Palo Alto Networks - Edu 210 Lab 1: Initial Configuration: Document Version
Palo Alto Networks - Edu 210 Lab 1: Initial Configuration: Document Version
NETLAB Academy Edition, NETLAB Professional Edition, and NETLAB+ are registered trademarks of Network Development Group,
Inc.
VMware is a registered trademark of VMware, Inc. Cisco, IOS, Cisco IOS, Networking Academy, CCNA, and CCNP are registered
trademarks of Cisco Systems, Inc. EMC2 is a registered trademark of EMC Corporation.
Lab 1: Initial Configuration
Contents
Introduction ........................................................................................................................ 3
Objectives............................................................................................................................ 3
Lab Topology ....................................................................................................................... 4
Lab Settings ......................................................................................................................... 5
1 Lab: Initial Configuration............................................................................................. 6
1.0 Connect to Your Student Firewall ........................................................................ 6
1.1 Apply a Baseline Configuration to the Firewall .................................................... 6
1.2 Add an Admin Role Profile ................................................................................... 8
1.3 Add an Administrator Account........................................................................... 10
1.4 Test the policy-admin User ................................................................................ 11
1.5 Take a Commit Lock and Test the Lock .............................................................. 13
1.6 Verify the Update and DNS Servers ................................................................... 17
1.7 Schedule Dynamic Updates................................................................................ 18
Introduction
The long-awaited moment has arrived. Your new Palo Alto Networks Firewall appliance
has arrived, and the networking team has put it in the racks and wired it up. It is now
your job as the Security Engineer to configure and test the firewall.
You have decided that the first thing you would like to do is create a new admin account
that can only work with certain features of the firewall. To setup these restrictions you
are going to have to create and administrator role and then assign it to the new admin
account you create.
You also want to test the ability to prevent others from making or committing changes
to the firewall while you are working. You have learned that this can be done with
commit locks.
Finally, you need to make sure the firewall is updating with new signatures and updates
on a regular basis, so you are going to configure the dynamic updates to do this for you.
Objectives
• Load a configuration.
• Create an administrator role.
• Create a new administrator and apply an administrator role.
• Observe the newly created role permissions via the CLI and WebUI.
• Create and test a commit lock.
• Configure DNS servers for the firewall.
• Schedule dynamic updates.
Lab Topology
Lab Settings
The information in the table below will be needed in order to complete the lab. The
task sections below provide details on the use of this information.
Parameter Value
Name admin
Password admin
1. In the Palo Alto Networks firewall WebUI, select Device > Setup > Operations.
2. Click Load named configuration snapshot:
3. Click the drop-down list next to the Name text box and select edu-210-lab-01.
4. Click OK.
5. After some time, a confirmation that the configuration has been loaded appears.
Click Close.
The following instructions are the steps to execute a “Commit All” as you will perform
many times throughout these labs.
2. Click Add in the lower-left corner of the panel to create a new administrator
role:
5. Under the Web UI tab, click the icon to disable the following:
Parameter Value
Monitor
Network
Device
Privacy
6. Click the XML API tab and verify that all items are disabled.
7. Click the Command Line tab and verify that the selection is none then click OK to
continue.
2. Click Add in the lower-left corner of the panel to open the Administrator
configuration window.
Parameter Value
Name policy-admin
Authentication Profile None
Password paloalto
Administrator Type
Profile policy-admins-profile
Password Profile None
4. Click OK.
5. Commit all changes.
2. Double-click firewall-management:
Parameter Value
Name admin
Password admin
The role assigned to this account is allowed CLI access, so the connection should
succeed.
Parameter Value
Name policy-admin
Password paloalto
Click through the Certificate Warning. The Palo Alto Networks firewall login page
opens.
8. Log in using the following information (this action must be done in a different
browser):
Parameter Value
Name policy-admin
Password paloalto
1. From the WebUI where you are logged in as policy-admin, click the transaction
lock icon to the right of the Commit link.
3. Set the Type to Commit, and click OK. The policy-admin lock is listed in the Locks
window.
Parameter Value
Name test-lock
Authentication Profile None
Password paloalto
Administrator Type
Profile policy-admins-profile
Password Profile None
12. Commit all changes. Although you could add a new administrator account, you
are not allowed to commit the changes because of the Commit lock set by the
policy-admin user:
Click Close.
Note: The user that took the lock or any superuser can remove a lock.
The DNS server configuration settings are used for all DNS queries that the firewall
initiates in support of FQDN address objects, logging, and firewall management.
3. Verify that 4.2.2.2 is the Primary DNS Server and that 8.8.8.8 is the Secondary
DNS Server.
4. Verify that updates.paloaltonetworks.com is the Update Server.
5. Click OK.
Palo Alto Networks regularly posts updates for application detection, threat protection,
and GlobalProtect data files through dynamic updates.
Parameter Value
Recurrence Daily
Time 01:02
Action download-and-install
4. Locate and click the hyperlink on the far right of Application and Threats. The
scheduling window opens. Application and Threat signatures are released
weekly.
Parameter Value
Recurrence Weekly
Day wednesday
Time 01:05
Action download-and-install
Click OK.
6. Locate and click the hyperlink on the far right of WildFire. The scheduling
window opens. WildFire signatures can be available within five minutes.
Parameter Value
Recurrence Every Minute
Action download-and-install
8. Click OK.
9. Commit all changes.