<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions on Palo Alto safe practices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26027#M18985</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. See ppatel answer. You have a revertable image and you can also load other images aswell (the later will take a few minutes to complete since it will re-install the image you like).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I think that depends on the model and how large the drives are. I prefer to delete stuff I no longer have use for and keep only the previous (and perhaps the version before that) still on the box. You can always download the images again if needed (keeping the old images is just to not to have to wait for the download to complete in case one need to rollback).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. You can use the maint-mode to reset the device into factory settings (the current image will be used but all settings and logs will be wiped).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. I think its safe to use a PA box just like any other networkconnected device. The main difference (depending on which models of Juniper you used previously) is that the PA have a dedicated mgmtplane running linux. So if you just unplug the powercoard it might take a few more seconds to boot up next time due to harddrive checks. Compared to Juniper the PA main configuration method is to use the WEB rather than CLI as GUI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. The logs are like a cyclic buffer so oldest entries will be overwritten by default. If you need to store the logs for a longer time of period you can get a Panorama log-only installation which your PA devices will push their logs to. You can also use plain syslog to archive the logs. Also CEF is supported in case you run Arcsight.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. Except for what ppatel already said the guideline when setting up security policies in a PA for NAT-use is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: &amp;lt;prenat srczone&amp;gt;&lt;/P&gt;&lt;P&gt;dstzone: &amp;lt;postnat dstzone&amp;gt;&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;prenat dstip&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7. Sorry I havent done dynamic routing with PA so I dont know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8. See 6 above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9. See 7 above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bonus: If you havent seen these docs before these 2-3 docs are great in order to better learn how a PA can be used:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Designing Networks with Palo Alto Networks Firewalls&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="2561" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-2561"&gt;https://live.paloaltonetworks.com/docs/DOC-2561&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diagrams and Tested Configurations&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="2560" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-2560"&gt;https://live.paloaltonetworks.com/docs/DOC-2560&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat Prevention Deployment Tech Note&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2021" data-containertype="14" data-objectid="3094" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;https://live.paloaltonetworks.com/docs/DOC-3094&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Sep 2012 04:30:37 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-09-25T04:30:37Z</dc:date>
    <item>
      <title>Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26024#M18982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi i have a few outstanding questions on Palo Alto devices. We just migrated from Juniper to PA line. So these might sound silly for people who already are on PA line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL class="ol1"&gt;&lt;LI&gt;Do we have any primary and back up images on PA firewall . Just like in JUNOS if one image is corrupt it tries to load from the back up image file.&lt;/LI&gt;&lt;LI&gt;How many rollbacks does the PA device support by default ? Can we actually delete some of them if we don't wish to have them on the device?&lt;/LI&gt;&lt;LI&gt;How do we load factory default configuration on the device ? What does the factory default config contain ? Does it have some templates?&lt;/LI&gt;&lt;LI&gt;What are the safe practices in operating a device ? Powering off and on PA firewall do we have some CLI commands ? I think we have a restart option in WEB GUI . But wanted to know about halting and forceful power off.&lt;/LI&gt;&lt;LI&gt;How do we clean up the database once it is full ? Can we delete the logs like system logs and all?&lt;/LI&gt;&lt;LI&gt;Flow diagram keeps changing in all of the modules (eg NAT ) . If you can throw some light on that , it would be helpful.&lt;/LI&gt;&lt;LI&gt;Can we apply import policies for route redistribution? The reason why i ask this is i did not find any import for RIP , OSPF except for BGP.&lt;/LI&gt;&lt;LI&gt;When we are configuring DNAT, what should we match on the destination IP address ( the pre NAT IP ) and i check mark on translated packet and give my post nat ip ? But i could not implement that on my device for some reason. Same goes with Static NAT&lt;/LI&gt;&lt;LI&gt;When doing lab on Route redistribution , i matched on my default route and tried to redistribute that in OSPF but for some reason everything was visible except my default route which i exported in OSPF.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hoping to get answers for these .. Thanks a lot guys !! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2012 16:02:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26024#M18982</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-24T16:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26025#M18983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Palo alto firewall, you can always re-install a software image. This can be achieved by going to Device &amp;gt; Software &amp;gt; and clicking the&lt;/P&gt;&lt;P&gt;As far as the partitions are concerned on the device, there are 2 partitions, running and revertible. Revertible would be the last version of OS installed on to the device.