Professional Documents
Culture Documents
Ultimate Test Drive NGFW Workshop Guide 3.0-20150616
Ultimate Test Drive NGFW Workshop Guide 3.0-20150616
Guide
©
2015
Palo
Alto
Networks.
Proprietary
and
Confidential
This
workshop
covers
only
basic
topics
and
is
not
a
substitute
for
the
training
classes
conducted
by
Palo
Alto
Networks’
Authorized
Training
Centers
(ATC).
Please
contact
your
partner
or
regional
sales
manager
for
more
training
information.
Terminology:
“Tab”
refers
to
the
5
tabs
along
the
top
of
each
screen
in
the
GUI.
“Node” refers to the options associated with each “Tab” found in the left-‐hand column on each screen.
*NOTE*
Unless
specified,
the
“Chrome”
web
browser
will
be
used
to
perform
any
tasks
outlined
in
the
following
Activities.
(Chrome
is
pre-‐installed
on
the
student
desktop
of
the
workshop
PC.)
Step
1:
First,
make
sure
your
laptop
is
installed
with
a
modern
browser
that
supports
HTML
5.0.
We
recommend
using
the
latest
version
of
Firefox,
Chrome
and
Internet
Explorer.
We
also
recommend
you
install
the
latest
Java
client
for
your
browser.
Step
2:
Go
to
class
URL.
Enter
your
email
address
and
the
Passphrase.
(If
you
have
an
invitation
email,
you
can
find
the
Class
URL
and
Passphrase
in
the
invitation
email.
Or
the
instructor
will
provide
you
with
the
class
URL
and
Passphrase.)
Step 3: Complete the Registration form and click “Register and Login” at the bottom.
Step
4:
Depends
on
your
browser
of
choice,
you
will
be
asked
to
install
a
plugin,
please
click
yes
to
allow
the
plugin
to
be
installed
and
continue
the
login
process.
Step
5:
Once
you
login,
the
environment
will
be
automatically
created
for
you.
Click
on
“Start
Using
This
Environment”
when
the
Environment
is
ready.
Step
6:
The
UTD
NGFW
Environment
consists
of
three
core
components:
a
“Student
Desktop”,
“VM-‐Series
Virtual
Firewall”
and
an
“Ubuntu
Server”.
You
will
access
the
lab
through
the
“Student
Desktop”.
Step
2:
You
will
be
connected
to
the
“Student
Desktop”
through
your
browser.
Step
3:
Click
on
the
blue
arrow
on
the
top
left
hand
corner
to
collapse
the
navigation
bar.
This
will
make
more
room
for
the
“Student
Desktop”.
Step
4:
If
the
“Student
Desktop”
resolution
is
too
high
or
too
low
for
your
laptop
display,
you
can
adjust
the
resolution
on
the
upper
right
hand
corner.
[Note:
The
default
connection
to
the
“Student
Desktop”
uses
RDP
over
HTML5
protocol
through
the
browser.
In
case
your
browser
does
not
support
HTML5
or
you
find
that
the
student
desktop
is
too
small
to
use
in
the
browser,
please
refer
to
Appendix-‐1
:
Alternative
Login
Method
to
connect
to
the
student
desktop
using
Java
or
RDP
client.
]
Optional
Step
5:
If
you
encounter
connection
issues
with
the
“Student
Desktop”,
click
on
“Reconnect”
to
re-‐establish
the
connection.
Optional
Step
6:
If
re-‐connection
to
the
“Student
Desktop”
remains
unsuccessful,
please
verify
your
laptop
connectivity
using
the
following
link.
Note
that
a
Java
client
is
required
on
your
browser
for
this
test
site
to
function.
https://use.cloudshare.com/test.mvc
This
test
site
will
validate
the
RDP-‐based
and
Java-‐based
connections
to
your
browser.
Click
“Allow”
to
allow
the
“Java
Applet”
to
be
installed
and
run
on
your
browser.
Optional
Step
7:
If
the
connectivity
test
passed,
please
close
the
browser
and
retry
from
Task-‐1
Step-‐1.
If
the
connectivity
test
failed,
please
inform
the
instructor
for
further
assistance.
“student”
-‐>
<-‐
“utd135”
Step
2:
You
are
now
logged
in
to
the
firewall
and
should
see
the
main
dashboard.
Step
3:
Open
a
new
tab
in
the
Chrome
browser
window
and
confirm
Internet
connectivity
to
some
URL
(e.g.
http://www.cnn.com)
Step
4:
Here
is
a
quick
look
at
how
the
student
desktop
and
the
virtual
firewall
are
connected.
