General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
About General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.

Discussions

Resolved! SSL VPN and TLS support

The NetConnect user authentication page does not load completely when the client browser (IE 8, for example) has TLS 1.1 / 1.2 enabled.  Instead of the Name and Password prompt, you get a popup window with an empty white frame.

I read a couple recent

...

nwallette by Not applicable
  • 2179 Views
  • 1 replies
  • 0 Likes

Is PBR similar or better than WCCP?

We're planning on implementing WCCP to route http and some streaming traffic to our proxy, but looking at how PBR work it's very similar. Can someone please give me a good comparison between the 2?

thank you.

friento by L3 Networker
  • 4381 Views
  • 2 replies
  • 0 Likes

Current session/connection information by subnet

Hi

We're trying to isolate the source of some high session traffic in one of our regions. This is showing up in our exterior firewall connection count, and also on our PA device which is in line.

I can see the sessions by using the command line tools a

...

How is QoS applied

Hello,

can somebody explain how QoS is applied on traffic through the PA.

I know that I configure a QoS Profile, bind it to an interface and create a QoS policy,

and that all belongs to the egress traffic of an interface.

But what happens if I configure

...

indevis by L2 Linker
  • 2905 Views
  • 2 replies
  • 0 Likes

URL Filtering License Monitoring

I have a setup where I need to block traffic if our URL filtering license is not working as apposed to letting traffic go out with out the filtering.  I want to monitor this license expiration some how.  I don't want us to find out that our license h

...

How to configure different Access Route in a SSL VPN?

My question is that I need to configure different Access Route for different user's profiles.

For example:

Group users 1 Access Route only to 192.168.0.0/16

Group users 2 Access Route all packets, 0.0.0.0/0.

It is possible with PA?

Thanks,

Félix Sánchez


How to configure Data Filtering Policy

I would like to know if there's a specific document that walks you through step-by-step of setting up data filtering.  I am running PA2020 v3.05.

I've read the Admin Guide v3.0, but it's very vague.  There's no information as to what weight # should b

...

hcao by L1 Bithead
  • 6972 Views
  • 9 replies
  • 0 Likes

OSPF Redistribution export tag

I have several connect and static routes I'm trying to redistribute into OSPF.  I've set up a redistribution profile and I'm trying to add it to the OSPF export rules.  I've selected the profile, set type as ext-1, but no matter what 32-bit value I e

...

nwallette by Not applicable
  • 2841 Views
  • 3 replies
  • 0 Likes

Resolved! IKE phase 2 failing with an asa5505

Message =

IKE phase-1 negotiation is succeeded as initiator, main mode. Established SA:

IKE phase-2 negotiation is started as initiator, quick mode. Initiated SA:

IKE protocol notification message received: INVALID-ID-INFORMATION (18).

Warning: undocumented change in syslog format

Heads-up to everybody: in version 4.x of PANOS, they have decided to make the following changes in their syslog format:

1. In the Miscellaneous field of the Threat Log syslog, where the URL a user visits is reported, the URL data used to be placed bet

...

ahopkins by L2 Linker
  • 2605 Views
  • 2 replies
  • 0 Likes

Application and Threat Versions

Hello-

I was wondering if there is a place on the portal to find out what the current available Application and Threat version is availble for download.  I use the dynamic updates option and look for a new version for the spyware and application and t

...

Syslog Issue.

Hi - I may have not understood how this is achieved - so apologies before I start!

I'm trying to forward logs for traffic and threat to syslog We have 2x 4050s and Panorama - all policy rules are added via panorama.

I've created a "log forwarding profi

...

fmd by L3 Networker
  • 4897 Views
  • 11 replies
  • 0 Likes
  • 24281 Posts
  • 99 Subscriptions
Top Solution Authors
Top Liked Authors
Labels