Palo Alto Networks Cybersecurity Essentials V9

3y ago
75 Views
3 Downloads
833.71 KB
26 Pages
Last View : 6d ago
Last Download : 3m ago
Upload by : Louie Bolen
Transcription

Palo Alto Networks Cybersecurity Essentialsv9.0Installation and Configuration GuideDocument Version: 2020-07-10Copyright 2020 Network Development Group, Inc.www.netdevgroup.comMicrosoft and Windows are registered trademarks of Microsoft Corporation in the United States and other countries.NETLAB Academy Edition, NETLAB Professional Edition, and NETLAB are registered trademarks of Network Development Group, Inc.VMware is a registered trademark of VMware, Inc. Cisco, IOS, Cisco IOS, Networking Academy, CCNA, and CCNP are registeredtrademarks of Cisco Systems, Inc.

PAN9 Cybersecurity Essentials Pod Installation and Configuration GuideContents12345Introduction . 31.1 Introducing the Palo Alto Networks Cybersecurity Essentials v9.0 Pod . 3Planning. 42.1 Pod Creation Workflow . 42.2 Pod Resource Requirements . 52.3 ESXi Host Server Requirements. 52.4 NETLAB Requirements . 52.5 NETLAB Virtual Machine Infrastructure Setup . 62.6 Software Requirements . 62.7 Networking Requirements . 62.7.1 Pod Internet Access . 72.7.2 Completing the NETLAB Pod Internet Access and Use Agreement . 7Software and Licenses . 83.1 Obtaining Palo Alto Networks Software Licenses . 83.2 Downloading OVF Files. 8Master Pod Configuration. 94.1 Deploying Virtual Machine OVF/OVA Files . 94.1.1 Modify Virtual Machines. 104.2 NETLAB Virtual Machine Inventory Setup. 114.3 Building the Master Palo Alto Networks Cybersecurity Essentials v9.0 Pod . 134.3.1 Enabling Labs in Course Manager . 134.3.2 Create the Master Pod . 134.3.3 Attach Virtual Machines to the Master Pod . 144.3.4 Create Snapshots for the Master Virtual Machines . 154.3.5 Set the Revert to Snapshot . 184.3.6 Bring the Master Pod online . 194.4 Make changes to the Master Pod . 194.4.1 Virtual Machine Credentials . 194.4.2 Create Class and Schedule the Master Pod . 204.4.3 License the Firewall. 204.4.4 Shut Down the Firewall . 204.4.5 Reset the NICs to SAFETY NET . 214.4.6 Create Snapshot on the Changed Master Virtual Machine . 214.4.7 End Reservation . 21Pod Cloning . 225.1 Linked Clones and Full Clones . 225.2 Creating User Pods . 225.3 Copying Your Master Pod to the Second Host . 245.4 Creating User Pods on the Second Host . 265.5 Assigning Pods to Students, Teams, or Classes . 267/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 2

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide1IntroductionThis document provides detailed guidance on performing the installation andconfiguration of the Palo Alto Networks Cybersecurity Essentials v9.0 pod on theNETLAB VE system.1.1Introducing the Palo Alto Networks Cybersecurity Essentials v9.0 PodThe Palo Alto Networks Cybersecurity Essentials v9.0 pod is a 100% virtual machine podconsisting of four virtual machines. Linked together through virtual networking, thesefour virtual machines provide the environment for a student or a team to perform thePalo Alto Networks Cybersecurity Essentials v9.0 labs.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 3

PAN9 Cybersecurity Essentials Pod Installation and Configuration GuidePlanning2This guide provides specific information pertinent to delivering the Palo Alto NetworksCybersecurity Essentials v9.0 pod. The NETLAB Remote PC Guide Series provides theprerequisite guidance for setting up your VMware infrastructure, including: An introduction to virtualization using NETLAB Detailed setup instructions for standing up VMware vCenter and VMware ESXiVirtual machine and virtual pod management concepts using NETLAB This document assumes that you have set up virtual machine infrastructure inaccordance with the NETLAB Remote PC Guide Series. The planning information belowrefers to specific sections in the Remote PC Guide when applicable.2.1Pod Creation WorkflowThe following list is an overview of the pod setup process.1. Obtain the master virtual machine images required for the master pod.2. Deploy the master virtual machine images to your VMware vCenter Appliance.a. Deploy virtual machines using Thin Provisioning to reduce storageconsumption.b. Make necessary adjustments to each virtual machine in the environment.i. Insert/Verify manual MAC addresses.ii. Change the default network to SAFETY NET.iii. Any other configuration changes mentioned in this guide.3. Import the deployed virtual machines to the NETLAB Virtual MachineInventory.4. Activate or license the required software on each virtual machine whenprompted.5. Take a snapshot of each virtual machine in the master pod labeledGOLDEN MASTER after all configurations and licensing have taken effect. TheGOLDEN MASTER snapshot is used to clone virtual machine images for the userpods.6. Use the NETLAB Pod Cloning feature to create student pods from the masterpod.7. If multiple hosts are used in the NETLAB environment, make a Full Clone of themaster pod on the initial host (Host A) to the subsequent host (Host B) and so onusing the NETLAB Pod Cloning feature.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 4

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide2.2Pod Resource RequirementsThe Palo Alto Networks Cybersecurity Essentials v9.0 course will consume 35.1 GB ofstorage per each master pod instance.The following table provides details of the storage requirements for each of the virtualmachines in the pod.Virtual MachineClientDMZFirewallVRouterTotal2.3OVF/OVA3.4 GB1 GB9.5 GB1 GB14.9Initial Master Pod(Thin Provisioned)8 GB2.7 GB22.2 GB2.2 GB35.1ESXi Host Server RequirementsPlease refer to the NDG website for specific ESXi host requirements to support virtualmachine delivery: The deployment of the Palo Alto Networks Cybersecurity Essentials v9.0 pod requiresVMware ESXi version of 6.0 or greater.The number of active pods that can be used simultaneously dependson the NETLAB product license and the number of VMware ESXi hostservers meeting the hardware requirements specifications.For current ESXi server requirements and active pod count, refer to the mote pc.html#vm host server specifications.2.4NETLAB RequirementsInstallation of Palo Alto Networks Cybersecurity Essentials v9.0 pods, as described in thisguide, requires that you are running NETLAB VE.Previous versions of NETLAB do not support requirements for the Palo AltoNetworks Cybersecurity Essentials v9.0 course on the physical host servers.Please refer to the NETLAB Remote PC Guide Series.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 5

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide2.5NETLAB Virtual Machine Infrastructure SetupThe NETLAB Virtual Machine Infrastructure setup is described in the followingsections of the NETLAB Remote PC Guide Series: Registering a Virtual Datacenter in NETLAB Adding ESXi hosts in NETLAB Proactive Resource AwarenessIt is important to configure Proactive Resource Awareness to maximizethe number of active pods per physical ESXi host.2.6Software RequirementsFor the purpose of software licensing, each virtual machine is treated as an individualmachine, PC, or server. Please refer to the specific vendor license agreements (andeducational discount programs, if applicable) to determine licensing requirements foryour virtual machines’ software, operating system, and applications.The minimum virtual infrastructure software required for standing up this pod is in thefollowing table.Virtual Infrastructure RequirementsSoftwarevSphere ESXivCenter ServerVersion6.06.0Please refer to the Software and Licenses section regarding the software requirementsfor virtual machines in the pod.2.7Networking RequirementsTo accommodate the movement of large VMs, OVF/OVAs, and ISO disk images from onehost to another, gigabit Ethernet or better connectivity is recommended to interconnectyour NETLAB , vCenter Server system and ESXi host systems.The two standard networking models recommended to interconnect your servers aredescribed in detail in the Networking Models section of the Remote PC Guide Series,Volume 1 - Introduction and Planning.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 6

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide2.7.1Pod Internet AccessThe pods for the Palo Alto Networks Cybersecurity Essentials v9.0 course each requireInternet access. This access is required for licensing the Master pod. It is important tonote that Internet access is not required to complete lab objectives in this lab series.This environment is designed to leverage one vSwitch per host that attaches to anetwork that has a DHCP server to assign IPv4 addresses that are routable to theInternet.This lab environment is also designed to leverage the public DNS servers 8.8.8.8 and4.2.2.2. This vSwitch must be able to access those servers, which may requireadjustments in a firewall if applicable.2.7.2Completing the NETLAB Pod Internet Access and Use AgreementYou are required to complete the NETLAB Pod Internet Access andUse Agreement prior to obtaining access to the pod or content for thiscourse.Due to the security and legal implications regarding accessing the Internet from withinthe pod, we require that you agree to the terms contained within this online documentprior to obtaining access to the pod or content for this o/agreement7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 7