ü Question:
What
is
the
response
seen
in
the
browser
window?
Ø Answer:
You
should
get
blocked
and
see
a
screen
that
looks
like
this:
Step 2: Click on the rule name “UTD-‐Policy-‐03” à a “Security Policy Rule” pop-‐up will appear
Step 3: Click on the “Application” tab (within the pop-‐up)
Step 4: Click “Add” and type “facebook” and select “facebook-‐base” from the list
Step 6: Click “Enable” (in the bottom bar of the GUI)
Step 7: Click “Commit” (in the upper right hand corner of the GUI)
[NOTE:
There
will
be
a
pop-‐up
window
with
messages
regarding
the
Commit.
Any
warning
messages
can
be
safely
ignored.]
Step 9: Click “Close” in the pop-‐up window once the Commit has completed
Step
10:
Open
a
new
browser
tab
and
surf
to
http://www.facebook.com.
(You
may
get
a
warning
message
that
you
can
ignore.)
Username/Email:
ultimatetestdrive@gmail.com
Password:
paloalto123
Note:
If
you
have
trouble
passing
the
@
symbol
to
the
VM
please
follow
the
directions
in
the
Appendix
for
accessing
the
on-‐screen
keyboard.
Step 2: Type into the query box (directly above the “Receive Time” column) the search string:
Questions:
Ø You
should
not
be
able
to
go
to
Google
drive.
Google-‐drive-‐web application is not explicitly allowed by the firewall so it is blocked.
To get around the firewall some users may try to use an anonymizer site to by-‐pass the firewall
Step 2: You should see the anonymizer site being blocked:
Task
3–
Attempt
to
download
and
install
evasive
application
Step
1:
To
circumvent
the
firewall,
some
students
may
try
to
download
and
install
an
evasive
application
such
as
Tor.
Step
2:
Attempt
to
download
Tor
from
the
web
site
https://www.torproject.org
in
the
browser.
You
should
see
that
it
has
been
blocked
too.
Step
2:
You
can
click
on
any
entry
under
the
“URL”
column
and
it
will
automatically
enter
the
filtering
string
in
the
search
bar
Questions:
Step 3: Name the Policy “IT-‐usage” and select “Activity-‐3” for Tags using the drop down list
Step 5: Click “Add” in the “Source Zone” box and select “Trust”
Step 6: Click on the “Destination” tab and click “Add” in the “Destination Zone” box and select “Untrust”
Step 7: Click on the “Application” tab and click “Add” à type “IT-‐apps” and select it
Step
8:
Click
on
the
“Service/URL
Category”
tab
and
click
on
the
pull
down
menu
above
“Service”,
change
the
default
setting
from
“application-‐default”
to
“any”
and
then
click
“Ok”.
Step 10: Click and drag the Policy “IT-‐usage” so it is above the “UTD-‐Policy-‐05” rule.
Step 11: Click “Commit” (in the upper right hand corner of the web browser)
Step
14:
“IT-‐apps”
is
a
predefined
application
group
that
includes
SSH,
MS-‐RDP
and
other
applications.
Go
to
the
“Object”
tab
and
“Application
Groups”
node
to
review
what
applications
are
included
in
this
application
group.
Login: student
Password: utd135
Question:
ü Can
you
login?
Ø Yes
–
you
should
be
able
to
login.
Step 3: Close the SSH session. SSH again to “172.16.1.101” using the non-‐standard port “443”
Question:
ü Can
you
login
using
the
non-‐standard
port?
Ø Yes
–
you
should
be
able
to
login.
Step 4: Close the putty application and click the “Monitor” tab à “Traffic” log on the firewall GUI.
Step 5: Search for application SSH on port 22 or 443
Questions:
ü What
query
string
did
you
type
into
the
search
box?
ü Was
the
application
allowed?
Step 2: Click on the “IT-‐usage” Security Policy created in Task 1
Step
3:
Click
on
the
“Service/URL
Category”
tab
and
click
on
the
pull
down
menu
above
“Service”,
change
“any”
to
“application-‐default”
and
then
click
“Ok”
(The
“Application-‐default”
option
only
allows
applications
over
the
default
port
and
protocol,
it
prevents
applications
from
running
on
non-‐standard
port
or
protocol.)
Step 4: Click “Commit” (in the upper right hand corner of the web browser)
Step 2: SSH to 172.16.1.101 again on port 443 using putty. Did you get a login prompt?
