Avatar of Michael  McCabe
Michael McCabeFlag for United States of America

asked on 

PaloAlto Solution for 2008R2 Servers on outside network

Hello Experts,
I'm very much a novice when it comes to firewall security, terms, and options.

I have a small network which is protected by a pair of PA3020 security devices.  The current setup is working great and I have a decent handle on the security of the local networks.  I also have a working VPN (GlobalProtect) setup working with my users when they travel off-site.

I've been tasked with moving our internal infrastructures servers (DC, Shared Storage, AV, Monitoring, RADIUS, Print) to a virtual server farm which exists outside of our "trusted networks".  The server farm is accessible on the internet, but from the perspective of my local "trusted" LANs the IP range of the new VM servers is considered out on the public internet.

I do not have access to their security appliances at the server farms, only RDP to the servers.  I'm not sure at what level I can request edits to whatever security device is managing the access to my VM servers.

The VMs themselves will all be Win Server2008R2 OS, and I have admin access to the boxes via RDP.  As far as I know the security team is allowing unfettered access to the servers from my public IP address.

Keeping things at a novice level...  what are my options with regards to getting these VM servers to join my "trusted networks" and become a viable infrastructure to my LANs?

What I need to happen:
 - The server farm need to attach to my "Trusted Networks"
 - Upon reboot the servers need to automatically re-connect to my "Trusted Networks"
 - The servers will only be infrastructure boxes... (no end-user logins)
 - The servers need to have communications with my LANs and supply their individual services as if they were on-site.

What I've attempted:
I've contacted PA and have an open case.  They have suggested a GlobalProtect client type setup with "Pre-Logon" and "Always-On" VPN configuration.  I'm not sure if this is what I'm needing to setup as I will not have a user tied to the servers.

Global Protect (Client Configurations)
Global Protect (Always-On)


I'm open to any direction.  If by chance you could offer a step-by-step that would be great.
Windows Server 2008VPNInternet Protocol SecurityWindows NetworkingNetwork Security

Avatar of undefined
Last Comment
Michael McCabe
Avatar of Bryant Schaper
Bryant Schaper
Flag of United States of America image

This seems like a very messed up design, your infrastructure servers should not be on the public internet.

What service are you hosting them in?  Is it a public cloud infrastructure like AWS or Azure?
Avatar of Michael  McCabe

ASKER

This would be considered a private cloud.  

The service/data center is a consortium of entities which host for local businesses on our local fiber ring.  While I say raw Internet, the data center is logically no different than being on the Internet with respect to my networks.  All traffic will need to route across the PA device, but hopefully as a secure connection.

So while its not actually on the public net I'm treating it as it it were for the sake of the PA device.
ASKER CERTIFIED SOLUTION
Avatar of Bryant Schaper
Bryant Schaper
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of Michael  McCabe

ASKER

I'll approach the vendor about a hardware solution.

When you say software... Could you offer examples?  Are you thinking software on the boxes themselves or software running outside of my VMs?

Is the Win Server built in VPN a viable option?  I've never worked with it, but I'm open to what would work.

Thanks.
Windows server is viable, but I dont think it is a good fit.

I was more referring to a "virtual firewall" appliance, like the palo alto VM for example.

You would have a "cloud network" for example call it 10.0.0.0/24 that all your cloud machines are on.  That network would be behind the vm firewall, that has the public IP.   That VM firewall would establish a VPN tunnel to the on prem palo alto and your inside devices would just know to go to the palo alto to get to those devices.
Avatar of Michael  McCabe

ASKER

Thank you for your assistance.  I have contacted our ISP and am waiting back to hear from them the options for a secure connection.
Windows Server 2008
Windows Server 2008

Windows Server 2008 and Windows Server 2008 R2, based on the Microsoft Vista codebase, is the last 32-bit server operating system released by Microsoft. It has a number of versions, including including Foundation, Standard, Enterprise, Datacenter, Web, HPC Server, Itanium and Storage; new features included server core installation and Hyper-V.

86K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo