GUI Visual Guide: PAN-OS

IronSkillet is delivered as a configuration template without a step-by-step configuration guide. This was the intent to have a rapid deployment option without massive GUI clicks.

However, users still want to know what exactly they configured in the event they want to make changes or compare IronSkillet manually to their existing configuration.

So based on popular demand here is the GUI-based visual guide to all of the IronSkillet configuration elements.

This is based on PAN-OS 10.x with callouts for any features not supported in the prior releases. Also note that based on software release, there may be other items configured or ‘checked’ as defaults and not part of IronSkillet. These items are not referenced in this guide.

IronSkillet includes a mix of day one best practices for configuration types such as:

  • Device management hardening: general operations of the NGFW

  • Security traffic hardening: control of traffic flows that impacts device monitoring

  • Logging and alerts: data collection and external notifications

  • Security objects and policies: policy-related config settings and dynamic updates

  • Decryption objects and policies: certification checks and sample no-decrypt policy

This visual guide is based on the IronSkillet full configuration file

This file uses default value settings and can be readily imported and loaded as a candidate configuration allowing the user to follow along with this guide.

Note

Documentation links for release 10.0 are provided for additional information.

Device

The device tab is used for device management, hardening, system logging, and other device related configuration elements.

It also includes security function related configuration such as dynamic updates for anti-virus, vulnerability, spyware DNS and Wildfire signatures as well as Wildfire submission file size configuration.

Setup

Management

See also

General configuration information in the Admin Guide: Device - Setup - Management

Device > Setup > Management > General Settings
_images/vg_device_setup_general.png

Changes to General Settings:

  • Hostname: name of the device; IronSkillet defaults to ‘sample’

  • Login Banner: display text presented to users at login

  • Time Zone: set to UTC so all devices map to a common universal timezone

  • Automatically Acquire Commit Lock: block a commit across multiple web sessions

Device > Setup > Management > Authentication Settings
_images/vg_device_setup_auth.png

Changes to Authentication Settings:

  • Idle Timeout: close the session after 10 minutes of inactivity

  • API Key Lifetime (9.0): time to expire an existing API key; ‘infinite’ pre 9.0

  • Failed Attempts: Lockout the account after 5 failed attempts

  • Lockout Time: Lockout the account for 30 minutes after 5 failed attempts

Device > Setup > Management > Logging and Reporting Settings
_images/vg_device_setup_logging_reporting.png

Changes to Logging and Reporting Settings:

  • Max Rows in CSV Export: increase row count to 1,048,576

  • Enable Log on High DP Load: a system log entry is generated when the packet processing load on the firewall is at 100% CPU utilization

Log Suppression (CLI only)

Log suppression, when enabled, is a feature that instructs the Palo Alto Networks device to combine multiple similar logs into a single log entry on the Monitor > Logs > Traffic page.

Disabled to ensure unique log entries even if similar session types

set deviceconfig setting logging log-suppression no
Device > Setup > Management > Minimum Password Complexity
_images/vg_device_pwd_complexity.png

Enable minimum password requirements for local accounts. With this feature, you can ensure that local administrator accounts on the firewall will adhere to a defined set of password requirements.

Note

password expiration has been removed based on NIST standards although users can still opt to set an expiration and notification period

Operations

See also

General configuration information in the Admin Guide: Device - Setup - Operations

Device > Setup > Operations > SNMP Setup
_images/vg_device_snmp.png

If used, ensure SNMP version is V3

Services

See also

General configuration information in the Admin Guide: Device - Setup - Services

Device > Setup > Services > Services
_images/vg_device_setup_svcs.png

Key configuration elements:

  • DNS: Primary and Secondary server IP addresses; for all DNS queries that the firewall initiates in support of FQDN address objects, logging, and firewall management

  • NTP: Primary and Secondary server FQDNs; use to synchronize the clock on the firewall

Interfaces

See also

General configuration information in the Admin Guide: Device - Setup - Interfaces

Device > Setup > Interfaces > Management
_images/vg_device_mgmt_intf.png

This example shows a static IP address, netmask, and gateway configuration. IronSkillet also gives the option of using the DHCP Client which removes the IP data fields.

