How to configure port forwarding in xfinity

Advanced Settings in Xfinity modem has been moved to https://xfinity.com/myxfi .  This article shows how to access xfinity Advanced Settings and configure port forwarding for Remote Desktop.

1.Login https://internet.xfinity.com/

2.Click on Connect.

3. Click See Network under your WiFi name, Chicagotech in our example.

4. Click Advanced Settings under More.

5. Now, you should have these options: Port Forwarding, LAN & WAN, DNS Server, AMZ, Data Usage, and Detect Title Device. 

6. Click on Port Forwarding

7. Click on Add Port Forward

8. Click Select one under Select the device for this port forward.

9. Select the device you want to setup for port forward, pc02 in our example.

10. Select port #, 3389 in our Remote Desktop 

11. It take a few minutes. You will have Port Forward Added message.

12. You has configured port forwarding successfully.

Please view this step by step video:

How to reset Palalto Firewall to Factory Default Settings

Resetting Palalto firewall to factory defaults will result in the loss of all configuration settings and logs. This article shows how to do so step by step.

1.Save and export the current configuration.

* Login to the web interface, for example https://192.168.11.11

* Go to Device>Setup to save and export configuration

2. Connect a serial cable from your computer to the Console port

3. Run Purty or any terminal emulation software (9600-8-N-1).

4. Enter your login credentials

. Enter the following CLI command:

debug system maintenance-mode

The firewall will reboot in the maintenance mode.

Type Y and press Enter

6. To enter the maintenance mode, you need to type “maint” and press Enter.

Then press ENTER to select.

7. Select Factory Reset and then press Enter

8. A warning message will be shown along with factory reset option. Highlight Factory reset and press Enter.

9. The reset is progressing in percentage

10. When the reset finishes, you have options to Back or Reboot.

Select Reboot and press Enter

11. After the booting, the firewall in default login. Enter the default username and password: admin/admin to login.

12. You have an option to change the default password

13. Now, you are ready to re-configure the Paloalto firewall.

Please view to step by step video:

How to change or add default and virtual routers in Paloalto Firewall

The client just changes their IPS and need to change the default router. This article shows how to change and add router on PA-850.

1. Login to the web interface, for example https://192.168.11.11

2. Go to Network>Virtual Routers.

3. Click on default to open Virtual Router – default.

4. Click on Static Routers and then the router you want to make the change, route out in our example.

5. Type the new default gateway IP address over the current IP address. 

Note: to add a new router, click on Add icon in the left bottom. Then follow above steps to add a new router.

6. Click Oks and then commit to save the settings.

Please view this step by step video:

Paloalto Firewall command to check DNS

Show deviceconfig system dns-setting

dns-setting {

  servers {

    primary 192.168.11.1;

    secondary 8.8.8.8;

  }

}

[edit]

show deviceconfig

deviceconfig {

  system {

    ip-address 192.168.11.11;

    netmask 255.255.255.0;

    update-server updates.paloaltonetworks.com;

    update-schedule {

      threats {

        recurring {

          hourly {

            at 5;

            action download-and-install;

          }

          threshold 3;

        }

      }

      anti-virus {

        recurring {

          hourly {

            at 35;

            action download-and-install;

          }

          threshold 3;

        }

      }

      statistics-service {

        threat-prevention-information yes;

      }

    }

    timezone America/Chicago;

    service {

      disable-telnet yes;

      disable-http yes;

    }

    hostname HSA-Firewall;

    default-gateway 192.168.11.1;

    dns-setting {

      servers {

        primary 192.168.11.1;

        secondary 8.8.8.8;

      }

    }

    ntp-servers {

      primary-ntp-server {

        ntp-server-address time-a-g.nist.gov;

        authentication-type {

          none;

        }

      }

      secondary-ntp-server {

        ntp-server-address ntp-d.nist.gov;

        authentication-type {

          none;

        }

      }

    }

    type {

      static;

    }

    domain payroll;

    route {

      destination {

        outside {

          source {

            interface ethernet1/1;

            address 192.168.11.12/24;

          }

        }

      }

      service;

    }

  }

  setting {

    config {

      rematch yes;

    }

    management {

      hostname-type-in-syslog FQDN;

      auto-acquire-commit-lock yes;

    }

  }

  high-availability {

    interface {

      ha1 {

        ip-address 192.168.10.1;

        netmask 255.255.255.0;

      }

      ha1-backup;

      ha2 {

        ip-address 192.168.20.1;

        netmask 255.255.255.0;

      }

      ha2-backup;

      ha3;

    }

    group {

      group-id 10;

      description PA_850A;

      peer-ip 192.168.10.2;

    }

    enabled yes;

  }

}

[edit]

show session all filter application dns


ID Application State Type Flag Src[Sport]/Zone/Proto (translated
IP[Port])
Vsys Dst[Dport]/Zone (translated IP[Por

t])

