Tuesday, 28 January 2025

geoblock on palo alto

The FW needs to see the IP before geoblock can be applied 


under monitor > logs > GlobalProtect

( stage eq 'login' ) and ( status eq 'success' )


Also

Network > Gateways, click on the "Remote Users" link on the right


There is also the option to create the NAT for the GP IP only for the geo locations allowed


Have a general security rules with geoblock to/from any deny

Have a security rule to allow access to the GP IP only from the approved countries

Set the countries up in the GP config (portal / gateway)

Config the geoblock on any 2FA you might be using for 2FA as well as another line of defence

Enable the palo EDL blocks and dynamic threats etc, strict IPS

Wednesday, 22 January 2025

exclude IP's from nessus scan

Say we want to exclude 101 and 102 we can create targets like so:


192.168.1.1-192.168.1.100, 192.168.1.103-192.168.1.254

Nessus HSTS check and redirects HTTP 3xx codes

 https://community.tenable.com/s/article/Verify-strict-transport-security-header-for-HSTS-Missing-From-HTTPS-Server?language=en_US


curl -sSI http://domain.com/

Friday, 17 January 2025

Palo alto and azure SAML auth

KBs:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE

https://learn.microsoft.com/en-us/entra/identity/saas-apps/palo-alto-networks-globalprotect-tutorial



Generate the the cert and make it active

Delete the old cert

Wait a few minutes for azure cloud to update 

Download the xml

delete old certs from palo

Import the xml into palo this will create cert and SAML IDP profile

Don't tick validate check box

Select the new IDP profile in your azure auth profile

Thursday, 2 January 2025

NAT rules on palo alto

 Making a note because its a bit different to cisco ASA


NAT rule

OUTSIDE > OUTSIDE 

Public src > Public dst


FW rule 

OUTSIDE > INSIDE (counted as inside because of the NAT)

Public src > Public dst