Technical Articles
F5 SMEs share good practice.
cancel
Showing results for 
Search instead for 
Did you mean: 
KevinGallaugher
F5 Employee
F5 Employee

Summary

This article is part of a series on implementing Orchestrated Infrastructure Security. It includes High Availability and the protection of critical assets using Virtual Palo Alto NGFW.  It is assumed that SSL Orchestrator is already deployed, and basic network connectivity is working.

If you need help setting up SSL Orchestrator for the first time, refer to the Dev/Central article series on Implementing SSL Orchestrator here or the CloudDocs Deployment Guide here.

This article focuses on using SSL Orchestrator as a tool to assist with simplifying Change Management processes, procedures and shortening the duration of the entire process.

Configuration files of Palo Alto NGFW can be downloaded from here from GitLab. 

Please forgive me for using SSL and TLS interchangeably in this article.

This article is divided into the following high level sections:

Part 1 (available here) 

  • Palo Alto NGFW Virtual Machine configuration
  • Create a new Topology to perform testing
  • Monitor Palo Alto statistics – change the weight ratio – check Palo Alto stats again
  • Remove a single Palo Alto VM from the Service

Part 2 (available here)

  • Perform maintenance on the Palo Alto VM
  • Add the Palo Alto VM to the new Topology
  • Test functionality with a single client
  • Add the Palo Alto VM back to the original Topology
  • Test functionality again
  • Repeat to perform maintenance on the other Palo Alto VM

Palo Alto Virtual Machine configuration

If you haven’t already configured the Palo Alto Virtual Machines there are a few things to be aware of.  For the ESX Network configuration you will need 4 interfaces at a minimum. The configuration should look something like this:

Screen Shot 2023-02-27 at 2.27.59 PM.png

The corresponding Palo Alto network settings should look something like the image below.

Click the name (ethernet1/X) of the interface you wish to configure. 

Screen Shot 2019-10-24 at 12.51.01 PM.png

Set the Interface Type to Virtual Wire and the Security Zone to trust.  Click OK. 

Do the same for the next interface.

Screen Shot 2023-02-27 at 3.39.58 PM.png

Click the name of one of the interfaces configured previously.  Click Virtual Wire > New Virtual Wire. 

Screen Shot 2023-02-27 at 3.40.44 PM.png

Give it a name.  Select the 2 interfaces configured previously.  Click OK and OK. 

Screen Shot 2023-02-27 at 3.41.27 PM.png

You will need to Commit the changes for them to take effect.

Note: setting the Security Zone to trust is needed for the F5 Health Monitors to work.

Repeat these steps if configuring SSL Orchestrator deployed with High Availability.

Create a new Topology to perform testing

A new Topology will be used to safely test the Service after maintenance is performed.  The Topology should be similar to the one used for production traffic.  This Topology can be re-used in the future.

From the BIG-IP Configuration Utility select SSL Orchestrator > Configuration.  Click Add under Topologies.

Screen Shot 2021-01-15 at 10.59.33 AM.png

Scroll to the bottom of the next screen and click Next.

Screen Shot 2021-01-15 at 10.59.54 AM.png

Give it a name, Topology_Staging in this example.

Screen Shot 2021-01-15 at 11.00.43 AM.png

Select L2 Inbound as the Topology type then click Save & Next.

Screen Shot 2021-01-15 at 11.00.53 AM.png

For the SSL Configurations you can leave the default settings.  Click Save & Next at the bottom.

Screen Shot 2021-01-15 at 11.01.32 AM.png

Click Save & Next at the bottom of the Services List.

Screen Shot 2021-01-15 at 11.01.50 AM.png

Click the Add button under Services Chain List.  A new Service Chain is needed so we can remove PaloAlto1 from the Production Service and add it here.

Screen Shot 2021-01-15 at 11.02.02 AM.png

Give the Service Chain a name, Staging_Chain in this example.  Click Save at the bottom.

Screen Shot 2021-01-15 at 11.02.23 AM.png

Note: The Service will be added to this Service Chain later.

Click Save & Next.

Screen Shot 2021-01-15 at 11.02.38 AM.png

Click the Add button on the right to add a new rule.

Screen Shot 2021-01-15 at 11.56.33 AM.png

For Conditions select Client IP Subnet Match.

