<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA 500 Cisco 3560 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524504#M108529</link>
    <description>&lt;P&gt;Check if this helps&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/getting-started/segment-your-network-using-interfaces-and-zones/configure-interfaces-and-zones" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/getting-started/segment-your-network-using-interfaces-and-zones/configure-interfaces-and-zones&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Dec 2022 22:48:23 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2022-12-19T22:48:23Z</dc:date>
    <item>
      <title>PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524480#M108518</link>
      <description>&lt;P&gt;Hi there,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am totally new here in Paloalto firewall. I have PA 500 and want to do lab test and I want to find a basic instruction to set up PA to connect internet and also connect to Cisco switch. I am very familiar with Cisco ASA and switch since we do all CLI but I understand PA firewall is all GUI. Any help I would be appreciate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My understand is I need a license to update OS.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Vincent&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 18:18:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524480#M108518</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-12-19T18:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524482#M108519</link>
      <description>&lt;P&gt;As PA-500 is end of sale (&lt;A href="https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates" target="_blank"&gt;https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates&lt;/A&gt;) you most likely won't be able to re-activate already expired support subscription to download latest supported PANOS updates (8.1.x in case of PA-500).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"A product must be covered by a support contract as of the End-of-Sale date to be eligible for support renewal. Support contracts may be renewed for the duration of the End-of-Life cycle, and cannot be allowed to lapse during this time and be reinstated later."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-policy" target="_blank"&gt;https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-policy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check&amp;nbsp;&lt;A href="https://beacon.paloaltonetworks.com/student/collection/660313-next-generation-firewall" target="_blank"&gt;https://beacon.paloaltonetworks.com/student/collection/660313-next-generation-firewall&lt;/A&gt;&amp;nbsp;for learning materials&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 19:00:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524482#M108519</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-19T19:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524490#M108525</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/263384"&gt;@phugiay&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Beacon is a great resource as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;mentioned. &amp;nbsp;I recommend searching for "Firewall Essentials" and going through that course. &amp;nbsp;It is most excellent and free.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want something faster to get you up and running, go to the Administrator's Guide,&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin&lt;/A&gt;. &amp;nbsp;It has great links for basic configurations to get you going.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since you know the ASA, you are already very familiar with FW concepts. &amp;nbsp;These links will help you learn the GUI and additional NGFW material.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 20:30:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524490#M108525</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-12-19T20:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524502#M108528</link>
      <description>&lt;P&gt;Hi Raido_Rattameister.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the advise. I think I am OK for version 9. I want to play with PA 500 first before go to the real PA 850. I can be able to connect to internet to PA 500 .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My next step how to connect PA to one port from Cisco switch like we do in Cisco ASA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 22:38:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524502#M108528</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-12-19T22:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524504#M108529</link>
