Administrative Access Best Practices
Administrative Access Best Practices
10.1
docs.paloaltonetworks.com
Contact Informaon
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks menoned herein may be trademarks of their respecve companies.
Last Revised
May 12, 2022
Administrave Access Best Pracces 10.1 2 ©2022 Palo Alto Networks, Inc.
Table of Contents
Administrave Access Best Pracces........................................................... 5
Plan Administrave Access Best Pracces............................................................................6
Deploy Administrave Access Best Pracces.......................................................................8
Select the Management Interface................................................................................ 8
Manage Administrator Access.................................................................................... 12
Isolate the Management Network.............................................................................16
Restrict Access to the Management Interface........................................................18
Replace the Cerficate for Inbound Traffic Management.................................... 21
Keep Content and Soware Updates Current........................................................21
Scan All Traffic Desned for the Management Interface..................................... 21
Maintain Administrave Access Best Pracces................................................................. 24
Administrave Access Best Pracces 10.1 3 ©2022 Palo Alto Networks, Inc.
Table of Contents
Administrave Access Best Pracces 10.1 4 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
No network security system is secure if you don’t lock down administrave access to
network devices. This is especially true for firewalls and security management devices
such as Panorama because they are the gatekeepers and protectors of your network.
Aackers who gain administrave access to these devices can reconfigure them in
order to permit malicious access to your network remotely, facilitate the distribuon
of malware to endpoints, and even lock you out of your own network.
To safeguard your network from such aacks, follow the best pracces in this
document—scan administrave traffic for threats, and secure administrator and
programmac access to device management, the management network, and the
management interface.
This document contains a streamlined checklist of planning, deployment, and
maintenance best pracces so that you can secure administrave access to your PAN-
OS firewall and Panorama devices. Each secon includes links to detailed informaon
in the PAN-OS Admin Guide that shows how to configure different aspects of
administrave access in case you’re not familiar with some of the procedures.
This best pracce guide is wrien from the point-of-view of a new deployment to show
how to create a secure management network and configure secure access to firewall
and Panorama management interfaces. However, many enterprises have an exisng
management security strategy and implementaon. For exisng deployments, these are
the recommended best pracces to migrate to and to keep in mind if you overhaul your
management network security. If you haven’t adopted these best pracces in an exisng
framework, adopt them if possible to ghten security around administrave access.
5
Administrave Access Best Pracces
Administrave Access Best Pracces 10.1 6 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
Audit, list, and understand all programmac access requirements that leverage the firewall and
Panorama APIs. For example:
• Network-as-code and policy-as-code tools that modify the configuraon, such as Ansible or
Terraform.
• Rulebase analysis and audit tools.
• PAM/PIM tools.
• DNS, DHCP, and IPAM (DDI) tools.
• IT operaons and service management tools.
• In-house scripts and tools.
• Any other programmac access to the management interface.
For each required programmac access, list:
• Admin accounts used.
• Method of access (HTTPS, SSH, or API).
• Source IP address or network of the access.
Filter the System logs for administrave login events to help with auding exisng
programmac access.
Ensure that your architecture enables you to inspect and log all inbound management traffic
and to regularly monitor the traffic for suspicious acvity.
To ensure that you can connect to and manage crical devices, including firewalls and
Panorama, during power outages and other events that prevent the use of normal
communicaon channels, design and implement an access strategy for business connuity.
Administrave Access Best Pracces 10.1 7 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
If you are deploying a firewall for the first me, you must perform the inial configuraon
using the MGT port.
You cannot apply Security policy rules directly to traffic that ingresses the dedicated MGT port.
However, you can route incoming traffic for the MGT port through a DP port to decrypt and
Administrave Access Best Pracces 10.1 8 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
inspect the traffic. You can use a variety of methods to route incoming MGT port traffic for
inspecon, such as:
• Looping back through a local DP port on the same device (MP to DP connecon).
• Connecng to a DP port on another firewall.
• Leveraging upstream roung/switching infrastructure to provide the appropriate isolaon and
the appropriate inspecon by firewalls.
When you use a DP port to inspect traffic desned for the MGT port, do not enable management
protocols on the DP port. Enable management protocols only on the MGT port. Understand the
external services and service routes for which you will need to set up access
If you can’t route traffic desned for the MGT port through a DP port interface on another firewall
for inspecon, configure a dedicated DP port to be the management interface so that you can
use Security policy to inspect the inbound management traffic. If you use the DP port as the
management interface, isolate it as described in this secon. Using a DP port as the isolated
management interface trades consuming a producon port for safeguarding management traffic.
If you choose to route inbound management traffic to the MGT port without prior
inspecon, understand the risks of not inspecng the traffic, which include unauthorized
access to device management, potenal malicious acvity, and unblocked threats. The
best pracce is always to inspect inbound management traffic because it controls and
configures your device.
Management networks that include more than one firewall (and Panorama)—Use the MGT
port as the management interface.
Route incoming management traffic through an isolated DP interface on a different firewall first
and use Security policy to inspect the traffic before forwarding it to the MGT port. This method
enables you to inspect and control traffic without consuming a dedicated DP port.
To use a DP port on a different firewall to inspect MGT port traffic before forwarding that
traffic to the managed firewall:
Configure a dedicated subinterface and a dedicated VLAN to isolate the traffic on the
inspecng firewall’s DP port. Allow only management traffic on that subinterface and in that
VLAN. Using a dedicated management subinterface with a dedicated management VLAN
enables you to use the rest of the port’s bandwidth for producon traffic while sll isolang
the management network traffic.
Configure Security policy rules (see Scan All Traffic Desned for the Management Interface)
that restrict access to the management interface based not only on IP addresses, but also
on users (User-ID), applicaons (App-ID), and zones, and aach a best pracce Vulnerability
Protecon profile.
A number of network architectures enable inspecng traffic desned for the management port,
many of which depend on company-specific needs. The following topology diagrams show two
Administrave Access Best Pracces 10.1 9 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
common high-level architecture examples of using a DP port on one firewall to inspect traffic
desned for the MGT port of a firewall in the management network. Both architectures have
these common components:
• A firewall administrator aempng to access a device. Administrators who are external to
the network access the network using a VPN.
• A bason host that authencates the administrator to prevent unauthorized access to the
management network and management devices.
• A firewall with a dedicated subinterface and a dedicated VLAN on a DP port to isolate the
management traffic. The firewall inspects management traffic before the traffic enters the
management network. No management protocols are enabled on the DP port.
• An isolated management network, protected by the bason host and the inspecng firewall.
• A device that the administrator manages using the MGT port.
Aer each diagram is a descripon of its packet flow.
Packet Flow
1. The firewall administrator (1) uses a VPN connecon to aempt to log in and manage a
firewall (5)
2. The bason host (2) authencates the administrator’s credenals.
3. If authencaon succeeds, the bason host (2) creates a new session and forwards the
traffic to the inspecng firewall (3), which protects the management network. The firewall
decrypts and inspects the traffic.
4. If Security policy on the inspecng firewall (3) allows the administrator to access the
firewall (5) in the management network, the inspecng firewall (3) forwards the traffic to
the management network (4) and is restricted to connecng only to the device (5) that
the administrator needs to manage. Security policy rules determine which devices the
administrator can access, from where, using which applicaons, and even when, and how
Administrave Access Best Pracces 10.1 10 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
to inspect the traffic. Role-based access profiles control the privilege level the administrator
has on each device.
5. All subsequent traffic between the administrator (1) and the managed device (5) is inspected
(3) for threats.
Packet Flow
1. The firewall administrator (1) uses a VPN connecon to aempt to log in and manage a
firewall (5)
2. The administrator’s traffic reaches the inspecng firewall (2) that protects the management
network. The firewall decrypts and inspects the traffic, and then forwards it (A) to the
bason host (3).
