approach f or managing policies across your network of f irewalls. At the bottom level,
a device group can have parent, grandparent, and great-grandparent device groups at successively
higher levels—collectively called ancestors—f rom which the bottom-level device group inherits policies
and objects. At the top level, a device group can have child, grandchild, and great -grandchild device
groups—collectively called descendants.
Af ter adding, editing, or deleting a device group, perf orm a Panorama commit and device group commit,
Panorama then pushes the conf iguration changes to the f irewalls that are assigned to the device group .
Panorama supports up to 1,024 device groups.
Device Group Tree
The f ollowing table represents the structure of the device groups .
Table 25 - Device Group Tree Structure
2nd Tier
Device Group Name
3rd Tier
4th Tier
Shared
Corporate Global
US
East Coast
West Coast
APAC
Japan
Korea
Logging and Reporting Settings
Panorama can be conf igured to generate reports based on data observed in the traf f ic logs. These are
device group level settings that can be conf igured to automatically email PDF reports to organization
teams.
©2019 Palo Alto Networks, Inc.
36
Proprietary and Confidential
Security Profiles
Security policy rules allow or block traf f ic based on match crit eria and are otherwise known as firewall
rules. Security prof iles, on the other hand, are objects attached to security policies that help def ine an
allow but scan rule. Security prof iles perf orm various types of deep content inspection on allowed
applications such as CVE vulnerabilities, viruses, malware, spyware, and DDOS attacks. When traf f ic
matches the allow rule def ined in the security policy, the security prof iles that are attached to the rule are
applied f or f urther content inspection criteria. Security prof iles are not used as a match-criteria; the
security prof ile is only applied to permit rules af ter all match criteria is satisf ied.
The f irewall provides def ault security prof iles that you can use out of the box to begin protecting your
network f rom threats. You can add security prof iles that are commonly applied together to a Security
Prof ile Group. This set of prof iles can be treated as a unit and added to security policies in one step; or
included in security policies by def ault, if yo u choose to set up a def ault security prof ile group.
The f ollowing topics provide more detailed inf ormation about each type of security prof ile and how to set
up a security prof ile group.
Antivirus Profiles
Antivirus prof iles protect against known viruses, worms, and trojans as well as spyware downloads. Using
a stream-based malware prevention engine, which inspects traf f ic the moment the f irst packet is received,
the Palo Alto Networks antivirus solution can provide protection f or clients without signif icantly impacting
the perf ormance of the f irewall. This prof ile scans f or a wide variety of malware in executables, PDF f iles,
HTML and JavaScript viruses, including support f or scanning inside compressed f iles and data encoding
schemes. If you have enabled decryption on the f irewall, the prof ile also enables scanning of decrypted
content.
The def ault prof ile inspects all the listed protocol decoders f or viruses, and generates alerts f or SMTP,
IMAP, and POP3 protocols while blocking f or FTP, HTTP, and SMB prot ocols. You can conf igure the
action f or a decoder or antivirus signature and specif y how the f irewall responds to a threat event and
make exceptions if the prof ile detects a f alse positive.
To protect against unknown threats, if there is a valid WildFire subscription licensed on the f irewall the
Antivirus prof iles can take action on WildFire signatures to protect against “zero-day” threats that are
successf ully identif ied as Malware by the WildFire cloud. The recommended action is block on all
decoders as this prof ile is searching f or known malware.
Table 26 - Antivirus Profile
Profile Name
AV-General
Decoder
Action
WildFire-Action
smtp
Reset-both
Reset-both
smb
Reset-both
Reset-both
pop3
Reset-both
Reset-both
imap
Reset-both
Reset-both
http
Reset-both
Reset-both
ftp
Reset-both
Reset-both
Anti-Spyware Profiles
Anti-Spyware prof iles block spyware on compromised hosts f rom trying to phone-home or beacon out to
external command-and-control (C2) servers, allowing the detection of malicious traf f ic leaving the network
f rom inf ected clients. Various levels of protection can be applied between zones. Custom Anti-Spyware
prof iles can be created manually or chosen f rom predef ined prof iles.
©2019 Palo Alto Networks, Inc.
37
Proprietary and Confidential
Additionally, Anti-Spyware prof iles support the DNS sinkhole action. This can be enabled to f orge a
response to a DNS query f or a known malicious domain, causing the malicious domain name to resolve
to an IP address that you def ine. This f eature helps to identif y inf ected hosts on the protected network
using DNS traf f ic. Inf ected hosts can then be easily identif ied in the traf f ic and threat logs because any
host that attempts to connect to the sinkhole IP address are most likely inf ected with malware.
Note: Make a new table per profile.
Table 27 - Anti-Spyware Profile Details
Profile Name
AS-General
Severity
Action
Critical / High / Medium
Reset-both
Low / Informational
Alert
DNS Sinkhole?
Yes, Palo Alto
Networks IP
Vulnerability Protection Profiles
Vulnerability Protection prof iles stop attempts to exploit system f laws or gain unauthorized access to
systems. Vulnerability Protection prof iles help protect against buf f er overf lows, illegal code execution,
brute f orce attempts and other attempts to exploit system vulnerabilities. It is recommended to make a
Vulnerability Protection prof ile that takes the action of reset-both on all medium, high, and critical severity
vulnerability detections f or inbound and outbound f lows. Inside to inside (network segmentation f lows)
should block critical and high. Exceptions can be made if any f alse positives are detected, or true
positives that cannot be f ixed in a specif ic LAN segment. This recommendation does not apply to all
levels of risk tolerance – environments that are averse to any interruption in service should f ollow their
own best practice models. For lower severity such as Low and Inf ormational, choose the action of default.
You can also create exceptions, which allow you to change the response to a specif ic signature.
For more information on Vulnerability Protection profile recommendations, refer to the following link.
Vulnerability profiles should be configured based on traffic direction.
https://iron-skillet.readthedocs.io/en/panos_v8.0/panos_template_guide.html#vulnerability -protection
Actions – The f ollowing actions can be conf igured in a prof ile:
•
Default - For each threat signature and Antivirus signature that is def ined by Palo Alto Networks,
•
•
a def ault action is specif ied internally. Typically, the def ault action is an alert or a reset -both. The
def ault action is displayed in parenthesis, f or example def ault (alert) in the threat or Antivirus
signature.
Allow - Permits the application traf f ic. Does not create a log entry.
Alert - Generates an alert f or each application traf f ic flow. The alert is saved in the threat log.
•
•
•
•
Drop – Drops the application traf f ic.
Reset Client – For TCP, resets the client-side connection. For UDP, drops the connection.
Reset Server – For TCP, resets the client-side connection. For UDP, drops the connection.
Reset Both - For TCP, resets the client-side connection. For UDP, drops the connection.
Table 28 – Threat profiles
Profile Name
Threat-General
Severity
Action
Critical / High / Medium
Reset-both
Low / Informational
Default
©2019 Palo Alto Networks, Inc.
38
Proprietary and Confidential
WildFire Profiles
WildFire prof iles control which f ile types get submitted to the WildFire public cloud or WildFire private
security appliances when traf f ic matches a security policy with the prof ile attached. The def ault, out -of the-box WildFire prof ile submits any-and-all f ile types to the public cloud. This might be acceptable f or
some customers, but f or customers that must adhere to PCI, HIPAA, or other such industry regulations
you must conf igure WildFire prof iles that ignore f ile types that may contain f inancial transaction
inf ormation or personally identif iable inf ormation (PII), such as of f ice documents and PDF f iles, and apply
them to the appropriate security policies. Most customers will have specif ic networks conf igured f or
systems governed by these regulations. There should theref ore be security zones associated with traf f ic
associated with these network segments. Use zones as the primary guideline f or enabling and disabling
f ile types f rom being submitted to WildFire but ensure that you have this discussion with your customer
and put the onus on them f or identif ying any network segments outside the scope of easily identif ied
systems.
