top of page

Network Design with Palo Alto



Background Scenario


ACME Inc., a forward-thinking organization, has its resources strategically deployed across two Azure Regions, facilitating efficient data management and exchange. In addition to their Azure-based resources, ACME Inc. maintains a robust on-premises data center and operates a remote branch, ensuring comprehensive coverage and connectivity across its network infrastructure.


Recognizing the paramount importance of cybersecurity, ACME Inc. has bolstered its network defense by implementing a Next-Generation Firewall (NGFW) from Palo Alto Networks. This move complements their existing Cisco ASA 55XX firewall, which continues to support the MPLS connection through their MPLS provider. This dual-firewall strategy is a testament to ACME Inc.'s commitment to minimizing its attack surface while maintaining robust connectivity.


A key operational requirement for ACME Inc. is the ability for administrators to seamlessly manage both Azure and on-premises resources. This management capability must be accessible from various locations, including the headquarters (HQ), the branch office, and even remotely from home. Furthermore, the administration of the Palo Alto NGFW itself must be versatile, allowing for secure access via HTTPS and SSH protocols from within the network, the HQ, and the branch office.


Project Outline


Part 1: Selection and Deployment of Optimal Security Appliances and Technologies


Objective: To identify and implement the most suitable security appliances and technologies that will fortify ACME Inc.'s network against potential threats.


ACME Network Diagram



Key Actions:


a. Evaluate the current network architecture, identifying potential vulnerabilities and areas for improvement.


Address Scheme Table


b. Select appropriate Palo Alto NGFW models and additional security technologies that align with ACME Inc.'s network requirements.


c. Deploy these solutions strategically across the network, ensuring optimal coverage and performance.


Data Flows of Interest


Part 2: Configuration of Palo Alto Zones


Objective: To establish and configure network zones within the Palo Alto NGFW, enhancing network segmentation and security.


Key Actions:


a. Define network zones based on the organization's structure, including separate zones for the HQ, branch office, Azure resources, and the on-premises data center.


Create L3 interfaces per the Final Project requirements.


b. Implement policies for traffic flow between these zones, ensuring secure and efficient data exchange.


Add created L3 interfaces to zones per the Final Project requirements.


Ethernet 1/1: Internet Connection

Ethernet 1/2: Users network connection

Ethernet 1/3: Extranet servers connection

zones:

Internet

Users Network

Extranet server connection


Creating different zones in a firewall network helps to segment and control network traffic based on security policies and requirements, which can improve overall security posture and reduce the impact of potential security breaches.


c. Configure zone-specific security settings, tailoring firewall rules and inspection levels to the needs of each zone.


Part 3: Configuration of Next-Generation Firewall Security, NAT, and Application-Driven Policies


Objective: To leverage the advanced capabilities of the Palo Alto NGFW for robust security, efficient network address translation (NAT), and application-centric policy enforcement.


Key Actions:


a. Set up advanced firewall features, including intrusion prevention, malware protection, and URL filtering.


Test if the security policy rule is functioning correctly for ICMP traffic by runningC:\home\lab-user\Desktop\Lab-Files> ping 192.168.50.80 <Enter>



b. Configure NAT rules to facilitate efficient and secure use of IP addresses across the network.


It is possible to use a custom port such as port 8080 for Mozilla Firefox in a firewall by configuring the firewall to allow traffic on that port and then configuring Firefox to use that port for its network connections.


c. Develop and implement application-driven policies that align with ACME Inc.'s operational requirements and security posture, ensuring that network traffic is not only secure but also optimally managed in line with business applications.

bottom of page