<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Address Group and Tag limitations in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248741#M126027</link>
    <description>&lt;P&gt;The necessary firewall rules for each application are defined by labels. &lt;BR /&gt;If a workstation needs access to it, the label is requested and assigned (XML-API), so&amp;nbsp;each Workstation has its own set of firewall rules. I tried implementing this requirement using different approaches, but unfortunately, everything failed due to several limitations.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;First, custom external dynamic lists (EDLs) are limited to a maximum of 30 lists.&lt;/LI&gt;
&lt;LI&gt;Assigning tags to address objects for dynamic address groups is limited to 64.&lt;/LI&gt;
&lt;LI&gt;The maximum number of members per Address Group is 2,500.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These limitations are documented, and some of them have already been discussed on this portal:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/products/product-selection" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/products/product-selection&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Show system state | Match cfg.general.max-address.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Why do data center firewalls (not the small boxes) have limitations like this? Have others also reached these limitations?&lt;BR /&gt;Does anyone have another approach to implementing the requirements?&lt;/P&gt;</description>
    <pubDate>Sun, 22 Feb 2026 15:13:50 GMT</pubDate>
    <dc:creator>HeinzP</dc:creator>
    <dc:date>2026-02-22T15:13:50Z</dc:date>
    <item>
      <title>Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248741#M126027</link>
      <description>&lt;P&gt;The necessary firewall rules for each application are defined by labels. &lt;BR /&gt;If a workstation needs access to it, the label is requested and assigned (XML-API), so&amp;nbsp;each Workstation has its own set of firewall rules. I tried implementing this requirement using different approaches, but unfortunately, everything failed due to several limitations.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;First, custom external dynamic lists (EDLs) are limited to a maximum of 30 lists.&lt;/LI&gt;
&lt;LI&gt;Assigning tags to address objects for dynamic address groups is limited to 64.&lt;/LI&gt;
&lt;LI&gt;The maximum number of members per Address Group is 2,500.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These limitations are documented, and some of them have already been discussed on this portal:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/products/product-selection" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/products/product-selection&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Show system state | Match cfg.general.max-address.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Why do data center firewalls (not the small boxes) have limitations like this? Have others also reached these limitations?&lt;BR /&gt;Does anyone have another approach to implementing the requirements?&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2026 15:13:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248741#M126027</guid>
      <dc:creator>HeinzP</dc:creator>
      <dc:date>2026-02-22T15:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248814#M126039</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/901194817"&gt;@HeinzP&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;The necessary firewall rules for each application are defined by labels. &lt;BR /&gt;If a workstation needs access to it, the label is requested and assigned (XML-API), so&amp;nbsp;each Workstation has its own set of firewall rules. I tried implementing this requirement using different approaches, but unfortunately, everything failed due to several limitations.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;First, custom external dynamic lists (EDLs) are limited to a maximum of 30 lists.&lt;/LI&gt;
&lt;LI&gt;Assigning tags to address objects for dynamic address groups is limited to 64.&lt;/LI&gt;
&lt;LI&gt;The maximum number of members per Address Group is 2,500.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These limitations are documented, and some of them have already been discussed on this portal:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/products/product-selection" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/products/product-selection&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Show system state | Match cfg.general.max-address.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Why do data center firewalls (not the small boxes) have limitations like this? Have others also reached these limitations?&lt;BR /&gt;Does anyone have another approach to implementing the requirements?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/901194817"&gt;@HeinzP&lt;/a&gt;&amp;nbsp; -- What are you trying to do?&amp;nbsp; What are you trying to control?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you trying to control a specific device from accessing a specific resource (server?)&amp;nbsp; Or are you trying to control a specific person/account from accessing a specific resource (server?)&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 21:30:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248814#M126039</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-02-23T21:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248854#M126041</link>
      <description>&lt;P&gt;Exactly! We are trying to enable a specific device to access particular servers. Company policy states that this should &lt;STRONG&gt;NOT&lt;/STRONG&gt; be done using user accounts. In other words, one user account can be used on different devices with different firewall rules (for example, developer devices and business user devices.).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;For example:&lt;BR /&gt;Device1 -&amp;gt; Application_Server_1&lt;BR /&gt;Device2 -&amp;gt; Application_Server_1 and Application_Server_2&lt;BR /&gt;Device3 -&amp;gt; Application_Server_2&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;We have around 3,000 devices and approximately 250 application servers, so any combination should be possible.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 07:21:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248854#M126041</guid>
      <dc:creator>HeinzP</dc:creator>