3. The bason host (3) authencates the administrator’s credenals.
4. If authencaon succeeds, the bason host (3) creates a new session and forwards it (B)
back to the inspecng firewall (2), where the traffic is inspected again.
5. If Security policy on the inspecng firewall (2) allows the administrator to access the
firewall (5) in the management network, the inspecng firewall (2) forwards the traffic to
the management network (4) and is restricted to connecng only to the device (5) that
the administrator needs to manage. Security policy rules determine which devices the
administrator can access, from where, using which applicaons, and even when, and how
to inspect the traffic. Role-based access profiles control the privilege level the administrator
has on each device.
6. All subsequent traffic between the administrator (1) and the managed device (5) is inspected
(2) for threats.
Management networks in which you cannot use another firewall’s DP port to inspect inbound
MGT port traffic—Dedicate one of the firewall’s DP ports as the management interface so
that you can apply Security policy to inspect and control management traffic (do not use the
Administrave Access Best Pracces 10.1 11 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
MGT port as the management interface). Do not allow any traffic on the DP port other than
management traffic.
The tradeoff is best security against not being able to use one DP port as a producon port.
If you can’t dedicate a firewall DP port to management traffic and must use the out-of-band
MGT port, understand the risks and follow the rest of the best pracces in this document to
isolate the management network and restrict administrator and service access to only those
that require access to manage the device.
When you can’t use a DP port interface on a different firewall to inspect the traffic,
dedicate a firewall DP port to management traffic or you won’t be able to apply
Security policy or Threat profiles to inbound management traffic. That means you can’t
inspect traffic, apply Vulnerability Protecon profiles, or use Security policy to restrict
MGT port access in a granular manner. You can use a loopback interface or another
method to route the traffic from the MGT port to a DP port on the same firewall, but
you sll need to dedicate the DP port to the management traffic to isolate it on the
device.
Administrave Access Best Pracces 10.1 12 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
Instute of Standards and Technology (NIST) or local regional standards bodies, and
applicable compliance regulaons. Set the Administrator Type as Dynamic and Superuser.
Log out of the firewall or Panorama and then log back in with the new, more secure local
admin account that you just configured.
Delete the default admin account so that your new local superuser account is the only local
account on the device. In Device > Administrators, select the default admin account and
then Delete the account.
Store the new local login and password credenals in the safest storage your enterprise has
available in case emergency access is required.
If for business reasons you must have more than one local account on the firewall,
follow the best pracces for password construcon and usage later in this secon.
However, mulple local admin accounts are not a security best pracce because
each local account increases the risk of credenal compromise resulng in
unauthorized access.
STEP 2 | For all management access other than the default local administrator account, including
API access, Configure a Firewall Administrator Account, use an external authencaon
system (see Configure Local or External Authencaon for Firewall Administrators) with
a password manager that generates passwords automacally and configure Mul-Factor
Authencaon (MFA) to prevent the unauthorized use of stolen credenals. The mandatory
local superuser account is the only local account that you should have on the device (to use
in case of emergency).
NIST Special Publicaon 800-63B Digital Identy Guidelines describes standard best pracces
for digital authencaon management in the U.S. Other regions may have local enes that
provide standard best pracces.
If you cannot implement the best pracce of using an external authencaon system
and must configure local administrators, Configure Cerficate-Based Administrator
Authencaon to the Web Interface and Configure SSH Key-Based Administrator
Authencaon to the CLI to increase security. Always use MFA to protect against
compromised credenals.
Enable MFA for all management access with external authencaon and authorizaon using
RADIUS or SAML and corporate credenals (use your exisng authencaon system if you
have one). If available, use privileged account management (PIM) and/or privileged identy
management (PIM) soluons to secure credenals externally.
If you have a strong authencaon system using smart cards, Configure Cerficate-
Based Administrator Authencaon to the Web Interface and Configure SSH Key-
Based Administrator Authencaon to the CLI. If your system can’t use MFA, import the
cerficate from the SAML provider to ensure secure access. If you manage cerficates
through a cloud provider, use client cerficates to provide secure login access. Use client
cerficates for on-premise access to help protect servers against DoS aacks.