Table 29 - WildFire Profile Details
Profile Name
WildFire -All
Applications
any
File Types
Any
Direction
Both
Analysis
Public-cloud
File Blocking Profiles
File blocking prof iles block file transf ers f or configured f ile extensions on any security policies where they
are attached. Beware that some f ile extensions may seem like a good idea to block but can impact line of
business applications. A simple example is .exe f iles f or the website category “internet-communicationsand-telephony.” If you block .exe f iles in a blanket f ashion, you will prevent your users f rom being able to
use webex, zoom, and other remote conf erencing applications.
Table 30 - File Blocking Profile Details
Rule Name
Block-Risky
Applications
Any
©2019 Palo Alto Networks, Inc.
File Types
7z, bat, chm,
class, cpl, dll, hlp,
hta, jar, ocx, pif,
scr, torrent, vbe,
wsf
39
Direction
Both
Action
Block
Proprietary and Confidential
Data Filtering Profiles
Data f iltering prof iles are looking f or specific data patterns. When the pattern is identif ied by f irewall
policy, the f irewall will start generating alerts when alert threshold is hit and start blocking if it hits the
block threshold. Data f iltering prof iles require the conf iguration of data pattern objects. The f ollowing
tables contain the data patterns and the data f iltering prof iles.
Table 31 - Data Pattern Objects
Profile Name
CreditCards-SSN
Pattern Type
Predefined
Name
Credit Card
SSN
SSN(No Dashes)
File
Types
Any
Pattern
4444-4444-4444-4444
123-45-1234
123451234
AccountNumbers
Regex
AccountNums
Any
P\-[A-Z]{1,3}\-\d{8}
Table 32 - Data Filtering Profile Details
Rule Name
BlockRiskyData
Apps
Any
©2019 Palo Alto Networks, Inc.
File
Types
Any
Pattern(s)
CreditCards-SSN
AccountNumbers
40
Direction
Both
Alert
Threshold
Block
Threshold
3
5
Proprietary and Confidential
Denial of Service Protection Profiles
Denial of Service (DoS) protection prof iles are designed to protect resources f rom packet -based attacks
such as TCP Non Syn attacks, pings of death, UDP f loods, etc. They extend the capabilities of , and
should be more specif ic (strict) than, the Zone Protection prof iles conf igured on security zones. These
should typically be applied to servers that have known traf f ic metrics and a known baseline number of
sessions.
Table 33 - DoS Profile Details
DoS Profile
Name
SynFloodCookiesAggregate
Type
SYN
Flood
Aggregate
Yes
UDP Flood
Yes
ICMP
Flood
No
ICMPV6
Flood
Other
IP
Flood
Resource
Protection
(Sessions)
No
No
1000
Security Profile Groups
Security prof ile groups are designed to ease the conf iguration of many security policies by allowing the
f irewall administrator to group multiple security prof iles together in one “all-in-one” object that can be
associated with a security policy. DoS profiles are not included in prof ile groups.
Table 34 - Security Profile Group Details
Group
Name
Base
line
Antivirus
Anti-
Vulnerability
Spyware
Block-all
BlockCritHighMed
©2019 Palo Alto Networks, Inc.
BlockCritHighMed
File
Blocking
BlockRisky
41
Data
Filtering
WildFire
None
SubmitAll
URL
BlockBadURL
Proprietary and Confidential
User-ID
User identif ication is a cornerstone of ef f ective security policy. It is important to be able to identif y not only
what systems are conducting activity on the network , but the user perf orming the activity. Palo Alto
Networks next-generation f irewalls can gather User-ID inf ormation f rom various sources including LDAP
servers, Kerberos / SSO, RADIUS servers via Syslog Listeners, Terminal Server Agents, API calls, and
GlobalProtect.
User-ID Sources
Table 35 - User-ID Source Details
User-ID Source
LDAP
Kerberos
Splunk
Type
IP Address
Port
Configured Interface
UID Agent
192.168.10.45
5007
Def ault (MGMT)
SSO
192.168.10.45
88
Def ault (MGMT)
Syslog
Listener
192.168.10.77
514
Def ault (MGMT)
Group Mapping Profiles
Group mapping is necessary f or being able to enumerate users and link them to AD groups. When
creating group mapping prof iles f or Panorama Templates, it is necessary to specif y a Master Device to
serve as the f irewall f rom which User-ID inf ormation is gathered. This setting is a checkbox in each
conf igured template.
Table 36 - Group Mapping Profile Details
Server
Profile
Domain
Setting
LDAP
Sample.com
©2019 Palo Alto Networks, Inc.
Group
Object
class
group
User
Object
Class
person
User and Group
Attributes
sAMAccountName
mail
userPrincipalName
42
Group Include List
Sample\USUsers
sample\USAdmins
sample\GlobalAdmins
Proprietary and Confidential
URL Filtering Profiles
URL Filtering prof iles enable control over how users access the web over HTTP and HTTPS. The f irewall
comes with a def ault prof ile that is conf igured to block websites such as known malware sites, phishing
sites, and adult content sites. The def ault prof ile can be deployed in a security policy or be cloned to be
used as a starting point f or new URL Filtering prof ile. URL prof iles can be used in conjunction with
User-ID to block specific categories of sites for specific categories of users. URL prof iles that have all
categories set to allow can be used f or visibility into web-based traf f ic on the network. The newly added
URL prof iles can then be customized and added to lists of specific websites that should always be
blocked or allowed, which provides more granular control over URL categories.
Table 37 – URL Filtering Profiles
Category Name
Recommended
Action
Description
Abortion
Sites that pertain to inf ormation or
groups in f avor of or against abortion,
details regarding abortion procedures,
help or support f orums f or or against
abortion, or sites that provide
inf ormation regarding the
consequences/ef f ects of pursuing (or
not) an abortion.
Alert
Abused Drugs
Sites that promote the abuse of both
legal and illegal drugs, use and sale of
drug related paraphernalia,
manuf acturing and/or selling of drugs.
Block
Adult
Sexually explicit material, media
(including language), art, and/or
products, online groups or f orums that
are sexually explicit in nature. Sites that
promote adult services such as
video/telephone conf erencing, escort
services, strip clubs, etc.
Block
Alcohol and
Tobacco
Sites that pertain to the sale,
manuf acturing, or use of alcohol and/or
tobacco products and related
paraphernalia. Includes sites related to
electronic cigarettes.
Alert
Auctions
Sites that promote the sale of goods
between individuals.
Alert
Business and
Economy
Marketing, management, economics,
and sites relating to entrepreneurship or
running a business.
Alert
Override
Note:
Includes advertising and marketing
f irms. Should not include corporate
websites as they should be categorized
with their technology. Also shipping
sites, such as f edex.com and ups.com.
Command and
Control
URLs and domains used by malware
and/or compromised systems to
surreptitiously communicate with an
©2019 Palo Alto Networks, Inc.
43
Block
Proprietary and Confidential
attacker’s remote server to receive
malicious commands or exf iltrate data.
Computer and
Internet Info
General inf ormation regarding
computers and the internet.
Alert
Note:
Should include sites about computer
science, engineering, hardware,
sof tware, security, programming, etc.
Programming may have some overlap
with ref erence, but the main category
should remain computer and internet
inf o.
Content Delivery
Networks
Sites whose primary f ocus is delivering
content to 3rd parties such as
advertisements, media, f iles, etc.
Alert
Note:
Includes image servers.
Copyright
Infringement
Web pages and services that are
dedicated to illegally of f er videos,
movies or other media f or download
inf ringing copyrights of others.
Block
Note:
Should not include sites that provide
peer-to-peer f ile exchange services or
general streaming media.
Dating
Websites of fering online dating
services, advice, and other personal
ads
Alert
Dynamic DNS
Sites that provide and/or utilize dynamic
DNS services to associate domain
names to dynamic IP addresses.
Dynamic DNS is of ten used by
attackers f or command-and-control
communication and other malicious
purposes.
