<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA-500 Virtual Wire implementation (HA) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31463#M23023</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to ensure that the management interface has access to the Internet for this to work, as it connects to Palo Alto's servers. Alternately, you can download the licenses from the My Devices page by registering your device and then clicking the &lt;IMG alt="https://support.paloaltonetworks.com/components/com_pan/images/download.gif" class="jive-image" src="https://ip1.i.lithium.com/b6a609d7fb78c80f88bf3c3c281bdb338d6e09bc/68747470733a2f2f737570706f72742e70616c6f616c746f6e6574776f726b732e636f6d2f636f6d706f6e656e74732f636f6d5f70616e2f696d616765732f646f776e6c6f61642e676966" /&gt;, and upload them to the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Feb 2013 19:26:21 GMT</pubDate>
    <dc:creator>Abs</dc:creator>
    <dc:date>2013-02-27T19:26:21Z</dc:date>
    <item>
      <title>PA-500 Virtual Wire implementation (HA)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31459#M23019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am planning a deployment of two PA-500's for just Threat Prevention and URL monitoring.&amp;nbsp; I am working through the best way to do it for physical cabling and figuring out where everything should go.&amp;nbsp; I would also like to use the Active Directory integration to base URL Filtering policies to groups/users.&amp;nbsp; My question is, will I need to connect another interface to my internal network for it to access my domain controllers?&amp;nbsp; I've gone through the Palo Alto documentation and it somewhat describes it but I'm still a little unclear of this simple implementation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 19:51:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31459#M23019</guid>
      <dc:creator>fonasupport</dc:creator>
      <dc:date>2013-02-26T19:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 Virtual Wire implementation (HA)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31460#M23020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default management interface is chosen and should have access to your DC.&lt;/P&gt;&lt;P&gt;If your network design cannot allow this access.You can configure a L3 interface and change the service route going to :&lt;/P&gt;&lt;P&gt;Device &amp;gt; Setup &amp;gt; Services&amp;gt;&lt;A name="1558221" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;Service Route&lt;/A&gt;&lt;SPAN style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;Configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 23:54:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31460#M23020</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-02-26T23:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 Virtual Wire implementation (HA)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31461#M23021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is something called virtual wire subinterface introduces in PANOS 5.0. However I don't think it's possible to have a layer3 wvire subinterface, but I'm not 100% sure. &lt;/P&gt;&lt;P&gt;I would say your best option is to use the management interface, as you probably want to have management access to the device anyway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 15:02:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31461#M23021</guid>
      <dc:creator>torm</dc:creator>
      <dc:date>2013-02-27T15:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 Virtual Wire implementation (HA)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31462#M23022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so now I am to the point on applying my licenses.&amp;nbsp; Right now I just have the Management Port plugged in and that network does have routing to the domain controllers (for DNS) and the Internet.&amp;nbsp; If I try to either "Retrieve license key from license server" or "Activate deature using auth code" (which I have all the codes) it fails to install the licenses.&amp;nbsp; &lt;/P&gt;&lt;P&gt;If I create and connect a Layer 3 interface do I need to setup a new Zone and create a policy allowing it out?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 18:53:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31462#M23022</guid>
      <dc:creator>fonasupport</dc:creator>
      <dc:date>2013-02-27T18:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 Virtual Wire implementation (HA)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31463#M23023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to ensure that the management interface has access to the Internet for this to work, as it connects to Palo Alto's servers. Alternately, you can download the licenses from the My Devices page by registering your device and then clicking the &lt;IMG alt="https://support.paloaltonetworks.com/components/com_pan/images/download.gif" class="jive-image" src="https://ip1.i.lithium.com/b6a609d7fb78c80f88bf3c3c281bdb338d6e09bc/68747470733a2f2f737570706f72742e70616c6f616c746f6e6574776f726b732e636f6d2f636f6d706f6e656e74732f636f6d5f70616e2f696d616765732f646f776e6c6f61642e676966" /&gt;, and upload them to the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 19:26:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31463#M23023</guid>
      <dc:creator>Abs</dc:creator>
      <dc:date>2013-02-27T19:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 Virtual Wire implementation (HA)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31464#M23024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was able to get it to work by setting the DNS and Palo Alto Updates to go out the MGT port.&amp;nbsp; I forgot the changes don't take full effect until I click Commit too...&lt;/P&gt;&lt;P&gt;Once I did that I was able to install the license files.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 19:29:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-virtual-wire-implementation-ha/m-p/31464#M23024</guid>
      <dc:creator>fonasupport</dc:creator>
      <dc:date>2013-02-27T19:29:01Z</dc:date>
    </item>
  </channel>
</rss>