Step 3: Close the putty application and click the “Monitor” tab à “Traffic” log on the firewall GUI
Questions:
ü What
query
string
did
you
type
into
the
search
box?
ü Was
the
application
allowed?
Activity
4
–
Decryption
Background:
More
and
more
traffic
is
encrypted
with
SSL
by
default,
making
it
difficult
to
allow
and
scan
that
traffic,
yet
blindly
allowing
it
is
high
risk.
Policy
based
SSL
decryption
will
allow
you
to
enable
encrypted
applications,
apply
policy,
then
re-‐encrypt
and
send
the
traffic
to
its
final
destination.
Policy
considerations
include
which
applications
to
decrypt,
protection
from
malware
propagation
and
data/file
transfer.
ü Question:
What
is
the
response
seen
in
the
browser
window?
Ø Answer:
You
should
get
blocked
and
see
a
screen
that
looks
like
this:
Step
3:
Click
on
the
“Application”
tab
(within
the
pop-‐up)
Step
4:
Click
“Add”
and
type
“linkedin-‐base”
à
select
it
Step
5:
Click
“Ok”
Step
6:
Click
“Enable”
(in
the
lower
bar
of
the
GUI)
NOTE: You don’t need to click “Commit” until after the next Task
Step
3:
In
the
“Decryption
Policy
Rule”
pop-‐up:
name
the
Policy
“UTD-‐Decryption-‐02”
and
select
“Activity-‐
4”
in
“Tags”
Step
4:
Click
on
the
“Source”
tab
Step
5:
Click
“Add”
in
the
box
labeled
“Source
Zone”
and
select
“Trust”
Step
6:
Click
on
the
“Destination”
tab
Step
7:
Click
“Add”
in
the
box
labeled
“Destination
Zone”
and
select
“Untrust”
Step
8:
Click
on
the
“Options”
tab
and
select
“decrypt”
for
“Action”
-‐
leave
the
“Type”
selection
as
“SSL
Forward
Proxy”
Step
9:
Click
“Ok”
Step
10:
Click
“Commit”
(in
the
upper
right
hand
corner
of
the
web
browser)
Step
11:
Click
“Ok”
in
the
pop-‐up
window
Step
12:
Click
“Close”
once
the
commit
has
completed
Task
3
–
Log
into
LinkedIn
Step
1:
Open
a
new
browser
tab
and
enter
http://www.linkedin.com
Step
2:
Log
into
LinkedIn
using
your
personal
account.
[Note:
LinkedIn
User
Agreement
8.2
prevents
us
from
providing
a
generic
account
for
the
lab.
Please
login
with
your
personal
account
to
continue
with
the
lab.
If
you
do
not
wish
to
use
your
own
account
or
do
not
have
an
account
to
continue
on
with
the
lab,
please
move
on
to
the
next
activity.]
Step 2: Type into the query box (directly above the “Receive Time” column) the search string:
Questions:
ü Can you find the log entry associated with the application you just used?
Then click the Details icon next to the top log entry:
Questions:
Step
3:
On
the
“Enable
WildFire”
entry,
change
the
“File
Types”
from
“Any”
to
“exe”,
“pdf”,
“docx”
and
“PE”,
Step
5:
Click
“Ok”
–
this
now
allows
the
File
Blocking
Profile
to
forward
files
to
WildFire
Modern
Malware
Protection
services
Step 2: Click on the rule name “UTD-‐Policy-‐01” à a “Security Policy Rule” pop-‐up will appear
Step 3: Click on the “Actions” tab (within the pop-‐up)
Step 4: In the “Profile Setting” section, select the pull-‐down menu next to “File Blocking”
Optional Step 7: Click on the rule name “UTD-‐Policy-‐04” à a “Security Policy Rule” pop-‐up will appear
Optional Step 8: Click on the “Actions” tab (within the pop-‐up)
Optional
Step
9:
In
the
“Profile
Setting”
section,
select
the
pull-‐down
menu
next
to
“Profile
Type”
and
select
“Profiles”
Optional Step 10: Select the pull-‐down menu next to “File Blocking” and select “UTD-‐File-‐Blocking-‐01”
Question:
ü Should
you
apply
any
other
Security
Profiles
to
this
Security
Rule?
Optional
Step
12:
If
this
policy
is
not
enabled,
click
“Enable”
at
the
bottom
of
the
policy
screen
to
enable
the
policy
Step
13:
Click
“Commit”
(in
the
upper
right
hand
corner
of
the
web
browser)
Step
14:
Click
“Ok”
in
the
pop-‐up
window
Step
15:
Click
“Close”
once
the
commit
has
completed
http://wildfire.paloaltonetworks.com/publicapi/test/pe
Step
2:
The
browser
will
automatically
download
a
“wildfire-‐test-‐pe-‐file.exe”
sample
file.
Check
your
“Download”
folder
to
confirm
the
download.
[Note
that
this
sample
changes
every
time
it
is
downloaded
and
it
should
by-‐pass
most
Antivirus
scans.]
Step
3:
To
view
that
the
sample
file
has
been
sent
to
WildFire,
go
back
to
the
firewall
GUI,
click
on
the
“Monitor”
tab,
then
click
on
“Data
Filtering”
node
(under
the
“Logs”
section),
you
should
see
log
entries
that
the
test
sample
file
is
uploaded
to
WildFire.
Click
on
the
“WildFile
Submissions”
node
and
review
the
results
return
from
the
WildFire
service.
[Note:
It
may
take
about
10
mins
for
the
Wildfire
Submissions
log
to
appear.
It
is
a
good
time
to
take
a
short
break
before
you
continue.
Please
do
not
skip
ahead
to
the
next
task.]
Step
4:
When
you
see
the
entry,
click
the
“Details”
icon
next
to
the
top
log
entry.
In
the
“Log
Info”
tab,
you
can
view
the
basic
info
of
the
file
and
the
application
that
carries
that
file.
Step
5:
Click
on
the
“WildFire
Analysis
Report”
tab
to
view
the
details
on
the
analysis
results.
Under
“WildFire
Analysis
Summary”,
the
“Verdict”
indicates
that
the
submitted
file
is
a
Malware
and
you
can
download
the
malware
file
from
the
“Sample
File”
directly.
Step
6:
Under
“Dynamic
Analysis”,
you
can
see
the
behavior
of
the
malware
under
different
operating
systems.
“Virtual
Machine
1”
is
configured
with
Window
XP,
review
the
behavior
and
activity
of
the
malware.
Click
on
“Virtual
Machine
2”
to
review
the
malware
behavior
and
activity
in
Window
7.
Step
7:
Click
on
“VirusTotal
Information”
on
the
report,
and
it
will
bring
you
to
the
VirusTotal
home
page.
Since
this
malware
has
never
been
seen
before,
VirusTotal
will
not
have
any
information
on
this
virus.
Step
8:
Explore
the
other
features
and
functions
offered
in
the
WildFire
Analysis
Report
such
as
download
the
sample
file
or
download
the
WildFire
Analysis
report
in
pdf.
Username:
ngfw.utd@gmail.com
Password:
utd135
Step
3:
In
the
portal,
click
on
the
“Reports”
tab,
you
can
see
a
summary
of
all
the
files
that
are
summited
for
analysis.
You
can
review
the
WildFire
Analysis
Report
by
clicking
on
the
Report
icon
on
the
left
hand
side
of
the
entry.
A
WildFire
account
can
manage
multiple
Palo
Alto
Networks
firewalls.
(Note:
In
this
lab
environment,
there
is
only
one
firewall
managed
by
this
account.)
Step
4:
You
can
also
upload
suspicious
files
manually
for
analysis
using
the
“Upload
Sample”,
click
on
“Upload
Sample”
tab
on
top
to
review
the
various
upload
options.
End
of
Activity
5
UTD-‐NGFW
3.0
Page
25
Ultimate
Test
Drive
-‐
NGFW
Questions:
ü What
was
the
action
associated
with
the
log
entries?
ü What
was
the
application
associated
with
the
log
entries?
Task
1
–
Identify
the
Gateway
URL
Step
1:
Locate
the
public
URL
for
your
GlobalProtect
gateway
running
on
your
VM-‐Series.
This
is
the
URL
for
gateway
that
we
will
use
to
configure
both
the
GlobalProtect
gateway
and
the
client.
Go
to
the
“Virtual
Machines”
tab
on
top.
You
will
see
a
list
of
all
the
Virtual
Machines
used
in
this
lab.
Step
2:
Identify
the
“VM-‐Series
Next
Generation
Firewall”
virtual
machine,
click
on
“More
details”.
The
“External
Address”
for
the
virtual
firewall
will
resolve
to
the
public
IP
address
that
you
will
need
to
use.
Note
that
the
External
Address
is
unique
to
each
lab
environment
and
it
is
different
from
what
is
shown
below.
(Optional)
Step
3a:
You
can
copy
this
URL
down
on
paper
or
you
can
use
“Cloudshare
–Clipboard”
to
copy
text
to
the
VM
in
the
environment.
To
use
the
Cloudshare
–
Clipboard,
click
on
the
little
blue
icon
next
to
the
URL
to
copy
it
to
the
clipboard.
In
order
to
paste
this
URL
in
the
window,
you
will
need
to
put
it
in
the
Cloudshare
clipboard.
Go
back
to
the
“Student
Desktop”,
click
on
the
“Edit
Clipboard”
button.
(If
you
are
using
“Fullscreen
RDP”,
you
will
need
to
exit
it
to
see
the
“Edi
Clipboard”
button.
(Optional) Step 3b: In the Clipboard window, right click and paste the URL here.
(Optional)
Step
3c:
Click
“Save”
to
save
the
URL
in
the
Cloudshare
clipboard.
Now
you
should
be
able
to
paste
this
text
in
the
VM
when
you
right
click
in
any
text
field.
[You may want to paste the URL into a text file on your laptop -‐ it may come in handy later in this activity.]
Step 2: Go to the “Network” tab on top, then click on the “GlobalProtect” node and then click on “Portals”
Step
3:
Click
on
the
‘UTD-‐GP-‐Portal”
to
open
up
the
GlobalProtect
Portal
configuration
window,
then
click
on
the
“Client
Configuration”
tab
on
the
left
hand
side
of
the
window.
Step 4: Click on the “UTD-‐GP-‐Portal-‐ClientCfg” in the “Client Configuration” window.
Step
5:
In
the
“Config”
window
of
the
“UTD-‐GP-‐Portal-‐ClientCfg”,
go
to
the
“Gateways”
tab
to
configure
the
gateway
information
that
will
be
provided
to
the
client.
Step
6:
In
our
lab,
we
will
use
one
External
Gateway.
We
will
enter
the
your
lab
gateway
URL
for
the
client.
Click
on
“Address”
field
under
External
Gateways,
and
replace
the
“replace.this.url”
with
the
“External
Address
URL”
from
Task-‐1
of
this
activity.
[If you have done Optional Step-‐3 in Task-‐1, you can right click and paste the URL in the Address field.]
Step
7:
Click
“OK”
twice
to
close
and
save
the
configuration
changes
in
the
“UTD-‐GP-‐Portal”
and
commit
the
changes.
Step
2:
Open
the
chrome
browser
and
test
the
internet
connectivity
using
web
pages
such
as
www.msn.com
and
www.cnn.com.
You
should
be
able
to
connect
to
the
internet
directly
from
this
device.
[Note
that
this
device
is
NOT
sitting
being
the
VM-‐Series
firewall.
You
can
test
this
by
going
to
the
web
site
that
was
blocked
in
Activity-‐6.
You
should
see
not
see
the
same
block
page.]
Step
3:
Start
the
GlobalProtect
application
from
the
“Start”
menu.
Step
4:
On
the
GlobalProtect
application
window,
go
to
the
“Settings”
tab
to
enter
the
login
info
for
the
GlobalProtect
Portal.
Step
5:
In
the
setting
window,
enter
the
following
Username
and
Password
and
copy
the
“External
Gateway”
URL
from
Task-‐1
of
this
activity
into
the
“Portal”
field.
[You
can
use
the
“Send
Text”
feature
here
to
cut
and
paste
the
External
Gateway
URL
in
the
Send
Text
Window
and
send
it
to
the
GlobalProtect
Setting
window.]
Username:
joe
Password:
utd135
[
Note:
If
you
encountered
connection
problems,
check
to
ensure
the
“External
Gateway”
URL
is
entered
correctly
in
the
“Portal”
field.
]
(Optional)
Step
5a:
You
can
validate
the
“External
Gateway”
URL
by
testing
it
in
a
browser
with
the
HTTPS
protocol.
It
will
open
the
“GlobalProtect
Portal”
page
on
your
gateway.
You
are
not
required
to
login
to
this
portal.
Step
6:
Once
connected,
you
can
see
the
GlobalProtect
Welcome
page.
To
verify
that
GlobalProtect
is
connected
to
the
Portal,
go
to
the
“Status”
window
in
the
GlobalProtect
application
to
confirm
the
“Connected”
status.
Step
7:
Check
your
internet
connectivity
in
the
mobile
PC
by
visiting
some
web
pages
(e.g.
www.msn.com
or
www.cnn.com)
via
the
browser.
