EDU-210-8.1-Lab Guide PDF
EDU-210-8.1-Lab Guide PDF
Lab Guide
PAN-OS® 8.1
EDU-210
Courseware Version A
Bolding Names of selectable items in Click Security to open the Security Rule
the web interface Page
Consolas font Text that you enter and Enter the following command:
coding examples a:\setup
The show arp all command yields this
output:
username@hostname> show arp
<output>
Click Click the left mouse button Click Administrators under the Device
tab
Right-click Click the right mouse button Right-click the number of a rule you want
to copy, and select Clone Rule
< > (text enclosed Parameter in the Lab Settings Click Add again and select <Internal
in angle brackets) Handout Interface>
5. Click the drop-down list next to the Name text box and select edu-210-lab-01.
6. Click OK. After some time, a confirmation that the configuration is being loaded
appears.
7. Click Close.
9. Click the Commit link at the top right of the web interface. Click Commit and wait until
the commit process is complete. Click Close to continue.
14. Click the XML API tab and verify that all items are disabled.
15. Click the Command Line tab and verify that the selection is None.
Profile policy-admins-role
Password Profile None
The role assigned to this account is allowed CLI access, so the connection should succeed.
25. Close the PuTTY window and then open PuTTY again.
26. Double-click firewall-management.
The PuTTY window closes because the Admin Role assigned to this account denies CLI
access.
28. Open a different browser (not a tab) in private/incognito mode and browse to
https://192.168.1.254. A Certificate Warning might appear.
29. Click through any Certificate Warning. The Palo Alto Networks firewall login page
opens.
30. Log in using the following information (this action must be done in a different browser):
Parameter Value
Name policy-admin
Password paloalto
34. Click Take Lock in the lower-left corner of the panel. A Take lock window opens.
35. Set the Type to Commit, and click OK. The policy-admin lock is listed in the Locks
window.
36. Click Close to close the Locks window.
37. Click the Logout button on the lower-left corner of the web interface:
Parameter Value
Name test-lock
Authentication Profile None
Password paloalto
Administrator Type
Profile policy-admins-role
Password Profile None
Note: The user that took the lock or any superuser can remove a lock.
51. Select the test-lock user and then click to delete the test-lock user.
52. Click Yes to confirm the deletion.
53. all changes.
56. Verify that 4.2.2.2 is the Primary DNS Server and that 8.8.8.8 is the Secondary DNS
Server.
57. Verify that updates.paloaltonetworks.com is the Update Server.
58. Click OK.
Lab Objectives
▪ Create Security zones two different ways and observe the time saved.
▪ Create Interface Management Profiles to allow ping and responses pages.
▪ Configure Ethernet interfaces to observe DHCP client options and static configuration.
▪ Create a virtual router and attach configured Ethernet interfaces.
▪ Test connectivity with automatic default route configuration and static configuration.
9. Click OK to close the Zone configuration window. The outside zone is the only zone
created in this task. You will add an Ethernet interface to this zone in a later lab step.
20. Click the Security Zone drop-down list and select New Zone:
30. Click the Security Zone drop-down list and select New Zone. The Zone configuration
window opens.
31. Configure the following:
Parameter Value
Name dmz
Type Verify that the type is set to Layer3
44. Click the Security Zone drop-down list and select New Zone. The Zone configuration
window opens.
45. Configure the following:
Parameter Value
Name danger
Type Verify that the type is set to Virtual Wire
46. Click OK twice to close the Zone and Ethernet Interface configuration windows.
47. Click ethernet1/5 to open the interface.
48. Configure the following:
Parameter Value
Comment vWire zone named danger
Interface Type Virtual Wire
Virtual Wire None
Note: This step also can be completed via each Ethernet Interface configuration
window.
57. Click OK.
58. all changes.
Parameter Value
Name default-route
Destination 0.0.0.0/0
Interface ethernet1/1
Next Hop IP Address
81. Click OK to add the static route and then click OK again to close the Virtual Router –
lab-vr configuration window.
82. all changes.
83. Make the PuTTY window that was used to ping 8.8.8.8 the active window.
84. Type the command ping source 203.0.113.20 host 8.8.8.8.
You should be able to successfully ping 8.8.8.8:
Lab Objectives
▪ Create tags for later use with Security policy rules.
