Pan Os Admin
Pan Os Admin
Version 10.1
docs.paloaltonetworks.com
Contact Informaon
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks menoned herein may be trademarks of their respecve companies.
Last Revised
September 9, 2022
PAN-OS® Administrator’s Guide Version 10.1 2 ©2022 Palo Alto Networks, Inc.
Table of Contents
Geng Started................................................................................................. 21
Integrate the Firewall into Your Management Network.................................................. 22
Determine Your Access Strategy for Business Connuity................................... 22
Determine Your Management Strategy....................................................................23
Perform Inial Configuraon...................................................................................... 24
Set Up Network Access for External Services........................................................31
Register the Firewall................................................................................................................. 38
Create a New Support Account and Register a Firewall...................................... 38
Register a Firewall......................................................................................................... 40
(Oponal) Perform Day 1 Configuraon.................................................................. 43
Register the Firewall Line Cards................................................................................ 46
Segment Your Network Using Interfaces and Zones........................................................47
Network Segmentaon for a Reduced Aack Surface......................................... 47
Configure Interfaces and Zones................................................................................. 48
Set Up a Basic Security Policy............................................................................................... 52
Assess Network Traffic.............................................................................................................57
Enable Free WildFire Forwarding.......................................................................................... 59
Best Pracces for Compleng the Firewall Deployment.................................................62
Subscripons..................................................................................................... 63
Subscripons You Can Use With the Firewall....................................................................64
Acvate Subscripon Licenses.............................................................................................. 68
What Happens When Licenses Expire?............................................................................... 70
Enhanced Applicaon Logs for Palo Alto Networks Cloud Services.............................73
Firewall Administraon.................................................................................. 77
Management Interfaces........................................................................................................... 78
Use the Web Interface.............................................................................................................79
Launch the Web Interface........................................................................................... 79
Configure Banners, Message of the Day, and Logos.............................................80
Use the Administrator Login Acvity Indicators to Detect Account
Misuse...............................................................................................................................82
Manage and Monitor Administrave Tasks............................................................. 84
Commit, Validate, and Preview Firewall Configuraon Changes........................ 85
Export Configuraon Table Data............................................................................... 87
Use Global Find to Search the Firewall or Panorama Management
Server................................................................................................................................ 88
Manage Locks for Restricng Configuraon Changes.......................................... 90
Manage Configuraon Backups.............................................................................................92
PAN-OS® Administrator’s Guide Version 10.1 3 ©2022 Palo Alto Networks, Inc.
Table of Contents
Authencaon................................................................................................219
PAN-OS® Administrator’s Guide Version 10.1 4 ©2022 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Administrator’s Guide Version 10.1 5 ©2022 Palo Alto Networks, Inc.
Table of Contents
High Availability.............................................................................................361
HA Overview........................................................................................................................... 362
HA Concepts............................................................................................................................ 363
HA Modes..................................................................................................................... 363
HA Links and Backup Links...................................................................................... 364
Device Priority and Preempon.............................................................................. 370
Failover........................................................................................................................... 370
LACP and LLDP Pre-Negoaon for Acve/Passive HA.................................. 372
PAN-OS® Administrator’s Guide Version 10.1 6 ©2022 Palo Alto Networks, Inc.
Table of Contents
Monitoring....................................................................................................... 449
Use the Dashboard.................................................................................................................450
Use the Applicaon Command Center..............................................................................452
ACC—First Look........................................................................................................... 452
ACC Tabs....................................................................................................................... 454
ACC Widgets................................................................................................................ 456
Widget Descripons................................................................................................... 458
ACC Filters.................................................................................................................... 464
Interact with the ACC................................................................................................ 465
Use Case: ACC—Path of Informaon Discovery..................................................469
Use the App Scope Reports................................................................................................. 476
Summary Report.......................................................................................................... 476
Change Monitor Report............................................................................................. 477
PAN-OS® Administrator’s Guide Version 10.1 7 ©2022 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Administrator’s Guide Version 10.1 8 ©2022 Palo Alto Networks, Inc.
Table of Contents
User-ID............................................................................................................. 681
User-ID Overview................................................................................................................... 682
User-ID Concepts....................................................................................................................684
Group Mapping............................................................................................................ 684
User Mapping............................................................................................................... 684
Enable User-ID.........................................................................................................................689
Map Users to Groups.............................................................................................................693
Map IP Addresses to Users.................................................................................................. 700
Create a Dedicated Service Account for the User-ID Agent.............................701
Configure User Mapping Using the Windows User-ID Agent.......................... 720
Configure User Mapping Using the PAN-OS Integrated User-ID Agent.........734
Configure Server Monitoring Using WinRM.........................................................738
Configure User-ID to Monitor Syslog Senders for User Mapping....................746
Map IP Addresses to Usernames Using Authencaon Portal.........................756
Configure User Mapping for Terminal Server Users............................................762
Send User Mappings to User-ID Using the XML API......................................... 772
Enable User- and Group-Based Policy...............................................................................773
Enable Policy for Users with Mulple Accounts............................................................. 774
Verify the User-ID Configuraon........................................................................................776
Deploy User-ID in a Large-Scale Network....................................................................... 779
Deploy User-ID for Numerous Mapping Informaon Sources......................... 779
Insert Username in HTTP Headers......................................................................... 783
PAN-OS® Administrator’s Guide Version 10.1 9 ©2022 Palo Alto Networks, Inc.
Table of Contents
App-ID.............................................................................................................. 795
App-ID Overview.................................................................................................................... 796
Streamlined App-ID Policy Rules........................................................................................ 797
Create an Applicaon Filter Using Tags.................................................................797
Create an Applicaon Filter Based on Custom Tags...........................................798
App-ID and HTTP/2 Inspecon.......................................................................................... 800
Manage Custom or Unknown Applicaons......................................................................802
Manage New and Modified App-IDs................................................................................. 803
Workflow to Best Incorporate New and Modified App-IDs............................. 803
See the New and Modified App-IDs in a Content Release................................804
See How New and Modified App-IDs Impact Your Security Policy.................806
Ensure Crical New App-IDs are Allowed............................................................ 806
Monitor New App-IDs................................................................................................807
Disable and Enable App-IDs..................................................................................... 809
Use Applicaon Objects in Policy.......................................................................................810
Create an Applicaon Group....................................................................................810
Create an Applicaon Filter......................................................................................811
Create a Custom Applicaon................................................................................... 812
Resolve Applicaon Dependencies.........................................................................816
Safely Enable Applicaons on Default Ports....................................................................818
Applicaons with Implicit Support..................................................................................... 820
Security Policy Rule Opmizaon...................................................................................... 824
Policy Opmizer Concepts........................................................................................825
Migrate Port-Based to App-ID Based Security Policy Rules............................. 832
Rule Cloning Migraon Use Case: Web Browsing and SSL Traffic...................839
Add Applicaons to an Exisng Rule..................................................................... 843
Idenfy Security Policy Rules with Unused Applicaons.................................. 845
High Availability for Applicaon Usage Stascs................................................848
How to Disable Policy Opmizer............................................................................ 848
App-ID Cloud Engine............................................................................................................. 850
Prepare to Deploy App-ID Cloud Engine.............................................................. 852
Enable or Disable the App-ID Cloud Engine........................................................ 856
App-ID Cloud Engine Processing and Usage........................................................ 856
New App Viewer (Policy Opmizer)....................................................................... 860
Add Apps to an Applicaon Filter with Policy Opmizer.................................. 861
Add Apps to an Applicaon Group with Policy Opmizer................................ 864
Add Apps Directly to a Rule with Policy Opmizer............................................ 867
Replace an RMA Firewall (ACE)...............................................................................870
PAN-OS® Administrator’s Guide Version 10.1 10 ©2022 Palo Alto Networks, Inc.
Table of Contents
Device-ID......................................................................................................... 893
Device-ID Overview...............................................................................................................894
Prepare to Deploy Device-ID...............................................................................................898
Configure Device-ID...............................................................................................................904
Manage Device-ID.................................................................................................................. 907
CLI Commands for Device-ID..............................................................................................909
Threat Prevenon..........................................................................................911
Best Pracces for Securing Your Network from Layer 4 and Layer 7 Evasions........912
Set Up Anvirus, An-Spyware, and Vulnerability Protecon.....................................923
DNS Security............................................................................................................................926
About DNS Security................................................................................................... 926
Cloud-Delivered DNS Signatures and Protecons..............................................927
DNS Security Analycs..............................................................................................928
Enable DNS Security.................................................................................................. 932
DNS Security Data Collecon and Logging.......................................................... 939
Use DNS Queries to Idenfy Infected Hosts on the Network.................................... 941
How DNS Sinkholing Works.....................................................................................941
Configure DNS Sinkholing.........................................................................................942
Configure DNS Sinkholing for a List of Custom Domains................................. 943
Configure the Sinkhole IP Address to a Local Server on Your Network......... 945
See Infected Hosts that Aempted to Connect to a Malicious Domain.........948
Data Filtering........................................................................................................................... 952
Create a Data Filtering Profile................................................................................. 952
Predefined Data Filtering Paerns..........................................................................955
PAN-OS® Administrator’s Guide Version 10.1 11 ©2022 Palo Alto Networks, Inc.
Table of Contents
Decrypon.......................................................................................................999
Decrypon Overview.......................................................................................................... 1000
Decrypon Concepts...........................................................................................................1002
Keys and Cerficates for Decrypon Policies....................................................1002
SSL Forward Proxy................................................................................................... 1004
SSL Forward Proxy Decrypon Profile................................................................ 1006
SSL Inbound Inspecon...........................................................................................1009
SSL Inbound Inspecon Decrypon Profile........................................................1010
SSL Protocol Sengs Decrypon Profile............................................................1011
SSH Proxy................................................................................................................... 1013
SSH Proxy Decrypon Profile................................................................................1015
Profile for No Decrypon....................................................................................... 1017
SSL Decrypon for Ellipcal Curve Cryptography (ECC) Cerficates...........1018
Perfect Forward Secrecy (PFS) Support for SSL Decrypon.......................... 1018
SSL Decrypon and Subject Alternave Names (SANs).................................. 1019
TLSv1.3 Decrypon..................................................................................................1020
High Availability Not Supported for Decrypted Sessions................................1022
Decrypon Mirroring............................................................................................... 1023
Prepare to Deploy Decrypon.......................................................................................... 1024
Work with Stakeholders to Develop a Decrypon Deployment Strategy... 1024
Develop a PKI Rollout Plan.................................................................................... 1026
Size the Decrypon Firewall Deployment.......................................................... 1028
Plan a Staged, Priorized Deployment................................................................ 1029
PAN-OS® Administrator’s Guide Version 10.1 12 ©2022 Palo Alto Networks, Inc.
Table of Contents
URL Filtering.................................................................................................1119
About Palo Alto Networks URL Filtering Soluon....................................................... 1120
How Advanced URL Filtering Works...............................................................................1121
URL Filtering Inline ML.......................................................................................................1123
URL Filtering Use Cases..................................................................................................... 1124
URL Categories..................................................................................................................... 1127
Security-Focused URL Categories........................................................................ 1127
Malicious URL Categories.......................................................................................1128
Verified URL Categories.......................................................................................... 1130
Policy Acons You Can Take Based on URL Categories..................................1131
Plan Your URL Filtering Deployment...............................................................................1134
URL Filtering Best Pracces.............................................................................................. 1137
PAN-OS® Administrator’s Guide Version 10.1 13 ©2022 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Administrator’s Guide Version 10.1 14 ©2022 Palo Alto Networks, Inc.
Table of Contents
VPNs............................................................................................................... 1257
VPN Deployments................................................................................................................1258
Site-to-Site VPN Overview................................................................................................ 1259
Site-to-Site VPN Concepts.................................................................................................1260
IKE Gateway...............................................................................................................1260
Tunnel Interface.........................................................................................................1260
Tunnel Monitoring.....................................................................................................1261
Internet Key Exchange (IKE) for VPN.................................................................. 1261
IKEv2............................................................................................................................ 1264
Set Up Site-to-Site VPN..................................................................................................... 1268
Set Up an IKE Gateway...........................................................................................1268
Define Cryptographic Profiles................................................................................1275
Set Up an IPSec Tunnel...........................................................................................1279
Set Up Tunnel Monitoring...................................................................................... 1282
Enable/Disable, Refresh or Restart an IKE Gateway or IPSec Tunnel...........1283
Test VPN Connecvity............................................................................................ 1285
Interpret VPN Error Messages...............................................................................1286
Site-to-Site VPN Quick Configs........................................................................................1288
Site-to-Site VPN with Stac Roung...................................................................1288
Site-to-Site VPN with OSPF.................................................................................. 1292
Site-to-Site VPN with Stac and Dynamic Roung..........................................1298
PAN-OS® Administrator’s Guide Version 10.1 15 ©2022 Palo Alto Networks, Inc.
Table of Contents
Policy.............................................................................................................. 1341
Policy Types........................................................................................................................... 1342
Security Policy....................................................................................................................... 1343
Components of a Security Policy Rule................................................................ 1343
Security Policy Acons............................................................................................ 1346
Create a Security Policy Rule.................................................................................1347
Policy Objects........................................................................................................................1351
Security Profiles.................................................................................................................... 1353
Create a Security Profile Group............................................................................ 1360
Set Up or Override a Default Security Profile Group.......................................1361
Track Rules Within a Rulebase..........................................................................................1364
Rule Numbers............................................................................................................ 1364
Rule UUIDs................................................................................................................. 1366
Enforce Policy Rule Descripon, Tag, and Audit Comment........................................1371
Move or Clone a Policy Rule or Object to a Different Virtual System..................... 1374
Use an Address Object to Represent IP Addresses..................................................... 1376
Address Objects........................................................................................................ 1376
Create an Address Object.......................................................................................1377
Use Tags to Group and Visually Disnguish Objects...................................................1379
Create and Apply Tags.............................................................................................1379
PAN-OS® Administrator’s Guide Version 10.1 16 ©2022 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Administrator’s Guide Version 10.1 17 ©2022 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Administrator’s Guide Version 10.1 18 ©2022 Palo Alto Networks, Inc.
Table of Contents
Cerficaons................................................................................................ 1529
Enable FIPS and Common Criteria Support...................................................................1530
Access the Maintenance Recovery Tool (MRT)..................................................1530
Change the Operaonal Mode to FIPS-CC Mode............................................ 1532
FIPS-CC Security Funcons...............................................................................................1535
Scrub the Swap Memory on Firewalls or Appliances Running in FIPS-CC Mode.. 1537
PAN-OS® Administrator’s Guide Version 10.1 19 ©2022 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Administrator’s Guide Version 10.1 20 ©2022 Palo Alto Networks, Inc.
Geng Started
The following topics provide detailed steps to help you deploy a new Palo Alto
Networks next-generaon firewall. They provide details for integrang a new
firewall into your network and how to set up a basic security policy. For guidance on
connuing to deploy the security plaorm features to address your network security
needs, review the Best Pracces for Compleng the Firewall Deployment.
21
Geng Started
Do not enable access to your management interface from the internet or from other
untrusted zones inside your enterprise security boundary. This applies whether you use the
dedicated management port (MGT) or you configured a data port as your management
interface. When integrang your firewall into your management network, follow the
Adminstrave Access Best Pracces to ensure that you are securing administrave
access to your firewalls and other security devices in a way that prevents successful
aacks.
The following topics describe how to perform the inial configuraon steps that are necessary
to integrate a new firewall into the management network and deploy it in a basic security
configuraon.
• Determine Your Access Strategy for Business Connuity
• Determine Your Management Strategy
• Perform Inial Configuraon
• Set Up Network Access for External Services
The following topics describe how to integrate a single Palo Alto Networks next-generaon
firewall into your network. However, for redundancy, consider deploying a pair of firewalls
in a High Availability configuraon.
PAN-OS® Administrator’s Guide Version 10.1 22 ©2022 Palo Alto Networks, Inc.
Geng Started
An OOB network is a secure method of remotely accessing and managing devices and
does not use the primary communicaon channels. Instead, OOB networks use separate
communicaon channels that are always available if the primary channel fails and have
a different source of power than the primary network. Depending on your network
architecture, you may use both the primary network and the OOB network to access and
manage devices in day-to-day operaon.
The OOB network should never rely on a power source or network that could fail concurrently
with the primary access network. How you architect OOB access to devices depends on your
network architecture and your business consideraons, so there is no “one size fits all” method of
ensuring connecvity. However, there are guidelines that help you understand how to meet the
goals of an OOB access network:
• Power consideraons—Use a different power source (a separate circuit or a protected or
baery-powered source) for the OOB network than you use for the regular access network. If
you lose power to the regular network, you won’t lose power to the OOB network.
Use power distribuon unit (PDU) controls to remotely power devices on and off.
• Secure connecon method—There are a number of ways to connect securely to an OOB
network, for example, a terminal server device, a modem, or a serial console server. Examples
of secure networks you can use for OOB access include LTE, dial-up, and broadband
(completely separated from the normal broadband network) networks. The connecon method
you use depends on your business needs and network architecture.
Regardless of the method you select, the connecon must be secure, with strong encrypon
and authencaon. See Administrave Access Best Pracces for advice about how to secure
management connecons to the firewall and Panorama.
You can connect into an OOB network remotely using SSH with strong authencaon over
an Ethernet LAN or you can dial in over a serial connecon. The outbound connecon will be
serial.
PAN-OS® Administrator’s Guide Version 10.1 23 ©2022 Palo Alto Networks, Inc.
Geng Started
If your firewall model has dual power supplies, connect the second power supply for
redundancy. Refer to the hardware reference guide for your model for details.
You may need to change the IP address on your computer to an address in the
192.168.1.0/24 network, such as 192.168.1.2, to access this URL.
PAN-OS® Administrator’s Guide Version 10.1 24 ©2022 Palo Alto Networks, Inc.
Geng Started
Starng with PAN-OS 9.0.4, the predefined, default administrator password (admin/
admin) must be changed on the first login on a device. The new password must be
a minimum of eight characters and include a minimum of one lowercase and one
uppercase character, as well as one number or special character.
Be sure to use the best pracces for password strength to ensure a strict password
and review the password complexity sengs.
PAN-OS® Administrator’s Guide Version 10.1 25 ©2022 Palo Alto Networks, Inc.
Geng Started
Make sure Telnet and HTTP are not selected because these services use
plaintext and are not as secure as the other services and could compromise
administrator credenals.
5. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 26 ©2022 Palo Alto Networks, Inc.
Geng Started
You must manually configure at least one DNS server on the firewall or it will not be
able to resolve hostnames; it will not use DNS server sengs from another source, such
as an ISP.
3. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 27 ©2022 Palo Alto Networks, Inc.
Geng Started
As a best pracce, avoid using welcoming verbiage. Addionally, you should ask
your legal department to review the banner message to ensure it adequately
warns that unauthorized access is prohibited.
4. Enter the Latude and Longitude to enable accurate placement of the firewall on the
world map.
5. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 28 ©2022 Palo Alto Networks, Inc.
Geng Started
When the configuraon changes are saved, you lose connecvity to the web interface
because the IP address has changed.
Click Commit at the top right of the web interface. The firewall can take up to 90 seconds to
save your changes.
PAN-OS® Administrator’s Guide Version 10.1 29 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 13 | Verify network access to external services required for firewall management, such as the Palo
Alto Networks Update Server.
You can do this in one of the following ways:
• If you do not want to allow external network access to the MGT interface, you will need to
set up a data port to retrieve required service updates. Connue to Set Up Network Access
for External Services.
• If you do plan to allow external network access to the MGT interface, verify that you have
connecvity and then proceed to Register the Firewall and Acvate Subscripon Licenses.
1. Use update server connecvity test to verify network connecvity to the Palo Alto
Networks Update server as shown in the following example:
1. Select Device > Troubleshoong, and select Update Server Connecvity from the
Select Test drop-down.
2. Execute the update server connecvity test.
2. Use the following CLI command to retrieve informaon on the support entlement for
the firewall from the Palo Alto Networks update server:
request support
check
If you have connecvity, the update server will respond with the support status for your
firewall. If your firewall is not yet registered, the update server returns the following
message:
Contact Us
https://www.paloaltonetworks.com/company/contact-us.html
Support Home
https://www.paloaltonetworks.com/support/tabs/overview.html
PAN-OS® Administrator’s Guide Version 10.1 30 ©2022 Palo Alto Networks, Inc.
Geng Started
Do not enable management access from the internet or from other untrusted zones inside
your enterprise security boundary. Follow the Adminstrave Access Best Pracces to
ensure that you are properly securing your firewall.
This task requires familiarity with firewall interfaces, zones, and policies. For more
informaon on these topics, see Configure Interfaces and Zones and Set Up a Basic
Security Policy.
STEP 1 | Decide which interface you want to use for access to external services and connect it to your
switch or router port.
The interface you use must have a stac IP address.
STEP 3 | (Oponal) The firewall comes preconfigured with a default virtual wire interface between
ports Ethernet 1/1 and Ethernet 1/2 (and a corresponding default security policy and
zones). If you do not plan to use this virtual wire configuraon, you must manually delete the
configuraon to prevent it from interfering with other interface sengs you define.
You must delete the configuraon in the following order:
1. To delete the default security policy, select Policies > Security, select the rule, and click
Delete.
2. To delete the default virtual wire, select Network > Virtual Wires, select the virtual wire
and click Delete.
3. To delete the default trust and untrust zones, select Network > Zones, select each zone
and click Delete.
4. To delete the interface configuraons, select Network > Interfaces and then select each
interface (ethernet1/1 and ethernet1/2) and click Delete.
5. Commit the changes.
PAN-OS® Administrator’s Guide Version 10.1 31 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 4 | Configure the interface you plan to use for external access to management services.
1. Select Network > Interfaces and select the interface that corresponds to the interface
you cabled in Step 1.
2. Select the Interface Type. Although your choice here depends on your network topology,
this example shows the steps for Layer3.
3. On the Config tab, expand the Security Zone drop-down and select New Zone.
4. In the Zone dialog, enter a Name for new zone, for example Management, and then click
OK.
5. Select the IPv4 tab, select the Stac radio buon, and click Add in the IP secon,
and enter the IP address and network mask to assign to the interface, for example
192.168.1.254/24. You must use a stac IP address on this interface.
6. Select Advanced > Other Info, expand the Management Profile drop-down, and select
New Management Profile.
7. Enter a Name for the profile, such as allow_ping, and then select the services you want
to allow on the interface. For the purposes of allowing access to the external services,
you probably only need to enable Ping and then click OK.
PAN-OS® Administrator’s Guide Version 10.1 32 ©2022 Palo Alto Networks, Inc.
Geng Started
These services provide management access to the firewall, so only select the
services that correspond to the management acvies you want to allow on this
interface. For example, don’t enable HTTP or Telnet because those protocols
transmit in plaintext and therefore aren’t secure. Or if you plan to use the MGT
interface for firewall configuraon tasks through the web interface or CLI, you
don’t enable HTTP, HTTPS, SSH, or Telnet so that you prevent unauthorized
access through the interface (if you must allow HTTPS or SSH in this scenario,
limit access to a specific set of Permied IP Addresses). For details, see Use
Interface Management Profiles to Restrict Access.
PAN-OS® Administrator’s Guide Version 10.1 33 ©2022 Palo Alto Networks, Inc.
Geng Started
This example shows how to set up global service routes. For informaon on seng up
network access to external services on a virtual system basis rather than a global basis,
see Customize Service Routes to Services for Virtual Systems.
1. Select Device > Setup > Services > Global and click Service Route Configuraon.
For the purposes of acvang your licenses and geng the most recent content
and soware updates, you will want to change the service route for DNS, Palo
Alto Networks Services, URL Updates, and AutoFocus.
2. Click the Customize radio buon, and select one of the following:
• For a predefined service, select IPv4 or IPv6 and click the link for the service. To
limit the drop-down list for Source Address, select Source Interface and select the
interface you just configured. Then select a Source Address (from that interface) as
the service route.
If more than one IP address is configured for the selected interface, the Source
Address drop-down allows you to select an IP address.
• To create a service route for a custom desnaon, select Desnaon, and click Add.
Enter a Desnaon IP address. An incoming packet with a desnaon address that
matches this address will use as its source the Source Address you specify for this
service route. To limit the drop-down for Source Address, select a Source Interface. If
PAN-OS® Administrator’s Guide Version 10.1 34 ©2022 Palo Alto Networks, Inc.
Geng Started
more than one IP address is configured for the selected interface, the Source Address
drop-down allows you to select an IP address.
STEP 6 | Configure an external-facing interface and an associated zone and then create a security
policy rule to allow the firewall to send service requests from the internal zone to the
external zone.
1. Select Network > Interfaces and then select the external-facing interface. Select Layer3
as the Interface Type, Add the IP address (on the IPv4 or IPv6 tab), and create the
associated Security Zone (on the Config tab), such as Internet. This interface must have a
stac IP address; you do not need to set up management services on this interface.
2. To set up a security rule that allows traffic from your internal network to the Palo Alto
Networks update server, select Policies > Security and click Add.
As a best pracce when creang Security policy rules, use applicaon-based rules
instead of port-based rules to ensure that you are accurately idenfying the underlying
applicaon regardless of the port, protocol, evasive taccs, or encrypon in use. Always
leave the Service set to applicaon-default. In this case, create a security policy rule
that allows access to the update server (and other Palo Alto Networks services).
PAN-OS® Administrator’s Guide Version 10.1 35 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 8 | Select Device > Troubleshoong and verify that you have connecvity from the data port
to the external services, including the default gateway, using the Ping connecvity test, and
the Palo Alto Networks Update Server using the Update Server Connecvity test. In this
example, the firewall connecvity to the Palo Alto Networks Update Server is tested.
Aer you verify you have the required network connecvity, connue to Register the Firewall
and Acvate Subscripon Licenses.
1. Select Update Server from the Select Test drop-down.
2. Execute the Palo Alto Networks Update Server connecvity test.
3. Access the firewall CLI, and use the following command to retrieve informaon on the
support entlement for the firewall from the Palo Alto Networks update server:
request support
check
If you have connecvity, the update server will respond with the support status for
your firewall. Because your firewall is not registered, the update server will return the
following message:
Contact Us
https://www.paloaltonetworks.com/company/contact-us.html
Support Home
https://www.paloaltonetworks.com/support/tabs/overview.html
PAN-OS® Administrator’s Guide Version 10.1 36 ©2022 Palo Alto Networks, Inc.
Geng Started
PAN-OS® Administrator’s Guide Version 10.1 37 ©2022 Palo Alto Networks, Inc.
Geng Started
If you are registering a VM-Series firewall, refer to the VM-Series Deployment Guide
for instrucons.
PAN-OS® Administrator’s Guide Version 10.1 38 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 3 | Enter Your Email Address, check I’m not a robot, and click Submit.
STEP 4 | Select Register device using Serial Number or Authorizaon Code and click Next.
PAN-OS® Administrator’s Guide Version 10.1 39 ©2022 Palo Alto Networks, Inc.
Geng Started
Register a Firewall
If you already have an acve Palo Alto Networks Customer Support account, perform the
following task to register your firewall.
PAN-OS® Administrator’s Guide Version 10.1 40 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 3 | Go to the Palo Alto Networks Customer Support Portal and, if not already logged in, Sign In
now.
PAN-OS® Administrator’s Guide Version 10.1 41 ©2022 Palo Alto Networks, Inc.
Geng Started
2. Select Register device using Serial Number or Authorizaon Code, and then click Next.
3. Enter the firewall Serial Number (you can copy and paste it from the firewall Dashboard).
4. (Oponal) Enter the Device Name and Device Tag.
5. (Oponal) If the device will not have a connecon to the internet, select the Device will
be used offline check box and then, from the drop-down, select the OS Release you plan
to use.
6. Provide informaon about where you plan to deploy the firewall including the Address,
City, Postal Code, and Country.
7. Read the End User License Agreement (EULA) and the Support Agreement, then Agree
and Submit.
PAN-OS® Administrator’s Guide Version 10.1 42 ©2022 Palo Alto Networks, Inc.
Geng Started
You can view the entry for the firewall you just registered under Devices.
STEP 5 | (Firewalls with line cards) To ensure that you receive support for your firewall’s line cards,
make sure to Register the Firewall Line Cards.
PAN-OS® Administrator’s Guide Version 10.1 43 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 1 | From the page that displays aer you have registered your firewall, select Run Day 1
Configuraon.
If you’ve already registered your firewall but haven’t run Day 1 Configuraon, you can
also run it from the Customer Support Portal home page by selecng Tools > Run Day
1 Configuraon.
STEP 2 | Enter the Hostname and Pan OS Version for your new device, and oponally, the Serial
Number and Device Type.
PAN-OS® Administrator’s Guide Version 10.1 44 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 3 | Under Management, select either Stac or DHCP Client for your Management Type.
Selecng Stac will require you fill out the IPV4, Subnet Mask, and Default Gateway fields.
Selecng DHCP Client only requires that you enter the Primary DNS and Secondary DNS. A
device configured in DHCP client mode will ensure the management interface receives an IP
address from the local DHCP server, or it will fill out all the parameters if they are known.
PAN-OS® Administrator’s Guide Version 10.1 45 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 6 | To import and load the Day 1 Configuraon file you just downloaded to your firewall:
1. Log into your firewall web interface.
2. Select Device > Setup > Operaons.
3. Click Import named configuraon snapshot.
4. Select the file.
STEP 4 | Enter the Palo Alto Networks Sales Order Number of the line cards into the Sales Order
Number field to display the line cards eligible for registraon.
STEP 5 | Register the line cards to your firewall by entering its chassis serial number in the Serial
Number field. The Locaon Informaon below auto-populates based on the registraon
informaon of your firewall.
STEP 6 | Click Agree and Submit to accept the legal terms. The system updates to display the
registered line cards under Assets > Line Cards/Opcs/FRUs.
PAN-OS® Administrator’s Guide Version 10.1 46 ©2022 Palo Alto Networks, Inc.
Geng Started
PAN-OS® Administrator’s Guide Version 10.1 47 ©2022 Palo Alto Networks, Inc.
Geng Started
The firewall comes preconfigured with a default virtual wire interface between ports
Ethernet 1/1 and Ethernet 1/2 (and a corresponding default security policy and virtual
router). If you do not plan to use the default virtual wire, you must manually delete the
configuraon and commit the change before proceeding to prevent it from interfering with
other sengs you define. For instrucons on how to delete the default virtual wire and its
associated security policy and zones, see Step 3 in Set Up Network Access for External
Services.
PAN-OS® Administrator’s Guide Version 10.1 48 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 2 | Configure the external interface (the interface that connects to the Internet).
1. Select Network > Interfaces and then select the interface you want to configure. In this
example, we are configuring Ethernet1/8 as the external interface.
2. Select the Interface Type. Although your choice here depends on interface topology, this
example shows the steps for Layer3.
3. On the Config tab, select New Zone from the Security Zone drop-down. In the Zone
dialog, define a Name for new zone, for example Internet, and then click OK.
4. In the Virtual Router drop-down, select default.
5. To assign an IP address to the interface, select the IPv4 tab, click Add in the IP secon,
and enter the IP address and network mask to assign to the interface, for example
203.0.113.23/24.
6. To enable you to ping the interface, select Advanced > Other Info, expand the
Management Profile drop-down, and select New Management Profile. Enter a Name for
the profile, select Ping and then click OK.
7. To save the interface configuraon, click OK.
PAN-OS® Administrator’s Guide Version 10.1 49 ©2022 Palo Alto Networks, Inc.
Geng Started
In this example, the interface connects to a network segment that uses private IP
addresses. Because private IP addresses cannot be routed externally, you have to
configure NAT.
1. Select Network > Interfaces and select the interface you want to configure. In this
example, we are configuring Ethernet1/15 as the internal interface our users connect to.
2. Select Layer3 as the Interface Type.
3. On the Config tab, expand the Security Zone drop-down and select New Zone. In the
Zone dialog, define a Name for new zone, for example Users, and then click OK.
4. Select the same Virtual Router you used previously, default in this example.
5. To assign an IP address to the interface, select the IPv4 tab, click Add in the IP secon,
and enter the IP address and network mask to assign to the interface, for example
192.168.1.4/24.
6. To enable you to ping the interface, select the management profile that you just created.
7. To save the interface configuraon, click OK.
STEP 4 | Configure the interface that connects to your data center applicaons.
Make sure you define granular zones to prevent unauthorized access to sensive
applicaons or data and eliminate the possibility of malware moving laterally within
your data center.
PAN-OS® Administrator’s Guide Version 10.1 50 ©2022 Palo Alto Networks, Inc.
Geng Started
PAN-OS® Administrator’s Guide Version 10.1 51 ©2022 Palo Alto Networks, Inc.
Geng Started
PAN-OS® Administrator’s Guide Version 10.1 52 ©2022 Palo Alto Networks, Inc.
Geng Started
As a best pracce, use address objects in the Desnaon Address field to enable
access to specific servers or groups of servers only, parcularly for services such
as DNS and SMTP that are commonly exploited. By restricng users to specific
desnaon server addresses, you can prevent data exfiltraon and command
and control traffic from establishing communicaon through techniques such as
DNS tunneling.
5. In the Applicaons tab, Add the applicaons that correspond to the network services
you want to safely enable. For example, select dns, ntp, ocsp, ping, and smtp.
6. In the Service/URL Category tab, keep the Service set to applicaon-default.
7. In the Acons tab, set the Acon Seng to Allow.
8. Set Profile Type to Profiles and select the following security profiles to aach to the
policy rule:
• For Anvirus, select default
• For Vulnerability Protecon, select strict
• For An-Spyware, select strict
• For URL Filtering, select default
• For File Blocking, select basic file blocking
• For WildFire Analysis, select default
9. Verify that Log at Session End is enabled. Only traffic that matches a Security policy rule
will be logged.
10. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 53 ©2022 Palo Alto Networks, Inc.
Geng Started
This is a temporary rule that allows you to gather informaon about the traffic on your
network. Aer you have more insight into which applicaons your users need to access,
you can make informed decisions about which applicaons to allow and create more
granular applicaon-based rules for each user group.
PAN-OS® Administrator’s Guide Version 10.1 54 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 5 | Save your policy rules to the running configuraon on the firewall.
Click Commit.
PAN-OS® Administrator’s Guide Version 10.1 55 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 6 | To verify that you have set up your basic policies effecvely, test whether your Security
policy rules are being evaluated and determine which Security policy rule applies to a traffic
flow.
For example, to verify the policy rule that will be applied for a client in the user zone with the
IP address 10.35.14.150 when it sends a DNS query to the DNS server in the data center:
1. Select Device > Troubleshoong and select Security Policy Match (Select Test).
2. Enter the Source and Desnaon IP addresses.
3. Enter the Protocol.
4. Select dns (Applicaon)
5. Execute the Security policy match test.
PAN-OS® Administrator’s Guide Version 10.1 56 ©2022 Palo Alto Networks, Inc.
Geng Started
Use the Applicaon Command Center and Use the Automated Correlaon Engine.
In the ACC, review the most used applicaons and the high-risk applicaons on your network.
The ACC graphically summarizes the log informaon to highlight the applicaons traversing the
network, who is using them (with User-ID enabled), and the potenal security impact of the
content to help you idenfy what is happening on the network in real me. You can then use
this informaon to create appropriate security policy rules that block unwanted applicaons,
while allowing and enabling applicaons in a secure manner.
The Compromised Hosts widget in ACC > Threat Acvity displays potenally compromised
hosts on your network and the logs and match evidence that corroborates the events.
Determine what updates/modificaons are required for your network security policy rules and
implement the changes.
For example:
• Evaluate whether to allow web content based on schedule, users, or groups.
• Allow or control certain applicaons or funcons within an applicaon.
• Decrypt and inspect content.
• Allow but scan for threats and exploits.
For informaon on refining your security policies and for aaching custom security profiles, see
how to Create a Security Policy Rule and Security Profiles.
View Logs.
Specifically, view the traffic and threat logs (Monitor > Logs).
Traffic logs are dependent on how your security policies are defined and set up to log
traffic. The Applicaon Usage widget in the ACC, however, records applicaons and
stascs regardless of policy configuraon; it shows all traffic that is allowed on your
network, therefore it includes the inter-zone traffic that is allowed by policy and the
same zone traffic that is allowed implicitly.
PAN-OS® Administrator’s Guide Version 10.1 57 ©2022 Palo Alto Networks, Inc.
Geng Started
Use WildFire verdict informaon (benign, grayware, malware) and AutoFocus matching tags to
look for potenal risks in your network.
AutoFocus tags created by Unit 42, the Palo Alto Networks threat intelligence team,
call aenon to advanced, targeted campaigns and threats in your network.
From the AutoFocus intelligence summary, you can start an AutoFocus search for arfacts and
assess their pervasiveness within global, industry, and network contexts.
PAN-OS® Administrator’s Guide Version 10.1 58 ©2022 Palo Alto Networks, Inc.
Geng Started
PAN-OS® Administrator’s Guide Version 10.1 59 ©2022 Palo Alto Networks, Inc.
Geng Started
You can also forward files to a WildFire regional cloud or a private cloud based
on your locaon and your organizaonal requirements.
3. Review the File Size Limits for PEs the firewall forwards for WildFire analysis. set the
Size Limit for PEs that the firewall can forward to the maximum available limit of 10 MB.
As a WildFire best pracce, set the Size Limit for PEs to the maximum available
limit of 10 MB.
4. Click OK to save your changes.
STEP 4 | Apply the new WildFire Analysis profile to traffic that the firewall allows.
1. Select Policies > Security and either select an exisng policy rule or create a new policy
rule as described in Set Up a Basic Security Policy.
2. Select Acons and in the Profile Sengs secon, set the Profile Type to Profiles.
3. Select the WildFire Analysis profile you just created to apply that profile rule to all traffic
this policy rule allows.
4. Click OK.
STEP 5 | Enable the firewall to forward decrypted SSL traffic for WildFire analysis.
STEP 6 | Review and implement WildFire best pracces to ensure that you are geng the most of
WildFire detecon and prevenon capabilies.
STEP 8 | Verify that the firewall is forwarding PE files to the WildFire public cloud.
Select Monitor > Logs > WildFire Submissions to view log entries for PEs the firewall
successfully submied for WildFire analysis. The Verdict column displays whether WildFire
found the PE to be malicious, grayware, or benign. (WildFire only assigns the phishing verdict
to email links). The Acon column indicates whether the firewall allowed or blocked the
sample. The Severity column indicates how much of a threat a sample poses to an organizaon
using the following values: crical, high, medium, low, informaon.
PAN-OS® Administrator’s Guide Version 10.1 60 ©2022 Palo Alto Networks, Inc.
Geng Started
STEP 9 | (Threat Prevenon subscripon only) If you have a Threat Prevenon subscripon, but do
not have a WildFire subscripon, you can sll receive WildFire signature updates every 24-
48 hours.
1. Select Device > Dynamic Updates.
2. Check that the firewall is scheduled to download, and install Anvirus updates.
PAN-OS® Administrator’s Guide Version 10.1 61 ©2022 Palo Alto Networks, Inc.
Geng Started
PAN-OS® Administrator’s Guide Version 10.1 62 ©2022 Palo Alto Networks, Inc.
Subscripons
Learn about all the subscripons and services that work with the firewall, and get
started by acvang subscripon licenses:
Certain cloud services, like Cortex XDR™, do not integrate with the firewall directly, but rely on
data stored in Cortex Data Lake for visibility into network acvity. Enhanced applicaon logging
is a feature that comes with a Cortex Data Lake subscripon—it allows the firewall to collect data
specifically for Cortex XDR to use to detect anomalous network acvity. Turning on enhanced
applicaon logging is a Cortex XDR best pracce.
63
Subscripons
IoT Security The IoT Security soluon works with next-generaon firewalls
to dynamically discover and maintain a real-me inventory of
the IoT devices on your network. Through AI and machine-
learning algorithms, the IoT Security soluon achieves a high
level of accuracy, even classifying IoT device types encountered
for the first me. And because it’s dynamic, your IoT device
inventory is always up to date. IoT Security also provides the
automac generaon of policy recommendaons to control IoT
device traffic, as well as the automac creaon of IoT device
aributes for use in firewall policies.
• Get Started with IoT Security.
PAN-OS® Administrator’s Guide Version 10.1 64 ©2022 Palo Alto Networks, Inc.
Subscripons
URL Filtering Provides the ability to not only control web-access, but how
users interact with online content based on dynamic URL
categories. You can also prevent credenal the by controlling
the sites to which users can submit their corporate credenals.
To set up URL Filtering, you must purchase and install a
subscripon for the supported URL filtering database, PAN-
DB. With PAN-DB, you can set up access to the PAN-DB
public cloud or to the PAN-DB private cloud.
Advanced URL Filtering Advanced URL Filtering uses a cloud-based ML-powered web
security engine to perform ML-based inspecon of web traffic
in real-me. This reduces reliance on URL databases and out-
of-band web crawling to detect and prevent advanced, file-
less web-based aacks including targeted phishing, web-
delivered malware and exploits, command-and-control, social
engineering, and other types of web aacks.
• Get Started with Advanced URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 65 ©2022 Palo Alto Networks, Inc.
Subscripons
Cortex Data Lake Provides cloud-based, centralized log storage and aggregaon.
The Cortex Data Lake is required or highly-recommended
to support several other cloud-delivered services, including
Cortex XDR, IoT Security, and Prisma Access, and Traps
management service.
• Get Started with Cortex Data Lake
SaaS Security Inline The SaaS Security soluon works with Cortex Data Lake to
discover all of the SaaS applicaons in use on your network.
SaaS Security Inline can discover thousands of Shadow IT
applicaons and their users and usage details. SaaS Security
Inline also enforces SaaS policy rule recommendaons
PAN-OS® Administrator’s Guide Version 10.1 66 ©2022 Palo Alto Networks, Inc.
Subscripons
PAN-OS® Administrator’s Guide Version 10.1 67 ©2022 Palo Alto Networks, Inc.
Subscripons
To automate acvaon using the Customer Support Portal API, see the process to
Acvate Licenses. This process works for both the hardware and VM-Series firewalls.
PAN-OS® Administrator’s Guide Version 10.1 68 ©2022 Palo Alto Networks, Inc.
Subscripons
STEP 5 | (WildFire, Advanced URL Filtering, and DNS Security subscripons only) Commit
configuraon changes to complete subscripon acvaon.
Aer acvang a WildFire, Advanced URL Filtering, or DNS Security subscripon license, a
commit is required for the firewall to begin processing their corresponding traffic and data
types based on the security profile configuraons. You should:
• Commit any pending changes. If you do not have pending changes, which prevents you from
comming any configuraon updates, you can: issue a commit force command through the
CLI or make an update that writes to the candidate configuraon, which enables the commit
opon.
Use the following CLI configuraon mode command to iniate a commit force:
username@hostname> configure
Entering configuration mode
[edit]
username@hostname# commit force
A commit force bypasses some of the validaon checks that normally occur with a
normal commit operaon. Make sure your configuraon is valid and is semancally
and syntaccally correct before issuing a commit force update.
• WildFire only Check that the WildFire Analysis profile rules include the advanced file types
that are now supported with the WildFire subscripon. If no change to any of the rules is
required, make a minor edit to a rule descripon and perform a commit.
PAN-OS® Administrator’s Guide Version 10.1 69 ©2022 Palo Alto Networks, Inc.
Subscripons
The precise moment of license expiry is at the beginning of the following day at 12:00 AM
(GMT). For example, if your license is scheduled to end on 1/20 you will have funconality
for the remainder of that day. At the start of the new day on 1/21 at 12:00 AM (GMT),
the license will expire. All license-related funcons operate on Greenwich Mean Time
(GMT), regardless of the configured me zone on the firewall.
Threat Prevenon Alerts appear in the System Log indicang that the license has
expired.
You can sll:
• Use signatures that were installed at the me the license
expired, unless you install a new Applicaons-only content
update either manually or as part of an automac schedule.
If you do, the update will delete your exisng threat
signatures and you will no longer receive protecon against
them.
• Use and modify Custom App-ID™ and threat signatures.
You can no longer:
• Install new signatures.
• Roll signatures back to previous versions.
PAN-OS® Administrator’s Guide Version 10.1 70 ©2022 Palo Alto Networks, Inc.
Subscripons
PAN-OS® Administrator’s Guide Version 10.1 71 ©2022 Palo Alto Networks, Inc.
Subscripons
PAN-OS® Administrator’s Guide Version 10.1 72 ©2022 Palo Alto Networks, Inc.
Subscripons
PAN-OS® Administrator’s Guide Version 10.1 73 ©2022 Palo Alto Networks, Inc.
Subscripons
STEP 2 | To Enable Enhanced Applicaon Logging on the firewall, select Device > Setup >
Management > Cortex Data Lake and edit Cortex Data Lake Sengs.
PAN-OS® Administrator’s Guide Version 10.1 74 ©2022 Palo Alto Networks, Inc.
Subscripons
STEP 3 | Connue to enable enhanced applicaon logging for the security policy rules that control the
traffic into which you want extended visibility.
1. Select Objects > Log Forwarding and Add or modify a log forwarding profile.
2. Update the profile to Enable enhanced applicaon logging to Cortex Data Lake
(including traffic and url logs).
Noce that when you enable enhanced applicaon logging in a Log Forwarding profile,
match lists that specify the log types required for enhanced applicaon logging are
automacally added to the profile.
3. Click OK to save the profile and connue to update as many profiles as needed.
4. Ensure that the Log Forwarding profile that you’ve updated is aached to a security
policy rule, to trigger log generaon and forwarding for the traffic matched to the rule.
1. Select Policies > Security to view the profiles aached to each security policy rule.
2. To update the log forwarding profile aached to a rule, Add or edit a rule and select
Policies > Security > Acons > Log Forwarding and select the Log Forwarding profile
enabled with enhanced applicaon logging.
PAN-OS® Administrator’s Guide Version 10.1 75 ©2022 Palo Alto Networks, Inc.
Subscripons
PAN-OS® Administrator’s Guide Version 10.1 76 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Administrators can configure, manage, and monitor Palo Alto Networks firewalls using
the web interface, CLI, and API management interface. You can customize role-based
administrave access to the management interfaces to delegate specific tasks or
permissions to certain administrators.
See Administrave Access Best Pracces for how to safeguard your management
network and the firewall and Panorama management interfaces.
77
Firewall Administraon
Management Interfaces
You can use the following user interfaces to manage the Palo Alto Networks firewall:
Do not enable management access from the internet or from other untrusted zones inside
your enterprise security boundary. Follow the Adminstrave Access Best Pracces to
ensure that you are properly securing your firewall.
• Use the Web Interface to perform configuraon and monitoring tasks with relave ease. This
graphical interface allows you to access the firewall using HTTPS (recommended) or HTTP and
it is the best way to perform administrave tasks.
• Use the Command Line Interface (CLI) to perform a series of tasks by entering commands in
rapid succession over SSH (recommended), Telnet, or the console port. The CLI is a no-frills
interface that supports two command modes, operaonal and configure, each with a disnct
hierarchy of commands and statements. When you become familiar with the nesng structure
and syntax of the commands, the CLI provides quick response mes and administrave
efficiency.
• Use the XML API to streamline your operaons and integrate with exisng, internally
developed applicaons and repositories. The XML API is a web service implemented using
HTTP/HTTPS requests and responses.
• Use Panorama to perform web-based management, reporng, and log collecon for mulple
firewalls. The Panorama web interface resembles the firewall web interface but with addional
funcons for centralized management.
PAN-OS® Administrator’s Guide Version 10.1 78 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
By default, the management (MGT) interface allows only HTTPS access to the web
interface. To enable other protocols, select Device > Setup > Interfaces and edit the
Management interface.
STEP 2 | Log in to the firewall according to the type of authencaon used for your account. If logging
in to the firewall for the first me, use the default value admin for your username and
password.
• SAML—Click Use Single Sign-On (SSO). If the firewall performs authorizaon (role
assignment) for administrators, enter your Username and Connue. If the SAML identy
provider (IdP) performs authorizaon, Connue without entering a Username. In both cases,
the firewall redirects you to the IdP, which prompts you to enter a username and password.
Aer you authencate to the IdP, the firewall web interface displays.
• Any other type of authencaon—Enter your user Name and Password. Read the login
banner and select I Accept and Acknowledge the Statement Below if the login page has the
banner and check box. Then click Login.
PAN-OS® Administrator’s Guide Version 10.1 79 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Aer you enter the message and click OK, administrators who subsequently
log in, and acve administrators who refresh their browsers, see the new or
updated message immediately; a commit isn’t necessary. This enables you to
inform other administrators of an impending commit that might affect their
configuraon changes. Based on the commit me that your message specifies,
the administrators can then decide whether to complete, save, or undo their
changes.
4. (Oponal) Select Allow Do Not Display Again (default is disabled) to give administrators
the opon to suppress a message of the day aer the first login session. Each
administrator can suppress messages only for his or her own login sessions. In the
message of the day dialog, each message will have its own suppression opon.
5. (Oponal) Enter a header Title for the message of the day dialog (default is Messageof
the Day).
PAN-OS® Administrator’s Guide Version 10.1 80 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
A bright background color and contrasng text color can increase the likelihood that
administrators will noce and read a banner. You can also use colors that correspond to
classificaon levels in your organizaon.
STEP 4 | Replace the logos on the login page and in the header.
The maximum size for any logo image is 128KB. The supported file types are png and
jpg. The firewall does not support image files that are interlaced, images that contain
alpha channels, and gif file types because such files interfere with PDF generaon.
1. Select Device > Setup > Operaons and click Custom Logos in the Miscellaneous
secon.
2. Perform the following steps for both the Login Screen logo and the Main UI (header)
logo:
1. Click upload .
2. Select a logo image and click Open.
You can preview the image to see how PAN-OS will crop it to fit by clicking
the magnifying glass icon.
3. Click Close.
3. Commit your changes.
STEP 5 | Verify that the banners, message of the day, and logos display as expected.
1. Log out to return to the login page, which displays the new logos you selected.
2. Enter your login credenals, review the banner, select I Accept and Acknowledge the
Statement Below to enable the Login buon, and then Login.
A dialog displays the message of the day. Messages that Palo Alto Networks embedded
display on separate pages in the same dialog. To navigate the pages, click the right or le
arrows along the sides of the dialog or click a page selector at the boom of
the dialog.
3. (Oponal) You can select Do not show again for the message you configured and for any
messages that Palo Alto Networks embedded.
4. Close the message of the day dialog to access the web interface.
Header and footer banners display in every web interface page with the text and colors
that you configured. The new logo you selected for the web interface displays below the
header banner.
PAN-OS® Administrator’s Guide Version 10.1 81 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
3. Look for a cauon symbol to the right of the last login me informaon for failed login
aempts.
The failed login indicator appears if one or more failed login aempts occurred using
your account since the last successful login.
1. If you see the cauon symbol, hover over it to display the number of failed login
aempts.
2. Click the cauon symbol to view the failed login aempts summary. Details include
the admin account name, the reason for the login failure, the source IP address, and
the date and me.
Aer you successfully log in and then log out, the failed login counter resets
to zero so you will see new failed login details, if any, the next me you log in.
PAN-OS® Administrator’s Guide Version 10.1 82 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 2 | Locate hosts that are connually aempng to log in to your firewall or Panorama
management server.
1. Click the failed login cauon symbol to view the failed login aempts summary.
2. Locate and record the source IP address of the host that aempted to log in. For
example, the following figure shows mulple failed login aempts.
3. Work with your network administrator to locate the user and host that is using the IP
address that you idenfied.
If you cannot locate the system that is performing the brute-force aack, consider
renaming the account to prevent future aacks.
PAN-OS® Administrator’s Guide Version 10.1 83 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Use the following best pracces to help prevent brute-force aacks on privileged
accounts.
• Limit the number of failed aempts allowed before the firewall locks a
privileged account by seng the number of Failed Aempts and the Lockout
Time (min) in the authencaon profile or in the Authencaon Sengs for
the Management interface (Device > Setup > Management > Authencaon
Sengs).
• Use Interface Management Profiles to Restrict Access.
• Enforce complex passwords for privileged accounts.
You can also view System Logs to monitor system events on the firewall or view Config
Logs to monitor firewall configuraon changes.
STEP 2 | Show only Running tasks (in progress) or All tasks (default). Oponally, filter the tasks by
type:
• Jobs—Administrator-iniated commits, firewall-iniated commits, and soware or content
downloads and installaons.
• Reports—Scheduled reports.
• Log Requests—Log queries that you trigger by accessing the Dashboard or a Monitor page.
PAN-OS® Administrator’s Guide Version 10.1 84 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 85 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
longer successfully connect to Panorama, then it reverts its configuraon to the previous running
configuraon.
The commit, validate, preview, save, and revert operaons apply only to changes made
aer the last commit. To restore configuraons to the state they were in before the last
commit, you must load a previously backed up configuraon.
To prevent mulple administrators from making configuraon changes during concurrent
sessions, see Manage Locks for Restricng Configuraon Changes.
STEP 1 | Configure the scope of configuraon changes that you will commit, validate, or preview.
1. Click Commit at the top of the web interface.
2. Select one of the following opons:
• Commit All Changes (default)—Applies the commit to all changes for which you have
administrave privileges. You cannot manually filter the commit scope when you
select this opon. Instead, the administrator role assigned to the account you used to
log in determines the commit scope.
• Commit Changes Made By—Enables you to filter the commit scope by administrator
or locaon. The administrave role assigned to the account you used to log in
determines which changes you can filter.
To commit the changes of other administrators, the account you used to log in
must be assigned the Superuser role or an Admin Role profile with the Commit
For Other Admins privilege enabled.
3. (Oponal) To filter the commit scope by administrator, select Commit Changes Made By,
click the adjacent link, select the administrators, and click OK.
4. (Oponal) To filter by locaon, select Commit Changes Made By and clear any changes
that you want to exclude from the Commit Scope.
PAN-OS® Administrator’s Guide Version 10.1 86 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
addional lines help you correlate the preview output to sengs in the web interface. Close
the preview window when you finish reviewing the changes.
Because the preview results display in a new browser window, your browser must allow
pop-ups. If the preview window does not open, refer to your browser documentaon
for the steps to allow pop-ups.
STEP 3 | Preview the individual sengs for which you are comming changes.
This can be useful if you want to know details about the changes, such as the types of sengs
and who changed them.
1. Click Change Summary.
2. (Oponal) Group By a column name (such as the Type of seng).
3. Close the Change Summary dialog when you finish reviewing the changes.
STEP 4 | Validate the changes before you commit to ensure the commit will succeed.
1. Validate Changes.
The results display all the errors and warnings that an actual commit would display.
2. Resolve any errors that the validaon results idenfy.
To view details about commits that are pending (which you can sll cancel), in progress,
completed, or failed, see Manage and Monitor Administrave Tasks.
Configuraon table export works like a print funcon—you cannot import generated files back
into Panorama or the firewall. When you export data as a PDF file and the table data exceeds
50,000 rows, the data is split in to mulple PDF files (for example, <report-name>_part1.pdf and
<report-name>_part2.pdf) When you export data as a CSV file, the data is exported as a single file.
These export formats allow you to apply filters that match your report criteria and search within
PDF reports to quickly find specific data. Addionally, when you export the configuraon table
data, a system log is generated to record the event.
STEP 1 | Launch the Web Interface and idenfy the configuraon data you need to export.
PAN-OS® Administrator’s Guide Version 10.1 87 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 2 | Apply filters as needed to produce the configuraon data you need to export and click PDF/
CSV.
PAN-OS® Administrator’s Guide Version 10.1 88 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
instance to navigate to the configuraon page and make the necessary change. Aer all references
are removed, you can then delete the profile. You can do this for any configuraon item that has
dependencies.
Global Find does not search dynamic content (such as logs, address ranges, or allocated
DHCP addresses). In the case of DHCP, you can search on a DHCP server aribute, such
as the DNS entry, but you cannot search for individual addresses allocated to users. Global
Find also does not search for individual user or group names idenfied by User-ID unless
the user/group is defined in a policy. In general, you can only search content that the
firewall writes to the configuraon.
Launch Global Find by clicking the Search icon located on the upper right of the web interface.
To access the Global Find from within a configuraon area, click the drop-down next to an item
and select Global Find:
For example, click Global Find on a zone named Users to search the candidate configuraon
for each locaon where the zone is referenced. The following screen capture shows the search
results for the zone Users:
Search ps:
• If you iniate a search on a firewall that has mulple virtual systems enabled or if custom
Administrave Role Types are defined, Global Find will only return results for areas of the
PAN-OS® Administrator’s Guide Version 10.1 89 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
firewall in which the administrator has permissions. The same applies to Panorama device
groups.
• Spaces in search terms are handled as AND operaons. For example, if you search on
corp policy, the search results include instances where corp and policy exist in the
configuraon.
• To find an exact phrase, enclose the phrase in quotaon marks.
• Enter no more than five keywords or use an exact phrase match with quotaon marks.
• To rerun a previous search, click Search (located on the upper right of the web interface) to
see a list of the last 20 searches. Click an item in the list to rerun that search. Search history
is unique to each administrator account.
• To search for a UUID, you must copy and paste the UUID.
The firewall queues commit requests and performs them in the order that administrators
iniate the commits. For details, see Commit, Validate, and Preview Firewall
Configuraon Changes. To view the status of queued commits, see Manage and Monitor
Administrave Tasks.
PAN-OS® Administrator’s Guide Version 10.1 90 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Lock a configuraon.
1. Click the lock at the top of the web interface.
The lock image varies based on whether exisng locks are or are not set.
Unlock a configuraon.
Only a superuser or the administrator who locked the configuraon can manually unlock it.
However, the firewall automacally removes a lock aer compleng the commit operaon.
1. Click the lock at the top of the web interface.
2. Select the lock entry in the list.
3. Click Remove Lock, OK, and Close.
Configure the firewall to automacally apply a commit lock when you change the candidate
configuraon. This seng applies to all administrators.
1. Select Device > Setup > Management and edit the General Sengs.
2. Select Automacally Acquire Commit Lock and then click OK and Commit.
PAN-OS® Administrator’s Guide Version 10.1 91 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
See Commit, Validate, and Preview Firewall Configuraon Changes for details about
commit operaons.
You don’t have to save a configuraon backup to revert the changes made since the last
commit or reboot; just select Config > Revert Changes (see Revert Firewall Configuraon
Changes).
When you edit a seng and click OK, the firewall updates the candidate configuraon but
does not save a backup snapshot.
Addionally, saving changes does not acvate them. To acvate changes, perform a
commit (see Commit, Validate, and Preview Firewall Configuraon Changes).
Palo Alto Networks recommends that you back up any important configuraon to a host
external to the firewall.
PAN-OS® Administrator’s Guide Version 10.1 92 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 1 | Save a local backup snapshot of the candidate configuraon if it contains changes that you
want to preserve in the event the firewall reboots.
These are changes you are not ready to commit—for example, changes you cannot finish in the
current login session.
To overwrite the default snapshot file (.snapshot.xml) with all the changes that all
administrators made, perform one of the following steps:
• Select Device > Setup > Operaons and Save candidate configuraon.
• Log in to the firewall with an administrave account that is assigned the Superuser role or
an Admin Role profile with the Save For Other Admins privilege enabled. Then select Config
> Save Changes at the top of the web interface, select Save All Changes and Save.
To create a snapshot that includes all the changes that all administrators made but without
overwring the default snapshot file:
1. Select Device > Setup > Operaons and Save named configuraon snapshot.
2. Specify the Name of a new or exisng configuraon file.
3. Click OK and Close.
To save only specific changes to the candidate configuraon without overwring any part of
the default snapshot file:
1. Log in to the firewall with an administrave account that has the role privileges required
to save the desired changes.
2. Select Config > Save Changes at the top of the web interface.
3. Select Save Changes Made By.
4. To filter the Save Scope by administrator, click <administrator-name>, select the
administrators, and click OK.
5. To filter the Save Scope by locaon, clear any locaons that you want to exclude. The
locaons can be specific virtual systems, shared policies and objects, or shared device
and network sengs.
6. Click Save, specify the Name of a new or exisng configuraon file, and click OK.
STEP 2 | Export a candidate configuraon, a running configuraon, or the firewall state informaon to
a host external to the firewall.
Select Device > Setup > Operaons and click an export opon:
• Export named configuraon snapshot—Export the current running configuraon, a named
candidate configuraon snapshot, or a previously imported configuraon (candidate or
running). The firewall exports the configuraon as an XML file with the Name you specify.
• Export configuraon version—Select a Version of the running configuraon to export as an
XML file. The firewall creates a version whenever you commit configuraon changes.
• Export device state—Export the firewall state informaon as a bundle. Besides the running
configuraon, the state informaon includes device group and template sengs pushed
from Panorama. If the firewall is a GlobalProtect portal, the informaon also includes
cerficate informaon, a list of satellites, and satellite authencaon informaon. If you
replace a firewall or portal, you can restore the exported informaon on the replacement by
imporng the state bundle.
PAN-OS® Administrator’s Guide Version 10.1 93 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
The privileges that control commit operaons also control revert operaons.
2. Select Config > Revert Changes at the top of the web interface.
3. Select Revert Changes Made By.
4. To filter the Revert Scope by administrator, click <administrator-name>, select the
administrators, and click OK.
5. To filter the Revert Scope by locaon, clear any locaons that you want to exclude.
6. Revert the changes.
PAN-OS® Administrator’s Guide Version 10.1 94 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Revert to a previous version of the running configuraon that is stored on the firewall.
The firewall creates a version whenever you commit configuraon changes.
1. Select Device > Setup > Operaons and Load configuraon version.
2. Select a configuraon Version and click OK.
3. (Oponal) Click Commit to overwrite the running configuraon with the version you just
restored.
PAN-OS® Administrator’s Guide Version 10.1 95 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
As a best pracce, create a separate administrave account for each person who needs
access to the administrave or reporng funcons of the firewall. This enables you to
beer protect the firewall from unauthorized configuraon and enables logging of the
acons of individual administrators. Make sure you are following the Adminstrave
Access Best Pracces to ensure that you are securing administrave access to your
firewalls and other security devices in a way that prevents successful aacks.
PAN-OS® Administrator’s Guide Version 10.1 96 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Device administrator Full access to all firewall sengs except for defining new
accounts or virtual systems.
Device administrator (read- Read-only access to all firewall sengs except password
only) profiles (no access) and administrator accounts (only the
logged in account is visible).
Virtual system administrator Access to selected virtual systems on the firewall to create
and manage specific aspects of virtual systems. A virtual
system administrator doesn’t have access to network
interfaces, VLANs, virtual wires, virtual routers, IPSec
tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or
network profiles.
Virtual system administrator Read-only access to selected virtual systems on the firewall
(read-only) and specific aspects of virtual systems. A virtual system
administrator with read-only access doesn’t have access to
network interfaces, VLANs, virtual wires, virtual routers,
IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or
network profiles.
Follow the principle of least privilege access to create Admin Role profiles that enable
administrators to access only the areas of the management interface that they need to
access to perform their jobs and follow Administrave Access Best Pracces.
STEP 3 | For the scope of the Role, select Device or Virtual System.
STEP 4 | In the Web UI and REST API tabs, click the icon for each funconal area to toggle it to the
desired seng: Enable, Read Only or Disable. For the XML API tab select, Enable or Disable.
For details on the Web UI opons, see Web Interface Access Privileges.
PAN-OS® Administrator’s Guide Version 10.1 97 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 5 | Select the Command Line tab and select a CLI access opon. The Role scope controls the
available opons:
• Device role:
• None—CLI access is not permied (default).
• superuser—Full access. Can define new administrator accounts and virtual systems. Only
a superuser can create administrator users with superuser privileges.
• superreader—Full read-only access.
• deviceadmin—Full access to all sengs except defining new accounts or virtual systems.
• devicereader—Read-only access to all sengs except password profiles (no access) and
administrator accounts (only the logged in account is visible).
• Virtual System role:
• None—Access is not permied (default).
• vsysadmin—Access to specific virtual systems to create and manage specific aspects
of virtual systems. Does not enable access to firewall-level or network-level funcons
including stac and dynamic roung, interface IP addresses, IPSec tunnels, VLANs, virtual
wires, virtual routers, GRE tunnels, DCHP, DNS Proxy, QoS, LLDP, or network profiles.
• vsysreader—Read-only access to specific virtual systems to specific aspects of virtual
systems. Does not enable access to firewall-level or network-level funcons including
stac and dynamic roung, interface IP addresses, IPSec tunnels, VLANs, virtual wires,
virtual routers, GRE tunnels, DCHP, DNS Proxy, QoS, LLDP, or network profiles.
STEP 7 | Assign the role to an administrator. See Configure a Firewall Administrator Account.
This is an example profile for a ficonal SOC manager. Configure Admin Role profiles
for your administrators based on the funcons they manage and the access required
to do their job. Do not enable unnecessary access. Create separate profiles for each
administrave group that shares the same dues and for administrators who have unique
dues. Each administrator should have the exact level of access required to perform their
dues and no access beyond that.
STEP 1 | Configure Web UI access permissions. Each snip of the Web UI screen shows a different area
of Web UI permissions. Permissions are listed by firewall tab, in the order you see the tabs in
the Web UI, followed by permissions for other acons.
The Dashboard, ACC, and Monitor > Logs areas of the firewall don’t contain configuraon
elements—all of the objects are informaonal (you can only toggle them between enable and
PAN-OS® Administrator’s Guide Version 10.1 98 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
disable because they are already read only). Because the SOC Manager needs to invesgate
potenal issues, the SOC Manager needs access to the informaon on these tabs.
The profile name and descripon make it easy to understand the profile’s objecve. This snip
doesn’t show all of the Logs permissions, but all of them are enabled for this profile.
The next snip shows permissions for more informaonal objects on the Monitor tab. The SOC
Manager uses these tools to invesgate potenal issues and therefore requires access.
The next two snips show permissions for PDF Reports, Custom Reports, and predefined
reports on the Monitor tab. While the SOC Manager needs access to PDF reports to gather
informaon, in this example, the SOC Manager does not need to configure reports, so access
is set to read-only (summary reports are not configurable). However, the SOC Manager needs
to manage custom reports to invesgate specific potenal issues, so full access permissions are
PAN-OS® Administrator’s Guide Version 10.1 99 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
granted for all custom reports (including those not shown in the snip). Finally the SOC Manager
requires access to predefined reports for invesgang potenal issues.
Because the SOC Manager is an invesgator and not an administrator who configures the
firewall, permissions for the Policies tab are read-only, with the excepon of reseng the rule
hit count. Reseng the rule hit count is not one of the SOC Manager’s dues (and changing
the hit count could adversely affect or confuse other administrators), so access is disabled.
Read access enables the SOC Manager to invesgate the construcon of a policy that the SOC
Manager suspects may have caused an issue.
Permissions for the Objects tab are also read-only for the same reason—the SOC Manager’s
job doesn’t require configuraon, so no configuraon permissions are assigned. For areas
that aren’t included in the SOC Manager’s dues, access is disabled. In this example, the SOC
Manager has read-only access to invesgate objects configuraons for all objects except URL
PAN-OS® Administrator’s Guide Version 10.1 100 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Filtering, SD-WAN Link Management and Schedules, which are under the control of different
administrators in this example.
For Network tab permissions, the scenario is similar: the SOC Manager doesn’t need to
configure any of the objects, but may need informaon to invesgate issues, so read-only
access is assigned to the areas that the SOC Manager may need to invesgate. In this example,
PAN-OS® Administrator’s Guide Version 10.1 101 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
access is disabled for QoS, LLDP, Network Profiles, or SD-WAN Interface profiles because
these items are not part of the SOC Manager’s dues.
In this example, the SOC Manager needs no access to the Device tab capabilies for
invesgave purposes, so all Device tab permissions are blocked. In addion, invesgaon
doesn’t require commit acons or access to any of the remaining acons, so those permissions
are also blocked.
PAN-OS® Administrator’s Guide Version 10.1 102 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 103 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Administrave Authencaon
You can configure the following types of authencaon and authorizaon (role and access domain
assignment) for firewall administrators:
AuthencaonAuthorizaon Descripon
Method Method
SSH Keys Local The administrave accounts are local to the firewall, but
authencaon to the CLI is based on SSH keys. You use the
firewall to manage role assignments but access domains are
not supported. For details, see Configure SSH Key-Based
Administrator Authencaon to the CLI.
Cerficates Local The administrave accounts are local to the firewall, but
authencaon to the web interface is based on client cerficates.
You use the firewall to manage role assignments but access
domains are not supported. For details, see Configure Cerficate-
Based Administrator Authencaon to the Web Interface.
PAN-OS® Administrator’s Guide Version 10.1 104 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
AuthencaonAuthorizaon Descripon
Method Method
External Local The administrave accounts you define locally on the firewall
service serve as references to the accounts defined on an external Mul-
Factor Authencaon, SAML, Kerberos, TACACS+, RADIUS, or
LDAP server. The external server performs authencaon. You
use the firewall to manage role assignments but access domains
are not supported. For details, see Configure Local or External
Authencaon for Firewall Administrators.
PAN-OS® Administrator’s Guide Version 10.1 105 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Create a separate administrave account for each person who needs access to the
administrave or reporng funcons of the firewall. This enables you to beer protect the
firewall from unauthorized configuraon and enables logging of the acons of individual
administrators.
Make sure you are following the Adminstrave Access Best Pracces to ensure that you
are securing administrave access to your firewalls and other security devices in a way
that prevents successful aacks.
You can also configure the total number of supported concurrent sessions by logging in
to the firewall CLI.
admin> configure
admin# commit
STEP 4 | Select an Authencaon Profile or sequence if you configured either for the administrator.
If the firewall uses Local Authencaon without a local user database for the account, select
None (default) and enter a Password.
PAN-OS® Administrator’s Guide Version 10.1 106 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 6 | (Oponal) Select a Password Profile for administrators that the firewall authencates locally
without a local user database. For details, see Define a Password Profile.
If you use an external service to manage both authencaon and authorizaon (role and
access domain assignments), see:
• Configure SAML Authencaon
• Configure TACACS+ Authencaon
• Configure RADIUS Authencaon
To authencate administrators without a challenge-response mechanism, you can
Configure Cerficate-Based Administrator Authencaon to the Web Interface and
Configure SSH Key-Based Administrator Authencaon to the CLI.
STEP 1 | (External authencaon only) Enable the firewall to connect to an external server for
authencang administrators.
Configure a server profile:
• Add a RADIUS server profile.
If the firewall integrates with a Mul-Factor Authencaon (MFA) service through RADIUS,
you must add a RADIUS server profile. In this case, the MFA service provides all the
authencaon factors (challenges). If the firewall integrates with an MFA service through
a vendor API, you can sll use a RADIUS server profile for the first factor but MFA server
profiles are required for addional factors.
• Add an MFA server profile.
• Add a TACACS+ server profile.
• Add a SAML IdP server profile. You cannot combine Kerberos single sign-on (SSO) with
SAML SSO; you can use only one type of SSO service.
• Add a Kerberos server profile.
• Add an LDAP server profile.
PAN-OS® Administrator’s Guide Version 10.1 107 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 2 | (Local database authencaon only) Configure a user database that is local to the firewall.
1. Add the user account to the local database.
2. (Oponal) Add the user group to the local database.
STEP 3 | (Local authencaon only) Define password complexity and expiraon sengs.
These sengs help protect the firewall against unauthorized access by making it harder for
aackers to guess passwords.
1. Define global password complexity and expiraon sengs for all local administrators.
The sengs don’t apply to local database accounts for which you specified a password
hash instead of a password (see Local Authencaon).
1. Select Device > Setup > Management and edit the Minimum Password Complexity
sengs.
2. Select Enabled.
3. Define the password sengs and click OK.
2. Define a Password Profile.
You assign the profile to administrator accounts for which you want to override the
global password expiraon sengs. The profiles are available only to accounts that are
not associated with a local database (see Local Authencaon).
1. Select Device > Password Profiles and Add a profile.
2. Enter a Name to idenfy the profile.
3. Define the password expiraon sengs and click OK.
If your administrave accounts are stored across mulple types of servers, you
can create an authencaon profile for each type and add all the profiles to an
authencaon sequence.
Configure an Authencaon Profile and Sequence. In the authencaon profile, specify the
Type of authencaon service and related sengs:
• External service—Select the Type of external service and select the Server Profile you
created for it.
• Local database authencaon—Set the Type to Local Database.
• Local authencaon without a database—Set the Type to None.
• Kerberos SSO—Specify the Kerberos Realm and Import the Kerberos Keytab.
PAN-OS® Administrator’s Guide Version 10.1 108 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Alternavely, Import a Cerficate and Private Key from your enterprise CA or a third-
party CA.
STEP 2 | Configure a cerficate profile for securing access to the web interface.
Configure a Cerficate Profile.
• Set the Username Field to Subject.
• In the CA Cerficates secon, Add the CA Cerficate you just created or imported.
STEP 3 | Configure the firewall to use the cerficate profile for authencang administrators.
1. Select Device > Setup > Management and edit the Authencaon Sengs.
2. Select the Cerficate Profile you created for authencang administrators and click OK.
PAN-OS® Administrator’s Guide Version 10.1 109 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 7 | Import the client cerficate into the client system of each administrator who will access the
web interface.
Refer to your web browser documentaon.
PAN-OS® Administrator’s Guide Version 10.1 110 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 3 | Configure the SSH client to use the private key to authencate to the firewall.
Perform this task on the client system of the administrator. For the steps, refer to your SSH
client documentaon.
STEP 4 | Verify that the administrator can access the firewall CLI using SSH key authencaon.
1. Use a browser on the client system of the administrator to go to the firewall IP address.
2. Log in to the firewall CLI as the administrator. Aer entering a username, you will see the
following output (the key value is an example):
3. If prompted, enter the passphrase you defined when creang the keys.
STEP 2 | Edit Authencaon Sengs to specify the API Key Lifeme (min).
Set the API key lifeme to protect against compromise and to reduce the effects of an
accidental exposure. By default, the API key lifeme is set to 0, which means that the keys
will never expire. To ensure that your keys are frequently rotated and each key is unique when
regenerated, you must specify a validity period that ranges between 1—525600 minutes. Refer
to the audit and compliance policies for your enterprise to determine how you should specify
the lifeme for which your API keys are valid.
PAN-OS® Administrator’s Guide Version 10.1 111 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 4 | (To revoke all API keys) Select Expire all API Keys to reset currently valid API keys.
If you have just set a key lifeme and want to reset all API keys to adhere to the new term, you
can expire all exisng keys.
On confirmaon, the keys are revoked and you can view the mestamp for when the API Keys
Last Expired.
STEP 1 | Configure a syslog server profile to forward audit logs of administrator acvity on the
firewall.
This step is required to successfully store audit logs for tracking administrator acvity on the
firewall.
1. Log in to the firewall web interface.
2. Configure a syslog server profile.
PAN-OS® Administrator’s Guide Version 10.1 112 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 113 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 114 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 115 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 116 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Device Group and Template roles can see log data only for the device groups that are
within the access domains assigned to those roles.
PAN-OS® Administrator’s Guide Version 10.1 117 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 118 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 119 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Authencaon
Specifies whether the Firewall: Yes Yes No Yes
administrator can see the
Panorama: Yes
Authencaon logs.
Device Group/
Template: No
PAN-OS® Administrator’s Guide Version 10.1 120 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 121 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 122 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 123 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 124 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 125 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
GTP Log Specifies whether the mobile Firewall: Yes Yes No Yes
network operator can create a
Panorama: Yes
custom report that includes data
from GTP logs. Device Group/
Template: Yes
SCTP Log Specifies whether the mobile Firewall: Yes Yes No Yes
network operator can create a
Panorama: Yes
custom report that includes data
from SCTP logs. Device Group/
Template: Yes
PAN-OS® Administrator’s Guide Version 10.1 126 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Authencaon
Specifies whether the Firewall: Yes Yes No Yes
administrator can create a
Panorama: Yes
custom report that includes data
from the Authencaon logs. Device Group/
Template: Yes
PAN-OS® Administrator’s Guide Version 10.1 127 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 128 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Policy Based Enable this privilege to allow the Yes Yes Yes
Forwarding administrator to view, add, and/or delete
Policy-Based Forwarding (PBF) rules. Set
the privilege to read-only if you want
the administrator to be able to see the
rules, but not modify them. To prevent
the administrator from seeing the PBF
rulebase, disable this privilege.
Network Packet Enable this privilege to allow the Yes Yes Yes
Broker administrator to view, add, and/or delete
Network Packet Broker policy rules. Set
the privilege to read-only if you want
the administrator to be able to see the
rules, but not modify them. To prevent the
PAN-OS® Administrator’s Guide Version 10.1 129 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Tunnel Inspecon Enable this privilege to allow the Yes Yes Yes
administrator to view, add, and/or delete
Tunnel Inspecon rules. Set the privilege
to read-only if you want the administrator
to be able to see the rules, but not modify
them. To prevent the administrator from
seeing the Tunnel Inspecon rulebase,
disable this privilege.
DoS Protecon Enable this privilege to allow the Yes Yes Yes
administrator to view, add, and/or delete
DoS protecon rules. Set the privilege to
read-only if you want the administrator to
be able to see the rules, but not modify
them. To prevent the administrator from
seeing the DoS protecon rulebase,
disable this privilege.
PAN-OS® Administrator’s Guide Version 10.1 130 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Address Groups Specifies whether the administrator can Yes Yes Yes
view, add, or delete address group objects
for use in security policy.
PAN-OS® Administrator’s Guide Version 10.1 131 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Service Groups Specifies whether the administrator can Yes Yes Yes
view, add, or delete service group objects
for use in security policy.
HIP Objects Specifies whether the administrator can Yes Yes Yes
view, add, or delete HIP objects, which are
used to define HIP profiles. HIP Objects
also generate HIP Match logs.
Clientless Apps Specifies whether the administrator can Yes Yes Yes
view, add, modify, or delete GlobalProtect
VPN Clientless applicaons.
Clientless App Specifies whether the administrator can Yes Yes Yes
Groups view, add, modify, or delete GlobalProtect
VPN Clientless applicaon groups.
HIP Profiles Specifies whether the administrator can Yes Yes Yes
view, add, or delete HIP Profiles for use in
security policy and/or for generang HIP
Match logs.
External Dynamic Specifies whether the administrator can Yes Yes Yes
Lists view, add, or delete external dynamic lists
for use in security policy.
PAN-OS® Administrator’s Guide Version 10.1 132 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Data Paerns Specifies whether the administrator can Yes Yes Yes
view, add, or delete custom data paern
signatures for use in creang custom
Vulnerability Protecon profiles.
PAN-OS® Administrator’s Guide Version 10.1 133 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
URL Filtering Specifies whether the administrator can Yes Yes Yes
view, add, or delete URL filtering profiles.
File Blocking Specifies whether the administrator can Yes Yes Yes
view, add, or delete file blocking profiles.
WildFire Analysis Specifies whether the administrator can Yes Yes Yes
view, add, or delete WildFire analysis
profiles.
Data Filtering Specifies whether the administrator can Yes Yes Yes
view, add, or delete data filtering profiles.
GTP Protecon Specifies whether the mobile network Yes Yes Yes
operator can view, add, or delete GTP
Protecon profiles.
SCTP Protecon Specifies whether the mobile network Yes Yes Yes
operator can view, add, or delete Stream
Control Transmission Protocol (SCTP)
Protecon profiles.
PAN-OS® Administrator’s Guide Version 10.1 134 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Path Quality Specifies whether the administrator can Yes Yes Yes
Profile view, add, or delete SD-WAN Path Quality
profiles.
Packet Broker Specifies whether the administrator can Yes Yes Yes
Profile view, add, or delete Packet Broker profiles.
PAN-OS® Administrator’s Guide Version 10.1 135 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Virtual Wires Specifies whether the administrator can Yes Yes Yes
view, add, or delete virtual wires.
Virtual Routers Specifies whether the administrator can Yes Yes Yes
view, add, modify or delete virtual routers.
IPSec Tunnels Specifies whether the administrator can Yes Yes Yes
view, add, modify, or delete IPSec Tunnel
configuraons.
GRE Tunnels Specifies whether the administrator can Yes Yes Yes
view, add, modify, or delete GRE Tunnel
configuraons.
DNS Proxy Specifies whether the administrator can Yes Yes Yes
view, add, modify, or delete DNS proxy
configuraons.
PAN-OS® Administrator’s Guide Version 10.1 136 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Device Block List Specifies whether the administrator can Yes Yes Yes
view, add, modify, or delete device block
lists.
Clientless Apps Specifies whether the administrator can Yes Yes Yes
view, add, modify, or delete GlobalProtect
Clientless VPN applicaons.
Clientless App Specifies whether the administrator can Yes Yes Yes
Groups view, add, modify, or delete GlobalProtect
Clientless VPN applicaon groups.
Network Profiles Sets the default state to enable or disable Yes No Yes
for all of the Network sengs described
below.
GlobalProtect Controls access to the Network Profiles > Yes Yes Yes
IPSec Crypto GlobalProtect IPSec Crypto node.
If you disable this privilege, the
administrator will not see that node, or
configure algorithms for authencaon
and encrypon in VPN tunnels between a
GlobalProtect gateway and clients.
If you set the privilege to read-only,
the administrator can view exisng
GlobalProtect IPSec Crypto profiles but
cannot add or edit them.
IKE Gateways Controls access to the Network Profiles Yes Yes Yes
> IKE Gateways node. If you disable
this privilege, the administrator will not
see the IKE Gateways node or define
gateways that include the configuraon
informaon necessary to perform IKE
protocol negoaon with peer gateway.
PAN-OS® Administrator’s Guide Version 10.1 137 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
IPSec Crypto Controls access to the Network Profiles Yes Yes Yes
> IPSec Crypto node. If you disable this
privilege, the administrator will not see
the Network Profiles > IPSec Crypto
node or specify protocols and algorithms
for idenficaon, authencaon, and
encrypon in VPN tunnels based on IPSec
SA negoaon.
If the privilege state is set to read-only,
you can view the currently configured
IPSec Crypto configuraon but cannot add
or edit a configuraon.
Monitor Controls access to the Network Profiles > Yes Yes Yes
Monitor node. If you disable this privilege,
the administrator will not see the Network
Profiles > Monitor node or be able to
create or edit a monitor profile that
is used to monitor IPSec tunnels and
monitor a next-hop device for policy-
based forwarding (PBF) rules.
If the privilege state is set to read-only,
you can view the currently configured
monitor profile configuraon but cannot
add or edit a configuraon.
Interface Mgmt Controls access to the Network Profiles > Yes Yes Yes
Interface Mgmt node. If you disable this
privilege, the administrator will not see
the Network Profiles > Interface Mgmt
node or be able to specify the protocols
that are used to manage the firewall.
PAN-OS® Administrator’s Guide Version 10.1 138 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Zone Protecon Controls access to the Network Profiles > Yes Yes Yes
Zone Protecon node. If you disable this
privilege, the administrator will not see
the Network Profiles > Zone Protecon
node or be able to configure a profile that
determines how the firewall responds to
aacks from specified security zones.
If the privilege state is set to read-only,
you can view the currently configured
Zone Protecon profile configuraon but
cannot add or edit a configuraon.
QoS Profile Controls access to the Network Profiles Yes Yes Yes
> QoS node. If you disable this privilege,
the administrator will not see the Network
Profiles > QoS node or be able to
configure a QoS profile that determines
how QoS traffic classes are treated.
If the privilege state is set to read-only,
you can view the currently configured
QoS profile configuraon but cannot add
or edit a configuraon.
LLDP Profile Controls access to the Network Profiles Yes Yes Yes
> LLDP node. If you disable this privilege,
the administrator will not see the Network
Profiles > LLDP node or be able to
configure an LLDP profile that controls
whether the interfaces on the firewall can
parcipate in the Link Layer Discovery
Protocol.
If the privilege state is set to read-only,
you can view the currently configured
LLDP profile configuraon but cannot add
or edit a configuraon.
BFD Profile Controls access to the Network Profiles Yes Yes Yes
> BFD Profile node. If you disable this
privilege, the administrator will not see
PAN-OS® Administrator’s Guide Version 10.1 139 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Setup Controls access to the Setup node. If you Yes Yes Yes
disable this privilege, the administrator
will not see the Setup node or have access
to firewall-wide setup configuraon
informaon, such as Management,
Operaons, Service, Content-ID, WildFire
or Session setup informaon.
PAN-OS® Administrator’s Guide Version 10.1 140 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 141 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 142 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
HSM Controls access to the HSM node. If you Yes Yes Yes
disable this privilege, the administrator
will not be able to configure a Hardware
Security Module.
If the privilege state is set to read-only,
you can view the current configuraon
but cannot make any changes.
High Availability Controls access to the High Availability Yes Yes Yes
node. If you disable this privilege,
the administrator will not see the
High Availability node or have access
to firewall-wide high availability
configuraon informaon such as General
setup informaon or Link and Path
Monitoring.
If you set this privilege to read-only, the
administrator can view High Availability
configuraon informaon for the firewall
but is not allowed to perform any
configuraon procedures.
PAN-OS® Administrator’s Guide Version 10.1 143 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Admin Roles Controls access to the Admin Roles node. No Yes Yes
This funcon can only be allowed for
read-only access.
If you disable this privilege, the
administrator will not see the Admin
Roles node or have access to any firewall-
wide informaon concerning Admin Role
profiles configuraon.
If you set this privilege to read-only, you
can view the configuraon informaon for
all administrator roles configured on the
firewall.
PAN-OS® Administrator’s Guide Version 10.1 144 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Virtual Systems Controls access to the Virtual Systems Yes Yes Yes
node. If you disable this privilege, the
administrator will not see or be able to
configure virtual systems.
If the privilege state is set to read-only,
you can view the currently configured
virtual systems but cannot add or edit a
configuraon.
Shared Gateways Controls access to the Shared Gateways Yes Yes Yes
node. Shared gateways allow virtual
systems to share a common interface for
external communicaons.
If you disable this privilege, the
administrator will not see or be able to
configure shared gateways.
If the privilege state is set to read-only,
you can view the currently configured
shared gateways but cannot add or edit a
configuraon.
PAN-OS® Administrator’s Guide Version 10.1 145 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Cerficate Profile Controls access to the Cerficate Profile Yes Yes Yes
node. If you disable this privilege, the
administrator will not see the Cerficate
Profile node or be able to create
cerficate profiles.
If you set this privilege to read-only, the
administrator can view Cerficate Profiles
that are currently configured for the
firewall but is not allowed to create or edit
a cerficate profile.
OCSP Responder Controls access to the OCSP Responder Yes Yes Yes
node. If you disable this privilege, the
administrator will not see the OCSP
Responder node or be able to define
a server that will be used to verify the
revocaon status of cerficates issues by
the firewall.
If you set this privilege to read-only,
the administrator can view the OCSP
PAN-OS® Administrator’s Guide Version 10.1 146 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
SSL/TLS Service Controls access to the SSL/TLS Service Yes Yes Yes
Profile Profile node.
If you disable this privilege, the
administrator will not see the node
or configure a profile that specifies a
cerficate and a protocol version or range
of versions for firewall services that use
SSL/TLS.
If you set this privilege to read-only, the
administrator can view exisng SSL/TLS
Service profiles but cannot create or edit
them.
SCEP Controls access to the SCEP node. If you Yes Yes Yes
disable this privilege, the administrator
will not see the node or be able to define
a profile that specifies simple cerficate
enrollment protocol (SCEP) sengs for
issuing unique device cerficates.
If you set this privilege to read-only, the
administrator can view exisng SCEP
profiles but cannot create or edit them.
SSL Decrypon Controls access to the SSL Decrypon Yes Yes Yes
Exclusion Exclusion node. If you disable this
privilege, the administrator will not
see the node or be able to add custom
exclusions.
If you set this privilege to read-only,
the administrator can view exisng SSL
decrypon excepons but cannot create
or edit them.
SSH Service Controls access to the SSH Service Profile Yes Yes Yes
Profile node. If you disable this privilege, the
administrator will be unable to see the
node or configure a profile to specify
parameters for SSH connecons to your
Palo Alto Networks management and high
availability (HA) appliances.
PAN-OS® Administrator’s Guide Version 10.1 147 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Response Pages Controls access to the Response Pages Yes Yes Yes
node. If you disable this privilege, the
administrator will not see the Response
Page node or be able to define a custom
HTML message that is downloaded and
displayed instead of a requested web page
or file.
If you set this privilege to read-only, the
administrator can view the Response Page
configuraon for the firewall but is not
allowed to create or edit a response page
configuraon.
Log Sengs Sets the default state to enable or disable Yes No Yes
for all of the Log sengs described below.
System Controls access to the Log Sengs > Yes Yes Yes
System node. If you disable this privilege,
the administrator cannot see the Log
Sengs > System node or specify which
System logs the firewall forwards to
Panorama or external services (such as a
syslog server).
If you set this privilege to read-only, the
administrator can view the Log Sengs >
System sengs for the firewall but cannot
add, edit, or delete the sengs.
Configuraon Controls access to the Log Sengs > Yes Yes Yes
Configuraon node. If you disable this
privilege, the administrator cannot see
the Log Sengs > Configuraon node
or specify which Configuraon logs the
firewall forwards to Panorama or external
services (such as a syslog server).
If you set this privilege to read-only, the
administrator can view the Log Sengs >
Configuraon sengs for the firewall but
cannot add, edit, or delete the sengs.
PAN-OS® Administrator’s Guide Version 10.1 148 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
User-ID Controls access to the Log Sengs > Yes Yes Yes
User-ID node. If you disable this privilege,
the administrator cannot see the Log
Sengs > User-ID node or specify which
User-ID logs the firewall forwards to
Panorama or external services (such as a
syslog server).
If you set this privilege to read-only, the
administrator can view the Log Sengs
> User-ID sengs for the firewall but
cannot add, edit, or delete the sengs.
HIP Match Controls access to the Log Sengs > Yes Yes Yes
HIP Match node. If you disable this
privilege, the administrator cannot see
the Log Sengs > HIP Match node or
specify which Host Informaon Profile
(HIP) match logs the firewall forwards to
Panorama or external services (such as
a syslog server). HIP match logs provide
informaon on Security policy rules that
apply to GlobalProtect endpoints.
If you set this privilege to read-only, the
administrator can view the Log Sengs
> HIP sengs for the firewall but cannot
add, edit, or delete the sengs.
GlobalProtect Controls access to the Log Sengs > Yes Yes Yes
GlobalProtect node. If you disable this
privilege, the administrator cannot see
the Log Sengs > GlobalProtect node
or specify which GlobalProtect logs the
firewall forwards to Panorama or external
services (such as a syslog server).
If you set this privilege to read-only, the
administrator can view the Log Sengs >
GlobalProtect sengs for the firewall but
cannot add, edit, or delete the sengs.
Correlaon Controls access to the Log Sengs > Yes Yes Yes
Correlaon node. If you disable this
privilege, the administrator cannot see
the Log Sengs > Correlaon node or
add, delete, or modify correlaon log
PAN-OS® Administrator’s Guide Version 10.1 149 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Alarm Sengs Controls access to the Log Sengs > Yes Yes Yes
Alarm Sengs node. If you disable this
privilege, the administrator cannot see
the Log Sengs > Alarm Sengs node
or configure noficaons that the firewall
generates when a Security policy rule (or
group of rules) is hit repeatedly within a
configurable me period.
If you set this privilege to read-only, the
administrator can view the Log Sengs >
Alarm Sengs for the firewall but cannot
edit the sengs.
Manage Logs Controls access to the Log Sengs > Yes Yes Yes
Manage Logs node. If you disable this
privilege, the administrator cannot see the
Log Sengs > Manage Logs node or clear
the indicated logs.
If you set this privilege to read-only, the
administrator can view the Log Sengs >
Manage Logs informaon but cannot clear
any of the logs.
Server Profiles Sets the default state to enable or disable Yes No Yes
for all of the Server Profiles sengs
described below.
SNMP Trap Controls access to the Server Profiles Yes Yes Yes
> SNMP Trap node. If you disable this
privilege, the administrator will not see
the Server Profiles > SNMP Trap node
or be able to specify one or more SNMP
trap desnaons to be used for system
log entries.
If you set this privilege to read-only, the
administrator can view the Server Profiles
PAN-OS® Administrator’s Guide Version 10.1 150 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Syslog Controls access to the Server Profiles > Yes Yes Yes
Syslog node. If you disable this privilege,
the administrator will not see the Server
Profiles > Syslog node or be able to
specify one or more syslog servers.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> Syslog informaon but cannot specify
syslog servers.
Email Controls access to the Server Profiles > Yes Yes Yes
Email node. If you disable this privilege,
the administrator will not see the Server
Profiles > Email node or be able to
configure an email profile that can be used
to enable email noficaon for system and
configuraon log entries.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> Email informaon but cannot configure
an email server profile.
HTTP Controls access to the Server Profiles > Yes Yes Yes
HTTP node. If you disable this privilege,
the administrator will not see the Server
Profiles > HTTP node or be able to
configure an HTTP server profile that can
be used to enable log forwarding to HTTP
desnaons any log entries.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> HTTP informaon but cannot configure
an HTTP server profile.
Nelow Controls access to the Server Profiles > Yes Yes Yes
Nelow node. If you disable this privilege,
the administrator will not see the Server
Profiles > Nelow node or be able to
define a NetFlow server profile, which
specifies the frequency of the export
along with the NetFlow servers that will
receive the exported data.
PAN-OS® Administrator’s Guide Version 10.1 151 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
RADIUS Controls access to the Server Profiles > Yes Yes Yes
RADIUS node. If you disable this privilege,
the administrator will not see the Server
Profiles > RADIUS node or be able to
configure sengs for the RADIUS servers
that are idenfied in authencaon
profiles.
If you set this privilege to read-only,
the administrator can view the Server
Profiles > RADIUS informaon but cannot
configure sengs for the RADIUS servers.
TACACS+ Controls access to the Server Profiles > Yes Yes Yes
TACACS+ node.
If you disable this privilege, the
administrator will not see the node
or configure sengs for the TACACS
+ servers that authencaon profiles
reference.
If you set this privilege to read-only, the
administrator can view exisng TACACS
+ server profiles but cannot add or edit
them.
LDAP Controls access to the Server Profiles > Yes Yes Yes
LDAP node. If you disable this privilege,
the administrator will not see the Server
Profiles > LDAP node or be able to
configure sengs for the LDAP servers
to use for authencaon by way of
authencaon profiles.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> LDAP informaon but cannot configure
sengs for the LDAP servers.
PAN-OS® Administrator’s Guide Version 10.1 152 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
SAML Identy Controls access to the Server Profiles Yes Yes Yes
Provider > SAML Identy Provider node. If you
disable this privilege, the administrator
cannot see the node or configure SAML
identy provider (IdP) server profiles.
If you set this privilege to read-only, the
administrator can view the Server Profiles
> SAML Identy Provider informaon but
cannot configure SAML IdP server profiles.
Local User Sets the default state to enable or disable Yes No Yes
Database for all of the Local User Database sengs
described below.
PAN-OS® Administrator’s Guide Version 10.1 153 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
User Groups Controls access to the Local User Yes Yes Yes
Database > Users node. If you disable this
privilege, the administrator will not see
the Local User Database > Users node or
be able to add user group informaon to
the local database.
If you set this privilege to read-only, the
administrator can view the Local User
Database > Users informaon but cannot
add user group informaon to the local
database.
Access Domain Controls access to the Access Domain Yes Yes Yes
node. If you disable this privilege, the
administrator will not see the Access
Domain node or be able to create or edit
an access domain.
If you set this privilege to read-only,
the administrator can view the Access
Domain informaon but cannot create or
edit an access domain.
PAN-OS® Administrator’s Guide Version 10.1 154 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Dynamic Updates Controls access to the Dynamic Updates Yes Yes Yes
node. If you disable this privilege, the
administrator will not see the Dynamic
Updates node or be able to view the latest
updates, read the release notes for each
update, or select an update to upload and
install.
If you set this privilege to read-only, the
administrator can view the available
Dynamic Updates releases, read the
release notes but cannot upload or install
the soware.
PAN-OS® Administrator’s Guide Version 10.1 155 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Master Key and Controls access to the Master Key and Yes Yes Yes
Diagnoscs Diagnoscs node. If you disable this
privilege, the administrator will not see
the Master Key and Diagnoscs node or
be able to specify a master key to encrypt
private keys on the firewall.
If you set this privilege to read-only,
the administrator can view the Master
Key and Diagnoscs node and view
informaon about master keys that have
been specified but cannot add or edit a
new master key configuraon.
Policy Controls access to IoT and SaaS policy rule Yes Yes Yes
Recommendaon recommendaons. If you disable these
privileges, the administrator can’t see the
Policy Recommendaon > IoT node, the
Policy Recommendaon > SaaS node, or
both, depending on which privileges you
disable.
If you set these privileges to read-only,
the administrator can view the nodes
but cannot import policy rules or edit
informaon.
Privacy Sets the default state to enable or disable Yes N/A Yes
for all of the privacy sengs described
below.
PAN-OS® Administrator’s Guide Version 10.1 156 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Show Full IP When disabled, full IP addresses obtained Yes N/A Yes
addresses by traffic running through the Palo Alto
firewall are not shown in logs or reports.
In place of the IP addresses that are
normally displayed, the relevant subnet is
displayed.
View PCAP Files When disabled, packet capture files that Yes N/A Yes
are normally available within the Traffic,
PAN-OS® Administrator’s Guide Version 10.1 157 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Save For Other When disabled, an administrator cannot Yes N/A Yes
Admins save changes that other administrators
made to the firewall configuraon.
PAN-OS® Administrator’s Guide Version 10.1 158 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Global Sets the default state to enable or disable Yes N/A Yes
for all of the global sengs described
below. In effect, this seng is only for
System Alarms at this me.
PAN-OS® Administrator’s Guide Version 10.1 159 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 160 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 161 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 162 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 163 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
An administrator
with Device
Deployment
privileges can sll
select Panorama
> Device
Deployment to
install updates on
managed firewalls.
PAN-OS® Administrator’s Guide Version 10.1 164 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
An administrator
with Device
Deployment
privileges can sll
use the Panorama
> Device
Deployment
opons to
install updates
on managed
collectors.
PAN-OS® Administrator’s Guide Version 10.1 165 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 166 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Log Sets the default state, enabled Panorama: Yes Yes No Yes
Sengs or disabled, for all the log
Device Group/
seng privileges.
Template: No
PAN-OS® Administrator’s Guide Version 10.1 167 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
This privilege
pertains only to
System logs that
Panorama and
Log Collectors
generate. The
Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
System logs that
Log Collectors
receive from
firewalls. The
Device > Log
Sengs >
System privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregaon on
Log Collectors).
PAN-OS® Administrator’s Guide Version 10.1 168 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
This privilege
pertains only to
Config logs that
Panorama and
Log Collectors
generate. The
Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
Config logs that
Log Collectors
receive from
firewalls. The
Device > Log
Sengs >
Configuraon
privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregaon on
Log Collectors).
PAN-OS® Administrator’s Guide Version 10.1 169 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
This privilege
pertains only
to User-ID logs
that Panorama
generates.
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for
User-ID logs that
Log Collectors
receive from
firewalls. The
Device > Log
Sengs > User-
ID privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregaon on
Log Collectors).
HIP Match Specifies whether the Panorama: Yes Yes Yes Yes
administrator can see and
Device Group/
configure the sengs that
Template: No
control the forwarding of HIP
Match logs from a Panorama
virtual appliance in Legacy
mode to external services
(syslog, email, SNMP trap, or
HTTP servers).
If you set this privilege to read-
only, the administrator can see
the forwarding sengs of HIP
Match logs but can’t manage
them.
PAN-OS® Administrator’s Guide Version 10.1 170 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
The Collector
Groups privilege
(Panorama
> Collector
Groups) controls
forwarding for HIP
Match logs that
Log Collectors
receive from
firewalls. The
Device > Log
Sengs > HIP
Match privilege
controls log
forwarding from
firewalls directly
to external
services (without
aggregaon on
Log Collectors).
PAN-OS® Administrator’s Guide Version 10.1 171 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 172 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 173 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 174 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 175 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Server Sets the default state, enabled Panorama: Yes Yes No Yes
Profiles or disabled, for all the server
Device Group/
profile privileges.
Template: No
PAN-OS® Administrator’s Guide Version 10.1 176 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
SNMP Trap Specifies whether the Panorama: Yes Yes Yes Yes
administrator can see and
Device Group/
configure SNMP trap server
Template: No
profiles.
If you set this privilege to read-
only, the administrator can see
SNMP trap server profiles but
can’t manage them.
If you disable this privilege,
the administrator can’t see
or manage SNMP trap server
profiles.
PAN-OS® Administrator’s Guide Version 10.1 177 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 178 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 179 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 180 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 181 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Device Sets the default state, enabled Panorama: Yes Yes No Yes
Deployment or disabled, for all the privileges
Device Group/
associated with deploying
Template: Yes
licenses and soware or
content updates to firewalls
and Log Collectors.
PAN-OS® Administrator’s Guide Version 10.1 182 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 183 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 184 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Reboot Restart the firewall. The firewall logs out Yes N/A Yes
all users, reloads the PAN-OS soware
and acve configuraon, closes and
logs exisng sessions, and creates a
system log entry that shows the name
of the administrator that iniated the
reboot. This access also affects Shutdown
operaons.
PAN-OS® Administrator’s Guide Version 10.1 185 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Generate Tech Generate a tech support system file that Yes N/A Yes
Support File the Palo Alto Networks support team can
use to troubleshoot issues that you may
be experiencing with the firewall.
Generate Stats Generate and download a set of XML Yes N/A Yes
Dump File reports that summarizes network traffic
over the last seven days for the firewall.
PAN-OS® Administrator’s Guide Version 10.1 186 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 187 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 188 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Force Template This privilege controls access to the Force Yes No Yes
Values Template Values opon in the Push Scope
Selecon dialog.
PAN-OS® Administrator’s Guide Version 10.1 189 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
PAN-OS® Administrator’s Guide Version 10.1 190 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
22 TCP Used for communicaon from a client system to the firewall CLI
interface.
80 TCP The port the firewall listens on for Online Cerficate Status
Protocol (OCSP) updates when acng as an OCSP responder.
443 TCP Used for communicaon from a client system to the firewall web
interface. This is also the port the firewall and User-ID agent
listens on for updates when you Enable VM Monitoring to Track
Changes on the Virtual Network.
For monitoring an AWS environment, this is the only port that is
used.
For monitoring a VMware vCenter/ESXi environment, the
listening port defaults to 443, but it is configurable.
PAN-OS® Administrator’s Guide Version 10.1 191 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
162 UDP Port the firewall, Panorama, or a Log Collector uses to Forward
Traps to an SNMP Manager.
161 UDP Port the firewall listens on for polling requests (GET messages)
from the SNMP manager.
514 TCP Port that the firewall, Panorama, or a Log Collector uses to
send logs to a syslog server if you Configure Syslog Monitoring,
514 UDP
and the ports that the PAN-OS integrated User-ID agent or
6514 SSL Windows-based User-ID agent listens on for authencaon
syslog messages.
2055 UDP Default port the firewall uses to send NetFlow records to a
NetFlow collector if you Configure NetFlow Exports, but this is
configurable.
5008 TCP Port the GlobalProtect Mobile Security Manager listens on for HIP
requests from the GlobalProtect gateways.
If you are using a third-party MDM system, you can configure the
gateway to use a different port as required by the MDM vendor.
10443 SSL Port that the firewall and Panorama use to provide contextual
informaon about a threat or to seamlessly shi your threat
invesgaon to the Threat Vault and AutoFocus.
PAN-OS® Administrator’s Guide Version 10.1 192 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
session. The HA3 link is a Layer 2 (MAC-in-MAC) link and it does not support Layer 3 addressing
or encrypon.
28769 TCP Used for the HA1 control link for clear text communicaon
between the HA peer firewalls. The HA1 link is a Layer 3 link and
28260 TCP
requires an IP address.
28 TCP Used for the HA1 control link for encrypted communicaon (SSH
over TCP) between the HA peer firewalls.
28771 TCP Used for heartbeat backups. Palo Alto Networks recommends
enabling heartbeat backup on the MGT interface if you use an in-
band port for the HA1 or the HA1 backup links.
PAN-OS® Administrator’s Guide Version 10.1 193 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
28443 TCP Used for managed devices (firewalls and Log Collectors) to
retrieve soware and content updates from Panorama.
28769 (5.1 TCP Used for the HA connecvity and synchronizaon between
and later) Panorama HA peers using clear text communicaon.
TCP
Communicaon can be iniated by either peer.
28260 (5.0
TCP
and later)
49160 (5.0
and earlier)
PAN-OS® Administrator’s Guide Version 10.1 194 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
2049 TCP Used by the Panorama virtual appliance to write logs to the
NFS datastore.
23000 to TCP, UDP, or Used for Syslog communicaon between Panorama and
23999 SSL the Traps ESM components.
4501 UDP Used for IPSec tunnel connecons between GlobalProtect apps
and gateways.
For ps on how to use a loopback interface to provide access to GlobalProtect on different ports
and addresses, refer to Can GlobalProtect Portal Page be Configured tobe Accessed on any Port?
PAN-OS® Administrator’s Guide Version 10.1 195 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
389 TCP Port the firewall uses to connect to an LDAP server (plaintext or
Start Transport Layer Security (Start TLS) to Map Users to Groups.
3268 TCP Port the firewall uses to connect to an Acve Directory global
catalog server (plaintext or Start TLS) to Map Users to Groups.
636 TCP Port the firewall uses for LDAP over SSL connecons with an
LDAP server to Map Users to Groups.
3269 TCP Port the firewall uses for LDAP over SSL connecons with an
Acve Directory global catalog server to Map Users to Groups.
514 TCP Port the User-ID agent listens on for authencaon syslog
messages if you Configure User-ID to Monitor Syslog Senders
6514 UDP
for User Mapping. The port depends on the type of agent and
SSL protocol:
• PAN-OS integrated User-ID agent—Port 6514 for SSL and port
514 for UDP.
• Windows-based User-ID agent—Port 514 for both TCP and
UDP.
5007 TCP Port the firewall listens on for user mapping informaon from
the User-ID or Terminal Server agent. The agent sends the IP
address and username mapping along with a mestamp whenever
it learns of a new or updated mapping. In addion, it connects to
the firewall at regular intervals to refresh known mappings.
5006 TCP Port the User-ID agent listens on for XML API requests. The
source for this communicaon is typically the system running a
script that invokes the API.
1812 UDP Port the User-ID agent uses to authencate to a RADIUS server.
135 TCP Port the User-ID agent uses to establish TCP-based WMI
connecons with the Microso Remote Procedure Call (RPC)
Endpoint Mapper. The Endpoint Mapper then assigns the agent
a randomly assigned port in the 49152-65535 port range. The
agent uses this connecon to make RPC queries for Exchange
Server or AD server security logs, session tables. This is also the
port used to access Terminal Servers.
PAN-OS® Administrator’s Guide Version 10.1 196 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
139 TCP Port the User-ID agent uses to establish TCP-based NetBIOS
connecons to the AD server so that it can send RPC queries for
security logs and session informaon.
The User-ID agent also uses this port to connect to client systems
for NetBIOS probing (supported on the Windows-based User-ID
agent only).
445 TCP Port the User-ID agent uses to connect to the Acve Directory
(AD) using TCP-based SMB connecons to the AD server for
access to user logon informaon (print spooler and Net Logon).
5985 HTTP Port the User-ID agent uses to monitor security logs and session
informaon with the WinRM protocol over HTTP.
5986 HTTPS Port the User-ID agent uses to monitor security logs and session
informaon with the WinRM protocol over HTTPS.
5009 TCP Port the firewall uses to connect to the Terminal Server Agent.
500 UDP Port used by IKE on the management plane to connect with
remote IKE peers.
4500 UDP Port used by IKE on the management plane to connect with
remote IKE peers.
PAN-OS® Administrator’s Guide Version 10.1 197 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
2049 TCP/UDP Port used for the Network File System (NFS).
PAN-OS® Administrator’s Guide Version 10.1 198 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
28260 TCP Port used by internal sysd IPC communicaon for internal
processes.
PAN-OS® Administrator’s Guide Version 10.1 199 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
If your computer does not have a 9-pin serial port, use a USB-to-serial port
connector.
2. Enter your login credenals.
3. Enter the following CLI command:
debug system maintenance-mode
The firewall will reboot in the maintenance mode.
PAN-OS® Administrator’s Guide Version 10.1 200 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Kingston
• Kingston SE9 8GB (2.0)
• Kingston SE9 16GB (3.0)
• Kingston SE9 32GB (3.0)
SanDisk
• SanDisk Cruzer Fit CZ33 8GB (2.0)
• SanDisk Cruzer Fit CZ33 16GB (2.0)
• SanDisk Cruzer CZ36 16GB (2.0)
• SanDisk Cruzer CZ36 32GB (2.0)
• SanDisk Extreme CZ80 32GB (3.0)
Silicon Power
• Silicon Power Jewel 32GB (3.0)
• Silicon Power Blaze 16GB (3.0)
PNY
• PNY Aache 16GB (2.0)
PAN-OS® Administrator’s Guide Version 10.1 201 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
type=static type=dhcp-client
ip-address=10.5.107.19 ip-address=
default-gateway=10.5.107.1 default-gateway=
netmask=255.255.255.0 netmask=
ipv6-address=2001:400:f00::1/64 ipv6-address=
ipv6-default- ipv6-default-gateway=
gateway=2001:400:f00::2 hostname=Ca-FW-DC1
hostname=Ca-FW-DC1 panorama-server=10.5.107.20
panorama-server=10.5.107.20 panorama-server-2=10.5.107.21
panorama-server-2=10.5.107.21 tplname=FINANCE_TG4
tplname=FINANCE_TG4 dgname=finance_dg
dgname=finance_dg dns-primary=10.5.6.6
dns-primary=10.5.6.6 dns-secondary=10.5.6.7
dns-secondary=10.5.6.7 op-command-modes=multi-
op-command-modes=multi- vsys,jumbo-frame
vsys,jumbo-frame dhcp-send-hostname=yes
dhcp-send-hostname=no dhcp-send-client-id=yes
dhcp-send-client-id=no dhcp-accept-server-
dhcp-accept-server-hostname=no hostname=yes
dhcp-accept-server-domain=no dhcp-accept-server-domain=yes
The following table describes the fields in the init-cfg.txt file. The type is required; if the type is
stac, the IP address, default gateway and netmask are required, or the IPv6 address and IPv6
default gateway are required.
Field Descripon
ip-address (Required for IPv4 stac management address) IPv4 address. The
firewall ignores this field if the type is dhcp-client.
PAN-OS® Administrator’s Guide Version 10.1 202 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
Field Descripon
netmask (Required for IPv4 stac management address) IPv4 netmask. The
firewall ignores this field if the type is dhcp-client.
ipv6-address (Required for IPv6 stac management address) IPv6 address and /
prefix length of the management interface. The firewall ignores this
field if the type is dhcp-client.
dhcp-send-hostname (DHCP client type only) The DHCP server determines a value of yes
or no. If yes, the firewall sends its hostname to the DHCP server.
dhcp-send-client-id (DHCP client type only) The DHCP server determines a value of yes
or no. If yes, the firewall sends its client ID to the DHCP server.
dhcp-accept-server- (DHCP client type only) The DHCP server determines a value of
hostname yes or no. If yes, the firewall accepts its hostname from the DHCP
server.
dhcp-accept-server- (DHCP client type only) The DHCP server determines a value of
domain yes or no. If yes, the firewall accepts its DNS server from the DHCP
server.
PAN-OS® Administrator’s Guide Version 10.1 203 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 3 | Acvate authorizaon codes on the Customer Support portal, which creates license keys.
1. Go to support.paloaltonetworks.com, log in, and select the Assets > Devices on the le-
hand navigaon pane.
2. For each device S/N you just registered, click the Acon link (the pencil icon).
3. Under Acvate Licenses, select Acvate Auth-Code.
4. Enter the Authorizaon code and click Agree and Submit.
If the init-cfg.txt file is missing, the bootstrap process will fail and the firewall will boot
up with the default configuraon in the normal boot-up sequence.
There are no spaces between the key and value in each field; do not add spaces because they
cause failures during parsing on the management server side.
You can have mulple init-cfg.txt files—one each for different remote sites—by prepending the
S/N to the file name. For example:
0008C200105-init-cfg.txt
0008C200107-init-cfg.txt
If no prepended filename is present, the firewall uses the init-cfg.txt file and proceeds with
bootstrapping.
PAN-OS® Administrator’s Guide Version 10.1 204 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 7 | Create and download the bootstrap bundle from the Customer Support portal.
For a physical firewall, the bootstrap bundle requires only the /license and /config directories.
Use one of the following methods to create and download the bootstrap bundle:
• Use Method 1 to create a bootstrap bundle specific to a remote site (you have only one init-
cfg.txt file).
• Use Method 2 to create one bootstrap bundle for mulple sites.
Method 1
1. On your local system, go to support.paloaltonetworks.com and log in.
2. Select Assets.
3. Select the S/N of the firewall you want to bootstrap.
4. Select Bootstrap Container.
5. Click Select.
6. Upload and Open the init-cfg.txt file you created.
7. (Oponal) Select the bootstrap.xml file you created and Upload Files.
You must use a bootstrap.xml file from a firewall of the same model and PAN-OS
version.
8. Select Bootstrap Container Download to download a tar.gz file named bootstrap_<S/
N>_<date>.tar.gz to your local system. This bootstrap container includes the license
keys associated with the S/N of the firewall.
Method 2
Create a tar.gz file on your local system with two top-level directories: /license and /config.
Include all licenses and all init-cfg.txt files with S/Ns prepended to the filenames.
The license key files you download from the Customer Support portal have the S/N in the
license file name. PAN-OS checks the S/N in the file name against the firewall S/N while
execung the bootstrap process.
PAN-OS® Administrator’s Guide Version 10.1 205 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 8 | Import the tar.gz file you created (to a firewall running a PAN-OS 7.1.0 or later image) using
Secure Copy (SCP) or TFTP.
Access the CLI and enter one of the following commands:
• tftp import bootstrap-bundle file <path and filename> from <host IP
address>
For example:
tftp import bootstrap-bundle file /home/userx/bootstrap/devices/
pa5000.tar.gz from 10.1.2.3
• scp import bootstrap-bundle from <<user>@<host>:<path to file>>
For example:
scp import bootstrap-bundle from [email protected]:/home/userx/
bootstrap/devices/pa200_bootstrap_bundle.tar.gz
Microso Windows and Apple Mac operang systems are unable to read the bootstrap
USB flash drive because the drive is formaed using an ext4 file system. You must install
third-party soware or use a Linux system to read the USB drive.
STEP 1 | The firewall must be in a factory default state or must have all private data deleted.
PAN-OS® Administrator’s Guide Version 10.1 206 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 2 | To ensure connecvity with your corporate headquarters, cable the firewall by connecng
the management interface (MGT) using an Ethernet cable to one of the following:
• An upstream modem
• A port on the switch or router
• An Ethernet jack in the wall
STEP 3 | Insert the USB flash drive into the USB port on the firewall and power on the firewall. The
factory default firewall bootstraps itself from the USB flash drive.
The firewall Status light turns from yellow to green when the firewall is configured; autocommit
is successful.
STEP 4 | Verify bootstrap compleon. You can see basic status logs on the console during the
bootstrap and you can verify that the process is complete.
1. If you included Panorama values (panorama-server, tplname, and dgname) in your init-
cfg.txt file, check Panorama managed devices, device group, and template name.
2. Verify the general system sengs and configuraon by accessing the web interface and
selecng Dashboard > Widgets > System or by using the CLI operaonal commands
show system info and show config running.
3. Verify the license installaon by selecng Device > Licenses or by using the CLI
operaonal command request license info.
4. If you have Panorama configured, manage the content versions and soware versions
from Panorama. If you do not have Panorama configured, use the web interface to
manage content versions and soware versions.
PAN-OS® Administrator’s Guide Version 10.1 207 ©2022 Palo Alto Networks, Inc.
Firewall Administraon
STEP 5 | (Panorama managed firewalls only) Create a device registraon authencaon key and add it
to the firewall.
This is required to successfully add a bootstrapped firewall to Panorama management. The
device registraon authencaon key has a finite lifeme and including the device registraon
authencaon key in the init-cfg.txt file is not supported.
1. Log in to the Panorama web interface.
2. Select Panorama > Device Registraon Auth Key and Add a new authencaon key.
3. Configure the authencaon key.
• Name—Add a descripve name for the authencaon key.
• Lifeme—Specify the key lifeme to limit how long you can use the authencaon
key to onboard new firewalls.
• Count—Specify how many mes you can use the authencaon key to onboard new
firewalls.
• Device Type—Specify that this authencaon key is used to authencate only a
Firewall.
You can select Any to use the device registraon authencaon key to
onboard firewalls, Log Collectors, and WildFire appliances.
• (Oponal) Devices—Enter one or more device serial numbers to specify for which
firewalls the authencaon key is valid.
4. Click OK.
When prompted, Copy Auth Key and Close.
5. Log in to the firewall web interface.
You can also log in to the firewall CLI to add the device registraon
authencaon key.
6. Select Device > Setup > Management and edit the Panorama Sengs.
7. Paste the device registraon authencaon key you copied in the previous step and click
OK.
8. Commit.
9. Log in to the Panorama web interface and select Panorama > Managed Devices >
Summary to verify the firewall is Connected to Panorama
PAN-OS® Administrator’s Guide Version 10.1 208 ©2022 Palo Alto Networks, Inc.
Device Telemetry
Device telemetry collects data about your next-generaon firewall or Panorama, and
shares it with Palo Alto Networks by uploading the data to Cortex Data Lake. This data
is used to power telemetry apps, and for sharing threat intelligence.
209
Device Telemetry
Telemetry data is collected and stored locally on your device for a limited period of me. This data
is shared with Palo Alto Networks only if you configure a desnaon region for the data. If your
organizaon has a Cortex Data Lake license, then you can only send the data to the same region
as where your Cortex Data Lake instance resides. If your organizaon does not have a Cortex Data
Lake license, then you must install a device cerficate in order to share this data. In this case, you
can choose any available region, although you must conform to all applicable local laws regarding
privacy and data storage.
Telemetry data is collected and shared with Palo Alto Networks on predefined collecon intervals.
You can control whether data is collected and shared by enabling/disabling categories of data. You
can also monitor the current status of data collecon and transmission.
Finally, you can obtain a live sample of the data that your firewall is collecng for telemetry
purposes. For a complete descripon of all the telemetry metrics that can be shared with Palo Alto
Networks, including the privacy implicaon for each metric, see the PAN-OS Device Telemetry
Metrics Reference Guide.
The automacally created user _cliadmin may appear under Logged in Admins on the
dashboard while telemetry is enabled. This user is created only for telemetry collecon.
PAN-OS® Administrator’s Guide Version 10.1 210 ©2022 Palo Alto Networks, Inc.
Device Telemetry
PAN-OS® Administrator’s Guide Version 10.1 211 ©2022 Palo Alto Networks, Inc.
Device Telemetry
STEP 4 | In Telemetry Desnaon, select your region. If your organizaon is using Cortex Data Lake,
you must use the region that your Cortex Data Lake is configured to use.
STEP 5 | Any telemetry data currently stored in Cortex Data Lake is automacally purged one year
aer your firewall uploaded it. Oponally, if you do not want the data to reside in Cortex
PAN-OS® Administrator’s Guide Version 10.1 212 ©2022 Palo Alto Networks, Inc.
Device Telemetry
Data Lake for this amount of me aer you disable telemetry, open a support cket and ask
Palo Alto Networks to purge your telemetry data.
STEP 2 | Click the Service Route Configuraon link under Services Features.
Only enter public IP addresses when tesng. Public IP address are dynamic and may be
subject to change.
Some common Palo Alto Network Service Desnaons for Cortex Data Lake may include:
• api.paloaltonetworks.com
• apitrusted.paloaltonetworks.com
• lic.lc.prod.us.cs.paloaltonetworks.com (if US based)
• storage.googeapis.com
• br-prd1.us.cdl.paloaltonetworks.com (if US based)
Review the FQDNs required for Cortex Data Lake for your specific locale.
You can find the licensing desnaon using the
STEP 6 | Choose the custom Source Interface you want to route the telemetry traffic through.
PAN-OS® Administrator’s Guide Version 10.1 213 ©2022 Palo Alto Networks, Inc.
Device Telemetry
STEP 7 | Choose the custom Source Address associated with the interface.
The image below shows a sample configuraon based on common Cortex Data Lake FQDNs.
PAN-OS® Administrator’s Guide Version 10.1 214 ©2022 Palo Alto Networks, Inc.
Device Telemetry
To stop sharing all device telemetry, uncheck the Enable Telemetry box, and then commit
your change.
PAN-OS® Administrator’s Guide Version 10.1 215 ©2022 Palo Alto Networks, Inc.
Device Telemetry
If you have a 10.1 firewall and this telemetry sharing is turned off, but you want to share this data
with Palo Alto Networks, then you can turn it on using:
You can see whether your device is collecng and sharing this historical telemetry data using the
following CLI command:
PAN-OS® Administrator’s Guide Version 10.1 216 ©2022 Palo Alto Networks, Inc.
Device Telemetry
In the event of a failure, your device will retry the send aempt at the next transmission me. If
the problem persists, check to make sure that your devices are properly configured to send data to
Cortex Data Lake:
• If your organizaon has a Cortex Data Lake license, then make sure your Cortex Data Lake
license has been acvated, and that your firewall is configured to use Cortex Data Lake.
• If your organizaon does not have a Cortex Data Lake license, then make sure you have
installed a device cerficate, and that your network is configured to allow traffic to Cortex
Data Lake.
PAN-OS® Administrator’s Guide Version 10.1 217 ©2022 Palo Alto Networks, Inc.
Device Telemetry
The data collecon will take a few minutes, depending on the speed of your firewall. When the
process completes, click Download Device Telemetry Data. The telemetry bundle is a compressed
tar ball, and it is placed in your default browser download directory.
For a descripon of every metric that device telemetry collects and shares with Palo Alto
Networks, see the PAN-OS Device Telemetry Metrics Reference Guide.
PAN-OS® Administrator’s Guide Version 10.1 218 ©2022 Palo Alto Networks, Inc.
Authencaon
Authencaon is a method for protecng services and applicaons by verifying the
idenes of users so that only legimate users have access. Several firewall and
Panorama features require authencaon. Administrators authencate to access the
web interface, CLI, or XML API of the firewall and Panorama. End users authencate
through Authencaon Portal or GlobalProtect to access various services and
applicaons. You can choose from several authencaon services to protect your
network and to accommodate your exisng security infrastructure while ensuring a
smooth user experience.
If you have a public key infrastructure, you can deploy cerficates to enable
authencaon without users having to manually respond to login challenges (see
Cerficate Management). Alternavely, or in addion to cerficates, you can
implement interacve authencaon, which requires users to authencate using
one or more methods. The following topics describe how to implement, test, and
troubleshoot the different types of interacve authencaon:
> Authencaon Types > Configure LDAP Authencaon
> Plan Your Authencaon > Connecon Timeouts for
Deployment Authencaon Servers
> Configure Mul-Factor > Configure Local Database
Authencaon Authencaon
> Configure SAML Authencaon > Configure an Authencaon Profile
> Configure Kerberos Single Sign-On and Sequence
219
Authencaon
Authencaon Types
• External Authencaon Services
• Mul-Factor Authencaon
• SAML
• Kerberos
• TACACS+
• RADIUS
• LDAP
• Local Authencaon
Mul-Factor Authencaon
You can Configure Mul-Factor Authencaon (MFA) to ensure that each user authencates using
mulple methods (factors) when accessing highly sensive services and applicaons. For example,
you can force users to enter a login password and then enter a verificaon code that they receive
by phone before allowing access to important financial documents. This approach helps to prevent
aackers from accessing every service and applicaon in your network just by stealing passwords.
PAN-OS® Administrator’s Guide Version 10.1 220 ©2022 Palo Alto Networks, Inc.
Authencaon
Of course, not every service and applicaon requires the same degree of protecon, and MFA
might not be necessary for less sensive services and applicaons that users access frequently.
To accommodate a variety of security needs, you can Configure Authencaon Policy rules that
trigger MFA or a single authencaon factor (such as login credenals or cerficates) based on
specific services, applicaons, and end users.
When choosing how many and which types of authencaon factors to enforce, it’s important
to understand how policy evaluaon affects the user experience. When a user requests a service
or applicaon, the firewall first evaluates Authencaon policy. If the request matches an
Authencaon policy rule with MFA enabled, the firewall displays a Authencaon Portal web
form so that users can authencate for the first factor. If authencaon succeeds, the firewall
displays an MFA login page for each addional factor. Some MFA services prompt the user
to choose one factor out of two to four, which is useful when some factors are unavailable. If
authencaon succeeds for all factors, the firewall evaluates Security policy for the requested
service or applicaon.
To reduce the frequency of authencaon challenges that interrupt the user workflow,
configure the first factor to use Kerberos or SAML single sign-on (SSO) authencaon.
To implement MFA for GlobalProtect, refer to Configure GlobalProtect to facilitate mul-
factor authencaon noficaons.
You cannot use MFA authencaon profiles in authencaon sequences.
For end-user authencaon via Authencaon Policy, the firewall directly integrates with several
MFA plaorms (Duo v2, Okta Adapve, PingID, and RSA SecurID), as well as integrang through
RADIUS or SAML for all other MFA plaorms. For remote user authencaon to GlobalProtect
portals and gateways and for administrator authencaon to the Panorama and PAN-OS web
interface, the firewall integrates with MFA vendors using RADIUS and SAML only.
The firewall supports the following MFA factors:
Factor Descripon
Short message An SMS message on the endpoint device prompts the user to allow
service (SMS) or deny authencaon. In some cases, the endpoint device provides a
code that the user must enter in the MFA login page.
PAN-OS® Administrator’s Guide Version 10.1 221 ©2022 Palo Alto Networks, Inc.
Authencaon
SAML
You can use Security Asseron Markup Language (SAML) 2.0 to authencate administrators who
access the firewall or Panorama web interface and end users who access web applicaons that
are internal or external to your organizaon. In environments where each user accesses many
applicaons and authencang for each one would impede user producvity, you can configure
SAML single sign-on (SSO) to enable one login to access mulple applicaons. Likewise, SAML
single logout (SLO) enables a user to end sessions for mulple applicaons by logging out of just
one session. SSO is available to administrators who access the web interface and to end users
who access applicaons through GlobalProtect or Authencaon Portal. SLO is available to
administrators and GlobalProtect end users, but not to Authencaon Portal end users. When you
configure SAML authencaon on the firewall or on Panorama, you can specify SAML aributes
for administrator authorizaon. SAML aributes enable you to quickly change the roles, access
domains, and user groups of administrators through your directory service, which is oen easier
than reconfiguring sengs on the firewall or Panorama.
Administrators cannot use SAML to authencate to the CLI on the firewall or Panorama.
You cannot use SAML authencaon profiles in authencaon sequences.
SAML authencaon requires a service provider (the firewall or Panorama), which controls access
to applicaons, and an identy provider (IdP) such as PingFederate, which authencates users.
When a user requests a service or applicaon, the firewall or Panorama intercepts the request and
redirects the user to the IdP for authencaon. The IdP then authencates the user and returns
a SAML asseron, which indicates authencaon succeeded or failed. SAML Authencaon for
Authencaon Portal End Users illustrates SAML authencaon for an end user who accesses
applicaons through Authencaon Portal.
Kerberos
Kerberos is an authencaon protocol that enables a secure exchange of informaon between
pares over an insecure network using unique keys (called ckets) to idenfy the pares. The
PAN-OS® Administrator’s Guide Version 10.1 222 ©2022 Palo Alto Networks, Inc.
Authencaon
firewall and Panorama support two types of Kerberos authencaon for administrators and end
users:
• Kerberos server authencaon—A Kerberos server profile enables users to navely
authencate to an Acve Directory domain controller or a Kerberos V5-compliant
authencaon server. This authencaon method is interacve, requiring users to enter
usernames and passwords. For the configuraon steps, see Configure Kerberos Server
Authencaon.
• Kerberos single sign-on (SSO)—A network that supports Kerberos V5 SSO prompts a user to
log in only for inial access to the network (such as logging in to Microso Windows). Aer this
inial login, the user can access any browser-based service in the network (such as the firewall
web interface) without having to log in again unl the SSO session expires. (Your Kerberos
administrator sets the duraon of SSO sessions.) If you enable both Kerberos SSO and another
external authencaon service (such as a TACACS+ server), the firewall first tries SSO and, only
if that fails, falls back to the external service for authencaon. To support Kerberos SSO, your
network requires:
• A Kerberos infrastructure, including a key distribuon center (KDC) with an authencaon
server (AS) and cket-granng service (TGS).
• A Kerberos account for the firewall or Panorama that will authencate users. An account
is required to create a Kerberos keytab, which is a file that contains the principal name and
hashed password of the firewall or Panorama. The SSO process requires the keytab.
For the configuraon steps, see Configure Kerberos Single Sign-On.
Kerberos SSO is available only for services and applicaons that are internal to your
Kerberos environment. To enable SSO for external services and applicaons, use SAML.
TACACS+
Terminal Access Controller Access-Control System Plus (TACACS+) is a family of protocols
that enable authencaon and authorizaon through a centralized server. TACACS+ encrypts
usernames and passwords, making it more secure than RADIUS, which encrypts only passwords.
TACACS+ is also more reliable because it uses TCP, whereas RADIUS uses UDP. You can configure
TACACS+ authencaon for end users or administrators on the firewall and for administrators
on Panorama. Oponally, you can use TACACS+ Vendor-Specific Aributes (VSAs) to manage
administrator authorizaon. TACACS+ VSAs enable you to quickly change the roles, access
domains, and user groups of administrators through your directory service instead of reconfiguring
sengs on the firewall and Panorama.
The firewall and Panorama support the following TACACS+ aributes and VSAs. Refer to your
TACACS+ server documentaon for the steps to define these VSAs on the TACACS+ server.
Name Value
PAN-OS® Administrator’s Guide Version 10.1 223 ©2022 Palo Alto Networks, Inc.
Authencaon
Name Value
RADIUS
Remote Authencaon Dial-In User Service (RADIUS) is a broadly supported networking
protocol that provides centralized authencaon and authorizaon. You can configure RADIUS
authencaon for end users or administrators on the firewall and for administrators on Panorama.
Oponally, you can use RADIUS Vendor-Specific Aributes (VSAs) to manage administrator
authorizaon. RADIUS VSAs enable you to quickly change the roles, access domains, and user
groups of administrators through your directory service instead of reconfiguring sengs on the
firewall and Panorama. You can also configure the firewall to use a RADIUS server for:
• Collecng VSAs from GlobalProtect endpoints.
• Implemenng Mul-Factor Authencaon.
When sending authencaon requests to a RADIUS server, the firewall and Panorama use the
authencaon profile name as the network access server (NAS) idenfier, even if the profile is
assigned to an authencaon sequence for the service (such as administrave access to the web
interface) that iniates the authencaon process.
The firewall and Panorama support the following RADIUS VSAs. To define VSAs on a RADIUS
server, you must specify the vendor code (25461 for Palo Alto Networks firewalls or Panorama)
and the VSA name and number. Some VSAs also require a value. Refer to your RADIUS server
documentaon for the steps to define these VSAs.
Alternavely, you can download the Palo Alto Networks RADIUS diconary, which defines
the authencaon aributes that the Palo Alto Networks firewall and a RADIUS server use to
PAN-OS® Administrator’s Guide Version 10.1 224 ©2022 Palo Alto Networks, Inc.
Authencaon
communicate with each other, and install it on your RADIUS server to map the aributes to the
RADIUS binary data.
When you predefine dynamic administrator roles for users on the server, use lower-case to
specify the role (for example, enter superuser, not SuperUser).
When configuring the advanced vendor opons on a Cisco Secure Access Control Server
(ACS), you must set both the Vendor Length Field Size and Vendor Type Field Size to 1.
Otherwise, authencaon will fail.
PaloAlto-Client-OS 8
PaloAlto-Client-Hostname 9
PaloAlto-GlobalProtect-Client- 10
Version
PAN-OS® Administrator’s Guide Version 10.1 225 ©2022 Palo Alto Networks, Inc.
Authencaon
LDAP
Lightweight Directory Access Protocol (LDAP) is a standard protocol for accessing informaon
directories. You can Configure LDAP Authencaon for end users and for firewall and Panorama
administrators.
Configuring the firewall to connect to an LDAP server also enables you to define policy rules
based on users and user groups instead of just IP addresses. For the steps, see Map Users to
Groups and Enable User- and Group-Based Policy.
Local Authencaon
Although the firewall and Panorama provide local authencaon for administrators and end
users, External Authencaon Services are preferable in most cases because they provide
central account management. However, you might require special user accounts that you don’t
manage through the directory servers that your organizaon reserves for regular accounts. For
example, you might define a superuser account that is local to the firewall so that you can access
the firewall even if the directory server is down. In such cases, you can use the following local
authencaon methods:
• (Firewall only) Local database authencaon—To Configure Local Database Authencaon,
you create a database that runs locally on the firewall and contains user accounts (usernames
and passwords or hashed passwords) and user groups. This type of authencaon is useful
for creang user accounts that reuse the credenals of exisng Unix accounts in cases where
you know only the hashed passwords, not the plaintext passwords. Because local database
authencaon is associated with authencaon profiles, you can accommodate deployments
where different sets of users require different authencaon sengs, such as Kerberos
single sign-on (SSO) or Mul-Factor Authencaon (MFA). (For details, see Configure an
Authencaon Profile and Sequence). For administrator accounts that use an authencaon
profile, password complexity and expiraon sengs are not applied. This authencaon
method is available to administrators who access the firewall (but not Panorama) and end users
who access services and applicaons through Authencaon Portal or GlobalProtect.
• Local authencaon without a database—You can configure firewall administrave accounts
or Panorama administrave accounts without creang a database of users and user groups
that runs locally on the firewall or Panorama. Because this method is not associated with
authencaon profiles, you cannot combine it with Kerberos SSO or MFA. However, this is
the only authencaon method that allows password profiles, which enable you to associate
individual accounts with password expiraon sengs that differ from the global sengs. (For
details, see Define password complexity and expiraon sengs)
PAN-OS® Administrator’s Guide Version 10.1 226 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 227 ©2022 Palo Alto Networks, Inc.
Authencaon
your most sensive services and applicaons, you can configure Mul-Factor Authencaon
(MFA) to ensure that each user authencates using mulple methods (factors) when accessing
those services and applicaons. To accommodate a variety of security needs, Configure
Authencaon Policy rules that trigger MFA or single factor authencaon (such as login
credenals or cerficates) based on specific services, applicaons, and end users. Other ways
to reduce your aack surface include network segmentaon and user groups for allowed
applicaons.
For administrators only, consider:
Do you use an external server to centrally manage authorizaon for all administrave
accounts? By defining Vendor-Specific Aributes (VSAs) on the external server, you can quickly
change administrave role assignments through your directory service instead of reconfiguring
sengs on the firewall. VSAs also enable you to specify access domains for administrators
of firewalls with mulple virtual systems. SAML, TACACS+, and RADIUS support external
authorizaon.
PAN-OS® Administrator’s Guide Version 10.1 228 ©2022 Palo Alto Networks, Inc.
Authencaon
Palo Alto Networks provides support for MFA vendors through Applicaons content
updates. This means that if you use Panorama to push device group configuraons
to firewalls, you must install the same Applicaons updates on the firewalls as on
Panorama to avoid mismatches in vendor support.
MFA vendor API integraons are supported for end-user authencaon through
Authencaon Policy only. For remote user authencaon to GlobalProtect portals or
gateways or for administrator authencaon to the PAN-OS or Panorama web interface,
you can only use MFA vendors supported through RADIUS or SAML; MFA services through
vendor APIs are not supported in these use cases.
STEP 1 | Configure Authencaon Portal in Redirect mode to display a web form for the first
authencaon factor, to record authencaon mestamps, and to update user mappings.
STEP 2 | Configure one of the following server profiles to define how the firewall will connect to the
service that authencates users for the first authencaon factor.
• Add a RADIUS server profile. This is required if the firewall integrates with an MFA
vendor through RADIUS. In this case, the MFA vendor provides the first and all addional
authencaon factors, so you can skip the next step (configuring an MFA server profile).
If the firewall integrates with an MFA vendor through an API, you can sll use a RADIUS
server profile for the first factor but MFA server profiles are required for the addional
factors.
• Add a SAML IdP server profile.
• Add a Kerberos server profile.
• Add a TACACS+ server profile.
• Add an LDAP server profile.
In most cases, an external service is recommended for the first authencaon factor.
However, you can configure Configure Local Database Authencaon as an
alternave.
PAN-OS® Administrator’s Guide Version 10.1 229 ©2022 Palo Alto Networks, Inc.
Authencaon
through vendor APIs. You can specify up to three addional factors. Each MFA vendor provides
one factor, though some vendors let users choose one factor out of several.
1. Select Device > Server Profiles > Mul Factor Authencaon and Add a profile.
2. Enter a Name to idenfy the MFA server.
3. Select the Cerficate Profile that the firewall will use to validate the MFA server
cerficate when establishing a secure connecon to the MFA server.
4. Select the MFA Vendor you deployed.
5. Configure the Value of each vendor aribute.
The aributes define how the firewall connects to the MFA server. Each vendor Type
requires different aributes and values; refer to your vendor documentaon for details.
6. Click OK to save the profile.
PAN-OS® Administrator’s Guide Version 10.1 230 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 231 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 8 | Configure a Security policy rule that allows users to access the services and applicaons that
require authencaon.
1. Create a Security Policy Rule.
2. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 232 ©2022 Palo Alto Networks, Inc.
Authencaon
(OTP) authencaon method. If you select push, your phone prompts you to approve the
authencaon.
The Palo Alto Networks next-generaon firewall integrates with the RSA SecurID Access
Cloud Authencaon Service. The MFA API integraon with RSA SecurID is supported
for cloud-based services only and does not support two-factor authencaon for the on-
premise Authencaon Manager when the second factor uses the Vendor Specific API.
The minimum content version required for this integraon is 752 and PAN-OS 8.0.2.
PAN-OS® Administrator’s Guide Version 10.1 233 ©2022 Palo Alto Networks, Inc.
Authencaon
Console and configure the RSA Access ID, the authencaon service URL, and the client API key
that the firewall needs to authencate to and interact with the service. The firewall also needs the
Access Policy ID that uses either the RSA Approve or RSA Tokencode authencaon method to
authencate to the identy source.
Generate the RSA SecurID API key—Log on to RSA SecurID Access Console and select My
Account > Company Sengs > Authencaon API Keys. Add a new key and then Save
Sengs and Publish Changes.
Get the RSA SecurID Access endpoint API (Authencaon Service Domain) to which the
firewall must connect—Select Plaorm > Identy Routers, pick an Identy Router to Edit
and jot down the Authencaon Service Domain. In this example it is hps://rsaready.auth-
demo.auth.
Get the Access Policy ID—Select Access > Policies and jot down the name of the access policy
that will allow the firewall to act as an authencaon client to the RSA SecurID service. The
policy must be configured to use either the RSA Approve or the RSA Tokencode authencaon
methods only.
PAN-OS® Administrator’s Guide Version 10.1 234 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 2 | Configure Authencaon Portal (Device > User Idenficaon > Authencaon Portal
Sengs) in Redirect mode to display a web form for authencang to RSA SecureID. Make
sure to specify the Redirect Host as an IP address or a hostname (with no periods in its name)
that resolves to the IP address of the Layer 3 interface on the firewall to which web requests
are redirected.
PAN-OS® Administrator’s Guide Version 10.1 235 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 3 | Configure a mul-factor authencaon server profile to specify how the firewall must
connect with the RSA SecurID cloud service (Device > Server Profiles > Mul Factor
Authencaon and click Add).
1. Enter a Name to idenfy the MFA server profile.
2. Select the Cerficate Profile that you created earlier, rsa-cert-profile in this example. The
firewall will use this cerficate when establishing a secure connecon with RSA SecurID
cloud service.
3. In the MFA Vendor drop-down, select RSA SecurID Access.
4. Configure the Value for each aribute that you noted in Get the RSA SecurID Access
Cloud Authencaon Service Details:
• API Host—Enter the hostname or IP address of the RSA SecurID Access API endpoint
to which the firewall must connect, rsaready.auth-demo.auth in this example.
• Base URI —Do not modify the default value (/mfa/v1_1)
• Client Key—Enter the RSA SecurID Client Key.
• Access ID—Enter the RSA SecurID Access ID.
• Assurance Policy—Enter the RSA SecurID Access Policy name, mfa-policy in this
example.
• Timeout—The default is 30 seconds.
PAN-OS® Administrator’s Guide Version 10.1 236 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 4 | Configure an authencaon profile (Device > Authencaon Profile and click Add).
The profile defines the order of the authencaon factors that users must respond to.
1. Select the Type for the first authencaon factor and select the corresponding Server
Profile.
2. Select Factors, Enable Addional Authencaon Factors, and Add the rsa-mfa server
profile you created earlier in this example.
STEP 5 | Configure an authencaon enforcement object. (Objects > Authencaon and click Add).
Make sure to select the authencaon profile you just defined called RSA in this example.
STEP 6 | Configure an Authencaon policy rule. (Policies > Authencaon and click Add)
Your authencaon policy rule must match the services and applicaons you want to protect,
specify the users who must authencate, and include the authencaon enforcement object
that triggers the authencaon profile. In this example, RSA SecurID Access authencates all
users who accessing HTTP, HTTPS, SSH, and VNC traffic with the authencaon enforcement
PAN-OS® Administrator’s Guide Version 10.1 237 ©2022 Palo Alto Networks, Inc.
Authencaon
object called RSA Auth Enforcement (in Acons, select the Authencaon Enforcement
object).
PAN-OS® Administrator’s Guide Version 10.1 238 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 8 | Verify that users on your network are being secured using RSA SecurID using the Push or
PIN Code authencaon method you enabled.
1. Push authencaon
1. Ask a user on your network to launch a web browser and access a website. The
Authencaon Portal page with the IP address or hostname for the Redirect Host you
defined earlier should display.
2. Verify that the user enters the credenals for the first authencaon factor and then
connues to the secondary authencaon factor, and selects Push.
3. Check for a Sign-In request on the RSA SecurID Access applicaon on the user’s
mobile device.
4. Ask the user to Accept the Sign-In Request on the mobile device, and wait for a few
seconds for the firewall to receive the noficaon of successful authencaon. The
user should be able to access the requested website.
PAN-OS® Administrator’s Guide Version 10.1 239 ©2022 Palo Alto Networks, Inc.
Authencaon
3. Check that a PIN Code displays on the RSA SecurID Access applicaon on the user’s
mobile device.
PAN-OS® Administrator’s Guide Version 10.1 240 ©2022 Palo Alto Networks, Inc.
Authencaon
4. Ask the user to copy the PIN code in the Enter the PIN... prompt of the web browser
and click Submit. Wait for a few seconds for the firewall to receive the noficaon of
successful authencaon. The user should be able to access the requested website.
Configure Okta
Log in to the Okta Admin Portal to create your user accounts, define your Okta MFA policy, and
obtain the token informaon required to configure MFA with Okta on the firewall.
PAN-OS® Administrator’s Guide Version 10.1 241 ©2022 Palo Alto Networks, Inc.
Authencaon
3. Create a new password that includes at least 8 characters, one lowercase leer, one
uppercase leer, a number, and does not include any part of your username.
4. Select a password reminder queson and enter the answer.
5. Select a security image, then Create My Account.
PAN-OS® Administrator’s Guide Version 10.1 242 ©2022 Palo Alto Networks, Inc.
Authencaon
If you log in and are not redirected to the Okta Admin Portal, select Admin at the upper
right.
1. From the Okta Dashboard, log in with your Okta Admin credenals, then select
Applicaons > Applicaons.
PAN-OS® Administrator’s Guide Version 10.1 243 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 3 | Create one or more user groups to categorize your users (for example, by device, by policy, or
by department) and assign the Okta Verify applicaon.
1. Select Directory > Groups.
3. Enter a group Name and oponally a Group Descripon, then Add Group.
The default group Everyone includes all users configured for your organizaon
during the first step in Configure Okta.
4. Select the group you created, then select Manage Apps.
5. Assign the Okta Verify applicaon you added in Step 2.
PAN-OS® Administrator’s Guide Version 10.1 244 ©2022 Palo Alto Networks, Inc.
Authencaon
2. Enter the user’s First Name, Last Name, and Username. The username must match the
Primary email, which populates automacally, and the username entered on the firewall.
You can oponally enter an alternate email address for the user as the Secondary Email.
3. Enter the name of the group or Groups to associate with this user. When you start
typing, the group name populates automacally.
4. Check Send user acvaon email now, then Save to add a single user or Save and Add
Another to connue adding users.
PAN-OS® Administrator’s Guide Version 10.1 245 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 246 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 6 | Record the Okta authencaon token informaon in a safe place because it is only displayed
once.
1. Select Security > API > Tokens.
2. Select Create Token.
5. In the URL for the Okta Admin Dashboard, copy the poron of the URL aer https://
up to /admin to use as the API host.
6. Omit the domain okta.com from this URL to use as the Organizaon.
PAN-OS® Administrator’s Guide Version 10.1 247 ©2022 Palo Alto Networks, Inc.
Authencaon
For example, in the example Okta Admin Dashboard URL above, https://
paloaltonetworks-doc-admin.okta.com/admin/dashboard:
• The API hostname is paloaltonetworks-doc-admin.okta.com.
• The Organizaon is paloaltonetworks-doc-admin.
STEP 7 | Export all cerficates in the cerficate chain using Base-64 encoding:
1. Depending on your browser, use one of the following methods to export all cerficates
in the chain.
• Chrome—Press F12, then select Security > View Cerficate > Details > Copy to File.
• Firefox—Select Opons > Privacy & Security > View Cerficates > Export.
• Internet Explorer—Select Sengs > Internet Opons > Content > Cerficates >
Export.
2. Use the Cerficate Export Wizard to export all cerficates in the chain and select
Base-64 encoded X.509 as the format.
PAN-OS® Administrator’s Guide Version 10.1 248 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 3 | Configure Authencaon Portal using Redirect Mode to redirect users to the MFA vendor’s
challenge.
PAN-OS® Administrator’s Guide Version 10.1 249 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 4 | Enable response pages on the Interface Management Profile to redirect users to the response
page challenge.
STEP 5 | Create an Authencaon Profile and add the MFA vendor as a Factor (see Configure Mul-
Factor Authencaon, Step 3.)
PAN-OS® Administrator’s Guide Version 10.1 250 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 6 | Enable User-ID on the source zone to require idenfied users to respond to the challenge
using your MFA vendor.
STEP 7 | Create an Authencaon Enforcement Object to use the MFA vendor and create an
Authencaon policy rule (see Configure Authencaon Policy, Steps 4 and 5).
If you are using a self-signed cerficate instead of a PKI-assigned cerficate from your
organizaon, a security warning displays that users must click through to access the
challenge.
STEP 5 | Confirm users can successfully access the page aer authencang the challenge by
accepng the push noficaon on their devices.
PAN-OS® Administrator’s Guide Version 10.1 251 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 252 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 253 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 4 | Upload the configuraon file to the Duo Access Gateway (DAG).
1. In the DAG admin console, select Applicaons.
2. Click Choose File and select the configuraon file you downloaded, then Upload it.
3. In Sengs > Session Management, disable User agent binding, then Save Sengs.
PAN-OS® Administrator’s Guide Version 10.1 254 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 5 | In the DAG admin console, configure your Acve Directory or OpenLDAP server as the
authencaon source and download the metadata file.
1. Log in to the DAG admin console.
2. In Authencaon Source > Set Acve Source, select your Source type (Acve Directory
or OpenLDAP) and Set Acve Source.
3. In Configure Sources, enter the Aributes.
• For Acve Directory, enter
mail,sAMAccountName,userPrincipalName,objectGUID.
• For OpenLDAP, enter mail,uid.
• For any custom aributes, append them to the end of the list and separate each
aribute with a comma. Do not delete any exisng aributes.
4. Save Sengs to save the configuraon.
5. Select Applicaons > Metadata, then click Download XML metadata to download the
XML metadata you will need to import into the firewall.
The file will be named dag.xml. Because this file includes sensive informaon to
authencate your Duo account with the firewall, make sure to keep the file in a secure
locaon to avoid the risk of compromising this informaon.
PAN-OS® Administrator’s Guide Version 10.1 255 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 256 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 257 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 3 | Specify the authencaon sengs that the firewall uses for SAML authencaon with Duo.
1. Select Device > Setup > Management and edit the Authencaon Sengs.
2. Select Duo Access Gateway as the Authencaon Profile, then click OK.
PAN-OS® Administrator’s Guide Version 10.1 258 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 4 | Add accounts for administrators who will authencate to the firewall using Duo.
1. Select Device > Administrators and Add an account.
2. Enter a user Name.
3. Select Duo Access Gateway as the Authencaon Profile.
4. Select the Administrator Type, then click OK.
Select Role Based if you want to use a custom role for the user. Otherwise, select
Dynamic. To require administrators to log in using SSO with Duo, assign the
authencaon profile to all current administrators.
STEP 3 | Enter your login credenals on the Duo Access Gateway login page.
STEP 4 | Select an authencaon method (push noficaon, phone call, or passcode entry).
When you authencate successfully, you will be redirected to the firewall web interface.
PAN-OS® Administrator’s Guide Version 10.1 259 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 1 | Obtain the cerficates that the IdP and firewall will use to sign SAML messages.
If the cerficates don’t specify key usage aributes, all usages are allowed by default, including
signing messages. In this case, you can Obtain Cerficates by any method.
If the cerficates do specify key usage aributes, one of the aributes must be Digital
Signature, which is not available on cerficates that you generate on the firewall or Panorama.
In this case, you must import the cerficates:
• Cerficate the firewall uses to sign SAML messages—Import the cerficate from your
enterprise cerficate authority (CA) or a third-party CA.
• Cerficate the IdP uses to sign SAML messages (Required for all deployments)—Import a
metadata file containing the cerficate from the IdP (see the next step). The IdP cerficate is
limited to the following algorithms:
Public key algorithms—RSA (1,024 bits or larger) and ECDSA (all sizes). A firewall in FIPS/CC
mode supports RSA (2,048 bits or larger) and ECDSA (all sizes).
Signature algorithms—SHA1, SHA256, SHA384, and SHA512. A firewall in FIPS/CC mode
supports SHA256, SHA384, and SHA512.
PAN-OS® Administrator’s Guide Version 10.1 260 ©2022 Palo Alto Networks, Inc.
Authencaon
If the IdP doesn’t provide a metadata file, select Device > Server Profiles > SAML
Identy Provider, Add the server profile, and manually enter the informaon (consult
your IdP administrator for the values).
1. Export the SAML metadata file from the IdP to a client system from which you can
upload the metadata to the firewall.
The cerficate specified in the file must meet the requirements listed in the preceding
step. Refer to your IdP documentaon for instrucons on exporng the file.
2. Select Device > Server Profiles > SAML Identy Provider or Panorama > Server Profiles
> SAML Identy Provider on Panorama™ and Import the metadata file onto the firewall.
3. Enter a Profile Name to idenfy the server profile.
4. Browse to the Identy Provider Metadata file.
5. Select Validate Identy Provider Cerficate (default) to validate the chain of trust and
oponally the revocaon status of the IdP cerficate.
To enable this opon, a Cerficate Authority (CA) must issue your IdP’s signing
cerficate. You must create a Cerficate Profile that has the CA that issued the IdP’s
signing cerficate. In the Authencaon Profile, select the SAML Server profile and
Cerficate Profile to validate the IdP cerficate.
If your IdP signing cerficate is a self-signed cerficate, there is no chain of trust; as
a result, you cannot enable this opon. The firewall always validates the signature of
the SAML Responses or Asserons against the Identy Provider cerficate that you
configure whether or not you enable the Validate Identy Provider Cerficate opon.
If your IdP provides a self-signed cerficate, ensure that you are using PAN-OS 10.1 to
migate exposure to CVE-2020-2021.
PAN-OS® Administrator’s Guide Version 10.1 261 ©2022 Palo Alto Networks, Inc.
Authencaon
When you predefine dynamic administrator roles for users, use lower-case to
specify the role (for example, enter superreader, not SuperReader). If you
manage administrator authorizaon in the IdP identy store, specify the Admin
Role Aribute and Access Domain Aribute also.
9. Select Advanced and Add the users and user groups that are allowed to authencate
with this authencaon profile.
10. Click OK to save the authencaon profile.
STEP 4 | Assign the authencaon profile to firewall applicaons that require authencaon.
1. Assign the authencaon profile to:
• Administrator accounts that you manage locally on the firewall. In this example,
Configure a Firewall Administrator Account before you verify the SAML configuraon
later in this procedure.
• Administrator accounts that you manage externally in the IdP identy store. Select
Device > Setup > Management, edit the Authencaon Sengs, and select the
Authencaon Profile you configured.
• Authencaon policy rules that secure the services and applicaons that end users
access through Authencaon Portal. See Configure Authencaon Policy.
• GlobalProtect portals and gateways that end users access.
2. Commit your changes.
The firewall validates the Identy Provider Cerficate that you assigned to the SAML IdP
server profile.
PAN-OS® Administrator’s Guide Version 10.1 262 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 5 | Create a SAML metadata file to register the firewall applicaon (management access,
Authencaon Portal, or GlobalProtect) on the IdP.
1. Select Device > Authencaon Profile and, in the Authencaon column for the
authencaon profile you configured, click Metadata.
2. In the Service drop-down, select the applicaon you want to register:
• management (default)—Administrave access to the web interface.
• authencaon-portal—End user access to services and applicaons through
Authencaon Portal.
• global-protect—End user access to services and applicaons through GlobalProtect.
3. (Authencaon Portal or GlobalProtect only) for the Vsysname Combo, select the virtual
system in which the Authencaon Portal sengs or GlobalProtect portal are defined.
4. Enter the interface, IP address, or hostname based on the applicaon you will register:
• management—For the Management Choice, select Interface (default) and select an
interface that is enabled for management access to the web interface. The default
selecon is the IP address of the MGT interface.
