- 109
- 153 155
Mode44
United Kingdom
Приєднався 16 кві 2020
Mode44 Palo Alto Networks Channel, provides admin guides and troubleshooting tips for Palo Alto Firewalls, as well as offering free training on PA Next Generation Firewalls, we cover all aspects of Palo Alto platforms including XSOAR, NGFW, Prisma and Globalprotect.
New videos are being added frequently and we do attempt to answer questions within a couple of days at most, to hire Mode44 for consultation or simply to request some help with a specific issue please get in touch by either following us on the Linkedin company page below or using the contact form @ www.mode44.co.uk/contact
Palo Alto Networks is the Gartner leader for the 10th time and is one of the only constantly evolving security vendors that are addressing todays security challenges.
Please follow our company on LinkedIn www.linkedin.com/company/mode44
#paloaltonetworks #xsoar #firewall #training #configuration #troubleshooting #overview #beginners #tutorial
Palo Alto Networks | Security Advisories | CVE-2024-0012 | PANOS Vulnerability
Sharing a lot in common with both the mitigation and the desired outcome from any hacking attempt with CVE-2024-9474, this video goes into using inbound SSL inspection to decrypt the management traffic and apply the security profiles to that traffic, fine tuning the Vulnerability profiles to provide the right level of protection from would be malicious actors.
As always this video is a guide, my interpretation of the security advisory, please ensure you are happy to proceed when implementing any configuration seen here or elsewhere on the channel.
#vulnerability #cybersecurity #cve #panos #paloaltonetworks #paloaltofirewall
As always this video is a guide, my interpretation of the security advisory, please ensure you are happy to proceed when implementing any configuration seen here or elsewhere on the channel.
#vulnerability #cybersecurity #cve #panos #paloaltonetworks #paloaltofirewall
Переглядів: 246
Відео
Palo Alto Security Advisory | CVE 2024 9474 | Mitigation
Переглядів 20916 годин тому
CVE-2024-9474 is a Privilege escalation vulnerability in Palo Alto Networks PAN-OS Software allowing an administrator with access to the management web interface to perform actions with root privilege, this is covered by an official document here securityadvisories.paloaltonetworks.com/CVE-2024-9474 If in any doubt at all then make sure to follow the official advice of Palo Alto Networks to mit...
How to | Disk Cleanup Root Partition | Palo Alto Panorama and Firewalls
Переглядів 20328 днів тому
Quick video on how to clean up the root partition on Palo Alto Firewalls and Panorama, now as it happens the Panorama in the demo was healthy, but all the steps to complete the task remain the same, Lots of different files are stored in the /tmp directory, including the Telemetry files that are uploaded to Palo Alto on an hourly basis, this can cause the partition to fill up and affect the Fire...
How to | HA Link and Path Monitoring | Palo Alto Networks Training
Переглядів 5073 місяці тому
Configuring HA failover monitors differs based on the upstream devices, in some cases interface failure is enough but to be completely sure that you have all bases covered path monitor can also be configured so that in the even the path from one of your firewalls is compromised but the interface stays up your firewalls will still failover and connectivity would continue as needed. #PaloAltoNetw...
CyberKill Chain Mitigation | Palo Alto Networks | Part 2 | Delivery
Переглядів 1113 місяці тому
💥 Don't forget to like, subscribe, and hit the notification bell to stay updated on the latest in cybersecurity tutorials and insights. The delivery phase of the Cyberkillchain, is when the attacker as completed their reconnaissance and has prepared the malware that is to the delivered to the target, with the exception of XDR or host defenses we can look to try and reduce this risk through the ...
Answer to Decryption Profile Question | How to create Decryption Profiles Palo Alto
Переглядів 1865 місяців тому
A viewer asked about my decryption (mode44) profile that is used on one of the videos about DOH, when I looked at it to see what settings it had I found it to be ever so slightly insecure, so as a reply I have put this video together (very quickly) to show the profile and what it should ideally look like. #paloaltofirewall #ssldecryption #paloaltotraining #ssl #mitm
How to Factory Reset Palo Alto Firewall
Переглядів 2765 місяців тому
Sometimes you just need to start again, this process removes all configuration and licenses from the device, useful if you need to re-purpose a firewall but essential if you are disposing of a firewall, the data contained on the firewall will range from simply giving away network infrastructure information to potentially handing over private keys for servers if you are using inbound SSL inspect...
