General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
About General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.

Discussions

User-ID mapping lost

model: PA-500
sw-version: 4.0.11
PanAgent: 3.1.2
Domain controller: Windows server 2003

Client SO: Windows XP

User-ID mapping from AD on my customer's network work fine, but only one user, who is logged on his workstation and also on his notebook, sometim

...

lauro7 by L0 Member
  • 3139 Views
  • 3 replies
  • 0 Likes

PPPoE on Active/Active HA configuration

Hi,

I try to configure PPPoE on Active/Active HA system (2xPA-500). Configuration went OK, but PPPoE stays disconnected. No log entries in System log. After changing to Active/Pasive mode PPPoE starts get connected.

Is PPPoE supported on Active/Active

...

BLepenik by L1 Bithead
  • 2139 Views
  • 2 replies
  • 0 Likes

SSL Forward Proxy - Best Practise?

Can anyone point me to a document or some guidelines on current recommendations/best practise when using forward proxy please?

I have the SSL certificate in place on my clients, my main target is SSL traffic to higher risk URL categories such as web b

...

Policy order

Is it important to have the Antivus, Vulnerability and Anti-Spyware rule as the first policy?

thanks

jorge by Not applicable
  • 2413 Views
  • 3 replies
  • 0 Likes

URL and Threat filter before reach squid caching

Dear All,

We have an existing squid proxy which going to use as a proxy caching and we want to use PAN to perform url and threat filteration in between user and squid proxy.

The end user browser proxy has been configure to point its proxy setting to th

...

eugene by Not applicable
  • 5186 Views
  • 9 replies
  • 0 Likes

Resolved! URL Filtering - Student Rights, School Rights

Our school district's attorney just forwarded me this news release: http://www.franczek.com/frontcenter-Internet_Filtering_Software_First_Amendment.html

So that we don't have a similar case against ourselves.  How do we make sure that we are blocking

...

polgarm by Not applicable
  • 2304 Views
  • 2 replies
  • 0 Likes

Maximum sessions for Captive Portal

Hi Guys,

On a PA-500, is there any specification for the maximum number of sessions or user logins at any given point of time for Captive Portal users?  Enquiring because, there is a known environment (school with boarding as well) (staff and student

...

PAN Agent stability

Hi All,

Is there anybody meets PAN Agent stability issue?

We always install PAN Agent version 3.1.2 on Windows Server 2003, but at lease tow customer meet the issue.

PAN Agent service is down once 1to3 weeks

No advnaced log can be found no matter debug i

...

PAN - DHCP option

Hi All,

I'm working to configure the PAN (4.1.2) DHCP, hopefully to replace the legacy DHCP server for the LAN.

My LAN consist of both data and voice on few vlans.

I would require to insert the dhcp option code of 176 & 242 for the ip phones.

But doesnt

...

ateo by Not applicable
  • 2905 Views
  • 3 replies
  • 0 Likes

ThreatID 33542 and Facebook

I'm seeing a lot of alerts in the last couple days for threatID 33542 when users are visiting facebook via http://www.facebook.com/

Could this be a false positive?  Anyone else seeing a jump in this threat?

Tnx, Tom

TomS by L1 Bithead
  • 3933 Views
  • 8 replies
  • 0 Likes

Data Filtering Patterns

Does anyone know the logic used to interpret data patterns/filtering expressions?

By this I mean, if I have two patterns:-

Confidential\\Eyes-Only     (exact match Confidential\Eyes-Only)

and

Confidential\\.+               (wildcard match Confidential\*)

...

apackard by L4 Transporter
  • 1934 Views
  • 1 replies
  • 0 Likes

Difference between session start vs end when doing DENY

The difference (generally speaking) between "log on session start" and "log on session end" (for ALLOW rules) is that the "session end" will also log application and trafficvolume however it will not show up in the log-files until the session really

...

mikand by L6 Presenter
  • 3794 Views
  • 1 replies
  • 0 Likes
  • 23713 Posts
  • 104 Subscriptions
Top Solution Authors
Top Liked Authors
Labels