  • Administrative Management Services: limit to HTTPS and SSH

  • Network Services: only allow Ping unless other services are required

Note

Additional recommendations include restricting access to only authorized IP addresses

Content-ID

See also

General configuration information in the Admin Guide: Device - Setup - Content-ID

Device > Setup > Content-ID > Content-ID Settings
_images/vg_content_id_settings.png

Enable allow forwarding of decrypted content: From version 10.1 and forwards enable the firewall to forward SSL traffic for WildFire analysis.

Disable Forward segments exceeding TCP App-ID inspection queue: In newer releases disabled by default; explicit disable in IronSkillet template Disable this option to prevent the firewall from forwarding TCP segments and skipping App-ID inspection when the App-ID inspection queue is full.

Disable Forward segments exceeding TCP content inspection queue: Disable this option to prevent the firewall from forwarding TCP segments and skipping content inspection when the content inspection queue is full.

Disable Forward segments exceeding UDP content inspection queue: Disable this option to prevent the firewall from forwarding UDP segments and skipping content inspection when the content inspection queue is full.

Device > Setup > Content-ID > X-Forwarded-For Headers

Note

IronSkillet only includes pre 10.0 release configuration. In 10.0 XFF moves from a global to policy or user configuration.

_images/vg_content_id_xff.png

Header field option that preserves the IP address of the user who made the GET request

Enable Use X-Forwarded-For Header in User-ID

Select this option to specify that User-ID reads IP addresses from the X-Forwarded-For (XFF) header in client requests for web services when the firewall is deployed between the Internet and a proxy server that would otherwise hide client IP addresses. User-ID matches the IP addresses it reads with usernames that your policies reference so that those policies can control and log access for the associated users and groups. If the header has multiple IP addresses, User-ID uses the first entry from the left.

Enable Strip X-Forwarded-For Header

Select this option to remove the X-Forwarded-For (XFF) header, which contains the IP address of a client requesting a web service when the firewall is deployed between the Internet and a proxy server. The firewall zeroes out the header value before forwarding the request: the forwarded packets don’t contain internal source IP information.

Wildfire

See also

General configuration information in the Admin Guide: Device - Setup - Wildfire

Device > Setup > Wildfire > General Settings
_images/vg_wildfire_general.png

Key configuration elements:

  • WildFire Public Cloud: where to send file samples for analysis; defaults to the US-based url and can be changed to various regional sites

  • File Size Limits: recommended maximum file sizes to send to WildFire

  • Report Grayware Files: shows verdicts in the Wildfire submissions logs

See also

The wildfire global cloud documentation has additional information for public cloud fqdn options

Session

Configure session age-out times, decryption certificate settings, and global session-related settings such as firewalling IPv6 traffic and rematching Security policy to existing sessions when the policy changes.

See also

General configuration information in the Admin Guide: Device - Setup - Session

Device > Setup > Session > Session Settings
_images/vg_device_setup_settings.png

Key configuration elements:

  • Rematch Sessions: cause the firewall to apply newly configured security policies to sessions that are already in progress

Device > Setup > Session > TCP Settings
_images/vg_device_tcp_settings.png

Prevent TCP and MPTCP evasions

  • set Forward segments exceeding TCP out-of-order queue to ‘no’

  • set Drop segments with null timestamp option to ‘yes’

  • set urgent data flag to ‘clear’

  • set drop segments without flag to ‘yes’

  • set Strip MPTCP option to ‘yes’

Administrators

IronSkillet default admin

See also

General configuration information in the Admin Guide: Device - Administrators

Device > Administrators : admin
_images/vg_device_admins.png

The default reference configuration uses the default admin/admin login credentials. This should be changed immediately.

