0% found this document useful (0 votes)
70 views44 pages

PALO

Palo Alto Networks, founded in 2005, is a leading cybersecurity company known for its next-generation firewalls (NGFWs) that provide advanced security by identifying applications, users, and content. Their firewalls utilize innovative features like App-ID, User-ID, and Content-ID to monitor and control network traffic effectively while addressing the limitations of traditional firewalls. With a global presence and over 12,500 customers, Palo Alto firewalls are designed to enhance security without compromising network performance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views44 pages

PALO

Palo Alto Networks, founded in 2005, is a leading cybersecurity company known for its next-generation firewalls (NGFWs) that provide advanced security by identifying applications, users, and content. Their firewalls utilize innovative features like App-ID, User-ID, and Content-ID to monitor and control network traffic effectively while addressing the limitations of traditional firewalls. With a global presence and over 12,500 customers, Palo Alto firewalls are designed to enhance security without compromising network performance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

ABOUT PALO-ALTO

Palo Alto Networks is a leading cybersecurity company, founded in 2005 by Nir Zuk, a well-
known expert in network security.

Next-generation firewalls (NGFWs), which are advanced security devices that can identify
and control over 1,900 applications, not just ports and protocols like traditional firewalls.
Key Innovations:

 App-ID™ – Identifies applications, regardless of port, protocol, or


encryption.
 User-ID™ – Connects network activity to specific users, not just IP
addresses.
 Content-ID™ – Scans content for threats like malware, viruses, and
data leaks.

Global Presence:

 12,500+ customers
 Spread across 55+ countries
 Offers 24/7 support worldwide

Why the Firewall is Placed at the Trust Border:


The gateway or firewall is placed at the boundary between trusted (internal) and
untrusted (external) networks. This is called the "trust border".

 Monitor all traffic coming in and going out


 Enforce security policies, like blocking harmful applications or allowing only certain
users access to specific resources

By seeing everything at this boundary, Palo Alto firewalls can make smart decisions about
what to allow, block, or inspect.

But Today’s Applications Have Changed...

In the past, firewalls could control traffic just based on:

 Ports (e.g., TCP 21 for FTP)


 IP addresses
 Packets

But now, that’s not enough.


Modern applications can:

 Use any port


 Hide inside encrypted traffic
 Mimic other apps to bypass security
 Move across different users and devices

So instead of just looking at port numbers and IP addresses, Palo Alto firewalls focus on:

 Applications instead of ports


 Users instead of IPs
 Content instead of raw packets

The Problem with Traditional Firewalls (and Their Helpers)


Standard firewalls aren't enough to stop modern cyber threats. So, companies started adding
extra tools, or "firewall helpers," to try to fill the gaps.

These "helpers" include:

 IPS (Intrusion Prevention System)


– Detects and blocks attacks and harmful applications.
 Proxy servers with or without Web Filters
– Controls which websites users can access, but only works well on standard ports like
HTTP/HTTPS.
 Network Anti-Virus (AV)
– Scans for and blocks malware (viruses, trojans, etc.).
 QoS (Quality of Service)
– Helps prioritize important traffic like voice or video.

But There's a Catch…

Adding all these tools creates complexity:

 Each tool only sees part of the traffic, so no single tool has a full picture.
 It's expensive to buy and maintain all these separate systems.
 They don’t work well together—more tools = more problems.
 Putting all of this into one device (like a traditional firewall) makes it slow and
inefficient.
Just adding more tools doesn’t fix the problem.
What’s needed is a single, smart security solution that can:

 See everything
 Understand applications, users, and content
 Stop threats in real time

That’s exactly what Palo Alto Networks' next-gen firewall is designed to do.

Next-Generation Firewall – Easy Breakdown


A Next-Gen Firewall (NGFW) is much smarter than old-style firewalls. It doesn't just block or
allow traffic based on ports and IPs—it understands what's actually happening in the traffic.

✅ 1. Application Awareness & Full Visibility

 It sees what applications are being used (e.g., YouTube, Skype, Dropbox), even if they
try to hide.
 This is done with a feature called App-ID, which can identify and control over 1,300+
applications, not just ports.

✅ 2. Built-in Intrusion Prevention (IPS)

 Traditional firewalls need a separate IPS tool.


 Palo Alto includes Content-ID, which gives full threat protection (IPS) inside the
firewall without slowing it down.
 It blocks malware, exploits, and malicious files in real time.

✅ 3. User Awareness (User-ID)

 It doesn't just see IP addresses—it knows who the user is.


 It connects to Active Directory (AD) to apply policies based on users or groups, like
“only HR can access systems.”

✅ 4. Standard Firewall Features Still Included

 It still does all the basics you expect from a firewall:


o Packet filtering
o Stateful inspection
o NAT (Network Address Translation)
o VPNs (IPsec and SSL)

✅ 5. Easy Deployment Options ("Bump in the Wire")

 Can be added to your network without major changes.


 Works in transparent mode, so it fits behind existing firewalls or routers—great for
upgrading security without redesigning the whole network.

In Short:

Palo Alto's Next-Gen Firewall is a powerful all-in-one box


that:

 Knows which apps are being used


 Sees who’s using them
 Scans everything for threats
 Applies smart policies
 Still does all the basic firewall stuff

And it does all this without slowing down your network.


PA-3250 PHYSICAL LAYOUT
PA-3200 Series Firewall – Port Summary

Micro USB Console


Port
MGT Port

LED Indicators
Ethernet Ports (1–12)
SFP Ports (13–20)
USB Port
PA-3250: 13–16 RJ-45 Console
HSCI Port Port
PA-3260: 13–20
HA1-A & HA1-B Ports

QSFP+ Ports (21–24) (PA-3260 only)

System Drive(240GB SSD) Ground Studs


Exhaust Fan Tray

Power Supplies (PS1 & PS2)


Palo Alto Architecture
Palo Alto firewalls are designed to be super fast and
super smart when it comes to securing your network.
They use a special technology called SP3 (Single Pass
Parallel Processing) architecture.

 What is SP3? (Single Pass Parallel


Processing)

SP3 has two main parts that work together:

1. Single Pass Software (Fast & Smart Processing)

This software processes each network packet only once instead


of multiple times.
During that single scan, it checks for:

 ✅ User-ID – Who is sending the traffic


 ✅ App-ID – What application is being used
 ✅ Content-ID – Is there any virus or threat inside?
 ✅ Policy Lookup – Is this allowed based on firewall
rules?
 ✅ Decoding & Signature Matching – Is it safe or
suspicious?

