: Tag Based Policies
Focus
Focus

Tag Based Policies

Table of Contents

Tag Based Policies

You can automatically update the Security Policy on your Palo Alto Networks® Cloud NGFW resources so that you can secure traffic to these AWS assets as you deploy or terminate AWS assets (such as EC2 instances) in the AWS public cloud.
To enable this capability from Panorama, you must configure the Panorama AWS plugin to fetch IP/Tags that your Cloud NGFW tenant harvests from the AWS accounts you added. Then use the AWS Panorama plugin to push these tags to the Cloud NGFW resources by configuring the monitoring definition and Notify them to the corresponding Device Groups corresponding to these Palo Alto Networks firewalls.
You can then create a Panorama Dynamic Address Group objects in those Device Groups using AWS resource tags. When you reference these tags in Dynamic Address Groups and match against them in Security policy rules, you can consistently enforce policy across all assets deployed within your AWS accounts.
Prerequisites
To enable tag based policies for Cloud NGFW for AWS resources, the following are the minimum system requirements:
Key Concepts
Term
Definition
Cloud Asset Tags
AWS tags configured on AWS resources.
VPC Group
A set of AWS VPCs from one or more AWS accounts.
Monitoring Definition
Associates a VPC Group with a notify group.
Notify Group
You can group together a set of Panorama Device Groups that require the same set of tags.
To enable tag-based policies for Cloud NGFW for AWS resources, you must prepare your Panorama appliance for this integration by installing the AWS plugin 5.1.0 version or above. Using the Cloud NGFW console, add your AWS accounts and harvest tags from the AWS resources. Then use the Panorama plugin to query tags periodically from your Cloud NGFW tenant and add it to the Panorama device groups to manage DAG objects and rules.
To enable Cloud NGFW tag-based policies in your Panorama appliance:

Add AWS Accounts to Cloud NGFW Tenant and Harvest Tags from them

Onboard your AWS account on to your Cloud NGFW tenant. For more information, see Step 10 in Cloud NGFW PAYG SaaS Subscription.
If you have already onboarded your AWS account on cloud NGFW tenant, you can directly get started with tag harvesting.
The existing CloudFormation template (CFT) of your onboarded AWS account must have Network MonitoringRole Arn role added to it. The Network Monitoring role provides visibility to the network performance connecting AWS hosted applications. For more information, see Manually add a CloudFormation template.

Enable Monitoring

In the Cloud NGFW console, you can enable the discovery of AWS resource tags for the desired regions. Cloud NGFW will periodically collect these tags of your AWS resources (For example: EC2, SG, and LB) in different AWS accounts and register the information to your Cloud NGFW tenant. Cloud NGFW displays the resource tags on resources organized by the VPCs in each AWS account.
For this purpose, you must enable monitoring in the Inventory Page to access data for each AWS region, to trigger the tags discovery.
The Enable Region button under the Discovered VPCs tab appears only when you onboard your AWS account for the first time. Select Region from the drop-down and click Enable Region to enable tag monitoring.
Alternatively, you can also select a Region from the drop-down and click Enable toggle to enable tags monitoring.

View the Harvested Tags in the Cloud NGFW console

You can see the total number of discovered tags in the Inventory page under the Discovered Tags tab.
Click the Tag Name to list the IPs associated with each tag.
Click Check Associated Tags to list the different tags associated with the IP address.
In the NGFW console, the tag character limit is 127 for any AWS resource type (key or value combined). The tags having key/value greater than 127are not added to the DiscoveredTags list. For more information, see Tag Restrictions.
If you do not have the Inventory Admin Permission, you cannot Set VPC group or Create New VPC group.

Use the Panorama Plugin to Query Tags and Add them to the Panorama Device Groups

Use the Panorama AWS plugin to perform the following:
  1. Create and manage VPC Groups.
  2. Add tags to Device Groups using monitoring definitions and notify groups.
Install and configure the AWS Plugin 5.1.0 plugin on Panorama to query AWS asset tags collected in the Cloud NGFW tenants and add them to the Cloud Device Groups.

Create and Manage VPC Groups

When you enable monitoring, a Default VPC Group is created automatically. You cannot delete the Default VPC group. A newly discovered VPC is always put into the Default VPC group. If you want, you can then move it into a different VPC group.
The scope of a VPC group created in a region is applicable for that region only. For example, VPC group A created in Region X is not accessible in Region Y.
Alternatively, you can create new VPC groups and move these VPCs to other VPC groups using the steps below:
If you wish to create a new non-Default VPC group on Panorama, follow the steps covered in the procedure below:
  1. In the Panorama Console, go to the Panorama tab, and then click AWS.
  2. Select Tenant and Region.
  3. Go to AWS > Cloud NGFW > Monitoring Definition > VPC Group > Add.
  4. Enter VPC Group Name and Description.
  5. Click OK.
  6. Go to AWS > Cloud NGFW > Monitoring Definition > Discovered VPC.
    • You cannot map a VPC Group to more than 8 Device Groups. Configure monitoring definitions with VPC Groups such that a given VPC Group has only 8 Device Groups mapped (via Notify Groups) for better performance.
    • The Default VPC Group is created automatically. You cannot delete the Default VPC group. A newly discovered VPC is always put into the Default VPC group. If required, VPCs can be moved under a different VPC group.
  7. Click Set VPC Group.
  8. Select VPC Group.
  9. Click Save.

