How to Configure Palo Alto Firewall for the First Time

Spread the love

Setting up a Palo Alto firewall for the first time can seem complex, but with the right guidance, you’ll have it up and running in no time. This step-by-step guide is designed to help you configure your Palo Alto PA-450 (or similar series) from scratch.

Palo Alto firewall setup and global network security illustration

✅ Prerequisites Before You Start

  • A Palo Alto firewall (e.g., PA-450)
  • Ethernet cable
  • A laptop/PC with a browser
  • Default login credentials:
    Username: admin
    Password: admin

🔧 Initial Configuration Steps

1. Connect to the Management Interface

  • Connect your laptop to the MGT port on the firewall using an Ethernet cable.
  • Manually assign the following IP to your laptop:
IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0

2. Login to Web Interface

  • Open your browser and go to: https://192.168.1.1
  • Accept the security warning.
  • Login using:
    • Username: admin
    • Password: admin
  • You’ll be prompted to change the default password — do it immediately.

3. Set Hostname, Timezone, and DNS

Go to: Device → Setup → Management

  • Set the hostname (e.g., PA-450-FW)
  • Choose your timezone
  • Enter public DNS servers:
8.8.8.8
1.1.1.1

4. Configure Management IP (Optional)

  • Go to: Device → Setup → Interfaces → Management
  • Assign a static IP (e.g., 192.168.10.1)
  • Set subnet mask and gateway (if needed)

5. Retrieve Licenses

  • Connect a WAN interface (e.g., ethernet1/1) to the internet.
  • Go to: Device → Licenses
  • Click “Retrieve license keys from Palo Alto Networks”
  • Ensure your device is licensed for Threat Prevention, WildFire, URL Filtering, and Support.

🌐 Network Configuration

6. Create Security Zones

Go to: Network → Zones → Add

  • Create: trust (for internal LAN)
  • Create: untrust (for internet-facing WAN)

7. Configure Interfaces

Go to: Network → Interfaces → Ethernet

Set Layer 3 interfaces:

InterfaceZoneIP AddressDescription
ethernet1/1untrust192.168.1.2/24WAN interface
ethernet1/2trust192.168.10.1/24LAN interface

Assign each interface to the correct virtual router (default) and zone.

8. Configure Virtual Router + Static Route

Go to: Network → Virtual Routers → default

  • Add a static route:
Name: default-route
Destination: 0.0.0.0/0
Next Hop: 192.168.1.1 (your internet gateway)
Interface: ethernet1/1

🔐 Security Policy + NAT

9. Create Security Policy

Go to: Policies → Security → Add

  • Name: Allow Internet
  • From Zone: trust
  • To Zone: untrust
  • Source/Destination: any
  • Application: any
  • Service: any
  • Action: allow

10. Configure NAT Policy

Go to: Policies → NAT → Add

  • Name: Internet NAT
  • Original Packet:
    • From: trust
    • To: untrust
    • Source/Destination: any
  • Translated Packet:
    • Translation Type: Dynamic IP and Port
    • Interface Address: ethernet1/1

11. Commit the Configuration

  • Click Commit at the top-right.
  • Wait for the commit to complete (1–2 minutes).

12. Test Connectivity

  • Connect a PC to the LAN interface (e.g., ethernet1/2)
  • IP: 192.168.10.10
  • Gateway: 192.168.10.1
  • Test internet by pinging 8.8.8.8 or browsing any website

🗂️ Optional Enhancements

  • Enable Threat Prevention, URL Filtering, and WildFire profiles
  • Configure GlobalProtect VPN
  • Enable Logging and Alerts
  • Backup your config regularly via Device → Setup → Operations

🧐 Final Thoughts

This guide helps you set up your Palo Alto PA-450 (or similar) from scratch in a secure and scalable way. Once the basics are done, you can move on to more advanced topics like User-ID, SSL Decryption, HA, and advanced reporting.

Need more advanced setup guides? Drop a comment or contact us directly at contact@firewallflow.com or visit firewallflow.com!

📄 Example XML Configuration

This is a sample XML configuration for a basic Palo Alto firewall setup, including management IP, zones, interfaces, NAT, and security policies. You can use this as a reference or import it (with modifications) into your own firewall for quick initial configuration.

<?xml version=’1.0′ encoding=’UTF-8′?> <config version=”11.0.0″> <devices> <entry name=”localhost.localdomain”> <deviceconfig> <system> <ip-address>10.168.1.20</ip-address> <netmask>255.255.255.0</netmask> <default-gateway>10.168.1.1</default-gateway> <services> <ssh>yes</ssh> <https>yes</https> </services> </system> </deviceconfig> <network> <interface> <ethernet> <entry name=”ethernet1/1″> <layer3> <ip> <entry name=”192.168.1.2/24″/> </ip> </layer3> </entry> <entry name=”ethernet1/2″> <layer3> <ip> <entry name=”192.168.10.1/24″/> </ip> </layer3> </entry> </ethernet> </interface> <virtual-router> <entry name=”default”> <interface> <member>ethernet1/1</member> <member>ethernet1/2</member> </interface> <routing-table> <ip> <static-route> <entry name=”default-route”> <destination>0.0.0.0/0</destination> <nexthop> <ip-address>192.168.1.1</ip-address> </nexthop> <interface>ethernet1/1</interface> </entry> </static-route> </ip> </routing-table> </entry> </virtual-router> </network> <vsys> <entry name=”vsys1″> <zone> <entry name=”trust”> <network> <layer3> <member>ethernet1/2</member> </layer3> </network> </entry> <entry name=”untrust”> <network> <layer3> <member>ethernet1/1</member> </layer3> </network> </entry> </zone> <nat> <rules> <entry name=”internet-nat”> <from> <member>trust</member> </from> <to> <member>untrust</member> </to> <source> <member text=”any”/> </source> <destination> <member text=”any”/> </destination> <service>any</service> <source-translation> <dynamic-ip-and-port> <interface-address> <interface>ethernet1/1</interface> </interface-address> </dynamic-ip-and-port> </source-translation> </entry> </rules> </nat> <rulebase> <security> <rules> <entry name=”allow-internet”> <from> <member text=”trust”/> </from> <to> <member text=”untrust”/> </to> <source> <member text=”any”/> </source> <destination> <member text=”any”/> </destination> <application> <member text=”any”/> </application> <service> <member text=”any”/> </service> <action>allow</action> </entry> </rules> </security> </rulebase> </entry> </vsys> </entry> </devices> </config>
Scroll to Top
We use cookies in order to give you the best possible experience on our website. By continuing to use this site, you agree to our use of cookies.
Accept