Note

As of release 9.0.4 the user is forced to change the admin password based on a minimum character length of 8 as part of a default password complexity profile. Once IronSkillet is loaded, this complexity profile is more complex overriding the default profile.

Response Pages

Response pages are the web pages that display when a user tries to access a URL.

See also

General configuration information in the Admin Guide: Device - Response Pages

IronSkillet Enable Block Page

Device > Response Pages > Application Block Page
_images/vg_device_responsePage_appBlock.png

Response pages display when a user attempts to access a URL that is not permitted by policy or content (threat) inspection It is recommended to enable the Application Block Page setting so that users are aware of why an application is not working.

Log Settings

See also

General configuration information in the Admin Guide: Device - Log Settings

There are multiple sections that can be configured for device log forwarding (System, Configuration, User-ID, and HIP Match)

Options include sending all logs, logs by severity, and custom attributes using the filter builder. Iron Skillet recommended settings include forwarding critical system logs to email and using Syslog for all system logs

Configuration, User-ID, and HIP Match should forward all logs to syslog or another logging platform such as Panorama or Cortex Data Lake.

It is recommended to forward all logs to Panorama if the firewall is being managed by Panorama. This setting is unchecked as the Iron Skillet configuration assumes a standalone configuration

Note

Since log settings are operational and may vary across user environments, these are focused as ‘reference configurations’ as part of a recommended day one starter configuration.

System

System event log actions

Device > Log Settings > System
_images/vg_logging_system.png

Email_Critical_System_Logs: Send output as an email using a configured email profile. Only email severity=critical events

System_Log_Forwarding: As reference, forward all system logs as syslog using a configured syslog profile

Profiles configurations are in the section Server Profiles.

Configuration

Configuration event log actions

Device > Log Settings > Configuration
_images/vg_logging_config.png

Configuration_Log_Forwarding: As reference, forward all configuration logs as syslog using a configured syslog profile

Profiles configurations are in the section Server Profiles.

User-ID

User-ID event log actions

Device > Log Settings > User-ID
_images/vg_logging_userid.png

User-ID_Log_Forwarding: As reference, forward all user ID logs as syslog using a configured syslog profile

Profiles configurations are in the section Server Profiles.

Host Information Profile (HIP) Match

GlobalProtect HIP event log actions

Device > Log Settings > HIP Match
_images/vg_logging_hip.png

HIP_Log_Forwarding: As reference, forward all HIP logs as syslog using a configured syslog profile

GlobalProtect (GP)

GlobalProtect event log actions

Device > Log Settings > GlobalProtect
_images/vg_logging_globalprotect.png

GP_Log_Forwarding: As reference, forward all GP logs as syslog using a configured syslog profile

IP-Tag

GlobalProtect HIP event log actions

Device > Log Settings > IP-Tag
_images/vg_logging_globalprotect.png

IP_Tag: As reference, forward all IP-Tag logs as syslog using a configured syslog profile

Profiles configurations are in the section Server Profiles.

Server Profiles

See also

General configuration information in the Admin Guide: Device - Server Profiles

Note

Since are operational and may vary across user environments, these are focused as ‘reference configurations’ as part of a recommended day one starter configuration.

Note

These values will need to be adjusted to the actual customer environment settings. You will want to verify that the Email Relay and Syslog machine can receive messages from the firewalls management interface (default Service Route Configuration – Device > Setup > Services).

Configuration of server profiles used by the log setting configurations.

Syslog

Device > Server Profiles > Syslog
_images/vg_profile_syslog.png

Sample Syslog Profile using standard port 514.

Note

The sample IP address 192.0.2.2 is a non-routable address

Email Server

Device > Server Profiles > Email
_images/vg_profile_email.png

Sample email server profile for critical alert events including the new option for Protocol, IronSkillet using SMTP.

