
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Enable the Jenkins Application
/ 20
Configure a traffic mirroring policy
/ 20
Create a Pub/Sub Topic & VPC Firewall Rule
/ 20
Create a log sink
/ 10
Create a service account key file to authenticate XSOAR
/ 20
Resimulate malicious traffic
/ 10
This lab was developed with our partner, Palo Alto Networks. Your personal information may be shared with Palo Alto Networks, the lab sponsor, if you have opted in to receive product updates, announcements, and offers in your Account Profile.
In this lab, you will learn how the VM-Series firewall protects cloud networks by safely enabling applications and automatically preventing threats in realtime. You will then deploy Google Cloud IDS, the first native Google Cloud security offering powered by Palo Alto Networks detection technologies, to detect network threats and identify applications. You will then enable automatic incident response through Cortex Playbooks triggered by Cloud IDS events.
In this lab, you will perform the following tasks:
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources are made available to you.
This hands-on lab lets you do the lab activities in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Click the Start Lab button. If you need to pay for the lab, a dialog opens for you to select your payment method. On the left is the Lab Details pane with the following:
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window if you are running the Chrome browser).
The lab spins up resources, and then opens another tab that shows the Sign in page.
Tip: Arrange the tabs in separate windows, side-by-side.
If necessary, copy the Username below and paste it into the Sign in dialog.
You can also find the Username in the Lab Details pane.
Click Next.
Copy the Password below and paste it into the Welcome dialog.
You can also find the Password in the Lab Details pane.
Click Next.
Click through the subsequent pages:
After a few moments, the Google Cloud console opens in this tab.
The diagram and table below illustrate the lab environment. Please, take the time to familiarize yourself with each traffic flow.
Flow | Description |
---|---|
Red Line | Shows all inter-VPC traffic (north-south) traffic to/from the trust network. All inter-VPC traffic is routed to the VM-Series for in-line prevention. |
Blue Line | Shows all intra-VPC (east-west) traffic within the trust network. |
Green Line | Shows the integration between Cortex XSOAR and Cloud IDS. Threats detected by Cloud IDS are forwarded via pub/sub to Cortex XSOAR for security orchestration. |
In this task, protect a VPC network from internet bound threats by using App-ID™ and Threat Prevention™ on the VM-Series firewall.
Internet inbound traffic to the trust
VPC flows through the public address attached the VM-Series untrust interface. Then, the VM-Series inspects and translates this traffic to internal resources in the trust
VPC.
Access the web service on VM A
through the VM-Series firewall.
web-browsing
traffic from the internet to VM A
.
Access the Jenkins service on VM A
by appending :8080
to the previous URL.
In this step, use App-ID™ to allow jenkins
traffic through the VM-Series security policies.
In a separate browser tab, log into the VM-Series.
Key | Value |
---|---|
Console | |
Username | paloalto |
Password | Pal0Alt0@123 |
Go to Policies → Security. Within the inbound-web
security policy, click the web-browsing
application.
Click Add and search for jenkins
. Click OK.
Click Commit → Commit to apply the changes to the VM-Series.
After the commit completes, access the Jenkins service again.
jenkins
App-ID™ within the VM-Series security policies.
Go to Monitor → Traffic. Enter the query below to filter for jenkins
traffic.
jenkins
application was denied before the jenkins
application was added to the inbound-web security policy.
Click Check my progress to verify the objective.
All egress traffic from the trust network
is routed to the VM-Series trust interface for inspection and enforcement.
Click Activate Cloud Shell at the top of the Google Cloud console.
In Cloud Shell, SSH to the attacker
VM in the trust
network (Password: kali
).
jenkins
example in the previous step, the SSH session is inspected and translated by the VM-Series to the attacker
VM.
On the attacker
, attempt to download a pseudo-malicious file from the internet.
eicar
file is considered safe and is used to test threat prevention capabilities.
On the VM-Series, go to Monitor → Threat to view the threat logs.
eicar
) was successfully blocked.
It is likely other threats are visible in the threat logs. These are real threats hitting the public address assigned to the VM-Series.
threat severity
, filename
, file type
, application
, source/destination country
, and user
, and more.
In this task, configure a traffic mirroring policy for the Cloud IDS endpoint. Then, generate malicious traffic from the attacker VM (Kali linux) and leverage an exploit against the Jenkins server. Once the attack is complete, review the Cloud IDS application and threat logs in Logs Explorer.
Cloud IDS uses a resource known as an IDS endpoint, a zonal resource that can inspect traffic from any zone in its region. Each IDS endpoint receives mirrored traffic and performs threat detection analysis.
In Google Cloud, go to Network Security → Cloud IDS.
Click the endpoint cloud-ids-endpoint
to view more information about its configuration.
panw-trust-vpc
and is configured to log all traffic and to alert on threats with a severity level of Informational
or higher.
A traffic mirroring policy selects the type of traffic to send to the Cloud IDS endpoint for inspection.
On the cloud-ids-endpoint
, click Attach.
Enter a name
for the policy and enable
policy enforcement. Click Next.
Select All Subnets
for the mirrored source. Click Next.
Select Mirror all traffic (default)
. Click Submit.
Click Check my progress to verify the objective.
Generate malicious traffic from the attacker
VM to a victim
VM. This traffic is sent by the mirroring policy to the Cloud IDS endpoint for inspection.
If your session timed out, SSH to the attacker
VM in Cloud Shell (Password: kali
).
On the attacker
, make several requests to the jenkins
service.
Run the following curl
requests to simulate malicious traffic within the trust
network boundary.
Run the following command to use an exploit pack against the jenkins
server.
When you see [!] Deleting /tmp/eNJNLJ payload file
, attempt to access the shell of jenkins
server
You are now logged into the jenkins
server via reverse tunnel. Check which account you’re using:
root
.
(Optional) Drop a simple fork bomb to DoS the Jenkins server.
(Optional) Attempt to access the web
or jenkins
service on VM A
, again.
The threat logs generated by Cloud IDS can be viewed directly in the Google Cloud console.
In the Cloud IDS dashboard, click IDS Threats → Refresh.
(Optional) Click ⋮ → View threat details to view additional details about a given threat.
Cloud IDS ingests traffic logs based on your endpoint and traffic mirroring policy configuration. This enables you to gain visibility into application traffic, including: addresses, App-ID, source and destination countries, threat type, and more.
Click IDS Endpoints → cloud-ids-endpoint
→ View related logs.
Click Clear query and paste the query below. Then, click Run query.
jenkins
within your deployment zone. Feel free to adjust the filter to search for different types of traffic and alerts.
Expand a given traffic log to view more information. The example below shows traffic using the App-ID jenkins
between two servers in the trust
network.
In this task, configure Cortex XSOAR to receive threat intel from Cloud IDS. When a threat is detected, XSOAR executes a playbook to automatically block the attacker's IP address by adding it to the xsoar-blacklist
VPC firewall rule.
In this step, create a Pub/Sub topic to receive events generated by Cloud IDS. Then, create a VPC firewall rule (xsoar-blacklist
) to deny all traffic from specific source IP addresses.
In Cloud Shell, click + to open a new tab.
In the new tab, create a Pub/Sub topic (cloud-ids-topic
) and subscription (cloud-ids-sub
).
Create a VPC firewall rule named xsoar-blacklist
.
1.1.1.1
) is added as a source address.
Click Check my progress to verify the objective.
XSOAR subscribes to a Pub/Sub topic to receive events generated by Cloud IDS. Here, we will create a log sink to forward CRITICAL
threats detected by Cloud IDS to XSOAR.
In Logs Explorer. Click Clear Query.
Click More Actions → Create sink.
Set Sink name to cloud-ids-sink
. Click Next.
Set Sink Service to Cloud Pub/Sub topic
and select cloud-ids-topic
. Click Next.
Copy and paste the following into your inclusion filter. Click Create Sink.
