This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community and translation experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
The Palo Alto Networks Next-Generation Firewalls provide true, complete visibility everywhere, along with precise policy control. This resource page provides information from getting started guides to many other trouble-shooting docs. Ask your questions or provide insightful answers in the discussion forum specific to Next-Generation Firewall.
We are working with a client who has a network setup where a Palo Alto firewall is connected to a Check Point firewall. The client reports that they a... —
Read more
When multiple users access a terminal server from a single IP address, the firewall cannot distinguish which user generated which traffic. The firewal... —
Read more
When I search for "name-of-treatid contains 'Command and Control'" in the Threat Log, I get logs that contain that string in the Threat ID/NAME field... —
Read more
Hello, All.
Working on Windows. A few days ago, tried to understand why the Microsoft Azure CLI "az" command line program was not working with decry... —
Read more
Hi,
I have been doing researching for how to migrate from old palo alto firewall model to new. Seem like it will working if using configuration snap... —
Read more
05-19-2025
—
We're excited to announce that Palo Alto Networks VM-Series
next-generation firewalls are now supported on Red Hat OpenShift
Virtualization. This integration provides more seamless, robust security
capabilities for your workloads running on Red Ha... —
Read more
Labels:
FirewallKubevirt AINetwork SecurityngfwOpenShift virtualizationRuntime securitySoftware FirewallThreat protectionVM-SeriesZeroTrust 1368
by
jpuniain Community Blogs
05-19-2025
—
Palo Alto Networks is pleased to announce that Prisma AIRS™ now supports
Red Hat OpenShift, the industry leading hybrid cloud applications
platform powered by Kubernetes. With this release, customers can bring
AI-powered threat prevention for runt... —
Read more
Labels:
AIFirewallNetwork SecurityNext-Generation FirewallngfwPrisma AIRSRedHat OpenShiftRuntime securitySoftware FirewallThreat protectionZeroTrust 2599
1
by
cudeshiin Community Blogs
05-07-2025
—
Palo Alto Networks and Zero Networks have partnered to deliver a unified
solution combining Next-Generation Firewalls (NGFWs) with automated
secure microsegmentation. Together, we strengthen each layer of the
security stack to deliver true defense... —
Read more
04-17-2025
—
The combination of rising data volumes, performance expectations, and
processing demands has placed stringent requirements on next-generation
firewalls (NGFWs) positioned at the enterprise edge. Advanced security
measures such as threat protection... —
Read more
12-02-2024
—
In case you missed it: On Thursday, November 21, 2024, Palo Alto
Networks Dax Choksi and Unit 42's Sean Johnstone joined Fuel for a
virtual Spark session on Ruggedized NGFWs and Unit 42. Watch the videos
below to learn about the world of threats a... —
Read more
Labels:
FuelFuel User GroupngfwSpark User SummitSpark User Summit EventUnit 42 1594
by
emgarciain Community Blogs
06-05-2025
—
Most days, BGP runs quietly in the background. BGP advertises routes
that keep your WAN, VPN, cloud environments, and public services
connected and reachable. Until it doesn’t. And when BGP breaks, it’s not
just a routing issue, it’s unreachable services and frustrated users.
This guide will h... —
Read more
05-30-2025
—
The Palo Alto Network Destination NAT Session Distribution can be used
to implement similar to Load Balancer functionality by using one of the
"distribution" methods. —
Read more
05-13-2025
—
Learn about
Overview of Prisma Access Agent NGFW & Prisma Access Support Information
and Licensing High level Architecture Authentication Gateway Selection
and Tunnel Establishment PAA Specific features —
Read more
01-08-2025
—
Watch this demo for securing your firewall management interface, which
details best practices for securing your management interface, creating
a secure admin account with restricted Role-Based access following best
practices for account creation, ... —
Read more