• authencaon-portal—For the IP Hostname, enter the IP address or hostname of the
Redirect Host (see Device > User Idenficaon > Authencaon Portal Sengs).
• global-protect—For the IP Hostname, enter the hostname or IP address of the
GlobalProtect portal or gateway.
5. Click OK and save the metadata file to your client system.
6. Import the metadata file into the IdP server to register the firewall applicaon. Refer to
your IdP documentaon for instrucons.
PAN-OS® Administrator’s Guide Version 10.1 263 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 264 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 265 ©2022 Palo Alto Networks, Inc.
Authencaon
each keytab in the authencaon sequence unl it is able to successfully authencate using
Kerberos.
If the Kerberos SSO hostname is included in the request sent to the firewall, then
the hostname must match the service principal name of the keytab; otherwise, the
Kerberos authencaon request is not sent.
STEP 2 | Configure an Authencaon Profile and Sequence to define Kerberos sengs and other
authencaon opons that are common to a set of users.
• Enter the Kerberos Realm (usually the DNS domain of the users, except that the realm is
uppercase).
• Import the Kerberos Keytab that you created for the firewall.
STEP 3 | Assign the authencaon profile to the firewall applicaon that requires authencaon.
• Administrave access to the web interface—Configure a Firewall Administrator Account and
assign the authencaon profile you configured.
• End user access to services and applicaons—Assign the authencaon profile you
configured to an authencaon enforcement object. When configuring the object, set
the Authencaon Method to browser-challenge. Assign the object to Authencaon
PAN-OS® Administrator’s Guide Version 10.1 266 ©2022 Palo Alto Networks, Inc.
Authencaon
policy rules. For the full procedure to configure authencaon for end users, see Configure
Authencaon Policy.
PAN-OS® Administrator’s Guide Version 10.1 267 ©2022 Palo Alto Networks, Inc.
Authencaon
To use a Kerberos server for authencaon, the server must be accessible over an IPv4
address. IPv6 addresses are not supported.
If you use an FQDN address object to idenfy the server and you subsequently
change the address, you must commit the change in order for the new server
address to take effect.
4. Click OK to save your changes to the profile.
STEP 2 | Assign the server profile to an Configure an Authencaon Profile and Sequence.
The authencaon profile defines authencaon sengs that are common to a set of users.
STEP 3 | Assign the authencaon profile to the firewall applicaon that requires authencaon.
• Administrave access to the web interface—Configure a Firewall Administrator Account and
assign the authencaon profile you configured.
• End user access to services and applicaons—Assign the authencaon profile you
configured to an authencaon enforcement object and assign the object to Authencaon
policy rules. For the full procedure to configure authencaon for end users, see Configure
Authencaon Policy.
STEP 4 | Verify that the firewall can Test Authencaon Server Connecvity to authencate users.
PAN-OS® Administrator’s Guide Version 10.1 268 ©2022 Palo Alto Networks, Inc.
Authencaon
Select CHAP if the TACACS+ server supports that protocol; it is more secure
than PAP.
6. Add each TACACS+ server and enter the following:
• Name to idenfy the server
• TACACS+ Server IP address or FQDN. If you use an FQDN address object to idenfy
the server and you subsequently change the address, you must commit the change for
the new server address to take effect.
• Secret/Confirm Secret (a key to encrypt usernames and passwords)
• Server Port for authencaon requests (default is 49)
7. Click OK to save the server profile.
PAN-OS® Administrator’s Guide Version 10.1 269 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 3 | Configure the firewall to use the authencaon profile for all administrators.
1. Select Device > Setup > Management and edit the Authencaon Sengs.
2. Select the Authencaon Profile you configured and click OK.
STEP 4 | Configure the roles and access domains that define authorizaon sengs for administrators.
If you already defined TACACS+ VSAs on the TACACS+ server, the names you specify for roles
and access domains on the firewall must match the VSA values.
1. Configure an Admin Role Profile if the administrator will use a custom role instead of a
predefined (dynamic) role.
2. Configure an access domain if the firewall has more than one virtual system—Select
Device > Access Domain, Add an access domain, enter a Name to idenfy the access
domain, and Add each virtual system that the administrator will access, and then click
OK.
If you selected CHAP as the Authencaon Protocol, you must define accounts
with reversibly encrypted passwords. Otherwise, CHAP authencaon will fail.
3. Define TACACS+ VSAs for the role, access domain, and user group of each administrator.
When you predefine dynamic administrator roles for users, use lower-case to
specify the role (for example, enter superuser, not SuperUser).
PAN-OS® Administrator’s Guide Version 10.1 270 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 7 | Verify that the TACACS+ server performs authencaon and authorizaon for
administrators.
1. Log in the firewall web interface using an administrator account that you added to the
TACACS+ server.
2. Verify that you can access only the web interface pages that are allowed for the role you
associated with the administrator.
3. In the Monitor, Policies, and Objects tabs, verify that you can access only the virtual
systems that are allowed for the access domain you associated with the administrator.
PAN-OS® Administrator’s Guide Version 10.1 271 ©2022 Palo Alto Networks, Inc.
Authencaon
You can also configure client systems to send RADIUS Vendor-Specific Aributes (VSAs)
to the RADIUS server by assigning the authencaon profile to a GlobalProtect portal or
gateway. RADIUS administrators can then perform administrave tasks based on those
VSAs.
PAN-OS® Administrator’s Guide Version 10.1 272 ©2022 Palo Alto Networks, Inc.
Authencaon
If you use the server profile to integrate the firewall with an MFA service, enter
an interval that gives users enough me to authencate. For example, if the MFA
service prompts for a one-me password (OTP), users need me to see the OTP
on their endpoint device and then enter the OTP in the MFA login page.
5. Enter the number of Retries.
6. Select the Authencaon Protocol (default is PEAP-MSCHAPv2) that the firewall uses
to authencate to the RADIUS server.
Depending on which factors you want to use to authencate users within your mul-
factor authencaon (MFA) environment, select the appropriate authencaon protocol:
• Username, password, and push (an automacally triggered out-of-band request):
Supported with all authencaon protocols
• Push, password, token, and PIN (when password or token or PIN are provided
together): Supported with PAP, PEAP with GTC, and EAP-TTLS with PAP
• Username, password, token, and PIN, and challenge-response (when password or
token or PIN are provided together): Supported with PAP and PEAP with GTC
If you select an EAP authencaon method (PEAP-MSCHAPv2, PEAP with GTC,
or EAP-TTLS with PAP), confirm that your RADIUS server supports Transport Layer
Security (TLS) 1.1 or higher and that the root and intermediate cerficate authories
(CAs) for your RADIUS server are included in the cerficate profile associated with the
RADIUS server profile. If you select an EAP method and you do not associate a correctly
configured cerficate profile with the RADIUS profile, authencaon fails.
7. Add each RADIUS server and enter the following:
• Name to idenfy the server
• RADIUS Server IP address or FQDN. If you use an FQDN to idenfy the server and
you subsequently change the address, you must commit the change for the new
server address to take effect.
• Secret/Confirm Secret is a key to encrypt passwords and can be up to 64 characters
in length.
• Server Port for authencaon requests (default is 1812)
8. Click OK to save the server profile.
For redundancy, add mulple RADIUS servers in the sequence you want the firewall to use.
If you have selected an EAP method, configure an authencaon sequence to ensure that
users will be able to successfully respond to the authencaon challenge. There is no alternate
authencaon method with EAP: if the user fails the authencaon challenge and you have
PAN-OS® Administrator’s Guide Version 10.1 273 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 2 | If you are using PEAP-MSCHAPv2 with GlobalProtect, select Allow users to change
passwords aer expiry to allow GlobalProtect users to changed expired passwords to log in.
STEP 3 | (PEAP-MSCHAPv2, PEAP with GTC, or EAP-TTLS with PAP only) To anonymize the user’s
identy in the outer tunnel that is created aer authencang with the server, select Make
Outer Identy Anonymous.
You must configure the RADIUS server so that the enre chain allows access for
anonymous users. Some RADIUS server configuraons may not support anonymous
outer IDs, and you may need to clear the opon. When cleared, the RADIUS server
transmits usernames in cleartext.
STEP 6 | Configure the firewall to use the authencaon profile for all administrators.
1. Select Device > Setup > Management and edit the Authencaon Sengs.
2. Select the Authencaon Profile you configured and click OK.
STEP 7 | Configure the roles and access domains that define authorizaon sengs for administrators.
If you already defined RADIUS VSAs on the RADIUS server, the names you specify for roles
and access domains on the firewall must match the VSA values.
1. Configure an Admin Role Profile if the administrator uses a custom role instead of a
predefined (dynamic) role.
2. Configure an access domain if the firewall has more than one virtual system:
1. Select Device > Access Domain, Add an access domain, and enter a Name to idenfy
the access domain.
2. Add each virtual system that the administrator will access, and then click OK.
PAN-OS® Administrator’s Guide Version 10.1 274 ©2022 Palo Alto Networks, Inc.
Authencaon
If the RADIUS server profile specifies CHAP as the Authencaon Protocol, you
must define accounts with reversibly encrypted passwords. Otherwise, CHAP
authencaon will fail.
3. Define the vendor code for the firewall (25461) and define the RADIUS VSAs for the
role, access domain, and user group of each administrator.
When you predefine dynamic administrator roles for users, use lower-case to specify the
role (for example, enter superuser, not SuperUser).
When configuring the advanced vendor opons on the ACS, you must set both
the Vendor Length Field Size and Vendor Type Field Size to 1. Otherwise,
authencaon will fail.
4. If you have selected an EAP method, the firewall validates the server but not the client.
To ensure client validity, restrict clients by IP address or subdomain.
STEP 10 | Verify that the RADIUS server performs authencaon and authorizaon for administrators.
1. Log in the firewall web interface using an administrator account that you added to the
RADIUS server.
2. Verify that you can access only the web interface pages that are allowed for the role you
associated with the administrator.
3. In the Monitor, Policies, and Objects tabs, verify that you can access only the virtual
systems that are allowed for the access domain you associated with the administrator.
4. In Monitor > Authencaon, verify the Authencaon Protocol.
5. Test the connecon and the validity of the cerficate profile using the following CLI
command:
PAN-OS® Administrator’s Guide Version 10.1 275 ©2022 Palo Alto Networks, Inc.
Authencaon
You can also connect to an LDAP server to define policy rules based on user groups. For
details, see Map Users to Groups.
If you use an FQDN address object to idenfy the server and you subsequently
change the address, you must commit the change for the new server address to
take effect.
6. Select the server Type.
7. Select the Base DN.
To idenfy the Base DN of your directory, open the Acve Directory Domains and
Trusts Microso Management Console snap-in and use the name of the top-level
domain.
8. Enter the Bind DN and Password to enable the authencaon service to authencate
the firewall.
The Bind DN account must have permission to read the LDAP directory.
9. Enter the Bind Timeout and Search Timeout in seconds (default is 30 for both).
10. Enter the Retry Interval in seconds (default is 60).
11. Enable the opon to Require SSL/TLS secured connecon (enabled by default). The
protocol that the endpoint uses depends on the server port:
• 389 (default)—TLS (Specifically, the device uses the StartTLS operaon, which
upgrades the inial plaintext connecon to TLS.)
• 636—SSL
• Any other port—The device first aempts to use TLS. If the directory server doesn’t
support TLS, the device falls back to SSL.
12. (Oponal) For addional security, enable to the opon to Verify Server Cerficate
for SSL sessions so that the endpoint verifies the cerficate that the directory server
PAN-OS® Administrator’s Guide Version 10.1 276 ©2022 Palo Alto Networks, Inc.
Authencaon
presents for SSL/TLS connecons. To enable verificaon, you must also enable the
opon to Require SSL/TLS secured connecon. For verificaon to succeed, the
cerficate must meet one of the following condions:
• It is in the list of device cerficates: Device > Cerficate Management > Cerficates >
Device Cerficates. If necessary, import the cerficate into the device.
• The cerficate signer is in the list of trusted cerficate authories: Device >
Cerficate Management > Cerficates > Default Trusted Cerficate Authories.
13. Click OK to save the server profile.
STEP 2 | Assign the server profile to Configure an Authencaon Profile and Sequence to define
various authencaon sengs.
STEP 3 | Assign the authencaon profile to the firewall applicaon that requires authencaon.
• Administrave access to the web interface—Configure a Firewall Administrator Account
and assign the authencaon profile you configured.
• End user access to services and applicaons—For the full procedure to configure
authencaon for end users, see Configure Authencaon Policy.
STEP 4 | Verify that the firewall can Test Authencaon Server Connecvity to authencate users.
PAN-OS® Administrator’s Guide Version 10.1 277 ©2022 Palo Alto Networks, Inc.
Authencaon
Do not change the PAN-OS web server meout unless you see authencaon
failures. Seng the meout too high could degrade the performance of the firewall
or cause it to drop authencaon requests. You can review authencaon failures in
Authencaon logs.
The firewall applies an Authencaon Portal session meout that defines how long end users
can take to respond to the authencaon challenge in a Authencaon Portal web form. The
web form displays when users request services or applicaons that match an Authencaon
policy rule. The session meout is 30 seconds by default (range is 1 to 1,599,999). It must
be the same as or greater than the PAN-OS web server meout. Modify the Authencaon
Portal Session Timeout if necessary. Keep in mind that increasing the PAN-OS web server and
Authencaon Portal session meouts might degrade the performance of the firewall or cause
it to drop authencaon requests.
The Authencaon Portal session meout is not related to the mers that determine
how long the firewall retains IP address-to-username mappings.
PAN-OS® Administrator’s Guide Version 10.1 278 ©2022 Palo Alto Networks, Inc.
Authencaon
Timeouts are cumulave for authencaon sequences. For example, consider the case of
an authencaon sequence with two authencaon profiles. One authencaon profile
specifies a RADIUS server profile with a 3-second meout, 3 retries, and 4 servers. The other
authencaon profile specifies a TACACS+ server profile with a 3-second meout and 2
servers. The longest possible period in which the firewall can try to authencate user accounts
with that authencaon sequence is 42 seconds: 36 seconds for the RADIUS server profile
plus 6 seconds for the TACACS+ server profile.
The non-configurable meout for Kerberos servers is 17 seconds for each server specified in
the Kerberos server profile.
To configure the meouts and related sengs for other server types, see:
• Add an MFA server profile.
• Add a SAML IdP server profile.
• Add a TACACS+ server profile.
• Add a RADIUS server profile.
• Add an LDAP server profile.
Do not change the PAN-OS web server meout unless you see authencaon failures.
Seng the meout too high could degrade the performance of the firewall or cause it to
drop authencaon requests. You can review authencaon failures in Authencaon
logs.
STEP 2 | Set the PAN-OS web server meout by entering the following commands, where <value> is
the number of seconds (default is 30; range is 3 to 125).
> configure
# set deviceconfig setting l3-service timeout <value>
# commit
The more you raise the PAN-OS web server and Authencaon Portal session meouts,
the slower Authencaon Portal will respond to users.
STEP 1 | Select Device > Setup > Session and edit the Session Timeouts.
PAN-OS® Administrator’s Guide Version 10.1 279 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 2 | Enter a new Authencaon Portal value in seconds (default is 30; range is 1 to 1,599,999)
and click OK.
PAN-OS® Administrator’s Guide Version 10.1 280 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 5 | Verify that the firewall can Test Authencaon Server Connecvity to authencate users.
PAN-OS® Administrator’s Guide Version 10.1 281 ©2022 Palo Alto Networks, Inc.
Authencaon
If the firewall integrates with an MFA service through RADIUS, you must
add a RADIUS server profile. In this case, the MFA service provides all the
authencaon factors. If the firewall integrates with an MFA service through a
vendor API, you can sll use a RADIUS server profile for the first factor but MFA
server profiles are required for addional factors.
STEP 2 | (Local database authencaon only) Configure a user database that is local to the firewall.
Perform these steps for each user and user group for which you want to configure Local
Authencaon based on a user identy store that is local to the firewall:
1. Add the user account to the local database.
2. (Oponal) Add the user group to the local database.
STEP 3 | (Kerberos SSO only) Create a Kerberos keytab for the firewall if Kerberos single sign-on (SSO)
is the primary authencaon service.
Create a Kerberos keytab. A keytab is a file that contains Kerberos account informaon for the
firewall. To support Kerberos SSO, your network must have a Kerberos infrastructure.
PAN-OS® Administrator’s Guide Version 10.1 282 ©2022 Palo Alto Networks, Inc.
Authencaon
You can also select custom groups defined in a group mapping configuraon.
7. (Oponal) To modify the user informaon before the firewall sends the authencaon
request to the server, configure a Username Modifier.
• %USERDOMAIN%\%USERINPUT%—If the source does not include the domain
(for example, it uses the sAMAccountName), the firewall adds the User Domain you
specify before the username. If the source includes the domain, the firewall replaces
that domain with the User Domain. If the User Domain is empty, the firewall removes
PAN-OS® Administrator’s Guide Version 10.1 283 ©2022 Palo Alto Networks, Inc.
Authencaon
the domain from the user informaon that the firewall receives from source before
the firewall sends the request to the authencaon server.
PAN-OS® Administrator’s Guide Version 10.1 284 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 6 | Assign the authencaon profile or sequence to an administrave account for firewall
administrators or to Authencaon policy for end users.
• Administrators—Assign the authencaon profile based on how you manager administrator
authorizaon:
Authorizaon managed locally on the firewall—Configure a Firewall Administrator Account.
Authorizaon managed on a SAML, TACACS+, or RADIUS server—Select Device > Setup >
Management, edit the Authencaon Sengs, and select the Authencaon Profile.
• End users—For the full procedure to configure authencaon for end users, see Configure
Authencaon Policy.
STEP 7 | Verify that the firewall can Test Authencaon Server Connecvity to authencate users.
PAN-OS® Administrator’s Guide Version 10.1 285 ©2022 Palo Alto Networks, Inc.
Authencaon
STEP 3 | (Firewalls with mulple virtual systems) Define the target virtual system that the test
command will access.
This is required on firewalls with mulple virtual systems so that the test authencaon
command can locate the user you will test.
Define the target virtual system by entering:
The target-vsys opon is per login session; the firewall clears the opon when you
log off.
PAN-OS® Administrator’s Guide Version 10.1 286 ©2022 Palo Alto Networks, Inc.
Authencaon
For example, to test an authencaon profile named my-profile for a user named
bsimpson, enter:
When running the test command, the names of authencaon profiles and server
profiles are case sensive. Also, if an authencaon profile has a username modifier
defined, you must enter the modifier with the username. For example, if you add the
username modifier %USERINPUT%@%USERDOMAIN% for a user named bsimpson
and the domain name is mydomain.com, enter [email protected]
as the username. This ensures that the firewall sends the correct credenals to the
authencaon server. In this example, mydomain.com is the domain that you define in
the User Domain field in the authencaon profile.
The output results vary based on several factors related to the authencaon type that
you are tesng as well as the type of issue. For example, RADIUS and TACACS+ use
different underlying libraries, so the same issue that exists for both of these types will
produce different errors. Also, if there is a network problem, such as using an incorrect
port or IP address in the authencaon server profile, the output error is not specific.
This is because the test command cannot perform the inial handshake between the
firewall and the authencaon server to determine details about the issue.
PAN-OS® Administrator’s Guide Version 10.1 287 ©2022 Palo Alto Networks, Inc.
Authencaon
Authencaon Policy
Authencaon policy enables you to authencate end users before they can access services and
applicaons. Whenever a user requests a service or applicaon (such as by vising a web page),
the firewall evaluates Authencaon policy. Based on the matching Authencaon policy rule, the
firewall then prompts the user to authencate using one or more methods (factors), such as login
and password, Voice, SMS, Push, or One-me Password (OTP) authencaon. For the first factor,
users authencate through a Authencaon Portal web form. For any addional factors, users
authencate through a Mul-Factor Authencaon (MFA) login page.
Aer the user authencates for all factors, the firewall evaluates Security Policy to determine
whether to allow access to the service or applicaon.
To reduce the frequency of authencaon challenges that interrupt the user workflow, you can
specify a meout period during which a user authencates only for inial access to services and
applicaons, not for subsequent access. Authencaon policy integrates with Authencaon
Portal to record the mestamps used to evaluate the meout and to enable user-based policies
and reports.
Based on user informaon that the firewall collects during authencaon, User-ID creates a
new IP address-to-username mapping or updates the exisng mapping for that user (if the
mapping informaon has changed). The firewall generates User-ID logs to record the addions
and updates. The firewall also generates an Authencaon log for each request that matches an
Authencaon rule. If you favor centralized monitoring, you can configure reports based on User-
ID or Authencaon logs and forward the logs to Panorama or external services as you would for
any other log types.
• Authencaon Timestamps
• Configure Authencaon Policy
Authencaon Timestamps
When configuring an Authencaon policy rule, you can specify a meout period during which a
user authencates only for inial access to services and applicaons, not for subsequent access.
Your goal is to specify a meout that strikes a balance between the need to secure services
and applicaons and the need to minimize interrupons to the user workflow. When a user
authencates, the firewall records a mestamp for the first authencaon challenge (factor)
and a mestamp for any addional Mul-Factor Authencaon (MFA) factors. When the user
subsequently requests services and applicaons that match an Authencaon rule, the firewall
evaluates the meout specified in the rule relave to each mestamp. This means the firewall
reissues authencaon challenges on a per-factor basis when meouts expire. If you Redistribute
User Mappings and Authencaon Timestamps, all your firewalls will enforce Authencaon
policy meouts consistently for all users.
PAN-OS® Administrator’s Guide Version 10.1 288 ©2022 Palo Alto Networks, Inc.
Authencaon
The firewall records a separate mestamp for each MFA vendor. For example, if you use
Duo v2 and PingID servers to issue challenges for MFA factors, the firewall records one
mestamp for the response to the Duo factor and one mestamp for the response to the
PingID factor.
Within the meout period, a user who successfully authencates for one Authencaon rule
can access services or applicaons that other rules protect. However, this portability applies
only to rules that trigger the same authencaon factors. For example, a user who successfully
authencates for a rule that triggers TACACS+ authencaon must authencate again for a rule
that triggers SAML authencaon, even if the access requests are within the meout period for
both rules.
When evaluang the meout in each Authencaon rule and the global mer defined in the
Authencaon Portal sengs (see Configure Authencaon Portal), the firewall prompts the user
to re-authencate for whichever seng expires first. Upon re-authencang, the firewall records
new authencaon mestamps for the rules and resets the me count for the Authencaon
Portal mer. Therefore, to enable different meout periods for different Authencaon rules, set
the Authencaon Portal mer to a value that is the same as or higher than the meout in any
rule.
STEP 2 | Configure the firewall to use one of the following services to authencate users.
• External Authencaon Services—Configure a server profile to define how the firewall
connects to the service.
• Local database authencaon—Add each user account to the local user database on the
firewall.
• Kerberos single sign-on (SSO)—Create a Kerberos keytab for the firewall. Oponally, you can
configure the firewall to use Kerberos SSO as the primary authencaon service and, if SSO
failures occur, fall back to an external service or local database authencaon.
STEP 3 | Configure an Authencaon Profile and Sequence for each set of users and Authencaon
policy rules that require the same authencaon services and sengs.
Select the Type of authencaon service and related sengs:
• External service—Select the Type of external server and select the Server Profile you
created for it.
• Local database authencaon—Set the Type to Local Database. In the Advanced sengs,
Add the Authencaon Portal users and user groups you created.
• Kerberos SSO—Specify the Kerberos Realm and Import the Kerberos Keytab.
PAN-OS® Administrator’s Guide Version 10.1 289 ©2022 Palo Alto Networks, Inc.
Authencaon
PAN-OS® Administrator’s Guide Version 10.1 290 ©2022 Palo Alto Networks, Inc.
Authencaon
The firewall does not apply the Authencaon Portal meout if your authencaon
policy uses default authencaon enforcement objects (for example, default-browser-
challenge).To require users to re-authencate aer the Authencaon Portal meout,
clone the rule for the default authencaon object and move it before the exisng rule
for the default authencaon object.
PAN-OS® Administrator’s Guide Version 10.1 291 ©2022 Palo Alto Networks, Inc.
Authencaon
If you configured the firewall to use one or more MFA services, authencate for
the addional authencaon factors.
3. End the session for the service or URL you just accessed.
4. Start a new session for the same service or applicaon. Be sure to perform this step
within the Timeout period you configured in the Authencaon rule.
The firewall allows access without re-authencang.
5. Wait unl the Timeout period expires and request the same service or applicaon.
The firewall prompts you to re-authencate.
STEP 8 | (Oponal) Redistribute Data and Authencaon Timestamps to other firewalls that enforce
Authencaon policy to ensure they all apply the meouts consistently for all users.
PAN-OS® Administrator’s Guide Version 10.1 292 ©2022 Palo Alto Networks, Inc.
Authencaon
Task Command
PAN-OS® Administrator’s Guide Version 10.1 293 ©2022 Palo Alto Networks, Inc.
Authencaon
Task Command
• connection-show displays connection-debug-on |
authencaon request and response {
stascs for all authencaon servers or connection-id |
debug-prefix |
for a specific protocol type. protocol-type
Use the connection-debug opons to {
enable or disable authencaon debugging: Kerberos connection-id
<value> |
• Use the on opon to enable or the off LDAP connection-id <val
opon to disable debugging for authd. ue> |
RADIUS connection-id <v
• Use the connection-debug-on opon alue> |
to enable or the connection-debug- TACACS+ connection-id <
off opon to disable debugging for all value> |
authencaon servers or for a specific }
connection-debug-off |
protocol type.
{
connection-id |
protocol-type
{
Kerberos connection-id
<value> |
LDAP connection-id <val
ue> |
RADIUS connection-id <v
alue> |
TACACS+ connection-id <
value> |
}
connection-debug-on
}
PAN-OS® Administrator’s Guide Version 10.1 294 ©2022 Palo Alto Networks, Inc.
Cerficate Management
The following topics describe the different keys and cerficates that Palo Alto
Networks® firewalls and Panorama use, and how to obtain and manage them:
> Keys and Cerficates > Export a Cerficate and Private Key
> Default Trusted Cerficate > Configure a Cerficate Profile
Authories (CAs) > Configure an SSL/TLS Service Profile
> Cerficate Revocaon > Configure an SSH Service Profile
> Cerficate Deployment > Replace the Cerficate for Inbound
> Set Up Verificaon for Cerficate Management Traffic
Revocaon Status > Configure the Key Size for SSL
> Configure the Master Key Forward Proxy Server Cerficates
> Master Key Encrypon > Revoke and Renew Cerficates
> Obtain Cerficates > Secure Keys with a Hardware
Security Module
295
Cerficate Management
Key/Cerficate Descripon
Usage
PAN-OS® Administrator’s Guide Version 10.1 296 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Key/Cerficate Descripon
Usage
Forward Trust For outbound SSL/TLS traffic, if a firewall acng as a forward proxy
trusts the CA that signed the cerficate of the desnaon server, the
firewall uses the forward trust CA cerficate to generate a copy of the
desnaon server cerficate to present to the client. To set the private
key size, see Configure the Key Size for SSL Forward Proxy Server
Cerficates. For added security, store the key on a hardware security
module (for details, see Secure Keys with a Hardware Security Module).
Forward Untrust For outbound SSL/TLS traffic, if a firewall acng as a forward proxy
does not trust the CA that signed the cerficate of the desnaon
server, the firewall uses the forward untrust CA cerficate to generate a
copy of the desnaon server cerficate to present to the client.
SSL Inbound The keys that decrypt inbound SSL/TLS traffic for inspecon and policy
Inspecon enforcement. For this applicaon, import onto the firewall a private
key for each server that is subject to SSL/TLS inbound inspecon. See
Configure SSL Inbound Inspecon.
SSL Exclude Cerficates for servers to exclude from SSL/TLS decrypon. For
Cerficate example, if you enable SSL decrypon but your network includes
servers for which the firewall should not decrypt traffic (for example,
web services for your HR systems), import the corresponding
cerficates onto the firewall and configure them as SSL Exclude
Cerficates. See Decrypon Exclusions.
PAN-OS® Administrator’s Guide Version 10.1 297 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Key/Cerficate Descripon
Usage
Site-to-Site VPNs In a site-to-site IPSec VPN deployment, peer devices use Internet Key
(IKE) Exchange (IKE) gateways to establish a secure channel. IKE gateways
use cerficates or preshared keys to authencate the peers to each
other. You configure and assign the cerficates or keys when defining
an IKE gateway on a firewall. See Site-to-Site VPN Overview.
Master Key The firewall uses a master key to encrypt all private keys and
passwords. If your network requires a secure locaon for storing private
keys, you can use an encrypon (wrapping) key stored on a hardware
security module (HSM) to encrypt the master key. For details, see
Encrypt a Master Key Using an HSM.
Secure Syslog The cerficate to enable secure connecons between the firewall and a
syslog server. See Syslog Field Descripons.
Trusted Root CA The designaon for a root cerficate issued by a CA that the firewall
trusts. The firewall can use a self-signed root CA cerficate to
automacally issue cerficates for other applicaons (for example, SSL
Forward Proxy).
Also, if a firewall must establish secure connecons with other firewalls,
the root CA that issues their cerficates must be in the list of trusted
root CAs on the firewall.
PAN-OS® Administrator’s Guide Version 10.1 298 ©2022 Palo Alto Networks, Inc.
Cerficate Management
The only addional CAs you might want to add are trusted enterprise CAs that your organizaon
requires—see Obtain Cerficates.
PAN-OS® Administrator’s Guide Version 10.1 299 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Cerficate Revocaon
Palo Alto Networks firewalls and Panorama use digital cerficates to ensure trust between pares
in a secure communicaon session. Configuring a firewall or Panorama to check the revocaon
status of cerficates provides addional security. A party that presents a revoked cerficate is not
trustworthy. When a cerficate is part of a chain, the firewall or Panorama checks the status of
every cerficate in the chain except the root CA cerficate, for which it cannot verify revocaon
status.
Various circumstances can invalidate a cerficate before the expiraon date. Some examples are
a change of name, change of associaon between subject and cerficate authority (for example,
an employee terminates employment), and compromise (known or suspected) of the private key.
Under such circumstances, the cerficate authority that issued the cerficate must revoke it.
The firewall and Panorama support the following methods for verifying cerficate revocaon
status. If you configure both methods, the firewall or Panorama first tries the OCSP method; if the
OCSP server is unavailable, it uses the CRL method.
• Cerficate Revocaon List (CRL)
• Online Cerficate Status Protocol (OCSP)
If you configure mulple CRL distribuon points (CDPs) and the firewall cannot reach the
first CDP, the firewall does not check the remaining CDPs. To redirect invalid CRL requests,
configure a DNS proxy as an alternate server.
To use CRLs for verifying the revocaon status of cerficates used for the decrypon of inbound
and outbound SSL/TLS traffic, see Configure Revocaon Status Verificaon of Cerficates Used
for SSL/TLS Decrypon.
To use CRLs for verifying the revocaon status of cerficates that authencate users and devices,
configure a cerficate profile and assign it to the interfaces that are specific to the applicaon:
Authencaon Portal, GlobalProtect (remote user-to-site or large scale), site-to-site IPSec VPN,
or web interface access to Palo Alto Networks firewalls or Panorama. For details, see Configure
Revocaon Status Verificaon of Cerficates.
PAN-OS® Administrator’s Guide Version 10.1 300 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 301 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Cerficate Deployment
The basic approaches to deploy cerficates for Palo Alto Networks firewalls or Panorama are:
• Obtain cerficates from a trusted third-party CA—The benefit of obtaining a cerficate from
a trusted third-party cerficate authority (CA) such as VeriSign or GoDaddy is that end clients
will already trust the cerficate because common browsers include root CA cerficates from
well-known CAs in their trusted root cerficate stores. Therefore, for applicaons that require
end clients to establish secure connecons with the firewall or Panorama, purchase a cerficate
from a CA that the end clients trust to avoid having to pre-deploy root CA cerficates to
the end clients. (Some such applicaons are a GlobalProtect portal or GlobalProtect Mobile
Security Manager.) However, most third-party CAs cannot issue signing cerficates. Therefore,
this type of cerficate is not appropriate for applicaons (for example, SSL/TLS decrypon and
large-scale VPN) that require the firewall to issue cerficates. See Obtain a Cerficate from an
External CA.
• Obtain cerficates from an enterprise CA—Enterprises that have their own internal CA can use
it to issue cerficates for firewall applicaons and import them onto the firewall. The benefit is
that end clients probably already trust the enterprise CA. You can either generate the needed
cerficates and import them onto the firewall, or generate a cerficate signing request (CSR)
on the firewall and send it to the enterprise CA for signing. The benefit of this method is that
the private key does not leave the firewall. An enterprise CA can also issue a signing cerficate,
which the firewall uses to automacally generate cerficates (for example, for GlobalProtect
large-scale VPN or sites requiring SSL/TLS decrypon). See Import a Cerficate and Private
Key.
• Generate self-signed cerficates—You can Create a Self-Signed Root CA Cerficate on the
firewall and use it to automacally issue cerficates for other firewall applicaons.
If you use this method to generate cerficates for an applicaon that requires an end
client to trust the cerficate, end users will see a cerficate error because the root
CA cerficate is not in their trusted root cerficate store. To prevent this, deploy the
self-signed root CA cerficate to all end user systems. You can deploy the cerficates
manually or use a centralized deployment method such as an Acve Directory Group
Policy Object (GPO).
PAN-OS® Administrator’s Guide Version 10.1 302 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Configure an OCSP responder Cerficate Profile only when you generate a new cerficate
(Device > Cerficate Management > Cerficates). Specify the OCSP Responder when you
generate a new cerficate so that the firewall populates the Authority Informaon Access
(AIA) field with the appropriate URL and then specify the new cerficate in the Cerficate
Profile. Configuring a Cerficate Profile does not override the Cerficate Profile for exisng
cerficates or Root CAs.
You can enable OCSP validaon or override the AIA field of cerficate in the Cerficate
Profile. The Cerficate Profile configuraon determines which cerficate validaon
mechanisms are used on cerficates that authencate to services hosted on the firewall,
such as GlobalProtect.
STEP 1 | Define an external OCSP responder or configure the firewall itself as an OCSP responder.
1. Select Device > Cerficate Management > OCSP Responder and click Add.
2. Enter a Name to idenfy the responder (up to 31 characters). The name is case-sensive.
It must be unique and use only leers, numbers, spaces, hyphens, and underscores.
3. If the firewall has more than one virtual system (vsys), select a Locaon (vsys or Shared)
for the cerficate.
4. In the Host Name field, enter the host name (recommended) or IP address of the OCSP
responder. You can enter an IPv4 or IPv6 address. From this value, PAN-OS automacally
derives a URL and adds it to the cerficate being verified.
If you configure the firewall itself as an OCSP responder, the host name must resolve to
an IP address in the interface that the firewall uses for OCSP services.
5. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 303 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 2 | If you want the firewall to use the management interface for the OCSP responder interface,
enable OCSP communicaon on the firewall. Otherwise, connue to the next step to
configure an alternate interface.
1. Select Device > Setup > Interfaces > Management.
2. In the Network Services secon, select the HTTP OCSP check box, then click OK.
STEP 3 | To use an alternate interface as the OCSP responder interface, add an Interface Management
Profile to the interface used for OCSP services.
1. Select Network > Network Profiles > Interface Mgmt.
2. Click Add to create a new profile or click the name of an exisng profile.
3. Select the HTTP OCSP check box and click OK.
4. Select Network > Interfaces and click the name of the interface that the firewall will
use for OCSP services. The OCSP Host Name specified in Step 1 must resolve to an IP
address in this interface.
5. Select Advanced > Other info and select the Interface Management Profile you
configured.
6. Click OK and Commit.
PAN-OS® Administrator’s Guide Version 10.1 304 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Enabling revocaon status verificaon for SSL/TLS decrypon cerficates will add me to
the process of establishing the session. The first aempt to access a site might fail if the
verificaon does not finish before the session mes out. For these reasons, verificaon is
disabled by default.
STEP 1 | Define the service-specific meout intervals for revocaon status requests.
1. Select Device > Setup > Session and, in the Session Features secon, select Decrypon
Cerficate Revocaon Sengs.
2. Perform one or both of the following steps, depending on whether the firewall will use
Online Cerficate Status Protocol (OCSP) or the Cerficate Revocaon List (CRL) method
to verify the revocaon status of cerficates. If the firewall will use both, it first tries
OCSP; if the OCSP responder is unavailable, the firewall then tries the CRL method.
• In the CRL secon, select the Enable check box and enter the Receive Timeout. This
is the interval (1-60 seconds) aer which the firewall stops waing for a response
from the CRL service.
• In the OCSP secon, select the Enable check box and enter the Receive Timeout.
This is the interval (1-60 seconds) aer which the firewall stops waing for a response
from the OCSP responder.
Depending on the Cerficate Status Timeout value you specify in Step 2, the firewall
might register a meout before either or both of the Receive Timeout intervals pass.
STEP 2 | Define the total meout interval for revocaon status requests.
Enter the Cerficate Status Timeout. This is the interval (1-60 seconds) aer which the
firewall stops waing for a response from any cerficate status service and applies the session-
blocking logic you oponally define in Step 3. The Cerficate Status Timeout relates to the
OCSP/CRL Receive Timeout as follows:
• If you enable both OCSP and CRL—The firewall registers a request meout aer the lesser
of two intervals passes: the Cerficate Status Timeout value or the aggregate of the two
Receive Timeout values.
• If you enable only OCSP—The firewall registers a request meout aer the lesser of two
intervals passes: the Cerficate Status Timeout value or the OCSP Receive Timeout value.
• If you enable only CRL—The firewall registers a request meout aer the lesser of two
intervals passes: the Cerficate Status Timeout value or the CRL Receive Timeout value.
STEP 3 | Define the blocking behavior for unknown cerficate status or a revocaon status request
meout.
If you want the firewall to block SSL/TLS sessions when the OCSP or CRL service returns a
cerficate revocaon status of unknown, select the Block Session With Unknown Cerficate
Status check box. Otherwise, the firewall proceeds with the session.
If you want the firewall to block SSL/TLS sessions aer it registers a request meout, select
the Block Session On Cerficate Status Check Timeout check box. Otherwise, the firewall
proceeds with the session.
PAN-OS® Administrator’s Guide Version 10.1 305 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Change the default master key as soon as possible to ensure that you use a unique master
key for encrypon.
In a high availability (HA) configuraon, you must use the same master key on both firewalls
because the master key is not synchronized across HA peers. Otherwise, HA synchronizaon will
not work properly.
If you are using Panorama to manage your firewalls, you can configure the same master key on
Panorama and all managed firewalls or configure a unique master key for each managed firewall.
For managed firewalls in an HA configuraon, you must configure the same master key for each
HA peer. See Manage the Master Key from Panorama if the firewall is managed by a Panorama™
management server.
Be sure to store the master key in a safe locaon. You cannot recover the master key and the only
way to restore the default master key is to Reset the Firewall to Factory Default Sengs.
STEP 1 | Backup the configuraon.
STEP 3 | Select Device > Master Key and Diagnoscs and edit the Master Key secon.
STEP 5 | Define a new New Master Key and then Confirm New Master Key. The key must contain
exactly 16 characters.
PAN-OS® Administrator’s Guide Version 10.1 306 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 6 | To specify the master key Lifeme, enter the number of Days and/or Hours aer which the
key will expire.
You must configure a new master key before the current key expires. If the master key expires,
the firewall or Panorama automacally reboots in Maintenance mode. You must then Reset the
Firewall to Factory Default Sengs.
Set the Lifeme to two years or less, depending on how many encrypons the device
performs. The more encrypons a device performs, the shorter the Lifeme you should
set. The crical consideraon is to not run out of unique encrypons before you change
32
the master key. Each master key can provide up to 2 unique encrypons based on the
32
master key value and the Inializaon Vector (IV) value. Aer 2 unique encrypons,
encrypons repeat (are no longer unique), which is a security risk.
Set a Time for Reminder value (see next step) for the master key and when the
reminder noficaon occurs, change the master key.
STEP 7 | Enter a Time for Reminder that specifies the number of Days and Hours before the master
key expires when the firewall generates an expiraon alarm. The firewall automacally opens
the System Alarms dialog to display the alarm.
Set the reminder so that it gives you plenty of me to configure a new master key
before it expires in a scheduled maintenance window. When the Time for Reminder
expires and the firewall or Panorama sends a noficaon log, change the master key,
don’t wait for the Lifeme to expire. For grouped devices, track every device (e.g.,
firewalls that Panorama manages and firewall HA pairs) and when the reminder value
expires for the any device in the group, change the master key.
To ensure the expiraon alarm displays, select Device > Log Sengs, edit the Alarm
Sengs, and Enable Alarms.
STEP 8 | Enable Auto Renew Master Key to configure the firewall to automacally renew the master
key. To configure Auto Renew With Same Master Key, specify the number of Days and/
or Hours to renew the same master key. The key extension allows the firewall to remain
operaonal and connue securing your network; it is not a replacement for configuring a new
key if the exisng master key lifeme expires soon.
Automacally renewing the master key has benefits and risks. The benefit is that extending
the master key Lifeme protects against failure to change the master key before its lifeme
expires. The risk is that encrypons will repeat and cause a security risk if the number
PAN-OS® Administrator’s Guide Version 10.1 307 ©2022 Palo Alto Networks, Inc.
Cerficate Management
of encrypons the device performs with the master key exceeds the number of unique
32
encrypons the master key can generate (2 unique encrypons).
If the Master Key expires (you do not automacally renew it and you do not replace it
in a mely manner), the device goes into maintenance mode.
If you enable Auto Renew Master Key, set it so that the total me (lifeme plus the
auto renew me) does not cause the device to run out of unique encrypons. For
example, if you believe the device will consume the master key’s number of unique
encrypons in two and a half years, you could set the Lifeme for two years, set the
Time for Reminder to 60 days, and set the Auto Renew Master Key for 60-90 days
to provide the extra me to configure a new master key before the Lifeme expires.
However, the best pracce is sll to change the master key before the lifeme expires
to ensure that no device repeats encrypons.
Consider the number of days unl your next available maintenance window when
configuring the master key to automacally renew aer the lifeme of the key expires.
STEP 9 | (Oponal) For added security, select whether to use an HSM to encrypt the master key. For
details, see Encrypt a Master Key Using an HSM.
PAN-OS® Administrator’s Guide Version 10.1 308 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Use the same encrypon level on Panorama and its managed devices and use the same
encrypon level on firewall pairs. Upgrade devices to use the strongest possible encrypon
algorithm. If all Panorama-managed devices run PAN-OS 10.0, use AES-256-GCM on
all devices. The configuraon of managed or paired devices that use different encrypon
levels may become out of sync.
When you change the encrypon algorithm to AES-256-GCM, devices use it instead of AES-256-
CBC to encrypt sensive data. When you change from one algorithm to another, you can also
specify whether to:
• Re-encrypt exisng encrypted data with the new algorithm.
• Leave exisng data encrypted with the old encrypon algorithm and use the new algorithm
only for new (future) encrypons.
By default, when you change the encrypon algorithm, the device uses the new algorithm
to re-encrypt exisng encrypted data as well as to encrypt new data. If you manage
devices with Panorama, they may be on different versions of PAN-OS and may not support
the newest encrypon algorithms. Be sure you understand which encrypon algorithms
Panorama and its managed devices support before you change the encrypon algorithm or
re-encrypt data that has already been encrypted.
PAN-OS® Administrator’s Guide Version 10.1 309 ©2022 Palo Alto Networks, Inc.
Cerficate Management
The following operaonal CLI command changes the encrypon level and specifies whether to re-
encrypt all currently encrypted data with the new encrypon level:
Keyword Opons
PAN-OS® Administrator’s Guide Version 10.1 310 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Keyword Opons
yes = Re-encrypt currently encrypted data with the
specified algorithm and use that algorithm to encrypt
sensive data in the future.
Use the operaonal CLI command show system masterkey-properties to verify the
encrypon algorithm (level) currently configured on the device, for example:
The output shows that the current encrypon level is 1, which is AES-256-CBC.
If you downgrade to an earlier version of PAN-OS, the device automacally reverts the encrypon
algorithm to a level that the downgraded PAN-OS version supports and automacally re-encrypts
encrypted data using that level so that the device can decrypt and use the data as needed. For
example, if your device is on PAN-OS 10.1 and uses AES-256-GCM as the encrypon algorithm
(which is not supported on earlier versions of PAN-OS), and you downgrade to PAN-OS 9.1, then
the device re-encrypts the encrypted data to AES-256-CBC, which is supported in PAN-OS 9.1.
Use AES-256-GCM encrypon on both firewalls in the HA pair. Whether you use
AES-256-GCM or AES-256-CBC, use the same algorithm on both firewalls.
You do not need to disable HA to change the encrypon level on a firewall in an HA pair in which
both firewalls run PAN-OS 10.0.
PAN-OS® Administrator’s Guide Version 10.1 311 ©2022 Palo Alto Networks, Inc.
Cerficate Management
To view all of the System Logs for master key encrypon, create a filter that shows all logs of the
Type crypto: (subtype eq crypto).
PAN-OS® Administrator’s Guide Version 10.1 312 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Obtain Cerficates
• Create a Self-Signed Root CA Cerficate
• Generate a Cerficate
• Import a Cerficate and Private Key
• Obtain a Cerficate from an External CA
• Install a Device Cerficate
• Deploy Cerficates Using SCEP
On a Palo Alto Networks firewall or Panorama, you can generate self-signed cerficates
only if they are CA cerficates.
STEP 1 | Select Device > Cerficate Management > Cerficates > Device Cerficates.
STEP 2 | If the firewall has more than one virtual system (vsys), select a Locaon (vsys or Shared) for
the cerficate.
STEP 4 | Enter a Cerficate Name, such as GlobalProtect_CA. The name is case-sensive and
can have up to 63 characters on the firewall or up to 31 characters on Panorama. It must be
unique and use only leers, numbers, hyphens, and underscores.
STEP 5 | In the Common Name field, enter the FQDN (recommended) or IP address of the interface
where you will configure the service that will use this cerficate.
STEP 6 | If the firewall has more than one vsys and you want the cerficate to be available to every
vsys, select the Shared check box.
STEP 7 | Leave the Signed By field blank to designate the cerficate as self-signed.
STEP 9 | Leave the OCSP Responder field blank; revocaon status verificaon doesn’t apply to root
CA cerficates.
PAN-OS® Administrator’s Guide Version 10.1 313 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Generate a Cerficate
Palo Alto Networks firewalls and Panorama use cerficates to authencate clients, servers,
users, and devices in several applicaons, including SSL/TLS decrypon, Authencaon Portal,
GlobalProtect, site-to-site IPSec VPN, and web interface access to the firewall/Panorama.
Generate cerficates for each usage: for details, see Keys and Cerficates.
To generate a cerficate, you must first Create a Self-Signed Root CA Cerficate or import one
(Import a Cerficate and Private Key) to sign it. To use Online Cerficate Status Protocol (OCSP)
for verifying cerficate revocaon status, Configure an OCSP Responder before generang the
cerficate.
STEP 1 | Select Device > Cerficate Management > Cerficates > Device Cerficates.
STEP 2 | If the firewall has more than one virtual system (vsys), select a Locaon (vsys or Shared) for
the cerficate.
STEP 4 | Select Local (default) as the Cerficate Type unless you want to deploy SCEP cerficates to
GlobalProtect endpoints.
STEP 5 | Enter a Cerficate Name. The name is case-sensive and can have up to 63 characters on
the firewall or up to 31 characters on Panorama. It must be unique and use only leers,
numbers, hyphens, and underscores.
STEP 6 | In the Common Name field, enter the FQDN (recommended) or IP address of the interface
where you will configure the service that will use this cerficate.
STEP 7 | If the firewall has more than one vsys and you want the cerficate to be available to every
vsys, select the Shared check box.
STEP 8 | In the Signed By field, select the root CA cerficate that will issue the cerficate.
Enable this seng to prevent the private key from being exported when you export the
cerficate.
If you enable this seng, you must manually import the associated private key if you
import the cerficate to Panorama or to other firewalls. For firewalls managed by
Panorama, the private key is required to successfully push configuraon changes to
managed firewalls that you imported the cerficate to.
PAN-OS® Administrator’s Guide Version 10.1 314 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 11 | For the key generaon Algorithm, select RSA (default) or Ellipcal Curve DSA (ECDSA).
ECDSA is recommended for client browsers and operang systems that support it.
Firewalls that run PAN-OS 6.1 and earlier releases will delete any ECDSA cerficates
that you push from Panorama™, and any RSA cerficates signed by an ECDSA
cerficate authority (CA) will be invalid on those firewalls.
You cannot use a hardware security module (HSM) to store ECDSA keys used for SSL/TLS
Decrypon.
STEP 12 | Select the Number of Bits to define the cerficate key length. Higher numbers are more
secure but require more processing me.
STEP 13 | Select the Digest algorithm. From most to least secure, the opons are: sha512, sha384,
sha256 (default), sha1, and md5.
Client cerficates that are used when requesng firewall services that rely on TLSv1.2
(such as administrator access to the web interface) cannot have sha512 as a digest
algorithm. The client cerficates must use a lower digest algorithm (such as sha384) or
you must limit the Max Version to TLSv1.1 when you Configure an SSL/TLS Service
Profile for the firewall services.
STEP 14 | For the Expiraon, enter the number of days (default is 365) for which the cerficate is valid.
STEP 15 | (Oponal) Add the Cerficate Aributes to uniquely idenfy the firewall and the service that
will use the cerficate.
If you add a Host Name (DNS name) aribute, it is a best pracce for it to match the
Common Name, because the host name populates the Subject Alternate Name (SAN)
field of the cerficate and some browsers require the SAN to specify the domains
the cerficate protects; in addion, the Host Name matching the Common Name is
mandatory for GlobalProtect.
STEP 16 | Click Generate and, in the Device Cerficates page, click the cerficate Name.
Regardless of the me zone on the firewall, it always displays the corresponding
Greenwich Mean Time (GMT) for cerficate validity and expiraon dates/mes.
STEP 17 | Select the check boxes that correspond to the intended use of the cerficate on the firewall.
For example, if the firewall will use this cerficate to secure forwarding of syslogs to an
external syslog server, select the Cerficate for Secure Syslog check box.
PAN-OS® Administrator’s Guide Version 10.1 315 ©2022 Palo Alto Networks, Inc.
Cerficate Management
On a Palo Alto Networks firewall or Panorama, you can import self-signed cerficates only
if they are CA cerficates.
Instead of imporng a self-signed root CA cerficate into all the client systems, it is a best
pracce to import a cerficate from the enterprise CA because the clients will already have
a trust relaonship with the enterprise CA, which simplifies the deployment.
If the cerficate you will import is part of a cerficate chain, it is a best pracce to import
the enre chain.
STEP 1 | From the enterprise CA, export the cerficate and private key that the firewall will use for
authencaon.
When exporng a private key, you must enter a passphrase to encrypt the key for transport.
Ensure the management system can access the cerficate and key files. When imporng the
key onto the firewall, you must enter the same passphrase to decrypt it.
STEP 2 | Select Device > Cerficate Management > Cerficates > Device Cerficates.
STEP 3 | If the firewall has more than one virtual system (vsys), select a Locaon (vsys or Shared) for
the cerficate.
STEP 4 | Click Import and enter a Cerficate Name. The name is case-sensive and can have up to
63 characters on the firewall or up to 31 characters on Panorama. It must be unique and use
only leers, numbers, hyphens, and underscores.
STEP 5 | To make the cerficate available to all virtual systems, select the Shared check box. This
check box appears only if the firewall supports mulple virtual systems.
STEP 6 | Enter the path and name of the Cerficate File received from the CA, or Browse to find the
file.
(Panorama managed firewalls) You are required to Import Private Key if you enabled
Block Private Key Export when the cerficate was generated to successfully
push configuraon changes from the Panorama management server to managed
firewalls.
STEP 8 | Enter and re-enter (confirm) the Passphrase used to encrypt the private key.
STEP 9 | Click OK. The Device Cerficates page displays the imported cerficate.
PAN-OS® Administrator’s Guide Version 10.1 316 ©2022 Palo Alto Networks, Inc.
Cerficate Management
If you add a Host Name aribute, it should match the Common Name (this is
mandatory for GlobalProtect). The host name populates the Subject Alternave
Name field of the cerficate.
10. Click Generate. The Device Cerficates tab displays the CSR with a Status of pending.
PAN-OS® Administrator’s Guide Version 10.1 317 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 3 | Select Device > Setup > Management > Device Cerficate and Get cerficate.
STEP 4 | Paste the One-me Password you generated and click OK.
STEP 5 | Your next-generaon firewall successfully retrieves and installs the cerficate.
PAN-OS® Administrator’s Guide Version 10.1 318 ©2022 Palo Alto Networks, Inc.
Cerficate Management
You can use a SCEP profile with GlobalProtect to assign user-specific client cerficates to each
GlobalProtect user. In this use case, the GlobalProtect portal acts as a SCEP client to the SCEP
server in your enterprise PKI. Addionally, you can use a SCEP profile to assign client cerficates
to Palo Alto Networks devices for mutual authencaon with other Palo Alto Networks devices
for management access and inter-device communicaon.
STEP 1 | Create a SCEP profile.
1. Select Device > Cerficate Management > SCEP and then Add a new profile.
2. Enter a Name to idenfy the SCEP profile.
3. If this profile is for a firewall with mulple virtual systems capability, select a virtual
system or Shared as the Locaon where the profile is available.
STEP 2 | (Oponal) To make the SCEP-based cerficate generaon more secure, configure a SCEP
challenge-response mechanism between the PKI and portal for each cerficate request.
Aer you configure this mechanism, its operaon is invisible, and no further input from you is
necessary.
To comply with the U.S. Federal Informaon Processing Standard (FIPS), use a Dynamic SCEP
challenge and specify a Server URL that uses HTTPS.
Select one of the following opons:
• None—(Default) The SCEP server does not challenge the portal before it issues a cerficate.
• Fixed—Obtain the enrollment challenge password from the SCEP server in the PKI
infrastructure and then enter the password into the Password field.
• Dynamic—Enter a username and password of your choice (possibly the credenals
of the PKI administrator) and the SCEP Server URL where the portal-client submits
these credenals. The uses the credenals to authencate with the SCEP server
which transparently generates an OTP password for the portal upon each cerficate
request. (You can see this OTP change aer a screen refresh in The enrollment
challengepassword is field aer each cerficate request.) The PKI transparently
passes each new password to the portal, which then uses the password for its cerficate
request.
STEP 3 | Specify the sengs for the connecon between the SCEP server and the portal to enable the
portal to request and receive client cerficates.
You can include addional informaon about the client device or user by specifying tokens in
the Subject name of the cerficate.
The portal includes the token value and host ID in the CSR request to the SCEP server.
1. Configure the Server URL that the portal uses to reach the SCEP server in the PKI (for
example, http://10.200.101.1/certsrv/mscep/).
2. Enter a string (up to 255 characters in length) in the CA-IDENT Name field to idenfy
the SCEP server.
3. Enter the Subject name to use in the cerficates generated by the SCEP server. The
subject must be a disnguished name in the <attribute>=<value> format and
PAN-OS® Administrator’s Guide Version 10.1 319 ©2022 Palo Alto Networks, Inc.
Cerficate Management
must include a common name (CN) aribute (CN=<variable>). The CN supports the
following dynamic tokens:
• $USERNAME—Use this token to enable the portal to request cerficates for a specific
user. To use this variable with GlobalProtect, you must also Enable Group Mapping.
The username entered by the user must match the name in the user-group mapping
table.
• $EMAILADDRESS—Use this token to request cerficates associated with a specific
email address. To use this variable, you must also Enable Group Mapping and
configure the Mail Aributes in the Mail Domains secon of the Server Profile. If
GlobalProtect cannot idenfy an email address for the user, it generates a unique ID
and populates the CN with that value.
• $HOSTID—To request cerficates for the device only, specify the host ID token.
When a user aempts to log in to the portal, the endpoint sends idenfying
informaon that includes its host ID value. The host ID value varies by device type,
either GUID (Windows) MAC address of the interface (Mac), Android ID (Android
devices), UDID (iOS devices), or a unique name that GlobalProtect assigns (Chrome).
• $UDID—Use the UDID common name aribute to request cerficates based on
the client’s device UDID for GlobalProtect or device serial number for mutual
authencaon between Palo Alto Networks devices.
When the GlobalProtect portal pushes the SCEP sengs to the agent, the CN poron of
the subject name is replaced with the actual value (username, host ID, or email address)
of the cerficate owner (for example, O=acme,CN=johndoe).
4. Select the Subject Alternave Name Type:
Use stac entries for the Subject Alternave Name Type. The firewall does not
support dynamic tokens such as $USERNAME.
• RFC 822 Name—Enter the email name in a cerficate’s subject or Subject Alternave
Name extension.
• DNS Name—Enter the DNS name used to evaluate cerficates.
• Uniform Resource Idenfier—Enter the name of the resource from which the client
will obtain the cerficate.
• None—Do not specify aributes for the cerficate.
PAN-OS® Administrator’s Guide Version 10.1 320 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 5 | (Oponal) Configure the permied uses of the cerficate, either for signing or encrypon.
• To use this cerficate for signing, select the Use as digital signature check box. This enables
the endpoint use the private key in the cerficate to validate a digital signature.
• To use this cerficate for encrypon, select the Use for key encipherment check box. This
enables the client use the private key in the cerficate to encrypt data exchanged over the
HTTPS connecon established with the cerficates issued by the SCEP server.
STEP 6 | (Oponal) To ensure that the portal is connecng to the correct SCEP server, enter the
CA Cerficate Fingerprint. Obtain this fingerprint from the SCEP server interface in the
Thumbprint field.
1. Enter the URL for the SCEP server’s administrave UI (for example, http://
<hostname or IP>/CertSrv/mscep_admin/).
2. Copy the thumbprint and enter it in the CA Cerficate Fingerprint field.
STEP 7 | Enable mutual SSL authencaon between the SCEP server and the firewall. This is required
to comply with the U.S. Federal Informaon Processing Standard (FIPS).
FIPS-CC operaon is indicated on the firewall login page and in its status bar.
Select the SCEP server’s root CA Cerficate. Oponally, you can enable mutual SSL
authencaon between the SCEP server and the firewall by selecng a Client Cerficate.
STEP 9 | (Oponal) If aer saving the SCEP profile, the portal fails to obtain the cerficate, you can
manually generate a cerficate signing request (CSR) from the portal.
1. Select Device > Cerficate Management > Cerficates > Device Cerficates and then
click Generate.
2. Enter a Cerficate Name. This name cannot contain spaces.
3. Select the SCEP Profile to use to submit a CSR to your enterprise PKI.
4. Click OK to submit the request and generate the cerficate.
PAN-OS® Administrator’s Guide Version 10.1 321 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 2 | If the firewall has more than one virtual system (vsys), select a Locaon (a specific vsys or
Shared) for the cerficate.
STEP 3 | Select the cerficate, click Export, and select a File Format:
• Base64 Encoded Cerficate (PEM)—This is the default format. It is the most common and
has the broadest support on the Internet. If you want the exported file to include the private
key, select the Export Private Key check box.
• Encrypted Private Key and Cerficate (PKCS12)—This format is more secure than PEM but
is not as common or as broadly supported. The exported file will automacally include the
private key.
• Binary Encoded Cerficate (DER)—More operang system types support this format than
the others. You can export only the cerficate, not the key: ignore the Export Private Key
check box and passphrase fields.
STEP 4 | Enter a Passphrase and Confirm Passphrase to encrypt the private key if the File Format is
PKCS12 or if it is PEM and you selected the Export Private Key check box. You will use this
passphrase when imporng the cerficate and key into client systems.
(Panorama managed firewalls) If you enabled Block Private Key Export when you
generated or imported the cerficate, you must be sure to Import Private Key
and add the key File when you import the exported cerficate. This is required to
successfully push configuraon changes from Panorama to managed firewalls that you
imported the cerficate to.
PAN-OS® Administrator’s Guide Version 10.1 322 ©2022 Palo Alto Networks, Inc.
Cerficate Management
It is a best pracce to enable Online Cerficate Status Protocol (OCSP) and Cerficate
Revocaon List (CRL) status verificaon for cerficate profiles to verify that the cerficate
hasn’t been revoked. Enable both OCSP and CRL so that if the OCSP server isn’t available,
the firewall uses CRL. For details on these methods, see Cerficate Revocaon.
STEP 1 | Obtain the cerficate authority (CA) cerficates you will assign.
Perform one of the following steps to obtain the CA cerficates you will assign to the profile.
You must assign at least one.
• Generate a Cerficate.
• Export a cerficate from your enterprise CA and then import it onto the firewall (see step to
3).
PAN-OS® Administrator’s Guide Version 10.1 323 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 4 | Define the methods for verifying cerficate revocaon status and the associated blocking
behavior.
1. Select Use CRL and/or Use OCSP. If you select both, the firewall first tries OCSP and
falls back to the CRL method only if the OCSP responder is unavailable.
2. Depending on the verificaon method, enter the CRL Receive Timeout and/or OCSP
Receive Timeout. These are the intervals (1-60 seconds) aer which the firewall stops
waing for a response from the CRL/OCSP service.
3. Enter the Cerficate Status Timeout. This is the interval (1-60 seconds) aer which the
firewall stops waing for a response from any cerficate status service and applies any
PAN-OS® Administrator’s Guide Version 10.1 324 ©2022 Palo Alto Networks, Inc.
Cerficate Management
session-blocking logic you define. The Cerficate Status Timeout relates to the OCSP/
CRL Receive Timeout as follows:
• If you enable both OCSP and CRL—The firewall registers a request meout aer the
lesser of two intervals passes: the Cerficate Status Timeout value or the aggregate
of the two Receive Timeout values.
• If you enable only OCSP—The firewall registers a request meout aer the lesser
of two intervals passes: the Cerficate Status Timeout value or the OCSP Receive
Timeout value.
• If you enable only CRL—The firewall registers a request meout aer the lesser of two
intervals passes: the Cerficate Status Timeout value or the CRL Receive Timeout
value.
4. If you want the firewall to block sessions when the OCSP or CRL service returns a
cerficate revocaon status of unknown, select Block session if cerficate status is
unknown. Otherwise, the firewall allows the sessions.
5. If you want the firewall to block sessions aer it registers an OCSP or CRL request
meout, select Block session if cerficate status cannot be retrieved within meout.
Otherwise, the firewall allows the sessions.
6. (GlobalProtect only) If you want the firewall to block sessions when the serial number
aribute in the subject of the client cerficate does not match the host ID that the
GlobalProtect app reports for the endpoint, select Block sessions if the cerficate was
not issued to the authencang device.
PAN-OS® Administrator’s Guide Version 10.1 325 ©2022 Palo Alto Networks, Inc.
Cerficate Management
In the client systems that request firewall services, the cerficate trust list (CTL) must
include the cerficate authority (CA) cerficate that issued the cerficate specified in
the SSL/TLS service profile. Otherwise, users will see a cerficate error when requesng
firewall services. Most third-party CA cerficates are present by default in client browsers.
If an enterprise or firewall-generated CA cerficate is the issuer, you must deploy that CA
cerficate to the CTL in client browsers.
STEP 1 | For each desired service, generate or import a cerficate on the firewall (see Obtain
Cerficates).
STEP 2 | Select Device > Cerficate Management > SSL/TLS Service Profile.
STEP 3 | If the firewall has more than one virtual system (vsys), select the Locaon (vsys or Shared)
where the profile is available.
STEP 6 | Define the range of protocols that the service can use:
• For the Min Version, select the earliest allowed TLS version: TLSv1.0 (default), TLSv1.1, or
TLSv1.2.
• For the Max Version, select the latest allowed TLS version: TLSv1.0, TLSv1.1, TLSv1.2, or
Max (latest available version). The default is Max.
As a best pracce, set the Min Version to TLSv1.2 and the Max Version to Max.
On firewalls in FIPS/CC mode running PAN-OS 8.0 or a later release, TLSv1.1 is the earliest
supported TLS version; do not select TLSv1.0.
Client cerficates that are used when requesng firewall services that rely on TLSv1.2 cannot
have SHA512 as a digest algorithm. The client cerficates must use a lower digest algorithm
(such as SHA384) or you must limit the Max Version to TLSv1.1 for the firewall services.
PAN-OS® Administrator’s Guide Version 10.1 326 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 327 ©2022 Palo Alto Networks, Inc.
Cerficate Management
You can configure a maximum of four management and four HA server profiles.
To use the same SSH connecon sengs for each Dedicated Log Collector (M-series or
Panorama virtual appliance in Log Collector mode) in a Collector Group, configure an SSH
service profile from the Panorama management server, Commit the changes to Panorama,
and then Push the configuraon to the Log Collectors. You can also perform these steps
from the CLI using set log-collector-group <name> general-setting
management ssh commands.
You can configure or update an exisng management profile from your CLI.
PAN-OS® Administrator’s Guide Version 10.1 328 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 329 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 330 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 331 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 332 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 333 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 334 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 335 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 336 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 3 | Restart management SSH service from the CLI to apply the profile.
You must restart the connecon each me you apply a new profile or make changes to a profile
in use; this reboots the appliance. The new configuraons will not affect acve sessions. The
profile will apply to subsequent connecons (or sessions).
1. admin@PA-3260> set ssh service-restart mgmt
PAN-OS® Administrator’s Guide Version 10.1 337 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 338 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 339 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 340 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 341 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 342 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 343 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 344 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 345 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 3 | Restart HA1 SSH service from the CLI to apply the profile.
You must restart the connecon each me you apply a new profile or make changes to a profile
in use; this reboots the appliance. The new configuraon will not affect acve sessions. The
profile will apply to subsequent connecons (or sessions).
1. admin@PA-3260> set ssh service-restart ha
You can use the following commands if connecon between the HA pair has
been established and you’d like to minimize the downme that accompanies an
SSH service restart. If no HA connecon has been established, you must restart
SSH service.
• (HA1 Backup is configured) admin@PA-3260> request high-
availability session-reestablish
• (No HA1 Backup is configured or HA1 Backup link is down)
admin@PA-3260> request high-availability session-
reestablish force
You can force the firewall to reestablish HA1 sessions if there is no HA1
backup, which causes a brief split-brain condion between the HA peers.
(Using the force opon when an HA1 backup is configured has no effect.)
PAN-OS® Administrator’s Guide Version 10.1 346 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 1 | Obtain the cerficate that will authencate the firewall or Panorama to the client systems of
administrators.
You can simplify your Cerficate Deployment by using a cerficate that the client systems
already trust. Therefore, we recommend that you Import a Cerficate and Private Key from
your enterprise cerficate authority (CA) or Obtain a Cerficate from an External CA; the
trusted root cerficate store of the client systems is likely to already have the associated root
CA cerficate that ensures trust.
For enhanced security, we recommend that you set the Min Version (earliest allowed
TLS version) to TLSv1.2 for inbound management traffic. We also recommend that you
use a different SSL/TLS Service Profile for each firewall or Panorama service instead of
reusing this profile for all services.
PAN-OS® Administrator’s Guide Version 10.1 347 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Changing the key size seng clears the current cerficate cache.
PAN-OS® Administrator’s Guide Version 10.1 348 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Revoke a Cerficate
Various circumstances can invalidate a cerficate before the expiraon date. Some examples are
a change of name, change of associaon between subject and cerficate authority (for example,
an employee terminates employment), and compromise (known or suspected) of the private key.
Under such circumstances, the cerficate authority (CA) that issued the cerficate must revoke it.
The following task describes how to revoke a cerficate for which the firewall is the CA.
STEP 1 | Select Device > Cerficate Management > Cerficates > Device Cerficates.
STEP 2 | If the firewall supports mulple virtual systems, the tab displays a Locaon drop-down.
Select the virtual system to which the cerficate belongs.
STEP 4 | Click Revoke. PAN-OS immediately sets the status of the cerficate to revoked and adds the
serial number to the Online Cerficate Status Protocol (OCSP) responder cache or cerficate
revocaon list (CRL). You need not perform a commit.
Renew a Cerficate
If a cerficate expires, or soon will, you can reset the validity period. If an external cerficate
authority (CA) signed the cerficate and the firewall uses the Online Cerficate Status Protocol
(OCSP) to verify cerficate revocaon status, the firewall uses the OCSP responder informaon
to update the cerficate status (see Configure an OCSP Responder). If the firewall is the CA that
issued the cerficate, the firewall replaces it with a new cerficate that has a different serial
number but the same aributes as the old cerficate.
STEP 1 | Select Device > Cerficate Management > Cerficates > Device Cerficates.
STEP 2 | If the firewall has more than one virtual system (vsys), select a Locaon (vsys or Shared) for
the cerficate.
PAN-OS® Administrator’s Guide Version 10.1 349 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Downgrading HSM servers might not be an opon aer you upgrade them.
PAN-OS® Administrator’s Guide Version 10.1 350 ©2022 Palo Alto Networks, Inc.
Cerficate Management
HSM configuraons are not synchronized between high availability (HA) firewall peers.
Consequently, you must configure the HSM separately on each peer. In acve/passive HA
configuraons, you must manually perform one failover to individually configure and
authencate each HA peer to the HSM. Aer this inial manual failover, user interacon is
not required for failover to funcon properly.
PAN-OS® Administrator’s Guide Version 10.1 351 ©2022 Palo Alto Networks, Inc.
Cerficate Management
should use a SafeNet cluster only when you want to replicate the keys across the cluster.
Alternavely, you can add up to 16 SafeNet HSM servers to funcon independently.
1. Enter a Module Name (an ASCII string of up to 31 characters) for the HSM server.
2. Enter an IPv4 address for the HSM Server Address.
4. (HA only) Select High Availability, specify the Auto Recovery Retry value (maximum
number of mes the HSM client tries to recover its connecon to an HSM server before
failing over to an HSM HA peer server; range is 0 to 500; default is 0), and enter a High
Availability Group Name (an ASCII string up to 31 characters long).
If you configure two or more HSM servers, the best pracce is to enable High
Availability. Otherwise the firewall does not use the addional HSM servers.
5. Click OK and Commit your changes.
STEP 2 | (Oponal) Configure a service route to connect to the HSM if you don’t want the firewall to
connect through the Management interface (default).
If you configure a service route for the HSM, running the clear session all
CLI command clears all exisng HSM sessions, which brings all HSM states down and
then up again. During the several seconds required for HSM to recover, all SSL/TLS
operaons will fail.
1. Select Device > Setup > Services and click Service Route Configuraon.
2. Customize a service route. The IPv4 tab is acve by default.
3. Click HSM in the Service column.
4. Select a Source Interface for the HSM.
5. Click OK and Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 352 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 4 | Register the firewall as an HSM client with the HSM server and assign the firewall to a
paron on the HSM server.
If the HSM has a firewall with the same <cl-name> already registered, you must first
remove the duplicate registraon by running the client delete -client <cl-
name> command, where <cl-name> is the name of the registered client (firewall) you
want to delete.
STEP 6 | (HA only) Repeat the previous authencaon, registraon, and paron connecon steps to
add another HSM to the exisng HA group.
If you remove an HSM from your configuraon, repeat the previous paron
connecon step to remove the deleted HSM from the HA group.
PAN-OS® Administrator’s Guide Version 10.1 353 ©2022 Palo Alto Networks, Inc.
Cerficate Management
Connect client version on your firewalls is compable with your nShield Connect server, see Set
Up Connecvity with an HSM.
Before the HSM and firewalls connect, the HSM authencates the firewalls based on their IP
addresses. Therefore, you must configure the firewalls to use stac IP addresses—not dynamic
addresses assigned through DHCP. (Operaons on the HSM stop working if a firewall IP address
changes during runme).
HSM configuraons are not synchronized between high availability (HA) firewall peers.
Consequently, you must configure the HSM separately on each peer. In acve/passive HA
configuraons, you must manually perform one failover to individually configure and
authencate each HA peer to the HSM. Aer this inial manual failover, user interacon is
not required for failover to funcon properly.
STEP 1 | Define connecon sengs for each nCipher nShield Connect HSM.
1. Log in to the firewall web interface and select Device > Setup > HSM.
2. Edit the Hardware Security Module Provider sengs and set the Provider Configured to
nShield Connect.
3. Add each HSM server as follows. An HA HSM configuraon requires two servers.
1. Enter a Module Name for the HSM server. This can be any ASCII string of up to 31
characters.
2. Enter an IPv4 address for the HSM Server Address.
4. Enter an IPv4 address for the Remote Filesystem Address.
5. Click OK and Commit your changes.
STEP 2 | (Oponal) Configure a service route to connect to the HSM if you don’t want the firewall to
connect through the Management interface (default).
If you configure a service route for the HSM, running the clear session all
CLI command clears all exisng HSM sessions, which brings all HSM states down and
then up again. During the several seconds required for HSM to recover, all SSL/TLS
operaons will fail.
1. Select Device > Setup > Services and click Service Route Configuraon.
2. Customize a service route. The IPv4 tab is acve by default.
3. Click HSM in the Service column.
4. Select a Source Interface for the HSM.
5. Click OK and Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 354 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 3 | Register the firewall as an HSM client with the HSM server.
This step briefly describes the procedure for using the front panel interface of the nShield
Connect HSM. For more details, refer to nCipher documentaon.
1. Log in to the front panel display of the nCipher nShield Connect HSM.
2. Use the right-hand navigaon buon to select System > System configuraon > Client
config > New client.
3. Enter the firewall IP address.
4. Select System > System configuraon > Client config > Remote file system and enter
the IP address of the client computer where you set up the RFS.
anonkneti 192.0.2.1
B1E2-2D4C-E6A2 5a2e5107e70d525615a903f6391ad72b1c03352c
The <ip-address> is the IP address of the HSM, <ESN> is the electronic serial number, and
<hash-Kne-key> is the hash of the KNETI key.
The following example uses the values obtained in this procedure:
4. Use the following command to permit HSM client submissions on the RFS:
PAN-OS® Administrator’s Guide Version 10.1 355 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 6 | Synchronize the firewall with the RFS by selecng Device > Setup > HSM and Synchronize
with Remote Filesystem.
PAN-OS® Administrator’s Guide Version 10.1 356 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 2 | Specify the key that is currently used to encrypt all of the private keys and passwords on the
firewall in the Master Key field.
STEP 3 | If changing the master key, enter the new master key and confirm.
STEP 2 | Use the following CLI command to rotate the wrapping key for the master key on an HSM:
If the master key is encrypted on the HSM, the CLI command will generate a new wrapping key
on the HSM and encrypt the master key with the new wrapping key.
If the master key is not encrypted on the HSM, the CLI command will generate new wrapping
key on the HSM for future use.
The old wrapping key is not deleted by this command.
PAN-OS® Administrator’s Guide Version 10.1 357 ©2022 Palo Alto Networks, Inc.
Cerficate Management
STEP 1 | On the HSM, import or generate the cerficate and private key used in your decrypon
deployment.
For instrucons on imporng or generang a cerficate and private key on the HSM, refer to
your HSM documentaon.
STEP 2 | (nCipher nShield Connect only) Synchronize the key data from the nCipher nShield remote
file system to the firewall.
1. Access the firewall web interface and select Device > Setup > HSM.
2. Synchronize with Remote Filesystem (Hardware Security Operaons sengs).
STEP 4 | (Forward Trust cerficates only) Enable the cerficate for use in SSL/TLS Forward Proxy.
1. Open the cerficate you imported in Step 3 for eding.
2. Select Forward Trust Cerficate.
3. Click OK and Commit your changes.
STEP 5 | Verify that you successfully imported the cerficate onto the firewall.
Locate the cerficate you imported in Step 3 and check the icon in the Key column:
• Lock icon—The private key for the cerficate is on the HSM.
• Error icon—The private key is not on the HSM or the HSM is not properly authencated or
connected.
PAN-OS® Administrator’s Guide Version 10.1 358 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 359 ©2022 Palo Alto Networks, Inc.
Cerficate Management
PAN-OS® Administrator’s Guide Version 10.1 360 ©2022 Palo Alto Networks, Inc.
High Availability
High availability (HA) is a deployment in which two firewalls are placed in a group or
up to 16 firewalls are placed in an HA cluster and their configuraon is synchronized
to prevent a single point of failure on your network. A heartbeat connecon between
the firewall peers ensures seamless failover in the event that a peer goes down.
Seng up HA provides redundancy and allows you to ensure business connuity.
> HA Overview > Configure HA Clustering
> HA Concepts > Refresh HA1 SSH Keys and
> Set Up Acve/Passive HA Configure Key Opons
361
High Availability
HA Overview
You can configure two Palo Alto Networks firewalls as an HA pair or configure up to 16 firewalls
as peer members of an HA cluster. The peers in the cluster can be HA pairs or standalone
firewalls. HA allows you to minimize downme by making sure that an alternate firewall
is available in the event that a peer firewall fails. The firewalls in an HA pair or cluster use
dedicated or in-band HA ports on the firewall to synchronize data—network, object, and policy
configuraons—and to maintain state informaon. Firewall-specific configuraon such as
management interface IP address or administrator profiles, HA specific configuraon, log data, and
the Applicaon Command Center (ACC) informaon is not shared between peers.
For a consolidated applicaon and log view across an HA pair, you must use Panorama, the Palo
Alto Networks centralized management system. See Context Switch—Firewall or Panorama
in the Panorama Administrator’s Guide. Consult the Prerequisites for Acve/Passive HA and
Prerequisites for Acve/Acve HA. It is highly recommended that you use Panorama to provision
HA cluster members. Consult the HA Clustering Best Pracces and Provisioning.
When a failure occurs on a firewall in an HA pair or HA cluster and a peer firewall takes over the
task of securing traffic, the event is called a Failover. The condions that trigger a failover are:
• One or more of the monitored interfaces fail. (Link Monitoring)
• One or more of the desnaons specified on the firewall cannot be reached. (Path Monitoring)
• The firewall does not respond to heartbeat polls. (Heartbeat Polling and Hello messages)
• A crical chip or soware component fails, known as packet path health monitoring.
Palo Alto Networks firewalls support stateful acve/passive or acve/acve high availability with
session and configuraon synchronizaon with a few excepons:
• The VM-Series firewall on Azure and VM-Series firewall on AWS support acve/passive HA
only.
On AWS, when you deploy the firewall with the Amazon Elasc Load Balancing (ELB) service, it
does not support HA (in this case, ELB service provides the failover capabilies).
• The VM-Series firewall on Google Cloud Plaorm does not support HA.
Begin by understanding the HA Concepts and the HA Clustering Overview if you are going to
configure HA clustering.
PAN-OS® Administrator’s Guide Version 10.1 362 ©2022 Palo Alto Networks, Inc.
High Availability
HA Concepts
The following topics provide conceptual informaon about how HA works on a Palo Alto
Networks firewall:
• HA Modes
• HA Links and Backup Links
• Device Priority and Preempon
• Failover
• LACP and LLDP Pre-Negoaon for Acve/Passive HA
• Floang IP Address and Virtual MAC Address
• ARP Load-Sharing
• Route-Based Redundancy
• HA Timers
• Session Owner
• Session Setup
• NAT in Acve/Acve HA Mode
• ECMP in Acve/Acve HA Mode
HA Modes
You can set up the firewalls in an HA pair in one of two modes:
• Acve/Passive— One firewall acvely manages traffic while the other is synchronized and
ready to transion to the acve state, should a failure occur. In this mode, both firewalls share
the same configuraon sengs, and one acvely manages traffic unl a path, link, system, or
network failure occurs. When the acve firewall fails, the passive firewall transions to the
acve state and takes over seamlessly and enforces the same policies to maintain network
security. Acve/passive HA is supported in the virtual wire, Layer 2, and Layer 3 deployments.
• Acve/Acve— Both firewalls in the pair are acve and processing traffic and work
synchronously to handle session setup and session ownership. Both firewalls individually
maintain session tables and roung tables and synchronize to each other. Acve/acve HA is
supported in virtual wire and Layer 3 deployments.
In acve/acve HA mode, the firewall does not support DHCP client. Furthermore, only the
acve-primary firewall can funcon as a DHCP Relay. If the acve-secondary firewall receives
DHCP broadcast packets, it drops them.
An acve/acve configuraon does not load-balance traffic. Although you can load-
share by sending traffic to the peer, no load balancing occurs. Ways to load share
sessions to both firewalls include using ECMP, mulple ISPs, and load balancers.
When deciding whether to use acve/passive or acve/acve mode, consider the following
differences:
PAN-OS® Administrator’s Guide Version 10.1 363 ©2022 Palo Alto Networks, Inc.
High Availability
In acve/acve mode, the HA pair can be used to temporarily process more traffic
than what one firewall can normally handle. However, this should not be the norm
because a failure of one firewall causes all traffic to be redirected to the remaining
firewall in the HA pair. Your design must allow the remaining firewall to process the
maximum capacity of your traffic loads with content inspecon enabled. If the design
oversubscribes the capacity of the remaining firewall, high latency and/or applicaon
failure can occur.
For informaon on seng up your firewalls in acve/passive mode, see Set Up Acve/Passive
HA. For informaon on seng up your firewalls in acve/acve mode, see Set Up Acve/Acve
HA.
In an HA cluster, all members are considered acve; there is no concept of passive firewalls except
for HA pairs in the clusters, which can keep their acve/passive relaonship aer you add them to
an HA cluster.
For firewalls without dedicated HA ports, decide which ports to use for HA1 and HA1
backup based on your environment and understanding which are the least used and
least congested. Assign HA1 to the best interface and HA1 backup to the other one.
HA peers in an HA cluster can be a combinaon of standalone members and HA pairs. HA cluster
members use an HA4 link and HA4 backup link to perform session state syncronizaon. HA1
(control link), HA2 (data link), and HA3 (packet-forwarding link) are not supported between cluster
members that aren’t HA pairs.
PAN-OS® Administrator’s Guide Version 10.1 364 ©2022 Palo Alto Networks, Inc.
High Availability
Control Link The HA1 link is used to exchange hellos, heartbeats, and HA state
informaon, and management plane sync for roung, and User-
ID informaon. The firewalls also use this link to synchronize
configuraon changes with its peer. The HA1 link is a Layer 3 link and
requires an IP address.
ICMP is used to exchange heartbeats between HA peers.
Ports used for HA1—TCP port 28769 and 28260 for clear text
communicaon; port 28 for encrypted communicaon (SSH over TCP).
If you enable encrypon on the HA1 link, you can also Refresh HA1
SSH Keys and Configure Key Opons.
Data Link The HA2 link is used to synchronize sessions, forwarding tables, IPSec
security associaons and ARP tables between firewalls in an HA pair.
Data flow on the HA2 link is always unidireconal (except for the HA2
keep-alive); it flows from the acve or acve-primary firewall to the
passive or acve-secondary firewall. The HA2 link is a Layer 2 link, and
it uses ether type 0x7261 by default.
Ports used for HA2—The HA data link can be configured to use either
IP (protocol number 99) or UDP (port 29281) as the transport, and
thereby allow the HA data link to span subnets.
HA1 and HA2 Provide redundancy for the HA1 and the HA2 links. In-band ports
Backup Links can be used for backup links for both HA1 and HA2 connecons
when dedicated backup links are not available. Consider the following
guidelines when configuring backup HA links:
• The IP addresses of the primary and backup HA links must not
overlap each other.
• HA backup links must be on a different subnet from the primary HA
links.
• HA1-backup and HA2-backup ports must be configured on
separate physical ports. The HA1-backup link uses port 28770 and
28260.
• PA-3200 Series firewalls don’t support an IPv6 address for the
HA1-backup link; use an IPv4 address.
PAN-OS® Administrator’s Guide Version 10.1 365 ©2022 Palo Alto Networks, Inc.
High Availability
HA4 Link and HA4 The HA4 link and HA4 backup link perform session cache
Backup Link synchronizaon among all HA cluster members having the same
cluster ID. The HA4 link between cluster members detects
connecvity failures between cluster members by sending and
receiving Layer 2 keepalive messages. View the status of the HA4 and
HA4 backup links on the firewall dashboard.
The HA1 and AUX links provide synchronizaon for funcons that reside on the
management plane. Using the dedicated HA interfaces on the management plane is
more efficient than using the in-band ports as this eliminates the need to pass the
synchronizaon packets over the dataplane.
If your firewall does not have dedicated HA ports, you can configure data ports as HA interfaces.
If your firewall does have dedicated HA ports but does not have a dedicated HA backup port, you
can also configure data ports as backups to dedicated HA ports.
Whenever possible, connect HA ports directly between the two firewalls in an HA pair
(not through a switch or router) to avoid HA link and communicaons problems that could
occur if there is a network issue.
Use the following table to learn about dedicated HA ports and how to connect the HA Links and
Backup Links:
PAN-OS® Administrator’s Guide Version 10.1 366 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 367 ©2022 Palo Alto Networks, Inc.
High Availability
The traffic carried on the HSCI port is raw Layer 1 traffic, which
is not routable or switchable. Therefore, you must connect the
HSCI ports directly to each other (from the HSCI port on the first
firewall to the HSCI port on the second firewall).
PA-5200 Series • AUX-1 and AUX-2—The auxiliary SFP+ ports are mulpurpose
Firewalls (connued) ports that you can configure for HA1, management funcons, or
log forwarding to Panorama. Use these ports when you need a
fiber connecon for one of these funcons.
• For HA1 traffic—Connect the AUX-1 port on the first firewall
directly to the AUX-1 port on the second firewall in the pair or
connect them together through a switch or router.
• For a backup to the AUX-1 connecon—Connect the AUX-2
port on the first firewall directly to the AUX-2 port on the
second firewall in the pair or connect them together through a
switch or router.
PAN-OS® Administrator’s Guide Version 10.1 368 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 369 ©2022 Palo Alto Networks, Inc.
High Availability
Failover
When a failure occurs on one firewall and the peer in the HA pair (or a peer in the HA cluster)
takes over the task of securing traffic, the event is called a failover. A failover is triggered, for
example, when a monitored metric on a firewall in the HA pair fails. The metrics that the firewall
monitors for detecng a firewall failure are:
• Heartbeat Polling and Hello messages
The firewalls use hello message and heartbeats to verify that the peer firewall is responsive
and operaonal. Hello messages are sent from one peer to the other at the configured Hello
Interval to verify the state of the firewall. The heartbeat is an ICMP ping to the HA peer over
the control link, and the peer responds to the ping to establish that the firewalls are connected
and responsive. By default, the interval for the heartbeat is 1000 milliseconds. A ping is sent
every 1000 milliseconds and if there are three consecuve heartbeat losses, a failovers occurs.
For details on the HA mers that trigger a failover, see HA Timers.
• Link Monitoring
You can specify a group of physical interfaces that the firewall will monitor (a link group) and
the firewall monitors the state of each link in the group (link up or link down). You determine
PAN-OS® Administrator’s Guide Version 10.1 370 ©2022 Palo Alto Networks, Inc.
High Availability
the failure condion for the link group: Any link down or All links down in the group constutes
a link group failure (but not necessarily a failover).
You can create mulple link groups. Therefore, you also determine the failure condion of the
set of link groups: Any link group fails or All link groups fail, which determines when a failover
is triggered. The default behavior is that failure of Any one link in Any link group causes the
firewall to change the HA state to non-funconal (or to tentave state in acve/acve mode)
to indicate a failure of a monitored object.
• Path Monitoring
You can specify a desnaon IP group of IP address that the firewall will monitor. The firewall
monitors the full path through the network to mission-crical IP addresses using ICMP pings
to verify reachability of the IP address. The default interval for pings is 200ms. An IP address
is considered unreachable when 10 consecuve pings (the default value) fail. You specify the
failure condion for the IP addresses in a desnaon IP group: Any IP address unreachable
or All IP addresses unreachable in the group. You can specify mulple desnaon IP groups
for a path group for a virtual wire, VLAN, or virtual router; you specify the failure condion
of desnaon IP groups in a path group: Any or All, which constutes a path group failure.
You can configure mulple virtual wire path groups, VLAN path groups, and virtual router path
groups.
You also determine the global failure condion: Any path group fails or All path groups fail,
which determines when a failover is triggered. The default behavior is that Any one of the IP
addresses becoming unreachable in Any desnaon IP group in Any virtual wire, VLAN, or
virtual router path group causes the firewall to change the HA state to non-funconal (or to
tentave state in acve/acve mode) to indicate a failure of a monitored object.
In addion to the failover triggers listed above, a failover also occurs when the administrator
suspends the firewall or when preempon occurs.
On PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls, a failover can occur when an
internal health check fails. This health check is not configurable and is enabled to monitor the
crical components, such as the FPGA and CPUs. Addionally, general health checks occur on any
plaorm, causing failover.
The following describes what occurs in the event of a failure of a Network Processing Card (NPC)
on a PA-7000 Series firewall that is a member of an HA cluster:
• If the NPC that is being used to hold the HA clustering session cache (a copy of the other
members’ sessions) goes down, the firewall goes non-funconal. When this occurs, the session
distribuon device (such as a load balancer) must detect that the firewall is down and distribute
session load to the other members of the cluster.
• If the NPC of a cluster member goes down and no link monitoring or path monitoring was
enabled on that NPC, the PA-7000 Series firewall member will stay up, but with a lower
capacity because one NPC is down.
• If the NPC of a cluster member goes down and link monitoring or path monitoring was enabled
on that NPC, the PA-7000 Series firewall will go non-funconal and the session distribuon
device (such as a load balancer) must detect that the firewall is down and distribute session
load to the other members of the cluster.
PAN-OS® Administrator’s Guide Version 10.1 371 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 372 ©2022 Palo Alto Networks, Inc.
High Availability
As shown in the figure below, each HA firewall interface has its own IP address and floang IP
address. The interface IP address remains local to the firewall, but the floang IP address moves
between the firewalls upon firewall failure. You configure the end hosts to use a floang IP
address as its default gateway, allowing you to load balance traffic to the two HA peers. You can
also use external load balancers to load balance traffic.
If a link or firewall fails or a path monitoring event causes a failover, the floang IP address and
virtual MAC address move over to the funconal firewall. (In the figure below, each firewall has
two floang IP addresses and virtual MAC addresses; they all move over if the firewall fails.) The
funconing firewall sends a gratuitous ARP to update the MAC tables of the connected switches
to inform them of the change in floang IP address and MAC address ownership to redirect traffic
to itself.
Aer the failed firewall recovers, by default the floang IP address and virtual MAC address
move back to firewall with the Device ID [0 or 1] to which the floang IP address is bound.
More specifically, aer the failed firewall recovers, it comes on line. The currently acve firewall
determines that the firewall is back online and checks whether the floang IP address it is
handling belongs navely to itself or the other firewall. If the floang IP address was originally
bound to the other Device ID, the firewall automacally gives it back. (For an alternave to this
default behavior, see Use Case: Configure Acve/Acve HA with Floang IP Address Bound to
Acve-Primary Firewall.)
Each firewall in the HA pair creates a virtual MAC address for each of its interfaces that has a
floang IP address or ARP Load-Sharing IP address.
The format of the virtual MAC address (on firewalls other than PA-7000, PA-5200, and PA-3200
Series firewalls) is 00-1B-17-00-xx-yy, where 00-1B-17 is the vendor ID (of Palo Alto Networks
in this case), 00 is fixed, xx indicates the Device ID and Group ID as shown in the following figure,
and yy is the Interface ID:
7 6 543210 76543210
PAN-OS® Administrator’s Guide Version 10.1 373 ©2022 Palo Alto Networks, Inc.
High Availability
The format of the virtual MAC address on PA-7000, PA-5200, and PA-3200 Series firewalls is
B4-0C-25-xx-xx-xx, where B4-0C-25 is the vendor ID (of Palo Alto Networks in this case), and the
next 24 bits indicate the Device ID, Group ID and Interface ID as follows:
When a new acve firewall takes over, it sends gratuitous ARPs from each of its connected
interfaces to inform the connected Layer 2 switches of the new locaon of the virtual MAC
address. To configure floang IP addresses, see Use Case: Configure Acve/Acve HA with
Floang IP Addresses.
ARP Load-Sharing
In a Layer 3 interface deployment and acve/acve HA configuraon, ARP load-sharing allows the
firewalls to share an IP address and provide gateway services. Use ARP load-sharing only when no
Layer 3 device exists between the firewall and end hosts, that is, when end hosts use the firewall
as their default gateway.
In such a scenario, all hosts are configured with a single gateway IP address. One of the firewalls
responds to ARP requests for the gateway IP address with its virtual MAC address. Each firewall
has a unique virtual MAC address generated for the shared IP address. The load-sharing algorithm
PAN-OS® Administrator’s Guide Version 10.1 374 ©2022 Palo Alto Networks, Inc.
High Availability
that controls which firewall will respond to the ARP request is configurable; it is determined by
compung the hash or modulo of the source IP address of the ARP request.
Aer the end host receives the ARP response from the gateway, it caches the MAC address and
all traffic from the host is routed via the firewall that responded with the virtual MAC address for
the lifeme of the ARP cache. The lifeme of the ARP cache depends on the end host operang
system.
If a link or firewall fails, the floang IP address and virtual MAC address move over to the
funconal firewall. The funconal firewall sends gratuitous ARPs to update the MAC table of the
connected switches to redirect traffic from the failed firewall to itself. See Use Case: Configure
Acve/Acve HA with ARP Load-Sharing.
You can configure interfaces on the WAN side of the HA firewalls with floang IP addresses, and
configure interfaces on the LAN side of the HA firewalls with a shared IP address for ARP load-
sharing. For example, the figure below illustrates floang IP addresses for the upstream WAN
edge routers and an ARP load-sharing address for the hosts on the LAN segment.
Route-Based Redundancy
In a Layer 3 interface deployment and acve/acve HA configuraon, the firewalls are connected
to routers, not switches. The firewalls use dynamic roung protocols to determine the best path
(asymmetric route) and to load share between the HA pair. In such a scenario, no floang IP
addresses are necessary. If a link, monitored path, or firewall fails, or if Bidireconal Forwarding
Detecon (BFD) detects a link failure, the roung protocol (RIP, OSPF, or BGP) handles the
PAN-OS® Administrator’s Guide Version 10.1 375 ©2022 Palo Alto Networks, Inc.
High Availability
reroung of traffic to the funconing firewall. You configure each firewall interface with a unique
IP address. The IP addresses remain local to the firewall where they are configured; they do not
move between devices when a firewall fails. See Use Case: Configure Acve/Acve HA with
Route-Based Redundancy.
HA Timers
High availability (HA) mers facilitate a firewall to detect a firewall failure and trigger a failover.
To reduce the complexity in configuring mers for an HA pair, you can select from three profiles:
Recommended, Aggressive and Advanced. These profiles auto-populate the opmum HA mer
values for the specific firewall plaorm to enable a speedier HA deployment.
Use the Recommended profile for typical failover mer sengs and the Aggressive profile for
faster failover mer sengs. The Advanced profile allows you to customize the mer values to
suit your network requirements.
The following table describes each mer included in the profiles and the current preset values
(Recommended/Aggressive) across the different hardware models; these values are for current
reference only and can change in a subsequent release.
PAN-OS® Administrator’s Guide Version 10.1 376 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 377 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 378 ©2022 Palo Alto Networks, Inc.
High Availability
Session Owner
In an HA acve/acve configuraon, both firewalls are acve simultaneously, which means
packets can be distributed between them. Such distribuon requires the firewalls to fulfill two
funcons: session ownership and session setup. Typically, each firewall of the pair performs one
of these funcons, thereby avoiding race condions that can occur in asymmetrically routed
environments.
You configure the session owner of sessions to be either the firewall that receives the First Packet
of a new session from the end host or the firewall that is in acve-primary state (the Primary
device). If Primary device is configured, but the firewall that receives the first packet is not in
acve-primary state, the firewall forwards the packet to the peer firewall (the session owner) over
the HA3 link.
The session owner performs all Layer 7 processing, such as App-ID, Content-ID, and threat
scanning for the session. The session owner also generates all traffic logs for the session.
If the session owner fails, the peer firewall becomes the session owner. The exisng sessions fail
over to the funconing firewall and no Layer 7 processing is available for those sessions. When a
firewall recovers from a failure, by default, all sessions it owned before the failure revert back to
that original firewall; Layer 7 processing does not resume.
If you configure session ownership to be Primary device, the session setup defaults to Primary
device also.
Palo Alto Networks recommends seng the Session Owner to First Packet and the
Session Setup to IP Modulo unless otherwise indicated in a specific use case. Seng the
Session Owner to First Packet reduces traffic across the HA3 link and helps distribute the
dataplane load across peers.
Seng Session Owner and Session Setup to Primary Device causes the acve-primary
firewall to perform all traffic processing. You might want to configure this for one of these
reasons:
• You are troubleshoong and capturing logs and pcaps, so that packet processing is not
split between the firewalls.
• You want to force the acve/acve HA pair to funcon like an acve/passive HA pair.
See Use Case: Configure Acve/Acve HA with Floang IP Address Bound to
Acve-Primary Firewall.
PAN-OS® Administrator’s Guide Version 10.1 379 ©2022 Palo Alto Networks, Inc.
High Availability
Session Setup
The session setup firewall performs the Layer 2 through Layer 4 processing necessary to set up
a new session. The session setup firewall also performs NAT using the NAT pool of the session
owner. You determine the session setup firewall in an acve/acve configuraon by selecng one
of the following session setup load sharing opons.
IP Modulo The firewall distributes the session setup load based on parity of the
source IP address. This is a determinisc method of sharing the session
setup.
IP Hash The firewall uses a hash of the source and desnaon IP addresses to
distribute session setup responsibilies.
Primary Device The acve-primary firewall always sets up the session; only one
firewall performs all session setup responsibilies.
First Packet The firewall that receives the first packet of a session performs session
setup.
• If you want to load-share the session owner and session setup responsibilies,
set session owner to First Packet and session setup to IP modulo. These are the
recommended sengs.
• If you want to do troubleshoong or capture logs or pcaps, or if you want an acve/
acve HA pair to funcon like an acve/passive HA pair, set both the session owner
and session setup to Primary device so that the acve-primary device performs all
traffic processing. See Use Case: Configure Acve/Acve HA with Floang IP
Address Bound to Acve-Primary Firewall.
The firewall uses the HA3 link to send packets to its peer for session setup if necessary. The
following figure and text describe the path of a packet that firewall FW1 receives for a new
session. The red doed lines indicate FW1 forwarding the packet to FW2 and FW2 forwarding
the packet back to FW1 over the HA3 link.
PAN-OS® Administrator’s Guide Version 10.1 380 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 381 ©2022 Palo Alto Networks, Inc.
High Availability
FW1 examines the contents of the packet to match it to an exisng session. If the session
matches an exisng session, FW1 processes the packet and sends the packet out the egress
interface to the desnaon.
PAN-OS® Administrator’s Guide Version 10.1 382 ©2022 Palo Alto Networks, Inc.
High Availability
and path. This behavior occurs regardless of the ECMP algorithm in use; using the same interface
is desirable.
Only if no ECMP path matches the original egress interface will the acve-primary firewall select a
new ECMP path.
If you did not configure the same interfaces on the acve/acve peers, upon failover the acve-
primary firewall selects the next best path from the FIB table. Consequently, the exisng sessions
might not be distributed according to the ECMP algorithm.
PAN-OS® Administrator’s Guide Version 10.1 383 ©2022 Palo Alto Networks, Inc.
High Availability
Set Up Acve/Passive HA
• Prerequisites for Acve/Passive HA
• Configuraon Guidelines for Acve/Passive HA
• Configure Acve/Passive HA
• Define HA Failover Condions
• Verify Failover
As a best pracce, if you have an exisng firewall and you want to add a new firewall
for HA purposes and the new firewall has an exisng configuraon Reset the Firewall
to Factory Default Sengs on the new firewall. This ensures that the new firewall has
a clean configuraon. Aer HA is configured, you will then sync the configuraon on
the primary firewall to the newly introduced firewall with the clean configuraon.
PAN-OS® Administrator’s Guide Version 10.1 384 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 385 ©2022 Palo Alto Networks, Inc.
High Availability
Based on the combinaon of HA1 and HA1 Backup ports you are using, use the following
recommendaons to decide whether you should enable heartbeat backup:
HA funconality (HA1 and HA1 backup) is not supported on the management interface
if it's configured for DHCP addressing (IP Type set to DHCP Client). The excepons are
AWS and Azure, where the management interface is configured as DHCP Client and it
supports HA1 and HA1 Backup links.
Control Link IP address of the HA1 link configured IP address of the HA1 link
on this firewall (PeerA). configured on this firewall
(PeerB).
Data Link By default, the HA2 link uses By default, the HA2 link uses
Ethernet/Layer 2. Ethernet/Layer 2.
The data link
informaon is
synchronized
PAN-OS® Administrator’s Guide Version 10.1 386 ©2022 Palo Alto Networks, Inc.
High Availability
Device Priority The firewall you plan to make acve If PeerB is passive, set the device
(required, if must have a lower numerical value priority value to a number larger
preempon is than its peer. So, if Peer A is to than the seng on PeerA. For
enabled) funcon as the acve firewall, keep example, set the value to 110.
the default value of 100 and increment
the value on PeerB.
If the firewalls have the same device
priority value, they use the MAC
address of their HA1 as the e-
breaker.
Link Monitoring Select the physical interfaces on the Pick a similar set of physical
—Monitor one firewall that you would like to monitor interfaces that you would like
or more physical and define the failure condion (all or to monitor on this firewall and
interfaces that any) to trigger a failover. define the failure condion (all or
handle vital traffic any) to trigger a failover.
on this firewall
and define the
failure condion.
Path Monitoring Define the failure condion (all or any), Pick a similar set of devices or
—Monitor one or ping interval and the ping count. This desnaon IP addresses that can
more desnaon is parcularly useful for monitoring be monitored for determining
IP addresses the availability of other interconnected the failover trigger for PeerB.
that the firewall networking devices. For example, Define the failure condion (all
can use ICMP monitor the availability of a router that or any), ping interval and the
pings to ascertain connects to a server, connecvity to ping count.
responsiveness. the server itself, or some other vital
device that is in the flow of traffic.
Make sure that the node/device that
you are monitoring is not likely to
be unresponsive, especially when it
comes under load, as this could cause
a a path monitoring failure and trigger
a failover.
PAN-OS® Administrator’s Guide Version 10.1 387 ©2022 Palo Alto Networks, Inc.
High Availability
Configure Acve/Passive HA
The following procedure shows how to configure a pair of firewalls in an acve/passive
deployment as depicted in the following example topology.
To configure an acve/passive HA pair, first complete the following workflow on the first firewall
and then repeat the steps on the second firewall.
STEP 1 | Connect the HA ports to set up a physical connecon between the firewalls.
• For firewalls with dedicated HA ports, use an Ethernet cable to connect the dedicated HA1
ports and the HA2 ports on peers. Use a crossover cable if the peers are directly connected
to each other.
• For firewalls without dedicated HA ports, select two data interfaces for the HA2 link and
the backup HA1 link. Then, use an Ethernet cable to connect these in-band HA interfaces
across both firewalls.
Use the management port for the HA1 link and ensure that the management ports can connect
to each other across your network.
STEP 3 | If the firewall does not have dedicated HA ports, set up the data ports to funcon as HA
ports.
For firewalls with dedicated HA ports connue to the next step.
1. Select Network > Interfaces.
2. Confirm that the link is up on the ports that you want to use.
3. Select the interface and set Interface Type to HA.
4. Set the Link Speed and Link Duplex sengs, as appropriate.
PAN-OS® Administrator’s Guide Version 10.1 388 ©2022 Palo Alto Networks, Inc.
High Availability
If you enable encrypon, aer you finish configuring the HA firewalls, you can
Refresh HA1 SSH Keys and Configure Key Opons.
PA-3200 Series firewalls don’t support an IPv6 address for the HA1 backup
control link; use an IPv4 address.
PAN-OS® Administrator’s Guide Version 10.1 389 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 8 | Set up the data link connecon (HA2) and the backup HA2 connecon between the firewalls.
1. In Device > High Availability > General, edit the Data Link (HA2) secon.
2. Select the Port to use for the data link connecon.
3. Select the Transport method. The default is ethernet, and will work when the HA pair is
connected directly or through a switch. If you need to route the data link traffic through
the network, select IP or UDP as the transport mode.
4. If you use IP or UDP as the transport method, enter the IPv4/IPv6 Address and
Netmask.
5. Verify that Enable Session Synchronizaon is selected.
6. Select HA2 Keep-alive to enable monitoring on the HA2 data link between the HA
peers. If a failure occurs based on the threshold that is set (default is 10000 ms), the
defined acon will occur. For acve/passive configuraon, a crical system log message
is generated when an HA2 keep-alive failure occurs.
You can configure the HA2 keep-alive opon on both firewalls, or just one
firewall in the HA pair. If the opon is only enabled on one firewall, only that
firewall will send the keep-alive messages. The other firewall will be nofied if a
failure occurs.
7. Edit the Data Link (HA2 Backup) secon, select the interface, and add the IPv4/IPv6
Address and Netmask.
STEP 9 | Enable heartbeat backup if your control link uses a dedicated HA port or an in-band port.
You do not need to enable heartbeat backup if you are using the management port for the
control link.
1. In Device > High Availability > General, edit the Elecon Sengs.
2. Select Heartbeat Backup.
To allow the heartbeats to be transmied between the firewalls, you must verify that the
management port across both peers can route to each other.
PAN-OS® Administrator’s Guide Version 10.1 390 ©2022 Palo Alto Networks, Inc.
High Availability
If both firewalls have the same device priority value, the firewall with the lowest
MAC address on the HA1 control link will become the acve firewall.
3. Select Preempve.
You must enable preempve on both the acve firewall and the passive firewall.
To view the preset value for an individual mer included in a profile, select
Advanced and click Load Recommended or Load Aggressive. The preset values
for your hardware model will be displayed on screen.
STEP 12 | (Oponal) Modify the link status of the HA ports on the passive firewall.
The passive link state is shutdown, by default. Aer you enable HA, the link state for
the HA ports on the acve firewall will be green and those on the passive firewall will
be down and display as red.
Seng the link state to Auto allows for reducing the amount of me it takes for the passive
firewall to take over when a failover occurs and it allows you to monitor the link state.
To enable the link status on the passive firewall to stay up and reflect the cabling status on the
physical interface:
1. In Device > High Availability > General, edit the Acve Passive Sengs.
2. Set the Passive Link State to Auto.
The auto opon decreases the amount of me it takes for the passive firewall to take
over when a failover occurs.
Although the interface displays green (as cabled and up) it connues to discard
all traffic unl a failover is triggered.
When you modify the passive link state, make sure that the adjacent devices do not
forward traffic to the passive firewall based only on the link status of the firewall.
PAN-OS® Administrator’s Guide Version 10.1 391 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 14 | (Oponal) Enable LACP and LLDP Pre-Negoaon for Acve/Passive HA for faster failover if
your network uses LACP or LLDP.
Enable LACP and LLDP before configuring HA pre-negoaon for the protocol if you
want pre-negoaon to funcon in acve mode.
You cannot also select Same System MAC Address for Acve-Passive HA
because pre-negoaon requires unique interface MAC addresses on the
acve and passive firewalls.
4. To enable LACP passive pre-negoaon:
1. Select an Ethernet interface in a virtual wire deployment.
2. Select the Advanced tab.
3. Select the LACP tab.
4. Select Enable in HA Passive State.
5. Click OK.
5. To enable LLDP acve pre-negoaon:
1. Select an Ethernet interface in a Layer 2, Layer 3, or virtual wire deployment.
2. Select the Advanced tab.
3. Select the LLDP tab.
4. Select Enable in HA Passive State.
5. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 392 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 16 | Aer you finish configuring both firewalls, verify that the firewalls are paired in acve/
passive HA.
1. Access the Dashboard on both firewalls, and view the High Availability widget.
2. On the acve firewall, click the Sync to peer link.
3. Confirm that the firewalls are paired and synced, as shown as follows:
• On the passive firewall: the state of the local firewall should display passive and the
Running Config should show as synchronized.
• On the acve firewall: The state of the local firewall should display acve and the
Running Config should show as synchronized.
Ensure that you delete all VLAN path monitoring configuraons in acve/acve HA
before you upgrade to PAN-OS 10.1 because VLAN path monitoring is not compable
with acve/acve HA pairing in PAN-OS 10.0; retaining an earlier acve/acve HA
configuraon results in an autocommit failure.
Before you enable path monitoring, you must set up your virtual routers, VLAN, or virtual wires
or a combinaon of these logical networking components. Path monitoring in virtual routers and
virtual wires is compable with both acve/acve and acve/passive HA deployments; however,
path monitoring in VLANs is supported only on acve/passive pairs.
Before you enable path monitoring, you must also:
• Check reachability for desnaon IP groups in your virtual routers.
• Ensure that the VLANs (for which you intend to enable path monitoring) include configured
interfaces.
• Obtain the source IP address that you will use to receive pings from the appropriate desnaon
IP address.
PAN-OS® Administrator’s Guide Version 10.1 393 ©2022 Palo Alto Networks, Inc.
High Availability
If you are using SNMPv3 to monitor the firewalls, note that the SNMPv3 Engine ID is
synchronized between the HA pair. For informaon on seng up SNMP, see Forward
Traps to an SNMP Manager. Because the EngineID is generated using the firewall serial
number, on the VM-Series firewall you must apply a valid license in order to obtain a
unique EngineID for each firewall.
STEP 1 | To configure HA link monitoring, specify a group of physical interfaces for the firewall to
monitor (link up or link down).
1. Select Device > High Availability > Link and Path Monitoring.
2. In the Link Monitoring secon, Add a link group by Name.
3. Select Enabled to enable the link group.
4. Select the Failure Condion for the interfaces in the link group: Any (default) or All.
5. Add the Interface(s) to monitor.
6. Click OK.
STEP 2 | (Oponal) Modify the failure condion for the set of Link Groups configured on the firewall.
By default, the firewall triggers a failover when any monitored Link Group fails.
1. Edit the Link Monitoring secon.
2. Set the Failure Condion to Any (default) or All.
3. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 394 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 3 | To configure HA path monitoring for a virtual wire, VLAN, or virtual router, specify the
desnaon IP addresses that the firewall will ping to verify network connecvity.
1. In the Path Monitoring secon, select Add Virtual Wire Path, Add VLAN Path, or Add
Virtual Router Path.
2. Enter a Name for the virtual wire, VLAN, or virtual router path group.
3. (Virtual Wire Path or VLAN Path only) Enter the Source IP address to use to ping the
desnaon IP address through the virtual wire or VLAN.
4. Select Enabled to enable the path group.
5. Select the Failure Condion that results in a failure for this path group: Any (default) to
issue a failure when one or more Desnaon IP groups in this path group fail or All to
issue a failure when all Desnaon IP groups in this path group fail.
6. Enter the Ping Interval in milliseconds; the interval between ICMP messages sent to the
Desnaon IP address (range is 200 to 60,000; default is 200).
7. Enter the Ping Count of pings that must fail before declaring a failure (range is 3 to 10;
default is 10).
8. Add and enter a Desnaon IP Group name.
9. Add one or more Desnaon IP addresses to ping.
10. Select Enabled to enable path monitoring for the Desnaon IP group.
11. Select the Failure Condion that results in a failure for this Desnaon IP group: Any
(default) to issue a failure when one or more listed IP addresses is unreachable or All to
issue a failure when all listed IP addresses are unreachable.
12. Click OK twice.
13. (Panorama only) Select the appropriate Panorama template to push the path monitoring
configuraon to your appliance.
You can push HA path monitoring for a virtual wire, VLAN, or virtual router
only to firewalls running PAN-OS 10.0 or a later releases. If you try to push the
configuraon to firewalls running a release earlier than PAN-OS 10.0 (such as
9.1.x or 9.0.x), the commit may fail or the commit may remove desnaon IP
addresses from the path group.
Only HA Path Groups containing one Desnaon IP Group are supported for
managed firewalls running PAN-OS 9.1 and earlier releases.
PAN-OS® Administrator’s Guide Version 10.1 395 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 4 | (Oponal) Modify the failure condion for the set of Path Groups configured on the firewall.
By default, the firewall triggers a failover when any monitored Path Group fails.
1. Edit the Path Monitoring secon.
2. Select Enabled to enable path monitoring on the appliance.
3. Set the Failure Condion to Any (default) to issue a failure for this firewall when one
or more monitored virtual routers, VLANs, or virtual wires is down. Select All to issue
a failure for this firewall when all monitored virtual routers, VLANs, or virtual wires are
down.
4. Click OK.
STEP 5 | Commit.
Verify Failover
To test that your HA configuraon works properly, trigger a manual failover and verify that the
firewalls transion states successfully.
STEP 1 | Suspend the acve firewall.
Select Device > High Availability > Operaonal Commands and click the Suspend local device
link.
STEP 2 | Verify that the passive firewall has taken over as acve.
On the Dashboard, verify that the state of the passive firewall changes to acve in the High
Availability widget.
STEP 3 | Restore the suspended firewall to a funconal state. Wait for a couple of minutes, and then
verify that preempon has occurred, if Preempve is enabled.
1. On the firewall you previously suspended, select Device > High Availability >
Operaonal Commands and click the Make local device funconal link.
2. In the High Availability widget on the Dashboard, confirm that the firewall has taken over
as the acve firewall and that the peer is now in a passive state.
PAN-OS® Administrator’s Guide Version 10.1 396 ©2022 Palo Alto Networks, Inc.
High Availability
Set Up Acve/Acve HA
• Prerequisites for Acve/Acve HA
• Configure Acve/Acve HA
• Determine Your Acve/Acve Use Case
PAN-OS® Administrator’s Guide Version 10.1 397 ©2022 Palo Alto Networks, Inc.
High Availability
an idencal set of licenses, they cannot synchronize configuraon informaon and maintain
parity for a seamless failover.
If you have an exisng firewall and you want to add a new firewall for HA purposes
and the new firewall has an exisng configuraon, it is recommended that you Reset
the Firewall to Factory Default Sengs on the new firewall. This will ensure that the
new firewall has a clean configuraon. Aer HA is configured, you will then sync the
configuraon on the primary firewall to the newly introduced firewall with the clean
config. You will also have to configure local IP addresses.
Configure Acve/Acve HA
The following procedure describes the basic workflow for configuring your firewalls in an acve/
acve configuraon. However, before you begin, Determine Your Acve/Acve Use Case for
configuraon examples more tailored to your specific network environment.
If you have a switch located between your HA firewalls, the switch ports that connect the
HA3 link must support jumbo frames to handle the overhead associated with the MAC-in-
MAC encapsulaon on the HA3 link.
To configure acve/acve, first complete the following steps on one peer and then complete them
on the second peer, ensuring that you set the Device ID to different values (0 or 1) on each peer.
STEP 1 | Connect the HA ports to set up a physical connecon between the firewalls.
For each use case, the firewalls could be any hardware model; choose the HA3 step
that corresponds with your model.
• For firewalls with dedicated HA ports, use an Ethernet cable to connect the dedicated HA1
ports and the HA2 ports on peers. Use a crossover cable if the peers are directly connected
to each other.
• For firewalls without dedicated HA ports, select two data interfaces for the HA2 link and
the backup HA1 link. Then, use an Ethernet cable to connect these in-band HA interfaces
across both firewalls. Use the management port for the HA1 link and ensure that the
management ports can connect to each other across your network.
• For HA3:
• On PA-7000 Series firewalls, connect the High Speed Chassis Interconnect (HSCI-A) on
the first chassis to the HSCI-A on the second chassis, and the HSCI-B on the first chassis
to the HSCI-B on the second chassis.
• On the PA-5450 firewall, connect the HSCI-A on the first chassis to the HSCI-A on the
second chassis, and the HSCI-B on the first chassis to the HSCI-B on the second chassis.
• On PA-5200 Series firewalls (which have one HSCI port), connect the HSCI port on the
first chassis to the HSCI port on the second chassis. You can also use data ports for HA3
on PA-5200 Series firewalls.
• On PA-3200 Series firewalls (which have one HSCI port), connect the HSCI port on the
first chassis to the HSCI port on the second chassis.
• On any other hardware model, use dataplane interfaces for HA3.
PAN-OS® Administrator’s Guide Version 10.1 398 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 3 | If the firewall does not have dedicated HA ports, set up the data ports to funcon as HA
ports.
For firewalls with dedicated HA ports connue to the next step.
1. Select Network > Interfaces.
2. Confirm that the link is up on the ports that you want to use.
3. Select the interface and set Interface Type to HA.
4. Set the Link Speed and Link Duplex sengs, as appropriate.
STEP 5 | Set the Device ID, enable synchronizaon, and idenfy the control link on the peer firewall
1. In Device > High Availability > General, edit Setup.
2. Select Device ID as follows:
• When configuring the first peer, set the Device ID to 0.
• When configuring the second peer, set the Device ID to 1.
3. Select Enable Config Sync. This seng is required to synchronize the two firewall
configuraons (enabled by default).
4. Enter the Peer HA1 IP Address, which is the IP address of the HA1 control link on the
peer firewall.
5. (Oponal) Enter a Backup Peer HA1 IP Address, which is the IP address of the backup
control link on the peer firewall.
6. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 399 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 6 | Determine whether or not the firewall with the lower Device ID preempts the acve-primary
firewall upon recovery from a failure.
1. In Device > High Availability > General, edit Elecon Sengs.
2. Select Preempve to cause the firewall with the lower Device ID to automacally
resume acve-primary operaon aer either firewall recovers from a failure. Both
firewalls must have Preempve selected for preempon to occur.
Leave Preempve unselected if you want the acve-primary role to remain with the
current firewall unl you manually make the recovered firewall the acve-primary
firewall.
STEP 7 | Enable heartbeat backup if your control link uses a dedicated HA port or an in-band port.
You need not enable heartbeat backup if you are using the management port for the control
link.
1. In Device > High Availability > General, edit Elecon Sengs.
2. Select Heartbeat Backup.
To allow the heartbeats to be transmied between the firewalls, you must verify that the
management port across both peers can route to each other.
To view the preset value for an individual mer included in a profile, select
Advanced and click Load Recommended or Load Aggressive. The preset values
for your hardware model will be displayed on screen.
PAN-OS® Administrator’s Guide Version 10.1 400 ©2022 Palo Alto Networks, Inc.
High Availability
If you enable encrypon, aer you finish configuring the HA firewalls, you can
Refresh HA1 SSH Keys and Configure Key Opons.
PA-3200 Series firewalls don’t support an IPv6 address for the HA1 backup
control link; use an IPv4 address.
PAN-OS® Administrator’s Guide Version 10.1 401 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 12 | Set up the data link connecon (HA2) and the backup HA2 connecon between the firewalls.
1. In Device > High Availability > General, edit Data Link (HA2).
2. Select the Port to use for the data link connecon.
3. Select the Transport method. The default is ethernet, and will work when the HA pair is
connected directly or through a switch. If you need to route the data link traffic through
the network, select IP or UDP as the transport mode.
4. If you use IP or UDP as the transport method, enter the IPv4/IPv6 Address and
Netmask.
5. Verify that Enable Session Synchronizaon is selected.
6. Select HA2 Keep-alive to enable monitoring on the HA2 data link between the HA
peers. If a failure occurs based on the threshold that is set (default is 10000 ms), the
defined acon will occur. When an HA2 Keep-alive failure occurs, the system either
generates a crical system log message or causes a split dataplane depending on your
configuraon.
You can configure the HA2 Keep-alive opon on both firewalls, or just one
firewall in the HA pair. If the opon is only enabled on one firewall, only that
firewall sends the Keep-alive messages. The other firewall is nofied if a failure
occurs.
PAN-OS® Administrator’s Guide Version 10.1 402 ©2022 Palo Alto Networks, Inc.
High Availability
Start with First Packet for Session Owner and Session Setup, and then based
on load distribuon, you can change to one of the other opons.
• IP Hash—The firewall uses a hash of either the source IP address or a combinaon of
the source and desnaon IP addresses to distribute session setup responsibilies.
4. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 403 ©2022 Palo Alto Networks, Inc.
High Availability
peer owns the floang IP address you just configured (range is 0-255). The firewall with
the lowest priority value (highest priority) owns the floang IP address.
3. Select Failover address if link state is down to cause the firewall to use the failover
address when the link state on the interface is down.
4. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 404 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 5 | Configure the peer firewall in the same way, except in Step 5, if you selected Device ID 0 for
the first firewall, select Device ID 1 for the peer firewall.
PAN-OS® Administrator’s Guide Version 10.1 405 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 4 | Enable jumbo frames on firewalls other than PA-7000 Series firewalls.
Perform Step 19 of Configure Acve/Acve HA.
PAN-OS® Administrator’s Guide Version 10.1 406 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 7 | Configure the peer firewall in the same way, except selecng a different Device ID.
For example, if you selected Device ID 0 for the first firewall, select Device ID 1 for the peer
firewall.
PAN-OS® Administrator’s Guide Version 10.1 407 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 4 | Enable jumbo frames on firewalls other than PA-7000 Series firewalls.
STEP 7 | Configure the peer firewall in the same way, except selecng a different Device ID.
For example, if you selected Device ID 0 for the first firewall, select Device ID 1 for the peer
firewall.
PAN-OS® Administrator’s Guide Version 10.1 408 ©2022 Palo Alto Networks, Inc.
High Availability
Upon a failover, when the acve-primary firewall (Peer A) goes down and the acve-secondary
firewall (Peer B) takes over as the acve-primary peer, the floang IP address moves to Peer B
(shown in the following figure). Peer B remains the acve-primary firewall and traffic connues to
go to Peer B, even when Peer A recovers and becomes the acve-secondary firewall. You decide if
and when to make Peer A the acve-primary firewall again.
Binding the floang IP address to the acve-primary firewall provides you with more control over
how the firewalls determine floang IP address ownership as they move between various HA
Firewall States. The following advantages result:
• You can have an acve/acve HA configuraon for path monitoring out of both firewalls, but
have the firewalls funcon like an acve/passive HA configuraon because traffic directed to
the floang IP address always goes to the acve-primary firewall.
When you disable preempon on both firewalls, you have the following addional benefits:
• The floang IP address does not move back and forth between HA firewalls if the acve-
secondary firewall flaps up and down.
• You can review the funconality of the recovered firewall and the adjacent components before
manually direcng traffic to it again, which you can do at a convenient down me.
PAN-OS® Administrator’s Guide Version 10.1 409 ©2022 Palo Alto Networks, Inc.
High Availability
• You have control over which firewall owns the floang IP address so that you keep all flows of
new and exisng sessions on the acve-primary firewall, thereby minimizing traffic on the HA3
link.
You cannot configure NAT for a floang IP address that is bound to an acve-primary
firewall.
Disabling preempon allows you full control over when the recovered firewall becomes
the acve-primary firewall.
1. In Device > High Availability > General, edit the Elecon Sengs.
2. Clear Preempve if it is enabled.
3. Click OK.
You must also engineer your network to eliminate the possibility of asymmetric
traffic going to the HA pair. If you don’t do so and traffic goes to the acve-
secondary firewall, seng Session Owner Selecon and Session Setup to
Primary Device causes the traffic to traverse HA3 to get to the acve-primary
firewall for session ownership and session setup.
4. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 410 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 7 | Enable jumbo frames on firewalls other than PA-7000 Series firewalls.
STEP 9 | Configure the peer firewall in the same way, except selecng a different Device ID.
For example, if you selected Device ID 0 for the first firewall, select Device ID 1 for the peer
firewall.
Use Case: Configure Acve/Acve HA with Source DIPP NAT Using Floang IP
Addresses
This Layer 3 interface example uses source NAT in Acve/Acve HA Mode. The Layer 2 switches
create broadcast domains to ensure users can reach everything north and south of the firewalls.
PA-3050-1 has Device ID 0 and its HA peer, PA-3050-2, has Device ID 1. In this use case, NAT
translates the source IP address and port number to the floang IP address configured on the
egress interface. Each host is configured with a default gateway address, which is the floang IP
address on Ethernet1/1 of each firewall. The configuraon requires two source NAT rules, one
bound to each Device ID, although you configure both NAT rules on a single firewall and they are
synchronized to the peer firewall.
PAN-OS® Administrator’s Guide Version 10.1 411 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 1 | On PA-3050-2 (Device ID 1), perform Step 1 through Step 3 of Configure Acve/Acve HA.
PAN-OS® Administrator’s Guide Version 10.1 412 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 7 | Enable jumbo frames on firewalls other than the PA-7000 Series.
STEP 10 | Configure the peer firewall, PA-3050-1 with the same sengs, except for the following
changes:
• Select Device ID 0.
• Configure an HA virtual address of 10.1.1.100.
• For Device 1 Priority, enter 255. For Device 0 Priority, enter 0.
In this example, Device ID 0 has a lower priority value so a higher priority; therefore, the
firewall with Device ID 0 (PA-3050-1) owns the floang IP address 10.1.1.100.
STEP 11 | Sll on PA-3050-1, create the source NAT rule for Device ID 0.
1. Select Policies > NAT and click Add.
2. Enter a Name for the rule that in this example idenfies it as a source NAT rule for
Device ID 0.
3. For NAT Type, select ipv4 (default).
4. On the Original Packet, for Source Zone, select Any.
5. For Desnaon Zone, select the zone you created for the external network.
6. Allow Desnaon Interface, Service, Source Address, and Desnaon Address to
remain set to Any.
7. For the Translated Packet, select Dynamic IP And Port for Translaon Type.
8. For Address Type, select Interface Address, in which case the translated address will
be the IP address of the interface. Select an Interface (eth1/1 in this example) and an IP
Address of the floang IP address 10.1.1.100.
9. On the Acve/Acve HA Binding tab, for Acve/Acve HA Binding, select 0 to bind the
NAT rule to Device ID 0.
10. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 413 ©2022 Palo Alto Networks, Inc.
High Availability
Use Case: Configure Separate Source NAT IP Address Pools for Acve/Acve HA
Firewalls
If you want to use IP address pools for source NAT in Acve/Acve HA Mode, each firewall must
have its own pool, which you then bind to a Device ID in a NAT rule.
Address objects and NAT rules are synchronized (in both acve/passive and acve/acve mode),
so they need to be configured on only one of the firewalls in the HA pair.
This example configures an address object named Dyn-IP-Pool-dev0 containing the IP address
pool 10.1.1.140-10.1.1.150. It also configures an address object named Dyn-IP-Pool-dev1
containing the IP address pool 10.1.1.160-10.1.1.170. The first address object is bound to Device
ID 0; the second address object is bound to Device ID 1.
STEP 1 | On one HA firewall, create address objects.
1. Select Objects > Addresses and Add an address object Name, in this example, Dyn-IP-
Pool-dev0.
2. For Type, select IP Range and enter the range 10.1.1.140-10.1.1.150.
3. Click OK.
4. Repeat this step to configure another address object named Dyn-IP-Pool-dev1 with the
IP Range of 10.1.1.160-10.1.1.170.
PAN-OS® Administrator’s Guide Version 10.1 414 ©2022 Palo Alto Networks, Inc.
High Availability
Use Case: Configure Acve/Acve HA for ARP Load-Sharing with Desnaon NAT
This Layer 3 interface example uses NAT in Acve/Acve HA Mode and ARP Load-Sharing
with desnaon NAT. Both HA firewalls respond to an ARP request for the desnaon NAT
address with the ingress interface MAC address. Desnaon NAT translates the public, shared
IP address (in this example, 10.1.1.200) to the private IP address of the server (in this example,
192.168.2.200).
When the HA firewalls receive traffic for the desnaon 10.1.1.200, both firewalls could possibly
respond to the ARP request, which could cause network instability. To avoid the potenal issue,
configure the firewall that is in acve-primary state to respond to the ARP request by binding the
desnaon NAT rule to the acve-primary firewall.
PAN-OS® Administrator’s Guide Version 10.1 415 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 1 | On PA-3050-2 (Device ID 1), perform Step 1 through Step 3 of Configure Acve/Acve HA.
PAN-OS® Administrator’s Guide Version 10.1 416 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 6 | Enable jumbo frames on firewalls other than the PA-7000 Series.
STEP 9 | Configure the peer firewall, PA-3050-1 (Device ID 0), with the same sengs, except in Step 2
select Device ID 0.
STEP 10 | Sll on PA-3050-1 (Device ID 0), create the desnaon NAT rule so that the acve-primary
firewall responds to ARP requests.
1. Select Policies > NAT and click Add.
2. Enter a Name for the rule that, in this example, idenfies it as a desnaon NAT rule for
Layer 2 ARP.
3. For NAT Type, select ipv4 (default).
4. On the Original Packet, for Source Zone, select Any.
5. For Desnaon Zone, select the Untrust zone you created for the external network.
6. Allow Desnaon Interface, Service, and Source Address to remain set to Any.
7. For Desnaon Address, specify 10.1.1.200.
8. For the Translated Packet, Source Address Translaon remains None.
9. For Desnaon Address Translaon, enter the private IP address of the desnaon
server, in this example, 192.168.1.200.
10. On the Acve/Acve HA Binding tab, for Acve/Acve HA Binding, select primary to
bind the NAT rule to the firewall in acve-primary state.
11. Click OK.
Use Case: Configure Acve/Acve HA for ARP Load-Sharing with Desnaon NAT in
Layer 3
This Layer 3 interface example uses NAT in Acve/Acve HA Mode and ARP Load-Sharing.
PA-3050-1 has Device ID 0 and its HA peer, PA-3050-2, has Device ID 1.
In this use case, both of the HA firewalls must respond to an ARP request for the desnaon
NAT address. Traffic can arrive at either firewall from either WAN router in the untrust zone.
Desnaon NAT translates the public-facing, shared IP address to the private IP address of the
server. The configuraon requires one desnaon NAT rule bound to both Device IDs so that
both firewalls can respond to ARP requests.
PAN-OS® Administrator’s Guide Version 10.1 417 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 1 | On PA-3050-2 (Device ID 1), perform Step 1 through Step 3 of Configure Acve/Acve HA.
PAN-OS® Administrator’s Guide Version 10.1 418 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 6 | Enable jumbo frames on firewalls other than PA-7000 Series firewalls.
STEP 9 | Configure the peer firewall, PA-3050-1 (Device ID 0), with the same sengs, except set the
Device ID to 0 instead of 1.
STEP 10 | Sll on PA-3050-1 (Device ID 0), create the desnaon NAT rule for both Device ID 0 and
Device ID 1.
1. Select Policies > NAT and click Add.
2. Enter a Name for the rule that in this example idenfies it as a desnaon NAT rule for
Layer 3 ARP.
3. For NAT Type, select ipv4 (default).
4. On the Original Packet, for Source Zone, select Any.
5. For Desnaon Zone, select the Untrust zone you created for the external network.
6. Allow Desnaon Interface, Service, and Source Address to remain set to Any.
7. For Desnaon Address, specify 10.1.1.200.
8. For the Translated Packet, Source Address Translaon remains None.
9. For Desnaon Address Translaon, enter the private IP address of the desnaon
server, in this example 192.168.1.200.
10. On the Acve/Acve HA Binding tab, for Acve/Acve HA Binding, select both to bind
the NAT rule to both Device ID 0 and Device ID 1.
11. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 419 ©2022 Palo Alto Networks, Inc.
High Availability
HA Clustering Overview
®
A number of Palo Alto Networks firewall models now support session state synchronizaon
among firewalls in a high availability (HA) cluster of up to 16 firewalls. The HA cluster peers
synchronize sessions to protect against failure of the data center or a large security inspecon
point with horizontally scaled firewalls. In the case of a network outage or a firewall going down,
the sessions fail over to a different firewall in the cluster. Such synchronizaon is especially helpful
in the following use cases.
One use case is when HA peers are spread across mulple data centers so that there is no single
point of failure within or between data centers. A second mul-data center use case is when one
data center is acve and the other is standby.
A third HA clustering use case is horizontal scaling, in which you add HA cluster members to a
single data center to scale security and ensure session survivability.
PAN-OS® Administrator’s Guide Version 10.1 420 ©2022 Palo Alto Networks, Inc.
High Availability
HA clusters support a Layer 3 or virtual wire deployment. HA peers in the cluster can be a
combinaon of HA pairs and standalone cluster members. In an HA cluster, all members are
considered acve; there is no concept of passive firewalls except for HA pairs, which can keep
their acve/passive relaonship aer you add them to an HA cluster.
All cluster members share session state. When a new firewall joins an HA cluster, that triggers all
firewalls in the cluster to synchronize all exisng sessions. HA4 and HA4 backup connecons are
the dedicated cluster links that synchronize session state among all cluster members having the
same cluster ID. The HA4 link between cluster members detects connecvity failures between
cluster members. HA1 (control link), HA2 (data link), and HA3 (packet-forwarding link) are not
supported between cluster members that aren’t HA pairs.
For a normal session that has not failed over, only the firewall that is the session owner creates
a traffic log. For a session that failed over, the new session owner (the firewall that receives the
failed over traffic) creates the traffic log.
The firewall models that support HA clustering and the maximum number of members supported
per cluster are as follows:
PA-3200 Series 6
PA-5200 Series 16
PA-5450 8
PAN-OS® Administrator’s Guide Version 10.1 421 ©2022 Palo Alto Networks, Inc.
High Availability
VM-300 6
VM-500 6
VM-700 16
HA clustering is not supported in public cloud deployments. Consider the HA Clustering Best
Pracces and Provisioning before you start to Configure HA Clustering.
PAN-OS® Administrator’s Guide Version 10.1 422 ©2022 Palo Alto Networks, Inc.
High Availability
When upgrading, firewall members will connue to synchronize sessions with one
member at a different version.
• It is highly recommended and a best pracce to use Panorama to provision HA cluster
members to keep all configuraon and policies synchronized among all cluster members.
• HA cluster members must be licensed for the same components to ensure consistent policy
enforcement and content inspecon capabilies.
• The licenses must expire at the same me to prevent mismatched licenses and loss of
funconality.
• All cluster members should be running with the same version of dynamic Content Updates
for consistent security enforcement.
• HA cluster members must share the same zone names in order for sessions to successfully
fail over to another cluster member. For example, suppose sessions going to an ingress zone
named internal are dropped because the link is down. For those sessions to fail over to
an HA firewall peer in the cluster, that peer must also have a zone named internal.
• Client-to-server and server-to-client flows must go back to the same firewall under normal
(non-failure) condions in order for security content scanning to occur. Asymmetric traffic
won’t be dropped, but it cannot be scanned for security purposes.
• Session Synchronizaon Best Pracces
• Dedicated HA communicaon interfaces should be used over dataplane interfaces. HSCI
interfaces aren’t used for HA4. This allows separaon of HA pair and cluster session
synchronizaon to ensure maximum bandwidth and reliability for session syncing.
• HA4 should be adequately sized if you use dataplane interfaces. This ensures best effort
session state synchronizing between cluster members.
• Best pracce is to have a dedicated cluster network for the HA4 communicaons link to
ensure adequate bandwidth and non-congested, low-latency connecons between cluster
members.
• Architect your networks and perform traffic engineering to avoid possible race condions,
in which a network steers traffic from the session owner to a cluster member before the
session is successfully synced between the firewalls. Layer2 HA4 connecons must have
sufficient bandwidth and low latency to allow mely synchronizaon between HA members.
The HA4 latency must be lower than the latency incurred when the peering devices switch
traffic between cluster members.
• Architect your networks to minimize asymmetric flows. Session setup requires one cluster
member to see the complete TCP three-way handshake.
PAN-OS® Administrator’s Guide Version 10.1 423 ©2022 Palo Alto Networks, Inc.
High Availability
PAN-OS® Administrator’s Guide Version 10.1 424 ©2022 Palo Alto Networks, Inc.
High Availability
Configure HA Clustering
Learn about HA clustering and follow the HA Clustering Best Pracces and Provisioning before
you configure HA firewalls as members of a cluster.
STEP 1 | Establish an interface as an HA interface (to later assign as the HA4 link).
1. Select Network > Interfaces > Ethernet and select an interface; for example,
ethernet1/1.
2. Select the Interface Type to be HA.
3. Click OK.
4. Repeat this step to configure another interface to use as the HA4 backup link.
PAN-OS® Administrator’s Guide Version 10.1 425 ©2022 Palo Alto Networks, Inc.
High Availability
STEP 5 | Specify all members of the HA cluster, including the local member and both HA peers in any
HA pair.
1. Select Cluster Config.
2. (On a supported firewall) Add a peer member’s Device Serial Number.
3. (On Panorama) Add and select a Device from the dropdown and enter a Device Name.
4. Enter the HA4 IP Address of the HA peer in the cluster.
5. Enter the HA4 Backup IP Address of the HA peer in the cluster.
6. Enable Session Synchronizaon with the peer you idenfied.
7. (Oponal) Enter a helpful Descripon.
8. Click OK.
9. Select the device and Enable it.
STEP 7 | Commit.
PAN-OS® Administrator’s Guide Version 10.1 426 ©2022 Palo Alto Networks, Inc.
High Availability
HA4 backup links, signifying possible problems with synchronizing informaon between
members.
STEP 10 | Access the CLI to view HA cluster and HA4 link informaon and perform other HA clustering
tasks.
You can view HA cluster flap stascs. The cluster flap count is reset when the HA
device moves from suspended to funconal and vice versa. The cluster flap count also
resets when the non-funconal hold me expires.
PAN-OS® Administrator’s Guide Version 10.1 427 ©2022 Palo Alto Networks, Inc.
High Availability
You must enable encrypon and it must be funconing properly on an HA pair before you
can perform the following tasks.
If you are configuring the HA1 control link in FIPS-CC mode, you must set automac
rekeying parameters for session keys.
To use the same SSH connecon sengs for each Dedicated Log Collector (M-series or
Panorama virtual appliance in Log Collector mode) in a Collector Group, configure an SSH
service profile from the Panorama management server, Commit the changes to Panorama,
and then Push the configuraon to the Log Collectors. You can use the set log-
collector-group <name> general-setting management ssh commands.
Create an SSH service profile to exercise greater control over SSH connecons between your
HA firewalls.
This example creates an HA profile without configuring any sengs.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name>
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. To verify that the new profile has been created and view the sengs for any exisng
profiles:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles
PAN-OS® Administrator’s Guide Version 10.1 428 ©2022 Palo Alto Networks, Inc.
High Availability
(Oponal) Set the SSH server to use only the specified encrypon ciphers for the HA1 sessions.
By default, HA1 SSH allows all supported ciphers for encrypon of CLI HA sessions. When you
set one or more ciphers, the SSH server adverses only those ciphers while connecng, and
if the SSH client (HA peer) tries to connect using a different cipher, the server terminates the
connecon.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh profiles ciphers ha-
profiles <name> ciphers <cipher>
aes128-cbc—AES 128-bit cipher with Cipher Block Chaining
aes128-ctr—AES 128-bit cipher with Counter Mode
aes128-gcm—AES 128-bit cipher with GCM (Galois/Counter Mode)
aes192-cbc—AES 192-bit cipher with Cipher Block Chaining
aes192-ctr—AES 192-bit cipher with Counter Mode
aes256-cbc—AES 256-bit cipher with Cipher Block Chaining
aes256-ctr—AES 256-bit cipher with Counter Mode
aes256-gcm—AES 256-bit cipher with GCM
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. (HA1 Backup is configured) admin@PA-3250> request high-availability
session-reestablish
6. (No HA1 Backup is configured or HA1 Backup link is down) admin@PA-3250> request
high-availability session-reestablish force
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the HA peers. (Using the force
opon when an HA1 backup is configured has no effect.)
7. To verify the ciphers have been updated:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles ha-profiles
ciphers
PAN-OS® Administrator’s Guide Version 10.1 429 ©2022 Palo Alto Networks, Inc.
High Availability
key of 256 bits. It also re-establishes the HA1 connecon using the new host key without
restarng the HA peers.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name> default-hostkey key-type ECDSA key-length 256
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. admin@PA-3250> request high-availability sync-to-remote ssh-key
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the two HA peers. (Using the
force opon when an HA1 backup is configured has no effect.)
8. To verify the host key has been updated:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles ha-profiles
<name> default-hostkey
PAN-OS® Administrator’s Guide Version 10.1 430 ©2022 Palo Alto Networks, Inc.
High Availability
(Oponal) Delete a cipher from the set of ciphers you selected for SSH over the HA1 control
link.
This example deletes the AES CBC cipher with 128-bit key.
1. admin@PA-3250> configure
2. admin@PA-3250# delete deviceconfig system ssh profiles ha-profiles
<name> ciphers aes128-cbc
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. (HA1 Backup is configured) admin@PA-3250> request high-availability
session-reestablish
6. (No HA1 Backup is configured or HA1 Backup link is down) admin@PA-3250> request
high-availability session-reestablish force
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the two HA peers. (Using the
force opon when an HA1 backup is configured has no effect.
7. To verify the cipher has been deleted:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles ha-profiles
<name> ciphers
PAN-OS® Administrator’s Guide Version 10.1 431 ©2022 Palo Alto Networks, Inc.
High Availability
(Oponal) Set the session key exchange algorithms the HA1 SSH server will support.
By default, the SSH server (HA firewall) adverses all the key exchange algorithms to the SSH
client (HA peer firewall).
If you are using an ECDSA default key type, the best pracce is to use an ECDH key
algorithm.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name> kex <value>
diffie-hellman-group14-sha1—Diffie-Hellman group 14 with SHA1 hash
ecdh-sha2-nistp256—Ellipc-Curve Diffie-Hellman over Naonal Instute of
Standards and Technology (NIST) P-256 with SHA2-256 hash
ecdh-sha2-nistp384—Ellipc-Curve Diffie-Hellman over NIST P-384 with SHA2-384
hash
ecdh-sha2-nistp521—Ellipc-Curve Diffie-Hellman over NIST P-521 with SHA2-521
hash
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. (HA1 Backup is configured) admin@PA-3250> request high-availability
session-reestablish
6. (No HA1 Backup is configured or HA1 Backup link is down) admin@PA-3250> request
high-availability session-reestablish force
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the two HA peers. (Using the
force opon when an HA1 backup is configured has no effect.
7. To verify the key exchange algorithms have been updated:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles ha-profiles
PAN-OS® Administrator’s Guide Version 10.1 432 ©2022 Palo Alto Networks, Inc.
High Availability
(Oponal) Set the message authencaon codes (MAC) the HA1 SSH server will support.
By default, the server adverses all of the MAC algorithms to the client.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name> mac <value>
hmac-sha1—MAC with SHA1 cryptographic hash
hmac-sha2-256—MAC with SHA2-256 cryptographic hash
hmac-sha2-512—MAC with SHA2-512 cryptographic hash
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. (HA1 Backup is configured) admin@PA-3250> request high-availability
session-reestablish
6. (No HA1 Backup is configured or HA1 Backup link is down) admin@PA-3250> request
high-availability session-reestablish force
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the two HA peers. (Using the
force opon has no effect when an HA1 backup is configured.
7. To verify the MAC algorithms have been updated:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles ha-profiles
PAN-OS® Administrator’s Guide Version 10.1 433 ©2022 Palo Alto Networks, Inc.
High Availability
(Oponal) Regenerate ECDSA or RSA host keys for HA1 SSH to replace the exisng keys, and
re-establish HA1 sessions between HA peers using the new keys without restarng the HA
peers.
The HA peers use the host keys to authencate each other. This example regenerates the
ECDSA 256 default host key.
Regenerang a host key does not change your default host key type. To regenerate the
default host key you are using, you must specify your default host key type and length
when you regenerate. Regenerang a host key that isn’t your default host key type
simply regenerates a key that you aren’t using and therefore has no effect.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh regenerate-hostkeys ha
key-type ECDSA key-length 256
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. admin@PA-3250> request high-availability sync-to-remote ssh-key
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the two HA peers. (Using the
force opon when an HA1 backup is configured has no effect.)
(Oponal) Set rekey parameters to establish when automac rekeying of the session keys
occurs for SSH over the HA1 control link.
The session keys are used to encrypt the traffic between the HA peers. The parameters you
can set are data volume (in megabytes), me interval (seconds), and packet count. Aer any
one rekey parameter reaches its configured value, SSH iniates a key exchange.
You can set a second or third parameter if you aren’t sure the parameter you configured
will reach its value as soon as you want rekeying to occur. The first parameter to reach its
configured value will prompt a rekey, then the firewall will reset all rekey parameters.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name> session-rekey data 32
Rekeying occurs aer the volume of data (in megabytes) is transmied following the
previous rekey. The default is based on the cipher you use and ranges from 1GB to 4GB;
PAN-OS® Administrator’s Guide Version 10.1 434 ©2022 Palo Alto Networks, Inc.
High Availability
the range is 10MB to 4,000MB. Alternavely, you can enter set deviceconfig
system ssh profiles ha-profiles <name> session-rekey data
default command, which sets the data parameter to the default value of the individual
cipher you are using.
3. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name> session-rekey interval 3600
Rekeying occurs aer the specified me interval (in seconds) passes following the
previous rekeying. By default, me-based rekeying is disabled (set to none). The range is
10 to 3,600.
4. admin@PA-3250# set deviceconfig system ssh profiles ha-profiles
<name> session-rekey packets 27
n
Rekeying occurs aer the defined number of packets (2 ) are transmied following
14
the previous rekey. For example, 14 configures that a maximum of 2 packets are
28 12 27
transmied before a rekey occurs. The default is 2 . The range is 12 to 27 (2 to 2 ).
Alternavely, you can enter set deviceconfig system ssh profiles ha-
profiles <name> session-rekey packets default, which sets the packets
28
parameter to 2 .
Choose rekeying parameters based on your type of traffic and network speeds (in
addion to FIPS-CC requirements if they apply to you). Don’t set the parameters
so low that they affect SSH performance.
5. admin@PA-3250# commit
6. admin@PA-3250# exit
7. (HA1 Backup is configured) admin@PA-3250> request high-availability
session-reestablish
8. (No HA1 Backup is configured or HA1 Backup link is down) admin@PA-3250> request
high-availability session-reestablish force
You can force the firewall to reestablish HA1 sessions if there is no HA1 backup,
which causes a brief split-brain condion between the two HA peers. (Using the
force opon when an HA1 backup is configured has no effect.)
9. To verify the changes:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh profiles ha-profiles
<name> session-rekey
PAN-OS® Administrator’s Guide Version 10.1 435 ©2022 Palo Alto Networks, Inc.
High Availability
Acvate the profile by selecng the profile and restarng HA1 SSH service.
1. admin@PA-3250> configure
2. admin@PA-3250# set deviceconfig system ssh ha ha-profile <name>
3. admin@PA-3250# commit
4. admin@PA-3250# exit
5. admin@PA-3250> set ssh service-restart ha
6. To verify the correct profile is in use:
admin@PA-3250> configure
admin@PA-3250# show deviceconfig system ssh ha
PAN-OS® Administrator’s Guide Version 10.1 436 ©2022 Palo Alto Networks, Inc.
High Availability
HA Firewall States
An HA firewall can be in one of the following states:
Inial A/P or A/ Transient state of a firewall when it joins the HA pair. The firewall
A remains in this state aer boot-up unl it discovers a peer and
negoaons begins. Aer a meout, the firewall becomes acve
if HA negoaon has not started.
PAN-OS® Administrator’s Guide Version 10.1 437 ©2022 Palo Alto Networks, Inc.
High Availability
Suspended A/P or A/ The device is disabled so won’t pass data traffic and although
A HA communicaons sll occur, the device doesn’t parcipate in
the HA elecon process. It can’t move to an HA funconal state
without user intervenon.
PAN-OS® Administrator’s Guide Version 10.1 438 ©2022 Palo Alto Networks, Inc.
High Availability
Reference: HA Synchronizaon
If you have enabled configuraon synchronizaon on both peers in an HA pair, most of the
configuraon sengs you configure on one peer will automacally sync to the other peer upon
commit. To avoid configuraon conflicts, always make configuraon changes on the acve (acve/
passive) or acve-primary (acve/acve) peer and wait for the changes to sync to the peer before
making any addional configuraon changes.
The following topics idenfy which configuraon sengs you must configure on each firewall
independently (these sengs are not synchronized from the HA peer).
• What Sengs Don’t Sync in Acve/Passive HA?
• What Sengs Don’t Sync in Acve/Acve HA?
• Synchronizaon of System Runme Informaon
Mul-vsys Capability You must acvate the Virtual Systems license on each firewall in the
pair to increase the number of virtual systems beyond the base number
provided by default on PA-3200 Series, PA-5200 Series, PA-5450, and
PA-7000 Series firewalls.
You must also enable Mul Virtual System Capability on each firewall
(Device > Setup > Management > General Sengs).
Panorama Sengs Set the following Panorama sengs on each firewall (Device > Setup >
Management > Panorama Sengs).
• Panorama Servers
PAN-OS® Administrator’s Guide Version 10.1 439 ©2022 Palo Alto Networks, Inc.
High Availability
Global Service Routes Device > Setup > Services > Service Route Configuraon
Telemetry and Threat Device > Setup > Telemetry and Threat Intelligence
Intelligence Sengs
Data Protecon Device > Setup > Content-ID > Manage Data Protecon
Jumbo Frames Device > Setup > Session > Session Sengs > Enable Jumbo Frame
Packet Buffer Device > Setup > Session > Session Sengs > Packet Buffer
Protecon Protecon
Network > Zones > Enable Packet Buffer Protecon
Forward Proxy Server Device > Setup > Session > Decrypon Sengs > SSL Forward Proxy
Cerficate Sengs Sengs
Master Key Secured Device > Setup > HSM > Hardware Security Module Provider >
by HSM Master Key Secured by HSM
Soware Updates With soware updates, you can either download and install them
separately on each firewall, or download them on one peer and sync
the update to the other peer. You must install the update on each peer
(Device > Soware).
GlobalProtect Agent With GlobalProtect app updates, you can either download and install
Package them separately on each firewall, or download them to one peer and
sync the update to the other peer. You must acvate separately on
each peer (Device > GlobalProtect Client).
Content Updates With content updates, you can either download and install them
separately on each firewall, or download them on one peer and sync
the update to the other peer. You must install the update on each peer
(Device > Dynamic Updates).
PAN-OS® Administrator’s Guide Version 10.1 440 ©2022 Palo Alto Networks, Inc.
High Availability
Master Key The master key must be idencal on each firewall in the HA pair, but
you must manually enter it on each firewall (Device > Master Key and
Diagnoscs).
Before changing the master key, you must disable config sync on both
peers (Device > High Availability > General > Setup and clear the
Enable Config Sync check box) and then re-enable it aer you change
the keys.
Reports, logs, and Log data, reports, and Dashboard data and sengs (column display,
Dashboard Sengs widgets) are not synced between peers. Report configuraon sengs,
however, are synced.
Rule Usage Data Rule usage data, such as hit count, Created, and Modified Dates, are
not synced between peers. You need to log in to the each firewall to
view the policy rule hit count data for each firewall or use Panorama to
view informaon on the HA firewall peers.
SSL/TLS Service Device > Cerficate Management > SSL/TLS Service Profile
Profile for Device
SSL/TLS Service Profile for Device Management doesn’t synchronize
Management only
with an HA peer.
Device-ID and IoT IP address-to-device mappings and policy rule recommendaons don’t
Security synchronize with an HA peer.
PAN-OS® Administrator’s Guide Version 10.1 441 ©2022 Palo Alto Networks, Inc.
High Availability
Mul-vsys Capability You must acvate the Virtual Systems license on each firewall in the
pair to increase the number of virtual systems beyond the base number
provided by default on PA-3200 Series, PA-5200 Series, PA-5450, and
PA-7000 Series firewalls.
You must also enable Mul Virtual System Capability on each firewall
(Device > Setup > Management > General Sengs).
Panorama Sengs Set the following Panorama sengs on each firewall (Device > Setup >
Management > Panorama Sengs).
• Panorama Servers
• Disable Panorama Policy and Objects and Disable Device and
Network Template
Global Service Routes Device > Setup > Services > Service Route Configuraon
Telemetry and Threat Device > Setup > Telemetry and Threat Intelligence
Intelligence Sengs
Data Protecon Device > Setup > Content-ID > Manage Data Protecon
Jumbo Frames Device > Setup > Session > Session Sengs > Enable Jumbo Frame
Packet Buffer Device > Setup > Session > Session Sengs > Packet Buffer
Protecon Protecon
Network > Zones > Enable Packet Buffer Protecon
Forward Proxy Server Device > Setup > Session > Decrypon Sengs > SSL Forward Proxy
Cerficate Sengs Sengs
PAN-OS® Administrator’s Guide Version 10.1 442 ©2022 Palo Alto Networks, Inc.
High Availability
Soware Updates With soware updates, you can either download and install them
separately on each firewall, or download them on one peer and sync
the update to the other peer. You must install the update on each peer
(Device > Soware).
GlobalProtect Agent With GlobalProtect app updates, you can either download and install
Package them separately on each firewall, or download them to one peer and
sync the update to the other peer. You must acvate separately on
each peer (Device > GlobalProtect Client).
Content Updates With content updates, you can either download and install them
separately on each firewall, or download them on one peer and sync
the update to the other peer. You must install the update on each peer
(Device > Dynamic Updates).
Ethernet Interface IP All Ethernet interface configuraon sengs sync except for the IP
Addresses address (Network > Interface > Ethernet).
Loopback Interface IP All Loopback interface configuraon sengs sync except for the IP
Addresses address (Network > Interface > Loopback).
Tunnel Interface IP All Tunnel interface configuraon sengs sync except for the IP
Addresses address (Network > Interface > Tunnel).
LACP System Priority Each peer must have a unique LACP System ID in an acve/acve
deployment (Network > Interface > Ethernet > Add Aggregate Group
> System Priority).
VLAN Interface IP All VLAN interface configuraon sengs sync except for the IP
Address address (Network > Interface > VLAN).
Virtual Routers Virtual router configuraon synchronizes only if you have enabled
VR Sync (Device > High Availability > Acve/Acve Config > Packet
Forwarding). Whether or not to do this depends on your network
design, including whether you have asymmetric roung.
PAN-OS® Administrator’s Guide Version 10.1 443 ©2022 Palo Alto Networks, Inc.
High Availability
Master Key The master key must be idencal on each firewall in the HA pair, but
you must manually enter it on each firewall (Device > Master Key and
Diagnoscs).
