<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Web Interface access from Internet in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11358#M8359</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;show log traffic action equal deny dport equal 80(or 443) to equal X.X.X.X&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Dec 2014 20:15:14 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2014-12-01T20:15:14Z</dc:date>
    <item>
      <title>Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11351#M8352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have PA-200 connected to Internet , but mgmt interface disconnected right now. Do I have to piggyback mgmt to one of remaining Ethernet interfaces in order to get access to web interface from Internet ? Plus port forward rule ?Let me know &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 18:49:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11351#M8352</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T18:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11352#M8353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can assign management profile to the outside interface and access it to manage device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use following document :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1456"&gt;How to Create a Management Profile using the CLI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this example, we assume ethernet 1/3 is your outside network. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 18:55:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11352#M8353</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-12-01T18:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11353#M8354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know how to show/display current mgmt interface profiles ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 19:01:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11353#M8354</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T19:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11354#M8355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pa&amp;gt; show interface &amp;lt;interface&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface management profile: allow_all&lt;/P&gt;&lt;P&gt;&amp;nbsp; ping: yes&amp;nbsp; telnet: yes&amp;nbsp; ssh: yes&amp;nbsp; http: yes&amp;nbsp; https: yes&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; snmp: yes&amp;nbsp; response-pages: no&amp;nbsp; userid-service: no&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 19:07:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11354#M8355</guid>
      <dc:creator>dburns</dc:creator>
      <dc:date>2014-12-01T19:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11355#M8356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So here it is , replaced my public with x's. I have ping/https/ssh I can ping and ssh but no https to web interface . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name: ethernet1/1, ID: 16&lt;/P&gt;&lt;P&gt;Operation mode: layer3&lt;/P&gt;&lt;P&gt;Virtual router default&lt;/P&gt;&lt;P&gt;Interface MTU 1500&lt;/P&gt;&lt;P&gt;Interface IP address: x.x.x.x/24&lt;/P&gt;&lt;P&gt;Interface management profile: untrust-mgmt&lt;/P&gt;&lt;P&gt;&amp;nbsp; ping: yes&amp;nbsp; telnet: no&amp;nbsp; ssh: yes&amp;nbsp; http: no&amp;nbsp; https: yes&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; snmp: no&amp;nbsp; response-pages: no&amp;nbsp; userid-service: no&lt;/P&gt;&lt;P&gt;Service configured: SSL-VPN &lt;/P&gt;&lt;P&gt;Zone: WAN-zone, virtual system: vsys1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 19:16:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11355#M8356</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T19:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11356#M8357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Niuk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have deny any any policy by any chance? Also can you check on Traffic logs and check for your source address from internet and destination on 443 and see if it is denied? Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:04:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11356#M8357</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-12-01T20:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11357#M8358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think there is default deny interzone. But how to find drop logs using my ssh access only ? I don't have web access temporarily &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:10:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11357#M8358</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T20:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11358#M8359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;show log traffic action equal deny dport equal 80(or 443) to equal X.X.X.X&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:15:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11358#M8359</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-12-01T20:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11359#M8360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Assuming your public ip is 1.1.1.1 and firewall's outside interface is 5.5.5.5, try to access &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://5.5.5.5" rel="nofollow"&gt;https://5.5.5.5&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then on the CLI, run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show session all filter source 1.1.1.1 destination 5.5.5.5 destination-port 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if you see anything there, if possible paste the output of "show session id &amp;lt;&amp;gt;" for any session that matches above show session command. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:27:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11359#M8360</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-12-01T20:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11360#M8361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont see any 443 neither denied&amp;nbsp; nor allowed, see below. Also output of 'show counter global name flow_host_service_deny'&lt;/P&gt;&lt;P&gt;admin@PA-200-1&amp;gt; show log traffic action equal deny dport equal 443 &lt;/P&gt;&lt;P&gt;Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; App&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; From&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Src Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&lt;/P&gt;&lt;P&gt;Rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dst Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Src User&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dst User&lt;/P&gt;&lt;P&gt;===============================================================================&lt;/P&gt;&lt;P&gt;admin@PA-200-1&amp;gt; show log traffic action equal allow dport equal 443&lt;/P&gt;&lt;P&gt;Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; App&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; From&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Src Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&lt;/P&gt;&lt;P&gt;Rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dst Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Src User&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dst User&lt;/P&gt;&lt;P&gt;===============================================================================&lt;/P&gt;&lt;P&gt;admin@PA-200-1&amp;gt; show counter global name flow_host_service_deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow_host_service_deny&lt;/P&gt;&lt;P&gt;Value:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80&lt;/P&gt;&lt;P&gt;Severity:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;/P&gt;&lt;P&gt;Category:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&lt;/P&gt;&lt;P&gt;Aspect:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mgmt&lt;/P&gt;&lt;P&gt;Desciption:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device management session denied&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:28:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11360#M8361</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T20:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11361#M8362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I looked port 443 (nothing) , and 22 (where I am actually connected)&lt;/P&gt;&lt;P&gt;admin@PA-200-1&amp;gt; show session all filter destination-port 443&lt;/P&gt;&lt;P&gt;No Active Sessions&lt;/P&gt;&lt;P&gt;admin@PA-200-1&amp;gt; show session all filter destination-port 22&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Application&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp; Type Flag&amp;nbsp; Src[Sport]/Zone/Proto (translated IP[Port])&lt;/P&gt;&lt;P&gt;Vsys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dst[Dport]/Zone (translated IP[Port])&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;19243&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp; FLOW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; y.y.y.y[39267]/WAN-zone/6&amp;nbsp; (y.y.y.y[39267])&lt;/P&gt;&lt;P&gt;vsys1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x.x.x.x[22]/WAN-zone&amp;nbsp; (x.x.x.x[22])&lt;/P&gt;&lt;P&gt;......&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11361#M8362</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T20:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11362#M8363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;write a temporary rule, and try to access.it will be better&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set rulebase security rules TEST from WAN to WAN source (your ip address which you try to access now) destination X.X.X.X(fw address) action allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;move rulebase security rules TEST top&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;commit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:36:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11362#M8363</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-12-01T20:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11363#M8364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Niuk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a NAT for the outside interface ip? Can you check your NAT policy to see if you are translating anything on 443?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:44:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11363#M8364</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-12-01T20:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11364#M8365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I moved below to TOP and committed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set rulebase security rules TEST from WAN-zone to WAN-zone source any destination x.x.x.x action allow service service-https application any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; rulebase {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; security {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rules {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TEST {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from WAN-zone;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to WAN-zone;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination x.x.x.x;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service service-https;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application any;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but no difference , maybe I should do service application-default , and application ssl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;application ssl;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;service application-default;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:50:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11364#M8365</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T20:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11365#M8366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no NAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:51:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11365#M8366</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-01T20:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11366#M8367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is no NAT and security policy allows any source to connect to firewall's IP on 443 and if we still don't see any sessions on firewall. Next step would be take pcap on the firewall and see 443 packets are making it upto the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2313"&gt;How to Run a Packet Capture&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if packets are even making it to the outside interface. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:55:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11366#M8367</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-12-01T20:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11367#M8368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Niuk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;You&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; can check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&amp;gt;&amp;nbsp; If there is &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;an&lt;/SPAN&gt; session exist for the same traffic,&amp;nbsp; then please &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt;&amp;nbsp; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;verify&lt;/SPAN&gt; the global counters, if a specific "DRP" counter is increasing rapidly. &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;The command &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: 'courier new', courier;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;show&lt;/SPAN&gt; counter global&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt; provides information about the processes/actions taken on the packets going through the device; if they are dropped, &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;nat&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;ed&lt;/SPAN&gt;, decrypted etc.&amp;nbsp; These counters are for all the traffic going through the device and are useful in troubleshooting issues; like poor performance, packet loss, latency etc. It is advised to use the command &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: 'courier new', courier;"&gt;show counter global filter packet-filter yes delta yes&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt; in conjunction with filters to obtain meaningful data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;For more information, you can follow the DOC &lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="4650" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-4650" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit; color: #006595;"&gt;What is the Significance of Global Counters?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; You can enable FLOW BASIC feature to understand the exact reason behind the failure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; clear all&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set filter match source&amp;nbsp; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set filter match source IP_ADD_OF_THE_DESTINATION destination&amp;nbsp; IP_ADD_OF_THE_TESTING_PC&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set log feature flow &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;basic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set log feature &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;tcp&lt;/SPAN&gt; all&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set filter on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;debug&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; packet-&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;diag&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; set log on&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;~~~~~~~~~~~~~~~~ Initiate traffic ( try to access the management interface) ~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set log off&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;diag&lt;/SPAN&gt; aggregate-logs&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;less&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit;"&gt;mp&lt;/SPAN&gt;-log pan_packetdiag_log.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;For more information, you can follow the DOC: &lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1506" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1506" style="font-weight: inherit; font-style: inherit; font-size: 13.3333339691162px; font-family: inherit; color: #006595;"&gt;Packet Capture, Debug Flow-basic and Counter Commands&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333339691162px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 20:58:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11367#M8368</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-12-01T20:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Web Interface access from Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11368#M8369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The fix was to access web gui on port 4443....I have Global Protect configured, and&amp;nbsp; believe or not , &lt;SPAN style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 1.5em;"&gt;GP swings system https port to 4443&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2014 12:26:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-interface-access-from-internet/m-p/11368#M8369</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2014-12-03T12:26:20Z</dc:date>
    </item>
  </channel>
</rss>

