Configuration for update server when static update server is used in Firewall and Panorama

Configuration for update server when static update server is used in Firewall and Panorama

97374
Created On 03/23/21 01:41 AM - Last Modified 10/01/21 21:00 PM


Objective
BackGround:
  • Dynamic Content Updates service is a subscription service that provides protection again newly seen threats.
  • By default, the content update URL is provided under Device-> setup -> services-> update server has a fixed URL  "updates.paloaltonetworks.com".  The URL will resolve to different IP addresses as the update servers are located across different geographical locations for faster content delivery.
Summary of the Objective: Download the dynamic content from a fixed address
  • If an organization wants to restrict the updates to only a single Known IP address they can use a fixed URL "staticupdates.paloaltonetworks.com" can be used in place of updates.paloaltonetworks.com".
  • Update Server should never use IP address- by doing so, SSL verification to our servers is disabled which exposes them to a man-in-the-middle attack.
  • The article provides configuration guidelines for any Firewall or Panorama wanting to use "staticupdates.paloaltonetworks.com"

NOTE: These changes are effective immediately.


 



Environment
  • Any PAN-OS.
  • Threat protection license.
  • Any Firewall or Panorama.


Procedure
Following are configuration steps based on the location of the Firewall/Panorama or internal access restrictions. 
 
  1. For the Firewalls or appliances that connect from outside mainland China and want to continue using the dynamic content server, use the  URL "updates.paloaltonetworks.com" 
update server configuration
 
  1. On the Firewalls or appliances that connect from mainland China, modify the URL from "staticupdates.paloaltonetworks.com" to "updates.paloaltonetworks.cn"

  2. On the Firewalls or appliances that have access to outbound traffic restricted by IP, Use the URL  “us-static.updates.paloaltonetworks.com".

NOTE: Avoid using an IP address instead of a URL. Doing so will break the SSL/TLS SNI verification.

  1. If the Firewall needs to connect to the static update server using outbound Security Policy to limit the IP addresses available for updates, then implement the following change.
          (a)  Allow these IPv4 Or IPv6 addresses
             us-static.updates.paloaltonetworks.com - 35.186.202.45:443 (ipv4) , [2600:1901:0:669::]:443 (ipv6)
             static.itpdownloads.paloaltonetworks.com - 34.120.74.244:443 (ipv4) , [2600:1901:0:5162::]:443 (ipv6)
        (b) AND:
            Allow the current IPv4 address 199.167.52.15:443 as this IPv4 address is valid until July 31st, 2021.                           
  1.  If any connection issues are found, try the following:
  • Continue utilizing  "staticupdates.paloaltonetworks.com" until July 31st, 2021 as we will support this server for an easy transition. 
  • Allow IP address 199.167.52.15. 
  • Open a support case

 



Additional Information
flow chart
 


 

 


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001UtRCAU&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Attachments
Choose Language