      <description>&lt;P&gt;Check if this helps&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/getting-started/segment-your-network-using-interfaces-and-zones/configure-interfaces-and-zones" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/getting-started/segment-your-network-using-interfaces-and-zones/configure-interfaces-and-zones&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 22:48:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524504#M108529</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-19T22:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524617#M108542</link>
      <description>&lt;P&gt;Hi Raido,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much.&lt;/P&gt;
&lt;P&gt;I have a question: I got the answer from the other forum. I can download the OS through my company account.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I read some instructions, you need to update from 8.1 -&amp;gt;9 -&amp;gt; 10, not straight to 10.1.8 right?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Re: Factory reset&lt;BR /&gt;@XXXX wrote:&lt;BR /&gt;We need license to do the update? &lt;BR /&gt;you actually don't need a license to do an upgrade, but a non-licensed device will not be able to download software versions from the update server, so you will need to do that part manually&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-OS 10.1.8-h2 is now available!&lt;BR /&gt;The PAN-OS 10.1.8-h2 software update is now available on the Palo Alto Networks Software Updates page. Check out the PAN-OS 10.1.8-h2 Release Notes for release details, including the new features and bug fixes that make the upgrade worthwhile.&lt;/P&gt;
&lt;P&gt;This email was sent to you because you are a registered user of the Palo Alto Networks Support Portal. If you no longer wish to receive these updates, please unsubscribe by updating your profile on the Support Portal.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:40:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524617#M108542</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-12-20T17:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524618#M108543</link>
      <description>&lt;P&gt;Hi TomYoung,&lt;/P&gt;
&lt;P&gt;Thank you so much for quick response. My first step to update OS since I can download the OS from my company.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to update from 8--&amp;gt; 9 - &amp;gt;10 or straight to 10.1.8&lt;/P&gt;
&lt;P&gt;PAN-OS 10.1.8-h2 is now available!&lt;BR /&gt;The PAN-OS 10.1.8-h2 software update is now available on the Palo Alto Networks Software Updates page. Check out the PAN-OS 10.1.8-h2 Release Notes for release details, including the new features and bug fixes that make the upgrade worthwhile.&lt;/P&gt;
&lt;P&gt;This email was sent to you because you are a registered user of the Palo Alto Networks Support Portal. If you no longer wish to receive these updates, please unsubscribe by updating your profile on the Support Portal.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:42:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524618#M108543</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-12-20T17:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524620#M108544</link>
      <description>&lt;P&gt;Yes it is possible to manually upload and upgrade PANOS.&lt;/P&gt;
&lt;P&gt;In your case it would not work as PA-500 does not support anything above 8.1.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates" target="_blank"&gt;https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:53:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524620#M108544</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-20T17:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524777#M108558</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Raido_Rattameis&lt;/SPAN&gt;&lt;SPAN&gt;ter,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I can be able update to 8.07 and it cannot update to version 8.1&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I follow the instruction below from CLI but still cannot update to 8.1. They said it will take more than an hour but it did reboot but still show 8.07&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; show system info&lt;/P&gt;
&lt;P&gt;hostname: PA-500&lt;BR /&gt;ip-address: 192.168.1.1&lt;BR /&gt;netmask: 255.255.255.0&lt;BR /&gt;default-gateway:&lt;BR /&gt;ip-assignment: static&lt;BR /&gt;ipv6-address: unknown&lt;BR /&gt;ipv6-link-local-address: fe80::d6f4:beff:fe26:8d00/64&lt;BR /&gt;ipv6-default-gateway:&lt;BR /&gt;mac-address: d4:f4:be:26:8d:00&lt;BR /&gt;time: Tue Dec 20 17:05:38 2022&lt;BR /&gt;uptime: 0 days, 0:57:52&lt;BR /&gt;family: 500&lt;BR /&gt;model: PA-500&lt;BR /&gt;serial: XXXX&lt;BR /&gt;sw-version: 8.0.7&lt;BR /&gt;global-protect-client-package-version: 0.0.0&lt;BR /&gt;app-version: 695-4002&lt;BR /&gt;app-release-date: unknown&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; show jobs id 2&lt;/P&gt;
