User Tools

Site Tools


paloaltonetworks:architecture

This is an old revision of the document!


Palo Deployment Architecture

Configuration strategy:

Zones:

  • Untrust (for Internet links).
  • VPN (possibly use but only for third party - not VPN to other internal sites).
  • Trust (all interfaces that don't fit the others).
  • Guest (for guest networks that break out locally to the Internet and do not access any other site and are not accessible from any other site).

Tags:

  • global-block
  • inbound
  • global-allow (e.g. ping).
  • rest-of-rules, use “Group by” tag. Within a group, use normal 'tag' to describe destination.
  • For guest, explicily allow allowed traffic then block all from guest zone.
  • For each “zone” that isn't a zone (e.g. mgmt, printers, wifi, servers, dmz) create an address group that contains all the subnets.).

Two zone protection profiles - one for external interfaces and one for all others.

Create address group of firewall interface IP addresses to make a simple rule that allows the firewal interfaces to ping/traceroute/icmp anywhere.

Enable interface management profile with ping, ssh, https, user-id and snmp on loopback or firewall's interface to mgmt network. Use this for SNMP polling, User-ID redistribution (and use service route to use this to get User-ID from other firewalls) and managing the 'active' firewall. Enable ping, https, ssh and snmp on actually managment interfaces. Use this for backup access/troubleshooting. Consider doing RADIUS/LDAP/TACACS queries from loopback via service route. Would have to use a local account to get access to passive.

paloaltonetworks/architecture.1623669469.txt.gz · Last modified: (external edit)