1.
Palo Alto Networks Platforms
The PA-500, PA-200, and VM-Series firewalls do not support virtual systems. High Availability and
Aggregated interfaces are also only supported on higher models of the product.
The even-numbered platforms are older platforms. The PA-4000 is End-of-Sale. The PA-3000 and PA-
5000 models use superior hardware, such as Cavium chips and SSD for logging. The PA-7050 is a
chassis architecture.
The Control Plane has its own dual core processor, RAM, and hard drive. This processor is responsible
for tasks such as management Ul, logging, and route updates.
The Data Plane contains three types of processors that are connected by high speed 1Gbps busses:
Signature Match Processor: Performs vulnerability and virus detection
Security Processors: Multi-core processors, which handle security tasks such as SSL decryption
Network Processor: Responsible for routing, NAT, and network layer communication
2. Initial Access to the System
2.1 Initial Access to the System
Connect a serial cable from your computer to the Console port and connect to the firewall using
terminal emulation software (9600-8-N-1). Wait a few minutes for the boot-up sequence to complete;
when the device is ready, the prompt changes to the name of the firewall, for example PA-500 login .
Connect an RJ-45 Ethernet cable from your computer to the MGT port on the firewall. From a
browser, go to https://192.168.1.1 . Note that you may need to change the IP address on your computer
to an address in the 192.168.1.0 network, such as 192.168.1.2, in order to access this URL.
2.2 Configuration Management
Candidate Config: When you change a configuration setting and click OK, the current or
"candidate" configuration is updated; not the active or "running" configuration.
Running Config: Clicking Commit at the top of the page applies the candidate configuration to the
running configuration, which activates all configuration changes since the last commit.
2.3 Licensing and Software Updates
2.4 Account Administration
2.5 Administrative Controls
CLI Mode:
Operational Mode
Configuration Mode
CLI Tools:
?
Find command keyword fpga
show
ping
3. Basic Interface Configuration
3.1 Security Zones
3.2 Interface Types
Tap Mode
Decryption Mirror
Virtual Wire Interface
Layer 2
Layer 3 (Virtual Router, IP Addressing, DHCP, Interface Management Profile)
3.3 IPv4 and IPv6
3.4 DHCP
3.5 Interface Management
Loopback
Aggregrate
4. Security and NAT Policies
4.1 Security Policy Overview
4.2 Security Policy Administration
Security Zone Rules - Three types
Intrazone
Interzone
Universal
4.3 Network Address Translation (NAT)
Source NAT
Static IP
Dynamic IP
Dynamic IP/Port (DIPP)
Destination NAT
5. Basic App-ID
Application Identification (App-ID)
App-ID Overview
Application Groups and Filters
6. Basic Content-ID
Content-ID Overview
Security Profiles
Security Profile Administration
Zone Protection Profile
7. Decryption
Certificate management
Outbound SSL Decryption
Inbound SSL decryption
Other Decryption Topics
8. Basic User-ID
Configuring User-ID
Mapping Users to Group
Working with the Windoes User-ID Agent
Mapping Users to IP Addresses: Syslog Integration
9. Site-to-Site VPNs
Site-to Site and Client VPNs
Site-to-Site VPN
Configuring Site-to-Site Tunnels
IPSec Troubleshooting
10. Management and Reporting
Dashboard
Basic Logging
Viewing and Filtering Logs
Basic Reports
11. Active/Passive High Availability
Active/Passive High Availability Overview
Active/Passive Configuration
Managing Split Brain
Monitoring
Active/Active Overview
12. Panorama
Panorama Overview
Centralized Configuration and Deployment
Centralized Logging and Reporting
Role-Based Access Control
Types of roles