Ensure that the password manager follows industry recommendaons for construcng
strong passwords, such as those published by NIST in NIST Special Publicaon 800-63B
Digital Identy Guidelines and Easy Ways to Build a Beer P@$5w0rd, and follow
Administrave Access Best Pracces 10.1 13 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
compliance regulaons. Some regions may have local enes that require compliance
regulaons.
Follow industry password usage best pracces such as those published by NIST (or local
standards authories and compliance regulaons).
Change the master key on the device to prevent the default master key from being
compromised and used to decode passwords. Take the following acons when you change
the master key:
Back up your configuraon before you change the master key.
In HA firewall configuraons (standalone or Panorama-managed), disable Config Sync on
both firewalls before you change the master key, and then configure the same master key
on both devices before you re-enable Config Sync.
On Panorama, WildFire and Log Collector devices must use the same master key as
Panorama.
Reseng the master key results in down me, so do it during a normal maintenance
period.
As with the local admin account, store the master key in the safest storage your
enterprise has. You need the current master key to reset the master key (periodically
reset the master key because eventually it runs out of unique encrypons). If you lose the
master key, the only way to reset it is to reset the system to the factory default.
If you lose the master key and factory reset the device and the default master
key was changed before the reset, your backed up configuraon won’t work on
the device aer the reset because the master key is different.
Securing API access is similar to securing administrator access. The main difference is that
aer you configure administrator accounts and role-based access control (RBAC, see Step
4), you generate an API key, which contains an API’s authencaon details, and use the key
for subsequent API access instead of subming the username and password credenals
every me.
Using API keys is a best pracce because it enables you to Configure API Key Lifeme to
enforce regular key rotaon and harden your security posture. When you enable API key
lifemes on firewalls or Panorama, ensure that the systems and scripts which access those
Administrave Access Best Pracces 10.1 14 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
devices update their API keys at the end of the configured lifeme to prevent disrupng
access.
For SNMP access, if your infrastructure supports it, use SNMPv3 instead of SNMPv2c.
SNMPv3 has many security improvements that are best pracces to implement. SNMPv3:
• Enables granular, per-manager and per-agent access to MIB objects, so you can restrict
access to the areas that the manager or agent needs to access. (SNMPv2c gives access to
all MIBs to all managers and agents.)
• Enables granular, per-manager and per-agent authencaon requirements.
• Provides encrypon instead of transming data in cleartext and has stronger hashing
algorithms.
Create the appropriate SNMP accounts and configure the firewall or Panorama to
communicate with the SNMP Manager to Monitor Stascs Using SNMP.
You can route SNMP traffic through the MGT port or through a DP port (must be a layer 3
Ethernet interface). If you use the MGT port, first send inbound traffic through a DP port
on the same firewall or on another firewall so that you can control and inspect the incoming
traffic using Security policy rules. Create a dedicated subinterface and a dedicated VLAN on
the DP port to isolate the SNMP traffic.
If you use SNMP to manage routers or switches that are behind the firewall,
configure the appropriate Security policy rule to allow the traffic.
STEP 3 | Limit access to users and services that manage the firewall.
Only allow access for people and services that need to manage the device.
STEP 4 | Assign an Admin Role Profile (Device > Admin Roles) to each administrator or group or
department of administrators who have the same role and to each service or group of
services that require the same access. Configure each profile sot that it limits access to only
the areas of the device that each administrator, group of administrators, service, or group
of services manages. Create individual, unique accounts for each administrator and for each
service (for example, Terraform, Ansible, Tufin, etc.).
Configure administrave access only for people and services that need to manage the
device.
Configure a unique firewall administrator account for each administrator and for each
service so that you can control and idenfy them individually. Administrave Role Types
describes the access roles you can assign to administrators. Don’t use the same account for
more than one administrator or for more than one service. API access for services works
similarly to access for human administrators, including using role-based access.