🔄All this is done in one go!


That means less delay, less load, and faster results.

2. Parallel Processing Hardware (Speed at


Hardware Level)

While the software does the smart thinking, the


hardware handles everything in parallel, using
dedicated parts of the firewall. This boosts
performance without slowing anything down.

Separation of Planes = Smooth


Performance

 Control Plane – Handles management, policies, and configurations.


 Data Plane – Handles actual traffic passing through the firewall.
These two planes are separated, so if you're doing heavy work in one (like updating policies), it
won’t affect traffic flow.

Inside the Data Plane – 3 Key Processors

1. Signature/Content Processor
o Detects viruses, malware,
intrusions, and does App-ID checks.
2. Security Processor
o Handles SSL decryption, policy
enforcement, and other security
tasks.
3. Network Processor
o Takes care of routing, NAT, and
layer 3 communication.

Why It’s So Good

 Processes each packet once → Fast & efficient


 Parallel hardware processing → High speed
 Advanced security checks → Safer networks
 Separation of planes → No performance drop under heavy load

Palo Alto Networks – Security Zones)

What is a Security Zone?

Think of a zone as a group or area in your network that you want to apply specific rules to.
Instead of creating rules for each interface, Palo Alto firewalls use zones to apply security
policies.

 Firewall rules (like who can access what) are applied between zones, not interfaces.
 If an interface is not in a zone, no traffic will pass through it.
4 Main Types of Zones in Palo Alto
1. Tap Zone
o Monitors traffic only, no control
o Used with SPAN/RSPAN for packet inspection
o Good for passive monitoring of network traffic
2. Virtual Wire (VWire)
o Also called transparent firewall
o Firewall sits in the path but doesn’t do any routing or switching
o Ideal when you don’t want to change your existing network setup
3. Layer 2 Zone
o Works like a switch
o Interfaces can communicate within the same network (like VLANs)
4. Layer 3 Zone
o Used when you need to route traffic between networks
o Each interface must have an IP address
o This is the most common zone type in enterprise networks

What is a Virtual Router in Palo Alto?


A Virtual Router (VR) is like a built-in router inside the
firewall.
It helps the firewall know how to reach other networks by
using:

 ✅ Static routes (manually added)


 ✅ Dynamic routes (like OSPF, BGP)

Where is it used?

Every Layer 3 interface, loopback interface, and VLAN


interface on the firewall must be linked to a virtual router.

 A virtual router makes routing decisions for those interfaces.


 One interface can belong to only one virtual router at a time.

Why Use Multiple Virtual Routers?

 The firewall can act like multiple routers at the same time.
 This helps when you want to separate departments or customers, like:

 HR traffic uses VR-HR


 Finance traffic uses VR-Finance

 You can even reuse the same IPs in different VRs without conflict. (Perfect for multi-
tenant environments!)

Palo Alto Interface Types & Deployment Modes –


Why it's powerful?

Palo Alto firewalls are very flexible.


You can mix and match different interface types and
deployment modes to fit your network.
That makes network segmentation, monitoring,
and security enforcement super easy!

Physical Interface Modes (How to connect it)

1. Tap Mode

 Like a CCTV camera for your


network.
 It monitors traffic using SPAN
ports on a switch.
 Good for: seeing what’s happening, without changing anything.
 ❗ Can't block or control traffic, just watch.

2. Virtual Wire (V-Wire)

 Think of it like a transparent firewall.


 Sits between two devices
without needing an IP
address.
 Good for: dropping in
the firewall without redesigning your network.
 ✅ Can monitor and control traffic with full features.
3. Layer 2 Mode

 Works like a switch.


 Traffic flows between segments (like
VLANs) within the firewall.
 Good for: securing traffic inside your
network.
 Can use access or trunk ports (802.1Q),
but no routing.

4. Layer 3 Mode

 Works like a router.


 Interfaces have IP addresses and route between
networks.
 Good for: controlling traffic between
different subnets or VLANs.
 Fully supports routing, NAT, DHCP, VPNs,
etc.

5. Aggregate Interfaces

 Combines multiple physical ports into one logical link for higher bandwidth and
redundancy.

6. HA (High Availability)

 Use special interfaces to link two firewalls for redundancy.


 If one fails, the other takes over.

Logical Interface Types (Used inside config)

1. VLAN Interface
o Used in Layer 2 mode to route between VLANs using a Layer 3 gateway.
2. Loopback Interface
o A virtual interface (doesn’t connect to a cable).
o Useful for testing, management, or VPN termination.
3. Tunnel Interface

 Used for VPNs (IPSec/SSL).

4. Decrypt Mirror

 Copies decrypted traffic to a monitoring tool for


inspection (great for SOC/security teams).
(Quick View)

Mode Controls Traffic Needs IP Used For


Tap ❌ No ❌ No Monitoring only
Virtual Wire ✅ Yes ❌ No Inline control, no IP needed
Layer 2 ✅ Yes ❌ (L2) Segmenting VLANs (switching)
Layer 3 ✅ Yes ✅ Yes Routing between networks/subnets

Palo Alto Packet Flow –


Think of the packet flow like a security checkpoint at the airport, where every packet (data)
goes through checks before it’s allowed through. Here's how it works:

1. Ingress (Packet Enters)

 The packet enters the firewall through a physical interface (like Ethernet).
 The firewall checks if the interface and zone are valid.
 If the interface isn’t in a security zone, the packet is dropped.

2. Flow/Session Lookup

 The firewall checks if this traffic already has an existing session.


o If yes ➜ it uses the fast path (skips deep checks).
o If no ➜ it goes to slow path (full inspection).

3. Slow Path (First Time Traffic)

 Full inspection of traffic begins:

 Zone checks
 Policy lookup (matches rules you’ve configured)
 Routing decisions
 NAT policies

If it passes all checks, a new session is created in the firewall.

4. Fast Path (Subsequent Packets)


 Once a session is set up, next packets in the same session go through fast path for
quicker performance.
 Still gets checked for threats, but skips the full slow path steps.

