# SECCDCq 2023 Networking Strat
#### Secure Palo admin acccess
- [ ] If you can't get into the web interface, SSH in and set up user account
```
> configure
# set mgt-config users admin password
# commit
```
- [ ] Lock down admin
`Device -> Administrators`
- [ ] Make new admin account + set password
- [ ] Login to new account to verify
- [ ] Disable old admin
- [ ] Clear authorized SSH keys
- [ ] Restrict administrative login to your IP
(check where you're logged in from on the Dashboard)
`Device -> Setup -> Interfaces`
- [ ] **Exfil Palo config**
#### Threat blocking
- [ ] Updates (Antivirus, Applications and Threats, Wildfire)
`Device -> Dynamic Updates`
- [ ] Create custom Vulnerability Profile
`Objects -> Security Profiles -> Vulnerability Protection`
- [ ] Block all critical / high
- [ ] Warn on medium
- [ ] Exceptions: SSH Bruteforce (block on 10 attempts in 60 sec)
- [ ] Create Security Profile Group
`Objects -> Security Profile Groups`
- [ ] Apply Security Profile Group to all policies
`Policies -> Security` then `Actions -> Profile Setting`
- [ ] Flood protection + Reconnaissance Protection (IP block 180 sec)
`Network -> Network Profiles -> Zone Protection`
#### Determine network layout
- [ ] Is NAT occuring? Where?
- [ ] Check for AWS NAT Gateway or NAT on Palo
- [ ] Do we have a DNS server? If not, what should be used?
- [ ] Who has public IPs?
- [ ] Where are scoring checks coming from?
- [ ] Palo CLI
- [ ] `curl interface dst-URL`
- [ ] `tcpdump`
- [ ] `netstat -planet` and `tcpdump port 25 -i any` on boxes
- [ ] Worstttttt case Wireshark on Windows boxes
#### If we have time between injects + AWS stuff
- [ ] Nmap everyone (add your IP to ZPP exceptions)
- [ ] Inbound rule per host if you can
- [ ] Kill internet?
- [ ] URL filtering
#### If you blocked stuff
List blocked IPs
`> debug dataplane show dos block-table`
Empty the block table
`> debug dataplane reset dos block-table`
#### Help troubleshoot
`uname -r` (OS version number)
`netstat -planet`
`tcpdump -D` (lists available interfaces)
`tcpdump -i eth0`
`tcpdump -i any`
`tcpdump port 25`
`route print` (Windows)
`route` or `ip route` (Linux)
Supposedly you can unblock a single IP with something like this
`> debug dataplane reset dos zone L3_Untrust block-table source x.x.x.x`
After being removed from the block table, you might need to clear sessions
`> show session all filter source x.x.x.x`
`> clear session id 45629`