<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article PANCast™ Episode 34: Firewall Initial Setup in PANCast™ Episodes</title>
    <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-34-firewall-initial-setup/ta-p/573018</link>
    <description>&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FrOKQB5Zeyn4%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DrOKQB5Zeyn4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FrOKQB5Zeyn4%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast™ Episode 34: Firewall Initial Setup" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Episode Transcript:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Hello and welcome back PANCasters, Olivier is back with us today to discuss the initial steps when you get a new firewall. Hi Olivier and welcome back.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Olivier:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Hello John, thanks for having me back.&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="Olivier Zheng, PCNSE, is a Staff Support Engineer at Palo Alto Networks. As SME Management/Logging Reporting in Technical Assistance Centre Singapore, he is supporting customers and participating in multiple knowledge sharing initiatives by writing content in the Knowledge Base, by delivering training to internal engineers.  He is responsible for 1 issued patent.  Olivier holds a Master of Science Mobile and High Speed telecom networks from Oxford Brookes University, UK and a Master of Science in Computer Science and Information Technology from ESI SUPINFO Paris, France." style="width: 275px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56593i10A8EA9B653AB587/image-dimensions/275x272?v=v2" width="275" height="272" role="button" title="PANCast_Olivier-Zheng_palo-alto-networks.png" alt="Olivier Zheng, PCNSE, is a Staff Support Engineer at Palo Alto Networks. As SME Management/Logging Reporting in Technical Assistance Centre Singapore, he is supporting customers and participating in multiple knowledge sharing initiatives by writing content in the Knowledge Base, by delivering training to internal engineers.  He is responsible for 1 issued patent.  Olivier holds a Master of Science Mobile and High Speed telecom networks from Oxford Brookes University, UK and a Master of Science in Computer Science and Information Technology from ESI SUPINFO Paris, France." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Olivier Zheng, PCNSE, is a Staff Support Engineer at Palo Alto Networks. As SME Management/Logging Reporting in Technical Assistance Centre Singapore, he is supporting customers and participating in multiple knowledge sharing initiatives by writing content in the Knowledge Base, by delivering training to internal engineers.  He is responsible for 1 issued patent.  Olivier holds a Master of Science Mobile and High Speed telecom networks from Oxford Brookes University, UK and a Master of Science in Computer Science and Information Technology from ESI SUPINFO Paris, France.&lt;/span&gt;&lt;/span&gt;&lt;BR /&gt;So I received a new firewall and I wanted to share with the audience the 3 must-do things with setting up the new firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Great Olivier, let’s get started.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1734228258"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Perform the Initial Configuration&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Olivier:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So the first step is to perform the initial configuration : the purpose of that initial configuration is to set the most basic configuration of the firewall, something you can backup and use as a recovery point.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;At the first startup of the firewall, you will be requested to change the password of the default user account. What I like to do as well is to create a new default superuser account and delete the default “admin” account. Anyway, make sure you have at least one local superuser account.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;Another thing to set up on the firewall is the basic network configuration : the IP configuration, the DNS servers and the time related settings - the device date and time and the NTP servers.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Once the initial configuration is done, perform the first commit on the firewall.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;If you need to enable the multi vsys feature or jumbo frame support, enable those then commit and reboot the firewall.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Also since PAN-OS 10.2, I think it can be interesting to move to the Advanced Routing Engine while the firewall is not fully configured yet, it will be simpler than to do it later. This activation also requires a commit and a reboot.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;Finally, if you plan on managing the configuration using Strata Cloud Manager or the Panorama, enable the setting then commit.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;And for Panorama management, you will have to set the authkey for the initial authentication with Panorama, but no commit is required to set this key.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;OK, so what’s next?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1734228258"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Register the Device and Get the Licenses&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Olivier:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Now that the initial configuration is done, your firewall should be able to contact the Palo Alto Networks server. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So the next step is to activate the firewall on the Customer Support Portal. You will have to register the firewall, make sure the information is accurate as it will be used the day you need to replace a hardware component.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;You will also have to register the license authkeys so the firewall is correctly associated with the right subscriptions. One thing to note is that as long as you did activate the licenses, you won’t be able to get the associated services : no support license, no TAC support, no Threat license, no threat update on your firewall, which I remind you is to keep you secure.