5. App-ID (Application Identification)

 The firewall inspects the packet’s content to detect what application is being used (e.g.,
Facebook, YouTube, BitTorrent).
 Doesn’t just rely on port numbers.

6. Content-ID (Deep Security Check)

 Checks for:

 Viruses
 Spyware
 Malware
 URL filtering
 Data loss (DLP)

Basically, this is the deep security brain of the firewall.

7. Forwarding / Egress

 After passing all inspections, the packet is forwarded to its destination.


 Routing and NAT rules are applied again if needed.

In Short:

1. Ingress – Packet enters


2. Session Lookup – Fast path
or slow path?
3. Slow Path – Deep check if
new
4. Session Setup – Save session
details
5. App-ID – What app is this?
6. Content-ID – Is it safe?
7. Forwarding – Send it out
How to Manage a Palo Alto Firewall
All Palo Alto firewalls come with a dedicated management port
(MGT) — this is used just for managing the device, not for
passing user traffic.

Ways to Access the Firewall

You can manage the firewall using:

 Web Interface – Easy-to-use browser-based GUI


 CLI (Command Line Interface) – For advanced users
 Panorama – Centralized management for many firewalls

You can give the MGT port an IP address manually (static) or get it from a DHCP server.

What If the MGT Port Goes Down?

No problem! You can still manage the firewall through any data interface (the ones that carry
user traffic), but you must explicitly allow this.

Services You Can Enable on Data Interfaces

(Using a Management Profile)

You can choose which services are allowed on each interface.


Examples:

 ✅ HTTPS – For secure web access (enabled by


default)
 ✅ SSH – For remote command-line access (enabled
by default)
 ✅ Ping – For testing connectivity (enabled by default)
 Telnet – Older remote access (not secure)
 HTTP – Unsecure web access
 SNMP – For monitoring
 Response Pages – Shown when access is blocked
 User-ID – For identifying users

To make this work, you create and assign a Management Profile to that interface.
By Default:

If you don’t assign a Management Profile, the firewall will block all management access on
that interface — even ping or web access.

Example Use Case:

You want to manage the firewall using a LAN port if the MGT port fails:
➡ Assign a Management Profile that allows HTTPS and Ping
➡ Apply it to the LAN interface
➡ Now you can still log in if MGT goes down!

What are Service Routes?

By default, Palo Alto firewalls use the Management (MGT) interface to reach out to external
services like:

 DNS (Domain Name System)


 Email servers (for alerts, etc.)
 Palo Alto update servers (for threat updates, firmware, etc.)
 External Dynamic Lists (EDLs)
 Panorama (for centralized management)
 LDAP (for user authentication)

Why Use Custom Service Routes?

Sometimes, you may want these services to go through a different


interface instead of the MGT port — maybe due to:

 MGT not having internet access


 Using a different ISP
 Better routing or performance
 Security policies

That’s where Service Route Configuration comes in.

Example Use Case

You want DNS and updates to go through your Ethernet1/1 interface instead of MGT:

 You go to Device > Setup > Services > Service Route Configuration
 Choose services like DNS, LDAP, Updates, etc.
 Set the "Source Interface" to ethernet1/1
 Set the "Source Address" (e.g., 203.0.112.20)
Now the firewall will send DNS and updates through Ethernet1/1 instead of the MGT port.

What Are Dynamic Updates?


Palo Alto Networks regularly releases updates to protect your network from new and emerging
threats. These updates include:

 Application Updates – New apps or changes in how apps behave (App-ID).


 Threat Updates – New viruses, malware, spyware signatures, and attack patterns (Threat
Prevention).
 GlobalProtect Updates – For VPN and remote access improvements.
 WildFire – New threat intelligence from cloud-based analysis.
 URL Filtering & EDLs – Updates for web filtering and external block lists.

Why Schedule These Updates?

To stay protected, you should automatically download and install these updates regularly
(like every hour or daily), so your firewall is always ready to block the latest threats — even
ones that were just discovered.

How It Works:
✅ Benefits:
1. Go to:
Device > Dynamic Updates  Always up to date
2. Set a schedule for each update type:  Better protection against
o Download Frequency (e.g., every 1 hour) new threats
o Install Immediately after download  No need to manually update
3. The firewall will check Palo Alto's cloud, download the
updates, and install them automatically.

Firewall Configuration Management :


1. Candidate Configuration

When you make changes to a Palo Alto


firewall (like editing policies, interfaces, or
routes), the changes are first stored in a
candidate configuration.
 This config is temporary and resides in the memory of the management (control)
plane.
 It does not affect live traffic until committed.

2. Commit Process

To make the changes active, you must commit them.

 Commit applies the candidate config to the actual firewall operation.


 During commit, the configuration is pushed to the data plane, which handles real traffic.

3. Running Configuration

Once committed:

 The active config becomes the running


configuration.
 It is saved in a file named running-config.xml.
 This is the version of the config the firewall uses to
process live traffic.

4. Why This Method is Useful

 You can review and verify changes before they go live.


 Mistakes can be caught and corrected before affecting production traffic.
 It supports safe and controlled configuration management.

What Are Security Rules?


Security policies (rules) control what traffic is allowed
or denied through the firewall. You can make them
specific (like allowing one app from one IP) or general
(like blocking all traffic from a zone).
Types of Security Rules
1. Intrazone Rule

 Traffic Source & Destination: From same zone


 Default Behavior: Allow
 Example: Traffic between devices in the LAN zone (e.g., PC to Printer).
 You can still customize it.

2. Interzone Rule

 Traffic Source & Destination: From different zones


 Default Behavior: Deny
 Example: Traffic from the LAN zone trying to reach the internet (Trust ➝ Untrust).
 You need to explicitly allow this traffic by creating a rule.

3. Universal Rule

 Traffic: Can apply to both same and different zones


 Useful when you want a single rule to cover multiple situations.

Actions in Security Policies

Action Description
Allow Permits the traffic.
Deny Blocks the traffic without a response.
Drop Silently discards packets (no feedback to sender).
Reset Client Sends a TCP RST to the client only.
Reset Server Sends a TCP RST to the server only.
Reset Both Sends a TCP RST to both client and server (clean termination).

What is the Advanced Routing Engine?


The Advanced Routing Engine in Palo Alto’s PAN-OS helps the firewall do
advanced routing like a full-featured router. It supports both basic and
dynamic routing protocols, which makes it suitable for use in:

 Enterprises
 Data centers
 ISPs
 Cloud environments
What Routing Features Are Supported?