CVE-2024-3661 TunnelVision | How to Mitigate on Palo Alto Firewalls
Переглядів 3096 місяців тому
Quick video to address the ways of configuring Palo Alto Firewalls to aid in the fight against the TunnelVision vulnerability, not mean to be deep dive into the vulnerability at all, more of a quick way to check / alter the Globalprotect configurations to set your mind at ease. #cve20243661 #globalprotect #paloaltofirewall #paloaltonetworks #cybersecurityengineer #hacking
How to Stop Reconnaissance Attempts | Palo Alto Firewall Training
Переглядів 3276 місяців тому
A look at the tools and configurations available to us in Palo Alto Networks Strata firewalls to help stop the first part of the Cyber Kill Chain sequence, Reconnaissance is normally done externally as an attacker starts to look for ways to compromise the target or simply to learn more about the platforms in use and if there are any potential open attack vectors. Port Scanning, IP sweeps, even ...
How to use Panorama Variables on Multiple Firewalls | palo alto firewall training
Переглядів 5807 місяців тому
Panorama allows us to manage and monitor multiple firewalls from a single point, adding managed firewalls to a single stack allows us to control the network and device configurations on those devices, however you can soon end up with a lot of templates and stacks, adding multiple firewalls into a single stack can solve these problems, in this video we go into the pros and cons of multiple firew...
Site 2 Site VPN part 3 | Palo Alto Firewall Training | Ciphers and Certs
Переглядів 2018 місяців тому
In part 3 (my 100th video) 🎉 We look at fixing the insecure Encryption and Authentication that I had for my IPSEC Tunnels. With that fixed we also switch the IKE from PSK to Certificate based authentication although this is done in a very basic way and only really suitable in a lab environment, it is more to demonstrate the base process and hopefully to expand on the config in later videos. We ...
Dynamic Routing Over VPN | Site 2 Site Part 2 | palo alto firewall training
Переглядів 5768 місяців тому
Configuring Dynamic routing over IPSEC VPN on Palo Alto Firewalls. In this video we take the Site 2 Site VPN configuration and migrate from static routing to dynamic using BGP protocol with no downtime, BGP is the protocol you are most likely to find in enterprise environments for B2B (Business to Business) VPN's and where you are peering for ISP access and point to point with Azure or Aws clou...
Site 2 Site IPSEC VPN Intro to Post Quantum | Palo Alto Training
Переглядів 3509 місяців тому
Site to Site IPSEC VPN although an old subject is still a fascinating one, and of course the security of these connections is always under attack, the ability to intercept a VPN could provide an attacker unlimited information and leverage against an individual or an organisation. In this series we are going to go right through IPSEC VPN and discuss how to make more secure as well as addressing ...
DNS Security IV Monitoring and Confirmation | Palo Alto Training
Переглядів 2189 місяців тому
In the final installment we check to make sure that our DNS lookups are not going to suffer with latency related issues and failures, and how to adjust the timers should you need to, also a quick look at the ACC and the differences between 10.1 and 11.1 when it comes to configuring the timeouts on the latest security subscriptions such as Wildfire and URL Filtering. #paloaltonetworks #paloaltot...
DNS Security III | DNS Over TLS | Palo Alto Firewall Training
Переглядів 3169 місяців тому
Following on from the previous video on DOH (DNS Over HTTPS) this video looks at how we deal with DOT (DNS over TLS), using QUAD9 DNS service to demonstrate not only the configuration but the difference in how the traffic is blocked and dealt with when traffic is decrypted to when it is not decrypted. Although I used Stubby client on this video I must say that I did not have any particular secu...
