Module Overview+Management options
+Management port
+CLI
+Web Interface
+Local
+Centralized
+Panorama
+Panorama is recommended for networks with 6+ firewalls
+Reduces complexity and administration overhead
+Aggregates data from all managed devices
Management Options
+Special interface designed for administration
+Part of the Control Plane
+Preconfigured with 192.168.1.1/24 for HTTPS
+admin//admin
+Data ports also support management functions
+Management Profiles
+Service Routes
Management Port
+Required to provide access to external services through data ports
+Device > Setup > Services > Service Route Configuration > Customize
Service Routes
+Palo Alto firewalls use two CLI modes
+Operational
+Basic networking/system commands & verification
+E.g. ping, traceroute, show, debug
+Configuration
+Accessible via configure
+CLI Enhancements
+Use findto figure out the command syntax
+Use "?" to get help on command options and parameters
+Use the "Tab" key for command auto-completion
+Use the "|" symbol along with matchor exceptfor output filtering
Firewall CLI
+Running Configuration
+Current configuration enforced in the Data Plane
+Controls the firewall's behavior
+Saved to running-config.xml
+Candidate Configuration
+Temporary configuration stored in the memory in the Control Plane
+Saved as either default snapshot.xml or as a custom XML file
+Saving candidate configuration does not activate the changes
+Requires a commit
+Turns candidate configuration into running configuration
Configuration Files
+Firewall configurations are managed using several options
+Revert to Last Saved Configuration
+Replaces current candidate configuration settings with a saved
candidate configuration file
+Revert to Running Configuration
+Replaces current candidate configuration settings with the current
running configuration
+Load
+Overwrites the current candidate configuration with a config file
+Export
+Exports a Current/Running Configuration file as an XML (backups)
+Import, Save
Configuration Files
+Keep the system up-to-date with latest threats, applications & more
+AntiVirus
+Including WildFiresignatures
+Applications, Applications and Threats
+GlobalProtectData File
+Host Information Profile (HIP) data
+GlobalProtectClientless VPN
+Enables clientless VPN access to common web applications from the
GlobalProtectportal
+PAN-DB URL Filtering
Dynamic Updates
+Used for scheduled PAN-OS code updates
+Require a system reboot
+Software can be downloaded manually or over the Management interface
Software Updates
+Defines the type of access that an administrator has to the firewall
+Dynamic
+Based on pre-built profiles
+E.g. Superuser, Superuser (read-only), Device administrator
+Role Based
+Custom access for granular control
+Configuration
+Device -> Administrators
+Device -> Admin Roles
Admin Roles
+PAN-OS supports several types of interfaces and can operate in
multiple deployments
+Tap, Virtual Wire, Layer 2, Layer 3
+Tap
+Works on a copy of network traffic
+Port mirroring (SPAN)
+Deployed for logging & visibility
Data Interfaces
+Virtual Wire
+For inline deployments
+Traffic control, decryption, QoS, etc.
+A logical connection of two ports
+No L2/L3 addresses
+No management capabilities
+Easy to integrate
+Allows for subinterfaces
+Virtual Wire interfaces must be attached to a Virtual Wire Object
+Default Virtual Wire ports may need to be removed
Data Interfaces
+Layer 2
+Used for L2 switching
+Inline
+Require a VLAN Object
+Support subinterfaces
+Layer3
+Used for L3 routing (IPv4, IPv6)
+Inline
+Require a Virtual Router
+Support subinterfaces& management
Data Interfaces
+Loopback
+Virtual L3 ports internal to the firewall
+Used in many scenarios
+Routing, DNS Sinkholes & more
+Tunnel
+Virtual interface used for VPN representation
Other Interfaces
+A group of interfaces representing a segment controlled by the firewall
+LAN1, Internet, etc.
+A firewall interface can belong to only one zone
+Interface Type & Zone Type must match
+Zone-unassigned interface does not process traffic
+Zones affects the data traffic
+Intra-zone
+Inter-zone
Security Zone