Feature Description
Static Routes Manually set paths for traffic to follow.
BGP Border Gateway Protocol, used between large networks like ISPs.
OSPFv2 / OSPFv3 Open Shortest Path First – for IPv4 (v2) and IPv6 (v3).
RIPv2 An older dynamic routing protocol.
Route Redistribution Shares routes between different routing protocols.
Route Maps & Filters Control which routes go in or out.
Prefix/Access Lists Define what networks or IPs to allow or block in routing.

Virtual Routers = Logical Routers

 On Palo Alto firewalls, "Virtual Routers" are like independent routers inside the same
device.
 You can use multiple virtual routers to separate traffic or clients (e.g., departments or
customers).
 Each VR can run different routing protocols.

Administrative Distance (AD)

When multiple routing options exist to the same destination, the


firewall uses Administrative Distance (AD) to choose the best route.

 Lower AD = More Trusted

Route Type AD Value


Static Route 10
Static IPv6 10
OSPF Internal 30
OSPF External 110
OSPFv3 Internal 30
OSPFv3 External 110
RIP 120 (not shown but standard)
BGP 20 (assumed standard unless changed)

What is NAT?
NAT changes private IP addresses (like 192.168.x.x) into public IP addresses (like 203.x.x.x) so
your internal devices can talk to the internet.
Palo Alto firewalls support NAT
on:
It also hides internal IPs for security
It helps save public IP addresses  Layer 3 interfaces
 Virtual Wire interfaces
1.Source NAT (SNAT)

Used when internal users want to access the


internet.

✅ 1. Dynamic IP and Port (DIPP)

 Many private IPs share one public IP,


but with different ports.
 Example:
o 192.168.1.10 → 203.0.113.5:5001
o 192.168.1.11 → 203.0.113.5:5002

 Great for saving public IPs

Translation Options:

 Address Pool: You define a range (e.g.,


203.0.113.5–203.0.113.10)
 Interface Address: The public IP of the
firewall interface is used for translation

 If the interface gets a new IP (DHCP, PPPoE),


the NAT rule will automatically update.

✅ 2. Dynamic IP

 One-to-one mapping (but dynamically assigned)


 Only IP address is changed — ports are not used
 Each internal IP gets its own public IP from a pool

If the NAT pool is small, and all IPs are in use, new connections get dropped.

Optional Fix: Use "Dynamic IP and Port Fallback" so it uses ports if IPs run out.

Summary Table

TYPE DESCRIPTION USE CASE


DYNAMIC IP & PORT Many-to-one Internet browsing for many users
DYNAMIC IP ONLY One-to-one More control per user/device
Static IP NAT

✅ Source NAT – Static IP

 One-to-one translation of an internal IP to a fixed public IP


 Always the same IP is used
 Best for when an internal device/server needs to go out using a specific public IP

Example:
Your internal server (192.168.1.100) always uses public IP 203.0.113.5 for outgoing traffic.

2.Destination NAT (DNAT)

Used when someone from the internet needs to access


your internal server (like a website or mail server).

✅ Static IP

 Public IP maps permanently to one internal server


 Used for hosting internal services to the public

Example:
Public IP 203.0.113.10 always forwards to 192.168.1.10 (Web Server)

✅ Dynamic IP (with Session Distribution)

 Used with FQDN-based address objects (like server.example.com)


 DNS might return multiple IPs for the FQDN
 Firewall balances traffic among those IPs
 Useful in cloud setups where public IPs change dynamically

3.U-Turn NAT

Used when:

 An internal user accesses an internal server using its


external/public IP

Why?

 Sometimes, DNS gives external IPs even to internal users


U-Turn NAT ensures the traffic goes out and comes back in properly, so internal users can still
access internal servers using public URLs.

Example:

 Internal client: 192.168.1.5


 Tries to access: www.yourcompany.com → (Public IP: 203.0.113.10)
 U-Turn NAT will route that request back to internal web server: 192.168.1.10

Summary Table

Type Use Case


Static Source NAT Fixed public IP for internal device
Destination Static NAT Public can access internal service
Dynamic DNAT (FQDN) For cloud/dynamic IP environments
U-Turn NAT Internal clients access internal servers via public IP

What is the Data Plane?


The data plane is the part of the firewall that handles actual network traffic—it’s where
packets are inspected, forwarded, blocked, or allowed.

Key Components of the Data Plane

To process traffic fast and efficiently, Palo Alto firewalls use different specialized chips and
CPUs in the data plane. Here's a breakdown:

1. Network Processor (Session Offloader CPU)

 Handles network layer tasks like:


o Routing
o NAT (Network Address Translation)
o QoS (Quality of Service)
 Think of it as the fast lane for routing packets.
2. Security Processor (Data Plane CPU)

 Performs security-related tasks such as:


o Policy checks
o SSL decryption
o Session setup
 Helps enforce firewall rules for each session.

3. Content Processor (Signature/Content CPU)

 Deep inspection of traffic:


o Looks for viruses, malware, intrusions
o Runs App-ID, Content-ID, and Threat-ID
 It checks the actual content inside the packets (payload scanning).

Custom Hardware Components

Some chip names you mentioned refer to


specific hardware units (ASICs or FPGAs)
used in Palo Alto firewalls. Here's a simple
mapping:

Chip/Name Function
Octeon General-purpose CPU used for data processing
Marvel Handles physical interfaces like copper and fiber
Petra, Tiger, Liger, Jaguar Specialized ASICs/FPGAs for high-speed packet processing
Copper/Fiber/SFP Types of physical ports used for network connectivity

What is App-ID?
App-ID is Palo Alto Networks’ unique, patented
technology that identifies applications passing through
the firewall — regardless of port number, protocol, or
even encryption (like SSL or SSH).