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide3Software and Licenses3.1Obtaining Palo Alto Networks Software LicensesTo obtain licensing and access to the Palo Alto Networks Cybersecurity Essentials v9.0labs, your institution must be a Palo Alto Networks Authorized Academy Center (AAC).You can find information about the Palo Alto Networks AAC at the followinglink: n/academyOnce your membership in the Palo Alto Networks AAC is approved, you can requestlicenses for use with your pods from your Palo Alto Networks Academy representativeor by emailing academy@paloaltonetworks.com.3.2Downloading OVF FilesThe virtual machines are made available as Open Virtualization Format (OVF) or OpenVirtualization Archive (OVA) files. These files are available for download from CSSIA.To request access to the preconfigured virtual machine templates from CSSIA:1. Go to the CSSIA Resources page: https://www.cssia.org/cssiaresources/2. Select CSSIA VM Image Sharing Agreement.3. Complete and submit your access request by following the instructions on therequest form.4. CSSIA will provide, via email, password-protected download links. Access to thedownload links is provided only to customers who are current with theirNETLAB support contract and are participants in the appropriate partnerprograms (i.e., Cisco Networking Academy, VMware IT Academy, Red HatAcademy, and/or Palo Alto Networks).5. Once all virtual machines have been downloaded, they can be deployedfollowing the steps in the appropriate pod installation guide. Each virtualmachine is deployed individually.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 8

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide4Master Pod Configuration4.1Deploying Virtual Machine OVF/OVA FilesDeploy on your host server the pod virtual machine OVF/OVA files you havedownloaded.1. Navigate to your vSphere Client using your management workstation, ensurethat your downloaded OVA/OVF files are accessible on this machine, and thenconnect to your vCenter Server.2. From the vSphere Client interface, navigate to Hosts and Clusters.3. Right-click on the target ESXi Host Server and select Deploy OVF Template.4. In the Deploy OVF Template window, on the Select source step, select the LocalFile radio button and click Browse.5. Locate and select one of the VMs for the pod, click Open.Only one VM can be selected using this wizard. The process will haveto be repeated for the remaining VMs.6. Verify that the VM information populates next to the Browse button and clickNext.7. On the Review details step, make sure to fill the checkbox for Accept extraconfiguration options (if present) and click Next.8. On the Select name and folder step, change the name of the virtual machine tosomething that is easy to manage. You can use the names provided in the listbelow as names for the virtual machines if you do not have a set namingconvention. Select the appropriate datacenter and click Next.VM NameVM ual Machine DeploymentNamePAN9 CE Master.ClientPAN9 CE Master.DMZPAN9 CE Master.FirewallPAN9 CE Master.VRouter9. On the Select Storage step, choose the appropriate storage device and makesure that Thin Provision is selected. Click Next.10. In the Setup networks section, select SAFETY NET as the destination and clickNext.If SAFETY NET is not available, refer to the Create a Safe StagingNetwork section in the Remote PC Guide Series – Volume 2.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 9

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide11. In the Ready to complete section, make sure Power on after deployment isunchecked and confirm the settings. Click Finish.12. vCenter will begin deploying the virtual machine. This may take some timedepending on the speed of your connection, HDDs, etc. Repeat the previoussteps for each remaining virtual machine in the master pod.13. The Firewall VM requires an extra step. First, deploy the VM from the OVA usingthe name PAN9 CE FW Init while following the instructions in the previoussteps. Then, clone PAN9 CE FW Init, naming it PAN9 CE Master.Firewall orwhichever naming convention you chose for the previous VMs. Next, deletePAN9 CE FW Init. This extra cloning procedure is to resolve licensing with thePAN9 Firewall. You only need to perform this step with the Firewall VM.4.1.1Modify Virtual MachinesOnce the virtual machines are imported onto the host, verify the configurations. Thefollowing steps will guide you through the process.1. In the vSphere Client interface, right-click on the imported virtual machine andselect Edit Settings.2. For all the virtual machines, manually assign the MAC addresses for each NIC.The table below identifies the MAC addresses per NIC.Virtual :a6:88Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 10

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide3. Repeat the previous steps for each of the remaining virtual machines in themaster pod.4. For the vRouter virtual machine, change Network adapter 1 to the network thathas DHCP Internet access available, see Pod Internet Access.4.2NETLAB Virtual Machine Inventory SetupThis section will guide you in adding your templates to the Virtual Machine Inventory ofyour NETLAB VE system.1. Log in to your NETLAB VE system using the administrator account.7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 11

