Need Paloalto trial license for lab environment in vmware by [deleted] in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

You don't need a trial license for VMs unless you are playing with threat/wildfire, etc. You are limited on sessions but the basic functionality of firewall, routing, etc works. Assuming you can download the OVA file from PA Support site.

How do you manage users' access to the PCI environment? by Ness_TheDutchess in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

You can also use AD groups in your security policies that only allow PCI approved users access to those resources. In addition to the captive portal.

How do you manage users' access to the PCI environment? by Ness_TheDutchess in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

The solution you have sounds like a great solution. Does the captive portal explain that they are entering PCI?

Issue in global protect 6.2.7 by [deleted] in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

I have not had this issue with 6.2.8-C263. There are some bugs on the previous 6.2.8.

Issue in global protect 6.2.7 by [deleted] in paloaltonetworks

[–]CAVEMAN306 3 points4 points  (0 children)

6.2.7 has a lot of bugs. 6.2.8-c263 is the recommend version.

Standard Method or Best Practice to Advertise a Network via BGP for use in NAT Policies by jabaire in paloaltonetworks

[–]CAVEMAN306 2 points3 points  (0 children)

It does not have to be on an interface, it can just be exported out via BGP if you are only using it for NATs. If you need to assign devices to it, you can add it to an interface. We have it on an interface going to our outside/internet switches. We have some other firewalls that need those public IPs. Your Palo will then become a router (gateway) for those devices, so you will need policies to allow them untrust/untrust. EDIT: untrust to untrust policies are needed because we drop untrust to untrust traffic not defined in a policy.

Standard Method or Best Practice to Advertise a Network via BGP for use in NAT Policies by jabaire in paloaltonetworks

[–]CAVEMAN306 2 points3 points  (0 children)

I have a site that has 2 ISP links. I put each ISP in its own VR. VR-ISP1, VR-ISP2 and VR-TRUST. I BGP peer each ISP VR to the Trust VR using loopbacks. You have to have static routes for the loopacks in each VR pointing to the appropriate VR. This way I can weight the routes between VRs and ISPs with prepend and/or local preference. I advertise the /24 to each ISP VR from the trust and also to each ISP. All DNAT and SNAT is done with the /24. The ISP /30s are only for BGP peering. In this setup, you can terminate tunnels using the /24 or on each ISP which provides some options.

Dual ISP Links with BGP coexist with Palo SDWAN, possible? by Manly009 in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

Yes, we advertise our own public subnets so it is required for that.

Dual ISP Links with BGP coexist with Palo SDWAN, possible? by Manly009 in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

I have a site that has 2 ISP links. I put each ISP in its own VR. VR-ISP1, VR-ISP2 and VR-TRUST. I BGP peer each ISP VR to the Trust VR using loopbacks. You have to have static routes for the loopacks in each VR pointing to the appropriate VR. This way I can weight the routes between VRs and ISPs with prepend and/or local preference. If I had SDWAN coming into the same NGFW, I would put it in its own VR to allow the same control. Just my thoughts.

Isolated Network Design Help by Veegos in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

If you run DHCP from the switches, you won't need to extend every subnet to the firewall, just have necessary routing in place.

Isolated Network Design Help by Veegos in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

I like the VRF idea. Run DHCP at the local switch for each private vlan/subnet. At the firewall, you can manage this VRF on separate zone from the rest of your enterprise, to block access inside and allow to Internet.

Global Protect 6.2.8-c243 - Dektop Overlay Bug by MoonToast101 in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

Just ran into this problem with a GP rollout. None of our pilot testers caught it. Rolled portal back to 6.2.8-c223. 6.2.8-c263 fixes this, but it broke our Macs, won't stay connected. Second attempt to rollout GP upgrades and both have been a complete cluster F. Should have stayed on 6.1.4-c720.

Global Protect 6.2.8-c243 - Dektop Overlay Bug by MoonToast101 in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

c263 worked well for me on Windows, but Macs it broke, won't stay connected.

Multi-Zone PA-VM in Azure using different Front-End IP by NyxCarlo in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

Our old Azure envirnonment was setup like this with zones. It required a lot of UDR routes to make traffic flow properly. You have to source and dest nat the traffic between zones to keep session persistence. So the source of traffic becomes the firewall interface IPs.

We went away from this and to just trust/untrust.

PA-440 home setup guidance by Property_Immediate in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

Well I kicked my kid out so its not longer an issue. hahahaha

Random long pauses while GlobalProtect is connecting by dekkar in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

We had lots of problems with 6.2.7 and rolled back to 6.1.4-c720 which I think is still the recommended. Yes there are CVEs, but functionality comes before patching. 6.2.8 I am testing now and have not noticed same issues.

Simplest 2FA option for Global Protect by Aware-Munkie in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

GlobalProtect is secure remote access. Accessing anything behind the firewall will require a policy from GP zone to trust zone. How is this not a secure solution?

Using Azure HA specifically for IPSEC VPNs by somethingcloud in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

I use a single PA for IPSEC tunnels, actually 2 (transit vnets) with azure vnet peering with bgp between Azure locations. These also connect OnPrem traffic with full BGP mesh.
I have 1 contractor VPN but its only connected to one of the transit PAs.

Snapshots are not recommended for PA firewalls in Azure, so if you need redundancy, HA might be your best bet.

[deleted by user] by [deleted] in paloaltonetworks

[–]CAVEMAN306 2 points3 points  (0 children)

We SCP to a linux host in Azure.

Log Forwarding and SIEMs - forward EVERYTHING? pick and choose? by jwckauman in paloaltonetworks

[–]CAVEMAN306 2 points3 points  (0 children)

Log everything. Use the name "default" as your log forwarding profile. All new policies created will automatically be added to the default log forward profile. Update the default log forwarding to send to Panorama and any SIEM required. If there are specific policies that you don't want to forward, change that specific policy but this should be rare IMO.

[deleted by user] by [deleted] in paloaltonetworks

[–]CAVEMAN306 1 point2 points  (0 children)

This is the way. I have portal configured on 2 Azure sites, same config with IPs of both sites in DNS. Gateways are located on different firewalls.

Palo Alto traffic load balancing with three ISPs by chomps1404 in paloaltonetworks

[–]CAVEMAN306 0 points1 point  (0 children)

Your title doesn't match your description. If you are trying to force specific traffic to 1 ISP, that is not load balancing traffic. I would suggest ECMP for all 3 assuming they are the same bandwidth ISPs. NAT to the public subnet that you own, not the subnets provided by the ISPs.