It lets you create security rules based on actual


applications, not just IP addresses or ports. This makes
the firewall more accurate and secure, especially at Layer 7 (application layer).
How Does App-ID Work?
Application Signatures and Updates
App-ID identifies applications using a
four-step process:  2,000 App-ID signatures
 Grouped into 5 main categories Further split into 40 sub-
1. Protocol and Port Analysis categories (e.g., File sharing, Collaboration, etc.)
 New App-IDs are added weekly (3–5 per week) to keep up with
o First, it looks at the port and evolving applications.
basic protocol to make an
initial guess about the
traffic.
2. Decryption (if needed)
o If traffic is encrypted (SSL or SSH), App-ID decrypts it temporarily (if allowed)
to see what application is
inside. Why is App-ID Important?
3. Application Protocol Decoding
o It checks how the protocol  Better Security: Blocks risky apps like file-sharing tools or remote access
behaves (how the data is software.
structured or communicated) to  Granular Control: Allows specific actions like:
o “Allow Facebook, but block Facebook Chat”
better recognize the app. o “Block unknown applications after hours”
4. Application Signatures & Heuristics  Improved Visibility: You get full insight into what apps are being used on
your network — no more relying only on IPs and ports.
o It uses signatures (predefined
patterns) and heuristics
(behavioral analysis) to accurately identify the application.
o For example, it can tell whether the traffic is Skype, Facebook, Webex, etc.,
even if they’re all using port 443.

SSL (Secure Sockets Layer)


Feature SSL TLS
Full Form Secure Sockets Layer Transport Layer
Security
Developed Netscape IETF
By
Versions SSL 1.0–3.0 (Deprecated) TLS 1.0–1.3 (Latest: TLS
1.3)
Security Less secure More secure
Performance Slower, outdated Faster, improved
cryptography encryption
Current Use Deprecated, not Actively used, industry
recommended standard
Compatibility Old systems Modern systems
Why SSL/TLS Is Important
✅ 1. Protects Data in Transit

 SSL (Secure Sockets Layer) and TLS (Transport Layer Security) encrypt data when it's
sent between a user's browser and a website or service.
 This prevents hackers from reading sensitive information like:
o Passwords
o Credit card numbers
o Personal details

✅ 2. Builds Trust Real Stats:


 When a website uses
 85–95% of internet traffic is now encrypted.
SSL/TLS (shows or  70% of malware campaigns use encryption to hide from
"HTTPS"), users feel safe security tools (Gartner).
and trust the site.  Modern protocols (TLS 1.2, TLS 1.3) and HTTP/2 are the
 Without it, modern new standards.
browsers show “Not  Free SSL certs (e.g., via Let’s Encrypt) have made it easy for
Secure” warnings. anyone—even attackers—to use encryption.

✅ 3. Required for Compliance

 Industries like banking, healthcare, and e-commerce require encryption for legal and
compliance reasons (e.g., GDPR, HIPAA, PCI-DSS).

The Hidden Danger: Encrypted Traffic Can Carry Malware


Even though SSL/TLS is good for
security, attackers use it against The Solution: Decryption + Inspection
you by hiding threats inside
encrypted traffic.  Firewalls like Palo Alto Networks NGFW can decrypt
SSL/TLS traffic, scan it for threats, and then re-encrypt it
How It Works: before sending it to the user.
 This process:
1. A hacker uploads a o Blocks malicious downloads
malicious file to a website o Detects hidden malware
over HTTPS. o Protects users even if traffic is encrypted
2. A user downloads it thinking it's safe
because it's from a "secure" site.
3. The malware bypasses inspection because
the firewall can’t see inside the encrypted
content.
4. The malware infects the user’s device and
starts stealing data or damaging the network.

Why Decrypt Traffic at All?


When data (like emails, web browsing, apps) travels on your network, it's often encrypted using
HTTPS or other secure methods. That’s great for privacy, but if you can't see inside the
encrypted traffic, you can't inspect it for threats like malware or data leaks.

To solve this, companies use tools that decrypt, check, then re-encrypt the traffic.

1.Web Proxies

 Think of a web proxy like a traffic inspector standing between your browser and the
internet.
 It can decrypt your traffic, look inside for anything bad,
then re-encrypt and send it out.
 Works only for web traffic (like sites using
HTTP/HTTPS).
 Can’t inspect traffic from other apps like Microsoft Office
365, which use more than just web ports.
 Requires setting it up in the browser or using a config file.
 Adds extra steps in troubleshooting if users face issues.
2.Application Delivery Controllers (ADCs)

 ADCs are used to handle and optimize app


traffic.
 Usually, two devices are used:
o One to decrypt
o One to re-encrypt
 Risk: Once traffic is decrypted, it travels
unencrypted between the devices.
 If someone is snooping on the internal
network (like a hacker), they could steal or
change the data.

3.Next-Gen Firewalls (NGFWs) & SSL Appliances

 These are advanced firewalls that can:


o Decrypt, inspect, and re-encrypt traffic
o Work with more than just web traffic
 NGFWs are more versatile than web proxies.
 SSL appliances do a similar job but are focused mainly on
handling encrypted (SSL/TLS) traffic.

 Palo Alto NGFW decrypts and inspects all kinds of traffic (web + non-web) securely inside
the firewall, giving full visibility and protection — without compromising on encryption
standard

Visual Summary:

Tool What it Does Traffic Type Risk Setup


Web Proxy Decrypts only web HTTP/HTTPS Limited visibility Browser setup
traffic needed
ADC Handles app App-specific Data unencrypted Complex
delivery + decrypts between devices setup
NGFW / SSL Full inspection of All (not just More secure More
Appliance all types of traffic web) integrated

1.Without SSL Decryption

 When SSL is used, the firewall sees only the outside of the packet (just the destination,
not the content).
 It's like looking at a sealed envelope — you know where it’s going, but not what’s
inside.
 ❗Problem: Hackers and malware can hide inside encrypted traffic, and the firewall won’t
catch them.

2.With SSL Decryption (on Palo Alto)

 Palo Alto firewall can temporarily decrypt the SSL traffic:


o Opens the packet securely
o Inspects the content for bad stuff (malware, data leaks, unknown apps)
o Then re-encrypts it before sending it out
 Now the firewall acts like a secure checkpoint:
o It sees the real content
o It can stop hidden threats
o It gives full visibility into apps, websites, and user behavior

What You Can See With SSL Decryption

Without SSL Decryption With SSL Decryption


Just destination IP/domain Full website URL, file downloads, keywords
No visibility into hidden apps Detect apps like Psiphon, Tor, or tunnels
Missed threats inside HTTPS Malware & data theft detection inside SSL

Step-by-Step: How SSL Decryption Works


on a Firewall
When a client (like a user's browser) connects to a secure
website (https://), here's how the firewall decrypts and
inspects the traffic without the client or server knowing
anything changed.