▪ Create a basic source NAT rule to allow outbound access and an associated Security
policy rule to allow the traffic.
▪ Create a destination NAT rule for the FTP server and an associated Security policy rule
to allow the traffic.
22. Click the Original Packet tab and configure the following:
Parameter Value
Source Zone inside
Destination Zone outside
Destination Interface ethernet1/1
23. Click the Translated Packet tab and configure the following:
Parameter Value
Translation Type Dynamic IP And Port
Address Type Interface Address
Interface ethernet1/1
IP Address Select 203.0.113.20/24 (Make sure to select the interface IP
address, do not type it.)
31. Click the Service/URL Category tab and verify that is selected.
32. Click the Actions tab and verify the following:
Parameter Value
Action Setting Allow
Log Setting Log at Session End
45. Click the Translated Packet tab and configure the following:
Parameter Value
Destination Address Static IP
Translation Type
Translated Address 192.168.50.10 (address of DMZ server)
54. Click the Service/URL Category tab and configure the following:
Parameter Value
Service service-ftp
55. Click the Actions tab and verify that Allow is selected.
56. Locate the Schedule drop-down list and select New Schedule:
By default, Security policy rules always are in effect (all dates and times). To limit a
Security policy to specific times, you can define schedules and then apply them to the
appropriate policy rules.
57. Configure the following:
Parameter Value
Name internal-dmz-ftp
Recurrence Daily
Start Time 5 minutes from the time noted in Step 48 (firewall time)
End time 2 hours from the current firewall time.
192.168.1.1 is the inside interface address on the firewall. The firewall is not hosting the
FTP server. The fact that you were prompted for a username indicates that FTP was
allowed through the firewall using the destination NAT.
64. Verify that you can view the directory listing, and then close the Chrome browser
window:
65. In the web interface select Monitor > Logs > Traffic.
66. Find the entries where the application ftp has been allowed by rule internal-dmz-ftp.
Notice the Destination address and rule matching:
Lab Objectives
▪ Create an application-aware Security policy rule.
▪ Enable interzone logging.
▪ Enable the Application Blocked page for blocked applications.
▪ Test application blocking with different applications
▪ Find the categories that match to the signature web-browsing
▪ Migrate older port-based rules to application-aware policies.
▪ Review logs associated with the traffic and browse the Application Command Center
(ACC).
12. Click to open the cloned Security policy rule named egress-outside-1.
13. Configure the following:
Parameter Value
Name egress-outside-app-id
19. With the interzone-default policy rule selected but not opened, click . The
Security Policy Rule – predefined window opens.
20. Click the Actions tab.
21. Select Log at Session End.
22. Click OK.
Based on the information from your log, Shutterfly and avoidr are denied by the
interzone-default Security policy rule.
Note: If the logging function of your interzone-default rule is not enabled, no information
would be provided via the Traffic log.
Selecting application-default does not change the service behavior because, in the
application database, FTP is allowed only on port 21 by default.
51. Click OK.
52. all changes.
53. Open a new Chrome browser window in incognito and browse to ftp://192.168.1.1.
54. At the prompt for login information, enter the following (credentials may be cached from
a previous login):
Parameter Value
User Name lab-user
Password paloalto
56. Note that the upper-right corner of the ACC displays the total risk level for all traffic that
has passed through the firewall thus far:
57. On the Network Activity tab, the Application Usage pane shows application traffic
generated so far (because log aggregation is required, 15 minutes might pass before the
ACC displays all applications):
Notice that the Application Usage pane updates to present only google-base information.
Once the Traffic Log is selected, you automatically are linked to the applicable log
information with the filter set for the google-base application:
Lab Objectives
▪ Configure and test an Antivirus Security Profile.
▪ Configure and test an Anti-Spyware Security Profile.
▪ Configure and test the DNS Sinkhole feature with an External Dynamic List.
▪ Configure and test a Vulnerability Security Profile.
▪ Configure and test a File Blocking Security Profile.
▪ Use the Virtual Wire mode and configure the danger zone.
