Pan8 Cybersecurity Essentials Lab 2: Configuring Authentication
Pan8 Cybersecurity Essentials Lab 2: Configuring Authentication
NETLAB Academy Edition, NETLAB Professional Edition, and NETLAB+ are registered trademarks of Network Development Group, Inc.
Palo Alto Networks and the Palo Alto Networks logo are trademarks or registered trademarks of Palo Alto Networks, Inc.
Lab 2: Configuring Authentication
Contents
Introduction ........................................................................................................................ 3
Objective ............................................................................................................................. 3
Lab Topology ....................................................................................................................... 4
Lab Settings ......................................................................................................................... 5
2 Lab: Configuring Authentication ................................................................................ 6
2.0 Load Lab Configuration ....................................................................................... 6
2.1 Configure a Local User Account and Authentication Profile................................ 9
2.2 Enable the Captive Portal and Enable Web-Form based Logins ........................ 13
2.3 Create an Authentication Policy......................................................................... 17
2.4 Commit and Test Authentication Policy............................................................. 20
Introduction
In this lab, you will configure the Firewall to use a Captive Portal to authenticate users
by using a local user account and Authentication Policy.
Objective
Lab Topology
Lab Settings
The information in the table below will be needed in order to complete the lab. The
task sections below provide details on the use of this information.
4. In the Google Chrome address field, type https://192.168.1.254 and press Enter.
5. You will see a “Your connection is not private” message. Click on the ADVANCED
link.
8. Navigate to Device > Setup > Operations > Load named configuration snapshot.
9. In the Load Named Configuration window, select pan8-ce-lab-02 from the Name
dropdown box and click OK.
10. A message will confirm the configuration has loaded. Click Close to continue.
11. Click the Commit link located at the top-right of the web interface.
12. In the Commit window, click Commit to proceed with committing the changes.
13. When the commit operation successfully completes, click Close to continue.
The commit process takes changes made to the Firewall and copies
them to the running configuration, which will activate all configuration
changes since the last commit.
In this section, you will configure a local user account. Then, you will create a local
authentication profile which will later be assigned to a security policy.
3. In the Zone window, click the Enable User Identification checkbox, under the
User Identification ACL. Then, click the OK button.
This will enable the inside zone to use a Username for authentication.
4. Navigate to Device > Local User Database > Users > Add. You may need to scroll
down on the left pane.
5. In the Local User window, type lab-web in the Name field. Then, type Pal0Alt0
in the Password and Confirm Password fields. Finally, click the OK button.
6. Navigate to Device > Authentication Profile > Add. You may need to scroll up on
the left pane.
8. In the Authentication Profile window, click on the Advanced tab. Then, click on
the Add button. Next, select all from the dropdown in the Allow List column.
Finally, click the OK button.
2.2 Enable the Captive Portal and Enable Web-Form based Logins
In this section, you will enable a captive portal. In that captive portal, you will use a web-
form for login.
2. Under the Captive Portal Settings tab, click on the gear icon.
3. In the Captive Portal window, click the Enable Captive Portal checkbox. Then,
select Local-Auth-Profile from the Authentication Profile dropdown. Finally, click
the OK button.
This will turn on the Captive Portal for web-form logins and associate it
with the Local-Auth-Profile you created earlier.
4. Navigate to Objects > Authentication. You may need to scroll down on the left
pane.
7. You will notice a new entry named default-web-form-1 has been created, click
on default-web-form-1.
In this section, you will enable a captive portal. A captive portal redirects web requests
that match the authentication policy and forces the user to use a login to continue. This
is typically seen in corporate guest networks, hotels and Wi-Fi hotspots. In this captive
portal, you will use a web-form for login.
3. In the Authentication Policy Rule window, click on the Source tab. Then, click the
Add button in the Source Zone section. Next, select inside.
4. In the Authentication Policy Rule window, click on the Destination tab. Then,
click the Add button in the Destination Zone section. Next, select outside.
5. In the Authentication Policy Rule window, click on the Service/URL Category tab.
Then, click on the Add button in the Service section. Next, select service-https.
6. In the Authentication Policy Rule window, click on the Actions tab. Then, select
local-web-form-auth from the Authentication Enforcement dropdown. Then,
click the OK button.
In this section, you will commit your changes and test the authentication policy with the
captive portal.
1. Click the Commit link located at the top-right of the web interface.
2. In the Commit window, click Commit to proceed with committing the changes.
You will see a vsys1 in Warnings, which refers to a virtual system in the
Firewall. You can ignore it in this lab environment.
5. In the address bar, type http://www.facebook.com and press Enter. You will
need to confirm the certificate error, and click Continue to this website (not
recommended).
You are seeing this error because the Firewall is intercepting traffic
coming from the inside zone to the outside zone. The Firewall serves as
a man-in-the-middle until authenticated.
6. You will see a web-form login, type lab-web as the username. Then, type
Pal0Alt0 as the password. Finally, click the Login button.
7. You will then see Facebook after you successfully authenticate to the Firewall as
lab-web.
10. You will see in the logs the entries to facebook-base are associated to the lab-
web user. You may need to manually refresh logs or check additional pages at
the bottom.