Before changing the master key, you must disable config sync on both
peers (Device > High Availability > General > Setup and clear the
Enable Config Sync check box) and then re-enable it aer you change
the keys.
PAN-OS® Administrator’s Guide Version 10.1 444 ©2022 Palo Alto Networks, Inc.
High Availability
Reports, logs, and Log data, reports, and dashboard data and sengs (column display,
Dashboard Sengs widgets) are not synced between peers. Report configuraon sengs,
however, are synced.
Rule Usage Data Rule usage data, such as hit count, Created, and Modified Dates, are
not synced between peers. You need to log in to the each firewall to
view the policy rule hit count data for each firewall or use Panorama to
view informaon on the HA firewall peers.
SSL/TLS Service Device > Cerficate Management > SSL/TLS Service Profile
Profile for Device
SSL/TLS Service Profile for Device Management doesn’t synchronize
Management only
with an HA peer.
Device-ID and IoT IP address-to-device mappings and policy rule recommendaons don’t
Security synchronize with an HA peer.
A/P A/A
Management Plane
PAN-OS® Administrator’s Guide Version 10.1 445 ©2022 Palo Alto Networks, Inc.
High Availability
A/P A/A
DHCP Lease (as server) Yes Yes HA1 If the PAN-OS versions
on the HA peers don’t
match, the DHCP
Lease (as server) config
informaon won’t sync.
DHCP Client Sengs and Yes Yes HA1 If the PAN-OS versions
Lease on the HA peers don’t
match, the DHCP Client
PAN-OS® Administrator’s Guide Version 10.1 446 ©2022 Palo Alto Networks, Inc.
High Availability
A/P A/A
Sengs and Lease config
informaon won’t sync.
Dataplane
A host
session is
a session
terminated
on one
of the
firewall
interfaces,
such as
an ICMP
session
pinging
one
of the
firewall
interfaces
or a GP
tunnel.
PAN-OS® Administrator’s Guide Version 10.1 447 ©2022 Palo Alto Networks, Inc.
High Availability
A/P A/A
PAN-OS® Administrator’s Guide Version 10.1 448 ©2022 Palo Alto Networks, Inc.
Monitoring
To forestall potenal issues and to accelerate incidence response when needed, the
firewall provides intelligence about traffic and user paerns using customizable and
informave reports. The dashboard, Applicaon Command Center (ACC), reports, and
logs on the firewall allow you to monitor acvity on your network. You can monitor
the logs and filter the informaon to generate reports with predefined or customized
views. For example, you can use the predefined templates to generate reports on
user acvies or analyze the reports and logs to interpret unusual behavior on your
network and generate a custom report on the traffic paern. For a visually engaging
presentaon of network acvity, the dashboard and the ACC include widgets, charts,
and tables with which you can interact to find the informaon you care about. In
addion, you can configure the firewall to forward monitored informaon as email
noficaons, syslog messages, SNMP traps, and NetFlow records to external services.
(PAN-OS 10.1.2 and later versions) To use the monitoring funconality with the PA-410 you must
manage PA-410 firewalls through a Panorama management server.
449
Monitoring
Top Applicaons Displays the applicaons with the most sessions. The block size
indicates the relave number of sessions (mouse-over the block to
view the number), and the color indicates the security risk—from green
(lowest) to red (highest). Click an applicaon to view its applicaon
profile.
Top High Risk Similar to Top Applicaons, except that it displays the highest-risk
Applicaons applicaons with the most sessions.
General Informaon Displays the firewall name, model, PAN-OS soware version, the
applicaon, threat, and URL filtering definion versions, the current
date and me, and the length of me since the last restart.
Threat Logs Displays the threat ID, applicaon, and date and me for the last 10
entries in the Threat log. The threat ID is a malware descripon or URL
that violates the URL filtering profile.
Config Logs Displays the administrator username, client (Web or CLI), and date and
me for the last 10 entries in the Configuraon log.
Data Filtering Logs Displays the descripon and date and me for the last 60 minutes in
the Data Filtering log.
URL Filtering Logs Displays the descripon and date and me for the last 60 minutes in
the URL Filtering log.
System Logs Displays the descripon and date and me for the last 10 entries in the
System log.
PAN-OS® Administrator’s Guide Version 10.1 450 ©2022 Palo Alto Networks, Inc.
Monitoring
System Resources Displays the Management CPU usage, Data Plane usage, and the
Session Count, which displays the number of sessions established
through the firewall.
Logged In Admins Displays the source IP address, session type (Web or CLI), and session
start me for each administrator who is currently logged in.
ACC Risk Factor Displays the average risk factor (1 to 5) for the network traffic
processed over the past week. Higher values indicate higher risk.
High Availability If high availability (HA) is enabled, indicates the HA status of the local
and peer firewall—green (acve), yellow (passive), or black (other). For
more informaon about HA, see High Availability.
PAN-OS® Administrator’s Guide Version 10.1 451 ©2022 Palo Alto Networks, Inc.
Monitoring
ACC data, including ACC widgets and exported ACC reports, use Security policy rule data
that you enabled to Log at Session End. If some data you expect to view in the ACC is
not displayed, view your Traffic and Threat logs to determine the correct Security policy
rule to modify as needed so all new logs generated that match the Security policy rule are
viewable in the ACC.
• ACC—First Look
• ACC Tabs
• ACC Widgets (Widget Descripons)
• ACC Filters
• Interact with the ACC
• Use Case: ACC—Path of Informaon Discovery
ACC—First Look
Take a quick tour of the ACC.
PAN-OS® Administrator’s Guide Version 10.1 452 ©2022 Palo Alto Networks, Inc.
Monitoring
ACC—First Look
Global Filters The Global Filters allow you to set the filter across
all widgets and all tabs. The charts/graphs apply
the selected filters before rendering the data. For
informaon on using the filters, see ACC Filters.
PAN-OS® Administrator’s Guide Version 10.1 453 ©2022 Palo Alto Networks, Inc.
Monitoring
ACC—First Look
virtual systems on a firewall enabled for mulple
virtual systems or across one or more firewalls
within a device group on Panorama.
Source The data used for the ACC display. The opons
vary on the firewall and on Panorama.
On the firewall, if enabled for mulple virtual
systems, you can use the Virtual System drop-
down to change the ACC display to include data
from all virtual systems or just a selected virtual
system.
On Panorama, you can select the Device Group
drop-down to change the ACC display to include
data from all device groups or just a selected
device group.
Addionally, on Panorama, you can change the
Data Source as Panorama data or Remote Device
Data. Remote Device Data is only available when
all the managed firewalls are on PAN-OS 7.0.0
or later. When you filter the display for a specific
device group, Panorama data is used as the data
source.
ACC Tabs
The ACC includes the following predefined tabs for viewing network acvity, threat acvity, and
blocked acvity.
PAN-OS® Administrator’s Guide Version 10.1 454 ©2022 Palo Alto Networks, Inc.
Monitoring
Tab Descripon
Network Acvity Displays an overview of traffic and user acvity on your network
including:
• Top applicaons in use
• Top users who generate traffic (with a drill down into the bytes,
content, threats or URLs accessed by the user)
• Most used security rules against which traffic matches occur
In addion, you can also view network acvity by source or
desnaon zone, region, or IP address, ingress or egress interfaces,
and GlobalProtect host informaon such as the operang systems
of the devices most commonly used on the network.
Blocked Acvity Focuses on traffic that was prevented from coming into the
network. The widgets in this tab allow you to view acvity denied
by applicaon name, username, threat name, blocked content—files
and data that were blocked by a file blocking profile. It also lists the
top security rules that were matched on to block threats, content,
and URLs.
Tunnel Acvity Displays the acvity of tunnel traffic that the firewall inspected
based on your tunnel inspecon policies. Informaon includes
tunnel usage based on tunnel ID, monitor tag, user, and tunnel
protocols such as Generic Roung Encapsulaon (GRE), General
Packet Radio Service (GPRS) Tunneling Protocol for User Data (GTP-
U), and non-encrypted IPSec.
PAN-OS® Administrator’s Guide Version 10.1 455 ©2022 Palo Alto Networks, Inc.
Monitoring
Tab Descripon
GlobalProtect to quaranne the device, the reason GlobalProtect
quaranned the device, and the locaon of the quaranned devices.
You can also Interact with the ACC to create customized tabs with custom layout and widgets that
meet your network monitoring needs, export the tab and share with another administrator.
ACC Widgets
The widgets on each tab are interacve; you can set the ACC Filters and drill down into the details
for each table or graph, or customize the widgets included in the tab to focus on the informaon
you need. For details on what each widget displays, see Widget Descripons.
Widgets
PAN-OS® Administrator’s Guide Version 10.1 456 ©2022 Palo Alto Networks, Inc.
Monitoring
Widgets
applicaons, data, profiles, objects, users. The
available opons vary by widget.
Acons
Maximize view— Allows you enlarge the widget
and view the table in a larger screen space and with
more viewable informaon.
PAN-OS® Administrator’s Guide Version 10.1 457 ©2022 Palo Alto Networks, Inc.
Monitoring
Widgets
filtered using the me period for which the graph is
rendered.
If you have set local and global filters, the log query
concatenates the me period and the filters and
only displays logs that match the combined filter
set.
Widget Descripons
Each tab on the ACC includes a different set of widgets.
Widget Descripon
Applicaon Usage The table displays the top ten applicaons used on your network, all
the remaining applicaons used on the network are aggregated and
displayed as other. The graph displays all applicaons by applicaon
category, sub category, and applicaon. Use this widget to scan
for applicaons being used on the network, it informs you about
the predominant applicaons using bandwidth, session count, file
transfers, triggering the most threats, and accessing URLs.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: treemap, area, column, line (the charts vary by the
sort by aribute selected)
User Acvity Displays the top ten most acve users on the network who have
generated the largest volume of traffic and consumed network
resources to obtain content. Use this widget to monitor top users on
usage sorted on bytes, sessions, threats, content (files and paerns),
and URLs visited.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: area, column, line (the charts vary by the sort by
aribute selected)
Source IP Acvity Displays the top ten IP addresses or hostnames of the devices that
have iniated acvity on the network. All other devices are aggregated
and displayed as other.
PAN-OS® Administrator’s Guide Version 10.1 458 ©2022 Palo Alto Networks, Inc.
Monitoring
Widget Descripon
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: area, column, line (the charts vary by the sort by
aribute selected)
Source Regions Displays the top ten regions (built-in or custom defined regions) around
the world from where users iniated acvity on your network.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: map, bar
Desnaon Regions Displays the top ten desnaon regions (built-in or custom defined
regions) on the world map from where content is being accessed by
users on the network.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: map, bar
HIP Informaon Displays informaon on the state of the hosts on which the
GlobalProtect agent is running; the host system is a GlobalProtect
endpoint. This informaon is sourced from entries in the HIP match log
that are generated when the data submied by the GlobalProtect app
matches a HIP object or a HIP profile you have defined on the firewall.
If you do not have HIP Match logs, this widget is blank. To learn how
to create HIP objects and HIP profiles and use them as policy match
criteria, see Configure HIP-Based Policy Enforcement.
Sort aributes: profiles, objects, operang systems
Charts available: bar
Rule Usage Displays the top ten rules that have allowed the most traffic on the
network. Use this widget to view the most commonly used rules,
monitor the usage paerns, and to assess whether the rules are
effecve in securing your network.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: line
Ingress Interfaces Displays the firewall interfaces that are most used for allowing traffic
into the network.
Sort aributes: bytes, bytes sent, bytes received
PAN-OS® Administrator’s Guide Version 10.1 459 ©2022 Palo Alto Networks, Inc.
Monitoring
Widget Descripon
Charts available: line
Egress Interfaces Displays the firewall interfaces that are most used by traffic exing the
network.
Sort aributes: bytes, bytes sent, bytes received
Charts available: line
Source Zones Displays the zones that are most used for allowing traffic into the
network.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: line
Desnaon Zones Displays the zones that are most used by traffic going outside the
network.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: line
Compromised Hosts Displays the hosts that are likely compromised on your network. This
widget summarizes the events from the correlaon logs. For each
source user/IP address, it includes the correlaon object that triggered
the match and the match count, which is aggregated from the match
evidence collated in the correlated events logs. For details see Use the
Automated Correlaon Engine.
Available on the PA-5200 Series, PA-7000 Series, and Panorama.
Sort aributes: severity (by default)
Hosts Vising Displays the frequency with which hosts (IP address/hostnames) on
Malicious URLs your network have accessed malicious URLs. These URLs are known to
be malware based on categorizaon in PAN-DB.
Sort aributes: count
Charts available: line
Hosts Resolving Displays the top hosts matching DNS signatures; hosts on the network
Malicious Domains that are aempng to resolve the hostname or domain of a malicious
URL. This informaon is gathered from an analysis of the DNS acvity
on your network. It ulizes passive DNS monitoring, DNS traffic
generated on the network, acvity seen in the sandbox if you have
configured DNS sinkhole on the firewall, and DNS reports on malicious
DNS sources that are available to Palo Alto Networks customers.
Sort aributes: count
PAN-OS® Administrator’s Guide Version 10.1 460 ©2022 Palo Alto Networks, Inc.
Monitoring
Widget Descripon
Charts available: line
Threat Acvity Displays the threats seen on your network. This informaon is based
on signature matches in Anvirus, An-Spyware, and Vulnerability
Protecon profiles and viruses reported by WildFire.
Sort aributes: threats
Charts available: bar, area, column
WildFire Acvity by Displays the applicaons that generated the most WildFire
Applicaon submissions. This widget uses the malicious and benign verdict from
the WildFire Submissions log.
Sort aributes: malicious, benign
Charts available: bar, line
WildFire Acvity by Displays the threat vector by file type. This widget displays the file
File Type types that generated the most WildFire submissions and uses the
malicious and benign verdict from the WildFire Submissions log. If this
data is unavailable, the widget is empty.
Sort aributes: malicious, benign
Charts available: bar, line
Applicaons using Displays the applicaons that are entering your network on non-
Non Standard Ports standard ports. If you have migrated your firewall rules from a port-
based firewall, use this informaon to cra policy rules that allow
traffic only on the default port for the applicaon. Where needed,
make an excepon to allow traffic on a non-standard port or create a
custom applicaon.
Sort aributes: bytes, sessions, threats, content, URLs
Charts available: treemap, line
Rules Allowing Displays the security policy rules that allow applicaons on non-
Applicaons On Non default ports. The graph displays all the rules, while the table displays
Standard Ports the top ten rules and aggregates the data from the remaining rules as
other.
This informaon helps you idenfy gaps in network security by
allowing you to assess whether an applicaon is hopping ports or
sneaking into your network. For example, you can validate whether
you have a rule that allows traffic on any port except the default port
for the applicaon. Say for example, you have a rule that allow DNS
traffic on its applicaon-default port (port 53 is the standard port for
DNS). This widget will display any rule that allows DNS traffic into your
network on any port except port 53.
Sort aributes: bytes, sessions, threats, content, URLs
PAN-OS® Administrator’s Guide Version 10.1 461 ©2022 Palo Alto Networks, Inc.
Monitoring
Widget Descripon
Charts available: treemap, line
Blocked Acvity—Focuses on traffic that was prevented from coming into the network
Blocked Applicaon Displays the applicaons that were denied on your network, and
Acvity allows you to view the threats, content, and URLs that you kept out of
your network.
Sort aributes: threats, content, URLs
Charts available: treemap, area, column
Blocked User Displays user requests that were blocked by a match on an Anvirus,
Acvity An-spyware, File Blocking or URL Filtering profile aached to
Security policy rule.
Sort aributes: threats, content, URLs
Charts available: bar, area, column
Blocked Threats Displays the threats that were successfully denied on your network.
These threats were matched on anvirus signatures, vulnerability
signatures, and DNS signatures available through the dynamic content
updates on the firewall.
Sort aributes: threats
Charts available: bar, area, column
Blocked Content Displays the files and data that was blocked from entering the
network. The content was blocked because security policy denied
access based on criteria defined in a File Blocking security profile or a
Data Filtering security profile.
Sort aributes: files, data
Charts available: bar, area, column
Security Policies Displays the security policy rules that blocked or restricted traffic
Blocking Acvity into your network. Because this widget displays the threats, content,
and URLs that were denied access into your network, you can use
it to assess the effecveness of your policy rules. This widget does
not display traffic that blocked because of deny rules that you have
defined in policy.
Sort aributes: threats, content, URLs
Charts available: bar, area, column
PAN-OS® Administrator’s Guide Version 10.1 462 ©2022 Palo Alto Networks, Inc.
Monitoring
Widget Descripon
GlobalProtect Displays a chart view summary of your deployment. Use the toggle at
Deployment Acvity the top of the chart to view the distribuon of users by authencaon
method, GlobalProtect app version, and operang system version.
Sort aributes: auth method, globalprotect app version, os
Charts available: bar, line
GlobalProtect Displays a chart view summary of devices that have been quaranned.
Quaranne Acvity Use the toggle at the top of the chart to view the quaranned devices
by the acons that caused GlobalProtect to quaranne the device, the
reason GlobalProtect quaranned the device, and the locaon of the
quaranned devices.
Sort aributes: acons, reason, locaon
Charts available: bar, line
SSL/TLS Acvity Shows successful TLS connecons by TLS version and applicaon or
SNI. This widget helps you understand how much risk you are taking
on by allowing weaker TLS protocol versions. Idenfying applicaons
and SNIs that use weak protocols enables you to evaluate each
one and decide whether you need to allow access to it for business
reasons. If you don’t need the applicaon for business purposes, you
PAN-OS® Administrator’s Guide Version 10.1 463 ©2022 Palo Alto Networks, Inc.
Monitoring
Widget Descripon
may want to block the traffic instead of allowing it. Click an applicaon
or an SNI to drill down and see detailed informaon.
Decrypon Failure Shows the reasons for decrypon failures, such as cerficate or
Reasons protocol issues, by SNI. Use this informaon to detect problems
caused by Decrypon policy or profile misconfiguraon or by traffic
that uses weak protocols or algorithms. Click a failure reason to drill
down and isolate the number of sessions per SNI or click an SNI to see
the failures for that SNI.
Successful TLS Shows the amount of decrypted and non-decrypted traffic by sessions
Version Acvity or bytes. Traffic that was not decrypted may be excepted from
decrypon by policy, policy misconfiguraon, or by being on the
Decrypon Exclusion List (Device > Cerficate Management > SSL
Decrypon Exclusion).
Successful Key Shows successful key exchange acvity per algorithm, by applicaon
Exchange Acvity or by SNI. Click a key exchange algorithm to see the acvity for just
that algorithm or click an applicaon or SNI to view the key exchange
acvity for that applicaon or SNI.
ACC Filters
The graphs and tables on the ACC widgets allow you to use filters to narrow the scope of data
that is displayed, so that you can isolate specific aributes and analyze informaon you want to
view in greater detail. The ACC supports the simultaneous use of widget and global filters.
• Widget Filters—Apply a widget filter, which is a filter that is local to a specific widget. A widget
filter allows you to interact with the graph and customize the display so that you can drill down
in to the details and access the informaon you want to monitor on a specific widget. To create
a widget filter that is persistent across reboots, you must use the Set Local Filter opon.
PAN-OS® Administrator’s Guide Version 10.1 464 ©2022 Palo Alto Networks, Inc.
Monitoring
• Global filters—Apply global filters across all the tabs in the ACC. A global filter allows you
to pivot the display around the details you care about right now and exclude the unrelated
informaon from the current display. For example, to view all events relang to a specific user
and applicaon, you can apply the username and the applicaon as a global filter and view only
informaon pertaining to the user and the applicaon through all the tabs and widgets on the
ACC. Global filters are not persistent.
Add a tab.
1. Select the icon along the list of tabs.
2. Add a View Name. This name will be used as the name for the tab. You can add up to five
tabs.
PAN-OS® Administrator’s Guide Version 10.1 465 ©2022 Palo Alto Networks, Inc.
Monitoring
Edit a tab.
Select the tab, and click the pencil icon next to the tab name, to edit the tab. For example
.
Eding a tab allows you to add or delete or reset the widgets that are displayed in the tab. You
can also change the widget layout in the tab.
2. To delete a widget group/widget, edit the tab and in the workspace secon, click the [X]
icon on the right. You cannot undo a deleon.
PAN-OS® Administrator’s Guide Version 10.1 466 ©2022 Palo Alto Networks, Inc.
Monitoring
You can also click an aribute in the table (below the graph) to apply it as a widget
filter.
The acve widget filters are indicated next to the widget name.
PAN-OS® Administrator’s Guide Version 10.1 467 ©2022 Palo Alto Networks, Inc.
Monitoring
2. Click the icon to view the list of filters you can apply.
Remove a filter.
Click the icon to remove a filter.
• For global filters: It is located in the Global Filters pane.
• For widget filters: Click the icon to display the Setup Local Filters dialog, then select the
filter, and click the icon.
PAN-OS® Administrator’s Guide Version 10.1 468 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 469 ©2022 Palo Alto Networks, Inc.
Monitoring
Because Marsha has transferred a large volume of data, apply her username as a global filter (ACC
Filters) and pivot all the views in the ACC to Marsha’s traffic acvity.
The Applicaon Usage tab now shows that the top applicaon that Martha used was rapidshare,
a Swiss-owned file-hosng site that belongs to the file-sharing URL category. For further
invesgaon, add rapidshare as a global filter, and view Marsha’s acvity in the context of
rapidshare.
Consider whether you want to sancon rapidshare for company use. Should you allow
uploads to this site and do you need a QoS policy to limit bandwidth?
PAN-OS® Administrator’s Guide Version 10.1 470 ©2022 Palo Alto Networks, Inc.
Monitoring
To view which IP addresses Marsha has communicated with, check the Desnaon IP Acvity
widget, and view the data by bytes and by URLs.
To find out which countries Marsha communicated with, sort on sessions in the Desnaon
Regions widget.
From this data, you can confirm that Marsha, a user on your network, has established sessions in
Canada, Germany, Sweden, United Kingdom, and the United States. She logged 2 threats in her
sessions with each desnaon country.
To look at Marsha’s acvity from a threat perspecve, remove the global filter for rapidshare.
In the Threat Acvity widget on the Threat Acvity tab, view the threats. The widget displays
that her acvity had triggered a match for 452 vulnerabilies in the brute force, informaon
PAN-OS® Administrator’s Guide Version 10.1 471 ©2022 Palo Alto Networks, Inc.
Monitoring
leak, portable executable (PE) and spyware threat category. Several of these vulnerabilies are of
crical severity.
To further drill-down into each vulnerability, click into the graph and narrow the scope of your
invesgaon. Each click automacally applies a local filter on the widget.
To invesgate each threat by name, you can create a global filter for say, WordPress Login
Brute Force Aack. Then, view the User Acvity widget in the Network Acvity tab. The tab
is automacally filtered to display threat acvity for Marsha (noce the global filters in the
screenshot).
PAN-OS® Administrator’s Guide Version 10.1 472 ©2022 Palo Alto Networks, Inc.
Monitoring
Noce that this Microso code-execuon vulnerability was triggered over email, by the imap
applicaon. You can now establish that Martha has IE vulnerabilies and email aachment
vulnerabilies, and perhaps her computer needs to be patched. You can now either navigate to
the Blocked Threats widget in the Blocked Acvity tab to check how many of these vulnerabilies
were blocked.
Or, you can check the Rule Usage widget on the Network Acvity tab to discover how many
vulnerabilies made it into your network and which security rule allowed this traffic, and navigate
directly to the security rule using the Global Find capability.
Then, drill into the aackers using web-browsing to aack target desnaon. Consider modifying
the security policy rule to restrict these malicious IP addresses or more narrowly defining which IP
addresses can access your network resources.
To review if any threats were logged over web-browsing, check Marsha’s acvity in the WildFire
Acvity by Applicaon widget in the Threat Acvity tab. You can confirm that Marsha had no
malicious acvity, but to verify that other no other user was compromised by the web-browsing
PAN-OS® Administrator’s Guide Version 10.1 473 ©2022 Palo Alto Networks, Inc.
Monitoring
applicaon, negate Marsha as a global filter and look for other users who triggered threats over
web-browsing.
Click into the bar for imap in the graph and drill into the inbound threats associated with the
applicaon. To find out who an IP address is registered to, hover over the aacker IP address and
select the Who Is link in the drop-down.
Because the session count from this IP address is high, check the Blocked Content and Blocked
Threats widgets in the Blocked Acvity tab for events related to this IP address. The Blocked
Acvity tab allows you to validate whether or not your policy rules are effecve in blocking
content or threats when a host on your network is compromised.
Use the Export PDF capability on the ACC to export the current view (create a snapshot of the
data) and send it to an incidence response team. To view the threat logs directly from the widget,
you can also click the icon to jump to the logs; the query is generated automacally and only
the relevant logs are displayed onscreen (for example in Monitor > Logs > Threat Logs).
PAN-OS® Administrator’s Guide Version 10.1 474 ©2022 Palo Alto Networks, Inc.
Monitoring
You have now used the ACC to review network data/trends to find which applicaons or users are
generang the most traffic, and how many applicaon are responsible for the threats seen on the
network. You were able to idenfy which applicaon(s), user(s) generated the traffic, determine
whether the applicaon was on the default port, and which policy rule(s) allowed the traffic
into the network, and determine whether the threat is spreading laterally on the network. You
also idenfied the desnaon IP addresses, geo-locaons with which hosts on the network are
communicang with. Use the conclusions from your invesgaon to cra goal-oriented policies
that can secure users and your network.
PAN-OS® Administrator’s Guide Version 10.1 475 ©2022 Palo Alto Networks, Inc.
Monitoring
Summary Report
The App Scope Summary report (Monitor > App Scope > Summary) displays charts for the top five
gainers, losers, and bandwidth consuming applicaons, applicaon categories, users, and sources.
PAN-OS® Administrator’s Guide Version 10.1 476 ©2022 Palo Alto Networks, Inc.
Monitoring
The Change Monitor Report contains the following buons and opons.
Buon Descripon
PAN-OS® Administrator’s Guide Version 10.1 477 ©2022 Palo Alto Networks, Inc.
Monitoring
Buon Descripon
PAN-OS® Administrator’s Guide Version 10.1 478 ©2022 Palo Alto Networks, Inc.
Monitoring
Each threat type is color-coded as indicated in the legend below the chart. The Threat Monitor
report contains the following buons and opons.
Buon Descripon
PAN-OS® Administrator’s Guide Version 10.1 479 ©2022 Palo Alto Networks, Inc.
Monitoring
The Threat Map report contains the following buons and opons.
Buon Descripon
Zoom In and Zoom Out Zoom in and zoom out of the map.
PAN-OS® Administrator’s Guide Version 10.1 480 ©2022 Palo Alto Networks, Inc.
Monitoring
The Network Monitor report contains the following buons and opons.
Buon Descripon
PAN-OS® Administrator’s Guide Version 10.1 481 ©2022 Palo Alto Networks, Inc.
Monitoring
The firewall uses geolocaon for creang traffic maps. The firewall is placed at the boom of
the traffic map screen, if you have not specified the geolocaon coordinates (Device > Setup >
Management, General Sengs secon) on the firewall.
Each traffic type is color-coded as indicated in the legend below the chart. The Traffic Map report
contains the following buons and opons.
Buons Descripon
Zoom In and Zoom Out Zoom in and zoom out of the map.
PAN-OS® Administrator’s Guide Version 10.1 482 ©2022 Palo Alto Networks, Inc.
Monitoring
Correlaon Object
A correlaon object is a definion file that specifies paerns to match against, the data sources
to use for the lookups, and me period within which to look for these paerns. A paern is a
boolean structure of condions that queries the following data sources (or logs) on the firewall:
applicaon stascs, traffic, traffic summary, threat summary, threat, data filtering, and URL
filtering. Each paern has a severity rang, and a threshold for the number of mes the paern
match must occur within a defined me limit to indicate malicious acvity. When the match
condions are met, a correlated event is logged.
A correlaon object can connect isolated network events and look for paerns that indicate a
more significant event. These objects idenfy suspicious traffic paerns and network anomalies,
including suspicious IP acvity, known command-and-control acvity, known vulnerability
exploits, or botnet acvity that, when correlated, indicate with a high probability that a host on
the network has been compromised. Correlaon objects are defined and developed by the Palo
Alto Networks Threat Research team, and are delivered with the weekly dynamic updates to
PAN-OS® Administrator’s Guide Version 10.1 483 ©2022 Palo Alto Networks, Inc.
Monitoring
the firewall and Panorama. To obtain new correlaon objects, the firewall must have a Threat
Prevenon license. Panorama requires a support license to get the updates.
The paerns defined in a correlaon object can be stac or dynamic. Correlated objects that
include paerns observed in WildFire are dynamic, and can correlate malware paerns detected
by WildFire with command-and-control acvity iniated by a host that was targeted with the
malware on your network or acvity seen by a Traps protected endpoint on Panorama. For
example, when a host submits a file to the WildFire cloud and the verdict is malicious, the
correlaon object looks for other hosts or clients on the network that exhibit the same behavior
seen in the cloud. If the malware sample had performed a DNS query and browsed to a malware
domain, the correlaon object will parse the logs for a similar event. When the acvity on a host
matches the analysis in the cloud, a high severity correlated event is logged.
Correlated Events
A correlated event is logged when the paerns and thresholds defined in a correlaon object
match the traffic paerns on your network. To Interpret Correlated Events and to view a graphical
display of the events, see Use the Compromised Hosts Widget in the ACC.
STEP 2 | View the details on each correlaon object. Each object provides the following informaon:
• Name and Title—The name and tle indicate the type of acvity that the correlaon object
detects. The name column is hidden from view, by default. To view the definion of the
object, unhide the column and click the name link.
• ID— A unique number that idenfies the correlaon object; this column is also hidden by
default. The IDs are in the 6000 series.
• Category—A classificaon of the kind of threat or harm posed to the network, user, or host.
For now, all the objects idenfy compromised hosts on the network.
• State—Indicates whether the correlaon object is enabled (acve) or disabled (inacve). All
the objects in the list are enabled by default, and are hence acve. Because these objects
PAN-OS® Administrator’s Guide Version 10.1 484 ©2022 Palo Alto Networks, Inc.
Monitoring
are based on threat intelligence data and are defined by the Palo Alto Networks Threat
Research team, keep the objects acve in order to track and detect malicious acvity on
your network.
• Descripon—Specifies the match condions for which the firewall or Panorama will analyze
logs. It describes the sequence of condions that are matched on to idenfy acceleraon or
escalaon of malicious acvity or suspicious host behavior. For example, the Compromise
Lifecycle object detects a host involved in a complete aack lifecycle in a three-step
escalaon that starts with scanning or probing acvity, progressing to exploitaon, and
concluding with network contact to a known malicious domain.
For more informaon, see Automated Correlaon Engine Concepts and Use the Automated
Correlaon Engine.
Field Descripon
Update Time The me when the event was last updated with evidence on the
match. As the firewall collects evidence on paern or sequence
of events defined in a correlaon object, the me stamp on the
correlated event log is updated.
Object Name The name of the correlaon object that triggered the match.
Source Address The IP address of the user/device on your network from which the
traffic originated.
Source User The user and user group informaon from the directory server, if
User-ID is enabled.
Severity A rang that indicates the urgency and impact of the match. The
severity level indicates the extent of damage or escalaon paern,
and the frequency of occurrence. Because correlaon objects are
PAN-OS® Administrator’s Guide Version 10.1 485 ©2022 Palo Alto Networks, Inc.
Monitoring
Field Descripon
To primarily for detecng threats, the correlated events typically relate
configure to idenfying compromised hosts on the network and the severity
the implies the following:
firewall
• Crical—Confirms that a host has been compromised based on
or
correlated events that indicate an escalaon paern. For example,
Panorama
a crical event is logged when a host that received a file with a
to send
malicious verdict by WildFire exhibits the same command-and-
alerts
control acvity that was observed in the WildFire sandbox for that
using
malicious file.
email,
SNMP • High—Indicates that a host is very likely compromised based on
or syslog a correlaon between mulple threat events, such as malware
messages detected anywhere on the network that matches the command-
for a and-control acvity generated by a parcular host.
desired • Medium—Indicates that a host is likely compromised based
severity on the detecon of one or mulple suspicious events, such as
level, repeated visits to known malicious URLs, which suggests a scripted
see Use command-and-control acvity.
External
Services • Low—Indicates that a host is possibly compromised based on the
for detecon of one or mulple suspicious events, such as a visit to a
Monitoring. malicious URL or a dynamic DNS domain.
• Informaonal—Detects an event that may be useful in aggregate
for idenfying suspicious acvity, but the event is not necessarily
significant on its own.
Click the icon to see the detailed log view, which includes all the evidence on a match:
PAN-OS® Administrator’s Guide Version 10.1 486 ©2022 Palo Alto Networks, Inc.
Monitoring
Tab Descripon
Match Object Details: Presents informaon on the Correlaon Object that triggered the
Informaon match.
Match Details: A summary of the match details that includes the match me, last
update me on the match evidence, severity of the event, and an event summary.
Match Presents all the evidence that corroborates the correlated event. It lists detailed
Evidence informaon on the evidence collected for each session.
For more details, see Use the Automated Correlaon Engine and Use the Applicaon Command
Center.
PAN-OS® Administrator’s Guide Version 10.1 487 ©2022 Palo Alto Networks, Inc.
Monitoring
Packet capture can be very CPU intensive and can degrade firewall performance. Only
use this feature when necessary and make sure you turn it off aer you have collected the
required packets.
PAN-OS® Administrator’s Guide Version 10.1 488 ©2022 Palo Alto Networks, Inc.
Monitoring
• GTP Event Packet Capture—The firewall captures a single GTP event, such as GTP-in-GTP, end
user IP spoofing, and abnormal GTP messages, to make GTP troubleshoong easier for mobile
network operators. Enable packet capture in a Mobile Network Protecon profile.
Hardware offload is supported on the following firewalls: PA-3200 Series, PA-5200 Series,
and PA-7000 Series firewall.
Disabling hardware offload may increase the dataplane CPU usage. If dataplane CPU
usage is already high, you may want to schedule a maintenance window before disabling
hardware offload.
STEP 2 | Aer the firewall captures the required traffic, enable hardware offload by running the
following CLI command:
PAN-OS® Administrator’s Guide Version 10.1 489 ©2022 Palo Alto Networks, Inc.
Monitoring
The following example shows how to use a packet capture to troubleshoot a Telnet
connecvity issue from a user in the Trust zone to a server in the DMZ zone.
PAN-OS® Administrator’s Guide Version 10.1 490 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Set packet capture filters, so the firewall only captures traffic you are interested in.
Using filters makes it easier for you to locate the informaon you need in the packet capture
and will reduce the processing power required by the firewall to take the packet capture. To
capture all traffic, do not define filters and leave the filter opon off.
For example, if you configured NAT on the firewall, you will need to apply two filters. The first
one filters on the pre-NAT source IP address to the desnaon IP address and the second one
filters traffic from the desnaon server to the source NAT IP address.
1. Select Monitor > Packet Capture.
2. Click Clear All Sengs at the boom of the window to clear any exisng capture
sengs.
3. Click Manage Filters and click Add.
4. Select Id 1 and in the Source field enter the source IP address you are interested in and
in the Desnaon field enter a desnaon IP address.
For example, enter the source IP address 192.168.2.10 and the desnaon IP address
10.43.14.55. To further filter the capture, set Non-IP to exclude non-IP traffic, such as
broadcast traffic.
5. Add the second filter and select Id 2.
For example, in the Source field enter 10.43.14.55 and in the Desnaon field enter
10.43.14.25. In the Non-IP drop-down menu select exclude.
6. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 491 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 4 | Specify the traffic stage(s) that trigger the packet capture and the filename(s) to use to store
the captured content. For a definion of each stage, click the Help icon on the packet capture
page.
For example, to configure all packet capture stages and define a filename for each stage,
perform the following procedure:
1. Add a Stage to the packet capture configuraon and define a File name for the resulng
packet capture.
For example, select receive as the Stage and set the File name to telnet-test-received.
2. Connue to Add each Stage you want to capture (receive, firewall, transmit, and drop)
and set a unique File name for each stage.
STEP 6 | Generate traffic that matches the filters that you defined.
For this example, generate traffic from the source system to the Telnet-enabled server by
running the following command from the source system (192.168.2.10):
telnet 10.43.14.55
PAN-OS® Administrator’s Guide Version 10.1 492 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 7 | Turn packet capture OFF and then click the refresh icon to see the packet capture files.
Noce that in this case, there were no dropped packets, so the firewall did not create a file for
the drop stage.
STEP 8 | Download the packet captures by clicking the filename in the File Name column.
STEP 9 | View the packet capture files using a network packet analyzer.
In this example, the received.pcap packet capture shows a failed Telnet session from the source
system at 192.168.2.10 to the Telnet-enabled server at 10.43.14.55. The source system sent
the Telnet request to the server, but the server did not respond. In this example, the server may
not have Telnet enabled, so check the server.
STEP 10 | Enable the Telnet service on the desnaon server (10.43.14.55) and turn on packet capture
to take a new packet capture.
PAN-OS® Administrator’s Guide Version 10.1 493 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 12 | Download and open the received.pcap file and view it using a network packet analyzer.
The following packet capture now shows a successful Telnet session from the host user at
192.168.2.10 to the Telnet-enabled server at 10.43.14.55.
You also see the NAT address 10.43.14.25. When the server responds, it does so to
the NAT address. You can see the session is successful as indicated by the three-way
handshake between the host and the server and then you see Telnet data.
PAN-OS® Administrator’s Guide Version 10.1 494 ©2022 Palo Alto Networks, Inc.
Monitoring
If the acon for a given threat is allow, the firewall does not trigger a Threat log and
does not capture packets. If the acon is alert, you can set the packet capture to
single-packet or extended-capture. All blocking acons (drop, block, and reset acons)
capture a single packet. The content package on the device determines the default
acon.
1. Select Objects > Security Profiles and enable the packet capture opon for the
supported profiles as follows:
• Anvirus—Select a custom anvirus profile and in the Anvirus tab select the Packet
Capture check box.
• An-Spyware—Select a custom An-Spyware profile, click the DNS Signatures tab
and in the Packet Capture drop-down, select single-packet or extended-capture.
• Vulnerability Protecon—Select a custom Vulnerability Protecon profile and in the
Rules tab, click Add to add a new rule, or select an exisng rule. Set Packet Capture
to single-packet or extended-capture.
If the profile has signature excepons defined, click the Excepons tab and in the
Packet Capture column for a signature, set single-packet or extended-capture.
2. (Oponal) If you selected extended-capture for any of the profiles, define the extended
packet capture length.
1. Select Device > Setup > Content-ID and edit the Content-ID Sengs.
2. In the Extended Packet Capture Length (packets) secon, specify the number of
packets that the firewall will capture (range is 1-50; default is 5).
3. Click OK.
STEP 2 | Add the security profile (with packet capture enabled) to a Security Policy rule.
1. Select Policies > Security and select a rule.
2. Select the Acons tab.
3. In the Profile Sengs secon, select a profile that has packet capture enabled.
For example, click the Anvirus drop-down and select a profile that has packet capture
enabled.
PAN-OS® Administrator’s Guide Version 10.1 495 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 496 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Locate unknown TCP and UDP applicaons by filtering the traffic logs.
1. Select Monitor > Logs > Traffic.
2. Click Add Filter, create the unknown TCP poron of the filter (Connector = “and”,
Aribute = “Applicaon”, Operator = “equal”, and enter “unknown-tcp” as the Value), and
then click Add to add the query to the filter.
3. Create the unknown UDP poron of the filter (Connector = “or”, Aribute =
“Applicaon”, Operator = “equal”, and enter “unknown-udp” as the Value), and then click
Add to add the query to the filter.
4. Click Apply to place the filter in the log screen query field.
STEP 3 | Click the Apply Filter arrow next to the query field to run the filter and then click the packet
capture icon to view the packet capture or Export it to your local system.
PAN-OS® Administrator’s Guide Version 10.1 497 ©2022 Palo Alto Networks, Inc.
Monitoring
For example, to capture packets for the linkedin-base applicaon that matches the security rule
named Social Networking Apps, run the following CLI command:
You can also apply other filters, such as source IP address and desnaon IP address.
STEP 3 | View the packet capture output to ensure that the correct filters are applied. The output
displays aer you enable the packet capture.
The following output confirms that applicaon capture filtering is now based on the linkedin-
base applicaon for traffic that matches the Social Networking Apps rule.
STEP 4 | Access linkedin.com from a web browser and perform some LinkedIn tasks to generate
LinkedIn traffic, and then run the following CLI command to turn off applicaon packet
capture:
PAN-OS® Administrator’s Guide Version 10.1 498 ©2022 Palo Alto Networks, Inc.
Monitoring
Each plaorm has a default number of bytes that tcpdump captures. The PA-220
firewalls capture 68 bytes of data from each packet and anything over that is truncated.
The PA-7000 Series firewalls and VM-Series firewalls capture 96 bytes of data from each
packet. To define the number of packets that tcpdump will capture, use the snaplen
(snap length) opon (range 0-65535). Seng the snaplen to 0 will cause the firewall to
use the maximum length required to capture whole packets.
STEP 1 | Using a terminal emulaon applicaon, such as PuTTY, launch an SSH session to the firewall.
PAN-OS® Administrator’s Guide Version 10.1 499 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 2 | To start a packet capture on the MGT interface, run the following command:
For example, to capture the traffic that is generated when and administrator authencates
to the firewall using RADIUS, filter on the desnaon IP address of the RADIUS server
(10.5.104.99 in this example):
You can also filter on src (source IP address), host, net, and you can exclude content. For
example, to filter on a subnet and exclude all SCP, SFTP, and SSH traffic (which uses port 22),
run the following command:
Each me tcpdump takes a packet capture, it stores the content in a file named
mgmt.pcap. This file is overwrien each me you run tcpdump.
STEP 3 | Aer the traffic you are interested in has traversed the MGT interface, press Ctrl + C to stop
the capture.
The following output shows the packet capture from the MGT port (10.5.104.98) to the
RADIUS server (10.5.104.99):
PAN-OS® Administrator’s Guide Version 10.1 500 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 5 | (Oponal) Export the packet capture from the firewall using SCP (or TFTP). For example, to
export the packet capture using SCP, run the following command:
For example, to export the pcap to an SCP enabled server at 10.5.5.20 to a temp folder named
temp-SCP, run the following CLI command:
Enter the login name and password for the account on the SCP server to enable the firewall to
copy the packet capture to the c:\temp-SCP folder on the SCP-enabled.
STEP 6 | You can now view the packet capture files using a network packet analyzer, such as
Wireshark.
PAN-OS® Administrator’s Guide Version 10.1 501 ©2022 Palo Alto Networks, Inc.
Monitoring
Review the Content Delivery Network Infrastructure to check whether logged events on the
firewall pose a security risk. The AutoFocus intelligence summary shows the prevalence of
properes, acvies, or behaviors associated with logs in your network and on a global scale,
as well as the WildFire verdict and AutoFocus tags linked to them. With an acve AutoFocus
subscripon, you can use this informaon to create customized AutoFocus Alerts that track
specific threats on your network.
PAN-OS® Administrator’s Guide Version 10.1 502 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 503 ©2022 Palo Alto Networks, Inc.
Monitoring
Traffic Logs
Traffic logs display an entry for the start and end of each session. Each entry includes the
following informaon: date and me; source and desnaon zones, source and desnaon
dynamic address groups, addresses and ports; applicaon name; security rule applied to the traffic
flow; rule acon (allow, deny, or drop); ingress and egress interface; number of bytes; and session
end reason.
A dynamic address group only appears in a log if the rule the traffic matches includes a
dynamic address group. If an IP address appears in more than one dynamic address group,
the firewall displays up to five dynamic address groups in logs along with the source IP
address
The Type column indicates whether the entry is for the start or end of the session. The Acon
column indicates whether the firewall allowed, denied, or dropped the session. A drop indicates
the security rule that blocked the traffic specified any applicaon, while a deny indicates the rule
idenfied a specific applicaon. If the firewall drops traffic before idenfying the applicaon,
such as when a rule drops all traffic for a specific service, the Applicaon column displays not-
applicable.
Click beside an entry to view addional details about the session, such as whether an ICMP
entry aggregates mulple sessions between the same source and desnaon (in which case the
Count column value is greater than one).
When the Decrypon log introduced in PAN-OS 10.1 is disabled, the firewall sends
HTTP/2 logs as Traffic logs. However, when the Decrypon logs are enabled, the firewall
sends HTTP/2 logs as Tunnel Inspecon logs (when Decrypon logs are disabled, HTTP/2
logs are sent as Traffic logs), so you need to check the Tunnel Inspecon logs instead of the
Traffic logs for HTTP/2 events.
Threat Logs
Threat logs display entries when traffic matches one of the Security Profiles aached to a security
rule on the firewall. Each entry includes the following informaon: date and me; type of threat
(such as virus or spyware); threat descripon or URL (Name column); source and desnaon
zones, addresses, source and desnaon dynamic address groups, and ports; applicaon name;
alarm acon (such as allow or block); and severity level.
A dynamic address group only appears in a log if the rule the traffic matches includes a
dynamic address group. If an IP address appears in more than one dynamic address group,
the firewall displays up to five dynamic address groups in logs along with the source IP
address
PAN-OS® Administrator’s Guide Version 10.1 504 ©2022 Palo Alto Networks, Inc.
Monitoring
Severity Descripon
Crical Serious threats, such as those that affect default installaons of widely
deployed soware, result in root compromise of servers, and the exploit code
is widely available to aackers. The aacker usually does not need any special
authencaon credenals or knowledge about the individual vicms and the
target does not need to be manipulated into performing any special funcons.
High Threats that have the ability to become crical but have migang factors; for
example, they may be difficult to exploit, do not result in elevated privileges, or do
not have a large vicm pool.
WildFire Submissions log entries with a malicious verdict and an acon set to allow
are logged as High.
Medium Minor threats in which impact is minimized, such as DoS aacks that do not
compromise the target or exploits that require an aacker to reside on the same
LAN as the vicm, affect only non-standard configuraons or obscure applicaons,
or provide very limited access.
• Threat log entries with a malicious verdict and an acon of block or alert, based
on the exisng WildFire signature severity, are logged as Medium.
InformaonalSuspicious events that do not pose an immediate threat, but that are reported to
call aenon to deeper problems that could possibly exist.
• URL Filtering log entries are logged as Informaonal.
• WildFire Submissions log entries with a benign verdict and any acon are
logged as Informaonal.
• WildFire Submissions log entries with any verdict and an acon set to block and
forward are logged as Informaonal.
• Log entries with any verdict and an acon set to block are logged as
Informaonal.
PAN-OS® Administrator’s Guide Version 10.1 505 ©2022 Palo Alto Networks, Inc.
Monitoring
• Traffic matches a Security policy rule with a URL category as match criteria. The rule enforces
one of the following acons for the traffic: deny, drop, or reset (client, server,
both).
• Traffic matches a Security policy rule with a URL Filtering Profile aached. Site Access for
categories in the profile is set to alert, block, continue, or override.
By default, categories set to allow do not generate URL filtering log entries. The excepon
is if you configure log forwarding.
If you want the firewall to log traffic to categories that you allow but would like more
visibility into, set Site Access for these categories to alert in your URL Filtering profiles.
Verdict Descripon
Benign Indicates that the entry received a WildFire analysis verdict of benign. Files
categorized as benign are safe and do not exhibit malicious behavior.
Grayware Indicates that the entry received a WildFire analysis verdict of grayware. Files
categorized as grayware do not pose a direct security threat, but might display
otherwise obtrusive behavior. Grayware can include, adware, spyware, and
Browser Helper Objects (BHOs).
Phishing Indicates that WildFire assigned a link an analysis verdict of phishing. A phishing
verdict indicates that the site to which the link directs users displayed credenal
phishing acvity.
Malicious Indicates that the entry received a WildFire analysis verdict of malicious. Samples
categorized as malicious are can pose a security threat. Malware can include
viruses, C2 (command-and-control), worms, Trojans, Remote Access Tools (RATs),
rootkits, and botnets. For samples that are idenfied as malware, the WildFire
cloud generates and distributes a signature to prevent against future exposure.
PAN-OS® Administrator’s Guide Version 10.1 506 ©2022 Palo Alto Networks, Inc.
Monitoring
Correlaon Logs
The firewall logs a correlated event when the paerns and thresholds defined in a Correlaon
Object match the traffic paerns on your network. To Interpret Correlated Events and view a
graphical display of the events, see Use the Compromised Hosts Widget in the ACC.
The following table summarizes the Correlaon log severity levels:
Severity Descripon
Crical Confirms that a host has been compromised based on correlated events that
indicate an escalaon paern. For example, a crical event is logged when a
host that received a file with a malicious verdict by WildFire, exhibits the same
command-and control acvity that was observed in the WildFire sandbox for that
malicious file.
High Indicates that a host is very likely compromised based on a correlaon between
mulple threat events, such as malware detected anywhere on the network that
matches the command and control acvity being generated from a parcular
host.
Medium Indicates that a host is likely compromised based on the detecon of one or
mulple suspicious events, such as repeated visits to known malicious URLs that
suggests a scripted command-and-control acvity.
Low Indicates that a host is possibly compromised based on the detecon of one or
mulple suspicious events, such as a visit to a malicious URL or a dynamic DNS
domain.
PAN-OS® Administrator’s Guide Version 10.1 507 ©2022 Palo Alto Networks, Inc.
Monitoring
When the Decrypon logs introduced in PAN-OS 10.1 are enabled, the firewall sends
HTTP/2 logs as Tunnel Inspecon logs (when Decrypon logs are disabled, HTTP/2
logs are sent as Traffic logs), so you need to check the Tunnel Inspecon logs instead of
the Traffic logs for HTTP/2 events. In this case, you must also enable Tunnel Content
Inspecon to obtain the App-ID for HTTP/2 traffic.
Click the Detailed Log view to see details for an entry, such as the tunnel protocol used, and the
flag indicang whether the tunnel content was inspected or not. Only a session that has a parent
session will have the Tunnel Inspected flag set, which means the session is in a tunnel-in-tunnel
(two levels of encapsulaon). The first outer header of a tunnel will not have the Tunnel Inspected
flag set.
Config Logs
Config logs display entries for changes to the firewall configuraon. Each entry includes the date
and me, the administrator username, the IP address from where the administrator made the
change, the type of client (Web, CLI, or Panorama), the type of command executed, the command
status (succeeded or failed), the configuraon path, and the values before and aer the change.
System Logs
System logs display entries for each system event on the firewall. Each entry includes the date
and me, event severity, and event descripon. The following table summarizes the System log
severity levels. For a paral list of System log messages and their corresponding severity levels,
refer to System Log Events.
Severity Descripon
Crical Hardware failures, including high availability (HA) failover and link failures.
High Serious issues, including dropped connecons with external devices, such as LDAP
and RADIUS servers.
InformaonalLog in/log off, administrator name or password change, any configuraon change,
and all other events not covered by the other severity levels.
PAN-OS® Administrator’s Guide Version 10.1 508 ©2022 Palo Alto Networks, Inc.
Monitoring
GlobalProtect Logs
GlobalProtect logs display the following logs related to GlobalProtect:
• GlobalProtect system logs.
GlobalProtect authencaon event logs remain in Monitor > Logs > System; however, the
Auth Method column of the GlobalProtect logs display the authencaon method used for
logins.
• LSVPN/satellite events.
• GlobalProtect portal and gateway logs.
• Clientless VPN logs.
IP-Tag Logs
IP-tag logs display how and when a source IP address is registered or unregistered on the
firewall and what tag the firewall applied to the address. Addionally, each log entry displays
the configured meout (when configured) and the source of the IP address-to-tag mapping
informaon, such as User-ID agent VM informaon sources and auto-tagging. See how to Register
IP Address and Tags Dynamically for more informaon.
User-ID Logs
User-ID logs display informaon about IP address-to-username mappings and Authencaon
Timestamps, such as the sources of the mapping informaon and the mes when users
authencated. You can use this informaon to help troubleshoot User-ID and authencaon
issues. For example, if the firewall is applying the wrong policy rule for a user, you can view the
logs to verify whether that user is mapped to the correct IP address and whether the group
associaons are correct.
Decrypon Logs
Decrypon Logs display entries for unsuccessful TLS handshakes by default and can display
entries for successful TLS handshakes if you enable them in Decrypon policy. If you enable
entries for successful handshakes, ensure that you have the system resources (log space) for the
logs.
Decrypon logs include a vast amount of informaon to help you Troubleshoot and Monitor
Decrypon and then resolve issues. There are 62 columns of different types of informaon you
can enable in the logs, and you can select any individual log ( , the magnifying glass) and see
the details in a single Detail view. You can view cerficate, cipher suite, and error informaon
such as: subject common name, issuer common name, root common name, root status, cerficate
key type and size, cerficate start and end date, cerficate serial number, cerficate fingerprint,
TLS version, key exchange algorithm, encrypon algorithm, negoated EC curve, authencaon
algorithm, SNI, proxy type, errors informaon (cipher, HSM, resource, resume, protocol, feature,
cerficate, version), and error indexes (codes that you can look up to get more error informaon).
Alarms Logs
An alarm is a firewall-generated message indicang that the number of events of a parcular type
(for example, encrypon and decrypon failures) has exceeded the threshold configured for that
event type. To enable alarms and configure alarm thresholds, select Device > Log Sengs and edit
the Alarm Sengs.
PAN-OS® Administrator’s Guide Version 10.1 509 ©2022 Palo Alto Networks, Inc.
Monitoring
When generang an alarm, the firewall creates an Alarm log and opens the System Alarms dialog
to display the alarm. Aer you Close the dialog, you can reopen it anyme by clicking Alarms ( )
at the boom of the web interface. To prevent the firewall from automacally opening the dialog
for a parcular alarm, select the alarm in the Unacknowledged Alarms list and Acknowledge the
alarm.
Authencaon Logs
Authencaon logs display informaon about authencaon events that occur when end users
try to access network resources for which access is controlled by Authencaon Policy rules. You
can use this informaon to help troubleshoot access issues and to adjust your Authencaon
policy as needed. In conjuncon with correlaon objects, you can also use Authencaon logs to
idenfy suspicious acvity on your network, such as brute force aacks.
Oponally, you can configure Authencaon rules to log meout events. These meouts relate to
the period when a user need authencate for a resource only once but can access it repeatedly.
Seeing informaon about the meouts helps you decide if and how to adjust them (for details, see
Authencaon Timestamps).
Unified Logs
Unified logs are entries from the Traffic, Threat, URL Filtering, WildFire Submissions, and Data
Filtering logs displayed in a single view. Unified log view enables you to invesgate and filter the
latest entries from different log types in one place, instead of searching through each log type
separately. Click Effecve Queries ( ) in the filter area to select which log types will display
entries in Unified log view.
The Unified log view displays only entries from logs that you have permission to see. For example,
an administrator who does not have permission to view WildFire Submissions logs will not see
WildFire Submissions log entries when viewing Unified logs. Administrave Role Types define
these permissions.
When you Set Up Remote Search in AutoFocus to perform a targeted search on the
firewall, the search results are displayed in Unified log view.
View Logs
You can view the different log types on the firewall in a tabular format. The firewall locally stores
all log files and automacally generates Configuraon and System logs by default. To learn more
about the security rules that trigger the creaon of entries for the other types of logs, see Log
Types and Severity Levels.
To configure the firewall to forward logs as syslog messages, email noficaons, or Simple
Network Management Protocol (SNMP) traps, Use External Services for Monitoring.
PAN-OS® Administrator’s Guide Version 10.1 510 ©2022 Palo Alto Networks, Inc.
Monitoring
The firewall displays only the logs you have permission to see. For example,
if your administrave account does not have permission to view WildFire
Submissions logs, the firewall does not display that log type when you access the
logs pages. Administrave Role Types define the permissions.
Enable AutoFocus in Panorama to view AutoFocus threat data for all Panorama
log entries, including those from firewalls that are not connected to AutoFocus
and/or are running PAN-OS 7.0 and earlier release versions (Panorama > Setup
> Management > AutoFocus).
2. Hover over an IP address, URL, user agent, threat name (subtype: virus and wildfire-virus
only), filename, or SHA-256 hash.
3. Click the drop-down ( ) and select AutoFocus.
4. Content Delivery Network Infrastructure.
Next Steps...
• Filter Logs.
• Export Logs.
• Configure Log Storage Quotas and Expiraon Periods.
Filter Logs
Each log has a filter area that allows you to set a criteria for which log entries to display. The
ability to filter logs is useful for focusing on events on your firewall that possess parcular
properes or aributes. Filter logs by arfacts that are associated with individual log entries.
For example, filtering by the rule UUID makes it easier to pinpoint the specific rule you want to
locate, even among many similarly-named rules. If your ruleset is very large and contains many
PAN-OS® Administrator’s Guide Version 10.1 511 ©2022 Palo Alto Networks, Inc.
Monitoring
rules, using the rule’s UUID as a filter spotlights the parcular rule you need to find without having
to navigate through pages of results.
STEP 1 | (Unified logs only) Select the log types to include in the Unified log display.
1. Click Effecve Queries ( ).
2. Select one or more log types from the list (traffic, threat, url, data, and wildfire).
3. Click OK. The Unified log updates to show only entries from the log types you have
selected.
If the value of the arfact matches the operator (such as has or in), enclose the value
in quotaon marks to avoid a syntax error. For example, if you filter by desnaon
country and use IN as a value to specify INDIA, enter the filter as ( dstloc eq
“IN” ).
• Click one or more arfacts (such as the applicaon type associated with traffic and the
IP address of an aacker) in a log entry. For example, click the Source 10.0.0.25 and
Applicaon web-browsing of a log entry to display only entries that contain both arfacts in
the log (AND search).
• To specify arfacts to add to the filter field, click Add Filter ( ).
• To add a previously saved filter, click Load Filter ( ).
Export Logs
You can export the contents of a log type to a comma-separated value (CSV) formaed report. By
default, the report contains up to 2,000 rows of log entries.
PAN-OS® Administrator’s Guide Version 10.1 512 ©2022 Palo Alto Networks, Inc.
Monitoring
If you want to manually delete logs, select Device > Log Sengs and, in the Manage Logs
secon, click the links to clear logs by type.
STEP 1 | Select Device > Setup > Management and edit the Logging and Reporng Sengs.
STEP 2 | Select Log Storage and enter a Quota (%) for each log type. When you change a percentage
value, the dialog refreshes to display the corresponding absolute value (Quota GB/MB
column).
STEP 3 | Enter the Max Days (expiraon period) for each log type (range is 1-2,000). The fields are
blank by default, which means the logs never expire.
The firewall synchronizes expiraon periods across high availability (HA) pairs. Because
only the acve HA peer generates logs, the passive peer has no logs to delete unless
failover occurs and it starts generang logs.
PAN-OS® Administrator’s Guide Version 10.1 513 ©2022 Palo Alto Networks, Inc.
Monitoring
You can use Secure Copy (SCP) commands from the CLI to export the enre log
database to an SCP server and import it to another firewall. Because the log database is
too large for an export or import to be praccal on the following plaorms, they do not
support these opons: PA-7000 Series firewalls (all PAN-OS releases), Panorama virtual
appliance running Panorama 6.0 or later releases, and Panorama M-Series appliances (all
Panorama releases).
STEP 1 | Select Device > Scheduled Log Export and click Add.
STEP 2 | Enter a Name for the scheduled log export and Enable it.
STEP 4 | Select the daily Scheduled Export Start Time. The opons are in 15-minute increments for a
24-hour clock (00:00 - 23:59).
STEP 5 | Select the Protocol to export the logs: SCP (secure) or FTP.
STEP 7 | Enter the Port number. By default, FTP uses port 21 and SCP uses port 22.
STEP 8 | Enter the Path or directory in which to save the exported logs.
STEP 9 | Enter the Username and, if necessary, the Password (and Confirm Password) to access the
server.
STEP 10 | (FTP only) Select Enable FTP Passive Mode if you want to use FTP passive mode, in which
the firewall iniates a data connecon with the FTP server. By default, the firewall uses FTP
acve mode, in which the FTP server iniates a data connecon with the firewall. Choose
the mode based on what your FTP server supports and on your network requirements.
STEP 11 | (SCP only) Click Test SCP server connecon. Before establishing a connecon, the firewall
must accept the host key for the SCP server.
If you use a Panorama template to configure the log export schedule, you must
perform this step aer comming the template configuraon to the firewalls. Aer the
template commit, log in to each firewall, open the log export schedule, and click Test
SCP server connecon.
PAN-OS® Administrator’s Guide Version 10.1 514 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 515 ©2022 Palo Alto Networks, Inc.
Monitoring
Report Types
The firewall includes predefined reports that you can use as-is, or you can build custom reports
that meet your needs for specific data and aconable tasks, or you can combine predefined and
custom reports to compile informaon you need. The firewall provides the following types of
reports:
• Predefined Reports—Allow you to view a quick summary of the traffic on your network. A suite
of predefined reports are available in four categories—Applicaons, Traffic, Threat, and URL
Filtering. See View Reports.
• User or Group Acvity Reports—Allow you to schedule or create an on-demand report on the
applicaon use and URL acvity for a specific user or for a user group. The report includes the
URL categories and an esmated browse me calculaon for individual users. See Generate
User/Group Acvity Reports.
• Custom Reports—Create and schedule custom reports that show exactly the informaon
you want to see by filtering on condions and columns to include. You can also include query
builders for more specific drill down on report data. See Generate Custom Reports.
• PDF Summary Reports—Aggregate up to 18 predefined or custom reports/graphs from Threat,
Applicaon, Trend, Traffic, and URL Filtering categories into one PDF document. See Manage
PDF Summary Reports.
• Botnet Reports—Allow you to use behavior-based mechanisms to idenfy potenal botnet-
infected hosts in the network. See Generate Botnet Reports.
PAN-OS® Administrator’s Guide Version 10.1 516 ©2022 Palo Alto Networks, Inc.
Monitoring
• Report Groups—Combine custom and predefined reports into report groups and compile a
single PDF that is emailed to one or more recipients. See Manage Report Groups.
Reports can be generated on demand, on a recurring schedule, and can be scheduled for email
delivery.
View Reports
The firewall provides an assortment of over 40 predefined reports that it generates every day. You
can view these reports directly on the firewall. You can also view custom reports and summary
reports.
About 200 MB of storage is allocated for saving reports on the firewall. This limit can be
reconfigured for PA-7000 series and PA-5200 series firewalls only. For all other firewall models,
you can Configure the Expiraon Period and Run Time for Reports to allow the firewall to delete
reports that exceed the period. Keep in mind that when the firewall reaches its storage limit, it
automacally deletes older reports to create space even if you don’t set an expiraon period.
Another way to conserve system resources on the firewall is to Disable Predefined Reports. For
long-term retenon of reports, you can export the reports (as described below) or Schedule
Reports for Email Delivery.
Unlike other reports, you can’t save User/Group Acvity reports on the firewall. You must
Generate User/Group Acvity Reports on demand or schedule them for email delivery.
STEP 1 | (VM-50, VM-50 Lite, and PA-200 firewalls only) Enable generaon of predefined reports.
By default, predefined reports are disabled on VM-50, VM-50 Lite, and PA-200
firewalls to save resources.
1. Select Device > Setup > Management and edit Logging and Reporng.
2. Select Pre-Defined Reports and enable (check) Pre-Defined Reports.
3. Check (enable) the predefined reports you want to generate and click OK
4. Commit your configuraon changes.
5. Access the firewall CLI to enable predefined reports.
This step is required for local predefined reports and predefined reports pushed from a
Panorama™ management server.
STEP 3 | Select a report to view. The reports page then displays the report for the previous day.
To view reports for other days, select a date in the calendar at the boom right of the page and
select a report. If you select a report in another secon, the date selecon resets to the current
date.
PAN-OS® Administrator’s Guide Version 10.1 517 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 4 | To view a report offline, you can export the report to PDF, CSV or to XML formats. Click
Export to PDF, Export to CSV, or Export to XML at the boom of the page, then print or
save the file.
STEP 2 | Set the Report Runme to an hour in the 24-hour clock schedule (default is 02:00; range is
00:00 [midnight] to 23:00).
STEP 3 | Enter the Report Expiraon Period in days (default is no expiraon; range is 1 is 2,000).
You can’t change the storage that the firewall allocates for saving reports: it is
predefined at about 200 MB. When the firewall reaches the storage maximum, it
automacally deletes older reports to create space even if you don’t set a Report
Expiraon Period.
STEP 2 | Select the Pre-Defined Reports tab and clear the check box for each report you want to
disable. To disable all predefined reports, click Deselect All.
Custom Reports
In order to create purposeful custom reports, you must consider the aributes or key pieces of
informaon that you want to retrieve and analyze, such as threats, as well as the best way to
categorize the informaon, such as grouping by rule UUID, which will allow you to see the rule
that applies to each threat type. This consideraon guides you in making the following selecons
in a custom report:
PAN-OS® Administrator’s Guide Version 10.1 518 ©2022 Palo Alto Networks, Inc.
Monitoring
Selecon Descripon
Database You can base the report on one of the following database types:
• Summary databases—These databases are available for Applicaon
Stascs, Traffic, Threat, URL Filtering, and Tunnel Inspecon logs.
The firewall aggregates the detailed logs at 15-minute intervals. To
enable faster response me when generang reports, the firewall
condenses the data: duplicate sessions are grouped and incremented
with a repeat counter, and some aributes (columns) are excluded
from the summary.
• Detailed logs—These databases itemize the logs and list all the
aributes (columns) for each log entry.
Aributes The columns that you want to use as the match criteria. The aributes
are the columns that are available for selecon in a report. From the list
of Available Columns, you can add the selecon criteria for matching
data and for aggregang the details (the Selected Columns).
Sort By/ Group By The Sort By and the Group By criteria allow you to organize/segment
the data in the report; the sorng and grouping aributes available vary
based on the selected data source.
The Sort By opon specifies the aribute that is used for aggregaon. If
you do not select an aribute to sort by, the report will return the first
N number of results without any aggregaon.
The Group By opon allows you to select an aribute and use it as an
anchor for grouping data; all the data in the report is then presented in
a set of top 5, 10, 25 or 50 groups. For example, when you select Hour
as the Group By selecon and want the top 25 groups for a 24-hr me
period, the results of the report will be generated on an hourly basis
over a 24-hr period. The first column in the report will be the hour and
the next set of columns will be the rest of your selected report columns.
The following example illustrates how the Selected Columns and Sort
By/Group By criteria work together when generang reports:
PAN-OS® Administrator’s Guide Version 10.1 519 ©2022 Palo Alto Networks, Inc.
Monitoring
Selecon Descripon
The columns circled in red (above) depict the columns selected, which
are the aributes that you match against for generang the report.
Each log entry from the data source is parsed and these columns are
matched on. If mulple sessions have the same values for the selected
columns, the sessions are aggregated and the repeat count (or sessions)
is incremented.
The column circled in blue indicates the chosen sort order. When the
sort order (Sort By) is specified, the data is sorted (and aggregated) by
the selected aribute.
The column circled in green indicates the Group By selecon, which
serves as an anchor for the report. The Group By column is used as a
match criteria to filter for the top N groups. Then, for each of the top
N groups, the report enumerates the values for all the other selected
columns.
The report is anchored by Day and sorted by Sessions. It lists the 5 days
(5 Groups) with maximum traffic in the Last 7 Days me frame. The
PAN-OS® Administrator’s Guide Version 10.1 520 ©2022 Palo Alto Networks, Inc.
Monitoring
Selecon Descripon
data is enumerated by the Top 5 sessions for each day for the selected
columns—App Category, App Subcategory and Risk.
Time Frame The date range for which you want to analyze data. You can define a
custom range or select a me period ranging from the last 15 minutes
to the last 30 days. The reports can be run on demand or scheduled to
run at a daily or weekly cadence.
Query Builder The query builder allows you to define specific queries to further
refine the selected aributes. It allows you see just what you want in
your report using and and or operators and a match criteria, and then
include or exclude data that matches or negates the query in the report.
Queries enable you to generate a more focused collaon of informaon
in a report.
Aer the firewall has generated a scheduled custom report, you risk invalidang the past
results of that report if you modify its configuraon to change its future output. If you
need to modify a scheduled report configuraon, the best pracce is to create a new
report.
STEP 2 | Click Add and then enter a Name for the report.
To base a report on an predefined template, click Load Template and choose the
template. You can then edit the template and save it as a custom report.
Each me you create a custom report, a log view report is automacally created. This
report show the logs that were used to build the custom report. The log view report
uses the same name as the custom report, but appends the phrase (Log View) to the
report name.
When creang a report group, you can include the log view report with the custom report. For
more informaon, see Manage Report Groups.
PAN-OS® Administrator’s Guide Version 10.1 521 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 4 | Select the Scheduled check box to run the report each night. The report is then available for
viewing in the Reports column on the side.
To generate a scheduled custom report using logs stored in Cortex Data Lake on the
Panorama™ management server, Cloud Service plugin 1.8 or later release must be
installed on Panorama.
STEP 5 | Define the filtering criteria. Select the Time Frame, the Sort By order, Group By preference,
and select the columns that must display in the report.
STEP 6 | (Oponal) Select the Query Builder aributes if you want to further refine the selecon
criteria. To build a report query, specify the following and click Add. Repeat as needed to
construct the full query.
• Connector—Choose the connector (and/or) to precede the expression you are adding.
• Negate—Select the check box to interpret the query as a negaon. If, for example, you
choose to match entries in the last 24 hours and/or are originang from the untrust zone,
the negate opon causes a match on entries that are not in the past 24 hours and/or are not
from the untrust zone.
• Aribute—Choose a data element. The available opons depend on the choice of database.
• Operator—Choose the criterion to determine whether the aribute applies (such as =). The
available opons depend on the choice of database.
• Value—Specify the aribute value to match.
For example, the following figure (based on the Traffic Log database) shows a query that
matches if the Traffic log entry was received in the past 24 hours and is from the untrust zone.
STEP 7 | To test the report sengs, select Run Now. Modify the sengs as required to change the
informaon that is displayed in the report.
PAN-OS® Administrator’s Guide Version 10.1 522 ©2022 Palo Alto Networks, Inc.
Monitoring
And the PDF output for the report would look as follows:
Now, if you want to use the query builder to generate a custom report that represents the top
consumers of network resources within a user group, you would set up the report to look like
this:
PAN-OS® Administrator’s Guide Version 10.1 523 ©2022 Palo Alto Networks, Inc.
Monitoring
The report would display the top users in the product management user group sorted by bytes.
The firewall requires Threat Prevenon and URL Filtering licenses to use the botnet report.
You can Use the Automated Correlaon Engine to monitor suspicious acvies based on
addional indicators besides those that the botnet report uses. However, the botnet report
is the only tool that uses newly registered domains as an indicator.
PAN-OS® Administrator’s Guide Version 10.1 524 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 1 | Define the types of traffic that indicate possible botnet acvity.
1. Select Monitor > Botnet and click Configuraon on the right side of the page.
2. Enable and define the Count for each type of HTTP Traffic that the report will include.
The Count values represent the minimum number of events of each traffic type that
must occur for the report to list the associated host with a higher confidence score
(higher likelihood of botnet infecon). If the number of events is less than the Count, the
report will display a lower confidence score or (for certain traffic types) won’t display an
entry for the host. For example, if you set the Count to three for Malware URL visit, then
hosts that visit three or more known malware URLs will have higher scores than hosts
that visit less than three. For details, see Interpret Botnet Report Output.
3. Define the thresholds that determine whether the report will include hosts associated
with traffic involving Unknown TCP or Unknown UDP applicaons.
4. Select the IRC check box to include traffic involving IRC servers.
5. Click OK to save the report configuraon.
PAN-OS® Administrator’s Guide Version 10.1 525 ©2022 Palo Alto Networks, Inc.
Monitoring
other types of suspicious traffic, can help you priorize your invesgaons of compromised
hosts.
When reviewing the report output, you might find that the sources the firewall uses to evaluate
botnet acvity (for example, the list of malware URLs in PAN-DB) have gaps. You might also find
that these sources idenfy traffic that you consider safe. To compensate in both cases, you can
add query filters when you Configure a Botnet Report.
The predefined SaaS applicaon usage report is sll available as a daily View Reports that
lists the top 100 SaaS applicaons (which means applicaons with the SaaS applicaon
characterisc, SaaS=yes) running on your network on a given day. This report does
not give visibility into applicaons you have designated as sanconed, but rather gives
visibility into all of the SaaS applicaons in use on your network.
PAN-OS® Administrator’s Guide Version 10.1 526 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 1 | Tag applicaons that you approve for use on your network as Sanconed.
For generang an accurate and informave report, you need to tag the sanconed
applicaons consistently across firewalls with mulple virtual systems, and across
firewalls that belong to a device group on Panorama. If the same applicaon is tagged
as sanconed in one virtual system and is not sanconed in another or, on Panorama,
if an applicaon is unsanconed in a parent device group but is tagged as sanconed
in a child device group (or vice versa), the SaaS Applicaon Usage report will report the
applicaon as parally sanconed and will have overlapping results.
Example: If Box is sanconed on vsys1 and Google Drive is sanconed on vsys2, Google Drive
users in vsys1 will be counted as users of an unsanconed SaaS applicaon and Box users
in vsys2 will be counted as users of an unsanconed SaaS applicaon. The key finding in the
report will highlight that a total of two unique SaaS applicaons are discovered on the network
with two sanconed applicaons and two unsanconed applicaons.
1. Select Objects > Applicaons.
2. Click the applicaon Name to edit an applicaon and select Edit in the Tag secon.
3. Select Sanconed from the Tags drop-down.
You must use the predefined Sanconed tag ( ). If you use any other tag to
indicate that you sanconed an applicaon, the firewall will fail to recognize the tag and
the report will be inaccurate.
PAN-OS® Administrator’s Guide Version 10.1 527 ©2022 Palo Alto Networks, Inc.
Monitoring
By default, the report includes detailed informaon on the top SaaS and non-
SaaS applicaon subcategories, which can make the report large by page count
and file size. Clear the Include detailed applicaon category informaon in
report check box if you want to reduce the file size and restrict the page count to
10 pages.
3. Select whether you want the report to Include logs from:
In PAN-OS 10.0.2 and later releases, reports generated from logs in the Cortex
Data Lake only support including logs from the Selected Zone.
• All User Groups and Zones—The report includes data on all security zones and user
groups available in the logs.
If you want to include specific user groups in the report, select Include user group
informaon in the report and click the manage groups link to select the groups you
want to include. You must add between one and up to a maximum of 25 user groups,
so that the firewall or Panorama can filter the logs for the selected user groups. If you
do select the groups to include, the report will aggregate all user groups in to one
group called Others.
• Selected Zone—The report filters data for the specified security zone, and includes
data on that zone only.
If you want to include specific user groups in the report, select Include user group
informaon in the report and click the manage groups for selected zone link to select
the user groups within this zone that you want to include in the report. You must
add between one and up to a maximum of 25 user groups, so that the firewall or
Panorama can filter the logs for the selected user groups within the security zone. If
PAN-OS® Administrator’s Guide Version 10.1 528 ©2022 Palo Alto Networks, Inc.
Monitoring
you do select the groups to include, the report will aggregate all user groups in to one
group called Others.
• Selected User Group—The report filters data for the specified user group only, and
includes SaaS applicaon usage informaon for the selected user group only.
4. Select whether you want to include all the applicaon subcategories in the report
(the default) or Limit the max subcategories in the report to the top 10, 15, 20 or 25
categories (default is all subcategories).
5. Click Run Now to generate the report on-demand for the last 7-day and the last 30-day
me period. Make sure that the pop-up blocker is disabled on your browser because the
report opens in a new tab.
6. Click OK to save your changes.
PAN-OS® Administrator’s Guide Version 10.1 529 ©2022 Palo Alto Networks, Inc.
Monitoring
• To remove an element from the report, click the x icon or clear the selecon from the
drop-down for the appropriate report group.
• To rearrange the reports, drag and drop the element icons to another area of the
report.
4. Click OK to save the report.
5. Commit the changes.
PAN-OS® Administrator’s Guide Version 10.1 530 ©2022 Palo Alto Networks, Inc.
Monitoring
The following summary secons refer to the following PDF Summary Report elements:
• Top 5 Aacks—Refers to the Top threats element.
• Top 5 Threats—Refers to the High risk user - Top threats element.
• Top Threats report—Refers to the full list of threats from the Top threats element.
PAN-OS® Administrator’s Guide Version 10.1 531 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 1 | Configure the browse mes and number of logs for User/Group Acvity reports.
Required only if you want to change the default values.
1. Select Device > Setup > Management, edit the Logging and Reporng Sengs, and
select the Log Export and Reporng tab.
2. For the Max Rows in User Acvity Report, enter the maximum number of rows that
the detailed user acvity report supports (range is 1-1048576, default is 5000). This
determines the number of logs that the report analyzes.
3. Enter the Average Browse Time in seconds that you esmate users should take to
browse a web page (range is 0-300, default is 60). Any request made aer the average
browse me elapses is considered a new browsing acvity. The calculaon uses Log
Only the Page a User Visits (logged in the URL Filtering logs) as the basis and ignores any
new web pages that are loaded between the me of the first request (start me) and the
average browse me. For example, if you set the Average Browse Time to two minutes
and a user opens a web page and views that page for five minutes, the browse me for
that page will sll be two minutes. This is done because the firewall can’t determine
how long a user views a given page. The average browse me calculaon ignores sites
categorized as web adversements and content delivery networks.
4. For the Page Load Threshold, enter the esmated me in seconds for page elements to
load on the page (default is 20). Any requests that occur between the first page load and
the page load threshold are assumed to be elements of the page. Any requests that occur
outside of the page load threshold are assumed to be the user clicking a link within the
page.
5. Click OK to save your changes.
PAN-OS® Administrator’s Guide Version 10.1 532 ©2022 Palo Alto Networks, Inc.
Monitoring
The Log View report is a report type that is automacally created each me you
create a custom report and uses the same name as the custom report. This report will
show the logs that were used to build the contents of the custom report.
To include the log view data, when creang a report group, add your custom report
under the Custom Reports list and then add the log view report by selecng the
matching report name from the Log View list. The report will include the custom
report data and the log data that was used to create the custom report.
5. Click OK to save the sengs.
6. To use the report group, see Schedule Reports for Email Delivery.
PAN-OS® Administrator’s Guide Version 10.1 533 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 1 | Select Monitor > PDF Reports > Email Scheduler and click Add.
STEP 3 | Select the Report Group for email delivery. To set up a report group; see Manage Report
Groups.
STEP 4 | For the Email Profile, select an Email server profile to use for delivering the reports, or click
the Email Profile link to Create an Email server profile.
STEP 5 | Select the frequency at which to generate and send the report in Recurrence.
STEP 6 | The Override Email Addresses field allows you to send this report exclusively to the specified
recipients. When you add recipients to the field, the firewall does not send the report to the
recipients configured in the Email server profile. Use this opon for those occasions when the
report is for the aenon of someone other than the administrators or recipients defined in
the Email server profile.
STEP 3 | Verify you have sufficient storage across the firewall to allocate toward expanding the report
storage capacity:
PAN-OS® Administrator’s Guide Version 10.1 534 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 5 | Verify that the report storage capacity is increased to the amount set in the previous step:
PAN-OS® Administrator’s Guide Version 10.1 535 ©2022 Palo Alto Networks, Inc.
Monitoring
The rule hit count data is not synchronized across firewalls in a high availability (HA)
deployment so you need to log in to each firewall to view the policy rule hit count data for
each firewall or use Panorama to view informaon on the HA firewall peers.
Policy rule usage data is also useful when using Security Policy Rule Opmizaon to
determine which rules to migrate or clean up first.
PAN-OS® Administrator’s Guide Version 10.1 536 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 4 | View the policy rule usage for each policy rule:
• Hit Count—The number of mes traffic matched the criteria you defined in the policy rule.
Persists through reboot, dataplane restarts, and upgrades unless you manually reset or
rename the rule.
• Last Hit—The most recent mestamp for when traffic matched the rule.
• First Hit—The first instance when traffic was matched to this rule.
• Modified—The date and me the policy rule was last modified.
• Created—The date and me the policy rule was created.
If the rule was created when Panorama was running PAN-OS 8.1 and the Policy
Rule Hit Count seng is enabled, the First Hit date and me is used as the Created
date and me on upgrade to PAN-OS 9.0. If the rule was created in PAN-OS 8.1
when the Policy Rule Hit Count seng was disabled or if the rule was created when
Panorama was running PAN-OS 8.0 or an earlier release, the Created date for the
rule will be the date and me you successfully upgraded Panorama to PAN-OS 9.0
STEP 5 | In the Policy Opmizer dialog, view the Rule Usage filter.
Use the rule usage filter to evaluate the rule usage within a specified period of me. For
example, filter the selected rulebase for Unused rules within the last 30 days. You can
also evaluate rule usage with other rule aributes, such as the Created and Modified
dates, which enables you to filter for the correct set of rules to review. You can use this
data to help manage your rule lifecycle and to determine if a rule needs to be removed
to reduce your network aack surface.
1. Select the Timeframe you want to filter on or specify a Custom me frame.
2. Select the rule Usage on which to filter.
3. (Oponal) If you have reset the rule usage data for any rules, check for Exclude rules
reset during the last <number of days> days and decide when to exclude a rule based
PAN-OS® Administrator’s Guide Version 10.1 537 ©2022 Palo Alto Networks, Inc.
Monitoring
on the number of days you specify since the rule was reset. Only rules that were reset
before your specified number of days are included in the filtered results.
3. Hover your cursor over the column data that you would like to filter on Filter. For data
that contain dates, select whether to filter using This date, This date or earlier, or This
date or later.
4. Apply Filter ( ).
PAN-OS® Administrator’s Guide Version 10.1 538 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 539 ©2022 Palo Alto Networks, Inc.
Monitoring
You can’t aggregate NetFlow records on Panorama; you must send them directly from the
firewalls to a NetFlow collector.
PAN-OS® Administrator’s Guide Version 10.1 540 ©2022 Palo Alto Networks, Inc.
Monitoring
Log forwarding is supported only for supported log fields. Forwarding logs that contain
unsupported log fields or pseudo-fields causes the firewall to crash.
You can forward logs from the firewalls directly to external services or from the firewalls
to Panorama and then configure Panorama to forward logs to the servers. Refer to Log
Forwarding Opons for the factors to consider when deciding where to forward logs.
You can use Secure Copy (SCP) commands from the CLI to export the enre log
database to an SCP server and import it to another firewall. Because the log database is
too large for an export or import to be praccal on the PA-7000 Series firewall, it does not
support these opons. You can also use the web interface on all plaorms to View and
Manage Reports, but only on a per log type basis, not for the enre log database.
STEP 1 | Configure a server profile for each external service that will receive log informaon.
You can use separate profiles to send different sets of logs, filtered by log aributes, to
a different server. To increase availability, define mulple servers in a single profile.
PAN-OS® Administrator’s Guide Version 10.1 541 ©2022 Palo Alto Networks, Inc.
Monitoring
If no log forwarding profile named default exists, the profile selecon is set
to None by default in new security rules (Log Forwarding field) and new security
zones (Log Seng field), although you can change the selecon.
3. Add one or more match list profiles.
The profiles specify log query filters, forwarding desnaons, and automac acons such
as tagging. For each match list profile:
1. Enter a Name to idenfy the profile.
2. Select the Log Type.
3. In the Filter drop-down, select Filter Builder. Specify the following and then Add each
query:
• Connector logic (and/or)
• Log Aribute
• Operator to define inclusion or exclusion logic
• Aribute Value for the query to match
4. Select Panorama if you want to forward logs to Log Collectors or the Panorama
management server.
5. For each type of external service that you use for monitoring (SNMP, Email, Syslog,
and HTTP), Add one or more server profiles.
4. (Oponal, GlobalProtect Only) If you are using a log forwarding profile with a security
policy to automacally quaranne a device using GlobalProtect, select Quaranne in the
Built-in Acons area.
5. Click OK to save the Log Forwarding profile.
PAN-OS® Administrator’s Guide Version 10.1 542 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 3 | Assign the Log Forwarding profile to policy rules and network zones.
Security, Authencaon, and DoS Protecon rules support log forwarding. In this example, you
assign the profile to a Security rule.
Perform the following steps for each rule that you want to trigger log forwarding:
1. Select Policies > Security and edit the rule.
2. Select Acons and select the Log Forwarding profile you created.
3. Set the Profile Type to Profiles or Group, and then select the security profiles or Group
Profile required to trigger log generaon and forwarding for:
• Threat logs—Traffic must match any security profile assigned to the rule.
• WildFire Submission logs—Traffic must match a WildFire Analysis profile assigned to
the rule.
4. For Traffic logs, select Log At Session Start and/or Log At Session End.
5. Click OK to save the rule.
STEP 4 | Configure the desnaons for System, Configuraon, Correlaon, GlobalProtect, HIP Match,
and User-ID logs.
Panorama generates Correlaon logs based on the firewall logs it receives, rather than
aggregang Correlaon logs from firewalls.
STEP 5 | (PA-7000 Series firewalls only) Configure a log card interface to perform log forwarding.
As of PAN-OS 10.1, you can no longer forward system logs using the Management
interface or using service routes through the Data Plane interfaces. The only way to
forward system logs from a PA-7000 Series firewall running PAN-OS 10.1 or later is by
configuring a Log Forwarding Card (LFC).
1. Select Network > Interfaces > Ethernet and click Add Interface.
2. Select the Slot and Interface Name.
3. Set the Interface Type to Log Card.
4. Enter the IP Address, Default Gateway, and (for IPv4 only) Netmask.
5. Select Advanced and specify the Link Speed, Link Duplex, and Link State.
These fields default to auto, which specifies that the firewall automacally
determines the values based on the connecon. However, the minimum
recommended Link Speed for any connecon is 1000 (Mbps).
6. Click OK to save your changes.
PAN-OS® Administrator’s Guide Version 10.1 543 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 6 | (PA-5450 firewall only) Configure a log interface to perform log forwarding.
This step is not required if you are forwarding logs to a Panorama or Cortex Data Lake
using the management interface. The management interface handles log forwarding by
default and does not require the log interface to be configured.
• (PAN-OS 10.1.0 to 10.1.6) The management interface handles log forwarding by default
unless you configure a specific service route for log forwarding.
• (PAN-OS 10.1.6-h3 and later releases) The management interface handles log forwarding by
default unless you configure the log interface or a specific service route for log forwarding.
If a log interface is configured and commied, all internal logging, CDL, SNMP, HTTP, and
Syslog will be forwarded by the log interface.
All services, such as SNMP, HTTP, and Syslog, are routed through the management or
data interface. If you designate a specific service route for a service, then that service
route is priorized for log forwarding over the interface.
Ensure that the log interface you are configuring is not in the same subnetwork as the
management interface. Configuring both interfaces in the same subnetwork can cause
connecvity issues and result in the wrong interface being used for log forwarding.
The Log ports (LOG-1 and LOG-2) are bundled by default as a LAG (link aggregaon
group). To leverage both ports, they must be connected to a LAG aware switch.
These fields default to auto, which specifies that the firewall automacally
determines the values based on the connecon.
5. Click OK to save your changes.
PAN-OS® Administrator’s Guide Version 10.1 544 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 545 ©2022 Palo Alto Networks, Inc.
Monitoring
As a best pracce, configure transport layer security (TLS) to require the firewall to
authencate with the email server before the firewall relays email to the server. This helps
prevent malicious acvity, such as Simple Mail Transfer Protocol (SMTP) relay, which can
be used to send spam or malware, and email spoofing, which can be used for phishing
aacks.
STEP 1 | (Required for SMTP over TLS) If you have not already done so, create a cerficate profile for
the email server.
STEP 4 | From the read-only window that appears, Add the email server and enter a Name.
STEP 5 | If the firewall has more than one virtual system (vsys), select the Locaon (vsys or Shared)
where this profile is available.
STEP 6 | (Oponal) Enter an Email Display Name to specify the name to display in the From field of
the email.
STEP 7 | Enter the email address From which the firewall sends emails.
STEP 8 | Enter the email address To which the firewall sends emails.
STEP 9 | (Oponal) If you want to send emails to a second account, enter the address of the
Addional Recipient. You can add only one addional recipient. For mulple recipients, add
the email address of a distribuon list.
STEP 10 | Enter the IP address or hostname of the Email Gateway to use for sending emails.
STEP 11 | Select the Type of protocol to use to connect to the email server:
• Unauthencated SMTP—Use SMTP to connect to the email server without authencaon.
The default Port is 25, but you can oponally specify a different port. This protocol does not
provide the same security as SMTP over TLS, but if you select this protocol, skip the next
step.
• SMTP over TLS—(Recommended) Use TLS to require authencaon to connect to the email
server. Connue to the next step to configure the TLS authencaon.
PAN-OS® Administrator’s Guide Version 10.1 546 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 12 | (SMTP over TLS only) Configure the firewall to use TLS authencaon to connect to the
email server.
1. (Oponal) Specify the Port to use to connect to the email server (default is 587).
2. TLS Version—Specify the TLS version (1.1 or 1.2).
Palo Alto Networks strongly recommends using the latest TLS version.
3. Select the Authencaon Method for the firewall and the email server:
• Auto—Allow the firewall and the email server to determine the authencaon
method.
• Login—Use Base64 encoding for the username and password and transmit them
separately.
• Plain—Use Base64 encoding for the username and password and transmit them
together.
4. Select a Cerficate Profile to authencate with the email server.
5. Enter the Username and Password of the account that sends the emails, then Confirm
Password.
6. (Oponal) To confirm that the firewall can successfully authencate with the email
server, you can Test Connecon.
STEP 14 | (Oponal) Select the Custom Log Format tab and customize the format of the email
messages. For details on how to create custom formats for the various log types, refer to the
Common Event Format Configuraon Guide.
STEP 15 | Configure email alerts for Traffic, Threat, and WildFire Submission logs.
1. See Create a Log Forwarding profile.
1. Select Objects > Log Forwarding, click Add, and enter a Name to idenfy the profile.
2. For each log type and each severity level or WildFire verdict, select the Email server
profile and click OK.
2. See Assign the Log Forwarding profile to policy rules and network zones.
STEP 16 | Configure email alerts for System, Config, HIP Match, and Correlaon logs.
1. Select Device > Log Sengs.
2. For System and Correlaon logs, click each Severity level, select the Email server profile,
and click OK.
3. For Config and HIP Match logs, edit the secon, select the Email server profile, and click
OK.
4. Click Commit.
PAN-OS® Administrator’s Guide Version 10.1 547 ©2022 Palo Alto Networks, Inc.
Monitoring
For CEF-formated syslog events collecon, you must edit the default syslog
configuraon. The default syslog monitoring configuraon is not supported for CEF syslog
events collecon.
PAN-OS® Administrator’s Guide Version 10.1 548 ©2022 Palo Alto Networks, Inc.
Monitoring
You can use separate profiles to send syslogs for each log type to a different server. To
increase availability, define mulple servers (up to four) in a single profile.
If you configure an FQDN and use UDP transport, if the firewall cannot
resolve the FQDN, the firewall uses the exisng IP address resoluon for the
FQDN as the Syslog Server address.
• Transport—Select TCP, UDP, or SSL (TLS) as the protocol for communicang with the
syslog server. For SSL, the firewall supports only TLSv1.2.
• Port—The port number on which to send syslog messages (default is UDP on port
514); you must use the same port number on the firewall and the syslog server.
• Format—Select the syslog message format to use: BSD (the default) or IETF.
Tradionally, BSD format is over UDP and IETF format is over TCP or SSL/TLS.
• Facility—Select a syslog standard value (default is LOG_USER) to calculate the priority
(PRI) field in your syslog server implementaon. Select the value that maps to how
you use the PRI field to manage your syslog messages.
5. (Oponal) To customize the format of the syslog messages that the firewall sends, select
the Custom Log Format tab. For details on how to create custom formats for the various
log types, refer to the Common Event Format Configuraon Guide.
6. Click OK to save the server profile.
PAN-OS® Administrator’s Guide Version 10.1 549 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Configure syslog forwarding for Traffic, Threat, and WildFire Submission logs.
1. Configure the firewall to forward logs. For more informaon, see Step Create a Log
Forwarding profile.
1. Select Objects > Log Forwarding, click Add, and enter a Name to idenfy the profile.
2. For each log type and each severity level or WildFire verdict, select the Syslog server
profile and click OK.
2. Assign the log forwarding profile to a security policy to trigger log generaon and
forwarding. For more informaon, See Step Assign the Log Forwarding profile to policy
rules and network zones.
1. Select Policies > Security and select a policy rule.
2. Select the Acons tab and select the Log Forwarding profile you created.
3. In the Profile Type drop-down, select Profiles or Groups, and then select the security
profiles or Group Profiles required to trigger log generaon and forwarding.
4. For Traffic logs, select one or both of the Log at Session Start and Log At Session End
check boxes, and click OK.
For detailed informaon about configuring a log forwarding profile and assigning the
profile to a policy rule, see Configure Log Forwarding.
STEP 3 | Configure syslog forwarding for System, Config, HIP Match, and Correlaon logs.
1. Select Device > Log Sengs.
2. For System and Correlaon logs, click each Severity level, select the Syslog server profile,
and click OK.
3. For Config, HIP Match, and Correlaon logs, edit the secon, select the Syslog server
profile, and click OK.
PAN-OS® Administrator’s Guide Version 10.1 550 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 6 | Commit your changes and review the logs on the syslog server.
1. Click Commit.
2. To review the logs, refer to the documentaon of your syslog management soware. You
can also review the Syslog Field Descripons.
STEP 7 | (Oponal) Configure the firewall to terminate the connecon to the syslog server upon
FQDN refresh.
When you configure a syslog server profile using a FQDN, the firewall maintains its connecon
to the syslog server by default in the event of an FQDN name change.
For example, you have replaced an exisng syslog server with a new syslog server that uses
a different FQDN name. If you want the firewall to connect to the new syslog server using a
new FQDN name, you can configure the firewall to automacally terminate its connecon to
PAN-OS® Administrator’s Guide Version 10.1 551 ©2022 Palo Alto Networks, Inc.
Monitoring
the old syslog server and establish a connecon to the new syslog server using the new FQDN
name.
1. Log in to the firewall CLI.
2. Configure the firewall to terminate the connecon to the syslog server upon FQDN
refresh.
WildFire Submissions logs are a subtype of Threat log and use the same syslog format.
PAN-OS® Administrator’s Guide Version 10.1 552 ©2022 Palo Alto Networks, Inc.
Monitoring
Source Port, Desnaon Port, NAT Source Port, NAT Desnaon Port, Flags, Protocol, Acon,
Bytes, Bytes Sent, Bytes Received, Packets, Start Time, Elapsed Time, Category, FUTURE_USE,
Sequence Number, Acon Flags, Source Country, Desnaon Country, FUTURE_USE, Packets
Sent, Packets Received, Session End Reason, Device Group Hierarchy Level 1, Device Group
Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual
System Name, Device Name, Acon Source, Source VM UUID, Desnaon VM UUID, Tunnel
ID/IMSI, Monitor Tag/IMEI, Parent Session ID, Parent Start Time, Tunnel Type, SCTP Associaon
ID, SCTP Chunks, SCTP Chunks Sent, SCTP Chunks Received, Rule UUID, HTTP/2 Connecon,
App Flap Count, Policy ID, Link Switches, SD-WAN Cluster, SD-WAN Device Type, SD-WAN
Cluster Type, SD-WAN Site, Dynamic User Group Name, XFF Address, Source Device Category,
Source Device Profile, Source Device Model, Source Device Vendor, Source Device OS Family,
Source Device OS Version, Source Hostname, Source Mac Address, Desnaon Device Category,
Desnaon Device Profile, Desnaon Device Model, Desnaon Device Vendor, Desnaon
Device OS Family, Desnaon Device OS Version, Desnaon Hostname, Desnaon Mac
Address, Container ID, POD Namespace, POD Name, Source External Dynamic List, Desnaon
External Dynamic List, Host ID, Serial Number, Source Dynamic Address Group, Desnaon
Dynamic Address Group, Session Owner, High Resoluon Timestamp, A Slice Service Type, A Slice
Differenator, Applicaon Subcategory, Applicaon Category, Applicaon Technology, Applicaon
Risk, Applicaon Characterisc, Applicaon Container, Tunneled Applicaon, Applicaon SaaS,
Applicaon Sanconed State, Offloaded
Receive Time (receive_me Time the log was received at the management plane.
or cef-formaed-
receive_me)
Serial Number (serial) Serial number of the firewall that generated the log.
Threat/Content Type Subtype of traffic log; values are start, end, drop, and deny
(subtype)
• Start—session started
• End—session ended
• Drop—session dropped before the applicaon is idenfied
and there is no rule that allows the session.
• Deny—session dropped aer the applicaon is idenfied
and there is a rule to block or no rule that allows the
session.
PAN-OS® Administrator’s Guide Version 10.1 553 ©2022 Palo Alto Networks, Inc.
Monitoring
NAT Source IP (natsrc) If Source NAT performed, the post-NAT Source IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who iniated the session.
Desnaon User (dstuser) Username of the user to which the session was desned.
Log Acon (logset) Log Forwarding Profile that was applied to the session.
Repeat Count (repeatcnt) Number of sessions with same Source IP, Desnaon IP,
Applicaon, and Subtype seen within 5 seconds.
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—opon is enabled to allow a client to use
mulple paths to connect to a desnaon host
PAN-OS® Administrator’s Guide Version 10.1 554 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; possible values are:
• allow—session was allowed by policy
• deny—session was denied by policy
• drop—session was dropped silently
PAN-OS® Administrator’s Guide Version 10.1 555 ©2022 Palo Alto Networks, Inc.
Monitoring
Bytes (bytes) Number of total bytes (transmit and receive) for the session.
Packets (packets) Number of total packets (transmit and receive) for the session.
Category (category) URL category associated with the session (if applicable).
Sequence Number (seqno) A 64-bit log entry idenfier incremented sequenally; each log
type has a unique number space.
Acon Flags (aconflags) A bit field indicang if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses;
maximum length is 32 bytes.
Desnaon Country (dstloc) Desnaon country or Internal region for private addresses.
Maximum length is 32 bytes.
Session End Reason The reason a session terminated. If the terminaon had
(session_end_reason) mulple causes, this field displays only the highest priority
reason. The possible session end reason values are as follows,
in order of priority (where the first is highest):
PAN-OS® Administrator’s Guide Version 10.1 556 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 557 ©2022 Palo Alto Networks, Inc.
Monitoring
Device Group Hierarchy A sequence of idenficaon numbers that indicate the device
(dg_hier_level_1 to group’s locaon within a device group hierarchy. The firewall
dg_hier_level_4) (or virtual system) generang the log includes the idenficaon
number of each ancestor in its device group hierarchy. The
shared device group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to
device group 45, and its ancestors are 34, and 12. To view the
device group names that correspond to the value 12, 34 or 45,
use one of the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session;
(vsys_name) only valid on firewalls enabled for mulple virtual systems.
Device Name (device_name) The hostname of the firewall on which the session was logged.
Acon Source (acon_source) Specifies whether the acon taken to allow or block an
applicaon was defined in the applicaon or in policy. The
acons can be allow, deny, drop, reset- server, reset-client or
reset-both for the session.
PAN-OS® Administrator’s Guide Version 10.1 558 ©2022 Palo Alto Networks, Inc.
Monitoring
Source VM UUID (src_uuid) Idenfies the source universal unique idenfier for a guest
virtual machine in the VMware NSX environment.
Desnaon VM UUID Idenfies the desnaon universal unique idenfier for a guest
(dst_uuid) virtual machine in the VMware NSX environment.
SCTP Chunks (chunks) Sum of SCTP chunks sent and received for an associaon.
Rule UUID (rule_uuid) The UUID that permanently idenfies the rule.
App Flap Count Number of link flaps that occurred during the session.
(link_change_count)
PAN-OS® Administrator’s Guide Version 10.1 559 ©2022 Palo Alto Networks, Inc.
Monitoring
Link Switches (link_switches) Contains up to four link flap entries, with each entry containing
the link name, link tag, link type, physical interface, mestamp,
bytes read, bytes wrien, link health, and link flap cause.
Dynamic User Group Name Name of the dynamic user group that contains the user who
(dynusergroup_name) iniated the session.
XFF Address (xff_ip) The IP address of the user who requested the web page or
the IP address of the next to last device that the request
traversed. If the request goes through one or more proxies,
load balancers, or other upstream devices, the firewall displays
the IP address of the most recent device.
Source Device Category The category for the device that Device-ID idenfies as the
(src_category) source of the traffic.
Source Device Profile The device profile for the device that Device-ID idenfies as
(src_profile) the source of the traffic.
Source Device Model The model of the device that Device-ID idenfies as the source
(src_model) of the traffic.
Source Device Vendor The vendor of the device that Device-ID idenfies as the
(src_vendor) source of the traffic.
Source Device OS Family The operang system type for the device that Device-ID
(src_osfamily) idenfies as the source of the traffic.
Source Device OS Version The version of the operang system for the device that
(src_osversion) Device-ID idenfies as the source of the traffic.
Source Hostname (src_host) The hostname of the device that Device-ID idenfies as the
source of the traffic.
PAN-OS® Administrator’s Guide Version 10.1 560 ©2022 Palo Alto Networks, Inc.
Monitoring
Source MAC Address The MAC address for the device that Device-ID idenfies as
(src_mac) the source of the traffic.
Desnaon Device Category The category for the device that Device-ID idenfies as the
(dst_category) desnaon for the traffic.
Desnaon Device Profile The device profile for the device that Device-ID idenfies as
(dst_profile) the desnaon for the traffic.
Desnaon Device Model The model of the device that Device-ID idenfies as the
(dst_model) desnaon for the traffic.
Desnaon Device Vendor The vendor of the device that Device-ID idenfies as the
(dst_vendor) desnaon for the traffic.
Desnaon Device OS The operang system type for the device that Device-ID
Family (dst_osfamily) idenfies as the desnaon for the traffic.
Desnaon Device OS The version of the operang system for the device that
Version (dst_osversion) Device-ID idenfies as the desnaon for the traffic.
Desnaon Hostname The hostname of the device that Device-ID idenfies as the
(dst_host) desnaon for the traffic.
Desnaon MAC Address The MAC address for the device that Device-ID idenfies as
(dst_mac) the desnaon for the traffic.
Source External Dynamic List The name of the external dynamic list that contains the source
(src_edl) IP address of the traffic.
Desnaon External The name of the external dynamic list that contains the
Dynamic List (dst_edl) desnaon IP address of the traffic.
User Device Serial Number Serial number of the user’s machine or device.
(serialnumber)
PAN-OS® Administrator’s Guide Version 10.1 561 ©2022 Palo Alto Networks, Inc.
Monitoring
Session Owner The original high availability (HA) peer session owner in an HA
(session_owner) cluster from which the session table data was synchronized
upon HA failover.
High Resoluon Timestamp Time in milliseconds the log was received at the management
(high_res_mestamp) plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
A Slice Service Type The A Slice Service Type of the Network Slice ID.
(nsdsai_sst)
PAN-OS® Administrator’s Guide Version 10.1 562 ©2022 Palo Alto Networks, Inc.
Monitoring
Applicaon Risk (risk_of_app) Risk level associated with the applicaon (1=lowest to
5=highest).
Offloaded (offloaded) Displays 1 if traffic flow has been offloaded or 0 if traffic flow
was not offloaded.
PAN-OS® Administrator’s Guide Version 10.1 563 ©2022 Palo Alto Networks, Inc.
Monitoring
Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID,
Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level
3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source
VM UUID, Desnaon VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent
Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE,
SCTP Associaon ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2
Connecon, Dynamic User Group Name, XFF Address, Source Device Category, Source Device
Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device
OS Version, Source Hostname, Source MAC Address, Desnaon Device Category, Desnaon
Device Profile, Desnaon Device Model, Desnaon Device Vendor, Desnaon Device OS
Family, Desnaon Device OS Version, Desnaon Hostname, Desnaon MAC Address,
Container ID, POD Namespace, POD Name, Source External Dynamic List, Desnaon External
Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Desnaon
Dynamic Address Group, Paral Hash, High Resoluon Timestamp, Reason, Jusficaon, A Slice
Service Type, Applicaon Subcategory, Applicaon Category, Applicaon Technology, Applicaon
Risk, Applicaon Characterisc, Applicaon Container, Tunneled Applicaon, Applicaon SaaS,
Applicaon Sanconed State
Receive Time Time the log was received at the management plane.
(receive_me or cef-
formaed-receive_me)
Serial Number (serial #) Serial number of the firewall that generated the log.
PAN-OS® Administrator’s Guide Version 10.1 564 ©2022 Palo Alto Networks, Inc.
Monitoring
NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who iniated the session.
Desnaon User Username of the user to which the session was desned.
(dstuser)
Log Acon (logset) Log Forwarding Profile that was applied to the session.
Repeat Count Number of sessions with same Source IP, Desnaon IP,
(repeatcnt) Applicaon, and Content/Threat Type seen within 5 seconds.
PAN-OS® Administrator’s Guide Version 10.1 565 ©2022 Palo Alto Networks, Inc.
Monitoring
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—opon is enabled to allow a client to use mulple
paths to connect to a desnaon host
• 0x20000000—indicates whether a sample has been submied
for analysis using the WildFire public or private cloud channel
• 0x10000000—enterprise credenal submission by end user
detected
• 0x08000000— source for the flow is on an allow list and not
subject to recon protecon
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translaon performed
• 0x00200000—user informaon for the session was captured
through Authencaon Portal
• 0x00100000—applicaon traffic is on a non-standard desnaon
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the
source user field
• 0x00040000 —log corresponds to a transacon within a hp
proxy session (Proxy Transacon)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
• 0x00010000—Server to Client flow is subject to policy based
forwarding
• 0x00008000 —session is a container page access (Container
Page)
PAN-OS® Administrator’s Guide Version 10.1 566 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; values are alert, allow, deny, drop,
drop-all-packets, reset-client, reset-server, reset-both, block-url.
• alert—threat or URL detected but not blocked
• allow— flood detecon alert
• deny—flood detecon mechanism acvated and deny traffic
based on configuraon
• drop— threat detected and associated session was dropped
• reset-client —threat detected and a TCP RST is sent to the client
• reset-server —threat detected and a TCP RST is sent to the
server
• reset-both —threat detected and a TCP RST is sent to both the
client and the server
• block-url —URL request was blocked because it matched a URL
category that was set to be blocked
• block-ip—threat detected and client IP is blocked
• random-drop—flood detected and packet was randomly dropped
• sinkhole—DNS sinkhole acvated
• syncookie-sent—syncookie alert
• block-connue (URL subtype only)—a HTTP request is blocked
and redirected to a Connue page with a buon for confirmaon
to proceed
• connue (URL subtype only)—response to a block-connue URL
connue page indicang a block-connue request was allowed
to proceed
• block-override (URL subtype only)—a HTTP request is blocked
and redirected to an Admin override page that requires a pass
code from the firewall administrator to connue
PAN-OS® Administrator’s Guide Version 10.1 567 ©2022 Palo Alto Networks, Inc.
Monitoring
Threat/Content Name Palo Alto Networks idenfier for known and custom threats. It
(thread) is a descripon string followed by a 64-bit numerical idenfier in
parentheses for some Subtypes:
• 8000 – 8099— scan detecon
• 8500 – 8599— flood detecon
• 9999— URL filtering log
• 10000 – 19999 —spyware phone home detecon
• 20000 – 29999 —spyware download detecon
• 30000 – 44999 —vulnerability exploit detecon
• 52000 – 52999— filetype detecon
• 60000 – 69999 —data filtering detecon
If the Domain EDL field is populated, then this field is populated
with the same value.
PAN-OS® Administrator’s Guide Version 10.1 568 ©2022 Palo Alto Networks, Inc.
Monitoring
Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is
the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’,
or ‘benign’; For other subtypes, the value is ‘any’.
Severity (severity) Severity associated with the threat; values are informaonal, low,
medium, high, crical.
Sequence Number A 64-bit log entry idenfier incremented sequenally. Each log type
(seqno) has a unique number space.
Acon Flags (aconflags) A bit field indicang if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses. Maximum
length is 32 bytes.
PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denong
an ID to correlate threat pcap files with extended pcaps taken as a
part of that flow. All threat logs will contain either a pcap_id of 0 (no
associated pcap), or an ID referencing the extended pcap file.
File Digest (filedigest) Only for WildFire subtype; all other types do not use this field
The filedigest string shows the binary hash of the file sent to be
analyzed by the WildFire service.
Cloud (cloud) Only for WildFire subtype; all other types do not use this field.
The cloud string displays the FQDN of either the WildFire appliance
(private) or the WildFire cloud (public) from where the file was
uploaded for analysis.
PAN-OS® Administrator’s Guide Version 10.1 569 ©2022 Palo Alto Networks, Inc.
Monitoring
User Agent (user_agent) Only for the URL Filtering subtype; all other types do not use this
field.
The User Agent field specifies the web browser that the user used
to access the URL, for example Internet Explorer. This informaon is
sent in the HTTP request to the server.
File Type (filetype) Only for WildFire subtype; all other types do not use this field.
Specifies the type of file that the firewall forwarded for WildFire
analysis.
X-Forwarded-For (xff) Only for the URL Filtering subtype; all other types do not use this
field.
The X-Forwarded-For field in the HTTP header contains the IP
address of the user who requested the web page. It allows you to
idenfy the IP address of the user, which is useful parcularly if
you have a proxy server on your network that replaces the user IP
address with its own address in the source IP address field of the
packet header.
Referer (referer) Only for the URL Filtering subtype; all other types do not use this
field.
The Referer field in the HTTP header contains the URL of the web
page that linked the user to another web page; it is the source
that redirected (referred) the user to the web page that is being
requested.
Report ID (repord) Only for WildFire subtype; all other types do not use this field.
PAN-OS® Administrator’s Guide Version 10.1 570 ©2022 Palo Alto Networks, Inc.
Monitoring
Device Group Hierarchy A sequence of idenficaon numbers that indicate the device
(dg_hier_level_1 to group’s locaon within a device group hierarchy. The firewall (or
dg_hier_level_4) virtual system) generang the log includes the idenficaon number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device group
names that correspond to the value 12, 34 or 45, use one of the
following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only
(vsys_name) valid on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Source VM UUID Idenfies the source universal unique idenfier for a guest virtual
(src_uuid) machine in the VMware NSX environment.
Desnaon VM UUID Idenfies the desnaon universal unique idenfier for a guest
(dst_uuid) virtual machine in the VMware NSX environment.
HTTP Method Only in URL filtering logs. Describes the HTTP Method used in
(hp_method) the web request. Only the following methods are logged: Connect,
Delete, Get, Head, Opons, Post, Put.
Parent Session ID ID of the session in which this session is tunneled. Applies to inner
(parent_session_id) tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
PAN-OS® Administrator’s Guide Version 10.1 571 ©2022 Palo Alto Networks, Inc.
Monitoring
Threat Category Describes threat categories used to classify different types of threat
(thr_category) signatures.
If a domain external dynamic list generated the log, domain-edl
populates this field.
Content Version Applicaons and Threats version on your firewall when the log was
(contentver) generated.
SCTP Associaon ID Number that idenfies all connecons for an associaon between
(assoc_id) two SCTP endpoints.
Payload Protocol ID ID of the protocol for the payload in the data poron of the
(ppid)
data chunk.
HTTP Headers Indicates the inserted HTTP header in the URL log entries on the
(hp_headers) firewall.
URL Category List Lists the URL Filtering categories that the firewall used to enforce
(url_category_list) policy.
Rule UUID (rule_uuid) The UUID that permanently idenfies the rule.
Dynamic User The name of the dynamic user group that contains the user who
Group Name iniated the session.
(dynusergroup_name)
XFF Address (xff_ip) The IP address of the user who requested the web page or the IP
address of the next to last device that the request traversed. If the
request goes through one or more proxies, load balancers, or other
upstream devices, the firewall displays the IP address of the most
recent device.
Source Device Category The category for the device that Device-ID idenfies as the source
(src_category) of the traffic.
PAN-OS® Administrator’s Guide Version 10.1 572 ©2022 Palo Alto Networks, Inc.
Monitoring
Source Device Profile The device profile for the device that Device-ID idenfies as the
(src_profile) source of the traffic.
Source Device Model The model of the device that Device-ID idenfies as the source of
(src_model) the traffic.
Source Device Vendor The vendor of the device that Device-ID idenfies as the source of
(src_vendor) the traffic.
Source Device OS The operang system type for the device that Device-ID idenfies
Family (src_osfamily) as the source of the traffic.
Source Device OS The version of the operang system for the device that Device-ID
Version (src_osversion) idenfies as the source of the traffic.
Source Hostname The hostname of the device that Device-ID idenfies as the source
(src_host) of the traffic.
Source MAC Address The MAC address for the device that Device-ID idenfies as the
(src_mac) source of the traffic.
Desnaon Device The category for the device that Device-ID idenfies as the
Category (dst_category) desnaon for the traffic.
Desnaon Device The device profile for the device that Device-ID idenfies as the
Profile (dst_profile) desnaon for the traffic.
Desnaon Device The model of the device that Device-ID idenfies as the desnaon
Model (dst_model) for the traffic.
Desnaon Device The vendor of the device that Device-ID idenfies as the
Vendor (dst_vendor) desnaon for the traffic.
Desnaon Device OS The operang system type for the device that Device-ID idenfies
Family (dst_osfamily) as the desnaon for the traffic.
Desnaon Device OS The version of the operang system for the device that Device-ID
Version (dst_osversion) idenfies as the desnaon for the traffic.
Desnaon Hostname The hostname of the device that Device-ID idenfies as the
(dst_host) desnaon for the traffic.
Desnaon MAC The MAC address for the device that Device-ID idenfies as the
Address (dst_mac) desnaon for the traffic.
PAN-OS® Administrator’s Guide Version 10.1 573 ©2022 Palo Alto Networks, Inc.
Monitoring
Source External The name of the external dynamic list that contains the source IP
Dynamic List (src_edl) address of the traffic.
Desnaon External The name of the external dynamic list that contains the desnaon
Dynamic List (dst_edl) IP address of the traffic.
Domain EDL The name of the external dynamic list that contains the domain
(domain_edl) name of the traffic.
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 574 ©2022 Palo Alto Networks, Inc.
Monitoring
A Slice Service Type The A Slice Service Type of the Network Slice ID.
(nssai_sst)
Applicaon Risk Risk level associated with the applicaon (1=lowest to 5=highest).
(risk_of_app)
PAN-OS® Administrator’s Guide Version 10.1 575 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time Time the log was received at the management plane.
(receive_me or cef-
formaed-receive_me)
PAN-OS® Administrator’s Guide Version 10.1 576 ©2022 Palo Alto Networks, Inc.
Monitoring
Serial Number (serial #) Serial number of the firewall that generated the log.
NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who iniated the session.
Desnaon User Username of the user to which the session was desned.
(dstuser)
Log Acon (logset) Log Forwarding Profile that was applied to the session.
PAN-OS® Administrator’s Guide Version 10.1 577 ©2022 Palo Alto Networks, Inc.
Monitoring
Repeat Count Number of sessions with same Source IP, Desnaon IP,
(repeatcnt) Applicaon, and Content/Threat Type seen within 5 seconds.
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—opon is enabled to allow a client to use mulple
paths to connect to a desnaon host
• 0x20000000—file is submied to WildFire for a verdict
• 0x10000000—enterprise credenal submission by end user
detected
• 0x08000000— source for the flow is on an allow list and not
subject to recon protecon
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translaon performed
• 0x00200000—user informaon for the session was captured
through Authencaon Portal
• 0x00100000—applicaon traffic is on a non-standard desnaon
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the
source user field
• 0x00040000 —log corresponds to a transacon within a hp
proxy session (Proxy Transacon)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
• 0x00010000—Server to Client flow is subject to policy based
forwarding
• 0x00008000 —session is a container page access (Container
Page)
PAN-OS® Administrator’s Guide Version 10.1 578 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; values are alert, allow, block-url, block-
connue, connue, block-override, override-lockout, override.
• alert—threat or URL detected but not blocked
• allow— flood detecon alert
• block-url —URL request was blocked because it matched a URL
category that was set to be blocked
• block-connue—a HTTP request is blocked and redirected to a
Connue page with a buon for confirmaon to proceed
• connue —response to a block-connue URL connue page
indicang a block-connue request was allowed to proceed
• block-override —a HTTP request is blocked and redirected to an
Admin override page that requires a pass code from the firewall
administrator to connue
• override-lockout—too many failed admin override pass code
aempts from the source IP. IP is now blocked from the block-
override redirect page
• override —response to a block-override page where a correct
pass code is provided and the request is allowed
URL/Filename (misc) Field with variable length. A URL has a maximum of 1023
characters.
The actual URI when the subtype is url.
URL when Threat Category is domain-edl.
Threat/Content Name Palo Alto Networks idenfier for known and custom threats. It
(thread) is a descripon string followed by a 64-bit numerical idenfier in
parentheses for some Subtypes:
• 8000 – 8099— scan detecon
• 8500 – 8599— flood detecon
• 9999— URL filtering log
PAN-OS® Administrator’s Guide Version 10.1 579 ©2022 Palo Alto Networks, Inc.
Monitoring
Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is
the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’,
or ‘benign’; For other subtypes, the value is ‘any’.
Severity (severity) Severity associated with the threat; values are informaonal, low,
medium, high, crical.
Sequence Number A 64-bit log entry idenfier incremented sequenally. Each log type
(seqno) has a unique number space.
Acon Flags (aconflags) A bit field indicang if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses. Maximum
length is 32 bytes.
Content Type Content type of the HTTP response data. Maximum length 32
(contenype) bytes.
PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denong
an ID to correlate threat pcap files with extended pcaps taken as a
part of that flow. All threat logs will contain either a pcap_id of 0 (no
associated pcap), or an ID referencing the extended pcap file.
PAN-OS® Administrator’s Guide Version 10.1 580 ©2022 Palo Alto Networks, Inc.
Monitoring
File Digest (filedigest) Only for WildFire subtype; all other types do not use this field
The filedigest string shows the binary hash of the file sent to be
analyzed by the WildFire service.
Cloud (cloud) Only for WildFire subtype; all other types do not use this field.
The cloud string displays the FQDN of either the WildFire appliance
(private) or the WildFire cloud (public) from where the file was
uploaded for analysis.
URL Index (url_idx) When an applicaon uses TCP keepalives to keep a connecon
open for a length of me, all the log entries for that session have a
single session ID. In such cases, when you have a single threat log
(and session ID) that includes mulple URL entries, the url_idx is
a counter that allows you to correlate the order of each log entry
within the single session.
For example, to learn the URL of a file that the firewall forwarded
to WildFire for analysis, locate the session ID and the url_idx from
the WildFire Submissions log and search for the same session ID
and url_idx in your URL filtering logs. The log entry that matches
the session ID and url_idx will contain the URL of the file that was
forwarded to WildFire.
User Agent (user_agent) The User Agent field specifies the web browser that the user used
to access the URL, for example Internet Explorer. This informaon is
sent in the HTTP request to the server.
File Type (filetype) Only for WildFire subtype; all other types do not use this field.
Specifies the type of file that the firewall forwarded for WildFire
analysis.
X-Forwarded-For (xff) The X-Forwarded-For field in the HTTP header contains the IP
address of the user who requested the web page. It allows you to
idenfy the IP address of the user, which is useful parcularly if
you have a proxy server on your network that replaces the user IP
address with its own address in the source IP address field of the
packet header.
Referer (referer) The Referer field in the HTTP header contains the URL of the web
page that linked the user to another web page; it is the source
that redirected (referred) the user to the web page that is being
requested.
PAN-OS® Administrator’s Guide Version 10.1 581 ©2022 Palo Alto Networks, Inc.
Monitoring
Report ID (repord) Only for Data Filtering and WildFire subtype; all other types do not
use this field.
Idenfies the analysis request on the firewall, WildFire cloud, or the
WildFire appliance.
Device Group Hierarchy A sequence of idenficaon numbers that indicate the device
(dg_hier_level_1 to group’s locaon within a device group hierarchy. The firewall (or
dg_hier_level_4) virtual system) generang the log includes the idenficaon number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device group
names that correspond to the value 12, 34 or 45, use one of the
following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only
(vsys_name) valid on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Source VM UUID Idenfies the source universal unique idenfier for a guest virtual
(src_uuid) machine in the VMware NSX environment.
Desnaon VM UUID Idenfies the desnaon universal unique idenfier for a guest
(dst_uuid) virtual machine in the VMware NSX environment.
HTTP Method Describes the HTTP Method used in the web request. Only the
(hp_method) following methods are logged: Connect, Delete, Get, Head, Opons,
Post, Put.
PAN-OS® Administrator’s Guide Version 10.1 582 ©2022 Palo Alto Networks, Inc.
Monitoring
Parent Session ID ID of the session in which this session is tunneled. Applies to inner
(parent_session_id) tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Threat Category Describes threat categories used to classify different types of threat
(thr_category) signatures.
If a domain external dynamic list generated the log, domain-edl
populates this field.
Content Version Applicaons and Threats version on your firewall when the log was
(contentver) generated.
SCTP Associaon ID Number that idenfies all connecons for an associaon between
(assoc_id) two SCTP endpoints.
Payload Protocol ID ID of the protocol for the payload in the data poron of the
(ppid)
data chunk.
HTTP Headers Indicates the inserted HTTP header in the URL log entries on the
(hp_headers) firewall.
URL Category List Lists the URL Filtering categories that the firewall used to enforce
(url_category_list) policy.
Rule UUID (rule_uuid) The UUID that permanently idenfies the rule.
Dynamic User The name of the dynamic user group that contains the user who
Group Name iniated the session.
(dynusergroup_name)
XFF Address (xff_ip) The IP address of the user who requested the web page or the IP
address of the next to last device that the request traversed. If the
PAN-OS® Administrator’s Guide Version 10.1 583 ©2022 Palo Alto Networks, Inc.
Monitoring
Source Device Category The category for the device that Device-ID idenfies as the source
(src_category) of the traffic.
Source Device Profile The device profile for the device that Device-ID idenfies as the
(src_profile) source of the traffic.
Source Device Model The model of the device that Device-ID idenfies as the source of
(src_model) the traffic.
Source Device Vendor The vendor of the device that Device-ID idenfies as the source of
(src_vendor) the traffic.
Source Device OS The operang system type for the device that Device-ID idenfies
Family (src_osfamily) as the source of the traffic.
Source Device OS The version of the operang system for the device that Device-ID
Version (src_osversion) idenfies as the source of the traffic.
Source Hostname The hostname of the device that Device-ID idenfies as the source
(src_host) of the traffic.
Source MAC Address The MAC address for the device that Device-ID idenfies as the
(src_mac) source of the traffic.
Desnaon Device The category for the device that Device-ID idenfies as the
Category (dst_category) desnaon for the traffic.
Desnaon Device The device profile for the device that Device-ID idenfies as the
Profile (dst_profile) desnaon for the traffic.
Desnaon Device The model of the device that Device-ID idenfies as the desnaon
Model (dst_model) for the traffic.
Desnaon Device The vendor of the device that Device-ID idenfies as the
Vendor (dst_vendor) desnaon for the traffic.
Desnaon Device OS The operang system type for the device that Device-ID idenfies
Family (dst_osfamily) as the desnaon for the traffic.
Desnaon Device OS The version of the operang system for the device that Device-ID
Version (dst_osversion) idenfies as the desnaon for the traffic.
PAN-OS® Administrator’s Guide Version 10.1 584 ©2022 Palo Alto Networks, Inc.
Monitoring
Desnaon Hostname The hostname of the device that Device-ID idenfies as the
(dst_host) desnaon for the traffic.
Desnaon MAC The MAC address for the device that Device-ID idenfies as the
Address (dst_mac) desnaon for the traffic.
Source External The name of the external dynamic list that contains the source IP
Dynamic List (src_edl) address of the traffic.
Desnaon External The name of the external dynamic list that contains the desnaon
Dynamic List (dst_edl) IP address of the traffic.
Domain EDL The name of the external dynamic list that contains the domain
(domain_edl) name of the traffic.
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
PAN-OS® Administrator’s Guide Version 10.1 585 ©2022 Palo Alto Networks, Inc.
Monitoring
A Slice Service Type The A Slice Service Type of the Network Slice ID.
(nssai_sst)
Applicaon Risk Risk level associated with the applicaon (1=lowest to 5=highest).
(risk_of_app)
PAN-OS® Administrator’s Guide Version 10.1 586 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 587 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time Time the log was received at the management plane.
(receive_me or cef-
formaed-receive_me)
Serial Number (serial #) Serial number of the firewall that generated the log.
NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who iniated the session.
Desnaon User Username of the user to which the session was desned.
(dstuser)
PAN-OS® Administrator’s Guide Version 10.1 588 ©2022 Palo Alto Networks, Inc.
Monitoring
Log Acon (logset) Log Forwarding Profile that was applied to the session.
Repeat Count Number of sessions with same Source IP, Desnaon IP,
(repeatcnt) Applicaon, and Content/Threat Type seen within 5 seconds.
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—opon is enabled to allow a client to use mulple
paths to connect to a desnaon host
• 0x20000000—file is submied to WildFire for a verdict
• 0x10000000—enterprise credenal submission by end user
detected
• 0x08000000— source for the flow is on an allow list and not
subject to recon protecon
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translaon performed
• 0x00200000—user informaon for the session was captured
through Authencaon Portal
• 0x00100000—applicaon traffic is on a non-standard desnaon
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the
source user field
• 0x00040000 —log corresponds to a transacon within a hp
proxy session (Proxy Transacon)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
PAN-OS® Administrator’s Guide Version 10.1 589 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; values are alert, allow, deny, drop,
drop-all-packets, reset-client, reset-server, reset-both, block-url.
• alert—traffic containing matching data detected but not blocked
• allow (dlp subtype only)—flood detecon alert
• block (dlp and WildFire subtype only) —traffic containing
matching data detected but blocked
• block-connue (dlp subtype only)—traffic containing matching
data is blocked and redirected to a Connue page with a buon
for confirmaon to proceed
• connue (dlp subtype only)—response to a block-connue page
indicang a block-connue request was allowed to proceed
• deny (dlp subtype only)—flood detecon mechanism acvated
and deny traffic based on configuraon
Threat/Content Name Palo Alto Networks idenfier for known and custom threats. It
(thread) is a descripon string followed by a 64-bit numerical idenfier in
parentheses for some Subtypes:
• 8000 – 8099— scan detecon
• 8500 – 8599— flood detecon
• 9999— URL filtering log
• 10000 – 19999 —spyware phone home detecon
PAN-OS® Administrator’s Guide Version 10.1 590 ©2022 Palo Alto Networks, Inc.
Monitoring
Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is
the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’,
or ‘benign’; For other subtypes, the value is ‘any’.
Severity (severity) Severity associated with the threat; values are informaonal, low,
medium, high, crical.
Sequence Number A 64-bit log entry idenfier incremented sequenally. Each log type
(seqno) has a unique number space.
Acon Flags (aconflags) A bit field indicang if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses. Maximum
length is 32 bytes.
PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denong
an ID to correlate threat pcap files with extended pcaps taken as a
PAN-OS® Administrator’s Guide Version 10.1 591 ©2022 Palo Alto Networks, Inc.
Monitoring
File Digest (filedigest) Only for WildFire subtype; all other types do not use this field
The filedigest string shows the binary hash of the file sent to be
analyzed by the WildFire service.
Cloud (cloud) Only for WildFire subtype; all other types do not use this field.
The cloud string displays the FQDN of either the WildFire appliance
(private) or the WildFire cloud (public) from where the file was
uploaded for analysis.
User Agent (user_agent) Only for the URL Filtering subtype; all other types do not use this
field.
The User Agent field specifies the web browser that the user used
to access the URL, for example Internet Explorer. This informaon is
sent in the HTTP request to the server.
File Type (filetype) Specifies the type of file that the firewall forwarded for analysis.
X-Forwarded-For (xff) Only for the URL Filtering subtype; all other types do not use this
field.
The X-Forwarded-For field in the HTTP header contains the IP
address of the user who requested the web page. It allows you to
idenfy the IP address of the user, which is useful parcularly if
you have a proxy server on your network that replaces the user IP
address with its own address in the source IP address field of the
packet header.
Referer (referer) Only for the URL Filtering subtype; all other types do not use this
field.
PAN-OS® Administrator’s Guide Version 10.1 592 ©2022 Palo Alto Networks, Inc.
Monitoring
Report ID (repord) Idenfies the analysis request on the firewall, WildFire cloud, or the
WildFire appliance.
Device Group Hierarchy A sequence of idenficaon numbers that indicate the device
(dg_hier_level_1 to group’s locaon within a device group hierarchy. The firewall (or
dg_hier_level_4) virtual system) generang the log includes the idenficaon number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device group
names that correspond to the value 12, 34 or 45, use one of the
following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only
(vsys_name) valid on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Source VM UUID Idenfies the source universal unique idenfier for a guest virtual
(src_uuid) machine in the VMware NSX environment.
Desnaon VM UUID Idenfies the desnaon universal unique idenfier for a guest
(dst_uuid) virtual machine in the VMware NSX environment.
HTTP Method Only in URL filtering logs. Describes the HTTP Method used in
(hp_method) the web request. Only the following methods are logged: Connect,
Delete, Get, Head, Opons, Post, Put.
PAN-OS® Administrator’s Guide Version 10.1 593 ©2022 Palo Alto Networks, Inc.
Monitoring
Parent Session ID ID of the session in which this session is tunneled. Applies to inner
(parent_session_id) tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Threat Category Describes threat categories used to classify different types of threat
(thr_category) signatures.
If a domain external dynamic list generated the log, domain-edl
populates this field.
Content Version Applicaons and Threats version on your firewall when the log was
(contentver) generated.
SCTP Associaon ID Number that idenfies all connecons for an associaon between
(assoc_id) two SCTP endpoints.
Payload Protocol ID ID of the protocol for the payload in the data poron of the
(ppid)
data chunk.
HTTP Headers Indicates the inserted HTTP header in the URL log entries on the
(hp_headers) firewall.
URL Category List Lists the URL Filtering categories that the firewall used to enforce
(url_category_list) policy.
Rule UUID (rule_uuid) The UUID that permanently idenfies the rule.
PAN-OS® Administrator’s Guide Version 10.1 594 ©2022 Palo Alto Networks, Inc.
Monitoring
Dynamic User The name of the dynamic user group that contains the user who
Group Name iniated the session.
(dynusergroup_name)
XFF Address (xff_ip) The IP address of the user who requested the web page or the IP
address of the next to last device that the request traversed. If the
request goes through one or more proxies, load balancers, or other
upstream devices, the firewall displays the IP address of the most
recent device.
Source Device Category The category for the device that Device-ID idenfies as the source
(src_category) of the traffic.
Source Device Profile The device profile for the device that Device-ID idenfies as the
(src_profile) source of the traffic.
Source Device Model The model of the device that Device-ID idenfies as the source of
(src_model) the traffic.
Source Device Vendor The vendor of the device that Device-ID idenfies as the source of
(src_vendor) the traffic.
Source Device OS The operang system type for the device that Device-ID idenfies
Family (src_osfamily) as the source of the traffic.
Source Device OS The version of the operang system for the device that Device-ID
Version (src_osversion) idenfies as the source of the traffic.
Source Hostname The hostname of the device that Device-ID idenfies as the source
(src_host) of the traffic.
Source MAC Address The MAC address for the device that Device-ID idenfies as the
(src_mac) source of the traffic.
Desnaon Device The category for the device that Device-ID idenfies as the
Category (dst_category) desnaon for the traffic.
Desnaon Device The device profile for the device that Device-ID idenfies as the
Profile (dst_profile) desnaon for the traffic.
Desnaon Device The model of the device that Device-ID idenfies as the desnaon
Model (dst_model) for the traffic.
Desnaon Device The vendor of the device that Device-ID idenfies as the
Vendor (dst_vendor) desnaon for the traffic.
PAN-OS® Administrator’s Guide Version 10.1 595 ©2022 Palo Alto Networks, Inc.
Monitoring
Desnaon Device OS The operang system type for the device that Device-ID idenfies
Family (dst_osfamily) as the desnaon for the traffic.
Desnaon Device OS The version of the operang system for the device that Device-ID
Version (dst_osversion) idenfies as the desnaon for the traffic.
Desnaon Hostname The hostname of the device that Device-ID idenfies as the
(dst_host) desnaon for the traffic.
Desnaon MAC The MAC address for the device that Device-ID idenfies as the
Address (dst_mac) desnaon for the traffic.
Source External The name of the external dynamic list that contains the source IP
Dynamic List (src_edl) address of the traffic.
Desnaon External The name of the external dynamic list that contains the desnaon
Dynamic List (dst_edl) IP address of the traffic.
Domain EDL The name of the external dynamic list that contains the domain
(domain_edl) name of the traffic.
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
mestamp)
• YYYY—Four digit year
PAN-OS® Administrator’s Guide Version 10.1 596 ©2022 Palo Alto Networks, Inc.
Monitoring
A Slice Service Type The A Slice Service Type of the Network Slice ID.
(nssai_sst)
PAN-OS® Administrator’s Guide Version 10.1 597 ©2022 Palo Alto Networks, Inc.
Monitoring
Applicaon Risk Risk level associated with the applicaon (1=lowest to 5=highest).
(risk_of_app)
Receive Time Time the log was received at the management plane.
(receive_me or
cef-formaed-
receive_me)
Serial Number Serial number of the firewall that generated the log.
(serial)
PAN-OS® Administrator’s Guide Version 10.1 598 ©2022 Palo Alto Networks, Inc.
Monitoring
Virtual System (vsys) Virtual System associated with the HIP match log.
Operang System The operang system installed on the user’s machine or device (or on
(os) the client system).
HIP Type Whether the hip field represents a HIP object or a HIP profile.
(matchtype)
Sequence Number A 64-bit log entry idenfier incremented sequenally; each log type has
(seqno) a unique number space.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45, and
its ancestors are 34, and 12. To view the device group names that
correspond to the value 12, 34 or 45, use one of the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
PAN-OS® Administrator’s Guide Version 10.1 599 ©2022 Palo Alto Networks, Inc.
Monitoring
Virtual System The name of the virtual system associated with the session; only valid
Name (vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks firewall.
(vsys_id)
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
(high_res_mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 600 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time The me that the log was received at the management plane.
(receive_me)
Serial # (serial) The serial number of the firewall that generated the log.
Generate Time The me that the log was generated on the dataplane.
(me_generated)
Virtual System (vsys) The Virtual System associated with the session.
PAN-OS® Administrator’s Guide Version 10.1 601 ©2022 Palo Alto Networks, Inc.
Monitoring
Stage (stage) A string showing the stage of the connecon (for example, before-
login, login, or tunnel).
Source User (srcuser) The username of the user who iniated the session.
Source Region The region for the user who iniated the session.
(srcregion)
Public IP (public_ip) The public IP address for the user who iniated the session.
Public IPv6 The public IPv6 address for the user who iniated the session.
(public_ipv6)
Private IP (private_ip) The private IP address for the user who iniated the session.
Private IPv6 The private IPv6 address for the user who iniated the session.
(private_ipv6)
Host ID (hosd) The unique ID that GlobalProtect assigns to idenfy the host.
Client OS (client_os) The client device’s OS type (for example, Windows or Linux).
Repeat Count The number of sessions with the same source IP address, desnaon
(repeatcnt) IP address, applicaon, and subtype that GlobalProtect has detected
within the last five seconds.
PAN-OS® Administrator’s Guide Version 10.1 602 ©2022 Palo Alto Networks, Inc.
Monitoring
Reason (reason) A string that shows the reason for the quaranne.
Error (error) A string showing that error that has occurred in any event.
Descripon (opaque) Addional informaon for any event that has occurred.
Login Duraon The length of me, in seconds, the user is connected to the
(login_duraon) GlobalProtect gateway from logging in to logging out.
Connect Method A string showing the how the GlobalProtect app connects to Gateway,
(connect_method) (for example, on-demand or user-logon.
Sequence Number A 64-bit log entry idenfier incremented sequenally; each log type
(seqno) has a unique number space.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
SSL Response Time The SSL response me of the selected gateway that is measured in
(response_me) milliseconds on the endpoint during tunnel setup.
Gateway Priority The priority order of the gateway that is based on highest (1), high (2),
(priority) medium (3), low (4), or lowest (5) to which the GlobalProtect app can
connect.
Aempted Gateways The fields that are collected for each gateway connecon aempt
(aempted_gateways) with the gateway name, SSL response me, and priority (see Gateway
PAN-OS® Administrator’s Guide Version 10.1 603 ©2022 Palo Alto Networks, Inc.
Monitoring
Gateway Name The name of the gateway that is specified on the portal configuraon.
(gateway)
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks
(vsys_id) firewall.
Receive Time The me the log was received at the management plane.
(receive_me or
PAN-OS® Administrator’s Guide Version 10.1 604 ©2022 Palo Alto Networks, Inc.
Monitoring
Serial Number (serial) The serial number of the firewall that generated the log.
Generated Time The me the log was generated on the dataplane.
(me_generated
or cef-formaed-
me_generated)
Virtual System (vsys) The virtual system associated with the HIP match log.
Repeat Count The number of sessions with the same Source IP, Desnaon IP,
(repeatcnt) Applicaon, and Subtype seen within 5 seconds.
Timeout (meout) The amount of me before the IP address-to-tag mapping expires for
the source IP address.
Data Source Name The name of the source from which mapping informaon is collected.
(datasourcename)
Data Source Type The source from which mapping informaon is collected.
(datasource_type)
Data Source Subtype The mechanism used to idenfy the IP address-to-username mappings
(datasource_subtype) within a data source.
Sequence Number A 64-bit log entry idenfier incremented sequenally. Each log type
(seqno) has a unique number space.
Acon Flags A bit field indicang whether the log was forwarded to Panorama.
(aconflags)
Device Group A sequence of idenficaon numbers that indicates the locaon of the
Hierarchy device group within a device group hierarchy. The firewall (or virtual
system) generang the log includes the idenficaon number of each
PAN-OS® Administrator’s Guide Version 10.1 605 ©2022 Palo Alto Networks, Inc.
Monitoring
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks
(vsys_id) firewall.
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 606 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time Time the log was received at the management plane.
(receive_me or cef-
formaed-receive_me)
Serial Number (serial) Serial number of the firewall that generated the log.
Threat/Content Type Subtype of User-ID log; values are login, logout, register-tag, and
(subtype) unregister-tag.
• login—User logged in.
• logout—User logged out.
• register-tag—Indicates a tag or tags were registered for the user.
• unregister-tag—Indicates a tag or tags were unregistered for the
user.
Generated Time The me the log was generated on the dataplane.
(me_generated
or cef-formaed-
me_generated)
Virtual System (vsys) Virtual System associated with the configuraon log.
Data Source Name User-ID source that sends the IP (Port)-User Mapping.
(datasourcename)
Repeat Count Number of sessions with same Source IP, Desnaon IP,
(repeatcnt) Applicaon, and Subtype seen within 5 seconds.
PAN-OS® Administrator’s Guide Version 10.1 607 ©2022 Palo Alto Networks, Inc.
Monitoring
Time Out Threshold Timeout aer which the IP/User Mappings are cleared.
(meout)
Data Source Type Mechanism used to idenfy the IP/User mappings within a data
(datasourcetype) source.
Sequence Number Serial number of the firewall that generated the log.
(seqno)
Acon Flags (aconflags) A bit field indicang if the log was forwarded to Panorama.
Device Group Hierarchy A sequence of idenficaon numbers that indicate the device
(dg_hier_level_1 to group’s locaon within a device group hierarchy. The firewall (or
dg_hier_level_4) virtual system) generang the log includes the idenficaon number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device group
names that correspond to the value 12, 34 or 45, use one of the
following methods:
API query: /api/?type=op&cmd=<show><dg-hierarchy></
dg-hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only
(vsys_name) valid on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks
(vsys_id) firewall.
Factor Type (factortype) Vendor used to authencate a user when Mul Factor
authencaon is present.
PAN-OS® Administrator’s Guide Version 10.1 608 ©2022 Palo Alto Networks, Inc.
Monitoring
Factor Number Indicates the use of primary authencaon (1) or addional factors
(factorno) (2, 3).
User Group Flags Displays whether the user group that was found during user group
(ugflags) mapping. Supported values are:
• User Group Found—Indicates whether the user could be mapped
to a group.
• Duplicate User—Indicates whether duplicate users were found in
a user group. Displays N/A if no user group is found.
User by Source Indicates the username received from the source through IP
(userbysource) address-to-username mapping.
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 609 ©2022 Palo Alto Networks, Inc.
Monitoring
Source Port, Desnaon Port, NAT Source Port, NAT Desnaon Port, Flags, IP Protocol, Acon,
Tunnel, FUTURE_USE, FUTURE_USE, Source VM UUID, Desnaon VM UUID, UUID for rule,
Stage for Client to Firewall, Stage for Firewall to Server, TLS Version, Key Exchange Algorithm,
Encrypon Algorithm, Hash Algorithm, Policy Name, Ellipc Curve, Error Index, Root Status, Chain
Status, Proxy Type, Cerficate Serial Number, Fingerprint, Cerficate Start Date, Cerficate End
Date, Cerficate Version, Cerficate Size, Common Name Length, Issuer Common Name Length,
Root Common Name Length, SNI Length, Cerficate Flags, Subject Common Name, Issuer Subject
Common Name, Root Subject Common Name, Server Name Indicaon, Error, Container ID, POD
Namespace, POD Name, Source External Dynamic List, Desnaon External Dynamic List, Source
Dynamic Address Group, Desnaon Dynamic Address Group, High Res Timestamp, Source
Device Category, Source Device Profile, Source Device Model, Source Device Vendor, Source
Device OS Family, Source Device OS Version, Source Hostname, Source Mac Address, Desnaon
Device Category, Desnaon Device Profile, Desnaon Device Model, Desnaon Device
Vendor, Desnaon Device OS Family, Desnaon Device OS Version, Desnaon Hostname,
Desnaon Mac Address, Sequence Number, Acon Flags, Device Group Hierarchy Level 1,
Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level
4, Virtual System Name, Device Name, Virtual System ID, Applicaon Subcategory, Applicaon
Category, Applicaon Technology, Applicaon Risk, Applicaon Characterisc, Applicaon
Container, Applicaon SaaS, Applicaon Sanconed State
Receive Time Time the log was received at the management plane.
(receive_me or
cef-formaed-
receive_me)
Serial Number (serial) Serial number of the firewall that generated the log.
PAN-OS® Administrator’s Guide Version 10.1 610 ©2022 Palo Alto Networks, Inc.
Monitoring
Rule (rule) Security policy rule that controls the session traffic.
Source User (srcuser) Username of the user who iniated the session.
Desnaon User Username of the user to which the session was desned.
(dstuser)
Repeat Count Number of sessions with the same Source IP, Desnaon IP,
(repeatcnt) Applicaon, and Content/Threat Type seen within 5 seconds.
Flags (flags) 32-bit field that provides details on session; this field can be decoded
by AND-ing the values with the logged value:
PAN-OS® Administrator’s Guide Version 10.1 611 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; possible values are:
• allow—session was allowed by policy
• deny—session was denied by policy
PAN-OS® Administrator’s Guide Version 10.1 612 ©2022 Palo Alto Networks, Inc.
Monitoring
Source VM UUID The source universal unique idenfier for a guest virtual machine in the
(src_uuid) VMware NSX environment.
Desnaon VM The desnaon universal unique idenfier for a guest virtual machine
UUID (dst_uuid) in the VMware NSX environment.
UUID for rule The UUID that permanently idenfies the rule.
(rule_uuid)
Stage for Client The stage of the TLS handshake from the client to the firewall, for
to Firewall example, Client Hello, Server Hello, Cerficate, Client/Server key
(hs_stage_c2f) exchange, etc.
Stage for Firewall to The stage of the TLS handshake from the firewall to the server.
Server (hs_stage_f2s)
TLS Version The version of TLS protocol used for the session.
(tls_version)
Key Exchange The key exchange algorithm used for the session.
Algorithm
(tls_keyxchg)
Encrypon Algorithm The algorithm used to encrypt the session data, such as AES-128-CBC,
(tls_enc) AES-256-GCM, etc.
Hash Algorithm The authencaon algorithm used for the session, for example, SHA,
(tls_auth) SHA256, SHA384, etc.
Policy Name The name of the Decrypon policy associated with the session.
(policy_name)
PAN-OS® Administrator’s Guide Version 10.1 613 ©2022 Palo Alto Networks, Inc.
Monitoring
Ellipc Curve The ellipc cryptography curve that the client and server negoate and
(ec_curve) use for connecons that use ECDHE cipher suites.
Error Index The type of error that occurred: Cipher, Resource, Resume, Version,
(err_index) Protocol, Cerficate, Feature, or HSM.
Root Status The status of the root cerficate, for example, trusted, untrusted, or
(root_status) uninspected.
Proxy Type The Decrypon proxy type, such as Forward for Forward Proxy,
(proxy_type) Inbound for Inbound Inspecon, No Decrypt for undecrypted traffic,
GlobalProtect, etc.
Cerficate Serial The unique idenfier of the cerficate (generated by the cerficate
Number (cert_serial) issuer).
Cerficate Start Date The me the cerficate became valid (cerficate in invalid before this
(notbefore) me).
Cerficate End Date The me the cerficate expires (cerficate becomes invalid aer this
(notaer) me).
PAN-OS® Administrator’s Guide Version 10.1 614 ©2022 Palo Alto Networks, Inc.
Monitoring
SNI Length (sni_len) The length of the Server Name Indicaon (hostname).
Subject Common The domain name (the name of the server that the cerficate protects).
Name (cn)
Issuer Common The name of the organizaon that verified the cerficate’s contents.
Name (issuer_cn)
Server Name The hostname of the server that the client is trying to contact. Using
Indicaon SNIs enables a server to host mulple websites and present mulple
cerficates on the same IP address and TCP port because each website
(sni)
has a unique SNI.
Error (error) A string showing the error that has occurred in the event.
Source External The name of the external dynamic list that contains the source IP
Dynamic List (src_edl) address of the traffic.
PAN-OS® Administrator’s Guide Version 10.1 615 ©2022 Palo Alto Networks, Inc.
Monitoring
Desnaon External The name of the external dynamic list that contains the desnaon IP
Dynamic List (dst_edl) address of the traffic.
Source Dynamic The dynamic address group that Device-ID idenfies as the source of
Address Group the traffic.
(src_dag)
Desnaon Dynamic The dynamic address group that Device-ID idenfies as the desnaon
Address Group for the traffic.
(dst_dag)
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp
The format for this field is YYYY-MM-DDThh:ss:sssTZD:
(high_res_mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
Source Device The category for the device that Device-ID idenfies as the source of
Category the traffic.
(src_category)
Source Device Profile The device profile for the device that Device-ID idenfies as the
(src_profile) source of the traffic.
Source Device Model The model of the device that Device-ID idenfies as the source of the
(src_model) traffic.
Source Device The vendor of the device that Device-ID idenfies as the source of the
Vendor (src_vendor) traffic.
PAN-OS® Administrator’s Guide Version 10.1 616 ©2022 Palo Alto Networks, Inc.
Monitoring
Source Device OS The operang system type for the device that Device-ID idenfies as
Family (src_osfamily) the source of the traffic.
Source Device The version of the operang system for the device that Device-ID
OS Version idenfies as the source of the traffic.
(src_osversion)
Source Hostname The hostname of the device that Device-ID idenfies as the source of
(src_host) the traffic.
Source MAC Address The MAC address for the device that Device-ID idenfies as the
(src_mac) source of the traffic.
Desnaon The category for the device that Device-ID idenfies as the desnaon
Device Category for the traffic.
(dst_category)
Desnaon Device The device profile for the device that Device-ID idenfies as the
Profile (dst_profile) desnaon for the traffic.
Desnaon Device The model of the device that Device-ID idenfies as the desnaon
Model (dst_model) for the traffic.
Desnaon Device The vendor of the device that Device-ID idenfies as the desnaon
Vendor (dst_vendor) for the traffic.
Desnaon The operang system type for the device that Device-ID idenfies as
Device OS Family the desnaon for the traffic.
(dst_osfamily)
Desnaon The version of the operang system for the device that Device-ID
Device OS Version idenfies as the desnaon for the traffic.
(dst_osversion)
Desnaon MAC The MAC address for the device that Device-ID idenfies as the
Address (dst_mac) desnaon for the traffic.
Sequence Number A 64-bit log entry idenfier incremented sequenally; each log type
(seqno) has unique number space.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
PAN-OS® Administrator’s Guide Version 10.1 617 ©2022 Palo Alto Networks, Inc.
Monitoring
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks
(vsys_id) firewall.
PAN-OS® Administrator’s Guide Version 10.1 618 ©2022 Palo Alto Networks, Inc.
Monitoring
Applicaon Risk Risk level associated with the applicaon (1=lowest to 5=highest).
(risk_of_app)
Receive Time Month, day, and me the log was received at the management plane.
(receive_me or
cef-formaed-
receive_me)
Serial Number (serial) Serial number of the firewall that generated the log.
PAN-OS® Administrator’s Guide Version 10.1 619 ©2022 Palo Alto Networks, Inc.
Monitoring
Threat/Content Type Subtype of traffic log; values are start, end, drop, and deny
(subtype)
• Start—session started
• End—session ended
• Drop—session dropped before the applicaon is idenfied and there
is no rule that allows the session.
• Deny—session dropped aer the applicaon is idenfied and there
is a rule to block or no rule that allows the session.
Rule Name (rule) Name of the Security policy rule in effect on the session.
PAN-OS® Administrator’s Guide Version 10.1 620 ©2022 Palo Alto Networks, Inc.
Monitoring
Log Acon (logset) Log Forwarding Profile that was applied to the session.
Repeat Count Number of sessions with same Source IP, Desnaon IP, Applicaon,
(repeatcnt) and Subtype seen within 5 seconds.
Flags (flags) 32-bit field that provides details on session; this field can be decoded
by AND-ing the values with the logged value:
• 0x80000000 —session has a packet capture (PCAP)
• 0x02000000 —IPv6 session
• 0x01000000 —SSL session was decrypted (SSL Proxy)
• 0x00800000 —session was denied via URL filtering
• 0x00400000 —session has a NAT translaon performed (NAT)
• 0x00200000 —user informaon for the session was captured
through Authencaon Portal
• 0x00080000 —X-Forwarded-For value from a proxy is in the source
user field
• 0x00040000 —log corresponds to a transacon within a hp proxy
session (Proxy Transacon)
• 0x00008000 —session is a container page access (Container Page)
• 0x00002000 —session has a temporary match on a rule for implicit
applicaon dependency handling. Available in PAN-OS 5.0.0 and
above.
• 0x00000800 —symmetric return was used to forward traffic for this
session
PAN-OS® Administrator’s Guide Version 10.1 621 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; possible values are:
• Allow—session was allowed by policy
• Deny—session was denied by policy
• Drop—session was dropped silently
• Drop ICMP—session was silently dropped with an ICMP
unreachable message to the host or applicaon
• Reset both—session was terminated and a TCP reset is sent to both
the sides of the connecon
• Reset client—session was terminated and a TCP reset is sent to the
client
• Reset server—session was terminated and a TCP reset is sent to the
server
Severity (severity) Severity associated with the event; values are informaonal, low,
medium, high, crical.
Sequence Number A 64-bit log entry idenfier incremented sequenally; each log type
(seqno) has a unique number space. This field is not supported on PA-7000
Series firewalls.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
Source Locaon Source country or Internal region for private addresses; maximum
(srcloc) length is 32 bytes.
Desnaon Locaon Desnaon country or Internal region for private addresses. Maximum
(dstloc) length is 32 bytes.
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
PAN-OS® Administrator’s Guide Version 10.1 622 ©2022 Palo Alto Networks, Inc.
Monitoring
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Tunnel ID (tunnelid) ID of the tunnel being inspected or the Internaonal Mobile Subscriber
Identy (IMSI) ID of the mobile user.
Monitor Tag Monitor name you configured for the Tunnel Inspecon policy rule or
(monitortag) the Internaonal Mobile Equipment Identy (IMEI) ID of the mobile
device.
Parent Session ID ID of the session in which this session is tunneled. Applies to inner
(parent_session_id) tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Parent Start Time Year/month/day hours:minutes:seconds that the parent tunnel session
(parent_start_me) began.
Packets (packets) Number of total packets (transmit and receive) for the session.
Maximum Number of packets the firewall dropped because the packet exceeded
Encapsulaon the maximum number of encapsulaon levels configured in the Tunnel
(max_encap) Inspecon policy rule (Drop packet if over maximum tunnel inspecon
level).
Unknown Protocol Number of packets the firewall dropped because the packet contains
(unknown_proto) an unknown protocol, as enabled in the Tunnel Inspecon policy rule
(Drop packet if unknown protocol inside tunnel).
PAN-OS® Administrator’s Guide Version 10.1 623 ©2022 Palo Alto Networks, Inc.
Monitoring
Strict Checking Number of packets the firewall dropped because the tunnel protocol
(strict_check) header in the packet failed to comply with the RFC for the tunnel
protocol, as enabled in the Tunnel Inspecon policy rule (Drop packet
if tunnel protocol fails strict header check).
Session End Reason The reason a session terminated. If the terminaon had mulple
(session_end_reason) causes, this field displays only the highest priority reason. The possible
session end reason values are as follows, in order of priority (where the
first is highest):
• threat—The firewall detected a threat associated with a reset, drop,
or block (IP address) acon.
• policy-deny—The session matched a security rule with a deny or
drop acon.
• decrypt-cert-validaon—The session terminated because you
configured the firewall to block SSL forward proxy decrypon or
SSL inbound inspecon when the session uses client authencaon
or when the session uses a server cerficate with any of the
following condions: expired, untrusted issuer, unknown status, or
status verificaon me-out. This session end reason also displays
when the server cerficate produces a fatal error alert of type
bad_cerficate, unsupported_cerficate, cerficate_revoked,
access_denied, or no_cerficate_RESERVED (SSLv3 only).
• decrypt-unsupport-param—The session terminated because you
configured the firewall to block SSL forward proxy decrypon or
SSL inbound inspecon when the session uses an unsupported
protocol version, cipher, or SSH algorithm. This session end
reason is displays when the session produces a fatal error
alert of type unsupported_extension, unexpected_message, or
handshake_failure.
• decrypt-error—The session terminated because you configured
the firewall to block SSL forward proxy decrypon or SSL inbound
inspecon when firewall resources or the hardware security module
(HSM) were unavailable. This session end reason is also displayed
when you configured the firewall to block SSL traffic that has SSH
errors or that produced any fatal error alert other than those listed
PAN-OS® Administrator’s Guide Version 10.1 624 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon Source Specifies whether the acon taken to allow or block an applicaon was
(acon_source) defined in the applicaon or in policy. The acons can be allow, deny,
drop, reset- server, reset-client or reset-both for the session.
Tunnel Name of the tunnel inspecon rule matching the cleartext tunnel
Inspecon Rule traffic.
(tunnel_insp_rule)
PAN-OS® Administrator’s Guide Version 10.1 625 ©2022 Palo Alto Networks, Inc.
Monitoring
Remote User ID IMSI identy of a remote user, and if available, one IMEI identy or
(remote_user_id) one MSISDN identy.
Security Rule UUID The UUID that permanently idenfies the rule.
(rule_uuid)
PCAP ID (pcap_id) Unique packet capture ID that defines the locaon of the pcap file on
the firewall.
Dynamic User The name of the dynamic user group that contains the user who
Group Name iniated the session.
(dynusergroup_name)
Source External The name of the external dynamic list that contains the source IP
Dynamic List (src_edl) address of the traffic.
Desnaon External The name of the external dynamic list that contains the desnaon IP
Dynamic List (dst_edl) address of the traffic.
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 626 ©2022 Palo Alto Networks, Inc.
Monitoring
A Slice Service Type The A Slice Service Type of the Network Slice ID.
(nssai_sd)
Applicaon Risk Risk level associated with the applicaon (1=lowest to 5=highest).
(risk_of_app)
PAN-OS® Administrator’s Guide Version 10.1 627 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time (receive_me Time the log was received at the management plane.
or cef-formaed-
receive_me)
Serial Number (serial) Serial number of the firewall that generated the log.
Rule Name (rule) Name of the Security policy rule in effect on the session.
PAN-OS® Administrator’s Guide Version 10.1 628 ©2022 Palo Alto Networks, Inc.
Monitoring
Log Acon (logset) Log Forwarding Profile that was applied to the session.
Repeat Count (repeatcnt) Number of sessions with same Source IP, Desnaon IP,
Applicaon, and Subtype seen within 5 seconds.
Acon (acon) Acon taken for the session; possible values are:
• allow—session was allowed by the policy
• deny—session was denied by the policy
Device Group Hierarchy A sequence of idenficaon numbers that indicate the device
(dg_hier_level_1 to group’s locaon within a device group hierarchy. The firewall
dg_hier_level_4) (or virtual system) generang the log includes the idenficaon
number of each ancestor in its device group hierarchy. The
shared device group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to
device group 45, and its ancestors are 34, and 12. To view the
device group names that correspond to the value 12, 34 or 45,
use one of the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session;
(vsys_name) only valid on firewalls enabled for mulple virtual systems.
Device Name (device_name) The hostname of the firewall on which the session was logged.
Sequence Number (seqno) A 64-bit log entry idenfier incremented sequenally; each log
type has a unique number space.
PAN-OS® Administrator’s Guide Version 10.1 629 ©2022 Palo Alto Networks, Inc.
Monitoring
Payload Protocol ID (ppid) Idenfies the Payload Protocol ID (PPID) in the data chunk
which triggered this event. PPID is assigned by Internet
Assigned Numbers Authority (IANA).
Severity (severity) Severity associated with the event; values are informaonal,
low, medium, high, crical.
SCTP Chunk Type Describes the type of informaon contained in a chunk, such
(sctp_chunk_type) as control or data.
SCTP Event Type Defines the event triggered per SCTP chunk or packet when
(sctp_event_type) SCTP protecon profile is applied to the SCTP traffic. It is also
triggered by start or end of a SCTP associaon.
SCTP Verificaon Tag 1 Used by endpoint1 which iniates the associaon to verify if
(verif_tag_1) the SCTP packet received belongs to current SCTP associaon
and validate the endpoint2.
SCTP Verificaon Tag 2 Used by endpoint2 to verify if the SCTP packet received
(verif_tag_2) belongs to current SCTP associaon and validate the
endpoint1.
SCTP Cause Code Sent by an endpoint to specify reason for an error condion to
(sctp_cause_code) other endpoint of same SCTP associaon.
Diameter App ID The diameter applicaon in the data chunk which triggered
(diam_app_id) the event. Diameter Applicaon ID is assigned by Internet
Assigned Numbers Authority (IANA).
Diameter Command Code The diameter command code in the data chunk which triggered
(diam_cmd_code) the event. Diameter Command Code is assigned by Internet
Assigned Numbers Authority (IANA)
Diameter AVP Code The diameter AVP code in the data chunk which triggered the
(diam_avp_code) event.
SCTP Stream ID (stream_id) ID of the stream which carries the data chunk which triggered
the event.
SCTP Associaon End Reason an associaon was terminated. If the terminaon had
Reason (assoc_end_reason) mulple causes, the highest priority reason is displayed. The
possible session end reasons in descending priority are:
• shutdown-from-endpoint (highest)—endpoint sends out
SHUTDOWN
• abort-from-endpoint—endpoint sends out ABORT
PAN-OS® Administrator’s Guide Version 10.1 630 ©2022 Palo Alto Networks, Inc.
Monitoring
SCCP Calling Party SSN The Signaling Connecon Control Part (SCCP) calling party
(sccp_calling_ssn) subsystem number (SSN) in the data chunk which triggered the
event.
SCCP Calling Party Global The Signaling Connecon Control Part (SCCP) calling party
Title (sccp_calling_gt) global tle (GT) in the data chunk which triggered the event.
SCTP Filter (sctp_filter) Name of the filter that the SCTP chunk matched.
SCTP Chunks (chunks) Number of total chunks (transmit and receive) for the
associaon.
Packets (packets) Number of total packets (transmit and receive) for the session.
UUID for rule (rule_uuid) The UUID that permanently idenfies the rule.
High Resoluon Timestamp Time in milliseconds the log was received at the management
(high_res_mestamp) plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
PAN-OS® Administrator’s Guide Version 10.1 631 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time Time the log was received at the management plane.
(receive_me or
cef-formaed-
receive_me)
Serial Number (serial) Serial number of the device that generated the log.
Threat/Content Type Subtype of the system log; refers to the system daemon generang the
(subtype) log; values are crypto, dhcp, dnsproxy, dos, general, global-protect, ha,
hw, nat, ntpd, pbf, port, pppoe, ras, roung, satd, sslmgr, sslvpn, userid,
url-filtering, vpn.
PAN-OS® Administrator’s Guide Version 10.1 632 ©2022 Palo Alto Networks, Inc.
Monitoring
Object (object) Name of the object associated with the system event.
Authencaon Policy Policy invoked for authencaon before allowing access to a protected
(authpolicy) resource.
Repeat Count Number of sessions with same Source IP, Desnaon IP, Applicaon,
(repeatcnt) and Subtype seen within 5 seconds.
Log Acon (logset) Log Forwarding Profile that was applied to the session.
Factor Number Indicates the use of primary authencaon (1) or addional factors (2,
(factorno) 3).
Sequence Number A 64-bit log entry idenfier incremented sequenally. Each log type
(seqno) has a unique number space.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
generang the log includes the idenficaon number of each ancestor
PAN-OS® Administrator’s Guide Version 10.1 633 ©2022 Palo Alto Networks, Inc.
Monitoring
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks
(vsys_id) firewall.
Authencaon Indicates the authencaon protocol used by the server. For example,
Protocol (authproto) PEAP with GTC.
UUID for rule The UUID that permanently idenfies the rule.
(rule_uuid)
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp (high_res
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
_mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 634 ©2022 Palo Alto Networks, Inc.
Monitoring
Source Device The category for the device that Device-ID idenfies as the source of
Category the traffic.
(src_category)
Source Device Profile The device profile for the device that Device-ID idenfies as the
(src_profile) source of the traffic.
Source Device Model The model of the device that Device-ID idenfies as the source of the
(src_model) traffic.
Source Device The vendor of the device that Device-ID idenfies as the source of the
Vendor (src_vendor) traffic.
Source Device OS The operang system type for the device that Device-ID idenfies as
Family (src_osfamily) the source of the traffic.
Source Device The version of the operang system for the device that Device-ID
OS Version idenfies as the source of the traffic.
(src_osversion)
Source Hostname The hostname of the device that Device-ID idenfies as the source of
(src_host) the traffic.
Source MAC Address The MAC address for the device that Device-ID idenfies as the
(src_mac) source of the traffic.
User Agent The string from the HTTP request header User-Agent.
(user_agent)
PAN-OS® Administrator’s Guide Version 10.1 635 ©2022 Palo Alto Networks, Inc.
Monitoring
Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4,
Virtual System Name, Device Name, Device Group, Audit Comment
Receive Time Time the log was received at the management plane.
(receive_me or
cef-formaed-
receive_me)
Serial Number Serial number of the device that generated the log.
(serial)
Virtual System (vsys) Virtual System associated with the configuraon log
Command (cmd) Command performed by the Admin; values are add, clone, commit,
delete, edit, move, rename, set.
Client (client) Client used by the Administrator; values are Web and CLI
Result (result) Result of the configuraon acon; values are Submied, Succeeded,
Failed, and Unauthorized
Configuraon Path The path of the configuraon command issued; up to 512 bytes in
(path) length
Before Change This field is in custom logs only; it is not in the default format.
Detail (before-
It contains the full xpath before the configuraon change.
change-detail)
Aer Change Detail This field is in custom logs only; it is not in the default format.
(aer-change-detail)
It contains the full xpath aer the configuraon change.
PAN-OS® Administrator’s Guide Version 10.1 636 ©2022 Palo Alto Networks, Inc.
Monitoring
Sequence Number A 64bit log entry idenfier incremented sequenally; each log type has
(seqno) a unique number space.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45, and
its ancestors are 34, and 12. To view the device group names that
correspond to the value 12, 34 or 45, use one of the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System The name of the virtual system associated with the session; only valid
Name (vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Device Group (dg_id) The device group the firewall belongs to if managed by a Panorama™
management server.
Audit Comment The audit comment entered in a policy rule configuraon change.
(comment)
Receive Time Time the log was received at the management plane.
(receive_me or
PAN-OS® Administrator’s Guide Version 10.1 637 ©2022 Palo Alto Networks, Inc.
Monitoring
Serial Number (serial) Serial number of the firewall that generated the log.
Content/Threat Type Subtype of the system log; refers to the system daemon generang the
(subtype) log; values are crypto, dhcp, dnsproxy, dos, general, global-protect, ha,
hw, nat, ntpd, pbf, port, pppoe, ras, roung, satd, sslmgr, sslvpn, userid,
url-filtering, vpn.
Virtual System (vsys) Virtual System associated with the configuraon log.
Object (object) Name of the object associated with the system event.
Module (module) This field is valid only when the value of the Subtype field is general. It
provides addional informaon about the sub-system generang the
log; values are general, management, auth, ha, upgrade, chassis.
Severity (severity) Severity associated with the event; values are informaonal, low,
medium, high, crical.
Sequence Number A 64-bit log entry idenfier incremented sequenally; each log type
(seqno) has a unique number space.
Acon Flags A bit field indicang if the log was forwarded to Panorama.
(aconflags)
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
PAN-OS® Administrator’s Guide Version 10.1 638 ©2022 Palo Alto Networks, Inc.
Monitoring
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
High Resoluon Time in milliseconds the log was received at the management plane.
Timestamp
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
(high_res_mestamp)
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the mestamp
• hh—Two-digit hour using 24-hour me (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.1 639 ©2022 Palo Alto Networks, Inc.
Monitoring
Receive Time Time the log was received at the management plane.
(receive_me or
cef-formaed-
receive_me)
Serial Number (serial) Serial number of the device that generated the log.
Content/Threat Type Subtype of the system log; refers to the system daemon generang the
(subtype) log; values are crypto, dhcp, dnsproxy, dos, general, global-protect, ha,
hw, nat, ntpd, pbf, port, pppoe, ras, roung, satd, sslmgr, sslvpn, userid,
url-filtering, vpn.
Source Address (src) IP address of the user who iniated the event.
Source User (srcuser) Username of the user who iniated the event.
Virtual System (vsys) Virtual System associated with the configuraon log.
Category (category) A summary of the kind of threat or harm posed to the network, user, or
host.
Severity (severity) Severity associated with the event; values are informaonal, low,
medium, high, crical.
Device Group A sequence of idenficaon numbers that indicate the device group’s
Hierarchy locaon within a device group hierarchy. The firewall (or virtual system)
(dg_hier_level_1 to generang the log includes the idenficaon number of each ancestor
dg_hier_level_4) in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-
hierarchy></show>
PAN-OS® Administrator’s Guide Version 10.1 640 ©2022 Palo Alto Networks, Inc.
Monitoring
Virtual System Name The name of the virtual system associated with the session; only valid
(vsys_name) on firewalls enabled for mulple virtual systems.
Device Name The hostname of the firewall on which the session was logged.
(device_name)
Virtual System ID A unique idenfier for a virtual system on a Palo Alto Networks
(vsys_id) firewall.
Object Name Name of the correlaon object that was matched on.
(objectname)
Object ID (object_id) Name of the object associated with the system event.
Evidence (evidence) A summary statement that indicates how many mes the host has
matched against the condions defined in the correlaon object. For
example, Host visited known malware URl (19 mes).
Receive Time (receive_me Month, Day and me the log was received at the management
or cef-formaed- plane.
receive_me)
Serial Number (serial) Serial number of the firewall that generated the log.
PAN-OS® Administrator’s Guide Version 10.1 641 ©2022 Palo Alto Networks, Inc.
Monitoring
Threat/Content Type Subtype of traffic log; values are start, end, drop, and deny
(subtype)
• Start—session started
• End—session ended
• Drop—session dropped before the applicaon is idenfied
and there is no rule that allows the session.
• Deny—session dropped aer the applicaon is idenfied
and there is a rule to block or no rule that allows the
session.
Rule Name (rule) Name of the Security policy rule in effect on the session.
Log Acon (logset) Log Forwarding Profile that was applied to the session.
PAN-OS® Administrator’s Guide Version 10.1 642 ©2022 Palo Alto Networks, Inc.
Monitoring
Acon (acon) Acon taken for the session; possible values are:
• allow—session was allowed by policy
• deny—session was denied by policy
GTP Event Type (event_type) Defines event triggered by a GTP message when checks in
GTP protecon profile are applied to the GTP traffic. Also
triggered by the start or end of a GTP session.
Access Point Name (apn) Reference to a Packet Data Network Data Gateway (PGW)/
Gateway GPRS Support Node in a mobile network. Composed
of a mandatory APN Network Idenfier and an oponal APN
Operator Idenfier.
Radio Access Technology (rat) Type of technology used for radio access. For example,
EUTRAN, WLAN, Virtual, HSPA Evoluon, GAN and GERAN.
Tunnel Endpoint Idenfier1 Idenfies the GTP tunnel in the network node. TEID1 is the
(teid1) first TEID in the GTP message.
Tunnel Endpoint Idenfier2 Idenfies the GTP tunnel in the network node. TEID2 is the
(teid2) second TEID in the GTP message.
GTP Interface (gtp_interface) 3GPP interface from which a GTP message is received.
GTP Cause (cause_code) GTP cause value in logs responses which contain an
Informaon Element that provides informaon about
acceptance or rejecon of GTP requests by a network node.
Severity (severity) Severity associated with the event; values are informaonal,
low, medium, high, crical.
Serving Network MCC (mcc) Mobile country code of serving core network operator.
Serving Network MNC (mnc) Mobile network code of serving core network operator.
PAN-OS® Administrator’s Guide Version 10.1 643 ©2022 Palo Alto Networks, Inc.
Monitoring
Area Code (area_code) Area within a Public Land Mobile Network (PLMN).
GTP Event Code (event_code) Event code describing the GTP event.
Source Locaon (srcloc) Source country or Internal region for private addresses;
maximum length is 32 bytes.
Desnaon Locaon (dstloc) Desnaon country or Internal region for private addresses;
maximum length is 32 bytes.
Tunnel Inspecon Rule Name of the tunnel inspecon rule matching the cleartext
tunnel traffic
(tunnel_insp_rule)
Remote User ID IMSI identy of a remote user, and if available, one IMEI
(remote_user_id) identy and/or one MSISDN identy.
PCAP ID (pcap_id) Unique packet capture ID that is used to locate the pcap file
saved on the firewall.
High Resoluon Timestamp Time in milliseconds the log was received at the management
(high_res_mestamp) plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
PAN-OS® Administrator’s Guide Version 10.1 644 ©2022 Palo Alto Networks, Inc.
Monitoring
A Slice Service Type The A Slice Service Type of the Network Slice ID.
(nsdsai_sst)
PAN-OS® Administrator’s Guide Version 10.1 645 ©2022 Palo Alto Networks, Inc.
Monitoring
Applicaon Risk (risk_of_app) Risk level associated with the applicaon (1=lowest to
5=highest).
Syslog Severity
The syslog severity is set based on the log type and contents.
Traffic Info
Config Info
Threat/System— Info
Informaonal
Threat/System—Low Noce
Threat/System—Medium Warning
Threat/System—High Warning
Threat/System—Crical Crical
PAN-OS® Administrator’s Guide Version 10.1 646 ©2022 Palo Alto Networks, Inc.
Monitoring
To achieve ArcSight Common Event Format (CEF) compliant log formang, refer to the CEF
Configuraon Guide.
Escape Sequences
Any field that contains a comma or a double-quote is enclosed in double quotes. Furthermore, if
a double-quote appears inside a field it is escaped by preceding it with another double-quote. To
maintain backward compability, the Misc field in threat log is always enclosed in double-quotes.
PAN-OS® Administrator’s Guide Version 10.1 647 ©2022 Palo Alto Networks, Inc.
Monitoring
SNMP Support
You can use an SNMP manager to monitor event-driven alerts and operaonal stascs for the
firewall, Panorama, or WF-500 appliance and for the traffic they process. The stascs and traps
can help you idenfy resource limitaons, system changes or failures, and malware aacks. You
configure alerts by forwarding log data as traps, and enable the delivery of stascs in response to
GET messages (requests) from your SNMP manager. Each trap and stasc has an object idenfier
(OID). Related OIDs are organized hierarchically within the Management Informaon Bases (MIBs)
that you load into the SNMP manager to enable monitoring.
When an event triggers SNMP trap generaon (for example, an interface goes down), the
firewall, Panorama virtual appliance, M-Series appliance, and WF-500 appliance respond
by updang the corresponding SNMP object (for example, the interfaces MIB) instead of
waing for the periodic update of all objects that occurs every ten seconds. This ensures
that your SNMP manager displays the latest informaon when polling an object to confirm
an event.
The firewall, Panorama, and WF-500 appliance support SNMP Version 2c and Version 3. Decide
which to use based on the version that other devices in your network support and on your
network security requirements. SNMPv3 is more secure and enables more granular access control
for system stascs than SNMPv2c. The following table summarizes the security features of each
version. You select the version and configure the security features when you Monitor Stascs
Using SNMP and Forward Traps to an SNMP Manager.
SNMPVersion
Authencaon Message Privacy MessageIntegrity
MIB Access Granularity
SNMPv3 EngineID, username, Privacy Yes User access based on views that
and authencaon password for include or exclude specific OIDs
password (SHA AES (128,
hashing for the 192, or 256)
password) encrypon
PAN-OS® Administrator’s Guide Version 10.1 648 ©2022 Palo Alto Networks, Inc.
Monitoring
SNMPVersion
Authencaon Message Privacy MessageIntegrity
MIB Access Granularity
of SNMP
messages
PAN-OS® Administrator’s Guide Version 10.1 649 ©2022 Palo Alto Networks, Inc.
Monitoring
• Walk a MIB
• Idenfy the OID for a System Stasc or Trap
STEP 1 | Load all the Supported MIBs into your SNMP manager.
STEP 2 | Search the enre MIB tree for the known OID. The search result displays the MIB path for
the OID, as well as informaon about the OID (for example, name, status, and descripon).
You can then select other OIDs in the same MIB to see informaon about them.
Walk a MIB
If you want to see which SNMP objects (system stascs and traps) are available for monitoring,
displaying all the objects of a parcular MIB can be useful. To do this, load the Supported
MIBs into your SNMP manager and perform a walk on the desired MIB. To list the traps
that Palo Alto Networks firewalls, Panorama, and WF-500 appliance support, walk the
panCommonEventEventsV2 MIB. In the following example, walking the PAN-COMMON-MIB.my
displays the following list of OIDs and their values for certain stascs:
PAN-OS® Administrator’s Guide Version 10.1 650 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Open the MIB in a text editor and perform a keyword search. For example, using Hardware
version as a search string in PAN-COMMON-MIB idenfies the panSysHwVersion object:
panSysHwVersion OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..128))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Hardware version of the unit."
::= {panSys 2}
PAN-OS® Administrator’s Guide Version 10.1 651 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 3 | In a MIB browser, search the MIB tree for the idenfied object name to display its OID. For
example, the panSysHwVersion object has an OID of 1.3.6.1.4.1.25461.2.1.2.1.2.
You don’t need a security rule to enable SNMP monitoring of Palo Alto Networks firewalls,
Panorama, or WF-500 appliances. For details, see Monitor Stascs Using SNMP.
PAN-OS® Administrator’s Guide Version 10.1 652 ©2022 Palo Alto Networks, Inc.
Monitoring
idenfy resource limitaons, and monitor traffic or processing loads. The stascs include
informaon such as interface states (up or down), acve user sessions, concurrent sessions,
session ulizaon, temperature, and system upme.
You can’t configure an SNMP manager to control Palo Alto Networks firewalls (using SET
messages), only to collect stascs from them (using GET messages). For details on how
SNMP is implemented for Palo Alto Networks firewalls, see SNMP Support.
The SNMP manager can use the same or different connecon and authencaon
sengs for mulple firewalls. The sengs must match those you define when you
configure SNMP on the firewall (see Step 3). For example, if you use SNMPv2c, the
community string you define when configuring the firewall must match the community
string you define in the SNMP manager for that firewall.
3. Determine the object idenfiers (OIDs) of the stascs you want to monitor. For
example, to monitor the session ulizaon percentage of a firewall, a MIB browser shows
that this stasc corresponds to OID 1.3.6.1.4.1.25461.2.1.2.3.1.0 in PAN-COMMON-
MIB.my. For details, see Use an SNMP Manager to Explore MIBs and Objects.
4. Configure the SNMP manager to monitor the desired OIDs.
PAN-OS® Administrator’s Guide Version 10.1 653 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 3 | Configure the firewall to respond to stascs requests from an SNMP manager.
PAN-OS doesn’t synchronize SNMP response sengs for firewalls in a high availability
(HA) configuraon. You must configure these sengs for each HA peer.
1. Select Device > Setup > Operaons and, in the Miscellaneous secon, click SNMP
Setup.
2. Select the SNMP Version and configure the authencaon values as follows. For version
details, see SNMP Support.
• V2c—Enter the SNMP Community String, which idenfies a community of SNMP
managers and monitored devices, and serves as a password to authencate the
community members to each other.
As a best pracce, don’t use the default community string public; it’s well
known and therefore not secure.
• V3—Create at least one SNMP view group and one user. User accounts and views
provide authencaon, privacy, and access control when firewalls forward traps and
SNMP managers get firewall stascs.
• Views—Each view is a paired OID and bitwise mask: the OID specifies a MIB and
the mask (in hexadecimal format) specifies which objects are accessible within
(include matching) or outside (exclude matching) that MIB. Click Add in the first list
and enter a Name for the group of views. For each view in the group, click Add and
configure the view Name, OID, matching Opon (include or exclude), and Mask.
• Users—Click Add in the second list, enter a username under Users, select the View
group from the drop-down, enter the authencaon password (Auth Password)
used to authencate to the SNMP manager, and enter the privacy password (Priv
Password) used to encrypt SNMP messages to the SNMP manager.
3. Click OK and Commit.
When monitoring stascs related to firewall interfaces, you must match the interface
indexes in the SNMP manager with interface names in the firewall web interface.
For details, see Firewall Interface Idenfiers in SNMP Managers and NetFlow
Collectors.
To see the list of traps that Palo Alto Networks firewalls support, use your SNMP Manager
to access the panCommonEventEventsV2 MIB. For details, see Use an SNMP Manager to
Explore MIBs and Objects.
For details on how for Palo Alto Networks firewalls implement SNMP, see SNMP Support.
PAN-OS® Administrator’s Guide Version 10.1 654 ©2022 Palo Alto Networks, Inc.
Monitoring
Oponally, configure separate SNMP Trap server profiles for different log types,
severity levels, and WildFire verdicts.
As a best pracce, don’t use the default community string public; it’s well
known and therefore not secure.
• V3—For each server, click Add and enter the server Name, IP address (SNMP
Manager), SNMP User account (this must match a username defined in the SNMP
manager), EngineID used to uniquely idenfy the firewall (you can leave the field
blank to use the firewall serial number), authencaon password (Auth Password)
used to authencate to the server, and privacy password (Priv Password) used to
encrypt SNMP messages to the server.
6. Click OK to save the server profile.
PAN-OS® Administrator’s Guide Version 10.1 655 ©2022 Palo Alto Networks, Inc.
Monitoring
When monitoring traps related to firewall interfaces, you must match the interface
indexes in the SNMP manager with interface names in the firewall web interface.
For details, see Firewall Interface Idenfiers in SNMP Managers and NetFlow
Collectors.
Supported MIBs
The following table lists the Simple Network Management Protocol (SNMP) management
informaon bases (MIBs) that Palo Alto Networks firewalls, Panorama, and WF-500 appliances
support. You must load these MIBs into your SNMP manager to monitor the objects (system
stascs and traps) that are defined in the MIBs. For details, see Use an SNMP Manager to
Explore MIBs and Objects.
PAN-OS® Administrator’s Guide Version 10.1 656 ©2022 Palo Alto Networks, Inc.
Monitoring
MIB-II
MIB-II provides object idenfiers (OIDs) for network management protocols in TCP/IP-based
networks. Use this MIB to monitor general informaon about systems and interfaces. For example,
you can analyze trends in bandwidth usage by interface type (ifType object) to determine if the
firewall needs more interfaces of that type to accommodate spikes in traffic volume.
Palo Alto Networks firewalls, Panorama, and WF-500 appliances support only the following object
groups:
interfaces Provides stascs for physical and logical interfaces such as type,
current bandwidth (speed), operaonal status (for example, up or
down), and discarded packets. Logical interface support includes VPN
tunnels, aggregate groups, Layer 2 subinterfaces, Layer 3 subinterfaces,
loopback interfaces, and VLAN interfaces.
IF-MIB
IF-MIB supports interface types (physical and logical) and larger counters (64K) beyond those
defined in MIB-II. Use this MIB to monitor interface stascs in addion to those that MIB-
II provides. For example, to monitor the current bandwidth of high-speed interfaces (greater
than 2.2Gps) such as the 10G interfaces of the PA-5200 Series firewalls, you must check the
ifHighSpeed object in IF-MIB instead of the ifSpeed object in MIB-II. IF-MIB stascs can be
useful when evaluang the capacity of your network.
Palo Alto Networks firewalls, Panorama, and WF-500 appliances support only the ifXTable in IF-
MIB, which provides interface informaon such as the number of mulcast and broadcast packets
transmied and received, whether an interface is in promiscuous mode, and whether an interface
has a physical connector.
RFC 2863 defines this MIB.
HOST-RESOURCES-MIB
HOST-RESOURCES-MIB provides informaon for host computer resources. Use this MIB
to monitor CPU and memory usage stascs. For example, checking the current CPU load
(hrProcessorLoad object) can help you troubleshoot performance issues on the firewall.
PAN-OS® Administrator’s Guide Version 10.1 657 ©2022 Palo Alto Networks, Inc.
Monitoring
Palo Alto Networks firewalls, Panorama, and WF-500 appliances support porons of the following
object groups:
hrDevice Provides informaon such as CPU load, storage capacity, and paron
size. The hrProcessorLoad OIDs provide an average of the cores that
process packets.
For the PA-7000 and PA-5200 Series firewalls, which have mulple
dataplanes (DPs), you can monitor individual dataplane processor
ulizaon. Set alerts when ulizaon reaches a specific threshold for
each DP processor to avoid service availability issues.
ENTITY-MIB
ENTITY-MIB provides OIDs for mulple logical and physical components. Use this MIB to
determine what physical components are loaded on a system (for example, fans and temperature
sensors) and see related informaon such as models and serial numbers. You can also use the
index numbers for these components to determine their operaonal status in the ENTITY-
SENSOR-MIB and ENTITY-STATE-MIB.
Palo Alto Networks firewalls, Panorama, and WF-500 appliances support only porons of the
entPhysicalTable group:
Object Descripon
entPhysicalIndex A single namespace that includes disk slots and disk drives.
entPhysicalClass Chassis (3), container (5) for a slot, power supply (6), fan (7), sensor (8)
for each temperature or other environmental, and module (9) for each
line card.
PAN-OS® Administrator’s Guide Version 10.1 658 ©2022 Palo Alto Networks, Inc.
Monitoring
Object Descripon
entPhysicalParentRelPos
The relave posion of this child component among its sibling
components. Sibling components are defined as entPhysicalEntry
components that share the same instance values of each of the
entPhysicalContainedIn and entPhysicalClass objects.
entPhysicalName Supported only if the management (MGT) interface allows for naming
the line card.
entPhysicalHardwareRev
The vendor-specific hardware revision of the component.
entPhysicalAlias An alias that the network manager specified for the component.
ENTITY-SENSOR-MIB
ENTITY-SENSOR-MIB adds support for physical sensors of networking equipment beyond what
ENTITY-MIB defines. Use this MIB in tandem with the ENTITY-MIB to monitor the operaonal
status of the physical components of a system (for example, fans and temperature sensors). For
example, to troubleshoot issues that might result from environmental condions, you can map
the enty indexes from the ENTITY-MIB (entPhysicalDescr object) to operaonal status values
(entPhysSensorOperStatus object) in the ENTITY-SENSOR-MIB. In the following example, all the
fans and temperature sensors for a PA-3020 firewall are working:
PAN-OS® Administrator’s Guide Version 10.1 659 ©2022 Palo Alto Networks, Inc.
Monitoring
The same OID might refer to different sensors on different plaorms. Use the ENTITY-MIB
for the targeted plaorm to match the value to the descripon.
Palo Alto Networks firewalls, Panorama, and WF-500 appliances support only porons of the
entPhySensorTable group. The supported porons vary by plaorm and include only thermal
(temperature in Celsius) and fan (in RPM) sensors.
RFC 3433 defines the ENTITY-SENSOR-MIB.
ENTITY-STATE-MIB
ENTITY-STATE-MIB provides informaon about the state of physical components beyond what
ENTITY-MIB defines, including the administrave and operaonal state of components in chassis-
based plaorms. Use this MIB in tandem with the ENTITY-MIB to monitor the operaonal state
of the components of a PA-7000 Series or PA-5450 firewall (for example, line cards, fan trays,
and power supplies). For example, to troubleshoot log forwarding issues for Threat logs, you can
map the log processing card (LPC) indexes from the ENTITY-MIB (entPhysicalDescr object) to
operaonal state values (entStateOper object) in the ENTITY-STATE-MIB. The operaonal state
values use numbers to indicate state: 1 for unknown, 2 for disabled, 3 for enabled, and 4 for
tesng. The PA-7000 Series and PA-5450 firewalls are the only Palo Alto Networks firewalls that
support this MIB.
RFC 4268 defines the ENTITY-STATE-MIB.
The dot3adTablesLastChanged object indicates the me of the most recent change to
dot3adAggTable, dot3adAggPortListTable, and dot3adAggPortTable.
Table Descripon
Aggregator This table contains informaon about every aggregate group that is
Configuraon Table associated with a firewall. Each aggregate group has one entry.
(dot3adAggTable)
PAN-OS® Administrator’s Guide Version 10.1 660 ©2022 Palo Alto Networks, Inc.
Monitoring
Table Descripon
Some table objects have restricons, which the dot3adAggIndex
object describes. This index is the unique idenfier that the local
system assigns to the aggregate group. It idenfies an aggregate
group instance among the subordinate managed objects of the
containing object. The idenfier is read-only.
Aggregaon This table lists the ports associated with each aggregate group in a
Port List Table firewall. Each aggregate group has one entry.
(dot3adAggPortListTable)
The dot3adAggPortListPorts aribute lists the complete set of ports
associated with an aggregate group. Each bit set in the list represents
a port member. For non-chassis plaorms, this is a 64-bit value. For
chassis plaorms, the value is an array of eight 64-bit entries.
Aggregaon Port Table This table contains LACP configuraon informaon about every port
(dot3adAggPortTable) associated with an aggregate group in a firewall. Each port has one
entry. The table has no entries for ports that are not associated with
an aggregate group.
LACP Stascs Table This table contains link aggregaon informaon about every port
(dot3adAggPortStatsTable)associated with an aggregate group in a firewall. Each port has one
row. The table has no entries for ports that are not associated with an
aggregate group.
The IEEE 802.3 LAG MIB includes the following LACP-related traps:
panLACPLostConnecvityTrap
The peer lost connecvity to the firewall.
panLACPSpeedDuplexTrap The link speed and duplex sengs on the firewall and peer do not
match.
PAN-OS® Administrator’s Guide Version 10.1 661 ©2022 Palo Alto Networks, Inc.
Monitoring
LLDP-V2-MIB.my
Use the LLDP-V2-MIB to monitor Link Layer Discovery Protocol (LLDP) events. For example,
you can check the lldpV2StatsRxPortFramesDiscardedTotal object to see the number of LLDP
frames that were discarded for any reason. The Palo Alto Networks firewall uses LLDP to discover
neighboring devices and their capabilies. LLDP makes troubleshoong easier, especially for
virtual wire deployments where the ping or traceroute ulies won’t detect the firewall.
Palo Alto Networks firewalls support all the LLDP-V2-MIB objects except:
• The following lldpV2Stascs objects:
• lldpV2StatsRemTablesLastChangeTime
• lldpV2StatsRemTablesInserts
• lldpV2StatsRemTablesDeletes
• lldpV2StatsRemTablesDrops
• lldpV2StatsRemTablesAgeouts
• The following lldpV2RemoteSystemsData objects:
• The lldpV2RemOrgDefInfoTable table
• In the lldpV2RemTable table: lldpV2RemTimeMark
RFC 4957 defines this MIB.
BFD-STD-MIB
Use the Bidireconal Forwarding Detecon (BFD) MIB to monitor and receive failure alerts for the
bidireconal path between two forwarding engines, such as interfaces, data links, or the actual
engines. For example, you can check the bfdSessState object to see the state of a BFD session
between forwarding engines. In the Palo Alto Networks implementaon, one of the forwarding
engines is a firewall interface and the other is an adjacent configured BFD peer.
RFC 7331 defines this MIB.
PAN-COMMON-MIB.my
Use the PAN-COMMON-MIB to monitor the following informaon for Palo Alto Networks
firewalls, Panorama, and WF-500 appliances:
PAN-OS® Administrator’s Guide Version 10.1 662 ©2022 Palo Alto Networks, Inc.
Monitoring
panSession Session ulizaon informaon. For example, the total number of acve
sessions on the firewall or a specific virtual system.
panLogCollector Logging stascs for each Log Collector, including logging rate, log
quotas, disk usage, retenon periods, log redundancy (enabled or
disabled), the forwarding status from firewalls to Log Collectors, the
forwarding status from Log Collectors to external services, and the
status of firewall-to-Log Collector connecons.
panDeviceLogging Logging stascs for each firewall, including logging rate, disk usage,
retenon periods, the forwarding status from individual firewalls
to Panorama and external servers, and the status of firewall-to-Log
Collector connecons.
PAN-GLOBAL-REG-MIB.my
PAN-GLOBAL-REG-MIB.my contains global, top-level OID definions for various sub-trees of Palo
Alto Networks enterprise MIB modules. This MIB doesn’t contain objects for you to monitor; it is
required only for referencing by other MIBs.
PAN-GLOBAL-TC-MIB.my
PAN-GLOBAL-TC-MIB.my defines convenons (for example, character length and allowed
characters) for the text values of objects in Palo Alto Networks enterprise MIB modules. All Palo
Alto Networks products use these convenons. This MIB doesn’t contain objects for you to
monitor; it is required only for referencing by other MIBs.
PAN-LC-MIB.my
PAN-LC-MIB.my contains definions of managed objects that Log Collectors (M-Series appliances
in Log Collector mode) implement. Use this MIB to monitor the logging rate, log database storage
duraon (in days), and disk usage (in MB) of each logical disk (up to four) on a Log Collector. For
example, you can use this informaon to determine whether you should add more Log Collectors
or forward logs to an external server (for example, a syslog server) for archiving.
PAN-PRODUCT-MIB.my
PAN-PRODUCT-MIB.my defines sysObjectID OIDs for all Palo Alto Networks products. This MIB
doesn’t contain objects for you to monitor; it is required only for referencing by other MIBs.
PAN-OS® Administrator’s Guide Version 10.1 663 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-ENTITY-EXT-MIB.my
Use PAN-ENTITY-EXT-MIB.my in tandem with the ENTITY-MIB to monitor power usage for the
physical components of a PA-7000 Series or PA-5450 firewall (for example, fan trays, and power
supplies), which are the only two Palo Alto Networks firewalls that support this MIB. For example,
when troubleshoong log forwarding issues, you might want to check the power usage of the log
processing cards (LPCs): you can map the LPC indexes from the ENTITY-MIB (entPhysicalDescr
object) to values in the PAN-ENTITY-EXT-MIB (panEntryFRUModelPowerUsed object).
PAN-TRAPS.my
Use PAN-TRAPS.my to see a complete lisng of all the generated traps and informaon about
them (for example, a descripon). For a list of traps that Palo Alto Networks firewalls, Panorama,
and WF-500 appliances support, refer to the PAN-COMMON-MIB.my panCommonEvents >
panCommonEventsEvents > panCommonEventEventsV2 object.
PAN-OS® Administrator’s Guide Version 10.1 664 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 665 ©2022 Palo Alto Networks, Inc.
Monitoring
3. Send Test Log to verify that the HTTP server receives the request. When you
interacvely send a test log, the firewall uses the format as is and does not replace the
variable with a value from a firewall log. If your HTTP server sends a 404 response,
provide values for the parameters so that the server can process the request successfully.
PAN-OS® Administrator’s Guide Version 10.1 666 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 3 | Define the match criteria for when the firewall will forward logs to the HTTP server and
aach the HTTP server profile you will use.
1. Select the log types for which you want to trigger a workflow:
• Add a Log Forwarding Profile (Objects > Log Forwarding) for logs that pertain to user
acvity (for example, Traffic, Threat, or Authencaon logs).
• Select Device > Log Sengs for logs that pertain to system events, such as
Configuraon or System logs.
2. Select the Log Type and use the new Filter Builder to define the match criteria.
3. Add the HTTP server profile for forwarding logs to the HTTP desnaon.
PAN-OS® Administrator’s Guide Version 10.1 667 ©2022 Palo Alto Networks, Inc.
Monitoring
NetFlow Monitoring
NetFlow is an industry-standard protocol that the firewall can use to export stascs about the IP
traffic ingressing its interfaces. The firewall exports the stascs as NetFlow fields to a NetFlow
collector. The NetFlow collector is a server you use to analyze network traffic for security,
administraon, accounng and troubleshoong. All Palo Alto Networks firewalls support NetFlow
Version 9. The firewalls support only unidireconal NetFlow, not bidireconal. The firewalls
perform NetFlow processing on all IP packets on the interfaces and do not support sampled
NetFlow. You can export NetFlow records for Layer 3, Layer 2, virtual wire, tap, VLAN, loopback,
and tunnel interfaces. For aggregate Ethernet sub-interfaces, you can export records for the
individual sub-interfaces that data flows through within the group. To idenfy firewall interfaces in
a NetFlow collector, see Firewall Interface Idenfiers in SNMP Managers and NetFlow Collectors.
The firewalls support standard and enterprise (PAN-OS specific) NetFlow Templates, which
NetFlow collectors use to decipher the NetFlow fields.
• Configure NetFlow Exports
• NetFlow Templates
PAN-OS® Administrator’s Guide Version 10.1 668 ©2022 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Assign the NetFlow server profile to the firewall interfaces where traffic you want to analyze
is ingressing.
In this example, you assign the profile to an exisng Ethernet interface.
1. Select Network > Interfaces > Ethernet and click an interface name to edit it.
You can export NetFlow records for Layer 3, Layer 2, virtual wire, tap, VLAN,
loopback, and tunnel interfaces. For aggregate Ethernet interfaces, you can
export records for the individual sub-interfaces that data flows through within
the group.
2. Select the NetFlow server profile (NetFlow Profile) you configured and click OK.
STEP 3 | (Required for PA-7000 Series, PA-5400 Series, and PA-5200 Series firewalls) Configure a
service route for the interface that the firewall will use to send NetFlow records.
You cannot use the management (MGT) interface to send NetFlow records from the PA-7000
Series, PA-5400 Series, and PA-5200 Series firewalls. For other firewall models, a service route
is oponal. For all firewalls, the interface that sends NetFlow records does not have to be the
same as the interface for which the firewall collects the records.
1. Select Device > Setup > Services.
2. (Firewall with mulple virtual systems) Select one of the following:
• Global—Select this opon if the service route applies to all virtual systems on the
firewall.
• Virtual Systems—Select this opon if the service route applies to a specific virtual
system. Set the Locaon to the virtual system.
3. Select Service Route Configuraon and Customize.
4. Select the protocol (IPv4 or IPv6) that the interface uses. You can configure the service
route for both protocols if necessary.
5. Click Nelow in the Service column.
6. Select the Source Interface.
Any, Use default, and MGT are not valid interface opons for sending NetFlow records
from PA-7000 Series, PA-5400 Series, or PA-5200 Series firewalls.
7. Select a Source Address (IP address).
8. Click OK twice to save your changes.
When monitoring stascs, you must match the interface indexes in the NetFlow
collector with interface names in the firewall web interface. For details, see Firewall
Interface Idenfiers in SNMP Managers and NetFlow Collectors.
To troubleshoot NetFlow delivery issues, use the operaonal CLI command debug log-
receiver netflow statistics.
PAN-OS® Administrator’s Guide Version 10.1 669 ©2022 Palo Alto Networks, Inc.
Monitoring
NetFlow Templates
NetFlow collectors use templates to decipher the fields that the firewall exports. The firewall
selects a template based on the type of exported data: IPv4 or IPv6 traffic, with or without
NAT, and with standard or enterprise-specific (PAN-OS specific) fields. The firewall periodically
refreshes templates to re-evaluate which one to use (in case the type of exported data changes)
and to apply any changes to the fields in the selected template. When you Configure NetFlow
Exports, set the refresh rate based on a me interval and a number of exported records according
to the requirements of your NetFlow collector. The firewall refreshes the templates aer either
threshold is passed.
The Palo Alto Networks firewall supports the following NetFlow templates:
Template ID
The following table lists the NetFlow fields that the firewall can send, along with the templates
that define them:
PAN-OS® Administrator’s Guide Version 10.1 670 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 671 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 672 ©2022 Palo Alto Networks, Inc.
Monitoring
226 postNATDesnaonIPv4Address
The definion of this informaon IPv4 with NAT
element is idencal to that of standard
desnaonIPv4Address, except
IPv4 with NAT
that it reports a modified value
enterprise
that the firewall produced during
network address translaon aer
the packet traversed the interface.
PAN-OS® Administrator’s Guide Version 10.1 673 ©2022 Palo Alto Networks, Inc.
Monitoring
228 postNAPTDesnaonTransportPort
The definion of this informaon IPv4 with NAT
element is idencal to that of standard
desnaonTransportPort, except
IPv4 with NAT
that it reports a modified value
enterprise
that the firewall produced during
network address port translaon
aer the packet traversed the
interface.
282 postNATDesnaonIPv6Address
The definion of this informaon IPv6 with NAT
element is idencal to the standard
definion of informaon element
IPv6 with NAT
desnaonIPv6Address, except
enterprise
that it reports a modified value
that the firewall produced
during NAT64 network address
translaon aer the packet
traversed the interface. See RFC
2460 for the definion of the
desnaon address field in the
IPv6 header. See RFC 6146 for
NAT64 specificaon.
PAN-OS® Administrator’s Guide Version 10.1 674 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 675 ©2022 Palo Alto Networks, Inc.
Monitoring
You can match the indexes with names by understanding the formulas that the firewall uses to
calculate indexes. The formulas vary by plaorm and interface type: physical or logical.
Physical interface indexes have a range of 1-9999, which the firewall calculates as follows:
PAN-OS® Administrator’s Guide Version 10.1 676 ©2022 Palo Alto Networks, Inc.
Monitoring
PA-7000 Series (Max. ports * slot) + physical port PA-7000 Series firewall,
offset + number of management Eth3/9 =
ports
[64 (max. ports) * 3 (slot)] + 9
• Maximum ports—This is a (physical port) + 5 (number of
constant of 64. management ports) = 206
• Slot—This is the chassis
slot number of the network
interface card.
• Physical port offset—This is
the physical port number.
• Number of management
ports—This is a constant of 5.
Logical interface indexes for all plaorms are nine-digit numbers that the firewall calculates as
follows:
Interface Range Digit Digits Digits Digits 1-4 Example Interface Index
Type 9 7-8 5-6
Layer 101010001-199999999
Type: Interface Interface Subinterface: Eth1/5.22 =
3 1 slot: port: suffix 100000000 (type) +
subinterface 1-9 1-9 1-9999 100000 (slot) + 50000
(01-09) (01-09) (0001-9999) (port) + 22 (suffix) =
101050022
Layer 101010001-199999999
Type: Interface Interface Subinterface: Eth2/3.6 = 100000000
2 1 slot: port: suffix (type) + 200000 (slot) +
subinterface 1-9 1-9 1-9999 30000 (port) + 6 (suffix)
(01-09) (01-09) (0001-9999) = 102030006
Vwire 101010001-199999999
Type: Interface Interface Subinterface: Eth4/2.312 =
subinterface 1 slot: port: suffix 100000000 (type) +
1-9 1-9 1-9999 400000 (slot) + 20000
(01-09) (01-09) (0001-9999) (port) + 312 (suffix) =
104020312
VLAN 200000001-200009999
Type: 00 00 VLAN VLAN.55 = 200000000
2 suffix: (type) + 55 (suffix) =
1-9999 200000055
(0001-9999)
PAN-OS® Administrator’s Guide Version 10.1 677 ©2022 Palo Alto Networks, Inc.
Monitoring
Interface Range Digit Digits Digits Digits 1-4 Example Interface Index
Type 9 7-8 5-6
Loopback300000001-300009999
Type: 00 00 Loopback Loopback.55 =
3 suffix: 300000000 (type) + 55
1-9999 (suffix) = 300000055
(0001-9999)
Tunnel 400000001-400009999
Type: 00 00 Tunnel Tunnel.55 =
4 suffix: 400000000 (type) + 55
1-9999 (suffix) = 400000055
(0001-9999)
Aggregate500010001-500089999
Type: 00 AE Subinterface: AE5.99 = 500000000
group 5 suffix: suffix (type) + 50000 (AE
1-8 1-9999 Suffix) + 99 (suffix) =
(01-08) (0001-9999) 500050099
PAN-OS® Administrator’s Guide Version 10.1 678 ©2022 Palo Alto Networks, Inc.
Monitoring
Monitor Transceivers
You can monitor the status of transceivers in your physical appliance or device to enable easier
installaon and troubleshoong. Diagnoscs that can be viewed are transmied bias current,
transmied power, received power, transceiver temperature, and power supply voltage. See below
for a list of devices that support transceiver monitoring.
• PA-800 Series
• PA-3200 Series
• PA-5200 Series
• PA-5450 Firewall
• PA-7000 Series
Use the Command Line Interface to run transceiver monitoring. See the following table for all
available CLI commands.
If you run commands on an incompable transceiver, the CLI will return 'n/a' for any
diagnosc informaon it cannot read.
CLI Definion
PAN-OS® Administrator’s Guide Version 10.1 679 ©2022 Palo Alto Networks, Inc.
Monitoring
PAN-OS® Administrator’s Guide Version 10.1 680 ©2022 Palo Alto Networks, Inc.
User-ID
The user identy, as opposed to an IP address, is an integral component of an effecve
security infrastructure. Knowing who is using each of the applicaons on your
network, and who may have transmied a threat or is transferring files, can strengthen
security policies and reduce incident response mes. User-ID™, a standard feature on
the Palo Alto Networks firewall, enables you to leverage user informaon stored in a
wide range of repositories. The following topics provide more details about User-ID
and how to configure it:
681
User-ID
User-ID Overview
User-ID™ enables you to idenfy all users on your network using a variety of techniques to
ensure that you can idenfy users in all locaons using a variety of access methods and operang
systems, including Microso Windows, Apple iOS, Mac OS, Android, and Linux®/UNIX. Knowing
who your users are instead of just their IP addresses enables:
• Visibility—Improved visibility into applicaon usage based on users gives you a more relevant
picture of network acvity. The power of User-ID becomes evident when you noce a
strange or unfamiliar applicaon on your network. Using either ACC or the log viewer, your
security team can discern what the applicaon is, who the user is, the bandwidth and session
consumpon, along with the source and desnaon of the applicaon traffic, as well as any
associated threats.
• Policy control—Tying user informaon to Security policy rules improves safe enablement of
applicaons traversing the network and ensures that only those users who have a business
need for an applicaon have access. For example, some applicaons, such as SaaS applicaons
that enable access to Human Resources services (such as Workday or Service Now) must be
available to any known user on your network. However, for more sensive applicaons you can
reduce your aack surface by ensuring that only users who need these applicaons can access
them. For example, while IT support personnel may legimately need access to remote desktop
applicaons, the majority of your users do not.
• Logging, reporng, forensics—If a security incident occurs, forensics analysis and reporng
based on user informaon rather than just IP addresses provides a more complete picture of
the incident. For example, you can use the pre-defined User/Group Acvity to see a summary
of the web acvity of individual users or user groups, or the SaaS Applicaon Usage report to
see which users are transferring the most data over unsanconed SaaS applicaons.
To enforce user- and group-based policies, the firewall must be able to map the IP addresses in the
packets it receives to usernames. User-ID provides many mechanisms to collect this User Mapping
informaon. For example, the User-ID agent monitors server logs for login events and listens
for syslog messages from authencang services. To idenfy mappings for IP addresses that
the agent didn’t map, you can configure Authencaon Policy to redirect HTTP requests to an
Authencaon Portal login. You can tailor the user mapping mechanisms to suit your environment,
and even use different mechanisms at different sites to ensure that you are safely enabling access
to applicaons for all users, in all locaons, all the me.
PAN-OS® Administrator’s Guide Version 10.1 682 ©2022 Palo Alto Networks, Inc.
User-ID
Figure 4: User-ID
To enable user- and group-based policy enforcement, the firewall requires a list of all available
users and their corresponding group memberships so that you can select groups when defining
your policy rules. The firewall collects Group Mapping informaon by connecng directly to your
LDAP directory server, or using XML API integraon with your directory server.
See User-ID Concepts for informaon on how User-ID works and Enable User-ID for instrucons
on seng up User-ID.
User-ID does not work in environments where the source IP addresses of users are subject
to NAT translaon before the firewall maps the IP addresses to usernames.
PAN-OS® Administrator’s Guide Version 10.1 683 ©2022 Palo Alto Networks, Inc.
User-ID
User-ID Concepts
• Group Mapping
• User Mapping
Group Mapping
To define policy rules based on user or group, first you create an LDAP server profile that defines
how the firewall connects and authencates to your directory server. The firewall supports a
variety of directory servers, including Microso Acve Directory (AD), Novell eDirectory, and
Sun ONE Directory Server. The server profile also defines how the firewall searches the directory
to retrieve the list of groups and the corresponding list of members. If you are using a directory
server that is not navely supported by the firewall, you can integrate the group mapping funcon
using the XML API. You can then create a group mapping configuraon to Map Users to Groups
and Enable User- and Group-Based Policy.
Defining policy rules based on group membership rather than on individual users simplifies
administraon because you don’t have to update the rules whenever new users are added
to a group. When configuring group mapping, you can limit which groups will be available
in policy rules. You can specify groups that already exist in your directory service or define
custom groups based on LDAP filters. Defining custom groups can be quicker than creang new
groups or changing exisng ones on an LDAP server, and doesn’t require an LDAP administrator
to intervene. User-ID maps all the LDAP directory users who match the filter to the custom
group. For example, you might want a security policy that allows contractors in the Markeng
Department to access social networking sites. If no Acve Directory group exists for that
department, you can configure an LDAP filter that matches users for whom the LDAP aribute
Department is set to Markeng. Log queries and reports that are based on user groups will include
custom groups.
User Mapping
Knowing user and groups names is only one piece of the puzzle. The firewall also needs to know
which IP addresses map to which users so that security rules can be enforced appropriately.
User-ID Overview illustrates the different methods that are used to idenfy users and groups on
your network and shows how user mapping and group mapping work together to enable user-
and group-based security enforcement and visibility. The following topics describe the different
methods of user mapping:
• Server Monitoring
• Port Mapping
• Syslog
• XFF Headers
• Username Header Inseron
• Authencaon Policy and Authencaon Portal
• GlobalProtect
• XML API
PAN-OS® Administrator’s Guide Version 10.1 684 ©2022 Palo Alto Networks, Inc.
User-ID
• Client Probing
Server Monitoring
With server monitoring a User-ID agent—either a Windows-based agent running on a domain
server in your network, or the PAN-OS integrated User-ID agent running on the firewall—monitors
the security event logs for specified Microso Exchange Servers, Domain Controllers, or Novell
eDirectory servers for login events. For example, in an AD environment, you can configure the
User-ID agent to monitor the security logs for Kerberos cket grants or renewals, Exchange server
access (if configured), and file and print service connecons. For these events to be recorded in
the security log, the AD domain must be configured to log successful account login events. In
addion, because users can log in to any of the servers in the domain, you must set up server
monitoring for all servers to capture all user login events. See Configure User Mapping Using the
Windows User-ID Agent or Configure User Mapping Using the PAN-OS Integrated User-ID Agent
for details.
Port Mapping
In environments with mul-user systems—such as Microso Terminal Server or Citrix
environments—many users share the same IP address. In this case, the user-to-IP address mapping
process requires knowledge of the source port of each client. To perform this type of mapping,
you must install the Palo Alto Networks Terminal Server Agent on the Windows/Citrix terminal
server itself to intermediate the assignment of source ports to the various user processes. For
terminal servers that do not support the Terminal Server agent, such as Linux terminal servers, you
can use the XML API to send user mapping informaon from login and logout events to User-ID.
See Configure User Mapping for Terminal Server Users for configuraon details.
XFF Headers
If you have a proxy server deployed between the users on your network and the firewall, the
firewall might see the proxy server IP address as the source IP address in HTTP/HTTPS traffic that
the proxy forwards rather than the IP address of the client that requested the content. In many
cases, the proxy server adds an X-Forwarded-For (XFF) header to traffic packets that includes the
actual IPv4 or IPv6 address of the client that requested the content or from whom the request
originated. In such cases, you can configure the firewall to extract the end user IP address from
the XFF so that User-ID can map the IP address to a username. This enables you to Use XFF
Values for Policies and Logging Source Users so that you can enforce user-based policy to safely
enable access to web-based for your users behind a proxy server.
PAN-OS® Administrator’s Guide Version 10.1 685 ©2022 Palo Alto Networks, Inc.
User-ID
Syslog
Your environment might have exisng network services that authencate users. These services
include wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, and
other Network Access Control (NAC) mechanisms. You can configure these services to send
syslog messages that contain informaon about login and logout events and configure the User-
ID agent to parse those messages. The User-ID agent parses for login events to map IP addresses
to usernames and parses for logout events to delete outdated mappings. Deleng outdated
mappings is parcularly useful in environments where IP address assignments change oen.
Both the PAN-OS integrated User-ID agent and Windows-based User-ID agent use Syslog Parse
profiles to parse syslog messages. In environments where services send the messages in different
formats, you can create a custom profile for each format and associate mulple profiles with
each syslog sender. If you use the PAN-OS integrated User-ID agent, you can also use predefined
Syslog Parse profiles that Palo Alto Networks provides through Applicaons content updates.
Syslog messages must meet the following criteria for a User-ID agent to parse them:
• Each message must be a single-line text string. The allowed delimiters for line breaks are a new
line (\n) or a carriage return plus a new line (\r\n).
• The maximum size for individual messages is 8,000 bytes.
• Messages sent over UDP must be contained in a single packet; messages sent over SSL can
span mulple packets. A single packet might contain mulple messages.
See Configure User-ID to Monitor Syslog Senders for User Mapping for configuraon details.
PAN-OS® Administrator’s Guide Version 10.1 686 ©2022 Palo Alto Networks, Inc.
User-ID
GlobalProtect
For mobile or roaming users, the GlobalProtect endpoint provides the user mapping informaon to
the firewall directly. In this case, every GlobalProtect user has an app running on the endpoint that
requires the user to enter login credenals for VPN access to the firewall. This login informaon
is then added to the User-ID user mapping table on the firewall for visibility and user-based
security policy enforcement. Because GlobalProtect users must authencate to gain access to
the network, the IP address-to-username mapping is explicitly known. This is the best soluon
in sensive environments where you must be certain of who a user is in order to allow access
to an applicaon or service. For more informaon on seng up GlobalProtect, refer to the
GlobalProtect Administrator’s Guide.
XML API
Authencaon Portal and the other standard user mapping methods might not work for
certain types of user access. For example, the standard methods cannot add mappings of users
connecng from a third-party VPN soluon or users connecng to a 802.1x-enabled wireless
network. For such cases, you can use the PAN-OS XML API to capture login events and send them
to the PAN-OS integrated User-ID agent. See Send User Mappings to User-ID Using the XML API
for details.
Client Probing
Palo Alto Networks strongly recommends disabling client probing because it is not a
recommended method of obtaining User-ID informaon in a high-security network.
Palo Alto Networks does not recommend using client probing due to the following potenal risks:
• Because client probing trusts data reported back from the endpoint, it can expose you to
security risks when misconfigured. If you enable it on external, untrusted interfaces, this
would cause the agent to send client probes containing sensive informaon such as the
username, domain name, and password hash of the User-ID agent service account outside
PAN-OS® Administrator’s Guide Version 10.1 687 ©2022 Palo Alto Networks, Inc.
User-ID
of your network. If you do not configure the service account correctly, the credenals could
potenally be exploited by an aacker to penetrate the network to gain further access.
• Client probing was designed for legacy networks where most users were on Windows
workstaons on the internal network, but is not ideal for today’s more modern networks that
support a roaming and mobile user base on a variety of devices and operang systems.
• Client probing can generate a large amount of network traffic (based on the total number of
mapped IP addresses).
Instead, Palo Alto Networks strongly recommends using the following alternate methods for user
mapping:
• Using more isolated and trusted sources, such as domain controllers and integraons with
Syslog or the XML API, to safely capture user mapping informaon from any device type or
operang system.
• Configuring Authencaon Policy and Authencaon Portal to ensure that you only allow
access to authorized users.
The User-ID agent supports two types of client probing:
• NetBIOS probing, which uses the Windows User-ID agent.
• WMI probing, which uses either the PAN-OS integrated User-ID agent or the Windows User-
ID agent.
Client probing is not recommended as a user mapping method, but if you plan to enable
it, Palo Alto Networks strongly recommends using WMI probing over NetBIOS probing.
In a Microso Windows environment, you can configure the User-ID agent to probe client systems
using Windows Management Instrumentaon (WMI) or NetBIOS probing at regular intervals to
verify that an exisng user mapping is sll valid or to obtain the username for an IP address that is
not yet mapped.
If you do choose to enable probing in your trusted zones, the agent will probe each learned IP
address periodically (every 20 minutes by default, but this is configurable) to verify that the same
user is sll logged in. In addion, when the firewall encounters an IP address for which it has no
user mapping, it will send the address to the agent for an immediate probe.
See Configure User Mapping Using the Windows User-ID Agent or Configure User Mapping Using
the PAN-OS Integrated User-ID Agent for details.
PAN-OS® Administrator’s Guide Version 10.1 688 ©2022 Palo Alto Networks, Inc.
User-ID
Enable User-ID
The user identy, as opposed to an IP address, is an integral component of an effecve security
infrastructure. Knowing who is using each of the applicaons on your network, and who may
have transmied a threat or is transferring files, can strengthen your security policy and reduce
incident response mes. User-ID enables you to leverage user informaon stored in a wide range
of repositories for visibility, user- and group-based policy control, and improved logging, reporng,
and forensics:
STEP 1 | Enable User-ID on the source zones that contain the users who will send requests that
require user-based access controls.
Enable User-ID on trusted zones only. If you enable User-ID and client probing on
an external untrusted zone (such as the internet), probes could be sent outside your
protected network, resulng in an informaon disclosure of the User-ID agent service
account name, domain name, and encrypted password hash, which could allow an
aacker to gain unauthorized access to protected services and applicaons.
1. Select Network > Zones and click the Name of the zone.
2. Enable User Idenficaon and click OK.
As a best pracce, create a service account with the minimum set of permissions
required to support the User-ID opons you enable to reduce your aack surface in the
event that the service account is compromised.
This is required if you plan to use the Windows-based User-ID agent or the PAN-OS integrated
User-ID agent to monitor domain controllers, Microso Exchange servers, or Windows clients
for user login and logout events.
PAN-OS® Administrator’s Guide Version 10.1 689 ©2022 Palo Alto Networks, Inc.
User-ID
As a best pracce, do not enable client probing as a user mapping method on high-
security networks. Client probing can generate a large amount of network traffic and
can pose a security threat when misconfigured.
The way you do this depends on where your users are located and what types of systems they
are using, and what systems on your network are collecng login and logout events for your
users. You must configure one or more User-ID agents to enable User Mapping:
• Configure User Mapping Using the Windows User-ID Agent.
• Configure User Mapping Using the PAN-OS Integrated User-ID Agent.
• Configure User-ID to Monitor Syslog Senders for User Mapping.
• Configure User Mapping for Terminal Server Users.
• Send User Mappings to User-ID Using the XML API.
• Insert Username in HTTP Headers.
STEP 5 | Specify the networks to include and exclude from user mapping.
As a best pracce, always specify which networks to include and exclude from User-ID.
This allows you to ensure that only your trusted assets are probed and that unwanted
user mappings are not created unexpectedly.
The way you specify which networks to include and exclude depends on whether you are using
the Windows-based User-ID agent or the PAN-OSintegrated User-ID agent.
PAN-OS® Administrator’s Guide Version 10.1 690 ©2022 Palo Alto Networks, Inc.
User-ID
Create rules based on group rather than user whenever possible. This prevents you
from having to connually update your rules (which requires a commit) whenever your
user base changes.
Aer configuring User-ID, you will be able to choose a username or group name when defining
the source or desnaon of a security rule:
1. Select Policies > Security and Add a new rule or click an exisng rule name to edit.
2. Select User and specify which users and groups to match in the rule in one of the
following ways:
• If you want to select specific users or groups as matching criteria, click Add in the
Source User secon to display a list of users and groups discovered by the firewall
group mapping funcon. Select the users or groups to add to the rule.
• If you want to match any user who has or has not authencated and you don’t need
to know the specific user or group name, select known-user or unknown from the
drop-down above the Source User list.
3. Configure the rest of the rule as appropriate and then click OK to save it. For details on
other fields in the security rule, see Set Up a Basic Security Policy.
STEP 8 | Create the Security policy rules to safely enable User-ID within your trusted zones and
prevent User-ID traffic from egressing your network.
Follow the Best Pracce Internet Gateway Security Policy to ensure that the User-ID
applicaon (paloalto-userid-agent) is only allowed in the zones where your agents
(both your Windows agents and your PAN-OS integrated agents) are monitoring services and
distribung mappings to firewalls. Specifically:
• Allow the paloalto-userid-agent applicaon between the zones where your agents
reside and the zones where the monitored servers reside (or even beer, between the
specific systems that host the agent and the monitored servers).
• Allow the paloalto-userid-agent applicaon between the agents and the firewalls
that need the user mappings and between firewalls that are redistribung user mappings
and the firewalls they are redistribung the informaon to.
• Deny the paloalto-userid-agent applicaon to any external zone, such as your
internet zone.
STEP 9 | Configure the firewall to obtain user IP addresses from X-Forwarded-For (XFF) headers.
When the firewall is between the Internet and a proxy server, the IP addresses in the packets
that the firewall sees are for the proxy server rather than users. To enable visibility of user IP
addresses instead, configure the firewall to use the XFF headers for user mapping. With this
opon enabled, the firewall matches the IP addresses with usernames referenced in policy to
PAN-OS® Administrator’s Guide Version 10.1 691 ©2022 Palo Alto Networks, Inc.
User-ID
enable control and visibility for the associated users and groups. For details, see Idenfy Users
Connected through a Proxy Server.
1. Select Device > Setup > Content-ID and edit the X-Forwarded-For Headers sengs.
2. Select X-Forwarded-For Header in User-ID.
As a best pracce, always enable the Enable Config Sync opon for an HA
configuraon to ensure that the group mappings and user mappings are synchronized
between the acve and passive firewall.
1. Select Device > High Availability > General and edit the Setup secon.
2. Select Enable HA.
3. Select Enable Config Sync.
4. Enter the Peer HA1 IP Address, which is the IP address of the HA1 control link on the
peer firewall.
5. (Oponal) Enter a Backup Peer HA1 IP Address, which is the IP address of the backup
control link on the peer firewall.
6. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 692 ©2022 Palo Alto Networks, Inc.
User-ID
The following are best pracces for group mapping in an Acve Directory (AD)
environment:
• If you have a single domain, you need only one group mapping configuraon with an
LDAP server profile that connects the firewall to the domain controller with the best
connecvity. You can add up to four domain controllers to the LDAP server profile for
redundancy. Note that you cannot increase redundancy beyond four domain controllers
for a single domain by adding mulple group mapping configuraons for that domain.
• If you have mulple domains and/or mulple forests, you must create a group mapping
configuraon with an LDAP server profile that connects the firewall to a domain server
in each domain/forest. Take steps to ensure unique usernames in separate forests.
• If you have Universal Groups, create an LDAP server profile to connect to the root
domain of the Global Catalog server on port 3268 or 3269 for SSL, then create another
LDAP server profile to connect to the root domain controllers on port 389. This helps
ensure that users and group informaon is available for all domains and subdomains.
• Before using group mapping, configure a Primary Username for user-based security
policies, since this aribute will idenfy users in the policy configuraon, logs, and
reports.
PAN-OS® Administrator’s Guide Version 10.1 693 ©2022 Palo Alto Networks, Inc.
User-ID
If you create mulple group mapping configuraons that use the same base
disnguished name (DN) or LDAP server, the group mapping configuraons cannot
contain overlapping groups (for example, the Include list for one group mapping
configuraon cannot contain a group that is also in a different group mapping
configuraon).
1. Select Device > Server Profiles > LDAP and Add a server profile.
2. Enter a Profile Name to idenfy the server profile.
3. Add the LDAP servers. You can add up to four servers to the profile but they must be
the same Type. For each server, enter a Name (to idenfy the server), LDAP Server IP
address or FQDN, and server Port (default 389).
4. Select the server Type.
Based on your selecon (such as acve-directory), the firewall automacally populates
the correct LDAP aributes in the group mapping sengs. However, if you customized
your LDAP schema, you might need to modify the default sengs.
5. For the Base DN, enter the Disnguished Name (DN) of the LDAP tree locaon where
you want the firewall to start searching for user and group informaon.
6. For the Bind DN, Password and Confirm Password, enter the authencaon credenals
for binding to the LDAP tree.
The Bind DN can be a fully qualified LDAP name (such as
cn=administrator,cn=users,dc=acme,dc=local) or a user principal name (such
as [email protected]).
7. Enter the Bind Timeout and Search Timeout in seconds (default is 30 for both).
8. Click OK to save the server profile.
PAN-OS® Administrator’s Guide Version 10.1 694 ©2022 Palo Alto Networks, Inc.
User-ID
if you need to enter a value, enter the NetBIOS domain name (for example, example not
example.com).
If you use Global Catalog, entering a value replaces the domain name for all users and
groups from this server, including those from other domains.
7. (Oponal) To filter the groups that the firewall tracks for group mapping, in the Group
Objects secon, enter a Search Filter (LDAP query) and Object Class (group definion).
8. (Oponal) To filter the users that the firewall tracks for group mapping, in the User
Objects secon, enter a Search Filter (LDAP query), and Object Class (user definion).
9. Make sure the group mapping configuraon is Enabled (default is enabled).
STEP 3 | (Oponal) Define User and Group Aributes to collect for user and group mapping. This step
is required if you want to map users based on directory aributes other than the domain.
1. If your User-ID sources only send the username and the username is unique across the
organizaon, select Device > User Idenficaon > User Mapping > Setup and Edit the
Setup secon to Allow matching usernames without domains to allow the firewall to
check if unique usernames collected from the LDAP server during group mapping match
the users associated with a policy and avoid overwring the domain in your source
profile.
Before enabling this opon, configure group mapping for the LDAP group
containing the User-ID source (such as GlobalProtect or Authencaon Portal)
that collects the mappings. Aer you commit the changes, the User-ID source
populates the usernames without domains. Only usernames collected during
group mapping can be matched without a domain. If your User-ID sources send
user informaon in mulple formats and you enable this opon, verify that the
aributes collected by the firewall have a unique prefix. To ensure users are
idenfied correctly if you enable this opon, all aributes for group mapping
should be unique. If the username is not unique, the firewall logs an error in the
Debug logs.
2. Select Device > User Idenficaon > Group Mapping Sengs > Add > User and Group
Aributes > User Aributes and enter the Directory Aribute you want to collect for
user idenficaon. Specify a Primary Username to idenfy the user on the firewall and
PAN-OS® Administrator’s Guide Version 10.1 695 ©2022 Palo Alto Networks, Inc.
User-ID
to represent the user in reports and logs that will override any other format the firewall
receives from the User-ID source.
When you select the Server Profile Type, the firewall auto-populates the values for the
user and group aributes. Based on the user informaon that your User-ID sources send,
you may need to configure the correct aributes:
• User Principal Name (UPN): userPrincipalName
• NetBios Name: sAMAccountName
• Email ID: Directory aribute for that email
• Mulple formats: Retrieve the user mapping aributes from the user directory before
enabling your User-ID sources.
If you do not specify a primary username, the firewall uses the following default values
for each server profile type:
PAN-OS® Administrator’s Guide Version 10.1 696 ©2022 Palo Alto Networks, Inc.
User-ID
Each entry can be a single group or a list of groups. By default, if you don’t specify groups, all
groups are available in policy rules.
Any custom groups you create will also be available in the Allow List of authencaon
profiles (Configure an Authencaon Profile and Sequence).
To minimize the performance impact on the LDAP directory server, use only
indexed aributes in the filter.
3. Click OK to save your changes.
You must commit before custom groups will be available in policies and objects.
Aer configuring the firewall to retrieve group mapping informaon from an LDAP
server, but before configuring policies based on the groups it retrieves, the best pracce
is to either wait for the firewall to refresh its group mappings cache or refresh the cache
manually. To verify which groups you can currently use in policies, access the firewall
CLI and run the show user group command. To determine when the firewall will
next refresh the group mappings cache, run the show user group-mapping
statistics command and check the Next Action. To manually refresh the
cache, run the debug user-id refresh group-mapping all command.
PAN-OS® Administrator’s Guide Version 10.1 697 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 6 | Verify that the user and group mapping has correctly idenfied users.
1. Select Device > User Idenficaon > Group Mapping > Group Include List to confirm
the firewall has fetched all of the groups.
2. To verify that all of the user aributes have been correctly captured, use the following
CLI command:
The normalized format for the User Principal Name (UPN), primary username, email
aributes, and any configured alternate usernames display for all users:
2) nam\sam-user-upn
3. Verify that the usernames are correctly displayed in the Source User column under
Monitor > Logs > Traffic.
PAN-OS® Administrator’s Guide Version 10.1 698 ©2022 Palo Alto Networks, Inc.
User-ID
4. Verify that the users are mapped to the correct usernames in the User Provided by
Source column under Monitor > Logs > User-ID.
PAN-OS® Administrator’s Guide Version 10.1 699 ©2022 Palo Alto Networks, Inc.
User-ID
While you can configure either the Windows agent or the PAN-OS integrated User-
ID agent on the firewall to listen for authencaon syslog messages from the network
services, because only the PAN-OS integrated agent supports syslog listening over TLS,
it is the preferred configuraon.
To include the username and domain in the headers for outgoing traffic so other devices in your
network can idenfy the user and enforce user-based policy, you can Insert Username in HTTP
Headers.
To Share User-ID Mappings Across Virtual Systems, you can configure a virtual system as a
User-ID hub.
For other clients that you can’t map using the other methods, you can Send User Mappings to
User-ID Using the XML API.
A large-scale network can have hundreds of informaon sources that firewalls query for
user and group mapping and can have numerous firewalls that enforce policies based on
the mapping informaon. You can simplify User-ID administraon for such a network by
aggregang the mapping informaon before the User-ID agents collect it. You can also reduce
the resources that the firewalls and informaon sources use in the querying process by
PAN-OS® Administrator’s Guide Version 10.1 700 ©2022 Palo Alto Networks, Inc.
User-ID
configuring some firewalls to redistribute the mapping informaon. For details, see Deploy
User-ID in a Large-Scale Network.
User-ID provides many methods for safely collecng user mapping informaon. Some
legacy features designed for environments that only required user mapping on Windows
desktops aached to the local network require privileged service accounts. If the privileged
service account is compromised, this would open your network to aack. As a best
pracce, avoid using legacy features that require privileges that would pose a threat if
compromised, such as client probing and session monitoring.
The following workflow details all required privileges and provides guidance for the User-
ID features which require privileges that could pose a threat so that you can decide how to
best idenfy users without compromising your overall security posture.
PAN-OS® Administrator’s Guide Version 10.1 701 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 702 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | Configure either local or group policy to allow the service account to log on as a service.
The permission to log on as a service is only needed locally on the Windows server that is the
agent host.
• To assign permissions locally:
1. select Control Panel > Administrave Tools > Local Security Policy.
2.
3. Select Local Policies > User Rights Assignment > Log on as a service.
PAN-OS® Administrator’s Guide Version 10.1 703 ©2022 Palo Alto Networks, Inc.
User-ID
5. Enter the object names to select (the service account name) in domain\username
format and click OK.
• To configure group policy if you are installing Windows User-ID agents on mulple servers,
use the Group Policy Management Editor.
1. Select Start > Group Policy Management > <your domain> > Default Domain Policy >
Acon > Edit for the Windows server that is the agent host.
2. Select Computer Configuraon > Policies > Windows Sengs > Security Sengs >
Local Policies > User Rights Assignment.
PAN-OS® Administrator’s Guide Version 10.1 704 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | If you want to use WMI to collect user data, assign DCOM privileges to the service account
so that it can use WMI queries on monitored servers.
1. Select Acve Directory Users and Computers > <your domain> > Builn > Distributed
COM Users.
2. Right-click Properes > Members > Add and enter the service account name.
PAN-OS® Administrator’s Guide Version 10.1 705 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 4 | If you plan to use WMI probing, enable the account to read the CIMV2 namespace and
assign the required permissions on the client systems to be probed.
Do not enable client probing on high-security networks. Client probing can generate
a large amount of network traffic and can pose a security threat when misconfigured.
Instead collect user mapping informaon from more isolated and trusted sources, such
as domain controllers and through integraons with Syslog or the XML API, which have
the added benefit of allowing you to safely capture user mapping informaon from any
device type or operang system, instead of just Windows clients.
Perform this task on each client system that the User-ID agent will probe for user mapping
informaon:
1. Right-click the Windows icon ( ), Search for wmimgmt.msc, and launch the WMI
Management Console.
2. In the console tree, right-click WMI Control and select Properes.
3. Select the Security tab, then select Root > CIMV2, and click the Security buon.
4. Add the name of the service account you created, Check Names to verify your entry, and
click OK.
You might have to change the Locaons or click Advanced to query for account
names. See the dialog help for details.
PAN-OS® Administrator’s Guide Version 10.1 706 ©2022 Palo Alto Networks, Inc.
User-ID
5. In the Permissions for <Username> secon, Allow the Enable Account and Remote
Enable permissions.
6. Click OK twice.
7. Use the Local Users and Groups MMC snap-in (lusrmgr.msc) to add the service account
to the local Distributed Component Object Model (DCOM) Users and Remote Desktop
Users groups on the system that will be probed.
PAN-OS® Administrator’s Guide Version 10.1 707 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 5 | If you want to use Server Monitoring to idenfy users, add the service account to the Event
Log Reader builn group to allow the service account to read the security log events.
1. On the domain controller or Exchange server that contains the logs you want the User-
ID agent to read, or on the member server that receives events from Windows log
forwarding, select Start > Run, enter MMC.
2. Select File > Add/Remove Snap-in > Acve Directory Users and Computers > Add, then
click OK to run the MMC and launch the Acve Directory Users and Computers snap-in.
3. Navigate to the Builn folder for the domain, right-click the Event Log Readers group,
and select Properes > Members.
4. Add the service account then click Check Names to validate that you have the proper
object name.
PAN-OS® Administrator’s Guide Version 10.1 708 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 709 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 6 | Assign account permissions to the installaon folder to allow the service account to access
the agent’s installaon folder to read the configuraon and write logs.
You only need to perform this step if the service account you configured for the User-ID agent
is not either a domain administrator or a local administrator on the User-ID agent server host.
1. From the Windows Explorer, navigate to C:\Program Files(x86)\Palo Alto
Networks, right-click the folder, and select Properes.
2. On the Security tab, click Edit.
3. Add the User-ID agent service account and Allow permissions to Modify, Read &
execute, List folder contents, Read, and Write, and then click OK to save the account
sengs.
If you do not want to configure individual permissions, you can Allow the Full
Control permission instead.
PAN-OS® Administrator’s Guide Version 10.1 710 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 7 | To allow the agent to make configuraon changes (for example, if you select a different
logging level), give the service account permissions to the User-ID agent registry sub-tree.
1. Select Start > Run and enter regedt32 and navigate to the Palo Alto Networks sub-tree
in one of the following locaons:
• 32-bit systems—HKEY_LOCAL_MACHINE\Software\Palo Alto Networks
• 64-bit systems—HKEY_LOCAL_MACHINE\Software\WOW6432Node\PaloAlto
Networks
2. Right-click the Palo Alto Networks node and select Permissions.
3. Assign the User-ID service account Full Control and then click OK to save the seng.
PAN-OS® Administrator’s Guide Version 10.1 711 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 712 ©2022 Palo Alto Networks, Inc.
User-ID
privilege using Group Policies or by using a Managed Service account (refer to Microso
TechNet for more informaon).
1. Select Group Policy Management Editor > Default Domain Policy > Computer
Configuraon > Policies > Windows Sengs > Security Sengs > User Rights
Assignment.
2. For Deny log on as a batch job, Deny log on locally, and Deny log on through Remote
Desktop Services, right-click Properes.
3. Select Define these policy sengs > Add User or Group and add the service account
name, then click OK.
• Deny remote access for the User-ID service account—This prevents an aacker from using
the account to access your network from the outside the network.
1. Select Start > Run, enter MMC, and select File > Add/Remove Snap-in > Acve Directory
Users and Computers > Users.
2. Right-click the service account name, then select Properes.
3. Select Dial-in, then Deny the Network Access Permission.
PAN-OS® Administrator’s Guide Version 10.1 713 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 9 | As a next step, Configure User Mapping Using the Windows User-ID Agent.
The following workflow details all required privileges and provides guidance for the User-
ID features which require privileges that could pose a threat so that you can decide how to
best idenfy users without compromising your overall security posture.
PAN-OS® Administrator’s Guide Version 10.1 714 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | If you want to use Server Monitoring to idenfy users, add the service account to the Event
Log Reader builn group to allow the service account to read the security log events.
1. On the domain controller or Exchange server that contains the logs you want the User-
ID agent to read, or on the member server that receives events from Windows log
forwarding, select Start > Run, enter MMC.
2. Select File > Add/Remove Snap-in > Acve Directory Users and Computers > Add, then
click OK to run the MMC and launch the Acve Directory Users and Computers snap-in.
3. Navigate to the Builn folder for the domain, right-click the Event Log Readers group,
and select Properes > Members.
4. Add the service account then click Check Names to validate that you have the proper
object name.
PAN-OS® Administrator’s Guide Version 10.1 715 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | If you want to use WMI to collect user data, assign DCOM privileges to the service account
so that it can use WMI queries on monitored servers.
1. Select Acve Directory Users and Computers > <your domain> > Builn > Distributed
COM Users.
2. Right-click Properes > Members > Add and enter the service account name.
PAN-OS® Administrator’s Guide Version 10.1 716 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 4 | If you plan to use WMI probing, enable the service account to read the CIMV2 namespace on
the domain controllers you want to monitor and assign the required permissions on the client
systems to be probed.
Do not enable client probing on high-security networks. Client probing can generate
a large amount of network traffic and can pose a security threat when misconfigured.
Instead collect user mapping informaon from more isolated and trusted sources, such
as domain controllers and through integraons with Syslog or the XML API, which have
the added benefit of allowing you to safely capture user mapping informaon from any
device type or operang system, instead of just Windows clients.
Perform this task on each client system that the User-ID agent will probe for user mapping
informaon:
1. Right-click the Windows icon ( ), Search for wmimgmt.msc, and launch the WMI
Management Console.
2. In the console tree, right-click WMI Control and select Properes.
3. Select the Security tab, then select Root > CIMV2, and click the Security buon.
4. Add the name of the service account you created, Check Names to verify your entry, and
click OK.
You might have to change the Locaons or click Advanced to query for account
names. See the dialog help for details.
PAN-OS® Administrator’s Guide Version 10.1 717 ©2022 Palo Alto Networks, Inc.
User-ID
5. In the Permissions for <Username> secon, Allow the Enable Account and Remote
Enable permissions.
6. Click OK twice.
7. Use the Local Users and Groups MMC snap-in (lusrmgr.msc) to add the service account
to the local Distributed Component Object Model (DCOM) Users and Remote Desktop
Users groups on the system that will be probed.
STEP 5 | (Not Recommended) To allow the agent to monitor user sessions to poll Windows servers for
user mapping informaon, assign Server Operator privileges to the service account.
Because this group also has privileges for shung down and restarng servers, only
assign the account to this group if monitoring user sessions is very important.
1. Select Acve Directory Users and Computers > <your domain> > Builn > Server
Operators Group.
2. Right-click Properes > Members > Add add service account name
PAN-OS® Administrator’s Guide Version 10.1 718 ©2022 Palo Alto Networks, Inc.
User-ID
privilege using Group Policies or by using a Managed Service account (refer to Microso
TechNet for more informaon).
1. Select Group Policy Management Editor > Default Domain Policy > Computer
Configuraon > Policies > Windows Sengs > Security Sengs > User Rights
Assignment.
2. For Deny log on as a batch job, Deny log on locally, and Deny log on through Remote
Desktop Services, right-click Properes, then select Define these policy sengs > Add
User or Group and add the service account name, then click OK.
• Deny remote access for the User-ID service account—This prevents an aacker from using
the account to access your network from the outside the network.
1. Start > Run, enter MMC, and select File > Add/Remove Snap-in > Acve Directory Users
and Computers > Users.
2. Right-click the service account name, then select Properes.
3. Select Dial-in, then Deny the Network Access Permission.
PAN-OS® Administrator’s Guide Version 10.1 719 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 7 | As a next step, Configure User Mapping Using the PAN-OS Integrated User-ID Agent.
For informaon about the system requirements for installing the Windows-based User-
ID agent and for informaon on supported server OS versions, refer to the User-ID agent
release notes and the Palo Alto Networks Compability Matrix.
PAN-OS® Administrator’s Guide Version 10.1 720 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 1 | Create a dedicated Acve Directory service account for the User-ID agent to access the
services and hosts it will monitor to collect user mappings.
Create a Dedicated Service Account for the User-ID Agent and grant the necessary
permissions for the Windows User-ID agent.
1. Enable the service account to log on as a service by configuring either local or group
policy.
1. To configure the group policy if you are installing Windows-based User-ID agents
on mulple servers, select Group Policy Management > Default Domain Policy >
PAN-OS® Administrator’s Guide Version 10.1 721 ©2022 Palo Alto Networks, Inc.
User-ID
Computer Configuraon > Policies > Windows Sengs > Security Sengs > Local
Policies > User Rights Assignment for the Windows server that is the agent host.
2. Right-click Log on as a service, then select Properes.
3. Add the service account username or builn group (Administrators have this privilege
by default).
1. To assign permissions locally, select Control Panel > Administrave Tools > Local
Security Policy.
2. Select Local Policies > User Rights Assignment > Log on as a service.
PAN-OS® Administrator’s Guide Version 10.1 722 ©2022 Palo Alto Networks, Inc.
User-ID
4. Enter the service account name in domain\username format in the Enter the object
names to select entry field and click OK.
PAN-OS® Administrator’s Guide Version 10.1 723 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 724 ©2022 Palo Alto Networks, Inc.
User-ID
log forwarding, run the MMC and launch the Acve Directory Users and Computers
snap-in.
2. Navigate to the Builn folder for the domain, right-click the Event Log Reader group
and select Add to Group to open the properes dialog.
3. Click Add and enter the name of the service account that you configured the User-ID
service to use and then click Check Names to validate that you have the proper object
name.
4. Click OK twice to save the sengs.
5. Confirm that the builn Event Log Reader group lists the service account as a member.
3. Assign account permissions to the installaon folder to allow the service account to
access the agent’s installaon folder to read the configuraon and write logs.
You only need to perform this step if the service account you configured for the User-ID
agent is not either a domain administrator or a local administrator on the User-ID agent
server host.
1. From the Windows Explorer, navigate to C:\Program Files(x86)\Palo Alto
Networks for 32-bit systems, right-click the folder, and select Properes.
2. On the Security tab, click Edit.
PAN-OS® Administrator’s Guide Version 10.1 725 ©2022 Palo Alto Networks, Inc.
User-ID
3. Add the User-ID agent service account and assign it permissions to Modify, Read &
execute, List folder contents, Read, and Write, and then click OK to save the account
sengs.
If you want to allow the service account to access the User-ID agent’s registry
keys, Allow the Full Control permission.
4. Give the service account permissions to the User-ID Agent registry sub-tree:
1. Run regedt32 and navigate to the Palo Alto Networks sub-tree in the following
locaon: HKEY_LOCAL_MACHINE\Software\Palo Alto Networks.
2. Right-click the Palo Alto Networks node and select Permissions.
3. Assign the User-ID service account Full Control and then click OK to save the seng.
PAN-OS® Administrator’s Guide Version 10.1 726 ©2022 Palo Alto Networks, Inc.
User-ID
Do not use the User-ID agent installed on the RODC to map IP addresses to users. The
User-ID agent installer for credenal detecon is named UaCredInstall64-x.x.x.msi.
Install the User-ID agent version that is the same as the PAN-OS version running on
the firewalls. If there is not a User-ID agent version that matches the PAN-OS version,
install the latest version that is closest to the PAN-OS version.
C:\Users\administrator.acme>cd Desktop
PAN-OS® Administrator’s Guide Version 10.1 727 ©2022 Palo Alto Networks, Inc.
User-ID
C:\Users\administrator.acme\Desktop>UaInstall-6.0.0-1.msi
3. Follow the setup prompts to install the agent using the default sengs. By default, the
agent gets installed to C:\Program Files(x86)\Palo Alto Networks, but you
can Browse to a different locaon.
4. When the installaon completes, Close the setup window.
You must run the User-ID Agent applicaon as an administrator to install the
applicaon, commit configuraon changes, or uninstall the applicaon.
STEP 6 | (Oponal) Change the service account that the User-ID agent uses to log in.
By default, the agent uses the administrator account used to install the .msi file. To change the
account to a restricted account:
1. Select User Idenficaon > Setup and click Edit.
2. Select the Authencaon tab and enter the service account name that you want the
User-ID agent to use in the User name for Acve Directory field.
3. Enter the Password for the specified account.
4. Commit the changes to the User-ID agent configuraon to restart the service using the
service account credenals.
PAN-OS® Administrator’s Guide Version 10.1 728 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 7 | (Oponal) Assign your own cerficates for mutual authencaon between the Windows
User-ID agent and the firewall.
1. Obtain your cerficate for the Windows User-ID agent using one of the following
methods. Upload the server cerficate in Privacy Enhanced Mail (PEM) format and the
server cerficate’s encrypted key.
• Generate a Cerficate and export it for upload to the Windows User-ID agent.
• Export a cerficate from your enterprise cerficate authority (CA) and the upload it to
the Windows User-ID agent.
2. Add a server cerficate to Windows User-ID agent.
1. On the Windows User-ID agent, select Server Cerficate and click Add.
2. Enter the path and name of the cerficate file received from the CA or browse to the
cerficate file.
3. Enter the private key passphrase.
4. Click OK and then Commit.
3. Upload a cerficate to the firewall to validate the Windows User-ID agent’s identy.
4. Configure the cerficate profile for the client device (firewall or Panorama).
1. Select Device > Cerficate Management > Cerficate Profile.
2. Configure a Cerficate Profile.
You can only assign one cerficate profile for Windows User-ID agents and
Terminal Server (TS) agents. Therefore, your cerficate profile must include all
cerficate authories that issued cerficates uploaded to connected User-ID
and TS agents.
5. Assign the cerficate profile on the firewall.
1. Select Device > User Idenficaon > Connecon Security and click the edit buon.
2. Select the User-ID Cerficate Profile you configured in the previous step.
3. Click OK.
6. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 729 ©2022 Palo Alto Networks, Inc.
User-ID
For informaon about the server OS versions supported by the User-ID agent, refer to
“Operang System (OS) Compability User-ID Agent” in the User-ID Agent Release
Notes.
STEP 1 | Define the servers the User-ID agent will monitor to collect IP address to user mapping
informaon.
The User-ID agent can monitor up to 100 servers, of which up to 50 can be syslog senders.
To collect all of the required mappings, the User-ID agent must connect to all servers
that your users log in to in order to monitor the security log files on all servers that
contain login events.
Auto-discovery locates domain controllers in the local domain only; you must
manually add Exchange servers, eDirectory servers, and syslog senders.
7. (Oponal) To tune the frequency at which the firewall polls configured servers for
mapping informaon, select User Idenficaon > Setup and Edit the Setup secon. On
the Server Monitor tab, modify the value in the Server Log Monitor Frequency (seconds)
field. Increase the value in this field to 5 seconds in environments with older Domain
Controllers or high-latency links.
Ensure that the Enable Server Session Read seng is not selected. This seng
requires that the User-ID agent have an Acve Directory account with Server
Operator privileges so that it can read all user sessions. Instead, use a syslog or
XML API integraon to monitor sources that capture login and logout events
for all device types and operang systems (instead of just Windows), such as
wireless controllers and Network Access Controllers (NACs).
8. Click OK to save the sengs.
PAN-OS® Administrator’s Guide Version 10.1 730 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | Specify the subnetworks the Windows User-ID agent should include in or exclude from User-
ID.
By default, the User-ID maps all users accessing the servers you are monitoring.
As a best pracce, always specify which networks to include and exclude from User-
ID to ensure that the agent is only communicang with internal resources and to
prevent unauthorized users from being mapped. You should only enable User-ID on the
subnetworks where users internal to your organizaon are logging in.
If you add Exclude profiles without adding any Include profiles, the User-ID
agent excludes all subnetworks, not just the ones you added.
4. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 731 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | (Oponal) If you configured the agent to connect to a Novell eDirectory server, you must
specify how the agent should search the directory.
1. Select User Idenficaon > Setup and click Edit in the Setup secon of the window.
2. Select the eDirectory tab and then complete the following fields:
• Search Base—The starng point or root context for agent queries, for example:
dc=domain1,dc=example, dc=com.
• Bind Disnguished Name—The account to use to bind to the directory, for example:
cn=admin,ou=IT, dc=domain1, dc=example, dc=com.
• Bind Password—The bind account password. The agent saves the encrypted password
in the configuraon file.
• Search Filter—The search query for user entries (default is objectClass=Person).
• Server Domain Prefix—A prefix to uniquely idenfy the user. This is only required if
there are overlapping name spaces, such as different users with the same name from
two different directories.
• Use SSL—Select the check box to use SSL for eDirectory binding.
• Verify Server Cerficate—Select the check box to verify the eDirectory server
cerficate when using SSL.
1. On the Client Probing tab, deselect the Enable WMI Probing check box if it is enabled.
2. Deselect the Enable NetBIOS Probing check box if it is enabled.
Palo Alto Network strongly recommends that you collect user mapping
informaon from isolated and trusted sources, such as domain controllers
or integraons with Syslog or the XML API, to safely capture user mapping
informaon from any device type or operang system.
If you must enable client probing, select the Enable WMI Probing check box and
on the Client Probing tab. Due to the potenal security risks of this method, only
select the Enable NetBIOS Probing check box if the firewall cannot obtain user
mappings using any other method. Then add a remote administraon excepon
to the Windows firewall for each probed client to ensure the Windows firewall
will allow client probing. Each probed client PC must allow port 139 in the
Windows firewall and must also have file and printer sharing services enabled.
PAN-OS® Administrator’s Guide Version 10.1 732 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 6 | (Oponal) Define the set of users for which you do not need to provide IP address-to-
username mappings, such as kiosk accounts.
Save the ignore-user list as a text document on the agent host using the tle
ignore_user_list and use the .txt file extension to save it to the User-ID Agent folder on
the domain server where the agent is installed.
List the user accounts to ignore; there is no limit to the number of accounts you can add to the
list. Each user account name must be on a separate line. For example:
SPAdmin
SPInstall
TFSReport
You can use an asterisk as a wildcard character to match mulple usernames, but only as
the last character in the entry. For example, corpdomain\it-admin* would match all
administrators in the corpdomain domain whose usernames start with the string it‑admin.
You can also use the ignore-user list to idenfy users whom you want to force to
authencate using Authencaon Portal.
Aer adding entries to the Ignore User list, you must stop and restart the connecon to
the service.
The firewall can connect to only one Windows-based User-ID agent that is using the
User-ID credenal service add-on to detect corporate credenal submissions. See
Configure Credenal Detecon with the Windows-based User-ID Agent for more
details on how to use this service for credenal phishing prevenon.
Complete the following steps on each firewall you want to connect to the User-ID agent to
receive user mappings:
1. Select Device > Data Redistribuon > Agents and click Add.
2. Enter a Name for the agent.
3. Add an Agent Using the Host and Port.
4. Enter the IP address of the Windows Host on which the User-ID Agent is installed.
5. Enter the Port number (1-65535) on which the agent will listen for user mapping
requests. This value must match the value configured on the User-ID agent. By default,
the port is set to 5007 on the firewall and on newer versions of the User-ID agent.
However, some older User-ID agent versions use port 2010 as the default.
6. Select IP User Mappings as the Data type.
7. Make sure that the configuraon is Enabled, then click OK.
8. Commit the changes.
9. Verify that the Connected status displays as connected (a green light).
PAN-OS® Administrator’s Guide Version 10.1 733 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 8 | Verify that the User-ID agent is successfully mapping IP addresses to usernames and that the
firewalls can connect to the agent.
1. Launch the User-ID agent and select User Idenficaon.
2. Verify that the agent status shows Agent is running. If the Agent is not running, click
Start.
3. To verify that the User-ID agent can connect to monitored servers, make sure the Status
for each Server is Connected.
4. To verify that the firewalls can connect to the User-ID agent, make sure the Status for
each of the Connected Devices is Connected.
5. To verify that the User-ID agent is mapping IP addresses to usernames, select Monitoring
and make sure that the mapping table is populated. You can also Search for specific
users, or Delete user mappings from the list.
PAN-OS® Administrator’s Guide Version 10.1 734 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | Define the servers that the firewall will monitor to collect user mapping informaon.
Within the total maximum of 100 monitored servers per firewall, you can define no more than
50 syslog senders for any single virtual system.
To collect all the required mappings, the firewall must connect to all servers that your
users log in to so that the firewall can monitor the Security log files on all servers that
contain login events.
If you are using WinRM with Kerberos, you must enter a fully qualified domain
name (FDQN). If you want to use WinRM with basic authencaon or use
WMI to monitor the server, you can enter an IP address or FQDN.
To monitor servers using WMI, specify an IP address, the service account name
(if all server monitoring is in the same domain), or a fully qualified domain
name (FQDN). If you specify an FQDN, use the down-level logon name in the
(DLN)\sAMAccountName format instead of the FQDN\sAMAccountName
format. For example, use example\user.services not example.com
\user.services. If you specify an FQDN, the firewall will aempt to
authencate using Kerberos, which does not support WMI.
7. (Syslog Sender only) If you select Syslog Sender as the server Type, Configure the PAN-
OS Integrated User-ID Agent as a Syslog Listener.
8. (Novell eDirectory only) Make sure the Server Profile you select is Enabled and click OK.
PAN-OS® Administrator’s Guide Version 10.1 735 ©2022 Palo Alto Networks, Inc.
User-ID
The auto-discovery feature is for domain controllers only; you must manually
add any Exchange servers or eDirectory servers you want to monitor.
STEP 3 | (Oponal) Specify the frequency at which the firewall polls Windows servers for mapping
informaon. This is the interval between the end of the last query and the start of the next
query.
If the domain controller is processing many requests, delays between queries may
exceed the specified value.
Ensure that the Enable Session opon is not enabled. This opon requires that
the User-ID agent have an Acve Directory account with Server Operator
privileges so that it can read all user sessions. Instead, use a Syslog or XML
API integraon to monitor sources that capture login and logout events for all
device types and operang systems (instead of just Windows), such as wireless
controllers and network access control (NAC) devices.
3. Click OK to save your changes.
STEP 4 | Specify the subnetworks that the PAN-OS integrated User-ID agent should include in or
exclude from user mapping.
By default, the User-ID maps all users accessing the servers you are monitoring.
As a best pracce, always specify which networks to include and, oponally, which
networks to exclude from User-ID to ensure that the agent is communicang only
with internal resources and to prevent unauthorized users from being mapped. You
should enable user mapping only on the subnetworks where users internal to your
organizaon are logging in.
PAN-OS® Administrator’s Guide Version 10.1 736 ©2022 Palo Alto Networks, Inc.
User-ID
exclude 10.2.50.0/22, the agent will map users on all the subnetworks of 10.0.0.0/8
except 10.2.50.0/22 and will exclude all subnetworks outside of 10.0.0.0/8.
If you add Exclude profiles without adding any Include profiles, the User-ID
agent excludes all subnetworks, not just the ones you added.
4. Click OK.
STEP 5 | Set the domain credenals for the account that the firewall will use to access Windows
resources. This is required for monitoring Exchange servers and domain controllers as well as
for WMI probing.
1. Edit the Palo Alto Networks User-ID Agent Setup.
2. Select the Server Monitor Account tab and enter the User Name and Password for the
service account that the User-ID agent will use to probe the clients and monitor servers.
Enter the username using the domain\username syntax.
3. If you are using WinRM to monitor servers, configure the firewall to authencate with
the server you are monitoring.
• If you want to use WinRM with basic authencaon, enable WinRM on the server,
configure basic authencaon, and specify the service account Domain’s DNS Name.
• If you want to use WinRM with Kerberos, Configure a Kerberos server profile if you
have not already done so and then select the Kerberos Server Profile.
STEP 6 | (Oponal, not recommended) Configure WMI probing (the PAN-OS integrated User-ID agent
does not support NetBIOS probing).
Do not enable WMI probing on high-security networks. Client probing can generate a
large amount of network traffic and can pose a security threat when misconfigured.
If the request load is high, the observed delay between requests might
significantly exceed the specified interval.
3. Click OK.
4. Make sure the Windows firewall will allow client probing by adding a remote
administraon excepon to the Windows firewall for each probed client.
PAN-OS® Administrator’s Guide Version 10.1 737 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 7 | (Oponal) Define the set of user accounts that don’t require IP address-to-username
mappings, such as kiosk accounts.
Define the ignore user list on the firewall that is the User-ID agent, not the client. If
you define the ignore user list on the client firewall, the users in the list are sll mapped
during redistribuon.
On the Ignore User List tab, Add each username you want to exclude from user mapping. You
can also use the ignore user list to idenfy the users you want to force to use Authencaon
Portal to authencate. You can use an asterisk as a wildcard character to match mulple
usernames but only as the last character in the entry. For example, corpdomain\it-admin*
would match all administrators in the corpdomain domain whose usernames start with the
string it‑admin. You can add up to 5,000 entries to exclude from user mapping.
3. On the Device > User Idenficaon > User Mapping tab in the web interface, verify that
the Status of each server you configured for server monitoring is Connected.
PAN-OS® Administrator’s Guide Version 10.1 738 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 1 | Configure the service account with Remote Management User and CIMV2 privileges for the
server you want to monitor.
STEP 2 | On the Windows server you are monitoring, obtain the thumbprint from the cerficate for
the Windows server to use with WinRM and enable WinRM.
Ensure that you use an account with administrator privileges to configure WinRM on
the server you want to monitor. As a best pracce for security, this account should not
be the same account as the service account in Step 1.
1. Verify the cerficate is installed in the Local Computer cerficate store (Cerficates
(Local Computer) > Personal > Cerficates).
If you do not see the Local Computer cerficate store, launch the Microso Management
Console (Start > Run > MMC) and add the Cerficates snap-in (File > Add/Remove
Snap-in > Cerficates > Add > Computer account > Next > Finish).
2. Open the cerficate and select General > Details > Show: <All>.
3. Select the Thumbprint and copy it.
4. To enable the firewall to connect to the Windows server using WinRM, enter the
following command: winrm quickconfig.
5. Enter y to confirm the changes and then confirm the output displays WinRM service
started.
If WinRM is enabled, the output displays WinRM service is already running
on this machine. You will be prompted to confirm any addional required
configuraon changes.
6. To verify that WinRM is communicang using HTTPS, enter the following command:
winrm enumerate winrm/config/listener and confirm that the output displays
Transport = HTTPS.
By default, WinRM/HTTPS uses port 5986.
7. From the Windows server command prompt, enter the following command:
winrm create winrm/config/Listener?Address=*+Transport=HTTPS
@{Hostname=”<hostname>";CertificateThumbprint=”Certificate
Thumbprint"}, where hostname is the hostname of the Windows server and Cerficate
Thumbprint is the value you copied from the cerficate.
Use the command prompt (not Powershell) and remove any spaces in the
Cerficate Thumbprint to ensure that WinRM can validate the cerficate.
8. From the Windows server command prompt, enter the following command:
PAN-OS® Administrator’s Guide Version 10.1 739 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | Enable Basic Authencaon between the PAN-OS integrated User-ID agent and the
monitored servers.
1. Select Device > User Idenficaon > User Mapping > Palo Alto Networks User-ID
Agent Setup > Server Monitor Account.
2. In domain\username format, enter the User Name for the service account that the
User-ID agent will use to monitor servers.
3. Enter the Domain’s DNS Name of the server monitor account.
4. Enter the Password and Confirm Password for the service account.
5. Click OK
STEP 4 | Configure server monitoring for the PAN-OS integrated User-ID agent.
1. Select the Microso server Type (Microso Acve Directory or Microso Exchange).
2. Select Win-RM-HTTPS as the Transport Protocol to use Windows Remote Management
(WinRM) over HTTPS to monitor the server security logs and session informaon.
STEP 5 | To enable the PAN-OS integrated User-ID agent to communicate with the monitored servers
using WinRM-HTTPS, verify that you successfully imported the root cerficate for the
PAN-OS® Administrator’s Guide Version 10.1 740 ©2022 Palo Alto Networks, Inc.
User-ID
service cerficates that the Windows server uses for WinRM on to the firewall and associate
the cerficate with the User-ID Cerficate Profile.
1. Select Device > User Idenficaon > Connecon Security.
2. Click Edit.
3. Select the Windows server cerficate to use for the User-ID Cerficate Profile.
4. Click OK.
STEP 7 | Verify that the status of each monitored server is Connected (Device > User Idenficaon >
User Mapping).
STEP 1 | Configure the service account with Remote Management User and CIMV2 privileges for the
server you want to monitor.
PAN-OS® Administrator’s Guide Version 10.1 741 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | Confirm that WinRM is enabled on the Windows server you are monitoring.
Ensure that you use an account with administrator privileges to configure WinRM on
the server you want to monitor. As a best pracce for security, this account should not
be the same account as the service account in Step 1.
1. To enable the firewall to connect to the Windows server using WinRM, enter the
following command: winrm quickconfig.
2. Enter y to confirm the changes and then confirm the output displays WinRM service
started.
If WinRM is enabled, the output displays WinRM service is already running
on this machine. You will be prompted to confirm any addional required
configuraon changes.
3. To verify that WinRM is communicang using HTTP, enter the following command:
winrm enumerate winrm/config/listener and confirm that the output displays
Transport = HTTP.
By default, WinRM/HTTP uses port 5985.
4. Enter the following command: winrm get winrm/config/service/Auth and
confirm that Kerberos = true.
STEP 3 | Enable the PAN-OS integrated User-ID agent and the monitored servers to authencate
using Kerberos.
1. If you did not do so during the inial configuraon, configure date and me (NTP)
sengs to ensure successful Kerberos negoaon.
2. Configure a Kerberos server profile on the firewall to authencate with the server to
monitor the security logs and session informaon.
3. Select Device > User Idenficaon > User Mapping > Palo Alto Networks User-ID
Agent Setup > Server Monitor Account.
4. In domain\username format, enter the User Name for the service account that the
User-ID agent will use to monitor servers.
5. Enter the Domain’s DNS Name of the server monitor account.
Kerberos uses the domain name to locate the service account.
6. Enter the Password and Confirm Password for the service account.
7. Select the Kerberos Server Profile you configured in Step 3.2.
8. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 742 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 4 | Configure server monitoring for the PAN-OS integrated User-ID agent.
1. Configure the Microso server type (Microso Acve Directory or Microso Exchange).
2. Select WinRM-HTTP as the Transport Protocol to use Windows Remote Management
(WinRM) over HTTP to monitor the server security logs and session informaon.
STEP 6 | Verify that the status of each monitored server is Connected (Device > User Idenficaon >
User Mapping).
STEP 1 | Configure the service account with Remote Management User and CIMV2 privileges for the
server you want to monitor.
PAN-OS® Administrator’s Guide Version 10.1 743 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | On the Windows server you are monitoring, obtain the thumbprint from the cerficate for
the Windows server to use with WinRM and enable WinRM.
Ensure that you use an account with administrator privileges to configure WinRM on
the server you want to monitor. As a best pracce for security, this account should not
be the same account as the service account in Step 1.
1. Verify the cerficate is installed in the Local Computer cerficate store (Cerficates
(Local Computer) > Personal > Cerficates).
If you do not see the Local Computer cerficate store, launch the Microso Management
Console (Start > Run > MMC) and add the Cerficates snap-in (File > Add/Remove
Snap-in > Cerficates > Add > Computer account > Next > Finish).
2. Open the cerficate and select General > Details > Show: <All>.
3. Select the Thumbprint and copy it.
4. To enable the firewall to connect to the Windows server using WinRM, enter the
following command: winrm quickconfig.
5. Enter y to confirm the changes and then confirm the output displays WinRM service
started.
If WinRM is enabled, the output displays WinRM service is already running
on this machine. You will be prompted to confirm any addional required
configuraon changes.
6. To verify that WinRM is communicang using HTTPS, enter the following command:
winrm enumerate winrm/config/listener. Then confirm that the output
displays Transport = HTTPS.
By default, WinRM/HTTPS uses 5986.
7. From the Windows server command prompt, enter the following command:
winrm create winrm/config/Listener?Address=*+Transport=HTTPS
@{Hostname=”<hostname>";CertificateThumbprint=”Certificate
Thumbprint"}, where hostname is the hostname of the Windows server and Cerficate
Thumbprint is the value you copied from the cerficate.
Use the command prompt (not Powershell) and remove any spaces in the
Cerficate Thumbprint to ensure that WinRM can validate the cerficate.
8. Enter the following command: winrm get winrm/config/service/Auth and
confirm that Basic = false and Kerberos= true.
PAN-OS® Administrator’s Guide Version 10.1 744 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | Enable the PAN-OS integrated User-ID agent and the monitored servers to authencate
using Kerberos.
1. If you did not do so during the inial configuraon, configure date and me (NTP)
sengs to ensure successful Kerberos negoaon.
2. Configure a Kerberos server profile on the firewall to authencate with the server to
monitor the security logs and session informaon.
3. Select Device > User Idenficaon > User Mapping > Palo Alto Networks User-ID
Agent Setup > Server Monitor Account.
4. In domain\username format, enter the User Name for the service account that the
User-ID agent will use to monitor servers.
5. Enter the Domain’s DNS Name of the server monitor account.
Kerberos uses the domain name to locate the service account.
6. Enter the Password and Confirm Password for the service account.
7. Select the Kerberos Server Profile you created in Step 3.2.
8. Click OK.
STEP 4 | Configure server monitoring for the PAN-OS integrated User-ID agent.
1. Configure the Microso server type (Microso Acve Directory or Microso Exchange).
2. Select Win-RM-HTTPS as the Transport Protocol to use Windows Remote Management
(WinRM) over HTTPS to monitor the server security logs and session informaon.
PAN-OS® Administrator’s Guide Version 10.1 745 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 5 | To enable the PAN-OS integrated User-ID agent to communicate with the monitored servers
using WinRM-HTTPS, verify that you successfully imported the root cerficate for the
service cerficates that the Windows server uses for WinRM on to the firewall and associate
the cerficate with the User-ID Cerficate Profile.
The firewall uses the same cerficate to authencate with all monitored servers.
1. Select Device > User Idenficaon > Connecon Security.
2. Click Edit.
3. Select the Windows server cerficate to use for the User-ID Cerficate Profile.
4. Click OK.
5. Commit your changes.
STEP 6 | Verify that the status of each monitored server is Connected (Device > User Idenficaon >
User Mapping).
PAN-OS® Administrator’s Guide Version 10.1 746 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 1 | Determine whether there is a predefined Syslog Parse profile for your parcular syslog
senders.
Palo Alto Networks provides several predefined profiles through Applicaon content updates.
The predefined profiles are global to the firewall, whereas custom profiles apply to a single
virtual system only.
Any new Syslog Parse profiles in a given content release is documented in the
corresponding release note along with the specific regex used to define the filter.
STEP 2 | Define custom Syslog Parse profiles to create and delete user mappings.
Each profile filters syslog messages to idenfy either login events (to create user mappings) or
logout events (to delete mappings), but no single profile can do both.
1. Review the syslog messages that the syslog sender generates to idenfy the syntax for
login and logout events. This enables you to define the matching paerns when creang
Syslog Parse profiles.
While reviewing syslog messages, also determine whether they include the
domain name. If they don’t, and your user mappings require domain names,
enter the Default Domain Name when defining the syslog senders that the User-
ID agent monitors (later in this procedure).
2. Select Device > User Idenficaon > User Mapping and edit the Palo Alto Networks
User-ID Agent Setup.
3. Select Syslog Filters and Add a Syslog Parse profile.
4. Enter a name to idenfy the Syslog Parse Profile.
5. Select the Type of parsing to find login or logout events in syslog messages:
• Regex Idenfier—Regular expressions.
• Field Idenfier—Text strings.
The following steps describe how to configure these parsing types.
PAN-OS® Administrator’s Guide Version 10.1 747 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | (Regex Idenfier parsing only) Define the regex matching paerns.
If the syslog message contains a standalone space or tab as a delimiter, use \s for a
space and \t for a tab.
1. Enter the Event Regex for the type of events you want to find:
• Login events—For the example message, the regex (authentication\ success)
{1} extracts the first {1} instance of the string authenticationsuccess.
• Logout events—For the example message, the regex (logout\ successful){1}
extracts the first {1} instance of the string logoutsuccessful.
The backslash (\) before the space is a standard regex escape character that instructs the
regex engine not to treat the space as a special character.
2. Enter the Username Regex to idenfy the start of the username.
In the example message, the regex User:([a-zA-Z0-9\\\._]+) matches the string
User:johndoe1 and idenfies johndoe1 as the username.
3. Enter the Address Regex to idenfy the IP address poron of syslog messages.
In the example message, the regular expression Source:([0-9]{1,3}\.
[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}) matches the IPv4 address
Source:192.168.3.212.
The following is an example of a completed Syslog Parse profile that uses regex to
idenfy login events:
PAN-OS® Administrator’s Guide Version 10.1 748 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 749 ©2022 Palo Alto Networks, Inc.
User-ID
To select the TLS cerficate that the firewall uses to receive syslog messages,
select Device > User Idenficaon > User Mapping > Palo Alto Networks User-
ID Agent Setup. Edit the sengs and select Server Monitor, then select the
Syslog Service Profile that contains the TLS cerficate you want to the firewall
to use to receive syslog messages.
The PAN-OS integrated User-ID agent accepts syslogs over SSL and UDP only.
However, you must use cauon when using UDP to receive syslog messages
because it is an unreliable protocol and as such there is no way to verify that
a message was sent from a trusted syslog sender. Although you can restrict
syslog messages to specific source IP addresses, an aacker can sll spoof the IP
address, potenally allowing the injecon of unauthorized syslog messages into
the firewall.
Always use SSL to listen for syslog messages because the traffic is encrypted
(UDP sends the traffic in cleartext). If you must use UDP, make sure that the
syslog sender and client are both on a dedicated, secure network to prevent
untrusted hosts from sending UDP traffic to the firewall.
A syslog sender using SSL to connect will show a Status of Connected only when there is
an acve SSL connecon. Syslog senders using UDP will not show a Status value.
7. For each syslog format that the sender supports, Add a Syslog Parse profile to the Filter
list. Select the Event Type that each profile is configured to idenfy: login (default) or
logout.
8. (Oponal) If the syslog messages don’t contain domain informaon and your user
mappings require domain names, enter a Default Domain Name to append to the
mappings.
9. Click OK to save the sengs.
PAN-OS® Administrator’s Guide Version 10.1 750 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 6 | Enable syslog listener services on the interface that the firewall uses to collect user
mappings.
1. Select Network > Network Profiles > Interface Mgmt and edit an exisng Interface
Management profile or Add a new profile.
2. Select User-ID Syslog Listener-SSL or User-ID Syslog Listener-UDP or both, based on
the protocols you defined for the syslog senders in the Server Monitoring list.
The listening ports (514 for UDP and 6514 for SSL) are not configurable; they
are enabled through the management service only.
3. Click OK to save the interface management profile.
Even aer enabling the User-ID Syslog Listener service on the interface,
the interface only accepts syslog connecons from senders that have a
corresponding entry in the User-ID monitored servers configuraon. The firewall
discards connecons or messages from senders that are not on the list.
4. Assign the Interface Management profile to the interface that the firewall uses to collect
user mappings:
1. Select Network > Interfaces and edit the interface.
2. Select Advanced > Other info, select the Interface Management Profile you just
added, and click OK.
5. Commit your changes.
STEP 7 | Verify that the firewall adds and deletes user mappings when users log in and out.
You can use CLI commands to see addional informaon about syslog senders, syslog
messages, and user mappings.
1. Log in to a client system for which a monitored syslog sender generates login and logout
event messages.
2. Log in to the firewall CLI.
3. Verify that the firewall mapped the login username to the client IP address:
PAN-OS® Administrator’s Guide Version 10.1 751 ©2022 Palo Alto Networks, Inc.
User-ID
agent uses the profiles to find login and logout events in syslog messages. In environments where
syslog senders (the network services that authencate users) deliver syslog messages in different
formats, configure a profile for each syslog format. Syslog messages must meet certain criteria
for a User-ID agent to parse them (see Syslog). This procedure uses examples with the following
formats:
• Login events—[Tue Jul 5 13:15:04 2016 CDT] Administrator authentication
success User:johndoe1 Source:192.168.3.212
• Logout events—[Tue Jul 5 13:18:05 2016 CDT] User logout successful
User:johndoe1 Source:192.168.3.212
Aer configuring the Syslog Parse profiles, you specify the syslog senders that the User-ID agent
monitors.
The Windows User-ID agent accepts syslogs over TCP and UDP only. However, you
must use cauon when using UDP to receive syslog messages because it is an unreliable
protocol and as such there is no way to verify that a message was sent from a trusted
syslog sender. Although you can restrict syslog messages to specific source IP addresses,
an aacker can sll spoof the IP address, potenally allowing the injecon of unauthorized
syslog messages into the firewall. As a best pracce, use TCP instead of UDP. In either
case, make sure that the syslog sender and client are both on a dedicated, secure VLAN to
prevent untrusted hosts from sending syslogs to the User-ID agent.
STEP 2 | Define custom Syslog Parse profiles to create and delete user mappings.
Each profile filters syslog messages to idenfy either login events (to create user mappings) or
logout events (to delete mappings), but no single profile can do both.
1. Review the syslog messages that the syslog sender generates to idenfy the syntax for
login and logout events. This enables you to define the matching paerns when creang
Syslog Parse profiles.
While reviewing syslog messages, also determine whether they include the
domain name. If they don’t, and your user mappings require domain names,
enter the Default Domain Name when defining the syslog senders that the User-
ID agent monitors (later in this procedure).
2. Open the Windows Start menu and select User-ID Agent.
3. Select User Idenficaon > Setup and Edit the Setup.
4. Select Syslog, Enable Syslog Service, and Add a Syslog Parse profile.
5. Enter a Profile Name and Descripon.
6. Select the Type of parsing to find login and logout events in syslog messages:
• Regex—Regular expressions.
• Field—Text strings.
The following steps describe how to configure these parsing types.
PAN-OS® Administrator’s Guide Version 10.1 752 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 753 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 754 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 5 | Specify the syslog senders that the User-ID agent monitors.
Within the total maximum of 100 servers of all types that the User-ID agent can monitor, up to
50 can be syslog senders.
The User-ID agent discards any syslog messages received from senders that are not on this list.
1. Select User Idenficaon > Discovery and Add an entry to the Servers list.
2. Enter a Name to idenfy the sender.
3. Enter the Server Address of the syslog sender (IP address or FQDN).
4. Set the Server Type to Syslog Sender.
5. (Oponal) If you want to override the current domain in the username of your syslog
message or prepend the domain to the username if your syslog message doesn’t contain
a domain, enter a Default Domain Name.
6. For each syslog format that the sender supports, Add a Syslog Parse profile to the Filter
list. Select the Event Type that you configured each profile to idenfy—login (default) or
logout—and then click OK.
7. Click OK to save the sengs.
8. Commit your changes to the User-ID agent configuraon.
STEP 6 | Verify that the User-ID agent adds and deletes user mappings when users log in and out.
You can use CLI commands to see addional informaon about syslog senders, syslog
messages, and user mappings.
1. Log in to a client system for which a monitored syslog sender generates login and logout
event messages.
2. Verify that the User-ID agent mapped the login username to the client IP address:
1. In the User-ID agent, select Monitoring.
2. Enter the username or IP address in the filter field, Search, and verify that the list
displays the mapping.
3. Verify that the firewall received the user mapping from the User-ID agent:
1. Log in to the firewall CLI.
2. Run the following command:
If the firewall received the user mapping, the output resembles the following:
PAN-OS® Administrator’s Guide Version 10.1 755 ©2022 Palo Alto Networks, Inc.
User-ID
From: SYSLOG
No matched record
Kerberos SSO The firewall uses Kerberos single sign-on (SSO) to transparently
obtain user credenals from the browser. To use this method,
your network requires a Kerberos infrastructure, including a
key distribuon center (KDC) with an authencaon server
and cket granng service. The firewall must have a Kerberos
account.
PAN-OS® Administrator’s Guide Version 10.1 756 ©2022 Palo Alto Networks, Inc.
User-ID
Web Form The firewall redirects web requests to a web form for
authencaon. For this method, you can configure
Authencaon policy to use Mul-Factor Authencaon (MFA),
SAML, Kerberos, TACACS+, RADIUS, or LDAP authencaon.
Although users have to manually enter their login credenals,
this method works with all browsers and operang systems.
Client Cerficate The firewall prompts the browser to present a valid client
Authencaon cerficate to authencate the user. To use this method, you must
provision client cerficates on each user system and install the
trusted cerficate authority (CA) cerficate used to issue those
cerficates on the firewall.
Mode Descripon
PAN-OS® Administrator’s Guide Version 10.1 757 ©2022 Palo Alto Networks, Inc.
User-ID
Mode Descripon
If you use Kerberos SSO, you must use Redirect mode
because the browser will provide credenals only to trusted
sites. Redirect mode is also required if you use Mul-Factor
Authencaon to authencate Authencaon Portal users.
SSL Inbound Inspecon does not support Authencaon Portal redirect. To use
Authencaon Portal redirect and decrypon, you must use SSL Forward Proxy.
Based on their sensivity, the applicaons that users access through Authencaon Portal require
different authencaon methods and sengs. To accommodate all authencaon requirements,
you can use default and custom authencaon enforcement objects. Each object associates an
Authencaon rule with an authencaon profile and an Authencaon Portal authencaon
method.
• Default authencaon enforcement objects—Use the default objects if you want to associate
mulple Authencaon rules with the same global authencaon profile. You must configure
this authencaon profile before configuring Authencaon Portal, and then assign it
in the Authencaon Portal Sengs. For Authencaon rules that require Mul-Factor
Authencaon (MFA), you cannot use default authencaon enforcement objects.
• Custom authencaon enforcement objects—Use a custom object for each Authencaon
rule that requires an authencaon profile that differs from the global profile. Custom objects
are mandatory for Authencaon rules that require MFA. To use custom objects, create
authencaon profiles and assign them to the objects aer configuring Authencaon Portal—
when you Configure Authencaon Policy.
Keep in mind that authencaon profiles are necessary only if users authencate through a
Authencaon Portal Web Form or Kerberos SSO. Alternavely, or in addion to these methods,
the following procedure also describes how to implement Client Cerficate Authencaon.
If you use Authencaon Portal without the other User-ID funcons (user mapping and
group mapping), you don’t need to configure a User-ID agent.
STEP 1 | Configure the interfaces that the firewall will use for incoming web requests, authencang
users, and communicang with directory servers to map usernames to IP addresses.
When the firewall connects to authencaon servers or User-ID agents, it uses the
management interface by default. As a best pracce, isolate your management network by
configuring service routes to connect to the authencaon servers or User-ID agents.
1. (MGT interface only) Select Device > Setup > Interfaces, edit the Management interface,
select User-ID, and click OK.
2. (Non-MGT interface only) Assign an Interface Management Profile to the Layer 3
interface that the firewall will use for incoming web requests and communicaon
PAN-OS® Administrator’s Guide Version 10.1 758 ©2022 Palo Alto Networks, Inc.
User-ID
with directory servers. You must enable Response Pages and User-ID in the Interface
Management profile.
3. (Non-MGT interface only) Configure a service route for the interface that the firewall
will use to authencate users. If the firewall has more than one virtual system (vsys),
the service route can be global or vsys-specific. The services must include LDAP and
potenally the following:
• Kerberos, RADIUS, TACACS+, or Mul-Factor Authencaon—Configure a service
route for any authencaon services that you use.
• UID Agent—Configure this service only if you Enable User- and Group-Based Policy.
4. (Redirect mode only) Create a DNS address (A) record that maps the IP address on the
Layer 3 interface to the redirect host. If you will use Kerberos SSO, you must also add a
DNS pointer (PTR) record that performs the same mapping.
If your network doesn’t support access to the directory servers from any firewall interface, you
must Configure User Mapping Using the Windows User-ID Agent.
STEP 2 | Make sure Domain Name System (DNS) is configured to resolve your domain controller
addresses.
To verify proper resoluon, ping the server FQDN. For example:
PAN-OS® Administrator’s Guide Version 10.1 759 ©2022 Palo Alto Networks, Inc.
User-ID
If you don’t assign an SSL/TLS Service Profile, the firewall uses TLS 1.2 by
default. To use a different TLS version, configure an SSL/TLS Service Profile for
the TLS version you want to use.
5. Configure clients to trust the cerficate:
1. Export the CA cerficate you created or imported.
2. Import the cerficate as a trusted root CA into all client browsers, either by manually
configuring the browser or by adding the cerficate to the trusted roots in an Acve
Directory (AD) Group Policy Object (GPO).
1. Use a root CA cerficate to generate a client cerficate for each user who will
authencate through Authencaon Portal. The CA in this case is usually your enterprise
CA, not the firewall.
2. Export the CA cerficate in PEM format to a system that the firewall can access.
3. Import the CA cerficate onto the firewall: see Import a Cerficate and Private Key. Aer
the import, click the imported cerficate, select Trusted Root CA, and click OK.
4. Configure a Cerficate Profile.
• In the Username Field drop-down, select the cerficate field that contains the user
identy informaon.
• In the CA Cerficates list, click Add and select the CA cerficate you just imported.
PAN-OS® Administrator’s Guide Version 10.1 760 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 5 | (Oponal) Configure Authencaon Portal for the Apple Capve Network Assistant.
This step is only required if you are using Authencaon Portal with the Apple Capve
Network Assistant (CNA). To use Authencaon Portal with CNA, perform the following steps.
1. Verify you have specified an FQDN for the redirect host (not just an IP address).
2. Select an SSL/TLS service profile that uses a publicly-signed cerficate for the specified
FQDN.
3. Enter the following command to adjust the number of requests supported for
Authencaon Portal: set deviceconfig setting ctd cap-portal-ask-
requests <threshold-value>
By default, the firewall has a rate limit threshold for Authencaon Portal that limits the
number of requests to one request every two seconds. The CNA sends mulple requests
that can exceed this limit, which can result in a TCP reset and an error from the CNA. The
recommended threshold value is 5 (default is one). This value will allow up to 5 requests
every two seconds. Based on your environment, you may need to configure a different
value. If the current value is not sufficient to handle the number of requests, increase the
value.
PAN-OS® Administrator’s Guide Version 10.1 761 ©2022 Palo Alto Networks, Inc.
User-ID
firewall removes the mapping and any associated Authencaon Timestamps used to
evaluate the Timeout in Authencaon policy rules.
When evaluang the Authencaon Portal Timer and the Timeout value in each
Authencaon policy rule, the firewall prompts the user to re-authencate for
whichever seng expires first. Upon re-authencang, the firewall resets the
me count for the Authencaon Portal Timer and records new authencaon
mestamps for the user. Therefore, to enable different Timeout periods for
different Authencaon rules, set the Authencaon Portal Timer to a value the
same as or higher than any rule Timeout.
4. Select the SSL/TLS Service Profile you created for redirect requests over TLS. See
Configure an SSL/TLS Service Profile.
5. Select the Mode (in this example, Redirect).
6. (Redirect mode only) Specify the Redirect Host, which is the intranet hostname (a
hostname with no period in its name) that resolves to the IP address of the Layer 3
interface on the firewall to which web requests are redirected.
If users authencate through Kerberos single sign-on (SSO), the Redirect Host must be
the same as the hostname specified in the Kerberos keytab.
7. Select the fall back authencaon method to use:
• To use client cerficate authencaon, select the Cerficate Profile you created.
• To use global sengs for interacve or SSO authencaon, select the Authencaon
Profile you configured.
• To use Authencaon policy rule-specific sengs for interacve or SSO
authencaon, assign authencaon profiles to authencaon enforcement objects
when you Configure Authencaon Policy.
8. Click OK and Commit the Authencaon Portal configuraon.
PAN-OS® Administrator’s Guide Version 10.1 762 ©2022 Palo Alto Networks, Inc.
User-ID
For informaon about the terminal servers supported by the TS agent and the number of TS
agents supported on each firewall model, refer to the Palo Alto Networks Compability Matrix
and the Product Comparison Tool.
The following secons describe how to configure user mapping for terminal server users:
• Configure the Palo Alto Networks Terminal Server (TS) Agent for User Mapping
• Retrieve User Mappings from a Terminal Server Using the PAN-OS XML API
Configure the Palo Alto Networks Terminal Server (TS) Agent for User Mapping
Use the following procedure to install and configure the TS agent on the terminal server. To map
all your users, you must install the TS agent on all terminal servers to which your users log in.
If you are using TS agent 7.0 or a later version, disable any Sophos anvirus soware on
the TS agent host. Otherwise, the anvirus soware overwrites the source ports that the
TS agent allocates.
For informaon about default values, ranges, and other specificaons, refer to Configure
User Mapping for Terminal Server Users. For informaon about the terminal servers
supported by the TS agent and the number of TS agents supported on each firewall model,
refer to the Palo Alto Networks Compability Matrix.
PAN-OS® Administrator’s Guide Version 10.1 763 ©2022 Palo Alto Networks, Inc.
User-ID
C:\Users\administrator.acme>cd Desktop
C:\Users\administrator.acme\Desktop>TaInstall-9.0.0-1.msi
3. Follow the setup prompts to install the agent using the default sengs. The setup
installs the agent in C:\ProgramFiles\Palo Alto Networks\Terminal Server
Agent.
To ensure correct port allocaon, you must use the default Terminal Server agent
installaon folder locaon.
4. When the installaon completes, Close the setup dialog.
If you are upgrading to a TS agent version that has a newer driver than the
exisng installaon, the installaon wizard prompts you to reboot the system
aer you upgrade.
STEP 3 | Define the range of ports for the TS agent to allocate to end users.
The System Source Port Allocaon Range and System Reserved Source Ports specify
the range of ports that are allocated to non-user sessions. Make sure the values in
these fields do not overlap with the ports you designate for user traffic. These values
can be changed only by eding the corresponding Windows registry sengs. The TS
agent does not allocate ports for network traffic emied by session 0.
1. Open the Windows Start menu and select Terminal Server Agent to launch the Terminal
Server agent applicaon.
2. Configure (side menu) the agent.
3. Enter the Source Port Allocaon Range (default is 20,000-39,999). This is the full range
of port numbers that the TS agent will allocate for user mapping. The port range you
specify cannot overlap the System Source Port Allocaon Range.
4. (Oponal) If there are ports or port ranges within the source port allocaon that
you do not want the TS agent to allocate to user sessions, specify them as Reserved
Source Ports. To include mulple ranges, use commas with no spaces (for example:
2000-3000,3500,4000-5000).
5. Specify the number of ports to allocate to each individual user upon login to the terminal
server (Port Allocaon Start Size Per User); default is 200.
6. Specify the Port Allocaon Maximum Size Per User, which is the maximum number of
ports the Terminal Server agent can allocate to an individual user.
7. Specify whether to connue processing traffic from the user if the user runs out of
allocated ports. The Fail port binding when available ports are used up opon is enabled
by default, which indicates that the applicaon will fail to send traffic when all ports are
PAN-OS® Administrator’s Guide Version 10.1 764 ©2022 Palo Alto Networks, Inc.
User-ID
used. To enable users to connue using applicaons when they run out of ports, disable
(clear) this opon, but if you do, this traffic may not be idenfied with User-ID.
8. If the terminal server stops responding when you aempt to shut it down, enable the
Detach agent driver at shutdown opon.
STEP 4 | (Oponal) Assign your own cerficates for mutual authencaon between the TS agent and
the firewall.
1. Obtain your cerficate for the TS agent from your enterprise PKI or generate one
on your firewall. The private key of the server cerficate must be encrypted and the
cerficate must be uploaded in PEM file format. Perform one of the following tasks to
upload a cerficate:
• Generate a Cerficate and export it.
• Export a cerficate from your enterprise cerficate authority (CA).
2. Add a server cerficate to the TS agent.
1. On the TS agent, select Server Cerficate and Add a new cerficate.
2. Enter the path and name of the cerficate file received from the CA or browse to the
cerficate file.
3. Enter the private key password.
4. Click OK.
5. Commit your changes.
You can assign only one cerficate profile for Windows User-ID agents and
TS agents. Therefore, your cerficate profile must include all cerficate
authories that issued cerficates uploaded to connected Windows User-ID
and TS agents.
2. Select Device > User Idenficaon > Connecon Security.
3. Edit ( ) and select the cerficate profile you configured in the previous step as the
User-ID Cerficate Profile.
4. Click OK.
5. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 765 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 6 | Verify that the Terminal Server agent is successfully mapping IP addresses to usernames and
that the firewalls can connect to the agent.
1. Open the Windows Start menu and select Terminal Server Agent.
2. Verify that the firewalls can connect by making sure the Connecon Status of each
firewall in the Connecon List is Connected.
3. Verify that the Terminal Server agent is successfully mapping port ranges to usernames
(Monitor in the side menu) and confirm that the mapping table is populated.
PAN-OS® Administrator’s Guide Version 10.1 766 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 7 | (Windows 2012 R2 servers only) Disable Enhanced Protected Mode in Microso Internet
Explorer for each user who uses that browser.
This task is not necessary for other browsers, such as Google Chrome or Mozilla Firefox.
To disable Enhanced Protected Mode for all users, use Local Security Policy.
In Internet Explorer, Palo Alto Networks recommends that you do not disable
Protected Mode, which differs from Enhanced Protected Mode.
Retrieve User Mappings from a Terminal Server Using the PAN-OS XML API
The PAN-OS XML API uses standard HTTP requests to send and receive data. API calls can be
made directly from command line ulies such as cURL or using any scripng or applicaon
framework that supports RESTful services.
To enable a non-Windows terminal server to send user mapping informaon directly to the
firewall, create scripts that extract the user login and logout events and use them for input to
the PAN-OS XML API request format. Then define the mechanisms for subming the XML
API request(s) to the firewall using cURL or wget and providing the firewall’s API key for secure
communicaon. Creang user mappings from mul-user systems such as terminal servers requires
use of the following API messages:
• <multiusersystem>—Sets up the configuraon for an XML API Mul-user System on the
firewall. This message allows for definion of the terminal server IP address (this will be the
source address for all users on that terminal server). In addion, the <multiusersystem>
setup message specifies the range of source port numbers to allocate for user mapping and
the number of ports to allocate to each individual user upon login (called the block size). If you
want to use the default source port allocaon range (1025-65534) and block size (200), you do
not need to send a <multiusersystem> setup event to the firewall. Instead, the firewall will
automacally generate the XML API Mul-user System configuraon with the default sengs
upon receipt of the first user login event message.
• <blockstart>—Used with the <login> and <logout> messages to indicate the starng
source port number allocated to the user. The firewall then uses the block size to determine the
actual range of port numbers to map to the IP address and username in the login message. For
example, if the <blockstart> value is 13200 and the block size configured for the mul-user
system is 300, the actual source port range allocated to the user is 13200 through 13499. Each
connecon iniated by the user should use a unique source port number within the allocated
range, enabling the firewall to idenfy the user based on its IP address-port-user mappings
for enforcement of user- and group-based security rules. When a user exhausts all the ports
allocated, the terminal server must send a new <login> message allocang a new port range
for the user so that the firewall can update the IP address-port-user mapping. In addion, a
single username can have mulple blocks of ports mapped simultaneously. When the firewall
PAN-OS® Administrator’s Guide Version 10.1 767 ©2022 Palo Alto Networks, Inc.
User-ID
The XML files that the terminal server sends to the firewall can contain mulple message
types and the messages do not need to be in any parcular order within the file. However,
upon receiving an XML file that contains mulple message types, the firewall will process
them in the following order: mulusersystem requests first, followed by logins, then
logouts.
The following workflow provides an example of how to use the PAN-OS XML API to send user
mappings from a non-Windows terminal server to the firewall.
STEP 1 | Generate the API key that will be used to authencate the API communicaon between
the firewall and the terminal server. To generate the key you must provide login credenals
for an administrave account; the API is available to all administrators (including role-based
administrators with XML API privileges enabled).
From a browser, log in to the firewall. Then, to generate the API key for the firewall, open a
new browser window and enter the following URL:
https://<Firewall-IPaddress>/api/?
type=keygen&user=<username>&password=<password>
https://10.1.2.5/api/?type=keygen&user=admin&password=admin
The firewall responds with a message containing the key, for example:
<response status="success">
<result>
<key>k7J335J6hI7nBxIqyfa62sZugWx7ot%2BgzEA9UOnlZRg=</key>
</result>
</response>
PAN-OS® Administrator’s Guide Version 10.1 768 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | (Oponal) Generate a setup message that the terminal server will send to specify the port
range and block size of ports per user that your Terminal Server agent uses.
If the Terminal Server agent does not send a setup message, the firewall will automacally
create a Terminal Server agent configuraon using the following default sengs upon receipt
of the first login message:
• Default port range: 1025 to 65534
• Per user block size: 200
• Maximum number of mul-user systems: 1,000
The following shows a sample setup message:
<uid-message>
<payload>
<multiusersystem>
<entry ip="10.1.1.23" startport="20000" endport="39999"
blocksize="100/">
</multiusersystem>
</payload>
<type>update</type>
<version>1.0</version>
</uid-message>
where entry ip specifies the IP address assigned to terminal server users, startport
and endport specify the port range to use when assigning ports to individual users, and
blocksize specifies the number of ports to assign to each user. The maximum blocksize is
4000 and each mul-user system can allocate a maximum of 1000 blocks.
If you define a custom blocksize and or port range, keep in mind that you must configure the
values such that every port in the range gets allocated and that there are no gaps or unused
ports. For example, if you set the port range to 1000–1499, you could set the block size to
100, but not to 200. This is because if you set it to 200, there would be unused ports at the
end of the range.
STEP 3 | Create a script that will extract the login events and create the XML input file to send to the
firewall.
Make sure the script enforces assignment of port number ranges at fixed boundaries with
no port overlaps. For example, if the port range is 1000–1999 and the block size is 200,
acceptable blockstart values would be 1000, 1200, 1400, 1600, or 1800. Blockstart values of
1001, 1300, or 1850 would be unacceptable because some of the port numbers in the range
would be le unused.
The login event payload that the terminal server sends to the firewall can contain
mulple login events.
The following shows the input file format for a PAN-OS XML login event:
<uid-message>
<payload>
<login>
PAN-OS® Administrator’s Guide Version 10.1 769 ©2022 Palo Alto Networks, Inc.
User-ID
The firewall uses this informaon to populate its user mapping table. Based on the mappings
extracted from the example above, if the firewall received a packet with a source address and
port of 10.1.1.23:20101, it would map the request to user jparker for policy enforcement.
STEP 4 | Create a script that will extract the logout events and create the XML input file to send to the
firewall.
Upon receipt of a logout event message with a blockstart parameter, the firewall removes
the corresponding IP address-port-user mapping. If the logout message contains a username
and IP address, but no blockstart parameter, the firewall removes all mappings for the user.
If the logout message contains an IP address only, the firewall removes the mul-user system
and all associated mappings.
The following shows the input file format for a PAN-OS XML logout event:
<uid-message>
<payload>
<logout>
<entry name="acme\jjaso" ip="10.1.1.23" blockstart="20000">
<entry name="acme\ccrisp" ip="10.1.1.23">
<entry ip="10.2.5.4">
</logout>
</payload>
<type>update</type>
<version>1.0</version>
</uid-message>
You can also clear the muluser system entry from the firewall using the following CLI
command: clear xml-api multiusersystem
STEP 5 | Make sure that the scripts you create include a way to dynamically enforce that the port
block range allocated using the XML API matches the actual source port assigned to the user
on the terminal server and that the mapping is removed when the user logs out or the port
allocaon changes.
One way to do this would be to use netfilter NAT rules to hide user sessions behind the
specific port ranges allocated via the XML API based on the uid. For example, to ensure that a
PAN-OS® Administrator’s Guide Version 10.1 770 ©2022 Palo Alto Networks, Inc.
User-ID
user with the user ID jjaso is mapped to a source network address translaon (SNAT) value of
10.1.1.23:20000-20099, the script you create should include the following:
Similarly, the scripts you create should also ensure that the IP table roung configuraon
dynamically removes the SNAT mapping when the user logs out or the port allocaon changes:
STEP 6 | Define how to package the XML input files containing the setup, login, and logout events into
wget or cURL messages for transmission to the firewall.
To apply the files to the firewall using wget:
For example, the syntax for sending an input file named login.xml to the firewall at 10.2.5.11
using key k7J335J6hI7nBxIqyfa62sZugWx7ot%2BgzEA9UOnlZRg using wget would look
as follows:
For example, the syntax for sending an input file named login.xml to the firewall at 10.2.5.11
using key k7J335J6hI7nBxIqyfa62sZugWx7ot%2BgzEA9UOnlZRg using cURL would
look as follows:
STEP 7 | Verify that the firewall is successfully receiving login events from the terminal servers.
Verify the configuraon by opening an SSH connecon to the firewall and then running the
following CLI commands:
To verify if the terminal server is connecng to the firewall over XML:
PAN-OS® Administrator’s Guide Version 10.1 771 ©2022 Palo Alto Networks, Inc.
User-ID
10.5.204.43 vsys1 5 2
To verify that the firewall is receiving mappings from a terminal server over XML:
Total host: 1
PAN-OS® Administrator’s Guide Version 10.1 772 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 773 ©2022 Palo Alto Networks, Inc.
User-ID
Later, if other users that are in the group for less restricted services are given
addional usernames that access more restricted services, you can add those
usernames to the group for more restricted services. This scenario is more
common than the inverse; a user with access to more restricted services usually
already has access to less restricted services.
PAN-OS® Administrator’s Guide Version 10.1 774 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | Configure the rules that control user access based on the groups you just configured.
For more informaon, refer to Enable user- and group-based policy enforcement.
1. Configure a security rule that allows the corp_employees group to access email.
2. Configure a security rule that allows the network_services group to access the MySQL
server.
If you use the PAN-OS integrated User-ID agent, see Configure User Mapping
Using the PAN-OS Integrated User-ID Agent for instrucons on how to
configure the ignore list.
If the user logs in to the network as admin_user, the user can then access the MySQL
server without it prompng for the admin_user credenals again.
In this example, both corp_user and admin_user have email accounts, so the email server won’t
prompt for addional credenals regardless of which username the user entered when logging
in to the network.
The firewall is now ready to enforce rules for a user with mulple usernames.
PAN-OS® Administrator’s Guide Version 10.1 775 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 776 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 777 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 778 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 779 ©2022 Palo Alto Networks, Inc.
User-ID
configure Windows Log Forwarding, mulple domain controllers export their login events to a
single domain member from which a User-ID agent collects the user mapping informaon.
You can configure Windows Log Forwarding for Windows Server versions 2012 and 2012
R2. Windows Log Forwarding is not available for non-Microso servers.
To collect group mapping informaon in a large-scale network, you can configure the firewall to
query a Global Catalog server that receives account informaon from the domain controllers.
The following figure illustrates user mapping and group mapping for a large-scale network
in which the firewall uses a Windows-based User-ID agent. See Plan a Large-Scale User-ID
Deployment to determine if this deployment suits your network.
PAN-OS® Administrator’s Guide Version 10.1 780 ©2022 Palo Alto Networks, Inc.
User-ID
Bandwidth required for domain controllers to forward login events to member servers.
The bandwidth is a mulple of the login rate (number of logins per minute) of the domain
controllers and the byte size of each login event.
Domain controllers won’t forward their enre security logs, they forward only the events that
the user mapping process requires per login: four events for Windows Server 2012 and MS
Exchange.
Whether the following network elements support the required bandwidth:
• Domain controllers—Must support the processing load associated with forwarding the
events.
• Member Servers—Must support the processing load associated with receiving the events.
• Connecons—The geographic distribuon (local or remote) of the domain controllers,
member servers, and Global Catalog servers is a factor. Generally, a remote distribuon
supports less bandwidth.
User-ID agents monitor the Security log on Windows Event Collectors, not the default
forwarded events locaon. To change the event logging path to the Security log, perform the
following steps on each Windows Event Collector.
1. Open the Event Viewer.
2. Right-click the Security log and select Properes.
3. Copy the Log path (default %SystemRoot%\System32\Winevt\Logs
\security.evtx) and click OK.
4. Right-click the Forwarded Events folder and select Properes.
5. Replace the default Log path (%SystemRoot%\System32\Winevt\Logs
\ForwardedEvents.evtx) by pasng the value from the Security log, and then click OK.
STEP 2 | Configure a group policy to enable Windows Remote Management (WinRM) on the domain
controllers.
STEP 3 | Configure a group policy to enable Windows Event Forwarding on the domain controllers.
PAN-OS® Administrator’s Guide Version 10.1 781 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 1 | Configure Windows Log Forwarding on the member servers that will collect login events.
Configure Windows Log Forwarding. This step requires administrave privileges for configuring
group policies on Windows servers.
STEP 3 | Configure the User-ID agent to collect user mapping informaon from the member servers.
1. Start the Windows-based User-ID agent.
2. Select User Idenficaon > Discovery and perform the following steps for each member
server that will receive events from domain controllers:
1. In the Servers secon, click Add and enter a Name to idenfy the member server.
2. In the Server Address field, enter the FQDN or IP address of the member server.
3. For the Server Type, select Microso Acve Directory.
4. Click OK to save the server entry.
3. Configure the remaining User-ID agent sengs (refer to Configure the Windows-Based
User-ID Agent for User Mapping).
4. If the User-ID sources provide usernames in mulple formats, specify the format for the
Primary Username when you Map Users to Groups.
The primary username is the username that idenfies the user on the firewall and
represents the user in reports and logs, regardless of the format that the User-ID source
provides.
STEP 4 | Configure an LDAP server profile to specify how the firewall connects to the Global Catalog
servers (up to four) for group mapping informaon.
To improve availability, use at least two Global Catalog servers for redundancy.
You can collect group mapping informaon only for universal groups, not local domain groups
(subdomains).
1. Select Device > Server Profiles > LDAP, click Add, and enter a Name for the profile.
2. In the Servers secon, for each Global Catalog, click Add and enter the server Name, IP
address (LDAP Server), and Port. For a plaintext or Start Transport Layer Security (Start
TLS) connecon, use Port 3268. For an LDAP over SSL connecon, use Port 3269. If
the connecon will use Start TLS or LDAP over SSL, select the Require SSL/TLS secured
connecon check box.
3. In the Base DN field, enter the Disnguished Name (DN) of the point in the Global
Catalog server where the firewall will start searching for group mapping informaon (for
example, DC=acbdomain,DC=com).
4. For the Type, select acve-directory.
PAN-OS® Administrator’s Guide Version 10.1 782 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 5 | Configure an LDAP server profile to specify how the firewall connects to the servers (up to
four) that contain domain mapping informaon.
User-ID uses this informaon to map DNS domain names to NetBIOS domain names. This
mapping ensures consistent domain/username references in policy rules.
The steps are the same as for the LDAP server profile you created for Global Catalogs in the
previous step, except for the following fields:
• LDAP Server—Enter the IP address of the domain controller that contains the domain
mapping informaon.
• Port—For a plaintext or Start TLS connecon, use Port 389. For an LDAP over SSL
connecon, use Port 636. If the connecon will use Start TLS or LDAP over SSL, select the
Require SSL/TLS secured connecon check box.
• Base DN—Select the DN of the point in the domain controller where the
firewall will start searching for domain mapping informaon. The value must
start with the string: cn=partitions,cn=configuration (for example,
cn=partitions,cn=configuration,DC=acbdomain,DC=com).
STEP 6 | Create a group mapping configuraon for each LDAP server profile you created.
1. Select Device > User Idenficaon > Group Mapping Sengs.
2. Click Add and enter a Name to idenfy the group mapping configuraon.
3. Select the LDAP Server Profile and ensure the Enabled check box is selected.
If the Global Catalog and domain mapping servers reference more groups than
your security rules require, configure the Group Include List and/or Custom
Group list to limit the groups for which User-ID performs mapping.
4. Click OK and Commit.
PAN-OS® Administrator’s Guide Version 10.1 783 ©2022 Palo Alto Networks, Inc.
User-ID
To include the username and domain in the header, the firewall requires the IP address-to-
username mapping for the user. If the user is not mapped, the firewall inserts unknown in
Base64 encoding for both the domain and username in the header.
To include the username and domain in headers for HTTPS traffic, you must first create a
decrypon profile to decrypt HTTPS traffic.
The firewall does not insert headers if the acon for the URL filtering profile is block
for the domain.
STEP 2 | Create or edit an HTTP header inseron entry using predefined types.
You can define up to five headers for each profile.
STEP 4 | Add the Domains where you want insert headers. When the user accesses a domain in the
list, the firewall inserts the specified header.
Do not use the same dynamic token (either ($user) or ($domain)) more than once
per value.
Each value can be up to 512 characters. The firewall populates the ($user) and ($domain)
dynamic tokens using the primary username in the group mapping profile. For example:
• If the primary username is the sAMAccountName, the value for ($user) is the
sAMAccountName and the value for ($domain) is the NetBios domain name.
• If the primary username is the UserPrincipalName, the ($user) the user account name
(prefix) and the ($domain) is the Domain Name System (DNS) name.
STEP 7 | (Oponal) Select Log to enable logging for the header inseron.
PAN-OS® Administrator’s Guide Version 10.1 784 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 8 | Apply the URL filtering profile to the security policy rule for HTTP or HTTPS traffic.
STEP 11 | Verify the firewall includes the username and domain in the HTTP headers.
• Use the show user user-ids all command to verify the group mapping is correct.
• Use the show counter global name ctd_header_insert command to view the
number of HTTP headers inserted by the firewall.
• If you configured logging in Step 7, check the logs for the inserted Base64 encoded
payload (for example, corpexample\testuser would appear in the logs as
Y29ycGV4YW1wbGVcdGVzdHVzZXI=).
You can redistribute user mapping informaon collected through any method except
Terminal Server (TS) agents. You cannot redistribute Group Mapping or HIP match
informaon.
If you use Panorama to manage firewalls and aggregate firewall logs, you can use
Panorama to manage User-ID redistribuon. Leveraging Panorama is a simpler soluon
than creang extra connecons between firewalls to redistribute User-ID informaon.
If you Configure Authencaon Policy, your firewalls must also redistribute the Authencaon
Timestamps that are generated when users authencate to access applicaons and services.
Firewalls use the mestamps to evaluate the meouts for Authencaon policy rules. The
meouts allow a user who successfully authencates to later request services and applicaons
without authencang again within the meout periods. Redistribung mestamps enables you
to enforce consistent meouts across all the firewalls in your network.
Firewalls share data and authencaon mestamps as part of the same redistribuon flow; you
don’t have to configure redistribuon for each informaon type separately.
• Firewall Deployment for Data Redistribuon
• Configure Data Redistribuon
PAN-OS® Administrator’s Guide Version 10.1 785 ©2022 Palo Alto Networks, Inc.
User-ID
Data redistribuon can be unidireconal (the agent provides data to the client) or bidireconal,
where both the agent and the client can simultaneously send and receive data.
To redistribute the data, you can use the following architecture types:
• Hub and spoke architecture for a single region:
To redistribute data between firewalls, use a hub and spoke architecture as a best pracce.
In this configuraon, a hub firewall collects the data from sources such as Windows User-ID
agents, Syslog Servers, Domain Controllers, or other firewalls. Configure the redistribuon
client firewalls to collect the data from the hub firewall.
For example, a hub (consisng of a pair of VM-50s for resiliency) could connect to the User-ID
sources for the user mappings. The hub would then be able to redistribute the user mappings
when the client firewalls that use the user mappings to enforce policy connect to the hub to
receive data.
• Mul-Hub and spoke architecture for mulple regions:
If you have firewalls deployed in mulple regions and want to distribute the data to the
firewalls in all of these regions so that you can enforce policy consistently regardless of where
the user logs in, you can use a mul-hub and spoke architecture for mulple regions.
Start by configuring a firewall in each region to collect data from the sources. This firewall acts
as a local hub for redistribuon. This firewall collects the data from all sources in that region so
that it can redistribute it to the client firewalls. Next, configure the client firewalls to connect to
the redistribuon hubs for their region and all other regions so that the client firewalls have all
data from all hubs.
As a best pracce, enable bidireconal redistribuon within a region if the firewalls need to
both send and receive data. For example, if a firewall is acng as a GlobalProtect gateway for
remote users and as a branch firewall for local users, the firewall must send the user mappings
it collects for remote users to the hub firewall as well as receive the user mappings of the local
users from the hub firewall.
• Hierarchical architecture:
To redistribute data, you can also use a hierarchical architecture. For example, to redistribute
data such as User-ID informaon, organize the redistribuon sequence in layers, where
each layer has one or more firewalls. In the boom layer, PAN-OS integrated User-ID agents
running on firewalls and Windows-based User-ID agents running on Windows servers map IP
addresses to usernames. Each higher layer has firewalls that receive the mapping informaon
and authencaon mestamps from up to 100 redistribuon points in the layer beneath it. The
top-layer firewalls aggregate the mappings and mestamps from all layers. This deployment
provides the opon to configure policies for all users in top-layer firewalls and region- or
funcon-specific policies for a subset of users in the corresponding domains served by lower-
layer firewalls.
In this scenario, three layers of firewalls redistribute mappings and mestamps from local
offices to regional offices and then to a global data center. The data center firewall that
aggregates all the informaon shares it with other data center firewalls so that they can all
enforce policy and generate reports for users across your enre network. Only the boom layer
firewalls use User-ID agents to query the directory servers.
The informaon sources that the User-ID agents query do not count towards the maximum
of ten hops in the sequence. However, Windows-based User-ID agents that forward mapping
PAN-OS® Administrator’s Guide Version 10.1 786 ©2022 Palo Alto Networks, Inc.
User-ID
informaon to firewalls do count. Also in this example, the top layer has two hops: the first to
aggregate informaon in one data center firewall and the second to share the informaon with
other data center firewalls.
PAN-OS® Administrator’s Guide Version 10.1 787 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 2 | Add the agent using its Serial Number or its Host and Port.
• To add an agent using a serial number, select the Serial Number of the firewall you want to
use as a redistribuon agent.
• To add an agent using its host and port informaon:
1. Enter the informaon for the Host.
2. Select whether the host is an LDAP Proxy.
3. Enter the Port (default is 5007, range is 1—65535).
4. (Mulple virtual systems only) Enter the Collector Name to idenfy which virtual system
you want to use as a redistribuon agent.
5. (Mulple virtual systems only) Enter and confirm the Collector Pre-Shared Key for the
virtual system you want to use as a redistribuon agent.
STEP 3 | Select one or more Data Type for the agent to redistribute.
• IP User Mappings—IP address-to-username mappings for User-ID.
• IP Tags—IP address-to-tag mappings for dynamic address groups.
• User Tags—Username-to-tag mappings for dynamic user groups.
• HIP—Host informaon profile (HIP) data from GlobalProtect, which includes HIP objects
and profiles.
• Quaranne List—Devices that GlobalProtect idenfies as quaranned.
STEP 4 | (Mulple virtual systems only) Configure a virtual system as a collector that can redistribute
data.
Skip this step if the firewall receives but does not redistribute data.
You can redistribute informaon among virtual systems on different firewalls or on the
same firewall. In both cases, each virtual system counts as one hop in the redistribuon
sequence.
PAN-OS® Administrator’s Guide Version 10.1 788 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 5 | (Oponal but recommended) Configure which networks you want to include in data
redistribuon and which networks you want to exclude from data redistribuon.
You can include or exclude networks and subnetworks when redistribung either IP address-
to-tag mappings or IP address-to-username mappings.
As a best pracce, always specify which networks to include and exclude to ensure that
the agent is only communicang with internal resources.
STEP 6 | Configure the service route that the firewall uses to query other firewalls for User-ID
informaon.
Skip this step if the firewall only receives user mapping informaon from Windows-based User-
ID agents or directly from the informaon sources (such as directory servers) instead of from
other firewalls.
1. Select Device > Setup > Services.
2. (Firewalls with mulple virtual systems only) Select Global (for a firewall-wide service
route) or Virtual Systems (for a virtual system-specific service route), and then configure
the service route.
3. Click Service Route Configuraon, select Customize, and select IPv4 or IPv6 based on
your network protocols. Configure the service route for both protocols if your network
uses both.
4. Select UID Agent and then select the Source Interface and Source Address.
5. Click OK twice to save the service route.
STEP 7 | Enable the firewall to respond when other firewalls query it for data to redistribute.
Skip this step if the firewall receives but does not redistribute data.
Configure an Interface Management Profile with the User-ID service enabled and assign the
profile to a firewall interface.
PAN-OS® Administrator’s Guide Version 10.1 789 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 8 | (Oponal but recommended) Use a custom cerficate from your enterprise PKI to establish a
unique chain of trust from the redistribuon client to the redistribuon agent.
1. On the redistribuon client firewall, create a custom SSL cerficate profile to use for
outgoing connecons.
2. Select Device > Setup > Management > Secure Communicaon Sengs.
3. Edit the sengs.
4. Select the Customize Secure Server Communicaon opon.
5. Select the Cerficate Profile you created in Substep 1.
6. Click OK.
7. Customize Communicaon for Data Redistribuon.
8. Commit your changes.
9. Enter the following CLI command to confirm the cerficate profile (SSL config) uses
Custom certificates: show redistribution agent state <agent-name>
(where <agent-name> is the name of the redistribuon agent or User-ID agent.
STEP 9 | (Oponal but recommended) Use a custom cerficate from your enterprise PKI to establish a
unique chain of trust from the redistribuon agent to the redistribuon client.
1. On the redistribuon agent firewall, create a custom SSL/TLS service profile for the
firewall to use for incoming connecons.
2. Select Device > Setup > Management > Secure Communicaon Sengs.
3. Edit the sengs.
4. Select the Customize Secure Server Communicaon opon.
5. Select the SSL/TLS Service Profile you created in Step 1.
6. Click OK.
7. Commit your changes.
8. Enter the following CLI command to confirm the cerficate profile (SSL config) uses
Custom certificates: show redistribution service status.
PAN-OS® Administrator’s Guide Version 10.1 790 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 791 ©2022 Palo Alto Networks, Inc.
User-ID
PAN-OS® Administrator’s Guide Version 10.1 792 ©2022 Palo Alto Networks, Inc.
User-ID
STEP 3 | Select the Mapping Type that you want to share then click OK.
STEP 4 | Consolidate your User-ID sources and migrate them to the virtual system that you want to
use as a User-ID hub.
This consolidates the User-ID configuraon for operaonal simplicity. By configuring the hub
to monitor servers and connect to agents that were previously monitored by other virtual
systems, the hub collects the user mapping informaon instead of having each virtual system
PAN-OS® Administrator’s Guide Version 10.1 793 ©2022 Palo Alto Networks, Inc.
User-ID
collect it independently. If you don’t want to share mappings from specific virtual systems,
configure those mappings on a virtual system that will not be used as the hub.
Use the same format for the Primary Username across virtual systems and firewalls.
On the hub, you can configure any User-ID source that is currently configured
on a virtual system. However, IP address-and-port-to-username mapping
informaon from Terminal Server agents are not shared between the User-ID
hub and the connected virtual systems.
3. Specify the subnetworks that User-ID should include in or exclude from mapping.
4. Define the Ignore User List.
5. On all other virtual systems, remove any sources that are on the User-ID hub.
STEP 5 | Commit the changes to enable the User-ID hub and begin collecng mappings for the
consolidated sources.
STEP 6 | Confirm the User-ID hub is mapping the users and groups.
1. Use the show user ip-user-mapping all command to show the IP address-to-
username mappings and which virtual system provides the mappings.
2. Use the show user user-id-agent statistics command to show which virtual
system is serving as the User-ID hub.
3. Confirm the hub is sharing the group mappings by using the following CLI commands:
• show user group-mapping statistics
• show user group-mapping state all
• show user group list
• show user group name <group-name>
PAN-OS® Administrator’s Guide Version 10.1 794 ©2022 Palo Alto Networks, Inc.
App-ID
To safely enable applicaons on your network, the Palo Alto Networks next-
generaon firewalls provide both an applicaon and web perspecve—App-ID and
URL Filtering—to protect against a full spectrum of legal, regulatory, producvity, and
resource ulizaon risks.
App-ID enables visibility into the applicaons on the network, so you can learn how
they work and understand their behavioral characteriscs and their relave risk. This
applicaon knowledge allows you to create and enforce security policy rules to enable,
inspect, and shape desired applicaons and block unwanted applicaons. When
you define policy rules to allow traffic, App-ID begins to classify traffic without any
addional configuraon.
New and modified App-IDs are released as part of Applicaons and Threat Content
Updates—follow the Best Pracces for Applicaons and Threats Content Updates to
seamlessly keep your applicaon and threat signatures up-to-date.
> App-ID Overview > Security Policy Rule Opmizaon
> Streamlined App-ID Policy Rules > App-ID Cloud Engine
> App-ID and HTTP/2 Inspecon > SaaS App-ID Policy Recommendaon
> Manage Custom or Unknown > Applicaon Level Gateways
Applicaons > Disable the SIP Applicaon-level
> Manage New and Modified App-IDs Gateway (ALG)
> Use Applicaon Objects in Policy > Use HTTP Headers to Manage SaaS
> Safely Enable Applicaons on Applicaon Access
Default Ports > Maintain Custom Timeouts for
> Applicaons with Implicit Support Legacy Applicaons
795
App-ID
App-ID Overview
App-ID, a patented traffic classificaon system only available in Palo Alto Networks firewalls,
determines what an applicaon is irrespecve of port, protocol, encrypon (SSH or SSL) or
any other evasive tacc used by the applicaon. It applies mulple classificaon mechanisms
—applicaon signatures, applicaon protocol decoding, and heuriscs—to your network traffic
stream to accurately idenfy applicaons.
Here's how App-ID idenfies applicaons traversing your network:
• Traffic is matched against policy to check whether it is allowed on the network.
• Signatures are then applied to allowed traffic to idenfy the applicaon based on unique
applicaon properes and related transacon characteriscs. The signature also determines if
the applicaon is being used on its default port or it is using a non-standard port. If the traffic is
allowed by policy, the traffic is then scanned for threats and further analyzed for idenfying the
applicaon more granularly.
• If App-ID determines that encrypon (SSL or SSH) is in use, and a Decrypon policy rule is in
place, the session is decrypted and applicaon signatures are applied again on the decrypted
flow.
• Decoders for known protocols are then used to apply addional context-based signatures to
detect other applicaons that may be tunneling inside of the protocol (for example, Yahoo!
Instant Messenger used across HTTP). Decoders validate that the traffic conforms to the
protocol specificaon and provide support for NAT traversal and opening dynamic pinholes for
applicaons such as SIP and FTP.
• For applicaons that are parcularly evasive and cannot be idenfied through advanced
signature and protocol analysis, heuriscs or behavioral analysis may be used to determine the
identy of the applicaon.
When the applicaon is idenfied, the policy check determines how to treat the applicaon, for
example—block, or allow and scan for threats, inspect for unauthorized file transfer and data
paerns, or shape using QoS.
PAN-OS® Administrator’s Guide Version 10.1 796 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 2 | (Oponal) Exclude tags from your filter by selecng the check box in the Exclude column.
STEP 3 | Create a security policy rule and Add your new applicaon filter on the Applicaon tab.
PAN-OS® Administrator’s Guide Version 10.1 797 ©2022 Palo Alto Networks, Inc.
App-ID
4. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 798 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | Create a security policy rule and Add your new applicaon filter on the Applicaon tab.
PAN-OS® Administrator’s Guide Version 10.1 799 ©2022 Palo Alto Networks, Inc.
App-ID
The firewall processes and inspects HTTP/2 traffic by default when SSL decrypon is enabled. For
HTTP/2 inspecon to work correctly, the firewall must be enabled to use ECDHE (ellipc curve
Diffie-Hellman) as a key exchange algorithm for SSL sessions. ECDHE is enabled by default, but
you can check to confirm that it’s enabled by selecng Objects > Decrypon > Decrypon Profile
> SSL Decrypon > SSL Protocol Sengs.
When the Decrypon logs introduced in PAN-OS 10.1 are enabled, you must enable
Tunnel Content Inspecon to obtain the App-ID for HTTP/2 traffic.
PAN-OS® Administrator’s Guide Version 10.1 800 ©2022 Palo Alto Networks, Inc.
App-ID
when there is no value specified for this TLS extension, the firewall either downgrades HTTP/2
traffic to HTTP/1.1 or classifies it as unknown TCP traffic.
1. Select Objects > Decrypon > Decrypon Profile > SSL Decrypon > SSL Forward
Proxy and then select Strip ALPN.
2. Aach the decrypon profile to a decrypon policy (Policies > Decrypon) to turn off
HTTP/2 inspecon for traffic that matches the policy.
3. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 801 ©2022 Palo Alto Networks, Inc.
App-ID
PAN-OS® Administrator’s Guide Version 10.1 802 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 2 | Review and apply the Best Pracces for Applicaons and Threats Content Updates based on
your organizaon’s network security and applicaon availability requirements.
STEP 3 | Configure a security policy rule to always allow new App-IDs that might have network-wide
impact, like authencaon or soware development applicaons.
The New App-ID characterisc matches to only the App-IDs introduced in the latest content
release. When used in a security policy, this gives you a month’s me to fine tune your security
policy based on new App-IDs while ensuring constant availability for App-IDs that fall into
crical categories (Ensure Crical New App-IDs are Allowed).
PAN-OS® Administrator’s Guide Version 10.1 803 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 4 | Set the schedule to Deploy Applicaon and Threat Content Updates; this includes the opon
to delay new App-ID installaon unl you’ve had me to make necessary security policy
updates (using the New App-ID Threshold).
STEP 5 | Aer you’ve setup a content updates installaon schedule, you’ll want to regularly check in
and See the New and Modified App-IDs in a Content Release.
STEP 6 | You can then See How New and Modified App-IDs Impact Your Security Policy, and make
adjustments to your security policy as needed.
STEP 7 | Monitor New App-IDs to get a view into new App-ID acvity on your network, so that you’re
best equipped to make the most effecve security policy updates.
STEP 2 | For either a downloaded or currently installed content release, click Review Apps link in the
Acons column to view details on newly-idenfied and modified applicaons in that release:
PAN-OS® Administrator’s Guide Version 10.1 804 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | Review the App-IDs this content release introduces or modifies since the last content
version.
New and modified App-IDs are listed separately. Full applicaon details are provided for each,
and App-IDs that Palo Alto Networks foresees as having network-wide impact are flagged as
recommended for policy review.
New App-ID details that you can use to assess possible impact to policy enforcement include:
• Depends on—Lists the applicaon signatures that this App-ID relies on to uniquely idenfy
the applicaon. If one of the applicaon signatures listed in the Depends On field is
disabled, the dependent App-ID is also disabled.
• Previously Idenfied As—Lists the App-IDs that matched to the applicaon before the new
App-ID was installed to uniquely idenfy the applicaon.
• App-ID Enabled—All App-IDs display as enabled when a content release is downloaded,
unless you choose to manually disable the App-ID signature before installing the content
update.
For modified App-IDs, details include informaon on: Expanded Coverage, Remove False
Posive, and applicaon metadata changes. The Expanded Coverage and Remove False
Posive fields both indicate how the applicaon’s coverage has changed (it’s either more
comprehensive or has been narrowed) and a clock icon indicates a metadata change, where
certain applicaon details are updated.
STEP 4 | Based on your findings, click Review Policies to see how the new and modified App-IDs
impact security policy enforcement: See How New and Modified App-IDs Impact Your
Security Policy.
PAN-OS® Administrator’s Guide Version 10.1 805 ©2022 Palo Alto Networks, Inc.
App-ID
See How New and Modified App-IDs Impact Your Security Policy
Newly-categorized and modified App-IDs can change the way the firewall enforces traffic.
Perform a content update policy review to see how new and modified App-IDs impact your
security policy, and to easily make any necessary adjustments. You can perform a content update
policy review for both downloaded and installed content.
STEP 1 | Select Device > Dynamic Updates.
STEP 2 | See the New and Modified App-IDs in a Content Release to learn more about each App-ID
that a content release introduces or modifies.
STEP 3 | For a downloaded or currently installed content release, click Review Policies in the Acon
column. The Policy review based on candidate configuraon dialog allows you to filter by
Content Version and view either new or modified App-IDs introduced in a specific release
(you can also filter the policy impact of new App-IDs according to Rulebase, Virtual System,
and Applicaon).
STEP 4 | Select an App-ID from the Applicaon drop-down to view policy rules that currently enforce
the applicaon. The rules displayed are based on the App-IDs that match to the applicaon
before the new App-ID is installed (view applicaon details to see the list of applicaon
signatures that an applicaon was Previously Idenfied As before the new App-ID).
STEP 5 | Use the detail provided in the policy review to plan policy rule updates to take effect when
the App-ID is installed, or if the content release version that included the App-ID is currently
installed, the changes you make take effect immediately.
You can Add app to selected policies or Remove app from selected policies.
PAN-OS® Administrator’s Guide Version 10.1 806 ©2022 Palo Alto Networks, Inc.
App-ID
you manually install content) to assess how newly-categorized applicaons might impact security
policy enforcement and make any necessary adjustments.
STEP 1 | Select Objects > Applicaon Filters and Add a new applicaon filter.
STEP 2 | Define the types of new applicaons for which you want to ensure constant availability
based on subcategory or characterisc. For example, select the category “auth-service”
to ensure that any newly-installed applicaons that are known to perform or support
authencaon are allowed.
STEP 3 | Only aer narrowing the types of new applicaons that you want to allow immediately upon
installaon, select Apply to New App-IDs only.
STEP 4 | Select Policies > Security and add or edit a security policy rule that is configured to allow
matching traffic.
STEP 5 | Select Applicaon and add the new Applicaon Filter to the policy rule as match criteria.
STEP 7 | To connue to adjust your security policy to account for any changes to enforcement that
new App-IDs introduce:
• Monitor New App-IDs—Monitor and get reports on new App-ID acvity.
• See the New and Modified App-IDs in a Content Release—See how the newly-installed App-
IDs impact your exisng security policy rules.
PAN-OS® Administrator’s Guide Version 10.1 807 ©2022 Palo Alto Networks, Inc.
App-ID
App-ID characterisc on the ACC to get visibility into the new applicaons on your network, and
to generate reports that detail newly-categorized applicaon acvity. What you learn can help
you make the right decisions about how you to update your security policy to enforce the most
recently-categorized App-IDs. Whether you’re using it on the ACC or to generate reports (or to
Ensure Crical New App-IDs are Allowed), the New App-ID characterisc always matches to only
the new App-IDs in the most recently installed content releases. When a new content release is
installed, the new App-ID characterisc automacally begins to match only to the new App-IDs in
that content release version.
Generate a report with details specifically regarding new applicaons (applicaons introduced
only in the latest content release).
Use the ACC to monitor new applicaon acvity: select ACC and under Global Filters, select
Applicaon > Applicaon Characteriscs > New App-ID.
PAN-OS® Administrator’s Guide Version 10.1 808 ©2022 Palo Alto Networks, Inc.
App-ID
Enable App-IDs.
Enable App-IDs that you previously disabled by selecng Objects > Applicaons. Select one or
more applicaon check box and click Enable or open the details for a specific applicaon and
click Enable App-ID.
PAN-OS® Administrator’s Guide Version 10.1 809 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | (Oponal) Select Shared to create the object in a shared locaon for access as a shared
object in Panorama or for use across all virtual systems in a mulple virtual system firewall.
STEP 4 | Add the applicaons you want in the group and then click OK.
PAN-OS® Administrator’s Guide Version 10.1 810 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | (Oponal) Select Shared to create the object in a shared locaon for access as a shared
object in Panorama or for use across all virtual systems in a mulple virtual system firewall.
STEP 4 | Define the filter by selecng aribute values from the Category, Subcategory, Technology,
Risk, and Characterisc secons. As you select values, noce that the list of matching
applicaons at the boom of the dialog narrows. When you have adjusted the filter
aributes to match the types of applicaons you want to safely enable, click OK.
PAN-OS® Administrator’s Guide Version 10.1 811 ©2022 Palo Alto Networks, Inc.
App-ID
If you are seeing unknown traffic for a commercial applicaon that does not
yet have an App-ID, you can submit a request for a new App-ID here: hp://
researchcenter.paloaltonetworks.com/submit-an-applicaon/.
To ensure that your internal custom applicaons do not show up as unknown traffic, create a
custom applicaon. You can then exercise granular policy control over these applicaons in order
to minimize the range of unidenfied traffic on your network, thereby reducing the aack surface.
Creang a custom applicaon also allows you to correctly idenfy the applicaon in the ACC and
Traffic logs, which enables you to audit/report on the applicaons on your network.
To create a custom applicaon, you must define the applicaon aributes: its characteriscs,
category and sub-category, risk, port, meout. In addion, you must define paerns or values that
the firewall can use to match to the traffic flows themselves (the signature). Finally, you can aach
the custom applicaon to a security policy that allows or denies the applicaon (or add it to an
applicaon group or match it to an applicaon filter). You can also create custom applicaons to
idenfy ephemeral applicaons with topical interest, such as ESPN3-Video for world cup soccer
or March Madness.
In order to collect the right data to create a custom applicaon signature, you'll need a
good understanding of packet captures and how datagrams are formed. If the signature is
created too broadly, you might inadvertently include other similar traffic; if it is defined too
narrowly, the traffic will evade detecon if it does not strictly match the paern.
Custom applicaons are stored in a separate database on the firewall and this database is
not impacted by the weekly App-ID updates.
The supported applicaon protocol decoders that enable the firewall to detect applicaons
that may be tunneling inside of the protocol include the following as of content release
version 609: FTP, HTTP, IMAP, POP3, SMB, and SMTP.
PAN-OS® Administrator’s Guide Version 10.1 812 ©2022 Palo Alto Networks, Inc.
App-ID
downloading, so that you will be able to locate each type of session in the resulng packet
captures (PCAPs).
• Because the firewall by default takes packet captures for all unknown traffic, if the firewall is
between the client and the server you can view the packet capture for the unknown traffic
directly from the Traffic log.
• Use the packet captures to find paerns or values in the packet contexts that you can use to
create signatures that will uniquely match the applicaon traffic. For example, look for string
paerns in HTTP response or request headers, URI paths, or hostnames. For informaon on
the different string contexts you can use to create applicaon signatures and where you can
find the corresponding values in the packet, refer to Creang Custom Threat Signatures.
PAN-OS® Administrator’s Guide Version 10.1 813 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | Define details about the applicaon, such as the underlying protocol, the port number the
applicaon runs on, the meout values, and any types of scanning you want to be able to
perform on the traffic.
On the Advanced tab, define sengs that will allow the firewall to idenfy the applicaon
protocol:
• Specify the default ports or protocol that the applicaon uses.
• Specify the session meout values. If you don’t specify meout values, the default meout
values will be used.
• Indicate any type of addional scanning you plan to perform on the applicaon traffic.
For example, to create a custom TCP-based applicaon that runs over SSL, but uses port 4443
(instead of the default port for SSL, 443), you would specify the port number. By adding the
port number for a custom applicaon, you can create policy rules that use the default port
for the applicaon rather than opening up addional ports on the firewall. This improves your
security posture.
PAN-OS® Administrator’s Guide Version 10.1 814 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 4 | Define the criteria that the firewall will use to match the traffic to the new applicaon.
You will use the informaon you gathered from the packet captures to specify unique string
context values that the firewall can use to match paerns in the applicaon traffic.
1. On the Signatures tab, click Add and define a Signature Name and oponally a Comment
to provide informaon about how you intend to use this signature.
2. Specify the Scope of the signature: whether it matches to a full Session or a single
Transacon.
3. Specify condions to define signatures by clicking Add And Condion or Add Or
Condion.
4. Select an Operator to define the type of match condions you will use: Paern Match or
Equal To.
• If you selected Paern Match, select the Context and then use a regular expression
to define the Paern to match the selected context. Oponally, click Add to define a
qualifier/value pair. The Qualifier list is specific to the Context you chose.
• If you selected Equal To, select the Context and then use a regular expression to
define the Posion of the bytes in the packet header to use match the selected
context. Choose from first-4bytes or second-4bytes. Define the 4-byte hex value for
the Mask (for example, 0xffffff00) and Value (for example, 0xaabbccdd).
For example, if you are creang a custom applicaon for one of your internal
applicaons, you could use the ssl-rsp-cerficate Context to define a paern match
for the cerficate response message of a SSL negoaon from the server and create a
Paern to match the commonName of the server in the message as shown here:
PAN-OS® Administrator’s Guide Version 10.1 815 ©2022 Palo Alto Networks, Inc.
App-ID
group and click Move Up or Move Down. You cannot move condions from one group to
another.
7. Click OK to save the signature definion.
STEP 2 | Specify the applicaon that the rule will allow or block.
1. In the Applicaons tab, Add the Applicaon you want to safely enable. You can select
mulple applicaons or you can use applicaon groups or applicaon filters.
2. View dependencies for selected applicaons and Add To Current Rule or Add To Exisng
Rule.
PAN-OS® Administrator’s Guide Version 10.1 816 ©2022 Palo Alto Networks, Inc.
App-ID
PAN-OS® Administrator’s Guide Version 10.1 817 ©2022 Palo Alto Networks, Inc.
App-ID
Select Policy > Security and add or a modify a rule to enforce applicaons only on their default
port(s):
PAN-OS® Administrator’s Guide Version 10.1 818 ©2022 Palo Alto Networks, Inc.
App-ID
PAN-OS® Administrator’s Guide Version 10.1 819 ©2022 Palo Alto Networks, Inc.
App-ID
360-safeguard-update hp
apple-update hp
apt-get hp
as2 hp
avg-update hp
blokus rtmp
bugzilla hp
clubcooee hp
corba hp
dropbox ssl
PAN-OS® Administrator’s Guide Version 10.1 820 ©2022 Palo Alto Networks, Inc.
App-ID
esignal hp
ezhelp hp
facebook-chat jabber
facebook-social-plugin hp
forclient-update hp
google-desktop hp
google-talk jabber
google-update hp
gotomypc-desktop-sharing citrix-jedi
gotomypc-file-transfer citrix-jedi
gotomypc-prinng citrix-jedi
hipchat hp
infront hp
java-update hp
jepptech-updates hp
PAN-OS® Administrator’s Guide Version 10.1 821 ©2022 Palo Alto Networks, Inc.
App-ID
kerberos rpc
mcafee-update hp
megaupload hp
metatrader hp
mocha-rdp t_120
mount rpc
ms-frs msrpc
ms-rdp t_120
ms-scheduler msrpc
ms-service-controller msrpc
nfs rpc
paloalto-updates ssl
panos-global-protect hp
panos-web-interface hp
pastebin hp
pastebin-posng hp
portmapper rpc
PAN-OS® Administrator’s Guide Version 10.1 822 ©2022 Palo Alto Networks, Inc.
App-ID
rdp2tcp t_120
renren-im jabber
salesforce hp
stumbleupon hp
supremo hp
symantec-av-update hp
trendmicro hp
twier hp
xm-radio rtsp
PAN-OS® Administrator’s Guide Version 10.1 823 ©2022 Palo Alto Networks, Inc.
App-ID
PA-7000 Series Firewalls support two logging cards, the PA-7000 Series Firewall Log
Processing Card (LPC) and the high-performance PA-7000 Series Firewall Log Forwarding
Card (LFC). Unlike the LPC, the LFC does not have disks to store logs locally. Instead, the
LFC forwards all logs to one or more external logging systems, such as Panorama or a
syslog server. If you use the LFC, the applicaon usage informaon for Policy Opmizer
does not display on the firewall because traffic logs aren’t stored locally. If you use the LPC,
the traffic logs are stored locally on the firewall, so the applicaon usage informaon for
Policy Opmizer displays on the firewall.
PAN-OS® Administrator’s Guide Version 10.1 824 ©2022 Palo Alto Networks, Inc.
App-ID
• Idenfy over-provisioned applicaon-based rules—Rules that are too broad allow applicaons
you don’t use on your network, which increases the aack surface and the risk of inadvertently
allowing malicious traffic.
Remove unused applicaons from Security policy rules to reduce the aack surface and
keep the rulebase clean. Don’t allow applicaons that nobody uses on your network.
• Add App-ID Cloud Engine (ACE) applicaons to Security policy rules—If you have a SaaS
Security Inline subscripon, you can use Policy Opmizer’s New App Viewer to manage cloud-
delivered App-IDs in Security policy. The ACE documentaon describes how to use Policy
Opmizer to gain visibility into and control cloud-delivered App-IDs.
The Policy Opmizer examples in this secon do not show the New App Viewer
because they depict firewalls that do not have a SaaS Security Inline subscripon.
To migrate a configuraon from a legacy firewall to a Palo Alto Networks device, see Best
Pracces for Migrang to Applicaon-Based Policy.
You can’t sort Security policy rules in Security > Policies because sorng would change the rule
order in the rulebase. However, under Polices > Security > Policy Opmizer, Policy Opmizer
provides sorng opons that don’t affect the rule order, so you can sort rules to priorize which
rules to convert or clean up first. You can sort rules by the amount of traffic during the past 30
days, the number of applicaons seen on the rule, the number of days with no new applicaons,
and the number of applicaons allowed (for over-provisioned rules).
You can use Policy Opmizer in other ways as well, including validang pre-producon rules and
troubleshoong exisng rules. Note that Policy Opmizer honors only Log at Session End and
ignores Log at Session Start to avoid counng transient applicaons on rules.
Due to resource constraints, VM-50 Lite virtual firewalls don’t support Policy Opmizer.
PAN-OS® Administrator’s Guide Version 10.1 825 ©2022 Palo Alto Networks, Inc.
App-ID
You can’t filter or sort rules in Policies > Security because that would change the order of
the policy rules in the rulebase. Filtering and sorng Policies > Security > Policy Opmizer
> No App Specified, Policies > Security > Policy Opmizer > Unused Apps, and Policies
> Security > Policy Opmizer > New App Viewer (if you have a SaaS Inline Security
subscripon) does not change the order of the rules in the rulebase.
You can click several column headers to sort rules based on applicaon usage stascs. In
addion, you can View Policy Rule Usage to help idenfy and remove unused rules to reduce
security risks and keep your policy rule base organized. Rule usage tracking allows you to quickly
validate new rule addions and rule changes and to monitor rule usage for operaons and
troubleshoong tasks.
PAN-OS® Administrator’s Guide Version 10.1 826 ©2022 Palo Alto Networks, Inc.
App-ID
• Traffic (Bytes, 30 days)—The amount of traffic seen on the rule over the last 30 days. The 30-
day window places rules that currently match the most traffic at the top of the list by default (a
longer me frame places more emphasis on older rules that would remain at the top of the list
because they have large cumulave totals even though they may no longer see much traffic).
Click to reverse the order.
• Apps Seen—Place the rules with the most or least applicaons seen at the top. The firewall
never automacally purges the applicaon data.
The firewall updates Apps Seen approximately every hour. However, if there is a large
volume of applicaon traffic or a large number of rules, it may take longer than an hour
to update. Aer you add an applicaon to a rule, wait at least an hour before running
Traffic logs to see the applicaon’s log informaon.
• Days with No New Apps—Place the rules with the most or least days since the last new
applicaon matched the rule at the top.
• (Unused Apps only) Apps Allowed—Place the rules with the most or least applicaons
configured on the rule at the top.
Applicaon usage stascs only count applicaons for rules that meet the following criteria:
PAN-OS® Administrator’s Guide Version 10.1 827 ©2022 Palo Alto Networks, Inc.
App-ID
The firewall doesn’t track applicaon usage stascs for the interzone-default and
intrazone-default Security policy rules.
If the UUID of a rule changes, the applicaon usage stascs for that rule reset because
the UUID change makes the firewall see the rule as a different (new) rule.
To see and sort the applicaons seen on a rule, in the rule’s row, click Compare or click the
number in Apps Seen.
PAN-OS® Administrator’s Guide Version 10.1 828 ©2022 Palo Alto Networks, Inc.
App-ID
For the rules you see in Policies > Security > Policy Opmizer > No App Specified and Policies >
Security > Policy Opmizer > Unused Apps, clicking Compare or the Apps Seen number brings
up Applicaons & Usage, which gives you a view of the applicaons seen on the rule and the
ability to sort them. Applicaons & Usage is also where you Migrate Port-Based to App-ID Based
Security Policy Rules and remove unused applicaons from rules.
PAN-OS® Administrator’s Guide Version 10.1 829 ©2022 Palo Alto Networks, Inc.
App-ID
You can sort the applicaons seen on the rule by all six of the Apps Seen stascs (Apps Seen is
not updated in real me and takes an hour or longer to update, depending on the volume of traffic
and number of rules).
• Applicaons—Alphabecal by applicaon name. If you configure specific ports or port ranges
for a rule’s Service (the Service cannot be any), and there are standard (applicaon default)
ports for the applicaon, and the configured ports don’t match the applicaon-default ports,
then a yellow, triangular warning icon appears next to the applicaon.
• Subcategory—Alphabecal by applicaon subcategory, derived from the applicaon content
metadata.
• Risk—According to the risk rang of the applicaon.
• First Seen—The first day the applicaon was seen on the rule. The me stamp resoluon is by
the day only (not hourly).
• Last Seen—The last day the applicaon was seen on the rule. The me stamp resoluon is by
the day only (not hourly).
• Traffic (30 days)—Traffic in bytes that matched the rule over the last 30 days is the default
sorng method.
PAN-OS® Administrator’s Guide Version 10.1 830 ©2022 Palo Alto Networks, Inc.
App-ID
Set the Timeframe to display stascs for a parcular me period—Anyme, the Past 7 days, the
Past 15 days, or the Past 30 days.
Traffic (30 days) always displays only the last 30 days of traffic in bytes. Changing the
Timeframe does not change the duraon of the Traffic (30 days) bytes measurement.
Clicking the column header orders the display and clicking the same column again reverses the
order. For example, click Risk to sort applicaons from low risk to high risk. Click Risk again to sort
applicaons from high risk to low risk.
The firewall doesn’t report applicaon usage stascs in real me for Policy Opmizer, so it isn’t a
replacement for running reports.
• The firewall updates Apps Allowed, Apps Seen, and the applicaons listed in Applicaons &
Usage approximately every hour, not in real me. If there is a large amount of traffic or a large
number of rules, updates may take longer. Aer you add an applicaon to a rule, wait at least
an hour before running Traffic logs to see the applicaon’s log informaon.
The firewall updates Apps Seen approximately every hour. However, if there is a large volume
of applicaon traffic or a large number of rules, it may take longer than an hour to update. Aer
you add an applicaon to a rule, wait at least an hour before running Traffic logs to see the
applicaon’s log informaon.
• The firewall updates Days with No New Apps and also First Seen and Last Seen on
Applicaons & Usage once per day, at midnight device me.
• For rules with large numbers of applicaons seen, it may take longer to process applicaon
usage stascs.
• For Security policy rulebases with large numbers of rules that have many applicaons, it may
take longer to process applicaon usage stascs.
• For firewalls managed by Panorama, applicaon usage data is visible only for rules Panorama
pushes to the firewalls, not for rules configured locally on individual firewalls.
PAN-OS® Administrator’s Guide Version 10.1 831 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 1 | Find the UUID of the Security policy rule whose applicaon usage data you want to clear.
There are two ways to find the UUID in the UI:
• In Policies > Security, copy the UUID from the Rule UUID column.
• In Policies > Security, select Copy UUID in the rule Name drop-down menu.
To migrate a configuraon from a legacy firewall to a Palo Alto Networks device, see Best
Pracces for Migrang to Applicaon-Based Policy.
PAN-OS® Administrator’s Guide Version 10.1 832 ©2022 Palo Alto Networks, Inc.
App-ID
The firewall updates Apps Seen approximately every hour. However, if there is a
large volume of applicaon traffic or a large number of rules, it may take longer
than an hour to update. Aer you add an applicaon to a rule, wait at least an hour
before running Traffic logs to see the applicaon’s log informaon.
• Days with No New Apps—(Click to sort.) When the applicaons seen on a port-based
rule stabilize, you can be more confident the rule is mature, conversion won’t accidentally
exclude legimate applicaons, and no more new applicaons will match the rule. The
Created and Modified dates help you evaluate a rule’s stability because older rules that
have not been modified recently may also be more stable.
• Hit Count—Displays rules with the most matches over a selected me frame. You can
exclude rules for which you reset the hit counter and specify the exclusion me period in
days. Excluding rules with recently reset hit counters prevents misconcepons about rules
that show fewer hits than you expect because you didn’t know the counter was reset.
You can also use Hit Count to View Policy Rule Usage and help idenfy and
remove unused rules to reduce security risks and keep your rulebase organized.
STEP 3 | Review the Apps Seen on port-based rules, starng with the highest priority rules.
On No Apps Specified, click Compare or the number in Apps Seen to open Applicaons &
Usage, which lists applicaons that matched a port-based rule over a specified Timeframe,
PAN-OS® Administrator’s Guide Version 10.1 833 ©2022 Palo Alto Networks, Inc.
App-ID
with each applicaon’s Risk, the date it was First Seen, the date it was Last Seen, and the
amount of traffic over the last 30 days.
You can check Applicaons seen on port-based rules over the past 7, 15, or 30 days, or
over the rule’s lifeme (Anyme). For migrang rules, Anyme provides the most complete
assessment of applicaons that matched the rule.
You can search and filter the Apps Seen, but keep in mind that it takes an hour or more to
update Apps Seen. You can also order the Apps Seen by clicking the column headers. For
example, you can click Traffic (30 days) to bring the applicaons with the most recent traffic to
the top of the list, or click Subcategory to organize the applicaons by subcategory.
The granularity of measurement for First Seen and Last Seen data is one day, so on the
day you define a rule, the dates in these two columns are the same. On the second day
the firewall sees traffic on an applicaon, you’ll see a difference in the dates.
PAN-OS® Administrator’s Guide Version 10.1 834 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 4 | Clone or add applicaons to the rule to specify the applicaons you want to allow on the
rule.
On Applicaons & Usage, convert a port-based rule to an applicaon-based rule in either of
two ways:
• Clone the rule—Preserves the original port-based rule and places the cloned applicaon-
based rule directly above it in the rulebase.
• Add Applicaons to the Rule—Replaces the original port-based rule with the new
applicaon-based rule and deletes the original rule.
If you have exisng applicaon-based rules and you want to migrate applicaons to
them from port-based rules, you can Add Applicaons to an Exisng Rule instead
of cloning a new rule or converng the port-based rule by adding applicaons to it.
Some applicaons appear on the network at intervals, for example, for quarterly or
yearly events. These applicaons may not display on the Applicaons & Usage screen
if the history isn’t long enough to capture their latest acvity.
When you clone a rule or add applicaons to a rule, nothing else about the original rule
changes. The original rule’s configuraon remains the same except for the applicaons
you added to the rule. For example, if the original rule’s Service allowed Any applicaon
or specified a parcular service, you need to change the Service to Applicaon-Default
to restrict the allowed applicaons to their default ports on the new rule.
Cloning is the safest way to migrate rules, especially when Applicaons & Usage shows more
than a few well-known applicaons matching the rule (Rule Cloning Migraon Use Case: Web
Browsing and SSL Traffic provides an example of this). Cloning preserves the original port-
based rule and places it below the cloned applicaon-based rule, which eliminates the risk of
losing applicaon availability because traffic that doesn’t match the cloned rule flows through
to the port-based rule. When traffic from legimate applicaons hasn’t hit the port-based rule
for a reasonable period of me, you can remove it to complete that rule’s migraon.
To clone a port-based rule:
1. In Apps Seen, click the check box next to each applicaon you want in the cloned rule. Keep
in mind that it takes an hour or more to update Apps Seen.
2. Click Create Cloned Rule. In the Create Cloned Rule dialog, Name the cloned rule
(“slack” in this example) and add other applicaons in the same container and applicaon
PAN-OS® Administrator’s Guide Version 10.1 835 ©2022 Palo Alto Networks, Inc.
App-ID
The green text is the selected applicaon to clone. The container applicaon (slack) is in
the gray row. The applicaons listed in italics are applicaons that have not been seen on
the rule but are in the same container as the selected applicaon. Individual applicaons
that have been seen on the rule are in normal font. All the applicaons are included in the
cloned rule by default (Add Container App, which adds all the applicaons in the container,
is selected by default) to help prevent the rule from breaking in the future.
3. If you want to allow all of the applicaons in the container, leave Add container app
selected. This also “future proofs” the rule because when an applicaon is added to the
container app, it’s automacally added to the rule.
If you want to constrain access to some of the individual applicaons in the container,
uncheck the box next to each individual applicaon you don’t want users to access. This
also unchecks the container app, so if you want to allow new applicaons in the container
later, you have to add those applicaons individually.
If you uncheck the container app, all the apps are unchecked and you manually select the
apps you want to include in the cloned rule.
4. If applicaon dependencies are listed in a box below the Applicaons (there are none in
this example), leave them checked. The applicaons you selected need those applicaon
dependencies to run. Common dependencies include ssl and web-browsing.
5. Click OK to add the new applicaon-based rule directly above the port-based rule in the
rulebase.
6. Commit the configuraon.
When you clone a rule and Commit the configuraon, the applicaons you select for the
cloned rule are removed from the original port-based rule’s Apps Seen list. For example,
if a port-based rule has 16 Apps Seen and you select two individual applicaons and one
dependent applicaon for the cloned rule, aer cloning, the port-based rule shows 13 Apps
Seen because the three selected applicaons have been removed from the port-based rule
(16-3 = 13). The cloned rule shows the three added applicaons in Apps on Rule.
Creang a cloned rule with a container app works a bit differently. For example, a port-
based rule has 16 Apps Seen and you select one individual applicaon and a container
app for the cloned rule. The container app has five individual applicaons and has one
dependent applicaon. Aer cloning, the cloned rule shows seven Apps on Rule—the
PAN-OS® Administrator’s Guide Version 10.1 836 ©2022 Palo Alto Networks, Inc.
App-ID
individual applicaon, the five individual applicaons in the container app, and the dependent
applicaon for the container app. However, in the original port-based rule, Apps Seen shows
13 applicaons because only the individual applicaon, the container app, and the container
app’s dependent applicaon are removed from the port-based rule.
In contrast to cloning, adding applicaons to a port-based rule replaces the rule with the
resulng applicaon-based rule. Adding applicaons to a rule is simpler than cloning, but riskier
because you may inadvertently miss applicaons that should be on the rule, and the original
port-based rule is no longer in the rulebase to catch accidental omissions. However, adding
applicaons to port-based rules that apply to only a few well-known applicaons migrates the
rule quickly to an applicaon-based rule. For example, for a port-based rule that only controls
traffic to TCP port 22, the only legimate applicaon is SSH, so it’s safe to add applicaons to
the rule.
Adding applicaons using the tradional Security policy rule’s Applicaon tab does
not change Apps Seen or Apps on Rule. To preserve accurate applicaon usage
informaon, when replacing port-based rules with applicaon-based rules, add
applicaons using Add to This Rule or Match Usage (or create a cloned rule or add
applicaons to an exisng applicaon-based rule instead) in Apps Seen.
There are three ways to replace a port-based rule with an applicaon-based rule by adding
applicaons (Add to This Rule and Match Usage in Apps Seen and Add in Apps on Rule):
• Add to This Rule applicaons from Apps Seen (applicaons that matched the rule). Keep in
mind that it takes an hour or more to update Apps Seen.
1. Select applicaons from Apps Seen on the rule.
2. Click Add to This Rule. In the Add to This Rule dialog, add other applicaons in the same
container app and applicaon dependencies, if required. For example, to add slack-base
to a rule:
Similar to the Create Cloned Rule dialog, the green text in Add to This Rule is the
selected applicaon to add to the rule. The container app (slack) is in the gray row. The
applicaons listed in italics are applicaons that have not been seen on the rule but are
in the same container as the selected applicaon. Individual applicaons that have been
seen on the rule are in normal font. All the applicaons are included in the cloned rule by
PAN-OS® Administrator’s Guide Version 10.1 837 ©2022 Palo Alto Networks, Inc.
App-ID
default (Add Container App, which adds all the applicaons in the container, is selected
by default) to help prevent the rule from breaking in the future.
3. If you want to allow all of the applicaons in the container, leave Add container app
selected. This also “future proofs” the rule because when an applicaon is added to the
container app, it’s automacally added to the rule.
If you want to constrain access to some of the individual applicaons in the container,
uncheck the box next to each individual applicaon you don’t want users to access.
This also unchecks the container app, so if you want to allow new applicaons in the
container later, you have to add those applicaons individually.
If you uncheck the container app, all the apps are unchecked and you manually select the
apps you want to include in the cloned rule.
4. If applicaon dependencies are listed in a box below the Applicaons (there are none in
this example), leave them checked. The applicaons you selected need those applicaon
dependencies to run.
5. Click OK to replace the port-based rule with the new applicaon-based rule.
When you Add to This Rule and Commit the configuraon, the applicaons you didn’t add
are removed from Apps Seen because the new applicaon-based rule no longer allows
them. For example, if a rule has 16 Apps Seen and you Add to This Rule three applicaons,
the resulng new rule shows only those three added applicaons in Apps Seen.
Add to This Rule with a container app works a bit differently. For example, a port-based
rule has 16 Apps Seen and you select one individual applicaon and a container app to add
to the new rule. The container app has five individual applicaons and has one dependent
applicaon. Aer adding the applicaons to the rule, the new rule shows seven Apps on
Rule—the individual applicaon, the five individual applicaons in the container app, and the
dependent applicaon for the container app. However, Apps Seen shows 13 applicaons
because the individual applicaon, the container app, and the container app’s dependent
applicaon are removed from that list.
• Add all of the Apps Seen on the rule to the rule at one me with one click (Match Usage).
Port-based rules allow any applicaon, so Apps Seen may include unneeded or
unsafe applicaons. Use Match Usage to convert a rule only when the rule has seen
a small number of well-known applicaons with legimate business purposes. A
good example is TCP port 22, which should only allow SSH traffic, so if SSH is the
only applicaon seen on a port-based rule that opens port 22, you can safely Match
Usage.
1. In Apps Seen, click Match Usage. Keep in mind that it takes an hour or more to update
Apps Seen. All the applicaons in Apps Seen are copied to Apps on Rule.
2. Click OK to create the applicaon-based rule and replace the port-based rule.
• If you know the applicaons you want on the rule, you can Add applicaons manually in
Apps on Rule. However, this method is equivalent to using the tradional Security policy
rule Applicaon tab and does not change Apps Seen or Apps on Rule. To preserve accurate
PAN-OS® Administrator’s Guide Version 10.1 838 ©2022 Palo Alto Networks, Inc.
App-ID
applicaon usage informaon, convert rules using Add to This Rule, Create Cloned Rule, or
Match Usage in Apps Seen.
1. In Apps on Rule, Add (or Browse) and select applicaons to add to the rule. This is
equivalent to adding applicaons on the Applicaon tab.
2. Click OK to add the applicaons to the rule and replace the port-based rule with the new
applicaon-based rule.
If business needs require you to allow applicaons (for example, internal custom
applicaons) on non-standard ports between parcular clients and servers, restrict
the excepon to only the required applicaon, sources, and desnaons. Consider
rewring custom applicaons so they use the applicaon default port.
Rule Cloning Migraon Use Case: Web Browsing and SSL Traffic
A port-based rule that allows web access on TCP ports 80 (HTTP web-browsing) and 443 (HTTPS
SSL) provides no control over which applicaons use those open ports. There are many web
applicaons, so a general rule that allows web traffic allows thousands of applicaons, many of
which you don’t want on your network.
This use case shows how to migrate a port-based policy that allows all web applicaons to an
applicaon-based policy that allows only the applicaons you want, so you can safely enable the
applicaons you choose to allow. For rules that see a lot of applicaons, cloning the original port-
based rule is safer than adding applicaons to the rule because adding replaces the port-based
rule, so if you inadvertently forget to add a crical applicaon, you affect applicaon availability.
And if you Match Usage, which also replaces the port-based rule, you allow all of the applicaons
the rule has seen, which could be dangerous, especially with web browsing traffic.
PAN-OS® Administrator’s Guide Version 10.1 839 ©2022 Palo Alto Networks, Inc.
App-ID
Cloning the rule retains the original port-based rule and places the cloned rule directly above
the port-based rule in the rulebase, so you can monitor the rules. Cloning also allows you to split
rules that see a lot of different applicaons—such as a port-based web traffic rule—into mulple
applicaon-based rules so you can treat different groups of applicaons differently. When you’re
sure you’re allowing all the applicaons you need to allow in the cloned rule (or rules), you can
remove the port-based rule.
This example clones a port-based web traffic rule to create an applicaon-based rule for web-
based file sharing traffic (a subset of the applicaon traffic seen on the port-based rule).
This example does not apply to using the New App Viewer to clone App-ID Cloud Engine
(ACE) applicaons (see the ACE documentaon for examples of how to do this); ACE
requires a SaaS Security Inline license.
STEP 1 | Navigate to Policies > Security > Policy Opmizer > No App Specified to view the port-
based rules.
PAN-OS® Administrator’s Guide Version 10.1 840 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | Use the sorng opons to review and select the applicaons you want to allow from Apps
Seen.
The number of Apps Seen is updated approximately every hour, so if you don’t see as
many applicaons as you expect, check again aer about an hour. Depending on the
firewall’s load, it may take longer than one hour for these fields to update.
For example, click Subcategory to sort the applicaons, scroll to the file-sharing subcategory,
and then select the applicaons you want to allow. Alternavely, you can filter (search) for file-
sharing applicaons.
STEP 4 | Click Create Cloned Rule and Name the cloned rule (file-sharing-apps in this example).
Create Cloned Rule shows the selected applicaons shaded green, the container apps shaded
gray, individual applicaons in the container that haven’t been seen on the rule in italics, and
individual applicaons that have been seen on the rule in normal text font. Scrolling through
Applicaons shows all the container apps and their individual applicaons.
Create Cloned Rule also shows the dependent applicaons for the selected applicaons. In this
example, some of the selected applicaons require (Required By) the google-base and google-
docs-base applicaons to run.
PAN-OS® Administrator’s Guide Version 10.1 841 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 7 | In Policies > Security, the cloned rule (file-sharing-apps) is inserted in the rulebase above the
original port-based rule (Traffic to internet).
STEP 8 | Click the rule name to edit the cloned rule, which inherits the properes of the original port-
based rule.
STEP 9 | On the Service/URL Category tab, delete service-hp and service-hps from Service.
This changes the Service to applicaon-default, which prevents applicaons from using non-
standard ports and further reduces the aack surface.
If business needs require you to allow applicaons (for example, internal custom
applicaons) on non-standard ports between parcular clients and servers, restrict
the excepon to only the required applicaon, sources, and desnaons. Consider
rewring custom applicaons so they use the applicaon default port.
STEP 10 | On the Source, User, and Desnaon tabs, ghten the rule to apply to only the right users in
only the right locaons (zones, subnets).
For example, you may decide to limit web file sharing acvity to only the user groups that have
business reasons to share files across the web.
STEP 13 | Repeat the process for other applicaon categories in the port-based web access rule unl
your applicaon-based rules allow only the applicaons you want to allow on your network.
When traffic you want to allow stops hing the original port-based rule for a sufficient amount
of me to be confident that the port-based rule is no longer needed, you can remove the port-
based rule from the rulebase.
PAN-OS® Administrator’s Guide Version 10.1 842 ©2022 Palo Alto Networks, Inc.
App-ID
This example does not apply to using the New App Viewer to add App-ID Cloud Engine
(ACE) applicaons to an exisng rule (see the ACE documentaon for examples of how to
do this); ACE requires a SaaS Security Inline license.
STEP 1 | You check the port-based internet access rule and discover that the rule has seen general
business applicaons and that you need to allow some of them for business purposes.
PAN-OS® Administrator’s Guide Version 10.1 843 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 2 | Select the general business apps you want to add to the exisng rule.
STEP 3 | Click Add to Exisng Rule and select the Name of the rule to which you want to add the
applicaons, in this example, general-business-applicaons.
STEP 4 | Click OK in Add Apps to Exisng Ruleto add the selected applicaons to the general-
business-applicaons rule.
STEP 6 | The updated rule now controls the original applicaons on the rule and the applicaons you
just added.
PAN-OS® Administrator’s Guide Version 10.1 844 ©2022 Palo Alto Networks, Inc.
App-ID
The number of Apps Allowed and Apps Seen are updated approximately every hour,
so if you configure applicaons on a rule and don’t see as many Apps Allowed as you
expect, check again aer about an hour. Depending on the firewall’s load, it may take
longer than one hour for these fields to update.
PAN-OS® Administrator’s Guide Version 10.1 845 ©2022 Palo Alto Networks, Inc.
App-ID
days. Excluding rules with recently reset hit counters prevents misconcepons about rules
that show fewer hits than you expect because you didn’t know the counter was reset.
You can also use Hit Count to View Policy Rule Usage.
You can also click Traffic (Bytes, 30 days) to sort by the amount of traffic a rule has seen over
the last 30 days. Use this informaon to priorize which rules to modify first. For example, you
can priorize rules with the largest difference between Apps Allowed and Apps Seen and that
also have the most Days with No New Apps, because those rules have the greatest number of
unused applicaons and are the most mature.
• The number next to Apps Seen (10 in this example) is the number of applicaons that
matched the rule. Keep in mind that it takes at least one hour for the firewall to update
Apps Seen.
• The number next to Apps on Rule (35 in this example) is how many applicaons are
configured on the rule, which is calculated by counng each applicaon in a container
app (but not the container app itself—if you configure a container app on the rule, the rule
allows the container app’s individual applicaons). Because the Applicaons list shows only
the applicaons you configure manually on the rule, when you configure a container app on
a rule, Applicaons only shows the container app, not all of the individual applicaons in the
container (unless you also manually configure the individual applicaons on the rule). For
this reason, the number of Apps on Rule may not be the same as the number of applicaons
you see in the Applicaons list.
• Click the number next to Apps on Rule to see all of the individual applicaons on the rule.
This example rule has 10 Apps Seen (applicaons that matched the rule) but allows 35 Apps
on Rule. The facebook container app is configured on the rule and the rule sees traffic from
the individual applicaons facebook-base, facebook-chat, and facebook-video (Apps Seen).
PAN-OS® Administrator’s Guide Version 10.1 846 ©2022 Palo Alto Networks, Inc.
App-ID
When you click the Apps on Rule number, the Apps on Rule dialog displays the individual
applicaons allowed, but not the container app itself.
You can clone rules from Policies > Security and from No App Specified to Migrate
Port-Based to App-ID Based Security Policy Rules. You can’t clone a rule starng
from Unused Apps.
PAN-OS® Administrator’s Guide Version 10.1 847 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 6 | Monitor updated rules and listen to user feedback to ensure that updated rules allow the
applicaons you want to allow and don’t inadvertently block periodically used applicaons.
The number of Apps Allowed and Apps Seen are updated approximately every hour.
Aer you remove all of the unused applicaons from a rule, the rule remains listed in
Policies > Security > Policy Opmzer > Unused Apps unl the firewall updates the
display. When the firewall updates the display and the number of Apps Allowed is
the same as the number of Apps Seen, the rule no longer displays in the Unused Apps
screen. However, depending on the firewall’s load, it may take longer than one hour for
these fields to update.
PAN-OS® Administrator’s Guide Version 10.1 848 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 2 | Select the Policy Applicaon Usage check box to enable the feature and deselect the check
box to disable the feature.
PAN-OS® Administrator’s Guide Version 10.1 849 ©2022 Palo Alto Networks, Inc.
App-ID
ACE requires a SaaS Security Inline subscripon. Each appliance that uses ACE must have
a valid device cerficate installed.
All hardware plaorms that support PAN-OS 10.1 or later support ACE and all appliances
on which you want to use ACE require PAN-OS 10.1 or later. Panorama cannot push and
commit ACE-based polices or objects to firewalls that don’t have a SaaS Security Inline
license installed or to firewalls that run an earlier version of PAN-OS than 10.1.
ACE is supported in the US, APAC, and EU GCP regions. The region is selected
automacally based on your CDL region.
Verify that the firewall uses the correct Content Cloud FQDN (Device > Setup > Content-
ID > Content Cloud Seng) for your region and change the FQDN if necessary:
• US—hawkeye.services-edge.paloaltonetworks.com
• EU—eu.hawkeye.services-edge.paloaltonetworks.com
• APAC—apac.hawkeye.services-edge.paloaltonetworks.com
ACE data, including traffic payloads, is sent to the servers in the selected region. If you
specify a Content Cloud FQDN that is outside of your region (for example, if you are in the
EU region but you specify the APAC region FQDN), you may break your country’s or your
organizaon’s privacy and legal regulaons.
Predefined content-delivered App-ID delivers new applicaons once per month and you need
to analyze the new App-IDs before you install them to understand changes that they may make
to Security policy rules. The monthly cadence and need for analysis slows down the adopon of
new App-IDs in policy. Although Palo Alto Networks will connue to provide new App-IDs via
monthly content updates that you need to review, ACE improves the adopon of new App-IDs
by providing on-demand App-IDs for applicaons inially idenfied as any of the following two
types:
PAN-OS® Administrator’s Guide Version 10.1 850 ©2022 Palo Alto Networks, Inc.
App-ID
• ssl—Encrypted SSL traffic is by far the most common type of network traffic, with most experts
claiming that it exceeds 90% of total traffic. If you don’t or can’t decrypt that traffic, the firewall
oen can only idenfy it as ssl instead of as the actual underlying applicaon.
• web-browsing—The firewall can’t specifically idenfy some unencrypted web-browsing traffic
because there are so many applicaons that content-delivered App-ID can’t keep up with the
ever-increasing amount.
ACE provides specific idenficaon of these applicaons, which enables you to understand them
and control them appropriately in policy.
ACE App-IDs do not idenfy other types of public applicaons and do not idenfy private
and custom applicaons. The ACE App-ID catalog does not contain predefined, content-
provided App-IDs. Content-provided App-IDs sll arrive monthly in content updates.
When the firewall encounters ssl or web-browsing traffic, the firewall sends the payload to ACE
for analysis. If there is a matching App-ID in the ACE database, ACE returns the App-ID to the
requesng firewall. If ACE has no matching App-ID for the traffic, ACE sends the payload to the
Machine Learning (ML) engine. The ML engine analyzes the payload and develops the new App-
ID in conjuncon with the human content team and drops traffic that isn’t related to applicaons.
When development finishes, the ML engine uploads new App-ID to the ACE database, and the
requesng firewall (and any other firewalls) can download the App-ID and use it in Security policy.
Because it can take several minutes to retrieve an applicaon from ACE for which it has
an App-ID and longer if a new App-ID must be developed, cloud applicaon detecon is
not inline on the firewall. The firewall does not wait for a verdict to process the applicaon
traffic. The firewall processes the traffic as ssl or web-browsing unl it receives an App-ID
from ACE and then connues to process the traffic in that way unl you receive the new
App-ID and use it in Security policy.
If you downgrade a firewall or Panorama aer ACE has been enabled and ACE cloud App-
IDs are sll in use in Security policy rules or Applicaon Groups, the downgrade fails. The
fail reason lists the objects that you need to remove from the configuraon in order to
downgrade. Remove those objects from the configuraon and Commit the configuraon,
and then the downgrade will succeed.
PAN-OS® Administrator’s Guide Version 10.1 851 ©2022 Palo Alto Networks, Inc.
App-ID
• Create Security policy rule that allows ACE traffic. (PAN-OS administrator.)
• Configure Log Forwarding from the firewall to the Cortex Data Lake (CDL). (PAN-OS
administrator.)
At the appropriate step in the following procedure, the PAN-OS administrator should
nofy the SaaS Security administrator that the deployment is ready for SaaS Security
Inline acvaon. Aer acvang SaaS Security Inline, the SaaS Security Inline
administrator should nofy the PAN-OS administrator that the deployment is ready to
complete on the PAN-OS devices. Communicaon between the administrators is essenal
to achieving a smooth deployment.
Requirements:
• Standalone firewalls, Panorama appliances, and managed firewalls must run PAN-OS 10.1 or
later.
• All ACE firewalls must have purchased a SaaS Security Inline license. Panorama does not
require a license to manage ACE firewalls or push ACE configuraons to managed firewalls.
PAN-OS® Administrator’s Guide Version 10.1 852 ©2022 Palo Alto Networks, Inc.
App-ID
• All ACE appliances must be able to connect to the US, APAC, or EU GCP region, depending on
your locaon (the region is selected automacally based on your CDL region).
Verify that the firewall uses the correct Content Cloud FQDN (Device > Setup > Content-ID >
Content Cloud Seng) for your region and change the FQDN if necessary:
• US—hawkeye.services-edge.paloaltonetworks.com
• EU—eu.hawkeye.services-edge.paloaltonetworks.com
• APAC—apac.hawkeye.services-edge.paloaltonetworks.com
ACE data, including traffic payloads, is sent to the servers in the selected region. If you specify
a Content Cloud FQDN that is outside of your region (for example, if you are in the EU region
but you specify the APAC region FQDN), you may break your country’s or your organizaon’s
privacy and legal regulaons.
The PAN-OS administrator completes the first two steps of the procedure and then hands it off
to the SaaS Security Inline administrator for acvaon (Step 3). Aer acvaon, the SaaS Security
Inline administrator hands the rest of the procedure off to the PAN-OS administrator to complete
on the PAN-OS devices.
STEP 1 | Bring the firewall and Panorama (if using) online. (PAN-OS administrator.)
STEP 2 | Install a Device Cerfcate on individual firewalls so that they can use cloud services or use
Panorama to Install the Device Cerficate for Managed Firewalls. (PAN-OS administrator.)
STEP 3 | Acvate SaaS Security Inline on every firewall that will use ACE. Acvaon enables ACE on
the firewalls. (SaaS Security administrator.)
Panorama does not require a SaaS Security Inline license to manage firewalls that
use ACE. Only managed firewalls need licenses, which you must retrieve manually as
shown in the next step.
STEP 4 | Retrieve the SaaS Security Inline license on each firewall—Panorama doesn’t need a license—
and verify that it is acvated. (PAN-OS administrator.)
The SaaS Security administrator’s acvaon sets up the licenses for the firewall, so you don’t
have to go to the Customer Support Portal or obtain Auth Codes.
1. Go to Device > Licenses > License Management and select Retrieve license keys from
license server to retrieve the license.
2. Check Device > Licenses to ensure that the SaaS Security Inline license is acve.
PAN-OS® Administrator’s Guide Version 10.1 853 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 5 | Configure a data services (dataplane) service route so that the firewall can communicate with
the App-ID Cloud Engine. (PAN-OS administrator.)
You can push this configuraon to managed firewalls from Panorama. Both Panorama
and the managed firewalls must run PAN-OS 10.1 or later.
By default, the firewall uses the management interface as the source interface for the data
services service route, but it is recommended that you configure a dataplane interface that has
connecvity to cloud services as the Source Interface and Source Address for data services, as
shown later in this step.
The issue on firewalls is that if an explicit proxy is configured on the management interface and
you use it for the data services service route, then the management interface can only connect
to the Knowledge Cloud Service (KCS), which manages the cloud applicaon and signatures.
When an explicit proxy is configured on the management interface, it cannot connect to the
Detecon Cloud Service (DCS), which checks the applicaon payload against exisng ACE
App-IDs and provides verdicts. KCS and DCS are services in the ACE cloud. If the management
interface has an explicit proxy configured, you can’t use it for the data services service route
for ACE because it can’t connect to all of the services. In this case, you must use a dataplane
interface on the firewall to connect to the data services.
Panorama uses the management port by default to connect to the KCS and does not
connect to the DCS.
To configure the service route on a data plane interface instead of using the default
management interface:
1. Select Device > Setup > Services then in Service Features, select Service Route
Configuraon.
2. Customize a service route.
3. Select the IPv4 protocol.
4. Click Data Services in the Service column to open the Service Route Source dialog box.
5. Select a Source Interface and Source Address (these cannot be the management
interface).
The source interface must have internet connecvity. The best pracce is to use a
dataplane interface that has connecvity to cloud services. See Configure Interfaces and
Create an Address Object for more informaon about creang source interfaces and
addresses.
6. Click OK to set the source interface and address.
7. Click OK to set the Service Route Configuraon.
8. Select Policies > Security and add a Security policy rule that allows traffic from the
source interface you specified earlier in this procedure to the FQDN addresses for the
KCS and DCS services, which are kcs.ace.tpcloud.paloaltonetworks (KCS
service for all regions) and hawkeye.services-edge.paloaltonetworks.com (US
region DCS service), eu.hawkeye.services-edge.paloaltonetworks.com (EU
PAN-OS® Administrator’s Guide Version 10.1 854 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 7 | (Panorama only) Enable ACE on any Panorama appliance that manages ACE-enabled
firewalls. (PAN-OS administrator.)
ACE is disabled by default on Panorama.
If you push ACE configuraons to managed groups that do not have ACE-enabled
firewalls (some or all firewalls in the group do not have ACE enabled), the push fails.
PAN-OS® Administrator’s Guide Version 10.1 855 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 9 | (Panorama only) Push the desired configuraon to the managed firewall(s). (PAN-OS
administrator.)
STEP 10 | Configure Log Forwarding to Cortex Data Lake (CDL) and enable Log Forwarding with the
correct Log Forwarding profile in Security policy rules. (PAN-OS administrator.)
A SaaS Security Inline connecon to CDL is required for SaaS visibility and to support
SaaS App-ID Policy Recommendaon. At a minimum, you must forward Traffic logs
and URL logs to CDL for SaaS Security Inline to work properly.
STEP 2 | Click edit ( ) and then either de-select Disable App-ID Cloud Engine to enable ACE or select
Disable App-ID Cloud Engine to disable ACE.
ACE is disabled by default.
STEP 4 | (Only if enabling ACE) If you are enabling ACE, the Enable App-ID Cloud Engine dialog
appears.
If the firewall or Panorama-managed firewalls have the SaaS Security Inline license installed,
click Yes to enable ACE.
PAN-OS® Administrator’s Guide Version 10.1 856 ©2022 Palo Alto Networks, Inc.
App-ID
ACE requires a SaaS Security Inline license. Firewalls that don’t support ACE have only predefined
content-based App-IDs. The ACE App-ID catalog doesn’t contain content-based App-IDs.
You can only use ACE App-IDs in Security policy rules. You cannot use ACE App-IDs in any
other type of policy rule.
• When the firewall first connects to the App-ID cloud engine, the firewall downloads a catalog
of the available ACE App-IDs, and you can use those App-IDs in Security policy. It does not
download the full signatures. The catalog enables you to use ACE App-IDs in Security policy
even if the applicaons have never been seen on the firewall. ACE pushes catalog updates to
firewalls regularly so that firewalls have access to the latest ACE App-IDs.
If an applicaon arrives at the firewall that is idenfied as ssl or web-browsing and the firewall
doesn’t have its signature, the firewall sends the payload to ACE. If ACE has an App-ID for the
traffic, ACE sends the full signatures back to the firewall. If the traffic doesn’t match any ACE
signatures, then ACE sends the payload to the Machine Learning (ML) engine. The ML engine
analyzes the payload and develops the new App-ID in conjuncon with the human content
team and drops traffic that isn’t related to applicaons. The ML engine sends the new App-ID
to ACE and requesng firewalls can download it and use it in Security policy.
Because it can take several minutes to retrieve an App-ID from ACE and longer if a new
App-ID must be developed, cloud applicaon detecon is not inline on the firewall.
The firewall does not wait for a verdict to process the applicaon traffic. The firewall
processes the traffic as ssl or web-browsing unl it receives an App-ID from ACE and
you use it in Security policy.
• When a firewall requests an App-ID from ACE, the firewall doesn’t hold the traffic, it connues
to process the traffic as usual unl it receives an App-ID from ACE.
• The firewall handles cloud App-IDs downloaded from ACE differently than it handles content-
delivered App-IDs. You don’t have to examine how new ACE App-IDs affect Security policy
before they are installed on the firewall because the firewall uses ACE App-IDs according to
previously exisng Security policy. Your exisng Security policy rules control the new ACE App-
IDs unl you explicitly use ACE App-IDs in Security policy. For example:
1. An applicaon is idenfied only as “ssl” and you have a Security policy rule that allows SSL
traffic, so the ssl rule allows that applicaon.
2. The firewall sees the ssl applicaon and sends the payload to ACE.
3. ACE idenfies the actual applicaon. If the applicaon exists in the ACE database, then ACE
sends that App-ID to the firewall. If it’s a new applicaon for which ACE does not have an
App-ID, then ACE forwards the payload to the ML Engine. The firewall does not receive the
App-ID unl the ML Engine and the human content team assign an App-ID and send it to
ACE.
4. The rule that allows ssl traffic sll allows the newly-idenfied applicaon, even though its
App-ID is no longer “ssl”. (However, if you use the new ACE App-ID in Security policy, that
policy controls the traffic. Similarly, traffic previously idenfied as web-browsing connues
to obey the Security policy rules that control web browsing traffic unl you use the ACE
App-IDs in Security policy.)
The excepon to this behavior is if another Security policy rule already specifies the App-
ID given to the traffic by ACE. The Security policy rule with the specific App-ID takes
precedence over the rule with the less specific ssl App-ID. For example, if the firewall
PAN-OS® Administrator’s Guide Version 10.1 857 ©2022 Palo Alto Networks, Inc.
App-ID
idenfies an applicaon as ssl and sends the payload to ACE to obtain the granular App-ID.
ACE returns the App-ID “app-abc”. The firewall already has a Security policy rule that allows
the App-ID “app-abc”, so the applicaon’s traffic now matches that rule.
If the rule that specifies the actual App-ID is a block rule, the applicaon is blocked even
though there is a rule that allows ssl traffic. The rule with the more specific (granular) App-ID
is the one the firewall acts on.
Unl you explicitly add new ACE App-IDs to Security policy rules, the firewall controls them
with the same rules that controlled those applicaons before they had ACE App-IDs and
were idenfied as ssl or web-browsing traffic. For example, if the firewall sees an applicaon
idenfied as web-browsing and then receives an ACE App-ID for the traffic, but you don’t use
that ACE App-ID in a Security policy rule, then the firewall sll controls that traffic using the
rule that controls web-browsing traffic—if you block web-browsing traffic, then the traffic is
blocked, and if you allow web-browsing traffic, the traffic is allowed.
• The firewall caches some informaon so that the firewall can check the cache and avoid
repeatedly sending data to the cloud and requesng verdicts. If the firewall is waing for a
verdict from ACE, the firewall doesn’t forward the same applicaon data twice.
• A parcular container app and its funconal applicaons are either all cloud-based App-IDs or
all content-based App-IDs. One App-ID delivery method defines a container app and all of its
funconal apps.
• If cloud-based, content-provided, and user-defined custom App-ID names overlap, the order of
precedence is:
1. Custom App-IDs—These App-IDs take precedence over all other App-IDs and if the firewall
aempts to download an ACE applicaon with the same App-ID, the commit fails because
two applicaons on the same firewall cannot have the same App-ID.
In this case, you can rename the custom applicaon, or if the custom applicaon is the same
applicaon as the ACE applicaon, you can delete the custom applicaon and use the ACE
applicaon.
2. Content-based, predefined App-IDs—These App-IDs take precedence over ACE cloud App-
ID definions.
3. ACE cloud App-IDs—Custom and content-based App-IDs take precedence over ACE App-ID
definions.
• If an App-ID matches a container app, the firewall downloads the container app’s App-ID and
all of its funconal apps. For example, if the firewall retrieves the facebook container app, it
also retrieves facebook-base, facebook-chat, facebook-post, etc.
PAN-OS® Administrator’s Guide Version 10.1 858 ©2022 Palo Alto Networks, Inc.
App-ID
• When you take any of the following acons to add ACE App-IDs to Security policy rules, the
firewall no longer matches the applicaon traffic to the ssl or web-browsing rule, it matches the
applicaon traffic to the rule that controls the specific App-ID:
• Create Applicaon Filters to automate adding ACE App-IDs to Security policy.
Use Applicaon Filters to automate adding ACE App-IDs to Security policy rules.
When a new App-ID matches an Applicaon Filter, the firewall automacally adds
it to the filter. When you use that Applicaon Filter in a Security policy rule, the rule
controls the applicaon traffic for the new App-IDs that were automacally added
to the filter. In other words, Applicaon Filters are your “Easy Buon” for securing
ACE App-IDs automacally to gain maximum applicaon visibility and control with
minimum effort.
• Add the App-IDs to Applicaon Groups.
• Use Policy Opmizer to add the App-IDs to a cloned rule or to an exisng rule, or to an
exisng Applicaon Filter or Applicaon Group. You can use Policy Opmizer to create new
Applicaon Filters and Applicaon Groups directly from within the Policy Opmizer tool.
Use Policy Opmizer’s sorng and filtering tools to priorize the rules to work on and to
assess how many ACE App-IDs match those rules.
• Add an ACE App-ID directly to a new or exisng Security policy rule.
When you add a cloud App-ID to a Security policy rule directly or by using an Applicaon Filter
or an Applicaon Group, that rule controls the applicaon.
• When you create Applicaon Filters, exclude ssl and web-browsing from the filters. Together,
ssl and web-browsing match all browser-based cloud applicaons, so an Applicaon Filter that
includes ssl and web-browsing matches all browser-based cloud applicaons.
• Acve/Passive High Availability:
• The Acve firewall syncs the ACE catalog to the passive firewall so that they have idencal
catalogs.
• The Passive firewall does not iniate connecons to ACE unl it becomes the Acve
firewall.
• Acve/Acve High Availability: Each device fetches catalogs and signatures separately, so the
catalogs and signatures are not synced. However, commits fail if the catalog is out-of-sync
on peers and ACE App-IDs are referenced in Security policy rules. If the catalogs of peer HA
firewalls are out-of-sync, wait a few minutes for the updates to reach the devices and become
in-sync again.
• A Panorama commit all/push failure to managed firewalls occurs if:
• Managed firewalls do not have a valid SaaS Security Inline license so they do not have the
ACE catalog. In this case, remove the ACE objects from the pushed configuraon and try
again.
• The connecon between a managed firewall and ACE goes down and the pushed
configuraon includes applicaons that are not in the ACE catalog on the firewall. In this
PAN-OS® Administrator’s Guide Version 10.1 859 ©2022 Palo Alto Networks, Inc.
App-ID
case, check the connecon to the ACE cloud and re-establish the connecon if necessary so
that the firewall can update its catalog.
The operaonal CLI command show cloud-appid connection-to-cloud provides
the cloud connecon status and the ACE cloud server URL.
• The ACE catalog on Panorama and the ACE catalog on managed firewalls is out-of-sync,
which results in pushed configuraons that include ACE apps that are not in the firewall’s
catalog. If the connecon between the firewall and ACE is up, the outdated catalog will
update in the next few minutes automacally and resolve the issue. (Wait five minutes and
try again.)
You can also use the CLI command debug cloud-appid cloud-manual-
pull check-cloud-app-data to update the catalog manually.
• Some Security profiles such as the File Blocking, Anvirus, WildFire, and DLP profiles can
specify applicaons as part of the profile. Only content-provided App-IDs are supported
in Security profiles. ACE App-IDs are not supported in Security profiles. ACE App-IDs are
intended for use in Security policy rules only.
• Because ACE App-IDs are supported only for Security policy, they are not supported in
Applicaon Override, Policy-Based Forwarding (PBF), QoS, or SD-WAN policy rules.
You cannot see ACE App-IDs in Applicaon Override or PBF rule configuraon.
However, ACE App-IDs are visible (able to be selected) in QoS and SD-WAN policy
rule configuraon and may be present in Applicaon Groups or Applicaon Filters
applied to a rule. If you use ACE App-IDs in these rules, the policy doesn’t control the
applicaon traffic and there is no effect on the applicaon traffic—the rules do not
apply to the ACE App-ID traffic even though ACE App-IDs were added to the rule.
PAN-OS® Administrator’s Guide Version 10.1 860 ©2022 Palo Alto Networks, Inc.
App-ID
Click the number in the Apps Seen column to open the Applicaons & Usage dialog to change
the way the firewall handles the cloud-based applicaons in Security policy. Add ACE App-IDs
to Security policy rules using an Applicaon Filter, an Applicaon Group, Policy Opmizer, or by
directly adding an ACE App-ID to a rule. Unl you take one of these acons to control cloud-
delivered App-IDs, the firewall connues to treat the traffic as ssl or web-browsing traffic and uses
exisng ssl or web-browsing Security policy rules to control the applicaons.
ACE provides App-IDs for applicaons that were previously idenfied as ssl or web-
browsing.
When you create Applicaon Filters, exclude ssl and web-browsing from the filters.
Together, ssl and web-browsing match all browser-based cloud applicaons, so an
Applicaon Filter that includes ssl and web-browsing matches all browser-based cloud
applicaons.
Use Policy Opmizer to add ACE App-IDs to Applicaon Filters and to apply the filters to cloned
or exisng rules and control the ACE App-IDs in Security policy.
PAN-OS® Administrator’s Guide Version 10.1 861 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 1 | Go to Policies > Security and then select Policy Opmizer > New App Viewer.
If the firewall has idenfied traffic with ACE App-IDs, a number displays next to New App
Viewer in the le navigaon window. The screen displays the Security policy rules that match
cloud App-IDs.
STEP 2 | Click the number in Apps Seen for a Security policy rule to see the cloud-delivered
applicaons that matched the rule in the Applicaons & Usage dialog.
STEP 3 | Select the applicaons that you want to add to an exisng or new Applicaon Filter.
You can sort and filter the applicaons in Apps Seen by subcategory, risk, amount of traffic
seen over the last 30 days, or when the applicaon was first or last seen.
STEP 4 | Select Applicaon Filter from Create Cloned Rule or Add to Exisng Rule, depending on
how you want to handle the applicaons.
The maximum number of applicaons you can clone using Create Cloned Rule is 1,000
applicaons. If there are more than 1,000 applicaons that you want to move to a
different rule, use Add to Exisng Rule instead. If you want to move the applicaons
to a new rule, simply create the rule first (Policies > Security) and then use Policy
Opmizer to add them to that rule.
PAN-OS® Administrator’s Guide Version 10.1 862 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 5 | Select or create the Applicaon Filter for the cloned or exisng rule. Creang an Applicaon
Filter using Policy Opmizer is the almost exactly the same as using Objects > Applicaon
Filters to create an Applicaon Filter—you use the same filtering tools and opons.
Create Cloned Rule:
1. Type the Cloned Rule Name (the name for the cloned rule, which will appear in the Security
policy rulebase immediately above the original rule).
2. Select the Policy Acon (Allow or Deny).
3. Select the Applicaon Filter Name from the menu or type the name of a new Applicaon
Filter.
4. Select whether the filter should Apply to New App-IDs only or if it should apply to all App-
IDs.
5. Use the Category, Subcategory, Risk, Tags, and Characterisc values to filter the types of
applicaons you want to add to the Applicaon Filter. The firewall automacally adds new
applicaons that meet the filter criteria to the Applicaon Filter.
6. Click OK to add the applicaons to the new or exisng Applicaon Filter. The firewall
includes the applicaons that you selected in Step 3 in the Applicaon Filter.
7. Commit the changes.
Add to Exisng Rule:
1. Select the Exisng Rule Name to add the selected applicaons to an exisng rule in an
Applicaon Filter.
2. Select the Applicaon Filter Name from the menu or type the name of a new Applicaon
Filter.
3. Select whether the Applicaon Filter is Shared, whether you want to Disable override of
applicaon characteriscs for the filter, and whether the filter should Apply to New App-
IDs only or if it should apply to all App-IDs.
4. Use the Category, Subcategory, Risk, Tags, and Characterisc values to filter the types of
applicaons you want to add to the Applicaon Filter. The firewall automacally adds new
applicaons that meet the filter criteria to the Applicaon Filter.
PAN-OS® Administrator’s Guide Version 10.1 863 ©2022 Palo Alto Networks, Inc.
App-ID
5. Click OK to add the applicaons to the new or exisng Applicaon Filter. The firewall
includes the applicaons that you selected in Step 3 in the Applicaon Filter.
6. Commit the changes.
ACE provides App-IDs for applicaons that were previously idenfied as ssl or web-
browsing.
Use Policy Opmizer to add ACE App-IDs to Applicaon Groups and to apply the groups to
cloned or exisng rules and control the ACE App-IDs in Security policy.
STEP 1 | Go to Policies > Security and then select Policy Opmizer > New App Viewer.
If the firewall or Panorama has downloaded ACE App-IDs, a number displays next to New App
Viewer in the le navigaon window. The screen displays the Security policy rules that match
downloaded cloud App-IDs.
STEP 2 | Click the number in Apps Seen for a Security policy rule to see the cloud-delivered
applicaons that matched the rule in the Applicaons & Usage dialog.
STEP 3 | Select the applicaons that you want to add to an exisng or new Applicaon Group.
You can sort and filter the applicaons in Apps Seen by subcategory, risk, amount of traffic
seen over the last 30 days, or when the applicaon was first or last seen.
PAN-OS® Administrator’s Guide Version 10.1 864 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 4 | Select Applicaon Group from Create Cloned Rule or Add to Exisng Rule, depending on
how you want to handle the applicaons.
The maximum number of applicaons you can clone using Create Cloned Rule is 1,000
applicaons. If there are more than 1,000 applicaons that you want to move to a
different rule, use Add to Exisng Rule instead. If you want to move the applicaons
to a new rule, simply create the rule first (Policies > Security) and then use Policy
Opmizer to add them to that rule.
STEP 5 | Select or create the Applicaon Group for the cloned or exisng rule. Creang Applicaon
Groups using Policy Opmizer is similar to using Objects > Applicaon Groups to create an
Applicaon Group.
Create Cloned Rule:
1. Type the Cloned Rule Name (the name for the cloned rule, which will appear in the Security
policy rulebase immediately above the original rule).
2. Select the Policy Acon (Allow or Deny).
3. In Add to Applicaon Group, select the Applicaon Group to which you want to add the
applicaons that you selected in Step 3.
4. Select whether to Add container app (default) or only to Add specific apps seen.
When you add the container app, you also add all of the funconal apps in that container,
including funconal apps that have not yet been seen on the firewall. For example, if you
add the “facebook” container app, that also adds facebook-base, facebook-chat, facebook-
posng, etc., and also any future applicaons added to the container. The container app and
its funconal apps are subject to the Security policy rule to which you add the Applicaon
Group. Selecng the container app essenally future-proofs and automates security for the
container’s apps so that you don’t have to manually add new apps in that container to your
Security policy.
Adding only the specific apps seen means that only the applicaons that you selected are
added to the Applicaon Group. If new applicaons in the same container app arrive at the
firewall, the Applicaon Group doesn’t control them and you have to manually decide how
to handle the new apps.
5. In some cases, the applicaons that you want to place in an Applicaon Group require
(depend on) other applicaons to funcon. In those cases, the Create Cloned Rule dialog
box includes Dependent Applicaons, where you can select whether to add those
PAN-OS® Administrator’s Guide Version 10.1 865 ©2022 Palo Alto Networks, Inc.
App-ID
applicaons to the cloned rule. Add the dependent applicaons to the rule to ensure that
the selected applicaons funcon properly.
PAN-OS® Administrator’s Guide Version 10.1 866 ©2022 Palo Alto Networks, Inc.
App-ID
select whether to add those applicaons to the cloned rule. Add the dependent applicaons
to the rule to ensure that the selected applicaons funcon properly.
ACE provides App-IDs for applicaons that were previously idenfied as ssl or web-
browsing.
STEP 1 | Go to Policies > Security and then select Policy Opmizer > New App Viewer.
If the firewall or Panorama has downloaded ACE App-IDs, a number displays next to New App
Viewer in the le navigaon window. The screen displays the Security policy rules that match
downloaded cloud App-IDs.
STEP 2 | Click the number in Apps Seen for a Security policy rule to see the cloud-delivered
applicaons that matched the rule in the Applicaons & Usage dialog.
STEP 3 | Select the applicaons that you want to add to an exisng or cloned Security policy rule.
You can sort and filter the applicaons in Apps Seen by subcategory, risk, amount of traffic
seen over the last 30 days, or when the applicaon was first or last seen.
PAN-OS® Administrator’s Guide Version 10.1 867 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 4 | Select Applicaons from Create Cloned Rule or Add to Exisng Rule, depending on how you
want to handle the applicaons.
The maximum number of applicaons you can clone using Create Cloned Rule is 1,000
applicaons. If there are more than 1,000 applicaons that you want to move to a
different rule, use Add to Exisng Rule instead. If you want to move the applicaons
to a new rule, simply create the rule first (Policies > Security) and then use Policy
Opmizer to add them to that rule.
PAN-OS® Administrator’s Guide Version 10.1 868 ©2022 Palo Alto Networks, Inc.
App-ID
the cloned rule. Add the dependent applicaons to the rule to ensure that the selected
applicaons funcon properly.
PAN-OS® Administrator’s Guide Version 10.1 869 ©2022 Palo Alto Networks, Inc.
App-ID
those applicaons to the cloned rule. Add the dependent applicaons to the rule to ensure
that the selected applicaons funcon properly.
PAN-OS® Administrator’s Guide Version 10.1 870 ©2022 Palo Alto Networks, Inc.
App-ID
Disabling ACE stops enforcing Security policy rules based on ACE App-IDs as soon as
you commit the change even if the SaaS Security Inline license is sll valid and acve.
• The catalog of ACE App-IDs remains on the firewall and on Panorama but the cloud engine no
longer updates the catalog.
• The connecon from the firewall to ACE no longer funcons. If you re-enable ACE or renew
the SaaS Security Inline license, it may take some me to download all of the catalog updates.
• If the SaaS Security Inline license expires, the ACE service stops working within 4-6 hours.
Panorama doesn’t require a SaaS Security Inline license, so there is no license to expire
on Panorama. However, when the license expires on managed firewalls, configuraon
pushes to those firewalls from Panorama fail if they contain ACE configuraons in
Security policy or in Applicaon Groups.
• Objects such as Applicaon Filters and Applicaon Groups are not changed, but any ACE App-
IDs that you placed in those objects are no longer enforced even though the ACE App-IDs are
sll visible.
• If you are using SaaS Policy Recommendaon, the firewall can no longer pull SaaS policy
recommendaons, so the SaaS administrator cannot push new policy recommendaons to the
firewall. Policy recommendaons that were downloaded before license expiraon remain in
the configuraon but they are not enforced (same behavior as Security policies configured with
ACE App-IDs when the license expires or ACE is disabled).
PAN-OS® Administrator’s Guide Version 10.1 871 ©2022 Palo Alto Networks, Inc.
App-ID
If it becomes necessary to roll back App-IDs, ACE reverts all of the most recently delivered cloud-
based App-IDs, signatures, metadata, categories, subcategories, and tags from the ACE catalog.
Removing the App-IDs from the catalog removes them from the firewall, which is why the commit
acon fails when the App-IDs are used in Security policy.
If you did not use the applicaons that ACE had to roll back in Security policy, there is no
impact to the configuraon and commit acons succeed.
When you aempt to commit a configuraon aer an ACE content rollback, the commit failure
message lists the applicaons that ACE reverted, as in this example Validaon Error:
To fix the issue, you must remove the listed applicaons from Security policy rules, regardless
of whether they were added directly to a rule or were added using an Applicaon Group. If the
applicaon is used in an Applicaon Group, remove it from the Applicaon Group.
In this example, content-qa-test-2 is the reverted applicaon, which is referenced in the
Applicaon Group content-qa-test-apps. Aer you remove content-qa-test-2 from the
Applicaon Group, commit acons succeed.
PAN-OS® Administrator’s Guide Version 10.1 872 ©2022 Palo Alto Networks, Inc.
App-ID
• Panorama commit all/push to managed firewalls fails. Check if any of the following condions
exist and repair them:
• Do managed firewalls have a valid SaaS Security Inline license? If not, then they do not
have the ACE catalog and the commit all/push operaon fails. Depending on whether you
want to managed firewalls to handle ACE App-IDs, either remove the ACE objects from
the pushed configuraon and try again or install valid SaaS Security Inline licenses on the
managed firewalls, wait for the catalog to download.
There are fewer than four thousand content-provided App-IDs. Aer you download
the ACE catalog, you see many thousands more applicaons on the firewall and
can confirm by checking Objects > Applicaons or by using the operaonal CLI
command show cloud-appid cloud-app-data application all to
see the new App-IDs.
• Has the connecon between a managed firewall and ACE has gone down? Check the
connecon to the ACE cloud and restore the connecon if necessary.
The operaonal CLI command show cloud-appid connection-to-cloud provides
the cloud connecon status and the ACE cloud server URL.
• The ACE catalog on Panorama and the ACE catalog on managed firewalls is out-of-sync,
which results in pushed configuraons that include ACE apps that are not in the firewall’s
catalog. If the connecon between the firewall and ACE is up, the outdated catalog will
update in the next few minutes automacally and resolve the issue. (Wait five minutes and
try again.)
You can also run the operaonal CLI command debug cloud-appid cloud-
manual-pull check-cloud-app-data to update the catalog manually.
• Are the firewalls all running PAN-OS 10.1 or later? (Pushing configuraons that reference
ACE applicaons and objects to firewalls running earlier versions than PAN-10 10.1 is not
allowed.)
• In an HA pair (acve/acve or acve/passive) that has an ACE configuraon, if you run the
operaonal command show session all or show session id <id>, the output for ACE
applicaons may show the global App-ID number instead of the applicaon name. The firewall
only shows the applicaon name if its data plane has the cloud applicaon data. If not, then the
firewall shows the global App-ID number for the applicaon instead.
• To reset the connecon to ACE (the gRPC connecon), run the operaonal CLI command
debug cloud-appid reset connection-to-cloud.
• View the ACE applicaons downloaded to the appliance with the operaonal CLI command
show cloud-appid cloud-app-data application. You can view all downloaded apps
or individual apps by App-ID or applicaon name.
• View pending requests for ACE App-IDs with the operaonal CLI command show cloud-
appid signature-dp pending-request. The output includes how many mes the
firewall sent the request to ACE (tries). Aer eleven tries, the send operaon mes out.
• The operaonal CLI command show cloud-appid has more useful opons:
PAN-OS® Administrator’s Guide Version 10.1 873 ©2022 Palo Alto Networks, Inc.
App-ID
• To view the global counters for ACE, run the operaonal CLI command show counter
global filter value all category cad (cad stands for “cloud app-idenficaon).
• To view stascs for bytes and packets received and sent to/from shared memory and to/from
the security client for services such as ACE, DLP, and IoT, run the operaonal command show
ctd-agent statistics.
• If you noce a discrepancy between the number of applicaons that match an Applicaon
Filter when you look in the user interface versus when you look in the CLI, it’s because of the
way the firewall counts matching applicaons in the user interfaces versus in the CLI:
• When you look at an Applicaon Filter in Objects > Applicaon Filters, the firewall displays
all of the matching applicaons in the ACE catalog, regardless of whether the firewall has
actually seen those applicaons and downloaded their App-IDs, and the number count
includes all of those applicaons.
• When you look at an Applicaon Filter in the CLI with the show cloud-appid
application-filter operaonal command, the firewall only displays the number of
matching applicaons for which the firewall has downloaded ACE App-IDs.
For this reason, the user interface may show more matching applicaons than the CLI for the
same Applicaon Filter.
The same thing applies to Applicaon Groups when you look at them in the user
interface versus the CLI.
• ACE App-IDs are supported for Security policy only. ACE App-IDs are not supported for any
other policy type.
However, when you configure QoS or SD-WAN policy, ACE App-IDs are visible (able to be
selected) and may be present in Applicaon Groups or Applicaon Filters applied to the rule,
but adding them to QoS or SD-WAN policy has no effect on the applicaon traffic. (The QoS
and SD-WAN policies don’t control the applicaon traffic.)
PAN-OS® Administrator’s Guide Version 10.1 874 ©2022 Palo Alto Networks, Inc.
App-ID
SaaS Policy Recommendaon requires a SaaS Security Inline subscripon. Each appliance
that uses the SaaS Policy Recommendaon Engine needs to generate and install a valid
device cerficate or use Panorama to generate and install a valid device cerficate.
A SaaS Security Inline connecon to Cortex Data Lake (CDL) is required for SaaS
visibility. Configure Log Forwarding to CDL and enable Log Forwarding with the correct
Log Forwarding profile in Security policy rules. At a minimum, you must forward Traffic logs
and URL logs to CDL for SaaS Security Inline to work properly.
All hardware plaorms that support PAN-OS 10.1 or later support SaaS Policy
Recommendaon and all appliances on which you want to use SaaS Policy
Recommendaon require PAN-OS 10.1 or later. Panorama cannot push and commit
SaaS Policy Recommendaons to firewalls that don’t have a SaaS Security Inline license
installed or to firewalls that run an earlier version of PAN-OS than 10.1.
• The SaaS Security Administrator’s Guide describes the SaaS Security administrator’s procedure
for creang Security policy rule recommendaons and then pushing them to the firewall.
• The PAN-OS Administrator’s Guide describes how the PAN-OS administrator imports and
manages policy recommendaons from the SaaS Security administrator.
The SaaS Security administrator creates the new rule, adds applicaons, users, and groups to the
rule, and sets the rule acon. The rule acon can be allow or block; no other acons are permied
for pushed rules. The SaaS Security administrator then pushes the rule to the appropriate
appliances and the rule appears in the firewall interface (Device > Policy Recommendaon >
SaaS).
The PAN-OS administrator evaluates the recommended rule and decides whether to implement
it on the firewall. If the PAN-OS administrator chooses to implement the rule, the administrator
imports it on the firewall and selects where to place the policy rule in the firewall rulebase. When
a PAN-OS administrator imports a policy recommendaon, the firewall creates the required HIP
profiles, tags, and Applicaon Groups automacally (the PAN-OS administrator doesn’t have to do
it manually).
If the SaaS Security administrator pushes Security profiles with the policy recommendaon
and those profiles don’t exist on the firewall, the firewall import fails. If the profiles already
exist on the firewall, the import succeeds.
If the SaaS Security administrator updates a policy rule recommendaon, the PAN-OS
administrator sees the update and imports it into the firewall. If the SaaS Security administrator
PAN-OS® Administrator’s Guide Version 10.1 875 ©2022 Palo Alto Networks, Inc.
App-ID
deletes a policy rule recommendaon, the PAN-OS administrator sees the acon and deletes the
rule from the firewall Security policy rulebase.
If the SaaS Security Inline license expires, the firewall no longer pulls SaaS policy
recommendaons, so you see no new recommendaons. However, Security policy rules
that you already imported connue to work.
If you disable ACE, the firewall no longer receives new cloud applicaon signatures and
App-IDs and the firewall cannot import SaaS policy recommendaons based on new ACE
App-IDs.
The ACE deployment process (connecng to the cloud, installing device cerficates, acvang
the license on the SaaS Security Portal and pushing it to Panorama and firewalls, etc.) also sets up
SaaS Policy Recommendaon.
If the SaaS Security administrator pushes Security profiles with the policy recommendaon
and those profiles don’t exist on the firewall, the firewall import fails. If the profiles already
exist on the firewall, the import succeeds.
PAN-OS® Administrator’s Guide Version 10.1 876 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 1 | Device > Policy Recommendaon > SaaS on the firewall and Panorama > Policy
Recommendaon > SaaS on Panorama show all of the SaaS policy recommendaons pushed
from the SaaS administrator. Push policy recommendaons from Panorama to managed
firewalls.
STEP 2 | Refresh ( ) Device > Policy Recommendaon > SaaS (or Panorama > Policy
Recommendaon > SaaS) to ensure that the SaaS policy recommendaons are up-to-date.
Any me you push policy recommendaons from Panorama to managed firewalls,
refresh ( ) the page on the firewalls to ensure that the recommendaons are up-to-
date.
Newly pushed policy recommendaons appear at the top of the screen. Acve
Recommendaons shows the value acve and New Updates Available shows the value Yes.
If you specify a rule name that already exists in the Security policy rulebase, the
imported rule overwrites the exisng rule.
• Aer Rule—Select the rule aer which to place the imported SaaS rule. Think about the
firewall’s rulebase and how the new rule may affect exisng rules. If you do not select a
rule (No Rule Selecon), then the rule is placed at the top of the Security policy rulebase.
In some cases, that’s not where you want to place the rule. For example, you may want
some parcular block rules to always be at the top of the rulebase, such as blocking QUIC
PAN-OS® Administrator’s Guide Version 10.1 877 ©2022 Palo Alto Networks, Inc.
App-ID
protocol. Be aware of the intent of the imported rule and be careful not to shadow exisng
rules.
The Descripon comes from the descripon entered when the SaaS administrator created the
rule. You can change it or leave it as-is.
The import process automacally creates an Applicaon Group for the applicaons
in the policy recommendaon. The name of the Applicaon Group is derived from
the Name that the SaaS Security administrator gave to the rule. The firewall also
automacally creates any HIP profiles and tags that the SaaS administrator applied to
the rule.
STEP 5 | Click OK to import the rule and add it to the Security policy rulebase in the posion selected
in Aer Rule.
STEP 6 | When you see the status message “You’ve successfully updated your Security policy rules”,
click OK.
The Locaon column now shows the rule’s locaon (vsys) on the firewall, which corresponds to
the vsys to which the SaaS administrator pushed the rule.
STEP 7 | Confirm that the imported policy rule is in the Security policy rulebase (Security > Policies) at
the specified locaon and that the firewall created the associated objects.
For example, check the Security policy rule for:
• The rule’s Source Device is populated and shows the source device for the rule on the
Source tab.
• The Applicaon Group populates the rule’s Applicaon tab.
• Associated profiles are aached to the rule (Acons tab).
Also check that:
• Objects > Applicaons Group shows the imported Applicaon Group.
• Objects > GlobalProtect > HIP Objects and Objects > GlobalProtect > HIP Profiles show
the HIP informaon pushed from the SaaS Security administrator with the rule.
If the SaaS Security administrator pushes new or updated Applicaon Groups, HIP profiles,
or tags, the firewall automacally creates or updates those objects. If the SaaS Security
administrator pushes Security profiles with the policy recommendaon update and those
profiles don’t exist on the firewall, the firewall import fails. If the profiles already exist on
the firewall, the import succeeds.
PAN-OS® Administrator’s Guide Version 10.1 878 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 1 | Refresh ( ) Device > Policy Recommendaon > SaaS (or Panorama > Policy
Recommendaon > SaaS) to ensure that you see all of the latest SaaS policy
recommendaons that the SaaS administrator pushed to the firewall.
STEP 3 | Click the Applicaon Group name in the Applicaons column to see the updated list of
applicaons that the rule controls.
STEP 5 | Click Import Policy Rule to import the policy (if there are no updates to the rule, this opon is
grayed out and you can’t select it).
The Import Policy Rule dialog appears. The Name is already populated and cannot be changed
because the rule has already been imported. Aer Rule also cannot be changed in the dialog,
but if you want to change the rule’s locaon in the Security policy rulebase, you can do that on
Policies > Security in the same way that you change the posion of any Security policy rule.
You can change the Descripon or leave it as-is.
STEP 7 | Click Yes in Confirm Change to import the updated rule (or click No if you don’t want to
import the changed rule).
The firewall automacally makes any changes to the Applicaon Group, HIP profiles, and tags
associated with the rule.
The Import Policy Rule opon is grayed out because the rule can no longer be
imported.
PAN-OS® Administrator’s Guide Version 10.1 879 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 4 | In the Confirm Change dialog, click Yes to remove the rule from the policy recommendaon
database.
This acon only removes the rule from the policy recommendaon rule list. It does NOT
remove the rule from the Security policy rulebase. You must manually remove the rule
from the rulebase.
STEP 5 | A Status dialog appears to confirm that the policy recommendaon mapping has been
removed, but you sll need to remove the rule from the Security policy rulebase.
STEP 6 | Go to Policies > Security and delete the rule from the Security policy rulebase.
PAN-OS® Administrator’s Guide Version 10.1 880 ©2022 Palo Alto Networks, Inc.
App-ID
• H.323 (H.225 and H.248) ALG is not supported in gatekeeper routed mode.
• When the firewall serves as an ALG for the Session Iniaon Protocol (SIP), by default
it performs NAT on the payload and opens dynamic pinholes for media ports. In some
cases, depending on the SIP applicaons in use in your environment, the SIP endpoints
have NAT intelligence embedded in their clients. In such cases, you might need to
disable the SIP ALG funconality to prevent the firewall from modifying the signaling
sessions. When SIP ALG is disabled, if App-ID determines that a session is SIP, the
payload is not translated and dynamic pinholes are not opened. See Disable the SIP
Applicaon-level Gateway (ALG).
When you use Dynamic IP and Port (DIPP) NAT, the Palo Alto Networks firewall ALG
decoder needs a combinaon of IP and Port (Sent-by Address and Sent-by Port) under SIP
headers (Contact and Via fields) to be able to translate the menoned headers and open
predict sessions based on them.
The following table lists IPv4, NAT, IPv6, NPTv6 and NAT64 ALGs and indicates with a check mark
whether the ALG supports each protocol (such as SIP).
SIP — —
SCCP — —
MGCP — — —
FTP —
RTSP —
MySQL — — —
PAN-OS® Administrator’s Guide Version 10.1 881 ©2022 Palo Alto Networks, Inc.
App-ID
Oracle/ —
SQLNet/ TNS
RPC — — —
RSH — — —
UNISm — — —
H.225 — — —
H.248 — — —
PAN-OS® Administrator’s Guide Version 10.1 882 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 3 | Select Customize... for ALG in the Opons secon of the Applicaon dialog box.
STEP 4 | Select the Disable ALG check box in the Applicaon - sip dialog box and click OK.
STEP 5 | Close the Applicaon dialog box and Commit the change.
PAN-OS® Administrator’s Guide Version 10.1 883 ©2022 Palo Alto Networks, Inc.
App-ID
To understand how to use HTTP headers to manage SaaS applicaons, see the following:
• Understand SaaS Custom Headers
• Domains used by the Predefined SaaS Applicaon Types
• Create HTTP Header Inseron Entries using Predefined Types
• Create Custom HTTP Header Inseron Entries
PAN-OS® Administrator’s Guide Version 10.1 884 ©2022 Palo Alto Networks, Inc.
App-ID
The following table lists the headers that you can use for the SaaS applicaons for which Palo
Alto Networks provides predefined support; each header also includes a link to more informaon
specific to that header.
PAN-OS® Administrator’s Guide Version 10.1 885 ©2022 Palo Alto Networks, Inc.
App-ID
PAN-OS® Administrator’s Guide Version 10.1 886 ©2022 Palo Alto Networks, Inc.
App-ID
Applicaon Domains
Dropbox *.dropbox.com
G Suite *.google.com
gmail.com
YouTube www.youtube.com
m.youtube.com
youtubei.googleapis.com
youtube.googleapis.com
www.youtube-nocookie.com
PAN-OS® Administrator’s Guide Version 10.1 887 ©2022 Palo Alto Networks, Inc.
App-ID
If you are configuring SSL decrypon for Dropbox, then you must also configure your
Dropbox clients to allow SSL traffic. These procedures are specific and private to
Dropbox — to obtain these procedures, contact your Dropbox account representave.
1. Add a Custom URL Category for the SaaS applicaon you are managing (Objects >
Custom Objects > URL Category).
2. Specify a Name for the category.
3. Add the domains specific to the SaaS applicaon you are managing or for which you
want to insert the username and domain in the headers. See Domains used by the
Predefined SaaS Applicaon Types for a list of the domains that you use for each of
the predefined SaaS applicaons. See Insert Username in HTTP Headers for more
informaon on configuring the firewall to include the username and domain in the HTTP
headers.
Each domain name can be up to 254 characters and you can idenfy a maximum
of 50 domains for each entry. The domain list supports wildcards (for example,
*.example.com). As a best pracce, do not nest wildcards (for example, *.*.*) and do
not overlap domains within the same URL profile.
4. For SaaS applicaon management, Create a Decrypon Policy Rule and, as you follow
this procedure, configure the following:
• In the Service/URL Category tab, Add the URL Category that you created in the
previous step.
• In the Opons tab, make sure the Acon is set to Decrypt and that the Type is set to
SSL Forward Proxy.
STEP 3 | Select HTTP Header Inseron in the URL Filtering Profile dialog.
PAN-OS® Administrator’s Guide Version 10.1 888 ©2022 Palo Alto Networks, Inc.
App-ID
STEP 5 | Add or edit a Security Policy rule (Policies > Security) to include the HTTP header inseron
URL filtering profile.
• For SaaS applicaon management, allow users to access the SaaS applicaon for which you
are configuring this header inseron rule.
• To include the username and domain in the HTTP headers, apply the URL filtering profile to
the security policy rule for HTTP or HTTPS traffic.
1. Choose the URL filtering profile (Acons > URL Filtering) that you edited or created in
Step 2.
2. Click OK to save and then Commit your changes.
STEP 3 | Select HTTP Header Inseron in the URL Filtering Profile dialog.
PAN-OS® Administrator’s Guide Version 10.1 889 ©2022 Palo Alto Networks, Inc.
App-ID
HTTP header inseron occurs when a domain in this list matches the domain in
the Host header of the HTTP request.
4. Add headers to the Headers list.
You can add up to 5 headers, and each header can have up to 100 characters but cannot
contain any spaces.
5. For each header, enter a Value.
Each header value can have up to 512 characters.
6. (Oponal) Log inseron acvity for the headers.
7. Click OK to save your changes.
STEP 5 | Add or edit a Security policy rule (Policies > Security) that allows users to access the SaaS
applicaon for which you are configuring this header inseron rule.
1. Choose the URL Filtering profile (Acons > URL Filtering) that you edited or created in
Step 2.
2. Click OK to save and then Commit your changes.
STEP 6 | Verify that access to the SaaS applicaon is working in the way you expect. From an endpoint
that is connected to your network:
1. Try to access an account or content that you expect to be able to access. If you cannot
access the SaaS account or content, then the configuraon is not working.
2. Try to access an account or content that you expect will be blocked. If you can access the
SaaS account or content, then the configuraon is not working.
3. If both of the previous steps work as expected, then you can View Logs (if you
configured logging in step 4.6) and you should see the recorded HTTP header inseron
acvity.
PAN-OS® Administrator’s Guide Version 10.1 890 ©2022 Palo Alto Networks, Inc.
App-ID
Then add the service object in a policy rule to apply the custom meouts to the applicaon(s) the
rule enforces.
The following steps describe how apply custom meouts to applicaons; to apply custom
meouts to user groups, you can follow the same steps but just make sure to add the service
object to the security policy rule that enforces the users to whom you want the meout to apply.
STEP 1 | Select Objects > Services to add or modify a service object.
You can also create service objects as you are defining match criteria for a security policy rule:
select Policies > Security > Service/URL Category and Add a new Service object to apply to
the applicaon traffic the rule governs.
STEP 2 | Select the protocol for the service to use (TCP or UDP).
STEP 3 | Enter the desnaon port number or a range of port numbers used by the service.
STEP 5 | If you chose to override the applicaon meout and define a custom session meout,
connue to:
• Enter a TCP Timeout value to set the Maximum length of me in seconds that a TCP
session can remain open aer data transmission has started. When this me expires, the
session closes. The value range is 1 - 604800, and the default value is 3600 seconds.
• Enter a TCP Half Closed value to set the maximum length of me in seconds that a
session remains in the session table between receiving the first FIN packet and receiving
PAN-OS® Administrator’s Guide Version 10.1 891 ©2022 Palo Alto Networks, Inc.
App-ID
the second FIN packet or RST packet. If the mer expires, the session closes. The value
range is 1 - 604800, and the default value is 120 seconds.
• Enter a TCP Wait Time value to set the maximum length of me in seconds that a session
remains in the session table aer receiving the second FIN packet or a RST packet. When
the mer expires, the session closes. The value range is 1 - 600, and the default value is
15 seconds.
STEP 7 | Select Policies > Security and Add or modify a policy rule to govern the applicaon traffic
you want to control.
STEP 8 | Select Service/URL Category and Add the service object you just created to the security
policy rule.
PAN-OS® Administrator’s Guide Version 10.1 892 ©2022 Palo Alto Networks, Inc.
Device-ID
> Device-ID Overview
> Prepare to Deploy Device-ID
> Configure Device-ID
> Manage Device-ID
> CLI Commands for Device-ID
893
Device-ID
Device-ID Overview
According to the 2020 Unit 42 IoT Threat Report, 30% of all network-connected devices in an
average enterprise are IoT. This presents a constantly growing area of risk with many possibilies
for exploitaon by malicious users. Addionally, once you idenfy these devices, how do you
secure them from vulnerabilies such as outdated operang soware? Using Device-ID™
on your firewalls, you can get device context for events on your network, obtain policy rule
recommendaons for those devices, write policy rules based on devices, and enforce Security
policy based on the recommendaons.
Similar to how User-ID provides user-based policy and App-ID provides app-based policy,
Device-ID provides policy rules that are based on a device, regardless of changes to its IP
address or locaon. By providing traceability for devices and associang network events with
specific devices, Device-ID allows you to gain context for how events relate to devices and write
policies that are associated with devices, instead of users, locaons, or IP addresses, which can
change over me. You can use Device-ID in Security, Decrypon, Quality of Service (QoS), and
Authencaon policies.
For Device-ID features to be available on a firewall, you must purchase an IoT Security
subscripon and select the firewall during the IoT Security onboarding process. There are two
types of IoT Security subscripons:
• IoT Security Subscripon
• IoT Security – Doesn’t Require Data Lake (DRDL) Subscripon
With the first subscripon, firewalls send data logs to the logging service, which streams them to
IoT Security for analysis and to a Cortex Data Lake instance for storage. The data lake instance
can either be a new or exisng one. With the second subscripon, firewalls send data logs to
the logging service, which streams them to IoT Security for analysis but not to a Cortex Data
Lake instance for storage. It’s important to note that both IoT Security and IoT Security (DRDL)
subscripons provide the same funconality in terms of IoT Security and Device-ID.
To permit connecons to IoT Security, a firewall needs a device license; and to permit connecons
to the logging service, it needs a logging service license. A firewall also requires a device cerficate
to authencate itself when connecng to IoT Security and the logging service.
If you use PAN-OS version 8.1.0 through PAN-OS 9.1.x on a firewall, the IoT Security license
provides device classificaon, behavior analysis, and threat analysis for your devices. If you use
PAN-OS 10.1 or later, you can use Device-ID to obtain IP address-to-device mappings to view
device context for network events, use IoT Security to obtain policy rule recommendaons for
these devices, and gain visibility for devices in reports and the ACC.
You can create a device-based Security policy on any Panorama or firewall that uses PAN-
OS version 10.0 or later. To enforce the Security policy, the device must have a valid IoT
Security license.
To idenfy and classify devices, the IoT Security app uses metadata from logs, network protocols,
and sessions on the firewall. This does not include private or sensive informaon or data that is
not relevant for device idenficaon. Metadata also forms the basis of the expected behavior for
the device, which then establishes the criteria for the policy rule recommendaon that defines
what traffic and protocols to allow for that device.
PAN-OS® Administrator’s Guide Version 10.1 894 ©2022 Palo Alto Networks, Inc.
Device-ID
When a firewall imports security policy rule recommendaons and IP address-to-device mappings
from IoT Security, the firewall sends its device cerficate to an edge server to authencate itself.
The edge server authencates itself to the firewall by sending its own cerficate. The firewall uses
Online Cerficate Status Protocol (OCSP) to validate the server’s cerficate by checking it against
the following sites using HTTP on TCP port 80:
• o.lencr.org
• c.lencr.org
Panorama performs the same check to validate the edge server’s cerficate when Panorama
imports policy rule recommendaons from IoT Security.
Aer IoT Security idenfies and classifies the devices in your network using the Palo Alto
Networks firewalls already in your network, so you don’t have to implement new devices or
third-party soluons, Device-ID can leverage this data to match devices with policy rules and
provide device context for network events. Through the visibility that the firewall or Panorama
provides for traffic, apps, users, devices, and threats, you can instantly trace network events back
to individual devices and obtain Security policy rule recommendaons for securing those devices.
All firewall plaorms that support PAN-OS 10.1 support Device-ID and the IoT Security
app with the excepon of the VM-50 series, the VM-200, the CN series, and Prisma
Access.
There are six levels of classificaon (also known as aributes) for devices:
Aribute Example
Model iPad
To obtain policy rule recommendaons for devices in your network, the firewall observes traffic
to generate Enhanced Applicaon logs (EALs). The firewall then forwards the EALs to the logging
service. The IoT Security app receives logs from the logging service for analysis, provides IP
address-to-device mappings, and generates the latest policy rule recommendaons for your
devices. Using the IoT Security app, you can review these policy rule recommendaons and create
a Security policy for these devices. Aer you acvate the policy rules in the IoT Security app,
import them to the firewall or Panorama and commit your Security policy.
The firewall must be able to observe DHCP broadcast and unicast traffic on your network
to idenfy devices with dynamically assigned network sengs. IoT Security also supports
stac IP devices. The more traffic the firewall can observe, the more accurate the policy rule
recommendaons are for the device and the more rapid and accurate the IP address-to-device
PAN-OS® Administrator’s Guide Version 10.1 895 ©2022 Palo Alto Networks, Inc.
Device-ID
mappings are for the device. When a device sends DHCP traffic to obtain an IP address, the
firewall observes this type of request, it generates EALs to send to the logging service, where IoT
Security accesses them for analysis.
To observe traffic on an L2 interface, you must configure a VLAN for that interface. By
allowing the firewall to treat the interface as an L3 interface for a DHCP relay, it can
observe the DHCP broadcast traffic without impacng traffic or performance.
Because the firewall needs to both detect the devices based on their traffic and then enforce
Security policy for those devices, the firewall acts as both a sensor to collect metadata from
devices and an enforcer by enforcing your Security policy for the devices. The IoT Security app
automacally detects new devices as soon as they send DHCP traffic and can idenfy 95% of
devices within the first week.
Each applicaon has an individual recommendaon that you import to the firewall or Panorama
as a rule. When you import the recommendaon, the firewall or Panorama creates at least two
objects to define the device behavior from the recommendaon:
• A source device object that idenfies the device where the traffic originates
• One or more desnaon objects that idenfy the permied desnaons for the traffic, which
can be a device, IP address, or Fully Qualified Domain Name (FQDN)
If any of the device objects already exist on the firewall or Panorama, the firewall or Panorama
updates the device object instead of creang a new device objects. You can use these device
objects in Security, authencaon, decrypon, and Quality of Service (QoS) policies.
Addionally, the firewall assigns two tags to each rule:
• One that idenfies the source device, including the category (such as NetworkDevice -
TrendNet).
• One that indicates that the rule is an IoT policy rule recommendaon
(IoTSecurityRecommended).
Because the tags that the firewall assigns to the rule are the only way to restore your
mappings if they become out of sync, do not edit or remove the tags.
For opmal deployment and operaon of Device-ID, we recommend the following best pracces:
• Deploy Device-ID on firewalls that are centrally located in your network. For example, if you
have a large environment, deploy Device-ID on a firewall that is upstream from the IP address
management (IPAM) device. If you have a small environment, deploy Device-ID on a firewall
that is acng as a DHCP server.
• During inial deployment, allow Device-ID to collect metadata from your network for at least
fourteen days. If devices are not acve daily, the idenficaon process may take longer.
• Write device-based policy in order of your most crical devices to least crical. Priorize by:
1. Class (secure networked devices first)
2. Crical devices (such as servers or MRI machines)
3. Environment-specific devices (such as fire alarms and badge readers)
4. Consumer-facing IoT devices (such as a smart watch or smart speaker)
PAN-OS® Administrator’s Guide Version 10.1 896 ©2022 Palo Alto Networks, Inc.
Device-ID
PAN-OS® Administrator’s Guide Version 10.1 897 ©2022 Palo Alto Networks, Inc.
Device-ID
If you use Panorama to manage mulple firewalls, Palo Alto Networks strongly
recommends upgrading all firewalls in your Device-ID deployment to PAN-OS 10.0 or a
later version. If you create a rule that uses Device as a match criteria and Panorama
pushes the rule to a firewall that uses PAN-OS 9.1 or an earlier version, the firewall
omits the Device match criteria because it is not supported, which may cause issues
with policy rule traffic matching.
STEP 2 | Acvate your Cortex Data Lake instance and connect your firewall to the instance.
1. Acvate a Cortex Data Lake instance.
2. Onboard your firewall to Cortex Data Lake.
STEP 3 | (L2 interfaces only) Create a VLAN interface for each L2 interface so the firewall can observe
the DHCP broadcast traffic.
STEP 4 | (Oponal) Configure a service route to allow the necessary traffic for Device-ID and IoT
Security.
By default, the firewall uses the management interface. To use a different interface, complete
the following steps.
1. Select Device > Setup > Services then select Service Route Configuraon.
2. Customize a service route.
3. Select the IPv4 protocol.
STEP 5 | Use App-IDs to allow the necessary traffic for Device-ID and IoT Security.
Purpose App-ID
Allow traffic for all EALs and all session logs. paloalto-logging-service
PAN-OS® Administrator’s Guide Version 10.1 898 ©2022 Palo Alto Networks, Inc.
Device-ID
Purpose App-ID
STEP 6 | If there’s a third-party firewall between the internet and Panorama and Panorama-managed
next-generaon firewalls, make sure it allows the necessary traffic for Device-ID and IoT
Security.
PAN-OS® Administrator’s Guide Version 10.1 899 ©2022 Palo Alto Networks, Inc.
Device-ID
(IoT Security subscripon + See TCP Ports and FQDNs Required for Cortex Data Lake.
Cortex Data Lake) Forward
logs to Cortex Data Lake.
PAN-OS versions 10.0.0 - 10.0.2 connect to the edge services FQDN in the
Americas region by default (iot.services-edge.paloaltonetworks.com).
For firewalls running these PAN-OS versions to connect to the FQDN in the EU
region (eu.iot.services-edge.paloaltonetworks.com), Asia-Pacific
region (apac.iot.services-edge.paloaltonetworks.com), or Japan
(jp.iot.services-edge.paloaltonetworks.com), you must manually
configure it. For PAN-OS versions 10.0.3 and later, firewalls automacally discover
the correct FQDN to use based on the region set during the IoT Security onboarding
process. There is no need to set it manually.
STEP 7 | If there’s a third-party firewall between the internet and next-generaon firewalls (without
Panorama), make sure it allows the necessary traffic for Device-ID and IoT Security.
PAN-OS® Administrator’s Guide Version 10.1 900 ©2022 Palo Alto Networks, Inc.
Device-ID
(IoT Security subscripon + Cortex See TCP Ports and FQDNs Required for Cortex Data
Data Lake) Forward logs to Cortex Lake.
Data Lake.
PAN-OS® Administrator’s Guide Version 10.1 901 ©2022 Palo Alto Networks, Inc.
Device-ID
STEP 8 | Configure your firewall to observe and generate logs for DHCP traffic then forward the logs
for processing and analysis by IoT Security.
• If the firewall is acng as a DHCP server:
1. Enable Enhanced Applicaon logging.
2. Create a log forwarding profile to forward the logs to Cortex Data Lake for processing.
3. (Not supported on the PA-3200, PA-5200, PA-5450, or PA-7000) Enable the DHCP
Broadcast Session opon (Device > Setup > Session > Session Sengs).
4. Create a Security policy rule to allow dhcp as the Applicaon type.
• If the firewall is not a DHCP server, configure an interface as a DHCP relay agent so that the
firewall can generate EALs for the DHCP traffic it receives from clients.
• If your DHCP server is on the same network segment as the interface your firewall, deploy
a virtual wire interface in front of the DHCP server to ensure the firewall generates EALs for
all packets in the inial DHCP exchange with minimal performance impact.
1. Configure a virtual wire interface with corresponding zones and enable the Mulcast
Firewalling opon (Network > Virtual Wires > Add).
2. Configure a rule to allow DHCP traffic to and from the DHCP server between the virtual
wire zones. The policy must allow all exisng traffic that the server currently observes
and use the same log forwarding profile as the rest of your rules.
3. To allow the DHCP servers to check if an IP address is acve before assigning it as a
lease to a new request, configure a rule to allow pings from the DHCP server to the rest
of the subnet.
4. Configure a rule to allow all other traffic to and from the DHCP server that does not
forward logs for traffic matches.
5. Configure the DHCP server host to use the first virtual wire interface and the network
switch to use the second virtual wire interface. To minimize cabling, you can use an
isolated VLAN in the switching infrastructure instead of connecng the DHCP server
host directly to the firewall.
• If you want to use a tap interface to gain visibility into DHCP traffic that the firewall doesn’t
usually observe due to the current configuraon or topology of the network, use the
following configuraon as a best pracce.
1. Configure a tap interface and corresponding zone.
2. Configure a rule to match DHCP traffic that uses the same log forwarding profile as the
rest of your rules.
3. To minimize the session load on the firewall, configure a rule to drop all other traffic.
4. Connect the tap interface to the port mirror on the network switch.
PAN-OS® Administrator’s Guide Version 10.1 902 ©2022 Palo Alto Networks, Inc.
Device-ID
PAN-OS® Administrator’s Guide Version 10.1 903 ©2022 Palo Alto Networks, Inc.
Device-ID
Configure Device-ID
Complete the following tasks to import the IP address-to-device mappings and policy rule
recommendaons from IoT Security to your firewall or Panorama.
If you use Panorama to manage mulple firewalls, Palo Alto Networks strongly
recommends upgrading all firewalls in your Device-ID deployment to PAN-OS 10.0 or a
later version. If you create a rule that uses Device as a match criteria and Panorama
pushes the rule to a firewall that uses PAN-OS 9.1 or an earlier version, the firewall omits
the Device match criteria because it is not supported, which may cause issues with
policy rule traffic matching.
STEP 2 | Define your IoT Security policy on the IoT Security app.
1. On the IoT Security app, select the source device object.
2. Create a new set of policy rules for the source device object.
For more informaon about creang security policies with the IoT Security app, refer to
Recommend Security Policies.
3. Acvate the policy rules to confirm your changes.
PAN-OS® Administrator’s Guide Version 10.1 904 ©2022 Palo Alto Networks, Inc.
Device-ID
STEP 3 | Import the IP address-to-device mappings and policy rule recommendaons to the firewall or
Panorama.
1. Import the policy rule recommendaon.
• On the firewall, select Device > Policy Recommendaon > IoT.
• For Panorama, select Panorama > Policy Recommendaon > IoT then push the policy
rules to the firewalls that Panorama manages.
Aer you push the policy to the firewalls, you must Sync Policy Rules on the
firewalls to create the policy rule recommendaon-to-policy rule mapping.
When you select Policy Recommendaon, the firewall or Panorama communicates
with IoT Security to obtain the latest policy rule recommendaons. The policy rule
recommendaons are not cached on the firewall or Panorama.
Because IoT Security creates the policy rule recommendaon using the trusted
behavior for the device, the default acon for the rule is allow.
2. Select the Source Device Profile.
3. Verify that the Desnaon Device Profile and permied Applicaons are correct.
4. Select Import Policy Rules to import the policy rules.
5. (Panorama only) Select the Locaon of the device group where you want to import the
policy rules.
6. Enter a Name for the policy rules.
7. (Panorama only) Select the Desnaon Type (Pre-Rulebase or Post-Rulebase).
8. Select Aer Rule to define the placement of the rule in the rulebase.
• No Rule Selecon—Places the rule at the top of the rulebase.
• Default One—Places the rule aer the listed rule.
In your Security policy, Device-ID rules must precede any exisng rules that
apply to the devices.
9. Repeat this process for each policy rule recommendaon to create rules to allow access
for each device object to the necessary desnaon(s).
10. Click OK and Commit your changes.
STEP 4 | Enable Device-ID in each zone where you want to use Device-ID to detect devices and
enforce your Security policy.
By default, Device-ID maps all subnetworks in the zones where you enable it. You can modify
which subnetworks Device-ID maps in the Include List and Exclude List.
As a best pracce, enable Device-ID in the source zone to detect devices and enforce
security policy. Only enable Device-ID for internal zones.
PAN-OS® Administrator’s Guide Version 10.1 905 ©2022 Palo Alto Networks, Inc.
Device-ID
2. Select the Source tab, then verify the Source Device Profile.
3. Select the Desnaon tab and verify the Desnaon Device Profile.
4. Select the Applicaon tab and verify the Applicaons.
5. Select the Acons tab and verify the Acon (default is Allow).
6. Use Explore to verify CDL receives your logs and review which logs CDL receives.
STEP 7 | Create custom device objects for any devices that do not have IoT Security policy rule
recommendaons.
For example, you cannot secure devices such as laptops and smartphones using policy rule
recommendaons, so you must manually create device objects for these types of devices
to use in your Security policy. For more informaon on custom device objects, see Manage
Device-ID.
STEP 8 | Use the device objects to enforce policy rules and to monitor and idenfy potenal issues.
The following list includes some example use cases for device objects.
• Use source device objects and desnaon device objects in Security, Authencaon, QoS, &
decrypon policies.
• Use the decrypon log to idenfy failures and which assets are the most crical to decrypt.
• View device object acvity in ACC to track new devices and device behavior.
• Use device objects to create a custom report (for example, for incident reports or audits).
PAN-OS® Administrator’s Guide Version 10.1 906 ©2022 Palo Alto Networks, Inc.
Device-ID
Manage Device-ID
Perform the following tasks as needed to ensure your policy rule recommendaons and device
objects are current or to restore policy rule recommendaon mappings.
STEP 1 | Update your policy rule recommendaon whenever the New Updates Available column
displays Yes for that recommendaon.
As devices gain new capabilies, IoT Security updates the policy rule recommendaons to
advise what addional traffic or protocols the firewall or Panorama should allow. Check IoT
Security daily for updates and update your policy rule recommendaons as soon as possible.
1. On the IoT Security app, Edit the policy rules then click Next.
2. Select the new recommendaon then click Next.
3. Save your changes.
4. On the firewall or Panorama, click Import Policy Rules then click Yes to confirm that you
want to overwrite the current rule.
This acon overwrites the recommendaon for the rule, not the rule itself.
5. (Panorama only) Repeat the previous step for all device groups.
6. Commit your changes.
STEP 2 | Review, update, and maintain the device objects in the Device Diconary.
You must create device objects for any devices that do not have an IoT Security policy
rule recommendaon. For example, you cannot secure devices such as laptops and
smartphones using IoT Security policy rule recommendaons, so you must create
device objects for these types of devices and use them in your Security policy to secure
these devices.
Always use a unique name for each device object. Do not change the tags in the
descripon for device objects from policy rule recommendaons.
5. (Panorama only) Select the Shared opon to make this device object available to other
device groups.
6. Select the aributes for the device object (Category, OS, Profile, Osfamily, Model, and
Vendor).
7. Click OK to confirm your changes.
PAN-OS® Administrator’s Guide Version 10.1 907 ©2022 Palo Alto Networks, Inc.
Device-ID
STEP 3 | In some cases (for example, if you restore a previous configuraon), the policy rule
recommendaon-to-policy rule mappings may become out of sync. You must also sync the
mappings on each firewall aer you push the policy rules from Panorama to the firewalls that
Panorama manages. To sync the mappings:
• On the firewall, select Device > Policy Recommendaon > IoT > Sync Policy Rules
• For Panorama, select Panorama > Policy Recommendaon > IoT > Sync Policy Rules.
The firewall or Panorama scans all of the rules in the rulebase to check for tags that idenfy
a rule as an IoT Security policy rule recommendaon, obtains the source device object
informaon, and repopulates the local policy rule recommendaon database.
STEP 4 | Delete any policy rule recommendaons that are no longer needed.
If a policy rule recommendaon no longer applies, you can remove the policy rule
recommendaon. You must also remove the rule for the policy rule recommendaon to enforce
the updated Security policy.
1. On the IoT Security app, select Delete.
2. Click Mark as Removed to select this recommendaon for removal.
3. Remove the mapping.
• On the firewall, select Device > Policy Recommendaon > IoT > Remove Policy
Mapping.
• For Panorama, select Device > Policy Recommendaon > IoT > Remove Policy
Mapping then select the Locaon from which you want to remove the mapping.
4. Click Yes to confirm the mapping removal.
5. Select Policies > Security. For Panorama, select Policies > Security > Pre-Rules/Post-
Rules.
6. Select the rule for the policy rule recommendaon you want to remove then select
Delete.
7. Commit your changes.
STEP 5 | Use CLI commands to troubleshoot any issues between the firewall and IoT Security.
PAN-OS® Administrator’s Guide Version 10.1 908 ©2022 Palo Alto Networks, Inc.
Device-ID
Example Command
View more details about the connecon between show iot eal conn
the firewall and Cortex Data Lake.
View a summary of the EAL counters by plane show iot eal dpi-eal
(dataplane or management plane), such as the
PAN-OS version and serial number.
View EAL counters by plane (dataplane or show iot eal dpi-stats all
management plane) and by protocol.
View a summary of Host Informaon Profile (HIP) show iot eal hipreport-eal
Match report counters.
View EAL log response me counters. show iot eal response-time
View details for the health of the connecon show iot icd statistics all
to the edge service between the firewall and
the IoT Security app and counters for the IP
address-to-device mappings and policy rule
recommendaons.
View counters for the connecon to the edge show iot icd statistics conn
service.
PAN-OS® Administrator’s Guide Version 10.1 909 ©2022 Palo Alto Networks, Inc.
Device-ID
Example Command
PAN-OS® Administrator’s Guide Version 10.1 910 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
The Palo Alto Networks® next-generaon firewall protects and defends your network
from commodity threats and advanced persistent threats (APTs). The mul-pronged
detecon mechanisms of the firewall include a signature-based (IPS/Command and
Control/Anvirus) approach, heuriscs-based (bot detecon) approach, sandbox-
based (WildFire) approach, and Layer 7 protocol analysis-based (App-ID) approach.
Commodity threats are exploits that are less sophiscated and more easily detected
and prevented using a combinaon of anvirus, an-spyware, and vulnerability
protecon features along with URL filtering and Applicaon idenficaon capabilies
on the firewall.
Advanced threats are perpetuated by organized cyber adversaries who use
sophiscated aack vectors to target your network, most commonly for intellectual
property the and financial data the. These threats are more evasive and require
intelligent monitoring mechanisms for detailed host and network forensics on
malware. The Palo Alto Networks next-generaon firewall together with WildFire™
and Panorama™ provide a comprehensive soluon that intercepts and breaks the
aack chain and provides visibility to prevent security infringement on your network
infrastructure—both mobile and virtualized.
Aer you implement your threat prevenon configuraons, Export Configuraon Table Data to
create a PDF or CSV report of your configuraons to use for internal review or for auding.
> Best Pracces for Securing Your > Customize the Acon and Trigger
Network from Layer 4 and Layer 7 Condions for a Brute Force
Evasions Signature
> Set Up Anvirus, An-Spyware, and > Enable Evasion Signatures
Vulnerability Protecon > Monitor Blocked IP Addresses
> DNS Security > Threat Signature Categories
> Use DNS Queries to Idenfy Infected > Create Threat Excepons
Hosts on the Network
> Custom Signatures
> Set Up Data Filtering
> Learn More About and Assess
> Predefined Data Filtering Paerns Threats
> Create a Data Filtering Profile > Share Threat Intelligence with Palo
> WildFire Inline ML Alto Networks
> Set Up File Blocking > Threat Prevenon Resources
> Prevent Brute Force Aacks
911
Threat Prevenon
DNS proxy is not part of the firewall security policy engine; instead, it directs the
firewall to resolve DNS hostnames, while maintaining domain to IP mapping, which is
crucial for prevenng TLS/HTTP evasion.
PAN-OS® Administrator’s Guide Version 10.1 912 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
returns different IP addresses—for servers hosng idencal resources—to the firewall and
client in response to the same DNS request.
For servers, create Security policy rules to allow only the applicaon(s) that you sancon on
each server. Verify that the standard port for the applicaon matches the listening port on
the server. For example, to ensure that only SMTP traffic is allowed to your email server, set
the Applicaon to smtp and set the Service to applicaon-default. If your server uses only a
subset of the standard ports (for example, if your SMTP server uses only port 587 while the
SMTP applicaon has standard ports defined as 25 and 587), create a new custom service
that includes only port 587 and use that new service in your security policy rule instead
of applicaon-default. Addionally, make sure you restrict access to specific source and
desnaons zones and sets of IP addresses.
Block all unknown applicaons and traffic using the Security policy. Typically, the only
applicaons classified as unknown traffic are internal or custom applicaons on your network
and potenal threats. Unknown traffic can be either non-compliant applicaons or protocols
that are anomalous or abnormal or it can be known applicaons that are using non-standard
ports, both of which should be blocked. See Manage Custom or Unknown Applicaons.
PAN-OS® Administrator’s Guide Version 10.1 913 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Set Up File Blocking to block Portable Executable (PE) file types for internet-based SMB (Server
Message Block) traffic from traversing trust to untrust zones (ms-ds-smb applicaons).
Block malicious variants of PE (portable executables), ELF and MS Office files, and PowerShell
and shell scripts in real-me. Enabling WildFire Inline ML allows you to dynamically analyze
files using machine learning on the firewall. This addional layer of anvirus protecon
complements the WildFire-based signatures to provide extended coverage for files of which
signatures do not already exist.
PAN-OS® Administrator’s Guide Version 10.1 914 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Create a Zone Protecon profile that is configured to protect against packet-based aacks
(Network > Network Profiles > Zone Protecon):
• Select the opon to drop Malformed IP packets (Packet Based Aack Protecon > IP Drop).
• Enable the drop Mismatched overlapping TCP segment opon (Packet Based Aack
Protecon > TCP Drop).
By deliberately construcng connecons with overlapping but different data in them,
aackers aempt to cause misinterpretaon of the intent of the connecon and deliberately
induce false posives or false negaves. Aackers also use IP spoofing and sequence
number predicon to intercept a user's connecon and inject their own data into that
connecon. Selecng the Mismatched overlapping TCP segment opon specifies that
PAN-OS discards frames with mismatched and overlapping data. Received segments are
PAN-OS® Administrator’s Guide Version 10.1 915 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
discarded when they are contained within another segment, when they overlap with part of
another segment, or when they contain another complete segment.
• Enable the drop TCP SYN with Data and drop TCP SYNACK with Data opons (Packet
Based Aack Protecon > TCP Drop).
Dropping SYN and SYN-ACK packets that contain data in the payload during a three-way
handshake increases security by blocking malware contained in the payload and prevenng
it from extracng unauthorized data before the TCP handshake is completed.
• Strip TCP mestamps from SYN packets before the firewall forwards the packet (Packet
Based Aack Protecon > TCP Drop).
When you enable the Strip TCP Opons - TCP Timestamp opon, the TCP stack on both
ends of the TCP connecon will not support TCP mestamps. This prevents aacks that use
different mestamps on mulple packets for the same sequence number.
PAN-OS® Administrator’s Guide Version 10.1 916 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
If you configure IPv6 addresses on your network hosts, be sure to enable support for IPv6 if
not already enabled (Network > Interfaces > Ethernet > IPv6).
Enabling support for IPv6 allows access to IPv6 hosts and also filters IPv6 packets encapsulated
in IPv4 packets, which prevents IPv6 over IPv4 mulcast addresses from being leveraged for
network reconnaissance.
Enable support for mulcast traffic so that the firewall can enforce policy on mulcast traffic
(Network > Virtual Router > Mulcast).
PAN-OS® Administrator’s Guide Version 10.1 917 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Disable the opons to Forward datagrams exceeding UDP content inspecon queue and
Forward segments exceeding TCP content inspecon queue (Device > Setup > Content-ID >
Content-ID Sengs).
By default, when the TCP or UDP content inspecon queues are full, the firewall skips content
inspecon for TCP segments or UDP datagrams that exceed the queue limit of 64. Disabling
this opon ensures content inspecon for all TCP and UDP datagrams that the firewall
allows. Only under specific circumstances—for example, if the firewall plaorm is not sized
appropriately to align with a use case—could disabling this seng impact performance.
Disable the Allow HTTP paral response (Device > Setup > Content-ID > Content-ID
Sengs).
The HTTP paral response opon allows a client to fetch only part of a file. When a next-
generaon firewall in the path of a transfer idenfies and drops a malicious file, it terminates
the TCP session with an RST packet. If the web browser implements the HTTP header range
opon, it can start a new session to fetch only the remaining part of the file, which prevents
the firewall from triggering the same signature again due to the lack of context into the inial
session and, at the same me, allows the web browser to reassemble the file and deliver the
malicious content. Disabling this opon prevents this from happening.
Allow HTTP paral response is enabled on the firewall by default. This provides maximum
availability but increases the risk of a successful cyberaack. For maximum security, disable this
opon to prevent the web browser from starng a new session to fetch the rest of a file aer
the firewall terminates the original session due to malicious acvity. Disabling HTTP paral
response affects HTTP-based data transfers which use the RANGE header, which may cause
service anomalies for certain applicaons. Aer you disable HTTP paral response, validate the
operaon of your business-crical applicaons.
If you experience HTTP data transfer disrupon on a business-crical applicaon, you can
create an Applicaon Override policy for that specific applicaon. Because Applicaon
Override bypasses App-ID (including threat and content inspecon), create an Applicaon
Override policy for only the specific business-crical applicaon, and specify sources and
desnaons to limit the rule (principle of least privilege access). Do not create Applicaon
Override policy unless you must. For informaon about Applicaon Override policies, refer to
hps://knowledgebase.paloaltonetworks.com/KCSArcleDetail?id=kA10g000000ClVLCA0.
Create a Vulnerability Protecon Profile that blocks protocol anomalies and all vulnerabilies
with low and high severies.
A protocol anomaly occurs when a protocol behavior deviates from standard and compliant
usage. For example, a malformed packet, poorly wrien applicaon, or an applicaon running
on a non-standard port would all be considered protocol anomalies, and could be used as
evasion tools.
If yours is a mission-crical network, where the business’s highest priority is applicaon
availability, you should begin by alerng on protocol anomalies for a period of me to ensure
PAN-OS® Administrator’s Guide Version 10.1 918 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
that no crical internal applicaons are using established protocols in a non-standard way. If
you find that certain crical applicaons trigger protocol anomaly signatures, you can then
exclude those applicaons from protocol anomaly enforcement. To do this, add another rule to
the Vulnerability Protecon Profile that allows protocol anomalies and aach the profile to the
security policy rule that enforces traffic to and from the crical applicaons.
Make sure that Vulnerability Protecon Profile rules and security policy rules that allow
protocol anomalies for crical internal applicaons are listed above rules that block protocol
anomalies. Traffic is evaluated against security policy rules and associated Vulnerability
Protecon Profiles rules from top to boom, and is enforced based on the first matching rule.
• Begin by alerng on protocol anomalies:
Create a Vulnerability Protecon Profile rule with the Acon set to Alert, the Category set
to protocol-anomaly, and the Severity set to Any. Monitor your traffic to determine if any
crical internal applicaons are using established protocols in non-standard ways. If you find
PAN-OS® Administrator’s Guide Version 10.1 919 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
this to be true, connue to allow protocol anomalies for those applicaons, and then block
protocol anomalies for all other applicaons.
PAN-OS® Administrator’s Guide Version 10.1 920 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
• Oponally allow protocol anomalies for crical applicaons that use established protocols
in a non-standard way. To do this, create a Vulnerability Protecon Profile rule that allows
protocol anomalies: set the rule Acon to Allow, the Category to protocol-anomaly, and the
PAN-OS® Administrator’s Guide Version 10.1 921 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Severity to any. Aach the Vulnerability Protecon Profile rule to the security policy rule
that enforces traffic to and from crical applicaons.
• Add another rule to the Vulnerability Protecon profile to block all vulnerabilies with low
and higher severity. This rule must be listed aer the rule that blocks protocol anomalies.
Connue to aach the following security profiles to your Security policy rules to provide
signature-based protecon:
• An An-Spyware profile to block all spyware with severity low and higher.
• An Anvirus profile to block all content that matches an anvirus signature.
PAN-OS® Administrator’s Guide Version 10.1 922 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Palo Alto Networks defines a default acon for all an-spyware and vulnerability
protecon signatures. To see the default acon, select Objects > Security Profiles >
An-Spyware or Objects > Security Profiles > Vulnerability Protecon and then select
a profile. Click the Excepons tab and then click Show all signatures to view the list
of the signatures and the corresponding default Acon. To change the default acon,
create a new profile and specify an Acon, and/or add individual signature excepons to
Excepons in the profile.
PAN-OS® Administrator’s Guide Version 10.1 923 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Review the Best Pracces for Applicaons and Threats Content Updates for
important informaon on deploying updates.
1. Select Device > Dynamic Updates and then click Schedule to automacally retrieve
signature updates for Anvirus and Applicaons and Threats.
2. Specify the frequency and ming for the updates:
• download-only—The firewall automacally downloads the latest updates per the
schedule you define but you must manually Install them.
• download-and-install—The firewall automacally downloads and installs the updates
per the schedule you define.
3. Click OK to save the update schedule; a commit is not required.
4. (Oponal) Define a Threshold to indicate the minimum number of hours aer an
update becomes available before the firewall will download it. For example, seng the
Threshold to 10 means the firewall will not download an update unl it is at least 10
hours old regardless of the schedule.
5. (HA only) Decide whether to Sync To Peer, which enables peers to synchronize content
updates aer download and install (the update schedule does not sync across peers; you
must manually configure the schedule on both peers).
There are addional consideraons for deciding if and how to Sync To Peer depending
on your HA deployment:
• Acve/Passive HA—If the firewalls are using the MGT port for content updates, then
schedule both firewalls to download and install updates independently. However,
if the firewalls are using a data port for content updates, then the passive firewall
will not download or install updates unless and unl it becomes acve. To keep the
schedules in sync on both firewalls when using a data port for updates, schedule
updates on both firewalls and then enable Sync To Peer so that whichever firewall is
acve downloads and installs the updates and also pushes the updates to the passive
firewall.
• Acve/Acve HA—If the firewalls are using the MGT interface for content updates,
then select download-and-install on both firewalls but do not enable Sync To Peer.
However, if the firewalls are using a data port, then select download-and-install on
both firewalls and enable Sync To Peer so that if one firewall goes into the acve-
secondary state, the acve-primary firewall will download and install the updates and
push them to the acve-secondary firewall.
PAN-OS® Administrator’s Guide Version 10.1 924 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 4 | (Oponal) Create custom security profiles for anvirus, an-spyware, and vulnerability
protecon.
Alternavely, you can use the predefined default or strict profiles.
Transion safely to best pracce Security profiles for the best security posture.
• To create custom Anvirus Profiles, select Objects > Security Profiles > Anvirus and Add a
new profile. Use the Anvirus profile transion steps to safely reach your goal.
• To create custom An-Spyware Profiles, select Objects > Security Profiles > An-Spyware
and Add a new profile. Use the An-Spyware profile transion steps to safely reach your
goal.
• To create custom Vulnerability Protecon Profiles, select Objects > Security Profiles >
Vulnerability Protecon and Add a new profile. Use the Vulnerability Protecon profile
transion steps to safely reach your goal.
When you configure the firewall with a Security policy rule that uses a Vulnerability
Protecon profile to block connecons, the firewall automacally blocks that traffic in
hardware (see Monitor Blocked IP Addresses).
1. Select Policies > Security and select the rule you want to modify.
2. In the Acons tab, select Profiles as the Profile Type.
3. Select the security profiles you created for Anvirus, An-Spyware, and Vulnerability
Protecon.
PAN-OS® Administrator’s Guide Version 10.1 925 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
DNS Security
DNS Security is a connuously evolving threat prevenon service designed to protect and defend
your network from advanced threats using DNS. By leveraging advanced machine learning and
predicve analycs, the service provides real-me DNS request analysis and rapidly produces and
distributes DNS signatures that are specifically designed to defend against malware using DNS for
C2 and data the. Combined with an extensible cloud architecture, it provides access to a scalable
threat intelligence system to keep your network protecons up to date.
• About DNS Security
• Cloud-Delivered DNS Signatures and Protecons
• DNS Security Analycs
• Enable DNS Security
• DNS Security Data Collecon and Logging
PAN-OS® Administrator’s Guide Version 10.1 926 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 927 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Upon upgrade to PAN-OS 10.0 and later, the DNS Security source gets redefined into
new categories to provide extended granular controls; as a result, the new categories will
overwrite the previously defined acon and acquire default sengs. Make sure to reapply
any sinkhole, log severity, and packet captures sengs appropriate for the newly defined
DNS Security Categories.
The DNS Security service currently supports detecon of the following DNS threat categories:
PAN-OS® Administrator’s Guide Version 10.1 928 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
The universal threat ID number (indicated as ID in the Threat logs) maps to the specific
DNS detecon mechanism used by DNS Security to classify domains. This shows the
precise categorizaon of the domain, alongside the broadly defined threat category, that it
belongs to.
• Command and Control Domains—C2 includes URLs and domains used by malware and/or
compromised systems to surrepously communicate with an aacker’s remote server to
receive malicious commands or exfiltrate data (this includes DNS tunneling detecon and DGA
detecon), or deplete resources on a target authoritave DNS servers (such as NXNSaack).
• DNS Tunnel Detecon (UTID: 109001001/109001002)—DNS tunneling can be used
by aackers to encode data of non-DNS programs and protocols within DNS queries
and responses. This provides aackers with an open back channel with which they can
transfer files or remotely access the system. DNS tunnel detecon uses machine learning
to analyze the behavioral qualies of DNS queries, including n-gram frequency analysis of
domains, entropy, query rate, and paerns to determine if the query is consistent with a
DNS tunneling-based aack. This includes certain next-generaon DNS tunneling malware
that exfiltrates data slowly across mulple domains to avoid detecon, such as TriFive and
Snugy. Combined with the firewall’s automated policy acons, this allows you to quickly
detect C2 or data the hidden in DNS tunnels and to automacally block it, based on your
defined policy rules.
• DGA Domain Detecon (UTID: 109000001)—Domain generaon algorithms (DGAs) are
used to auto-generate domains, typically in large numbers within the context of establishing
a malicious command-and-control (C2) communicaons channel. DGA-based malware (such
as Pushdo, BankPatch, and CryptoLocker) limit the number of domains from being blocked
by hiding the locaon of their acve C2 servers within a large number of possible suspects,
and can be algorithmically generated based on factors such as me of day, cryptographic
keys, diconary-derived naming schemes, and other unique values. While most domains
generated by a DGA do not resolve as a valid domain, they must all be idenfied to fully
defend against a given threat. DGA analysis determines whether a domain is likely to have
been generated by a machine, rather than a person, by reverse-engineering and analyzing
other frequently used techniques found in DGAs. Palo Alto Networks then uses these
characteriscs to idenfy and block previously unknown DGA-based threats in real-me.
• NXNSAack (UTID: 109010007)—The NXNSAack vulnerability present in the DNS
protocol affects all recursive DNS resolvers and can be used by malicious actors to launch
DDOS-like amplificaon aacks to disrupt the normal operaon of vulnerable authoritave
DNS servers. NXNSAack can introduce massive traffic spikes on an authoritave DNS
server by forcing the recursive DNS resolver to issue a large number of invalid requests to
potenally shut down the server.
• DNS Rebinding (UTID: 109010009)—DNS rebinding aacks lure users to an aacker-
controlled domain configured with a short TTL parameter to manipulate how domain names
are resolved to exploit and bypass the same-origin policy in browsers. This enables malicious
actors to use the client machine as an intermediary to aack or access a resource contained
within a private network.
• DNS Infiltraon (UTID: 109001003)—DNS infiltraon includes DNS queries that enable
malicious actors to hide and resolve minute payloads via a response to fraudulent A (IPv4)
and AAAA (IPv6) record requests. When the client resolves mulple subdomains, each
containing a A/AAAA record with an encoded component, the data contained within them
can be consolidated to form a malicious payload, which can then be executed on the client
PAN-OS® Administrator’s Guide Version 10.1 929 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
machine. Aer execung the payload, it can introduce secondary payloads to establish a
DNS tunnel or addional exploits.
• Dynamic DNS Hosted Domains (UTID: 109020002) —Dynamic DNS (DDNS) services provide
mapping between hostnames and IP addresses in near real-me to keep changing IP addresses
linked to a specific domain, when stac IPs are unavailable. This provides aackers a method of
infiltrang networks by using DDNS services to change the IP addresses that host command-
and-control servers. Malware campaigns and exploit kits can ulize DDNS services as part
of their payload distribuon strategy. By ulizing DDNS domains as part of their hostname
infrastructure, adversaries can change the IP address associated with given DNS records and
more easily avoid detecon. DNS Security detects exploitave DDNS services by filtering and
cross-referencing DNS data from various sources to generate candidate lists which are then
further validated to maximize accuracy.
• Malware Domains —Malicious domains host and distribute malware and can include
websites that aempt to install various threats (such as executables, scripts, viruses, drive-
by downloads). Malicious domains are disnguishable from C2 domains in that they deliver
malicious payloads into your network via an external source, whereas with C2, infected
endpoints typically aempt to connect to a remote server to retrieve addional instrucons or
other malicious content.
• Malware Compromised DNS (UTID: 109003001)—Malware compromised DNS covers a
range of techniques, some legimate, that result in the generaon of seemingly genuine
hostnames and subdomains, which in actuality, are malicious. This includes newly observed
hostnames that mimic exisng, reputable hostnames, in an aempt to impersonate or
otherwise mislead and evade database-centric security soluons. These can be quickly
produced en-masse to preempt their addion to database lists. Domain shadowing typically
follows aer an aacker gains control of a domain account through a more convenonal
aack. This provides the access necessary to create illegimate subdomains used to
coordinate aacks, even though the root domain remains legimate and valid, increasing the
likelihood of circumvenng network security.
• Newly Registered Domains (UTID: 109020001)—Newly registered domains are domains
that have been recently added by a TLD operator or had change in ownership within the
last 32 days. While new domains can be created for legimate purposes, the vast majority
are oen used to facilitate malicious acvies, such as operang as C2 servers or used to
distribute malware, spam, PUP/adware. Palo Alto Networks detects newly registered domains
by monitoring specific feeds (domain registries and registrars) and using zone files, passive DNS,
WHOIS data to detect registraon campaigns.
• Phishing Domains (UTID: 109010001) —Phishing domains aempt to lure users into subming
sensive data, such as personal informaon or user credenals, by masquerading as legimate
websites through phishing or pharming. These malicious acvies can be conducted through
social engineering campaigns (whereby a seemingly trusted source manipulates users into
subming personal informaon via email or other forms of electronic communicaons) or
through web traffic redirecon, which directs users to fraudulent sites that appear legimate.
• Grayware Domains (UTID: 109010002) —(Available with installaon of PAN-OS content
release 8290 and later). Grayware domains generally do not pose a direct security threat,
PAN-OS® Administrator’s Guide Version 10.1 930 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
however, they can facilitate vectors of aack, produce various undesirable behaviors, or might
simply contain quesonable/offensive content.These can include websites and domains that:
• Aempt to trick users into granng remote access.
• Contain adware and other unsolicited applicaons (such as cryptominers, hijackers, and
PUPs [potenally unwanted programs]).
• Deploy domain idenficaon concealment acons using fast flux techniques (faslux
detecon - UTID: 109010005).
• Demonstrate malicious behavior and usage as evidenced through DNS security predicave
analycs (malicious NRD - UTID: 109010006).
• Take advantage of user errors when entering web page addresses (typosquang domains).
• Redirect traffic from a legimate source to a malicious website due to an improperly
configured or stale DNS record on an authoritave DNS server that has not been removed
or otherwise corrected (dangling DNS - UTID: 109010008).
• Promote illegal acvies or scams.
• Include wildcard DNS entries, which can be used to evade block lists or enable wildcard
DNS aacks by roung traffic to malicious websites (Wildcard abuse - UTID: 109002001).
• Indicate the presence of DNS traffic with anomalous characteriscs when compared to
established baseline profiles built from collected DNS data (Anomaly detecon).
• Have been registered months or years in advance and le in a state of dormancy to bypass
reputaon checks when they become acve. This also includes newly observed domains
that have never been seen or otherwise evaluated (Strategically-aged domains - UTID:
109002002).
• Parked Domains (UTID: 109010003)—(Available with installaon of PAN-OS content release
8318 and later) Parked domains are typically inacve websites that host limited content, oen
in the form of click-through ads which may generate revenue for the host enty, but generally
do not contain content that is useful to the end user. While they oen funcon as a legimate
placeholder or as nothing more than a benign nuisance, they could also be used as a possible
vector for distribuon of malware.
• Proxy Avoidance and Anonymizers (UTID: 109010004)—(Available with installaon of PAN-
OS content release 8340 and later) Proxy Avoidance and Anonymizers is traffic to services that
are used to bypass content filtering policies. Users who aempt to circumvent an organizaon’s
content filtering policies via anonymizer proxy services are blocked at the DNS level.
• Ad Tracking Domains (UTID: 109004000)—(Available with installaon of PAN-OS content
release 8586 and later) Ad Tracking domains deliver certain types of markeng automaon
content for webpages in order to track user engagement (such as link clicks, web page
navigaon, etc). Typically, these third-party domains are concealed through the use of a vanity
URL to appear to be part of the originang domain.
• CNAME Cloaking (UTID: 109004001)—CNAME cloaking provides an alternate means of
concealing a URL by modifying a web request for a subdomain to appear as if it originates
from the same website, though in actuality, the subdomain uses a CNAME to resolve to a
third-party domain. This technique circumvents some browser-based privacy protecons
which could potenally connect to a suspicious CNAME desnaon.
PAN-OS® Administrator’s Guide Version 10.1 931 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 2 | Verify that the paloalto-dns-security App-ID in your security policy is configured to enable
traffic from the DNS security cloud security service.
PAN-OS® Administrator’s Guide Version 10.1 932 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 3 | Configure DNS Security signature policy sengs to send malware DNS queries to the
defined sinkhole.
If you use an external dynamic list as a domain allow list, it does not have precedence
over the DNS Security domain policy acons. As a result, when there is a domain
match to an entry in the EDL and a DNS Security domain category, the acon specified
under DNS Security is sll applied, even when the EDL is explicitly configured with an
acon of Allow. If you want to add DNS domain excepons, either configure an EDL
with an Alert acon or add them to the DNS Domain/FQDN Allow List located in the
DNS Excepons tab (step 8).
1. Log in to the firewall and select Objects > Security Profiles > An-Spyware.
2. Create or modify an exisng profile, or select one of the exisng default profiles and
clone it.
3. Name the profile and, oponally, provide a descripon.
4. Select the DNS Policies tab.
5. In the Signature Source column, beneath the DNS Security heading, there are
individually configurable DNS signature sources, which allow you to define separate
policy acons as well as a log severity level.
Palo Alto Networks recommends changing your default DNS Policies sengs for
signature sources to ensure opmum coverage as well as to assist with incidence
response and remediaon. Follow the best pracces for configuring your DNS
Security sengs as outlined in Best Pracces for Securing Your Network from
Layer 4 and Layer 7 Evasions.
• Specify the log severity level that is recorded when the firewall detects a domain
matching a DNS signature. For more informaon about the various log severity levels,
refer to Threat Severity Levels.
• Select an acon to be taken when DNS lookups are made to known malware sites for
the DNS Security signature source. The opons are allow, block, sinkhole, or default.
Verify that the acon is set to sinkhole.
• You can fully bypass DNS traffic inspecon by configuring your DNS Security An-
Spyware Profile with the following sengs:
• A policy acon of Allow with a corresponding log severity of None for each DNS
signature source.
• Removal of all DNS Domain/FQDN Allow List entries in the DNS Excepons tab.
• In the Packet Capture drop-down, select single-packet to capture the first packet of
the session or extended-capture to set between 1-50 packets. You can then use the
packet captures for further analysis.
6. In the DNS Sinkhole Sengs secon, verify that Sinkhole is enabled. For your
convenience, the default Sinkhole address (sinkhole.paloaltonetworks.com) is set to
PAN-OS® Administrator’s Guide Version 10.1 933 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
access a Palo Alto Networks server. Palo Alto Networks can automacally refresh this
address through content updates.