Block
Educational
Institutions
Of f icial websites f or schools, colleges,
universities, school districts, online
classes, and other academic
institutions.
Alert
Note: These ref er to larger, established
educational institutions such as
elementary schools, high schools,
universities, etc. Tutoring academies
can go here as well.
Entertainment
and Arts
Sites f or movies, television, radio,
videos, programming guides/tools,
comics, perf orming arts, museums, art
galleries, or libraries. Includes sites f or
©2019 Palo Alto Networks, Inc.
44
Alert
Proprietary and Confidential
entertainment, celebrity and industry
news.
Extremism
Websites promoting terrorism, racism,
f ascism or other extremist views
discriminating people or groups of
dif f erent ethnic backgrounds, religions
or other belief s.
Block
Financial
Services
Websites pertaining to personal
f inancial inf ormation or advice, such as
online banking, loans, mortgages, debt
management, credit card companies,
and insurance companies. Does not
include sites relating to stock markets,
brokerages or trading services.
Alert
Note: Includes sites f or f oreign currency
exchange.
Gambling
Lottery or gambling websites that
f acilitate the exchange of real and/or
virtual money. Related websites that
provide inf ormation, tutorials or advice
regarding gambling, including betting
odds and pools. Corporate websites f or
hotels and casinos that do not enable
gambling are categorized under Travel.
Alert
Games
Sites that provide online play or
download of video and/or computer
games, game reviews, tips, or cheats,
as well as instructional sites f or nonelectronic games, sale/trade of board
games, or related publications/media.
Includes sites that support or host
online sweepstakes and/or giveaways.
Alert
Government
Of f icial websites f or local, state, and
national governments, as well as
related agencies, services, or laws.
Alert
Hacking
Sites relating to the illegal or
questionable access to or the use of
communications equipment/sof tware.
Development and distribution of
programs, how-to-advice and/or tips
that may result in the compromise of
networks and systems. Also includes
sites that f acilitate the bypass of
licensing and digital rights systems.
Block
Health and
Medicine
Sites containing inf ormation regarding
general health inf ormation, issues, and
traditional and non-traditional tips,
remedies, and treatments. Also includes
sites f or various medical specialties,
practices and f acilities (such as gyms
and f itness clubs) as well as
prof essionals. Sites relating to medical
Alert
©2019 Palo Alto Networks, Inc.
45
Proprietary and Confidential
insurance and cosmetic surgery are
also included.
Home and
Garden
Inf ormation, products, and services
regarding home repair and
maintenance, architecture, design,
construction, décor, and gardening.
Alert
Hunting and
Fishing
Hunting and f ishing tips, instructions,
sale of related equipment and
paraphernalia.
Alert
Insufficient
Content
Websites and services that present test
pages, no content, provide API access
not intended f or end-user display or
require authentication without displaying
any other content suggesting a dif f erent
categorization.
Block
Note:
Should not include websites providing
remote access, such as web based
VPN solutions, web based email
services or identif ied credential phishing
pages.
Internet
Communications
and Telephony
Sites that support or provide services
f or video chatting, instant messaging, or
telephony capabilities.
Alert
Internet Portals
Sites that serve as a starting point f or
users, usually by aggregating a broad
set of content and topics.
Alert
Job Search
Sites that provide job listings and
employer reviews, interview advice and
tips, or related services f or both
employers and prospective candidates.
Alert
Legal
Inf ormation, analysis or advice
regarding the law, legal services, legal
f irms, or other legal related issues.
Alert
Malware
Sites containing malicious content,
executables, scripts, viruses, trojans,
and code.
Block
Military
Inf ormation or commentary regarding
military branches, recruitment, current
or past operations, or any related
paraphernalia.
Alert
Motor Vehicles
Inf ormation relating to reviews, sales
and trading, modif cations, parts, and
other related discussions f or
automobiles, motorcycles, boats, trucks
and RVs.
Alert
Music
Music sales, distribution, or inf ormation.
Includes websites f or music artists,
groups, labels, events, lyrics, and other
inf ormation regarding the music
Alert
©2019 Palo Alto Networks, Inc.
