Palo Firewall Summary
Palo Alto Firewall Configuration Summary
Device: Palo Alto VM-Series (jarnetfw) Location: ESXi ghost-esxi-01 (10.1.1.120) Management IP: 10.1.1.103 Config File: current_2026.xml PAN-OS Version: 11.2.0
Interfaces
Layer 3 Interfaces
ethernet1/1 (Inside - Primary LAN)
- IP Address: 10.1.1.1/24
- Security Zone: inside
- Management Profile: Interface-MGMT
- DHCP Server: Enabled
- Role: Internal network gateway
ethernet1/2 (VPN/WAN)
- IP Address: 172.16.101.1/24
- VPN Tunnel: tunnel.101
- Peer: 130.41.228.218
- Role: Site-to-site VPN or WAN link
ethernet1/3
- IP Address: 172.16.101.1/24
- Security Zone: (to be determined)
- Role: Additional WAN/VPN interface
vlan.1 (VLAN Interface)
- Security Zone: inside
- Virtual Interface: Associated with DHCP_VLAN
- Role: Internal VLAN routing
Security Zones
inside
- Members: ethernet1/1, vlan.1
- Functions:
- User identification: Enabled
- Device identification: Enabled
- Log setting: default
- Purpose: Internal trusted network
outside
- Members: (Ethernet interfaces facing internet)
- Purpose: External untrusted network
- NAT: Source NAT applied for outbound traffic
DNS Configuration
Primary DNS: 10.1.1.35 (Pi-hole VM) DNS Suffix: skinner.network Domain: skinner.network
DHCP Server
Interface: ethernet1/1 (10.1.1.1/24) Server Mode: Enabled DNS Settings:
- Primary DNS: 10.1.1.35 (Pi-hole)
- DNS Suffix: skinner.network
Pool Configuration:
- Network: 10.1.1.0/24
- Gateway: 10.1.1.1 (Palo Alto)
- DNS: 10.1.1.35 (Pi-hole)
Routing
Virtual Router: default
Static Routes:
- DHCP_Route:
- Destination: 172.16.100.0/24
- Next-Hop: DHCP_VR (virtual router)
- Interface: ethernet1/1
- Metric: 10
Default Route:
- Next-hop: (via outside zone - likely DHCP or static via ISP)
NAT Rules
No-NAT Rules (Exemptions)
-
GP-No-NAT
- From: inside
- To: outside
- Destination: H-ABB-Static (specific host)
- Service: GP-9443
- Action: No NAT (direct routing)
-
GP-LB-No-Nat
- From: inside
- To: outside
- Action: No NAT
Source NAT
- Default rule: inside → outside (hide behind Palo Alto outside interface)
VPN Configuration
Tunnel: tunnel.101
- Local Interface: ethernet1/2
- Peer Address: 130.41.228.218
- Purpose: Site-to-site IPSec VPN
Management
Management Interface: ethernet1/1 Default Gateway: 10.1.1.1 FQDN Refresh: 10 seconds
Key Network Services
GlobalProtect (GP):
- Portal/Gateway services configured
- Loopback interface for GP: GP-Loopback-Host
- Client DNS: 10.1.1.35 (Pi-hole)
- Client DNS Suffix: skinner.network
Migration Considerations
Critical Dependencies
-
DHCP Server: Currently provided by Palo Alto (10.1.1.1)
- Need alternative DHCP server before migrating off Palo Alto
- Options: Pi-hole, router, or dedicated DHCP service
-
Default Gateway: All clients use 10.1.1.1
- Must maintain this IP or update all clients
- Consider: Keep Palo Alto as gateway initially, or migrate to OPNsense/pfSense
-
Inter-VLAN Routing: Palo Alto handles L3 routing
- Alternative needed if migrating away
-
DNS: Already using Pi-hole (10.1.1.35) ✓
- No change needed
-
NAT/Firewall: Complex rules and zones
- Recommend export and document before migration
- Plan replacement (OPNsense, pfSense, or physical firewall)
Migration Path Options
Option A: Keep Palo Alto VM (Recommended for now)
- Migrate Palo Alto VM to Proxmox
- Reconfigure network interfaces/VLANs
- Test thoroughly before other migrations
- Least disruption
Option B: Replace with Alternative
- Deploy OPNsense or pfSense
- Migrate DHCP, routing, NAT rules
- Higher complexity, more downtime
- User mentioned they’re “migrating off this firewall eventually”
Pre-Migration Backup Checklist
- Configuration export (current_2026.xml) ✓
- Document NAT rules
- Document firewall security policies
- Test DHCP failover plan
- Document VPN configuration (if still in use)
- Screenshot GlobalProtect settings (if still in use)
Network Topology Summary
Internet
│
├─ (Outside Zone) ─── ethernet1/? (VLAN 300 from switch)
│
[Palo Alto VM - jarnetfw]
│
├─ ethernet1/1 (10.1.1.1/24) ─── Inside Zone
│ ├─ DHCP Server
│ ├─ Default Gateway for 10.1.1.0/24
│ └─ Routes to MikroTik switch SFP1 (VLAN 1)
│
├─ ethernet1/2 (172.16.101.1/24) ─── VPN Tunnel
│ └─ Peer: 130.41.228.218
│
└─ vlan.1 ─── Inside Zone (DHCP_VLAN)
Questions to Resolve
-
Outside Interface: Which ethernet interface is the outside zone?
- Likely connects to MikroTik switch SFP1 (VLAN 300)
- MAC: 00:50:56:a7:0f:60 (seen on switch)
-
VPN Status: Is the VPN tunnel to 130.41.228.218 still active/needed?
-
GlobalProtect: Still in use for remote access? Or replaced by Cloudflared?
-
DHCP Pool: What is the actual DHCP range (start/end IPs)?
-
Migration Timeline: When to migrate off Palo Alto?
- During Proxmox migration?
- After everything else is stable?