User Tools

Site Tools


paloaltonetworks:new_setup

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
paloaltonetworks:new_setup [2021/02/21 11:42] bstaffordpaloaltonetworks:new_setup [2025/10/29 10:54] (current) – [New Setup] bstafford
Line 1: Line 1:
 ====== New Setup ====== ====== New Setup ======
-Things to remember when setting gup a new firewall.+Things to remember when setting up a new firewall. 
 + 
 +===== Set MGMT to DHCP ===== 
 +<code>configure 
 +set deviceconfig system type dhcp-client send-hostname no accept-dhcp-hostname no send-client-id no accept-dhcp-domain no</code>
  
 ===== Proxy URL ===== ===== Proxy URL =====
Line 10: Line 14:
 ===== Management SSL ===== ===== Management SSL =====
 Secure SSL on the management interface by disabling old ciphers. Secure SSL on the management interface by disabling old ciphers.
 +
 **Use ECDSA Certificates**. If going self signed, you will need to create a CA and then create the MGMT cert from that. This will prevent some RSA ciphers being used and helps in Nessus audits. **Use ECDSA Certificates**. If going self signed, you will need to create a CA and then create the MGMT cert from that. This will prevent some RSA ciphers being used and helps in Nessus audits.
 <code>set shared ssl-tls-service-profile SERVICE_PROFILE_NAME protocol-settings auth-algo-sha1 no enc-algo-3des no enc-algo-rc4 no enc-algo-aes-128-cbc no enc-algo-aes-128-gcm no enc-algo-aes-256-cbc no keyxchg-algo-rsa no</code> <code>set shared ssl-tls-service-profile SERVICE_PROFILE_NAME protocol-settings auth-algo-sha1 no enc-algo-3des no enc-algo-rc4 no enc-algo-aes-128-cbc no enc-algo-aes-128-gcm no enc-algo-aes-256-cbc no keyxchg-algo-rsa no</code>
paloaltonetworks/new_setup.1613907720.txt.gz · Last modified: (external edit)