Use Interface Management Profiles to Restrict Access
An Interface Management profile protects the firewall from unauthorized access by defining the protocols, services, and IP addresses that a firewall interface permits for management traffic. For example, you might want to prevent users from accessing the firewall web interface over the ethernet1/1 interface but allow that interface to receive SNMP queries from your network monitoring system. In this case, you would enable SNMP and disable HTTP/HTTPS in an Interface Management profile and assign the profile to ethernet1/1.
You can assign an Interface Management profile to Layer 3 Ethernet interfaces (including subinterfaces) and to logical interfaces (aggregate group, VLAN, loopback, and tunnel interfaces). If you do not assign an Interface Management profile to an interface, it denies access for all IP addresses, protocols, and services by default.
The management (MGT) interface does not require an Interface Management profile. You restrict protocols, services, and IP addresses for the MGT interface when you Perform Initial Configuration of the firewall. In case the MGT interface goes down, allowing management access over another interface enables you to continue managing the firewall. However, as a best practice, use additional methods besides Interface Management profiles to prevent unauthorized access over that interface. These methods include role-based access control and access restrictions based on VLANs, virtual routers, or virtual systems.
- Configure the Interface Management profile.
- Selectand clickNetworkNetwork ProfilesInterface MgmtAdd.
- Select the protocols that the interface permits for management traffic:Ping,Telnet,SSH,HTTP,HTTP OCSP,HTTPS, orSNMP.
- Select the services that the interface permits for management traffic:
- Response Pages—Use to enable response pages for:
- (Optional)Addthe Permitted IP Addresses that can access the interface. If you don’t add entries to the list, the interface has no IP address restrictions.
- Assign the Interface Management profile to an interface.
- Select, select the type of interface (NetworkInterfacesEthernet,VLAN,Loopback, orTunnel), and select the interface.
- Selectand select the InterfaceAdvancedOther infoManagement Profileyou just added.
Network > Network Profiles > Interface Mgmt
Network > Network Profiles > Interface Mgmt An Interface Management profile protects the firewall from unauthorized access by defining the services and IP addresses that ...
Device > User Identification > Captive Portal Settings
Device > User Identification > Captive Portal Settings In the Device > User Identification > Captive Portal Settings page, Edit ( ) the following settings ...
Configure Captive Portal
Configure Captive Portal The following procedure shows how to configure Captive Portal using the PAN-OS integrated User-ID agent to redirect web requests that match a ...
Device > Setup > Management
Device > Setup > Management Device > Setup > Management Panorama > Setup > Management On a firewall, select Device > Setup > Management to ...
Network > GlobalProtect > Portals
Network > GlobalProtect > Portals Select Network > GlobalProtect > Portals to set up and manage a GlobalProtect™ portal. The portal provides the management functions ...
Replace the Certificate for Inbound Management Traffic
Replace the Certificate for Inbound Management Traffic When you first boot up the firewall or Panorama, it automatically generates a default certificate that enables HTTPS ...
Use Case: Secure the EC2 Instances in the AWS Cloud
Use Case: Secure the EC2 Instances in the AWS Cloud In this example, the VPC is deployed in the 10.0.0.0/16 network with two /24 subnets: ...
Set Up Network Access for External Services
Set Up Network Access for External Services By default, the firewall uses the MGT interface to access remote services, such as DNS servers, content updates, ...
Configure an OCSP Responder
Configure an OCSP Responder To use Online Certificate Status Protocol (OCSP) for verifying the revocation status of certificates, you must configure the firewall to access ...