[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 266
  • Last Modified:

PaloAlto Solution for 2008R2 Servers on outside network

Hello Experts,
I'm very much a novice when it comes to firewall security, terms, and options.

I have a small network which is protected by a pair of PA3020 security devices.  The current setup is working great and I have a decent handle on the security of the local networks.  I also have a working VPN (GlobalProtect) setup working with my users when they travel off-site.

I've been tasked with moving our internal infrastructures servers (DC, Shared Storage, AV, Monitoring, RADIUS, Print) to a virtual server farm which exists outside of our "trusted networks".  The server farm is accessible on the internet, but from the perspective of my local "trusted" LANs the IP range of the new VM servers is considered out on the public internet.

I do not have access to their security appliances at the server farms, only RDP to the servers.  I'm not sure at what level I can request edits to whatever security device is managing the access to my VM servers.

The VMs themselves will all be Win Server2008R2 OS, and I have admin access to the boxes via RDP.  As far as I know the security team is allowing unfettered access to the servers from my public IP address.

Keeping things at a novice level...  what are my options with regards to getting these VM servers to join my "trusted networks" and become a viable infrastructure to my LANs?

What I need to happen:
 - The server farm need to attach to my "Trusted Networks"
 - Upon reboot the servers need to automatically re-connect to my "Trusted Networks"
 - The servers will only be infrastructure boxes... (no end-user logins)
 - The servers need to have communications with my LANs and supply their individual services as if they were on-site.

What I've attempted:
I've contacted PA and have an open case.  They have suggested a GlobalProtect client type setup with "Pre-Logon" and "Always-On" VPN configuration.  I'm not sure if this is what I'm needing to setup as I will not have a user tied to the servers.

Global Protect (Client Configurations)
Global Protect (Always-On)


I'm open to any direction.  If by chance you could offer a step-by-step that would be great.
0
irishmic33
Asked:
irishmic33
  • 3
  • 3
1 Solution
 
Bryant SchaperCommented:
This seems like a very messed up design, your infrastructure servers should not be on the public internet.

What service are you hosting them in?  Is it a public cloud infrastructure like AWS or Azure?
0
 
irishmic33Author Commented:
This would be considered a private cloud.  

The service/data center is a consortium of entities which host for local businesses on our local fiber ring.  While I say raw Internet, the data center is logically no different than being on the Internet with respect to my networks.  All traffic will need to route across the PA device, but hopefully as a secure connection.

So while its not actually on the public net I'm treating it as it it were for the sake of the PA device.
0
 
Bryant SchaperCommented:
So what is trust and untrust is really up to you, they are just labels.  But from what you are trying to do, I would look more at what options your private provider is offering?

Are the servers on a private network together, can you install virtual Palo Alto and setup a VPN tunnel or can they establish a VPN tunnel to your PA?  These are important questions, you could set them up with globalprotect, but you will be relying a poor vpn client in the first place.  We use GlobalProtect and it can be very flaky.  The other option would be to use the built in VPN of Windows, but these are core machines like the DC, so they should not rely on software vpn, that is why a would push a hardware or software firewall to establish the connection.
0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
irishmic33Author Commented:
I'll approach the vendor about a hardware solution.

When you say software... Could you offer examples?  Are you thinking software on the boxes themselves or software running outside of my VMs?

Is the Win Server built in VPN a viable option?  I've never worked with it, but I'm open to what would work.

Thanks.
0
 
Bryant SchaperCommented:
Windows server is viable, but I dont think it is a good fit.

I was more referring to a "virtual firewall" appliance, like the palo alto VM for example.

You would have a "cloud network" for example call it 10.0.0.0/24 that all your cloud machines are on.  That network would be behind the vm firewall, that has the public IP.   That VM firewall would establish a VPN tunnel to the on prem palo alto and your inside devices would just know to go to the palo alto to get to those devices.
0
 
irishmic33Author Commented:
Thank you for your assistance.  I have contacted our ISP and am waiting back to hear from them the options for a secure connection.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now