Тёмный
NETSums
NETSums
NETSums
Подписаться
Welcome! This channel is focused on creating tutorials and walkthroughs for Network Professionals. I hope I will be able to help you configure and manage your Palo Alto Firewalls and boost your networking career!

- ABOUT -

Ricardo has been a network professional for over 20 years. For the last 7 years he has been daily working with the Palo Alto Firewalls. He comes originally from Brazil, and has been living in Germany since 2004.
Palo Alto GlobalProtect Clientless VPN [2024]
26:07
7 месяцев назад
Adding a Palo Alto Firewall to Panorama
7:31
9 месяцев назад
Palo Alto URL Filtering and URL Categories
15:48
9 месяцев назад
Palo Alto NAT Configuration [2024]
6:33
9 месяцев назад
Palo Alto Tech Support File [2024]
1:26
10 месяцев назад
Palo Alto Firewall - Static Routes [2024]
2:40
10 месяцев назад
Palo Alto Panorama Template Variables [2024]
1:32
11 месяцев назад
Palo Alto Firewall - Packet Capture [2024]
10:47
11 месяцев назад
Комментарии
@Josellv_
@Josellv_ День назад
Amazing
@netsums
@netsums День назад
Thank you, I'm glad you liked it. :-)
@tundetade6472
@tundetade6472 День назад
Hello, I have this error of virtual adapter not set up correctly due to a delay. It's frustrating. help
@Rucci00
@Rucci00 2 дня назад
Hello, I have already made the configuration that you explain in your video and when I connect to the GP portal I have no problem but when I try to connect through the VPN client that is, when I connect to the gateway it gives me the following error: AADSTS700016 Do you know how it can be solved?
@A..n..d..y
@A..n..d..y 2 дня назад
In the Global Protect Gateway Configuration - agent - you skip over the part about the tunnel interface. We never go into creating on the tunnel.
@netsums
@netsums 2 дня назад
I show it in minute 5:08.
@Killa_krayon917
@Killa_krayon917 2 дня назад
This was great and informative. I am hoping to deploy this very soon. Does the Palo encrypt the data once it has inspected it and sends it to the final destination? I'll search the PA KBs in support but I'm just wondering how the last leg of data is handled. For topics I would like to see a video on HA Active / Active with shared resources and converged NAT table to eliminate the need for Source NAT when a resource is available via two external gateways.
@netsums
@netsums 2 дня назад
Thank you for your video suggestion. And yes, the Palo Alto encrypts the data again going to the server. It doesn't do SSL offloading.
@brianleb
@brianleb 3 дня назад
How would I setup multiple firewalls to use the CA generated on one firewall?
@brianleb
@brianleb 2 дня назад
Answer is to export the CA cert from the originating firewall and then import it on each additional PA and setup the in a Cert Profile and attach that to the UserID Connection Security
@tarangshah6399
@tarangshah6399 3 дня назад
Hi Ricardo, it's amazing video. Its help me to achieve my goal which I was searching same solution since last few months. Even Palo Alto Tac Engineer was not able to support. Only one advise to achieve 100% that is it possible to restart PANGPS service for all GlobalProtect users remotely and is it possible? Other issue is while testing found that first time needs to login with External gateway and then it is working next time login with Internal gateway with on premise dns server successfully authentication.
@user-qu3hc9kt6i
@user-qu3hc9kt6i 4 дня назад
Please also make a video of the Palo Alto EDL (External dynamic List) feature. I am curious about how to connect to the EDL server in https mode instead of http.
@netsums
@netsums 2 дня назад
Good suggestion, I'll keep that in mind for upcoming videos. Thank you.
@gabintalla1096
@gabintalla1096 6 дней назад
Amazing video, really helpful...Thanks again
@netsums
@netsums 2 дня назад
Thank you for the comment, I'm glad the video could be useful. :-)
@Leokev123
@Leokev123 7 дней назад
Can I check if we are configuring 2 gateway, then does both WAN ip be on the same VR?
@netsums
@netsums 7 дней назад
I'm not sure I understand your question. It doesn't matter if the routes to the gateways are configured on the same VR or not, the important thing is that the clients are able to reach the gateways.
@Leokev123
@Leokev123 7 дней назад
@netsums thanks! Anyway are we able to do Dual ISP/gateway using one portal? So they can do a auto failover
@netsums
@netsums 7 дней назад
If a client cannot connect to the first gateway, it tries the second one. So with dual ISP, it would be no problem. The only problem there is the GlobalProtect Portal. Usually a client saves the last configuration it downloaded from the portal. But if a client is connecting for the first time, and the portal is not available, the client won't be able to connect. For a portal redundancy you would probably need to setup DNS with some sort of monitoring, if you want an automatic solution.
@Leokev123
@Leokev123 7 дней назад
@@netsums I configured path monitoring in the VR for both ISP.
@ispolin1313
@ispolin1313 9 дней назад
Can we configure prelogin while using EnrtaID SSO for authentication to Global protect? How it will work? First it will use machine cert, to connect VPN, and the relogin with EntraID user creds?
@netsums
@netsums 7 дней назад
Yes, just like that. I have that implemented to a customer, it works fine.
@ispolin1313
@ispolin1313 5 дней назад
@@netsums Can you please share with me more details? Have you used EntraID certificate based authentication for this? If yes, what kind of CA you used and should machines be hybrid joined? Should cert be issued for each machine?
@imrancisco1
@imrancisco1 10 дней назад
Great video Would you please show us how this will work with PKI certs with hundreds of users having their machine certs?
@netsums
@netsums 10 дней назад
Hi. You can either have one certificate for all your clients (which I wouldn't recommend) or one different certificate for each PC. On the Palo Alto you would upload the Root CA from the PKI. I cannot go over Microsoft Group Policies or how you roll out the certificates on hundreds of PCs, because it's not my field. :-)
@ADempsey
@ADempsey 10 дней назад
If we use a public cert from globalsign will it be generated on the UserID server or from the Palo?
@netsums
@netsums 2 дня назад
You need to install the certificate on the User-ID server.
@onurcan9129
@onurcan9129 11 дней назад
Thanks for sharing another next great content, can you please demystify the packet capture via cli to analyze the traffic ? There is no plain instructions on internet about it.
@netsums
@netsums 2 дня назад
Sorry for the late reply. I found this, is it what you're looking for? indepthtechno.wordpress.com/2018/12/09/enable-packet-captures-on-palo-alto/
@andrey-qx7kg
@andrey-qx7kg 11 дней назад
God bless you man! This is the most detailed guide what I've seen .
@netsums
@netsums 2 дня назад
Glad you liked it!
@tremelai
@tremelai 12 дней назад
I have been working with PA firewalls since 2009. I find your videos very helpful for my team to get proficient with our current PA environment. I see that you share the same the joy I feel when working with technology! Thank you for your work!
@netsums
@netsums 11 дней назад
Thank you for your comment! I'm glad to hear your team is being able to learn something with the videos! 😊
@debmalyabasu479
@debmalyabasu479 13 дней назад
Nice tutorial, need Playlist for panorama Sir.
@netsums
@netsums 13 дней назад
Thank you. Here the link: ru-vid.com/group/PLzZhtxtP3S77U0ituiyfc17uFP_qB5mDV&si=gGmfeVlJyTI7kJp2
@midas1108
@midas1108 16 дней назад
I'm curious how to have the certificate verification enabled. When I import the federation metadata XML a certificate is created on the firewall. However I'm unable to modify that certificate--for example, to set it as a CA certificate, which appears to be required for this setup. When attempting to create the Authentication Profile, the add fails because there is no Certificate Profile (the exact error is that "Validate Identity Provider Certificate is checked but no Certificate Profile is provided"). I'm unable to create a certificate profile with the auto-added certificate since it isn't marked as a CA.