If you want to modify the Sinkhole IPv4 or Sinkhole IPv6 address to a local server on
your network or to a loopback address, see Configure the Sinkhole IP Address to a Local
Server on Your Network.
7. Click OK to save the An-Spyware profile.
PAN-OS® Administrator’s Guide Version 10.1 934 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 935 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 7 | (Oponal) Add domain signature excepons in cases where false-posives occur.
1. Select Objects > Security Profiles > An-Spyware.
2. Select a profile to modify.
3. Add or modify the An-Spyware profile from which you want to exclude the threat
signature, and select DNS Excepons.
4. Search for a DNS signature to exclude by entering the name or FQDN.
5. Select the checkbox for each Threat ID of the DNS signature that you want to exclude
from enforcement.
6. Click OK to save your new or modified An-Spyware profile.
STEP 8 | (Oponal) Add an allow list to specify a list of DNS domains / FQDNs to be explicitly
allowed.
1. Select Objects > Security Profiles > An-Spyware.
2. Select a profile to modify.
3. Add or modify the An-Spyware profile from which you want to exclude the threat
signature, and select DNS Excepons.
4. To Add a new FQDN Allow List, provide the DNS domain or FQDN locaon and a
descripon.
5. Click OK to save your new or modified An-Spyware profile.
PAN-OS® Administrator’s Guide Version 10.1 936 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 9 | (Oponal) Verify your firewall’s connecvity to the DNS Security service. If you
cannot reach the service, verify that the following domain is not being blocked:
dns.service.paloaltonetworks.com.
Use the following CLI command on the firewall to verify your firewall’s connecon availability
to the DNS Security service.
For example:
Cache Size: 0
STEP 10 | (Oponal) Retrieve a specified domain’s transacon details, such as latency, TTL, and the
signature category.
Use the following CLI command on the firewall to review the details about the list.
For example:
Completed in 178 ms
Entries: 2
PAN-OS® Administrator’s Guide Version 10.1 937 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
-----------------------------------------------------------------------------
*.yahoo.com Benign 0
86400
www.yahoo.com Benign 0
3600
STEP 11 | (Oponal) Configure the DNS signature lookup meout seng. If the firewall is unable
to retrieve a signature verdict in the alloed me due to connecvity issues, the request,
including all subsequent DNS responses, are passed through. You can check the average
latency to verify that the requests fall within the configured period. If the average latency
exceeds the configured period, consider updang the seng to a value that is higher than
the average latency to prevent requests from ming out.
1. In the CLI, issue the following command to view the average latency.
3. If the average latency is consistency above the default meout value, you can raise the
seng so that the requests fall within a given period. Select Device > Content-ID and
update the Realme Signature Lookup seng.
4. Commit the changes.
To view sinkholed DNS queries, refer to the firewall threat logs (Monitor > Logs, then select the
log type from the list):
PAN-OS® Administrator’s Guide Version 10.1 938 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Field Descripon
Response The IP address that the domain in the DNS query got resolved to.
Response Code The DNS response code that was received as an answer to your DNS
query.
Source IP The IP address of the system that made the DNS request.
Source User When the firewall User-ID feature is enabled, the identy of the DNS
requester is shown.
Source Zone The configured source zone referenced in your security policy rule.
DNS expanded data collecon is bypassed for domains added to the Allow list in DNS
Excepons.
Data fields that can be used to potenally idenfy users (Source IP, Source User, and Source
Zone) can be withheld from automac submission using the following CLI command: set
PAN-OS® Administrator’s Guide Version 10.1 939 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 940 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 941 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
that you define if you choose to Configure DNS Sinkholing for a List of Custom Domains). Infected
hosts can then be easily idenfied in the traffic logs.
PAN-OS® Administrator’s Guide Version 10.1 942 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 4 | Test that the policy acon is enforced by monitoring the acvity on the firewall.
1. Select ACC and add a URL Domain as a global filter to view the Threat Acvity and
Blocked Acvity for the domain you accessed.
2. Select Monitor > Logs > Threat and filter by (action eq sinkhole) to view logs on
sinkholed domains.
PAN-OS® Administrator’s Guide Version 10.1 943 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 1 | Enable DNS sinkholing for the custom list of domains in an external dynamic list.
1. Select Objects > Security Profiles > An-Spyware.
2. Modify an exisng profile, or select one of the exisng default profiles and clone it.
3. Name the profile and select the DNS Policies tab.
4. Select an EDL from the External Dynamic Lists signature source.
If you have already created an external dynamic list of type: Domain List, you
can select it from here. The list does not display external dynamic lists of type
URL or IP Address that you may have created.
5. Configure the external dynamic list from the An-Spyware profile (see Configure the
Firewall to Access an External Dynamic List). The Type is preset to Domain List.
6. (Oponal) In the Packet Capture drop-down, select single-packet to capture the first
packet of the session or extended-capture to set between 1-50 packets. You can then
use the packet captures for further analysis.
PAN-OS® Administrator’s Guide Version 10.1 944 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 5 | Verify whether entries in the external dynamic list are ignored or skipped.
Use the following CLI command on the firewall to review the details about the list.
For example:
As an alternave, you can use the firewall interface to Retrieve an External Dynamic
List from the Web Server.
PAN-OS® Administrator’s Guide Version 10.1 945 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
sinkhole address must be in a different zone than the client hosts to ensure that when an infected
host aempts to start a session with the sinkhole IP address, it will be routed through the firewall.
The sinkhole addresses must be reserved for this purpose and do not need to be assigned
to a physical host. You can oponally use a honey-pot server as a physical host to further
analyze the malicious traffic.
The configuraon steps that follow use the following example DNS sinkhole addresses:
IPv4 DNS sinkhole address—10.15.0.20
IPv6 DNS sinkhole address—fd97:3dec:4d27:e37c:5:5:5:5
Use a dedicated zone for sinkhole traffic, because the infected host will be sending
traffic to this zone.
1. Select Network > Interfaces and select an interface to configure as your sinkhole
interface.
2. In the Interface Type drop-down, select Layer3.
3. To add an IPv4 address, select the IPv4 tab and select Stac and then click Add. In this
example, add 10.15.0.20 as the IPv4 DNS sinkhole address.
4. Select the IPv6 tab and click Stac and then click Add and enter an IPv6 address and
subnet mask. In this example, enter fd97:3dec:4d27:e37c::/64 as the IPv6 sinkhole
address.
5. Click OK to save.
6. To add a zone for the sinkhole, select Network > Zones and click Add.
7. Enter zone Name.
8. In the Type drop-down select Layer3.
9. In the Interfaces secon, click Add and add the interface you just configured.
10. Click OK.
STEP 3 | Edit the security policy rule that allows traffic from client hosts in the trust zone to the
untrust zone to include the sinkhole zone as a desnaon and aach the An-Spyware
profile.
Eding the Security policy rule(s) that allows traffic from client hosts in the trust zone to
the untrust zone ensures that you are idenfying traffic from infected hosts. By adding the
PAN-OS® Administrator’s Guide Version 10.1 946 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
sinkhole zone as a desnaon on the rule, you enable infected clients to send bogus DNS
queries to the DNS sinkhole.
1. Select Policies > Security.
2. Select an exisng rule that allows traffic from the client host zone to the untrust zone.
3. On the Desnaon tab, Add the Sinkhole zone. This allows client host traffic to flow to
the sinkhole zone.
4. On the Acons tab, select the Log at Session Start check box to enable logging. This will
ensure that traffic from client hosts in the Trust zone will be logged when accessing the
Untrust or Sinkhole zones.
5. In the Profile Seng secon, select the An-Spyware profile in which you enabled DNS
sinkholing.
6. Click OK to save the Security policy rule and then Commit.
STEP 4 | To confirm that you will be able to idenfy infected hosts, verify that traffic going from the
client host in the Trust zone to the new Sinkhole zone is being logged.
In this example, the infected client host is 192.168.2.10 and the Sinkhole IPv4 address is
10.15.0.20.
1. From a client host in the trust zone, open a command prompt and run the following
command:
The following example output shows the ping request to the DNS sinkhole address at
10.15.0.2 and the result, which is Request timed out because in this example the
sinkhole IP address is not assigned to a physical host:
C:\>ping 10.15.0.20
Pinging 10.15.0.20 with 32 bytes of data:
Request timed out.
Request timed out.
Ping statistics for 10.15.0.20:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)
2. On the firewall, select Monitor > Logs > Traffic and find the log entry with the Source
192.168.2.10 and Desnaon 10.15.0.20. This will confirm that the traffic to the
sinkhole IP address is traversing the firewall zones.
You can search and/or filter the logs and only show logs with the desnaon
10.15.0.20. To do this, click the IP address (10.15.0.20) in the Desnaon
column, which will add the filter (addr.dst in 10.15.0.20) to the search field. Click
the Apply Filter icon to the right of the search field to apply the filter.
PAN-OS® Administrator’s Guide Version 10.1 947 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
conficker:tbsbana 1
variants: net
C:\>nslookup
track.bidtrk.com
Server: my-local-dns.local
Address: 10.0.0.222
Non-authoritative answer:
Name: track.bidtrk.com.org
Addresses: fd97:3dec:4d27:e37c:5:5:5:510.15.0.20
In the output, note that the NSLOOKUP to the malicious domain has been forged using
the sinkhole IP addresses that we configured (10.15.0.20). Because the domain matched
a malicious DNS signature, the sinkhole acon was performed.
4. Select Monitor > Logs > Threat and locate the corresponding threat log entry to verify
that the correct acon was taken on the NSLOOKUP request.
5. Perform a ping to track.bidtrk.com, which will generate network traffic to the
sinkhole address.
PAN-OS® Administrator’s Guide Version 10.1 948 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Configure a custom report to idenfy all client hosts that have sent traffic to the sinkhole IP
address, which is 10.15.0.20 in this example.
In this example, the infected client host performed an NSLOOKUP to a known malicious
domain that is listed in the Palo Alto Networks DNS Signature database. When this occurred,
the query was sent to the local DNS server, which then forwarded the request through
the firewall to an external DNS server. The firewall security policy with the An-Spyware
profile configured matched the query to the DNS Signature database, which then forged the
reply using the sinkhole address of 10.15.0.20 and fd97:3dec:4d27:e37c:5:5:5:5. The client
aempts to start a session and the traffic log records the acvity with the source host and the
desnaon address, which is now directed to the forged sinkhole address.
Viewing the traffic log on the firewall allows you to idenfy any client host that is sending
traffic to the sinkhole address. In this example, the logs show that the source address
192.168.2.10 sent the malicious DNS query. The host can then be found and cleaned. Without
the DNS sinkhole opon, the administrator would only see the local DNS server as the system
that performed the query and would not see the client host that is infected. If you aempted
PAN-OS® Administrator’s Guide Version 10.1 949 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
to run a report on the threat log using the acon “Sinkhole”, the log would show the local DNS
server, not the infected host.
1. Select Monitor > Manage Custom Reports.
2. Click Add and Name the report.
3. Define a custom report that captures traffic to the sinkhole address as follows:
• Database—Select Traffic Log.
• Scheduled—Enable Scheduled and the report will run every night.
• Time Frame—30 days
• Selected Columns—Select Source address or Source User (if you have User-ID
configured), which will idenfy the infected client host in the report, and Desnaon
address, which will be the sinkhole address.
• In the secon at the boom of the screen, create a custom query for traffic to the
sinkhole address (10.15.0.20 in this example). You can either enter the desnaon
address in the Query Builder window (addr.dst in 10.15.0.20) or select the following
PAN-OS® Administrator’s Guide Version 10.1 950 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
in each column and click Add: Connector = and, Aribute = Desnaon Address,
Operator = in, and Value = 10.15.0.20. Click Add to add the query.
4. Click Run Now to run the report. The report will show all client hosts that have sent
traffic to the sinkhole address, which indicates that they are most likely infected. You can
now track down the hosts and check them for spyware.
5. To view scheduled reports that have run, select Monitor > Reports.
PAN-OS® Administrator’s Guide Version 10.1 951 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Data Filtering
Use Data Filtering Profiles to prevent sensive, confidenal, and proprietary informaon from
leaving your network. Predefined paerns, built-in sengs, and customizable opons make it easy
for you to protect files that contain certain file properes (such as a document tle or author),
credit card numbers, regulated informaon from different countries (like social security numbers),
and third-party data loss prevenon (DLP) labels.
• Predefined Data Paerns—Easily filter common paerns, including credit card numbers.
Predefined data filtering paerns also idenfy specific (regulated) informaon from different
countries of the world, such as social security numbers (United States), INSEE Idenficaon
numbers (France), and New Zealand Internal Revenue Department Idenficaon Numbers.
Many of the predefined data filtering paerns enable compliance for standards such as HIPAA,
GDPR, Gramm-Leach-Bliley Act.
• Built-In Support for Azure Informaon Protecon and Titus Data Classificaon—Predefined
file properes allow you to filter content based on Azure Informaon Protecon and Titus
labels. Azure Informaon Protecon labels are stored in metadata, so make sure that you know
the GUID of the Azure Informaon Protect label that you want the firewall to filter.
• Custom Data Paerns for Data Loss Prevenon (DLP) Soluons—If you’re using a third-party,
endpoint DLP soluon that populates file properes to indicate sensive content, you can
create a custom data paern to idenfy the file properes and values tagged by your DLP
soluon and then log or block the files that your Data Filtering profile detects based on that
paern.
PAN-OS® Administrator’s Guide Version 10.1 952 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
This selecon is cleared by default, which means administrators can override the sengs
for any device group that inherits the object.
5. (Oponal—Panorama only) Select Data Capture to automacally collect the data that is
blocked by the filter.
Specify a password for Manage Data Protecon on the Sengs page to view
your captured data (Device > Setup > Content-ID > Manage Data Protecon).
6. Set the Paern Type to one of the following:
• Predefined Paern—Filter for credit card, social security numbers, and personally
idenfiable informaon for several compliance standards including HIPAA, GDPR,
Gramm-Leach-Bliley Act.
• Regular Expression—Filter for custom data paerns.
• File Properes—Filter based on file properes and the associated values.
7. Add a new rule to the data paern object.
8. Specify the data paern according to the Paern Type you selected for this object:
• Predefined—Select the Name and choose the predefined data paern on which to
filter.
• Regular Expression—Specify a descripve Name, select the File Type (or types) you
want to scan, and then enter the specific Data Paern you want the firewall to detect.
• File Properes—Specify a descripve Name, select the File Type and File Property
you want to scan, and enter the specific Property Value that you want the firewall to
detect.
• To filter Titus classified documents: Select one of the non-AIP protected file
types, and set the File Property to TITUS GUID. Enter the Titus label GUID as the
Property Value.
• For Azure Informaon Protecon labeled documents: Select any File Type except
Rich Text Format. For the file type you choose, set the File Property to Microso
MIP Label, and enter the Azure Informan Protect label GUID as the Property
Value.
PAN-OS® Administrator’s Guide Version 10.1 953 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
The file type you select must be the same file type you defined for the data
paern earlier, or it must be a file type that includes the data paern file type.
For example, you could define both the data paern object and the data filtering
profile to scan all Microso Office documents. Or, you could define the data
paern object to match to only Microso PowerPoint Presentaons while the
data filtering profile scans all Microso Office documents.
If a data paern object is aached to a data filtering profile and the configured file types
do not align between the two, the profile will not correctly filter documents matched to
the data paern object.
5. Set the Alert Threshold to specify the number of mes the data paern must be
detected in a file to trigger an alert.
6. Set the Block Threshold to block files that contain at least this many instances of the
data paern.
7. Set the Log Severity recorded for files that match this rule.
8. Click OK to save the data filtering profile.
STEP 4 | (Recommended) Prevent web browsers from resuming sessions that the firewall has
terminated.
This opon ensures that when the firewall detects and then drops a sensive file, a web
browser cannot resume the session in an aempt to retrieve the file.
1. Select Device > Setup > Content-ID and edit Content-ID Sengs.
2. Clear the Allow HTTP paral response.
3. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 954 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
If the type of informaon you want to protect is not covered in the list of predefined
paerns, you can use regular expressions to create custom paerns.
Paern Descripon
Social Security Numbers (without dash 9-digit social security numbers without dashes
separator)
PAN-OS® Administrator’s Guide Version 10.1 955 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Paern Descripon
Codice Fiscale Idenficaon Number Italian Fiscal Tax Code Card Idenficaon
Number
PAN-OS® Administrator’s Guide Version 10.1 956 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Paern Descripon
Republic of South Korea Resident Registraon Republic of South Korea Resident Registraon
Number
PAN-OS® Administrator’s Guide Version 10.1 957 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
WildFire Inline ML
The WildFire inline ML opon present in the Anvirus profile enables the firewall dataplane
to apply machine learning on PE (portable executable), ELF (executable and linked format) and
MS Office files, and PowerShell and shell scripts in real-me. This layer of anvirus protecon
complements the WildFire-based signatures to provide extended coverage for files of which
signatures do not already exist. Each inline ML model dynamically detects malicious files of a
specific type by evaluang file details, including decoder fields and paerns, to formulate a high
probability classificaon of a file. This protecon extends to currently unknown as well as future
variants of threats that match characteriscs that Palo Alto Networks has idenfied as malicious.
To keep up with the latest changes in the threat landscape, inline ML models are added or updated
via content releases. Before you can enable WildFire inline ML, you must possess an acve
WildFire subscripon.
Inline ML-based protecon can also be enabled to detect malicious URLs in real-me as part of
your URL Filtering configuraon. For more informaon, refer to: URL Filtering Inline ML
WildFire inline ML is not currently supported on the VM-50 or VM50L virtual appliance.
STEP 1 | To take advantage of WildFire inline ML, you must have an acve WildFire subscripon to
analyze Windows executables.
Verify that you have a WildFire subscripon. To verify which subscripons that you currently
have licenses for, select Device > Licenses and verify that the appropriate licenses display and
have not expired.
PAN-OS® Administrator’s Guide Version 10.1 958 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 2 | Create a new or update your exisng Anvirus security profile(s) to use the real-me
WildFire inline ML models.
1. Select an exisng Anvirus Profile or create a new one (select Objects > Security Profiles >
Anvirus and Add a new profile.
2. Configure your Anvirus profile.
3. Select the WildFire Inline ML tab and apply an Acon Seng for each WildFire Inline ML
model. This enforces the WildFire Inline ML Acons sengs configured for each protocol
on a per model basis. The following classificaon engines available: Windows Executables,
PowerShell Scripts 1, and PowerShell Scripts 2.
The following addional analysis models are available upon installaon of the
specified content update:
• Executable Linked Format (available with installaon of PAN-OS content release
8367 and later)
• MSOffice (available with installaon of PAN-OS content release 8434 and later)
• Shell Scripts (available with installaon of PAN-OS content release 8543 and
later)
STEP 3 | (Oponal) Add file excepons to your Anvirus security profile if you encounter false-
posives. This is typically done for users who are not forwarding files to WildFire for analysis.
PAN-OS® Administrator’s Guide Version 10.1 959 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
You can add the file excepon details directly to the excepon list or by specifying a file from
the threat logs.
If your WildFire Analysis security profile is configured to forward the filetypes analyzed
using WildFire inline ML, false-posives are automacally corrected as they are
received. If you connue to see ml-virus alerts for files that have been classified as
benign by WildFire Analysis, please contact Palo Alto Networks Support.
4. Click OK to save the Anvirus profile and then Commit your updates.
• Add file excepons from threat logs entries.
1. Select Monitor > Logs > Threat and filter the logs for the ml-virus threat type. Select a
threat log for a file that you wish to create a file excepon for.
2. Go to the Detailed Log View and scroll down to the Details pane then select Create
Excepon.
STEP 4 | (Oponal) Verify the status of your firewall’s connecvity to the Inline ML cloud service.
Use the following CLI command on the firewall to view the connecon status.
For example:
MLAV cloud
Current cloud server: ml.service.paloaltonetworks.com
PAN-OS® Administrator’s Guide Version 10.1 960 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
If you are unable to connect to the Inline ML cloud service, verify that the following domain is
not being blocked: ml.service.paloaltonetworks.com.
To view informaon about files that have been detected using WildFire Inline ML, examine the
threat logs (Monitor > Logs > Threat, then select the log type from the list). Files that have been
analyzed using WildFire inline ML are labeled with the threat type ml-virus:
PAN-OS® Administrator’s Guide Version 10.1 961 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 962 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Only web browsers can display the response page (connue prompt) that allows
users to confirm their Choosing any other applicaon results in blocked traffic
for those applicaons because there is no prompt displayed to allow users to
connue.
4. Select Any or specify one or more specific File Types, such as exe.
5. Specify the Direcon, such as download.
6. Specify the Acon (alert, block, or connue). For example, select connue to prompt
users for confirmaon before they are allowed to download an executable (.exe) file.
Alternavely, you could block the specified files or you could configure the firewall to
simply trigger an alert when a user downloads an executable file.
7. Click OK to save the profile.
STEP 4 | To test your file blocking configuraon, access an endpoint PC in the trust zone of the
firewall and aempt to download an executable file from a website in the untrust zone; a
response page should display. Click Connue to confirm that you can download the file. You
PAN-OS® Administrator’s Guide Version 10.1 963 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
can also set other acons, such as alert or block, which do not provide an opon for the user
to connue the download. The following shows the default response page for File Blocking:
STEP 5 | (Oponal) Define custom file blocking response pages (Device > Response Pages). This
allows you to provide more informaon to users when they see a response page. You can
include informaon such as company policy informaon and contact informaon for a
Helpdesk.
When you create a file blocking profile with the connue acon, you can choose only
the web-browsing applicaon. If you choose any other applicaon, traffic that matches
the security policy will not flow through the firewall because users are not prompted
with an opon to connue. Addionally, you need to configure and enable a decrypon
policy for HTTPS websites.
Check your logs to determine the applicaon used when you test this feature. For
example, if you are using Microso SharePoint to download files, even though you are
using a web-browser to access the site, the applicaon is actually sharepoint-
base, or sharepoint-document. (It can help to set the applicaon type to Any for
tesng.)
PAN-OS® Administrator’s Guide Version 10.1 964 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 965 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
To effecvely migate an aack, specify the block-ip address acon instead of the drop or
reset acon for most brute force signatures.
PAN-OS® Administrator’s Guide Version 10.1 966 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 2 | Create a rule that defines the acon for all signatures in a category.
1. On the Rules tab, Add and enter a Rule Name for a new rule.
2. (Oponal) Specify a specific threat name (default is any).
3. Set the Acon. In this example, it is set to Block IP.
If you set a Vulnerability Protecon profile to Block IP, the firewall first uses
hardware to block IP addresses. If aack traffic exceeds the blocking capacity of
the hardware, the firewall then uses soware blocking mechanisms to block the
remaining IP addresses.
4. Set Category to brute-force.
5. (Oponal) If blocking, specify the Host Type on which to block: server or client (default is
any).
6. See Step 3 to customize the acon for a specific signature.
7. See Step 4 to customize the trigger threshold for a parent signature.
PAN-OS® Administrator’s Guide Version 10.1 967 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
3. Set the acon: Allow, Alert, Block Ip, or Drop. If you select Block Ip, complete these
addional tasks:
1. Specify the Time period (in seconds) aer which to trigger the acon.
2. Specify whether to Track By and block the IP address using the IP source or the IP
source and desnaon.
4. Click OK.
5. For each modified signature, select the check box in the Enable column.
6. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 968 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 969 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 2 | Get the latest Applicaons and Threats content version (at least content version 579 or later).
1. Select Device > Dynamic Updates.
2. Check Now to get the latest Applicaons and Threats content update.
3. Download and Install Applicaons and Threats content version 579 (or later).
STEP 3 | Define how the firewall should enforce traffic matched to evasion signatures.
1. Select Objects > Security Profiles > An-Spyware and Add or modify an An-spyware
profile.
2. Select Excepons and select Show all signatures.
3. Filter signatures based on the keyword evasion.
4. For all evasion signatures, set the Acon to any seng other than allow or the default
acon (the default acon is for evasion signatures is allow). For example, set the Acon
for signature IDs 14978 and 14984 to alert or drop.
5. Click OK to save the updated An-spyware profile.
6. Aach the An-spyware profile to a security policy rule: Select Policies > Security, select
the desired policy to modify and then click the Acons tab. In Profile Sengs, click the
drop-down next to An-Spyware and select the an-spyware profile you just modified to
enforce evasion signatures.
PAN-OS® Administrator’s Guide Version 10.1 970 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 971 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Delete an entry if you determine the IP address shouldn’t be blocked. Then revise the
policy rule that caused the firewall to block the address.
While hardware IP address blocking is disabled, the firewall sll performs any soware
IP address blocking you have configured.
To conserve CPU and packet buffer resources, leave hardware IP address blocking
enabled unless Palo Alto Networks technical support asks you to disable it, for
example, if they are debugging a traffic flow.
Tune the number of seconds that IP addresses blocked by hardware remain on the block list
(range is 1-3,600; default is 1).
Maintain a shorter duraon for hardware block list entries than soware block list
entries to reduce the likelihood of exceeding the blocking capacity of the hardware.
Change the default website for finding more informaon about an IP address from Network
Soluons Who Is to a different website.
PAN-OS® Administrator’s Guide Version 10.1 972 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
View counts of source IP addresses blocked by hardware and soware, for example to see the
rate of an aack.
View the total sum of IP address entries on the hardware block table and block list (blocked by
hardware and soware):
View the count of IP address entries on the hardware block table that were blocked by
hardware:
View the count of IP address entries on the block list that were blocked by soware:
PAN-OS® Administrator’s Guide Version 10.1 973 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Anvirus Signatures
PAN-OS® Administrator’s Guide Version 10.1 974 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
archive Anvirus Roshal Archive (RAR) and 7-Zip (7z) archive files.
Wildfire
Spyware Signatures
PAN-OS® Administrator’s Guide Version 10.1 975 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 976 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
hacktool Applicaons and Detects traffic generated by soware tools that are
Threats used by malicious actors to conduct reconnaissance,
aack or gain access to vulnerable systems, exfiltrate
data, or create a command and control channel to
surrepously control a computer system without
authorizaon. These programs are strongly associated
with malware and cyber aacks. Hacking tools might
be deployed in a benign manner when used in Red and
Blue Team operaons, penetraon tests, and R&D. The
PAN-OS® Administrator’s Guide Version 10.1 977 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
webshell Applicaons and Detects web shells and web shell traffic, including
Threats implant detecon and command and control interacon.
Web shells must first be implanted by a malicious actor
onto the compromised host, most oen targeng a
web server or framework. Subsequent communicaon
with the web shell file frequently enables a malicious
actor to establish a foothold in the system, conduct
service and network enumeraon, data exfiltraon, and
remote code execuon in the context of the web server
PAN-OS® Administrator’s Guide Version 10.1 978 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Vulnerability Signatures
code execuon Applicaons and Detects a code execuon vulnerability that an aacker
Threats can leverage to run code on a system with the privileges
of the logged-in user.
code- Applicaons and Detects code that has been transformed to conceal
obfuscaon Threats certain data while retaining its funcon. Obfuscated
code is difficult or impossible to read, so it’s not
apparent what commands the code is execung or
with which programs its designed to interact. Most
commonly, malicious actors obfuscate code to conceal
malware. More rarely, legimate developers might
obfuscate code to protect privacy, intellectual property,
or to improve user experience. For example, certain
types of obfuscaon (like minificaon) reduce file size,
PAN-OS® Administrator’s Guide Version 10.1 979 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
exploit-kit Applicaons and Detects an exploit kit landing page. Exploit kit landing
Threats pages oen contain several exploits that target one or
many common vulnerabilies and exposures (CVEs), for
mulple browsers and plugins. Because the targeted
CVEs change quickly, exploit-kit signatures trigger
based on the exploit kit landing page, and not the CVEs.
When a user visits a website with an exploit kit, the
exploit kit scans for the targeted CVEs and aempts
to silently deliver a malicious payload to the vicm’s
computer.
PAN-OS® Administrator’s Guide Version 10.1 980 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 981 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
While you can use an Anvirus profile to exclude anvirus signatures from
enforcement, you cannot change the acon the firewall enforces for a specific anvirus
signature. However, you can define the acon for the firewall to enforce for viruses
found in different types of traffic by eding the Decoders (Objects > Security Profiles >
Anvirus > <anvirus-profile> > Anvirus).
PAN-OS® Administrator’s Guide Version 10.1 982 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 2 | Modify enforcement for vulnerability and spyware signatures (except DNS signatures; skip
to the next opon to modify enforcement for DNS signatures, which are a type of spyware
signature).
1. Select Objects > Security Profiles > An-Spyware or Objects > Security Profiles >
Vulnerability Protecon.
2. Add or modify an exisng An-Spyware or Vulnerability Protecon profile from which
you want to exclude the threat signature and then select either Signature Excepons for
An-Spyware Protecon profiles or Excepons for Vulnerability Protecon profiles.
3. Show all signatures and then filter to select the signature for which you want to modify
enforcement rules.
4. Check the box under the Enable column for the signature whose enforcement you want
to modify.
5. Select the Acon you want the firewall to enforce for this threat signature.
For signatures that you want to exclude from enforcement because they trigger false
posives, set the Acon to Allow.
6. Click OK to save your new or modified An-Spyware or Vulnerability Protecon profile.
PAN-OS® Administrator’s Guide Version 10.1 983 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Custom Signatures
You can create custom threat signatures to detect and block specific traffic. When the firewall
is managed by a Panorama management server, the ThreatID is mapped to the corresponding
custom threat on the firewall to enable the firewall to generate a threat log populated with the
configured custom ThreatID. Learn more by vising our guide to Custom Applicaon and Threat
Signatures.
PAN-OS® Administrator’s Guide Version 10.1 984 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Addionally, you can use Threat Signature Categories—which classify types of threat events—to
narrow your view into a certain type of threat acvity or to build custom reports.
• Monitor Acvity and Create Custom Reports Based on Threat Categories
• Learn More About Threat Signatures
• AutoFocus Threat Intelligence for Network Traffic
PAN-OS® Administrator’s Guide Version 10.1 985 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 986 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Create custom reports based on threat categories to receive informaon about specific types of
threats that the firewall has detected.
1. Select Monitor > Manage Custom reports to add a new custom report or modify an
exisngone.
2. Choose the Database to use as the source for the custom report—in this case, select
Threat from either of the two types of database sources, summary databases and
Detailed logs. Summary database data is condensed to allow a faster response me when
generang reports. Detailed logs take longer to generate but provide an itemized and
complete set of data for each log entry.
3. In the Query Builder, add a report filter with the Aribute Threat Category and in the
Value field, select a threat category on which to base your report.
4. To test the new report sengs, click Run Now.
5. Click OK to save the report.
PAN-OS® Administrator’s Guide Version 10.1 987 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
You can use the threat ID found with a Threat log or ACC entry to:
• Easily check if a threat signature is configured as an excepon to your security policy (Create
Threat Excepons).
• Find the latest Threat Vault informaon about a specific threat. Because the Threat Vault is
integrated with the firewall, you can view threat details directly in the firewall context or launch
a Threat Vault search in a new browser window for a threat the firewall logged.
If a signature has been disabled, the signature UTID might be reused for a new signature.
Review the content update release notes for noficaons regarding new and disabled
signatures. Signatures might disabled in cases where: the acvity the signature detects
has fallen out of use by aackers, the signature generated significant false posives, or
the signature was consolidated with other like signatures into a single signature (signature
opmizaon).
PAN-OS® Administrator’s Guide Version 10.1 988 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 3 | Hover over a Threat Name or the threat ID to open the drop-down, and click Excepon to
review both the threat details and how the firewall is configured to enforce the threat.
For example, find out more about a top threat charted on the ACC:
STEP 4 | Review the latest Threat Details for the threat and launch a Threat Vault search based on the
threat ID.
• Threat details displayed include the latest Threat Vault informaon for the threat, resources
you can use to learn more about the threat, and CVEs associated with the threat.
• Select View in Threat Vault to open a Threat Vault search in a new window and look up the
latest informaon the Palo Alto Networks threat database has for this threat signature.
The Used in security rule column does not indicate if the Security policy rule is enabled,
only if the Security policy rule is configured with the threat excepon. Select Policies >
Security to check if an indicated security policy rule is enabled.
PAN-OS® Administrator’s Guide Version 10.1 989 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 6 | Add an IP address on which to filter the threat excepon or view exisng Exempt IP
Addresses.
Configure an exempt IP address to enforce a threat excepon only when the associated session
has either a matching source or desnaon IP address; for all other sessions, the threat is
enforced based on the default signature acon.
PAN-OS® Administrator’s Guide Version 10.1 990 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
Analysis Informaon The Analysis Informaon tab displays the following informaon:
• Sessions—The number of sessions logged in your firewall(s) in which
the firewall detected samples associated with the arfact.
• Samples—A comparison of organizaon and global samples
associated with the arfact and grouped by WildFire verdict
(benign, malware, or grayware). Global refers to samples from all
WildFire submissions, while organizaon refers only to samples
submied to WildFire by your organizaon.
• Matching Tags—The AutoFocus tags matched to the arfact.
AutoFocus Tags indicate whether an arfact is linked to malware or
targeted aacks.
Passive DNS The Passive DNS tab displays passive DNS history that includes the
arfact. This passive DNS history is based on global DNS intelligence
in AutoFocus; it is not limited to the DNS acvity in your network.
Passive DNS history consists of:
• The domain request
• The DNS request type
• The IP address or domain to which the DNS request resolved
(private IP addresses are not displayed)
• The number of mes the request was made
• The date and me the request was first seen and last seen
Matching Hashes The Matching Hashes tab displays the 5 most recently detected
matching samples. Sample informaon includes:
PAN-OS® Administrator’s Guide Version 10.1 991 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
As a best pracce, set the query meout to the default value of 15 seconds.
AutoFocus queries are opmized to complete within this duraon.
4. Select Enabled to allow the firewall to connect to AutoFocus.
5. Click OK.
6. Commit your changes to retain the AutoFocus sengs upon reboot.
PAN-OS® Administrator’s Guide Version 10.1 992 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 993 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 3 | Hover over an arfact to open the drop-down, and click AutoFocus.
The AutoFocus Intelligence Summary is only available for the following types of arfacts:
IP address
URL
Domain
User agent
Threat name (only for threats of the subtypes virus and wildfire-virus)
Filename
SHA-256 hash
STEP 4 | Launch an AutoFocus search for the arfact for which you opened the AutoFocus
Intelligence Summary.
Click the Search AutoFocus for... link at the top of the AutoFocus Intelligence Summary
window. The search results include all samples associated with the arfact. Toggle between
the My Samples and All Samples tabs and compare the number of samples to determine the
pervasiveness of the arfact in your organizaon.
STEP 5 | Launch an AutoFocus search for other arfacts in the AutoFocus Intelligence Summary.
Click on the following arfacts to determine their pervasiveness in your organizaon:
• WildFire verdicts in the Analysis Informaon tab
• URLs and IP addresses in the Passive DNS tab
• The SHA256 hashes in the Matching Hashes tab
PAN-OS® Administrator’s Guide Version 10.1 994 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
STEP 6 | View the number of sessions associated with the arfact in your organizaon per month.
Hover over the session bars.
STEP 7 | View the number of samples associated with the arfact by scope and WildFire verdict.
Hover over the samples bars.
PAN-OS® Administrator’s Guide Version 10.1 995 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 996 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 997 ©2022 Palo Alto Networks, Inc.
Threat Prevenon
PAN-OS® Administrator’s Guide Version 10.1 998 ©2022 Palo Alto Networks, Inc.
Decrypon
Palo Alto Networks firewalls can decrypt and inspect traffic to provide visibility
into threats and to control protocols, cerficate verificaon, and failure handling.
Decrypon can enforce policies on encrypted traffic so that the firewall handles
encrypted traffic according to your configured security sengs. Decrypt traffic to
prevent malicious encrypted content from entering your network and sensive
content from leaving your network concealed as encrypted traffic. Enabling decrypon
can include preparing the keys and cerficates required for decrypon, creang
decrypon profiles and policies, and configuring decrypon port mirroring.
> Decrypon Overview > Decrypon Exclusions
> Decrypon Concepts > Block Private Key Export
> Prepare to Deploy Decrypon > Enable Users to Opt Out of SSL
> Define Traffic to Decrypt Decrypon
> Configure SSL Forward Proxy > Temporarily Disable SSL Decrypon
> Configure SSL Inbound Inspecon > Configure Decrypon Port Mirroring
999
Decrypon
Decrypon Overview
The Secure Sockets Layer (SSL) and Secure Shell (SSH) encrypon protocols secure traffic between
two enes, such as a web server and a client. SSL and SSH encapsulate traffic, encrypng data
so that it is meaningless to enes other than the client and server with the cerficates to affirm
trust between the devices and the keys to decode the data. Decrypt SSL and SSH traffic to:
• Prevent malware concealed as encrypted traffic from being introduced into your network. For
example, an aacker compromises a website that uses SSL encrypon. Employees visit that
website and unknowingly download an exploit or malware. The malware then uses the infected
employee endpoint to move laterally through the network and compromise other systems.
• Prevent sensive informaon from moving outside the network.
• Ensure the appropriate applicaons are running on a secure network.
• Selecvely decrypt traffic; for example, create a Decrypon policy and profile to exclude traffic
for financial or healthcare sites from decrypon.
Palo Alto Networks firewall decrypon is policy-based, and can decrypt, inspect, and control
inbound and outbound SSL and SSH connecons. A Decrypon policy enables you to specify
traffic to decrypt by desnaon, source, service, or URL category, and to block, restrict, or forward
the specified traffic according to the security sengs in the associated Decrypon profile. A
Decrypon profile controls SSL protocols, cerficate verificaon, and failure checks to prevent
traffic that uses weak algorithms or unsupported modes from accessing the network. The firewall
uses cerficates and keys to decrypt traffic to plaintext, and then enforces App-ID and security
sengs on the plaintext traffic, including Decrypon, Anvirus, Vulnerability, An-Spyware, URL
Filtering, WildFire, and File-Blocking profiles. Aer decrypng and inspecng traffic, the firewall
re-encrypts the plaintext traffic as it exits the firewall to ensure privacy and security.
The firewall provides three types of Decrypon policy rules: SSL Forward Proxy to control
outbound SSL traffic, SSL Inbound Inspecon to control inbound SSL traffic, and SSH Proxy to
control tunneled SSH traffic. You can aach a Decrypon profile to a policy rule to apply granular
access sengs to traffic, such as checks for server cerficates, unsupported modes, and failures.
SSL decrypon (both forward proxy and inbound inspecon) requires cerficates to establish the
firewall as a trusted third party, and to establish trust between a client and a server to secure an
SSL/TLS connecon. You can also use cerficates when excluding servers from SSL decrypon for
technical reasons (the site breaks decrypon for reasons such as cerficate pinning, unsupported
ciphers, or mutual authencaon). SSH decrypon does not require cerficates.
Use the Decrypon Best Pracces Checklist to plan, implement, and maintain your
decrypon deployment.
You can integrate a hardware security module (HSM) with a firewall to enable enhanced security
for the private keys used in SSL forward proxy and SSL inbound inspecon decrypon. To learn
more about storing and generang keys using an HSM and integrang an HSM with your firewall,
see Secure Keys with a Hardware Security Module.
You can also use Decrypon Mirroring to forward decrypted traffic as plaintext to a third party
soluon for addional analysis and archiving.
PAN-OS® Administrator’s Guide Version 10.1 1000 ©2022 Palo Alto Networks, Inc.
Decrypon
If you enable Decrypon mirroring, be aware of local laws and regulaons about what
traffic you can mirror and where and how you can store the traffic, because all mirrored
traffic, including sensive informaon, is forwarded in cleartext.
PAN-OS® Administrator’s Guide Version 10.1 1001 ©2022 Palo Alto Networks, Inc.
Decrypon
Decrypon Concepts
Review the following topics to learn more about decrypon features and support:
• Keys and Cerficates for Decrypon Policies
• SSL Forward Proxy
• SSL Forward Proxy Decrypon Profile
• SSL Inbound Inspecon
• SSL Inbound Inspecon Decrypon Profile
• SSL Protocol Sengs Decrypon Profile
• SSH Proxy
• SSH Proxy Decrypon Profile
• SSL Profile for No Decrypon
• SSL Decrypon for Ellipcal Curve Cryptography (ECC) Cerficates
• Perfect Forward Secrecy (PFS) Support for SSL Decrypon
• SSL Decrypon and Subject Alternave Names (SANs)
• TLSv1.3 Decrypon
• High Availability Support for Decrypted Sessions
• Decrypon Mirroring
If you have two CAs (Device > Cerficate Management > Device Cerficates) with the
same subject and key, and one CA expires, delete (custom) or disable (predefined) the
expired CA. If you do not delete or disable an expired CA, the firewall can build a chain to
the expired CA if it is enabled in the trusted chain resulng in a Block page.
When you apply a decrypon policy to traffic, a session between the client and the server is
established only if the firewall trusts the CA that signed the server cerficate. In order to establish
PAN-OS® Administrator’s Guide Version 10.1 1002 ©2022 Palo Alto Networks, Inc.
Decrypon
trust, the firewall must have the server root CA cerficate in its cerficate trust list (CTL) and
use the public key contained in that root CA cerficate to verify the signature. The firewall then
presents a copy of the server cerficate signed by the Forward Trust cerficate for the client
to authencate. You can also configure the firewall to use an enterprise CA as a forward trust
cerficate for SSL Forward Proxy. If the firewall does not have the server root CA cerficate in
its CTL, the firewall will present a copy of the server cerficate signed by the Forward Untrust
cerficate to the client. The Forward Untrust cerficate ensures that clients are prompted with a
cerficate warning when aempng to access sites hosted by a server with untrusted cerficates.
For detailed informaon on cerficates, see Cerficate Management.
To control the trusted CAs that your firewall trusts, use the Device > Cerficate
Management > Cerficates > Default Trusted Cerficate Authories tab on the firewall
web interface.
The following table describes the different cerficates Palo Alto Networks firewalls use for
decrypon.
Forward Trust (Used The cerficate the firewall presents to clients during decrypon if the
for SSL Forward site the client is aempng to connect to has a cerficate signed by a
Proxy decrypon) CA that the firewall trusts. To configure a Forward Trust cerficate on
the firewall to present to clients when the server cerficate is signed
by a trusted CA, see Configure SSL Forward Proxy.
By default, the firewall determines the key size to use for the client
cerficate based on the key size of the desnaon server. However,
you can Configure the Key Size for SSL Proxy Server cerficates. For
added security, consider storing the private key associated with the
Forward Trust cerficate on a hardware security module (see Store
Private Keys on an HSM).
Forward Untrust The cerficate the firewall presents to clients during decrypon if
(Used for SSL the site the client is aempng to connect to has a cerficate that is
Forward Proxy signed by a CA that the firewall does not trust. To configure a Forward
decrypon) Untrust cerficate on the firewall, see Configure SSL Forward Proxy.
PAN-OS® Administrator’s Guide Version 10.1 1003 ©2022 Palo Alto Networks, Inc.
Decrypon
SSL Inbound The cerficates of the servers on your network for which you want to
Inspecon perform SSL Inbound Inspecon of traffic desned for those servers.
Import the server cerficates onto the firewall.
PAN-OS® Administrator’s Guide Version 10.1 1004 ©2022 Palo Alto Networks, Inc.
Decrypon
Because the firewall is a proxy device, SSL Forward Proxy Decrypon cannot decrypt some
sessions, such as sessions with client authencaon or pinned cerficates. Being a proxy
also means that the firewall does not support High Availability (HA) sync for decrypted SSL
sessions.
The following figure shows this process in detail. See Configure SSL Forward Proxy for details on
configuring SSL Forward Proxy.
1. The internal client on your network aempts to iniate a TLS session with an external server.
2. The firewall intercepts the client’s SSL cerficate request. For the client, the firewall acts as the
external server, even though the secure session being established is with the firewall, not with
the actual server.
3. The firewall then forwards the client’s SSL cerficate request to the server to iniate a separate
session with the server. To the server, the firewall looks like the client, the server doesn’t know
there’s a man-in-the-middle, and the server verifies the cerficate.
4. The server sends the firewall a signed cerficate intended for the client.
5. The firewall analyzes the server cerficate. If the server cerficate is signed by a CA that the
firewall trusts and meets the policies and profiles you configure, the firewall generates an SSL
Forward Trust copy of the server cerficate and sends it to the client. If the server cerficate
is signed by a CA that the firewall does not trust, the firewall generates an SSL Forward
Untrust copy of the server cerficate and sends it to the client. The cerficate copy the firewall
generates and sends to the client contains extensions from the original server cerficate and is
called an impersonaon cerficate because it is not the server’s actual cerficate. If the firewall
does not trust the server, the client sees a block page warning message that the site they’re
aempng to connect to is not trusted, and if you Enable Users to Opt Out of SSL Decrypon,
the client can choose to proceed or terminate the session.
PAN-OS® Administrator’s Guide Version 10.1 1005 ©2022 Palo Alto Networks, Inc.
Decrypon
6. The client verifies the firewall’s impersonaon cerficate. The client then iniates a session
key exchange with the server, which the firewall proxies in the same manner as it proxies the
cerficates. The firewall forwards the client key to the server, and makes an impersonaon
copy of the server key for the client, so that firewall remains an “invisible” proxy, the client and
server believe their session is with each other, but there are sll two separate sessions, one
between the client and the firewall, and the other between the firewall and the server. Now all
pares have the cerficates and keys required and the firewall can decrypt the traffic.
7. All SSL session traffic between goes through the firewall transparently between the client
and the server. The firewall decrypts the SSL traffic, applies security policies and profiles and
decrypon profiles to the traffic, re-encrypts the traffic, and then forwards it.
When you configure SSL Forward Proxy, the proxied traffic does not support DSCP code
points or QoS.
Because the firewall is a proxy device, SSL Forward Proxy Decrypon cannot decrypt some
sessions, such as sessions with client authencaon or pinned cerficates. Being a proxy
also means that the firewall does not support High Availability (HA) sync for decrypted SSL
sessions.
PAN-OS® Administrator’s Guide Version 10.1 1006 ©2022 Palo Alto Networks, Inc.
Decrypon
• Block sessions with expired cerficates—Always check this box to block sessions with servers
that have expired cerficates and prevent access to potenally insecure sites. If you don’t
check this box, users can connect with and transact with potenally malicious sites and see
warning messages when they aempt to connect, but the connecon is not prevented.
• Block sessions with untrusted issuers—Always check this box to block sessions with servers
that have untrusted cerficate issuers. An untrusted issuer may indicate a man-in-the-middle
aack, a replay aack, or other aack.
• Block sessions with unknown cerficate status—Blocks the SSL/TLS session when a the
cerficate revocaon status of the server returns with the status “unknown”. Because
cerficate status may be unknown for mulple reasons, for general decrypon security,
checking this box usually ghtens security too much. However, in higher-security areas of the
network such as the data center, checking this box makes sense.
• Block sessions on cerficate status check meout—Whether to block sessions if the status
check mes out depends on your company’s security compliance stance because it’s a tradeoff
between ghter security and a beer user experience. Cerficate status verificaon examines
the Cerficate Revocaon List (CRL) on a revocaon server or uses Online Cerficate Status
Protocol (OCSP) to find out if the issuing CA has revoked the cerficate and the cerficate
should not be trusted. However, revocaon servers can be slow to respond, which can cause
the session to meout and the firewall to block the session even though the cerficate may
be valid. If you Block sessions on cerficate status check meout and the revocaon server
is slow to respond, you can use Device > Setup > Session > Decrypon Sengs and click
Cerficate Revocaon Checking to change the default meout value of five seconds to
another value. For example, you could increase the meout value to eight seconds, as shown
in the following figure. Enable both CRL and OCSP cerficate revocaon checking because
server cerficates can contain the CRL URL in the CRL Distribuon Point (CDP) extension or
the OCSP URL in the Authority Informaon Access (AIA) cerficate extension.
• Restrict cerficate extensions—Checking this box limits the cerficate extensions in the server
cerficate to key usage and extended key usage and blocks cerficates with other extensions.
However, in certain deployments, some other cerficate extensions may be necessary, so only
check this box if your deployment requires no other cerficate extensions.
• Append cerficate’s CN value to SAN extension—Checking this box ensures that when a
browser requires a server cerficate to use a Subject Alternave Name (SAN) and doesn’t
support cerficate matching based on the Common Name (CN), if the cerficate doesn’t have
a SAN extension, users can sll access the requested web resources because the firewall adds
the SAN extension (based on the CN) to the impersonaon cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1007 ©2022 Palo Alto Networks, Inc.
Decrypon
Unsupported Mode Checks. If you don’t block sessions with unsupported modes, users receive
a warning message if they connect with potenally unsafe servers, and they can click through
that message and reach the potenally dangerous site. Blocking these sessions protects you from
servers that use weak, risky protocol versions and algorithms:
• Block sessions with unsupported versions—When you configure the SSL Protocol Sengs
Decrypon Profile, you specify the minimum version of SSL protocol to allow on your network
to reduce the aack surface by blocking weak protocols. Always check this box to block
sessions with the weak SSL/TLS protocol versions that you have chosen not to support.
• Block sessions with unsupported cipher suites—Always check this box to block sessions if
the firewall doesn’t support the cipher suite specified in the handshake. You configure which
algorithms the firewall supports on the SSL Protocol Sengs tab of the Decrypon profile.
• Block sessions with client authencaon—If you have no crical applicaons that require
client authencaon, block it because firewall can’t decrypt sessions that require client
authencaon. The firewall needs both the client and the server cerficates to perform bi-
direconal decrypon, but with client authencaon, the firewall only knows the server
cerficate. This breaks decrypon for client authencaon sessions. When you check this box,
the firewall blocks all sessions with client authencaon except sessions from sites on the SSL
Decrypon Exclusion list (Device > Cerficate Management > SSL Decrypon Exclusion).
If you don’t Block sessions with client authencaon, when the firewall aempts to decrypt
a session that uses client authencaon, the firewall allows the session and adds an entry that
contains the server URL/IP address, the applicaon, and the Decrypon profile to its Local
Decrypon Exclusion Cache.
You may need to allow traffic on your network from sites that use client authencaon
and are not in the Predefined sites on the SSL Decrypon Exclusion list. Create
a Decrypon profile that allows sessions with client authencaon. Add it to a
Decrypon policy rule that applies only to the server(s) that host the applicaon. To
increase security even more, you can require Mul-Factor Authencaon to complete
the user login process.
Failure Checks:
• Block sessions if resources not available—If you block sessions when no firewall processing
resources are available, the firewall drops traffic when it doesn’t have the resources to decrypt
the traffic. If you don’t block sessions when the firewall can’t process decrypon due to a
lack of resources, then traffic that you want to decrypt enters the network sll encrypted
and therefore is not inspected. However, blocking sessions when resources aren’t available
may affect the user experience by making sites that users normally can reach temporarily
unreachable. Whether to implement this failure check depends on your company’s security
compliance stance and the importance of the user experience, weighed against ghter security.
Alternavely, consider using firewall models with more processing power so that you can
decrypt more traffic.
• Block sessions if HSM not available—If you use a Hardware Security Module (HSM) to store
your private keys, whether you use one depends on your compliance rules about where the
private key must come from and how you want to handle encrypted traffic if the HSM isn’t
available. For example, if your company mandates the use of an HSM for private key signing,
then block sessions if the HSM isn’t available. However, if your company is less strict about
this, then you can consider not blocking sessions if the HSM isn’t available. (If the HSM is
down, the firewall can process decrypon for sites for which it has cached the response from
PAN-OS® Administrator’s Guide Version 10.1 1008 ©2022 Palo Alto Networks, Inc.
Decrypon
the HSM, but not for other sites.) The best pracce in this case depends on your company’s
policies. If the HSM is crical to your business, run the HSM in a high-availability (HA) pair
(PAN-OS 8.1 supports two members in an HSM HA pair).
• Block downgrade on no resource—Prevents the firewall from downgrading TLSv1.3 to TLSv1.2
if the firewall has no available TLSv1.3 processing resources. If you block the downgrade, then
when the firewall runs out of TLSv1.3 resources, it drops traffic that uses TLSv1.3 instead of
downgrading it to TLSv1.2. If you don’t block downgrade, then when the firewall runs out of
TLSv1.3 resources, it downgrades to TLSv1.2. However, blocking downgrade when resources
aren’t available may affect the user experience by making sites that users normally can reach
temporarily unreachable. Whether to implement this failure check depends on your company’s
security compliance stance and the importance of the user experience, weighed against ghter
security. You may want to create a separate Decrypon policy and profile to govern decrypon
for sensive traffic for which you don’t want to downgrade the TLS version.
Because the firewall is a proxy device, SSL Inbound Inspecon cannot decrypt some
sessions, such as sessions with client authencaon or pinned cerficates. Being a proxy
also means that the firewall does not support High Availability (HA) sync for decrypted SSL
sessions.
On the firewall, you must install the cerficate and private key for each server for which you
want to perform SSL Inbound Inspecon. The TLS versions that your web server supports
determine how you should install the server cerficate and key on the firewall. If your web
server supports TLS 1.2 and Rivest, Shamir, Adleman (RSA) or Perfect Forward Secrecy (PFS) key
exchange algorithms and your end-enty (leaf) cerficate is signed by intermediate cerficates, we
recommend uploading a cerficate chain (a single file) to the firewall. Uploading the chain avoids
client-side server cerficate authencaon issues.
TLS 1.3 removes support for the RSA key exchange algorithm.
The firewall handles TLS 1.3 connecons differently than TLS 1.2 connecons. During TLS 1.3
handshakes, the firewall sends the client the same cerficate or cerficate chain that it receives
from the server. As a result, uploading the server cerficate and private key to the firewall is
sufficient if you correctly set up your web server. For example, if your server’s leaf cerficate is
PAN-OS® Administrator’s Guide Version 10.1 1009 ©2022 Palo Alto Networks, Inc.
Decrypon
signed by intermediate cerficates, the chain of cerficates needs to be installed on the server to
avoid client-side server authencaon issues.
When you configure the SSL Protocol Sengs Decrypon Profile for SSL Inbound
Inspecon traffic, create separate profiles for servers with different security capabilies.
For example, if one set of servers supports only RSA, the SSL Protocol Sengs only need
to support RSA. However, the SSL Protocol Sengs for servers that support PFS should
support PFS. Configure SSL Protocol Sengs for the highest level of security that the
server supports, but check performance to ensure that the firewall resources can handle
the higher processing load that higher security protocols and algorithms require.
When you configure SSL Inbound Inspecon and use a PFS cipher, session resumpon is
not supported.
When you configure SSL Inbound Inspecon, the proxied traffic does not support DSCP
code points or QoS.
To protect an internal server, follow the steps to configure SSL Inbound Inspeconpolicy rules.
Because the firewall is a proxy device, SSL Inbound Inspecon cannot decrypt some
sessions, such as sessions with client authencaon or pinned cerficates. Being a proxy
also means that the firewall does not support High Availability (HA) sync for decrypted SSL
sessions.
Unsupported Mode Checks. If you don’t block sessions with unsupported modes, users receive
a warning message if they connect with potenally unsafe servers, and they can click through
PAN-OS® Administrator’s Guide Version 10.1 1010 ©2022 Palo Alto Networks, Inc.
Decrypon
that message and reach the potenally dangerous site. Blocking these sessions protects you from
servers that use weak, risky protocol versions and algorithms:
1. Block sessions with unsupported versions—When you configure the SSL Protocol Sengs
Decrypon Profile, you specify the minimum version of TLS protocol to allow on your network
to reduce the aack surface by blocking weak protocols. Always check this box to block
sessions with the weak SSL and TLS protocol versions that you have chosen not to support.
2. Block sessions with unsupported cipher suites—Always check this box to block sessions if
the firewall doesn’t support the cipher suite specified in the handshake. You configure which
algorithms the firewall supports on the SSL Protocol Sengs tab of the Decrypon profile.
Failure Checks:
• Block sessions if resources not available—If you block sessions when no firewall processing
resources are available, the firewall drops traffic when it doesn’t have the resources to decrypt
the traffic. If you don’t block sessions when the firewall can’t process decrypon due to a
lack of resources, then traffic that you want to decrypt enters the network sll encrypted
and therefore is not inspected. However, blocking sessions when resources aren’t available
may affect the user experience by making sites that users normally can reach temporarily
unreachable. Whether to implement this failure check depends on your company’s security
compliance stance and the importance of the user experience, weighed against ghter security.
Alternavely, consider using firewall models with more processing power so that you can
decrypt more traffic.
• Block sessions if HSM not available—If you use a Hardware Security Module (HSM) to store
your private keys, whether you use one depends on your compliance rules about where the
private key must come from and how you want to handle encrypted traffic if the HSM isn’t
available. For example, if your company mandates the use of an HSM for private key signing,
then block sessions if the HSM isn’t available. However, if your company is less strict about
this, then you can consider not blocking sessions if the HSM isn’t available. (If the HSM is
down, the firewall can process decrypon for sites for which it has cached the response from
the HSM, but not for other sites.) The best pracce in this case depends on your company’s
policies. If the HSM is crical to your business, run the HSM in a high-availability (HA) pair
(PAN-OS 8.1 supports two members in an HSM HA pair).
• Block downgrade on no resource—Prevents the firewall from downgrading TLSv1.3 to TLSv1.2
if the firewall has no available TLSv1.3 processing resources. If you block the downgrade, then
when the firewall runs out of TLSv1.3 resources, it drops traffic that uses TLSv1.3 instead of
downgrading it to TLSv1.2. If you don’t block downgrade, then when the firewall runs out of
TLSv1.3 resources, it downgrades to TLSv1.2. However, blocking downgrade when resources
aren’t available may affect the user experience by making sites that users normally can reach
temporarily unreachable. Whether to implement this failure check depends on your company’s
security compliance stance and the importance of the user experience, weighed against ghter
security. You may want to create a separate Decrypon policy and profile to govern decrypon
for sensive traffic for which you don’t want to downgrade the TLS version.
PAN-OS® Administrator’s Guide Version 10.1 1011 ©2022 Palo Alto Networks, Inc.
Decrypon
Forward Proxy and inbound SSL Inbound Inspecon traffic. These sengs don’t apply to SSH
Proxy traffic or to traffic that you don’t decrypt.
The following figure shows the general best pracce recommendaons for SSL Protocol Sengs.
There are also specific best pracces for perimeter internet gateway decrypon profiles and for
data center decrypon profiles.
When you configure SSL Protocol Sengs for SSL Inbound Inspecon traffic, create
separate profiles for servers with different security capabilies. For example, if one set of
servers supports only RSA, the SSL Protocol Sengs only need to support RSA. However,
the SSL Protocol Sengs for servers that support PFS should support PFS. Configure SSL
Protocol Sengs for the highest level of security that the target server you are protecng
supports, but check performance to ensure that the firewall resources can handle the
higher processing load that higher security protocols and algorithms require.
Protocol Versions:
• Set the Min Version to TLSv1.2 to provide the strongest security—business sites that value
security support TLSv1.2. If a site (or a category of sites) only supports weaker ciphers, review
the site and determine if it hosts a legimate business applicaon. If it does, make an excepon
for only that site by configuring a Decrypon profile with a Min Version that matches the
strongest cipher the site supports and then applying the profile to a Decrypon policy rule that
limits allowing the weak cipher to only the site or sites in queson. If the site doesn’t host a
legimate business applicaon, don’t weaken your security posture to support the site—weak
protocols (and ciphers) contain known vulnerabilies that aackers can exploit.
If the site belongs to a category of sites that you don’t need for business purposes, use
URL Filtering to block access to the enre category. Don’t support weak encrypon or
authencaon algorithms unless you must to support important legacy sites, and when you
make excepons, create a separate Decrypon profile that allows the weaker protocol just
PAN-OS® Administrator’s Guide Version 10.1 1012 ©2022 Palo Alto Networks, Inc.
Decrypon
for those sites. Don’t downgrade the main Decrypon profile that you apply to most sites to
TLSv1.1 just to accommodate a few excepons.
Qualys SSL Labs SSL Pulse web page provides up-to-date stascs on the percentages
of different ciphers and protocols in use on the 150,000 most popular sites in the world
so you can see trends and understand how widespread worldwide support is for more
secure ciphers and protocols.
• Set the Max Version to Max rather than to a parcular version so that as the protocols
improve, the firewall automacally supports the newest and best protocols. Whether you
intend to aach a Decrypon profile to a Decrypon policy rule that governs inbound (SSL
Inbound Inspecon) or outbound (SSL Forward Proxy) traffic, avoid allowing weak algorithms.
If your Decrypon policy supports mobile applicaons, many of which use pinned
cerficates, set the Max Version to TLSv1.2. Because TLSv1.3 encrypts cerficate
informaon that was not encrypted in previous TLS versions, the firewall can’t
automacally add decrypon exclusions based on cerficate informaon, which affects
some mobile applicaons. Therefore, if you enable TLSv1.3, the firewall may drop some
mobile applicaon traffic unless you create a No Decrypon policy for that traffic.
If you know the mobile applicaons you use for business, consider creang a separate
Decrypon policy and profile for those applicaons so that you can enable TLSv1.3 for
all other applicaon traffic.
Key Exchange Algorithms: Leave all three boxes checked (default) to support both RSA and PFS
(DHE and ECDHE) key exchanges unless the minimum version is set to TLSv1.3, which only
supports ECDHE.
To support HTTP/2 traffic, you must leave the ECDHE box checked.
Encrypon Algorithms: When you set the minimum protocol version to TLSv1.2, the older, weaker
3DES and RC4 algorithms are automacally unchecked (blocked). When you set the minimum
protocol version to TLSv1.3, the 3DES, RC4, AES128-CBC, and AES256-CBC algorithms are
automacally blocked. For any traffic for which you must allow a weaker TLS protocol, create a
separate Decrypon profile and apply it only to traffic for that site, and deselect the appropriate
boxes to allow the algorithm. Allowing traffic that uses the 3DES or RC4 algorithms exposes your
network to excessive risk. If blocking 3DES or RC4 prevents you from accessing a site that you
must use for business, create a separate Decrypon profile and policy for that site. Don’t weaken
decrypon for any other sites.
Authencaon Algorithms: The firewall automacally blocks the older, weaker MD5 algorithm.
When TLSv1.3 is the minimum version, the firewall also blocks SHA1. Do not allow MD5
authencated traffic on your network; SHA1 is the weakest authencaon algorithm you should
allow. If no necessary sites use SHA1, block SHA1 traffic to further reduce the aack surface.
SSH Proxy
In an SSH Proxy configuraon, the firewall resides between a client and a server. SSH Proxy
enables the firewall to decrypt inbound and outbound SSH connecons and ensures that aackers
don’t use SSH to tunnel unwanted applicaons and content. SSH decrypon does not require
cerficates and the firewall automacally generates the key used for SSH decrypon when the
PAN-OS® Administrator’s Guide Version 10.1 1013 ©2022 Palo Alto Networks, Inc.
Decrypon
firewall boots up. During the boot up process, the firewall checks if there is an exisng key. If
not, the firewall generates a key. The firewall uses the key to decrypt SSH sessions for all virtual
systems configured on the firewall and all SSH v2 sessions.
SSH allows tunneling, which can hide malicious traffic from decrypon. The firewall can’t decrypt
traffic inside an SSH tunnel. You can block all SSH tunnel traffic by configuring a Security policy
rule for the applicaon ssh-tunnel with the Acon set to Deny (along with a Security policy rule to
allow traffic from the ssh applicaon).
SSH tunneling sessions can tunnel X11 Windows packets and TCP packets. One SSH connecon
may contain mulple channels. When you apply an SSH Decrypon profile to traffic, for each
channel in the connecon, the firewall examines the App-ID of the traffic and idenfies the
channel type. The channel type can be:
• session
• X11
• forwarded-tcpip
• direct-tcpip
When the channel type is session, the firewall idenfies the traffic as allowed SSH traffic such
as SFTP or SCP. When the channel type is X11, forwarded-tcpip, or direct-tcpip, the firewall
idenfies the traffic as SSH tunneling traffic and blocks it.
Limit SSH use to administrators who need to manage network devices, log all SSH traffic,
and consider configuring Mul-Factor Authencaon to help ensure that only legimate
users can use SSH to access devices, which reduces the aack surface.
Aer you enable SSH Decrypon on the firewall, authencang to hosts that have a
cerficate fails because the SSH client no longer uses public key-based authencaon,
so the server can’t use a public key that the client that the client can decrypt to with its
private key to complete the handshake. Use username and password authencaon to
iniate the SSH session.
For systems that must use key-based authencaon, configure your SSH Decrypon
policy rule to exclude the systems that require public key authencaon. To edit the SSH
Decrypon policy rule:
1. Go to Policies > Decrypon and select the policy rule that controls SSH decrypon.
2. Select the Desnaon tab.
3. Add the IP addresses of the systems you want to exclude from the rule.
4. Select Negate.
5. Click OK.
6. Commit the change.
The following figure shows how SSH Proxy decrypon works. See Configure SSH Proxy for how to
enable SSH Proxy decrypon.
PAN-OS® Administrator’s Guide Version 10.1 1014 ©2022 Palo Alto Networks, Inc.
Decrypon
When you configure SSH Proxy, the proxied traffic does not support DSCP code points or
QoS.
PAN-OS® Administrator’s Guide Version 10.1 1015 ©2022 Palo Alto Networks, Inc.
Decrypon
The firewall doesn’t perform content and threat inspecon on SSH tunnels (port
forwarding). However, the firewall disnguishes between the SSH applicaon and the SSH-
tunnel applicaon. If the firewall idenfies SSH tunnels, it blocks the SSH tunneled traffic
and restricts the traffic according to configured security policies.
Unsupported Mode Checks. The firewall supports SSHv2. If you don’t block sessions with
unsupported modes, users receive a warning message if they connect with potenally unsafe
servers, and they can click through that message and reach the potenally dangerous site.
Blocking these sessions protects you from servers that use weak, risky protocol versions and
algorithms:
1. Block sessions with unsupported versions—The firewall has a set of predefined supported
versions. Checking this box blocks traffic with weak versions. Always check this box to block
sessions with the weak protocol versions to reduce the aack surface.
2. Block sessions with unsupported algorithms—The firewall has a set of predefined supported
algorithms. Checking this box blocks traffic with weak algorithms. Always check this box to
block sessions with unsupported algorithms to reduce the aack surface.
Failure Checks:
• Block sessions on SSH errors—Checking this box terminates the session if SSH errors occur.
• Block sessions if resources not available—If you don’t block sessions when firewall processing
resources aren’t available, then encrypted traffic that you want to decrypt enters the network
sll encrypted, risking allowing potenally dangerous connecons. However, blocking sessions
when firewall processing resources aren’t available may affect the user experience by making
sites that users normally can reach temporarily unreachable. Whether to implement failure
checks depends on your company’s security compliance stance and the importance to your
business of the user experience, weighed against ghter security. Alternavely, consider using
firewall models with more processing power so that you can decrypt more traffic.
PAN-OS® Administrator’s Guide Version 10.1 1016 ©2022 Palo Alto Networks, Inc.
Decrypon
• Block sessions with expired cerficates—Check this box to block sessions with servers that
have expired cerficates and prevent access to potenally insecure sites. If you don’t check
this box, users can connect with and transact with potenally malicious sites and see warning
messages when they aempt to connect, but the connecon is not prevented.
• Block sessions with untrusted issuers—Check this box to block sessions with servers that have
untrusted cerficate issuers. An untrusted issuer may indicate a man-in-the-middle aack, a
replay aack, or other aack.
Do not aach a No Decrypon profile to Decrypon policies for TLSv1.3 traffic that
you don’t decrypt. Unlike previous versions, TLSv1.3 encrypts cerficate informaon,
so the firewall has no visibility into cerficate data and therefore cannot block sessions
with expired cerficates or untrusted issuers, so the profile has no effect. (The firewall
can perform cerficate checks with TLSv1.2 and earlier because those protocols do not
encrypt cerficate informaon and you should apply a No Decrypon profile to their
traffic.) However, you should create a Decrypon policy for TLSv1.3 traffic that you don’t
decrypt because the firewall doesn’t log undecrypted traffic unless a Decrypon policy
controls that traffic.
PAN-OS® Administrator’s Guide Version 10.1 1017 ©2022 Palo Alto Networks, Inc.
Decrypon
(Applies to TLSv1.2 and earlier) If you choose to allow sessions with untrusted issuers (not
recommended) and only Block sessions with expired cerficates, there is a scenario in
which a session with a trusted, expired issuer may be blocked inadvertently. When the
firewall’s cerficate store contains a valid, self-signed Trusted CA and the server sends an
expired CA in the cerficate chain, the firewall does not check its cerficate store. Instead,
the firewall blocks the session based on the expired CA when it should find the trusted,
valid alternave trust anchor and allow the session based on that trusted self-signed
cerficate.
To avoid this scenario, in addion to Block sessions with expired cerficates, enable Block
sessions with untrusted issuers. This forces the firewall to check its cerficate store, find
the self-signed Trusted CA, and allow the session.
Decrypon for websites and applicaons using ECC cerficates is not supported for traffic
that is mirrored to the firewall; encrypted traffic using ECC cerficates must pass through
the firewall directly for the firewall to decrypt it.
You can use a hardware security module (HSM) to store the private keys associated with
ECDSA cerficates. For TLSv1.3 traffic, PAN-OS supports HSMs only for SSL Forward
Proxy. It does not support HSMs for SSL Inbound Inspecon.
If you use the DHE or ECDHE key exchange algorithms to enable PFS support for SSL
decrypon, you can use a hardware security module (HSM) to store the private keys for
SSL Inbound Inspecon.
When you configure SSL Inbound Inspecon and use a PFS cipher, session resumpon is
not supported.
PAN-OS® Administrator’s Guide Version 10.1 1018 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1019 ©2022 Palo Alto Networks, Inc.
Decrypon
TLSv1.3 Decrypon
You can decrypt, gain full visibility into, and prevent known and unknown threats in TLSv1.3
traffic. TLSv1.3 is the latest version of the TLS protocol, which provides applicaon security and
performance improvements. To support TLSv1.3 decrypon, you must apply a Decrypon profile
to exisng and new Decrypon policy rules with TLSv1.3 configured as the minimum protocol
version or with Max or TLSv1.3 configured as the maximum protocol version. You can edit your
exisng profiles to support TLSv1.3. If you don’t specify TLSv1.3 support in the Decrypon profile,
then PAN-OS defaults to supporng TLSv1.2 as the maximum protocol version. The firewall
supports TLSv1.3 decrypon for Forward Proxy, Inbound Inspecon, decrypted Network Packet
Broker traffic, and Decrypon Port Mirroring.
To use TLSv1.3, the client and server must be able to negoate TLSv1.3 ciphers. For websites that
don’t support TLSv1.3, the firewall selects an older version of the TLS protocol that the server
supports.
The firewall supports the following decrypon algorithms for TLSv1.3:
• TLS13-AES-128-GCM-SHA256
• TLS13-AES-256-GCM-SHA384
• TLS13-CHACHA20-POLY1305-SHA256
If the Decrypon profile you apply to decrypted traffic specifies the protocol’s Max Version as
Max, then the profile supports TLSv1.3 and automacally uses TLSv1.3 with sites that support
TLSv1.3. (You could set the Max Version to TLSv1.3 to support TLSv1.3, but when the next
version of TLS is released, you will need to update the profile. Seng the Max Version to Max
future-proofs the profile to automacally support new TLS versions as they are released.) When
PAN-OS® Administrator’s Guide Version 10.1 1020 ©2022 Palo Alto Networks, Inc.
Decrypon
you upgrade to PAN-OS 10.0, all Decrypon profiles with the Max Version set to Max are reset
to TLSv1.2 to provide automac support for mobile applicaons that use pinned cerficates and
prevent that traffic from dropping.
Not all applicaons support the TLSv1.3 protocol. Follow decrypon best pracces, set the Min
Version of the TLS protocol to TLSv1.2, and leave the Max Version seng as Max. If business
needs require allowing a weaker TLS protocol, create a separate SSL Decrypon profile with a
Min Version that allows the weaker protocol and aach it to a Decrypon policy that defines the
traffic you need to allow with the weaker TLS protocol.
If your Decrypon policy supports mobile applicaons, many of which use pinned cerficates,
set the Max Version to TLSv1.2. Because TLSv1.3 encrypts cerficate informaon that was not
encrypted in previous TLS versions, the firewall can’t automacally add decrypon exclusions
based on cerficate informaon, which affects some mobile applicaons. Therefore, if you enable
TLSv1.3, the firewall may drop some mobile applicaon traffic unless you create a No Decrypon
policy for that traffic. If you know the mobile applicaons you use for business, consider creang
a separate Decrypon policy and profile for those applicaons so that you can enable TLSv1.3 for
all other traffic.
Do not aach a No Decrypon profile to Decrypon policies for TLSv1.3 traffic that
you don’t decrypt if you know that a parcular policy controls only TLSv1.3 traffic. A
change from previous TLS versions is that TLSv1.3 encrypts cerficate informaon, so
the firewall no longer has visibility into that data and therefore cannot block sessions
with expired cerficates or untrusted issuers, so the profile has no effect. (The firewall
can perform cerficate checks with TLSv1.2 and earlier because those protocols do not
encrypt cerficate informaon and you should apply a No Decrypon profile to their
traffic.) However, you can log undecrypted traffic of all types by enabling logging successful
and unsuccessful TLS handshakes in the Decrypon policy (logging unsuccessful TLS
handshakes is enabled by default).
When you allow unsupported modes in the SSL Protocol Sengs Decrypon Profile, the firewall
automacally adds the traffic to the Local Decrypon Exclusion Cache. The firewall sll decrypts
and inspects traffic that is downgraded from TLSv1.3 to TLSv1.2 and the Reason shown in the
cache for adding the server to the cache is TLS13_UNSUPPORTED.
If you downgrade from PAN-OS 10.1 to a previous version, any Decrypon profile that specifies
TLSv1.3 as the Min Version or the Max Version changes to the highest supported version. For
example, downgrading from PAN-OS 10.1 to PAN-OS 9.1 would replace TLSv1.3 with TLSv1.2. If
a Panorama device on PAN-OS 10.1 pushes the configuraon to devices that run older versions
of PAN-OS, any Decrypon profile that specified TLSv1.3 as the Min Version or the Max Version
also changes to highest supported version.
For customers who use Hardware Security Modules (HSMs), PAN-OS supports TLSv1.3
only for SSL Forward Proxy. It does not support HSMs for SSL Inbound Inspecon.
You can configure an SSL Decrypon profile that sets TLSv1.3 as the minimum allowed protocol
version to achieve the ghtest security. However, some applicaons don’t support TLSv1.3 and
may not work if TLSv1.3 is the minimum allowed protocol. Apply a profile that sets TLSv1.3 as the
minimum version only to applicaon traffic that only supports TLSv1.3.
PAN-OS® Administrator’s Guide Version 10.1 1021 ©2022 Palo Alto Networks, Inc.
Decrypon
1. Create a new SSL Decrypon profile or edit an exisng profile (Objects > Decrypon >
Decrypon Profile).
If the profile is new, specify a profile Name.
2. Select SSL Protocol Sengs.
3. Change the Min Version to TLSv1.3.
Using Max for the Max Version ensures that the traffic which the profile controls can use the
strongest available protocol version. Min Version sets the weakest version of the protocol that
the traffic can use. Seng the minimum version to TLSv1.3 means that the traffic must use
TLSv1.3 (or greater) and that weaker protocol versions are blocked. (The Decrypon Policy rule
defines the traffic the profile controls.)
When you configure TLSv1.3 as the Min Version, you must use Perfect Forward Secrecy (PFS)
and the weaker key exchange, encrypon, and authencaon algorithms are not available.
4. Configure any other Decrypon profile sengs you need to set or change.
5. Click OK to save the profile.
6. Aach the profile to the appropriate Decrypon Policy rule to apply it to the appropriate
traffic.
PAN-OS® Administrator’s Guide Version 10.1 1022 ©2022 Palo Alto Networks, Inc.
Decrypon
Decrypon Mirroring
Decrypon mirroring creates a copy of decrypted traffic from a firewall and sends it to a traffic
collecon tool such as NetWitness or Solera, which can receive raw packet captures for archiving
and analysis. Organizaons that require comprehensive data capture for forensic and historical
purposes or for data leak prevenon (DLP) can install a free license to enable the feature.
Aer you install the license, connect the traffic collecon tool directly to an Ethernet interface on
the firewall and set the Interface Type to Decrypt Mirror. The firewall simulates a TCP handshake
with the collecon tool and then sends every data packet through that interface, decrypted (as
cleartext).
Decrypon port mirroring is not available on the VM-Series for public cloud plaorms
(AWS, Azure, Google Cloud Plaorm) and VMware NSX.
Keep in mind that the decrypon, storage, inspecon, and/or use of SSL traffic is governed in
certain countries and user consent might be required in order to use the decrypon mirror feature.
Addionally, use of this feature could enable malicious users with administrave access to the
firewall to harvest usernames, passwords, social security numbers, credit card numbers, or other
sensive informaon submied using an encrypted channel. Palo Alto Networks recommends that
you consult with your corporate counsel before acvang and using this feature in a producon
environment.
The following graphic shows the process for mirroring decrypted traffic and the secon Configure
Decrypon Port Mirroring describes how to license and enable this feature.
PAN-OS® Administrator’s Guide Version 10.1 1023 ©2022 Palo Alto Networks, Inc.
Decrypon
Migrate from port-based to applicaon-based Security policy rules before you create
and deploy Decrypon policy rules. If you create Decrypon rules based on port-based
Security policy and then migrate to applicaon-based Security policy, the change could
cause the Decrypon rules to block traffic that you intend to allow because Security policy
rules are likely to use applicaon default ports to prevent applicaon traffic from using
non-standard ports. For example, traffic idenfied as web-browsing applicaon traffic
(default port 80) may have underlying applicaons that have different default ports, such
as HTTPS traffic (default port 443). The applicaon-default rule blocks the HTTPS traffic
because it sees the decrypted traffic using a “non-standard” port (443 instead of 80).
Migrang to App-ID based rules before deploying decrypon means that when you test
your decrypon deployment in POCs, you’ll discover Security policy misconfiguraon and
fix it before rolling it out to the general user populaon.
PAN-OS® Administrator’s Guide Version 10.1 1024 ©2022 Palo Alto Networks, Inc.
Decrypon
Next, idenfy traffic that you can’t decrypt because the traffic breaks decrypon for technical
reasons such as a pinned cerficate, an incomplete cerficate chain, unsupported ciphers, or
mutual authencaon. Decrypng sites that break decrypon technically results in blocking that
traffic. Evaluate the websites that break decrypon technically and ask yourself if you need access
to those sites for business reasons. If you don’t need access to those sites, allow decrypon to
block them. If you need access to any of those sites for business purposes, add them to the SSL
Decrypon Exclusion list to except them from decrypon. The SSL Decrypon Exclusion list is
exclusively for sites that break decrypon technically.
Idenfy sensive traffic that you choose not to decrypt for legal, regulatory, personal, or other
reasons, such as financial, health, or government traffic, or the traffic of certain execuves. This is
not traffic that breaks decrypon technically, so you don’t use the SSL Decrypon Exclusion list
to except this traffic from decrypon. Instead, you Create a Policy-Based Decrypon Exclusion
to idenfy and control traffic you choose not to decrypt and apply the No Decrypon decrypon
profile to the policy to prevent servers with cerficate issues from accessing the network. Policy-
based decrypon exclusions are only for traffic you choose not to decrypt.
When you plan decrypon policy, consider your company’s security compliance rules, computer
usage policy, and your business goals. Extremely strict controls can impact the user experience
by prevenng access to non-business sites the user used to access, but may be required for
government or financial instuons. There is always a tradeoff between usability, management
overhead, and security. The ghter the decrypon policy, the greater the chance that a website
will become unreachable, which may result in user complaints and possibly modifying the
rulebase.
Although a ght decrypon policy may inially cause a few user complaints, those
complaints can draw your aenon to unsanconed or undesirable websites that are
blocked because they use weak algorithms or have cerficate issues. Use complaints as a
tool to beer understand the traffic on your network.
Different groups of users and even individual users may require different decrypon policies, or
you may want to apply the same decrypon policy to all users. For example, execuves may be
exempted from decrypon policies that apply to other employees. And you may want to apply
different decrypon policies to employee groups, contracts, partners, and guests. Prepare updated
legal and HR computer usage policies to distribute to all employees, contractors, partners, guests,
and any other network users so that when you roll out decrypon, users understand their data can
be decrypted and scanned for threats.
PAN-OS® Administrator’s Guide Version 10.1 1025 ©2022 Palo Alto Networks, Inc.
Decrypon
How you handle guest users depends on the access they require. Isolate guests from the
rest of your network by placing them on a separate VLAN and on a separate SSID for
wireless access. If guests don’t need to access your corporate network, don’t let them on it
and there will be no need to decrypt their traffic. If guests need to access your corporate
network, decrypt their traffic:
• Enterprises don’t control guest devices. Decrypt guest traffic and subject it to your
guest Security policy so the firewall can inspect the traffic and prevent threats. To
do this, redirect guest users through an Authencaon Portal, instruct them how to
download and install the CA cerficate, and clearly nofy guests that their traffic
will be decrypted. Include the process in your company’s privacy and computer usage
policy.
• Create separate Decrypon policy rules and Security policy rules to ghtly control
guest access so that guests can only access the areas of your network that they need to
access.
Similarly to different groups of users, decide which devices to decrypt and which applicaons
to decrypt. Today’s networks support not only corporate devices, but BYOD, mobile, remote-
user and other devices, including contractor, partner, and guest devices. Today’s users aempt to
access many sites, both sanconed and unsanconed, and you should decide how much of that
traffic you want to decrypt.
Enterprises don’t control BYOD devices. If you allow BYOD devices on your network,
decrypt their traffic and subject it to the same Security policy that you apply to other
network traffic so the firewall can inspect the traffic and prevent threats. To do this,
redirect BYOD users through an Authencaon Portal, instruct them how to download
and install the CA cerficate, and clearly nofy users that their traffic will be decrypted.
Educate BYOD users about the process and include it in your company’s privacy and
computer usage policy.
Decide what traffic you want to log and invesgate what traffic you can log. Be aware of local
laws regarding what types of data you can log and store, and where you can log and store the
data. For example, local laws may prevent logging and storing personal informaon such as health
and financial data.
Decide how to handle bad cerficates. For example, will you block or allow sessions for which the
cerficate status is unknown? Understanding how you want to handle bad cerficates determines
how you configure the decrypon profiles that you aach to decrypon policies to control which
sessions you allow based on the server cerficate verificaon status.
PAN-OS® Administrator’s Guide Version 10.1 1026 ©2022 Palo Alto Networks, Inc.
Decrypon
cerficate from your Enterprise Root CA makes the rollout easier and smoother because
network devices already trust the Enterprise Root CA, so you avoid any cerficate issues when
you begin the deployment phase. If you don’t have an Enterprise Root CA, consider geng one.
• Generate a self-signed Root CA cerficate on the firewall and create subordinate CA
cerficates on that firewall—If you don’t have an Enterprise Root CA, this method provides a
self-signed Root CA cerficate and the subordinate Forward Trust and Untrust CA cerficates.
With this method, you need to install the self-signed cerficates on all of your network devices
so that those devices recognize the firewall’s self-signed cerficates. Because the cerficates
must be deployed to all devices, this method is beer for small deployments and proof-of-
concept (POC) trials than for large deployments.
Do not export the Forward Untrust cerficate to the Cerficate Trust Lists of your network
devices! This is crical because installing the Untrust cerficate in the Trust List results
in devices trusng websites that the firewall does not trust. In addion, users won’t see
cerficate warnings for untrusted sites, so they won’t know the sites are untrusted and
may access those sites, which could expose your network to threats.
Regardless of whether you generate Forward Trust cerficates from your Enterprise
Root CA or use a self-signed cerficate generated on the firewall, generate a separate
subordinate Forward Trust CA cerficate for each firewall. The flexibility of using separate
subordinate CAs enables you to revoke one cerficate when you decommission a device
(or device pair) without affecng the rest of the deployment and reduces the impact in any
situaon in which you need to revoke a cerficate. Separate Forward Trust CAs on each
firewall also helps troubleshoot issues because the CA error message the user sees includes
informaon about the firewall the traffic is traversing. If you use the same Forward Trust
CA on every firewall, you lose the granularity of that informaon.
There is no benefit to using different Forward Untrust cerficates on different firewalls, so you can
use the same Forward Untrust cerficate on all firewalls. If you need addional security for your
private keys, consider storing them on an HSM.
You may need to make special accommodaons for guest users. If guest users don’t need access
to your corporate network, don’t allow access, and then you won’t have to decrypt their traffic or
create infrastructure to support guest access. If you need to support guest users, discuss with your
legal department whether you can decrypt guest traffic.
If you can decrypt guest traffic, treat guests similarly to the way you treat BYOD devices. Decrypt
guest traffic and subject it to the same Security policy that you apply to other network traffic. Do
this by redirecng guest users through an Authencaon Portal, instruct them how to download
and install the CA cerficate, and clearly nofy users that their traffic will be decrypted. Include
the process in your company’s privacy and computer usage policy. In addion, restrict guest traffic
to only the areas guests need to access.
If you can’t decrypt guest traffic for legal reasons, then isolate guest traffic and prevent it from
moving laterally in your network:
• Create a separate zone for guests and restrict guest access to that zone. To prevent lateral
movement, don’t allow guest access to other zones.
• Allow only sanconed applicaons, use URL filtering to prevent access to risky URL categories,
and apply the best pracce Security profiles.
PAN-OS® Administrator’s Guide Version 10.1 1027 ©2022 Palo Alto Networks, Inc.
Decrypon
• Apply a No Decrypt decrypon policy and profile to prevent guests from accessing websites
with unknown or expired CAs.
All employees, contractors, partners, and other users should use your normal corporate
infrastructure and you should decrypt and inspect their traffic.
The combinaon of the key exchange algorithm and the cerficate authencaon
method affect throughput performance as shown in RSA and ECDSA benchmark tests.
The performance cost of PFS trades off against the higher security that PFS achieves,
but PFS may not be needed for all types of traffic. You can save firewall CPU cycles
by using RSA for traffic that you want to decrypt and inspect for threats but that isn’t
sensive.
• Average transacon sizes. For example, small average transacon sizes consume more
processing power to decrypt. Measure the average transacon size of all traffic, then measure
the average transacon size of traffic on port 443 (the default port for HTTPS encrypted traffic)
PAN-OS® Administrator’s Guide Version 10.1 1028 ©2022 Palo Alto Networks, Inc.
Decrypon
to understand the proporon of encrypted traffic going to the firewall in relaon to your total
traffic and the average transacon sizes. Eliminate anomalous outliers such as unusually large
transacons to get a truer measurement of average transacon size.
• The firewall model and resources. Newer firewall models have more processing power than
older models.
The combinaon of these factors determines how decrypon consumes firewall processing
resources. To best ulize the firewall’s resources, understand the risks of the data you’re
protecng. If firewall resources are an issue, use stronger decrypon for higher-priority traffic and
use less processor-intensive decrypon to decrypt and inspect lower-priority traffic unl you can
increase the available resources. For example, you could use RSA instead of ECDHE and ECDSA
for traffic that isn’t sensive or high-priority to preserve firewall resources for using PFS-based
decrypon for higher priority, sensive traffic. (You’re sll decrypng and inspecng the lower-
priority traffic, but trading off consuming fewer computaonal resources with using algorithms
that aren’t as secure as PFS.) The key is to understand the risks of different traffic types and treat
them accordingly.
Measure firewall performance so that you understand the currently available resources, which
helps you understand whether you need more firewall resources to decrypt the traffic you want to
decrypt. Measuring firewall performance also sets a baseline for performance comparisons aer
deploying decrypon.
When you size the firewall deployment, base it not only on your current needs, but also on your
future needs. Include headroom for the growth of decrypon traffic because Gartner predicts that
through 2019, more than 80 percent of enterprise web traffic will be encrypted, and more than 50
percent of new malware campaigns will use various forms of encrypon. Work with your Palo Alto
Networks representaves and take advantage of their experience in sizing firewalls to help you
size your firewall decrypon deployment.
PAN-OS® Administrator’s Guide Version 10.1 1029 ©2022 Palo Alto Networks, Inc.
Decrypon
support decrypon and to develop the most painless method for supporng the general rollout.
The interacon between POC users and technical support also allows you to fine-tune policies
and how to communicate with users.
POCs enable you to experiment with priorizing what to decrypt first, so that when you phase
in decrypon in the general populaon, your POC experience helps you understand how to
phase in decrypng different URL Categories. Measure the way decrypon affects firewall
CPU and memory ulizaon to help understand if the firewall sizing is correct or if you need to
upgrade. POCs can also reveal applicaons that break decrypon technically (decrypng them
blocks their traffic) and need to be added to the Decrypon Exclusion list.
When you set up POCs, also set up a user group that can cerfy the operaonal readiness and
procedures prior to the general rollout.
• Educate the user populaon before the general rollout, and plan to educate new users as they
join the company. This is a crical phase of deploying decrypon because the deployment
may affect websites that users previously visited but are not safe, so those sites are no longer
reachable. The POC experience helps idenfy the most important points to communicate.
• Phase in decrypon. You can accomplish this several ways. You can decrypt the highest priority
traffic first (for example, the URL Categories most likely to harbor malicious traffic, such as
gaming) and then decrypt more as you gain experience. Alternavely, you can take a more
conservave approach and decrypt the URL Categories that don’t affect your business first
(so if something goes wrong, no issues occur that affect business), for example, news feeds.
In all cases, the best way to phase in decrypon is to decrypt a few URL Categories, take user
feedback into account, run reports to ensure that decrypon is working as expected, and then
gradually decrypt a few more URL Categories and verify, and so on. Plan to make Decrypon
Exclusions to exclude sites from decrypon if you can’t decrypt them for technical reasons or
because you choose not to decrypt them.
If you Enable Users to Opt Out of SSL Decrypon (users see a response page that allows them
either to opt out of decrypon and end the session without going to the site or to proceed to
the site and agree to have the traffic decrypted), educate them about what it is, why they’re
seeing it, and what their opons are.
• Create realisc deployment schedules that allow me to evaluate each stage of the rollout.
Place firewalls in posions where they can see all of the network traffic so that no
encrypted traffic inadvertently gains access to your network because it bypasses the
firewall.
PAN-OS® Administrator’s Guide Version 10.1 1030 ©2022 Palo Alto Networks, Inc.
Decrypon
Review the Decrypon deployment best pracces checklist to ensure that you
understand the recommended best pracces.
Block known dangerous URL Filtering categories such as malware, phishing, dynamic-dns,
unknown, command-and-control, proxy-avoidance-and-anonymizers, copyright-infringement,
extremism, newly-registered-domain, grayware, and parked. If you must allow any of these
categories for business reasons, decrypt them and apply strict Security profiles to the traffic.
URL categories that you should always decrypt if you allow them include: online-storage-and-
backup, web-based-email, web-hosng, personal-sites-and-blogs, and content-delivery-networks.
In Security policy, block Quick UDP Internet Connecons (QUIC) protocol unless for
business reasons, you want to allow encrypted browser traffic. Chrome and some other
browsers establish sessions using QUIC instead of TLS, but QUIC uses proprietary
encrypon that the firewall can’t decrypt, so potenally dangerous traffic may enter the
network as encrypted traffic. Blocking QUIC forces the browser to fall back to TLS and
enables the firewall to decrypt the traffic.
Create a Security policy rule to block QUIC on its UDP service ports (80 and 443) and
create a separate rule to block the QUIC applicaon. For the rule that blocks UDP ports
80 and 443, create a Service (Objects > Services) that includes UDP ports 80 and 443:
Use the Service to specify the UDP ports to block for QUIC. In the second rule, block the
QUIC applicaon:
PAN-OS® Administrator’s Guide Version 10.1 1031 ©2022 Palo Alto Networks, Inc.
Decrypon
Avoid supporng weak protocols or algorithms because they contain known vulnerabilies
that aackers can exploit. If you must allow a weaker protocol or algorithm to support a
key partner or contractor who uses legacy systems with weak protocols, create a separate
Decrypon profile for the excepon and aach it to a Decrypon policy rule that applies
the profile only to the relevant traffic (for example, the source IP address of the partner).
Don’t allow the weak protocol for all traffic.
STEP 2 | (Oponal) Allow the profile rule to be Shared across every virtual system on a firewall or
every Panorama device group.
PAN-OS® Administrator’s Guide Version 10.1 1032 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | (Decrypon Mirroring Only) Enable an Ethernet Interface for the firewall to use to copy and
forward decrypted traffic.
Separate from this task, follow the steps to Configure Decrypon Port Mirroring. Be aware of
local privacy regulaons that may prohibit mirroring or control the type of traffic that you can
mirror. Decrypon port mirroring requires a decrypon port mirror license.
STEP 4 | (Oponal) Block and control SSL tunneled and/or inbound traffic:
STEP 5 | (Oponal) Block and control traffic (for example, a URL category) for which you choose to
Create a Policy-Based Decrypon Exclusion.
Although applying a Decrypon profile to traffic that you choose not to decrypt is
oponal, it is a best pracce to always apply a Decrypon profile to the policy rules to
protect your network against sessions with expired cerficates or untrusted issuers.
Select No Decrypon to configure the Profile for No Decrypon and check the Block
sessions with expired cerficates and Block sessions with untrusted issuers boxes to validate
cerficates for traffic that is excluded from decrypon. Create policy-based exclusions only for
traffic that you choose not to decrypt. If a server breaks decrypon for technical reasons, don’t
create a policy-based exclusion, add the server to the SSL Decrypon Exclusion list (Device >
Cerficate Management > SSL Decrypon Exclusion).
These seng are acve only when the decrypon profile is aached to a decrypon policy rule
that disables decrypon for certain traffic.
PAN-OS® Administrator’s Guide Version 10.1 1033 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 7 | Add the decrypon profile when you Create a Decrypon Policy Rule.
The firewall applies the decrypon profile to and enforces the profile’s sengs on the traffic
that matches the decrypon policy rule.
STEP 2 | Configure the decrypon rule to match to traffic based on network and policy objects:
• Firewall security zones—Select Source and/or Desnaon and match to traffic based on the
Source Zone and/or the Desnaon Zone.
• IP addresses, address objects, and/or address groups—Select Source and/or Desnaon
to match to traffic based on Source Address and/or the Desnaon Address. Alternavely,
select Negate to exclude the source address list from decrypon.
• Users—Select Source and set the Source User for whom to decrypt traffic. You can decrypt
specific user or group traffic, or decrypt traffic for certain types of users, such as unknown
users or pre-logon users (users that are connected to GlobalProtect but are not yet logged
in).
• Ports and protocols—Select Service/URL Category to set the rule to match to traffic based
on service. By default, the policy rule is set to decrypt Any traffic on TCP and UDP ports.
PAN-OS® Administrator’s Guide Version 10.1 1034 ©2022 Palo Alto Networks, Inc.
Decrypon
You can Add a service or a service group, and oponally set the rule to applicaon-default
to match to applicaons only on the applicaon default ports.
• URLs and URL categories—Select Service/URL Category and decrypt traffic based on:
• An externally-hosted list of URLs that the firewall retrieves for policy-enforcement (see
Objects > External Dynamic Lists).
• Palo Alto Networks predefined URL categories, which make it easy to decrypt enre
categories of allowed traffic. This opon is also useful when you create policy-based
decrypon exclusions because you can exclude sensive sites by category instead of
individually. For example, although you can create a custom URL category to group sites
that you do not want to decrypt, you can also exclude financial or healthcare-related
sites from decrypon based on the predefined Palo Alto Networks URL categories. In
addion, you can block risky URL categories and create comfort pages to communicate
the reason the sites are blocked or enable users to opt out of SSL decrypon.
You can use the predefined high-risk and medium-risk URL categories to create a
Decrypon policy rule that decrypts all high-risk and medium-risk URL traffic. Place the
rule at the boom of the rulebase (all decrypon excepons must be above this rule so
that you don’t decrypt sensive informaon) as a safety net to ensure that you decrypt
and inspect all risky traffic. However, if high-risk or medium-risk sites to which you allow
access contain personally idenfiable informaon (PII) or other sensive informaon
that you don’t want to decrypt, either block those sites to avoid allowing encrypted risky
traffic while also avoiding privacy issues, or create a No Decrypon rule to handle the
sensive traffic.
• Custom URL categories (see Objects > Custom Objects > URL Category). For example,
you can create a custom URL category to specify a group of sites you need to access for
business purposes but that don’t support the safest protocols and algorithms, and then
apply a customized Decrypon profile to allow the looser protocols and algorithms for
just those sites (that way, you don’t decrease security by downgrading the Decrypon
profile you use for most sites).
PAN-OS® Administrator’s Guide Version 10.1 1035 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | Set the rule to either decrypt matching traffic or to exclude matching traffic from decrypon.
Select Opons and set the policy rule Acon:
To decrypt matching traffic:
1. Set the Acon to Decrypt.
2. Set the Type of decrypon for the firewall to perform on matching traffic:
• SSL Forward Proxy.
• SSL Inbound Inspecon. If you want to enable SSL Inbound Inspecon, also select the
Cerficate for the desnaon internal server for the inbound SSL traffic.
• SSH Proxy.
To exclude matching traffic from decrypon:
Set the Acon to No Decrypt.
STEP 4 | (Oponal) Select a Decrypon Profile to perform addional checks on traffic that matches
the policy rule.
For example, aach a Decrypon profile to a policy rule to ensure that server cerficates are
valid and to block sessions using unsupported protocols or ciphers. To create a Decrypon
profile, select Objects > Decrypon Profile.
1. Create a Decrypon policy rule or open an exisng rule to modify it.
2. Select Opons and select a Decrypon Profile to block and control various aspects of
the traffic matched to the rule.
The profile rule sengs the firewall applies to matching traffic depends on the policy
rule Acon (Decrypt or No Decrypt) and the policy rule Type (SSL Forward Proxy, SSL
Inbound Inspecon, or SSH Proxy). This allows you to use the different Decrypon
profiles with different types of Decrypon policy rules that apply to different types of
traffic and users.
3. Click OK.
STEP 5 | Configure Decrypon logging (configure whether to log both successful and unsuccessful TLS
handshakes and configure Decrypon log forwarding).
PAN-OS® Administrator’s Guide Version 10.1 1036 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 7 | Choose your next step to fully enable the firewall to decrypt traffic...
• Configure SSL Forward Proxy.
• Configure SSL Inbound Inspecon.
• Configure SSH Proxy.
• Create policy-based decrypon exclusions for traffic you choose not to decrypt and add
sites that break decrypon for technical reasons such as pinned cerficates or mutual
authencaon to the SSL Decrypon Exclusion list.
PAN-OS® Administrator’s Guide Version 10.1 1037 ©2022 Palo Alto Networks, Inc.
Decrypon
Regardless of whether you generate Forward Trust cerficates from your Enterprise
Root CA or use a self-signed cerficate generated on the firewall, generate a separate
subordinate Forward Trust CA cerficate for each firewall. The flexibility of using separate
subordinate CAs enables you to revoke one cerficate when you decommission a device
(or device pair) without affecng the rest of the deployment and reduces the impact in any
situaon in which you need to revoke a cerficate. Separate Forward Trust CAs on each
firewall also helps troubleshoot issues because the CA error message the user sees includes
informaon about the firewall the traffic is traversing. If you use the same Forward Trust
CA on every firewall, you lose the granularity of that informaon.
Aer seng up the Forward Trust and Forward Untrust cerficates required for SSL Forward
Proxy decrypon, create a Decrypon policy rule to define the traffic you want the firewall to
decrypt and create a Decrypon profile to apply SSL controls and checks to the traffic. The
Decrypon policy decrypts SSL tunneled traffic that matches the rule into clear text traffic. The
firewall blocks and restricts traffic based on the Decrypon profile aached to the Decrypon
policy and on the firewall Security policy. The firewall re-encrypts traffic as it exits the firewall.
When you configure SSL Forward Proxy, the proxied traffic does not support DSCP code
points or QoS.
PAN-OS® Administrator’s Guide Version 10.1 1038 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 1 | Ensure that the appropriate interfaces are configured as either virtual wire, Layer 2, or Layer
3 interfaces.
View configured interfaces on the Network > Interfaces > Ethernet tab. The Interface
Type column displays if an interface is configured to be a Virtual Wire or Layer 2, or Layer
3 interface. You can select an interface to modify its configuraon, including what type of
interface it is.
PAN-OS® Administrator’s Guide Version 10.1 1039 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 2 | Configure the Forward Trust cerficate for the firewall to present to clients when a trusted
CA has signed the server cerficate. You can use an enterprise CA-signed cerficate or a self-
signed cerficate as the forward trust cerficate.
(Recommended Best Pracce) Use an enterprise CA-signed cerficate as the Forward Trust
cerficate. Create a uniquely named Forward Trust cerficate on each firewall:
1. Generate a Cerficate Signing Request (CSR) for the enterprise CA to sign and validate:
1. Select Device > Cerficate Management > Cerficates and click Generate.
2. Enter a Cerficate Name. Use a unique name for each firewall.
3. In the Signed By drop-down, select External Authority (CSR).
4. (Oponal) If your enterprise CA requires it, add Cerficate Aributes to further idenfy
the firewall details, such as Country or Department.
5. Click Generate to save the CSR. The pending cerficate is now displayed on the Device
Cerficates tab.
2. Export the CSR:
1. Select the pending cerficate displayed on the Device Cerficates tab.
2. Click Export to download and save the cerficate file.
Leave Export private key unselected in order to ensure that the private key
remains securely on the firewall.
3. Click OK.
3. Provide the cerficate file to your enterprise CA. When you receive the enterprise CA-
signed cerficate from your enterprise CA, save the enterprise CA-signed cerficate to
import onto the firewall.
4. Import the enterprise CA-signed cerficate onto the firewall:
1. Select Device > Cerficate Management > Cerficates and click Import.
2. Enter the pending Cerficate Name exactly. The Cerficate Name that you enter must
exactly match the pending cerficate name in order for the pending cerficate to be
validated.
3. Select the signed Cerficate File that you received from your enterprise CA.
4. Click OK. The cerficate is displayed as valid with the Key and CA check boxes selected.
5. Select the validated cerficate to enable it as a Forward Trust Cerficate to be used for SSL
Forward Proxy decrypon.
6. Click OK to save the enterprise CA-signed forward trust cerficate.
Use a self-signed cerficate as the Forward Trust cerficate:
1. Create a self-signed Root CA cerficate.
2. Click the self-signed root CA cerficate (Device > Cerficate Management > Cerficates
> Device Cerficates) to open Cerficate informaon and then click the Trusted Root CA
checkbox.
3. Click OK.
4. Generate new subordinate CA cerficates for each firewall:
1. Select Device > Cerficate Management > Cerficates.
PAN-OS® Administrator’s Guide Version 10.1 1040 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | Distribute the forward trust cerficate to client system cerficate stores.
If you are using an enterprise-CA signed cerficate as the forward trust cerficate for SSL
Forward Proxy decrypon, and the client systems already have the enterprise CA installed in
the local trusted root CA list, you can skip this step. (The client systems trust the subordinate
CA cerficates you generate on the firewall because the Enterprise Trusted Root CA has signed
them.)
If you do not install the forward trust cerficate on client systems, users see cerficate
warnings for each SSL site they visit.
This opon is supported with Windows and Mac client OS versions, and requires
GlobalProtect agent 3.0.0 or later to be installed on the client systems.
1. Select Network > GlobalProtect > Portals and then select an exisng portal
configuraon or Add a new one.
2. Select Agent and then select an exisng agent configuraon or Add a new one.
3. Add the self-signed firewall Trusted Root CA cerficate to the Trusted Root CA secon.
Aer GlobalProtect distributes the firewall’s Trusted Root CA cerficate to client
PAN-OS® Administrator’s Guide Version 10.1 1041 ©2022 Palo Alto Networks, Inc.
Decrypon
systems, the client systems trust the firewall’s subordinate CA cerficates because the
clients trust the firewall’s Root CA cerficate.
4. Install in Local Root Cerficate Store so that the GlobalProtect portal automacally
distributes the cerficate and installs it in the cerficate store on GlobalProtect client
systems.
5. Click OK twice.
Without GlobalProtect:
Export the firewall Trusted Root CA cerficate so that you can import it into client systems.
Highlight the cerficate and click Export at the boom of the window. Choose PEM format.
Do not select the Export private key checkbox! The private key should remain on the
firewall and should not be exported to client systems.
Import the firewall’s Trusted Root CA cerficate into the browser Trusted Root CA list on
the client systems in order for the clients to trust it. When imporng into the client browser,
ensure that you add the cerficate to the Trusted Root Cerficaon Authories cerficate
store. On Windows systems, the default import locaon is the Personal cerficate store. You
can also simplify this process by using a centralized deployment opon, such as an Acve
Directory Group Policy Object (GPO).
STEP 4 | Configure the Forward Untrust cerficate (use the same Forward Untrust cerficate for all
firewalls).
1. Click Generate at the boom of the cerficates page.
2. Enter a Cerficate Name, such as my-ssl-fwd-untrust.
3. Set the Common Name, for example 192.168.2.1. Leave Signed By blank.
4. Click the Cerficate Authority check box to enable the firewall to issue the cerficate.
5. Click Generate to generate the cerficate.
6. Click OK to save.
7. Click the new my-ssl-fwd-untrust cerficate to modify it and enable the Forward Untrust
Cerficate opon.
Do not export the Forward Untrust cerficate to the Cerficate Trust Lists of
your network devices! Do not install the Forward Untrust cerficate on client
systems. This is crical because installing the Untrust cerficate in the Trust List
results in devices trusng websites that the firewall does not trust. In addion,
users won’t see cerficate warnings for untrusted sites, so they won’t know the
sites are untrusted and may access those sites, which could expose your network
to threats.
8. Click OK to save.
STEP 5 | (Oponal) Configure the Key Size for SSL Forward Proxy Server Cerficates that the firewall
presents to clients. By default, the firewall determines the key size to use based on the key
size of the desnaon server cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1042 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 6 | Create a Decrypon Policy Rule to define traffic for the firewall to decrypt and Create a
Decrypon Profile to apply SSL controls to the traffic.
1. Select Policies > Decrypon, Add or modify an exisng rule, and define traffic to be
decrypted.
2. Select Opons and:
• Set the rule Acon to Decrypt matching traffic.
• Set the rule Type to SSL Forward Proxy.
• (Oponal but a best pracce) Configure or select an exisng Decrypon Profile
to block and control various aspects of the decrypted traffic (for example, create a
decrypon profile to perform cerficate checks and enforce strong cipher suites and
protocol versions).
3. Click OK to save.
STEP 7 | Enable the firewall to forward decrypted SSL traffic for WildFire analysis.
This opon requires an acve WildFire license and is a WildFire best pracce.
PAN-OS® Administrator’s Guide Version 10.1 1043 ©2022 Palo Alto Networks, Inc.
Decrypon
When you configure SSL Inbound Inspecon, the proxied traffic does not support DSCP
code points or QoS.
SSL Inbound Inspecon does not support Authencaon Portal redirect. To use
Authencaon Portal redirect and decrypon, you must use SSL Forward Proxy.
STEP 1 | Ensure that the appropriate interfaces are configured as either Tap, Virtual Wire, Layer 2, or
Layer 3 interfaces.
You cannot use a Tap mode interface for SSL Inbound Inspecon if the negoated
ciphers include Perfect Forward Secrecy (PFS) key exchange algorithms (DHE and
ECDHE).
View configured interfaces on the Network > Interfaces > Ethernet tab. The Interface Type
column displays if an interface is configured to be a Virtual Wire, Layer 2, or Layer 3 interface.
You can select an interface to modify its configuraon, including the interface type.
PAN-OS® Administrator’s Guide Version 10.1 1044 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 2 | Ensure that the targeted server cerficate is installed on the firewall.
On the web interface, select Device > Cerficate Management > Cerficates > Device
Cerficates to view cerficates installed on the firewall.
The TLS versions that your web server supports determine how you should install the
server cerficate and key on the firewall.
We recommend uploading a cerficate chain (a single file) to the firewall if your end-
enty (leaf) cerficate is signed by one or more intermediate cerficates and your web
server supports TLS 1.2 and Rivest, Shamir, Adleman (RSA) or Perfect Forward Secrecy
(PFS) key exchange algorithms. Uploading the chain avoids client-side server cerficate
authencaon issues. You should arrange the cerficates in the file as follows:
1. End-enty (leaf) cerficate
2. Intermediate cerficates (in issuing order)
3. (Oponal) Root cerficate
You can upload the server cerficate and private key alone to the firewall when the leaf
cerficate is signed by intermediate cerficates if your web server supports TLS 1.3
connecons and the server’s cerficate chain is installed on the server. SSL Inbound
Inspecon discusses each case in more detail.
STEP 3 | Create a Decrypon policy rule to define traffic for the firewall to decrypt and create a
Decrypon profile to apply SSL controls to the traffic.
Although Decrypon profiles are oponal, it is best to include a Decrypon profile with
each Decrypon policy rule to prevent weak, vulnerable protocols and algorithms from
allowing quesonable traffic on your network.
1. Select Policies > Decrypon, Add or modify an exisng rule, and define traffic to be
decrypted.
2. Select Opons and:
• Set the Acon to Decrypt matching traffic.
• Set the Type to SSL Inbound Inspecon.
• Select the Cerficate for the internal server that is the desnaon of the inbound SSL
traffic.
• (Oponal but a best pracce) Configure or select an exisng Decrypon Profile
to block and control various aspects of the decrypted traffic (for example, create
PAN-OS® Administrator’s Guide Version 10.1 1045 ©2022 Palo Alto Networks, Inc.
Decrypon
When you configure the SSL Protocol Sengs Decrypon Profile for SSL
Inbound Inspecon traffic, create separate profiles for servers with different
security capabilies. For example, if one set of servers supports only RSA, the
SSL Protocol Sengs only need to support RSA. However, the SSL Protocol
Sengs for servers that support PFS should support PFS. Configure SSL
Protocol Sengs for the highest level of security that the server supports, but
check performance to ensure that the firewall resources can handle the higher
processing load that higher security protocols and algorithms require.
3. Click OK to save.
STEP 4 | Enable the firewall to forward decrypted SSL traffic for WildFire analysis.
This opon requires an acve WildFire license and is a WildFire best pracce.
PAN-OS® Administrator’s Guide Version 10.1 1046 ©2022 Palo Alto Networks, Inc.
Decrypon
When you configure SSH Proxy, the proxied traffic does not support DSCP code points or
QoS.
STEP 1 | Ensure that the appropriate interfaces are configured as either virtual wire, Layer 2, or Layer
3 interfaces. Decrypon can only be performed on virtual wire, Layer 2, or Layer 3 interfaces.
View configured interfaces on the Network > Interfaces > Ethernet tab. The Interface
Type column displays if an interface is configured to be a Virtual Wire or Layer 2, or Layer
3 interface. You can select an interface to modify its configuraon, including what type of
interface it is.
STEP 2 | Create a Decrypon Policy Rule to define traffic for the firewall to decrypt and Create a
Decrypon Profile to apply checks to the SSH traffic.
1. Select Policies > Decrypon, Add or modify an exisng rule, and define traffic to be
decrypted.
2. Select Opons and:
• Set the rule Acon to Decrypt matching traffic.
• Set the rule Type to SSH Proxy.
• (Oponal but a best pracce) Configure or select an exisng Decrypon Profile
to block and control various aspects of the decrypted traffic (for example, create a
Decrypon profile to terminate sessions with unsupported versions and unsupported
algorithms).
3. Click OK to save.
STEP 4 | (Oponal) Connue to Decrypon Exclusions to disable decrypon for certain types of
traffic.
PAN-OS® Administrator’s Guide Version 10.1 1047 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1048 ©2022 Palo Alto Networks, Inc.
Decrypon
Decrypon Exclusions
You can exclude two types of traffic from decrypon:
• Traffic that breaks decrypon for technical reasons, such as using a pinned cerficate, an
incomplete cerficate chain, unsupported ciphers, or mutual authencaon (aempng to
decrypt the traffic results in blocking the traffic). Palo Alto Networks provides a predefined
SSL Decrypon Exclusion list (Device > Cerficate Management > SSL Decrypon Exclusion)
that excludes hosts with applicaons and services that are known to break decrypon
technically from SSL Decrypon by default. If you encounter sites that break decrypon
technically and are not on the SSL Decrypon Exclusion list, you can add them to list manually
by server hostname. The firewall blocks sites whose applicaons and services break decrypon
technically unless you add them to the SSL Decrypon Exclusion list.
If the Decrypon profile allows Unsupported Modes (sessions with client authencaon,
unsupported versions, or unsupported cipher suites), the firewall automacally adds servers
and applicaons that use the allowed unsupported modes to the its Local SSL Decrypon
Exclusion Cache (Device > Cerficate Management > SSL Decrypon Exclusion > Show Local
Exclusion Cache). When you block unsupported modes, you increase security but you also
block communicaon with applicaons that use those modes.
• Traffic that you choose not to decrypt because of business, regulatory, personal, or other
reasons, such as financial-services, health-and-medicine, or government traffic. You can choose
to exclude traffic based on source, desnaon, URL category, and service.
You can use asterisks (*) as wildcards to create decrypon exclusions for mulple hostnames
associated with a domain. Asterisks behave the same way that carets (^) behave for URL category
excepons—each asterisk controls one variable subdomain (label) in the hostname. This enables
you to create both very specific and very general exclusions. For example:
• mail.*.com matches mail.company.com but does not match mail.company.sso.com.
• *.company.com matches tools.company.com but does not match eng.tools.company.com.
• *.*.company.com matches eng.tools.company.com but does not match eng.company.com.
• *.*.*.company.com matches corp.exec.mail.company.com, but does not match
corp.mail.company.com.
• mail.google.* matches mail.google.com, but does not match mail.google.uk.com.
• mail.google.*.* matches mail.google.co.uk, but does not match mail.google.com.
For example, to use wildcards to exclude video-stats.video.google.com from decrypon but not to
exclude video.google.com from decrypon, exclude *.*.google.com.
Regardless of the number of asterisk wildcards that precede a hostname (without a non-
wildcard label preceding the hostname), the hostname matches the entry. For example,
*.google.com, *.*.google.com, and *.*.*.google.com all match google.com. However,
*.dev.*.google.com does not match google.com because one label (dev) is not a wildcard.
To increase visibility into traffic and reduce the aack surface as much as possible, don’t make
decrypon excepons unless you must.
• Palo Alto Networks Predefined Decrypon Exclusions
PAN-OS® Administrator’s Guide Version 10.1 1049 ©2022 Palo Alto Networks, Inc.
Decrypon
The SSL Decrypon Exclusion list is not for sites that you choose not to decrypt for legal,
regulatory, business, privacy, or other volional reasons, it is only for sites that break
decrypon technically (decrypng these sites blocks their traffic). For traffic such as IP
addresses, users, URL categories, services, and even enre zones that you choose not to
decrypt, Create a Policy-Based Decrypon Exclusion.
Because the traffic of sites on the SSL Decrypon Exclusion list remains encrypted, the firewall
does not inspect or provide further security enforcement the traffic. You can disable a predefined
exclusion. For example, you may choose to disable predefined exclusions to enforce a strict
security policy that allows only applicaons and services that the firewall can inspect and
on which the firewall can enforce Security policy. However, the firewall blocks sites whose
applicaons and services break decrypon technically if they are not enabled on the SSL
Decrypon Exclusion list.
You can view and manage all Palo Alto Networks predefined SSL decrypon exclusions directly on
the firewall (Device > Cerficate Management > SSL Decrypon Exclusions).
PAN-OS® Administrator’s Guide Version 10.1 1050 ©2022 Palo Alto Networks, Inc.
Decrypon
The Hostname displays the name of the host that houses the applicaon or service that breaks
decrypon technically. You can also Add hosts to Exclude a Server from Decrypon for Technical
Reasons if it is not on the predfined list.
The Descripon displays the reason the firewall can’t decrypt the site’s traffic, for example,
pinned-cert (a pinned cerficate) or client-cert-auth (client authencaon).
The firewall automacally removes enabled predefined SSL decrypon exclusions from the list
when they become obsolete (the firewall removes an applicaon that decrypon previously
caused to break when the applicaon becomes supported with decrypon). Show Obsoletes
checks if any disabled predefined exclusions remain on the list and are no longer needed. The
firewall does not remove disabled predefined decrypon exclusions from the list automacally, but
you can select and Delete obsolete entries.
You can select a hostname’s checkbox and then click Disable to remove predefined sites from
the list. Use the SSL Decrypon Exclusion list only for sites that break decrypon for technical
reasons, don’t use it for sites that you choose not to decrypt.
PAN-OS® Administrator’s Guide Version 10.1 1051 ©2022 Palo Alto Networks, Inc.
Decrypon
The SSL Decrypon Exclusion list is not for sites that you choose not to decrypt for legal,
regulatory, business, privacy, or other volional reasons, it is only for sites that break
decrypon technically. For traffic (IP addresses, users, URL categories, services, and
even enre zones) that you choose not to decrypt, Create a Policy-Based Decrypon
Exclusion.
Reasons that sites break decrypon technically include pinned cerficates, client authencaon,
incomplete cerficate chains, and unsupported ciphers. For HTTP public key pinning (HPKP), most
browsers that use HPKP permit Forward Proxy decrypon as long as you install the enterprise CA
cerficate (or the cerficate chain) on the client.
If the technical reason for excluding a site from decrypon is an incomplete cerficate
chain, the next-generaon firewall doesn’t automacally fix the chain as a browser would.
If you need to add a site to the SSL Decrypon Exclusion list, manually review the site to
ensure it’s a legimate business site, then download the missing sub-CA cerficates and
load and deploy them onto the firewall.
Aer you add a server to the SSL Decrypon Exclusion list, the firewall compares the server
hostname that you use to define the decrypon exclusion against both the Server Name
Indicaon (SNI) in the client hello message and the Common Name (CN) in the server cerficate. If
either the SNI or CN match the entry in the SSL Decrypon Exclusion list, the firewall excludes the
traffic from decrypon.
STEP 1 | Select Device > Cerficate Management > SSL Decrypon Exclusions.
STEP 2 | Add a new decrypon exclusion, or select an exisng custom entry to modify it.
STEP 3 | Enter the hostname of the website or applicaon you want to exclude from decrypon.
You can use wildcards to exclude mulple hostnames associated with a domain. The
firewall excludes all sessions where the server presents a CN that matches the domain from
decrypon.
Make sure that the hostname field is unique for each custom entry. If a predefined exclusion
matches a custom entry, the custom entry takes precedence.
STEP 4 | (Oponal) Select Shared to share the exclusion across all virtual systems in a mulple virtual
system firewall.
STEP 5 | Exclude the applicaon from decrypon. Alternavely, if you are modifying an exisng
decrypon exclusion, you can clear this checkbox to start decrypng an entry that was
previously excluded from decrypon.
PAN-OS® Administrator’s Guide Version 10.1 1052 ©2022 Palo Alto Networks, Inc.
Decrypon
from decrypon automacally for 12 hours if that traffic breaks decrypon for technical reasons
such as a pinned cerficate or an unsupported cerficate. When the Decrypon profile allows
unsupported modes—sessions with client authencaon, unsupported versions, or unsupported
cipher suites—and the allowed traffic uses an unsupported mode, then the device automacally
adds the server to the local exclusion cache and bypasses decrypon. The firewall doesn’t decrypt,
inspect, and enforce Security policy on traffic that the Local Decrypon Exclusion cache allows
because the traffic remains encrypted. Ensure that the sites you exclude from decrypon (by
applying a Decrypon profile that allows unsupported modes) are sites with applicaons or
services you need for business.
Blocking unsupported modes blocks communicaon with applicaons that use those modes
to increase security. Client authencaon is a common reason for excluding applicaons from
decrypon, which is why the best pracce is to block unsupported versions and unsupported
ciphers and to allow client authencaon in the Decrypon profile. If the Decrypon profile
allows client authencaon, then when a client starts a session with a server that requires the
client to authencate, instead of blocking the traffic because the firewall can’t decrypt it, the
firewall adds the applicaon and server to the local exclusion cache and allows the traffic.
If you allow traffic from sites that use client authencaon and are not in the predefined
sites on the SSL Decrypon Exclusion list, create a Decrypon profile that allows
sessions with client authencaon. Add the profile to a Decrypon policy rule that applies
only to the server(s) that host the applicaon. To increase security even more, you can
require Mul-Factor Authencaon to complete the user login process. Alternavely, you
can add the site to the SSL Decrypon Exclusion list to skip decrypon without using an
explicit Decrypon policy.
The firewall adds Local SSL Decrypon Exclusion cache entries based on the Decrypon policy
and profile that controls the applicaon traffic. If you don’t block Unsupported Mode Checks
in the Decrypon profile, the firewall adds entries to the Local SSL Decrypon Exclusion cache
when:
• The client supports only TLSv1.2 and the server supports only TLSv1.3. In the local cache, the
Reason shown for this exclusion is SSL_UNSUPPORTED.
• The client supports TLSv1.3 and TLSv1.2, and the server supports only TLSv1.2. In this case,
the Reason column shows TLS13_UNSUPPORTED.
When the Reason for adding a server to the Local SSL Decrypon Exclusion cache
is TLS13_UNSUPPORTED, the firewall downgrades the protocol to TLSv1.2 and the
firewall decrypts and inspects the traffic.
• The client adverses a specific cipher that the server doesn’t support.
• The client adverses a specific curve that the server doesn’t support.
The local cache contains a maximum of 1,024 entries. You can’t add local exclusions to the Local
SSL Decrypon Exclusion cache manually (but you can add decrypon exclusions to the SSL
Decrypon Exclusion list manually).
You must have superuser or Cerficate Management administrave access to view the Local
SSL Decrypon Exclusion cache. To view it, navigate to Device > Cerficate Management > SSL
Decrypon Exclusion and then click Show Local Exclusion Cache near the boom of the screen.
The local exclusion cache displays the applicaon, the server, the reason for inclusion in the cache,
PAN-OS® Administrator’s Guide Version 10.1 1053 ©2022 Palo Alto Networks, Inc.
Decrypon
the Decrypon profile that controls the traffic, and more for each entry. You can select and delete
entries from the local cache manually.
If anyone aempts to access the same server before the local cache entry ages out (12 hours), the
firewall matches the session to the cache entry, bypasses decrypon, and allows the traffic. The
firewall flushes the local exclusion cache if you change the Decrypon policy or profile because
those changes may affect the classificaon of the session. If the cache becomes full, the firewall
purges the oldest entries as new entries arrive.
PAN-OS® Administrator’s Guide Version 10.1 1054 ©2022 Palo Alto Networks, Inc.
Decrypon
• Traffic that originates or is desned for execuves or other users whose traffic shouldn’t be
decrypted.
• Some devices such as finance servers may need to be excepted from decrypon.
• Depending on the business, some companies may value privacy and the user experience more
than security for some applicaons.
• Laws or local regulaons that prohibit decrypon of some traffic.
An example of not decrypng traffic for regulatory and legal compliance is the European
Union (EU) General Data Protecon Regulaon (GDPR). The EU GDPR will require strong
protecon of all personal data for all individuals. The GDPR affects all companies, including
foreign companies, that collect or process the personal data of EU residents.
Different regulaons and compliance rules may mean that you treat the same data differently
in different countries or regions. Businesses usually can decrypt personal informaon in their
corporate data centers because the business owns the informaon. The best pracce is to
decrypt as much traffic as possible so that you can see it and apply security protecon to it.
You can use predefined URL Categories to except enre categories of websites from decrypon,
you can create custom URL Categories to define a customized list of URLs that you don’t want to
decrypt, or you can create an External Dynamic List (EDL) to define a customized list of URLs that
you don’t want to decrypt.
In environments such as Office 365 that have dynamically changing IP addresses or in
environments where you make frequent changes to the list of URLs that you want to exclude from
decrypon, it’s oen preferable to use an EDL instead of a URL Category to specify the excluded
URLs. Using an EDL is less disrupve in dynamic environments because eding an EDL changes
the URL categories dynamically, without a Commit, while eding a custom URL Category requires
a Commit to take effect.
Create an EDL or a custom URL Category that contains all the categories you choose not
to decrypt so that one Decrypon policy rule governs the encrypted traffic you choose to
allow. Apply a No Decrypon profile to the rule. The ability to add categories to an EDL or
a custom URL Category makes it easy to exclude traffic from decrypon and helps keep
the rulebase clean.
Similar to Security policy rules, the firewall compares incoming traffic to Decrypon policy
rules in the policy rulebase’s sequence. Place Decrypon exclusion rules at the top of
the rulebase to prevent inadvertently decrypng sensive traffic or traffic that laws and
regulaons prevent you from decrypng.
If you create policy-based decrypon exclusions, the best pracce is to place the following
exclusion rules at the top of the decrypon rulebase, in the following order:
1. IP-address based excepons for sensive desnaon servers.
2. Source-user based excepons for execuves and other users or groups.
3. Custom URL or EDL based excepons for desnaon URLs.
4. Sensive predefined URL Category based excepons for desnaon URLs of enre categories
such as financial-services, health-and-medicine, and government.
Place rules that decrypt traffic aer these rules in the decrypon rulebase.
PAN-OS® Administrator’s Guide Version 10.1 1055 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1056 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 2 | Place the decrypon exclusion rule at the top of your decrypon policy rulebase.
The firewall enforces decrypon rules against incoming traffic in the rulebase sequence and
enforces the first rule that match the traffic.
Select the No-Decrypt-Finance-Health policy (Decrypon > Policies), and click Move Up unl
it appears at the top of the list, or drag and drop the rule.
PAN-OS® Administrator’s Guide Version 10.1 1057 ©2022 Palo Alto Networks, Inc.
Decrypon
If you use an enterprise Public Key Infrastructure (PKI) to generate cerficates and private
keys, block the export of private keys because you can install them on new firewalls and
Panoramas from your enterprise cerficate authority (CA), so there is no reason to export
them from PAN-OS.
If you generate self-signed cerficates on the firewall or Panorama and apply the block
private key export opon, you can’t export the cerficate and key to other PAN-OS
appliances.
You can export and import the device state (Device > Setup > Operaons) even if you block
the export of private keys. We include the private keys in device state imports and exports, but
administrators can’t read or decode them.
You can import or load the configuraon of one firewall on another firewall if the master
key is the same on both firewalls. If the master key is different on the firewalls, then
imporng or loading the configuraon doesn’t work and the commit fails while reading the
cerficates.
PAN-OS® Administrator’s Guide Version 10.1 1058 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | Select Block Private Key Export to prevent anyone from exporng the cerficate.
See Generate a Cerficate for informaon about the other cerficate fields.
You can also generate a cerficate and block its private key from export using the
operaonal CLI command:
The preceding CLI command can also include the cerficate and other parameters that
are not shown.
PAN-OS® Administrator’s Guide Version 10.1 1059 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | Select Import Private Key to acvate the opon to block private key export.
STEP 4 | Select Block Private Key Export to prevent anyone from exporng the cerficate.
See Import a Cerficate and Private Key for informaon about the other cerficate import
fields.
If you use the SCP operaonal CLI command to import a cerficate or to import a
private key for a cerficate, you can sll block export of the private key:
• admin@pa-220> scp import private-key block-private-
key ...
Each of the preceding CLI commands can also include keywords to specify the source,
the cerficate name, and other parameters that are not shown.
If you use the SCP operaonal CLI command to export a cerficate and include its
private key (scp export certificate passphrase <phrase> remote-
port <1-65536> to <destination> certificate-name <name>
include-key <yes | no> format <der | pem | pkcs10 | pkcs12>),
and if the cerficate’s private key is blocked, the command fails and returns an error
message because you cannot export a blocked private key.
PAN-OS® Administrator’s Guide Version 10.1 1060 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 4 | For Local Cerficate select Import or Generate depending on whether you want to import an
exisng cerficate or create a cerficate.
STEP 5 | Enter the cerficate informaon. If you are imporng the cerficate, select Import Private
Key to acvate the Block Private Key Export checkbox.
PAN-OS® Administrator’s Guide Version 10.1 1061 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 6 | Select Block Private Key Export to prevent anyone from exporng the key.
For imporng a cerficate, enter and confirm the Passphrase and then click OK
PAN-OS® Administrator’s Guide Version 10.1 1062 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 7 | Enter the Passphrase, confirm it, and then click OK.
Check the Key column in Device > Cerficate Management > Cerficates > Device
Cerficates.
In this example, the forward-trust-cerficate is blocked:
When you aempt to export a cerficate whose private key is blocked from export, the Export
Private Key checkbox is not available and you can’t export the key, you can only export the
cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1063 ©2022 Palo Alto Networks, Inc.
Decrypon
Use the following operaonal CLI command to list all cerficates on the device or in a
parcular Vsys that have private keys blocked from export:
Use the following operaonal CLI command to check whether a parcular cerficate’s private
key is blocked from export:
If the cerficate is blocked from export, the command returns yes and if the cerficate is not
blocked the command returns no.
PAN-OS® Administrator’s Guide Version 10.1 1064 ©2022 Palo Alto Networks, Inc.
Decrypon
Custom response pages larger than the maximum supported size are not decrypted or
displayed to users. In PAN-OS 8.1.2 and earlier PAN-OS 8.1 releases, custom response
pages on a decrypted site cannot exceed 8,191 bytes; the maximum size is increased to
17,999 bytes in PAN-OS 8.1.3 and later releases.
PAN-OS® Administrator’s Guide Version 10.1 1065 ©2022 Palo Alto Networks, Inc.
Decrypon
7. Save the edited page with a new filename. Make sure that the page retains its UTF-8
encoding.
8. Back on the firewall, select Device > Response Pages.
9. Select the SSL Decrypon Opt-out Page link.
10. Click Import and then enter the path and filename in the Import File field or Browse to
locate the file.
11. (Oponal) Select the virtual system on which this login page will be used from the
Desnaon drop-down or select shared to make it available to all virtual systems.
12. Click OK to import the file.
13. Select the response page you just imported and click Close.
STEP 3 | Verify that the Opt Out page displays when you aempt to browse to a site.
From a browser, go to an encrypted site that matches your decrypon policy.
Verify that the SSL Decrypon Opt-out response page displays.
PAN-OS® Administrator’s Guide Version 10.1 1066 ©2022 Palo Alto Networks, Inc.
Decrypon
The command to disable SSL decrypon doesn’t persist in the configuraon aer a reboot.
If you turn off decrypon temporarily and then reboot the firewall, regardless of whether
the issue has been fixed, decrypon is turned on again.
PAN-OS® Administrator’s Guide Version 10.1 1067 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1068 ©2022 Palo Alto Networks, Inc.
Decrypon
4. Reboot the firewall (Device > Setup > Operaons). This feature is not available for
configuraon unl PAN-OS reloads.
STEP 3 | Enable the firewall to forward decrypted traffic. Superuser permission is required to perform
this step.
On a firewall with a single virtual system:
1. Select Device > Setup > Content - ID.
2. Select the Allow forwarding of decrypted content check box.
3. Click OK to save.
On a firewall with mulple virtual systems:
1. Select Device > Virtual System.
2. Select a Virtual System to edit or create a new Virtual System by selecng Add.
3. Select the Allow forwarding of decrypted content check box.
4. Click OK to save.
PAN-OS® Administrator’s Guide Version 10.1 1069 ©2022 Palo Alto Networks, Inc.
Decrypon
forwarding the decrypted traffic to other threat detecon devices, such as a DLP device
or another intrusion prevenon system (IPS).
4. Click OK to save the decrypon profile.
STEP 6 | Aach the decrypon profile rule (with decrypon port mirroring enabled) to a decrypon
policy rule. All traffic decrypted based on the policy rule is mirrored.
1. Select Policies > Decrypon.
2. Click Add to configure a decrypon policy or select an exisng decrypon policy to edit.
3. In the Opons tab, select Decrypt and the Decrypon Profile created in step 4.
4. Click OK to save the policy.
PAN-OS® Administrator’s Guide Version 10.1 1070 ©2022 Palo Alto Networks, Inc.
Decrypon
Verify Decrypon
Aer you configure a best pracce decrypon profile and apply it to traffic, you can check both
the Decrypon logs (introduced in PAN-OS 10.0) and the Traffic logs to verify that the firewall is
decrypng the traffic that you intend to decrypt and that the firewall is not decrypng the traffic
that you don’t want to decrypt. This topic shows you how to check decrypon using Traffic logs. In
addion, follow post-deployment decrypon best pracces to maintain the deployment.
View Decrypted Traffic Sessions—Filter the Traffic Logs (Monitor > Logs > Traffic) using the
filter ( flags has proxy ).
This filter displays only logs in which the SSL proxy flag is on, meaning only decrypted traffic—
every log entry has the value yes in the Decrypted column.
You can filter the traffic in a more granular fashion by adding more terms to the filter.
For example, you can filter for decrypted traffic going only to the desnaon IP address
99.84.224.105 by adding the filter ( addr.dst in 99.84.224.105 ):
PAN-OS® Administrator’s Guide Version 10.1 1071 ©2022 Palo Alto Networks, Inc.
Decrypon
View SSL Traffic Sessions That Are Not Decrypted—Filter the Traffic Logs (Monitor > Logs >
Traffic) using the filter ( not flags has proxy ) and ( app eq ssl ).
This filter displays only logs in which the SSL proxy flag is off (meaning only encrypted traffic)
and the traffic is SSL traffic; every log entry has the value no in the Decrypted column and the
value ssl in the Applicaon column.
Similar to the example for viewing decrypted traffic logs, you can add terms to filter the traffic
that you don’t decrypt in a more granular fashion.
View The Log for a Parcular Session—To view the Traffic log for a parcular session, filter on
the Session ID.
For example, to see the log for a session with the ID 137020, filter using the term
( sessionid eq 137020). You can find the ID number in the Session ID column in the
log output, as shown in the previous screens. If the Session ID column isn’t displayed, add the
column to the output.
PAN-OS® Administrator’s Guide Version 10.1 1072 ©2022 Palo Alto Networks, Inc.
Decrypon
View All TLS and SSH Traffic—Filter the Traffic Logs (Monitor > Logs > Traffic) to view both
decrypted and undecrypted TLS and SSH traffic, use the filter ( s_encrypted neq 0 ):
PAN-OS® Administrator’s Guide Version 10.1 1073 ©2022 Palo Alto Networks, Inc.
Decrypon
Drill Down Into the Details—To view more informaon about a parcular log entry, click the
magnifying glass to see a detailed log view. For example, for Session ID 137020 (shown in the
previous bullet), the detailed log looks like this:
The box for the Decrypted flag provides a second way to verify if traffic was decrypted.
You can also take upstream and downstream packet captures of decrypted traffic to view
how the firewall processes SSL traffic and takes acons on packets, or perform deep packet
inspecon.
PAN-OS® Administrator’s Guide Version 10.1 1074 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1075 ©2022 Palo Alto Networks, Inc.
Decrypon
The general troubleshoong methodology is to start with the ACC widgets to idenfy traffic that
causes decrypon issues. Next, use the Decrypon Log and custom report templates to drill down
into details and gain context about that traffic. This enables you to diagnose issues accurately and
much more easily than in the past. Understanding decrypon issues and their causes enables you
to select the appropriate way to fix each issue, such as:
• Modify Decrypon policy rules (a policy rule defines the traffic that the rule affects, the acon
taken on that traffic, log sengs, and the Decrypon profile applied to the traffic)
• Modify Decrypon profiles (acceptable protocols and algorithms for the traffic that a
Decrypon policy rule controls, plus failure checks, unsupported mode checks for items such as
unsupported ciphers and versions, cerficate checks, etc.)
• Add sites that break decrypon for technical reasons to the SSL Decrypon Exclusion List
• Evaluate security decisions about which sites your employees, customers, and partners really
need to access and which sites you can block when sites use weak decrypon protocols or
algorithms
The goals is to decrypt all the traffic you can decrypt (a decrypon best pracce) so that you can
inspect it and to properly handle traffic that you don’t decrypt.
In PAN-OS 10.0 or later, the device takes 1% of the log space and allocates it to Decrypon logs.
Step 3 in Configure Decrypon Logging shows you how to modify the log space allocaon to
provide more space for Decrypon logs.
If you downgrade from PAN-OS 10.0 or later to PAN-OS 9.1 or earlier, the features introduced
in PAN-OS 10.0 (Decrypon Log, SSL Acvity widgets in the ACC, custom report Decrypon
templates) are removed from the UI. References to Decrypon logs are also removed from Log
Forwarding profiles. In addion, the Local Decrypon Exclusion Cache is only viewable using the
CLI in PAN-OS 9.1 and earlier (PAN-OS 10.0 added the local cache to the UI).
If you push configuraons from Panorama on PAN-OS 10.0 or later to devices that run PAN-OS
9.1 or earlier, Panorama removes the features introduced in PAN-OS 10.0.
• Decrypon Applicaon Command Center Widgets
• Decrypon Log
• Custom Report Templates for Decrypon
• Decrypon Troubleshoong Workflow Examples
PAN-OS® Administrator’s Guide Version 10.1 1076 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1077 ©2022 Palo Alto Networks, Inc.
Decrypon
1. The Successful TLS Version Acvity widget shows that seventeen sessions used TLSv1.3
and seven sessions used TLSv1.2. The SNI list shows the desnaon SNIs and the number of
sessions per SNI.
2. To see which SNIs used TLSv1.2, click the green bar labeled TLS1.2.
PAN-OS® Administrator’s Guide Version 10.1 1078 ©2022 Palo Alto Networks, Inc.
Decrypon
3. Now you can see the seven TLSv1.2 sessions were spread among four servers.
4. Clicking Home returns to the home screen. Now, clicking the www.espn.com SNI shows us
which TLS versions it used. We can see that two of the four sessions used TLSv1.3 and two
used TLSv1.2.
For any Decrypon widget, click the Jump to Logs icon to jump directly to the Decrypon logs
that correspond to the data in the ACC:
PAN-OS® Administrator’s Guide Version 10.1 1079 ©2022 Palo Alto Networks, Inc.
Decrypon
In the preceding example, at any point in the invesgaon you could jump to the Decrypon
logs for the data to drill down more. For example, you could examine the logs for the individual
sessions that used TLSv1.2 to find out why they didn’t use TLSv1.3.
Decrypon ACC widgets show the name of the decrypted applicaon based on the Palo Alto
Networks App-ID. For populang the ACC, the firewall can only idenfy applicaons that have
a Palo Alto Networks App-ID; the firewall cannot populate the ACC with custom applicaons
or applicaons that do not have an App-ID. Content updates update App-IDs regularly. Other
reasons that the applicaon may be shown as incomplete or unknown are:
• The firewall dropped the session before it could idenfy the applicaon.
• Decrypon logs depend on Traffic logs to populate the Decrypon log applicaon field.
However, if the Traffic log is not completed in 60 seconds or less, the Traffic log does not
populate the applicaon in the Decrypon log and the applicaon displays as incomplete or
unknown.
Decrypon Log
The Decrypon Log (Monitor > Logs > Decrypon) provides comprehensive informaon about
sessions that match a Decrypon policy to help you gain context about that traffic so you can
accurately and easily diagnose and resolve decrypon issues. The firewall does not log traffic if the
traffic does not match a Decrypon policy. If you want to log traffic that you don’t decrypt, create
a policy-based decrypon exclusion and for policies that govern TLSv1.2 and earlier traffic, apply a
No Decrypon profile to the traffic.
PAN-OS supports Decrypon logs for the following types of traffic:
• Forward Proxy—Several fields only display informaon for Forward Proxy traffic, including Root
CA (for trusted cerficates only) and Server Name Idenficaon (SNI).
• Inbound Inspecon.
• No Decrypt (traffic excluded from decrypon by Decrypon policy).
Because the session remains encrypted, the firewall displays less informaon. For
undecrypted TLSv1.3 traffic, there is no cerficate informaon because TLSv1.3
encrypts cerficate informaon.
• GlobalProtect—Covers GlobalProtect Gateway, GlobalProtect Portal, and GlobalProtect
Clientless VPN (client-to-firewall only).
• Decrypon Mirror
Not all types of traffic support every parameter. Unsupported Parameters by Proxy Type
and TLS Version provides a complete list of unsupported parameters for each type of
decrypon traffic.
The data for Forward Proxy traffic is based on whether the TLS handshake is successful or
unsuccessful. For unsuccessful TLS handshakes, the firewall sends error data for the leg of the
transacon that caused the error, either client-to-firewall or firewall-to-server. For successful TLS
PAN-OS® Administrator’s Guide Version 10.1 1080 ©2022 Palo Alto Networks, Inc.
Decrypon
handshakes, the data is from the leg that successfully completes first, which is usually client-to-
firewall.
The firewall does not generate Decrypon log entries for web traffic blocked during SSL/
TLS handshake inspecon. These sessions do not appear in Decrypon logs because the
firewall prevents decrypon when it resets the SSL/TLS connecon, ending the handshake.
You can view details of the blocked sessions in the URL Filtering logs.
Decrypon logs are not supported for SSH Proxy traffic. In addion, cerficate informaon
is not available for session resumpon logs.
By default, the firewall logs all unsuccessful TLS handshake traffic. You can also log successful
TLS handshake traffic if you choose to do so. You can view up to 62 columns of log informaon
such as applicaon, SNI, Decrypon Policy Name, error index, TLS version, key exchange version,
encrypon algorithm, cerficate key types, and many other characteriscs:
Click the magnifying glass icon ( ) to see the Detailed Log View of a session.
PAN-OS® Administrator’s Guide Version 10.1 1081 ©2022 Palo Alto Networks, Inc.
Decrypon
The Decrypon log learns each session’s App-ID from the Traffic log, so Traffic logs must
be enabled to see the App-ID in the Decrypon log. If Traffic logs are disabled, the App-ID
shows as incomplete. For example, a lot of GlobalProtect traffic is intrazone traffic (Untrust
zone to Untrust zone), but the default intra-zone policy does not enable Traffic logs. To
see the App-ID for GlobalProtect intrazone traffic, you need to enable the Traffic log for
intrazone traffic.
Another reason that the App-ID may display as incomplete is that for long sessions, the
firewall may generate the Decrypon log before the Traffic log is complete (the Traffic log
is usually generated at session end). In those cases, the App-ID is not available for the
Decrypon log. In addion, when the TLS handshake fails and generates an error log, the
App-ID is not available because the failure terminates the session before the firewall can
determine the App-ID. In these cases, the applicaon may display as ssl or as incomplete.
To troubleshoot issues, use the Decrypon ACC widgets (ACC > SSL Acvity) to idenfy traffic
that causes decrypon issues and then use the Decrypon log and Custom Report Templates for
Decrypon to drill down into details.
When you forward Decrypon logs for storage, ensure that you properly secure log transport and
storage because Decrypon logs contain sensive informaon.
When the Decrypon logs are enabled, the firewall sends HTTP/2 logs as Tunnel
Inspecon logs (when Decrypon logs are disabled, HTTP/2 logs are sent as Traffic logs), so
you need to check the Tunnel Inspecon logs instead of the Traffic logs for HTTP/2 events.
In addion, you must enable Tunnel Content Inspecon to obtain the App-ID for HTTP/2
traffic.
PAN-OS® Administrator’s Guide Version 10.1 1082 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 1 | Configure the Decrypon traffic you want to log in Decrypon policy (Policies > Decrypon).
By default, the firewall logs only unsuccessful TLS handshakes:
STEP 2 | Create a Log Forwarding profle to forward Decrypon logs to Log Collectors, other storage
devices, or specific administrators and then specify the profile in the Log Forwarding field of
the Decrypon policy Opons tab.
To forward Decrypon logs, you must configure a Log Forwarding profile (Objects > Log
Forwarding) to specify the Decrypon Log Type and the method of forwarding the logs.
If you forward Decrypon logs, be sure that the logs are stored securely because they contain
sensive informaon.
PAN-OS® Administrator’s Guide Version 10.1 1083 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | If you log successful TLS handshakes in addion to unsuccessful TLS handshakes, configure
a larger log storage space quota (Device > Setup > Management > Logging and Reporng
Sengs > Log Storage) for Decrypon logs on the firewall.
The default quota (allocaon) is one percent of the device’s log storage capacity for Decrypon
logs and one percent for the general decrypon summary. There is no default allocaon for
hourly, daily, or weekly decrypon summaries.
Many factors determine the amount of storage you may need for Decrypon logs and they
depend on your deployment. For example, take these factors into account:
• The amount of TLS traffic that passes through the firewall.
• The amount of TLS traffic that you decrypt.
• Your usage of other logs (evaluate from which logs you should take capacity to allocate to
Decrypon logs).
• If you log both successful and unsuccessful TLS handshakes, you probably need significantly
more capacity than you need if you only log unsuccessful TLS handshakes. Depending on
the amount of traffic you decrypt, Decrypon logs could consume as much capacity as
PAN-OS® Administrator’s Guide Version 10.1 1084 ©2022 Palo Alto Networks, Inc.
Decrypon
Traffic logs or Threat logs and may require a tradeoff among them if the device’s capacity is
already fully subscribed.
The total combined allocaon of log quotas cannot exceed 100% of the available
firewall log resources.
You may need to experiment to find the right quota for each log category in your parcular
deployment. If you only log unsuccessful handshakes, you could start with the default or
increase the allocaon to two or three percent. If you log both successful and unsuccessful
handshakes, you could start by allocang about half of the space to Decrypon logs that you
allocate to Traffic logs. The logs from which you take the space to allocate to Decrypon logs
depends on your traffic, your business, and your monitoring requirements.
Error Index Error (possible errors shown for the Error Index)
PAN-OS® Administrator’s Guide Version 10.1 1085 ©2022 Palo Alto Networks, Inc.
Decrypon
Error Index Error (possible errors shown for the Error Index)
HSM Hardware storage module (HSM) errors such as unknown requests, items
not found in the configuraon, request meouts, and other HSM errors and
failures.
Protocol Errors such as TLS handshake failures, private and public key mismatches,
Heartbleed errors, TLS key exchange failures, and other TLS protocol errors.
Protocol errors show when the server doesn’t support the protocols that
the client supports, the server uses cerficate types that the firewall doesn’t
support, and general TLS protocol errors.
Resume Session resumpon errors concerning resume session IDs and ckets, resume
session entries in the firewall cache, and other session resumpon errors.
Version Errors regarding client and Decrypon profile version mismatches and client
and server version mismatches.
The error message includes bitmask values that idenfy the supported client
and Decrypon profile versions. Use the bitmask values to idenfy the cipher
the client tried to use and to list the cipher values that the Decrypon profile
supports as described later in this topic.
If no suitable error descripon category exists for an error, the default message is General
TLS protocol error.
Version and cipher log error informaon includes bitmask values that you convert to actual values
using operaonal CLI commands:
• Version error bitmask values idenfy mismatches between the TLS protocol versions that the
client and server use and also idenfy TLS protocol mismatches between the client and the
Decrypon profile applied to the traffic. The CLI command to convert version error bitmasks is:
The command returns the TLS version that matches the bitmask.
• Cipher error bitmask values idenfy encrypon and other mismatches between the client and
the Decrypon profile applied to the traffic.
PAN-OS® Administrator’s Guide Version 10.1 1086 ©2022 Palo Alto Networks, Inc.
Decrypon
that caused the error, and use the informaon to update the Decrypon policy or profile if you
want to allow access to the site in queson.
• Version Errors
• Cipher Errors
• Root Status “Uninspected”
Version Errors
To idenfy and fix version mismatch errors:
1. Filter the Decrypon Log to idenfy version errors using the filter (err_index eq
Version). The highlighted values are bitmask values:
You can filter the Decrypon log in many ways. For example, to see only TLSv1.3 version
errors, use the filter (err_index eq Version) and (tls_version eq TLS1.3):
2. Log in to the CLI and look up the bitmask values. The version errors in the first screen shot (the
same errors for all three sessions) show an issue with a client and Decrypon profile mismatch
PAN-OS® Administrator’s Guide Version 10.1 1087 ©2022 Palo Alto Networks, Inc.
Decrypon
—the supported client version bitmask is 0x08 and the supported Decrypon profile version
bitmask is 0x70:
TLSv1.0
TLSv1.1
TSLv1.2
TLSv1.3
This output shows that the Decrypon profile supports TLSv1.1, TLSv1.2, and TLSv1.3, but not
TLSv1.0. Now you know the issue is that the client only supports a very old version of the TLS
protocol and the Decrypon profile aached to the Decrypon policy rule that controls the
traffic does not allow TLSv1.0 traffic.
The next thing to do is to decide what acon to take. You could update the client so that it
accepts a more secure TLS version. If the client requires TLSv1.0 for some reason, you can
connue let the firewall connue to block the traffic, or you can update the Decrypon profile
to allow all TLSv1.0 traffic (not recommended), or you can create a Decrypon policy and
profile that allow TLSv1.0 and apply it only to the client devices that must use TLSv1.0 and
cannot support a more secure protocol (most secure opon for allowing the traffic).
The version error in the second screen shot shows a different issue: a client and server version
mismatch. The error indicates the supported client bitmask as 0x20:
TLSv1.2
The output shows that the client supports only TLSv1.2. Since the server does not support
TLSv1.2, it may only support TLSv1.3 or it may support only TLSv1.1 or lower (less secure
protocols). You can use Wireshark or another packet analysis tool to find out which version of
TLS the server supports. Depending on what the server supports, you can:
• If the server only supports TLSv1.3, you could edit the Decrypon profile so that it supports
TLSv1.3.
• If the server only supports TLSv1.1 or lower, evaluate whether you need to access that
server for business reasons. If not, consider blocking the traffic to increase security. If you
need to access the server for business purposes, create or add the server to a Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1088 ©2022 Palo Alto Networks, Inc.
Decrypon
policy that applies only to the servers and sites you need to access for business; don’t allow
access to all servers that use less secure TLS versions.
3. To find the Decrypon policy that controls the session traffic, check the Policy Name column in
the log (or click the magnifying glass icon next to the Decrypon log to see the informaon
in the General secon of the Detailed Log View). In the example above, the Decrypon policy
name is Big Brother. To find the Decrypon policy and profile, go to Policies > Decrypon,
select the policy named Big Brother, and then select the Opons tab. Decrypon profile
displays the name of the Decrypon profile.
Go to Objects > Decrypon > Decrypon Profile, select the appropriate Decrypon profile,
and edit it to address the version issue.
Cipher Errors
Using the Decrypon log to hunt down cipher errors is similar to hunng down version errors
—you filter the log to find errors and obtain error bitmasks. Then you go to the CLI, convert the
bitmask to the error value, and then take appropriate acon to fix the issue. For example:
1. Filter the Decrypon Log to idenfy cipher errors using the filter (err_index eq Cipher).
For example, let’s examine a cipher error with the Error message Unsupported cipher.
Supported client cipher bitmask: 0x80000000. Support decrypt profile
cipher bitmask 0x60f79980.
2. Log in to the CLI and look up the bitmask values:
CHACHA_PLY1305_SHA256
This output shows that client tried to negoate a cipher that the firewall supports (if the
bitmask is all zeros (0x0000000, then the client tried to negoate a cipher that the firewall
doesn’t support):
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS13_WITH_AES_256_GCM_SHA384
PAN-OS® Administrator’s Guide Version 10.1 1089 ©2022 Palo Alto Networks, Inc.
Decrypon
TLS13_WITH_AES_128_GCM_SHA256
This output shows that the Decrypon profile that controls the traffic supports many ciphers,
but does not support the cipher the client is trying to use.
To fix this issue so that the firewall allows and decrypts the traffic, you need to add support for
the missing cipher to the Decrypon profile.
3. Check the Decrypon log or the Detailed Log View Policy Name to get the name of the
Decrypon policy that controls the traffic. Go to Policies > Decrypon and select the policy.
On the Opons tab, look up the name of the Decrypon profile. Next, Go to Objects >
Decrypon > Decrypon Profile, select the appropriate Decrypon profile, and edit it to
address the version issue.
In this example, the Decrypon profile does not support the
TLS13_WITH_CHACHA_POLY1305_SHA256 cipher, so the client can’t connect:
To fix the issue, select the CHACHA20-POLY1305 encrypon algorithm opon (the Max
Version seng of Max means that the profile already supports TLSv1.3 and the Authencaon
Algorithm seng already includes SHA256, so only the encrypon algorithm support
was missing) and then Commit the configuraon. Aer you commit the configuraon, the
Decrypon profile supports the missing cipher and the decrypon sessions for the traffic
succeed.
If the firewall does not support a cipher suite and you need to allow the traffic for
business purposes, create a Decrypon policy and profile that applies only to that
traffic. In the Decrypon profile, disable the Block sessions with unsupported cipher
suites opon
.
PAN-OS® Administrator’s Guide Version 10.1 1090 ©2022 Palo Alto Networks, Inc.
Decrypon
• Session resumpon.
• Traffic was not decrypted because a No Decrypon policy controlled the traffic, so the firewall
did not decrypt the traffic.
• A decrypon failure occurred before the firewall could inspect the server cerficate.
Filter the Decrypon Log (root_status eq uninspected) and (tls_version eq
TLS1.3) to see Decrypon sessions for which the Root Status is uninspected:
The firewall only has root cerficates in its Default Trusted Cerficate Authories store.
If a website you need to communicate with for business purposes has one or more missing
intermediate cerficates and the Decrypon profile blocks sessions with untrusted issuers, then
you can find and download the missing intermediate cerficate and install it on the firewall as
a Trusted Root CA so that the firewall trusts the site’s server. (The alternave is to contact the
website owner and ask them to configure their server so that it sends the intermediate cerficate
during the handshake.)
If you allow sessions with untrusted issuers in the Decrypon profile, the firewall
establishes sessions even if the issuer is untrusted; however, it is a best pracce to block
sessions with untrusted issuers for beer security.
PAN-OS® Administrator’s Guide Version 10.1 1091 ©2022 Palo Alto Networks, Inc.
Decrypon
called the URI). The CA Issuer URL is the Authority Informaon Access (AIA) informaon
for the CA Issuer.