Now
test
www.facebook.com
and
www.linkedin.com.
You
should
not
be
able
to
get
to
those
services.
Step
7:
Under
the
“Current
User”
tab
in
the
“User
Information”
window.
Notice
that
the
GlobalProtect
client
in
the
Mobile-‐PC
can
collect
host
information
such
as
computer
name,
operation
system
used
and
more.
[Note:
GlobalProtect
-‐
Host-‐Information-‐Profile
(HIP)
provides
state
details
about
the
condition
of
the
mobile
laptop,
smartphone
or
tablet,
which
can
be
used
for
making
policy
decision
about
the
resources
the
device
can
access.
Please
talk
to
your
instructor
for
more
information
on
the
GlobablProtect
solution.
]
Step
4:
Click
“Run
Now”
(at
the
top
of
the
pop-‐up),
then
click
on
newly
create
tab
“Traffic
Stats”
to
review
the
report,
then
export
the
results
to
a
pdf
report
Step
5:
Click
“Ok”
to
save
this
custom
report
End
of
Activity
8
Step 2: Please complete the survey and let us know what you think about this event.
Ask you Palo Alto Networks Sales Representative or Palo Alto Networks Partner for more information
There are two other methods that you can use to login to the student desktop:
Both
methods
are
described
below
and
you
can
select
the
one
that
best
fit
what
you
have
installed
on
your
laptop.
Note
that
RDP
protocol
may
not
be
supported
on
all
networks
so
please
verify
that
RDP
is
supported
at
your
location.
Login
to
the
student
desktop
using
Java
Console
(Java
client
required)
Step
1:
Click
on
the
“Student
Desktop”
after
login
to
the
UTD
workshop
Step
2:
Click
on
the
Console
link
on
“switch
to
Console’.
This
will
run
the
Java
client.
Step
3:
Allow
to
Java
to
run
VncViewer
application.
You
may
need
to
click
“Run”
a
few
times.
Step
2:
Click
on
the
“Don’t
Block”
on
the
Java
Security
Warning
message.
Step
3:
After
allowing
the
Java
client
to
run,
you
will
see
the
student
desktop
display.
Click
the
“Send
Ctrl-‐
Alt-‐Del”
to
open
the
login
window
and
use
the
Username
and
Password
as
indicated
on
your
browser,
not
the
one
indicated
below.
You
should
be
login
to
the
student
desktop
after
entering
the
login
name
and
password.
Step 1: Click on the “Virtual Machines” tap to the top to view all the Virtual Machines in the environment.
Step
2:
Click
on
the
“More
details”
in
the
“VM-‐Series
Virtual
Firewall”.
Note:
Not
the
one
under
“Student
Desktop”.
Step
3:
Copy
the
URL
in
External
Address
under
VM
Details
of
the
“VM-‐Series
Virtual
Firewall.
You
can
click
on
the
blue
icon
next
to
the
address
to
copy
it
to
the
clipboard.
Step
4:
Open
the
RDP
client
on
your
laptop
and
paste
URL
to
the
host
or
PC
field.
(Note:
Not
the
URL
as
shown
below.)
Step
5:
On
the
browser,
click
on
the
“More
details”
link
on
the
“Student
Desktop”,
then
click
on
the
“show
password”
link
under
Credentials.
Use
the
password
to
login
to
the
student
desktop.
Step
6:
Use
the
username
and
password
to
login
to
the
student
desktop.
Step
8:
You
should
be
connected
to
the
student
desktop
after
that.
By
default,
the
“English
(United
Sates)”
and
“French
(France)”
keyboards
are
added
to
the
student
desktop.
Click
on
the
bottom
left
corner
to
switch
between
them.
Click
“Add”
to
add
a
new
international
keyboard.
Then
switch
to
the
new
keyboard
per
the
instruction
on
the
previous
page.
Step
2:
Click
“Accessories”
Step 3: Click “Ease of Access” and then “On-‐Screen Keyboard”
Step
4:
You
should
now
see
the
windows
On-‐Screen
Keyboard.
To
pass
keys
inside
the
VM
image
that
do
not
work
on
your
keyboard,
simply
select
the
key
using
a
mouse.
Lab
Setup
Firewall
VM-‐Series
Interface:
Int
Type:
IP
Address:
Connects
to
Zone:
Ethernet
1/1
L3
172.16.1.1
"Untrust"
Ethernet
1/2
L3
192.168.11.1
"Trust"
Management
-‐
10.30.11.1