@netsums
@netsums 16 дней назад
I think the best way is to have a second certificate just for the requests validation, separate from the one you receive with the Metadata. I think you can even use an internal (self-signed) certificate, but I'm not 100% sure how your IdP will handle that. Let me know if it worked for you, I would be interested. :-)
@imrancisco1
@imrancisco1 16 дней назад
you have great videos but too many ads
@netsums
@netsums 16 дней назад
Hi. Sorry about the adds, but they are chosen from RU-vid. 😬
@Knifehands__
@Knifehands__ 16 дней назад
Why not add all 4 EDLs to a single inbound rule and outbound rule?
@netsums
@netsums 16 дней назад
You can also do that if you want. The advantage of separating is that you can see on the monitor which rule (EDL) matched.
@Knifehands__
@Knifehands__ 15 дней назад
@@netsums okay thanks. I figured as much, I just wasn’t sure if there were limits to URL/IP lookups per rule, or something weird like that.
@netsums
@netsums 15 дней назад
You have a good point. I don't know any limits in this sense.
@jucelinodosreis
@jucelinodosreis 17 дней назад
congratulations!
@kishortp
@kishortp 18 дней назад
Thanks for blessing us with this video. I do have 1 doubt. Im using standalone firewalls which are active-passive mode. In the identifier do i have to add both my fqdns and i can import the same metadata on both the firewall? Is that the correct step?
@netsums
@netsums 16 дней назад
I'm almost sure the URLs are not in the Metadata, because you can change them and you don't need to upload a new Metadata. So in your case, you should import the same Metadata to both firewalls and configure 2 URLs on your IdP, as you mentioned. But how does your active/passive work? Do you use DNS for that?
@kishortp
@kishortp 14 дней назад
@@netsums Thanks for your reply. Yes I do have an internal dns server and the i have pointed my firewall urls to my local firewall ip's. 1 more query: Regarding the roles, Is it possible to configure 2 roles. Because In my setup i require both read only and write permission.
@netsums
@netsums 14 дней назад
Yes, you can use the menu Admin Roles on Panorama to create the roles you need.
@kishortp
@kishortp 13 дней назад
@@netsums Thanks again mate
@yusmaribriones3658
@yusmaribriones3658 19 дней назад
Thank you for the super well explained tutorial, I used it for a Palo Alto Firewall in standalone, now I have a doubt if this in HA should be a meta file for each FW (Active and Passive management IP), thanks for your help!🙏
@netsums
@netsums 18 дней назад
Hi. Thank you for the comment. You only need to import the Metadata once, both firewalls synchronize the configuration.
@freddycalderon9092
@freddycalderon9092 19 дней назад
Great way of explaining it but would be better if you could do a tutorial step by step on configuring this option. For example, how to assign a gateway to a dual ISP.
@netsums
@netsums 16 дней назад
Hi. I will keep that in mind, thanks!
@honno7765
@honno7765 20 дней назад
Amazing video. Thank you! I think, after watching it I was able to figure out why I am getting connected to portal but the connection fails at finding the best available gateway. I misconfigured the Agent External part which is crucial to connect to the gateway
@netsums
@netsums 16 дней назад
Cool! I'm glad I could help.
@SaSemairesearch
@SaSemairesearch 21 день назад
perfect!!
@yocath
@yocath 25 дней назад
Thanks for your sharing...
@samsal073
@samsal073 Месяц назад
Hi , I was trying Verizon home internet and noticed whenever i connect my machine to work via global protec the speed goes really down. Why is that? Is there anything I can do to fix?
@netsums
@netsums Месяц назад
Sorry, I don't think I can help you there. Maybe set your MTU to 1350 or something like this? You can configure it in the portal configuration, under App. Otherwise you could take a look at the GlobalProtect client logs, maybe some errors could point you to the right direction.