▪ Generate threats and observe the actions taken.
24. Click the Download link on the left of the web page:
25. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using standard HTTP and not SSL-enabled
HTTPS. The firewall will not be able to detect the viruses in an HTTPS connection until
decryption is configured.
30. Notice the icon on the left side of the entry for the Eicar Test File indicating that
there is a packet capture (pcap):
To view the packet capture through the Detailed Log View, first click the Detailed Log
view icon to open the Detailed Log View of the threat entry:
Captured packets can be exported in pcap format and examined with an offline analyzer
for further investigation.
31. After viewing the pcap, click Close.
59. Click .
60. all changes.
66. Confirm that the firewall reports that the “Source URL is accessible” and click Close. If
the firewall reports a “URL access error,” check the source address, correct any errors,
and rerun the test.
67. Click OK to close the External Dynamic Lists configuration window.
79. At the nslookup command prompt, type reddit.com. and press the Enter key:
Notice that the reply for reddit.com is 72.5.65.111. The request has been sinkholed.
80. Type exit and press the Enter key to exit nslookup. Then type exit and press the
Enter key again to exit the command-prompt window.
81. On the desktop, open a browser and go to http://reddit.com and wait for the
connection to timeout.
Notice that the Application type is “Incomplete” and the Session End Reason is “aged-
out.” These results occur because the sinkhole address does not reply to the connection
attempt made by the browser to reach reddit.com. The browser attempts to connect to the
sinkhole address because the firewall is blocking the original DNS request. The firewall
then returns a firewall-generated DNS reply that tells the browser that reddit.com is
located at the sinkhole address.
87. To find the original DNS request in the Traffic log, use the following filter statement
(addr.dst in 8.8.8.8) and (session_end_reason eq threat).
89. In the Detailed Log View notice the additional information that matches what you saw in
the Threat log. Next, scroll down and review the information in the Details section in the
middle column of the main display area. Notice that the traffic log records only one
packet. This packet is the original DNS query sent from the client. The DNS response
packet with the sinkhole address is sent directly from the firewall itself.
Severity
102. Double-click .
103. After the script completes, press a key to close the command-prompt window.
106. Open the Detailed Log View by clicking on the icon. From the Detailed Log
View, click the icon to open the packet capture.
107. Notice the username and password that were attempted along with the 530 response
from the FTP server.
113. Rerun and review the logs to confirm that the new FTP brute force
attempts are reset.
128. In the web interface select Objects > Security Profiles > File Blocking.
Note: The file type pe is a group that includes .exe, .cpl, .dll, .ocx, .sys, .scr, .drv, .efi,
.fon, and .pif file types.
133. Click OK to close the File Blocking Profile configuration window.
Note: If you get “failed to download pdf” and not the block page, then refresh the
browser window.
141. Close the browser window.
142. Select Monitor > Logs > Data Filtering.
143. Find the log entry for the PDF file that has been blocked:
144. In the web interface select Objects > Security Profiles > File Blocking.
145. Click to open the lab-file-blocking File Blocking Profile.
The file is blocked in accordance with the new file blocking rule.
154. Close the browser window.
Notice that the width of all the columns was adjusted to fit the text in the columns.
170. all changes.
Note: The Threat log entries that you see in your lab may not match exactly the image
above. Threat signatures, names, categorizations, and verdicts may change over time to
ensure that the firewall will consistently detect the packet captures. Two custom
Vulnerability signatures are included in the lab configuration that you loaded at the start
of this module. In your lab, at a minimum, you should see the Vulnerability detections
named Trojan-Win32.swrort.dfap and Ransom-Win32.locky.pe.
Note: Because threat signatures, names, categorizations, and verdicts may change over
time, the log entries that you see in your lab may not match exactly the image above.
Lab Objectives
▪ Create a custom URL category and use it as a Security policy rule match criterion and as
part of a URL Filtering Profile.
▪ Configure and use an External Dynamic List (EDL) as a URL block list.
▪ Create a URL Filtering Profile and observe the difference between using url-categories in
a Security policy versus a profile.
▪ Review firewall log entries to identify all actions and changes.