Add tags to Device Groups using Monitoring Definitions and Device Groups

To push tags learned from Cloud NGFW tenant to the Cloud NGFW resources, ensure that you configure the Notify Groups and Monitoring definitions to the corresponding Device Groups corresponding to these Palo Alto Networks firewalls. You can then view the AWS account tags harvested from Cloud NGFW tenant in Panorama.
Create a Notify Group for your cloud device group following the steps below:
  1. In the Panorama plugin Console, go to AWS > Notify Group.
  2. Click Add.
  3. Enter Name.
  4. Select the Device Group and Tags.
  5. Click Ok.
Create a cloud monitoring definition associating the required VPC group and Notify group for tags learned from Cloud NGFW.
  1. In the Panorama Console, go to AWS > Cloud NGFW > Monitoring Definition.
  2. Click Add.
  3. Enter your Name and Description.
  4. Select the required VPC Group from the VPC Group drop-down menu.
  5. Select the required notify group from the Notify Group drop-down menu.
  6. Click OK.
  7. Commit and Push your changes on Panorama.
  8. Select a Monitoring Definition and Click Dashboard to view the tags harvested from Cloud NGFW tenant.
    You can now view the tags harvested in Cloud NGFW tenant.

Configure Dynamic Address Group (DAG) objects with Tags in Device Groups

You can create Dynamic Address Groups with harvested Cloud NGFW tags for your cloud device group. For more information, see Create Dynamic Address Groups.
Following are the steps to add match criteria for your dynamic address groups:
  1. In the Panorama Console, go to Objects tab
  2. On the left pane, go to Address Groups.
  3. Click Add.
  4. Enter the Name of your Address Group and select Type Dynamic.
  5. Click Add match Criteria.
You can now create dynamic address group policies referencing above created DAGs for cloud device groups.
You can add tags from different regions on your DAG object. To use tags from different regions, you must create a cloud device group of the same name in other regions. Also, you must create a monitoring definition in other regions mapping the Notify Group to VPC Group of that region. For more information, see Cross-Region Tag Based Policies.
The following is an example of how DAGs are created using AND operator:
The Address Group displays the list of addresses that match with both matching criteria.
The following is an example of how DAGs are created using OR operator:
The Address Group displays the list of addresses that match with any one of the given matching criteria.
Following are the steps to create Dynamic Address policies referencing DAGs for cloud device groups:
  1. In the Panorama Console, go to the Policies tab.
  2. Go to Security > Pre/Post/Default Rules.
  3. Click Add.
  4. In the Security Policy Rule dialog box, enter a Name for the security policy rule.
  5. In the Source tab, select the DAG for the Source Address field and click Add.
  6. In the Destination tab, select the DAG for the Destination Address field and click Add.
  7. Click OK.
  8. Commit and Push your changes to the Cloud NGFW device group.
For more information on Commit and Push the configuration changes to the firewalls, see Preview, Validate, or Commit Configuration Changes.
Return to the Cloud NGFW console to verify an XML file containing dynamic address policies pushed from Panorama to the respective cloud device group. Click
View XML to display information on newly added dynamic address policies to the cloud device group.
Add a new subnet to the client account. For more information, see Create Subnet on AWS console.

Cross-Region Tag Based Policies

You can populate tags from two different regions to your cloud device groups.
For example:
Region X and Region Y are your desired regions to enable the discovery of AWS resource tags. If CNGFW resource is present in region X that needs to learn the tags from Region Y, and then use it for the cloud DG in region X, perform the following steps:
  1. Add AWS Accounts to Cloud NGFW Tenant and Harvest Tags from them.
  2. Use the Panorama Plugin to Query Tags and Add them to the Panorama Device Groups.
  3. Configure Dynamic Address Group (DAG) objects with Tags in Device Groups.
    You will be able to see only the Region X tags available for configuring your DAG objects.
  4. In Region Y, create the cloud device group of the same name as in Region X. Commit and Push your changes on Panorama. If required, create a VPC group and assign appropriate VPCs or use the default VPC group in Region Y.
  5. Create a monitoring Definition in Region Y, and then select the VPC group and Notify Group (where the Cloud DG is already mapped).
  6. Configure Dynamic Address Group (DAG) objects with Tags in Device Groups.
    You can now see that both Region X and Region Y tags are available for configuring your DAG objects.
  7. Commit the configuration in Panorama.
In the Cloud Device Group, you can now see the tags from Region Y to configure, and you can create a dynamic address group.