DNS Security II | DNS over HTTPS (DOH) | Palo Alto Firewall Training
Переглядів 6079 місяців тому
DNS Security II | DNS over HTTPS (DOH) | Palo Alto Firewall Training
DNS Security Subscription | Palo Alto Training | Stopping Malicious DNS Part one
Переглядів 1 тис.9 місяців тому
DNS Security Subscription | Palo Alto Training | Stopping Malicious DNS Part one
Initial Config V | SSL Decryption | Palo Alto Training | Tutorial
Переглядів 7649 місяців тому
Initial Config V | SSL Decryption | Palo Alto Training | Tutorial
Initial Config IV | Palo Alto Training | DHCP DNS and QUIC
Переглядів 2489 місяців тому
Initial Config IV | Palo Alto Training | DHCP DNS and QUIC
Initial Config III | Palo Alto Networks Training | Building Security Profiles
Переглядів 2659 місяців тому
Initial Config III | Palo Alto Networks Training | Building Security Profiles
Initial Config 2 | Security Zones, Rules, NAT | Palo Alto Firewall Training
Переглядів 3349 місяців тому
Initial Config 2 | Security Zones, Rules, NAT | Palo Alto Firewall Training
SSL TLS Profiles | Certificate Generation | Palo Alto Training
Переглядів 1,2 тис.9 місяців тому
SSL TLS Profiles | Certificate Generation | Palo Alto Training
Initial Configuration | Palo Alto Firewalls | Not Unboxing Video
Переглядів 8779 місяців тому
Initial Configuration | Palo Alto Firewalls | Not Unboxing Video
Protect Zones with L3 and L4 Header Inspection | Palo Alto Training
Переглядів 3899 місяців тому
Protect Zones with L3 and L4 Header Inspection | Palo Alto Training
Palo Alto Training | Configuring GRE Point to Point Tunnels
Переглядів 6329 місяців тому
Palo Alto Training | Configuring GRE Point to Point Tunnels
Command Line (CLI) to View Panorama Pushed Configurations | Palo Alto Training
Переглядів 1,3 тис.10 місяців тому
Command Line (CLI) to View Panorama Pushed Configurations | Palo Alto Training
Advanced Wildfire and File Blocking | Palo Alto Firewall Training
Переглядів 55810 місяців тому
Advanced Wildfire and File Blocking | Palo Alto Firewall Training
Advanced Wildfire | Palo Alto Training
Переглядів 1,3 тис.10 місяців тому
Advanced Wildfire | Palo Alto Training
URL Filtering Wildcards | Palo Alto Training
Переглядів 1,2 тис.10 місяців тому
URL Filtering Wildcards | Palo Alto Training
Palo Alto Training | Response Pages URL Filtering and an appeal!
Переглядів 1,7 тис.11 місяців тому
Palo Alto Training | Response Pages URL Filtering and an appeal!
Unfortunately, when executing the command (ChromePass.exe /stext password), the window pops up on the target machine, raising suspicion. I've tried several methods to run the program silently via PowerShell and redirect its output to a file, but without success.
Hi, I have to be honest I sort of changed direction since these early videos, and although I am now moving back toward the Offensive security/White Hat I really couldn't suggest anything to help at the moment that would have any merit, thank you for watching the channel though!
Great content again, I will kindly ask if you have full training on Panorama from designed phase to implementation phase. Thank you!
Hi apologies for the late reply, the filters on UA-cam got messed up (probably my fault) and so it looked like I didn't have any comments, I think a Panorama build video would be a great Idea! I will put it on the list. Thank you for watching!
I love this series and how you do the whiteboard session. This is simply amazing!!!
Thank you for watching! if they really helped I may look at bringing them back.
Have you deployed PA in Azure as cluster? It would be great to see video on it
I sort of have, as in I have been part of a team that was deploying them, I am more than happy to study it through and then create a video if it would be of interest, Azure does seem to be the cloud of choice these days! Thank you for watching, and apologies for the late reply!
Great work! My client is facing this issue with their panorama…. Even moving to 11.1 dis not help. Do not forget to enable aggressive cleaning
So we have been working with TAC on this case and it has been identified as a bug, I appreciate that this comment was 13 days ago so possibly you already know this.... but the bug relates (or it did in our case) to where the Telemetry file is stored, by default it was stored in /tmp which is in the root partition, from >=11.1.5 this location has been moved to fix the problem. Thank you for watching!
Thanks a lot! I'm wondering: Is it also possible to setup an SSL certificate for an IP address instead of a FQDN?
Hi, If I wanted to do that I would add the IP address in the Common Name and as most browsers require a SAN now use the IP address from Subject Alternative Name value to add the IP address in there as well. Hope this helps and thank you for watching!
where is the path upgrade ? or how know the correct path upgrade version to the last version of software?
Palo Alto Documentation is available here docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/upgrade-pan-os/upgrade-the-firewall-pan-os/determine-the-upgrade-path just use the drop down for the version you want to go to.
I would like to know if have interface with just ip and mgmt profile without any sec zone and clear firewall cause its new box i still cannot ping or manage via that interface am i missing something?