@samsal073
@samsal073 29 дней назад
@@netsums thanks for the reply. I have seen post about setting the MTU but I have no idea how to do that. Can you guide me where\how I can access the portal config?
@netsums
@netsums 29 дней назад
On the firewall, you go to network -> GlobalProtect -> portals. Click on your portal and click on Agent. Click on your agent configuration and select the tab App. There you need to search for MTU (you can use the browser search, it works), if I'm not mistaken, there is only one option with MTU in it.
@normannueno2872
@normannueno2872 Месяц назад
Awesome!!!
@netsums
@netsums 29 дней назад
Thank you, I'm glad you liked the video. 😊
@Roadhouse-20
@Roadhouse-20 Месяц назад
What would be the renewal process please? Ours is about to expire and I’m looking to renew it.
@juliaperez9958
@juliaperez9958 Месяц назад
Thank you, this is very helpful. With this setup, user mapping is working, but server monitoring under User-Identification-user mapping isn't. Do you have any suggestions to get server monitoring to work
@netsums
@netsums Месяц назад
Thank you for the comment. You don't need to configure anything in the server monitoring if you have a windows based User-ID agent. If you are trying to configure the PAN-OS User-ID agent, I would suggest you to think about the windows based agent, in my experience it's a lot less problematic to setup.
@juliaperez9958
@juliaperez9958 Месяц назад
@@netsums Thank you very much for the advice. I will give that a try.
@user-zq1ww3hy4f
@user-zq1ww3hy4f Месяц назад
thanks, very well explained.
@netsums
@netsums Месяц назад
Thank you, I'm glad you liked it
@pramodkumargangwar5598
@pramodkumargangwar5598 Месяц назад
hi sir I am using Palo Alto VM trail version there is no license, can I perform this practical?
@netsums
@netsums 29 дней назад
I'm not sure. Give it a try to see if it accepts the configuration.
@bradywang2050
@bradywang2050 Месяц назад
Nice Video! How about multiple group mapping, like full access group and read-only group? Thanks.
@netsums
@netsums Месяц назад
Thank you. In this case you need a second admin role with a read only profile. Take a look at the video starting at minute 11:33.
@fisa6835
@fisa6835 Месяц назад
Hallo, I'd like to ask, can I use this way to allow users that already join domain (AD users) to bypass captive portal and non ad users has to go to captive portal?
@mirourimatia203
@mirourimatia203 Месяц назад
thanks a lot Sunny Crocket from 2 cops to miami Beach 🙂
@aajratrikageet2213
@aajratrikageet2213 Месяц назад
Hi, your video is very helpful. We have successfully enabled MFA with Azure SAML auth with Palo alto. But we have one query, as we have multi tenant on Azure and in SAML Authentication we can apply only one auth profile so how can we enable MFA with Azure SAML for our different tenant for Global Protect.
@netsums
@netsums Месяц назад
Hi, thank you, and sorry for the late reply. I think what you need is an authentication sequence. You configure a SAML authentication for each tenant and add them to a sequence. I haven't tried before a sequence with SAML, but it should work for SAML as well. Let me know later if it worked! :)
@theinkyawhtun9432
@theinkyawhtun9432 Месяц назад
Hi Sir !!! How can I choose SMTP server ? and I have no local SMTP server.
@netsums
@netsums Месяц назад
I show you in minute 10:24 how you can enter your SMTP server. You can use gmail for example, just search the Internet to see how you can set it up.
@ErickVivas-s9v
@ErickVivas-s9v Месяц назад
You did an excellent job here! Thank you very much mate!
@netsums
@netsums Месяц назад
Thank you for your reply, I'm glad you liked it!
@vjysmarty5674
@vjysmarty5674 Месяц назад
Thanks. Great video. Could you please explain how the NAT is applied by firewall and how to configure it for particularly clientless VPN. In my case the GP-clientless interface has public IP, I want it to be Natted somehow. And is there any way we can assign an IP pool similar to what we assign for client/agent-based VPN? Any help here is much appreciated.