&lt;/P&gt;&lt;P&gt;&amp;gt;debug swm status&lt;/P&gt;&lt;P&gt;&lt;IMG alt="swm.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4149_swm.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;The revertible version is available if fallback is needed . With the next PAN-OS upgrade the revertible version will be replaced with the current running-active version. You will then be able to delete 4.0.1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;To boot from the partition in use prior to the upgrade, issue the command &lt;/SPAN&gt;,&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&amp;gt;debug swm revert&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Factory default &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;configurations will have only management ip-addresses set to 192.168.1.1 and the default admin password. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;For sample configurations please have a look at the following links to see if it useful to you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2561"&gt;https://live.paloaltonetworks.com/docs/DOC-2561&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2560"&gt;https://live.paloaltonetworks.com/docs/DOC-2560&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this time we don not have a CLI command to power off the device but we can restart the system&lt;/P&gt;&lt;P&gt;&amp;gt;request restart system&lt;/P&gt;&lt;P&gt;Force ful power off will be removing the power cable from the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can delete the system traffic threat logs using the following commnads:-&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;To remove these logs, use the following CLI command:&lt;/P&gt;&lt;P style="padding: 0px 0px 0px 30px; font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;clear log &amp;lt;log name&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;where log name is:&lt;/P&gt;&lt;P style="padding: 0px 0px 0px 30px; font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;acc&lt;BR /&gt;config&lt;BR /&gt;system&lt;BR /&gt;threat&lt;BR /&gt;traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this is helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2012 20:16:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26025#M18983</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-24T20:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26026#M18984</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Flow diagram for a packet when it ingress the firewall is explained beautifully in this document:-&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1628"&gt;https://live.paloaltonetworks.com/docs/DOC-1628&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also here is the link to the redistribution of routes from one area to the other using the firewall.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-3377"&gt;https://live.paloaltonetworks.com/docs/DOC-3377&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1113"&gt;https://live.paloaltonetworks.com/docs/DOC-1113&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Document is also attached to the thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the sample config snapshot of the DNAT rule&lt;/P&gt;&lt;P&gt;&lt;IMG alt="dnat.PNG" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4150_dnat.PNG" width="450" /&gt;&lt;/P&gt;&lt;P&gt;Make sure you also have a security rule to allow traffic from untrust to trust zone.&lt;/P&gt;&lt;P&gt;Link to NAT document :&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1517"&gt;https://live.paloaltonetworks.com/docs/DOC-1517&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Advertising a default route via OSPF. Is this what you were looking for?&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-3700"&gt;https://live.paloaltonetworks.com/docs/DOC-3700&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know of it is helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2012 20:34:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26026#M18984</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-24T20:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26027#M18985</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. See ppatel answer. You have a revertable image and you can also load other images aswell (the later will take a few minutes to complete since it will re-install the image you like).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I think that depends on the model and how large the drives are. I prefer to delete stuff I no longer have use for and keep only the previous (and perhaps the version before that) still on the box. You can always download the images again if needed (keeping the old images is just to not to have to wait for the download to complete in case one need to rollback).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. You can use the maint-mode to reset the device into factory settings (the current image will be used but all settings and logs will be wiped).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. I think its safe to use a PA box just like any other networkconnected device. The main difference (depending on which models of Juniper you used previously) is that the PA have a dedicated mgmtplane running linux. So if you just unplug the powercoard it might take a few more seconds to boot up next time due to harddrive checks. Compared to Juniper the PA main configuration method is to use the WEB rather than CLI as GUI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. The logs are like a cyclic buffer so oldest entries will be overwritten by default. If you need to store the logs for a longer time of period you can get a Panorama log-only installation which your PA devices will push their logs to. You can also use plain syslog to archive the logs. Also CEF is supported in case you run Arcsight.