&lt;P&gt;Enqueued Dequeued ID Type&lt;BR /&gt;Status Result Completed&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;2022/12/20 17:17:58 17:17:58 2 SWInstall&lt;BR /&gt;ACT PEND 0%&lt;BR /&gt;Warnings:&lt;BR /&gt;Details:Loading into software manager&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.samkear.com/upgrading-software-palo-alto-firewalls-without-internet-connections" target="_blank"&gt;https://www.samkear.com/upgrading-software-palo-alto-firewalls-without-internet-connections&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 17:22:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524777#M108558</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-12-21T17:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524788#M108561</link>
      <description>&lt;P&gt;If you do update manually you need to upload and install 8.1.0 before you can jump to 8.1.x from 8.0.x&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524788#M108561</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-21T18:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524990#M108600</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am finally be able update to version 8.1. Thank you for you help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My next step is connected the Internet to PA 500 and connect the switch 3560.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS2CAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS2CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;1. I plug my comcast router to Ethernet1/1 (untrust) and Ethernet1/2( trust) to Cisco switch. PA picked up the DHCP Client (10.0.0.126) and it shows the IP after I hit Commits and show green light. However, I cannot ping website like yahoo or ip or I cannot ping my wifi at home like Cisco ASA except the IP that Comcast assigned for PA 500.&amp;nbsp; I search from here and everyone said the issue is NAT/security policy/Virtual router. Since this is not a static IP so there is no need for virtual routing (Correct me if I am wrong)&lt;/P&gt;
&lt;P&gt;2. My Cisco switch has 2 VLAN 10 (192.168.10.0/24)and 12 (10.33.12.0/24). I assigned IP 192.168.10.50 for PA 500 and from my laptop or server,&amp;nbsp; I can ping PA 500 but not the comcast IP.&amp;nbsp;(something is not right here) For Cisco ASA, you connect one port from ASA to another port from your switch and you route all your VLAN to ASA port and from ASA you route to the port on switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attached the file and my routing. I changed my Management Profile all to ping. I did the screenshot before I change&lt;/P&gt;
&lt;P&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; show routing route&lt;/P&gt;
&lt;P&gt;flags: A:active, ?:loose, C:connect, H:host, S:static, ~:internal, R:rip, O:ospf&lt;BR /&gt;, B:bgp,&lt;BR /&gt;Oi:ospf intra-area, Oo:ospf inter-area, O1:ospf ext-type-1, O2:ospf ext-t&lt;BR /&gt;ype-2, E:ecmp, M:multicast&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;VIRTUAL ROUTER: default (id 1)&lt;BR /&gt;==========&lt;BR /&gt;destination nexthop&lt;BR /&gt;metric flags age interface next-AS&lt;BR /&gt;0.0.0.0/0 10.0.0.1&lt;BR /&gt;10 A S ethernet1/1&lt;BR /&gt;10.0.0.0/24 10.0.0.126&lt;BR /&gt;0 A C ethernet1/1&lt;BR /&gt;10.0.0.126/32 0.0.0.0&lt;BR /&gt;0 A H&lt;BR /&gt;192.168.10.0/24 192.168.10.0&lt;BR /&gt;0 A C ethernet1/2&lt;BR /&gt;192.168.10.0/32 0.0.0.0&lt;BR /&gt;0 A H&lt;BR /&gt;total routes shown: 5&lt;/P&gt;
&lt;P&gt;VIRTUAL ROUTER: VR1 (id 2)&lt;BR /&gt;==========&lt;BR /&gt;destination nexthop&lt;BR /&gt;metric flags age interface next-AS&lt;BR /&gt;total routes shown: 0&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt;&lt;BR /&gt;admin@PA-500&amp;gt;&lt;BR /&gt;admin@PA-500&amp;gt;&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; ping source 74.6.143.25 host 8.8.8.8&lt;BR /&gt;bind: Cannot assign requested address&lt;BR /&gt;admin@PA-500&amp;gt; ping source host 8.8.8.8&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;admin@PA-500&amp;gt; show rulebase security rule&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;admin@PA-500&amp;gt; configuration&lt;BR /&gt;Unknown command: configuration&lt;BR /&gt;admin@PA-500&amp;gt; conf&lt;BR /&gt;Unknown command: conf&lt;BR /&gt;admin@PA-500&amp;gt; configure&lt;BR /&gt;Entering configuration mode&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show rulebase security rules&lt;BR /&gt;rules {&lt;BR /&gt;bad-application-block {&lt;BR /&gt;from trust;&lt;BR /&gt;to untrust;&lt;BR /&gt;source any;&lt;BR /&gt;destination any;&lt;BR /&gt;service any;&lt;BR /&gt;application peer-to-peer;&lt;BR /&gt;action deny;&lt;BR /&gt;log-end yes;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;}&lt;BR /&gt;internet-acces {&lt;BR /&gt;profile-setting {&lt;BR /&gt;profiles {&lt;BR /&gt;url-filtering default;&lt;BR /&gt;virus default;&lt;BR /&gt;spyware default;&lt;BR /&gt;vulnerability default;&lt;BR /&gt;wildfire-analysis default;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;to untrust;&lt;BR /&gt;from trust;&lt;BR /&gt;source any;&lt;BR /&gt;destination any;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;application any;&lt;BR /&gt;service application-default;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;action allow;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500#&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show zone&lt;BR /&gt;zone {&lt;BR /&gt;trust {&lt;BR /&gt;network {&lt;BR /&gt;layer3 ethernet1/2;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;untrust {&lt;BR /&gt;network {&lt;BR /&gt;layer3 ethernet1/1;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;WAN {&lt;BR /&gt;network {&lt;BR /&gt;layer3;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;LAN {&lt;BR /&gt;network {&lt;BR /&gt;layer3;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show interface all&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# exit&lt;BR /&gt;Exiting configuration mode&lt;BR /&gt;admin@PA-500&amp;gt; show interface all&lt;/P&gt;
&lt;P&gt;total configured hardware interfaces: 7&lt;/P&gt;
&lt;P&gt;name id speed/duplex/state mac address&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;ethernet1/1 16 1000/full/up d4:f4:be:26:8d:10&lt;BR /&gt;ethernet1/2 17 1000/full/up d4:f4:be:26:8d:11&lt;BR /&gt;ethernet1/3 18 ukn/ukn/down(autoneg) d4:f4:be:26:8d:12&lt;BR /&gt;ethernet1/4 19 ukn/ukn/down(autoneg) d4:f4:be:26:8d:13&lt;BR /&gt;vlan 1 [n/a]/[n/a]/up d4:f4:be:26:8d:01&lt;BR /&gt;loopback 3 [n/a]/[n/a]/up d4:f4:be:26:8d:03&lt;BR /&gt;tunnel 4 [n/a]/[n/a]/up d4:f4:be:26:8d:04&lt;/P&gt;
&lt;P&gt;aggregation groups: 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2022 16:32:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/524990#M108600</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-12-23T16:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/525744#M108715</link>
      <description>&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 23:41:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/525744#M108715</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2023-01-03T23:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/525745#M108716</link>
      <description>&lt;DIV id="bodyDisplay_0" class=""&gt;
&lt;DIV class=""&gt;
&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am finally be able update to version 8.1. Thank you for you help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My next step is connected the Internet to PA 500 and connect the switch 3560.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS2CAK" target="_blank" rel="noopener nofollow noreferrer"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS2CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;1. I plug my comcast router to Ethernet1/1 (untrust) and Ethernet1/2( trust) to Cisco switch. PA picked up the DHCP Client (10.0.0.126) and it shows the IP after I hit Commits and show green light. However, I cannot ping website like yahoo or ip or I cannot ping my wifi at home like Cisco ASA except the IP that Comcast assigned for PA 500.&amp;nbsp; I search from here and everyone said the issue is NAT/security policy/Virtual router. Since this is not a static IP so there is no need for virtual routing (Correct me if I am wrong)&lt;/P&gt;
&lt;P&gt;2. My Cisco switch has 2 VLAN 10 (192.168.10.0/24)and 12 (10.33.12.0/24). I assigned IP 192.168.10.50 for PA 500 and from my laptop or server,&amp;nbsp; I can ping PA 500 but not the comcast IP.&amp;nbsp;(something is not right here) For Cisco ASA, you connect one port from ASA to another port from your switch and you route all your VLAN to ASA port and from ASA you route to the port on switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attached the file and my routing. I changed my Management Profile all to ping. I did the screenshot before I change&lt;/P&gt;
&lt;P&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; show routing route&lt;/P&gt;
&lt;P&gt;flags: A:active, ?:loose, C:connect, H:host, S:static, ~:internal, R:rip, O:ospf&lt;BR /&gt;, B:bgp,&lt;BR /&gt;Oi:ospf intra-area, Oo:ospf inter-area, O1:ospf ext-type-1, O2:ospf ext-t&lt;BR /&gt;ype-2, E:ecmp, M:multicast&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;VIRTUAL ROUTER: default (id 1)&lt;BR /&gt;==========&lt;BR /&gt;destination nexthop&lt;BR /&gt;metric flags age interface next-AS&lt;BR /&gt;0.0.0.0/0 10.0.0.1&lt;BR /&gt;10 A S ethernet1/1&lt;BR /&gt;10.0.0.0/24 10.0.0.126&lt;BR /&gt;0 A C ethernet1/1&lt;BR /&gt;10.0.0.126/32 0.0.0.0&lt;BR /&gt;0 A H&lt;BR /&gt;192.168.10.0/24 192.168.10.0&lt;BR /&gt;0 A C ethernet1/2&lt;BR /&gt;192.168.10.0/32 0.0.0.0&lt;BR /&gt;0 A H&lt;BR /&gt;total routes shown: 5&lt;/P&gt;