Note

the from/to and gateway values are reference only. The gateway address is non-routable.

Dynamic Updates

See also

General configuration information in the Admin Guide: Device - Dynamic Updates

IronSkillet Dynamic Updates

Dynamic updates allow the firewall to periodically check for content updates. Without this schedule configured, no new signature, vulnerabilities, malicious domains, or GlobalProtect files will be locally loaded into the firewall.

Device > Dynamic Updates : schedules
_images/vg_device_dynUpdates.png

Updates are configured with minimum time values to ensure new content loads are applied when available. They are also installed at the time of download.

Time schedules are varied around the hour to avoid download/install overlap between update types.

Antivirus

Includes new and updated antivirus signatures, including signatures discovered by WildFire. You must have a Threat Prevention subscription to get these updates. New antivirus signatures are published daily.

Applications and Threats

Includes new and updated application and threat signatures. This update is available if you have a Threat Prevention subscription (and in this case you will get this update instead of the Applications update). New Applications and Threats updates are published weekly. This means that the latest content update always includes the application and threat signatures released in previous versions.

WildFire

Provides real-time malware and antivirus signatures created as a result of the analysis done by the WildFire public cloud. Without the WildFire subscription, you must wait 24 to 48 hours for the WildFire signatures to roll into the Applications and Threat update.

GlobalProtect Clientless VPN

Contains new and updated application signatures to enable Clientless VPN access to common web applications from the GlobalProtect portal. You must have a GlobalProtect subscription to receive these updates. In addition, you must create a schedule for these updates before GlobalProtect Clientless VPN will function.

GlobalProtect Data File

Contains the vendor-specific information for defining and evaluating host information profile (HIP) data returned by GlobalProtect apps. You must have a GlobalProtect gateway subscription in order to receive these updates. In addition, you must create a schedule for these updates before GlobalProtect will function.

Network

Network Profiles

See also

General configuration information in the Admin Guide: Network - Network Profiles

Zone Protection

IronSkillet includes ‘non volumetric’ recommendations that are device and deployment specific. This is configured as the Recommended_Zone_Protection profile and should be added to configured zones. IronSkillet also provides an Alert_Only_Zone_Protection profile for users to monitor zones without blocking traffic.

Note

IronSkillet does not include zone configurations so the user must apply this profile when configured zones.

Network > Network Profiles > Zone Protection Profile > Alert_Only_Zone_Protection > Packet Based Attack Protection > IP Drop
_images/vg_alert_zoneProtect_packetBased.png

No IP Drop settings have been enabled for the the Alert Only profile.

Network > Network Profiles > Zone Protection Profile > Alert_Only_Zone_Protection > Packet Based Attack Protection > TCP Drop
_images/vg_alert_zoneProtect_TCPdrop.png

Default TCP Drop settings are set here with nothing more enabled for the Alert Only profile.

Note

These are explicit enables in the template to ensure not disabled across software versions.

Objects

This section includes various profiles, objects, and tags used primarily in security and decryption policies.

Tags

See also

General configuration information in the Admin Guide: Objects - Tags

IronSkillet Tag Objects

Object > Tags : directionals and version
_images/vg_objects_tags.png

Reference tags used in security policies along with an ‘IronSkillet’ version tag.

  • Outbound: traffic from internal to external

  • Inbound: traffic from external to internal

  • Internal: internal-only traffic

Note

The iron-skillet-version tag is used for release tracking only.

Custom Objects

See also

General configuration information in the Admin Guide: Objects - Custom Objects

User generated objects as placeholders.

IronSkillet Custom Objects

Object > Custom Objects > URL Category
_images/vg_customObjects_url.png

Placeholder for custom url categories used in security rules and url profiles. Using these categories prevents the need to modify the default template.

  • Block: placeholder to be used in block rules and objects to override default template behavior

  • Allow: placeholder to be used in permit rules and objects to override default template behavior

  • Custom-No-Decrypt: to be used in the decryption no-decrypt rule to specify URLs that should no be decrypted

Security Profiles

See also

General configuration information in the Admin Guide: Objects - Security Profiles

Security profiles in IronSkillet are explicitly named using one or more of the following:

  • Outbound: traffic originating inside the network accessing external sites

  • Inbound: traffic originating outside the network accessing internal sites

  • Internal: traffic originating inside the network access other internal sites

  • Alert-Only: alert-only for any traffic sessions; not recommended when blocking required

AntiVirus

Antivirus profiles to protect against worms, viruses, and trojans and to block spyware downloads.

Outbound, Inbound, and Internal AntiVirus (AV) profiles.

Object > Security Profiles > Antivirus : Blocking
  • reset-both for all decoder actions: Antivirus and Wildfire

  • Includes reset-both for Dynamic Classification actions

  • Includes enable for all file types

_images/vg_profiles_av_block.png

These are all explicitly set to reset-both for all decoders.

Object > Security Profiles > Antivirus : Alert-Only
  • alert for all decoder actions: Antivirus and Wildfire

  • Includes alert for Dynamic Classification actions

  • Includes enable (alert only) for all file types

_images/vg_profiles_av_alert.png

Sets all decoders to alert mode.

Anti-Spyware

Anti-Spyware profiles to block attempts from spyware on compromised hosts trying to phone-home or beacon out to external command-and-control (C2) servers.

Object > Security Profiles > Antivirus : Outbound-AS

Rules: Outbound Anti-Spyware (AS) and Inbound-AS profiles

_images/vg_profiles_as_blocking.png

Rules block critical, high, and medium severity events. For low and informational, default is used.

Note

Only Outbound-AS is shown with Inbound-AS having an identical configuration.

Exceptions: Checking Default Actions

To see the actions for ‘default’, click into Exceptions and enable ‘Show all signatures’. The Action column shows default actions for each ID.

_images/vg_profiles_as_defaults.png

DNS Signature: Sinkhole Malicious Domains

_images/vg_profiles_as_dns.png

The profile also sinkholes malicious domains based on the sinkhole settings. The settings map to the address objects and sinkhole redirects can be dropped as part of the security policies if no sinkhole server is used.

Note

As of 9.0, instead of only leveraging a list of locally stored malicious domains (Content DNS Signatures), Palo Alto Networks also provides a DNS Security service subscription for cloud-based domain lookups.

DNS Security Service: Sinkhole Malicious Domains by Category

_images/vg_profiles_as_dns_categories.png

In 10.0 and later, the DNS Security Service includes the ability to set actions by category. IronSkillet sets explicity ‘sinkhole’ actions for each malicious category (Command-and-Control, Malware) leaving the others as default. Severities are also left as default.

Object > Security Profiles > Antivirus : Internal-AS

The Internal profile shifts the medium severity to ‘default’ instead of reset both slightly lowering the security posture for internal-only sessions.

_images/vg_profiles_as_internal.png

The DNS Signatures and Security Service configurations are the same as Outbound-AS and Inbound-AS.

Object > Security Profiles > Antivirus : Alert-Only

This is a non-blocking alert-only configuration that can be used for testing/demonstration purposes.

_images/vg_profiles_as_alert.png

All DNS Security Service domain actions are set to ‘allow’ with no blocking posture.

_images/vg_profiles_as_alert_dns.png

Vulnerability

Vulnerability protection profiles to stop attempts to exploit system flaws or gain unauthorized access to systems.

Object > Security Profiles > Vulnerability Protection : Outbound-VP
_images/vg_profiles_vp_outbound.png

IronSkillet adds two rules:

  1. reset-both for critical/high/medium severity events

  2. the use of default actions for low and informational severities.

_images/vg_profiles_vp_outbound2.png

IronSkillet in 11.0 also enables cloud inline analysis and sets analysis engines to reset-both.

Object > Security Profiles > Vulnerability Protection : Inbound-VP
_images/vg_profiles_vp_inbound.png

Currently identical to the above Outbound profile to block critical/high/medium and use ‘default’ for low and informational severities.

_images/vg_profiles_vp_inbound2.png

For IronSkillet 11.0 the cloud inline analysis settings for the Inbound-VP profile are also identical to the Outbound profile.

Object > Security Profiles > Vulnerability Protection : Internal-VP
_images/vg_profiles_vp_internal.png

As with the Anti-spyware internal profile, medium is set as ‘default’ along with low and informational. This adds some trust to internal-only communications.

_images/vg_profiles_vp_internal2.png

For IronSkillet 11.0 the cloud inline analysis settings for the Internal-VP profile are identical to the Outbound and Inbound profiles.

Object > Security Profiles > Vulnerability Protection : Alert-Only-VP
_images/vg_profiles_vp_alert.png

Alert-Only provides a monitoring-only profile for vulnerability events. It is designed for use in demonstration or test deployments without active blocking.

_images/vg_profiles_vp_alert2.png

For IronSkillet 11.0 the cloud inline analysis settings are activated while the analysis engines are set to alert mode.

URL Filtering

URL filtering profiles to restrict users access to specific websites and/or website categories, such as shopping or gambling.

Object > Security Profiles > URL-Filtering
_images/vg_profiles_url.png

IronSkillet provides only 2 profiles for URL excluding the Inbound and Internal used in the other profiles. The IronSkillet assumption is that only outbound requests may be accessing malicious sites. In IronSkillet 10.1 added advanced URL Filtering changes, specifically updated real-time-detection categories to alert for all profiles.

Object > Security Profiles > URL-Filtering : HTTP Header Logging
_images/vg_profiles_HTTP_header_url.png

User-Agent, Referer and X-Forwarded-For HTTP Header Logging options have all been toggled on, added in IronSkillet 10.2.

Object > Security Profiles > URL-Filtering : Advanced URL Filtering
_images/vg_advanced_url.png

Advanced URL Filtering inline local and cloud categorization have all been toggled on, added in Ironskillet 10.2.

Object > Security Profiles > URL-Filtering : Outbound-URL

Categories: Site Access

IronSkillet only blocks known malicious categories and not high risk categories such as copyright-infringement mentioned in our Best Practice Assessment (BPA).

Categories blocked in the Outbound profiles:

  • Malware

  • Command-and-Control

  • Phishing

  • Ransomware

  • Grayware

  • Block [custom object users can edit]

All other categories have their action set as ‘alert’ instead of the default ‘allow’ for logging purposes.

_images/vg_profiles_url_outbound.png

For releases 10.0 and later, Dynamic Classification is configured for local machine learning and blocking based on web page analysis.

_images/vg_profiles_url_dynamic_class.png

Categories: User Credential Submission

If you block all the URL categories in a URL Filtering profile for user credential submission, you don’t need to check credentials. IronSkillet takes this approach blocking all categories under User Credential Submission.

The Alert-Only-URL profile sets all actions to alert for logging purposes, including Dynamic Classification and User Credential Submission. No categories are blocked.

File Blocking

This set of profiles allow the NGFW to explicitly block files transiting the firewall by type and direction.

Object > Security Profiles > File-Blocking
_images/vg_profiles_fb.png

IronSkillet defines a day one perspective without variations in file blocking based on URL category, direction, or application. File types that are not blocked are set as ‘alert’ for logging purposes.

The set of blocked file types represents the most common malicious file types that typically are not expected to cross a security zone boundary. Other types are ignored (eg. exe) since these can be used for legitimate, although not recommended, business purposes.

Note

Supported WildFire file types, even if blocked, will be sent to WildFire for analysis if Wildfire is license and configured in the device.

