Header Ads

Configure PaloAlto Interface and Ping from LAN


When you are reading for PaloAlto exam, you need to practice lab sessions to understand basic things. Once you do lab sessions with different kinds of typologies, you can pass the exam without any hesitation. 

But buying a PaloAlto firewall from a vendor doesn’t practical because you have to spend money on it and after finishing the exam, that firewall will lay down on desk or you will put it in your cupboard. I have done some experiment with GNS3 to build a PaloAlto firewall, like as we implemented Cisco ASA Firewall. Today I am going to share the lab with you which I have configured and tested successfully.

PREPARATION

I have installed GNS3 1.3.11 version on Windows 7 (8 GB RAM) laptop. Your machine’s physical memory is very important because PaloAlto needs minimum of 4 GB ram to work. Download the PaloAlto VM ESX (PA-VM-ESX-6.1.0) and install it in a Virtualbox.

PA-VM SETTINGS IN VIRTUALBOX
  • General
    • Type: Linux
    • Version: Red Hat (64 bit)
  • System
    • Motherboard
      • RAM (4 GB minimum)
      • Chipset: PIIX3
      • Extended Features: Enable I/O APIC
    • Processor
      • Processors: 2
      • Execution Cap: 100%
      • Extended Features: Enable PAE/NX
    • Acceleration       
      • Paravirtualization Interface: Default
      • Hardware Virtualization: Enable VT-x/AMD-V & Enable Nested Paging


















Network Adapter 1 is used to management interface. I have attached network adapter 1 to Host-Only Adapter > VirtualBox Host-Only Ethernet Adapter #2. Make sure to tick on cable connected feature.








At the moment, don’t configure an IP address on the adapter. Remain it as DHCP mode.

How to add other network adapters? In VirtualBox > File > Preferences > Network


























The purpose of adding those adapters: When we deploy PaloAlto firewall in GNS3, we can use this adapters as PaloAlto interfaces (Ex: Inside/Outside/DMZ). Don’t configure any adapter here, just add the adapter and remain it with its default configuration. Don’t worry about the IP addresses and number here.

You can make the topology as shown is the diagram. Drag and drop the PaloAlto firewall and other network devices to make the topology for future configuration.














Login to the Firewall using admin/admin credentials. To check the management IP address, use below command. ‘show interface management’



Create Zone



Now switch is able to ping the inside interface on PaloAlto firewall successfully.

If you have any doubts regards to this lab and the configuration, don’t hesitate to ask. We will give you the correct guidelines to troubleshoot your network and solve your problems.

Cheers! 

No comments

Thank you very much for your ideas!