&lt;P&gt;VIRTUAL ROUTER: VR1 (id 2)&lt;BR /&gt;==========&lt;BR /&gt;destination nexthop&lt;BR /&gt;metric flags age interface next-AS&lt;BR /&gt;total routes shown: 0&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt;&lt;BR /&gt;admin@PA-500&amp;gt;&lt;BR /&gt;admin@PA-500&amp;gt;&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; ping source 74.6.143.25 host 8.8.8.8&lt;BR /&gt;bind: Cannot assign requested address&lt;BR /&gt;admin@PA-500&amp;gt; ping source host 8.8.8.8&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;admin@PA-500&amp;gt; show rulebase security rule&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;admin@PA-500&amp;gt; configuration&lt;BR /&gt;Unknown command: configuration&lt;BR /&gt;admin@PA-500&amp;gt; conf&lt;BR /&gt;Unknown command: conf&lt;BR /&gt;admin@PA-500&amp;gt; configure&lt;BR /&gt;Entering configuration mode&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show rulebase security rules&lt;BR /&gt;rules {&lt;BR /&gt;bad-application-block {&lt;BR /&gt;from trust;&lt;BR /&gt;to untrust;&lt;BR /&gt;source any;&lt;BR /&gt;destination any;&lt;BR /&gt;service any;&lt;BR /&gt;application peer-to-peer;&lt;BR /&gt;action deny;&lt;BR /&gt;log-end yes;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;}&lt;BR /&gt;internet-acces {&lt;BR /&gt;profile-setting {&lt;BR /&gt;profiles {&lt;BR /&gt;url-filtering default;&lt;BR /&gt;virus default;&lt;BR /&gt;spyware default;&lt;BR /&gt;vulnerability default;&lt;BR /&gt;wildfire-analysis default;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;to untrust;&lt;BR /&gt;from trust;&lt;BR /&gt;source any;&lt;BR /&gt;destination any;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;application any;&lt;BR /&gt;service application-default;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;action allow;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500#&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show zone&lt;BR /&gt;zone {&lt;BR /&gt;trust {&lt;BR /&gt;network {&lt;BR /&gt;layer3 ethernet1/2;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;untrust {&lt;BR /&gt;network {&lt;BR /&gt;layer3 ethernet1/1;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;WAN {&lt;BR /&gt;network {&lt;BR /&gt;layer3;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;LAN {&lt;BR /&gt;network {&lt;BR /&gt;layer3;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show interface all&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# exit&lt;BR /&gt;Exiting configuration mode&lt;BR /&gt;admin@PA-500&amp;gt; show interface all&lt;/P&gt;
&lt;P&gt;total configured hardware interfaces: 7&lt;/P&gt;
&lt;P&gt;name id speed/duplex/state mac address&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;ethernet1/1 16 1000/full/up d4:f4:be:26:8d:10&lt;BR /&gt;ethernet1/2 17 1000/full/up d4:f4:be:26:8d:11&lt;BR /&gt;ethernet1/3 18 ukn/ukn/down(autoneg) d4:f4:be:26:8d:12&lt;BR /&gt;ethernet1/4 19 ukn/ukn/down(autoneg) d4:f4:be:26:8d:13&lt;BR /&gt;vlan 1 [n/a]/[n/a]/up d4:f4:be:26:8d:01&lt;BR /&gt;loopback 3 [n/a]/[n/a]/up d4:f4:be:26:8d:03&lt;BR /&gt;tunnel 4 [n/a]/[n/a]/up d4:f4:be:26:8d:04&lt;/P&gt;
&lt;P&gt;aggregation groups: 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 03 Jan 2023 23:43:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/525745#M108716</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2023-01-03T23:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: PA 500 Cisco 3560</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/525746#M108717</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am finally be able update to version 8.1. Thank you for you help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My next step is connected the Internet to PA 500 and connect the switch 3560.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS2CAK" target="_blank" rel="noopener nofollow noreferrer"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS2CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;1. I plug my comcast router to Ethernet1/1 (untrust) and Ethernet1/2( trust) to Cisco switch. PA picked up the DHCP Client (10.0.0.126) and it shows the IP after I hit Commits and show green light. However, I cannot ping website like yahoo or ip or I cannot ping my wifi at home like Cisco ASA except the IP that Comcast assigned for PA 500.&amp;nbsp; I search from here and everyone said the issue is NAT/security policy/Virtual router. Since this is not a static IP so there is no need for virtual routing (Correct me if I am wrong)&lt;/P&gt;