1.Client Sends Client Hello

 This is the first step in any SSL/TLS handshake.


 The client (browser) sends a Client Hello message to start the secure connection.
 This message includes:
o Supported SSL/TLS versions
o Supported encryption algorithms (ciphers)

2.Firewall Intercepts the Connection


 The firewall intercepts this Client Hello — it doesn't let it reach the real server yet.
 Now, the firewall pretends to be the client, and sends its own Client Hello to the real
server, using the settings from the firewall’s SSL Decryption Policy.

3.Server Responds with Server Hello

 The real server replies to the firewall with a Server Hello, which includes:
o The selected TLS version
o The encryption method to use
o The server's digital certificate

4.Firewall Validates the Server Certificate

 The firewall checks the server’s certificate to see if it’s valid and trusted.
 If the certificate is invalid (expired, untrusted, etc.), the firewall blocks the connection.

5.Firewall Creates a Dynamic Certificate

 If the server certificate is valid, the firewall creates a fake certificate called a dynamic
certificate.
 This dynamic certificate:
o Is made to look exactly like the real server’s certificate (same domain, etc.)
o Is signed by the firewall’s root certificate

This is why the client must trust the firewall’s root certificate — it's like
saying: "I trust this firewall to sign secure certificates on my behalf."

6.Firewall Sends Server Hello to the Client

 The firewall sends this dynamic certificate to the client.


 To the client, it looks like it’s talking to the real server — but it’s actually talking to the
firewall!

7.Connection is Established
 The client trusts the certificate (because the firewall’s root cert is installed on the
client).
 The secure TLS connection is established.
 The firewall can now:
o Decrypt the traffic
o Inspect it for threats
o Re-encrypt it and send it to the real server

1.Outbound SSL Decryption (SSL Forward Proxy)


When users inside your network visit secure websites (like https://google.com), the firewall
sits in the middle.
It pretends to be the website, so it can see and check what’s inside the encrypted traffic.
To do this, the firewall quickly creates a fake certificate for that website, using the same
validity period as the real one.

2.Inbound SSL Decryption


When someone from the internet is visiting your internal website (like
https://yourserver.com),
you give the firewall a copy of the website's certificate and private key.
That way, the firewall can decrypt the traffic, check it, and then forward it to your web server
safely.

Generating a Self-Signed Certificate


To decrypt HTTPS traffic, the firewall needs to act like a Certificate Authority (CA)—just like
trusted certificate companies do.
You can either:

 Create a self-signed CA directly on the firewall


 Or import one from your internal PKI system

Then you assign:

 A Forward Trust Certificate (for safe/trusted sites)


 A Forward Untrust Certificate (for risky/untrusted sites)

This helps the firewall securely create fake certificates for inspection while keeping your users
safe.
Public Key Infrastructure (PKI)
PKI is a system that helps prove who someone is online using digital certificates.
It makes sure the public key you're using actually belongs to the person or website you think it
does.

CA Hierarchy (Certificate Authority Hierarchy)


Think of it like a family tree of trust:

1. Root CA
o The top-level, most trusted
certificate authority
o Rarely used directly—signs
Intermediate CAs
o Stored safely, like a crown jewel
2. Intermediate CA
o Certified by the Root CA
o Does the real work: signs
certificates for websites and
devices
o Helps keep the Root CA safe
3. End-Entity Certificates (like websites, servers)
o Issued by the Intermediate CA
o These are the certificates you see on websites like https://example.com

Certificate DB (Database)
 This is where the firewall or system stores all certificates it uses or trusts.
 The Palo Alto firewall uses this to store and manage X.509 certificates, which are
standard digital certificates in PKI.

A Certificate = Public Key + Identity

It’s like an ID card that says:

"This public key belongs to www.google.com, and it was verified by a trusted CA."
What is User-ID?
In modern networks, people use multiple devices—laptops, phones, tablets—and their IP
address keeps changing (because of DHCP).
So, if you try to track users based on IP address, it becomes very confusing and unreliable.

User-ID Solves This Problem

User-ID is a feature (like in Palo Alto firewalls) that helps the firewall connect a username to
an IP address.
This way, instead of saying:

“Block IP 192.168.1.25”
you can say:
“Block Vishu from using YouTube”

No matter which device Vishu is using or what his IP address is today, the firewall knows it’s
him.

How it works

 User logs in to a system (like Windows, AD, etc.)


 User-ID Agent or firewall sees that login and maps the username to the IP address
 Now, the firewall can track and apply policies based on username

Why it’s helpful

 Easier tracking of user activity


 Better security policies
 Works across multiple devices and changing Ips

Why We Need User Mapping


To apply security policies based on usernames, the firewall needs to know which user is using
which IP address.

1. Server Monitoring

 A special agent watches login events on Windows servers (like Domain Controllers or
Exchange Servers).
 When a user logs in, it maps the username to the IP address using those logs.
 Can be done using a User-ID agent on the firewall or a separate Windows-based
agent.

2. XFF Headers (X-Forwarded-For)

 If traffic goes through a proxy, the firewall might only see the proxy’s IP, not the real
user’s IP.
 The proxy can add an XFF header that shows the real IP of the client.
 The firewall reads this header to map the user correctly.

3. Port Mapping (Terminal Server Environments)

 In environments like Citrix or Terminal Servers, many users share one IP address.
 The solution: track the source port each user is using.
 Requires installing the Palo Alto Terminal Server Agent to track user-to-port
mappings.

4. Syslog Parsing

 Devices like Wi-Fi controllers, proxies, NAC, 802.1x, etc., log user activity.
 You configure them to send syslog messages to the firewall.
 The firewall reads the logs and maps usernames to IPs based on login/logout events.

5. GlobalProtect

 For remote/mobile users, GlobalProtect VPN can collect the user login info.
 This info is added to the User-ID table on the firewall.
 Keeps visibility and control even when users aren’t on-prem.

6. Authentication Policy & Captive Portal

 If nothing else works (e.g., user is on Linux, or not logged into AD),
 The firewall can ask the user to log in via a browser (Captive Portal).
 Once the user logs in, the firewall maps the username to the IP.
Threat Prevention Technologies (Firewall Features)
These features are all about protecting your network from viruses, malware, hackers, and data
leaks.