2. Click an Error column entry that begins “Received fatal alert UnknownCA from client. CA
Issuer URL:” followed by the URI.
The firewall automacally adds the selected error to the query and shows the full URI
path (the full URI path may be truncated in the Error column).
STEP 2 | Copy and paste the URI into your browser and then press Enter to download the missing
intermediate cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1092 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 5 | Select the Details tab and then click Copy to File....
Follow the export direcons. The cerficate is copied to the folder you designated as you
default download folder.
PAN-OS® Administrator’s Guide Version 10.1 1093 ©2022 Palo Alto Networks, Inc.
Decrypon
3. Name the cerficate and specify any other opons you want to use, then click OK.
STEP 7 | When the cerficate has imported, select the cerficate from the Device Cerficates list to
open the Cerficate Informaon dialog.
STEP 8 | Select Trusted Root CA to mark the cerficate as a Trusted Root CA on the firewall and then
click OK.
In Device > Cerficate Management > Cerficates > Device Cerficates, the imported
cerficate now appears in the list of cerficates. Check the Usage column to confirm that the
status is Trusted Root CA Cerficate to verify that the firewall considers the cerficate to be a
trusted root CA.
PAN-OS® Administrator’s Guide Version 10.1 1094 ©2022 Palo Alto Networks, Inc.
Decrypon
The Available Columns list changes to match the columns available in the Decrypon log.
Select and add the columns (informaon) that you want to include in the custom report. If you
don’t want to refine the custom report any further, click OK to generate the report.
PAN-OS® Administrator’s Guide Version 10.1 1095 ©2022 Palo Alto Networks, Inc.
Decrypon
4. If desired, refine the output of the custom Decrypon report using the Query Builder and the
four templates introduced in PAN-OS 10.0. To select a template to filter the report output, click
Load Template and select from the four Decrypon templates:
The Query column shows the filter query that each template represents. Load the desired query
and then click OK to generate the custom report.
PAN-OS® Administrator’s Guide Version 10.1 1096 ©2022 Palo Alto Networks, Inc.
Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1097 ©2022 Palo Alto Networks, Inc.
Decrypon
In this example, we invesgate cerficate errors. You can use the same process to invesgate
version and protocol errors.
STEP 2 | Click the green bar next to Cerficate to see which hosts (SNIs) experienced cerficate
errors and see a list of hosts that experienced the largest number of cerficate errors.
PAN-OS® Administrator’s Guide Version 10.1 1098 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 3 | Go to Monitor > Logs > Decrypon to drill down into the logs.
Use the query (err_index eq Certificate) to filter the Decrypon logs to view all
Decrypon sessions that experienced cerficate errors.
The Error column shows the reason for the cerficate error. To filter for all Decrypon sessions
that had the same error, click the error message to add it to the query and then execute the
query. For example, to find all errors based on receiving a fatal alert from the client, clicking the
error produces the query (err_index eq Certificate) and (error eq ‘Received
fatal alert CertificateUnknown from client’):
To filter for the cerficate errors that a specific host received, add that SNI to the query
instead of adding error message text. For example, to find all cerficate errors for
expired.badssl.comm use the query (err_index eq Certificate) and (sni eq
‘expired.badssl.com’):
The Error column shows the specific reason for each cerficate error associated with
expired.badssl.com.
Once you know the reason for the cerficate issue that caused the decrypon failure, you can
address it. For example, if the cerficate chain is incomplete, you can repair the incomplete
PAN-OS® Administrator’s Guide Version 10.1 1099 ©2022 Palo Alto Networks, Inc.
Decrypon
cerficate chain. If a cerficate is expired, you can nofy the site administrator or create a
policy-based excepon if you need to access the site.
To find all Decrypon sessions that experienced the same error, click the error message to add
it to the query and remove the original query, for example:
The hexadecimal codes idenfy the exact version that the client supports and the exact version
that the Decrypon profile supports.
PAN-OS® Administrator’s Guide Version 10.1 1100 ©2022 Palo Alto Networks, Inc.
Decrypon
TLSv1.0
TLSv1.1
TSLv1.2
TLSv1.3
This output shows that the Decrypon profile supports TLSv1.1, TLSv1.2, and TLSv1.3, but not
TLSv1.0. Now you know that the client only supports an old version of the TLS protocol and
the Decrypon profile aached to the Decrypon policy rule that controls the traffic does not
allow that version.
STEP 4 | If you choose to edit the Decrypon profile, to find the Decrypon policy that controls the
session traffic, check the Policy Name column in the log (or click the magnifying glass icon
PAN-OS® Administrator’s Guide Version 10.1 1101 ©2022 Palo Alto Networks, Inc.
Decrypon
next to the Decrypon log to see the informaon in the General secon of the Detailed Log
View).
1. In this example, the Decrypon policy name is Big Brother; to find the Decrypon profile,
go to Policies > Decrypon and check the Decrypon Profile column.
The name of the Decrypon profile is bp tls1.1-tls1.3-1. You can also select the Big
Brother policy and then select the Opons tab to see the name of the Decrypon profile.
Go to Objects > Decrypon > Decrypon Profile, select the appropriate Decrypon
profile, and edit it to address the version issue.
2. Go to Objects > Decrypon > Decrypon Profile.
Select the bp tls1.1-tls1.3-1 Decrypon profile and click the SSL Protocol Sengs tab.
The minimum TLS protocol version (Min Version) that the profile supports is TLSv1.1.
To allow the traffic that the version mismatch blocks, you could change the Min Version
to TLSv1.0. However, a more secure opon is to update the client to use a recent TLS
PAN-OS® Administrator’s Guide Version 10.1 1102 ©2022 Palo Alto Networks, Inc.
Decrypon
protocol version. If you can’t update the client, you can create a Decrypon policy and
profile that apply only to that user, device, or source address (and to any similar users,
devices, or source addresses so that one policy and profile control all of this traffic)
instead of applying a general Decrypon policy that allows TLSv1.0 traffic.
Track down old, vulnerable TLS versions and cipher suites so that you can make informed
decisions about whether to allow connecons with servers and applicaons that may compromise
your security posture.
The examples in this topic show how to:
• Idenfy traffic that uses less secure TLS protocol versions.
• Idenfy traffic that uses a parcular key exchange algorithm.
• Idenfy traffic that uses a parcular authencaon algorithm.
• Idenfy traffic that uses a parcular encrypon algorithm.
These examples show you how to use the decrypon troubleshoong tools in various ways so
that you can learn to use them to troubleshoot any decrypon issues you may encounter.
You can use Wireshark or other packet analyzers to double-check whether the client or the
server caused an issue, TLS client and server versions, and other cipher suite informaon.
This can help analyze version mismatches and other issues.
PAN-OS® Administrator’s Guide Version 10.1 1103 ©2022 Palo Alto Networks, Inc.
Decrypon
TLS Protocols—Idenfy traffic that uses older, less secure versions of the TLS protocol so that
you can evaluate whether to allow access to servers and applicaons that use weak protocols.
1. Start by checking the Applicaon Command Center (ACC) to see if the firewall allows
weak protocols (ACC > SSL Acvity > Successful TLS Version Acvity) and to get an
overall view of acvity.
The majority of successful TLS acvity in this example is TLSv1.2 and TLSv1.3 acvity.
However, there are a few instances of allowed TLSv1.0 traffic. Let’s click the number 49
PAN-OS® Administrator’s Guide Version 10.1 1104 ©2022 Palo Alto Networks, Inc.
Decrypon
to drill down into the TLSv1.0 acvity and see which applicaons are making successful
TLSv1.0 connecons:
We see that the firewall is allowing traffic idenfied as web-browsing traffic. To gain
insight into what that TLSv1.0 web-browsing traffic is and why it’s allowed, we go next to
the Decrypon logs.
2. Filter the Decrypon log to check TLSv1.0 acvity details.
Use the query (tls_version eq TLS1.0) and (err_index eq ‘None’) to
show successful TLSv1.0 Decrypon sessions.
Decrypon logs show successful TLS acvity only if you enable logging
successful TLS handshakes in Decrypon policy when you Configure
Decrypon Logging. If logging successful TLS handshakes is disabled, you can’t
check this informaon.
The Decrypon log shows us that the name of the Decrypon policy that controls the
traffic is Inner Eye and that the name of the host is hq-screening.mt.com. Now we
know the site that uses TLSv1.0 and we can check the Decrypon policy (Policies >
PAN-OS® Administrator’s Guide Version 10.1 1105 ©2022 Palo Alto Networks, Inc.
Decrypon
Decrypon) to find the Decrypon profile that controls the traffic and learn why the
traffic is allowed:
We see that the Decrypon profile associated with the policy is old TLS versions
support. We check the profile (Objects > Decrypon > Decrypon Profile) and look at
the SSL Protocol Sengs to find out exactly what traffic the profile allows:
The profile allows TLSv1.0 traffic. The next thing to do is to decide if you want to allow
access to the site (do you need access for business purposes?) or if you want to block it.
Another common scenario that results in the firewall allowing traffic that uses less secure
protocols is when that traffic is not decrypted. When you filter the Decrypon log for
TLSv1.0 traffic, if the Proxy Type column contains the value No Decrypt, then a No
PAN-OS® Administrator’s Guide Version 10.1 1106 ©2022 Palo Alto Networks, Inc.
Decrypon
Decrypon policy controls the traffic, so the firewall does not decrypt or inspect it. If you
don’t want to allow the weak protocol, modify the Decrypon profile so that it blocks
TLSv1.0 traffic.
There are many ways you can filter the Decrypon log to find applicaons and sites that
use weak protocols, for example:
• Instead of filtering only for successful TLSv1.0 handshakes, filter for both successful
and unsuccessful TLSv1.0 handshakes using the query (tls_version eq
TLS1.0).
• Filter only for unsuccessful TLSv1.0 handshakes using the query (tls_version eq
TLS1.0) and (err_index neq ‘None’).
• Filter for all less secure protocols (TLSv1.1 and earlier) using the query
(tls_version leq tls1.1).
If you want to filter the logs for other TLS versions, simply replace TLS1.0 or TLS1.1
with another TLS version.
3. Decide what acon to take for sites that use weak TLS protocols.
• If you don’t need to access the site for business purposes, the safest acon is to block
access to the site by eding the Decrypon policy and Decrypon profile that control
the traffic. The Decrypon log Policy Name column provides the policy name and the
Decrypon policy shows the aached Decrypon profile (Opons tab).
• If you need to access the site for business purposes, consider creang a Decrypon
policy and Decrypon profile that apply only to that site (or to that site and other
similar sites) and block all other traffic that uses less secure protocols.
PAN-OS® Administrator’s Guide Version 10.1 1107 ©2022 Palo Alto Networks, Inc.
Decrypon
Key Exchange—Idenfy traffic that uses less secure key exchange algorithms.
1. Start by checking the Applicaon Command Center (ACC) to see which key exchange
algorithms the firewall allows (ACC > SSL Acvity > Successful Key Exchange Acvity)
and to get an overall view of acvity.
The majority of the key exchanges use the secure ECDHE key exchange algorithm.
However, some key exchange sessions use the less secure RSA algorithm and a few use
PAN-OS® Administrator’s Guide Version 10.1 1108 ©2022 Palo Alto Networks, Inc.
Decrypon
another key algorithm. To begin invesgang traffic that uses RSA key exchanges, for
example, click the number 325 to drill down into the data.
The drill-down shows the applicaons that use RSA key exchanges. We can also click the
SNI radio buon to view the RSA key exchanges by SNI:
PAN-OS® Administrator’s Guide Version 10.1 1109 ©2022 Palo Alto Networks, Inc.
Decrypon
Armed with this informaon, we can go to the logs to gain more context about RSA key
exchange usage.
2. Go to the Decrypon log (Monitor > Logs > Decrypon)) and filter them for decrypon
sessions that use the RSA key exchange using the query (tls_keyxchg eq RSA):
From the Policy Name column in the log, we see that the No Decrypt Decrypon policy
controls most of the traffic that uses RSA key exchanges and can infer that the firewall
does not decrypt the traffic and allows it without inspecon. Because the traffic isn’t
PAN-OS® Administrator’s Guide Version 10.1 1110 ©2022 Palo Alto Networks, Inc.
Decrypon
decrypted, the firewall can’t idenfy the applicaon and lists it as ssl. If you don’t want to
allow traffic that uses RSA key exchanges, modify the Decrypon profile aached to the
Decrypon policy that controls the traffic.
You can add to the query to further filter the results for a parcular SNI or applicaon
that you saw in the ACC or in the first Decrypon log query.
3. Decide what acon to take for traffic that uses less secure key exchange algorithms.
Block access to sites that use less secure key exchange protocols unless you need to
access them for business purposes. For those sites, consider creang a Decrypon policy
and Decrypon profile that apply only to that site (or to that site and other similar sites)
and block all other traffic that uses less secure key exchange algorithms.
Use the Decrypon logs to idenfy sessions that uses older, less secure authencaon
algorithms.
Filter the Decrypon log to idenfy older, less secure authencaon algorithms.
For example, to idenfy all sessions that use the SHA1 algorithm, use the query (tls_auth
eq SHA):
You can add to the query to further drill down into the results. For example, you can add a
parcular SNI, a key exchange version (such as filtering for SHA1 sessions that also use RSA
key exchanges), a TLS version, or any other metric found in a Decrypon log column.
PAN-OS® Administrator’s Guide Version 10.1 1111 ©2022 Palo Alto Networks, Inc.
Decrypon
Use the Decrypon logs to idenfy sessions that use a parcular encrypon algorithm.
For example, to idenfy all sessions that use the AES-128-CBC encrypon algorithm, use the
query (tls_enc eq AES_128_CBC):
You can add to the query to further drill down into the results.
Examples of queries to find other older encrypon algorithms include: (tls_enc eq
DES_CBC), (tls_enc eq 3DES_EDE_CBC), and (tls_enc eq DES40_CBC).
Use this methodology and the log filter builder to create queries to invesgate negoated ECC
curves and any other informaon you find in the Decrypon log.
PAN-OS® Administrator’s Guide Version 10.1 1112 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 1 | Ensure that you Block sessions with untrusted issuers in the Forward Proxy Decrypon
profile (Objects > Decrypon > Decrypon Profiles) to block sites with untrusted CAs.
When you block sessions with untrusted issuers in the Decrypon profile, the Decrypon log
(Monitor > Logs > Decrypon) logs the error.
STEP 2 | Filter the log to idenfy sessions that failed due to revoked cerficates using the query
(error eq ‘Untrusted issuer CA’).
STEP 3 | (Oponal) Double-check the cerficate expiraon date at the Qualys SSL Labs site.
Enter the hostname of the server (Server Name Idenficaon column of the Decrypon log) in
the Hostname field and Submit it to view cerficate informaon for the host.
PAN-OS® Administrator’s Guide Version 10.1 1113 ©2022 Palo Alto Networks, Inc.
Decrypon
business reasons allows its cerficate to expire, connecons to that site may be blocked and you
may not know why.
You can use the Decrypon log to check for expired cerficates and to check for cerficates that
will expire soon so you can be aware of the situaon and take appropriate acon.
STEP 1 | Filter the Decrypon log for expired cerficates using the query (error eq ‘Expired
server certificate’).
This query idenfies servers that generate Expired server certificate errors. The
firewall blocks access to these servers because of the expired cerficate.
STEP 2 | (Oponal) Double-check the cerficate expiraon date at the Qualys SSL Labs site.
Enter the hostname of the server (Server Name Idenficaon column of the Decrypon log) in
the Hostname field and Submit it to view cerficate informaon for the host.
STEP 3 | Filter the Decrypon log (Monitor > Logs > Decrypon) for cerficates that will expire soon
using a query that idenfies upcoming cerficate end dates.
For example, if today’s date is February 1, 2020 and you want to give yourself two months to
evaluate and prepare in case sites don’t update their cerficates, query the Decrypon log for
cerficates that expire April 1 2020 or earlier (notafter leq ‘2020/4/01’)):
The Cerficate End Date column shows the eact date on which the cerficate expires.
PAN-OS® Administrator’s Guide Version 10.1 1114 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 4 | Determine the acon to take for sites with expired cerficates.
• If you don’t need to access the site for business purposes, the safest acon is to connue to
block access to the site.
• If you need to access the site for business purposes, take one of the following acons:
• Contact the administrator of the site with the expired cerficate and nofy them that
they need to update or renew their cerficate.
• Create a Decrypon policy that applies only to the sites with expired cerficates that
you need for business purposes and a Decrypon profile that allows sites with expired
cerficates. Do not apply the policy to any sites that you don’t need for business
purposes. When a site updates its cerficate, remove it from the policy.
Don’t trust revoked cerficates; enable cerficate revocaon checking to deny access to
sites with revoked cerficates.
In order to drop sessions with revoked cerficates and troubleshoot revoked cerficates, you
need to enable cerficate revocaon checking. If you don’t enable cerficate revocaon checking,
the firewall doesn’t check for revoked cerficates and you won’t know if a site has a revoked
cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1115 ©2022 Palo Alto Networks, Inc.
Decrypon
STEP 1 | Enable cerficate revocaon checking if you haven’t already enabled it.
1. Go to Device > Setup > Session > Decrypon Sengs.
2. Enable both OCSP and CRL cerficate checking.
If you Block sessions on cerficate status check meout in the Forward Proxy
Decrypon profile and are concerned that 5 seconds is not enough me and may result
in too many sessions blocked by meouts, set the Receive Timeout (sec) to a longer
amount of me.
STEP 2 | Filter the Decrypon log (Monitor > Logs > Decrypon) to find cerficate revocaon errors
using the query (error eq ‘OCSP/CRL check: certificate revoked’).
STEP 3 | (Oponal) Double-check the cerficate expiraon date at the Qualys SSL Labs site.
Enter the hostname of the server (Server Name Idenficaon column of the Decrypon log) in
the Hostname field and Submit it to view cerficate informaon for the host.
PAN-OS® Administrator’s Guide Version 10.1 1116 ©2022 Palo Alto Networks, Inc.
Decrypon
to protect against man-in-the-middle (MITM) aacks where a device between the client and the
server replaces the server cerficate with another cerficate.
Although this prevents malicious actors from intercepng and manipulang connecons, it also
prevents forward proxy decrypon because the firewall creates an impersonaon cerficate
instead of the server cerficate to present to the client. Instead of one session that connects the
client and server directly, forward proxy creates two sessions, one between the client and the
firewall and another between the firewall and the server. This establishes trust with the client so
that the firewall can decrypt and inspect the traffic.
However, when a cerficate is pinned, the firewall cannot decrypt the traffic because the client
does not accept the firewall’s impersonaon cerficate—the client only accepts the cerficate that
is pinned to the applicaon.
STEP 1 | Filter the Decrypon log (Monitor > Logs > Decrypon) to find pinned cerficates using the
query (error contains ‘UnknownCA’).
The applicaon generates a TLS error code (Alert) when it fails to verify the server’s cerficate.
Different applicaons may use different error codes to indicate a pinned cerficate. The most
common error indicators for pinned cerficates are UnknownCA and BadCerficate. Aer
running the (error contains ‘UnknownCA’) query, run the query (error contains
‘BadCertificate’) to catch more pinned cerficate errors.
You can use Wireshark or other packet analyzers to double-check the error. Look for
the client breaking the connecon immediately aer the TLS handshake to confirm
that it is a pinned cerficate issue.
PAN-OS® Administrator’s Guide Version 10.1 1117 ©2022 Palo Alto Networks, Inc.
Decrypon
In PAN-OS 10.1, the Decrypon Broker feature and free license were replaced with
Network Packet Broker (see the Networking Administrator’s Guide), which expands
the broker’s capabilies to non-decrypted TLS traffic and non-TLS traffic in addion to
decrypted TLS traffic. Network Packet Broker licenses are also free to download and
install from the Customer Support Portal.
Follow these steps on the Palo Alto Networks Customer Support Portal to acvate a decrypon
mirroring feature license.
STEP 1 | Log in to the Customer Support Portal.
STEP 3 | Find the device on which you want to enable decrypon port mirroring and select Acons
(the pencil icon).
STEP 5 | Select the feature for which you want to acvate a free license: Decrypon Port Mirror.
PAN-OS® Administrator’s Guide Version 10.1 1118 ©2022 Palo Alto Networks, Inc.
URL Filtering
Palo Alto Networks URL filtering soluon allows you to monitor and control the sites
users can access, to prevent phishing aacks by controlling the sites to which users
can submit valid corporate credenals, and to enforce safe search for search engines
like Google and Bing.
> About Palo Alto Networks URL > Create a Custom URL Category
Filtering Soluon > URL Category Excepons
> How Advanced URL Filtering Works > Use an External Dynamic List in a
> URL Filtering Inline ML URL Filtering Profile
> URL Filtering Use Cases > Allow Password Access to Certain
> URL Categories Sites
> Plan Your URL Filtering Deployment > Prevent Credenal Phishing
> Acvate The Advanced URL Filtering > URL Filtering Response Pages
Subscripon > Customize the URL Filtering
> Test URL Filtering Configuraon Response Pages
> Configure URL Filtering Inline ML > Request to Change the Category for
a URL
> Monitor Web Acvity
> Troubleshoot URL Filtering
> Log Only the Page a User Visits
> PAN-DB Private Cloud
> Enable SSL/TLS Handshake
Inspecon
1119
URL Filtering
Legacy URL Filtering subscripon holders are able to connue using their URL filtering
deployment unl the end of the license term.
You can create policy rules to limit access to sites based on URL categories, users, and groups.
(See URL Filtering Use Cases for different ways you can leverage your Advanced URL Filtering
subscripon to meet your organizaon’s web security needs.)
With Advanced URL Filtering enabled, URL requests are:
• Compared against the PAN-DB URL database, which contains millions of websites that have
been categorized. You can use these URL categories in URL Filtering profiles or as match
criteria to enforce Security policy. You can also use URL filtering to enforce safe search sengs
for your users and to prevent credenal the based on URL category.
• Analyzed in real-me using the cloud-based Advanced URL Filtering detecon modules to
provide protecon against new and unknown threats that do not currently exist in the URL
filtering database.
• Inspected for phishing and malicious JavaScript using inline machine learning (ML), a firewall-
based analysis soluon, which can block unknown malicious web pages in real-me.
If the network security requirements in your enterprise prohibit the firewalls from directly
accessing the Internet, Palo Alto Networks provides an offline URL filtering soluon with the
PAN-DB Private Cloud. This allows you to deploy a PAN-DB private cloud on one or more M-600
appliances that funcon as PAN-DB servers within your network.
PAN-OS® Administrator’s Guide Version 10.1 1120 ©2022 Palo Alto Networks, Inc.
URL Filtering
When a user requests a web page, the firewall queries user-added excepons and PAN-DB for
the site’s risk category. PAN-DB uses URL informaon from Unit 42, WildFire, passive DNS,
Palo Alto Networks telemetry data, data from the Cyber Threat Alliance, and applies various
analyzers to determine the category. If the URL displays risky or malicious characteriscs, it is also
submied to Advanced URL Filtering in the cloud for real-me analysis and generates addional
analysis data. The resulng risk category is then retrieved by the firewall and is used to enforce
the web-access rules based on your policy configuraon. Addionally, the firewall caches site
categorizaon informaon for new entries to enable fast retrieval for subsequent requests, while
it removes URLs that users have not accessed recently so that it accurately reflects the traffic
in your network. Addionally, checks built into PAN-DB cloud queries ensure that the firewall
receives the latest URL categorizaon informaon. If you do not have Internet connecvity or an
acve URL filtering license, no queries are made to PAN-DB.
PAN-OS® Administrator’s Guide Version 10.1 1121 ©2022 Palo Alto Networks, Inc.
URL Filtering
The firewall determines a website’s URL category by comparing it to entries in 1) custom URL
categories, 2) external dynamic lists (EDLs), and 3) predefined URL categories, in order of
precedence.
Firewalls configured to analyze URLs in real-me using machine learning on the dataplane
provides an addional layer of security against phishing websites and JavaScript exploits. The
inline ML models used to idenfy these URL-based threats extend to currently unknown as well
as future variants of threats that match characteriscs that Palo Alto Networks has idenfied as
malicious. To keep up with the latest changes in the threat landscape, inline ML models are added
or updated via content releases.
When the firewall checks PAN-DB for a URL, it also looks for crical updates, such as URLs that
previously qualified as benign but are now malicious.
If you believe PAN-DB has incorrectly categorized a site, you can submit a URL category change
request in your browser through Test A Site or directly from the firewall logs.
PAN-OS® Administrator’s Guide Version 10.1 1122 ©2022 Palo Alto Networks, Inc.
URL Filtering
URL Filtering inline ML is not supported on the VM-50 or VM50L virtual appliance.
PAN-OS® Administrator’s Guide Version 10.1 1123 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1124 ©2022 Palo Alto Networks, Inc.
URL Filtering
Enforce Security, Decrypon, Authencaon, and QoS policies based on URL category
You can enforce different types of firewall policies based on URL categories. For example, suppose
you have enabled Decrypon, but you want to exclude certain personal informaon from being
decrypted. In this case you could create a Decrypon policy rule that excludes websites that
match the URL categories financial-services and health-and-medicine from decrypon. Another
example would be to use the URL category streaming-media in a QoS policy to apply bandwidth
controls to websites that fall in to this category.
The following table describes the policies that accept URL categories as match criteria:
Decrypon You can also use URL categories to phase-in decrypon, and to exclude
URL categories that might contain sensive or personal informaon
from decrypon (like financial-services and health-and-medicine).
Plan to decrypt the riskiest traffic first (URL categories most likely to
harbor malicious traffic, such as gaming or high-risk) and then decrypt
more as you gain experience. Alternavely, decrypt the URL categories
that don’t affect your business first (if something goes wrong, it won’t
affect business), for example, news feeds. In both cases, decrypt a few
URL categories, listen to user feedback, run reports to ensure that
decrypon is working as expected, and then gradually decrypt a few
more URL categories, and so on. Plan to make decrypon exclusions to
exclude sites from decrypon if you can’t decrypt them for technical
reasons or because you choose not to decrypt them.
PAN-OS® Administrator’s Guide Version 10.1 1125 ©2022 Palo Alto Networks, Inc.
URL Filtering
QoS Use URL categories to allocate throughput levels for specific website
categories. For example, you may want to allow the streaming-media
category, but limit throughput by adding the URL category to a QoS
policy rule.
Security In Security policy rules, you can use URL categories in two ways:
• Enforce policy based on URL categories by selecng them as match
criteria.
• Aach a URL Filtering profile that specifies the policy acon for each
category.
If for example, the IT-security group in your company needs access
to the hacking category, but all other users are denied access to the
category, you must create the following rules:
• A Security policy rule that allows the IT-Security group to access
content categorized as hacking. The Security policy rule references
the hacking category in the Services/URL Category tab and IT-
Security group in the Users tab.
• Another Security policy rule that allows general web access for all
users. To this rule you aach a URL Filtering profile that blocks the
hacking category.
You must list the policy that allows access to hacking before the policy
that blocks hacking. This is because the firewall evaluates Security policy
rules from the top down, so when a user who is part of the security
group aempts to access a hacking site, the firewall evaluates the policy
rule that allows access first and grants the user access. The firewall
evaluates users from all other groups against the general web access
rule that blocks access to the hacking sites.
PAN-OS® Administrator’s Guide Version 10.1 1126 ©2022 Palo Alto Networks, Inc.
URL Filtering
URL Categories
PAN-DB classifies websites based on site content, features, and safety. A URL can have up to four
categories, including risk categories (high, medium, and low), which indicate how likely it is that
the site will expose you to threats. For a complete list of predefined URL categories, see PAN-DB
URL Filtering Categories.
Visit Test A Site to see how PAN-DB categorizes a URL, and to learn about all available URL
categories. You can also use Test A Site to submit a URL category change request, or you can
submit the request directly in the firewall: select Monitor > Logs and open the details for a log
entry. Under the URL category, you’ll see the opon to submit a change request.
Read on to learn more about URL categories:
• URL Filtering Use Cases
• Security-Focused URL Categories
• Malicious URL Categories
• Verified URL Categories
• Policy Acons You Can Take Based on a URL Category
PAN-OS® Administrator’s Guide Version 10.1 1127 ©2022 Palo Alto Networks, Inc.
URL Filtering
Low-Risk Sites that are not medium or high risk are considered
low risk. These sites have displayed benign acvity for a
minimum of 90 days.
Default and Recommended Policy Acon: Allow
Newly-Registered Domains Idenfies sites that have been registered within the last
32 days. New domains are frequently used as tools in
malicious campaigns.
Default Policy Acon: Alert
Recommended Policy Acon: Block
PAN-OS® Administrator’s Guide Version 10.1 1128 ©2022 Palo Alto Networks, Inc.
URL Filtering
• malware—Sites known to host malware or used for command and control (C2) traffic. May also
exhibit Exploit Kits.
• phishing—Known to host credenal phishing pages or phishing for personal idenficaon. This
includes web content that covertly aempts to fool the user in order to harvest informaon,
including login credenals, credit card informaon – voluntarily or involuntarily, account
numbers, PINs, and any informaon considered to be personally idenfiable informaon (PII)
from vicms via social engineering techniques. Technical support scams and scareware are also
included as phishing.
• grayware—Websites and services that do not meet the definion of a virus or pose a direct
security threat but displays obtrusive behavior and influences users to grant remote access
or perform other unauthorized acons. Grayware includes scams, illegal acvies, criminal
acvies, get rich quick sites, adware, and other unwanted or unsolicited applicaons, such as
embedded crypto miners or hijackers that change the elements of the browser. Typosquang
domains that do not exhibit maliciousness and is not owned by the targeted domain will be
categorized as grayware. Prior to Content release version 8206, the firewall placed grayware
in either the malware or quesonable URL category. If you are unsure about whether to block
grayware, start by alerng on grayware, invesgate the alerts, and then decide whether to
block grayware or connue to alert on grayware.
• dynamic-dns—Hosts and domain names for systems with dynamically assigned IP addresses
and which are oenmes used to deliver malware payloads or C2 traffic. Also, dynamic DNS
domains do not go through the same veng process as domains that are registered by a
reputable domain registraon company, and are therefore less trustworthy.
• unknown—Sites that have not yet been idenfied by PAN-DB. If availability is crical to your
business and you must allow the traffic, alert on unknown sites, apply the best pracce Security
profiles to the traffic, and invesgate the alerts.
PAN-DB Real-Time Updates learns unknown sites aer the first aempt to access an
unknown site, so unknown URLs are idenfied quickly and become known URLs that
the firewall can then handle based on the actual URL category.
• newly-registered-domain—Newly registered domains are oen generated purposely or by
domain generaon algorithms and used for malicious acvity.
• copyright-infringement—Domains with illegal content, such as content that allows illegal
download of soware or other intellectual property, which poses a potenal liability risk. This
category was introduced to enable adherence to child protecon laws required in the educaon
industry as well as laws in countries that require internet providers to prevent users from
sharing copyrighted material through their service.
• extremism—Websites promong terrorism, racism, fascism, or other extremist views
discriminang against people or groups of different ethnic backgrounds, religions or other
beliefs. This category was introduced to enable adherence to child protecon laws required in
the educaon industry. In some regions, laws and regulaons may prohibit allowing access to
extremist sites, and allowing access may pose a liability risk.
• proxy-avoidance-and-anonymizers—URLs and services oen used to bypass content filtering
products.
• quesonable— Websites containing tasteless humor, offensive content targeng specific
demographics of individuals, or groups of people.
PAN-OS® Administrator’s Guide Version 10.1 1129 ©2022 Palo Alto Networks, Inc.
URL Filtering
Malware Block
Phishing
Grayware
For more informaon about current URL categories, see Complete List of PAN-DB URL
Filtering Categories.
PAN-OS® Administrator’s Guide Version 10.1 1130 ©2022 Palo Alto Networks, Inc.
URL Filtering
Learn more about configuring a best pracce URL Filtering profile to ensure protecon
against URLs that have been observed hosng malware or exploitave content.
Acon Descripon
Site Access
alert The website is allowed and a log entry is generated in the URL filtering
log.
Set alert as the Acon for categories of traffic you don’t block
to log and provide visibility into the traffic.
block The website is blocked and the user will see a response page and will
not be able to connue to the website. A log entry is generated in the
URL filtering log.
Blocking site access for a URL category also sets User Credenal
Submissions for that URL category to block.
connue The user will be prompted with a response page indicang that the site
has been blocked due to company policy, but the user is prompted with
the opon to connue to the website. The connue acon is typically
used for categories that are considered benign and is used to improve
the user experience by giving them the opon to connue if they feel
the site is incorrectly categorized. The response page message can be
PAN-OS® Administrator’s Guide Version 10.1 1131 ©2022 Palo Alto Networks, Inc.
URL Filtering
Acon Descripon
customized to contain details specific to your company. A log entry is
generated in the URL filtering log.
override The user will see a response page indicang that a password is required
to allow access to websites in the given category. With this opon, the
security admin or helpdesk person would provide a password granng
temporary access to all websites in the given category. A log entry
is generated in the URL filtering log. See Allow Password Access to
Certain Sites.
In earlier release versions, URL Filtering category overrides had priority
enforcement ahead of custom URL categories. As part of the upgrade
to PAN-OS 9.0, URL category overrides are converted to custom URL
categories, and no longer receive priority enforcement over other
custom URL categories. Instead of the acon you defined for the
category override in previous release versions, the new custom URL
category is enforced by the security policy rule with the strictest URL
Filtering profile acon. From most strict to least strict, possible URL
Filtering profile acons are: block, override, connue, alert, and allow.
This means that, if you had URL category overrides with the acon
allow, there’s a possibility the overrides might be blocked aer they are
converted to custom URL category in PAN-OS 9.0.
none The none acon only applies to custom URL categories. Select none to
ensure that if mulple URL Filtering profiles exist, the custom category
will not have any impact on other profiles. For example, if you have two
URL Filtering profiles and the custom URL category is set to block in
one profile, if you do not want the block acon to apply to the other
profile, you must set the acon to none.
Also, in order to delete a custom URL category, it must be set to none in
any profile where it is used.
PAN-OS® Administrator’s Guide Version 10.1 1132 ©2022 Palo Alto Networks, Inc.
URL Filtering
Acon Descripon
allow (default) Allow users to submit corporate credenals to websites in this URL
category.
connue Display a response page to users that prompts them to select Connue
to access to access the site. By default, the An Phishing Connue Page
is shown to user when they access sites to which credenal submissions
are discouraged. You can also choose to create a custom response page
to display—for example, if you want to warn users against phishing
aempts or reusing their credenals on other websites.
PAN-OS® Administrator’s Guide Version 10.1 1133 ©2022 Palo Alto Networks, Inc.
URL Filtering
At that me, you can also reduce URL filtering logs by enabling the Log container page
only opon in the URL Filtering profile so only the main page that matches the category
will be logged, not subsequent pages/categories that may be loaded within the container
page.
STEP 1 | At any me, you can use Test A Site to see how PAN-DB—the URL Filtering cloud database—
categorizes a specific URL, and to learn about all possible URL categories.
You can also use Test A Site to submit a change request, if you disagree with how a specific
URL is categorized.
STEP 2 | Create a passive URL Filtering profile that alerts on all categories so you have visibility into
web traffic.
1. Select Objects > Security Profiles> URL Filtering.
2. Select the default profile and then click Clone. The new profile will be named default-1.
3. Select the default-1 profile and rename it. For example, rename it to URL-Monitoring.
PAN-OS® Administrator’s Guide Version 10.1 1134 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | Configure the acon for all categories to alert, except for malware, command-and-control,
and phishing, which should remain blocked.
1. In the secon that lists all URL categories, select all categories and then de-select
malware, command-and-control, and phishing.
2. To the right of the Acon column heading, mouse over and select the down arrow and
then select Set Selected Acons and choose alert.
STEP 4 | Apply the URL Filtering profile to Security policy rules that allow traffic from clients in the
trust zone to the Internet.
Make sure the Source Zone in the Security policy rules to which you add URL
Filtering profiles is set to a protected internal network.
1. Select Policies > Security. Then, select a Security policy rule to modify.
2. On the Acons tab, edit the Profile Seng.
3. For Profile Type, select Profiles. A list of profiles appears.
4. For URL Filtering profile, select the profile you just created.
5. Click OK to save your changes.
PAN-OS® Administrator’s Guide Version 10.1 1135 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 6 | View the URL filtering logs to see all of the website categories that your users are accessing.
The categories you’ve set to block are also logged.
For informaon on viewing the logs and generang reports, see Monitor Web Acvity.
Select Monitor > Logs > URL Filtering. A log entry will be created for any website that exists in
the URL filtering database that is in a category set to any acon other than allow. URL Filtering
reports give you a view of web acvity in a 24-hour period. ( Monitor > Reports).
PAN-OS® Administrator’s Guide Version 10.1 1136 ©2022 Palo Alto Networks, Inc.
URL Filtering
• Prevent credenal the by enabling the firewall to detect corporate credenal submissions to
sites, and then control those submissions based on URL category. Block users from subming
credenals to malicious and untrusted sites, warn users against entering corporate credenals
PAN-OS® Administrator’s Guide Version 10.1 1137 ©2022 Palo Alto Networks, Inc.
URL Filtering
on unknown sites or reusing corporate credenals on non-corporate sites, and explicitly allow
users to submit credenals to corporate and sanconed sites.
• Block malicious variants of JavaScript exploits and phishing aacks in real-me. Enabling URL
Filtering Inline ML allows you to dynamically analyze web pages using machine learning on the
firewall.
• Decrypt, inspect, and strictly limit how users interact with high-risk and medium-risk content (if
you decided not to block any of the malicious URL categories for business reasons, you should
also strictly limit how users interact with those categories).
The web content that you sancon and the malicious URL categories that you block outright
are just one poron of your overall web traffic. The rest of the content your users are accessing
is a combinaon of benign (low-risk) and risky content (high-risk and medium-risk). High-risk
and medium-risk content is not confirmed malicious but is closely associated with malicious
sites. For example, a high-risk URL might be on the same domain as a malicious site, or maybe it
hosted malicious content in the past.
However, many sites that pose a risk to your organizaon also provide valuable resources
and services to your users (cloud storage services are a good example). While these resources
and services are necessary for business, they are also more likely to be used as part of a
cyberaack. Here’s how to control how users interact with this potenally-dangerous content,
while sll providing them a good user experience:
• In a URL Filtering profile, set the high-risk and medium-risk categories to connue to display
a response page that warns users they’re vising a potenally-dangerous site. Advise them
how to take precauons if they decide to connue to the site. If you don’t want to prompt
users with a response page, alert on the high-risk and medium-risk categories instead.
• Decrypt decrypt high-risk and medium-risk sites.
• Follow the An-Spyware, Vulnerability Protecon, and File Blocking best pracces for high-
risk and medium-risk sites. A protecve measure would be to block downloads of dangerous
file types and blocking obfuscated JavaScript.
• Stop credenal the by blocking users from subming their corporate credenals to high-
risk and medium-risk sites.
• Schools or educaonal instuons should use safe search enforcement to make sure
that search engines filter out adult images and videos from search results. You can even
transparently enable safe search for users.
• Enable the firewall to hold an inial web request as it looks up a website’s URL category with
PAN-DB.
When a user visits a website, a firewall with Advanced URL Filtering enabled checks its local
cache of URL categories to categorize the site. If the firewall doesn’t find the URL’s category in
the cache, it performs a lookup in PAN-DB, the Palo Alto Networks URL database. By default,
the firewall allows the user’s web request during this cloud lookup and enforces policy when
the server responds.
But when you choose to hold web requests, the firewall blocks the request unl it either finds
the URL category or mes out. If the lookup mes out, the firewall considers the URL category
not-resolved.
1. In Device > Setup > Content-ID, check the box for
Hold client request for category lookup.
PAN-OS® Administrator’s Guide Version 10.1 1138 ©2022 Palo Alto Networks, Inc.
URL Filtering
The Advanced URL Filtering license includes access to PAN-DB; if the license expires,
the firewall ceases to perform all URL filtering funcons, URL category enforcement,
and URL cloud lookups. Addionally, all other cloud based updates will not funcon
unl you install a valid license.
1. Select Device > Licenses and, in the License Management secon, select the license
installaon method:
• Retrieve license keys from license server
• Acvate feature using authorizaon code
2. Aer installing the license, confirm that the Advanced URL Filtering secon, Date
Expires field, displays a valid date.
When you acvate the Advanced URL Filtering license, your license entlements
for PAN-DB and Advanced URL Filtering might not display correctly on the
firewall — this is a display anomaly, not a licensing issue, and does not affect
access to the services. You can update the licenses on the firewall to recfy
the display issue by using the following CLI command: request license
fetch.
STEP 2 | Download and install the latest PAN-OS content release. PAN-OS Applicaons and Threats
content release 8390-6607 and later allows firewalls operang PAN-OS 9.x and later to
idenfy URLs that have been categorized using the new real-me-detecon category,
idenfying URLs classified by advanced URL filtering. For more informaon about the
update, refer to the Applicaons and Threat Content Release Notes. You can also review
Content Release Notes for apps and threats on the Palo Alto Networks Support Portal or
directly in the firewall web interface: select Device > Dynamic Updates and open the Release
Note for a specific content release version.
Follow the Best Pracces for Applicaons and Threats Content Updates when
updang to the latest content release version.
PAN-OS® Administrator’s Guide Version 10.1 1139 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | Schedule the firewall to download dynamic updates for Applicaons and Threats.
You can only schedule dynamic updates if the firewall has direct Internet access.
If updates are already scheduled in a secon, the link text displays the schedule
sengs.
The Applicaons and Threats updates somemes contain updates for URL filtering
related to Safe Search Enforcement.
Next Steps:
1. Configure a URL filtering profile to define your organizaon’s web usage policies.
2. Verify Advanced URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1140 ©2022 Palo Alto Networks, Inc.
URL Filtering
If you didn’t already, configure a best pracce URL Filtering profile to ensure
protecon against URLs hosng malware or exploive content.
Select Objects > Security Profiles > URL Filtering and Add or modify a URL Filtering profile.
STEP 3 | Configure the URL Filtering profile to detect corporate credenal submissions to websites
that are in allowed URL categories.
To ensure the best performance and a low false posive rate, the firewall automacally
skips checking the credenal submissions for any App-ID™ associated with sites that
have never been observed hosng malware or phishing content—even if you enable
checks in the corresponding category. The list of sites for which the firewall skips
credenal checking is automacally updated through Applicaons and Threats content
updates.
PAN-OS® Administrator’s Guide Version 10.1 1141 ©2022 Palo Alto Networks, Inc.
URL Filtering
mapping table. You can use any of the user mapping methods described in Map IP
Addresses to Users.
• Use Domain Credenal Filter—Checks for valid corporate usernames and password
submissions and verifies that the username maps to the IP address of the logged-in
user. See Configure User Mapping Using the Windows User-ID Agent for instrucons
on how to set up User-ID to enable this method.
• Use Group Mapping—Checks for valid username submissions based on the user-
to-group mapping table populated when you configure the firewall to map users to
groups.
With group mapping, you can apply credenal detecon to any part of the directory
or to a specific group, such as groups like IT that have access to your most sensive
applicaons.
STEP 4 | Configure the URL Filtering profile to detect phishing and malicious JavaScript in real-me
using URL Filtering Inline ML.
STEP 5 | Allow or block users from subming corporate credenals to sites based on URL category to
prevent credenal phishing.
To ensure the best performance and a low false posive rate, the firewall automacally
skips checking the credenal submissions for any App-ID associated with sites that
have never been observed hosng malware or phishing content—even if you enable
checks in the corresponding category. The list of sites for which the firewall skips
credenal checking is automacally updated through Applicaons and Threats content
updates.
1. For each URL category to which you allow Site Access, select how you want to treat
User Credenal Submissions:
• alert—Allow users to submit credenals to the website but generate a URL filtering
alert log each me a user submits credenals to sites in this URL category.
• allow (default)—Allow users to submit credenals to the website.
• block—Displays the An Phishing Block Page to block users from subming
credenals to the website.
• connue—Present the An Phishing Connue Page to require users to click Connue
to access the site.
2. Configure the URL Filtering profile to detect corporate credenal submissions to
websites that are in allowed URL categories.
PAN-OS® Administrator’s Guide Version 10.1 1142 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 6 | Define URL category excepon lists to specify websites that should always be blocked or
allowed, regardless of URL category.
For example, to reduce URL filtering logs, you may want to add your corporate websites to
the allow list so that no logs are generated for those sites or, if there is a website that is being
overly used and is not work-related, you can add that site to the block list.
The policy acons configured for custom URL categories have priority enforcement over
matching URLs in external dynamic lists.
Traffic to websites in the block list is always blocked regardless of the acon for the associated
category and traffic to URLs in the allow list is always allowed.
For more informaon on the proper format and wildcard usage, review the URL category
excepon list guidelines.
STEP 9 | Enable HTTP Header Logging for one or more of the supported HTTP header fields.
Select URL Filtering Sengs and select one or more of the following fields to log:
• User-Agent
• Referer
• X-Forwarded-For
STEP 11 | Apply the URL Filtering profile to Security policy rules that allow traffic from clients in the
trust zone to the Internet.
Make sure the Source Zone in the Security policy rules to which you add URL
Filtering profiles is set to a protected internal network.
1. Select Policies > Security. Then, select a Security policy rule to modify.
2. On the Acons tab, edit the Profile Seng.
3. For Profile Type, select Profiles. A list of profiles appears.
4. For URL Filtering profile, select the profile you just created.
5. Click OK to save your changes.
PAN-OS® Administrator’s Guide Version 10.1 1143 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 14 | (Best Pracce) Enable Hold client request for category lookup to block client requests while
the firewall performs URL category lookups.
1. Select Device > Setup > Content-ID.
2. Select Hold client request for category lookup.
3. Commit your changes.
STEP 15 | Set the amount of me, in seconds, before a URL category lookup mes out.
1. Select Device > Setup > Content-ID > gear icon.
2. Enter a number for Category lookup meout (sec).
3. Click OK.
4. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 1144 ©2022 Palo Alto Networks, Inc.
URL Filtering
You must enable SSL decrypon for test pages to work over an HTTPS connecon.
Advanced URL filtering test pages contain “real-me-detecon” in the URL and confirm
that firewalls correctly categorize and analyze malicious URLs in real-me. They do not
verify firewall behavior for any other categories.
You can check the classificaon of a specific website using Palo Alto Networks URL
category lookup tool, Test A Site.
STEP 2 | Review the Traffic and URL Filtering logs (Monitor > Logs) to verify that your firewall
processes the site correctly.
For example, if you configured a block page to display when someone accesses a site that
violates your organizaon’s policy, check that one appears when you visit the test site.
PAN-OS® Administrator’s Guide Version 10.1 1145 ©2022 Palo Alto Networks, Inc.
URL Filtering
Palo Alto Networks recommends seng the real-me-detecon acon seng to alert for
your acve URL filtering profiles. This provides visibility into URLs analyzed in real-me
and will block (or allow, depending on your policy sengs) based on the category sengs
configured for specific web threats.
The firewall enforces the most severe acon of the acons configured for detected URL
categories of a given URL. For example, suppose example.com is categorized as real-me-
detecon, command-and-control, and shopping—categories with an alert, block, and allow
acon configured, respecvely. The firewall will block the URL because block is the most
severe acon from the detected categories.
STEP 1 | Visit each of the following test URLs to verify that the Advanced URL Filtering service is
properly categorizing URLs:
• Malware—urlfiltering.paloaltonetworks.com/test-real-me-detecon-malware
• Phishing—urlfiltering.paloaltonetworks.com/test-real-me-detecon-phishing
• C2—urlfiltering.paloaltonetworks.com/test-real-me-detecon-command-and-control
• Grayware—urlfiltering.paloaltonetworks.com/test-real-me-detecon-grayware
• Benign (unknown)—urlfiltering.paloaltonetworks.com/test-real-me-detecon
STEP 2 | Monitor the acvity on the firewall to verify that the tested URLs have been properly
categorized as real-me-detecon.
1. Select Monitor > Logs > URL Filtering and filter by (url_category_list contains
real-time-detection) to view logs that have been analyzed using Advanced URL
Filtering.
Addional web page category matches are also displayed and corresponds to the
categories as defined by PAN-DB.
2. Take a detailed look at the logs to verify that each type of web threat is correctly
analyzed and categorized.
In the next example, the URL is categorized as having been analyzed in real-me and
possessing qualies that define it as command-and-control (C2). Because the C2
PAN-OS® Administrator’s Guide Version 10.1 1146 ©2022 Palo Alto Networks, Inc.
URL Filtering
category has a more severe acon associated with it than real-me-detecon (block as
opposed to alert), the URL is categorized as command-and-control and blocked.
PAN-OS® Administrator’s Guide Version 10.1 1147 ©2022 Palo Alto Networks, Inc.
URL Filtering
URL Filtering inline ML is not currently supported on the VM-50 or VM50L virtual
appliance.
STEP 1 | To take advantage of URL Filtering inline ML, you must have an acve Advanced URL
Filtering or legacy URL Filtering subscripon.
Verify that you have a URL Filtering subscripon. To verify subscripons for which you have
currently-acve licenses, select Device > Licenses and verify that the appropriate licenses
display and are not expired. The image below shows the license entry for the legacy URL
Filtering subscripon.
STEP 2 | Create a new or update your exisng URL Filtering profiles to use URL Filtering inline ML.
1. Select an exisng URL Filtering Profile or Add a new one (Objects > Security Profiles > URL
Filtering).
2. Select Inline ML and define a policy Acon for each URL Filtering inline ML model.
This enforces the selected policy acon on a per model basis. Currently, there are two
classificaon engines available: Phishing and JavaScript Exploit, one for each type of
malicious webpage content.
• Block—When the firewall detects a website with phishing content, the firewall generates
a URL Filtering log entry.
• Alert—The firewall allows access to the website and generates a URL Filtering log entry.
• Allow—The firewall allows access to the website but does not generate a URL Filtering
log entry.
3. Click OK to exit the URL Filtering Profile dialog, then Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 1148 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | (Oponal) Add URL excepons to your URL Filtering profile if you encounter false-posives.
You can add excepons by specifying an external dynamic list from the URL Filtering profile
or by adding a web page entry from the URL Filtering logs.
• Add an external dynamic list of URL excepons.
1. Select Objects > Security Profiles > URL Filtering.
2. Select a URL Filtering profile for which you want to exclude specific URLs, then select
Inline ML.
3. Add a pre-exisng URL-based external dynamic list. If none is available, create a new
external dynamic list.
4. Click OK to save the URL Filtering profile and Commit your changes.
• Add file excepons from URL Filtering log entries.
1. Select Monitor > Logs > URL Filtering and filter the logs for URL entries with an Inline
ML Verdict of malicious-javascript or phishing. Select a URL Filtering log for a URL that
you wish to create an excepon for.
2. Go to the Detailed Log View and scroll down to the Details pane, then select Create
Excepon located next to the Inline ML Verdict.
3. Select a custom category for the URL excepon and click OK.
4. The new URL excepon can be found in the list to which it was added, under Objects >
Custom Objects > URL Category.
STEP 4 | (Oponal) Verify the status of your firewall’s connecvity to the inline ML cloud service.
Use the following CLI command on the firewall to view the connecon status.
For example:
MLAV cloud
Current cloud server: ml.service.paloaltonetworks.com
Cloud connection: connected
If you are unable to connect to the inline ML cloud service, verify that the following domain is
not being blocked: ml.service.paloaltonetworks.com.
PAN-OS® Administrator’s Guide Version 10.1 1149 ©2022 Palo Alto Networks, Inc.
URL Filtering
To view informaon about web pages that have been processed using URL Filtering inline ML,
Filter the logs (Monitor > Logs > URL Filtering) based on Inline ML Verdict. Web pages that have
been determined to contain threats are categorized with verdicts of either phishing or malicious-
javascript. For example:
PAN-OS® Administrator’s Guide Version 10.1 1150 ©2022 Palo Alto Networks, Inc.
URL Filtering
For a quick view of the most common categories users access in your environment, check the
ACC widgets. Most Network Acvity widgets allow you to sort on URLs. For example, in the
Applicaon Usage widget, you can see that the networking category is the most accessed
category, followed by encrypted tunnel, and ssl. You can also view the list of Threat Acvity
and Blocked Acvity sorted on URLs.
PAN-OS® Administrator’s Guide Version 10.1 1151 ©2022 Palo Alto Networks, Inc.
URL Filtering
From the ACC, you can jump directly to the logs ( ) or select Monitor > Logs > URL Filtering.
The log acon for each entry depends on the Site Access seng you defined for the
corresponding category:
• Alert log—In this example, the computer-and-internet-info category is set to alert.
• Block log—In this example, the insufficient-content category is set to connue. If the
category had been set to block instead, the log Acon would be block-url.
• Alert log on encrypted website—In this example, the category is private-ip-addresses and
the applicaon is web-browsing. This log also indicates that the firewall decrypted this
traffic.
You can also add several other columns to your URL Filtering log view, such as: to and from
zone, content type, and whether or not a packet capture was performed. To modify what
columns to display, click the down arrow in any column and select the aribute to display.
PAN-OS® Administrator’s Guide Version 10.1 1152 ©2022 Palo Alto Networks, Inc.
URL Filtering
To view the complete log details and/or request a category change for the given URL that was
accessed, click the log details icon in the first column of the log.
Generate predefined URL filtering reports on URL categories, URL users, Websites accessed,
Blocked categories, and more.
Select Monitor > Reports and under the URL Filtering Reports secon, select one of the
reports. The reports cover the 24-hour period of the date you select on the calendar. You can
also export the report to PDF, CSV, or XML.
PAN-OS® Administrator’s Guide Version 10.1 1153 ©2022 Palo Alto Networks, Inc.
URL Filtering
You must enable User-ID in order to be able to select user or group names. If
User-ID is not configured, you can select the type User and enter the IP address
of the user’s computer.
4. Enter the Username/IP Address for a user report or enter the group name for a user
group report.
5. Select the me period. You can select an exisng me period, or select Custom.
6. Select the Include Detailed Browsing check box, so browsing informaon is included in
the report.
PAN-OS® Administrator’s Guide Version 10.1 1154 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | View the user acvity report by opening the file that you downloaded. The PDF version of
the report shows the user or group on which you based the report, the report me frame,
and a table of contents:
STEP 4 | Click an item in the table of contents to view the report details. For example, click Traffic
Summary by URL Category to view stascs for the selected user or group.
PAN-OS® Administrator’s Guide Version 10.1 1155 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1156 ©2022 Palo Alto Networks, Inc.
URL Filtering
3. If the firewall is enabled to prevent credenal phishing, select the Aribute Flags, the
Operator has and the Value Credenal Detected to also include events in the report that
record when a user submied a valid corporate credenal to a site.
4. (Oponal) Select a Sort By opon to set the aribute to use to aggregate the report
details. If you do not select an aribute to sort by, the report will return the first N
number of results without any aggregaon. Select a Group By aribute to use as an
PAN-OS® Administrator’s Guide Version 10.1 1157 ©2022 Palo Alto Networks, Inc.
URL Filtering
anchor for grouping data. The following example shows a report with Group By set to
App Category and Sort By set to a Count of Top 5.
PAN-OS® Administrator’s Guide Version 10.1 1158 ©2022 Palo Alto Networks, Inc.
URL Filtering
If you enable the Log container page only opon, there may not always be a correlated
URL log entry for threats detected by anvirus or vulnerability protecon.
PAN-OS® Administrator’s Guide Version 10.1 1159 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 2 | Add or modify a custom URL category and give the category a descripve Name.
STEP 3 | Set the category Type to either Category Match or URL List:
• URL List—Add URLs that you want to enforce differently than the URL category to which
they belong. Use this list type to define excepons for URL category enforcement or to
define a list of URLs as belonging to a custom category. Consult URL Category Excepons
for guidelines on creang URL list entries.
Consider the potenal matches an entry might have before adding it to a URL
category excepon list. Entries that do not end in a trailing slash (/) or asterisk (*)
may match more URLs than expected, resulng in less precise policy enforcement.
For example, if you add example.com to a list of allowed websites, the firewall
assumes an implicit asterisk and interprets that entry as example.com.*. As a
result, the firewall allows access to sites such as example.com.test.info.
You can construct domain entries with a trailing slash (example.com/) to
prevent the firewall from assuming an implicit asterisk to the right of the domain.
(See the step to Append a Trailing Slash for an overview of the trailing slash.)
• Category Match—Provide targeted enforcement for websites that match a set of
categories. The website or page must match all the categories defined in the custom
category.
PAN-OS® Administrator’s Guide Version 10.1 1160 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 5 | Select Objects > Security Profiles > URL Filtering and Add or modify a URL Filtering profile.
Your new custom category displays under Custom URL Categories:
STEP 6 | Decide how you want to enforce Site Access and User Credenal Submissions for the
custom URL category. (To control the sites to which users can submit their corporate
credenals, see Prevent Credenal Phishing.)
STEP 7 | Aach the URL Filtering profile to a Security policy rule to enforce traffic that matches that
rule.
Select Policies > Security > Acons and specify the Security policy rule to enforce traffic
based on the URL Filtering profile you just updated. Make sure to Commit your changes.
You can also use custom URL categories as Security policy rule match criteria. In this
case, you do not define site access for the URL category in a URL Filtering profile. Aer
creang a custom category, go to the Security policy rule to which you want to add the
custom URL category (Policies > Security). Then, select Service/URL Category to use
the custom URL category as match criteria for the rule.
STEP 8 | (Recommended) Enable the firewall to append a trailing slash (/) to custom URL categories
(URL List) and external dynamic lists (URL List) entries.
Aer you enable this feature, the firewall appends a trailing slash to domain entries
(example.com) that do not end in a trailing slash or asterisk (*). The trailing slash in non-
wildcard domain entries limits matches to the given domain and its subdirectories. For example,
example.com (example.com/ aer processing) matches itself and example.com/search.
The trailing slash in wildcard domain entries (entries using asterisks or carets) limits matches to
URLs that conform to the specified paern. For example, to match the entry *.example.com,
a URL must strictly begin with one or more subdomains and end with the root domain,
PAN-OS® Administrator’s Guide Version 10.1 1161 ©2022 Palo Alto Networks, Inc.
URL Filtering
admin@PA-850> configure
admin@PA-850# commit
admin@PA-850> configure
admin@PA-850# commit
We recommend manually adding trailing slashes to clarify the intended matching behavior of
an entry for anyone who inspects your URL list. The trailing slash is invisible if added by the
firewall. URL Category Excepons (PAN-OS 10.2) discusses the trailing slash and matching
behavior when this feature is enabled.
®
You have to enable this feature on each firewall running PAN-OS 10.1 or earlier.
Panorama™ management servers running PAN-OS 10.2 cannot enable this feature for
firewalls running PAN-OS 10.1 or earlier.
PAN-OS® Administrator’s Guide Version 10.1 1162 ©2022 Palo Alto Networks, Inc.
URL Filtering
You can also use a custom URL category as match criteria in a Security policy rule
(Policies > Security, and select Service/URL Category). Be sure to place the excepon
rule above any rules that block or allow the categories to which the URL excepons
belong.
• Add the URLs of sites you want to block or allow to an external dynamic list of type URL List
(Objects > External Dynamic Lists). Then, use the external dynamic list in a URL Filtering profile
or as match criteria in a Security policy rule. The benefit to using an external dynamic list is that
you can update the list without performing a configuraon change or commit on the firewall.
External dynamic lists of type URL List should not be confused with external dynamic
lists of type Domain List or IP Address. While external dynamic lists of URLs permit
domains and IP addresses, the reverse is not true and result in invalid entries.
The following guidelines describe how to populate URL category excepon lists—custom URL
categories or external dynamic lists of URLs:
• Basic Guidelines For URL Category Excepon Lists
• Wildcard Guidelines for URL Category Excepon Lists
• URL Category Excepon List—Examples
PAN-OS® Administrator’s Guide Version 10.1 1163 ©2022 Palo Alto Networks, Inc.
URL Filtering
To prevent the firewall from assuming the implicit asterisk, you can append a trailing slash
to domain entries that do not end in a / or *. The addion of the trailing slash changes the
URLs that the firewall considers a match and for which it enforces policy. In non-wildcard
domain entries, the trailing slash limits matches to the given domain and its subdirectories.
For example, example.com (example.com/ aer processing) matches itself and
example.com/search.
In wildcard domain entries (entries with asterisks or carets), the trailing slash limits
matches to URLs that conform to the specified paern. For example, to match the
entry *.example.com, a URL must include at least one subdomain and end with
the root domain, example.com. The paern is: <subdomain>.example.com;
news.example.com is a match, but example.com is not because it lacks a
subdomain.
You can enable the firewall to automacally append a trailing slash to applicable entries
using the following command line interface (CLI) commands:
admin@PA-850> configure
admin@PA-850# commit
We recommend manually adding trailing slashes to clarify the intended matching behavior
of an entry for anyone who inspects it. The trailing slash is invisible if added by the firewall.
To disable this feature:
admin@PA-850> configure
admin@PA-850# commit
®
Panorama™ management servers running PAN-OS 10.2 cannot enable this feature for
firewalls running PAN-OS 10.1 or earlier. You have to enable this feature on each firewall
running PAN-OS 10.1 or earlier.
PAN-OS® Administrator’s Guide Version 10.1 1164 ©2022 Palo Alto Networks, Inc.
URL Filtering
• Enter an exact match to the IP address or URL you want to block or allow or use wildcards to
create a paern match.
Different entries result in different exact matches. If you enter the URL for a specific
web page (example.com/contact), the firewall limits matches to that page alone.
Exact matching for a domain with a trailing slash restricts matches to the domain
itself and its subdirectories. If you enter a domain (without a trailing slash), the firewall
matches addional URLs due to the implicit asterisk.
• Consider adding the URLs most commonly used to access a website or page to your excepon
list (for example, blog.paloaltonetworks.com and paloaltonetworks.com/blog) if
the original entry is accessible from more than URL.
• The entry example.com is disnct from www.example.com. The domain name is the same,
but the second entry contains the www subdomain.
Palo Alto Networks does not support regular expression use in custom URL category or
external dynamic list entries. You must know the specific URLs or be able to construct the
URL paerns you want to match using wildcards and the following characters: . / ? &
= ; +.
Add a trailing slash (/) to domain entries to ensure the firewall ignores matches to the right
of the domain. For the trailing slash to have an impact, an entry must not end in an *.
* ^
Indicates one or more variable subdomains, Indicates one variable subdomain, root
domains, TLDs, or subdirectories. domain, or TLD.
Can use asterisk aer trailing slash, for Cannot use caret aer trailing slash. The
example, example.com/*. following entry is invalid: example.com/^.
Ex: *.domain.com matches Ex: ^.domain.com matches
docs.domain.com and docs.domain.com and
abc.xyz.domain.com. blog.domain.com.
PAN-OS® Administrator’s Guide Version 10.1 1165 ©2022 Palo Alto Networks, Inc.
URL Filtering
* ^
Key Point: Asterisks match a greater range of URLs than carets. An asterisk corresponds to any
number of consecuve tokens, while a caret corresponds to exactly one token.
An entry like xyz.*.com matches more sites than xyz.^.^.com; xyz.*.com matches sites
with any number of tokens between the strings, and xyz.^.^.com matches sites with exactly
two tokens.
The firewall interprets entries that do not end in a / or * with an implicit asterisk to
their end, which further increases the potenal matches.
• A wildcard must be the only character within a token. For example, example*.com is an
invalid entry because example and * are in the same token. An entry can contain wildcards in
more than one token, however.
• You can use asterisks and carets in the same entry (for example, *.example.^).
Do not create an entry with consecuve asterisks (*) or more than nine consecuve
carets (^)—entries like these can affect firewall performance.
For example, do not add an entry like mail.*.*.com. Instead, depending on the range
of websites you want to control access to, enter mail.*.com or mail.^.^.com.
Example Set 1
PAN-OS® Administrator’s Guide Version 10.1 1166 ©2022 Palo Alto Networks, Inc.
URL Filtering
To ensure your
entry matches
only subdomains
of the domain,
include a trailing
slash.
PAN-OS® Administrator’s Guide Version 10.1 1167 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1168 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1169 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1170 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1171 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 4 | Verify whether entries in the external dynamic list were ignored or skipped.
In a list of type URL, the firewall skips non-URL entries as invalid and ignores entries that
exceed the maximum limit for the firewall model.
To check whether you have reached the limit for an external dynamic list type, select
Objects > External Dynamic Lists and click List Capacies.
Use the following CLI command on a firewall to review the details for a list.
For example:
PAN-OS® Administrator’s Guide Version 10.1 1172 ©2022 Palo Alto Networks, Inc.
URL Filtering
The client browser will display cerficate errors if it does not trust the
cerficate.
• Redirect—The firewall intercepts HTTP or HTTPS traffic to a URL category set to
override and redirects the request to a Layer 3 interface on the firewall using an HTTP
302 redirect in order to prompt for the override password. If you select this opon,
you must provide the Address (IP address or DNS hostname) to which to redirect the
traffic.
7. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1173 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | (Redirect mode only) Create a Layer 3 interface to which to redirect web requests to sites in a
category configured for override.
1. Create a management profile to enable the interface to display the URL Filtering
Connue and Override Page response page:
1. Select Network > Interface Mgmt and click Add.
2. Enter a Name for the profile, select Response Pages, and then click OK.
2. Create the Layer 3 interface. Be sure to aach the management profile you just created
(on the Advanced > Other Info tab of the Ethernet Interface dialog).
STEP 4 | (Redirect mode only) To transparently redirect users without displaying cerficate errors,
install a cerficate that matches the IP address of the interface to which you are redirecng
web requests to a site in a URL category configured for override.You can either generate a
self-signed cerficate or import a cerficate that is signed by an external CA.
To use a self-signed cerficate, you must first create a root CA cerficate and then use that CA
to sign the cerficate you will use for URL admin override as follows:
1. To create a root CA cerficate, select Device > Cerficate Management > Cerficates >
Device Cerficates and then click Generate. Enter a Cerficate Name, such as RootCA.
Do not select a value in the Signed By field (this is what indicates that it is self-signed).
Make sure you select the Cerficate Authority check box and then click Generate the
cerficate.
2. To create the cerficate to use for URL admin override, click Generate. Enter a
Cerficate Name and enter the DNS hostname or IP address of the interface as the
Common Name. In the Signed By field, select the CA you created in the previous step.
Add an IP address aribute and specify the IP address of the Layer 3 interface to which
you will be redirecng web requests to URL categories that have the override acon.
3. Generate the cerficate.
4. To configure clients to trust the cerficate, select the CA cerficate on the Device
Cerficates tab and click Export. You must then import the cerficate as a trusted root
CA into all client browsers, either by manually configuring the browser or by adding the
cerficate to the trusted roots in an Acve Directory Group Policy Object (GPO).
STEP 5 | Specify which URL categories require an override password to enable access.
1. Select Objects > URL Filtering and either select an exisng URL Filtering profile or Add a
new one.
2. On the Categories tab, set the Acon to override for each category that requires a
password.
3. Complete any remaining secons on the URL Filtering profile and then click OK to save
the profile.
STEP 6 | Apply the URL Filtering profile to the Security policy rule(s) that allows access to the sites
requiring password override for access.
1. Select Policies > Security and select the appropriate Security policy to modify it.
2. Select the Acons tab and in the Profile Seng secon, click the drop-down for URL
Filtering and select the profile.
3. Click OK to save.
PAN-OS® Administrator’s Guide Version 10.1 1174 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1175 ©2022 Palo Alto Networks, Inc.
URL Filtering
Group Mapping Group Mapping The firewall checks to determine if the username a
configuraon on user submits to a restricted site matches any valid
the firewall corporate username.
To do this, the firewall matches the submied
username to the list of usernames in its user-to-group
mapping table to detect when users submit corporate
usernames to sites in a restricted category.
This method only checks for corporate username
submissions based on LDAP group membership, which
PAN-OS® Administrator’s Guide Version 10.1 1176 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1177 ©2022 Palo Alto Networks, Inc.
URL Filtering
The Domain Credenal Filter detecon method is supported with the Windows User-ID
agent only. You cannot use the PAN-OS integrated User-ID agent to configure this method
of credenal detecon.
An RODC is a Microso Windows server that maintains a read-only copy of an Acve Directory
database that a domain controller hosts. When the domain controller is located at a corporate
headquarters, for example, RODCs can be deployed in remote network locaons to provide local
authencaon services. Installing the User-ID agent on an RODC can be useful for a few reasons:
access to the domain controller directory is not required to enable credenal detecon and you
can support credenal detecon for a limited or targeted set of users. Because the directory the
RODC hosts is read-only, the directory contents remain secure on the domain controller.
Because you must install the Windows User-ID agent on the RODC for credenal
detecon, as a best pracce deploy a separate agent for this purpose. Do not use the User-
ID agent installed on the RODC to map IP addresses to users.
Aer you install the User-ID agent on an RODC, the User-ID credenal service runs in the
background and scans the directory for the usernames and password hashes of group members
that are listed in the RODC password replicaon policy (PRP)—you can define who you want to
be on this list. The User-ID credenal service then takes the collected usernames and password
hashes and deconstructs the data into a type of bit mask called a bloom filter. Bloom filters are
compact data structures that provide a secure method to check if an element (a username or
a password hash) is a member of a set of elements (the sets of credenals you have approved
for replicaon to the RODC). The User-ID credenal service forwards the bloom filter to the
Windows User-ID agent; the firewall retrieves the latest bloom filter from the User-ID agent at
regular intervals and uses it to detect usernames and password hash submissions. Depending
on your sengs, the firewall then blocks, alerts, or allows on valid password submissions to web
PAN-OS® Administrator’s Guide Version 10.1 1178 ©2022 Palo Alto Networks, Inc.
URL Filtering
pages, or displays a response page to users warning them of the dangers of phishing, but allowing
them to connue with the submission.
Throughout this process, the User-ID agent does not store or expose any password hashes, nor
does it forward password hashes to the firewall. Once the password hashes are deconstructed into
a bloom filter, there is no way to recover them.
STEP 1 | Configure user mapping using the Windows User-ID agent.
To enable credenal detecon, you must install the Windows User-ID agent on an
RODC. Refer to the Compability Matrix for a list of supported servers. Install a
separate User-ID agent for this purpose.
Important items to remember when seng up User-ID to enable Domain Credenal Filter
detecon:
• Because the effecveness of credenal phishing detecon is dependent on your RODC
setup, make sure that you also review best pracces and recommendaons for RODC
Administraon.
• Download User-ID soware updates:
• User-ID Agent Windows installer—UaInstall-x.x.x-x.msi.
• User-ID Agent Credenal Service Windows installer—UaCredInstall64-x.x.x-x.msi.
• Install the User-ID agent and the User Agent Credenal service on an RODC using an
account that has privileges to read Acve Directory via LDAP (the User-ID agent also
requires this privilege).
• The User-ID Agent Credenal Service requires permission to log on with the local system
account. For more informaon, refer to Create a Dedicated Service Account for the User-
ID Agent.
• The service account must be a member of the local administrator group on the RODC.
For more informaon, refer to the following link.
STEP 2 | Enable the User-ID agent and the User Agent Credenal service (which runs in the
background to scan permied credenals) to share informaon.
1. On the RODC server, launch the User-ID Agent.
2. Select Setup and edit the Setup secon.
3. Select the Credenals tab. This tab only displays if you have already installed the User-ID
Agent Credenal Service.
4. Select Import from User-ID Credenal Agent. This enables the User-ID agent to import
the bloom filter that the User-ID credenal agent creates to represent users and the
corresponding password hashes.
5. Click OK, Save your sengs, and Commit.
PAN-OS® Administrator’s Guide Version 10.1 1179 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | In the RODC directory, define the group of users for which you want to support credenal
submission detecon.
• Confirm that the groups that should receive credenal submission enforcement are added
to the Allowed RODC Password Replicaon Group.
• Check that none of the groups in the Allowed RODC Password Replicaon Group are also in
the Denied RODC Password Replicaon Group by default. Groups listed in both will not be
subject to credenal phishing enforcement.
Before enabling credenal phishing prevenon, verify that the Primary Username that
you configure on the firewall uses the sAMAccountName aribute. Credenal phishing
prevenon does not support alternate aributes.
STEP 2 | If you have not done so already, configure a best pracce URL Filtering profile to ensure
protecon against URLs that have been observed hosng malware or exploive content.
1. Select Objects > Security Profiles > URL Filtering and Add or modify a URL Filtering
profile.
2. Block access to all known dangerous URL categories: malware, phishing, dynamic-dns,
unknown, command-and-control, extremism, copyright-infringement, proxy-avoidance-
and-anonymizers, newly-registered-domain, grayware, and parked.
PAN-OS® Administrator’s Guide Version 10.1 1180 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | (Oponal but recommended)Add a Decrypon policy rule to decrypt the traffic you want to
monitor for user credenal submissions.
Because many websites decrypt traffic using SSL or TLS by default, configuring a
decrypon policy rule for user traffic is a best pracces to help ensure that the firewall
detects credenal submissions even if traffic is encrypted.
STEP 4 | Configure the URL Filtering profile to detect corporate credenal submissions to websites
that are in allowed URL categories.
The firewall does not check credenal submissions for trusted sites, even if you enable
the checks for the URL categories for these sites, to provide best performance. The
trusted sites represent sites where Palo Alto Networks has not observed any malicious
or phishing aacks. Updates for this trusted sites list are delivered through Applicaon
and Threat content updates. For a list of App-IDs that are exempt from credenal
detecon, see Trusted App-IDs That Skip Credenal Submission Detecon on
live.paloaltonetworks.com.
Confirm that the format for the primary username is the same as the username
format that the User-ID source provides.
• Use IP User Mapping—Checks for valid corporate username submissions and verifies
that the login username maps to the source IP address of the session. To do this, the
firewall matches the submied username and source IP address of the session against
its IP-address-to-username mapping table. To use this method you can use any of the
user mapping methods described in map IP addresses to users.
• Use Domain Credenal Filter—Checks for valid corporate usernames and password
submissions and verifies that the username maps to the IP address of the logged in
user. See Configure Credenal Detecon with the Windows-based User-ID Agent for
instrucons on how to set up User-ID to enable this method.
• Use Group Mapping—Checks for valid username submissions based on the user-
to-group mapping table populated when you configure the firewall to map users to
groups.
With group mapping, you can apply credenal detecon to any part of the directory,
or for specific groups that have access to your most sensive applicaons, such as IT.
PAN-OS® Administrator’s Guide Version 10.1 1181 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 6 | Apply the URL Filtering profile with the credenal detecon sengs to your Security policy
rules.
1. Select Policies > Security and Add or modify a Security policy rule.
2. On the Acons tab, set the Profile Type to Profiles.
3. Select the new or updated URL Filtering profile to aach it to the Security policy rule.
4. Select OK to save the Security policy rule.
Select ACC > Hosts Vising Malicious URLs to see the number of users who have
visited malware and phishing sites.
To display this column, hover over any column header and click the arrow to select the columns
you’d like to display.
Log entry details also indicate credenal submissions:
The output for this command varies depending on the method configured for the firewall
to detect credenal submissions. For example, if the Domain Credenal Filter method is
PAN-OS® Administrator’s Guide Version 10.1 1182 ©2022 Palo Alto Networks, Inc.
URL Filtering
configured in any URL Filtering profile, a list of User-ID agents that have forwarded a bloom
filter to the firewall is displayed, along with the number of credenals contained in the bloom
filter.
• (Group Mapping method only) Use the following CLI command to view group mapping
informaon, including the number of URL Filtering profiles with Group Mapping credenal
detecon enabled and the usernames of group members that have aempted to submit
credenals to a restricted site.
• (Domain Credenal Filter method only) Use the following CLI command to see all Windows-
based User-ID agents that are sending mappings to the firewall:
The command output now displays bloom filter counts that include the number of bloom
filter updates the firewall has received from each agent, if any bloom filter updates failed to
process, and how many seconds have passed since the last bloom filter update.
• (Domain Credenal Filter method only) The Windows-based User-ID agent displays log
messages that reference BF (bloom filter) pushes to the firewall. In the User-ID agent
interface, select Monitoring > Logs.
PAN-OS® Administrator’s Guide Version 10.1 1183 ©2022 Palo Alto Networks, Inc.
URL Filtering
Palo Alto Networks can no longer detect if Google SafeSearch is enabled due to
changes in Google’s implementaon. As a result, the firewall cannot enforce safe search
by the default method. You may sll enforce safe search using the transparent method.
However, we cannot guarantee that Google will filter out explicit images and content.
• Transparently Enable Safe Search for Users (Supported for Yahoo and Bing only)—The firewall
redirects the search query to a URL that returns strictly filtered search results. To enable this
funconality, you’ll need to replace the text in the predefined URL Filtering Safe Search Block
Page file with text that contains JavaScript for rewring search query URLs to include strict
safe search parameters for the detected search engine. The procedure provides text that you
can copy and paste into the new block page file.
The browser does not display the URL Filtering Safe Search Block Page.
Get started with safe search enforcement by reviewing safe search sengs for supported search
providers.
Safe search is a best-effort seng, and search providers cannot guarantee complete
filtering accuracy. Addionally, search providers classify sites as safe or unsafe (not Palo
Alto Networks). Sites that a search provider classifies as "safe" may contain explicit
content.
PAN-OS® Administrator’s Guide Version 10.1 1184 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1185 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1186 ©2022 Palo Alto Networks, Inc.
URL Filtering
Palo Alto Networks can no longer detect if Google SafeSearch is on due to changes in
Google’s implementaon. As a result, the firewall cannot enforce safe search using this
method. You may sll enforce safe search transparently. However, we cannot guarantee
that Google will filter out explicit images and content.
STEP 2 | Add the URL Filtering profile to the Security policy rule that allows traffic from clients in the
trust zone to the Internet.
1. Select Policies > Security. Then, click the rule to which you want to apply the URL
Filtering profile.
2. On the Acons tab, find Profile Seng. For Profile Type, select Profiles. A list of profiles
appears.
3. For the URL Filtering profile, select the profile you created earlier.
4. Click OK to save the Security policy rule.
PAN-OS® Administrator’s Guide Version 10.1 1187 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | Create a custom URL category for the supported search engines.
In the following step, you’ll specify that you want to decrypt traffic to the sites in the custom
category.
1. Select Objects > Custom Objects > URL Category and Add a custom category.
2. Enter a Name for the category, such as SearchEngineDecryption.
3. Add the following entries to the Sites list:
• www.bing.*
• search.yahoo.*
• yandex.com.*
4. Click OK to save the custom URL category.
This verificaon step only works if you use block pages to enforce safe search. There is
an alternave verificaon step if you enable safe search transparently.
1. From a computer behind the firewall, disable the strict search sengs for a supported
search provider. For example, on bing.com, click the Preferences icon on the Bing menu
bar.
4. Use the link on the block page to update the safe search seng to the strictest seng
(Strict in the case of Bing), and then click Save.
5. Perform a search again from Bing and verify that the filtered search results display
instead of the block page.
PAN-OS® Administrator’s Guide Version 10.1 1188 ©2022 Palo Alto Networks, Inc.
URL Filtering
The URL Filtering Safe Search Block Page does not display in the browser.
This funconality is supported for Bing and Yahoo search engines only and requires
Content Release version 475 or later.
STEP 1 | Make sure the firewall is running Content Release version 475 or later.
1. Select Device > Dynamic Updates.
2. Check the Applicaons and Threats secon to determine what update is currently
running.
3. If the firewall is not running the required update or later, click Check Now to retrieve a
list of available updates.
4. Locate the required update and click Download.
5. Aer the download completes, click Install.
PAN-OS® Administrator’s Guide Version 10.1 1189 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | Add the URL Filtering profile to the Security policy rule that allows traffic from clients in the
trust zone to the Internet.
1. Select Policies > Security. Then, click the rule to which you want to apply the URL
Filtering profile.
2. On the Acons tab, find Profile Seng. For Profile Type, select Profiles. A list of profiles
appears.
3. For the URL Filtering profile, select the profile you created earlier.
4. Click OK to save the Security policy rule.
STEP 4 | Edit the URL Filtering Safe Search Block Page, replacing the exisng code with JavaScript for
rewring search query URLs.
1. Select Device > Response Pages > URL Filtering Safe Search Block Page.
2. Select Predefined and then click Export to save the file locally.
3. Use an HTML editor and replace all of the exisng block page text with the following
text. Then, save the file.
<html>
<head>
<title>Search Blocked</title>
<meta http-equiv="Content-Type" content="text/html;
charset=utf-8">
<meta http-equiv="pragma" content="no-cache">
<meta name="viewport" content="initial-scale=1.0">
<style>
#content {
border:3px solid#aaa;
background-color:#fff;
margin:1.5em;
padding:1.5em;
font-family:Tahoma,Helvetica,Arial,sans-serif;
font-size:1em;
}
h1 {
font-size:1.3em;
font-weight:bold;
color:#196390;
}
b {
font-weight:normal;
color:#196390;
}
</style>
</head>
<body bgcolor="#e7e8e9">
<div id="content">
<h1>Search Blocked</h1>
<p>
<b>User:</b>
<user/>
</p>
<p>Your search results have been blocked because your
search settings are not in accordance with company policy.
PAN-OS® Administrator’s Guide Version 10.1 1190 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 5 | Import the edited URL Filtering Safe Search Block page onto the firewall.
1. Select Device > Response Pages > URL Filtering Safe Search Block Page.
2. Click Import. Then, Browse for the block page file or enter the path and filename in the
Import File field.
3. (Oponal) For Desnaon, select either the virtual system on which the login page will
be used or shared to make it available to all virtual systems.
4. Click OK to import the file.
PAN-OS® Administrator’s Guide Version 10.1 1191 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 6 | Create a custom URL category for the supported search engines.
In the following step, you’ll specify that you want to decrypt traffic to the sites in the custom
category.
1. Select Objects > Custom Objects > URL Category and Add a custom category.
2. Enter a Name for the category, such as SearchEngineDecryption.
3. Add the following entries to the Sites list:
• www.bing.*
• search.yahoo.*
• yandex.com.*
4. Click OK to save the custom URL category.
PAN-OS® Administrator’s Guide Version 10.1 1192 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1193 ©2022 Palo Alto Networks, Inc.
URL Filtering
search is performed using Google, Bing, Yahoo, or Yandex and their browser or search engine
account seng for Safe Search is not set to strict.
PAN-OS® Administrator’s Guide Version 10.1 1194 ©2022 Palo Alto Networks, Inc.
URL Filtering
You can either use the predefined pages, or you can customize the URL Filtering response pages
to communicate your specific acceptable use policies and/or corporate branding. In addion, you
can use the URL Filtering response page variables for substuon at the me of the block event
or add one of the supported response page references to external images, sounds, or style sheets.
The browser will not display response pages if you have enabled your firewall to inspect
SSL/TLS handshakes.
Variable Usage
<user/> The firewall replaces the variable with the username (if available via
User-ID) or IP address of the user when displaying the response page.
<url/> The firewall replaces the variable with the requested URL when
displaying the response page.
<category/> The firewall replaces the variable with the URL filtering category of the
blocked request.
<pan_form/> HTML code for displaying the Connue buon on the URL Filtering
Connue and Override page.
You can also add code that triggers the firewall to display different messages depending on what
URL category the user is aempng to access. For example, the following code snippet from
a response page specifies to display Message 1 if the URL category is games, Message 2 if the
category is travel, or Message 3 if the category is kids:
Only a single HTML page can be loaded into each virtual system for each type of block page.
However, other resources such as images, sounds, and cascading style sheets (CSS files) can be
loaded from other servers at the me the response page is displayed in the browser. All references
must include a fully qualified URL.
PAN-OS® Administrator’s Guide Version 10.1 1195 ©2022 Palo Alto Networks, Inc.
URL Filtering
Image
<img src="http://virginiadot.org/images/Stop-Sign
-gif.gif">
Sound
<embed src="http://simplythebest.net/sounds/WAV/W
AV_files/ movie_WAV_files/ do_not_go.wav" volume=
"100" hidden="true" autostart="true">
Style Sheet
<link href="http://example.com/style.css" rel="st
ylesheet" type="text/css" />
Hyperlink
<a href="http://en.wikipedia.org/wiki/Acceptable_
use_policy">View Corporate
Policy</a>
PAN-OS® Administrator’s Guide Version 10.1 1196 ©2022 Palo Alto Networks, Inc.
URL Filtering
Custom response pages larger than the maximum supported size are not decrypted or
displayed to users. In PAN-OS 8.1.2 and earlier PAN-OS 8.1 releases, custom response
pages on a decrypted site cannot exceed 8,191 bytes; the maximum size is increased to
17,999 bytes in PAN-OS 8.1.3 and later releases.
PAN-OS® Administrator’s Guide Version 10.1 1197 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1198 ©2022 Palo Alto Networks, Inc.
URL Filtering
You can also use HTTP headers to manage access to SaaS applicaons. You don’t need a
URL Filtering license to do this, but you must use a URL Filtering profile to turn this feature
on.
Aribute Descripon
User-Agent The web browser that the user used to access the URL, for
example, Internet Explorer. This informaon is sent in the
HTTP request to the server.
The HTTP header does not contain the full string for the User
Agent. The maximum logged bytes from the packet preceding
the packet containing the header-end is 36 bytes.
Referer The URL of the web page that linked the user to another web
page; it is the source that redirected (referred) the user to the
web page that is being requested.
X-Forwarded-For (XFF) The opon in the HTTP request header field that preserves
the IP address of the user who requested the web page. If you
have a proxy server on your network, the XFF allows you to
idenfy the IP address of the user who requested the content,
instead of only recording the proxy server’s IP address as
source IP address that requested the web page.
Headers Inserted The type of header and the text of the header that the firewall
inserts.
PAN-OS® Administrator’s Guide Version 10.1 1199 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1200 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | Review the URL categories, and if you don’t think that they’re accurate, select Request
Change.
PAN-OS® Administrator’s Guide Version 10.1 1201 ©2022 Palo Alto Networks, Inc.
URL Filtering
From here you can complete the request form, and submit it.
PAN-OS® Administrator’s Guide Version 10.1 1202 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1203 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 2 | Verify whether Advanced URL Filtering has been acvated by running the following
command:
show system setting url-database
If the response is paloaltonetworks, PAN-DB, the Palo Alto Networks URL filtering
database, is the acve vendor.
STEP 3 | Verify that the firewall has a valid Advanced URL Filtering license by running the following
command:
request license info
You should see the license entry Feature: Advanced URL Filtering. If the license is
not installed, you will need to obtain and install a license. See Configure URL Filtering.
PAN-OS® Administrator’s Guide Version 10.1 1204 ©2022 Palo Alto Networks, Inc.
URL Filtering
If the cloud is not accessible, the expected response is similar to the following:
For example, if your management interface IP address is 10.1.1.5, run the following command:
Is the firewall in an HA configuraon? Verify that the HA state of the firewalls is in the acve,
acve-primary, or acve-secondary state. Access to the PAN-DB cloud will be blocked if the
firewall is in a different state. Run the following command on each firewall in the pair to see the
state:
If you sll have problems with connecvity between the firewall and the PAN-DB cloud, contact
Palo Alto Networks support.
PAN-OS® Administrator’s Guide Version 10.1 1205 ©2022 Palo Alto Networks, Inc.
URL Filtering
cloud connecon status and URL classificaon does not apply to expired subscripon licenses
or unlicensed users. For a detailed explanaon of the URL categorizaon process, see How URL
Filtering Works.
Use the following workflow to troubleshoot why some or all of the URLs being idenfied by PAN-
DB are classified as not-resolved:
STEP 1 | Check the PAN-DB cloud connecon by running the show url-cloud status CLI
command.
The Cloud connection: field should show connected. If you see anything other than
connected, then any URL that does not exist in the management plane cache will be
categorized as not-resolved. To resolve this issue, see PAN-DB Cloud Connecvity Issues.
STEP 2 | If the cloud connecon status shows connected, check the current ulizaon of the
firewall.
If firewall ulizaon is spiking, URL requests may be dropped (may not reach the management
plane) and will be categorized as not-resolved.
To view system resources, run the show system resources CLI command. Then, view the
%CPU and %MEM columns.
You can also view system resources on the System Resources widget on the Dashboard in the
web interface.
Incorrect Categorizaon
Somemes you may come across a URL that you believe is categorized incorrectly. Use the
following workflow to determine the URL categorizaon for a site and request a category change,
if appropriate.
PAN-OS® Administrator’s Guide Version 10.1 1206 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 1 | Verify the category in the dataplane by running the following command:
For example, to view the category for the Palo Alto Networks website, run the following
command:
If the URL stored in the dataplane cache has the correct category (computer-and-internet-
info in this example), then the categorizaon is correct and no further acon is required. If the
category is not correct, connue to the next step.
STEP 2 | Verify if the category in the management plane by running the command:
For example:
If the URL stored in the management plane cache has the correct category, remove the URL
from the dataplane cache by running the following command:
The next me the firewall requests the category for this URL, the request will be forwarded to
the management plane. This will resolve the issue and no further acon is required. If this does
not solve the issue, go to the next step to check the URL category on the cloud systems.
STEP 3 | Verify the category in the cloud by running the following command:
PAN-OS® Administrator’s Guide Version 10.1 1207 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 4 | If the URL stored in the cloud has the correct category, remove the URL from the dataplane
and the management plane caches.
Run the following command to delete a URL from the dataplane cache:
Run the following command to delete a URL from the management plane cache:
The next me the firewall queries for the category of the given URL, the request will be
forwarded to the management plane and then to the cloud. This should resolve the category
lookup issue. If problems persist, see the next step to submit a categorizaon change request.
STEP 5 | To submit a change request from the web interface, go to the URL log and select the log
entry for the URL you would like to have changed.
STEP 6 | Click the Request Categorizaon change link and follow instrucons. You can also request
a category change from the Palo Alto Networks Test A Site website by searching for the
URL and then clicking the Request Change icon. To view a list of all available categories
with descripons of each category, refer to hps://urlfiltering.paloaltonetworks.com/
CategoryList.aspx.
If your change request is approved, you will receive an email noficaon. You then have two
opons to ensure that the URL category is updated on the firewall:
• Wait unl the URL in the cache expires and the next me the URL is accessed by a user, the
new categorizaon update will be put in the cache.
• Run the following command to force an update in the cache:
PAN-OS® Administrator’s Guide Version 10.1 1208 ©2022 Palo Alto Networks, Inc.
URL Filtering
Firewalls running PAN-OS 5.0 or later versions can communicate with the PAN-DB private
cloud.
When you set up the PAN-DB private cloud, you can either configure the M-600 appliance(s) to
have direct internet access or keep it completely offline. Because the M-600 appliance requires
database and content updates to perform URL lookups, if the appliance does not have an acve
internet connecon, you must manually download the updates to a server on your network and
then, import the updates using SCP into each M-600 appliance in the PAN-DB private cloud. In
addion, the appliances must be able to obtain the seed database and any other regular or crical
content updates for the firewalls that it services.
To authencate the firewalls that connect to the PAN-DB private cloud, a set of default server
cerficates are packaged with the appliance; you cannot import or use another server cerficate
for authencang the firewalls. If you change the hostname on the M-600 appliance, the
appliance automacally generates a new set of cerficates to authencate the firewalls.
• M-600 Appliance for PAN-DB Private Cloud
• Set Up the PAN-DB Private Cloud
PAN-OS® Administrator’s Guide Version 10.1 1209 ©2022 Palo Alto Networks, Inc.
URL Filtering
Table 4: Differences Between the PAN-DB Public Cloud and PAN-DB Private Cloud
Content and Content (regular and crical) updates Content updates and full URL
Database and full database updates are database updates are available once a
Updates published mulple mes during day during the work week.
the day. The PAN-DB public cloud
updates the URL categories malware
and phishing every five minutes. The
firewall checks for crical updates
whenever it queries the cloud
servers for URL lookups.
Unresolved If the firewall cannot resolve a URL If the firewall cannot resolve a query,
URL Queries query, the request is sent to the the request is sent to the M-600
servers in the public cloud. appliance(s) in the PAN-DB private
cloud. If there is no match for the
URL, the PAN-DB private cloud sends
a category unknown response to the
firewall; the request is not sent to
the public cloud unless you have
configured the M-600 appliance to
access the PAN-DB public cloud.
If the M-600 appliance(s) that
constute your PAN-DB private cloud
is configured to be completely offline,
PAN-OS® Administrator’s Guide Version 10.1 1210 ©2022 Palo Alto Networks, Inc.
URL Filtering
The M-600 appliance in PAN-DB mode uses two ports- MGT (Eth0) and Eth1; Eth2
is not used in PAN-DB mode. The management port is used for administrave access
to the appliance and for obtaining the latest content updates from the PAN-DB public
cloud. For communicaon between the appliance (PAN-DB server) and the firewalls on
the network, you can use the MGT port or Eth1.
PAN-OS® Administrator’s Guide Version 10.1 1211 ©2022 Palo Alto Networks, Inc.
URL Filtering
URL might require changing the IP address on the computer to an address in the
192.168.1.0 network (for example, 192.168.1.2).
2. When prompted, log in to the appliance. Log in using the default username and password
(admin/admin). The appliance will begin to inialize.
3. Configure network access sengs including the IP address for the MGT interface:
where <server-IP> is the IP address you want to assign to the management interface of
the server, <netmask> is the subnet mask, <gateway-IP> is the IP address of the network
gateway, and <DNS-IP> is the IP address of the primary DNS server.
4. Configure network access sengs including the IP address for the Eth1 interface:
where <server-IP> is the IP address you want to assign to the data interface of the server,
<netmask> is the subnet mask, <gateway-IP> is the IP address of the network gateway,
and <DNS-IP> is the IP address of the DNS server.
5. Save your changes to the PAN-DB server.
commit
You can switch from Panorama mode to PAN-DB mode and back; and from
Panorama mode to Log Collector mode and back. Switching directly from
PAN-DB mode to Log Collector mode or vice versa is not supported. When
switching operaonal mode, a data reset is triggered. With the excepon of
management access sengs, all exisng configuraon and logs will be deleted on
restart.
2. Use the following command to verify that the mode is changed:
show pan-url-cloud-status
hostname: M-600
ip-address: 1.2.3.4
netmask: 255.255.255.0
default-gateway: 1.2.3.1
ipv6-address: unknown
ipv6-link-local-address: fe80:00/64
ipv6-default-gateway:
mac-address: 00:56:90:e7:f6:8e
PAN-OS® Administrator’s Guide Version 10.1 1212 ©2022 Palo Alto Networks, Inc.
URL Filtering
3. Use the following command to check the version of the cloud database on the appliance:
show pan-url-cloud-status
Cloud status: Up
URL database version: 20150417-220
PAN-OS® Administrator’s Guide Version 10.1 1213 ©2022 Palo Alto Networks, Inc.
URL Filtering
The appliance only stores the currently running version of the content and one earlier
version.
Pick one of the following methods of installing the content and database updates:
• If the PAN-DB server has direct Internet access use the following commands:
1. To check whether a new version is published use:
request pan-url-db upgrade check
2. To check the version that is currently installed on your server use:
request pan-url-db upgrade info
3. To download and install the latest version:
• request pan-url-db upgrade download latest
• request pan-url-db upgrade install <version latest | file>
• If the PAN-DB server is offline, access the Palo Alto Networks Customer Support web site
to download and save the content updates to an SCP server on your network. You can then
import and install the updates using the following commands:
• scp import pan-url-db remote-port <port-number> from
username@host:path
PAN-OS® Administrator’s Guide Version 10.1 1214 ©2022 Palo Alto Networks, Inc.
URL Filtering
The appliance has a default admin account. Any addional administrave users that
you create can either be superusers (with full access) or superusers with read-only
access.
PAN-DB private cloud does not support the use of RADIUS VSAs. If the VSAs used on
the firewall or Panorama are used for enabling access to the PAN-DB private cloud, an
authencaon failure will occur.
• To set up a local administrave user on the PAN-DB server:
1. configure
2. set mgt-config users <username> permissions role-based
<superreader | superuser> yes
4. Enter password:xxxxx
5. Confirm password:xxxxx
6. commit
• To set up an administrave user with RADIUS authencaon:
1. Create RADIUS server profile.
2. Create authencaon-profile.
PAN-OS® Administrator’s Guide Version 10.1 1215 ©2022 Palo Alto Networks, Inc.
URL Filtering
role-based {
superuser yes;
}
}
}
admin_user_2 {
permissions {
role-based {
superreader yes;
}
}
authentication-profile RADIUS;
}
}
> configure
Or, in the web interface for each firewall, select Device > Setup > Content-ID, edit the URL
Filtering secon and enter the PAN-DB Server IP address(es) or FQDN(s). The list must be
comma separated.
• To delete the entries for the private PAN-DB servers, use the following command:
When you delete the list of private PAN-DB servers, a re-elecon process is triggered on
the firewall. The firewall first checks for the list of PAN-DB private cloud servers and when
it cannot find one, the firewall accesses the PAN-DB servers in the AWS cloud to download
the list of eligible servers to which it can connect.
PAN-OS® Administrator’s Guide Version 10.1 1216 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | To verify that the change is effecve, use the following CLI command on the firewall:
admin@M-600> configure
STEP 3 | Use TFTP or SCP to import the key pair that contains the server cerficate and private key
for the PAN-DB M-600 appliance.
PAN-OS® Administrator’s Guide Version 10.1 1217 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 4 | Configure a cerficate profile that includes the root CA and intermediate CA. This cerficate
profile defines the device authencaon between the PAN-DB server and the firewall.
1. In the CLI of the PAN-DB server, enter configuraon mode.
admin@M-600> configure
PAN-OS® Administrator’s Guide Version 10.1 1218 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 5 | Configure an SSL/TLS profile for the PAN-DB M-600 appliance. This profile defines the
cerficate and protocol range that PAN-DB and client devices use for SSL/TLS services.
1. Idenfy the SSL/TLS profile.
PAN-OS 8.0 and later releases support TLS 1.2 and later TLS versions only. You
must set the max version to TLS 1.2 or max.
3. Set the disconnect wait me in number of minutes that PAN-DB should wait before
breaking and reestablishing the connecon with its firewall (range is 0 to 44,640).
STEP 7 | Import the CA cerficate to validate the cerficate for the PAN-DB M-600 appliance.
1. Log in to the firewall web interface.
2. Import the CA cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1219 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 9 | Configure the cerficate profile for the firewall. You can configure this on each firewall
individually or you can push the configuraon from Panorama to the firewalls as part of a
template.
1. Select Device > Cerficate Management > Cerficate Profile for firewalls or Panorama >
Cerficate Management > Cerficate Profile for Panorama.
2. Configure a Cerficate Profile.
STEP 10 | Deploy custom cerficates on each firewall. You can either deploy cerficates centrally from
Panorama or configure them manually on each firewall.
1. Log in to the firewall web interface.
2. Select Device > Setup > Management for a firewall or Panorama > Setup > Management
for Panorama and Edit the Secure Communicaon
3. Select the Cerficate Type, Cerficate, and Cerficate Profile from the respecve drop-
downs.
4. In the Customize Communicaon sengs, select PAN-DB Communicaon.
5. Click OK.
6. Commit your changes.
Aer comming your changes, the firewalls do not terminate their current sessions with
the PAN-DB server unl aer the Disconnect Wait Time. The disconnect wait me begins
counng down aer you enforce the use of custom cerficates in the next step.
STEP 11 | Aer deploying custom cerficates on all firewalls, enforce custom cerficate authencaon.
1. Log in to the CLI on the PAN-DB server and enter configuraon mode.
admin@M-600> configure
Aer comming this change, the disconnect wait me begins counng down (if you
configured seng on PAN-DB). When the wait me ends, PAN-DB and its firewall connect
using only the configured cerficates.
STEP 12 | You have two choices when adding new firewalls or Panorama to your PAN-DB private cloud
deployment.
• If you did not enable Custom Cerficates Only then you can add a new firewall to the PAN-
DB private cloud and then deploy the custom cerficate as described above.
• If you enabled Custom Cerficates Only on the PAN-DB private cloud, then you can must
deploy the custom cerficates on the firewalls before connecng them to the PAN-DB
private cloud.
PAN-OS® Administrator’s Guide Version 10.1 1220 ©2022 Palo Alto Networks, Inc.
URL Filtering
URL Filtering response pages do not display for sites blocked during SSL/TLS handshake
inspecons. Aer detecng traffic from blocked categories, the firewall resets the HTTPS
connecon, ending the handshake and prevenng user noficaon by response page.
Instead, the browser displays a standard connecon error message.
You can find details of successful SSL/TLS handshakes and sessions in theTraffic and
Decrypon logs. If the firewall blocks web sessions during the SSL/TLS handshake, it does
not generate Decrypon logs. However, you can find details of failed sessions in the URL
Filtering logs.
The following procedure details the requirements and steps to enable SSL/TLS handshake
inspecon:
STEP 1 | Select Device > Licenses to confirm that you have an acve Advanced URL Filtering or
legacy URL Filtering license.
STEP 2 | Verify that you decrypt SSL/TLS traffic through either SSL Forward Proxy or SSL Inbound
Inspecon.
PAN-OS® Administrator’s Guide Version 10.1 1221 ©2022 Palo Alto Networks, Inc.
URL Filtering
STEP 3 | Enable inspecon of SSL/TLS handshakes by CTD. By default, the opon is disabled.
PAN-OS® Administrator’s Guide Version 10.1 1222 ©2022 Palo Alto Networks, Inc.
URL Filtering
PAN-OS® Administrator’s Guide Version 10.1 1223 ©2022 Palo Alto Networks, Inc.
URL Filtering
1. Select Device > Setup > Session > Decrypon Sengs > SSL Decrypon Sengs.
2. Select Send handshake messages to CTD for inspecon.
Alternavely, you can use the set deviceconfig setting ssl-decrypt scan-
handshake <yes|no> CLI command.
3. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1224 ©2022 Palo Alto Networks, Inc.
Quality of Service
Quality of Service (QoS) is a set of technologies that work on a network to guarantee
its ability to dependably run high-priority applicaons and traffic under limited
network capacity. QoS technologies accomplish this by providing differenated
handling and capacity allocaon to specific flows in network traffic. This enables the
network administrator to assign the order in which traffic is handled, and the amount
of bandwidth afforded to traffic.
Palo Alto Networks Applicaon Quality of Service (QoS) provides basic QoS applied to
networks and extends it to provide QoS to applicaons and users.
Use the following topics to learn about and configure Palo Alto Networks applicaon-
based QoS:
Use the Palo Alto Networks product comparison tool to view the QoS features
supported on your firewall model. Select two or more product models and click
Compare Now to view QoS feature support for each model (for example, you can
check if your firewall model supports QoS on subinterfaces and if so, the maximum
number of subinterfaces on which QoS can be enabled).
QoS on Aggregate Ethernet (AE) interfaces is supported on PA-7000 Series, PA-5450,
PA-5200 Series, PA-3200 Series, and PA-400 Series firewalls running PAN-OS 7.0 or
later release versions.
1225
Quality of Service
QoS Overview
Use QoS to priorize and adjust quality aspects of network traffic. You can assign the order in
which packets are handled and allot bandwidth, ensuring preferred treatment and opmal levels of
performance are afforded to selected traffic, applicaons, and users.
Service quality measurements subject to a QoS implementaon are bandwidth (maximum rate
of transfer), throughput (actual rate of transfer), latency (delay), and jier (variance in latency).
The capability to shape and control these service quality measurements makes QoS of parcular
importance to high-bandwidth, real-me traffic such as voice over IP (VoIP), video conferencing,
and video-on-demand that has a high sensivity to latency and jier. Addionally, use QoS to
achieve outcomes such as the following:
• Priorize network and applicaon traffic, guaranteeing high priority to important traffic or
liming non-essenal traffic.
• Achieve equal bandwidth sharing among different subnets, classes, or users in a network.
• Allocate bandwidth externally or internally or both, applying QoS to both upload and download
traffic or to only upload or download traffic.
• Ensure low latency for customer and revenue-generang traffic in an enterprise environment.
• Perform traffic profiling of applicaons to ensure bandwidth usage.
QoS implementaon on a Palo Alto Networks firewall begins with three primary configuraon
components that support a full QoS soluon: a QoS Profile, a QoS Policy, and seng up the QoS
Egress Interface. Each of these opons in the QoS configuraon task facilitate a broader process
that opmizes and priorizes the traffic flow and allocates and ensures bandwidth according to
configurable parameters.
The figure QoS Traffic Flow shows traffic as it flows from the source, is shaped by the firewall with
QoS enabled, and is ulmately priorized and delivered to its desnaon.
The QoS configuraon opons allow you to control the traffic flow and define it at different points
in the flow. The figure QoS Traffic Flow indicates where the configurable opons define the traffic
flow. A QoS policy rule allows you to define traffic you want to receive QoS treatment and assign
PAN-OS® Administrator’s Guide Version 10.1 1226 ©2022 Palo Alto Networks, Inc.
Quality of Service
that traffic a QoS class. The matching traffic is then shaped based on the QoS profile class sengs
as it exits the physical interface.
Each of the QoS configuraon components influence each other and the QoS configuraon
opons can be used to create a full and granular QoS implementaon or can be used sparingly
with minimal administrator acon.
Each firewall model supports a maximum number of ports that can be configured with QoS. Refer
to the spec sheet for your firewall model or use the product comparison tool to view QoS feature
support for two or more firewalls on a single page.
PAN-OS® Administrator’s Guide Version 10.1 1227 ©2022 Palo Alto Networks, Inc.
Quality of Service
QoS Concepts
Use the following topics to learn about the different components and mechanisms of a QoS
configuraon on a Palo Alto Networks firewall:
• QoS for Applicaons and Users
• QoS Policy
• QoS Profile
• QoS Classes
• QoS Priority Queuing
• QoS Bandwidth Management
• QoS Egress Interface
• QoS for Clear Text and Tunneled Traffic
QoS Policy
Use a QoS policy rule to define traffic to receive QoS treatment (either preferenal treatment or
bandwidth-liming) and assigns such traffic a QoS class of service.
Define a QoS policy rule to match to traffic based on:
• Applicaons and applicaon groups.
• Source zones, source addresses, and source users.
• Desnaon zones and desnaon addresses.
• Services and service groups limited to specific TCP and/or UDP port numbers.
• URL categories, including custom URL categories.
• Differenated Services Code Point (DSCP) and Type of Service (ToS) values, which are used to
indicate the level of service requested for traffic, such as high priority or best effort delivery.
You cannot apply DSCP code points or QoS to SSL Forward Proxy, SSL Inbound Inspecon,
and SSH Proxy traffic.
Set up mulple QoS policy rules (Policies > QoS) to associate different types of traffic with
different QoS Classes of service.
PAN-OS® Administrator’s Guide Version 10.1 1228 ©2022 Palo Alto Networks, Inc.
Quality of Service
Because QoS is enforced on traffic as it egresses the firewall, your QoS policy rule is applied to
traffic aer the firewall has enforced all other security policy rules, including Network Address
Translaon (NAT) rules. If you want to apply QoS treatment to traffic based on source, make
sure to specify the post-NAT source address in a QoS policy rule (do not use the pre-NAT source
address).
QoS Profile
Use a QoS profile rule to define values of up to eight QoS Classes contained within that single
profile rule.
With a QoS profile rule, you can define QoS Priority Queuing and QoS Bandwidth Management
for QoS classes. Each QoS profile rule allows you to configure individual bandwidth and priority
sengs for up eight QoS classes, as well as the total bandwidth alloted for the eight classes
combined. Aach the QoS profile rule (or mulple QoS profile rules) to a physical interface to
apply the defined priority and bandwidth sengs to the traffic exing that interface.
A default QoS profile rule is available on the firewall. The default profile rule and the classes
defined in the profile do not have predefined maximum or guaranteed bandwidth limits.
To define priority and bandwidth sengs for QoS classes, see Step Add a QoS profile rule.
QoS Classes
A QoS class determines the priority and bandwidth for traffic matching a QoS Policy rule. You can
use a QoS Profile rule to define QoS classes. There are up to eight definable QoS classes in a single
QoS profile. Unless otherwise configured, traffic that does not match a QoS class is assigned a
class of 4.
QoS Priority Queuing and QoS Bandwidth Management, the fundamental mechanisms of a QoS
configuraon, are configured within the QoS class definion (see Step 4). For each QoS class, you
can set a priority (real-me, high, medium, and low) and the maximum and guaranteed bandwidth
for matching traffic. QoS priority queuing and bandwidth management determine the order of
traffic and how traffic is handled upon entering or leaving a network.
PAN-OS® Administrator’s Guide Version 10.1 1229 ©2022 Palo Alto Networks, Inc.
Quality of Service
PAN-OS® Administrator’s Guide Version 10.1 1230 ©2022 Palo Alto Networks, Inc.
Quality of Service
• Egress Guaranteed—The amount of bandwidth guaranteed for matching traffic. When the
egress guaranteed bandwidth is exceeded, the firewall passes traffic on a best-effort basis.
Bandwidth that is guaranteed but is unused connues to remain available for all traffic.
Depending on your QoS configuraon, you can guarantee bandwidth for a single QoS class, for
all or some clear text traffic, and for all or some tunneled traffic.
Example:
Class 1 traffic has 5 Gbps of egress guaranteed bandwidth, which means that 5 Gbps is
available but is not reserved for class 1 traffic. If Class 1 traffic does not use or only parally
uses the guaranteed bandwidth, the remaining bandwidth can be used by other classes of
traffic. However, during high traffic periods, 5 Gbps of bandwidth is absolutely available for
class 1 traffic. During these periods of congeson, any Class 1 traffic that exceeds 5 Gbps is
best effort.
• Egress Max—The overall bandwidth allocaon for matching traffic. The firewall drops traffic
that exceeds the egress max limit that you set. Depending on your QoS configuraon, you can
set a maximum bandwidth limit for a QoS class, for all or some clear text traffic, for all or some
tunneled traffic, and for all traffic exing the QoS interface.
The cumulave guaranteed bandwidth for the QoS profile rules aached to the
interface must not exceed the total bandwidth allocated to the interface.
To define bandwidth sengs for QoS classes, see Step Add a QoS profile rule. To then apply those
bandwidth sengs to clear text and tunneled traffic, and to set the overall bandwidth limit for a
QoS interface, see Step Enable QoS on a physical interface.
PAN-OS® Administrator’s Guide Version 10.1 1231 ©2022 Palo Alto Networks, Inc.
Quality of Service
Because QoS is enforced on traffic as it egresses the firewall, your QoS policy rule is applied to
traffic aer the firewall has enforced all other security policy rules, including Network Address
Translaon (NAT) rules. If you want to apply QoS treatment to traffic based on source, you must
specify the post-NAT source address in a QoS policy rule (do not use the pre-NAT source address).
Learn more about how to Idenfy the egress interface for applicaons that you want to receive
QoS treatment.
PAN-OS® Administrator’s Guide Version 10.1 1232 ©2022 Palo Alto Networks, Inc.
Quality of Service
Configure QoS
Follow these steps to configure Quality of Service (QoS), which includes creang a QoS profile,
creang a QoS policy, and enabling QoS on an interface.
STEP 1 | Idenfy the traffic you want to manage with QoS.
This example shows how to use QoS to limit web browsing.
Select ACC to view the Applicaon Command Center page. Use the sengs and charts on the
ACC page to view trends and traffic related to Applicaons, URL filtering, Threat Prevenon,
Data Filtering, and HIP Matches.
Click any applicaon name to display detailed applicaon informaon.
PAN-OS® Administrator’s Guide Version 10.1 1233 ©2022 Palo Alto Networks, Inc.
Quality of Service
STEP 2 | Idenfy the egress interface for applicaons that you want to receive QoS treatment.
The egress interface for traffic depends on the traffic flow. If you are shaping incoming
traffic, the egress interface is the internal-facing interface. If you are shaping outgoing
traffic, the egress interface is the external-facing interface.
Select Monitor > Logs > Traffic to view the Traffic logs.
To filter and only show logs for a specific applicaon:
• If an entry is displayed for the applicaon, click the underlined link in the Applicaon
column then click the Submit icon.
• If an entry is not displayed for the applicaon, click the Add Log icon and search for the
applicaon.
The Egress I/F in the traffic logs displays each applicaon’s egress interface. To display the
Egress I/F column if it is not displayed by default:
• Click any column header to add a column to the log:
• Click the spyglass icon to the le of any entry to display a detailed log that includes the
applicaon’s egress interface listed in the Desnaon secon:
PAN-OS® Administrator’s Guide Version 10.1 1234 ©2022 Palo Alto Networks, Inc.
Quality of Service
Because QoS is enforced on traffic as it egresses the firewall, your QoS policy rule is
applied to traffic aer the firewall has enforced all other security policy rules, including
Network Address Translaon (NAT) rules. If you want to apply QoS treatment to traffic
based on source, you must specify the post-NAT source address in a QoS policy rule (do
not use the pre-NAT source address).
PAN-OS® Administrator’s Guide Version 10.1 1235 ©2022 Palo Alto Networks, Inc.
Quality of Service
Any traffic that exceeds the Egress Guaranteed value is best effort and not
guaranteed. Bandwidth that is guaranteed but is unused connues to remain
available for all traffic.
4. In the Classes secon, specify how to treat up to eight individual QoS classes:
1. Add a class to the QoS Profile.
2. Select the Priority for the class: real-me, high, medium, or low.
3. Enter the Egress Max and Egress Guaranteed bandwidth for traffic assigned to each
QoS class.
5. Click OK.
In the following example, the QoS profile rule Limit Web Browsing limits Class 2 traffic to a
maximum bandwidth of 50Mbps and a guaranteed bandwidth of 2Mbps.
PAN-OS® Administrator’s Guide Version 10.1 1236 ©2022 Palo Alto Networks, Inc.
Quality of Service
Check if the firewall model you’re using supports enabling QoS on a subinterface by
reviewing a summary of the Product Specificaons.
It is a best pracce to always define the Egress Max value for a QoS interface.
Ensure that the cumulave guaranteed bandwidth for the QoS profile rules
aached to the interface does not exceed the total bandwidth allocated to the
interface.
4. Select Turn on QoS feature on this interface.
5. In the Default Profile secon, select a QoS profile rule to apply to all Clear Text traffic
exing the physical interface.
6. (Oponal) Select a default QoS profile rule to apply to all tunneled traffic exing the
interface.
For example, enable QoS on ethernet 1/1 and apply the bandwidth and priority sengs you
defined for the QoS profile rule Limit Web Browsing (Step 4) to be used as the default sengs
for clear text egress traffic.
1. (Oponal) Connue to define more granular sengs to provide QoS for Clear Text and
Tunneled Traffic. Sengs configured on the Clear Text Traffic tab and the Tunneled
PAN-OS® Administrator’s Guide Version 10.1 1237 ©2022 Palo Alto Networks, Inc.
Quality of Service
Traffic tab automacally override the default profile sengs for clear text and tunneled
traffic on the Physical Interface tab.
• Select Clear Text Traffic and:
• Set the Egress Guaranteed and Egress Max bandwidths for clear text traffic.
• Click Add and apply a QoS profile rule to enforce clear text traffic based on source
interface and source subnet.
PAN-OS® Administrator’s Guide Version 10.1 1238 ©2022 Palo Alto Networks, Inc.
Quality of Service
Class 2 traffic limited to 2.343 Mbps of guaranteed bandwidth and a maximum bandwidth of
51.093 Mbps.
Connue to click the tabs to display further informaon regarding applicaons, source users,
desnaon users, security rules and QoS rules.
Bandwidth limits shown on the QoS Stascs window include a hardware adjustment
factor.
PAN-OS® Administrator’s Guide Version 10.1 1239 ©2022 Palo Alto Networks, Inc.
Quality of Service
Refer to Virtual Systems for informaon on virtual systems and how to configure them.
STEP 1 | Confirm that the appropriate interfaces, virtual routers, and security zones are associated
with each virtual system.
• To view configured interfaces, select Network > Interface.
• To view configured zones, select Network > Zones.
• To view informaon on defined virtual routers, select Network > Virtual Routers.
PAN-OS® Administrator’s Guide Version 10.1 1240 ©2022 Palo Alto Networks, Inc.
Quality of Service
PAN-OS® Administrator’s Guide Version 10.1 1241 ©2022 Palo Alto Networks, Inc.
Quality of Service
STEP 3 | Idenfy the egress interface for applicaons that you idenfied as needing QoS treatment.
In a virtual system environment, QoS is applied to traffic on the traffic’s egress point on the
virtual system. Depending the configuraon and QoS policy for a virtual system, the egress
point of QoS traffic could be associated with a physical interface or could be a zone.
This example shows how to limit web-browsing traffic on vsys 1.
Select Monitor > Logs > Traffic to view traffic logs. Each entry has the opon to display
columns with informaon necessary to configure QoS in a virtual system environment:
• virtual system
• egress interface
• ingress interface
• source zone
• desnaon zone
To display a column if it is not displayed by default:
• Click any column header to add a column to the log:
• Click the spyglass icon to the le of any entry to display a detailed log that includes the
applicaon’s egress interface, as well as source and desnaon zones, in the Source and
Desnaon secons:
For example, for web-browsing traffic from VSYS 1, the ingress interface is ethernet 1/2, the
egress interface is ethernet 1/1, the source zone is trust and the desnaon zone is untrust.
PAN-OS® Administrator’s Guide Version 10.1 1242 ©2022 Palo Alto Networks, Inc.
Quality of Service
Any traffic that exceeds the QoS profile’s egress guaranteed limit is best effort
but is not guaranteed.
5. In the Classes secon of the QoS Profile, specify how to treat up to eight individual QoS
classes:
1. Click Add to add a class to the QoS Profile.
2. Select the Priority for the class.
3. Enter an Egress Max for a class to set the overall bandwidth limit for that individual
class.
4. Enter an Egress Guaranteed for the class to set the guaranteed bandwidth for that
individual class.
6. Click OK to save the QoS profile.
PAN-OS® Administrator’s Guide Version 10.1 1243 ©2022 Palo Alto Networks, Inc.
Quality of Service
priorized and shaped only for that virtual system (and not for other virtual systems through
which the traffic might flow).
1. Select Policies > QoS and Add a QoS Policy Rule.
2. Select General and give the QoS Policy Rule a descripve Name.
3. Specify the traffic to which the QoS policy rule will apply. Use the Source, Desnaon,
Applicaon, and Service/URL Category tabs to define matching parameters for
idenfying traffic.
For example, select Applicaon and Add web-browsing to apply the QoS policy rule to
that applicaon:
4. Select Source and Add the source zone of vsys 1 web-browsing traffic.
5. Select Desnaon and Add the desnaon zone of vsys 1 web-browsing traffic.
6. Select Other Sengs and select a QoS Class to assign to the QoS policy rule. For
example, assign Class 2 to web-browsing traffic on vsys 1:
PAN-OS® Administrator’s Guide Version 10.1 1244 ©2022 Palo Alto Networks, Inc.
Quality of Service
It is a best pracce to always define the Egress Max value for a QoS interface.
1. Select Network > QoS and click Add to open the QoS Interface dialog.
2. Enable QoS on the physical interface:
1. On the Physical Interface tab, select the Interface Name of the interface to apply the
QoS Profile to.
In this example, ethernet 1/1 is the egress interface for web-browsing traffic on vsys 1
(see Step 2).
PAN-OS® Administrator’s Guide Version 10.1 1245 ©2022 Palo Alto Networks, Inc.
Quality of Service
acve sessions of a selected QoS node or class, and acve applicaons for the selected QoS
node or class.
• In a mul-vsys environment, sessions cannot span mulple systems. Mulple sessions are
created for one traffic flow if the traffic passes through more than one virtual system. To
browse sessions running on the firewall and view applied QoS Rules and QoS Classes, select
Monitor > Session Browser.
PAN-OS® Administrator’s Guide Version 10.1 1246 ©2022 Palo Alto Networks, Inc.
Quality of Service
You cannot apply DSCP code points or QoS to SSL Forward Proxy, SSL Inbound Inspecon,
and SSH Proxy traffic.
PAN-OS® Administrator’s Guide Version 10.1 1247 ©2022 Palo Alto Networks, Inc.
Quality of Service
STEP 2 | Define the traffic to receive QoS treatment based on DSCP value.
1. Select Policies > QoS and Add or modify an exisng QoS rule and populate required
fields.
2. Select DSCP/ToS and select Codepoints.
3. Add DSCP/ToS codepoints for which you want to enforce QoS.
4. Select the Type of DSCP/ToS marking for the QoS rule to match to traffic:
It is a best pracce to use a single DSCP type to manage and priorize your
network traffic.
5. Match the QoS policy to traffic on a more granular scale by specifying the Codepoint
value. For example, with Assured Forwarding (AF) selected as the Type of DSCP value for
the policy to match, further specify an AF Codepoint value such as AF11.
STEP 3 | Define the QoS priority for traffic to receive when it is matched to a QoS rule based the
DSCP marking detected at the beginning of a session.
1. Select Network > Network Profiles > QoS Profile and Add or modify an exisng QoS
profile. For details on profile opons to set priority and bandwidth for traffic, see QoS
Concepts and Configure QoS.
2. Add or modify a profile class. For example, because Step 2 showed steps to classify AF11
traffic as Class 1 traffic, you could add or modify a class1 entry.
3. Select a Priority for the class of traffic, such as high.
4. Click OK to save the QoS Profile.
PAN-OS® Administrator’s Guide Version 10.1 1248 ©2022 Palo Alto Networks, Inc.
Quality of Service
PAN-OS® Administrator’s Guide Version 10.1 1249 ©2022 Palo Alto Networks, Inc.
Quality of Service
The admin assigns a guaranteed bandwidth (Egress Guaranteed) of 50 Mbps to ensure that the
CEO will have that amount that bandwidth guaranteed to her at all mes (more than she would
need to use), regardless of network congeson.
The admin connues by designang Class 1 traffic as high priority and sets the profile’s
maximum bandwidth usage (Egress Max) to 1000 Mbps, the same maximum bandwidth for the
interface that the admin will enable QoS on. The admin is choosing to not restrict the CEO’s
bandwidth usage in any way.
It is a best pracce to populate the Egress Max field for a QoS profile, even if the max
bandwidth of the profile matches the max bandwidth of the interface. The QoS profile’s
max bandwidth should never exceed the max bandwidth of the interface you are
planning to enable QoS on.
STEP 2 | The admin creates a QoS policy to idenfy the CEO’s traffic (Policies > QoS) and assigns it
the class that he defined in the QoS profile (see prior step). Because User-ID is configured,
the admin uses the Source tab in the QoS policy to singularly idenfy the CEO’s traffic by her
PAN-OS® Administrator’s Guide Version 10.1 1250 ©2022 Palo Alto Networks, Inc.
Quality of Service
company network username. (If User-ID is not configured, the administrator could Add the
CEO’s IP address under Source Address. See User-ID.):
The admin associates the CEO’s traffic with Class 1 (Other Sengs tab) and then connues
to populate the remaining required policy fields; the admin gives the policy a descripve
Name (General tab) and selects Any for the Source Zone (Source tab) and Desnaon Zone
(Desnaon tab):
STEP 3 | Now that Class 1 is associated with the CEO’s traffic, the admin enables QoS by checking
Turn on QoS feature on interface and selecng the traffic flow’s egress interface. The egress
interface for the CEO’s traffic flow is the external-facing interface, in this case, ethernet 1/2:
Because the admin wants to ensure that all traffic originang from the CEO is guaranteed by
the QoS profile and associated QoS policy he created, he selects the CEO_traffic to apply to
Clear Text traffic flowing from ethernet 1/2.
STEP 4 | Aer comming the QoS configuraon, the admin navigates to the Network > QoS page to
confirm that the QoS profile CEO_traffic is enabled on the external-facing interface, ethernet
1/2:
PAN-OS® Administrator’s Guide Version 10.1 1251 ©2022 Palo Alto Networks, Inc.
Quality of Service
STEP 5 | He clicks Stascs to view how traffic originang with the CEO (Class 1) is being shaped as it
flows from ethernet 1/2:
This case demonstrates how to apply QoS to traffic originang from a single source
user. However, if you also wanted to guarantee or shape traffic to a desnaon user,
you could configure a similar QoS setup. Instead of, or in addion to this work flow,
create a QoS policy that specifies the user’s IP address as the Desnaon Address on
the Policies > QoS page (instead of specifying the user’s source informaon) and then
enable QoS on the network’s internal-facing interface on the Network > QoS page
(instead of the external-facing interface).
PAN-OS® Administrator’s Guide Version 10.1 1252 ©2022 Palo Alto Networks, Inc.
Quality of Service
STEP 1 | The admin creates a QoS profile, defining Class 2 so that Class 2 traffic receives real-me
priority and on an interface with a maximum bandwidth of 1000 Mbps, is guaranteed a
bandwidth of 250 Mbps at all mes, including peak periods of network usage.
Real-me priority is typically recommended for applicaons affected by latency, and is
parcularly useful in guaranteeing performance and quality of voice and video applicaons.
On the firewall web interface, the admin selects Network > Network Profiles > Qos Profile
page, clicks Add, enters the Profile Name ensure voip-video traffic and defines Class 2 traffic.
STEP 2 | The admin creates a QoS policy to idenfy voice and video traffic. Because the company
does not have one standard voice and video applicaon, the admin wants to ensure
QoS is applied to a few applicaons that are widely and regularly used by employees to
communicate with other offices, with partners, and with customers. On the Policies > QoS
> QoS Policy Rule > Applicaons tab, the admin clicks Add and opens the Applicaon Filter
window. The admin connues by selecng criteria to filter the applicaons he wants to apply
PAN-OS® Administrator’s Guide Version 10.1 1253 ©2022 Palo Alto Networks, Inc.
Quality of Service
QoS to, choosing the Subcategory voip-video, and narrowing that down by specifying only
voip-video applicaons that are both low-risk and widely-used.
The applicaon filter is a dynamic tool that, when used to filter applicaons in the QoS policy,
allows QoS to be applied to all applicaons that meet the criteria of voip-video, low risk, and
widely used at any given me.
The admin names the Applicaon Filter voip-video-low-risk and includes it in the QoS policy:
The admin names the QoS policy Voice-Video and selects Other Sengs to assign all traffic
matched to the policy Class 2. He is going to use the Voice-Video QoS policy for both incoming
and outgoing QoS traffic, so he sets Source and Desnaon informaon to Any:
STEP 3 | Because the admin wants to ensure QoS for both incoming and outgoing voice and video
communicaons, he enables QoS on the network’s external-facing interface (to apply QoS
PAN-OS® Administrator’s Guide Version 10.1 1254 ©2022 Palo Alto Networks, Inc.
Quality of Service
to outgoing communicaons) and to the internal-facing interface (to apply QoS to incoming
communicaons).
The admin begins by enabling the QoS profile he created, ensure voice-video traffic (Class 2 in
this profile is associated with policy, Voice-Video) on the external-facing interface, in this case,
ethernet 1/2.
He then enables the same QoS profile ensure voip-video traffic on a second interface, the
internal-facing interface (in this case, ethernet 1/1).
STEP 4 | The admin selects Network > QoS to confirm that QoS is enabled for both incoming and
outgoing voice and video traffic:
The admin has successfully enabled QoS on both the network’s internal- and external-facing
interfaces. Real-me priority is now ensured for voice and video applicaon traffic as it flows
both into and out of the network, ensuring that these communicaons, which are parcularly
sensive to latency and jier, can be used reliably and effecvely to perform both internal and
external business communicaons.
PAN-OS® Administrator’s Guide Version 10.1 1255 ©2022 Palo Alto Networks, Inc.
Quality of Service
PAN-OS® Administrator’s Guide Version 10.1 1256 ©2022 Palo Alto Networks, Inc.
VPNs
Virtual private networks (VPNs) create tunnels that allow users/systems to connect
securely over a public network, as if they were connecng over a local area network
(LAN). To set up a VPN tunnel, you need a pair of devices that can authencate each
other and encrypt the flow of informaon between them. The devices can be a pair
of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-
capable device from another vendor.
1257
VPNs
VPN Deployments
The Palo Alto Networks firewall supports the following VPN deployments:
• Site-to-Site VPN— A simple VPN that connects a central site and a remote site, or a hub and
spoke VPN that connects a central site with mulple remote sites. The firewall uses the IP
Security (IPSec) set of protocols to set up a secure tunnel for the traffic between the two sites.
See Site-to-Site VPN Overview.
• Remote User-to-Site VPN—A soluon that uses the GlobalProtect agent to allow a remote
user to establish a secure connecon through the firewall. This soluon uses SSL and IPSec
to establish a secure connecon between the user and the site. Refer to the GlobalProtect
Administrator’s Guide.
• Large Scale VPN— The Palo Alto Networks GlobalProtect Large Scale VPN (LSVPN) provides
a simplified mechanism to roll out a scalable hub and spoke VPN with up to 1,024 satellite
offices. The soluon requires Palo Alto Networks firewalls to be deployed at the hub and at
every spoke. It uses cerficates for device authencaon, SSL for securing communicaon
between all components, and IPSec to secure data. See Large Scale VPN (LSVPN).
PAN-OS® Administrator’s Guide Version 10.1 1258 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1259 ©2022 Palo Alto Networks, Inc.
VPNs
IKE Gateway
The Palo Alto Networks firewalls or a firewall and another security device that iniate and
terminate VPN connecons across the two networks are called the IKE Gateways. To set up the
VPN tunnel and send traffic between the IKE Gateways, each peer must have an IP address—stac
or dynamic—or FQDN. The VPN peers use preshared keys or cerficates to mutually authencate
each other.
The peers must also negoate the mode—main or aggressive—for seng up the VPN tunnel and
the SA lifeme in IKE Phase 1. Main mode protects the identy of the peers and is more secure
because more packets are exchanged when seng up the tunnel. Main mode is the recommended
mode for IKE negoaon if both peers support it. Aggressive mode uses fewer packets to set up
the VPN tunnel and is hence faster but a less secure opon for seng up the VPN tunnel.
See Set Up an IKE Gateway for configuraon details.
Tunnel Interface
To set up a VPN tunnel, the Layer 3 interface at each end must have a logical tunnel interface
for the firewall to connect to and establish a VPN tunnel. A tunnel interface is a logical (virtual)
interface that is used to deliver traffic between two endpoints. If you configure any proxy IDs, the
proxy ID is counted toward any IPSec tunnel capacity.
The tunnel interface must belong to a security zone to apply policy and it must be assigned to a
virtual router in order to use the exisng roung infrastructure. Ensure that the tunnel interface
and the physical interface are assigned to the same virtual router so that the firewall can perform a
route lookup and determine the appropriate tunnel to use.
Typically, the Layer 3 interface that the tunnel interface is aached to belongs to an external zone,
for example the untrust zone. While the tunnel interface can be in the same security zone as the
physical interface, for added security and beer visibility, you can create a separate zone for the
tunnel interface. If you create a separate zone for the tunnel interface, say a VPN zone, you will
need to create security policies to enable traffic to flow between the VPN zone and the trust
zone.
To route traffic between the sites, a tunnel interface does not require an IP address. An IP address
is only required if you want to enable tunnel monitoring or if you are using a dynamic roung
PAN-OS® Administrator’s Guide Version 10.1 1260 ©2022 Palo Alto Networks, Inc.
VPNs
protocol to route traffic across the tunnel. With dynamic roung, the tunnel IP address serves as
the next hop IP address for roung traffic to the VPN tunnel.
If you are configuring the Palo Alto Networks firewall with a VPN peer that performs policy-based
VPN, you must configure a local and remote Proxy ID when seng up the IPSec tunnel. Each peer
compares the Proxy-IDs configured on it with what is actually received in the packet in order to
allow a successful IKE phase 2 negoaon. If mulple tunnels are required, configure unique Proxy
IDs for each tunnel interface; a tunnel interface can have a maximum of 250 Proxy IDs. Each Proxy
ID counts towards the IPSec VPN tunnel capacity of the firewall, and the tunnel capacity varies by
the firewall model.
See Set Up an IPSec Tunnel for configuraon details.
Tunnel Monitoring
For a VPN tunnel, you can check connecvity to a desnaon IP address across the tunnel. The
network monitoring profile on the firewall allows you to verify connecvity (using ICMP) to a
desnaon IP address or a next hop at a specified polling interval, and to specify an acon on
failure to access the monitored IP address.
If the desnaon IP is unreachable, you either configure the firewall to wait for the tunnel to
recover or configure automac failover to another tunnel. In either case, the firewall generates
a system log that alerts you to a tunnel failure and renegoates the IPSec keys to accelerate
recovery.
See Set Up Tunnel Monitoring for configuraon details.
PAN-OS® Administrator’s Guide Version 10.1 1261 ©2022 Palo Alto Networks, Inc.
VPNs
IKE Phase 1
In this phase, the firewalls use the parameters defined in the IKE Gateway configuraon and the
IKE Crypto profile to authencate each other and set up a secure control channel. IKE Phase
supports the use of preshared keys or digital cerficates (which use public key infrastructure,
PKI) for mutual authencaon of the VPN peers. Preshared keys are a simple soluon for
securing smaller networks because they do not require the support of a PKI infrastructure. Digital
cerficates can be more convenient for larger networks or implementaons that require stronger
authencaon security.
When using cerficates, make sure that the CA issuing the cerficate is trusted by both gateway
peers and that the maximum length of cerficates in the cerficate chain is 5 or less. With IKE
fragmentaon enabled, the firewall can reassemble IKE messages with up to 5 cerficates in the
cerficate chain and successfully establish a VPN tunnel.
The IKE Crypto profile defines the following opons that are used in the IKE SA negoaon:
• Diffie-Hellman (DH) group for generang symmetrical keys for IKE.
The Diffie-Hellman algorithm uses the private key of one party and the public key of the other
to create a shared secret, which is an encrypted key that both VPN tunnel peers share. The DH
groups supported on the firewall are: Group 1—768 bits, Group 2—1024 bits (default), Group 5
—1536 bits, Group 14—2048 bits, Group 19—256-bit ellipc curve group, and Group 20—384-
bit ellipc curve group.
• Authencaon algorithms—sha1, sha 256, sha 384, sha 512, or md5
• Encrypon algorithms—aes-256-gcm, aes-128-gcm, 3des, aes-128-cbc, aes-192-cbc, aes-256-
cbc, or des
IKE Phase 2
Aer the tunnel is secured and authencated, in Phase 2 the channel is further secured for the
transfer of data between the networks. IKE Phase 2 uses the keys that were established in Phase
1 of the process and the IPSec Crypto profile, which defines the IPSec protocols and keys used for
the SA in IKE Phase 2.
The IPSEC uses the following protocols to enable secure communicaon:
PAN-OS® Administrator’s Guide Version 10.1 1262 ©2022 Palo Alto Networks, Inc.
VPNs
• Encapsulang Security Payload (ESP)—Allows you to encrypt the enre IP packet, and
authencate the source and verify integrity of the data. While ESP requires that you encrypt
and authencate the packet, you can choose to only encrypt or only authencate by seng
the encrypon opon to Null; using encrypon without authencaon is discouraged.
• Authencaon Header (AH)—Authencates the source of the packet and verifies data integrity.
AH does not encrypt the data payload and is unsuited for deployments where data privacy is
important. AH is commonly used when the main concern is to verify the legimacy of the peer,
and data privacy is not required.
ESP AH
PAN-OS® Administrator’s Guide Version 10.1 1263 ©2022 Palo Alto Networks, Inc.
VPNs
ESP AH
• md5 • md5
• sha 1 • sha 1
IKEv2
An IPSec VPN gateway uses IKEv1 or IKEv2 to negoate the IKE security associaon (SA) and
IPSec tunnel. IKEv2 is defined in RFC 5996.
Unlike IKEv1, which uses Phase 1 SA and Phase 2 SA, IKEv2 uses a child SA for Encapsulang
Security Payload (ESP) or Authencaon Header (AH), which is set up with an IKE SA.
NAT traversal (NAT-T) must be enabled on both gateways if you have NAT occurring on a device
that sits between the two gateways. A gateway can see only the public (globally routable) IP
address of the NAT device.
IKEv2 provides the following benefits over IKEv1:
• Tunnel endpoints exchange fewer messages to establish a tunnel. IKEv2 uses four messages;
IKEv1 uses either nine messages (in main mode) or six messages (in aggressive mode).
• Built-in NAT-T funconality improves compability between vendors.
PAN-OS® Administrator’s Guide Version 10.1 1264 ©2022 Palo Alto Networks, Inc.
VPNs
• Built-in health check automacally re-establishes a tunnel if it goes down. The liveness check
replaces the Dead Peer Detecon used in IKEv1.
• Supports traffic selectors (one per exchange). The traffic selectors are used in IKE negoaons
to control what traffic can access the tunnel.
• Supports Hash and URL cerficate exchange to reduce fragmentaon.
• Resiliency against DoS aacks with improved peer validaon. An excessive number of half-
open SAs can trigger cookie validaon.
Before configuring IKEv2, you should be familiar with the following concepts:
• Liveness Check
• Cookie Acvaon Threshold and Strict Cookie Validaon
• Traffic Selectors
• Hash and URL Cerficate Exchange
• SA Key Lifeme and Re-Authencaon Interval
Aer you Set Up an IKE Gateway, if you chose IKEv2, perform the following oponal tasks related
to IKEv2 as required by your environment:
• Export a Cerficate for a Peer to Access Using Hash and URL
• Import a Cerficate for IKEv2 Gateway Authencaon
• Change the Key Lifeme or Authencaon Interval for IKEv2
• Change the Cookie Acvaon Threshold for IKEv2
• Configure IKEv2 Traffic Selectors
Liveness Check
The liveness check for IKEv2 is similar to Dead Peer Detecon (DPD), which IKEv1 uses as the
way to determine whether a peer is sll available.
In IKEv2, the liveness check is achieved by any IKEv2 packet transmission or an empty
informaonal message that the gateway sends to the peer at a configurable interval, five seconds
by default. If necessary, the sender aempts the retransmission up to ten mes. If it doesn’t get
a response, the sender closes and deletes the IKE_SA and corresponding CHILD_SAs. The sender
will start over by sending out another IKE_SA_INIT message.
PAN-OS® Administrator’s Guide Version 10.1 1265 ©2022 Palo Alto Networks, Inc.
VPNs
validaon is successful, another SA can be iniated. A value of 0 means that cookie validaon is
always on.
The Responder does not maintain a state of the Iniator, nor does it perform a Diffie-Hellman
key exchange, unl the Iniator returns the cookie. IKEv2 cookie validaon migates a DoS
aack that would try to leave numerous connecons half open.
The Cookie Acvaon Threshold must be lower than the Maximum Half Opened SA seng.
If you Change the Cookie Acvaon Threshold for IKEv2 to a very high number (for example,
65534) and the Maximum Half Opened SA seng remained at the default value of 65535,
cookie validaon is essenally disabled.
• You can enable Strict Cookie Validaon if you want cookie validaon performed for every
new IKEv2 SA a gateway receives, regardless of the global threshold. Strict Cookie Validaon
affects only the IKE gateway being configured and is disabled by default. With Strict Cookie
Validaon disabled, the system uses the Cookie Acvaon Threshold to determine whether a
cookie is needed or not.
Traffic Selectors
In IKEv1, a firewall that has a route-based VPN needs to use a local and remote Proxy ID in order
to set up an IPSec tunnel. Each peer compares its Proxy IDs with what it received in the packet in
order to successfully negoate IKE Phase 2. IKE Phase 2 is about negoang the SAs to set up an
IPSec tunnel. (For more informaon on Proxy IDs, see Tunnel Interface.)
In IKEv2, you can Configure IKEv2 Traffic Selectors, which are components of network traffic that
are used during IKE negoaon. Traffic selectors are used during the CHILD_SA (tunnel creaon)
Phase 2 to set up the tunnel and to determine what traffic is allowed through the tunnel. The two
IKE gateway peers must negoate and agree on their traffic selectors; otherwise, one side narrows
its address range to reach agreement. One IKE connecon can have mulple tunnels; for example,
you can assign different tunnels to each department to isolate their traffic. Separaon of traffic
also allows features such as QoS to be implemented.
The IPv4 and IPv6 traffic selectors are:
• Source IP address—A network prefix, address range, specific host, or wildcard.
• Desnaon IP address—A network prefix, address range, specific host, or wildcard.
• Protocol—A transport protocol, such as TCP or UDP.
• Source port—The port where the packet originated.
• Desnaon port—The port the packet is desned for.
During IKE negoaon, there can be mulple traffic selectors for different networks and
protocols. For example, the Iniator might indicate that it wants to send TCP packets from
172.168.0.0/16 through the tunnel to its peer, desned for 198.5.0.0/16. It also wants to send
UDP packets from 172.17.0.0/16 through the same tunnel to the same gateway, desned for
0.0.0.0 (any network). The peer gateway must agree to these traffic selectors so that it knows
what to expect.
It is possible that one gateway will start negoaon using a traffic selector that is a more specific
IP address than the IP address of the other gateway.
• For example, gateway A offers a source IP address of 172.16.0.0/16 and a desnaon IP
address of 192.16.0.0/16. But gateway B is configured with 0.0.0.0 (any source) as the
source IP address and 0.0.0.0 (any desnaon) as the desnaon IP address. Therefore,
PAN-OS® Administrator’s Guide Version 10.1 1266 ©2022 Palo Alto Networks, Inc.
VPNs
gateway B narrows down its source IP address to 192.16.0.0/16 and its desnaon address to
172.16.0.0/16. Thus, the narrowing down accommodates the addresses of gateway A and the
traffic selectors of the two gateways are in agreement.
• If gateway B (configured with source IP address 0.0.0.0) is the Iniator instead of the
Responder, gateway A will respond with its more specific IP addresses, and gateway B will
narrow down its addresses to reach agreement.
PAN-OS® Administrator’s Guide Version 10.1 1267 ©2022 Palo Alto Networks, Inc.
VPNs
If there is a deny rule at the end of the security rulebase, intra-zone traffic is blocked
unless otherwise allowed. Rules to allow IKE and IPSec applicaons must be explicitly
included above the deny rule.
If your VPN traffic is passing through (not originang or terminang on) a PA-7000
Series or PA-5200 Series firewall, configure bi-direconal Security policy rules to allow
the ESP or AH traffic in both direcons.
When these tasks are complete, the tunnel is ready for use. Traffic desned for the zones/
addresses defined in policy is automacally routed properly based on the desnaon route in the
roung table, and handled as VPN traffic. For a few examples on site-to-site VPN, see Site-to-Site
VPN Quick Configs.
For troubleshoong purposes, you can Enable/Disable, Refresh or Restart an IKE Gateway or
IPSec Tunnel.
PAN-OS® Administrator’s Guide Version 10.1 1268 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 3 | Establish the peer at the far end of the tunnel (gateway).
For Peer IP Address Type, select one of the following and enter the corresponding informaon
for the peer:
• IP—Enter a Peer Address that is either an IPv4 or IPv6 address or enter an address object
that is an IPv4 or IPv6 address.
• FQDN—Enter a Peer Address that is an FQDN string or an address object that uses an
FQDN string. If the FQDN or FQDN address object resolves to more than one IP address,
the firewall selects the preferred address from the set of addresses that match the Address
Type (IPv4 or IPv6) of the IKE gateway as follows:
• If no IKE security associaon (SA) is negoated, the preferred address is the IP address
with the smallest value.
• If the IKE gateway uses an address that is in the set of returned addresses, the firewall
selects that address (whether or not it is the smallest address in the set).
• If the IKE gateway uses an address that isn’t in the set of returned addresses, the firewall
selects a new address, and it is the smallest address in the set.
• Dynamic—Select Dynamic if the peer IP address or FQDN value is unknown so that the
peer will iniate the negoaon.
Using an FQDN or FQDN address object reduces issues in environments where the
peer is subject to dynamic IP address changes (and would otherwise require you to
reconfigure this IKE gateway peer address).
PAN-OS® Administrator’s Guide Version 10.1 1269 ©2022 Palo Alto Networks, Inc.
VPNs
Generate a key that is difficult to crack with diconary aacks; use a pre-shared
key generator, if necessary.
2. For Local Idenficaon, choose from the following types and enter a value that you
determine: FQDN (hostname), IP address, KEYID (binary format ID string in HEX), and
User FQDN (email address). Local idenficaon defines the format and idenficaon of
the local gateway. If you do not specify a value, the local IP address is used as the local
idenficaon value.
3. For Peer Idenficaon, choose from the following types and enter a value that you
determine: FQDN (hostname), IP address, KEYID (binary format ID string in HEX), and
User FQDN (email address). Peer idenficaon defines the format and idenficaon of
the peer gateway. If you do not specify a value, the peer IP address is used as the peer
idenficaon value.
4. Proceed to Step 7 (Configure advanced opons for the gateway).
PAN-OS® Administrator’s Guide Version 10.1 1270 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1271 ©2022 Palo Alto Networks, Inc.
VPNs
If you do not set the exchange mode to auto, then you must configure both
peers with the same exchange mode to allow each peer to accept negoaon
requests.
• Select an exisng profile or keep the default profile from the IKE Crypto Profile list. If
needed, you can Define IKE Crypto Profiles.
• (Only when using cerficate-based authencaon and when exchange mode is not
set to aggressive mode) Click Enable Fragmentaon to enable the firewall to operate
with IKE Fragmentaon.
• Click Dead Peer Detecon and enter an Interval (range is 2 to 100 seconds). For
Retry, define the me to delay (range is 2 to 100 seconds) before aempng to
re-check availability. Dead peer detecon idenfies inacve or unavailable IKE
peers by sending an IKE phase 1 noficaon payload to the peer and waing for an
acknowledgment.
4. If you configured IKEv2 only mode or IKEv2 preferred mode in Step 1, then on the IKEv2
tab:
• Select an IKE Crypto Profile, which configures IKE Phase 1 opons such, as the DH
group, hash algorithm, and ESP authencaon. For informaon about IKE crypto
profiles, see IKE Phase 1.
• (Oponal) Enable Strict Cookie Validaon Cookie Acvaon Threshold and Strict
Cookie Validaon.
• (Oponal) Enable Liveness Check and enter an Interval (sec) (default is 5) if you
want to have the gateway send a message request to its gateway peer, requesng a
response. If necessary, the Iniator aempts the liveness check as many as 10 mes.
If it doesn’t get a response, the Iniator closes and deletes the IKE_SA and CHILD_SA.
The Iniator will start over by sending out another IKE_SA_INIT.
PAN-OS® Administrator’s Guide Version 10.1 1272 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 1 | Select Device > Cerficates, and if your plaorm supports mulple virtual systems, for
Locaon, select the appropriate virtual system.
STEP 2 | On the Device Cerficates tab, select the cerficate to Export to the server.
The status of the cerficate should be valid, not expired. The firewall will not stop you
from exporng an invalid cerficate.
STEP 4 | Leave Export private key clear. Exporng the private key is unnecessary for Hash and URL.
PAN-OS® Administrator’s Guide Version 10.1 1273 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1274 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 3 | Click Add and enter the Name in the Proxy ID field.
STEP 6 | In the Protocol field, select the transport protocol (TCP or UDP).
All IKE gateways configured on the same interface or local IP address must use the same
crypto profile when the IKE gateway’s Peer IP Address Type is configured as Dynamic and
IKEv1 main mode or IKEv2 is applied.
PAN-OS® Administrator’s Guide Version 10.1 1275 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 2 | Specify the DH (Diffie–Hellman) Group for key exchange and the Authencaon and
Encrypon algorithms.
Click Add in the corresponding secons (DH Group, Authencaon, and Encrypon) and select
from the menus.
If you are not certain what the VPN peers support, add mulple groups or algorithms in the
order of most-to-least secure; the peers negoate the strongest supported group or algorithm
to establish the tunnel.
• DH Group—
• group20
• group19
• group14
• group5
• group2
• group1
• Authencaon—
• sha512
• sha384
• sha256
• sha1
• md5
• (PAN-OS 10.0.3 and later 10.1 releases) none
If you select an AES-GCM algorithm for encrypon, you must select the
Authencaon seng none or the commit will fail. The hash is automacally
selected based on the DH Group selected. DH Group 19 and below uses sha256;
DH Group 20 uses sha384.
• Encrypon—
• (PAN-OS 10.0.3 and later 10.1 releases) aes-256-gcm (requires IKEv2; DH Group should
be set to group20)
• (PAN-OS 10.0.3 and later 10.1 releases) aes-128-gcm (requires IKEv2 and DH Group set
to group19)
• aes-256-cbc
• aes-192-cbc
• aes-128-cbc
• 3des
• des
PAN-OS® Administrator’s Guide Version 10.1 1276 ©2022 Palo Alto Networks, Inc.
VPNs
Choose the strongest authencaon and encrypon algorithms the peer can support.
For the authencaon algorithm, use SHA-256 or higher (SHA-384 or higher preferred
for long-lived transacons). Do not use SHA-1 or MD5. For the encrypon algorithm,
use AES; DES and 3DES are weak and vulnerable. AES with Galois/Counter Mode
(AES-GCM) provides the strongest security and has built-in authencaon, so you must
set Authencaon to none if you select aes-256-gcm or aes-128-gcm encrypon.
STEP 3 | Specify the duraon for which the key is valid and the re-authencaon interval.
For details, see SA Key Lifeme and Re-Authencaon Interval.
1. In the Key Lifeme fields, specify the period (in seconds, minutes, hours, or days) for
which the key is valid (range is 3 minutes to 365 days; default is 8 hours). When the
key expires, the firewall renegoates a new key. A lifeme is the period between each
renegoaon.
2. For the IKEv2 Authencaon Mulple, specify a value (range is 0-50; default is 0) that is
mulplied by the Key Lifeme to determine the authencaon count. The default value
of 0 disables the re-authencaon feature.
STEP 5 | Aach the IKE Crypto profile to the IKE Gateway configuraon.
See Configure advanced opons for the gateway.
PAN-OS® Administrator’s Guide Version 10.1 1277 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 2 | Select the DH Group to use for the IPSec SA negoaons in IKE phase 2.
From DH Group, select the key strength you want to use: group1, group2, group5, group14,
group19, or group20. For highest security, choose the group with the highest number.
If you don’t want to renew the key that the firewall creates during IKE phase 1, select no-
pfs (no perfect forward secrecy); the firewall reuses the current key for the IPSec security
associaon (SA) negoaons.
PAN-OS® Administrator’s Guide Version 10.1 1278 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 3 | Select the Tunnel interface on which to set up the IPSec tunnel.
To create a new tunnel interface:
1. Select Tunnel Interface > New Tunnel Interface. (You can also select Network >
Interfaces > Tunnel and click Add.)
2. In the Interface Name field, specify a numeric suffix, such as .2.
3. On the Config tab, select the Security Zone list to define the zone as follows:
Use your trust zone as the terminaon point for the tunnel—Select the zone. Associang the
tunnel interface with the same zone (and virtual router) as the external-facing interface on
which the packets enter the firewall migates the need to create inter-zone roung.
Or:
Create a separate zone for VPN tunnel terminaon (Recommended)—Select New Zone, define
a Name for the new zone (for example vpn-corp), and click OK.
1. For Virtual Router, select default.
2. (Oponal) If you want to assign an IPv4 address to the tunnel interface, select the IPv4
tab, and Add the IP address and network mask, for example 10.31.32.1/32.
3. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1279 ©2022 Palo Alto Networks, Inc.
VPNs
ESP. To route IPv6 traffic to the tunnel, you can use a stac route to the tunnel, or use
OSPFv3, or use a Policy-Based Forwarding (PBF) rule.
3. Enter the 64-bit extended unique Interface ID in hexadecimal format, for example,
00:26:08:FF:FE:DE:4E:29. By default, the firewall will use the EUI-64 generated from the
physical interface’s MAC address.
4. To assign an IPv6 Address to the tunnel interface, Add the IPv6 address and prefix
length, for example 2001:400:f00::1/64. If Prefix is not selected, the IPv6 address
assigned to the interface will be wholly specified in the address text box.
1. Select Use interface ID as host poron to assign an IPv6 address to the interface that
will use the interface ID as the host poron of the address.
2. Select Anycast to include roung through the nearest node.
PAN-OS® Administrator’s Guide Version 10.1 1280 ©2022 Palo Alto Networks, Inc.
VPNs
(packets that are too old) or packets that already appear in the sliding window (duplicate or
replayed packets). Accepted packets, aer they are validated, update the sliding window,
displacing the lowest sequence number out of the window if it was already full.
1. On the General tab, select Show Advanced Opons and select Enable Replay Protecon
to detect and neutralize against replay aacks.
2. Select the An Replay Window to use. You can select a an-replay window size of 64,
128, 256, 512, 1024, 2048, or 4096. The default is 1024.
STEP 7 | (Oponal) Preserve the Type of Service header for the priority or treatment of IP packets.
In the Show Advanced Opons secon, select Copy TOS Header. This copies the Type of
Service (TOS) header from the inner IP header to the outer IP header of the encapsulated
packets in order to preserve the original TOS informaon.
If there are mulple sessions inside the tunnel (each with a different TOS value),
copying the TOS header can cause the IPSec packets to arrive out of order.
STEP 8 | (Oponal) Select Add GRE Encapsulaon to enable GRE over IPSec.
Add GRE encapsulaon in cases where the remote endpoint requires traffic to be encapsulated
within a GRE tunnel before IPSec encrypts the traffic. For example, some implementaons
require mulcast traffic to be encapsulated before IPSec encrypts it. Add GRE Encapsulaon
when the GRE packet encapsulated in IPSec has the same source IP address and desnaon IP
address as the encapsulang IPSec tunnel.
To alert the device administrator to tunnel failures and to provide automac failover to another
tunnel interface:
1. Select Tunnel Monitor.
2. Specify a Desnaon IP address on the other side of the tunnel to determine if the
tunnel is working properly.
3. Select a Profile to determine the acon upon tunnel failure. To create a new profile, see
Define a Tunnel Monitoring Profile.
PAN-OS® Administrator’s Guide Version 10.1 1281 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1282 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 4 | Specify the Interval (sec) and Threshold to trigger the specified acon.
• Threshold specifies the number of heartbeats to wait before taking the specified acon
(range is 2-100; default is 5).
• Interval (sec) specifies the me (in seconds) between heartbeats (range is 2-10; default is 3).
STEP 5 | Aach the monitoring profile to the IPsec Tunnel configuraon. See Enable Tunnel
Monitoring.
