General Articles
LIVEcommunity's General Articles area is home to how-to resources, technical documentation, and discussions with Accepted Solutions that turn into articles related to all Palo Alto Networks products.
193 PostsLIVEcommunity's General Articles area is home to how-to resources, technical documentation, and discussions with Accepted Solutions that turn into articles related to all Palo Alto Networks products.
193 PostsSupport FAQ on LIVEcommunity is where customers can find answers to their most common queries, in collaboration with Palo Alto Networks Knowledge Base.
4 Posts
This Nominated Discussion Article is based on the post "External DHCP Configuration" by @mstf_ymn and answered by @miasmith500 Read on to see the response!
I am running a Microsoft DHCP server on my domain and this is serving IP's over my Palo
Patch Wednesday
This Nominated Discussion Article is based on the post "Automatically blocking IP's after a certain number of Global Protect pre-login failures? " by @pomologist and answered by Cyber Elite @BPry and @usanitary. Read on if you are curious about how p
...
Instructions:
Option 1
This article is based on a discussion, How to Configure GRE over IPSEC?, posted by @ZhouYu. Read on to see the solution!
Hello
Some implementations require multicast traffic to be encapsulated before IPSec encrypts it. If this is a requirement
This document provides detailed steps for a customer to achieve Cortex XDR Events / Telemetry forwarding to Google Security Operations (SIEM/Chronicle).
You can contact google-tech@paloaltonetworks.com if you have any further questions.
Factory resetting your firewall is a drastic step that should only be taken when necessary and with careful consideration. It's important to note that a factory reset should not be taken lightly, as it will erase all configurations and data on the f
You can use debug filters to enable the Palo Alto Networks firewall to collect packet captures for troubleshooting purposes.
However, there are situations where you may require a more in-depth understanding of the firewall's internal operations
Digging into the depths of policy details can be quite the task, especially after a long and tiring day. But fear not, handy search tools are here to lighten your load!
Here's how it works: Simply pop in a keyword related to what you're hunting
Patch Wednesday link
Software EOL Summary link
Cert Expiration link
Innovative Tech Link
#networksecurity #NGFW #ngfwnewsletter #proactiveinsightsnewsletter #proactiveinsights #focusedservicesnewsletter #focusedservicesproactiveinsightsn
Are you seeking better control over your web traffic? This guide will walk you through the steps to create custom URL categories and integrate them into your security policies.
Creating the Custom URL Category:
This article was created by @aalex
Enabling symmetric return ensures that return traffic is forwarded out through the same interface through which traffic ingresses. This feature is useful when the requirement is to access servers through two ISP
This Nominated Discussion Article is based on the post "Cannot Change Application Risk Level in ACC" by @engineerwang and answered @Brandon_Wertz. Read on if you are curious about how to change Application Risk Level in ACC.
HELP!
I'm
Organizations often use Google Cloud’s Application Load Balancer to distribute HTTP/HTTPS traffic to VM-Series firewalls deployed within Google Cloud.
Diagram 1
In this setup, the Application Load Balancer functions as a proxy, altering the client'
...