Set Up a Data Port for Access to External Services
Decide which port you want to use for access to external services and connect it to your switch or router port.
The interface you use must have a static IP address.
Log in to the web interface.
Using a secure connection (https) from your web browser, log in using the new IP address and password you assigned during initial configuration (https://<IP address>). You will see a certificate warning; that is okay. Continue to the web page.
) The firewall comes preconfigured with a default virtual wire interface between ports Ethernet 1/1 and Ethernet 1/2 (and a corresponding default security policy and zones). If you do not plan to use this virtual wire configuration, you must manually delete the configuration to prevent it from interfering with other interface settings you define.
You must delete the configuration in the following order:
To delete the default security policy, select
Policies > Security, select the rule, and click
To delete the default virtual wire, select
Network > Virtual Wires, select the virtual wire and click
To delete the default trust and untrust zones, select
Network > Zones, select each zone and click
To delete the interface configurations, select
Network > Interfaces
and then select each interface (ethernet1/1 and ethernet1/2) and click
Configure the interface you plan to use for external access to management services.
Network > Interfaces
and select the interface that corresponds to the port you cabled in Step 1.
Interface Type. Although your choice here depends on your network topology, this example shows the steps for
tab, expand the
drop-down and select
In the Zone dialog, enter a
for new zone, for example Management, and then click
tab, select the
radio button, and click
in the IP section, and enter the IP address and network mask to assign to the interface, for example 192.168.1.254/24. You must use a static IP address on this interface.
Advanced > Other Info, expand the
drop-down, and select
New Management Profile.
for the profile, such as allow_ping, and then select the services you want to allow on the interface. For the purposes of allowing access to the external services, you probably only need to enable
and then click
These services provide management access to the firewall, so only select the services that correspond to the management activities you want to allow on this interface. For example, if you plan to use the MGT interface for firewall configuration tasks through the web interface or CLI, you would not want to enable HTTP, HTTPS, SSH, or Telnet so that you could prevent unauthorized access through this interface (and if you did allow those services, you should limit access to a specific set of
Permitted IP Addresses). For details, see
Use Interface Management Profiles to Restrict Access.
To save the interface configuration, click
Configure the service routes.
By default, the firewall uses the MGT interface to access the external services it requires. To change the interface the firewall uses to send requests to external services, you must edit the service routes.
This example shows how to set up global service routes. For information on setting up network access to external services on a virtual system basis rather than a global basis, see
Per-Virtual System Service Routes.
Device > Setup > Services > Global
Service Route Configuration.
For the purposes of activating your licenses and getting the most recent content and software updates, you will want to change the service route for
Palo Alto Updates,
radio button, and select one of the following:
For a predefined service, select
and click the link for the service. To limit the drop-down list for Source Address, select
and select the interface you just configured. Then select a Source Address (from that interface) as the service route.
If more than one IP address is configured for the selected interface, the
drop-down allows you select an IP address.
To create a service route for a custom destination, select
Destination, and click
Add. Enter a
IP address. An incoming packet with a destination address that matches this address will use as its source the Source Address you specify for this service route. To limit the drop-down for Source Address, select a
Source Interface. If more than one IP address is configured for the selected interface, the
drop-down allows you to select an IP address.
to save the settings.
above for each service route you want to modify.
Configure an external-facing interface and an associated zone and then create a security policy rule to allow the firewall to send service requests from the internal zone to the external zone.
Network > Interfaces
and then select the external-facing interface. Select
address (on the
tab), and create the associated
tab), such as Internet. This interface must have a static IP address; you do not need to set up management services on this interface.
To set up a security rule that allows traffic from your internal network to the Palo Alto Networks update server, select
Policies > Security
As a best practice when creating Security policy rules, use application-based rules instead of port-based rules to ensure that you are accurately identifying the underlying application regardless of the port, protocol, evasive tactics, or encryption in use. Always leave the
application-default. In this case, create a security policy rule that allows access to the update server (and other Palo Alto Networks services).
Create a NAT policy rule.
If you are using a private IP address on the internal-facing interface, you will need to create a source NAT rule to translate the address to a publicly routable address. Select
Policies > NAT
and then click
Add. At a minimum you must define a name for the rule (
tab), specify a source and destination zone, Management to Internet in this case (
tab), and define the source address translation settings (
tab) and then click
Verify that you have connectivity from the data port to the external services, including the default gateway, and the Palo Alto Networks Update Server.
After you verify you have the required network connectivity, continue to
Register the Firewall
Activate Licenses and Subscriptions.
Use the ping utility to verify network connectivity to the Palo Alto Networks Update server as shown in the following example. Verify that DNS resolution occurs and the response includes the IP address for the Update server; the update server does not respond to a ping request.
ping host updates.paloaltonetworks.com
PING updates.paloaltonetworks.com (10.101.16.13) 56(84) bytes of data.
From 192.168.1.1 icmp_seq=1 Destination Host Unreachable
From 192.168.1.1 icmp_seq=2 Destination Host Unreachable
From 192.168.1.1 icmp_seq=3 Destination Host Unreachable
From 192.168.1.1 icmp_seq=4 Destination Host Unreachable
After verifying DNS resolution, press Ctrl+C to stop the ping request.
Use the following CLI command to retrieve information on the support entitlement for the firewall from the Palo Alto Networks update server:
request support check
If you have connectivity, the update server will respond with the support status for your firewall. Because your firewall is not registered, the update server will return the following message:
Device not found on this update server