General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
About General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.

Discussions

Threat Vector, a Unit 42 Podcast, is Now on LIVEcommunity!

We have some exciting community news to share: Threat Vector, a Unit 42 podcast, is now on LIVEcommunity!

 

Threat Vector is your compass in the world of cyberthreats. Listen to this biweekly podcast to learn about unique threat intelligence, cutting

...

jforsythe by Community Team Member
  • 311 Views
  • 0 replies
  • 0 Likes

How and Why to Accept a Solution to Your Post

Did you know that you can help your fellow community members by accepting solutions when a reply answers your question. Accepted solutions are a super-helpful resource in the community, and we want to make sure our members understand how this feature

...

JayGolf_0-1691518400714.jpeg
JayGolf by Community Team Member
  • 3656 Views
  • 2 replies
  • 14 Likes

Security rule for url filtering - best practices?

I would like to know what is the impact, if any, when configuring a security policy with allow action and associate with a url filtering profile if we use application as any or application set to web-browsing.

I understand the url filtering is only ap

...

Borgiani by L0 Member
  • 1739 Views
  • 1 replies
  • 0 Likes

License for IPsec and SSL VPN

Hi all,

  I need to know if we need a license to acivate or configure site to site VPN ( i.e: between Cisco ASA and PaloAlto), and also for remote client (ssl vpn). if it's possible can someone please help me with the procedure to follow for these two

...

Lahcen by Not applicable
  • 8732 Views
  • 1 replies
  • 0 Likes

Resolved! License for IPsec and SSL VPN

Hi all,

  I need to know if we need a license to acivate or configure site to site VPN ( i.e: between Cisco ASA and PaloAlto), and also for remote client (ssl vpn). if it's possible can someone please help me with the procedure to follow for these two

...

Lahcen by Not applicable
  • 3543 Views
  • 1 replies
  • 0 Likes

Stats Discrepancy in the ACC

Has anyone else noticed this?

Go to the ACC and sort it by Bytes (I believe this trick works regardless of the sort criteria, but it’s easiest to see this way). Make a note of the top three or so values

Next, Click on one of these, I picked the top: we

...

djr by L4 Transporter
  • 2248 Views
  • 4 replies
  • 0 Likes

Reporting on User downloads and uploads

Greetings,

Disclaimer:  Our regular Network Engineer is out on short term disability so I am the Sr. Systems Administrator trying to fill in.  Palo Alto reporting is not my everyday thing so I apologize in advance if this request seems to a bit basic

I

...

Strange VPN behaviour

Hi all!

Some of my colleagues have problems accessing certain services like TFS, Intranet, and Office 365(outlook, lync) through VPN. The weird thing is that for others it might work either 100%, 50% or whatever feels right that day, it seems.
What cou

...

Palo-Alto upgradation From 5.0.x to 6.0.x

Hi All, We are having PA-5050 & and PA-3020 model running on software version 5.0.8 & 5.0.9 and we are planing to upgrade it to 6.0.2. We firewall is running in Active/ Passive cluster. Please any one help to know the processes and suggest which vers

...

Sourabh by Not applicable
  • 1464 Views
  • 1 replies
  • 0 Likes

site to site vpn qestion

We're moving from Checkpoint to PAN. For site to site vpns, I'm assuing i should set up a logical subinterface? How do you ensure its floating/shared in an HA cluster?

dvlacic by Not applicable
  • 1922 Views
  • 2 replies
  • 0 Likes

Frustration with threats from PA

Is anyone else frustrated with PA's approach to threats and threat signatures?

Prime example: "Netbios Small Piece Data Evasion Attack Vulnerability" - signature ID 33511, link to the Threat Vault: https://threatvault.paloaltonetworks.com/Home/ThreatD

...

Does Panorama M-100 support more than 100 devices?

Looking to manage more than 100+ devices (around 300 device). is the M-100 able to meet this requirement?

below is my current planning setup:

M-100 (panorama mode) <--------------------------> 100+ PA box

or do i required another M-100 box as log colle

...

afiq by L1 Bithead
  • 3250 Views
  • 4 replies
  • 0 Likes

Setting up DMZ

First time poster in the new forum.

We're looking into creating a pure DMZ on our Palo Alto. Right now all our servers and network are behind a Layer 3 interface with private IPs. Anything that needs to be externally accessible is done via a One to On

...

tgrzeczk by Not applicable
  • 2885 Views
  • 3 replies
  • 0 Likes
  • 24188 Posts
  • 100 Subscriptions
Top Liked Authors
Labels