      <dc:date>2026-02-24T07:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248865#M126043</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/901194817"&gt;@HeinzP&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3,0"&gt;I haven't exactly tested this, but I'm thinking something along these lines should be possible:&lt;/P&gt;
&lt;P data-path-to-node="3,1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3,1"&gt;Since company policy forbids using human user accounts for this, could you use the User-ID XML-API to perform 'Machine-to-Group' mapping?&lt;/P&gt;
&lt;P data-path-to-node="3,2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3,2"&gt;Instead of tagging an Address Object, use the API to register the workstation's IP as a 'user' where the username is actually the Hostname (e.g., workstation-01). You can then map that hostname to 'Groups' (representing your application labels) using the 'type=user-id' XML-API payload.&lt;/P&gt;
&lt;P data-path-to-node="3,3"&gt;I believe, because these memberships are stored in the User-ID table (Data Plane) rather than the Configuration table, you bypass the 64-tag limit and the 2,500-member Address Group limit. An additional benefit is that these API updates happen in real-time—no 'Commit' is required to update access for a device (which is required every time a label should change for example).&lt;/P&gt;
&lt;P data-path-to-node="3,4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3,4"&gt;This fulfills the requirement of 'per-device' rules without touching actual user accounts, and I believe it scales better for thousands of devices and combinations.&lt;/P&gt;
&lt;P data-path-to-node="3,5"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3,5"&gt;Hope this approach can be useful.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 08:55:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248865#M126043</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-02-24T08:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248883#M126044</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/901194817"&gt;@HeinzP&lt;/a&gt;&amp;nbsp; -- I've done exactly this.&amp;nbsp; One way was ~12+ years ago via an "unsupported" option and now recently via a Palo supported option (which I've been doing successfully for the past ~2ish years.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first way was using an EDL, like you mentioned though, the box has a limit of 30 total EDLs.&amp;nbsp; So if you have more than 30 device types then an EDL won't ultimately work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto acquired a company about 6 years ago called "Zing Box."&amp;nbsp; This products' whole purpose was device control.&amp;nbsp; Prior to the Zing Box acquisition palo couldn't natively use the "what" in security policy, but with this acquisition they could.&amp;nbsp; This product turned into IoT Security or Device Security, which is a licensed feature of their firewall product.&amp;nbsp; If you purchase this product you can add "device type" as a field in your security policy and you'll be able to achieve exactly what you're trying to do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DeviceID.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70767i6E88A067FE778FCA/image-size/large?v=v2&amp;amp;px=999" role="button" title="DeviceID.png" alt="DeviceID.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 13:40:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248883#M126044</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-02-24T13:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248912#M126046</link>
      <description>&lt;P&gt;The User-ID XML API is a great idea. I have run a few tests with it. &lt;BR /&gt;Unfortunately, I am struggling with the user-to-group mapping. In my opinion, this is only possible with an LDAP server profile.&lt;BR /&gt;&lt;BR /&gt;Does the limit of 2,500 entries per group still exist when using Tag-Based Dynamic Group?&lt;/P&gt;
&lt;P&gt;eg.&lt;BR /&gt;&lt;SPAN class="ͼc"&gt; &amp;lt;dynamic&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ͼc"&gt; &amp;lt;filter&amp;gt;'user contains "label1\\"'&amp;lt;/filter&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ͼc"&gt; &amp;lt;/dynamic&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I will run some additional tests.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 18:12:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248912#M126046</guid>
      <dc:creator>HeinzP</dc:creator>
      <dc:date>2026-02-24T18:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248913#M126047</link>
      <description>&lt;P&gt;I'll try to get an evaluation license for it and give it a try.&lt;BR /&gt;Thanks for the tip!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 17:50:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248913#M126047</guid>
      <dc:creator>HeinzP</dc:creator>
      <dc:date>2026-02-24T17:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Address Group and Tag limitations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248918#M126048</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/901194817"&gt;@HeinzP&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;The User-ID XML API is a great idea. I have run a few tests with it. &lt;BR /&gt;Unfortunately, I am struggling with the user-to-group mapping. In my opinion, this is only possible with an LDAP server profile.&lt;BR /&gt;&lt;BR /&gt;Does the limit of 2,500 entries per group still exist when using Tag-Based Dynamic Group?&lt;/P&gt;
&lt;P&gt;eg.&lt;BR /&gt;&lt;SPAN class="ͼc"&gt; &amp;lt;dynamic&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ͼc"&gt; &amp;lt;filter&amp;gt;'user contains "label1\\"'&amp;lt;/filter&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ͼc"&gt; &amp;lt;/dynamic&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I will run some additional tests.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;IMO, if you're going to use this XML/EDL process you're going to set yourself up for support issues long term. The only real "enterprise" solution would be the DeviceID route, especially if you have a security policy driving your security architecture.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 19:02:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/address-group-and-tag-limitations/m-p/1248918#M126048</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-02-24T19:02:22Z</dc:date>
    </item>
  </channel>
</rss>

