General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
About General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.

Discussions

Discover LIVEcommunity Through Our New Animated Explainer Video!

We’re thrilled to unveil a brand-new animated video that highlights everything LIVEcommunity has to offer! This short and engaging video gives you a quick tour of the many resources available in our vibrant community — from interactive discussions and customer journey guides to the Cyber Elite program and Member Spotlight features. Whether ...

kiwi_0-1745308399217.png
kiwi by Community Team Member
  • 4123 Views
  • 0 replies
  • 0 Likes

Firewall rule optimization

Anyone know of any good firewall optimization software for PA. One that can review the rules and make good suggestion to improve the rule order, removal etc?

jdprovine by L4 Transporter
  • 4718 Views
  • 6 replies
  • 0 Likes

PA Bypass Question - McAfee Evader

Does anyone have any information on the latest posted PA bypass? The youtube video shows some of the FW features being bypassed using McAfee Evader. It appears to require an IP of the firewall to execute - the example also shows most of the evasions relating to protocols not likely to be exposed over the firewall (NetBIOS, RPC, SMB) so I'm no...

Demast by L2 Linker
  • 2602 Views
  • 1 replies
  • 0 Likes

Custome report

Hi How to generate trafficreport for webmail usage like gmailyoutube -education? Thanks

sib2017 by L4 Transporter
  • 1948 Views
  • 1 replies
  • 0 Likes

Block facebook by URL instead of category. Not doing SSL Decryption

Hey everyone! I have a request from one of my other offices to block access to facebook. The users there are already covered by a policy using a URL Profile that blocks the social networking category. I also added facebook.com/ and *.facebook.com/ to the block list for that URL profile. Users are blocked when going to http://www.facebook.com...

Resolved! Upgrade question Current version 6.0.10

Hi Am currently a PA n00b, looking at upgrading an active/active stand-alone pair of 3020s currently running 6.0.10, looking to upgrade to 7.0. Question: do we upgrade to 6.1 and then 7.0 or is there a better 6.1.x version to make leap from 6.0.10? Thanks, RS

Resolved! VPN Proxy ID nightmare

Hi All, I can't seem to resolve proxy-id mismatch on a Route-based VPN i have configured between the PAN Firewall and a Cisco 3G router. On the PAN side, I have configured 10.5.0.0/16 as my local proxy-id and 0.0.0.0 as proxy-id of remote side. I still get a mismatch error as follows: IKE phase-2 negotiation failed when processing proxy ID. ca...

Bocsa by L3 Networker
  • 6453 Views
  • 7 replies
  • 0 Likes

WildFire & Office Documents/PDFs - Limitations?

We currently use Wildfire on "PE Executable" filetypes on our PA-500. I'm interested in using it against Office documents and PDFs as those are clearly a major threat vector. Thing is, whatever model of Palo Alto I look at, they all seem to show low WildFire limits which makes me question how they cope with things like SMTP where there may b...

Block unwanted traffic on port 1720

Hi, I have a voice/visioconference system available on the internet (via NAT-ed IP) using H323. So of course the port 1720 is open and reachable from outside, without restriction on IP addresses because users must be able to reach the system from their smartphone App. My problem is that sometimes, some traffic on port 1720 (shown as H.225 in t...

NVogel by L0 Member
  • 4010 Views
  • 2 replies
  • 0 Likes

Resolved! Email alerts for threats.

Do I need Panorama to set up email notifications on high and critical severity threats? I know you can set up sheculed reports, but what if I just want to receive an email when a threat is blocked or detected, or what have you.

Netwerx by L2 Linker
  • 6380 Views
  • 3 replies
  • 1 Likes

What is the misc field in the threat syslogs supposed to show when the subtype is vulnerability?

Hi everyone, I'm sorry if this has been answered elsewhere-- I'm new to this livecommunity thing so, although I tried to search for an answer before posting-- I may have missed something... I'm running PanOS 6.1.7 and I can't find anything that explains what gets logged in the 'misc' field of the threat syslogs when the subtype is 'vulnerabili...

lawinter by L0 Member
  • 4289 Views
  • 1 replies
  • 0 Likes

SRX Config - XML Invalid

Since upgrading to MT 3.2.4 I have been unable to import the XML file from a SRX . Previous to this release (3.2.1), I had no issues with the same XML. However, it is not working on 3.2.4 The XML file is correct with the configuraiton tags at the start and end of with no attributes. I have created a number of projects, deleted them and res...

indysogi by L2 Linker
  • 3433 Views
  • 1 replies
  • 0 Likes

Meaningful User Reports

PA-500 Software Version 7.0.3 How do I generate meaningful user reports, or how do I better interpret the reports that are available. With a User Activity Report I get application statistics, browsing summary by category etc. But I can't say "User domain\user was on these sites between 10am and 11am when they should have being working". ...

PinkCup by L0 Member
  • 2949 Views
  • 2 replies
  • 0 Likes

Resolved! Rudimentary TCP Session and Monitor Question

I feel like I should already know this, but I just need a sanity check. I have a rule that allows host A to B via tcp/900. So host A starts to communicate via host B via that port. The firewall allows it and a session is created. Now, assume A and B stop talking but don't formally close the session. After the default timer, the PAN closes ...

mrcs by L0 Member
  • 3503 Views
  • 4 replies
  • 0 Likes
  • 24336 Posts
  • 124 Subscriptions
Top Solution Authors
Top Liked Authors
Labels