External Dynamic Lists

EDL’s are text files that allow the firewall to import objects and enforce policies based on contents of the EDL. In order to enforce policies on the entries included in the EDL, the list must be referenced in a supported policy rule or profile. Added in 10.2 Ironskillet are Bulletproof IP addresses and Tor exit IP addresses.

Object > External Dynamic Lists
_images/vg_external_dynamic_list.png

WildFire Analysis

WildFire™ analysis profiles to specify for file analysis to be performed locally on the WildFire appliance or in the WildFire cloud. IronSkillet uses the cloud option.

Object > Security Profiles > WildFire Analysis
_images/vg_profiles_wf.png

All profiles are set to send all file types for all applications in any direction to WildFire for analysis.

This configuration is for file analysis submissions only. WildFire signatures and protections are configured in the Anti-Virus profile. Below is the reference example for the Outbound-AV profile.

_images/vg_profiles_av_outbound.png

Based on the dynamic updates configuration, the device will check for new WildFire content updates based on worldwide analysis to download the latest signatures. These signatures are moved to the antivirus signature set on a daily basis for customers not subscribing to the WildFire service.

Security Profile Groups

See also

General configuration information in the Admin Guide: Objects - Security Profile Groups

In additional to individual profiles, you can combine profiles that are often applied together, and create Security Profile groups. These can be referenced in a security profile without the need to explicitly reference each profile.

IronSkillet Security Profile Groups

Object > Security Profile Groups : all groups
_images/vg_profilegroup.png

Each profile group is associated to the set of profiles reference the same direction or ‘alert’ mode.

The default profile, based on the Outbound security profiles, is created so that new security policies can easily reference this default profile group.

IronSkillet does not reference the security profile objects since IronSkillet does not have explicit allow rules.

Log Forwarding

See also

General configuration information in the Admin Guide: Objects - Log Forwarding

Sets up log forwarding profiles referenced in security policies.

IronSkillet Log Forwarding

Object > Log Forwarding : default
_images/vg_profiles_log_default.png

IronSkillet sets all log events to be sent to Syslog. Any malicious or phishing WildFire verdicts are emailed using the Threat Alert email profile. The Panorama associated configuration sends log to Panorama. Users can modify the default logging profile to send logs to additional locations as required.

The ‘default’ naming is used so that new security rules will automatically pick up this logging profile.

Decryption

Decryption profiles enable you to block and control specific aspects of SSL and SSH traffic that you have specified for decryption, as well as traffic that you have explicitly excluded from decryption. After you create a decryption profile, you can then add that profile to a decryption policy; any traffic matched to the decryption policy is additionally enforced based on the profile settings.

Decryption Profile

See also

General configuration information in the Admin Guide: Objects - Decryption Profile

Decryption Profile > SSL Decryption : SSL Forward Proxy
_images/vg_profiles_dec_ssl_fp.png

If using SSL Forward Proxy, block sessions with invalid certs and versions.

Decryption Profile > SSL Decryption : SSL Protocol Settings
_images/vg_profiles_dec_ssl_protocol.png

Protocol versions: Set the minimum protocol version to TLSv1.2. Any TLSv1.1 errors can help find outdated TLS endpoints

In 10.0, the max protocol version is set to TLSv1.3.

Encryption Algorithms: 3DES and RC4 not recommended and unavailable when TLSv1.2 is the minimum version. Authentication Algorithms: MD5 not recommended and unavailable when TLSv1.2 is the minimum version

Decryption Profile > No Decryption
_images/vg_profiles_dec_noDec.png

Even without decrypting, the recommended profile can block session with invalid certs or untrusted issuers.

Policies

Security

See also

General configuration information in the Admin Guide: Policies - Security

IronSkillet Security Policies

IronSkillet only provides suggested block rules and no traffic passing allow rules. When admins add new security rules, they should reference the security profile groups and logging profile configured under Objects.

Policies > Security : Block Malicious IPs
_images/vg_policy_security.png

Inbound and Outbound Block Rules Recommended Deny rules using the Palo Alto Networks predefined external dynamic lists (EDLs).