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. Except for what ppatel already said the guideline when setting up security policies in a PA for NAT-use is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: &amp;lt;prenat srczone&amp;gt;&lt;/P&gt;&lt;P&gt;dstzone: &amp;lt;postnat dstzone&amp;gt;&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;prenat dstip&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7. Sorry I havent done dynamic routing with PA so I dont know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8. See 6 above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9. See 7 above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bonus: If you havent seen these docs before these 2-3 docs are great in order to better learn how a PA can be used:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Designing Networks with Palo Alto Networks Firewalls&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="2561" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-2561"&gt;https://live.paloaltonetworks.com/docs/DOC-2561&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diagrams and Tested Configurations&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="2560" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-2560"&gt;https://live.paloaltonetworks.com/docs/DOC-2560&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat Prevention Deployment Tech Note&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2021" data-containertype="14" data-objectid="3094" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;https://live.paloaltonetworks.com/docs/DOC-3094&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 04:30:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26027#M18985</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-09-25T04:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26028#M18986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Parth thanks for the useful info&lt;/P&gt;&lt;P&gt;I am using 6 PA 500 devices and 1 PA 2020 device . I assume that this has a storage capacity of 120 gb . But it shows 5.96 gb free and rest is occupied and i am pretty sure that i did not create any logs. How can i free this storage space and make use of the rest of 115 gb on my PA firewalls &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 05:19:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26028#M18986</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-25T05:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26029#M18987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where do you see these ? Is it under Device &amp;gt; Setup &amp;gt; management ?&lt;/P&gt;&lt;P&gt;&lt;IMG alt="log-settings.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4159_log-settings.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you click edit under these settings, you will see the following:- &lt;/P&gt;&lt;P&gt;&lt;IMG alt="logging-reporting.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4160_logging-reporting.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that 45.76 GB of your total space is allocated to logging and reporting and the rest of it is free.&lt;/P&gt;&lt;P&gt;If you add up the% quotas, it will be 95%. (As an example to the above screenshot)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if it is helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 05:33:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26029#M18987</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T05:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26030#M18988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Parth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could see this under Device &amp;gt; Setup &amp;gt; Management tab the space reserved as 95 percent&lt;/P&gt;&lt;P&gt;But i could not see the other one precisely how much memory is occupied on my firewall currently .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you help ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 05:41:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26030#M18988</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-25T05:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26031#M18989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikand thanks for the prompt reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;3. You can use the maint-mode to reset the device into factory settings (the current image will be used but all settings and logs will be wiped).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Except for this one i think i have a clarity on rest of the things. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;How do i load the maint mode on PA both from CLI and Web GUI?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 05:46:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26031#M18989</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-25T05:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26032#M18990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following command will help you to see the disk space on the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@Lab-59-PA-500&amp;gt; show system disk-space&amp;nbsp;&amp;nbsp;&amp;nbsp; [example output]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Filesystem&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Size&amp;nbsp; Used Avail Use% Mounted on&lt;/P&gt;&lt;P&gt;/dev/sda2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.8G&amp;nbsp; 1.2G&amp;nbsp; 2.5G&amp;nbsp; 31% /&lt;/P&gt;&lt;P&gt;/dev/sda5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7.6G&amp;nbsp; 3.3G&amp;nbsp; 3.9G&amp;nbsp; 47% /opt/pancfg&lt;/P&gt;&lt;P&gt;/dev/sda6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.8G&amp;nbsp; 2.5G&amp;nbsp; 1.2G&amp;nbsp; 69% /opt/panrepo&lt;/P&gt;&lt;P&gt;tmpfs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 487M&amp;nbsp;&amp;nbsp; 37M&amp;nbsp; 451M&amp;nbsp;&amp;nbsp; 8% /dev/shm&lt;/P&gt;&lt;P&gt;/dev/sda8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 51G&amp;nbsp; 1.9G&amp;nbsp;&amp;nbsp; 47G&amp;nbsp;&amp;nbsp; 4% /opt/panlogs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Log-Quota:- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@Lab-59-PA-500&amp;gt; show system logdb-quota&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quotas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; traffic: 32.00%, 14.643 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; threat: 16.00%, 7.322 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; system: 