Panorama: how to manage Security/NAT policies

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Panorama: how to manage Security/NAT policies

L4 Transporter

This is something we're struggling with. How do you write Security Policies and NAT Policies in Panorama when each firewall uses different IPs for NAT and the Security Policies include the IPs in them?

On our FreeBSD firewalls, this was easy. We just used generic variables in our rules scripts such that the rules were the same across all the firewalls, with a separate/unique config file on each firewall that was read into the scripts (to populate the generic variables).

Is everyone just using generic Security Policies that only specify the Source/Destination Zones, the Application, and the Services?  How do you push out NAT Policies that are site-specific?

 

I have not found any way to do this in Panorama. Any pointers to documentation on best practises for this kind of setup would be nice. Having to touch 50 separate firewalls in order to add a new Security Policy is a bit of a pain. 🙂  The few bits of documentation I've found just show how to add policies into Panorama, without listing any best practises or examples.

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

You can nest device groups.

First you create Address object into parent device group.

 

Panorama-object-1.PNG

 

Then into every firewall device group with correct ip.

Panorama-object-2.PNG

 

 

Create rule in parent device group using address object.

Panorama-object-3.PNG

 

You can move around in hierarcy and verify that child device group is using IP from child device group.

Panorama-object-4.PNG

 

And if you push policy into firewall then it uses correct IP.

Panorama-object-5.PNG

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

View solution in original post

6 REPLIES 6

Cyber Elite
Cyber Elite

You can nest device groups.

First you create Address object into parent device group.

 

Panorama-object-1.PNG

 

Then into every firewall device group with correct ip.

Panorama-object-2.PNG

 

 

Create rule in parent device group using address object.

Panorama-object-3.PNG

 

You can move around in hierarcy and verify that child device group is using IP from child device group.

Panorama-object-4.PNG

 

And if you push policy into firewall then it uses correct IP.

Panorama-object-5.PNG

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Hrm, interesting.  I'll have to play around with that a bit.

 

Thanks for the tip.

 

Cheers,

Freddie

Okay, so would create a parent Device Group that will hold all of the Security Policies and NAT Policies,  and whatnot, using generic Address Object names for things.  Use a generic, non-routable IP for the value of the Address Objects.  There wouldn't be any firewalls associated with this Device Group.

 

Then create separate Device Groups for each firewall, nesting them all underneath the parent DG.  Recreate each of the Address Objects from the parent DG, assigning the correct IPs for that firewall into the AOs.

 

Did a couple of test rules using the above, and it appears to work.  Will need to play with this some, as this would also require having all the Zone configuration and whatnot configured in the Templates.

 

 

are you talking about "overriding" that address object in the lower device groups, or actually creating another object?  

I think this solution works only if you are using an object for the NAT rule, but if you are using PAT (Translate using the IP address of the untrust interface), I see we cant add an object for that, I only accepts a hardcoded IP address, so we cant use the object overriding unfortuntely.

 

If we try to commit a NAT rule (PAT) that is referencing an IP address of the untrust interface, but that ip address does not exist on the firewall, it will fail the commit.

 

Still trying to find a solution to this an avoid having NAT rules on 2 separate child Device groups (one for each firewall) while the Firewall Policies and SSL decryption policies on the Parent Device group.

 

Solved based on the provided solution 🙂

 

The way the firewall was configured was to use the IP address of the Interface., In the example below the interface IP was set to 1.1.1.1/32.

 

CarlosJimenez_0-1732825573159.png

 

So if we just change the way the NAT was configured, to use an object instead of the IP address of the interface, and for the object we use the exact same IP address of the interface, then NAT still works, and this allows us to do the object overriding on the child Device groups for 2 Different Firewalls that are sharing the same NAT policies from a Parent Device group.

 

  • 1 accepted solution
  • 5660 Views
  • 6 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!