46
Proprietary and Confidential
business.
Note:
Does not include streaming music.
News
Online publications, newswire services,
and other websites that aggregate
current events, weather, or other
contemporary issues. Includes
newspapers, radio stations, magazines,
and podcasts.
Alert
Not-Resolved
Indicates that the website was not
found in the local URL filtering
database and the firewall was unable
to connect to the cloud database to
check the category. When a URL
category lookup is performed, the
firewall first checks the dataplane
cache for the URL, if no match is
found, it will then check the
management plane cache, and if no
match is found there, it queries the
URL database in the cloud. When
deciding on what action to take for
traffic that is categorized as notresolved, be aware that setting the
action to block may be very disruptive
to users.
Alert
Nudity
Sites that contain nude or seminude
depictions of the human body,
regardless of context or intent, such as
artwork. Includes nudist or naturist sites
containing images of participants.
Block
Online Storage
and Backup
Websites that provide online storage of
f iles f or f ree and as a service.
Alert
Parked
URLs which host limited content or
click-through ads which may generate
revenue f or the host entity but generally
do not contain content that is usef ul to
the end user.
Block
Peer-to-Peer
Sites that provide access to or clients
f or peer-to-peer sharing of torrents,
download programs, media f iles, or
other sof tware applications.
Block
Note:
Does not include shareware or f reeware
sites. This is primarily f or those sites
that provide bittorrent download
capabilities.
Personal Sites
and Blogs
Personal websites and blogs by
individuals or groups.
©2019 Palo Alto Networks, Inc.
47
Alert
Proprietary and Confidential
Note:
Should try to f irst categorize based on
content. For example, if someone has a
blog just about cars, then the site
should be categorized under "motor
vehicles". However, if the site is a pure
blog, then it should remain under
"personal sites and blogs".
Philosophy and
Political
Advocacy
Sites containing inf ormation, viewpoints
or campaigns regarding philosophical or
political views.
Alert
Phishing
Seemingly reputable sites that harvest
personal inf ormation f rom its users via
phishing or pharming.
Block
Private IP
Addresses
This category includes IP addresses
def ined in RFC 1918, 'Address
Allocation f or Private Intranets? which
are : 10.0.0.0 - 10.255.255.255 (10/8
pref ix) 172.16.0.0 - 172.31.255.255
(172.16/12 pref ix) 192.168.0.0 192.168.255.255 (192.168/16 pref ix)
169.254.0.0 - 169.254.255.255
(169.254/16 pref ix) It also includes
domains not registered with the public
DNS system (such a *.local)
Block
Proxy Avoidance
and
Anonymizers
Proxy servers and other methods that
bypass URL f iltering or monitoring.
Block
Questionable
Sites containing tasteless humor,
of f ensive content targeting specif ic
demographics of individuals or groups
of people, criminal activity, illegal
activity, and get rich quick sites.
Block
Real Estate
Inf ormation on property rentals, sales
and related tips or inf ormation. Includes
sites f or real estate agents, f irms, rental
services, listings (and aggregates), and
property improvement.
Alert
Recreation and
Hobbies
Inf ormation, f orums, associations,
groups, and publications on recreations
and hobbies.
Alert
Reference and
Research
Personal, prof essional, or academic
ref erence portals, materials, or services.
Includes online dictionaries, maps,
almanacs, census inf ormation, libraries,
genealogy and scientif ic inf ormation.
Alert
Religion
Inf ormation regarding various religions,
related activities or events. Includes
websites f or religious organizations,
of f icials and places of worship.
Alert
©2019 Palo Alto Networks, Inc.
48
Proprietary and Confidential
Search Engines
Sites that provide a search interf ace
using keywords, phrases, or other
parameters that may return inf ormation,
websites, images or f iles as results
Alert
Sex Education
Inf ormation on reproduction, sexual
development, saf e sex practices,
sexually transmitted diseases, birth
control, tips f or better sex, as well as
any related products or related
paraphernalia. Includes websites f or
related groups, f orums or
organizations.