From Objects > External Dynamic Lists:

_images/vg_objects_edl.png

These external dynamic lists (EDLs) require a threat subscription and content update. Before configuring these security rules, the user needs to ensure that the EDLs show up under Objects - External Dynamic Lists. If not present, either the subscription is not valid or the content update has not been performed.

Decryption

See also

General configuration information in the Admin Guide: Policies - Decryption

IronSkillet Decryption Policies

The IronSkillet decryption policies contain two rules: (1) An optional no-decrypt URL category rule to bypass recommended URL categories when SSL decrypt is enabled and (2) a default NO-Decrypt rule that only provides cert validation checks according to the Recommended_Decryption_Profile.

Neither of the two rules perform any decryption but rather validate the encrypted sessions (SSL/SSH) meet particular integrity and encryption standards.

Policies > Decryption : no decrypt
_images/vg_policy_decrypt.png

SSL Decryption is highly recommended to gain visibility to traffic sessions yet is not part of the IronSkillet configuration template due to various requirements around certificates and application testing before full implementations. Included is a reference decryption rule for ‘no decrypt’ URL categories.

Monitor

Manage Custom Reports

See also

General configuration information in the Admin Guide: Monitor - Custom Reports

IronSkillet Custom Reports

IronSkillet includes a small set of custom reports aimed at SecOps practices and discovering malicious behavior. These can be used as a reference for additional custom reports.

Monitor > Manage Custom Reports
_images/vg_monitor_customReport.png
Monitor > Management > Custom Reports > Host-visit malicious sites plus
_images/vg_reports_host_visit_mal_sites_plus.png

A weekly report to identify over the past seven days the following categories:

  • Command-and-control

  • Hacking

  • Malware

  • Phishing

Monitor > Management > Custom Reports > Host-visit malicious sites
_images/vg_reports_host_visit_mal_sites.png

Same categories as previous report with fewer columns to simplify output

Monitor > Management > Custom Reports > Hosts visit questionable sites
_images/vg_reports_host_visit_quest_sites.png

A weekly report to identify over the past seven days the following categories

  • Dynamic-dns

  • Parked

  • Questionable

  • Unknown

Monitor > Management > Custom Reports > Host-visit quest sites plus
_images/vg_reports_host_visit_quest_sites_plus.png

Note

‘questionable’ was concatenated to meet name length requirements

Same categories as previous report with more columns as an extended view

Monitor > Management > Custom Reports > Wildfire malicious verdicts
_images/vg_reports_wf_mal_verdicts.png

Report viewing all grayware and malicious verdicts

  • Minus smtp (SMTP in separate report)

  • Minus benign (only grayware and malicious)

Monitor > Management > Custom Reports > Wildfire verdicts SMTP
_images/vg_reports_wf_verdicts_smtp.png

Report viewing all grayware and malicious verdicts

  • Only SMTP traffic

  • Minus benign (only grayware and malicious)

Monitor > Management > Custom Reports > Clients sinkholed
_images/vg_reports_clients_sinkholed.png

The importance here is we are viewing the verdict based on a rule. Reason being that if you go to threat log and say (action eq sinkhole) it will give you the DNS server and not the culprit. This rule allows for identification of the compromised client.

PDF Reports

See also

General configuration information in the Admin Guide: Monitor - PDF Reports

Report Groups

The set of recommended reports and grouped as ‘Possible Compromise’ for review and email distribution.

Monitor > PDF Reports > Report Groups
_images/vg_monitor_reportGroup.png

Email Scheduler

The report group ‘Possible Compromise’ is set up to be emailed using the referenced email profile as part of the device settings.

Monitor > PDF Reports > Email Scheduler
_images/vg_monitor_emailScheduler.png

It is up to the user to finalize configuration by setting the recurrence for how often the email should be generated and sent.