Aykut Koksal Essentials I Project
PaloAlto Networks Cybersecurity Academy Essentials I
ESSENTIALS I COURSE PROJECT
Contents
Lab 1: Creating a Zero Trust Environment ........................................................................................... 2
Lab 2: Configuring Authentication ....................................................................................................... 6
Lab 3: Using Two-Factor Authentication to Secure the Firewall ......................................................... 8
Lab 4: Allowing Only Trusted Applications ........................................................................................... 9
Lab 5: Managing Certificates................................................................................................................ 10
Lab 6: Decrypting SSH Traffic ............................................................................................................... 11
Lab 7: Decrypting SSL Inbound Traffic ................................................................................................. 13
Lab 1: Creating a Zero-Trust Environment
In this lab, I learned to set up security zones on the Firewall and applied Security principles to each of
them. Then I created a NAT policy and tested the entire setup by browsing a Facebook page using
Internet Explorer. Lab result successful:
Zones;
“Security Policy Rule Actions” Student input: 3.10
Student input: 3.15
Student input: 4.6
Student input: 4.16
Lab 2: Configuring Authentication
In this lab, the Firewall is configured to use a Captive Portal to authenticate users by using a lo-
cal user account and Authentication Policy. This lab, the following tasks are performed:
• Configure a Local User Account and Authentication Profile
• Enable the Captive Portal and Enable Web-Form based Logins
• Create an Authentication Policy
• Commit and Test Authentication Policy
See below,
Student input: 4.11
Apparently (again!) The PAN lab 2 example was wrong because IE was having problems with TLS (I'm
not sure what TLS 1.2 is currently) and the mod could not display the page.
Opening the facebook URL on Google created the Sign In Required screen for Google-based breads.
At least that was successful
Student input: 4.15 – 4.16
Lab 3: Using Two-Factor Authentication to Secure the Firewall
In this lab, the Firewall is configured to use two-factor authentication using a certificate, along with a
username and password. The following tasks are performed:
• Create a Local User Account
• Generate Certificates
• Create a Certificate Profile
• Export Certificate and Commit
• Test Connectivity and Import Certificate on the Client
Below result successful:
Lab 4: Allowing Only Trusted Applications
In this application I created a group of reliable laboratory and then I apply a security group that
allows them to communicate on the network. Then, you will test the security policy you modified
earlier. Next, you will add an additional application to the application group, Trusted-Apps. Finally,
you will verify the additional application is allowed. Pictures captured on this lab: My input: From this
lab, I learn how to create an application group. To simplify the creation of security policies,
applications requiring the same security settings can be combined by creating an application group.
Then learn how to modify the Allow-Inside-Out security policy to only allow the applications in the
application group, Trusted-Apps. Finally, commit and learn how to test the security policy. See below,
Lab 5: Managing Certificates
In this lab, I created a self-signed RA Certificate and transfer the Modified Certificate to the client for
incoming traffic management and added the certificate to the client and tested the connection
status. In the domain, this will help me know how to install Certificates to secure traffic between
client and Firewall. See below,
Lab 6: Decrypting SSH Traffic
In this lab, I prepared a policy to decrypt SSL traffic, then I logged into the DMZ server to generate
traffic and checked the Firewall Logs to verify that the traffic was not encrypted.
This monitoring traffic to protect areas prone to attack if necessary helps to real-life scenarios. See
below
After disabling the policy, it was seen that the traffic was not decrypted.
Monitor logs,
Lab 7: Decrypting SSL Inbound Traffic
In this lab, we decrypted the SSL traffic from the internal clients to the DMZ server, then we
examined it to make sure that the allowed applications communicate with it.
By doing this, the firewall can detect malicious content trying to access the DMZ server. See below,
A Decryption policy has been created using the object created so far
It was tested by opening a web page on the DMZ server and checking the Firewall logs to verify that
the traffic was decrypted.
Then we disabled the policy and tested it again. By checking the logs, we can now see that the traffic
is encrypted.
Monitor logs,