&lt;P&gt;2. My Cisco switch has 2 VLAN 10 (192.168.10.0/24)and 12 (10.33.12.0/24). I assigned IP 192.168.10.50 for PA 500 and from my laptop or server,&amp;nbsp; I can ping PA 500 but not the comcast IP.&amp;nbsp;(something is not right here) For Cisco ASA, you connect one port from ASA to another port from your switch and you route all your VLAN to ASA port and from ASA you route to the port on switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attached the file and my routing. I changed my Management Profile all to ping. I did the screenshot before I change&lt;/P&gt;
&lt;P&gt;---------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; show routing route&lt;/P&gt;
&lt;P&gt;flags: A:active, ?:loose, C:connect, H:host, S:static, ~:internal, R:rip, O:ospf&lt;BR /&gt;, B:bgp,&lt;BR /&gt;Oi:ospf intra-area, Oo:ospf inter-area, O1:ospf ext-type-1, O2:ospf ext-t&lt;BR /&gt;ype-2, E:ecmp, M:multicast&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;VIRTUAL ROUTER: default (id 1)&lt;BR /&gt;==========&lt;BR /&gt;destination nexthop&lt;BR /&gt;metric flags age interface next-AS&lt;BR /&gt;0.0.0.0/0 10.0.0.1&lt;BR /&gt;10 A S ethernet1/1&lt;BR /&gt;10.0.0.0/24 10.0.0.126&lt;BR /&gt;0 A C ethernet1/1&lt;BR /&gt;10.0.0.126/32 0.0.0.0&lt;BR /&gt;0 A H&lt;BR /&gt;192.168.10.0/24 192.168.10.0&lt;BR /&gt;0 A C ethernet1/2&lt;BR /&gt;192.168.10.0/32 0.0.0.0&lt;BR /&gt;0 A H&lt;BR /&gt;total routes shown: 5&lt;/P&gt;
&lt;P&gt;VIRTUAL ROUTER: VR1 (id 2)&lt;BR /&gt;==========&lt;BR /&gt;destination nexthop&lt;BR /&gt;metric flags age interface next-AS&lt;BR /&gt;total routes shown: 0&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt;&lt;BR /&gt;admin@PA-500&amp;gt;&lt;BR /&gt;admin@PA-500&amp;gt;&lt;/P&gt;
&lt;P&gt;admin@PA-500&amp;gt; ping source 74.6.143.25 host 8.8.8.8&lt;BR /&gt;bind: Cannot assign requested address&lt;BR /&gt;admin@PA-500&amp;gt; ping source host 8.8.8.8&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;admin@PA-500&amp;gt; show rulebase security rule&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;admin@PA-500&amp;gt; configuration&lt;BR /&gt;Unknown command: configuration&lt;BR /&gt;admin@PA-500&amp;gt; conf&lt;BR /&gt;Unknown command: conf&lt;BR /&gt;admin@PA-500&amp;gt; configure&lt;BR /&gt;Entering configuration mode&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show rulebase security rules&lt;BR /&gt;rules {&lt;BR /&gt;bad-application-block {&lt;BR /&gt;from trust;&lt;BR /&gt;to untrust;&lt;BR /&gt;source any;&lt;BR /&gt;destination any;&lt;BR /&gt;service any;&lt;BR /&gt;application peer-to-peer;&lt;BR /&gt;action deny;&lt;BR /&gt;log-end yes;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;}&lt;BR /&gt;internet-acces {&lt;BR /&gt;profile-setting {&lt;BR /&gt;profiles {&lt;BR /&gt;url-filtering default;&lt;BR /&gt;virus default;&lt;BR /&gt;spyware default;&lt;BR /&gt;vulnerability default;&lt;BR /&gt;wildfire-analysis default;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;to untrust;&lt;BR /&gt;from trust;&lt;BR /&gt;source any;&lt;BR /&gt;destination any;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;application any;&lt;BR /&gt;service application-default;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;action allow;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500#&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show zone&lt;BR /&gt;zone {&lt;BR /&gt;trust {&lt;BR /&gt;network {&lt;BR /&gt;layer3 ethernet1/2;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;untrust {&lt;BR /&gt;network {&lt;BR /&gt;layer3 ethernet1/1;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;WAN {&lt;BR /&gt;network {&lt;BR /&gt;layer3;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;LAN {&lt;BR /&gt;network {&lt;BR /&gt;layer3;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# show interface all&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-500# exit&lt;BR /&gt;Exiting configuration mode&lt;BR /&gt;admin@PA-500&amp;gt; show interface all&lt;/P&gt;
&lt;P&gt;total configured hardware interfaces: 7&lt;/P&gt;
&lt;P&gt;name id speed/duplex/state mac address&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;ethernet1/1 16 1000/full/up d4:f4:be:26:8d:10&lt;BR /&gt;ethernet1/2 17 1000/full/up d4:f4:be:26:8d:11&lt;BR /&gt;ethernet1/3 18 ukn/ukn/down(autoneg) d4:f4:be:26:8d:12&lt;BR /&gt;ethernet1/4 19 ukn/ukn/down(autoneg) d4:f4:be:26:8d:13&lt;BR /&gt;vlan 1 [n/a]/[n/a]/up d4:f4:be:26:8d:01&lt;BR /&gt;loopback 3 [n/a]/[n/a]/up d4:f4:be:26:8d:03&lt;BR /&gt;tunnel 4 [n/a]/[n/a]/up d4:f4:be:26:8d:04&lt;/P&gt;
&lt;P&gt;aggregation groups: 0&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 23:45:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-cisco-3560/m-p/525746#M108717</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2023-01-03T23:45:21Z</dc:date>
    </item>
  </channel>
</rss>