Apply the appropriate Admin Role Profile to each individual account.
Configure Admin Role Profiles and apply them to individual administrator and service
accounts to control access privileges granularly. Profiles determine what the administrator(s)
or service(s) can do and how they can do it (CLI, API, UI). Configure each profile to limit
Administrave Access Best Pracces 10.1 15 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
administrave privileges to only the areas of the device that an administrave group,
department, individual, or service needs to manage. Do not over-provision administrators or
services; allow only the required access privileges. Reference: Web Interface Administrator
Access describes the web access privileges that you can assign or deny to administrators on
the firewall and on Panorama.
In Panorama, Configure Access Domains to control administrave access to specific Device
Groups, templates, Log Collector Groups, etc.
Add a Commit Descripon when you commit changes so that others can understand the
reason for the change or addion.
STEP 5 | Configure a login meout (Idle Timeout) to prevent administrators from leaving idle sessions
open too long, specify a number of Failed Aempts to prevent brute force aempts to log in,
and specify a Lockout Time to prevent further immediate access aempts aer reaching the
Failed Aempts limit.
Configure global meout sengs for the device in Device > Setup > Management >
Authencaon Sengs or configure more granular sengs for Failed Aempts and
Lockout Time in Device > Authencaon Profile.
Check NIST Special Publicaon 800-63B Digital Identy Guidelines or local regional
standards bodies or applicable compliance regulaons for recommended sengs.
If you allow API access, Configure API Key Lifeme based on what makes sense for your
deployment to enforce regular key rotaon—don’t over-provision the key lifeme.
STEP 6 | Configure Administrator Acvity Tracking and send the logs to an external server for auding
and monitoring.
STEP 7 | Configure System logs and use Log Forwarding to send them to an external server for
auding and monitoring. Use a method that nofies administrators of events so that they can
take acon in a mely manner.
STEP 8 | Use the Administrator Login Acvity Indicators to Detect Account Misuse such as a high
number of failed login aempts.
STEP 9 | Enforce audit comments in policy rules so that you can understand why an administrator
created or modified a rule.
Enable access to the management interface only from within your dedicated management
network. Do not enable access to your management interface from the internet or from
other zones inside your enterprise security boundary.
STEP 1 | Use a bason host (or a similarly hardened host dedicated only to management network
access) with screen recording and the strongest authencaon and access control to provide
secure external access to your dedicated management network. Figure 1: Management
Administrave Access Best Pracces 10.1 16 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
STEP 2 | Enable access to the management network only from the management zone (including the
bason host). Do not allow direct access to the management network from the internet or
other zones.
Administrave Access Best Pracces 10.1 17 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
STEP 2 | Configure management interface sengs to restrict the available services and to restrict the
allowed IP addresses.
1. If you use the MGT port as the management interface (mandatory on Panorama),
configure Management Interface Sengs (Device > Setup > Interfaces > Management)
to restrict the services and IP addresses available on the management interface.
Enable HTTPS and SSH, and if you want to test connecvity to the device or use
monitoring and scanning tools, enable ping. Do not allow cleartext protocols (HTTP,
Telnet).
Administrave Access Best Pracces 10.1 18 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
the border guard for your management network, allow only IP addresses in the
management network to access the management port.
Because you must use the MGT port as the Panorama management interface,
you may need to specify IP addresses to allow the necessary services to
access the device. You also may need to open Ports Used for Panorama to
allow necessary services. Allow only the IP addresses and open only the ports
for required services and follow the principle of least privilege access.
Route incoming MGT port traffic to a DP interface on another firewall or on the same
firewall (as described in Select the Management Interface with the examples Figure
1: Management Isolaon Topology 1 and Figure 2: Management Isolaon Topology
2) so that you can apply Security policy to the traffic. Do not configure management
protocols on the DP interface you use to inspect the traffic desned for the MGT
port. Configure the same type of Security policy rule for inbound traffic as described
in Step 3 in Scan All Traffic Desned for the Management Interface.