@netsums
@netsums Месяц назад
Hi, sorry for my late reply. The firewall uses its "closest" interface to the target as the source interface (take a look at minute 16:18). So the firewall does NAT using it's own IP addresses. In your case the connection will be natted, since I suppose your application (target) is not in your outside zone. 🙂 I don't think it's possible to assign an IP pool to clientless VPN, since the firewall uses its own interfaces as source.
@RayAlejandroGaviriaAlegria
@RayAlejandroGaviriaAlegria Месяц назад
is the same process for panorama ?
@netsums
@netsums Месяц назад
Is has been a while since I did this video, but it should be the same process, yes. I didn't try it with Panorama, though. Let me know later if it worked! :)
@GeovanoQuatrin
@GeovanoQuatrin Месяц назад
Great video, it helped a lot to clarify how to set up. I'm reproducing the steps with PrivacyIdea with version 3.9.3, but the challenge response of type email doesn't appear in the list of available responses. Is there another configuration to make?
@netsums
@netsums Месяц назад
Hi, sorry for the late reply. I showed in the video the whole configuration I needed to make in my lab to make it work. I cannot tell you why the email challenge response doesn't get shown.
@animal9470
@animal9470 2 месяца назад
Do you need a support account to do this?
@netsums
@netsums 2 месяца назад
Hi. Yes, you won't get updates without a valid license.
@leanderjanlargo5690
@leanderjanlargo5690 2 месяца назад
Finally! I found a detailed procedure in implementing GlobalProtect Prelogon! Amazing! Great video! Thank you for creating such educational and highly informative content!
@netsums
@netsums 2 месяца назад
Thank you for your comment, I'm glad we were able to help.
@EduQueiroz1987
@EduQueiroz1987 2 месяца назад
I did a little confusion about this. What's the difference about a site with or whitout forward slash at the end?
@netsums
@netsums Месяц назад
Hi. Sorry for the late reply. An URL without the forward slash in the end can match more than you want. for example, if you have a URL "example.com" without the slash in the end, it will also match "example.com.badserver.com". From the Palo Alto documentation: The trailing slash prevents the firewall from assuming an implicit asterisk to the right of the domain.
@EduQueiroz1987
@EduQueiroz1987 Месяц назад
@@netsums No worries. Thanks a lot!
@dashginlazimov4923
@dashginlazimov4923 2 месяца назад
Thanks for publishing such a tutorial videos. 21:30 Doesn't Intrazone already allow kinda traffic ?, Because Thoese interfaces is in same zone I mean "Outside" that intrazone already allow kind of traffic. Is there a need to write this security policy?
@netsums
@netsums Месяц назад
Hi, sorry for the late reply. You're right if you don't change the default rules, there would be no reason to add such a rule. Since I like to change the interzone default rule to deny, so I have more control on what is being allowed, I need to do it in my case. :-) I would recommend you also to change the default rule to deny and to declare the interzone rules manually, so you can control which apps you allow, specially on your outside zone.
@Gabriel-gbl13
@Gabriel-gbl13 2 месяца назад
Great Video! Could you help me with a problem? I configured all these steps like in the video but when i try to login the application redirects me to internal ip off my panorama and i cannot access my application because it is on a private environment. I tried to change my identity url but the error occurs anyway.
@netsums
@netsums Месяц назад
Sorry for the late reply. You should be able to access your Panorama, even if it's on a private environment. Your IdP doesn't need to access your Panorama, only the client trying to authenticate.
@christianalinas
@christianalinas 2 месяца назад
👍👍👍🔥🔥
@Neur0bit
@Neur0bit 2 месяца назад
fantastic explanation. thanks for all the effort you put into these videos.
@brahimhamdi
@brahimhamdi 2 месяца назад
Hello, I need create two pools with different subjets. It’s possible ? How to do it? On asa it’s possible