Alert
Shareware and
Freeware
Sites that provide access to sof tware,
screensavers, icons, wallpapers,
utilities, ringtones, themes or widgets
f or f ree and/or donations. Also includes
open source projects.
Alert
Shopping
Sites that f acilitate the purchase of
goods and services. Includes online
merchants, websites f or department
stores, retail stores, catalogs, as well as
sites that aggregate and monitor
prices.
Alert
Note:
Sites listed here should be online
merchants that sell a variety of items (or
whose main purpose is online sales). A
webpage f or a cosmetics company that
also happens to allow online purchasing
should be categorized with cosmetics
and not shopping.
Social
Networking
User communities and sites where
users interact with each other, post
messages, pictures, or otherwise
communicate with groups of people.
Does not include blogs or personal
sites.
Alert
Society
Topics relating to the general
population, issues that impact a large
variety of people, such as f ashion,
beauty, philanthropic groups, societies,
or children. Also includes restaurant
websites.
Note:
Includes websites designed f or children
as well as restaurants.
Alert
Sports
Inf ormation about sporting events,
athletes, coaches, of f icials, teams or
organizations, sports scores, schedules
and related news, and any related
paraphernalia. Includes websites
Alert
©2019 Palo Alto Networks, Inc.
49
Proprietary and Confidential
regarding f antasy sports and other
virtual sports leagues.
Stock Advice
and Tools
Inf ormation regarding the stock market,
trading of stocks or options, portfolio
management, investment strategies,
quotes, or related news.
Alert
Streaming
Media
Sites that stream audio or video content
f or f ree and/or purchase.
Note:
Includes online radio stations and other
streaming music services.
Alert
Swimsuits and
Intimate Apparel
Sites that include inf ormation or images
concerning swimsuits, intimate apparel
or other suggestive clothing.
Alert
Training and
Tools
Sites that provide online education and
training and related materials.
Note:
Can include driving/traf f ic schools,
workplace training, etc.
Alert
Translation
Sites that provide translation services,
including both user input and URL
translations. These sites can also allow
users to circumvent f iltering as the
target page's content is presented
within the context of the translator's
URL.
Alert
Travel
Inf ormation regarding travel tips, deals,
pricing inf ormation, destination
inf ormation, tourism, and related
services. Includes websites f or hotels,
local attractions, casinos, airlines,
cruise lines, travel agencies, vehicle
rentals and sites that provide booking
tools such as price monitors.
Note:
Includes websites f or local points of
interest/tourist attractions such as the
Eif f el Tower, the Grand Canyon, etc.
Alert
Unknown
The website has not yet been
categorized, so it does not exist in the
URL filtering database on the firewall
or in the URL cloud database. When
deciding on what action to take for
traffic categorized as unknown, be
aware that setting the action to block
may be very disruptive to users
because there could be a lot of valid
sites that are not in the URL database
yet. If you do want a very strict policy,
you could block this category, so
Alert
©2019 Palo Alto Networks, Inc.
50
Proprietary and Confidential
websites that do not exist in the URL
database cannot be accessed.
Weapons
Sales, reviews, descriptions of or
instructions regarding weapons and
their use.
Alert
Web
Advertisements
Advertisements, media, content, and
banners.
Alert
Free or paid f or hosting services f or
web pages, including inf ormation
regarding web development,
publication, promotion, and other
methods to increase traf f ic.
Alert
Any website that provides access to an
email inbox and the ability to send and
receive emails.
Alert
Web Hosting
Web-based
Email
©2019 Palo Alto Networks, Inc.
51
Proprietary and Confidential
Reporting, Alerting, and Configuration Backup
The f ollowing section centers around documenting the conf igured Report and Alerting settings.
Report and Alert Settings
Document the Report and Alert settings in this section. These are located at Panorama > Log Settings.
Lots of inf ormation here, so you may want to export it in text f ormat using the CLI command:
show panorama log-settings
Figure 1 - Log Settings
Configuration Backup Settings
Document the Scheduled Conf ig Export settings in the f ollowing table.
