Lab 5 - App-ID, Content-ID and URL Filtering
Lab 5 - App-ID, Content-ID and URL Filtering
Filtering
In this lab you will configure some of the NGFW features included in PAN-OS. You will use App-ID to
identify applications based on their layer 7 data. Content-ID will be used to filter traffic that could
prove to be a threat to our network or our users. Finally, we will configure URL Filtering to control the
URLs that our users can access.
• BS-BR-FW1
• BS-WEB1
Required Resources • BS-HR1
• BS-WS-340
• VMware Workstation 15.5.6 or later
• VM Templates:
o _Debian10(bitnami)
o _Server2016-1607 Active Hosts
o _pfSense2.4.5
o PanOS9.0.0 • BS-WS-169
• BS-HQ-FW1
• ISP
Inactive Hosts
• BS-WS-268
• BS-SALES1
• BS-SALES2
3-4. Click on the link for the following services, changing the Source Interface to ethernet1/4 and
then clicking OK to accept the changes:
a. DNS
3-7. The VM series firewalls are activated using an authorization code. Click the Activate
feature using authorization code link. In the Update License window, add the license
code from FOL and click OK. This license code has a limited number of activations, so
please only use it for official lab activities.
3-8. A Warning should appear to tell you that when the license is activated, PAN services will be
restarted. Click OK to apply the license. Wait for the license to apply (it may take some
time for the services to restart). You should be logged out of your session when the change
is successful. Login to the firewall to continue.
3-9. When you have logged in you should see that the firewall has the VM-50 license applied.
2-3. When the list reloads, you will see all the software that is available for the firewall, including
the currently installed release.
2-4. To update to version 9.1.11-h2, we will first need to download and install the major release
version 9.1.0, as well as some content updates. Locate the row for version 9.1.0 and use
the Download link to download the update. When the download completes, click the Close
button to continue.
2-6. Next, we need to install the required content updates. From the left menu, open the
Dynamic Updates configuration page and use the Check Now button to populate the list.
2-9. We can now install software version 9.1.0. Switch to the Software configuration page from
the left menu. Locate the row for version 9.1.0 and use the Install button to begin the
install. Review the message in the Warning text box and click OK when you are ready to
continue. When prompted, click Yes to reboot the device. You should be logged out of
your session when the reboot is complete. Login to the firewall to continue.
After you have confirmed that the updated version of the software has not added instability to your
network, it would be best practice to clean up any unnecessary software images from the firewall.
2-11. From the top navigation menu, navigate to the Device tab, from the left menu, click on the
Software configuration page. In the final column for both version 9.0.0 and 9.0.1, use the X
button to remove the software image from the firewall. Click the Yes button when prompted
for you are sure you want to delete the software. Click OK when the images have been
successfully deleted.
3-3. Select the Allow-Users-All rule and use the Clone button to open the Clone window.
Select the rule from the list and modify the order to place the new rule before the existing
one. Click the OK button to clone the rule.
3-5. Click the link for the new rule (Allow-Users-All-1) to open the Security Policy Rule window.
Change the rule name to Allow-Users-App-ID. Modify the description to indicated that
App-ID is being used.
3-6. Switch to the Application tab and use the Add button in the Applications pane to add the
following apps:
b. ntp
c. ssl
d. web-browsing
3-7. Click OK to accept the changes. From the top navigation menu, click the Commit button
merge the changes with the running configuration. Click Commit to continue. Click Close
when the changes have applied.
3-8. On BS-WS-169, open a new Firefox tab and try to navigate to the following URLs:
a. http://example.com/
b. https://www.google.ca
c. https://www.bing.com/
d. https://www.reddit.com/
e. https://www.facebook.com/
Do all the pages load?_____________________________________________
Which ones do not? ______________________________________________
Are these results expected? ________________________________________
Next, we will enable the application block page to inform users that the page has been blocked.
3-9. From the top navigation menu, navigate to the Device tab, from the left menu open the
Response Pages configuration page. Click the Disabled link in the Application Block
Page row to open the configuration window. Check the checkbox to Enable the
Application Block Page. Click OK to accept the changes.
3-11. In new tab, navigate to https://www.google.ca once more. What response do you receive
this time? Can you identify the application that you would need to enable for google to
work?
Let’s view the firewall logs to see what information they provide.
3-12. From the top navigation menu, navigate to the Monitor tab, the Traffic page from the Logs
section should automatically open.
3-13. Try to identify the log that was generated when you navigated to https://www.google.ca.
What policy was matched to generate this log?__________________________________
3-21. Navigate to https://kproxy.com/ and use the proxy address bar to try to access
http://www.4shared.com/. Does the page load?
3-22. Try to locate the traffic you generated in the firewall’s logs.
To ensure that App-ID will not interfere with future restrictions, we will re-enable our Allow-Users-All
rule.
3-23. From the top navigation menu, navigate to the Policies tab, the Security configuration
page should automatically load.
3-24. Click the number next to the Allow-Users-All rule and click the Enable Button.
3-25. Click the number next to the Allow-Users-App-ID rule and click the Disable Button.
3-26. From the top navigation menu, click the Commit button merge the changes with the running
configuration. Click Commit to continue. Click Close when the changes have applied.
3-27. Test your configuration to ensure that you have access to all applications.
4-2. Use the Add button to open the Antivirus Profile configuration window. Name the profile
Users-AV. Add an appropriate description. Check the Packet Capture checkbox to save a
capture of the file when a virus is detected. Click the OK button to create the profile.
4-4. Open the Allow-Users-All rule and switch to the Actions tab. In the Profile Setting
section, use the dropdown to select the Profiles option. Use the Antivirus dropdown to
select the Users-AV profile. Click the OK button to accept the rule changes.
5-2. Use the Add button to open the File Blocking Profile configuration window. Name the
profile Users-FB. Add an appropriate description. Use the Add button to configure the
following:
• Applications – any
• Use the Add button to select pdf
• Direction – both
• Action – continue
5-3. Click the OK button to create the profile.
6-2. Use the Add button to open the Custom URL Category configuration window. Name the
category news-sites. Add an appropriate description. Use the Add button to configure the
following URLs:
• bbc.com
• msnbc.com
• *.foxnews.com
• *.bbc.com
• *.msnbc.com
6-3. Click the OK button to create the custom category.
6-5. Use the Add button to create a new security policy rule. Name the rule Block-Users-URL.
Provide an appropriate description. Apply the Egress tag to the rule. Switch to the Source
tab and add the Users zone to the Source Zone list. Switch to the Destination tab and
add External to the Destination Zone list. Switch to the Service/URL Category tab and
use the Add button to add the news-sites category to the URL Category list. Switch to the
Actions tab and select Reset both client and server from the Action dropdown. Click OK
to add the new security policy rule.
6-7. From the top navigation menu, click the Commit button merge the changes with the running
configuration. Click Commit to continue. Click Close when the changes have applied.
6-8. On BS-WS-169, open a new Firefox tab and navigate to http://www.bbc.com. The site
should be blocked, and an Application Blocked response page will appear in its place.
6-11. Use the Add button to open the URL Filtering Profile configuration window. Name the
category social-networking-sites. Add an appropriate description. Use the search bar on
the Categories tab to find the social-networking category. Check the checkbox next to
social networking. Click the allow link in the Site Access column and change the option to
block. Click the OK button to add the profile.
6-12. From the top navigation menu, navigate to the Policies tab, the Security configuration
page should automatically load.
6-13. Open the Allow-Users-All rule and switch to the Actions tab. In the Profile Setting
section, use the URL Filtering dropdown to select the social-networking-sites profile.
Click the OK button to accept the rule changes.
6-14. From the top navigation menu, click the Commit button merge the changes with the running
configuration. Click Commit to continue. Click Close when the changes have applied.
6-15. On BS-WS-169, open a new Firefox tab and navigate to http://www.facebook.com. The
site should be blocked, but an Application Blocked response page may not appear.
6-16. Review the firewall’s logs and look for evidence of the block.
This concludes the lab. To ensure are VMs are ready for the next lab, on the BS-HQ-FW1 VM, take a
running snapshot called Lab 5 Complete, then shut down all VMs and create snapshots on the
remaining VMs also called Lab 5 Complete.