If an interface has no security zone it is not routable, in session setup the first check source zone, if you add a zone you should be able to get to it no problem as long as you allow the correct type of traffic, so if it is a physical interface then it would be intrazone if it was a loopback not in the same zone as the physical ingress interface then it would be an interzone rule. Hope that helps! thank you for watching!
Thanks for the details of this video, your contents are top notch.
Nice videos as always, this serving as a great refresher for me, thank you for your amazing job.
This is great, I just got a job on a PaloAlto migration and your youtube videos are going to help me a lot. I will donate to your channel.
Hi Wow, thank you! I am glad it helped so much, thank you as always for watching!
you are very welcome!
I found out about your amazing UA-cam blog and I am very happy I came here. I am heading to your website to learn more about what you do. Thank you!
Hi, Thank you for the awesome comment! and thank you for watching!
IDK, I never get a log entry in the Threat log. Also, if you are blocking quic, it just give a quic error on the browser, most any. So, something aint working the same on 11.2...
Hi I can honestly say that I have never seen a quic error, I suppose if the browser was now trying to force quic instead of falling back that may happen, but that would be browser side not firewall side, interesting though, I will have to look into it more, can you describe the setup you are using to get those results? Thank you for watching!
Thank you for such a brilliant video. Its been a while since I have worked on Palos. This was perfect refresher for me 🙂
Hi, Thank you for the awesome comment! and thank you for watching!
Thanks Mate, is the process still the same when downgrading HA Firewalls? Can we go directly to the CLI and roll back?
Hi As long as you check and take into account any downgrade restrictions/version control from Palo Alto in upgrade/downgraded considerations docs then yes. Thank you for watching!
Sir its very useful......:) becoz i perviously worked on fortinet firewalls thats bit diff we can easily copy paste the command in fortigate
Hi, Glad it helped, I have never worked on Fortinet firewalls to be honest so a bit of a mystery to me! Thank you for watching!
Thank you :)
Thank you for watching!
thank you so much Bro for your good explanation, but i wounder why you have sinkhold all categories, I usually sinkhole all default block categories only.
Hi That is a really good question and really does get to the problem I see with a lot of security practice today, so the categories vary in the potential for malicious traffic, and with this variance comes the need to put the standards and best practice docs largely to one side, I sinkhole the default-paloalto-dns because it is a Palo provided list of malicious or undesirable domains, and as such is best to sinkhole for reporting as well as security purposes, I would also suggest that C&C domains should be blocked as they serve no purpose, the same can be said for Grayware, Malware and Phishing, Parked domains are a grey area and while not really a 100 percent security risk you may want to block it if you were in a high security government organization just in case, but if you are in a low security environment you may not be that bothered, and the extra reporting and logging could just be noise that you want to tune out, same really for Ad tracking, these drop cookies and actively follow users so depending on your security stance I guess that would also be open to interpretation, However when it comes to things like proxy Avoidance and Anonymizers, if this profile was to added to corporate network access then I cannot see why you would want to allow a user to encrypt their traffic and avoid the vast majority of security measures that are in place, but where this profile is added to Guest networks you would most likely allow it as users are more often than not going to be VPN'd back to their corporate networks and will need that traffic allowed. Finally Newly Registered Domains, in todays hyperscaling cloud environments where DNS is crucial and services can be brought online using newly created domains or local domains, you would weigh up the quantity, if there is only a few then the exceptions list could be the way to go, but if there are likely to an exponential amount then you may want to accept the risks with New Domains, reducing the admin overhead. Hope this helps!
thank you for this wonderful video! just a question though, do you have DNS Security license or just the Threat Prevention license in this video?
Hi, I have the DNS security Subscription in this video. Thank you for watching!
@@mode4480 Both licenses can provide these DNS controls, but I think the difference is that the DNS security subscription provides a real-time DNS threat DB update service, whereas with the ordinary threat prevention sub you are limited to the once a day update through the threat prevention signature update? Don't quote me on that but thats from what I can deduce so far, it's not exactly that clear.
Hi, Yes the cloud subscriptions can be a little difficult to understand is it is not very clear at all, I have had a look and come up with the following, Threat Prevention - Locally accessed through Anti-Virus and Wildfire Updates DNS Security - Cloud based analysis and ML as well as DGA/DNS tunneling etc Advanced DNS Security - All DNS Responses are sent to cloud for analysis, on PANOS 11.2 and above there are extra features for Hijacking and Domain Misconfiguration detection, ML and realtime analysis That is what I get from the documentation, hopefully that is somewhere near!
