Next-Generation Firewall Discussions
Palo Alto Networks Next-Generation Firewalls provide true, complete visibility everywhere, along with precise policy control. Ask your questions or provide insightful answers in the discussion forum specific to NGFW.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Next-Generation Firewall Discussions
Palo Alto Networks Next-Generation Firewalls provide true, complete visibility everywhere, along with precise policy control. Ask your questions or provide insightful answers in the discussion forum specific to NGFW.
About Next-Generation Firewall Discussions
Palo Alto Networks Next-Generation Firewalls provide true, complete visibility everywhere, along with precise policy control. Ask your questions or provide insightful answers in the discussion forum specific to NGFW.

Discussions

Palo Alto Kerberos for sso

Anyone hit the same issue before?

 

2025-08-16 20:35:38.768 +0800 debug: pan_auth_cache_get_authprof_info(pan_auth_cache_authprof_n_authseqprof.c:218): prof "KRB-SSO", vsys "vsys1" (method: Kerberos pre-auth) has sso hash table id: 1 (0 means no or inv

...

Data plane cpu 100% (pa-3410)

Hello!

 

We have a PA-3410 in our corporate network, and yesterday we encountered a problem: the data plane CPU reached 100%, and disabling the Decryption rules helped. Are there any solutions to this issue?

 

 
Device is up : 53 days 1
...

A.Bekim by L1 Bithead
  • 706 Views
  • 4 replies
  • 0 Likes

HA error when configuring

  • High-availability ha1 encryption requires an import of the high-availability-key(Module: ha_agent)
  • client ha_agent phase 1 failure

Any ideas why this is happening? I have configured 3 other HA pairs with no issue.

 

PA1

 

PA2

 

 

MAllen_1-1755178114085.png
MAllen_0-1755178085803.png
MAllen_2-1755178169452.png
MAllen_3-1755178206678.png
M.Allen by L1 Bithead
  • 629 Views
  • 1 replies
  • 0 Likes

Security Profile Evaluation

Hey Community!

 

In Palo Alto NGFW, when multiple Security Profiles (like Antivirus, Anti-Spyware, Vulnerability Protection, URL Filtering, File Blocking, DLP, etc.) are applied to a Security Policy

 

How does the inspection happen?

 

  • Is it sequential (one
...

Edsnow by L3 Networker
  • 397 Views
  • 1 replies
  • 0 Likes
  • 1685 Posts
  • 55 Subscriptions
Top Solution Authors