PaloAlto - Lab - Part 3 Basics
PaloAlto - Lab - Part 3 Basics
Version 8.0
Part-3
1
Agenda
1. Add Static route from WAN interface to any Destination
2. DNS reachability verification
3. Create object for 10.11.11.0/24
4. Create Tags
5. Create a Source Nat Policy (Dynamic NAT & PAT)
6. Create Inter-zone Policy Between LAN & WAN zone(Allow 10.11.11.0/24 to access internet)
7. 6. Internet connectivity verification From TEST_PC
8. Translation Verification
9. Monitoring Session Browser
10. Task Deny 10.11.11.6/32 to access internet
11. Task Deny PING at LAN interface only for 10.11.11.6/32
12. Verification for triggered Security Policy rule
13. Create FTP Service
14. Create Security Policy to access FTP server from LAN zone
15. Create a Destination NAT Policy
16. Create a Security Policy Rule
17. Test the connectivity
2
1. Add Static route from WAN interface to any Destination
Note: Before adding route always check reachability to Gateway
admin@PA-VM> ping source 192.168.3.125 host 192.168.3.254
3
Commit the changes
3
2. DNS reachability verification
Note: DNS reachability should be from Firewall, in order to get internet
connectivity in LAN zone.
3
3. Create object for 10.11.11.0/24
3
4. Create Tags
Tags can be used to sort or filter objects, & visually distinguish object because they have color.
When a color is applied to a tag, the Policies tab displays the object with a background color.
Name color
LAN Yellow
WAN Red
DMZ Orange
3
Create Tags based on above parameters
3
5. Translation
NAT CONFIG
Traffic from LAN to WAN for internet access best practice is to use Dynamic Nat & Pat in real
time
3
5. Create a Source Nat Policy
• Source Nat is Used to hide Identity of Source
• Configure Traffic from LAN to WAN for internet access, using Dynamic Nat & Pat
3
Continued remaining configuration
3
Continued remaining configuration
3
Commit the changes
3
4. Create Inter-zone Security Policy Rule Between LAN & WAN zone
I. Allow 10.11.11.0/24 to access internet
Note:
• By default only Intra-zone traffics are allowed
• By default all the traffics between Inter-zone are Denied.
• Policies are checked from top to bottom
• Deny/ block policies are recommended at top
3
As instructed above Security Policy configuration between LAN & WAN inter-zone
3
3
Finally it should be seen as below
3
6. Internet connectivity verification From TEST_PC
Note: Prerequisite before verification on TEST_PC
• IP address, Gateway & DNS address should be properly configured
• Test the Connectivity to Gateway.
3
7. Translation Verification
3
8. Monitoring Session Browser
3
Task Deny 10.11.11.6/32 to access internet
3
Task Deny PING at LAN interface only for 10.11.11.6/32
• Except 10.11.11.6/32 all internal hosts should be able to ping LAN interface
• Create INTRA-ZONE policy for LAN
• Deny PING for 10.11.11.6/24
3
Verification for triggered Security Policy rule
Ping from host 10.11.11.6 to 192.168.3.254
3
Create FTP server
When you define Security policy rules for specific applications, you can select one or more
services that limit the port numbers that the applications can use.
3
Create Security Policy to access FTP server from LAN zone
3
Create a Destination NAT Policy
• You are configuring destination NAT in the lab to get familiar with how destination NAT
works.
• Destination Nat is used to hide Identity of Destination
• Scenario is user BOB from Internet wants to access FTP server in DMZ.
• DMZ server is in private IP range we need to translate it to Public IP so that user BOB with
public IP can access DMZ server with translated IP address
3
Steps for Destination NAT
I. Create Address object of Translated IP (192.168.3.124)
II. Create Address object for DMZ_FTP_Server 172.16.10.50/32
III. Create D-NAT rule
IV. Create Security-Policy for WAN TO DMZ
V. Test the connection from BOB x.x.x.x/32
3
III. Create D-NAT rule
• Here Source & Translated IP both belongs to WAN zone, so WAN zone is used twice in D-NAT
3
IV. Create Security-Policy for WAN TO DMZ
3
Test the connection from BOB x.x.x.x/32
3
Check Translation on Firewall
3
FLOW LOGIC
4
NAT FLOW
15
17
IPV6 SUPPORT
24
IPV6 CONFIG
25
END OF MODULE THANK YOU !
29