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guide2. Select the Virtual Machine Infrastructure icon.3. Click the Virtual Machine Inventory icon.4. Click the Import Virtual Machines button located at the bottom of the list.5. Select the appropriate datacenter from the list where your master VMs reside.6. Select the checkbox next to the virtual machines you had just deployed and clickImport Selected Virtual Machines.7. When the Configure VMs window loads, you can set your virtual machineparameters.a. Check the dropdown box for the correct operating system for eachimported virtual machine.b. Change Role to Master for each VM.c. Add any comments for each virtual machine in the last column.It is advised to leave the Version and Build numbers for referencewhen requesting NDG support.d. Verify your settings and click Import (X) Virtual Machines (notice thenumber in parenthesis is dynamic, depending on the amount of VMsselected).7/10/2020Copyright 2020 Network Development Group, Inc. www.netdevgroup.comPage 12

PAN9 Cybersecurity Essentials Pod Installation and Configuration Guidee. Verify all Import Statuses report back with OK and then click on theDismiss button.f. Verify that your virtual machines show up in the inventory.For additional information, please refer to the NETLAB VE Administrator Guide.4.3Building the Master Palo Alto Networks Cybersecurity Essentials v9.0 PodThis section will assist you in adding the Palo Alto Networks Cybersecurity Essentials v9.0pod to your NETLAB system.4.3.1Enabling Labs in Course ManagerPlease refer to the Course Manager section of the NETLAB VE Administrator Guide onhow to enable content. Please install the Palo Alto Networks Cybersecurity Essentialsv9.0 course.4.3.2Create the Master Pod1. Log into NE

configuration of the Palo Alto Networks Cybersecurity Essentials v9.0 pod on the NETLAB VE system. 1.1 Introducing the Palo Alto Networks Cybersecurity Essentials v9.0 Pod The Palo Alto Networks Cybersecurity Essentials v9.0 pod is a 100% virtual machine pod consisting of four virtual machines. Linked together through virtual networking, these

Related Documents:

MZ - PAN IETF DEFAULT Palo-Alto MZ - Barracuda Barracuda MZ - Cisco BSD Default Cisco PA-200-ALL.tar.gz Palo-Alto PA-ALL Palo-Alto PAN 0.15.2 Palo-Alto PAN BSD DEFAULT Palo-Alto PAN BSD ISO Palo-Alto PAN IETF CUSTOM Palo-Alto PAN IETF DEFAULT Palo-Alto ScanSafe ScanSafe SonicFW Sonicwall Squid-IPDetect Squid Squid-IPS-1 Squid TZ-0804

3.1 Obtaining Palo Alto Networks Software Licenses To obtain licensing and access to the Palo Alto Networks Firewall 10.0 Essentials (EDU-210) labs, your institution must be a Palo Alto Networks Authorized Academy Center (AAC). You can find information about the Palo Alto Networks AAC at the following

3.1 Obtaining Palo Alto Networks Software Licenses To obtain licensing and access to the Palo Alto Networks - Cloud Security Fundamentals v1 labs, your institution must be a Palo Alto Networks Authorized Academy Center (AAC). You can find information about the Palo Alto Networks AAC at the following

El Palo tiene cuatro ramas: Palo Briyumba, Palo Monte, Palo Mayombe, y Palo Kimbisa. El Palo Briyumba es el que más elementos Africanos retiene. El Palo Monte se identifica mayoritariamente con la bondad, mientras que se piensa que el Palo Mayombe es "malo." El Palo Kimbisa es la más cristianizada y masónica de las sectas del Palo.File Size: 654KBPage Count: 114

The Palo Alto Networks Cybersecurity Essentials pod is a 100% virtual machine pod consisting of 4 virtual machines. Linked together through virtual networking, these 4 virtual machines provide the environment for a student or a team to perform the Palo Alto Networks Cybersecurity Essentialslabs.

Palo Alto Networks Certified Network Security Administrator (PCNSA) . impossible to install a "backdoor" on Palo alto firewall itself, even if you have physical access to the palo alto device.(This is also a reason we still don't have palo alto in . (this will make troubleshooting much easier). Ask questions:

PAN-PA-220R-ZTP Palo Alto Networks, Inc. Platforms Zero Touch Provisioning (ZTP) version of the Palo Alto Networks PA-220R (Includes the DIN rail kit) each PAN-PA-500-UPG-2GB Palo Alto Networks, Inc. Platforms 2GB Memory Upgrade Kit for PA-500 Only. Cannot be installed on a PA-500-2GB (this unit already has 2GB memory). each 400.00 HW PAN-PA .

Instructional Topics . 1 : 1: Building a Reading Life . Topic 1: Making Reading Lives Topic 2: Making Texts Matter Topic 3: Responding to Our Reading Through Writing . 2: Nonficti