5 Interface Configuration
5 Interface Configuration
CONFIGURATION
• Security zones and interfaces
• Tap interfaces
• Virtual wire interfaces
• Layer 2 interfaces
• Layer 3 interfaces
• Virtual routers
• VLAN interfaces
EDU-210 Version A
PAN-OS® 9.0 • Loopback interfaces
• Policy-based forwarding
Agenda
After you complete this module,
you should be able to:
Yes
Forward
INSPECTION Yes No ENFORCEMENT Traffic
Decrypt
Content-ID Policy? Security Profiles
Yes (Re-encrypt if decrypted)
Application, user, and content App-ID, Content-ID, User-ID, and All the Virtual Wire mode
visibility without inline deployment SSL decryption capabilities with the addition of
Evaluation and audit of existing Includes NAT capability Layer 3 services: virtual routers,
networks VPN, and routing protocols
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Policy-based forwarding
5 | © 2019 Palo Alto Networks, Inc.
Security Zones and Security Policy Rules
• A zone is a logical grouping of traffic on the network.
• Traffic within a zone is allowed by default.
• Traffic between zones is denied by default.
Internet
DMZ
Guest
Users
Data Center
ethernet 1/1
ethernet 2/1
ethernet 1/1 ethernet 1/1.1
ethernet 1/2 ethernet 1/1.2
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Internet
LAN
E1/1 SPAN or
Mirror Port
Select Tap
interface type.
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Link state is
forwarded.
Select a Virtual
Wire type security
zone.
Subinterface
ID
802.1Q VLAN
tag
Add optional
IP classifiers.
Select Virtual
Wire object.
Select Virtual
Wire zone.
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
STP forwarding
STP STP
20 | © 2019 Palo Alto Networks, Inc.
Layer 2 Subinterfaces
VLAN 1 VLAN 2
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Policy-based forwarding
22 | © 2019 Palo Alto Networks, Inc.
Layer 3 Interfaces
• Enable routing between multiple interfaces:
• Requires a virtual router
Layer 3 Layer 3
interface Virtual interface
IP address Router IP address
Traffic inspection
and control
Select Layer3.
Select a virtual
router.
Select a Layer 3
type security
zone.
Select to specify a
static or DHCP
assigned IP address.
Enter the static IP
address(es) with CIDR
notation.
192.168.2.2 192.168.4.1
VLAN 2 VLAN 3
HR Zone DC Zone
29 | © 2019 Palo Alto Networks, Inc.
Configuring a Layer 3 Subinterface
Network > Interfaces > Ethernet
802.1Q
VLAN tag
Subinterface ID
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Interfaces that
the virtual
router can use
to forward
traffic
All
known
routes Status of
Where traffic monitored
(RIB) will be paths
forwarded
(FIB)
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Policy-based forwarding
38 | © 2019 Palo Alto Networks, Inc.
VLAN Interfaces
Subnet 1
VLAN IP Subnet 2
VR
object address
Layer 2
VLAN Other
interface subnets
Firewall Layer 3
Read-only name
An interface ID
(not VLAN tag)
Connects interface
to Layer 2 network
Connects interface
to Layer 3
networks
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Policy-based forwarding
41 | © 2019 Palo Alto Networks, Inc.
Loopback Interface
• Logical interface with an IP address
• Behaves like a host interface
• Used to provide access to firewall services
Firewall
L3 L3
IP address
Loopback
interface
Read-only
name Loopback
interface ID
Tap interfaces
Layer 2 interfaces
Layer 3 interfaces
Virtual routers
VLAN interfaces
Loopback interfaces
Policy-based forwarding
44 | © 2019 Palo Alto Networks, Inc.
Policy-Based Forwarding
• Specifies a different egress interface than what is specified in the route table
• Possible use for performance or security reasons
Q
Q &&
AA
49 | © 2019 Palo Alto Networks, Inc.
Interface Configuration Lab (Pages 24-42 in the Lab Guide)
• Load a firewall lab configuration file
• Configure security zones
• Configure firewall Ethernet interfaces
• Configure a virtual router