Hello @jeff_pawlowski , good afternoon.
So, from what I see you are trying to allow access through one of your Outside/Untrust/WAN interfaces. Question, so to this interface you attached a Management Profiles profile allowing certain Public IP ranges ( I imagine the Public not private ranges are the ranges... ), you enabled SSH/HTTPS and PING. Now from the public ranges you are allowing you have PING response to that Interface ( did you try removing the Permitted IP Addresses just temporarily to validate access and correct connectivity ? ). Now another doubt, do you have Internet access working correctly from that PaloAlto you mention ? did you add the default route to the virtual router routing ? and did you validate that you have Internet access at least outbound from the public IP, the Gateway and the Internet ( from CLI ping source the PUBLIC IP of the WAN host interface the public IP to validate, example 1.1.1.1.1, 8.8.8.8.8 and your own public gateway, ideally add a trace ) ? Did you validate , although as it is from zone to untrsut to untrust, it should allow it by default unless you have made some adjustment at policy level, but did you validate in Monitor-Log-Traffic if there is any policy that may be restricting access ?
Now this is not the best practice, exposing your administration to the Internet, but if it is a requirement, the best thing to do is to apply the correct IP Permitted and at the same time restrict access to it from the outside adding a second layer of security with security policies.
Now more importantly, I recommend the best practice is to use GlobalProtect, I recommend enabling globalprotect, and once connected to globbalprotect, reach your MGT IP. At the Global protect level, you can restrict the IP(s), user and ip at the policy level and also at the permitted IP level on the MGT interface to allow only certain segments to reach, for example certain segments or trusted IPs on your LAN and certain IPs or IP range that you use for global protect.
Remember also that when you enable Global Protect, and you still want to reach from the outside directly to the public IP of your Firewall, the WEB-GUI HTTPS administration, port "4443" is used. So you must ensure that this SSL/HTTPS connection is allowed on port 4443 (Palo Alto Service).
How to Access the WebGUI when GlobalProtect Is Enabled: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm8SCAS
Best regards
... View more