This section describes the steps required to configure the VM interface on the WF-500 appliance using the Option 1 configuration detailed in the Virtual Machine Interface Example. After configuring the VM interface using this option, you must also configure an interface on a Palo Alto Networks firewall through which traffic from the VM interface is routed as described in Connect the Firewall to the WF-500 Appliance VM Interface.
By default, the VM interface has the following settings:
IP Address: 192.168.2.1 Netmask: 255.255.255.0 Default Gateway: 192.168.2.254 DNS: 192.168.2.254
If you plan on enabling this interface, configure it with the appropriate settings for your network. If you do not plan on using this interface, leave the default settings. Note that this interface must have network values configured or a commit failure will occur.
Configure the VM Interface
Set the IP information for the VM interface on the WF-500 appliance. The following settings are used in this example: IPv4 address - 10.16.0.20/22 Subnet Mask - 255.255.252.0 Default Gateway - 10.16.0.1 DNS Server - 10.0.0.246 The VM interface cannot be on the same network as the management interface (MGT). Enter configuration mode: admin@WF-500> configure Set the IP information for the VM interface: admin@WF-500# set deviceconfig system vm-interface ip-address 10.16.0.20 netmask 255.255.252.0 default-gateway 10.16.0.1 dns-server 10.0.0.246 You can only configure one DNS server on the VM interface. As a best practice, use the DNS server from your ISP or an open DNS service.
Enable the VM interface. Enable the VM interface: admin@WF-500# set deviceconfig setting wildfire vm-network-enable yes Commit the configuration: admin@WF-500# commit
Test connectivity of the VM interface. Ping a system and specify the VM interface as the source. For example, if the VM interface IP address is 10.16.0.20, run the following command where ip-or-hostname is the IP or hostname of a server/network that has ping enabled: admin@WF-500> ping source 10.16.0.20 host ip-or-hostname For example: admin@WF-500> ping source 10.16.0.20 host 10.16.0.1
(Optional) Send any malicious traffic that the malware generates to the Internet. The Tor network masks your public facing IP address, so the owners of the malicious site cannot determine the source of the traffic. Enable the Tor network: admin@WF-500# set deviceconfig setting wildfire vm-network-use-tor Commit the configuration: admin@WF-500# commit
Connect the Firewall to the WF-500 Appliance VM Interface.

Related Documentation