Internet Gateway Templates

The configuration snippet descriptions and the associated GitHub repository link for each xml snippet.

Panorama can be configured using shared elements and device-specific elements. The MSSP templates are based on a non-shared model to isolate each customer configuration. Deployments requiring shared or mixed models will need to edit the templates specific to their environment.

The templates are incremental to and reference the iron-skillet day one configurations. The details of the iron-skillet templates can be found at:

https://iron-skillet.readthedocs.io/en/panos_v8.1/panorama_template_guide.html.

The .meta-cnc.yaml file in each configuration directory contains:

  • list of variables and default values
  • load order including the xpaths and snippet file names

Note

SET commands are also included with the panos templates for users requiring quick configuration to sandbox or test. These can also be used for network deployments where Panorama is not leveraged.

Internet Gateway Baseline


This section provides templated configurations for network elements used by Gold, Silver, and Bronze services.

The Internet gateway deployment is a 2-zone, 2-interface model with IP routing.

Interface settings

Panorama template: internet_gateway_base/interface_template.xml Panorama template: internet_gateway_base/interface_stack.xml

PAN-OS template: internet_gateway_base/interface.xml

Sample interface configurations with one for external/untrust and one internal/trust.

  • untrust interface uses DHCP and provides default route inheritance to the internet
  • trust interface is uses a static IP configuration
  • the interface names and the trust IP address are variables to adjust as needed

Note

The Panorama template is an extension of Iron-Skillet and includes network elements including interfaces and zones. Thus this model uses 2 templates (skillet and internet gateway) with zones and address override in the stack. The internet gateway (ig) template is required to add the interface while the stack is required to associate to a device.

Zones

Panorama template: internet_gateway_base/zone.xml

PAN-OS template: internet_gateway_base/zone.xml

Two zones are provided in the template. The names are variables with default values set to trust and internet.

Vsys Import

Panorama template: internet_gateway_base/vsys_imports.xml

PAN-OS template: internet_gateway_base/vsys_imports.xml

Although not seen in the GUI or CLI configuration, the xml loading requires this mapping to associate interfaces to zones.

Virtual Router

Panorama template: internet_gateway_base/virtual_router.xml

PAN-OS template: internet_gateway_base/virtual_router.xml

The internet gateway deployment uses L3 zones and interfaces so routing configuration is required.

  • adds each of the firewall interfaces
  • uses inheritance from the DHCP internet interface to create a default gateway route to the internet

Source NAT

Panorama template: internet_gateway_base/source_nat_to_untrust.xml

PAN-OS template: internet_gateway_base/source_nat_to_untrust.xml

Provides dynamic ip and port mapping using the public internet interface address.

Network Profiles

Panorama template: internet_gateway_base/network_profiles.xml

PAN-OS template: internet_gateway_base/network_profiles.xml

Interface management profiles

  • sets the interface interface for ping only
  • allows for configuration access from the trust interface

Note

Device management will vary by MSSP. It is expected that these profiles will be updated specific to the MSSP management model.

Gold Template


The gold configuration provides outbound security rules referencing the iron-skillet security profiles and logging. It requires all subscription tiers for full functionality.

Unknown URL Category Profile Group

Panorama template: gold/profile_group_unknown_url.xml

PAN-OS template: gold/profile_group_unknown_url.xml

This adds additional protections with a more aggressive file blocking posture when the URL category is unknown. It is referenced in the gold security rules.

Gold Security Rules

Panorama template: gold/security_rules_gold.xml

PAN-OS template: gold/security_rules_gold.xml

These are outbound-specific rules levering the iron-skillet security profile groups.

  • Aggressive file blocking including PE file types when URL category = unknown
  • Outbound access for all applications using ‘application default’ port requirements
  • Non-defaul SSL ports: allows bypass of app defaults for SSL traffic; tracking for non-standard ports
  • Non-default web ports: allows bypass of app defaults for web traffic; tracking for non-standard ports
  • Non-default application ports: allows bypass of app defaults for all traffic; tracking for non-standard ports

Warning

The non-default ports effectively allow all outbound traffic on any port. These are provided due to the variance of ports used and for SMB deployments to avoid rampant support calls. The explicit rules provide for hit counts to track and monitor out-of-bounds and suspicious applications.

Gold Tag

Panorama template: gold/tag.xml

PAN-OS template: gold/tag.xml

The gold tag is provided and use by the security rules to view rules associated to the gold service.

Silver Template


The silver configuration provides outbound security rules referencing the iron-skillet security profiles and logging.

Warning

This tier does not provide support for best-practice security configurations due to the lack of URL Filtering and Wildfire subscriptions. Although the configuraiton from iron-skillet does embed these elements, they are ignored with a commit warning that the license is invalid.

Silver Security Rules

Panorama template: silver/security_rules_silver.xml

PAN-OS template: silver/security_rules_silver.xml

These are outbound-specific rules levering the iron-skillet security profile groups.

  • Outbound access for all applications using ‘application default’ port requirements
  • Non-defaul SSL ports: allows bypass of app defaults for SSL traffic; tracking for non-standard ports
  • Non-default web ports: allows bypass of app defaults for web traffic; tracking for non-standard ports
  • Non-default application ports: allows bypass of app defaults for all traffic; tracking for non-standard ports

Warning

The non-default ports effectively allow all outbound traffic on any port. These are provided due to the variance of ports used and for SMB deployments to avoid rampant support calls. The explicit rules provide for hit counts to track and monitor out-of-bounds and suspicious applications.

Silver Tag

Panorama template: silver/tag.xml

PAN-OS template: silver/tag.xml

The silver tag is provided and use by the security rules to view rules associated to the silver service.

Bronze Template


The bronze configuration provides outbound security rules referencing the iron-skillet security profiles and logging.

Warning

This tier does not provide support for best-practice security configurations due to the lack of Threat Protection, URL Filtering and Wildfire subscriptions. Although the configuraiton from iron-skillet does embed these elements, they are ignored with a commit warning that the license is invalid.

Bronze Security Rules

Panorama template: bronze/security_rules_bronze.xml

PAN-OS template: bronze/security_rules_bronze.xml

These are outbound-specific rules levering the iron-skillet security profile groups.

  • Outbound access for all applications using ‘application default’ port requirements
  • Non-defaul SSL ports: allows bypass of app defaults for SSL traffic; tracking for non-standard ports
  • Non-default web ports: allows bypass of app defaults for web traffic; tracking for non-standard ports
  • Non-default application ports: allows bypass of app defaults for all traffic; tracking for non-standard ports

Warning

The non-default ports effectively allow all outbound traffic on any port. These are provided due to the variance of ports used and for SMB deployments to avoid rampant support calls. The explicit rules provide for hit counts to track and monitor out-of-bounds and suspicious applications.

Warning

Due to the lack of subscription services, the only active security profile is file-blocking. Customers should consider a service upgrade to increase their security posture.

Bronze Tag

Panorama template: bronze/tag.xml

PAN-OS template: bronze/tag.xml

The bronze tag is provided and use by the security rules to view rules associated to the silver service.