For SNMP access, follow the recommendaons here.
2. If you use a firewall DP port as the management interface, configure an Interface
Management Profile (Network > Network Profile > Interface Mgmt) to restrict the
services and IP addresses available on the management interface.
Enable only the services that you require to manage the device (principle of least
privilege access). For example, enable HTTPS for web UI access and SSH for CLI
access. If you want to test connecvity to the device or use monitoring and scanning
tools, enable ping. If you use the management port for SNMP, enable SNMP, etc. Do
not allow cleartext protocols (HTTP, Telnet).
Administrave Access Best Pracces 10.1 19 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
anything else that originates outside of the dedicated management network to access
the management interface directly.
If you have Panorama devices that manage firewalls in different networks, treat the
traffic similarly to other external traffic—inspect the traffic and limit connecvity
following the principle of least privilege access (Ports Used for Management Funcons
describes the ports and protocols for management funcons).
STEP 3 | Allow access using only the most secure version of Transport Layer Security (TLS) encrypon
and most secure encrypon sengs.
If you use the MGT port as the management interface, Configure an SSL/TLS Service
Profile (Device > Cerficate Management > SSL/TLS Service Profile) that uses strong
encrypon to restrict access to the web interface and protect against weak protocols.
Set the Min Version to TLSv1.2 and the Max Version to Max. Seng TLSv1.2 as the Min
Version automacally blocks the weak 3DES and RC4 encrypon algorithms and MD5
authencaon algorithm.
Depending on applicable compliance regulaons, you may want to block other
authencaon, encrypon, and key exchange algorithms, which you can do in the CLI using
the configuraon command set shared ssl-tls-service-profile <profile-
name> protocol-settings.
Configure an SSH Service Profile (Device > Cerficate Management > SSH Service
Profile and Add a management server profile) to restrict SSH access to the CLI to only the
encrypon cipher, authencaon, and key exchange algorithms that meet your compliance
regulaons. If you don’t configure this profile, all algorithms are allowed, including weak
encrypon algorithms that you should block.
STEP 4 | As described in Step 5 of Manage Administrator Access, prevent brute force aacks on
administrator logins and prevent leaving idle sessions open too long.
STEP 5 | Treat external services such as DNS, NTP, authencaon, and Palo Alto Networks Services
the same way that you treat other external traffic desned for the MGT port: run the traffic
through a firewall DP port to inspect it before it reaches the MGT port.
By default, the firewall uses the dedicated MTG port to access services that are outside of
the management network. If you can’t access the required services through the management
network and inspect them, Configure Service Routes (Device > Setup > Services > Service
Administrave Access Best Pracces 10.1 20 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
Route Configuraon) that use a DP port instead of the MGT port so that you can inspect the
traffic. When you configure services routes:
Follow the principle of least privilege access and allow only the services you need.
Create a dedicated subinterface and a dedicated VLAN on the DP interface to isolate the
services traffic.
Customize service routes by specifying a source interface and source address on the firewall
or Panorama that does not have management access enabled.
Apply Security policy to the traffic (see Scan All Traffic Desned for the Management
Interface).
Use App-ID in Security policy to ensure that only the required service applicaons
are allowed. There are App-IDs for many common services (such as DNS) that you
can use to lock down access and prevent unnecessary applicaons from accessing
the device.
Some services, such as SNMP, cannot use service routes. For these services, the
same advice applies: before the traffic reaches the MGT port, run the traffic through
a firewall DP port on a dedicated subinterface and a dedicated VLAN to isolate the
traffic, and apply Security policy to control and inspect the traffic.
STEP 2 | Read the latest Release Notes before you upgrade PAN-OS.
STEP 3 | Follow Best Pracces for Applicaons and Threats Content Updates when updang to the
latest content release version.
Administrave Access Best Pracces 10.1 21 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
STEP 1 | Create Security policy rules to allow access to the web and CLI interfaces.
