How to configure External Dynamic List – EDL on Palo Alto Firewall

In this article, we will configure EDL (External Dynamic List) on Palo Alto Networks Firewall. EDL allows you to fetch the feeds from a text file hosted on a web server. It simplifies your task to configure the malicious IP Address on the firewall. You can also allow the number of IP addresses through the security policies and EDLs. You can configure the Web Server on Microsoft Windows or Linux platforms such as Ubuntu, and CentOS. Let’s Start!

how-to-configure-edl-on-palo-alto-firewall

How to configure External Dynamic List on Palo Alto Networks Firewall

As we discussed, we require a text file that is hosted on a web server. So, the prerequisite is having a Web Server that is reachable from the Palo Alto Networks Firewall. Let’s understand the EDL configuration in several easy steps.

Step 1: Preparing a web server for Palo Alto Networks EDL

This step is optional if you are already having a running Web Server with you. If you don’t have a webserver with you, you can simply deploy an open-source Web Server such as Apache or Microsoft IIS.

If you are new to the webservers, I recommend you download and install the Ubuntu Operating System and follow the web server installation guide.

Alternatively, we can host the Web Page for you, and you can update the IP Addresses into it in less than a minute. You will get the SSL Certificate as well. It will be free of cost for the first month. After the first month, pay 1$ USD per month. Contact Us for more information.

Once the Web Server is ready get the IP Address details using the below command:

Recommended:  How to deploy Palo Alto Firewall in GNS3

open an SSH session of ubuntu, and create the text files containing IP Addresses using the below commands:

The above commands will create a text file in the apache server directory with an IP Address, i.e., 104.227.185.171. Don’t worry, I will explain to you the easiest way to update this file at the end of this article.

Step 2: Configure EDL on Palo Alto Networks Firewall

Now, we need to configure the EDL on the Palo Alto Networks Firewall. Just need to log in to the GUI of Palo Alto Firewall and navigate to Objects > External Dynamic Lists. Now, click on Add.

Recommended:  IPSec Tunnel between Cisco ASA Firewall and Cisco Router

Enter the name of the EDL and then select the Type of the EDL to IP List. In the Source, enter the full address of the text file where we are going to retrieve the IP fields. In this example, my Web Server IP Address is 192.168.31.49 and the file name is blocklist.txt, so the feed text file will be on http://192.168.31.49/blocklist.txt. Click on OK.

 

how-to-configure-edl-on-palo-alto-firewall

Now, click on the test connectivity. If the Palo Alto Firewall connectivity to the Web Server is fine, you will get the below information.

edl-test-connectivity

Step 3: Creating a security policy with EDL

Finally, we need to create a security policy on Palo Alto Networks Firewall to allow or block the traffic based on EDL. Navigate to Policies > Security and click on Add.

Based on your requirement, add the EDL entry either in the source and/or in the destination. In this example, I’m using the blocklist in the destination field.

Once the Security Policy is created, your security policy will look like the below image.

palo-alto-security-policy

Important: Commit the changes that you have made till now.

Step 4: Verifying the IP Addresses are newly created EDL

We are ready with the configuration of the External Dynamic List & the security policy on the Palo Alto Firewall. Now, let’s verify the IP Addresses inside the EDL.

Navigate to Objects > External Dynamic Lists and select the EDL entry that you created, i.e., Malicious-IPs, and click on the Import Now option present on the bottom pane.

This will fetch the latest entries from the text file we have created.

Recommended:  How to configure Captive Portal in Palo Alto Firewall

fetching-latest-edl-palo-alto

Now, click on EDL entry, i.e., Malicious-IPs, and click on the List Entries And Exceptions sub tab. You will get the current IP Addresses that are available on the web server.

palo-alto-external-dynamic-lists---entries-and-exceptions

If required, you may create exceptions for a few IP Address lists.

Step 5: Bulk upload the IP Addresses in the text file

Well, finally, we need to bulk upload the IP Addresses in our EDL text file, i.e., blocklist.txt. We can use SCP clients such as WinSCP to upload the files to the Apache web server directory.

Now, open a new session using your Web Server IP Address. Navigate to /var/www/html/ directory and right-click on blocklist.txt. Edit this file with your favorite editor such as Notepad++ and save it with updated entries. Palo Alto Firewall will fetch these entries according to the defined time on EDL configuration.

Related Articles

Summary

In this article, we have configured the External Dynamic List for IP Address feeds on Palo Alto Networks Firewall. EDL allows you to fetch the IP Addresses/URLs feed from a web server. In this example, we discussed the Apache Web server which is an open-source server with great features.

I hope you like this article. Please share it on social media platforms and shows us some love 🙂

1 Comment

  1. Great Article and it made it easy to setup the first step. I’ll see i can build on what you did for a SSl connection and other parts of the EDL

Leave a Reply

Your email address will not be published. Required fields are marked *