<note>This page is still WIP
Palo Alto PA-500 is a Next Gener*ation Firewall Mostly, Next generation name com from the Application level filtering process.
MGT interface is configured by default with the following address : 192.168.1.1/24 ( Adobe flash needed…)
There are 3 main configuration mode for the PA-500
PA-500 acts as a tap between two zones.
The default configuration have a virtual wire on port 1 and 2.
Mode où le PA fait office de FW layer 2. The appliance act as a standard Layer 2 firewall
On configure 2 interface en mode layer 2 In Network > interface section then we select the wanted interfaces
Each Interface can be associated with a zone (trusted untrusted etc…)
Then in Network >vlans we can associate a vlan on each interface.
<note important>Configuration Commit may stop communication</note>
Where the PA-500 acts as a classic router firewall performing Nat VPN, etc…
In Policies > Security
<note warning> Configuration have to be commited through the commit button </note>
Les journaux se trouvent dans l'onglet monitor. Logs are available in monitor tab.
User ID is one of the key fonctionnality of Palo Alto appliance. It allow you to create filtering rules based on user identity (as opposed to user IP address only).
<note important>I tested this fonctionnality only in Active directory environnement</note>
The best way to make User ID work is to install an agent on a Active diricetory domain controller or even better a member server
Once the agent is setup