1. Antivirus

 Stops viruses, worms, Trojans (common


malware).
 Works in real-time, scanning data as it
flows through the firewall.
 Protects many protocols:
HTTP, SMTP, IMAP, POP3, FTP, SMB
 Blocks infected files before they reach the user.

2. Anti-Spyware

 Stops spyware from talking to hacker-controlled servers (called C2 servers).


 Detects malware trying to send data out of your network.
 Blocks things like keyloggers, browser hijacks, and remote control tools.

3. Vulnerability Protection

 Blocks attacks that try to exploit software bugs, like:


o Buffer overflows
o Remote code execution
o Denial of Service (DoS)
 Protects against attacks trying to enter the network.
 Complements Anti-Spyware, which protects what's already inside.

4. URL Filtering

 Every website belongs to a category (e.g., Social Media, Malware Sites, Adult, etc.).
 The firewall can:
o Allow (whitelist)
o Block (blacklist)
o Warn or log based on category
 Helps stop users from visiting malicious or phishing websites.

5. File and Data Filtering

 Controls what types of files are allowed in or out (e.g., .exe, .pdf, .zip)
 Filters files inside applications (e.g., block file upload in WhatsApp Web but allow chat)
 Can detect and block sensitive data like:
o Credit card numbers
o Social Security numbers
o Custom keywords or patterns
 Helps prevent data leakage or unauthorized file transfers.

☁ WildFire Analysis –
What is WildFire?

WildFire is a cloud-based system used by Palo Alto Networks firewalls to detect unknown or
new malware.

Instead of only relying on known virus signatures, it analyzes the behavior of suspicious files
in a safe virtual environment (sandbox).

How It Works

1. A user downloads or receives a file (email, web, etc.)


2. The firewall checks:
o Is this file already known
to be good or bad?
o If it’s unknown, it is sent
to WildFire.
3. WildFire runs the file in a virtual
machine and watches what it
does.
o Does it try to encrypt files
(ransomware)?
o Does it try to steal data or
connect to a hacker
server?
4. If it acts like malware, it’s classified as malicious and shared with other firewalls
worldwide.
What It Protects Against

 Zero-Day Exploits – brand-new attacks no one has seen before


 Advanced Persistent Threats (APTs) – stealthy, long-term attacks
 Unknown Malware – files not yet identified in antivirus databases

Why It's Powerful

 Doesn’t just look at file names or signatures


 It looks at what the file actually does
 Updates the global threat intelligence in minutes

What is Zone Protection?


 Zone Protection is like a security shield at the network edge (your internet-facing
zone).
 It protects against Denial of Service (DoS) attacks like:

1. Flood attacks (too many packets)


2. Reconnaissance scans (attackers scanning your network)
3. Packet-based attacks (malformed or spoofed packets)

1. Flood Protection
Flood attacks try to overwhelm a system with too many requests.
Palo Alto firewalls use two smart techniques to stop this:

1. Random Early Drop (RED)

 Used for UDP, ICMP, and IP-based floods.


 Once traffic crosses a certain threshold, the firewall randomly
drops some packets to reduce the load.
 Think of it like a traffic controller that starts stopping a few cars early before a full
traffic jam happens.

2. SYN Cookies

 Used for TCP SYN flood attacks.


 Works like a traffic checkpoint:
o When a device sends a SYN to start a connection, the firewall doesn't forward it
right away.
o It replies with a SYN-ACK containing a hidden cookie (a kind of code).
o If the sender is legit, it replies with an ACK + the cookie.
o Then the firewall forwards the connection to the actual server.
 Only valid traffic gets through.

Note: Don't turn on SYN Cookies if your firewall’s CPU is already heavily used—it may
slow things down even more.

2.Reconnaissance Protection

Stop attackers from scanning your network to find open ports or active devices.

Types of Scans Blocked:

 TCP Port Scan: Scanning many TCP ports.


 UDP Port Scan: Scanning many UDP ports.
 Host Sweep: Scanning many IP addresses.

Actions Firewall Can Take:

 Allow: Let the scan happen (not recommended).


 Alert: Just send an alert if a scan happens (default setting).
 Block: Drop packets from the attacker for a short time.
 Block IP: Block attacker’s IP completely for some time.

Key Settings:

 Interval (sec):
Time window (like 60 seconds) to watch for scan activity.
 Threshold (events):
Number of scan attempts (like 50 ports) before action is taken.
 Source Address Exclusion:
IPs you trust (like IT admin systems) can be excluded from being blocked.
 Of course! Here's a simple and short explanation like before:
 Of course! Here's a short and easy explanation like before:

TCP and ICMP Drop Protection
Protect the network by dropping weird or dangerous TCP and ICMP packets that hackers
might use.

TCP Drop Protection:

Check What It Means What Firewall Does


Mismatched TCP Overlapping bad TCP data ❌ Drops it
Segment
Split Handshake Not using 3-way handshake properly ❌ Drops it
TCP SYN with Data SYN packet wrongly contains data ❌ Drops it
TCP SYN-ACK with Data SYN-ACK packet wrongly contains ❌ Drops it
data
Reject Non-SYN TCP First TCP packet is not SYN ❌ Drops it
Asymmetric Path Out-of-order TCP packets ❌ Drops or
Bypasses
TCP Timestamp Remove extra timestamp info Strips it out
TCP Fast Open Remove fast open tricks from Strips it
handshake
MPTCP Options Remove multi-path TCP options Strips it

ICMP Drop Protection:

Check What It Means What Firewall Does


Ping ID 0 Ping with wrong ID (0) ❌ Drops it
ICMP Fragment Broken up ICMP packet ❌ Drops it
Large ICMP (>1024B) Oversized ICMP packet ❌ Drops it
Embedded Error ICMP error inside another packet ❌ Drops it
Suppress TTL Expired Stop sending "time expired" messages Stops it
Suppress Frag Needed Stop sending "need to fragment" messages Stops it

3. Packet-Based Attack Protection


Protect the firewall and network from bad or suspicious packets that can cause harm.