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Another thing you should do at that stage is to get the device certificate. This certificate automatically renewed every 3 months is required to have access to the cloud delivered security services : advanced threat prevention, IoT Security and so on...&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Finally, if you are using some cloud delivered security services like IoT Security, Cortex Data Lake, or AIOps free, you need to associate your devices on the TSG in the Hub Portal. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Keep in mind that the CSP and the Hub Portal are separate applications. There is no synchronization between the CSP and the Hub Portal.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;More good info. Thanks Olivier. What’s the third step.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1734228258"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Prepare the Software Stack&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Olivier:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Last point I wanted to discuss is the software stack of the firewall. By software stack, I mean the PAN-OS version, the different content updates, the plugins running on the firewall. Nobody can foresee the software version shipped with the firewall, so you will eventually have to upgrade it.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So now that the firewall has its initial configuration and that the licenses are activated, you can pull the licenses to the firewall.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Take the opportunity the firewall is not in production to perform all the required upgrades, as you may have to reboot multiple times the firewall.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;One thing I noticed on recent versions of the PAN-OS is the DLP plugin automatically installed. If you are not using the Enterprise DLP, which requires a specific license, remove the plugin. I saw some cases opened simply because the DLP plugin version was not matching between HA pairs, and this plugin was not even used.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;That’s all, once those 3 steps are done, you simply have to load the final configuration and connect the network cables when you are ready to put the firewall into production.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thanks Olivier, what are the key takeaways from this episode?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1734228258"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Episode Key Takeaways&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Olivier:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;SPAN&gt;I think we can summarize the episode in 3 points:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;Set the initial configuration to perform the basic tasks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Register the firewall on the Palo Alto Networks CSP and Hub Portal&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Install the required software for the firewall to be ready.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thanks again Olivier.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Olivier:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;That’s it for today PANCasters. Head to live.paloaltonetworks.com for the transcript and additional info. Until next time.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Related Content:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A title="How to Activate Authorization Codes (Auth Codes)" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClNACA0" target="_blank" rel="noopener nofollow noreferrer"&gt;How to Activate Authorization Codes (Auth Codes)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="Enable Advanced Routing" href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-networking-admin/advanced-routing/enable-advanced-routing" target="_blank" rel="noopener nofollow noreferrer"&gt;Enable Advanced Routing&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="Install a Device Certificate" href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/obtain-certificates/device-certificate" target="_blank" rel="noopener nofollow noreferrer"&gt;Install a Device Certificate&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="Enable Advanced Routing" href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-networking-admin/advanced-routing/enable-advanced-routing" target="_blank" rel="noopener nofollow noreferrer"&gt;Enable Advanced Routing&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="PANCast™  Episode 1: Four Things You Must Do When Upgrading Your Firewall" href="https://live.paloaltonetworks.com/t5/pancast/pancast-episode-1-four-things-you-must-do-when-upgrading-your/ta-p/515952" target="_blank" rel="noopener nofollow noreferrer"&gt;PANCast™ Episode 1: Four Things You Must Do When Upgrading Your Firewall&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;LI-PRODUCT title="NGFW" id="NGFW"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;LI-PRODUCT title="VM-Series" id="VM-Series"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 17 Jan 2024 19:31:21 GMT</pubDate>
    <dc:creator>ozheng</dc:creator>
    <dc:date>2024-01-17T19:31:21Z</dc:date>
    <item>
      <title>PANCast™ Episode 34: Firewall Initial Setup</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-34-firewall-initial-setup/ta-p/573018</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Received a new firewall to deploy? In this episode, we are discussing about 3 must-do things on the new firewall before putting it into production.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PANCast_Episode 34_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56594i0C5CDC0E5D568A7E/image-size/large?v=v2&amp;amp;px=999" role="button" title="PANCast_Episode 34_palo-alto-networks.jpg" alt="PANCast_Episode 34_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 19:31:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-34-firewall-initial-setup/ta-p/573018</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2024-01-17T19:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: PANCast™ Episode 34: Firewall Initial Setup</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-34-firewall-initial-setup/tac-p/573414#M81</link>
      <description>&lt;P&gt;Great guidance on starting our journey with a new firewall.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 23:42:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-34-firewall-initial-setup/tac-p/573414#M81</guid>
      <dc:creator>jnathan</dc:creator>
      <dc:date>2024-01-17T23:42:37Z</dc:date>
    </item>
  </channel>
</rss>

