Paloalto Lab Part 1 2019
Paloalto Lab Part 1 2019
Paloalto Lab Part 1 2019
Version 8.0
Part-1
1
1) Instructions
2) Basic Lab setup
3) Management Interface configuration through CLI
4) GUI login & Dashboard view Details
5) View Default services enabled on Management Interface via GUI
6) Enable HTTP service on Management Interface through CLI
7) Role based access (Admin Profiles & Admin Accounts)
8) Running Config & Candidate config
9) Commit Lock and Test the Lock
10)Host name & Time setting configuration
11) Banner & Message of the day configuration
12) DNS configuration
13) Dynamic Update
14) License Management
15)Device Operations
16) Backup & Restore
3
1. Instructions
GUI ACCESS INSTRUCTION
Invalid
4
2. Basic lab Setup
DEVICES
1. PALO ALTO (2 DEVICES)
2. ADMIN PC
3. LAN PC
4. DMZ SERVER
4
LAN PC VLAN 11 / VMNET 11 LAN 10.11.11.5/24
3. Management Interface configuration through CLI
4
Exiting configuration
admin@PA-VM> show interface management
admin@PA-VM> show System info
5
4. GUI login & Dashboard view Details
• Use browser https://103.0.0.254
6
View of Dashboard after login
7
View more information's on Dashboard
8
View active admin session through CLI
8
5. View Default services enabled on Management Interface via GUI
8
6. Enable http service on Management Interface through CLI
admin@PA-VM> configure
admin@PA-VM# set deviceconfig system service disable-http no
admin@PA-VM# commit
Show Commands
10
8. Running Config & Candidate config
When we make any changes to the when Commit tab at the top right corner of
configuration of an existing parameters like Web UI of the Palo Alto Firewall is clicked the
Security Policy, zone, Virtual router etc. in the Candidate Configuration is applied to the
Palo Alto firewall and click OK , the Candidate running configuration of the Palo Alto firewall.
Configuration is either created or updated. And the applied configuration is called running
This type of configuration is known as configuration.
Candidate Configuration.
13
Change Host-Name & time-zone on the Firewall to check difference between candidate config &
Running Config
13
7. Role based access (Admin Profiles & Admin Accounts)
a. Create Admin Role Profile with name of Firewall Administrator with following Parameters
10
a. Create Admin Role Profile
11
a) Create User (user1) with password (Ab12345) & apply Admin role profile
b) Commit to changes
c) Test by logging to user1
12
9. Commit Lock and Test the Lock
13
4. Click Close & logout on the bottom-left corner of the WebUI:
5. Return to the WebUI where you are logged in as a admin
6. Notice the lock icon Click on the icon to check locked users.
7. Now try to commit the changes it will give you an information “Other administrators are
holding device wide commit locks”.
13
10. Host name & Time setting configuration
13
11. Banner & Message of the day configuration
15
12. DNS Configuration
The DNS server configuration settings are used for all DNS queries that the firewall initiates in
support of FQDN address abjects, logging & firewall managenent,.
a) CLI
admin@PALO_ALTO> configure
admin@PALO_ALTO# set deviceconfig system dns-setting servers primary 4.2.2.2 secondary
8.8.8.8
16
DNS configuration through GUI
• Verify that 4.2.2.2 is the primary DNS Server & 8.8.8.8 is the secondary DNS Server
• Verify that updates.paloaltonetworks.com is the Update Server
16
13. DYNAMIC UPDATES
18
SOFTWARE UPDATES
19
14. License Management
Note: Internet connectivity is mandatory for licensing.
16
LICENSING
17
15. Device Operations
20
16. Backup & Restore
20
Backup has been saved locally on the Palo Alto now we need to Export on our PC.
20
Now you can see Backup file exported/Downloaded to your PC
20
Condition: After exporting Backup we did few changes on the firewall which went wrong & we
need to bring firewall to the Backup taken state.
Step 1: Import backup file
20
Step 2: Now load it back to Firewall
20
QUIZ
21
QUIZ
22
QUIZ
23
QUIZ
24
END OF MODULE THANK YOU !
25