17. Click to open the cloned Security policy rule named egress-outside-content-id-1.
18. Configure the following:
Parameter Value
Name egress-outside-url
20. Click the Service/URL Category tab and configure the following:
Parameter Value
URL Category
Profile Setting
24. Expand the Columns menu using the right-arrow and verify that the URL Category
check box is selected.
25. Enable the rule egress-outside.
Note: Because you created a rule that resets traffic, you need to enable the egress-outside
rule to allow everything else.
31. Notice that the firewall adds ( rule eq ‘egress-outside-url’ ) to the Traffic
log filter text box:
32. Click the down-arrow on any column header to add the URL Category column to the
Traffic log display.
33. Select the URL Filtering log.
37. Locate the text file in the right window pane named block-list.txt.
38. Right-click the block-list.txt file and select Edit.
39. Verify that the following URLs exist, each followed by a line break:
gizmodo.com
lifehacker.com
avsforum.com
reddit.com
40. Save the file if you made modifications, and Close the file.
41. Close the WinSCP window.
42. In the web interface select Objects > External Dynamic Lists.
43. Click to configure a new External Dynamic List.
shopping
government
hacking
61. Search for url-block-list and tech-sites. Notice that your custom URL categories are also
listed and they are set to a Site Access of “allow.” Leave them set to “allow.”
62. Click OK to close the URL Filtering Profile window.
63. Select Device > Licenses.
64. Under the PAN-DB URL Filtering header, click Download Now (or Re-Download).
Click Yes if a warning appears.
65. Select the region nearest the location of your firewall and click OK.
After the download completes, a Download Successful window appears.
66. Click Close to close the download status window. The web interface now should show a
message similar to the following:
Lab Objectives
▪ Observe firewall behavior without decryption.
▪ Create Forward Trust and Untrust certificates.
▪ Create a custom decryption category.
▪ Create a Decryption policy.
▪ Observe firewall behavior after decryption is enabled.
▪ Review logs.
13. Click the Download link on the left of the web page:
14. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using the standard HTTP protocol and not the
SSL-encrypted HTTPS protocol. The firewall will not be able to detect the viruses in an
HTTPS connection until decryption is configured.
15. Go back in the browser and download one of the test files using HTTPS:
16. Notice that the download is not blocked because the connection is encrypted and the virus
is hidden.
17. Close all browser windows except for the firewall web interface.
29. Click untrusted-ca in the list of certificates to edit the certificate information.
30. Select the Forward Untrust Certificate check box and click OK:
31. In the web interface select Objects > Custom Objects > URL Category.
32. Click to open the Custom URL Category configuration window.
33. Configure the following:
Parameter Value
Name lab-decryption
40. Click the Service/URL Category tab and configure the following:
Parameter Value
URL Category
Type
46. Click the Download link on the left of the web page:
47. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using HTTPS:
Note: The endpoint (Windows desktop) does not trust the certificate generated by the
firewall.
48. Close all browser windows except for the firewall web interface.
61. Click Next, click Finish, and then click OK in the status window.
63. Close the Microsoft Management Console. Click No when asked to save console settings.
66. Click the Download link on the left of the web page.
67. Within the Download area at the bottom of the page, click either the eicar.com or the
eicar.com.txt file to download the file using HTTPS:
The Eicar Test File is detected and the connection gets reset.
71. Close all browser windows except for the firewall web interface.
72. Open a new browser and browse to https://www.badssl.com.
73. Click untrusted-root:
Notice that the certificate is still signed by the firewall. However, it was signed with the
untrusted certificate.
79. Hover the mouse over Receive Time and click the down-arrow.
Lab Objectives
▪ Configure and test a WildFire Analysis Security Profile.
Note: The file type pe is a group that includes .exe, .cpl, .dll, .ocx, .sys, .scr, .drv, .efi,
.fon, and .pif file types.
10. Click OK to close the WildFire Analysis Profile configuration window.
23. On the Log Info tab, review the information within the General, Source, and
Destination panels.
24. Then look at the information in the WildFire Analysis Report tab. The verdict for this
file is Malware. Scroll down the Log Info tab to see Static and Dynamic Analysis,
Network Activity, Host Activity (by process), and Report Incorrect Verdict.