Table 38 - Scheduled Config Export Settings
Name
IS-LinuxBox
Description
Linux box used f or backing up conf ig text files
Enabled?
Yes
Scheduled Start Time
03:15
Protocol
SCP
Hostname
Isbox.sampleinc.com
Port
22
Path
/home/backupuser/paloalto/
Username
Backupuser
Password
Always store in a password manager
©2019 Palo Alto Networks, Inc.
52
Proprietary and Confidential
SNMP Settings
Document SNMP settings here.
Table 39 - SNMP Settings
Configured Interface
Aux1
Configured IP
192.168.10.1
SNMPv2 Settings
Table 40 - SNMPv2 Settings
Physical
Location
Denver
Contact
Version
ITAdmin@sampleinc.com
V2
Community String
C0MMun1TyStr1NG
SNMPv3 Settings
For assistance on setting up SNMPv3 ref er to the f ollowing document:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClG6CAK
Table 41 - Views
Name
TestView
View
OID
Option
panSysHwVersion
1.3.6.1.4.1.25461.2.1.2.1.2
Include
Mask
0x80
Table 42 - Users
Users
Viewer
View
TestView
©2019 Palo Alto Networks, Inc.
Auth
Password
********
Priv Password
********
53
Proprietary and Confidential
Cloud Services / Integration Pieces
This section is devoted to the documentation of the conf igured Cloud Services and Plugin Integrations f or
Panorama.
Include details such as version of plugin, configured region, subscription model etc.
Cloud Logging Service
The cloud logging service is a subscription-based service of f ered by Palo Alto Networks that provides a
remote storage target f or Panorama to f orward its logs. Notable details here are region, plugin version,
storage quantity, and retention.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
GlobalProtect Cloud Service
If GlobalProtect cloud service is conf igured, document the details here.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
Application Framework
If any custom applications are conf igured in the Palo Alto Networks Application Framework, document
their details here.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
Traps
Document Traps details here. Notab le details are version, Traps server, quantity of endpoint licenses,
allowed application list, and any other details which are Traps oriented.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
Azure
Enter any Azure specif ic details here such as region, account, devices, ACLs, etc.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
AWS
Enter any AWS specif ic details here such as region, account, devices, ACLs, etc.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
NSX Plugin
Enter any NSX specif ic details here such as plugin version, vCenter servers hosting NSX plugin, etc.
< Enter details in an organized format. Could be a table, a bullet list, or a form. >
©2019 Palo Alto Networks, Inc.
54
Proprietary and Confidential
Document Properties
This document is prepared f or the sole use by [CUSTOMER].
Contributors
Enter complete information for all people with their role, could include customer resources:
Role types: Author/Contributor/Reviewer
Title example: Professional Services Consultant
Name
Role
Tom Addair
Pro-Serv
Title
Sr. Prof essional Service
Consultant
Contact Information
taddair@paloaltonetworks.com
Revision History
Enter complete information for all revisions and be concise on comments:
Status types: Draft/In Review/Complete
Comments example: Initial draft/Added to Management and Routing sections/Draft complete – in
review
Date
dd MON yyyy
Revision
<x.y>
©2019 Palo Alto Networks, Inc.
Changes By
<your name>
Status
<status>
55
Comments
<comments on version/changes>
Proprietary and Confidential
Palo Alto Networks Resources
Palo Alto Networks has a team of resources committed to making the [CUSTOMER] deployment
successf ul. The f ollowing individuals are assigned to work on the [CUSTOMER] deployment.
Describe each member of the Palo Alto Networks team, their role, and contact information.
Professional Services Architect:
Engineer Name
engineer@paloaltonetworks.com
Professional Services PM
Project Manager Name
pm@paloaltonetworks.com
Customer Resources
Describe each member of the customer team, their role, and contact information.
Customer Role Title 1:
Customer Name
customer@company.com
Customer Role Title 2
Customer Name
customer@company.com
©2019 Palo Alto Networks, Inc.
56
Proprietary and Confidential
Download