CRITICAL
Cloud IDS threats to XSOAR for orchestration.
Click Check my progress to verify the objective.
In this step, create a service account key file to authenticate XSOAR to your Google Cloud project.
Go to IAM & Admin → Service Accounts.
On the qwiklabs-gcp-##
account, click ⋮ → Manage Keys.
Click Add Key → Create New Key. Select JSON
and click Create.
Click Check my progress to verify the objective.
Configure the Google Cloud Compute and Pub/Sub XSOAR integrations. This enables XSOAR to receive events from Cloud IDS and update the xsoar-blacklist
firewall rule.
Access the XSOAR console.
Key | Value |
---|---|
Console | |
Username | admin |
Password | fjvrcrkFw1PU6fSYizJA |
Go to Settings → Integrations. Search for google cloud compute
. Click Add instance.
On your local machine, copy the contents qwiklabs-gcp-##.json
to your clipboard.
Paste the contents qwiklabs-gcp-##.json
into the Service Account Private Key File field.
Click Test to verify connectivity. Then, click Save & Exit.
Search for google cloud pub/sub
. Click Add instance.
Configure the Pub/Sub integration as follows:
Field | Value |
---|---|
Fetch incidents | Enable |
Incident type | google cloud IDS |
Service Account Key File | Paste the contents of your qwiklabs-gcp-##.json . |
Project ID | |
Subscription ID | cloud-ids-sub |
Click Test to verify connectivity. Then click Save & Exit.
Prepare the XSOAR playbook to update the xsoar-blacklist
firewall rule with malicious addresses detected by Cloud IDS.
In XSOAR, go to Playbooks and search for Cloud IDS
.
Click Cloud IDS-IP Blacklist-GCP Firewall_Combine → Playbook Triggered.
Click Playbook Triggered. Set the value to xsoar-blacklist
. Click Save.
xsoar-blacklist
firewall rule.
Simulate malicious traffic from the attacker VM within the trust network. When a threat is detected by Cloud IDS, XSOAR will automatically add the attacker's address (192.168.11.3
) to the xsoar-blacklist
firewall rule.
In Cloud Shell, SSH into to the attacker
VM (Password: kali
).
Generate sudo threat with the threat severity of CRITICAL
.
CRITICAL
threat. This threat matches the sink filter and will be forwarded by Pub/Sub to XSOAR.
The threat generated in the previous step is forwarded by Pub/Sub to XSOAR. XSOAR uses this information to update the xsoar-blacklist
firewall rule with the threat's source address.
In XSOAR, go to Incidents and enter the following into the search filter.
Open the incident, click Workplan to review the actions taken by XSOAR.
Go to VPC network → Firewall. Click xsoar-blacklist
.
192.168.11.3
) should be added to the rule automatically.
CRITICAL
threat from those addresses.
From the attacker
VM, attempt to ping the internet and the jenkins
server.
xsoar-blacklist
firewall rule to block the attacker
.
Click Check my progress to verify the objective.
Congratulations! You have completed the lab. You have learned how to leverage VM-Series and Cloud IDS to provide in-line and out-of-band network prevention across your Google Cloud networks. You have also learned how to leverage Cortex XSOAR to provide end-to-end orchestration and remediation for security events detected by Cloud IDS.
Please click the following links for additional information:
...helps you make the most of Google Cloud technologies. Our classes include technical skills and best practices to help you get up to speed quickly and continue your learning journey. We offer fundamental to advanced level training, with on-demand, live, and virtual options to suit your busy schedule. Certifications help you validate and prove your skill and expertise in Google Cloud technologies.
Manual Last Updated: October 18, 2023
Lab Last Tested: October 18, 2023
Copyright 2025 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
Ce contenu n'est pas disponible pour le moment
Nous vous préviendrons par e-mail lorsqu'il sera disponible
Parfait !
Nous vous contacterons par e-mail s'il devient disponible
One lab at a time
Confirm to end all existing labs and start this one