If you use a bason host as the only gateway to your management network, configure a rule
to allow traffic from the bason host to the managed device. Configure rules to allow traffic
from necessary users and services within the management network (restricted to only the
necessary applicaons, etc.).
If you do not use a bason host, create the required rules to allow access only from the
management zone, using only the necessary applicaons and allowing only the necessary
users or services. All management traffic should come from within the management zone.
Inspect traffic entering the network from a VPN or other secure tunnel before it enters the
management zone.
STEP 2 | Create a best pracce Vulnerability Protecon profile by cloning the preconfigured strict
Vulnerability profile and then modifying it so that it only scans the signatures from the
requesng server.
Aer you clone and modify the best pracce Vulnerability Protecon profile, delete the
profile rules that have client as the Host Type because you only need to scan the inbound
traffic.
Aach the Vulnerability Protecon profile to every Security policy rule that controls
inbound access to the management interface.
STEP 3 | Tighten each Security policy rule to allow only the necessary users, services, and
applicaons.
Allow only the IP addresses you specified in the Interface Management Profile.
Specify the management network zone(s) as both the source and desnaon zones (both
the bason host and the device’s management port are in the management network
zone(s)).
Allow only the applicaons and services that you need to manage the device (use App-ID).
Specify user groups and/or individual users (you must implement User-ID).
Include the modified best pracce Vulnerability Protecon profile (Step 2).
Log traffic that matches the rule (this is enabled by default) and forwards logs to external log
storage to be available for analysis (you must Configure Log Forwarding).
If temporary access is required, for example for a contractor, configure a non-recurring
schedule (Objects > Schedules) to specify when that access is allowed and when it stops.
Aach the schedule to the Security policy rule that allows the temporary access.
Administrave Access Best Pracces 10.1 22 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
STEP 4 | Decrypt inbound traffic to the management interface so the firewall can inspect it. If you use
the MGT port as the management interface, you must first route the traffic through the DP
port of a firewall to decrypt and inspect the traffic (see Select the Management Interface).
Apply an SSL Inbound Inspecon Decrypon profile to the traffic.
Follow Decrypon Best Pracces to eliminate weak ciphers and algorithms based on
applicable compliance regulaons.
Do not decrypt management or service route traffic from the firewall to Panorama.
Do not configure SSL Forward Proxy decrypon to decrypt outbound management
traffic from the firewall or Panorama.
Administrave Access Best Pracces 10.1 23 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
STEP 2 | When services or API access for management tools changes, update Security policy rules
that allow access accordingly.
Similar to changes in administrave personnel, in firewall and Panorama Security policy and for
access to the management network, ensure that you:
Remove access privileges for services and tools that you no longer use.
Add access privileges for new services and tools using the most granular policy to permit
only the necessary connecon (principle of least privilege access).
Administrave Access Best Pracces 10.1 24 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
STEP 3 | Monitor System logs for administrators to idenfy abnormal account acvity, especially
for administrators with roles that permit changing key areas such as management access,
administrave users, or Security policy.
Configure Log Forwarding for specific log events and types. Use a method that nofies
administrators of events so that they can take acon in a mely manner. Abnormal acvity may
indicate a compromised administrator account. Look for acvity such as:
An excessive number of login aempts.
Repeated login aempts at unusual mes of day for the administrator.
Login aempts from unusual IP addresses or locaons.
Creaon of new user accounts (ensure that the new account is legimate).
Addion of new users to groups (ensure that the addion is legimate).
Unexpected password changes.
Policy and permission changes (Security policy, users, Security profiles, Admin Role Profiles,
etc.).
Unscheduled commits.
STEP 4 | On the Dashboard, use the administrator login acvity indicators to detect account misuse.
These acvity indicators enable you to quickly view the last login details of administrators and
locate hosts that aempt to log into the firewall or Panorama management server.
Administrave Access Best Pracces 10.1 25 ©2022 Palo Alto Networks, Inc.
Administrave Access Best Pracces
Administrave Access Best Pracces 10.1 26 ©2022 Palo Alto Networks, Inc.