863 dns ACTIVE FLOW 50.x.x.124[35735]/untrust/17
(50.x.x.124[35735])
vsys1 8.8.8.8[53]/untrust (8.8.8.8[53]
)
861 dns ACTIVE FLOW 50.x.x.124[60885]/untrust/17
(50.x.x.124[60885])
vsys1 8.8.8.8[53]/untrust (8.8.8.8[53]
)
865 dns ACTIVE FLOW 50.x.x.124[39112]/untrust/17
(50.x.x.124[39112])
vsys1 8.8.8.8[53]/untrust (8.8.8.8[53]
)
872 dns ACTIVE FLOW 50.x.x.124[42869]/untrust/17
(50.x.x.124[42869])
vsys1 8.8.8.8[53]/untrust (8.8.8.8[53]
)
lines 1-13

Configure Network Access for External Services on Paloalto Firewall

Your initial configuration on PA firewall may use MGT interface to access external services such as DNS server, content updates, and license retrieval. If you do not want to enable external network access to your management network, you must set up an in-band data port to provide access to required external services. This article shows how to do so.

1. Login to the web interface, for example https://192.168.11.11

2. Delete default virtual wire interface.

The PA firewall comes preconfigured with a default virtual wire interface between ports Ethernet 1/1 and Ethernet 1/2 (and a corresponding default security policy and zones). We will delete them.

* Delete the default security policy by selecting Policies>Security, select the rule, and click Delete

* Delete the default virtual wire, select Network>Virtual Wires by selecting the virtual wire and click Delete

* Delete the default trust and untrust zones, select Network>Zones by selecting each zone and click Delete.

* Delete the interface configurations, select Network>Interfaces and then select each interface (ethernet1/1 and ethernet1/2) and click Delete.

* Commit the changes

3. Configure the interface for external access to management services.
* Select Network>Interfaces>Ethernet and then the interface that corresponds to the port you want to use to access external services, ethernet1/1 in our example.

* Select the Interface Type, Layer3 in our example.

*  In the Config tab, expand the Security Zone drop-down and select New Zone.

* In the Zone dialog, enter a Name for new zone, for example untrust, and then click OK.

* Select the IPv4 tab, select the Static radio button, and click Add in the IP section.

* Enter the IP address and network mask to assign to the interface, for example 192.168.11.12/24.

* Select Advanced>Other Info, expand the Management Profile drop-down, and select New Management Profile.

•A Name for the profile, such as Managing, and then select the services you want to allow on the interface.

•Note: in most cases, you probably only need to enable Ping.

•Click OK.

* To save the interface configuration, and then Commit.

4. Configure the service routes such as DNS, Palo Alto Networks Services, URL Updates, and AutoFocus – this is option only if you don’t want to use Management profile.

• Select Device > Setup > Services and click Service Route Configuration.

• Click Service Route Configuration

• Check DNS, Palo Alto Networks Services, URL Updates, and AutoFocus.

5. Configure an external-facing interface and an associated zone.

•Select Network>Interfaces and then select the external-facing interface, ethernet1/1 in our example.

•Select Layer3 as the Interface Type

•On the Config tab, create the associated Security Zone, such as untrust.

  • Click on IPv4 and add the IP address

• Close the interface configuration and it looks like this.

6. Create a security policy rule to allow the firewall to send service requests from the internal zone to the external zone, Trust to Internet in our example.

7. To save the configuration, click on Commit.

8. Test by accessing Update Server Connectivity

•Select Device>Troubleshooting

•Select Update Server from the Select Test drop-down.

•Execute the Palo Alto Networks Update Server connectivity test.

* Also Access the firewall CLI, and use the following command to retrieve information on the support entitlement for the firewall from the Palo Alto Networks update server:

request support check

* If the configuration is correct, the update server will respond with the support status for your firewall. Because your firewall is not registered, the update server will return the following message:

If you have connectivity, the update server will respond with the support status for your firewall. Because your firewall is not registered, the update server will return the following message:

Contact Us

https://www.paloaltonetworks.com/company/contact-us.html

Support Home

https://www.paloaltonetworks.com/support/tabs/overview.html

Device not found on this update server

Please view this step by step video:

Should I setup DHCP/DNS on router or Windows Server?

It depends on your expertise and network environment. For home business and small business without Domain controller, we recommend to run DHCP/DNS on the Router.

If the company has Domain Controllers, we recommend to use Windows Server as DHCP/DNS server because it is quicker and easier to administer and troubleshoot as you can go through logs and Event Viewer. Also, if you have two Windows domain controllers, you can configure two DHCP servers for redundancy.

How to setup Automatic replies in Phone Outlook app

This article shows how to setup out of office automagical reply on Outlook app .

1. With Outlook app open, tap on your photo.

2. In the left bottom, click settings icon.

3. Tap on the Office 365 icon.

4. Tap on Automatic replies.

5. Turn on Automatic replies and edit the out of office message and settings.

6. Close the Outlook app.

Please view this step by step video: