PaloAlto Solution for 2008R2 Servers on outside network

Hello Experts,
I'm very much a novice when it comes to firewall security, terms, and options.

I have a small network which is protected by a pair of PA3020 security devices.  The current setup is working great and I have a decent handle on the security of the local networks.  I also have a working VPN (GlobalProtect) setup working with my users when they travel off-site.

I've been tasked with moving our internal infrastructures servers (DC, Shared Storage, AV, Monitoring, RADIUS, Print) to a virtual server farm which exists outside of our "trusted networks".  The server farm is accessible on the internet, but from the perspective of my local "trusted" LANs the IP range of the new VM servers is considered out on the public internet.

I do not have access to their security appliances at the server farms, only RDP to the servers.  I'm not sure at what level I can request edits to whatever security device is managing the access to my VM servers.

The VMs themselves will all be Win Server2008R2 OS, and I have admin access to the boxes via RDP.  As far as I know the security team is allowing unfettered access to the servers from my public IP address.

Keeping things at a novice level...  what are my options with regards to getting these VM servers to join my "trusted networks" and become a viable infrastructure to my LANs?

What I need to happen:
 - The server farm need to attach to my "Trusted Networks"
 - Upon reboot the servers need to automatically re-connect to my "Trusted Networks"
 - The servers will only be infrastructure boxes... (no end-user logins)
 - The servers need to have communications with my LANs and supply their individual services as if they were on-site.

What I've attempted:
I've contacted PA and have an open case.  They have suggested a GlobalProtect client type setup with "Pre-Logon" and "Always-On" VPN configuration.  I'm not sure if this is what I'm needing to setup as I will not have a user tied to the servers.

Global Protect (Client Configurations)
Global Protect (Always-On)


I'm open to any direction.  If by chance you could offer a step-by-step that would be great.
LVL 2
irishmic33Asked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Bryant SchaperCommented:
This seems like a very messed up design, your infrastructure servers should not be on the public internet.

What service are you hosting them in?  Is it a public cloud infrastructure like AWS or Azure?
irishmic33Author Commented:
This would be considered a private cloud.  

The service/data center is a consortium of entities which host for local businesses on our local fiber ring.  While I say raw Internet, the data center is logically no different than being on the Internet with respect to my networks.  All traffic will need to route across the PA device, but hopefully as a secure connection.

So while its not actually on the public net I'm treating it as it it were for the sake of the PA device.
Bryant SchaperCommented:
So what is trust and untrust is really up to you, they are just labels.  But from what you are trying to do, I would look more at what options your private provider is offering?

Are the servers on a private network together, can you install virtual Palo Alto and setup a VPN tunnel or can they establish a VPN tunnel to your PA?  These are important questions, you could set them up with globalprotect, but you will be relying a poor vpn client in the first place.  We use GlobalProtect and it can be very flaky.  The other option would be to use the built in VPN of Windows, but these are core machines like the DC, so they should not rely on software vpn, that is why a would push a hardware or software firewall to establish the connection.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
The 7 Worst Nightmares of a Sysadmin

Fear not! To defend your business’ IT systems we’re going to shine a light on the seven most sinister terrors that haunt sysadmins. That way you can be sure there’s nothing in your stack waiting to go bump in the night.

irishmic33Author Commented:
I'll approach the vendor about a hardware solution.

When you say software... Could you offer examples?  Are you thinking software on the boxes themselves or software running outside of my VMs?

Is the Win Server built in VPN a viable option?  I've never worked with it, but I'm open to what would work.

Thanks.
Bryant SchaperCommented:
Windows server is viable, but I dont think it is a good fit.

I was more referring to a "virtual firewall" appliance, like the palo alto VM for example.

You would have a "cloud network" for example call it 10.0.0.0/24 that all your cloud machines are on.  That network would be behind the vm firewall, that has the public IP.   That VM firewall would establish a VPN tunnel to the on prem palo alto and your inside devices would just know to go to the palo alto to get to those devices.
irishmic33Author Commented:
Thank you for your assistance.  I have contacted our ISP and am waiting back to hear from them the options for a secure connection.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows Server 2008

From novice to tech pro — start learning today.