Lab Objectives
▪ Enable User-ID technology on the inside zone.
▪ Configure the LDAP Server Profile to be used in group mapping.
▪ Configure group mapping for User-ID.
▪ Configure and test the PAN-OS® integrated User-ID agent.
▪ Leverage User-ID information in a Security policy rule.
9. Click OK.
10. In the web interface select Device > Server Profiles > LDAP.
12. Locate the server list on the left side of the window and click .
13. Configure the following:
Parameter Value
Port 389
14. Locate Server Settings on the right side of the window and configure the following:
Parameter Value
Type active-directory
Base DN DC=lab,DC=local
Bind DN [email protected]
Password Pal0Alt0
Name lab-group-mapping
Password Pal0Alt0
24. Click the Server Monitor tab and verify the following:
Parameter Value
Windows Server
Monitoring
Enable User
Identification Timeout
Note: Ensure that the timeout option is not enabled. You do not need to time out the IP
address associated with the lab-user-id because the IP never changes. In a production
environment, the timeout is recommended to be half the DHCP lease time.
28. Click the Ignore User List tab.
29. Click and configure the following:
Parameter Value
Ignore User
Note: lab\lab-user must have the IP address of 192.168.1.20. If that IP address is not
listed, do not proceed. Contact your instructor or lab partner for assistance.
reference may take up to three minutes to show on the logs. Click refresh to update
the log entries:
Lab Objectives
▪ Create and configure a subinterface.
▪ Create certificates for the GlobalProtect Portal, internal gateway, and external gateway.
▪ Attach certificates to an SSL-TLS Service Profile.
▪ Configure the Server Profile and Authentication Profile to be used when authenticating
users.
▪ Create and configure the tunnel interface to be used with the external gateway.
▪ Configure the internal gateway, external gateway, and portal.
▪ Host the GlobalProtect agent on the portal for download.
▪ Create a No-NAT policy rule to ensure that portal traffic is not subjected to network
address translation.
▪ Test the external gateway and internal gateway.
14. Click the Advanced tab and select ping for the Management Profile.
15. Click OK.
18. Click .
19. Click OK to dismiss the successful status window.
21. Click .
22. Click OK to dismiss the successful status window.
24. Click .
25. Click OK to dismiss the successful status window.
26. Export the GlobalProtect certificate, select but do not open GlobalProtect.
30. Open the Windows Explorer, under the Downloads folder right-click the GlobalProtect
certificate and select Install Certificate
Note: The certificate file might have been saved with a .txt extension depending on what
browser you used to export it. In this case please remove the .txt file extension.
35. Click Next and then Finish to close the Certificate Import Wizard.
36. After a couple of seconds a window will pop-up confirming that the certificate was
installed successfully, click OK
37. Double-click the GlobalProtect certificate in the Windows Explorer and click Open. In
the Certificate Path tab notice the status at the bottom confirming that the certificate is now
trusted
43. In the web interface select Device > Server Profiles > LDAP.
45. Locate the Server list on the left side of the window and click .
46. Configure the following:
Parameter Value
Port 389
47. Locate Server settings on the right side of the window and configure the following:
Parameter Value
Type active-directory
Base DN DC=lab,DC=local
Bind DN [email protected]
Password Pal0Alt0
57. In the web interface select Network > GlobalProtect > Gateways.
61. Locate the Client Authentication list box. Click and configure the following:
Parameter Value
Name lab-ad
OS Any
67. Locate the Client Authentication list box. Click and configure the following:
Parameter Value
Name lab-ad
OS Any
Authentication Profile auth-gp
77. Click to create a portal. The GlobalProtect Portal configuration window opens.
78. Configure the following:
Parameter Value
Name gp-portal
Interface ethernet1/1
IPv4 Address 203.0.113.20/24
80. Locate the Client Authentication list box. Click and configure the following:
Parameter Value
Name lab-ad
OS Any
Authentication Profile auth-gp
83. Locate the Agent list box and click to open the Configs window and configure
the following:
Parameter Value
Name portal-agent-config
87. Locate the Internal Gateways list box and click to open the Internal Gateway
configuration window.
88. Configure the following:
Parameter Value
Name int-gw-1
Address IP
IPv4 192.168.2.1
93. Locate the Source Region list box and click to configure the following:
Parameter Value
Source Region Any
Priority Highest
94. Click OK three times to close the External Gateway, Configs, and GlobalProtect
Portal configuration windows.
96. Click Check Now at the bottom of the page. The Palo Alto Networks
firewall checks for the latest version of the GlobalProtect agent.
97. Search for 4.1.1 version of GlobalProtect.
108. Click the Service/URL Category tab and configure the following:
Parameter Value
Service
113. Click the Original Packet tab and configure the following:
Parameter Value
Source Zone inside
Destination Zone outside
Destination Interface ethernet1/1
120. Download the Windows 64-bit MSI install file and use it to install the 64-bit
GlobalProtect agent:
122. Enter the Username and Password in the GlobalProtect pop-up window, and then click
Sign In:
Parameter Value
Name lab-user
Password Pal0Alt0
update to .
Note: You might get disconnected from your lab-client, should this occur press CTRL
+ ALT + Shift simultaneously on your keyboard, click on your username on the top
and select Disconnect. Click Reconnect to reestablish the connection to your lab client
124. Right-click the GlobalProtect system tray icon to open the GlobalProtect pop-up
125. Click the Connection tab and notice that the gateway is listed as ext-gw-1, the gateway
type is External, and a tunnel is established.
126. Notice that the IP assigned is the first in the IP pool specified on the external gateway:
135. Right-click the GlobalProtect agent in the Windows desktop system tray, click the
icon and select Disable:
139. Under the DNS Proxy Rules tab click and configure the following:
This will redirect all DNS queries for the local Active Directory Domain to the domain
controller
Parameter Value
Name Local Domain
Domain Name
lab.local
*.lab.local
Primary 192.168.1.20
146. On the Windows desktop, right-click the CMD icon and select Run as
administrator.
147. Type the command ipconfig /all.
148. Verify that the current DNS server is 192.168.1.1:
Note: Do not continue if the DNS server is otherwise. Contact the instructor.
150. On the GlobalProtect pop-up window, click the icon and then Settings. Click the
Connection tab in the GlobalProtect window and notice that the gateway is listed as
int-gw-1, the gateway type is Internal, and a tunnel is not established:
Note: Do not continue if the DNS server is otherwise. Contact the instructor.
Lab Objectives
▪ Create and configure a tunnel interface to use in the site-to-site VPN connection.
▪ Configure the IKE gateway and IKE Crypto Profile.
▪ Configure the IPSec Crypto Profile and IPsec tunnel.
▪ Test connectivity.
Security Zone Create and assign a new Layer 3 zone named VPN
IP 172.16.3.1/30
13. Click to create the IKE gateway and configure the following:
Parameter Value
Name dmz-ike-gateway
Version IKEv1 only mode
Interface ethernet1/3
17. Click OK twice to close the IKE Crypto Profile and the IKE Gateway window.
27. Click OK twice to close the Proxy IDs and IPsec Tunnel windows:
32. Click OK to add the static route and then click OK again to close the Virtual Router –
lab-vr configuration window.
41. Click the Service/URL Category tab and configure the following:
Parameter Value
Service
45. Refresh the Network > IPSec Tunnels page. The Status column indicator is now
green showing the VPN tunnel as connected:
51. On the Windows desktop, launch PuTTY, double-click firewall-management, and log
in to the firewall with admin/admin.
52. After the VPN tunnel is connected, type the following CLI commands and observe the
output:
show vpn ike-sa
9. Select Monitor > Session Browser to see any current sessions. You
might be able to see simulated sessions from the generated traffic. Notice that there is no
Source User column.
10. Click the icon at the upper-right of the window to open the Filters pane.
11. Type lab\jamie in the From User field.
12. Click .
13. Notice that, even though there is no Source User column, you still can search for the
From User. (Note: You also can search for a To User.)
14. Note: If a search for the user lab\jamie does not produce results, the session most
likely has completed and you will need to rerun the traffic generator on Step 8:
15. Locate a salesforce-base entry and click the Plus icon on the left to expand the display.
Notice the three sections labeled Detail, Flow 1, and Flow 2.
