- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
I am very new to Palo Alto administration, having been a Checkpoint guy at my previous job. At my new job I am tasked with creating a new IPsec site to site VPN with a vendor on our perimeter firewall. There are already several other VPNs running. My
...
I am using URL Block Page.
However, there is a part where the & part appears as %26 in a specific URL.
ex. I entered abc.d/&uid=B5C61D407 in the browser, but it appears as URL:abc.d/%26uid=B5C61D407 in the block page. Why is this and what can be done
...
Hello, I need to know how to block traffic that is not going through decrypt.
We are planning to migrate firewall from ASA to Palo Alto . Instead of performing hot cutover , we will install the Palo Alto firewall in-line along with existing ASA firewall using virtual wire interface type. Since we have many security zones on A
...
Dear and valuable Live Community Members,
I'm wondering if anyone has an issue when trying to access the MGMT interface off the active and/or passive firewalls and getting the error "fork failed: No space left on device"
We were never able to acc
...
Hi There,
Recently, we upgraded the OS on our PA-5220 from 9.1.4 to 10.2.3-h4. Immediately after we upgraded to 10.2.3-h4 our helpdesk began receiving calls from users reporting that they cannot get logged into MS Office365 Applications, it'll neve
...
Since upgrading our firewalls from 10.2.2-h2 to either 10.2.3 or 10.2.3-h2, any DNS resolution from the management interface is failing. Attempting to ping an FQDN from the CLI results in "ping: cnn.com: System error". I confirmed that the DNS server
...
Hi,
I'm updating our documentation and after switching from ASA to Palo:
Is there something comparable to the Ciscos Guides
https://blogs.cisco.com/security/new-forensic-investigation-procedures-for-first-responder-guides but for Palos? I can find on
...
We have a bunch of separate video networks that are separate, but use the same IP address space for each. Each is connected to their own dedicated switches and is attached to a couple of hundred cameras and a DVR. We would like to connect these netwo
...
Hi guys,
Besides Monitor - Logs - Wildfire Submissions, where else must we check whether Wildfire is working?
Thanks All.
The customer wants to know the query mechanism of agentless user-id. I can see the following description from the documentation.
With server monitoring a User-ID agent—either a Windows-based agent running on a domain server in your network, or the
...
ISSUE REPORTED: unable to block x-forwarder ip when the action is set to block ip in the vulnerability profile
------------------------------------------------------------------------------------------------------------------------
Discussion,observati
Hi all,
I have a HA cluster in which a trial threat prevention license was activated on active firewall only. Thus on the HA widget i have mismatch on anti virus version. Since it is already expired, in order to bring the firewalls back in sync, I
...User | Count |
---|---|
2 | |
1 | |
1 | |
1 | |
1 |
Subject | Likes |
---|---|
3 Likes | |
2 Likes | |
2 Likes | |
2 Likes | |
1 Like |