Thank you, clear explanation, however I still cannot find how a way to use variables created in different template.
Once the variable is created in a template the template is the object that is reused then the variable can be assigned a different value depending on the device that template is attached to, as far as I am aware there is no "global" variable type in panorama that could be used independently across templates. Hope this helps and thank you for watching!
thank you for share this content, well done
Thank you for watching!
So is the difference between an interzone and universal rule that with an interzone, the traffic only flows one way (Source Zone A to Dest Zone B but B can't go back to A) but with a universal one it's bidirectional?
Hi, Within the Palo Alto firewall there are two types of traffic flow with regard to zones, either intrazone or interzone, so if we had a rule with A,B and C zones in both the source and the destination a universal rule would allow intrazone traffic to flow (in this case A to A, B to B, C to C) and interzone traffic, A to B or C if we were to use interzone rule type A to A would not be permitted and if we use intrazone rule type, A to A would be permitted but A to B would not. Also when creating intrazone rules the destination zone is greyed out in the policy making the security policy a little easier to read. Hope this helps, and thank you for watching!
Hello! How did you configure the syslog server profile for xsoar, if you can help me.
Hi, I will go back over the config and see if I can put together a quick video showing the configs, do you mean the integration on XSOAR to listen for the logs or the Syslog profile on the firewall or both ? I will try and cover both sides, not sure when it will be but I will try and get one soon. Thank you for watching!
@@mode4480 thank you for your quick response. I figured what was configured from the previous video. Another question would be if I can do this with a panorama integration, or just with the firewall?
Hi, Yes, if you were to send the call to Panorama it would populate the list and then that would be updated on all the managed firewalls using that dynamic address group, the log action however that triggers the chain of events would have to come from a firewall, or potentially if you had log collectors configured and they were forwarding to XSOAR, but due to the fact that they do that in a batch fashion and not in real time that wouldn't be as reactive as from the firewalls. Hope that helps!
Neat explanation. Subscribved for more videos on PAlo alto FW
Thank you very much for watching!
Thank you for taking the time to made this easy to follow video.
Hi, Amazing content. Thanks for sharing your insights. Just a quick question, what is the configuration for Mode44 Decryt Profile? It doesn't appear on any DNS videos. 😐 Thank you.
Hi, Sorry for the delay, I thought I'd make a quick video to go through the decrypt profile, hope it helps! Thank you for watching!
Hi there! I'm have issue with our visitors' network. We need to display custom response pages for prohibited websites based on the URL Filtering Profile and its rules. While blocking works perfectly, the custom response pages for HTTPS sites result in an ERR_CONNECTION_RESET error.
Hi, Are you doing SSL decryption? this can be the cause of the issue you are seeing, just thinking about this, you will also see this if you are sending the handshake to the CTD for inspection, as this stops the connection at the handshake if it is in violation of security policy, this then sends a HTTP Reset and will not serve a response page, this setting can be found under the Setup>Session menu, scroll to the bottom and click on the SSL Decryption Settings. Thank you for watching!
@mode44 Great work you do, do you have any videos about GP and DUO MFA using the integration in PAN? There is little information but it's variable, the options mentioned in some sources from 4 years ago are no longer available. It would be very interesting because it's a bit complicated to find information about the whole process.
Hi, Thank you for the compliment! I don't at the moment, but I setup DUO a long time ago for 2-factor into my XSOAR instance, I can certainly look into it and see what I can put together.
You cut the video at minute 9:24, what problem did you have? I assume that the firewall went down and it took you an hour to recover it, If so, please tell us the error and how to recover it or avoid it?
Hi, Thank you for watching so closely! I think that you must be looking at the last login time and session expire times in the bottom left hand corner of the webui, these are the only time signatures I can see displayed on the video, these are not reflective of the actual time the video was shot just the last time logged in, the only thing I can think is that possibly one firewall was set to GMT and one to UTC (UTC does not have summertime) to account for the hour difference, that video was a long time ago now but I certainly don't remember any hour long recovery session, at 9:24 I am failing over the firewalls, as long as the HA is good (which it was) and the sessions were building there is very little that could go wrong. Thanks for watching!
