Palo Alto VM-Series Firewall: GlobalProtect – AWS SAML

  GlobalProtect supports various authorization methods, including SAML 2.0 IdP. This example shows how to set up authorization using AWS SSO. AWS Before adding SAML IdP, you must already have AWS Directory Service configured To begin with, let’s add an application, for this go to "IAM Identity Center" -> "Application assignments" -> "Application" And click "Add … Continue reading "Palo Alto VM-Series Firewall: GlobalProtect – AWS SAML"

Palo Alto VM-Series Firewall: AWS HA Multi AZ for GlobalProtect – Part 2

  VM-Series Firewall SSH To use WebUI, we need to set an administrator password, for this, need to connect via SSH. After creating instances, it takes 10-15 minutes before the Firewall is initialized and will be available via SSH Connect to the first instance, SSH user – "admin" And execute the following commands: Enter the … Continue reading "Palo Alto VM-Series Firewall: AWS HA Multi AZ for GlobalProtect – Part 2"

Palo Alto VM-Series Firewall: AWS HA Multi AZ for GlobalProtect – Part 1

  The Palo Alto VM-Series Firewall uses an active/passive configuration for high availability. In which the active firewall constantly synchronizes its configuration and information about active sessions with a similarly configured passive firewall. There are two options for achieving HA on AWS: "Secondary IP Move" and "Dataplane Interface Move". Secondary IP Move If the active … Continue reading "Palo Alto VM-Series Firewall: AWS HA Multi AZ for GlobalProtect – Part 1"

 S3 – Mounting in Linux

In order to mount an S3 Bucket as a file system, you need to install s3fs Create a directory to mount:   And add the following to "/etc/fstab":   Where: "artem-service-bucket:/upload/" – S3 bucket name and the directory inside the bucket to mount "url=https://s3.eu-central-1.amazonaws.com,endpoint=eu-central-1" – the region where the S3 bucket is located "iam_role" – … Continue reading " S3 – Mounting in Linux"

 Terraform – AWS SSM: Extract content

The SSM Parameter Store contains the following JSON:   It is necessary to extract the login and password, and use their values in the Terraform code. To do this, you can use the following construction:   And use variables: