General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
About General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.

Discussions

Discover LIVEcommunity Through Our New Animated Explainer Video!

We’re thrilled to unveil a brand-new animated video that highlights everything LIVEcommunity has to offer! This short and engaging video gives you a quick tour of the many resources available in our vibrant community — from interactive discussions and customer journey guides to the Cyber Elite program and Member Spotlight features. Whether ...

kiwi_0-1745308399217.png
kiwi by Community Team Member
  • 4110 Views
  • 0 replies
  • 0 Likes

Where do I start?

Hi I'm a network engineer being tasked to take over our PA firewalls since the guy who normally handled them is leaving. Where do I even begin to learn about this stuff? I've never had to work with these before. Thanks

Resolved! why hacktool vulnerability is set to medium action alert?

Hello,I've been looking a history entries in our threat log and it seems to me that most of the default settings for vulnerabilities - "action" are set to low, for example to "alert" - although they classify the threat as "medium" or "high". For example in the screenshot below the threat of this hacktool is set to "alert". Shouldn't this be a se...

Capture11.JPG
roma by L2 Linker
  • 3281 Views
  • 1 replies
  • 0 Likes

Palo Alto troubleshooting tool for IPsec

Hello I established an Ipsec tunnel (policy based) between palo Alto and Cisco FW.phase 1 & phase 2 are up and running but trying to transfer data, fail.Capture packet (merge recieved and transmit) shownSource : SYNDest : SYN ACKAnd then Dest : retransmit SYN ACK. If this capture is within transmit pcap, this mean the re transmission packet...

transmit.png

Resolved! Upgrade Minemeld Ubuntu 16.04 to 18.04

I tried a do-release upgrade on Ubuntu 16.04 LTS and it took me to 18.04 LTS without issue. However minemeld says "Bad gateway" when I try to log into it. I tried to check for updates and figured maybe the source would be changed from xenial-minemeld main to bionic-minemeld main ie)deb HTTP://minemeld-updates.panw.io/ubuntu bionic-minemeld mai...

ksauer507 by L3 Networker
  • 3481 Views
  • 2 replies
  • 0 Likes

Resolved! Syntax for security policies without security profile

Hi all, in my security policies on a PA-firewall (or in panorama) I want to be able to filter out all the security policies which have no security profile(s) . I tried a few combinations in the line of (profile-setting/profiles eq 'none') but alas, no joy 😕 Is it even possible?

KenVaBr by L1 Bithead
  • 3588 Views
  • 1 replies
  • 0 Likes

macOS Big Sur 11.6.2 - Global Protect 5.2.8-23 - Connected but Internet is not actually working

Hello all,I received from work a MacBook Pro with macOS Big Sur 11.6.2, I've installed the GlobalProtect 5.2.8-23 which is the only one that I had access to, and it seems like whenever I connect the GP, the connection is successful but there is no Internet Connection.As soon as I disconnect the GP, everything is working.I searched on the live co...

alberaru by L0 Member
  • 2372 Views
  • 1 replies
  • 0 Likes

Blocking Torch browser

Hi All, I would really appreciate if some one can help me on this. I am planning to block Torch browser through a firewall rule, using App-ID. But as per information in the community we cannot entirely block the functionality of Torch browser using App-ID. Once we block from the security rule, normal web traffic will go through the firewall. Ple...

Log Forwarding

Hello everyone, Before the question, the context.I have a panorama wich managed a lot of devices groups. we have a lot of rules for them. Which all these rules uses the default profile for log forwarding.I have a new syslog server and i need to forward the logs from all the devices and not from panorama. I created the new syslog server and i man...

Maryan by L0 Member
  • 2896 Views
  • 3 replies
  • 0 Likes

Custom Vulnerability Signature to block older versions of Chrome

After reviewing this KB article: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSOCA0 It looks like you can create custom vulnerability signatures for named browsers. Could you also do that to limit browser access via a security policy based on a minimum version number? For example: create a vulnerability signature...

Match next line at cli

Is there a way to match the next "X" number of lines when piping to match at the cli?I am entering:show zone-protection zone outside | match udpand would like to show the matched line and the next three.This would be analogous to grep -A 3Cheers!

  • 24332 Posts
  • 124 Subscriptions
Top Solution Authors
Labels