good work mate. keep it going.... how come you transition from Mode44 to fashion44 :) whats story behind? and other question. PA with DNS proxy in cooperation with X-forward-for? any practical info? as dns proxy, there will be no log from the real IP. any efficient way to find out who is the original requestor. im getting alot of logs hitting sinkhole and would like to know the real originator. thanks in advance
Fashion44 :) is there something I have missed? lol
For the DNS question what I would do is ensure that the sinkhole address is in a zone that means the traffic has to pass through the firewall to get to it, create a rule and log on that or simply run a report for hosts using the sinkhole address for normal traffic say SSL for example, the initial DNS query and DNS security logs will show the proxy as it is the proxy making the DNS lookup but there will also be the hosts that have been given the sinkhole address trying to use it to get out. Hope that is helpful!
my Question related to is it also decrypting Data inside packets ??? if yes then how Financial sites become secure ...anyone can fetch confidential data inside packet ..
Hi, This is more a question of policy, essentially (if I understand your question correctly) SSL decryption rests on the premise that people using a corporate network agree to having their traffic decrypted for inspection purpose based on the fact that they are using somebody else's equipment and infrastructure for work related purposes as opposed to private personal use, so the onus in that case would be on the user to moderate their behavior against what they know is going to be seen, however when it comes to financial information and other privileged data such as health and medical for instance there are multiple laws governing the ability to decrypt this traffic and in every case I am aware of it is deemed illegal and can not be done, therefore the situation would never arise, that is why the no-decrypt policy is as important as decrypt policy. SSL decryption does mean that the traffic would pass through the firewall in plain text so we control what data gets decrypted to ensure the balance of security for users privacy and security and the company providing the infrastructure to the employee / sanctioned user. Hope that helps!
Thank you for the great video. Just quick feedback, there is a static background in the audio. Hope your next video will be crystal clear 🙂
Yep, totally, I heard that on the first pass through but when I checked the final render it seemed to have disappeared, obviously not, will try harder!
This is very helpful - subscribed
Thank you for watching, and a big thank you for subscribing!
@@mode4480 no problem - i work in healthcare and we have palo alto firewalls in our environment HA pair with panorama I want to take my PCNSE any good recommendations on study material?
I would use Tom Piens Book "Mastering Palo Alto networks", and of course the training can be found on Palo Alto's own Beacon platform, it is a good cert to get, good luck with it!
Another great video. Thanks.
Thank you very much!
best video
Awesome, thank you very much for watching!
Excellent video! It provided a comprehensive overview of the pros and cons. Thanks for dedicating your time to creating such valuable content.
Thank you very much for watching!
To do the downgrade (rollback case) is it the same process?
Thanks for the video, it is perfectly explained the upgrade
There are some other considerations depending on how far back you are going, but as a general rule yes, an example of the downgrade advice from Palo for 10.2 to 10.1 for instance can be found here, docs.paloaltonetworks.com/pan-os/10-2/pan-os-upgrade/upgrade-pan-os/upgradedowngrade-considerations#idabba79e8-9c44-4360-b961-db7f118df20a ( I really need to shorten the URLS but I think sometimes they look dodgy ) let me know if you think a video on downgrade would be useful and I can put one together. Thank you very much for watching!
Been using PAs for coming on 10 years, jus started to use Panorama and having incredible issues with address groups not updating. Takes a few attempts but have to check everytime now before I can confidently go bac to user and ask them to check working without making myself look like a fool :-( So frustrating but glad we are not alone in this issue.
I feel your pain! there must be an underlying issue somewhere in the device-group that is causing this, I wonder if it is the inheritance? If you get to the bottom of it please share as Panorama is awesome but does come with it's quirks :-) Thank you for watching!
Thank you for taking the time to make this video. It was easy to follow and understand the concepts.
Thank you very much for watching!
This is the best triaining video specifically for this cert that I've seen
Thank you for watching! XSOAR and by extension XSIAM are awesome platforms, these videos are getting a little old now but I am glad they are still helping
Excellent!
Thank you for watching !
While performing Panorama upgrade you starting with secondary node first but when upgrading firewall you starting with primary node, is there any reason please ?.
Hi When upgrading firewalls there has to be the sessions that are running through that firewall to consider, so in that case I would failover the firewalls to check that there is no issues with traffic while we still have a working known good firewall, this is not the case with Panorama, Panorama is not in the traffic path and therefore we do not have the same considerations as with firewalls, so in this case I would (and have) confirmed that the Panoramas are in sync, check that the firewalls that are connected to one are also showing connected to the other in the HA pair, there is some telemetry between the firewalls and Panorama and so there is some need to make sure that we miss as little information as possible during the upgrade, but for me the most important thing is that the Panorama's are in sync and have the same configuration on both. I have said on other videos that really the process followed is up to the engineer completing the task, for instance simply upgrading the Primary firewall then the secondary would work in theory, but it would be risky, it is the risk tolerance of the engineer and the business that often determines the upgrade procedures, or content updates etc. Hope this helps.