What the Firewall Checks:

Attack Type What It Means What Firewall Does


Spoofed IP Address Packet comes from the wrong place ❌ Drops it
Strict IP Check Source or destination IP is wrong/malformed ❌ Drops it
Fragmented Traffic Packet is broken into parts ❌ Drops it
IP Option Drop Special IP tricks used in attack packets ❌ Drops them

Specific IP Options Blocked:

IP Option What It Does Action


Strict Source Routing Packet tries to define its path strictly ❌ Drop
Loose Source Routing Packet suggests a flexible path ❌ Drop
Timestamp Packet tries to record time at each router ❌ Drop
Record Route Packet records each router it passes ❌ Drop
Security Special security tags in the packet ❌ Drop
Stream ID Special packet stream IDs used ❌ Drop
Unknown Unknown or suspicious packet options ❌ Drop
Malformed Packet is incorrectly made (bad format) ❌ Drop

 The firewall checks every packet for anything weird, wrong, or dangerous and drops
it immediately to protect the network.

Protocol Protection and Ethernet SGT Protection (Palo Alto


Firewall)
Protocol Protection:

 Normally, firewalls allow non-IP protocols (old networking protocols) between Layer 2
zones (like switches or virtual wires).
 Examples of non-IP protocols:
➔ AppleTalk, Novell, Banyan, NetBEUI, etc.
 Protocol Protection lets you control:
o Include (allow) certain non-IP protocols
o Exclude (block) certain non-IP protocols
 This keeps your network clean and safe from old/unwanted protocols.

Ethernet SGT Protection:

 In Cisco TrustSec networks, devices get a Security Group Tag (SGT) — a small ID tag
(16 bits) attached at Layer 2.
 Firewalls can read SGT tags inside the Ethernet frames (Ethertype 0x8909).
 You can configure the firewall to block packets with unwanted SGT values.
 Helps in controlling which groups/devices can enter specific network zones.
 Protocol Protection = Control old, non-IP traffic.
 Ethernet SGT Protection = Control access based on Cisco security tags at Layer 2.

What is a VPN?
A VPN lets you send private data over the public internet in a safe and secure way.

Why We Need a VPN

Imagine you have two office branches in


different cities.
They both use the internet to connect,
but you don’t want anyone else to see
your company’s internal traffic.

That’s where VPN comes in.

How It Works

 A VPN creates a secure tunnel between two locations or users.


 All your data is encrypted (locked) before it leaves.
 Even if someone on the internet intercepts it, they can’t read it.
 On the other end, the data is decrypted (unlocked) safely.

What VPN Provides

 Data Confidentiality → Keeps your information private


 Data Integrity → Makes sure your data is not changed or tampered with
 Lower Cost → Uses public internet instead of expensive leased lines
 Secure Remote Access → Allows employees to connect securely from anywhere

Example Use Cases

 Connecting office branches securely


 Allowing remote workers to access company files safely
 Protecting data when using public Wi-Fi (like in cafes or airports)
Types of VPN Connections
When using a VPN, there are mainly two types based on your description:

1. Site-to-Site VPN
 Purpose: Connects whole office networks together (for example, HQ to branch offices).
 How:
o Each office (HQ and branches) has its own firewall/router.
o A VPN tunnel is created between the devices over the internet.
 Result:
o It feels like all offices are part of one big private network, even though they are
in different cities.

Example from your case:

 Headquarters in Bangalore
 Branch Office Pune
 Branch Office Delhi
All connected with VPN tunnels securely through the internet.

2. Remote Access VPN


 Purpose: Connects individual users (working from home, traveling, etc.) securely to the
company’s internal network.
 How:
o The user’s laptop or phone runs a VPN client software.
o It creates a VPN tunnel directly to the HQ (Data Center).
 Result:
o The remote user gets secure access to company resources, just like sitting inside
the office.

Example from your case:

 A remote employee connects to the Data Center in Bangalore over the internet using a
VPN tunnel.

Summary Table
TYPE WHO CONNECTS PURPOSE
SITE-TO-SITE VPN Office to Office (HQ ⇄ Branch) Connect entire networks
REMOTE VPN User to Office (Laptop ⇄ HQ) Secure access for individuals
What is Cryptography?
Cryptography is the science of securing information so that only the right people can read or
understand it.
It protects your data when you're sending it over the internet or storing it somewhere.

Key Terms in Cryptography


Term Simple Meaning
Encryption Turning normal data into secret code using a key.
Decryption Turning the secret code back to normal data using a key.
Plaintext The original data before encryption (readable).
Ciphertext The encrypted version of the data (looks like random text).
Hash A unique digital fingerprint of the data, created using a math formula. It can't be
reversed back to the original data.

Two Types of Encryption


1. Symmetric Encryption

 Uses the same key to encrypt and decrypt data.


 Example: You lock and unlock a box with one single key.
 Fast and uses less data.

Problem: How do you safely send the key to someone else?

2. Asymmetric Encryption

 Uses two keys:


o Public key to encrypt
o Private key to decrypt
 Example: Anyone can lock the box using your public key, but only you can unlock it
with your private key.
 Very secure, especially for sharing over the internet.

Slower and the encrypted message is larger in size.


What is Cryptography?

 Cryptography is a way to secure communication.


 It hides information from hackers and makes sure only the right people can see it.

Important Terms:

 Encryption: Turning normal data (plaintext) into secret code (ciphertext) using a key.
 Decryption: Turning the secret code (ciphertext) back into original data.
 Plaintext: Normal readable data.
 Ciphertext: Encrypted, unreadable data.
 Hash: A special unique number created from data. (Used for verifying data integrity.)

Types of Encryption:

Symmetric Encryption Asymmetric Encryption


Same key for encrypt & decrypt Key pair (Public Key + Private Key)
Fast Slower
Small ciphertext Bigger ciphertext
Problem: How to safely share the secret No key sharing problem (public key can be shared
key? freely)
Example: AES, DES, 3DES Example: RSA, DSA, ECC, DH

Popular Encryption Algorithms:

Symmetric Algorithms:

o DES: Old, 56-bit key (weak today)


o 3DES: Stronger, uses 3 keys
o AES: Modern, very strong (128/192/256-bit key)

Asymmetric Algorithms:

o RSA: Very popular for secure communication


o DSA: Used for digital signatures
o ECC: Newer, faster, smaller keys
o DH (Diffie-Hellman): Used for securely exchanging keys

In Short:

Symmetric = one key, Asymmetric = two keys (public/private).

AES is the best for fast encryption, RSA/ECC are best for secure key exchange.

You might also like