4.00%, 1.830 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; config: 4.00%, 1.830 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alarm: 3.00%, 1.373 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trsum: 8.40%, 3.844 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hourlytrsum: 2.40%, 1.098 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dailytrsum: 0.60%, 0.275 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; weeklytrsum: 0.60%, 0.275 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; thsum: 2.80%, 1.281 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hourlythsum: 0.80%, 0.366 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dailythsum: 0.20%, 0.092 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; weeklythsum: 0.20%, 0.092 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; appstat: 9.60%, 4.393 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userid: 2.40%, 1.098 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hipmatch: 3.00%, 1.373 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; application-pcaps: 1.00%, 0.458 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; threat-pcaps: 1.00%, 0.458 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp; debug-filter-pcaps: 1.00%, 0.458 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hip-reports: 1.00%, 0.458 GB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dlp-logs: 1.00%, 0.458 GB&lt;/P&gt;&lt;P&gt;Disk usage:&lt;/P&gt;&lt;P&gt;traffic: Logs: 211M, Index: 54M&lt;/P&gt;&lt;P&gt;threat: Logs: 53M, Index: 2.8M&lt;/P&gt;&lt;P&gt;system: Logs: 954M, Index: 149M&lt;/P&gt;&lt;P&gt;config: Logs: 97M, Index: 1.4M&lt;/P&gt;&lt;P&gt;alarm: Logs: 16K, Index: 16K&lt;/P&gt;&lt;P&gt;trsum: Logs: 138M, Index: 5.7M&lt;/P&gt;&lt;P&gt;hourlytrsum: Logs: 2.4M, Index: 2.4M&lt;/P&gt;&lt;P&gt;dailytrsum: Logs: 1.4M, Index: 2.2M&lt;/P&gt;&lt;P&gt;weeklytrsum: Logs: 728K, Index: 468K&lt;/P&gt;&lt;P&gt;thsum: Logs: 612K, Index: 772K&lt;/P&gt;&lt;P&gt;hourlythsum: Logs: 600K, Index: 600K&lt;/P&gt;&lt;P&gt;dailythsum: Logs: 560K, Index: 560K&lt;/P&gt;&lt;P&gt;weeklythsum: Logs: 88K, Index: 88K&lt;/P&gt;&lt;P&gt;appstatdb: Logs: 6.2M, Index: 5.7M&lt;/P&gt;&lt;P&gt;userid: Logs: 12K, Index: 12K&lt;/P&gt;&lt;P&gt;hipmatch: Logs: 16K, Index: 16K&lt;/P&gt;&lt;P&gt;application-pcaps: 32M&lt;/P&gt;&lt;P&gt;threat-pcaps: 60K&lt;/P&gt;&lt;P&gt;debug-filter-pcaps: 26M&lt;/P&gt;&lt;P&gt;dlp-logs: 4.0K&lt;/P&gt;&lt;P&gt;hip-reports: 1.1M&lt;/P&gt;&lt;P&gt;wildfire: 4.0K&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 05:55:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26032#M18990</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T05:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26033#M18991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reboot device, monitor the boot sequence for the following message: Autboot to default partition in 3 seconds.&lt;/P&gt;&lt;OL style="padding: 0px 0px 0px 2em; background-color: #ffffff;"&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; font-size: 12px; font-family: Arial, Helvetica, sans-serif;"&gt;Select m to boot to maintenance partition.&amp;nbsp; OR type "maint" to enter into maintenance mode.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you execute that, you will be in maint mode .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally to factory default the device,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="padding: 0 0 0 2em; font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;LI&gt;From the maint partition select factory reset.&lt;/LI&gt;&lt;LI&gt;At the password prompt, enter MA1NT.&lt;/LI&gt;&lt;LI&gt;Allow the device to complete the boot sequence.&lt;/LI&gt;&lt;LI&gt;After booting is completed, login using the default username password.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this helpful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 05:59:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26033#M18991</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T05:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26034#M18992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I forgot to add that there is NO WAY to enter into maintenance mode through the GUI.&lt;/P&gt;&lt;P&gt;It is only possible through the CLI with a console access since we have to monitor the boot up sequence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 06:09:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26034#M18992</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T06:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26035#M18993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Parth for patiently answering all my queries .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be once i start working i get even more queries ! But thanks this has solved lot of my questions !!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 06:49:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26035#M18993</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-25T06:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26036#M18994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="IKE SA Palo Alto.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4170_IKE SA Palo Alto.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi this is one the sample output that i captured when i established a VPN tunnel between 2 PA firewalls.&lt;/P&gt;&lt;P&gt;As far as my knowledge goes Ike SA's are bi directional and IPSEC SA's are uni directional correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But here i see 2 SA's in Phase 1 , but all i establised was only 1 VPN tunnel .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can some throw some light on this please . Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 09:40:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26036#M18994</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-25T09:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26037#M18995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since this is a different topic related to IPSEC lets go ahead and create a new discussion thread and so the techs can provide their inputs. The show commands actually shows you one negotiation for phase 1 and other for phase 2. I can explain in detail if you can create a new discussion thread.&lt;/P&gt;&lt;P&gt;Does that work for you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 10:00:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26037#M18995</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T10:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26038#M18996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi we normally use an external remote power management to turn on and off the devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is like a forceful power off and am i afraid in the long run this might affect my devices. So is there any way that i can gracefully halt all the processes and then power off them remotely ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suddenly see msg after logging in system is intialising please wait or press ctrl + c to abort .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this something to worry about ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also wanted to know what is the netflow profile in the interfaces configuration tab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What precise advantages we see when deploying interfaces on a tap mode and vwire mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we actually replicate the real time traffic on my firewall before i deploy by using tap mode? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 06:03:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26038#M18996</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-26T06:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26039#M18997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this time there is no way to remotely turn off the the device using the CLI.&lt;/P&gt;&lt;P&gt;Once you restart the system , the first process the device does is auto-commit. The management plane of the device comes up first and then the dataplane.&lt;/P&gt;&lt;P&gt;So we need to wait for the auto commit to complete. Having the access of device GUI , does not necessarily mean that the device is ready to pass traffic.&lt;/P&gt;&lt;P&gt;If the auto commit is not complete we see the system initializing message, we can either wait or bypass it by allowing it to run in the back ground.&lt;/P&gt;&lt;P&gt;Autocomm can be monitored by the following command:-&lt;/P&gt;&lt;P&gt;&amp;gt;show jobs processed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 06:12:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26039#M18997</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-26T06:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26040#M18998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netflow documentation :- &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2014"&gt;https://live.paloaltonetworks.com/docs/DOC-2014&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Tap mode implementation is to monitor the traffic over the network by not being inline:Generally this feature is used for evaluation/ POC etc. So to answer your last question , YES&amp;nbsp; you can r&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;eplicate the real time traffic on your firewall before you deploy by using tap mode&lt;/SPAN&gt; &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2561"&gt;https://live.paloaltonetworks.com/docs/DOC-2561&lt;/A&gt;&lt;/P&gt;&lt;P&gt;V wire implementation is like a bump-in-a-wire. Being inline and passing traffic through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 06:18:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26040#M18998</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-26T06:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26041#M18999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Parth very useful info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you help me how to register Panorama and add devices with that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was given Panorama Auth code but not sure where do i use that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i have device serial nos and auth codes but when i add that in Panorama it says auth code already used.&lt;/P&gt;&lt;P&gt;Not sure whats wrong with that. I followed admin guide when doing this &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 08:40:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26041#M18999</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-26T08:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26042#M19000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the document on "how to register a device and activating licenses:-&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1257"&gt;https://live.paloaltonetworks.com/docs/DOC-1257&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also go through the document below&amp;nbsp; to get&amp;nbsp; software downloaded for panorama&lt;/P&gt;&lt;P&gt;.&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2331"&gt;https://live.paloaltonetworks.com/docs/DOC-2331&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure tou will find this helpful.If so, feel free to mark it.&lt;/P&gt;&lt;P&gt;If you still have problems registering the device/panorama please open a support ticket.&lt;/P&gt;&lt;P&gt;Also I highly encourage you to create a new discussion thread for each topic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 09:16:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26042#M19000</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-26T09:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on Palo Alto safe practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26043#M19001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for that .. &lt;IMG alt="Panorama .jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4222_Panorama .jpg" /&gt;&lt;/P&gt;&lt;P&gt;I did not get any serial no with panorama when i purchased these neither do i find it under the device tab . &lt;/P&gt;&lt;P&gt;Please find the attached&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 09:22:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questions-on-palo-alto-safe-practices/m-p/26043#M19001</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-26T09:22:09Z</dc:date>
    </item>
  </channel>
</rss>