Screen Shot 2021-01-15 at 11.03.09 AM.png

Enter the Client IP and mask, 10.1.11.52/32 in this example.  Click New to add the IP/Subnet.

Screen Shot 2021-08-12 at 1.33.35 PM.png

Set the SSL Proxy Action to Intercept.

Screen Shot 2021-01-15 at 11.05.40 AM.png

Set the Service Chain to the one created previously.

Screen Shot 2021-01-15 at 11.06.03 AM.png

Click OK.

Screen Shot 2021-08-12 at 1.34.27 PM.png

Note: This rule is written so that a single client computer (10.1.11.52) will match and can be used for testing.  In the All Traffic default rule set the SSL Proxy Action to Bypass.

Screen Shot 2022-10-11 at 12.56.17 PM.png

Select Save & Next at the bottom.

Screen Shot 2021-01-15 at 11.06.29 AM.png

For the Interception Rule set the Source Address to 10.1.11.52/32.  Set the Destination Address/Mask to 10.4.11.0/24.  Set the port to 443.

Screen Shot 2021-08-12 at 1.35.44 PM.png

Select the VLAN for your Ingress Network and move it to Selected.

Screen Shot 2022-10-11 at 12.58.40 PM.png

Set the L7 Profile to Common/http.

Screen Shot 2021-01-15 at 11.08.03 AM.png

Click Save & Next.

Screen Shot 2021-01-15 at 11.08.12 AM.png

For Log Settings, scroll to the bottom and select Save & Next.

Screen Shot 2021-01-15 at 11.08.23 AM.png

Click Deploy.

Screen Shot 2021-01-15 at 11.08.33 AM.png

Monitor Palo Alto statistics – change the weight ratio – check Palo Alto statistics again

Check the statistics on the Palo Alto NGFW we will be performing maintenance on.  It’s “Palo_Alto1” in this example.

From the Palo Alto GUI select ACC (Application Command Center).

Screen Shot 2021-08-12 at 10.17.29 AM.png

Select Network Activity then Sessions.  A time filter can be set on the left, in this case it’s set to the Last Hour.

PAN-ACC.png

Palo_Alto1 appears to be completely healthy.

Screen Shot 2021-08-12 at 9.57.07 AM.png

Change the Weight Ratio

Back to the SSL Orchestrator Configuration Utility.  Click SSL Orchestrator > Configuration > Services > then the Service name, ssloS_PALOALTO in this example.

Services-Palo.png

Click the pencil icon to edit the Service.

Screen Shot 2021-01-15 at 11.13.31 AM.png

Click the pencil icon to edit the Network Configuration for PaloAlto2

Network-Config.png

Set the ratio to 65535 and click Done.

65535.png

Note: Alternately you could disable the Pool Member from LTM > Pools.

Click Save & Next at the bottom.

Screen Shot 2021-01-15 at 11.15.11 AM.png

Click OK if presented with the following warning.

Screen Shot 2021-01-15 at 11.15.20 AM.png

Click Deploy.

Screen Shot 2021-01-15 at 11.15.45 AM.png

Click OK when presented with the Success message.

Screen Shot 2021-01-15 at 11.16.12 AM.png

Check Palo Alto Statistics Again

Check the ACC statistics on “Palo_Alto1”.  It should look like the image below, with the number of sessions tapering off until there is zero.

Screen Shot 2021-08-12 at 10.19.48 AM.png

Remove a single Palo Alto VM from the Service

Back to the SSL Orchestrator Configuration Utility.  Click SSL Orchestrator > Configuration > Services > then the Service name, ssloS_PALOALTO in this example.

Services-Palo.png

Click the pencil icon to edit the Service.

Screen Shot 2021-01-15 at 11.13.31 AM.png

Under Network Configuration, delete Palo1.

Network-config-delete.png

Click Save & Next at the bottom.

Screen Shot 2021-01-15 at 1.34.09 PM.png

Click OK if presented with the following warning.

Screen Shot 2021-01-15 at 11.15.20 AM.png

Click Deploy.

Screen Shot 2021-01-15 at 11.15.45 AM.png

Click OK when presented with the Success message.

Screen Shot 2021-01-15 at 11.16.12 AM.png

Proceed to Part 2

Comments

Palo Alto and F5 is favorite combination!

Version history
Last update:
‎14-Mar-2023 10:06
Updated by:
Contributors