16. The Detail section shows various items of information. Your information may look
different. Important items that can help when troubleshooting are Session ID,
Application, Security Rule, QoS Rule, and QoS Class:
These flows provide information about both the request and response traffic.
17. You can end an active session by clicking the X icon at the far right of a session row:
21. You can change the time period at the bottom of the screen:
24. The time period (shown at the bottom of the screen) can be changed to the Last 6 hours,
12 hours, 24 hours, 7 days, or 30 days:
The ACC opens with a global filter referencing Malaysia (MY) or the geographical location
you clicked:
31. Click the icon to display the information by Session Count and not Bytes:
36. Explore the information available on the Network Activity tab. This tab displays an
overview of traffic and user activity on your network. It focuses on the top applications
being used; the top users who generate traffic with detailed information about the bytes,
content, threats, or URLs accessed by the user; and the most used security rules against
which traffic matches occur:
Notice that in every pane you can display data by bytes, sessions, threats, content, URLs, and
users:
This information indicates that one application does not supersede any other application in
overall use by users.
38. Select threats in the Application Usage widget:
Given the displayed information, what is the primary source of threats in this environment?
(Your results may differ from what is shown.)
39. Focus your attention on the User Activity widget. Which user consumed the most
bandwidth in the past seven days?
The displayed information in the example shows that the most active rule based on
session count is egress-outside. Your results may differ.
42. Click the Threat Activity tab:
Notice that the graph updates to display only critical and medium severities.
This pane is helpful for identifying rules that need to enforce the application-default service
setting.
Notice that all window panes have updated to show only information based on sally:
Which traffic in the displayed information is associated with sally? In the example, sally
is shown to be associated only with SMTP traffic, which could indicate a possible
infection and lateral movement.
53. Scroll down and locate the Destination Regions pane.
Notice that this is an internal network, which could indicate that sally is using corporate
e-mail and not an external source, or that there might be a rogue SMTP relay:
Notice that the web interface switched views to the Traffic log with a predefined filter.
57. Select the Detailed Log view icon. At the bottom of the Detailed Log view are the
associated threat entries:
60. Select Monitor > PDF Reports > User Activity Report.
61. Click to define a new user activity report:
Parameter Value
Name mark
Type User
Username / IP Address lab\mark
Time Period Last 7 days
64. Browse through the report to get familiar with the presented information. You also can
include detailed browsing history that will include an approximate time a user spends on
a website (this information is not available when a group is specified instead of an
individual user).
73. Click to save the report as a PDF. (You might need to disable your
browser’s popup blocker.)
74. Click OK to close the Custom Report window.
80. The Email Server Profile window is now displayed. Configure lab-smtp-profile as
the name.
Parameter Value
Name lab-smtp
Email Display Palo Alto Networks EDU Admin
Name
From [email protected]
To <your e-mail address>
Email Gateway 192.168.1.20
81. Click OK to close the Email Server Profile and Email Scheduler windows.
Lab Objectives
▪ Display the Dashboard HA widget.
▪ Configure a dedicated HA interface.
▪ Configure active/passive HA.
▪ Configure HA monitoring.
▪ Observe behavior in the HA widget.
11. Click ethernet1/7 to open the configuration window for that interface.
12. Select HA on the Interface Type drop-down list, “HA2” as a comment and click OK:
18. Select the Auto radio button. When Auto is selected, the links that have physical
connectivity remain physically up but in a disabled state. They do not participate in ARP
or packet forwarding. This configuration helps reduce convergence times during failover
Netmask 255.255.255.0
HA2 Keep-alive
Name traffic-links
Enabled
(Note: Not supported on VM-Series on ESXi.)
Failure Condition Any
Interface ethernet1/1
Enabled
Name lab-vr
Enabled
36. Click OK to close the HA Path Group Virtual Router configuration window.
37. all changes.
You can consider this objective complete when the following tests are successful:
▪ The internal host can successfully connect to the portal and external gateway.
▪ The internal host receives an IP pool address when connected to the external gateway.
▪ The internal host can access paloaltonetworks.com when connected to the external
gateway.