Set Up Network Access for External Services
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
Set Up Network Access for External Services
Learn how to set up an in-band data interface instead
of the MGT interface to enable your firewall to access remote services,
such as DNS servers, content updates, and license retrieval.
By default, the firewall uses the MGT interface
to access remote services, such as DNS servers, content updates,
and license retrieval. If you do not want to enable external network
access to your management network, you must set up an in-band data
port to provide access to required external services and set up
service routes to instruct the firewall what port to use to access
the external services.
Do not enable
management access from the internet or from other untrusted zones
inside your enterprise security boundary. Follow the Adminstrative Access Best Practices to
ensure that you are properly securing your firewall.
This
task requires familiarity with firewall interfaces, zones, and policies.
For more information on these topics, see Configure
Interfaces and Zones and Set
Up a Basic Security Policy.
- Decide which interface you want to use for access to external services and connect it to your switch or router port.The interface you use must have a static IP address.
- Log in to the web interface.Using a secure connection (https) from your web browser, log in using the new IP address and password you assigned during initial configuration (https://<IP address>). You will see a certificate warning; that is okay. Continue to the web page.
- (Optional) The firewall comes preconfigured with a default virtual wire interface between ports Ethernet 1/1 and Ethernet 1/2 (and a corresponding default security policy and zones). If you do not plan to use this virtual wire configuration, you must manually delete the configuration to prevent it from interfering with other interface settings you define.You must delete the configuration in the following order:
- To delete the default security policy, select, select the rule, and clickPoliciesSecurityDelete.
- To delete the default virtual wire, select, select the virtual wire and clickNetworkVirtual WiresDelete.
- To delete the default trust and untrust zones, select, select each zone and clickNetworkZonesDelete.
- To delete the interface configurations, selectand then select each interface (ethernet1/1 and ethernet1/2) and clickNetworkInterfacesDelete.
- Committhe changes.
- Configure the interface you plan to use for external access to management services.
- Selectand select the interface that corresponds to the interface you cabled in Step 1.NetworkInterfaces
- Select theInterface Type. Although your choice here depends on your network topology, this example shows the steps forLayer3.
- On theConfigtab, expand theSecurity Zonedrop-down and selectNew Zone.
- In the Zone dialog, enter aNamefor new zone, for example Management, and then clickOK.
- Select theIPv4tab, select theStaticradio button, and clickAddin the IP section, and enter the IP address and network mask to assign to the interface, for example 192.168.1.254/24. You must use a static IP address on this interface.
- Select, expand theAdvancedOther InfoManagement Profiledrop-down, and selectNew Management Profile.
- Enter aNamefor the profile, such as allow_ping, and then select the services you want to allow on the interface. For the purposes of allowing access to the external services, you probably only need to enablePingand then clickOK.These services provide management access to the firewall, so only select the services that correspond to the management activities you want to allow on this interface. For example, don’t enable HTTP or Telnet because those protocols transmit in plaintext and therefore aren’t secure. Or if you plan to use the MGT interface for firewall configuration tasks through the web interface or CLI, you don’t enable HTTP, HTTPS, SSH, or Telnet so that you prevent unauthorized access through the interface (if you must allow HTTPS or SSH in this scenario, limit access to a specific set ofPermitted IP Addresses). For details, see Use Interface Management Profiles to Restrict Access.
- To save the interface configuration, clickOK.
- Configure the Service Routes.By default, the firewall uses the MGT interface to access the external services it requires. To change the interface the firewall uses to send requests to external services, you must edit the service routes.This example shows how to set up global service routes. For information on setting up network access to external services on a virtual system basis rather than a global basis, see Customize Service Routes to Services for Virtual Systems.
- Selectand clickDeviceSetupServicesGlobalService Route Configuration.For the purposes of activating your licenses and getting the most recent content and software updates, you will want to change the service route forDNS,Palo Alto Networks Services,URL Updates, andAutoFocus.
- Click theCustomizeradio button, and select one of the following:
- For a predefined service, selectIPv4orIPv6and click the link for the service. To limit the drop-down list for Source Address, selectSource Interfaceand select the interface you just configured. Then select a Source Address (from that interface) as the service route.If more than one IP address is configured for the selected interface, theSource Addressdrop-down allows you to select an IP address.
- To create a service route for a custom destination, selectDestination, and clickAdd. Enter aDestinationIP address. An incoming packet with a destination address that matches this address will use as its source the Source Address you specify for this service route. To limit the drop-down for Source Address, select aSource Interface. If more than one IP address is configured for the selected interface, theSource Addressdrop-down allows you to select an IP address.
- ClickOKto save the settings.
- Commityour changes.
- Configure an external-facing interface and an associated zone and then create a security policy rule to allow the firewall to send service requests from the internal zone to the external zone.
- Selectand then select the external-facing interface. SelectNetworkInterfacesLayer3as theInterface Type,AddtheIPaddress (on theIPv4orIPv6tab), and create the associatedSecurity Zone(on theConfigtab), such as Internet. This interface must have a static IP address; you do not need to set up management services on this interface.
- To set up a security rule that allows traffic from your internal network to the Palo Alto Networks update server, selectand clickPoliciesSecurityAdd.
As a best practice when creating Security policy rules, use application-based rules instead of port-based rules to ensure that you are accurately identifying the underlying application regardless of the port, protocol, evasive tactics, or encryption in use. Always leave theServiceset toapplication-default. In this case, create a security policy rule that allows access to the update server (and other Palo Alto Networks services). - Create a NAT policy rule.
- If you are using a private IP address on the internal-facing interface, you will need to create a source NAT rule to translate the address to a publicly routable address. Selectand then clickPoliciesNATAdd. At a minimum you must define a name for the rule (Generaltab), specify a source and destination zone, Management to Internet in this case (Original Packettab), and define the source address translation settings (Translated Packettab) and then clickOK.
- Commityour changes.
- Selectand verify that you have connectivity from the data port to the external services, including the default gateway, using theDeviceTroubleshootingPingconnectivity test, and the Palo Alto Networks Update Server using theUpdate Server Connectivitytest. In this example, the firewall connectivity to the Palo Alto Networks Update Server is tested.After you verify you have the required network connectivity, continue to Register the Firewall and Activate Subscription Licenses.
- SelectUpdate Serverfrom the Select Test drop-down.
- Executethe Palo Alto Networks Update Server connectivity test.
- Access the firewall CLI, and use the following command to retrieve information on the support entitlement for the firewall from the Palo Alto Networks update server:request support checkIf you have connectivity, the update server will respond with the support status for your firewall. Because your firewall is not registered, the update server will return the following message:Contact Us https://www.paloaltonetworks.com/company/contact-us.html Support Home https://www.paloaltonetworks.com/support/tabs/overview.html Device not found on this update server