Very Helpful video. Sincere Thnaks.
Thank you for watching!
Congratulations for 100th video, great knowledge 🎉
Thank you for watching !
Nice video, except you didn't explain why the logs would show a verdict of malicious but then shows it as Allowed. When and where do I look to see if it blocked the malicious file. I have a lot of those and cant understand why. Makes no sense to me. I understand maybe the rule allows the connection, but once a file is determined maliscous, shou'd show as blocked
Hi I will admit there is some grey area here that I have not looked into fully since the video, the truth of the matter is that some files that were given the verdict of malicious were then given an allow action but when the file itself was examined although it had completed there was no content to the file, whereas there were other files that did have the action of block, these were exclusively informational severity however. It is worth noting that even in the official Wildfire example from Palo Alto the idea seems to be that once a malicious verdict is determined this allows an admin to block the user involved by virtue of receiving a log of the event, the "Zero day" protection is then based on the fact that a Wildfire signature will be created for the file and that will be available almost immediately based on Wildfire update settings (real-time or 15 minutes are the only ones that make sense) and through Anti-Virus updates at whatever frequency you have them set, meaning that any further occurrences of the malicious file would then be blocked based on signature, these are all provided that the action for the varying signature sources within the Anti-Virus profile are set to do so. Now the question is does this actually provide the Zero-Day protection claimed? well it sort of does but it still requires at least one machine to become infected, there is in version 11.0 and above the option to hold for Wildfire signature lookup which would make more sense to stop even the first person becoming infected, and you could create a log forwarding profile that has a tagging action to block users that trigger Wildfire or Threat log entries to add them to a dynamic block group but you would still have that first infection. The Document with the official Palo Alto Wildfire example can be found here docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-example Hope this helps!
Excellent answer and video. I think the confusion for us is that the session goes through and if it already has a threat signature (threat ID) of any kind, Palo does whatever your security profiles are set to, so you may see a malicious verdict but then its allowed. If you search threat logs, you will find that Palo has already taken an action on the sessions threat pass, so that threat may have been a medium vulnerability with the action of allow for example. So its only new or unknown threats that Wildfire has newly identified with a new signature that it will take a wildfire action based on the anti-virus profile wildfire settings @@mode4480
I think you answered that better than me!
appreciate it. The steps were easy to follow
Thank you for watching!
Congratulation on getting to 100th video. It has been great watching most of your videos. Very insightful and technically sound.
Hey, Thank you, it has been a long journey, hopefully get to move more into automation and Prisma soon!
It’s interesting to see the v11 bug with the redistribution, then going into panorama to see the devices not being shown as out of sync, I thought it was only Fortigates riddled with that many bugs across products!
I really wish it was only Fortigates lol, in fairness to Palo the version 11 box is still quite an early release, they don't seem to get into their stride until around the xx.6.x versions, but yes there are multiple bugs to be found, as a rule if I cannot get something to work through the Webui I tend to try command line, it usually solves the problem, it is odd that you have to commit to Panorama for the templates to be set as out-of-sync and a little annoying too, hopefully they will fix it in a later version.
@@mode4480 yeah I'd agree I'd never really look to deploy anything on an FG that's before an x.4 release but still find little annoying things in later releases too. It was good to see the BGP process though even though the bugs 👍
This is a brilliantly well described video. I'm new to Palo and Panorama so having resources like these are very important to me, I'll look forward to trying this out in my own lab now i've got more of an understanding where to start. I've already bookmarked my next video to watch and subscribed to learn more. Thanks again.
Hi Thank you for the awesome comment! I hope my other videos help too.
does palo allow first time to download the 0 day malware ? and only send a copy to wildfire or it will block at the first time and send it wildfire ? i am wounding palo allow or deny the very first time traffic which is 0 day and no reference DB. thanks
Hi Once Wildfire has executed the sample that has been sent which it can do in multiple environments it can then send a verdict to the firewall, if this verdict is malicious in any way then the firewall should block the traffic, the signature of the sample is then downloaded to the firewall in the Wildfire update and eventually the Threat Content Updates.