PAN-OS® Administrator’s Guide Version 10.1 1283 ©2022 Palo Alto Networks, Inc.
VPNs
IKE Updates the onscreen stascs for Restarts the selected IKE gateway.
Gateway the selected IKE gateway.
IKEv2: Also restarts any associated child
(IKE Phase
Equivalent to issuing a second show IPSec security associaons (SAs).
1)
command in the CLI (aer an inial
IKEv1: Does not restart the associated
show command).
IPSec SAs.
A restart is disrupve to all exisng
sessions.
Equivalent to issuing a clear, test,
show command sequence in the CLI.
IPSec Updates the onscreen stascs for Restarts the IPSec tunnel.
Tunnel the selected IPSec tunnel.
A restart is disrupve to all exisng
(IKE Phase
Equivalent to issuing a second show sessions.
2)
command in the CLI (aer an inial
Equivalent to issuing a clear, test,
show command).
show command sequence in the CLI.
PAN-OS® Administrator’s Guide Version 10.1 1284 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 2 | Enter the following command to test if IKE phase 1 is set up:
In the output, check whether the Security Associaon displays. If it doesn’t, review the system
log messages to interpret the reason for failure.
STEP 3 | Iniate IKE phase 2 by either pinging a host from across the tunnel or using the following CLI
command:
PAN-OS® Administrator’s Guide Version 10.1 1285 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 4 | Enter the following command to test if IKE phase 2 is set up:
In the output, check whether the Security Associaon displays. If it doesn’t, review the system
log messages to interpret the reason for failure.
STEP 5 | To view the VPN traffic flow informaon, use the following command:
Received unencrypted notify payload (no Check the IKE Crypto profile
proposal chosen) from IP x.x.x.x[500] to configuraon to verify that the
y.y.y.y[500], ignored... proposals on both sides have a
common encrypon, authencaon,
or and DH Group proposal.
PAN-OS® Administrator’s Guide Version 10.1 1286 ©2022 Palo Alto Networks, Inc.
VPNs
IKE phase-2 negotiation failed when The VPN peer on one end is using
processing Proxy ID. Received local id policy-based VPN. You must
x.x.x.x/x type IPv4 address protocol configure a Proxy ID on the Palo
0 port 0, received remote id y.y.y.y/y Alto Networks firewall. See Create a
type IPv4 address protocol 0 port 0. Proxy ID to idenfy the VPN peers..
PAN-OS® Administrator’s Guide Version 10.1 1287 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1288 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1289 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 2 | Create a tunnel interface and aach it to a virtual router and security zone.
1. Select Network > Interfaces > Tunnel and click Add.
2. In the Interface Name field, specify a numeric suffix, such as .1.
3. On the Config tab, expand the Security Zone to define the zone as follows:
• To use your trust zone as the terminaon point for the tunnel, select the zone.
• (Recommended) To create a separate zone for VPN tunnel terminaon, click New
Zone. In the Zone dialog, define a Name for new zone (for example vpn-tun), and then
click OK.
4. Select the Virtual Router.
5. (Oponal) Assign an IP address to the tunnel interface, select the IPv4 or IPv6 tab,
click Add in the IP secon, and enter the IP address and network mask to assign to the
interface.
With stac routes, the tunnel interface does not require an IP address. For traffic that is
desned to a specified subnet/IP address, the tunnel interface will automacally become
the next hop. Consider adding an IP address if you want to enable tunnel monitoring.
6. To save the interface configuraon, click OK.
In this example, the configuraon for VPN Peer A is:
• Interface—tunnel.10
• Security Zone—vpn_tun
• Virtual Router—default
• IPv4—172.19.9.2/24
The configuraon for VPN Peer B is:
• Interface—tunnel.11
• Security Zone—vpn_tun
• Virtual Router—default
• IPv4—192.168.69.2/24
STEP 3 | Configure a stac route, on the virtual router, to the desnaon subnet.
1. Select Network > Virtual Router and click the router you defined in the prior step.
2. Select Stac Route, click Add, and enter a new route to access the subnet that is at the
other end of the tunnel.
In this example, the configuraon for VPN Peer A is:
• Desnaon—192.168.69.0/24
• Interface—tunnel.10
The configuraon for VPN Peer B is:
• Desnaon—172.19.9.0/24
• Interface—tunnel.11
PAN-OS® Administrator’s Guide Version 10.1 1290 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 4 | Set up the Crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase
2).
Complete this task on both peers and make sure to set idencal values.
1. Select Network > Network Profiles > IKE Crypto. In this example, we use the default
profile.
2. Select Network > Network Profiles > IPSec Crypto. In this example, we use the default
profile.
PAN-OS® Administrator’s Guide Version 10.1 1291 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1292 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1293 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 2 | Create a tunnel interface and aach it to a virtual router and security zone.
1. Select Network > Interfaces > Tunnel and click Add.
2. In the Interface Name field, specify a numeric suffix, such as, .11.
3. On the Config tab, expand Security Zone to define the zone as follows:
• To use your trust zone as the terminaon point for the tunnel, select the zone.
• (Recommended) To create a separate zone for VPN tunnel terminaon, click New
Zone. In the Zone dialog, define a Name for new zone (for example, vpn-tun), and
then click OK.
4. Select the Virtual Router.
5. Assign an IP address to the tunnel interface, select the IPv4 or IPv6 tab, click Add in the
IP secon, and enter the IP address and network mask/prefix to assign to the interface,
for example, 172.19.9.2/24.
This IP address will be used as the next hop IP address to route traffic to the tunnel and
can also be used to monitor the status of the tunnel.
6. To save the interface configuraon, click OK.
In this example, the configuraon for VPN Peer A is:
• Interface—tunnel.41
• Security Zone—vpn_tun
• Virtual Router—default
• IPv4—2.1.1.141/24
The configuraon for VPN Peer B is:
• Interface—tunnel.40
• Security Zone—vpn_tun
• Virtual Router—default
• IPv4—2.1.1.140/24
STEP 3 | Set up the Crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase
2).
Complete this task on both peers and make sure to set idencal values.
1. Select Network > Network Profiles > IKE Crypto. In this example, we use the default
profile.
2. Select Network > Network Profiles > IPSec Crypto. In this example, we use the default
profile.
PAN-OS® Administrator’s Guide Version 10.1 1294 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 4 | Set up the OSPF configuraon on the virtual router and aach the OSPF areas with the
appropriate interfaces on the firewall.
For more informaon on the OSPF opons that are available on the firewall, see Configure
OSPF.
Use Broadcast as the link type when there are more than two OSPF routers that need to
exchange roung informaon.
1. Select Network > Virtual Routers, and select the default router or add a new router.
2. Select OSPF (for IPv4) or OSPFv3 (for IPv6) and select Enable.
3. In this example, the OSPF configuraon for VPN Peer A is:
• Router ID: 192.168.100.141
• Area ID: 0.0.0.0 that is assigned to the tunnel.1 interface with Link type: p2p
• Area ID: 0.0.0.10 that is assigned to the interface Ethernet1/1 and Link Type:
Broadcast
The OSPF configuraon for VPN Peer B is:
• Router ID: 192.168.100.140
• Area ID: 0.0.0.0 that is assigned to the tunnel.1 interface with Link type: p2p
• Area ID: 0.0.0.20 that is assigned to the interface Ethernet1/15 and Link Type:
Broadcast
PAN-OS® Administrator’s Guide Version 10.1 1295 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1296 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1297 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1298 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 2 | Set up the Crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase
2).
Complete this task on both peers and make sure to set idencal values.
1. Select Network > Network Profiles > IKE Crypto. In this example, we use the default
profile.
2. Select Network > Network Profiles > IPSec Crypto. In this example, we use the default
profile.
PAN-OS® Administrator’s Guide Version 10.1 1299 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1300 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 4 | Create a tunnel interface and aach it to a virtual router and security zone.
1. Select Network > Interfaces > Tunnel and click Add.
2. In the Interface Name field, specify a numeric suffix, say, .41.
3. On the Config tab, expand the Security Zone to define the zone as follows:
• To use your trust zone as the terminaon point for the tunnel, select the zone.
• (Recommended) To create a separate zone for VPN tunnel terminaon, click New
Zone. In the Zone dialog, define a Name for new zone (for example vpn-tun), and then
click OK.
4. Select the Virtual Router.
5. Assign an IP address to the tunnel interface, select the IPv4 or IPv6 tab, click Add in the
IP secon, and enter the IP address and network mask/prefix to assign to the interface,
for example, 172.19.9.2/24.
This IP address will be used to route traffic to the tunnel and to monitor the status of the
tunnel.
6. To save the interface configuraon, click OK.
In this example, the configuraon for VPN Peer A is:
• Interface—tunnel.41
• Security Zone—vpn_tun
• Virtual Router—default
• IPv4—2.1.1.141/24
The configuraon for VPN Peer B is:
• Interface—tunnel.42
• Security Zone—vpn_tun
• Virtual Router—default
• IPv4—2.1.1.140/24
STEP 5 | Specify the interface to route traffic to a desnaon on the 192.168.x.x network.
1. On VPN Peer A, select the virtual router.
2. Select Stac Routes, and Add tunnel.41 as the Interface for roung traffic with a
Desnaon in the 192.168.x.x network.
PAN-OS® Administrator’s Guide Version 10.1 1301 ©2022 Palo Alto Networks, Inc.
VPNs
STEP 6 | Set up the stac route and the OSPF configuraon on the virtual router and aach the OSPF
areas with the appropriate interfaces on the firewall.
1. On VPN Peer B, select Network > Virtual Routers, and select the default router or add a
new router.
2. Select Stac Routes and Add the tunnel IP address as the next hop for traffic in the
172.168.x.x. network.
Assign the desired route metric; using a lower the value makes the a higher priority for
route selecon in the forwarding table.
3. Select OSPF (for IPv4) or OSPFv3 (for IPv6) and select Enable.
4. In this example, the OSPF configuraon for VPN Peer B is:
• Router ID: 192.168.100.140
• Area ID: 0.0.0.0 is assigned to the interface Ethernet 1/12 Link type: Broadcast
• Area ID: 0.0.0.10 that is assigned to the interface Ethernet1/1 and Link Type:
Broadcast
• Area ID: 0.0.0.20 is assigned to the interface Ethernet1/15 and Link Type: Broadcast
STEP 7 | Create a redistribuon profile to inject the stac routes into the OSPF autonomous system.
1. Create a redistribuon profile on VPN Peer B.
1. Select Network > Virtual Routers, and select the router you used above.
2. Select Redistribuon Profiles, and click Add.
3. Enter a Name for the profile and select Redist and assign a Priority value. If you have
configured mulple profiles, the profile with the lowest priority value is matched first.
4. Set Source Type as stac, and click OK. The stac route you defined in Step 6 will be
used for the redistribuon.
2. Inject the stac routes in to the OSPF system.
1. Select OSPF > Export Rules (for IPv4) or OSPFv3 > Export Rules (for IPv6).
2. Click Add, and select the redistribuon profile that you just created.
3. Select how the external routes are brought into the OSPF system. The default opon,
Ext2 calculates the total cost of the route using only the external metrics. To use both
internal and external OSPF metrics, use Ext1.
4. Assign a Metric (cost value) for the routes injected into the OSPF system. This opon
allows you to change the metric for the injected route as it comes into the OSPF
system.
5. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1302 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1303 ©2022 Palo Alto Networks, Inc.
VPNs
PAN-OS® Administrator’s Guide Version 10.1 1304 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
The GlobalProtect Large Scale VPN (LSVPN) feature on the Palo Alto Networks next-
generaon firewall simplifies the deployment of tradional hub and spoke VPNs,
enabling you to quickly deploy enterprise networks with several branch offices with a
minimum amount of configuraon required on the remote satellites. This soluon uses
cerficates for firewall authencaon and IPSec to secure data.
LSVPN enables site-to-site VPNs between Palo Alto Networks firewalls. To set up a
site-to-site VPN between a Palo Alto Networks firewall and another device, see VPNs.
The following topics describe the LSVPN components and how to set them up to
enable site-to-site VPN services between Palo Alto Networks firewalls:
1305
Large Scale VPN (LSVPN)
LSVPN Overview
GlobalProtect provides a complete infrastructure for managing secure access to corporate
resources from your remote sites. This infrastructure includes the following components:
• GlobalProtect Portal—Provides the management funcons for your GlobalProtect LSVPN
infrastructure. Every satellite that parcipates in the GlobalProtect LSVPN receives
configuraon informaon from the portal, including configuraon informaon to enable the
satellites (the spokes) to connect to the gateways (the hubs). You configure the portal on an
interface on any Palo Alto Networks next-generaon firewall.
• GlobalProtect Gateways—A Palo Alto Networks firewall that provides the tunnel end point for
satellite connecons. The resources that the satellites access is protected by security policy
on the gateway. It is not required to have a separate portal and gateway; a single firewall can
funcon both as portal and gateway.
• GlobalProtect Satellite—A Palo Alto Networks firewall at a remote site that establishes
IPSec tunnels with the gateway(s) at your corporate office(s) for secure access to centralized
resources. Configuraon on the satellite firewall is minimal, enabling you to quickly and easily
scale your VPN as you add new sites.
The following diagram illustrates how the GlobalProtect LSVPN components work together.
PAN-OS® Administrator’s Guide Version 10.1 1306 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1307 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 2 | On the firewall(s) hosng GlobalProtect gateway(s), configure the logical tunnel interface that
will terminate VPN tunnels established by the GlobalProtect satellites.
IP addresses are not required on the tunnel interface unless you plan to use dynamic
roung. However, assigning an IP address to the tunnel interface can be useful for
troubleshoong connecvity issues.
Make sure to enable User-ID in the zone where the VPN tunnels terminate.
STEP 3 | If you created a separate zone for tunnel terminaon of VPN connecons, create a security
policy to enable traffic flow between the VPN zone and your trust zone.
For example, a policy rule enables traffic between the lsvpn-tun zone and the L3-Trust zone.
PAN-OS® Administrator’s Guide Version 10.1 1308 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1309 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 1 | On the firewall hosng the GlobalProtect portal, create the root CA cerficate for signing the
cerficates of the GlobalProtect components.
Create a Self-Signed Root CA Cerficate:
1. Select Device > Cerficate Management > Cerficates > Device Cerficates and click
Generate.
2. Enter a Cerficate Name, such as LSVPN_CA.
3. Do not select a value in the Signed By field (this is what indicates that it is self-signed).
4. Select the Cerficate Authority check box and then click OK to generate the cerficate.
STEP 2 | Create SSL/TLS service profiles for the GlobalProtect portal and gateways.
For the portal and each gateway, you must assign an SSL/TLS service profile that references a
unique self-signed server cerficate.
The best pracce is to issue all of the required cerficates on the portal, so that the
signing cerficate (with the private key) doesn’t have to be exported.
If the GlobalProtect portal and gateway are on the same firewall interface, you can use
the same server cerficate for both components.
1. Use the root CA on the portal to Generate a Cerficate for each gateway you will deploy:
1. Select Device > Cerficate Management > Cerficates > Device Cerficates and click
Generate.
2. Enter a Cerficate Name.
3. Enter the FQDN (recommended) or IP address of the interface where you plan to
configure the gateway in the Common Name field.
4. In the Signed By field, select the LSVPN_CA cerficate you just created.
5. In the Cerficate Aributes secon, click Add and define the aributes to uniquely
idenfy the gateway. If you add a Host Name aribute (which populates the SAN field
of the cerficate), it must exactly match the value you defined for the Common Name.
6. Generate the cerficate.
2. Configure an SSL/TLS Service Profile for the portal and each gateway:
1. Select Device > Cerficate Management > SSL/TLS Service Profile and click Add.
2. Enter a Name to idenfy the profile and select the server Cerficate you just created
for the portal or gateway.
3. Define the range of TLS versions (Min Version to Max Version) allowed for
communicang with satellites and click OK.
PAN-OS® Administrator’s Guide Version 10.1 1310 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
Best Pracces:
• Export the self-signed server cerficates issued by the root CA from the portal and import
them onto the gateways.
• Be sure to issue a unique server cerficate for each gateway.
• The Common Name (CN) and, if applicable, the Subject Alternave Name (SAN) fields of
the cerficate must match the IP address or fully qualified domain name (FQDN) of the
interface where you configure the gateway.
1. On the portal, select Device > Cerficate Management > Cerficates > Device
Cerficates, select the gateway cerficate you want to deploy, and click Export.
2. Select Encrypted Private Key and Cerficate (PKCS12) from the File Format drop-down.
3. Enter (and re-enter) a Passphrase to encrypt the private key associated with the
cerficate and then click OK to download the PKCS12 file to your computer.
4. On the gateway, select Device > Cerficate Management > Cerficates > Device
Cerficates and click Import.
5. Enter a Cerficate Name.
6. Enter the path and name to the Cerficate File you just downloaded from the portal, or
Browse to find the file.
7. Select Encrypted Private Key and Cerficate (PKCS12) as the File Format.
8. Enter the path and name to the PKCS12 file in the Key File field or Browse to find it.
9. Enter and re-enter the Passphrase you used to encrypt the private key when you
exported it from the portal and then click OK to import the cerficate and key.
PAN-OS® Administrator’s Guide Version 10.1 1311 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 4 | Import the root CA cerficate used to issue server cerficates for the LSVPN components.
You must import the root CA cerficate onto all gateways and satellites. For security reasons,
make sure you export the cerficate only, and not the associated private key.
1. Download the root CA cerficate from the portal.
1. Select Device > Cerficate Management > Cerficates > Device Cerficates.
2. Select the root CA cerficate used to issue cerficates for the LSVPN components
and click Export.
3. Select Base64 Encoded Cerficate (PEM) from the File Format drop-down and click
OK to download the cerficate. (Do not export the private key.)
2. On the firewalls hosng the gateways and satellites, import the root CA cerficate.
1. Select Device > Cerficate Management > Cerficates > Device Cerficates and click
Import.
2. Enter a Cerficate Name that idenfies the cerficate as your client CA cerficate.
3. Browse to the Cerficate File you downloaded from the CA.
4. Select Base64 Encoded Cerficate (PEM) as the File Format and then click OK.
5. Select the cerficate you just imported on the Device Cerficates tab to open it.
6. Select Trusted Root CA and then click OK.
7. Commit the changes.
PAN-OS® Administrator’s Guide Version 10.1 1312 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
the sengs in the SCEP profile and automacally includes the serial number of the device in the
subject of the client cerficate. Aer receiving the client cerficate from the enterprise PKI, the
portal transparently deploys the client cerficate to the satellite device. The satellite device then
presents the client cerficate to the portal or gateway for authencaon.
STEP 1 | Create a SCEP profile.
1. Select Device > Cerficate Management > SCEP and then Add a new profile.
2. Enter a Name to idenfy the SCEP profile.
3. If this profile is for a firewall with mulple virtual systems capability, select a virtual
system or Shared as the Locaon where the profile is available.
STEP 2 | (Oponal) To make the SCEP-based cerficate generaon more secure, configure a SCEP
challenge-response mechanism between the PKI and portal for each cerficate request.
Aer you configure this mechanism, its operaon is invisible, and no further input from you is
necessary.
To comply with the U.S. Federal Informaon Processing Standard (FIPS), use a Dynamic SCEP
challenge and specify a Server URL that uses HTTPS (see Step 7).
Select one of the following opons:
• None—(Default) The SCEP server does not challenge the portal before it issues a cerficate.
• Fixed—Obtain the enrollment challenge password from the SCEP server (for example,
http://10.200.101.1/CertSrv/mscep_admin/) in the PKI infrastructure and then
copy or enter the password into the Password field.
• Dynamic—Enter the SCEP Server URL where the portal-client submits these credenals (for
example, http://10.200.101.1/CertSrv/mscep_admin/), and a username and OTP
of your choice. The username and password can be the credenals of the PKI administrator.
STEP 3 | Specify the sengs for the connecon between the SCEP server and the portal to enable the
portal to request and receive client cerficates.
To idenfy the satellite, the portal automacally includes the device serial number in the CSR
request to the SCEP server. Because the SCEP profile requires a value in the Subject field, you
can leave the default $USERNAME token even though the value is not used in client cerficates
for LSVPN.
1. Configure the Server URL that the portal uses to reach the SCEP server in the PKI (for
example, http://10.200.101.1/certsrv/mscep/).
2. Enter a string (up to 255 characters in length) in the CA-IDENT Name field to idenfy
the SCEP server.
3. Select the Subject Alternave Name Type:
• RFC 822 Name—Enter the email name in a cerficate’s subject or Subject Alternave
Name extension.
• DNS Name—Enter the DNS name used to evaluate cerficates.
• Uniform Resource Idenfier—Enter the name of the resource from which the client
will obtain the cerficate.
• None—Do not specify aributes for the cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1313 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 5 | (Oponal) Configure the permied uses of the cerficate, either for signing or encrypon.
• To use this cerficate for signing, select the Use as digital signature check box. This enables
the endpoint use the private key in the cerficate to validate a digital signature.
• To use this cerficate for encrypon, select the Use for key encipherment check box. This
enables the client use the private key in the cerficate to encrypt data exchanged over the
HTTPS connecon established with the cerficates issued by the SCEP server.
STEP 6 | (Oponal) To ensure that the portal is connecng to the correct SCEP server, enter the
CA Cerficate Fingerprint. Obtain this fingerprint from the SCEP server interface in the
Thumbprint field.
1. Enter the URL for the SCEP server’s administrave UI (for example, http://
<hostname or IP>/CertSrv/mscep_admin/).
2. Copy the thumbprint and enter it in the CA Cerficate Fingerprint field.
STEP 7 | Enable mutual SSL authencaon between the SCEP server and the GlobalProtect portal.
This is required to comply with the U.S. Federal Informaon Processing Standard (FIPS).
FIPS-CC operaon is indicated on the firewall login page and in its status bar.
Select the SCEP server’s root CA Cerficate. Oponally, you can enable mutual SSL
authencaon between the SCEP server and the GlobalProtect portal by selecng a Client
Cerficate.
STEP 9 | (Oponal) If aer saving the SCEP profile, the portal fails to obtain the cerficate, you can
manually generate a cerficate signing request (CSR) from the portal.
1. Select Device > Cerficate Management > Cerficates > Device Cerficates and then
click Generate.
2. Enter a Cerficate Name. This name cannot contain spaces.
3. Select the SCEP Profile to use to submit a CSR to your enterprise PKI.
4. Click OK to submit the request and generate the cerficate.
PAN-OS® Administrator’s Guide Version 10.1 1314 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
The following workflow describes how to set up the portal to authencate satellites against an
exisng authencaon service. For authencang the satellite to the portal, GlobalProtect LSVPN
supports only local database authencaon.
STEP 1 | Set up local database authencaon so that the satellite administrator can authencate the
satellite to the portal.
1. Select Device > Local User Database > Users and Add the user account to the local
database.
2. Add the user account to the local database.
PAN-OS® Administrator’s Guide Version 10.1 1315 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1316 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 2 | Specify the network informaon that enables satellite devices to connect to the gateway.
If you haven’t created the network interface for the gateway, see Create Interfaces and Zones
for the LSVPN for instrucons.
1. Select the Interface that satellites will use for ingress access to the gateway.
2. Specify the IP Address Type and IP address for gateway access:
• The IP address type can be IPv4 (only), IPv6 (only), or IPv4 and IPv6. Use IPv4 and
IPv6 if your network supports dual stack configuraons, where IPv4 and IPv6 run at
the same me.
• The IP address must be compable with the IP address type. For example,
172.16.1/0 for IPv4 addresses or 21DA:D3:0:2F3B for IPv6 addresses. For dual
stack configuraons, enter both an IPv4 and IPv6 address.
3. Click OK to save changes.
PAN-OS® Administrator’s Guide Version 10.1 1317 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 3 | Specify how the gateway authencates satellites aempng to establish tunnels. If
you haven’t yet created an SSL/TLS Service profile for the gateway, see Deploy Server
Cerficates to the GlobalProtect LSVPN Components.
If you haven’t set up the authencaon profiles or cerficate profiles, see Configure the Portal
to Authencate Satellites for instrucons.
If you have not yet set up the cerficate profile, see Enable SSL Between GlobalProtect LSVPN
Components for instrucons.
On the GlobalProtect Gateway Configuraon dialog, select Authencaon and then configure
any of the following:
• To secure communicaon between the gateway and the satellites, select the SSL/TLS
Service Profile for the gateway.
• To specify the authencaon profile to use to authencate satellites, Add a Client
Authencaon. Then, enter a Name to idenfy the configuraon, select OS: Satellite to
apply the configuraon to all satellites, and specify the Authencaon Profile to use to
authencate the satellite. You can also select a Cerficate Profile for the gateway to use to
authencate satellite devices aempng to establish tunnels.
If there are mulple sessions inside the tunnel (each with a different TOS value),
copying the TOS header can cause the IPSec packets to arrive out of order.
STEP 6 | Select the IPSec Crypto profile to use when establishing tunnel connecons.
The profile specifies the type of IPSec encrypon and the authencaon method for securing
the data that will traverse the tunnel. Because both tunnel endpoints in an LSVPN are trusted
PAN-OS® Administrator’s Guide Version 10.1 1318 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
firewalls within your organizaon, you can typically use the default (predefined) profile, which
uses ESP as the IPSec protocol, group2 for the DH group, AES-128-CBC for encrypon, and
SHA-1 for authencaon.
In the IPSec Crypto Profile drop-down, select default to use the predefined profile or select
New IPSec Crypto Profile to define a new profile. For details on the authencaon and
encrypon opons, see Define IPSec Crypto Profiles.
STEP 7 | Configure the network sengs to assign the satellites during establishment of the IPSec
tunnel.
You can also configure the satellite to push the DNS sengs to its local clients by
configuring a DHCP server on the firewall hosng the satellite. In this configuraon, the
satellite will push DNS sengs it learns from the gateway to the DHCP clients.
1. On the GlobalProtect Gateway Configuraon dialog, select Satellite > Network Sengs.
2. (Oponal) If clients local to the satellite need to resolve FQDNs on the corporate
network, configure the gateway to push DNS sengs to the satellites in one of the
following ways:
• If the gateway has an interface that is configured as a DHCP client, you can set the
Inheritance Source to that interface and assign the same sengs received by the
DHCP client to GlobalProtect satellites. You can also inherit the DNS suffix from the
same source.
• Manually define the Primary DNS, Secondary DNS, and DNS Suffix sengs to push
to the satellites.
3. To specify the IP Pool of addresses to assign the tunnel interface on the satellites when
the VPN is established, click Add and then specify the IP address range(s) to use.
4. To define what desnaon subnets to route through the tunnel click Add in the Access
Route area and then enter the routes as follows:
• If you want to route all traffic from the satellites through the tunnel, leave this field
blank.
In this case, all traffic except traffic desned for the local subnet will be tunneled
to the gateway.
• To route only some traffic through the gateway (called split tunneling), specify the
desnaon subnets that must be tunneled. In this case, the satellite will route traffic
that is not desned for a specified access route using its own roung table. For
example, you may choose to only tunnel traffic desned for your corporate network,
and use the local satellite to safely enable Internet access.
• If you want to enable roung between satellites, enter the summary route for the
network protected by each satellite.
PAN-OS® Administrator’s Guide Version 10.1 1319 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 8 | (Oponal) Define what routes, if any, the gateway will accept from satellites.
By default, the gateway will not add any routes satellites adverse to its roung table. If you do
not want the gateway to accept routes from satellites, you do not need to complete this step.
1. To enable the gateway to accept routes adversed by satellites, select Satellite > Route
Filter.
2. Select the Accept published routes check box.
3. To filter which of the routes adversed by the satellites to add to the gateway roung
table, click Add and then define the subnets to include. For example, if all the satellites
are configured with subnet 192.168.x.0/24 on the LAN side, configuring a permied
route of 192.168.0.0/16 to enable the gateway to only accept routes from the satellite if
it is in the 192.168.0.0/16 subnet.
PAN-OS® Administrator’s Guide Version 10.1 1320 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1321 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 2 | Specify the network informaon to enable satellites to connect to the portal.
If you haven’t yet created the network interface for the portal, see Create Interfaces and Zones
for the LSVPN for instrucons.
1. Select the Interface that satellites will use for ingress access to the portal.
2. Specify the IP Address Type and IP address for satellite access to the portal:
• The IP address type can be IPv4 (for IPv4 traffic only), IPv6 (for IPv6 traffic only, or
IPv4 and IPv6. Use IPv4 and IPv6 if your network supports dual stack configuraons,
where IPv4 and IPv6 run at the same me.
• The IP address must be compable with the IP address type. For example,
172.16.1/0 for IPv4 addresses or 21DA:D3:0:2F3B for IPv6 addresses. For dual
stack configuraons, enter both an IPv4 and IPv6 address.
3. Click OK to save changes.
STEP 3 | Specify an SSL/TLS Service profile to use to enable the satellite to establish an SSL/TLS
connecon to the portal.
If you haven’t yet created an SSL/TLS service profile for the portal and issued gateway
cerficates, see Deploy Server Cerficates to the GlobalProtect LSVPN Components.
1. On the GlobalProtect Portal Configuraon dialog, select Authencaon.
2. Select the SSL/TLS Service Profile.
STEP 4 | Specify an authencaon profile and oponal cerficate profile for authencang satellites.
The first me the satellite connects to the portal it must authencate using local
database authencaon (on subsequent sessions it uses a satellite cookie issued by the
portal). Therefore, before you can save the portal configuraon (by clicking OK), you
must Configure an authencaon profile.
Add a Client Authencaon, and then enter a Name to idenfy the configuraon, select OS:
Satellite to apply the configuraon to all satellites, and specify the Authencaon Profile to
use to authencate satellite devices. You can also specify a Cerficate Profile for the portal to
use to authencate satellite devices.
STEP 5 | Connue with defining the configuraons to push to the satellites or, if you have already
created the satellite configuraons, save the portal configuraon.
Click OK to save the portal configuraon or connue to Define the Satellite Configuraons.
PAN-OS® Administrator’s Guide Version 10.1 1322 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
configuraon to deploy. As with security rule evaluaon, the portal looks for a match starng
from the top of the list. When it finds a match, it delivers the corresponding configuraon to the
satellite.
For example, the following figure shows a network in which some branch offices require VPN
access to the corporate applicaons protected by your perimeter firewalls and another site needs
VPN access to the data center.
PAN-OS® Administrator’s Guide Version 10.1 1323 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
will be automacally added when the satellite connects). Repeat this step for each satellite
you want to receive this configuraon.
• Select the Enrollment User/User Group tab, click Add, and then select the user or group
you want to receive this configuraon. Satellites that do not match on serial number will
be required to authencate as a user specified here (either an individual user or group
member).
Before you can restrict the configuraon to specific groups, you must Map Users to
Groups.
STEP 3 | Specify the gateways that satellites with this configuraon can establish VPN tunnels with.
Routes published by the gateway are installed on the satellite as stac routes. The
metric for the stac route is 10x the roung priority. If you have more than one
gateway, make sure to also set the roung priority to ensure that routes adversed
by backup gateways have higher metrics compared to the same routes adversed by
primary gateways. For example, if you set the roung priority for the primary gateway
and backup gateway to 1 and 10 respecvely, the satellite will use 10 as the metric for
the primary gateway and 100 as the metric for the backup gateway.
STEP 5 | Arrange the satellite configuraons so that the proper configuraon is deployed to each
satellite.
• To move a satellite configuraon up on the list of configuraons, select the configuraon
and click Move Up.
• To move a satellite configuraon down on the list of configuraons, select the configuraon
and click Move Down.
STEP 6 | Specify the cerficates required to enable satellites to parcipate in the LSVPN.
1. In the Trusted Root CA field, click Add and then select the CA cerficate used to issue
the gateway server cerficates. The portal will deploy the root CA cerficate you add
PAN-OS® Administrator’s Guide Version 10.1 1324 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
here to all satellites as part of the configuraon to enable the satellite to establish an SSL
connecon with the gateways. As a best pracce, all of your gateways should use the
same issuer.
2. Select the method of Client Cerficate distribuon:
• To store the client cerficates on the portal—select Local and select the Root
CA cerficate that the portal will use to issue client cerficates to satellites upon
successfully authencang them from the Issuing Cerficate drop-down.
If the root CA cerficate used to issue your gateway server cerficates is not
on the portal, you can Import it now. See Enable SSL Between GlobalProtect
LSVPN Components for details on how to import a root CA cerficate.
• To enable the portal to act as a SCEP client to dynamically request and issue client
cerficates—select SCEP and then select the SCEP profile used to generate CSRs to
your SCEP server.
If the you have not yet set up the portal to act as a SCEP client, you can add a
New SCEP profile now. See Deploy Client Cerficates to the GlobalProtect
Satellites Using SCEP for details.
PAN-OS® Administrator’s Guide Version 10.1 1325 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 2 | Configure the logical tunnel interface for the tunnel to use to establish VPN tunnels with the
GlobalProtect gateways.
IP addresses are not required on the tunnel interface unless you plan to use dynamic
roung. However, assigning an IP address to the tunnel interface can be useful for
troubleshoong connecvity issues.
PAN-OS® Administrator’s Guide Version 10.1 1326 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 3 | If you generated the portal server cerficate using a Root CA that is not trusted by the
satellites (for example, if you used self-signed cerficates), import the root CA cerficate
used to issue the portal server cerficate.
The root CA cerficate is required to enable the satellite to establish the inial connecon with
the portal to obtain the LSVPN configuraon.
1. Download the CA cerficate that was used to generate the portal server cerficates. If
you are using self-signed cerficates, export the root CA cerficate from the portal as
follows:
1. Select Device > Cerficate Management > Cerficates > Device Cerficates.
2. Select the CA cerficate, and click Export.
3. Select Base64 Encoded Cerficate (PEM) from the File Format drop-down and click
OK to download the cerficate. (You do not need to export the private key.)
2. Import the root CA cerficate you just exported onto each satellite as follows.
1. Select Device > Cerficate Management > Cerficates > Device Cerficates and click
Import.
2. Enter a Cerficate Name that idenfies the cerficate as your client CA cerficate.
3. Browse to the Cerficate File you downloaded from the CA.
4. Select Base64 Encoded Cerficate (PEM) as the File Format and then click OK.
5. Select the cerficate you just imported on the Device Cerficates tab to open it.
6. Select Trusted Root CA and then click OK.
PAN-OS® Administrator’s Guide Version 10.1 1327 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 5 | (Oponal) Configure the satellite to publish local routes to the gateway.
Pushing routes to the gateway enables traffic to the subnets local to the satellite via the
gateway. However, you must also configure the gateway to accept the routes as detailed in
Configure GlobalProtect Gateways for LSVPN.
1. To enable the satellite to push routes to the gateway, on the Advanced tab select Publish
all stac and connected routes to Gateway.
If you select this check box, the firewall will forward all stac and connected routes
from the satellite to the gateway. However, to prevent the creaon of roung loops, the
firewall will apply some route filters, such as the following:
• Default routes
• Routes within a virtual router other than the virtual router associated with the tunnel
interface
• Routes using the tunnel interface
• Routes using the physical interface associated with the tunnel interface
2. (Oponal) If you only want to push routes for specific subnets rather than all routes, click
Add in the Subnet secon and specify which subnet routes to publish.
STEP 7 | Provide the credenals to allow the satellite to authencate to the portal.
To authencate to the portal for the first me, the satellite administrator must provide a
username and password.
1. Select Network > IPSec Tunnels and click the Gateway Info link in the Status column of
the tunnel configuraon you created for the LSVPN.
2. Click the enter credenals link in the Portal Status field and username and password
required to authencate the satellite to the portal.
Aer the portal successfully authencates to the portal, it will receive its signed
cerficate and configuraon, which it will use to connect to the gateway(s). You should
see the tunnel establish and the Status change to Acve.
PAN-OS® Administrator’s Guide Version 10.1 1328 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1329 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
The following workflow shows the steps for seng up this basic configuraon:
STEP 1 | Configure a Layer 3 interface.
In this example, the Layer 3 interface on the portal/gateway requires the following
configuraon:
• Interface—ethernet1/11
• Security Zone—lsvpn-tun
• IPv4—203.0.113.11/24
STEP 2 | On the firewall(s) hosng GlobalProtect gateway(s), configure the logical tunnel interface that
will terminate VPN tunnels established by the GlobalProtect satellites.
To enable visibility into users and groups connecng over the VPN, enable User-ID in
the zone where the VPN tunnels terminate.
In this example, the Tunnel interface on the portal/gateway requires the following
configuraon:
• Interface—tunnel.1
• Security Zone—lsvpn-tun
PAN-OS® Administrator’s Guide Version 10.1 1330 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 3 | Create the Security policy rule to enable traffic flow between the VPN zone where the tunnel
terminates (lsvpn-tun) and the trust zone where the corporate applicaons reside (L3-Trust).
See Create a Security Policy Rule.
STEP 4 | Assign an SSL/TLS Service profile to the portal/gateway. The profile must reference a self-
signed server cerficate.
The cerficate subject name must match the FQDN or IP address of the Layer 3 interface you
create for the portal/gateway.
1. On the firewall hosng the GlobalProtect portal, create the root CA cerficate for signing
the cerficates of the GlobalProtect components. In this example, the root CA cerficate,
lsvpn-CA, will be used to issue the server cerficate for the portal/gateway. In addion,
the portal will use this root CA cerficate to sign the CSRs from the satellites.
2. Create SSL/TLS service profiles for the GlobalProtect portal and gateways.
Because the portal and gateway are on the same interface in this example, they can
share an SSL/TLS Service profile that uses the same server cerficate. In this example,
the profile is named lsvpnserver.
STEP 6 | Configure the portal to authencate satellites using local database authencaon.
PAN-OS® Administrator’s Guide Version 10.1 1331 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1332 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
For a basic setup of a LSVPN, follow the steps in Basic LSVPN Configuraon with Stac Roung.
You can then complete the steps in the following workflow to extend the configuraon to use
dynamic roung rather than stac roung.
STEP 1 | Add an IP address to the tunnel interface configuraon on each gateway and each satellite.
Complete the following steps on each gateway and each satellite:
1. Select Network > Interfaces > Tunnel and select the tunnel configuraon you created for
the LSVPN to open the Tunnel Interface dialog.
If you have not yet created the tunnel interface, see Step 2 in Create Interfaces and
Zones for the LSVPN.
2. On the IPv4 tab, click Add and then enter an IP address and subnet mask. For example,
to add an IP address for the gateway tunnel interface you would enter 2.2.2.100/24.
3. Click OK to save the configuraon.
PAN-OS® Administrator’s Guide Version 10.1 1333 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
STEP 4 | Verify that the gateways and satellites are able to form router adjacencies.
• On each satellite and each gateway, confirm that peer adjacencies have formed and that
roung table entries have been created for the peers (that is, the satellites have routes to
the gateways and the gateways have routes to the satellites). Select Network > Virtual
Router and click the More Runme Stats link for the virtual router you are using for the
LSVPN. On the Roung tab, verify that the LSVPN peer has a route.
• On the OSPF > Interface tab, verify that the Type is p2mp.
• On the OSPF > Neighbor tab, verify that the firewalls hosng your gateways have
established router adjacencies with the firewalls hosng your satellites and vice versa. Also
verify that the Status is Full, indicang that full adjacencies have been established.
PAN-OS® Administrator’s Guide Version 10.1 1334 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
The following workflow shows the steps for configuring this deployment:
PAN-OS® Administrator’s Guide Version 10.1 1335 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
Configure the zones, interfaces, and IP addresses on each satellite. The interface and
local IP address will be different for each satellite. This interface is used for the VPN
connecon to the portal and gateway.
STEP 2 | On the firewall(s) hosng GlobalProtect gateway(s), configure the logical tunnel interface that
will terminate VPN tunnels established by the GlobalProtect satellites.
Primary gateway:
• Interface: tunnel.5
• IPv4: 10.11.15.254/22
• Zone: LSVPN-Tunnel-Primary
Backup gateway:
• Interface: tunnel.1
• IPv4: 10.11.15.245/22
• Zone: LSVPN-Tunnel-Backup
PAN-OS® Administrator’s Guide Version 10.1 1336 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1337 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
single satellite configuraon is needed. Satellites are matched based on their serial
numbers, so no satellites will need to authencate as a user.
6. On Satellite > Network Sengs, define the pool of IP address to assign to the tunnel
interface on the satellite once the VPN connecon is established. Because this use case
uses dynamic roung, the Access Routes seng remains blank.
7. Repeat steps 1 through 5 on the backup gateway with the following sengs:
• Name: LSVPN-backup
• Gateway interface: ethernet1/5
• Gateway IP: 172.16.22.25/24
• Server cert: LSVPN-backup-GW-cert
• Tunnel interface: tunnel.1
STEP 5 | Configure iBGP on the primary and backup gateways and add a redistribuon profile to allow
the satellites to inject local routes back to the gateways.
Each satellite office manages its own network and firewall, so the redistribuon profile called
ToAllSat is configured to redistribute local routes back to the GlobalProtect gateway.
1. Select Network > Virtual Routers and Add a virtual router.
2. On Router Sengs, add the Name and Interface for the virtual router.
3. On Redistribuon Profile and select Add.
1. Name the redistribuon profile ToAllSat and set the Priority to 1.
2. Set Redistribute to Redist.
3. Add ethernet1/23 from the Interface drop-down.
4. Click OK.
4. Select BGP on the Virtual Router to configure BGP.
1. On BGP > General, select Enable.
2. Enter the gateway IP address as the Router ID (172.16.22.1) and 1000 as the AS
Number.
3. In the Opons secon, select Install Route.
4. On BGP > Peer Group, click Add a peer group with all the satellites that will connect
to the gateway.
5. On BGP > Redist Rules, Add the ToAllSat redistribuon profile you created
previously.
5. Click OK.
6. Repeat steps 1 through 5 on the backup gateway using ethernet1/6 for the
redistribuon profile.
PAN-OS® Administrator’s Guide Version 10.1 1338 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1339 ©2022 Palo Alto Networks, Inc.
Large Scale VPN (LSVPN)
PAN-OS® Administrator’s Guide Version 10.1 1340 ©2022 Palo Alto Networks, Inc.
Policy
Policies allow you to enforce rules and take acon. The different types of policy rules
that you can create on the firewall are: Security, NAT, Quality of Service (QoS), Policy
Based Forwarding (PBF), Decrypon, Applicaon Override, Authencaon, Denial of
Service (DoS), and Zone protecon policies. All these different policies work together
to allow, deny, priorize, forward, encrypt, decrypt, make excepons, authencate
access, and reset connecons as needed to help secure your network. The following
topics describe how to work with policy:
> Policy Types > Use an External Dynamic List in
> Security Policy Policy
1341
Policy
Policy Types
The Palo Alto Networks next-generaon firewall supports a variety of policy types that work
together to safely enable applicaons on your network.
For all policy types, when you Enforce Policy Rule Descripon, Tag, and Audit Comment, you
can use the audit comment archive to view how a policy rule changed over me. The archive,
which includes the audit comment history and the configuraon logs, enables you to compare
configuraon versions and review who created or modified and why.
NAT Instruct the firewall which packets need translaon and how to do
the translaon. The firewall supports both source address and/or port
translaon and desnaon address and/or port translaon. For details,
see NAT.
Policy Based Idenfy traffic that should use a different egress interface than the
Forwarding one that would normally be used based on the roung table. For more
details, see Policy-Based Forwarding.
Decrypon Idenfy encrypted traffic that you want to inspect for visibility, control,
and granular security. For more details, see Decrypon.
Applicaon Override Idenfy sessions that you do not want processed by the App-ID
engine, which is a Layer-7 inspecon. Traffic matching an applicaon
override policy forces the firewall to handle the session as a regular
stateful inspecon firewall at Layer-4. For more details, see Manage
Custom or Unknown Applicaons.
Authencaon Idenfy traffic that requires users to authencate. For more details, see
Authencaon Policy.
DoS Protecon Idenfy potenal denial-of-service (DoS) aacks and take protecve
acon in response to rule matches. For more details, see DoS
Protecon Profiles.
PAN-OS® Administrator’s Guide Version 10.1 1342 ©2022 Palo Alto Networks, Inc.
Policy
Security Policy
Security policy protects network assets from threats and disrupons and helps to opmally
allocate network resources for enhancing producvity and efficiency in business processes. On a
Palo Alto Networks firewall, individual Security policy rules determine whether to block or allow
a session based on traffic aributes, such as the source and desnaon security zone, the source
and desnaon IP address, the applicaon, the user, and the service.
To ensure that end users authencate when they try to access your network resources, the
firewall evaluates Authencaon Policy before Security policy.
All traffic passing through the firewall is matched against a session and each session is matched
against a Security policy rule. When a session match occurs, the firewall applies the matching
Security policy rule to bidireconal traffic in that session (client to server and server to client). For
traffic that doesn’t match any defined rules, the default rules apply. The default rules—displayed
at the boom of the security rulebase—are predefined to allow all intrazone traffic (within a zone)
and deny all interzone traffic (between zones). Although these rules are part of the predefined
configuraon and are read-only by default, you can override them and change a limited number of
sengs, including the tags, acon (allow or block), log sengs, and security profiles.
Security policy rules are evaluated le to right and from top to boom. A packet is matched
against the first rule that meets the defined criteria and, aer a match is triggered, subsequent
rules are not evaluated. Therefore, the more specific rules must precede more generic ones in
order to enforce the best match criteria. Traffic that matches a rule generates a log entry at the
end of the session in the traffic log if you enable logging for that rule. The logging opons are
configurable for each rule and can, for example, be configured to log at the start of a session
instead of, or in addion to, logging at the end of a session.
Aer an administrator configures a rule, you can View Policy Rule Usage to determine when
and how many mes traffic matches the Security policy rule to determine its effecveness. As
your rulebase evolves, change and audit informaon get lost over me unless you archived this
informaon at the me the rule is created or modified. You can Enforce Policy Rule Descripon,
Tag, and Audit Comment to ensure that all administrators enter audit comments so that you can
view the audit comment archive and review comments and configuraon log history and can
compare rule configuraon versions for a selected rule. Together, you now have more visibility
into and control over the rulebase.
• Components of a Security Policy Rule
• Security Policy Acons
• Create a Security Policy Rule
PAN-OS® Administrator’s Guide Version 10.1 1343 ©2022 Palo Alto Networks, Inc.
Policy
Required/Field Descripon
Oponal
Rule Type Specifies whether the rule applies to traffic within a zone, between
zones, or both:
• universal (default)—Applies the rule to all matching interzone
and intrazone traffic in the specified source and desnaon
zones. For example, if you create a universal rule with source
zones A and B and desnaon zones A and B, the rule would
apply to all traffic within zone A, all traffic within zone B, and all
traffic from zone A to zone B and all traffic from zone B to zone
A.
• intrazone—Applies the rule to all matching traffic within the
specified source zones (you cannot specify a desnaon zone
for intrazone rules). For example, if you set the source zone to
A and B, the rule would apply to all traffic within zone A and all
traffic within zone B, but not to traffic between zones A and B.
• interzone—Applies the rule to all matching traffic between the
specified source and desnaon zones. For example, if you set
the source zone to A, B, and C and the desnaon zone to A
and B, the rule would apply to traffic from zone A to zone B,
from zone B to zone A, from zone C to zone A, and from zone C
to zone B, but not traffic within zones A, B, or C.
Desnaon The zone at which the traffic terminates. If you use NAT, make sure
Zone to always reference the post-NAT zone.
Applicaon The applicaon that you wish to control. The firewall uses App-
ID, the traffic classificaon technology, to idenfy traffic on your
network. App-ID provides applicaon control and visibility in
creang security policies that block unknown applicaons, while
enabling, inspecng, and shaping those that are allowed.
Acon Specifies an Allow or Deny acon for the traffic based on the
criteria you define in the rule. When you configure the firewall
to deny traffic, it either resets the connecon or silently drops
packets. To provide a beer user experience, you can configure
granular opons to deny traffic instead of silently dropping
packets, which can cause some applicaons to break and appear
PAN-OS® Administrator’s Guide Version 10.1 1344 ©2022 Palo Alto Networks, Inc.
Policy
Required/Field Descripon
Oponal
unresponsive to the user. For more details, see Security Policy
Acons.
Oponal Tag A keyword or phrase that allows you to filter security rules. This
is handy when you have defined many rules and wish to then
review those that are tagged with a keyword such as IT-sanconed
applicaons or High-risk applicaons.
Source Address Define host IP addresses, subnets, address objects (of type IP
netmask, IP range, FQDN, or IP wildcard mask), address groups, or
country-based enforcement. If you use NAT, make sure to always
refer to the original IP addresses in the packet (i.e. the pre-NAT IP
address).
User The user or group of users for whom the policy applies. You must
have User-ID enabled on the zone. To enable User-ID, see User-ID
Overview.
URL Category Using the URL Category as match criteria allows you to customize
security profiles (Anvirus, An-Spyware, Vulnerability, File-
Blocking, Data Filtering, and DoS) on a per-URL-category basis.
For example, you can prevent.exe file download/upload for URL
categories that represent higher risk while allowing them for other
categories. This funconality also allows you to aach schedules to
specific URL categories (allow social-media websites during lunch
& aer-hours), mark certain URL categories with QoS (financial,
medical, and business), and select different log forwarding profiles
on a per-URL-category-basis.
Although you can manually configure URL categories on your
firewall, to take advantage of the dynamic URL categorizaon
updates available on Palo Alto Networks firewalls, you must
purchase a URL filtering license.
PAN-OS® Administrator’s Guide Version 10.1 1345 ©2022 Palo Alto Networks, Inc.
Policy
Required/Field Descripon
Oponal
To block or allow traffic based on URL category, you
must apply a URL Filtering profile to the security policy
rules. Define the URL Category as Any and aach a
URL Filtering profile to the security policy. See Set Up
a Basic Security Policy for informaon on using the
default profiles in your security policy.
Service Allows you to select a Layer 4 (TCP or UDP) port for the
applicaon. You can choose any, specify a port, or use applicaon-
default to permit use of the standards-based port for the
applicaon. For example, for applicaons with well-known port
numbers such as DNS, the applicaon-default opon will match
against DNS traffic only on TCP port 53. You can also add a custom
applicaon and define the ports that the applicaon can use.
HIP Profile (for Allows you to idenfy clients with Host Informaon Profile (HIP)
GlobalProtect) and then enforce access privileges.
Opons Allow you to define logging for the session, log forwarding sengs,
change Quality of Service (QoS) markings for packets that match
the rule, and schedule when (day and me) the security rule should
be in effect.
Acon Descripon
PAN-OS® Administrator’s Guide Version 10.1 1346 ©2022 Palo Alto Networks, Inc.
Policy
Acon Descripon
Deny Blocks traffic and enforces the default Deny Acon defined for
the applicaon that is being denied. To view the deny acon
defined by default for an applicaon, view the applicaon details
in Objects > Applicaons or check the applicaon details in
Applipedia.
Drop Silently drops the traffic; for an applicaon, it overrides the default
deny acon. A TCP reset is not sent to the host/applicaon.
For Layer 3 interfaces, to oponally send an ICMP unreachable
response to the client, set Acon: Drop and enable the Send ICMP
Unreachable check box. When enabled, the firewall sends the
ICMP code for communicaon with the desnaon is administravely
prohibited—ICMPv4: Type 3, Code 13; ICMPv6: Type 1, Code 1.
Reset both Sends a TCP reset to both the client-side and server-side devices.
A reset is sent only aer a session is formed. If the session is blocked before a 3-
way handshake is completed, the firewall will not send the reset.
For a TCP session with a reset acon, the firewall does not send an ICMP Unreachable
response.
For a UDP session with a drop or reset acon, if the ICMP Unreachable check box is
selected, the firewall sends an ICMP message to the client.
PAN-OS® Administrator’s Guide Version 10.1 1347 ©2022 Palo Alto Networks, Inc.
Policy
STEP 3 | Define the matching criteria for the source fields in the packet.
1. In the Source tab, select a Source Zone.
2. Specify a Source IP Address or leave the value set to any.
If you decide to Negate a region as a Source Address, ensure that all regions
that contain private IP addresses are added to the Source Address to avoid
connecvity loss between those private IP addresses.
3. Specify a Source User or leave the value set to any.
STEP 4 | Define the matching criteria for the desnaon fields in the packet.
1. In the Desnaon tab, set the Desnaon Zone.
2. Specify a Desnaon IP Address or leave the value set to any.
If you decide to Negate a region as the Desnaon Address, ensure that all
regions that contain private IP addresses are added to the Desnaon Address
to avoid connecvity loss between those private IP addresses.
STEP 5 | Specify the applicaon that the rule will allow or block.
As a best pracce, always use applicaon-based security policy rules instead of port-
based rules and always set the Service to applicaon-default unless you are using a
more restricve list of ports than the standard ports for an applicaon.
1. In the Applicaons tab, Add the Applicaon you want to safely enable. You can select
mulple applicaons or you can use applicaon groups or applicaon filters.
2. In the Service/URL Category tab, keep the Service set to applicaon-default to ensure
that any applicaons that the rule allows are allowed only on their standard ports.
STEP 6 | (Oponal) Specify a URL category as match criteria for the rule.
In the Service/URL Category tab, select the URL Category.
If you select a URL category, only web traffic will match the rule and only if the traffic is
desned for that specified category.
STEP 7 | Define what acon you want the firewall to take for traffic that matches the rule.
In the Acons tab, select an Acon. See Security Policy Acons for a descripon of each
acon.
PAN-OS® Administrator’s Guide Version 10.1 1348 ©2022 Palo Alto Networks, Inc.
Policy
As a best pracce, do not select the check box to Disable Server Response Inspecon
(DSRI). Selecng this opon prevents the firewall from inspecng packets from the
server to the client. For the best security posture, the firewall must inspect both the
client-to-server flows and the server-to-client flows to detect and prevent threats.
STEP 9 | Aach security profiles to enable the firewall to scan all allowed traffic for threats.
Make sure you create best pracce security profiles that help protect your network
from both known and unknown threats.
In the Acons tab, select Profiles from the Profile Type drop-down and then select the
individual security profiles to aach to the rule.
Alternavely, select Group from the Profile Type drop-down and select a security Group
Profile to aach.
STEP 10 | Click Commit to save the policy rule to the running configuraon on the firewall.
PAN-OS® Administrator’s Guide Version 10.1 1349 ©2022 Palo Alto Networks, Inc.
Policy
STEP 11 | To verify that you have set up your basic security policies effecvely, test whether your
security policy rules are being evaluated and determine which security policy rule applies to a
traffic flow.
The output displays the best rule that matches the source and desnaon IP address specified
in the CLI command.
For example, to verify the policy rule that will be applied for a server in the data center with
the IP address 208.90.56.11 when it accesses the Microso update server:
1. Select Device > Troubleshoong, and select Security Policy Match from the Select Test
drop-down.
2. Enter the Source and Desnaon IP addresses.
3. Enter the Protocol.
4. Execute the security policy match test.
STEP 12 | Aer waing long enough to allow traffic to pass through the firewall, View Policy Rule
Usage to monitor the policy rule usage status and determine the effecveness of the policy
rule.
PAN-OS® Administrator’s Guide Version 10.1 1350 ©2022 Palo Alto Networks, Inc.
Policy
Policy Objects
A policy object is a single object or a collecve unit that groups discrete idenes such as IP
addresses, URLs, applicaons, or users. With policy objects that are a collecve unit, you can
reference the object in security policy instead of manually selecng mulple objects one at a
me. Typically, when creang a policy object, you group objects that require similar permissions
in policy. For example, if your organizaon uses a set of server IP addresses for authencang
users, you can group the set of server IP addresses as an address group policy object and reference
the address group in the security policy. By grouping objects, you can significantly reduce the
administrave overhead in creang policies.
If you need to export specific parts of the configuraon for internal review or audit, you
can Export Configuraon Table Data as a PDF or CSV file.
User/User Group Allow you to create a list of users from the local database, an external
database, or match criteria and group them.
PAN-OS® Administrator’s Guide Version 10.1 1351 ©2022 Palo Alto Networks, Inc.
Policy
Service/Service Allows you to specify the source and desnaon ports and protocol
Groups that a service can use. The firewall includes two pre-defined services
—service-hp and service-hps— that use TCP ports 80 and 8080
for HTTP, and TCP port 443 for HTTPS. You can however, create
any custom service on any TCP/UDP port of your choice to restrict
applicaon usage to specific ports on your network (in other words,
you can define the default port for the applicaon).
PAN-OS® Administrator’s Guide Version 10.1 1352 ©2022 Palo Alto Networks, Inc.
Policy
Security Profiles
While security policy rules enable you to allow or block traffic on your network, security profiles
help you define an allow but scan rule, which scans allowed applicaons for threats, such as
viruses, malware, spyware, and DDOS aacks. When traffic matches the allow rule defined in the
security policy, the security profile(s) that are aached to the rule are applied for further content
inspecon rules such as anvirus checks and data filtering.
Security profiles are not used in the match criteria of a traffic flow. The security profile is
applied to scan traffic aer the applicaon or category is allowed by the security policy.
The firewall provides default security profiles that you can use out of the box to begin protecng
your network from threats. See Set Up a Basic Security Policy for informaon on using the default
profiles in your security policy. As you get a beer understanding about the security needs on
your network, see Create Best Pracce Security Profiles for the Internet Gateway to learn how
you can create custom profiles.
For recommendaons on the best-pracce sengs for security profiles, see Create Best
Pracce Security Profiles for the Internet Gateway.
You can add security profiles that are commonly applied together to Create a Security Profile
Group; this set of profiles can be treated as a unit and added to security policies in one step (or
included in security policies by default, if you choose to set up a default security profile group).
Anvirus Profiles Anvirus profiles protect against viruses, worms, and trojans as well
as spyware downloads. Using a stream-based malware prevenon
engine, which inspects traffic the moment the first packet is received,
the Palo Alto Networks anvirus soluon can provide protecon for
clients without significantly impacng the performance of the firewall.
This profile scans for a wide variety of malware in executables, PDF
files, HTML and JavaScript viruses, including support for scanning
inside compressed files and data encoding schemes. If you have
enabled Decrypon on the firewall, the profile also enables scanning of
decrypted content.
The default profile inspects all of the listed protocol decoders for
viruses, and generates alerts for SMTP, IMAP, and POP3 protocols
while blocking for FTP, HTTP, and SMB protocols. You can configure
the acon for a decoder or Anvirus signature and specify how the
firewall responds to a threat event:
• Default—For each threat signature and Anvirus signature that
is defined by Palo Alto Networks, a default acon is specified
internally. Typically, the default acon is an alert or a reset-both.
The default acon is displayed in parenthesis, for example default
(alert) in the threat or Anvirus signature.
PAN-OS® Administrator’s Guide Version 10.1 1353 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1354 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1355 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1356 ©2022 Palo Alto Networks, Inc.
Policy
URL Filtering Profiles URL Filtering profiles enable you to monitor and control how users
access the web over HTTP and HTTPS. The firewall comes with a
default profile that is configured to block websites such as known
malware sites, phishing sites, and adult content sites. You can use the
default profile in a security policy, clone it to be used as a starng point
for new URL filtering profiles, or add a new URL profile that will have
all categories set to allow for visibility into the traffic on your network.
You can then customize the newly added URL profiles and add lists
of specific websites that should always be blocked or allowed, which
provides more granular control over URL categories.
Data Filtering Profiles Data filtering profiles prevent sensive informaon such as credit
card or social security numbers from leaving a protected network.
The data filtering profile also allows you to filter on key words, such
as a sensive project name or the word confidenal. It is important to
focus your profile on the desired file types to reduce false posives.
For example, you may only want to search Word documents or Excel
spreadsheets. You may also only want to scan web-browsing traffic, or
FTP.
You can create custom data paern objects and aach them to a Data
Filtering profile to define the type of informaon on which you want to
filter. Create data paern objects based on:
• Predefined Paerns—Filter for credit card and social security
numbers (with or without dashes) using predefined paerns.
• Regular Expressions—Filter for a string of characters.
• File Properes—Filter for file properes and values based on file
type.
File Blocking Profiles The firewall uses file blocking profiles to block specified file types
over specified applicaons and in the specified session flow direcon
(inbound/outbound/both). You can set the profile to alert or block on
upload and/or download and you can specify which applicaons will
be subject to the file blocking profile. You can also configure custom
block pages that will appear when a user aempts to download the
PAN-OS® Administrator’s Guide Version 10.1 1357 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1358 ©2022 Palo Alto Networks, Inc.
Policy
DoS Protecon DoS protecon profiles provide detailed control for Denial of Service
Profiles (DoS) protecon policies. DoS policies allow you to control the number
of sessions between interfaces, zones, addresses, and countries based
on aggregate sessions or source and/or desnaon IP addresses. There
are two DoS protecon mechanisms that the Palo Alto Networks
firewalls support.
• Flood Protecon—Detects and prevents aacks where the network
is flooded with packets resulng in too many half-open sessions
and/or services being unable to respond to each request. In this
case the source address of the aack is usually spoofed. See DoS
Protecon Against Flooding of New Sessions.
• Resource Protecon— Detects and prevent session exhauson
aacks. In this type of aack, a large number of hosts (bots) are
used to establish as many fully established sessions as possible to
consume all of a system’s resources.
You can enable both types of protecon mechanisms in a single DoS
protecon profile.
The DoS profile is used to specify the type of acon to take and
details on matching criteria for the DoS policy. The DoS profile defines
sengs for SYN, UDP, and ICMP floods, can enable resource protect
and defines the maximum number of concurrent connecons. Aer
you configure the DoS protecon profile, you then aach it to a DoS
policy.
When configuring DoS protecon, it is important to analyze your
environment in order to set the correct thresholds and due to some of
the complexies of defining DoS protecon policies, this guide will not
go into detailed examples.
PAN-OS® Administrator’s Guide Version 10.1 1359 ©2022 Palo Alto Networks, Inc.
Policy
Security Profile A security profile group is a set of security profiles that can be treated
Group as a unit and then easily added to security policies. Profiles that are
oen assigned together can be added to profile groups to simplify
the creaon of security policies. You can also setup a default security
profile group—new security policies will use the sengs defined in
the default profile group to check and control traffic that matches
the security policy. Name a security profile group default to allow
the profiles in that group to be added to new security policies by
default. This allows you to consistently include your organizaon’s
preferred profile sengs in new policies automacally, without having
to manually add security profiles each me you create new rules.
See Create a Security Profile Group and Set Up or Override a Default
Security Profile Group.
PAN-OS® Administrator’s Guide Version 10.1 1360 ©2022 Palo Alto Networks, Inc.
Policy
If you name the group default, the firewall will automacally aach it to any new
rules you create. This is a me saver if you have a preferred set of security profiles that
you want to make sure get aached to every new rule.
1. Select Objects > Security Profile Groups and Add a new security profile group.
2. Give the profile group a descripve Name, for example, Threats.
3. If the firewall is in Mulple Virtual System Mode, enable the profile to be Shared by all
virtual systems.
4. Add exisng profiles to the group.
PAN-OS® Administrator’s Guide Version 10.1 1361 ©2022 Palo Alto Networks, Inc.
Policy
(the administrator can choose to manually select different profile sengs if desired). Use the
following opons to set up a default security profile group or to override your default sengs.
If no default security profile exists, the profile sengs for a new security policy are set to
None by default.
PAN-OS® Administrator’s Guide Version 10.1 1362 ©2022 Palo Alto Networks, Inc.
Policy
By default, the new security policy correctly shows the Profile Type set to Group and
the default Group Profile is selected.
PAN-OS® Administrator’s Guide Version 10.1 1363 ©2022 Palo Alto Networks, Inc.
Policy
Rule Numbers
The firewall automacally numbers each rule within a rulebase; when you move or reorder
rules, the numbers change based on the new order. When you filter the list of rules to find rules
that match specific criteria, the firewall display each rule with its number in the context of the
complete set of rules in the rulebase and its place in the evaluaon order.
Panorama independently numbers pre-rules, post-rules, and default rules. When Panorama pushes
rules to a firewall, the rule numbering reflects the hierarchy and evaluaon order of shared rules,
device group pre-rules, firewall rules, device group post-rules, and default rules. You can Preview
Rules in Panorama to display an ordered list of the total number of rules on a firewall.
PAN-OS® Administrator’s Guide Version 10.1 1364 ©2022 Palo Alto Networks, Inc.
Policy
Aer you push the rules from Panorama, view the complete list of rules with numbers on the
firewall.
From the web interface on the firewall, select Policies and pick any rulebase under it. For
example, select Policies > Security and view the complete set of numbered rules that the
firewall will evaluate.
PAN-OS® Administrator’s Guide Version 10.1 1365 ©2022 Palo Alto Networks, Inc.
Policy
Rule UUIDs
The universally unique idenfier (UUID) for a rule is a 32-character string (based on data such as
the network address and the mestamp of creaon) that the firewall or Panorama assigns to the
rule. The UUID uses the format 8-4-4-4-12 (where 8, 4, and 12 represent the number of unique
characters separated by hyphens). UUIDs idenfy rules for all policy rulebases. You can also use
UUIDs to idenfy applicable rules in the following log types: Traffic, Threat, URL Filtering, WildFire
Submission, Data Filtering, GTP, SCTP, Tunnel Inspecon, Configuraon, and Unified.
Using the UUID to search for a rule enables you to locate a specific rule you want to find among
thousands of rules that may have similar or idencal names. UUIDs also simplify automaon and
integraon for rules in third-party systems (such as ckeng or orchestraon) that do not support
names.
In some cases, you may need to generate new UUIDs for exisng rulebases. For example, if you
want to export a configuraon to another firewall, you need to regenerate the UUIDs for the rules
as you import the configuraon to ensure there are no duplicate UUIDs. If you regenerate UUIDs,
you are no longer able to track those rules using their previous UUIDs and the hit data and app
usage data for those rules are reset.
The firewall or Panorama assigns UUIDs when you:
• Create new rules
• Clone exisng rules
• Override the default security rules
• Load a named configuraon and regenerate UUIDs
• Load a named configuraon containing new rules that are not in the running configuraon
• Upgrade the firewall or Panorama to a PAN-OS 9.0 release
When you load a configuraon that contains rules with UUIDs, the firewall considers rules to be
the same if the rule name, rulebase, and virtual system all match. Panorama considers rules to be
the same if the rule name, rulebase, and the device group all match.
Keep in mind the following important points for UUIDs:
• If you manage firewall policy from Panorama, UUIDs are generated on Panorama and therefore
must be pushed from Panorama. If you do not push the configuraon from Panorama prior to
upgrading the firewalls to PAN-OS 9.0, the firewall upgrade will not succeed because it will not
have the UUIDs.
• In addion, if you are upgrading an HA pair, upon upgrade to PAN-OS 9.0, each peer
independently assigns UUIDs for each policy rule. Because of this, the peers will show as out
of sync unl you sync the configuraon (Dashboard > Widgets > System > High Availability >
Sync to peer).
• If you remove an exisng high availability (HA) configuraon aer upgrading to PAN-OS 9.0,
you must regenerate the UUIDs on one of the peers (Device > Setup > Operaons > Load
named configuraon snapshot > Regenerate UUIDs for the selected named configuraon) and
commit the changes to prevent UUID duplicaon.
• All rules pushed from Panorama will share the same UUID; all rules local to a firewall will
have different UUIDs. If you create a rule locally on the firewall aer you push the rules from
Panorama to the firewalls, the rule you created locally has its own UUID.
PAN-OS® Administrator’s Guide Version 10.1 1366 ©2022 Palo Alto Networks, Inc.
Policy
• To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load the named
Panorama configuraon snapshot. If you do not select this opon, Panorama removes all
previous rule UUIDs from the configuraon snapshot and assigns new UUIDs to the rules on
Panorama, which means it does not retain informaon associated with the previous UUIDs,
such as the policy rule hit count.
PAN-OS® Administrator’s Guide Version 10.1 1367 ©2022 Palo Alto Networks, Inc.
Policy
Display the Rule UUID column for logs and the UUID column for policy rules.
To view the UUIDs, you must display the column, which does not display by default.
• To display the UUID in logs:
1. Select Monitor and then expand the column header ( ).
2. Select Columns.
3. Enable Rule UUID.
PAN-OS® Administrator’s Guide Version 10.1 1368 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1369 ©2022 Palo Alto Networks, Inc.
Policy
You can also go to the Policies tab, click the arrow to the right of the rule name, and
Copy UUID.
PAN-OS® Administrator’s Guide Version 10.1 1370 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | Select Device > Setup > Management and edit the Policy Rulebase Sengs.
STEP 3 | Configure the sengs you want to enforce. In this example, tags and audit comments are
required for all policies.
Enforce audit comments for policy rules to capture the reason an administrator creates
or modifies a rule. Requiring audit comments on policy rules helps maintain an accurate
rule history for auding purposes.
STEP 4 | Configure the Audit Comment Regular Expression to specify the audit comment format.
When administrators create or modify a rule, you can require they enter a comment those
audit comments adhere to a specific format that fits your business and auding needs by
specifying leer and number expressions. For example, you can use this seng to specify
regular expressions that match your ckeng number formats:
• [0-9]{<Number of digits>}—Requires the audit comment to contain a minimum
number of digits that range from 0 to 9. For example, [0-9]{6} requires a minimum of six
digit in a numerical expression with numbers 0 to 9.
• <Letter Expression>—Requires the audit comment to contain a leer expression. For
example, Reason for Change- requires that the administrator begin the audit comment
with this leer expression.
• <Letter Expression>-[0-9]{<Number of digits>}—Requires the audit comment
to contain a predetermined character followed by a minimum number of digits that range
from 0 to 9. For example, SB-[0-9]{6} requires the audit comment format to begin with
SB-, followed by a minimum six digits in a numerical expression with values from 0 to 9. For
example, SB-012345.
• (<Letter Expression>)|(<Letter Expression>)|(<Letter
Expression>)|-[0-9]{<Number of digits>}—Requires the audit comment to
contain a prefix using any one of the predetermined leer expressions with a minimum
number of digits that range from 0 to 9. For example, (SB|XY|PN)-[0-9]{6} requires the
PAN-OS® Administrator’s Guide Version 10.1 1371 ©2022 Palo Alto Networks, Inc.
Policy
audit comment format to begin with SB-, XY-, or PN- followed by a minimum of six digits
in a numerical expression with values from 0 to 9. For example, SB-012345, XY-654321,
or PN-012543.
Aer you commit the policy rulebase sengs changes, modify the exisng policy rule
based on the rulebase sengs you decided to enforce.
PAN-OS® Administrator’s Guide Version 10.1 1372 ©2022 Palo Alto Networks, Inc.
Policy
STEP 7 | Verify that the firewall is enforcing the new policy rulebase sengs.
1. Select Policies and Add a new rule.
2. Confirm that you must add a tag and enter an audit comment click OK.
PAN-OS® Administrator’s Guide Version 10.1 1373 ©2022 Palo Alto Networks, Inc.
Policy
When cloning mulple policy rules, the order by which you select the rules will determine
the order they are copied to the device group. For example, if you have rules 1-4 and your
selecon order is 2-1-4-3, the device group where these rules will be cloned will display
the rules in the same order you selected. However, you can reorganize the rules as you see
fit once they have been successfully copied.
STEP 1 | Select the policy type (for example, Policy > Security) or object type (for example, Objects >
Addresses).
STEP 2 | Select the Virtual System and select one or more policy rules or objects.
STEP 4 | In the Desnaon drop-down, select the new virtual system or Shared.
STEP 6 | The Error out on first detected error in validaon check box is selected by default. The
firewall stops performing the checks for the move or clone acon when it finds the first
error, and displays just this error. For example, if an error occurs when the Desnaon vsys
doesn’t have an object that the policy rule you are moving references, the firewall will display
the error and stop any further validaon. When you move or clone mulple items at once,
selecng this check box will allow you to find one error at a me and troubleshoot it. If you
clear the check box, the firewall collects and displays a list of errors. If there are any errors in
validaon, the object is not moved or cloned unl you fix all the errors.
PAN-OS® Administrator’s Guide Version 10.1 1374 ©2022 Palo Alto Networks, Inc.
Policy
STEP 7 | Click OK to start the error validaon. If the firewall displays errors, fix them and retry the
move or clone operaon. If the firewall doesn’t find errors, the object is moved or cloned
successfully. Aer the operaon finishes, click Commit.
PAN-OS® Administrator’s Guide Version 10.1 1375 ©2022 Palo Alto Networks, Inc.
Policy
Address Objects
An address object is a set of IP addresses that you can manage in one place and then use in
mulple firewall policy rules, filters, and other funcons. There are four types of address objects:
IP Netmask, IP Range, IP Wildcard Mask, and FQDN.
An address object of type IP Netmask, IP Range, or FQDN can specify IPv4 or IPv6 addresses. An
address object of type IP Wildcard Mask can specify only IPv4 addresses.
An address object of type IP Netmask requires you to enter the IP address or network using slash
notaon to indicate the IPv4 network or the IPv6 prefix length. For example, 192.168.18.0/24 or
2001:db8:123:1::/64.
An address object of type IP Range requires you to enter the IPv4 or IPv6 range of addresses
separated by a hyphen.
An address object of type FQDN (for example, paloaltonetworks.com) provides further ease of use
because DNS provides the FQDN resoluon to the IP addresses instead of you needing to know
the IP addresses and manually updang them every me the FQDN resolves to new IP addresses.
An address object of type IP Wildcard Mask is useful if you define private IPv4 addresses to
internal devices and your addressing structure assigns meaning to certain bits in the address. For
example, the IP address of cash register 156 in the northeastern U.S. could be 10.132.1.156 based
on these bit assignments:
An address object of type IP Wildcard Mask specifies which source or desnaon addresses are
subject to a Security policy rule. For example, 10.132.1.1/0.0.2.255. A zero (0) bit in the mask
indicates that the bit being compared must match the bit in the IP address that is covered by
the zero. A one (1) bit in the mask (a wildcard bit) indicates that the bit being compared need
not match the bit in the IP address. The following snippets of an IP address and wildcard mask
illustrate how they yield four matches:
PAN-OS® Administrator’s Guide Version 10.1 1376 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1377 ©2022 Palo Alto Networks, Inc.
Policy
firewall or Panorama). To change the address object type from FQDN to IP Netmask,
select an IP Netmask and click Use this address. The Type changes to IP Netmask and
the IP address you select appears in the text field.
3. (Oponal) Enter one or more Use Tags to Group and Visually Disnguish Objects to apply
to the address object.
4. Click OK.
STEP 3 | View logs filtered by address object, address group, or wildcard address.
1. For example, select Monitor > Logs > Traffic to view traffic logs.
2. Select to add a log filter.
3. Select the Address aribute, the in Operator, and enter the name of the address object
for which you want to view logs. Alternavely, enter an address group name or a
wildcard address, such as 10.155.3.4/0.0.240.255.
4. Click Apply.
STEP 5 | Use a filter in the ACC to view network acvity based on a source IP address or desnaon
IP address that uses an address object.
1. Select ACC > Network Acvity.
2. View the Source IP Acvity—For Global Filters, click to add a filter and select one
of the following: Address or Source > Source Address or Desnaon > Desnaon
Address and select an address object.
3. View the Desnaon IP Acvity—For Global Filters, click the to add a filter and select
one of the following: Address or Source > Source Address or Desnaon > Desnaon
Address and select an address object.
PAN-OS® Administrator’s Guide Version 10.1 1378 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1379 ©2022 Palo Alto Networks, Inc.
Policy
To tag a zone, you must create a tag with the same name as the zone. When the zone
is aached in policy rules, the tag color automacally displays as the background color
against the zone name.
STEP 3 | Apply tags to an address object, address group, service, or service group.
1. Create the object.
For example, to create a service group, select Objects > Service Groups > Add.
2. Select a tag (Tags) or enter a name in the field to create a new tag.
To edit a tag or add color to the tag, see Modify Tags.
Modify Tags
PAN-OS® Administrator’s Guide Version 10.1 1380 ©2022 Palo Alto Networks, Inc.
Policy
Select Objects > Tags to perform any of the following operaons with tags:
• Click the Name to edit the properes of a tag.
• Select a tag in the table and Delete the tag from the firewall.
• Clone a tag to duplicate it with the same properes. A numerical suffix is added to the tag
name (for example, FTP-1).
For details on creang tags, see Create and Apply Tags. For informaon on working with tags,
see View Rules by Tag Group.
STEP 2 | Create and Apply Tags you want to use for grouping rules.
PAN-OS® Administrator’s Guide Version 10.1 1381 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1382 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1383 ©2022 Palo Alto Networks, Inc.
Policy
The following warning is displayed when the firewall is unable to connect or otherwise fetch the
most current EDL informaon from the server.
PAN-OS® Administrator’s Guide Version 10.1 1384 ©2022 Palo Alto Networks, Inc.
Policy
• URL—This type of external dynamic list gives you the agility to protect your network from new
sources of threat or malware. The firewall handles an external dynamic list with URLs like a
custom URL category and you can use this list in two ways:
• As a match criterion in Security policy rules, Decrypon policy rules, and QoS policy rules
to allow, deny, decrypt, not decrypt, or allocate bandwidth for the URLs in the custom
category.
• In a URL Filtering profile where you can define more granular acons, such as connue,
alert, or override, before you aach the profile to a Security policy rule (see Use an External
Dynamic List in a URL Filtering Profile).
• Equipment Identy—You can reference an external dynamic list of IoT devices defined by
Internaonal Mobile Equipment Idenes (IMEIs) in a Security policy rule that controls traffic
for equipment connected to a 5G or 4G network. Refer to the Mobile Network Infrastructure
Geng Started for informaon about configuring Equipment ID security on supported firewall
models.
• Subscriber Identy—You can reference an external dynamic list of Internaonal Mobile
Subscriber Idenes (IMSIs) in a Security policy rule that controls traffic for subscribers
connected to a 5G or 4G network. Refer to the Mobile Network Infrastructure Geng Started
for informaon about configuring Subscriber ID security on supported firewall models.
On each firewall model, you can add up to a maximum of 30 custom EDLs with unique sources
that can be used to enforce policy. The external dynamic list limit is not applicable to Panorama.
When using Panorama to manage a firewall that is enabled for mulple virtual systems, if you
exceed the limit for the firewall, a commit error displays on Panorama. A source is a URL that
includes the IP address or hostname, the path, and the filename for the external dynamic list. The
firewall matches the URL (complete string) to determine whether a source is unique.
While the firewall does not impose a limit on the number of lists of a specific type, the following
limits are enforced:
• IP address—The PA-5200 Series and the PA-7000 Series firewalls support a maximum of
150,000 total IP addresses; all other models support a maximum of 50,000 total IP addresses.
No limits are enforced for the number of IP addresses per list. When the maximum supported
IP address limit is reached on the firewall, the firewall generates a syslog message. The IP
addresses in predefined IP address lists do not count toward the limit.
• URL and domain—The maximum number of URLs and domains supported varies by model.
No limits are enforced for the number of URL or domain entries per list. Refer to the following
table for specifics on your model:
PAN-OS® Administrator’s Guide Version 10.1 1385 ©2022 Palo Alto Networks, Inc.
Policy
PA-7000
appliances
with mixed
NPCs only
support the
standard
capacies.
List entries only count toward the firewall limits if they belong to an external dynamic list that is
referenced in policy.
PAN-OS® Administrator’s Guide Version 10.1 1386 ©2022 Palo Alto Networks, Inc.
Policy
• When parsing the list, the firewall skips entries that do not match the list type, and
ignores entries that exceed the maximum number supported for the model. To ensure
that the entries do not exceed the limit, check the number of entries currently used in
policy. Select Objects > External Dynamic Lists and click List Capacies.
• An external dynamic list must contain entries. If you want to stop using the list, remove
the reference from the policy rule or profile instead leaving the list blank. If the list does
not contain any entries, the firewall fails to refresh the list and connues to use the last
informaon it retrieved.
• As a best pracce, Palo Alto Networks recommends using shared EDLs when mulple
virtual systems are used. Using individual EDLs with duplicate entries for each virtual
system uses more memory, which might over-ulize firewall resources.
• EDL entry counts on firewalls operang mul-virtual systems take addional factors
into account (such as DAGs, number of virtual systems, rules bases) to generate a more
accurate capacity consumpon lisng. This might result in a discrepancy in capacity
usage aer upgrading from PAN-OS 8.x releases.
• Depending on the features enabled on the firewall, memory usage limits might be
exceeded before EDL capacity limits are met due to memory allocaon updates. As a
best pracce, Palo Alto Networks recommends reviewing EDL capacies and, when
necessary, removing or consolidang EDLs into shared lists to minimize memory usage.
IP Address List
The external dynamic list can include individual IP addresses, subnet addresses (address/mask),
or range of IP addresses. In addion, the block list can include comments and special characters
such as * , : , ; , #, or /. The syntax for each line in the list is [IP address, IP/Mask, or IP
start range-IP end range] [space] [comment].
Enter each IP address/range/subnet in a new line; URLs or domains are not supported in this list.
A subnet or an IP address range, such as 92.168.20.0/24 or 192.168.20.40-192.168.20.50, count
as one IP address entry and not as mulple IP addresses. If you add comments, the comment must
be on the same line as the IP address/range/subnet. The space at the end of the IP address is the
delimiter that separates a comment from the IP address.
An example IP address list:
192.168.20.10/32
2001:db8:123:1::1 #test IPv6 address
192.168.20.0/24 ; test internal subnet
2001:db8:123:1::/64 test internal IPv6 range
PAN-OS® Administrator’s Guide Version 10.1 1387 ©2022 Palo Alto Networks, Inc.
Policy
192.168.20.40-192.168.20.50
For an IP address that is blocked, you can display a noficaon page only if the protocol is
HTTP.
Domain List
You can use placeholder characters in domain lists to configure a single entry to match against
mulple website subdomains, pages, including enre top-level domains, as well as matches to
specific web pages.
Follow these guidelines when creang domain list entries:
• Enter each domain name in a new line; URLs or IP addresses are not supported in this list.
• Do not prefix the domain name with the protocol, hp:// or hps://.
• You can use an asterisk (*) to indicate a wildcard value.
• You can use a caret (^) to indicate an exact match value.
• The following characters are considered token separators: . / ? & = ; +
Every string separated by one or two of these characters is a token. Use wildcard characters as
token placeholders, indicang that a specific token can contain any value.
• Wildcard characters must be the only character within a token; however, an entry can contain
mulple wildcards.
• Each domain entry can be up to 255 characters in length.
When to use the asterisk (*) wildcard:
Use an asterisk (*) wildcard to indicate one or mulple variable subdomains. For example,
to specify enforcement for Palo Alto Network’s website regardless of the domain extension
used, which might be one or two subdomains depending on locaon, you would add the entry:
*.paloaltonetworks.com. This entry would match to both docs.paloaltonetworks.com and
support.paloaltonetworks.com.
You can also use this wildcard to indicate enre top-level domains. For example, to specify
enforcement of a TLD named .work, you would add the entry *.work. This matches all websites
ending with .work.
*.company.com eng.tools.company.com
support.tools.company.com
tools.company.com
docs.company.com
PAN-OS® Administrator’s Guide Version 10.1 1388 ©2022 Palo Alto Networks, Inc.
Policy
^company.com company.com
^eng.company.com eng.company.com
URL List
See URL Category Excepons.
PAN-OS® Administrator’s Guide Version 10.1 1389 ©2022 Palo Alto Networks, Inc.
Policy
Configure the Firewall to Access an External Dynamic List) and exclude entries from the list as
needed.
The firewall does not use the External Dynamic Lists service route to retrieve Built-in
External Dynamic Lists; content updates modify or update the contents of those lists
(acve Threat Prevenon license required).
STEP 4 | Click Add and enter a descripve Name for the list.
PAN-OS® Administrator’s Guide Version 10.1 1390 ©2022 Palo Alto Networks, Inc.
Policy
STEP 5 | (Oponal) Select Shared to share the list with all virtual systems on a device that is enabled
for mulple virtual systems. By default, the object is created on the virtual system that is
currently selected in the Virtual Systems drop-down.
As a best pracce, Palo Alto Networks recommends using shared EDLs when mulple
virtual systems are used. Using individual EDLs with duplicate entries for each vsys
uses more memory, which might over-ulize firewall resources.
STEP 6 | (Panorama only) Select Disable override to ensure that a firewall administrator cannot
override sengs locally on a firewall that inherits this configuraon through a Device Group
commit from Panorama.
STEP 8 | Enter the Source for the list you just created on the web server. The source must include the
full path to access the list. For example, https://1.2.3.4/EDL_IP_2015.
• If you are creang a Predefined IP external dynamic list, select a Palo Alto Networks
malicious IP address feed to use as a source.
• If you are creang a Predefined URL external dynamic list, select panw-auth-portal-
exclude-list as a source.
STEP 9 | If the list source is secured with SSL (i.e. lists with an HTTPS URL), enable server
authencaon. Select a Cerficate Profile or create a New Cerficate Profile for
authencang the server that hosts the list. The cerficate profile you select must have
root cerficate authority (CA) and intermediate CA cerficates that match the cerficates
installed on the server you are authencang.
Maximize the number of external dynamic lists that you can use to enforce policy. Use
the same cerficate profile to authencate external dynamic lists from the same source
URL. If you assign different cerficate profiles to external dynamic lists from the same
source URL, the firewall counts each list as a unique external dynamic list.
PAN-OS® Administrator’s Guide Version 10.1 1391 ©2022 Palo Alto Networks, Inc.
Policy
STEP 10 | Enable client authencaon if the list source has an HTTPS URL and requires basic HTTP
authencaon for list access.
1. Select Client Authencaon.
2. Enter a valid Username to access the list.
3. Enter the Password and Confirm Password.
STEP 11 | (Not available on Panorama or for Predefined URL EDLs) Click Test Source URL to verify that
the firewall can connect to the web server.
The Test Source URL funcon is not available when authencaon is used for EDL
access.
STEP 12 | (Oponal) Specify the frequency at which the firewall should Check for updates to the list.
By default, the firewall retrieves the list once every hour and commits the changes.
The interval is relave to the last commit. So, for the five-minute interval, the commit
occurs in 5 minutes if the last commit was an hour ago. To retrieve the list immediately,
see Retrieve an External Dynamic List from the Web Server.
STEP 14 | (Oponal) EDLs are shown top to boom, in order of evaluaon. Use the direconal controls
at the boom of the page to change the list order. This allows you to or order the lists to
make sure the most important EDLs are commied before capacity limits are reached.
You can only change the EDL order when Group By Type is deselected.
If the server or client authencaon fails, the firewall ceases to enforce policy based on
the last successfully retrieved external dynamic list. Find External Dynamic Lists That
Failed Authencaon and view the reasons for authencaon failure.
PAN-OS® Administrator’s Guide Version 10.1 1392 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1393 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | (Best Pracces) Create a cerficate profile to authencate the EDL Hosng Service.
1. Download the GlobalSign Root R1 cerficate.
2. Convert the GlobalSign Root R1 Cerficate to PEM Format.
3. Launch the firewall web interface.
4. Import the GlobalSign Root R1 cerficate.
1. Select Device > Cerficate Management > Cerficates and Import a new cerficate.
2. For Cerficate Type, select Local.
3. Enter a descripve Cerficate Name.
4. For the Cerficate File, select Browse and select the cerficate you converted in the
previous step.
5. For the File Format, select Base64 Encoded Cerficate (PEM).
6. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1394 ©2022 Palo Alto Networks, Inc.
Policy
6. Commit.
PAN-OS® Administrator’s Guide Version 10.1 1395 ©2022 Palo Alto Networks, Inc.
Policy
STEP 3 | Create an EDL using a Feed URL from the EDL Hosng Service.
1. Select Objects > External Dynamic Lists and Add a new EDL.
2. Enter a descripve Name for the EDL.
3. Select the EDL Type.
• For an IP-based EDL, select IP List.
• For a URL-based EDL, select URL List.
4. (Oponal) Enter a Descripon for the EDL
5. Enter the Feed URL as the EDL Source.
Enforce all endpoints within a specific Feed URL. Adding an excluding a specific
endpoint from a Feed URL can cause connecvity issues to the SaaS applicaon.
6. (Best Pracces) Select the Cerficate Profile you created in the previous step.
7. Specify the frequency the firewall should Check for updates to match the update
frequency of the Feed URL.
For example, if the Feed URL is updated daily by Palo Alto Networks then configure the
EDL to check for updates Daily.
Palo Alto Networks displays the update frequency for each Feed URL in the EDL Hosng
Service. Feed URLs are automacally updated with any new endpoints.
8. Click Test Source URL to verify that the firewall can access the Feed URL from the EDL
Hosng Service.
9. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1396 ©2022 Palo Alto Networks, Inc.
Policy
Leverage App-ID alongside EDLs in a policy rule for addional strict enforcement of
SaaS applicaon traffic.
PAN-OS® Administrator’s Guide Version 10.1 1397 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1398 ©2022 Palo Alto Networks, Inc.
Policy
STEP 1 | To retrieve the list on demand, select Objects > External Dynamic Lists.
STEP 2 | Select the list that you want to refresh, and click Import Now. The job to import the list is
queued.
STEP 3 | To view the status of the job in the Task Manager, see Manage and Monitor Administrave
Tasks.
STEP 4 | (Oponal) Aer the firewall retrieves the list, View External Dynamic List Entries.
PAN-OS® Administrator’s Guide Version 10.1 1399 ©2022 Palo Alto Networks, Inc.
Policy
STEP 3 | Click List Entries and Excepons and view the objects that the firewall retrieved from the list.
STEP 4 | Enter an IP address, domain, or URL (depending on the type of list) in the filter field and
Apply Filter ( ) to check if it’s in the list. Exclude Entries from an External Dynamic List
based on which IP addresses, domains, and URLs you need to block or allow.
STEP 5 | (Oponal) View the AutoFocus Intelligence Summary for a list entry. Hover over an entry to
open the drop-down and then click AutoFocus.
PAN-OS® Administrator’s Guide Version 10.1 1400 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | Select up to 100 entries to exclude from the list and click Submit ( ) or manually Add a list
excepon.
• You cannot save your changes to the external dynamic list if you have duplicate entries
in the Manual Excepons list. To idenfy duplicate entries, look for entries with a red
underline.
• A manual excepon must match a list entry exactly. Addionally, you cannot exclude a
specific IP address from within an IP address range. To exclude a specific IP address from an
IP address range, you must add each IP address in the range as a list entry and then exclude
the desired IP address.
The firewall does not support excluding an individual IP address from an IP address range.
Tips for enforcing policy on the firewall with external dynamic lists:
• When viewing external dynamic lists on the firewall (Objects > External Dynamic
Lists), click List Capacies to compare how many IP addresses, domains, and URLs are
currently used in policy with the total number of entries that the firewall supports for
each list type.
• Use Global Find to Search the Firewall or Panorama Management Server for
a domain, IP address, or URL that belongs to one or more external dynamic lists is
used in policy. This is useful for determining which external dynamic list (referenced
in a Security policy rule) is causing the firewall to block or allow a certain domain, IP
address, or URL.
• Use the direconal controls at the boom of the page to change the evaluaon order of
EDLs. This allows you to or order the lists to make sure the most important entries in an
EDL are commied before capacity limits are reached.
You can only change the EDL order when Group By Type is deselected.
PAN-OS® Administrator’s Guide Version 10.1 1401 ©2022 Palo Alto Networks, Inc.
Policy
Use an External Dynamic List of Type URL as Match Criteria in a Security Policy Rule.
1. Select Policies > Security.
2. Click Add and enter a descripve Name for the rule.
3. In the Source tab, select the Source Zone.
4. In the Desnaon tab, select the Desnaon Zone.
5. In the Service/URL Category tab, click Add to select the appropriate external dynamic
list from the URL Category list.
6. In the Acons tab, set the Acon Seng to Allow or Deny.
7. Click OK and Commit.
8. Verify whether entries in the external dynamic list were ignored or skipped.
Use the following CLI command on a firewall to review the details for a list.
request
system external-list show type <domain | ip | url>
name_of_list
For example:
request system
external-list show type url EBL_ISAC_Alert_List
PAN-OS® Administrator’s Guide Version 10.1 1402 ©2022 Palo Alto Networks, Inc.
Policy
Create separate external dynamic lists if you want to specify allow and deny
acons for specific IP addresses.
6. Leave all the other opons at the default values.
7. Click OK to save the changes.
8. Commit the changes.
9. Test that the policy acon is enforced.
1. View External Dynamic List Entries for the external dynamic list, and aempt to
access an IP address from the list.
2. Verify that the acon you defined is enforced.
3. Select Monitor > Logs > Traffic and view the log entry for the session.
4. To verify the policy rule that matches a flow, select Device > Troubleshoong, and
execute a Security Policy Match test:
PAN-OS® Administrator’s Guide Version 10.1 1403 ©2022 Palo Alto Networks, Inc.
Policy
Use a Predefined URL External Dynamic List to exclude benign domains that applicaons use
for background traffic from Authencaon policy.
When you select the panw-auth-portal-exclude-list EDL type, you can easily exclude from
Authencaon policy enforcement the domains that many applicaons use for background
traffic, such as updates and other trusted services. This ensures that the firewall does not block
the necessary traffic for these services and applicaon maintenance is not interrupted.
1. Select Policies > Authencaon.
2. On the Service/URL Category tab, select the Predefined URL EDL as the URL Category.
3. On the Acons tab, select default-no-captive-portal as the Authencaon
Enforcement.
4. Click OK.
5. Move the rule to the top so that it is the first rule in the policy.
6. Commit your changes.
STEP 2 | Construct the following filters to view all messages related to authencaon failure, and
apply the filters. For more informaon, review the complete workflow to Filter Logs.
• Server authencaon failure—(eventid eq tls-edl-auth-failure)
• Client authencaon failure—(eventid eq edl-cli-auth-failure)
STEP 3 | Review the system log messages. The message descripon includes the name of the external
dynamic list, the source URL for the list, and the reason for the authencaon failure.
The server that hosts the external dynamic list fails authencaon if the cerficate is expired. If
you have configured the cerficate profile to check cerficate revocaon status via Cerficate
PAN-OS® Administrator’s Guide Version 10.1 1404 ©2022 Palo Alto Networks, Inc.
Policy
Revocaon List (CRL) or Online Cerficate Status Protocol (OCSP), the server may also fail
authencaon if:
• The cerficate is revoked.
• The revocaon status of the cerficate is unknown.
• The connecon mes out as the firewall is aempng to connect to the CRL/OCSP service.
For more informaon on cerficate profile sengs, refer to the steps to Configure a Cerficate
Profile.
Verify that you added the root CA and intermediate CA of the server to the cerficate
profile configured with the external dynamic list. Otherwise, the firewall will not
authencate the list properly.
Client authencaon fails if you have entered the incorrect username and password
combinaon for the external dynamic list.
STEP 4 | (Oponal) Disable Authencaon for an External Dynamic List that failed authencaon as
a stop-gap measure unl the list owner renews the cerficate(s) of the server that hosts the
list.
Disabling server authencaon for an external dynamic list also disables client
authencaon. With client authencaon disabled, the firewall will not be able to connect
to an external dynamic list that requires a username and password for access.
username@hostname> configure
Entering configuration mode
[edit]
username@hostname#
The change from the > to the # symbol indicates that you are now in configuraon mode.
PAN-OS® Administrator’s Guide Version 10.1 1405 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | Enter the appropriate CLI command for the list type:
• IP Address
• Domain
• URL
STEP 3 | Verify that authencaon is disabled for the external dynamic list.
Trigger a refresh for the list (see Retrieve an External Dynamic List from the Web Server). If the
firewall retrieves the list successfully, server authencaon is disabled.
PAN-OS® Administrator’s Guide Version 10.1 1406 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS only supports IPv4 IP subnets and ranges in dynamic address groups.
You can enable the dynamic registraon process using any of the following opons:
• User-ID agent for Windows—In an environment where you’ve deployed the User-ID agent, you
can enable the User-ID agent to monitor up to 100 VMware ESXi servers, vCenter Servers, or a
combinaon of the two. As you provision or modify virtual machines on these VMware servers,
the agent can retrieve the IP address changes and share them with the firewall.
• VM Informaon Sources—Enables you to monitor VMware ESXi, vCenter Server, AWS-VPCs,
and Google Compute Engines navely on the firewall and to retrieve IP address changes when
you provision or modify virtual machines on these sources. VM Informaon Sources opon
polls for a predefined set of aributes and does not require external scripts to register the IP
addresses through the XML API. See Monitor Changes in the Virtual Environment.
• Panorama Plugin—You can enable a Panorama™ M-Series or virtual appliance to connect to
your Azure or AWS public cloud environment and retrieve informaon on the virtual machines
deployed within your subscripon or VPC. Panorama then registers the VM informaon to the
managed Palo Alto Networks firewalls that you configured for noficaon and then you can
use these aributes to define dynamic address groups and aach them to Security policy rules
to allow or deny traffic to and from these VMs.
• VMware Service Manager (Integrated NSX soluons only)—The integrated NSX soluon
is designed for automated provisioning and distribuon of the Palo Alto Networks Next-
Generaon Security Operang Plaorm® and the delivery of dynamic context-based Security
policies using Panorama. The NSX Manager updates Panorama with the latest informaon
on the IP addresses, IP sets, and tags associated with the virtual machines deployed in this
integrated soluon. For informaon on this soluon, see Set Up a VM-Series NSX Edion
Firewall.
• XML API—The firewall and Panorama support an XML API that uses standard HTTP requests
to send and receive data. You can use this API to register IP addresses and tags with the
firewall or Panorama. You can make API calls directly from command-line ulies, such as
cURL, or by using any scripng or applicaon framework that supports REST-based services.
Refer to the PAN-OS XML API Usage Guide for details.
• Auto-Tag—Tag the source or desnaon IP address automacally when a log is generated on
the firewall and register the IP address and tag mapping to a User-ID agent on the firewall or on
Panorama, or to a remote User-ID agent using an HTTP server profile. For example, whenever
PAN-OS® Administrator’s Guide Version 10.1 1407 ©2022 Palo Alto Networks, Inc.
Policy
the firewall generates a threat log, you can configure the firewall to tag the source IP address
in the threat log with a specific tag name. For more informaon, refer to Use Auto-Tagging to
Automate Security Acons.
Addionally, you can configure the firewall to dynamically unregister a tag aer a configured
amount of me using a meout. For example, you can configure the meout to be the same
duraon as the DHCP lease meout for the IP address. This allows the IP address-to-tag
mapping to expire at the same me as the DHCP lease so that you don’t unintenonally apply
policy when the IP address is reassigned.
See Forward Logs to an HTTP(S) Desnaon.
For informaon on creang and using Dynamic Address Groups, see Use Dynamic Address Groups
in Policy.
For the CLI commands for registering tags dynamically, see CLI Commands for Dynamic IP
Addresses and Tags.
PAN-OS® Administrator’s Guide Version 10.1 1408 ©2022 Palo Alto Networks, Inc.
Policy
To support redistribuon for dynamic user group tags, all firewalls must use PAN-OS 9.1 to
receive the tags from the registraon sources.
The firewall redistributes the tags for the dynamic user group to the next hop and you can
configure log forwarding to send the logs to a specific server. Log forwarding also allows you
to use auto-tagging to automacally add or remove members of dynamic user groups based on
events in the logs.
STEP 1 | Select Objects > Dynamic User Groups and Add a new dynamic user group.
PAN-OS® Administrator’s Guide Version 10.1 1409 ©2022 Palo Alto Networks, Inc.
Policy
This tag displays in the Tags column in the Dynamic User Group list and defines
the dynamic group object, not the members in the group.
7. Click OK and Commit your changes.
If you update the user group object filter, you must commit the changes to
update the configuraon.
STEP 3 | Depending on the log informaon that you want to use as match criteria, configure auto-
tagging by creang a log forwarding profile or configuring the log sengs.
• For Authencaon, Data, Threat, Traffic, Tunnel Inspecon, URL, and WildFire logs, create a
log forwarding profile.
• For User-ID, GlobalProtect, and IP-Tag logs, configure the log sengs.
STEP 4 | (Oponal) To return dynamic user group members to their original groups aer a specific
duraon of me, enter a Timeout value in minutes (default is 0, range is 0-43200).
STEP 5 | Use the dynamic user group in a policy to regulate traffic for the members of the group.
You will need to create at least two rules: one to allow inial traffic to populate the dynamic
user group and one to deny traffic for the acvity you want to prevent. To tag users, the rule to
allow traffic must have a higher rule number in your rulebase than the rule that denies traffic.
1. Select the dynamic user group from Step 1 as the Source User.
2. Create the rule where the Acon denies traffic to the dynamic user group members.
3. Create the rule that allows the traffic to populate the dynamic user group members.
4. If you configured a Log Forwarding profile in Step 3, select it to add it to the policy.
5. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 1410 ©2022 Palo Alto Networks, Inc.
Policy
STEP 6 | (Oponal) Refine the group’s membership and define the registraon source for the user-to-
tag mapping updates.
If the inial user-to-tag mapping retrieves users who should not be members or if it does not
include users who should be, modify the members of the group to include the users for whom
you want to enforce the policy and specify the source for the mappings.
1. In the Users column, select more.
2. Register Users to add them to the group and select the Registraon Source for the tags
and user-to-tag mappings.
• Local (Default)—Register the tags and mappings for the dynamic user group members
locally on the firewall.
• Panorama User-ID Agent—Register the tags and mappings for the dynamic user group
members on a User-ID agent connected to Panorama. If the dynamic user group
originates from Panorama, the row displays in yellow and the group name, descripon,
match criteria, and tags are read-only. However, you can sll register or unregister
users from the group.
• Remote device User-ID Agent—Register the tags and mappings for the dynamic
user group members on a remote User-ID agent. To select this opon, you must first
configure an HTTP server profile.
3. Select the Tags you want to register on the source using the tag(s) you used to configure
the group.
4. (Oponal) To return dynamic user group members to their original groups aer a specific
duraon of me, enter a Timeout value in minutes (default is 0, range is 0-43200).
5. Add or Delete users as necessary.
6. (Oponal) Unregister Users to remove their tags and user-to-tag mappings.
STEP 7 | Verify the firewall correctly populates the users in the dynamic user group.
1. Confirm the Dynamic User Group column in the Traffic, Threat, URL Filtering, WildFire
Submissions, Data Filtering, and Tunnel Inspecon logs displays the dynamic user groups
correctly.
2. Use the show user group list dynamic command to display a list of all dynamic
user groups as well as the total number of dynamic user groups.
3. Use the show object registered-user all command to display a list of users
who are registered members of dynamic user groups.
4. Use the show user group name group-name command to display informaon
about the dynamic user group, such as the source type.
PAN-OS® Administrator’s Guide Version 10.1 1411 ©2022 Palo Alto Networks, Inc.
Policy
Dynamic user groups do not support auto-tagging from HIP Match logs.
Redistribute the mappings across your network by registering the IP address-to-tag and user-to-
tag mappings to a PAN-OS integrated User-ID agent on the firewall or Panorama or to a remote
User-ID agent using an HTTP server profile. The firewall can automacally remove (unregister)
a tag associated with an IP address or user when you configure a meout as part of a built-in
acon for a log forwarding profile or as part of log forwarding sengs. For example, if the firewall
detects a user has potenally compromised credenals, you could configure the firewall to require
MFA authencaon for that user for a given period of me, then configure a meout to remove
the user from the MFA requirement group.
STEP 1 | Depending on the type of log you want to use for tagging, create a log forwarding profile or
configure the log sengs to define how you want the firewall or Panorama to handle logs.
• For Authencaon, Data, Threat, Traffic, Tunnel Inspecon, URL, and WildFire logs, create
a log forwarding profile.
• For User-ID, GlobalProtect, and IP-Tag logs, configure the log sengs.
STEP 2 | Define the match list criteria that determine when the firewall or Panorama adds the tag to
the policy object.
For example, you can use a filter to configure a threshold or define a value (such as user eq
“unknown” to idenfy users that the firewall has not yet mapped); when the firewall reaches
that threshold or finds that value, the firewall adds the tag.
• To create a log forwarding profile, Add it and select the Log Type you want to monitor for
match list criteria (Objects > Log Forwarding).
• To configure log sengs, Add the log sengs for the type of log you want to monitor for
match list criteria (Device > Log Sengs).
STEP 3 | Copy and paste a Filter value or use the Filter Builder to define the match criteria for the tag.
PAN-OS® Administrator’s Guide Version 10.1 1412 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1413 ©2022 Palo Alto Networks, Inc.
Policy
STEP 5 | (Remote User-ID only) Configure an HTTP server profile to forward logs to a remote User-ID
agent.
1. Select Device > Server Profiles > HTTP.
2. Add a profile and specify a Name for the server profile.
3. (Virtual systems only) Select the Locaon. The profile can be Shared across all virtual
systems or can belong to a specific virtual system.
4. Select Tag Registraon to enable the firewall to register the IP address and tag mapping
with the User-ID agent on a remote firewall. With tag registraon enabled, you cannot
specify the payload format.
5. Add the server connecon details to access the remote User-ID agent and click OK.
6. Select the log forwarding profile you created then select this server profile as the HTTP
server profile for your Remote User-ID tag Registraon.
STEP 6 | Define the policy objects to which you want to apply the tags.
1. Create or select one of the following policy objects: dynamic address groups, Use
Dynamic User Groups in Policy, addresses, address groups, zones, policy rules, services,
or service groups.
2. Enter the tags you want to apply to the object as the Match criteria.
Confirm that the tag is idencal to the tag in Step 4.
STEP 8 | If you configured a log forwarding profile, assign it to your Security policy.
You can assign one log forwarding profile for each policy but you can assign mulple methods
and acons per profile. For an example, refer to Use Dynamic Address Groups in Policy.
PAN-OS® Administrator’s Guide Version 10.1 1414 ©2022 Palo Alto Networks, Inc.
Policy
STEP 10 | (Oponal) Configure a meout to remove the tag from the policy object aer the specified
me has elapsed.
Specify the amount of me (in minutes) that passes before the firewall removes the tag from
the policy object. The range is from 0 to 43,200. If you set the meout to zero, the IP address-
to-tag mapping does not meout and must be removed with an explicit acon. If you set the
meout to the maximum of 43,200 minutes, the firewall removes the tag aer 30 days.
Set the IP-tag meout to the same amount of me as the DHCP lease meout
for that IP address. This allows the IP address-to-tag mapping to expire at the
same me as the DHCP lease so that you do not unintenonally apply policy
when the IP address is reassigned.
4. Click OK and Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 1415 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1416 ©2022 Palo Alto Networks, Inc.
Policy
• When monitoring ESXi hosts that are part of the VM-Series NSX edion soluon,
use Dynamic Address Groups instead of using VM Informaon Sources to learn about
changes in the virtual environment. For the VM-Series NSX edion soluon, the NSX
Manager provides Panorama with informaon on the NSX security group to which an
IP address belongs. The informaon from the NSX Manager provides the full context
for defining the match criteria in a Dynamic Address Group because it uses the service
profile ID as a disnguishing aribute and allows you to properly enforce policy when
you have overlapping IP addresses across different NSX security groups. Up to a
maximum of 32 tags (from vCenter server and NSX Manager) that can be registered to
an IP address.
• For monitoring the virtual machines within your Azure deployment, instead of VM
Monitoring Sources, you need to deploy the VM Monitoring script that runs on a
virtual machine within the Azure public cloud. This script collects the IP address-to-
tag mapping informaon for your Azure assets and publishes it to the firewalls and
corresponding virtual systems you specify in the script.
• For Panorama version 8.1.3 and later, you can also use the Panorama plugin for AWS
or Azure to retrieve VM Informaon and register it to the managed firewalls. See
Aributes Monitored on Virtual Machines in Cloud Plaormsfor details.
You can configure up to 10 VM informaon sources for each firewall, or for each virtual
system on a mulple virtual systems capable firewall.
PAN-OS® Administrator’s Guide Version 10.1 1417 ©2022 Palo Alto Networks, Inc.
Policy
host cannot be accessed or does not respond, the firewall will close the connecon to
the source.
• Add the credenals (Username and Password) to authencate to the server specified
above.
• Define the Source—hostname or IP address.
• (Oponal) Modify the Update interval to a value between 5-600 seconds. By default,
the firewall polls every 5 seconds. The API calls are queued and retrieved within
every 60 seconds, so updates may take up to 60 seconds plus the configured polling
interval.
If the connecon status is pending or disconnected, verify that the source is operaonal and
that the firewall is able to access the source. If you use a port other than the MGT port for
communicang with the monitored source, you must change the service route (Device > Setup
> Services, click the Service Route Configuraon link and modify the Source Interface for the
VM Monitor service).
PAN-OS® Administrator’s Guide Version 10.1 1418 ©2022 Palo Alto Networks, Inc.
Policy
VMware ESXi
Each VM on a monitored ESXi or vCenter server must have VMware Tools installed and running.
VMware Tools provide the capability to glean the IP address(es) and other values assigned to each
VM.
When monitoring ESXi hosts that are part of the VM-Series NSX edion soluon, use
Dynamic Address Groups (instead of using VM Informaon Sources) to learn about
changes in the virtual environment. For the VM-Series NSX edion soluon, the NSX
Manager provides Panorama with informaon on the NSX security group to which an
IP address belongs. The informaon from the NSX Manager provides the full context for
defining the match criteria in a Dynamic Address Group because it uses the service profile
ID as a disnguishing aribute and allows you to properly enforce policy when you have
overlapping IP addresses across different NSX security groups.
Up to 32 tags (from vCenter server and NSX Manager) can be registered to an IP address.
To collect the values assigned to the monitored VMs, use the VM Informaon Sources on the
firewall to monitor the following predefined set of ESXi aributes:
UUID
Name
PAN-OS® Administrator’s Guide Version 10.1 1419 ©2022 Palo Alto Networks, Inc.
Policy
Guest OS
VM State — the power state can be poweredOff, poweredOn, standBy, and unknown.
Annotaon
Version
Container Name —vCenter Name, Data Center Object Name, Resource Pool Name, Cluster
Name, Host, Host IP address.
Architecture Yes No
Guest OS Yes No
Instance ID Yes No
PAN-OS® Administrator’s Guide Version 10.1 1420 ©2022 Palo Alto Networks, Inc.
Policy
Owner ID No Yes
Microso Azure
For VM Monitoring on Azure you need to retrieve the IP address-to-tag mapping for your Azure
VMs and make it available as match criteria in dynamic address groups. The Panorama plugin for
Microso Azure allows you to connect Panorama to your Azure public cloud subscripons and
retrieve the IP address-to-tag mapping for your Azure virtual machines. Panorama can retrieve
a total of 26 tags for each virtual machine, 11 predefined tags and up to 15 user-defined tags
and registers the VM informaon to the managed Palo Alto Networks® firewall(s) that you have
configured for noficaon.
With the Panorama plugin for Azure, you can monitor the following set of virtual machine
aributes within your Microso Azure deployment.
PAN-OS® Administrator’s Guide Version 10.1 1421 ©2022 Palo Alto Networks, Inc.
Policy
VM Name Yes
VM Size No
OS Type Yes
OS Publisher Yes
OS Offer Yes
OS SKU Yes
Subnet Yes
VNet Yes
Subscripon ID Yes
Google
Using VM Informaon Sources on the next-gen firewall, you can monitor the following predefined
set of Google Compute Engine (GCE) aributes.
Hostname of the VM
Machine type
Project ID
PAN-OS® Administrator’s Guide Version 10.1 1422 ©2022 Palo Alto Networks, Inc.
Policy
Status
Subnetwork
VPC Network
PAN-OS® Administrator’s Guide Version 10.1 1423 ©2022 Palo Alto Networks, Inc.
Policy
PA-440 50,000
The following example shows how dynamic address groups can simplify network security
enforcement. The example workflow shows how to:
• Enable the VM Monitoring agent on the firewall, to monitor the VMware ESX(i) host or vCenter
Server and register VM IP addresses and the associated tags.
• Create dynamic address groups and define the tags to filter. In this example, two address
groups are created. One that only filters for dynamic tags and another that filters for both stac
and dynamic tags to populate the members of the group.
• Validate that the members of the dynamic address group are populated on the firewall.
• Use dynamic address groups in policy. This example uses two different security policies:
• A security policy for all Linux servers that are deployed as FTP servers; this rule matches on
dynamically registered tags.
• A security policy for all Linux servers that are deployed as web servers; this rule matches on
a dynamic address group that uses stac and dynamic tags.
• Validate that the members of the dynamic address groups are updated as new FTP or web
servers are deployed. This ensure that the security rules are enforced on these new virtual
machines too.
STEP 1 | Enable VM Source Monitoring.
See Enable VM Monitoring to Track Changes on the Virtual Network.
PAN-OS® Administrator’s Guide Version 10.1 1424 ©2022 Palo Alto Networks, Inc.
Policy
6. Click Commit.
STEP 3 | The match criteria for each dynamic address group in this example is as follows:
p_server: matches on the guest operang system “Linux 64-bit” and annotated as
“p” ('guestos.Ubuntu Linux 64-bit' and 'annotaon.p').
web-servers: matches on two criteria—the tag black or if the guest operang system is Linux
64-bit and the name of the server us Web_server_Corp. ('guestos.Ubuntu Linux 64-bit' and
'vmname.WebServer_Corp' or 'black')
PAN-OS® Administrator’s Guide Version 10.1 1425 ©2022 Palo Alto Networks, Inc.
Policy
STEP 5 | This example shows how to create two policies: one for all access to FTP servers and the
other for access to web servers.
STEP 6 | Validate that the members of the dynamic address group are populated on the firewall.
1. Select Policies > Security, and select the rule.
2. Select the drop-down arrow next to the address group link, and select Value. You can
also verify that the match criteria is accurate.
3. Click the more link and verify that the list of registered IP addresses is displayed.
Policy will be enforced for all IP addresses that belong to this address group, and are
displayed here.
If you want to delete all registered IP addresses, use the CLI command debug
object registered-ip clear all and then reboot the firewall aer clearing
the tags.
PAN-OS® Administrator’s Guide Version 10.1 1426 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1427 ©2022 Palo Alto Networks, Inc.
Policy
View all tags registered from a specific • To view tags registered from the CLI:
data source, for example from the VM
Monitoring Agent on the firewall, the show log iptag datasource_type equ
XML API, Windows User-ID Agent or al unknown
the CLI.
PAN-OS® Administrator’s Guide Version 10.1 1428 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1429 ©2022 Palo Alto Networks, Inc.
Policy
You cannot configure the firewall to use the IP address in the XFF field in User-ID and
security policy at the same me.
PAN-OS® Administrator’s Guide Version 10.1 1430 ©2022 Palo Alto Networks, Inc.
Policy
behind the proxy server, you must also configure the firewall to populate the X-Forwarded-For
column in the URL Filtering log with the IP address in the XFF header so that you can track down
the specific user and device associated with an log event that is correlated with the URL Filtering
log entry.
The XFF header your proxy server adds must contain the source IP address of the end user who
originated the request. If the header contains mulple IP addresses, the firewall uses the first IP
address only. If the header contains informaon other than an IP address, the firewall will not be
able to perform user mapping.
Enabling the firewall to use the X-Forwarded-For headers to perform user mapping
does not enable the firewall to use the client IP address in the XFF header as the source
address in the logs; the logs sll display the proxy server IP address as the source address.
However, to simplify the debugging and troubleshoong process you can configure the
firewall to Add XFF Values to URL Filtering Logs to display the client IP address from the
XFF header in the URL Filtering logs.
STEP 1 | Enable the firewall to use XFF values in policies and in the source user fields of logs.
1. Select Device > Setup > Content-ID and edit the X-Forwarded-For Headers sengs.
2. Select Enabled for User-ID to Use X-Forwarded-For Header for User-ID.
STEP 3 | Verify the firewall is populang the source user fields of logs.
1. Select a log type that has a source user field (for example, Monitor > Logs > Traffic).
2. Verify that the Source User column displays the usernames of users who access web
applicaons.
PAN-OS® Administrator’s Guide Version 10.1 1431 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | Select Device > Setup > Content-ID > X-Forwarded-For Headers.
STEP 4 | Select Enabled for Security Policy from the Use X-Forwarded-For Header drop-down.
You cannot enable Use X-Forwarded-For Header for security policy and User-ID at the
same me.
STEP 5 | (Oponal) Select Strip X-Forwarded-For Header to remove the XFF field from outgoing
HTTP requests.
Selecng this opon does not disable the use of XFF headers. The firewall strips the XFF field
from client requests aer using it to enforce policy and log IP addresses.
For non-URL Filtering logs, XFF IP logging is supported only when packet capture is not
enabled.
PAN-OS® Administrator’s Guide Version 10.1 1432 ©2022 Palo Alto Networks, Inc.
Policy
The X-Forwarded-For IP column does not display a value if the firewall detects a threat
that requires a reset acon (reset-client, reset-server, or reset-both)
and the last inspected packet does not contain the XFF header.
To view the XFF IP address in your logs, complete the following steps.
STEP 1 | Log in to your firewall.
STEP 4 | Click the arrow to the right of any column header and select Columns.
PAN-OS® Administrator’s Guide Version 10.1 1433 ©2022 Palo Alto Networks, Inc.
Policy
STEP 4 | Enter XFF into the search bar and click the search buon to locate the built-in XFF report
templates.
STEP 6 | Configure your custom report. Click Time Frame, Sort By, and Group By to display the XFF
informaon in the manner best suited to your needs.
STEP 7 | (Oponal) Click Run Now to generate your report on demand instead of, or in addion to, a
Scheduled Time.
PAN-OS® Administrator’s Guide Version 10.1 1434 ©2022 Palo Alto Networks, Inc.
Policy
Before you can use the client IP address to troubleshoot events, you’ll need to enable the X-
Forwarded-For opon in a URL Filtering profile. Then, aach the URL Filtering profile to Security
policy rules that allow access to web-based applicaons. The proxy server remains as the Source
Address for all traffic that matches these rules.
URL Filtering logs do not display the X-Forwarded-For IP column on the web interface.
To view recorded X-Forwarded-For IP addresses, you must export the logs to comma-
separated value (CSV) files.
Enabling the X-Forwarded-For opon in a URL Filtering profile does not enable user
mapping of the source address. To populate the Source User fields with the username of
the person who originated an HTTP request, you need to configure the firewall to use XFF
values for User-ID purposes.
You cannot enable XFF logging in the default URL Filtering profile.
STEP 2 | Aach the URL Filtering profile to the Security policy rule(s) that enable access to web
applicaons.
1. Select Policies > Security and click the rule.
2. On the Acons tab, set the Profile Type to Profiles. Then, select the URL Filtering profile
you configured earlier for X-Forwarded-For HTTP Header Logging.
3. Click OK and Commit your changes.
The XFF column is not visible in the URL Filtering logs on the firewall.
STEP 4 | Use the XFF field in the URL Filtering log to troubleshoot a log event in another log type.
If you noce an event associated with HTTP/HTTPS traffic but cannot idenfy the source
IP address because it is that of the proxy server, you can use the X-Forwarded-For value in a
PAN-OS® Administrator’s Guide Version 10.1 1435 ©2022 Palo Alto Networks, Inc.
Policy
correlated URL Filtering log to help you idenfy the source address associated with the log
event. To do this:
1. Find an event you want invesgate in a Traffic, Threat, or WildFire Submissions log that
shows the IP address of the proxy server as the source address.
2. Click the spyglass icon for the log to display its details and look for an associated URL
Filtering log at the boom of the Detailed Log Viewer window.
3. Export the associated URL Filtering log to a CSV file and look for the X-Forwarded For
IP column. The IP address in this column represents the IP address of the source user
behind the proxy server. Use this IP address to track down the device that triggered the
event you are invesgang.
PAN-OS® Administrator’s Guide Version 10.1 1436 ©2022 Palo Alto Networks, Inc.
Policy
Policy-Based Forwarding
Normally, the firewall uses the desnaon IP address in a packet to determine the outgoing
interface. The firewall uses the roung table associated with the virtual router to which the
interface is connected to perform the route lookup. Policy-Based Forwarding (PBF) allows you
to override the roung table, and specify the outgoing or egress interface based on specific
parameters such as source or desnaon IP address, or type of traffic.
• PBF
• Create a Policy-Based Forwarding Rule
• Use Case: PBF for Outbound Access with Dual ISPs
PBF
PBF rules allow traffic to take an alternave path from the next hop specified in the route table,
and are typically used to specify an egress interface for security or performance reasons. Let's
say your company has two links between the corporate office and the branch office: a cheaper
internet link and a more expensive leased line. The leased line is a high-bandwidth, low-latency
link. For enhanced security, you can use PBF to send applicaons that aren’t encrypted traffic,
such as FTP traffic, over the private leased line and all other traffic over the internet link. Or, for
performance, you can choose to route business-crical applicaons over the leased line while
sending all other traffic, such as web browsing, over the cheaper link.
• Egress Path and Symmetric Return
• Path Monitoring for PBF
• Service Versus Applicaons in PBF
To determine the next hop for symmetric returns, the firewall uses an Address Resoluon
Protocol (ARP) table. The maximum number of entries that this ARP table supports is
limited by the firewall model and the value is not user configurable. To determine the limit
for your model, use the CLI command: show pbf return-mac all.
PAN-OS® Administrator’s Guide Version 10.1 1437 ©2022 Palo Alto Networks, Inc.
Policy
Behavior of a session If the rule stays enabled when If rule is disabled when the
on a monitoring failure the monitored IP address is monitored IP address is
unreachable unreachable
PAN-OS® Administrator’s Guide Version 10.1 1438 ©2022 Palo Alto Networks, Inc.
Policy
same from the inial session (based on the App-ID cache) and apply the PBF rule. Therefore, a
session that is not an exact match and is not the same applicaon, can be forwarded based on the
PBF rule.
Further, applicaons have dependencies and the identy of the applicaon can change as the
firewall receives more packets. Because PBF makes a roung decision at the start of a session,
the firewall cannot enforce a change in applicaon identy. YouTube, for example, starts as web-
browsing but changes to Flash, RTSP, or YouTube based on the different links and videos included
on the page. However with PBF, because the firewall idenfies the applicaon as web-browsing at
the start of the session, the change in applicaon is not recognized thereaer.
You cannot use custom applicaons, applicaon filters, or applicaon groups in PBF rules.
PAN-OS® Administrator’s Guide Version 10.1 1439 ©2022 Palo Alto Networks, Inc.
Policy
You can specify the source and desnaon addresses using an IP address, an address
object, or an FQDN.
1. Select Policies > Policy Based Forwarding and Add a PBF policy rule.
2. Give the rule a descripve name (General).
3. Select Source and configure the following:
1. Select the Type (Zone or Interface) to which you will apply the forwarding policy and
specify the relevant zone or interface. If you want to enforce symmetric return, you
must select a source interface.
Only Layer 3 interfaces support PBF; loopback interfaces do not support PBF.
2. (Oponal) Specify the Source Address to which the PBF rule applies. For example, a
specific IP address or subnet IP address from which you want to forward traffic to the
interface or zone specified in this rule.
Click Negate to exclude one or more Source Addresses from the PBF rule.
For example, if your PBF rule directs all traffic from the specified zone to the
internet, Negate allows you to exclude internal IP addresses from the PBF
rule.
The evaluaon order is top down. A packet is matched against the first rule that meets
the defined criteria; aer a match is triggered, subsequent rules are not evaluated.
3. (Oponal) Add and select the Source User or groups of users to whom the policy
applies.
4. Select Desnaon/Applicaon/Service and configure the following:
1. Desnaon Address—By default, the rule applies to Any IP address. Click Negate to
exclude one or more desnaon IP addresses from the PBF rule.
2. Add any Applicaon and Service that you want to control using PBF.
PAN-OS® Administrator’s Guide Version 10.1 1440 ©2022 Palo Alto Networks, Inc.
Policy
If you are configuring PBF in a mul-VSYS environment, you must create separate
PBF rules for each virtual system (and create the appropriate Security policy rules to
enable the traffic).
1. Select Forwarding.
2. Set the Acon to take when matching a packet:
• Forward—Directs the packet to the specified Egress Interface.
• Forward to VSYS (On a firewall enabled for mulple virtual systems)—Select the
virtual system to which to forward the packet.
• Discard—Drops the packet.
• No PBF—Excludes packets that match the criteria for source, desnaon, applicaon,
or service defined in the rule. Matching packets use the route table instead of PBF;
the firewall uses the route table to exclude the matched traffic from the redirected
port.
3. To trigger the specified Acon at a daily, weekly, or non-recurring frequency, create and
aach a Schedule.
4. For Next Hop, select one of the following:
• IP Address—Enter an IP address or select an address object of type IP Netmask to
which the firewall forwards matching packets. An IPv4 address object must have a /32
netmask and an IPv6 address object must have a /128 netmask.
• FQDN—Enter an FQDN (or select or create an address object of type FQDN) to which
the firewall forwards matching packets. The FQDN can resolve to an IPv4 address, an
IPv6 address, or both. If the FQDN resolves to both IPv4 and IPv6 addresses, then the
PBF rule has two next hops: one IPv4 address and one IPv6 address. You can use the
same PBF rule for both IPv4 and IPv6 traffic. IPv4 traffic is forwarded to the IPv4 next
hop; IPv6 traffic is forwarded to the IPv6 next hop.
This FQDN must resolve to an IP address that belongs to the same subnet
as the interface you configured for PBF; otherwise, the firewall rejects the
resoluon and the FQDN remains unresolved.
The firewall uses only one IP address (from each IPv4 or IPv6 family type)
from the DNS resoluon of the FQDN. If the DNS resoluon returns more
than one address, the firewall uses the preferred IP address that matches
the IP family type (IPv4 or IPv6) configured for the next hop. The preferred
IP address is the first address the DNS server returns in its inial response.
The firewall retains this address as preferred as long as the address appears in
subsequent responses, regardless of order.
• None—No next hop mean the desnaon IP address of the packet is used as the next
hop. Forwarding fails if the desnaon IP address is not in the same subnet as the
egress interface.
5. (Oponal) Enable monitoring to verify connecvity to a target IP address or to the Next
Hop IP address if no IP address is specified. Select Monitor and aach a monitoring
PAN-OS® Administrator’s Guide Version 10.1 1441 ©2022 Palo Alto Networks, Inc.
Policy
Profile (default or custom) that specifies the acon when the monitored address is
unreachable.
• You can Disable this rule if nexthop/monitor ip is unreachable.
• Enter a target IP Address to monitor.
The Egress Interface can have both IPv4 and IPv6 addresses and the Next Hop FQDN
can resolve to both IPv4 and IPv6 addresses. In this case:
1. If the egress interface has both IPv4 and IPv6 addresses and the next hop FQDN
resolves to only one address family type, the firewall monitors the resolved IP address.
If the FQDN resolves to both IPv4 and IPv6 addresses but the egress interface has
only one address family type address, the firewall monitors the resolved next hop
address that matches the address family of the egress interface.
2. If both the egress interface and next hop FQDN have both IPv4 and IPv6 addresses,
the firewall monitors the IPv4 next hop address.
3. If the egress interface has one address family address and the next hop FQDN
resolves to a different address family address, the firewall does not monitor anything.
6. (Required for asymmetric roung environments; otherwise, oponal) Enforce Symmetric
Return and Add one or more IP addresses in the Next Hop Address List. You can add up
to 8 next-hop IP addresses; tunnel and PPoE interfaces are not available as a next-hop IP
address.
Enabling symmetric return ensures that return traffic (such asfrom the Trust zone on the
LAN to the internet) is forwarded out through the same interface through which traffic
ingresses from the internet.
PAN-OS® Administrator’s Guide Version 10.1 1442 ©2022 Palo Alto Networks, Inc.
Policy
PAN-OS® Administrator’s Guide Version 10.1 1443 ©2022 Palo Alto Networks, Inc.
Policy
STEP 1 | Configure the ingress and the egress interfaces on the firewall.
Egress interfaces can be in the same zone.
1. Select Network > Interfaces and select the interface you want to configure.
The interface configuraon on the firewall used in this example is as follows:
• Ethernet 1/19 connected to the primary ISP:
• Zone: TwoISP
• IP Address: 1.1.1.2/30
• Virtual Router: Default
• Ethernet 1/20 connected to the backup ISP:
• Zone: TwoISP
• IP Address: 2.2.2.2/30
• Virtual Router: Default
• Ethernet 1/2 is the ingress interface, used by the network clients to connect to the
internet:
• Zone: Corporate
• IP Address: 192.168. 54.1/24
• Virtual Router: Default
2. To save the interface configuraon, click OK.
PAN-OS® Administrator’s Guide Version 10.1 1444 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | On the virtual router, add a stac route to the backup ISP.
1. Select Network > Virtual Router and select the default link to open the Virtual Router
dialog.
2. Select Stac Routes and click Add. Enter a Name for the route and specify the
Desnaon IP address for which you are defining the stac route. In this example, we
use 0.0.0.0/0 for all traffic.
3. Select the IP Address radio buon and set the Next Hop IP address for your router that
connects to the backup internet gateway (you cannot use a domain name for the next
hop). In this example, 2.2.2.1.
4. Specify a cost metric for the route.
PAN-OS® Administrator’s Guide Version 10.1 1445 ©2022 Palo Alto Networks, Inc.
Policy
STEP 3 | Create a PBF rule that directs traffic to the interface that is connected to the primary ISP.
Make sure to exclude traffic desned to internal servers/IP addresses from PBF. Define a
negate rule so that traffic desned to internal IP addresses is not routed through the egress
interface defined in the PBF rule.
1. Select Policies > Policy Based Forwarding and click Add.
2. Give the rule a descripve Name in the General tab.
3. In the Source tab, set the Source Zone; in this example, the zone is Corporate.
4. In the Desnaon/Applicaon/Service tab, set the following:
1. In the Desnaon Address secon, Add the IP addresses or address range for servers
on the internal network or create an address object for your internal servers. Select
Negate to exclude the IP addresses or address object listed above from using this rule.
2. In the Service secon, Add the service-hp and service-hps services to allow HTTP
and HTTPS traffic to use the default ports. For all other traffic that is allowed by
security policy, the default route will be used.
PAN-OS® Administrator’s Guide Version 10.1 1446 ©2022 Palo Alto Networks, Inc.
Policy
3. Enable Monitor and aach the default monitoring profile to trigger a failover to the
backup ISP. In this example, we do not specify a target IP address to monitor. The firewall
will monitor the next hop IP address; if this IP address is unreachable, the firewall will
direct traffic to the default route specified on the virtual router.
4. (Required if you have asymmetric routes) Select Enforce Symmetric Return to ensure
that return traffic from the Corporate zone to the internet is forwarded out on the same
interface through which traffic ingressed from the internet.
5. NAT ensures that the traffic from the internet is returned to the correct interface/IP
address on the firewall.
6. Click OK to save the changes.
PAN-OS® Administrator’s Guide Version 10.1 1447 ©2022 Palo Alto Networks, Inc.
Policy
STEP 5 | Create NAT rules based on the egress interface and ISP. These rules ensure that the correct
source IP address is used for outbound connecons.
1. Select Policies > NAT and click Add.
2. In this example, the NAT rule we create for each ISP is as follows:
NAT for Primary ISP
In the Original Packet tab,
Source Zone: Corporate
Desnaon Zone: TwoISP
In the Translated Packet tab, under Source Address Translaon
Translaon Type: Dynamic IP and Port
Address Type: Interface Address
Interface: ethernet1/19
IP Address: 1.1.1.2/30
NAT for Backup ISP
In the Original Packet tab,
Source Zone: Corporate
Desnaon Zone: TwoISP
In the Translated Packet tab, under Source Address Translaon
Translaon Type: Dynamic IP and Port
Address Type: Interface Address
Interface: ethernet1/20
IP Address: 2.2.2.2/30
PAN-OS® Administrator’s Guide Version 10.1 1448 ©2022 Palo Alto Networks, Inc.
Policy
STEP 8 | Verify that the PBF rule is acve and that the primary ISP is used for internet access.
1. Launch a web browser and access a web server. On the firewall, check the traffic log for
web-browsing acvity.
2. From a client on the network, use the ping ulity to verify connecvity to a web server
on the internet, and check the traffic log on the firewall.
C:\Users\pm-user1>ping 198.51.100.6
Pinging 198.51.100.6 with 32 bytes of data:
Reply from 198.51.100.6: bytes=32 time=34ms TTL=117
Reply from 198.51.100.6: bytes=32 time=13ms TTL=117
Reply from 198.51.100.6: bytes=32 time=25ms TTL=117
Reply from 198.51.100.6: bytes=32 time=3ms TTL=117
Ping statistics for 198.51.100.6:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milliseconds:
Minimum = 3ms, Maximum = 34ms, Average = 18ms
3. To confirm that the PBF rule is acve, use the following CLI command:
PAN-OS® Administrator’s Guide Version 10.1 1449 ©2022 Palo Alto Networks, Inc.
Policy
STEP 9 | Verify that the failover to the backup ISP occurs and that the Source NAT is correctly applied.
1. Unplug the connecon to the primary ISP.
2. Confirm that the PBF rule is inacve with the following CLI command:
3. Access a web server, and check the traffic log to verify that traffic is being forwarded
through the backup ISP.
4. View the session details to confirm that the NAT rule is working properly.
5. Obtain the session idenficaon number from the output and view the session details.
The PBF rule is not used and hence is not listed in the output.
PAN-OS® Administrator’s Guide Version 10.1 1450 ©2022 Palo Alto Networks, Inc.
Policy
state:
ACTIVE type: FLOW
src user:
unknown
dst user:
unknown
start time : Wed Nov5 11:16:10 2014
timeout : 1800 sec
time to live : 1757 sec
total byte count(c2s) : 1918
total byte count(s2c) : 4333
layer7 packet count(c2s) : 10
layer7 packet count(s2c) : 7
vsys : vsys1
application : ssl
rule : Corp2ISP
session to be logged at end : True
session in session ager : True
session synced from HA peer : False
address/port translation : source
nat-rule : NAT-Backup ISP(vsys1)
layer7 processing : enabled
URL filtering enabled : True
URL category : search-engines
session via syn-cookies : False
session terminated on host : False
session traverses tunnel : False
authentication portal session : False
ingress interface : ethernet1/2
egress interface : ethernet1/20
session QoS rule : N/A (class 4)
PAN-OS® Administrator’s Guide Version 10.1 1451 ©2022 Palo Alto Networks, Inc.
Policy
STEP 2 | Select Device > Troubleshoong to perform a policy match or connecvity test.
STEP 3 | Enter the required informaon to perform the policy match test. In this example, we run a
NAT policy match test.
1. Select Test—Select NAT Policy Match.
2. From—Select the zone traffic is originang from.
3. To—Select the target zone of the traffic.
4. Source—Enter the IP address from which traffic originated.
5. Desnaon—Enter the IP address of the target device for the traffic.
6. Desnaon Port—Enter the port used for the traffic. This port varies depending on the
IP protocol used in the following step.
7. Protocol—Enter the IP protocol used for the traffic.
8. If necessary, enter any addional informaon relevant for your NAT policy rule tesng.
STEP 5 | Review the NAT Policy Match Result to see the policy rules that match the test criteria.
PAN-OS® Administrator’s Guide Version 10.1 1452 ©2022 Palo Alto Networks, Inc.
Virtual Systems
This topic describes virtual systems, their benefits, typical use cases, and how to
configure them. It also provides links to other topics where virtual systems are
documented as they funcon with other features.
1453
Virtual Systems
A virtual system consists of a set of physical and logical interfaces and subinterfaces (including
VLANs and virtual wires), virtual routers, and security zones. You choose the deployment mode(s)
(any combinaon of virtual wire, Layer 2, or Layer 3) of each virtual system. By using virtual
systems, you can segment any of the following:
• Administrave access
PAN-OS® Administrator’s Guide Version 10.1 1454 ©2022 Palo Alto Networks, Inc.
Virtual Systems
• The management of all policies (Security, NAT, QoS, Policy-based Forwarding, Decrypon,
Applicaon Override, Tunnel Inspecon, Authencaon, and DoS protecon)
• All objects (such as address objects, applicaon groups and filters, external dynamic lists,
security profiles, decrypon profiles, custom objects, etc.)
• User-ID
• Cerficate management
• Server profiles
• Logging, reporng, and visibility funcons
Virtual systems affect the security funcons of the firewall, but virtual systems alone do not affect
networking funcons such as stac and dynamic roung. You can segment roung for each virtual
system by creang one or more virtual routers for each virtual system, as in the following use
cases:
• If you have virtual systems for departments of one organizaon, and the network traffic for
all of the departments is within a common network, you can create a single virtual router for
mulple virtual systems.
• If you want roung segmentaon and each virtual system’s traffic must be isolated from other
virtual systems, you can create one or more virtual routers for each virtual system.
• If you want to segment the user mappings so that not all mappings are shared across virtual
systems, you can configure the User-ID sources on a virtual system that is not a User-ID hub.
See Share User-ID Mappings Across Virtual Systems.
PAN-OS® Administrator’s Guide Version 10.1 1455 ©2022 Palo Alto Networks, Inc.
Virtual Systems
disabled easily. The firewall’s role-based administraon allows the ISP or MSSP to control each
customer’s access to funconality (such as logging and reporng) while hiding or offering read-
only capabilies for other funcons.
Another common use case is within a large enterprise that requires different firewall instances
because of different technical or confidenality requirements among mulple departments.
Like the above case, different groups can have different levels of access while IT manages the
firewall itself. Services can be tracked and/or billed back to departments to thereby make separate
financial accountability possible within an organizaon.
The default is vsys1. You cannot delete vsys1 because it is relevant to the internal
hierarchy on the firewall; vsys1 appears even on firewall models that don’t support
mulple virtual systems.
You can limit the resource allocaons for sessions, rules and VPN tunnels allowed for a virtual
system, and thereby control firewall resources. Each resource seng displays the valid range of
values, which varies per firewall model. The default seng is 0, which means the limit for the
virtual system is the limit for the firewall model. However, the limit for a specific seng isn’t
replicated for each virtual system. For example, if a firewall has four virtual systems, each virtual
system can’t have the total number of Decrypon Rules allowed per firewall. Aer the total
number of Decrypon Rules for all of the virtual systems reaches the firewall limit, you cannot add
more.
PAN-OS® Administrator’s Guide Version 10.1 1456 ©2022 Palo Alto Networks, Inc.
Virtual Systems
wires, virtual routers, IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network
profiles.
A virtual system administrator can view logs of only the virtual systems assigned to that
administrator. A Superuser or Device administrator can view all of the logs, select a virtual system
to view, or configure a virtual system as a User-ID hub.
PAN-OS® Administrator’s Guide Version 10.1 1457 ©2022 Palo Alto Networks, Inc.
Virtual Systems
PAN-OS® Administrator’s Guide Version 10.1 1458 ©2022 Palo Alto Networks, Inc.
Virtual Systems
External Zone
The communicaon desired in the use case above is achieved by configuring security policies that
point to or from an external zone. An external zone is a security object that is associated with a
specific virtual system that it can reach; the zone is external to the virtual system. A virtual system
can have only one external zone, regardless of how many security zones the virtual system has
within it. External zones are required to allow traffic between zones in different virtual systems,
without the traffic leaving the firewall.
The virtual system administrator configures the security policies needed to allow traffic between
two virtual systems. Unlike security zones, an external zone is not associated with an interface;
it is associated with a virtual system. The security policy allows or denies traffic between the
security (internal) zone and the external zone.
Because external zones do not have interfaces or IP addresses associated with them, some zone
protecon profiles are not supported on external zones.
Remember that each virtual system is a separate instance of a firewall, which means that each
packet moving between virtual systems is inspected for security policy and App-ID evaluaon.
PAN-OS® Administrator’s Guide Version 10.1 1459 ©2022 Palo Alto Networks, Inc.
Virtual Systems
To create external zones, the firewall administrator must configure the virtual systems so that they
are visible to each other. External zones do not have security policies between them because their
virtual systems are visible to each other.
To communicate between virtual systems, the ingress and egress interfaces on the firewall are
either assigned to a single virtual router or else they are connected using inter-virtual router
stac routes. The simpler of these two approaches is to assign all virtual systems that must
communicate with each other to a single virtual router.
There might be a reason that the virtual systems need to have their own virtual router, for
example, if the virtual systems use overlapping IP address ranges. Traffic can be routed between
the virtual systems, but each virtual router must have stac routes that point to the other virtual
router(s) as the next hop.
Referring to the scenario in the figure above, we have an enterprise with two administrave
groups: departmentA and departmentB. The departmentA group manages the local network and
the DMZ resources. The departmentB group manages traffic in and out of the sales segment
of the network. All traffic is on a local network, so a single virtual router is used. There are two
external zones configured for communicaon between the two virtual systems. The departmentA
virtual system has three zones used in security policies: deptA-DMZ, deptA-trust, and deptA-
External. The departmentB virtual system also has three zones: deptB-DMZ, deptB-trust, and
deptB-External. Both groups can control the traffic passing through their virtual systems.
In order to allow traffic from deptA-trust to deptB-trust, two security policies are required. In the
following figure, the two vercal arrows indicate where the security policies (described below the
figure) are controlling traffic.
• Security Policy 1: In the preceding figure, traffic is desned for the deptB-trust zone. Traffic
leaves the deptA-trust zone and goes to the deptA-External zone. A security policy must allow
traffic from the source zone (deptA-trust) to the desnaon zone (deptA-External). A virtual
system allows any policy type to be used for this traffic, including NAT.
No policy is needed between external zones because traffic sent to an external zone appears
in and has automac access to the other external zones that are visible to the original external
zone.
• Security Policy 2: In the preceding figure, the traffic from deptB-External is sll desned to the
deptB-trust zone, and a security policy must be configured to allow it. The policy must allow
traffic from the source zone (deptB-External) to the desnaon zone (deptB-trust).
The departmentB virtual system could be configured to block traffic from the departmentA virtual
system, and vice versa. Like traffic from any other zone, traffic from external zones must be
explicitly allowed by policy to reach other zones in a virtual system.
PAN-OS® Administrator’s Guide Version 10.1 1460 ©2022 Palo Alto Networks, Inc.
Virtual Systems
In addion to external zones being required for inter-virtual system traffic that does not
leave the firewall, external zones are also required if you configure a Shared Gateway, in
which case the traffic is intended to leave the firewall.
PAN-OS® Administrator’s Guide Version 10.1 1461 ©2022 Palo Alto Networks, Inc.
Virtual Systems
Shared Gateway
This topic includes the following informaon about shared gateways:
• External Zones and Shared Gateway
• Networking Consideraons for a Shared Gateway
The shared gateway has one globally-routable IP address used to communicate with the outside
world. Interfaces in the virtual systems have IP addresses too, but they can be private, non-
routable IP addresses.
PAN-OS® Administrator’s Guide Version 10.1 1462 ©2022 Palo Alto Networks, Inc.
Virtual Systems
You will recall that an administrator must specify whether a virtual system is visible to other virtual
systems. Unlike a virtual system, a shared gateway is always visible to all of the virtual systems on
the firewall.
A shared gateway ID number appears as sg<ID> on the web interface. It is recommended that you
name your shared gateway with a name that includes its ID number.
When you add objects such as zones or interfaces to a shared gateway, the shared gateway
appears as an available virtual system in the vsys menu.
A shared gateway is a limited version of a virtual system; it supports NAT and policy-based
forwarding (PBF), but does not support Security, DoS policies, QoS, Decrypon, Applicaon
Override, or Authencaon policies.
PAN-OS® Administrator’s Guide Version 10.1 1463 ©2022 Palo Alto Networks, Inc.
Virtual Systems
The default is vsys1. You cannot delete vsys1 because it is relevant to the
internal hierarchy on the firewall; vsys1 appears even on firewall models that
don’t support mulple virtual systems.
2. Select Allow forwarding of decrypted content if you want to allow the firewall to
forward decrypted content to an outside service. For example, you must enable this
opon for the firewall to be able to send decrypted content to WildFire for analysis.
3. Enter a descripve Name for the virtual system. A maximum of 31 alphanumeric, space,
and underscore characters is allowed.
PAN-OS® Administrator’s Guide Version 10.1 1464 ©2022 Palo Alto Networks, Inc.
Virtual Systems
STEP 4 | (Oponal) Limit the resource allocaons for sessions, rules, and VPN tunnels allowed for the
virtual system. The flexibility of being able to allocate limits per virtual system allows you to
effecvely control firewall resources.
1. On the Resource tab, oponally set limits for a virtual system. Each field displays the
valid range of values, which varies per firewall model. The default seng is 0, which
means the limit for the virtual system is the limit for the firewall model. However, the
limit for a specific seng isn’t replicated for each virtual system. For example, if a firewall
has four virtual systems, each virtual system can’t have the total number of Decrypon
PAN-OS® Administrator’s Guide Version 10.1 1465 ©2022 Palo Alto Networks, Inc.
Virtual Systems
Rules allowed per firewall. Aer the total number of Decrypon Rules for all of the
virtual systems reaches the firewall limit, you cannot add more.
• Sessions Limit
If you use the show session meter CLI command, it displays the Maximum
number of sessions allowed per dataplane, the Current number of sessions
being used by the virtual system, and the Throled number of sessions per
virtual system. On a PA-5200 or PA-7000 Series firewall, the Current number
of sessions being used can be greater than the Maximum configured for
Sessions Limit because there are mulple dataplanes per virtual system. The
Sessions Limit you configure on a PA-5200 Series or PA-7000 Series firewall
is per dataplane, and will result in a higher maximum per virtual system.
• Security Rules
• NAT Rules
• Decrypon Rules
• QoS Rules
• Applicaon Override Rules
• Policy Based Forwarding Rules
• Authencaon Rules
• DoS Protecon Rules
• Site to Site VPN Tunnels
• Concurrent SSL VPN Tunnels
2. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1466 ©2022 Palo Alto Networks, Inc.
Virtual Systems
STEP 5 | (Oponal) Configure a virtual system as a User-ID hub to Share User-ID Mappings Across
Virtual Systems.
1. For any exisng virtual systems, transfer the configuraon for the User-ID sources you
want to share (such as monitored servers and User-ID agents) to the virtual system you
will use as a hub.
2. On the Resource tab, select Make this vsys a User-ID data hub.
PAN-OS® Administrator’s Guide Version 10.1 1467 ©2022 Palo Alto Networks, Inc.
Virtual Systems
Select the New User-ID hub from the list, or select none to disable the User-ID hub and
stop sharing mappings across virtual systems.
PAN-OS® Administrator’s Guide Version 10.1 1468 ©2022 Palo Alto Networks, Inc.
Virtual Systems
STEP 7 | Create at least one virtual router for the virtual system in order to make the virtual system
capable of networking funcons, such as stac and dynamic roung.
Alternavely, your virtual system might use a VLAN or a virtual wire, depending on your
deployment.
1. Select Network > Virtual Routers and Add a virtual router by Name.
2. For Interfaces, click Add and select the interfaces that belong to the virtual router.
3. Click OK.
STEP 8 | Configure a security zone for each interface in the virtual system.
For at least one interface, create a Layer 3 security zone. See Configure Interfaces and Zones.
STEP 9 | Configure the security policy rules that allow or deny traffic to and from the zones in the
virtual system.
See Create a Security Policy Rule.
Aer creang a virtual system, you can use the CLI to commit a configuraon for only a
specific virtual system:
STEP 11 | (Oponal) View the security policies configured for a virtual system.
Open an SSH session to use the CLI. To view the security policies for a virtual system, in
operaonal mode, use the following commands:
set system setting target-vsys <vsys-id>
show running security-policy
PAN-OS® Administrator’s Guide Version 10.1 1469 ©2022 Palo Alto Networks, Inc.
Virtual Systems
STEP 2 | Configure the Security policy rules to allow or deny traffic from the internal zones to the
external zone of the virtual system, and vice versa.
• See Create a Security Policy Rule.
• See Inter-VSYS Traffic That Remains Within the Firewall.
PAN-OS® Administrator’s Guide Version 10.1 1470 ©2022 Palo Alto Networks, Inc.
Virtual Systems
When adding objects such as zones or interfaces to a shared gateway, the shared
gateway itself will be listed as an available vsys in the VSYS menu.
PAN-OS® Administrator’s Guide Version 10.1 1471 ©2022 Palo Alto Networks, Inc.
Virtual Systems
You can select a virtual router for a service route in a virtual system; you cannot select
the egress interface. Aer you select the virtual router and the firewall sends the packet
from the virtual router, the firewall selects the egress interface based on the desnaon
IP address. Therefore, if a virtual system has mulple virtual routers, packets to all of the
servers for a service must egress out of only one virtual router. A packet with an interface
source address may egress a different interface, but the return traffic would be on the
interface that has the source IP address, creang asymmetric traffic.
PAN-OS® Administrator’s Guide Version 10.1 1472 ©2022 Palo Alto Networks, Inc.
Virtual Systems
The firewall supports syslog forwarding on a virtual system basis. When mulple virtual
systems on a firewall are connecng to a syslog server using SSL transport, the firewall can
generate only one cerficate for secure communicaon. The firewall does not support each
virtual system having its own cerficate.
To easily use the same source address for mulple services, select the checkbox
for the services, click Set Selected Routes, and connue.
• To limit the list for Source Address, select a Source Interface, then select a Source
Address (from that interface) as the service route. Selecng Any Source Interface
makes all IP addresses on all interfaces for the virtual system available in the Source
Address list from which you select an address. You can select Inherit Global Seng.
• Source Address will indicate Inherited if you selected Inherit Global Seng for the
Source Interface or it will indicate the source address you selected. If you selected
Any for Source Interface, select an IP address or enter an IP address (using the IPv4 or
IPv6 format that matches the tab you chose) to specify the source address that will be
used in packets sent to the external service.
• If you modify an address object and the IP family type (IPv4/IPv6) changes, a Commit
is required to update the service route family to use.
5. Click OK.
6. Repeat the prior steps to configure source addresses for other external services.
7. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1473 ©2022 Palo Alto Networks, Inc.
Virtual Systems
The only way to forward system logs from a PA-7000 Series firewall running PAN-OS
10.1 or later is by configuring an LFC.
In other Palo Alto Networks models, the dataplane sends logging service route traffic to the
management plane, which sends the traffic to logging servers. In a PA-7000 Series firewall, the
LPC or LFC have only one interface, and dataplanes for mulple virtual systems send logging
server traffic (types menoned above) to the PA-7000 Series firewall logging card. The logging
card is configured with mulple subinterfaces, over which the plaorm sends the logging service
traffic out to a customer’s switch, which can be connected to mulple logging servers.
Each subinterface can be configured with a subinterface name and a doed subinterface number.
The subinterface is assigned to a virtual system, which is configured for logging services. The other
service routes on a PA-7000 Series firewall funcon similarly to service routes on other Palo Alto
Networks plaorms. For informaon about the LPC or LFC, see the PA-7000 Series Hardware
Reference Guide.
• Configure a PA-7000 Series LPC for Logging per Virtual System
• Configure a PA-7000 Series LFC for Logging per Virtual System
PAN-OS® Administrator’s Guide Version 10.1 1474 ©2022 Palo Alto Networks, Inc.
Virtual Systems
STEP 2 | Add a subinterface for each tenant on the LPCs physical interface.
1. Highlight the Ethernet interface that is a Log Card interface type and click Add
Subinterface.
2. For Interface Name, aer the period, enter the subinterface assigned to the tenant’s
virtual system.
3. For Tag, enter a VLAN tag value.
Make the tag the same as the subinterface number for ease of use, but it could
be a different number.
4. (Oponal) Enter a Comment.
5. On the Config tab, in the Assign Interface to Virtual System field, select the virtual
system to which the LPC subinterface is assigned. Alternavely, you can click Virtual
Systems to add a new virtual system.
6. Click OK.
STEP 3 | Enter the addresses assigned to the subinterface, and configure the default gateway.
1. Select the Log Card Forwarding tab, and do one or both of the following:
• For the IPv4 secon, enter the IP Address and Netmask assigned to the subinterface.
Enter the Default Gateway (the next hop where packets will be sent that have no
known next hop address in the Roung Informaon Base [RIB]).
• For the IPv6 secon, enter the IPv6 Address assigned to the subinterface. Enter the
IPv6 Default Gateway.
2. Click OK.
STEP 5 | If you haven’t already done so, configure the remaining service routes for the virtual system.
Customize Service Routes for a Virtual System.
You can choose to configure only the physical interface. Because syslog forwarding via
subinterfaces is not yet supported on LFCs, each virtual system uses the single untagged
physical interface.
If you configure an LFC subinterface to forward logs externally, the interfaces will no longer
work as expected.
To configure a separate subinterface for each virtual system, add subinterfaces to the physical
interface and assign the necessary tag to segment the subinterface traffic.
PAN-OS® Administrator’s Guide Version 10.1 1475 ©2022 Palo Alto Networks, Inc.
Virtual Systems
For a PA-7000 Series firewall managed by a Panorama management server, you cannot
override or revert the LFC configuraon locally on the firewall if the LFC configuraon is
pushed from Panorama. To override the LFC configuraon pushed from Panorama, you
must log in to the firewall CLI and delete the Panorama pushed configuraon.
admin> configure
admin# commit
PAN-OS® Administrator’s Guide Version 10.1 1476 ©2022 Palo Alto Networks, Inc.
Virtual Systems
Services > Virtual Systems tab. If the Role was specified as Virtual System in the
prior step, Services is the only seng that can be enabled under Device > Setup.
• Content-ID—Allows an admin with this profile to configure sengs on the
Content-ID tab.
• WildFire—Allows an admin with this profile to configure sengs on the WildFire
tab.
• Session—Allows an admin with this profile to configure sengs on the Session tab.
• HSM—Allows an admin with this profile to configure sengs on the HSM tab.
5. Click OK.
6. (Oponal) Repeat the enre step to create another Admin Role profile with different
permissions, as necessary.
PAN-OS® Administrator’s Guide Version 10.1 1477 ©2022 Palo Alto Networks, Inc.
Virtual Systems
PAN-OS® Administrator’s Guide Version 10.1 1478 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Segmenng the network into funconal and organizaonal zones reduces the
network’s aack surface—the poron of the network exposed to potenal aackers.
Zone protecon defends network zones against flood aacks, reconnaissance
aempts, packet-based aacks, and aacks that use non-IP protocols. Tailor a Zone
Protecon profile to protect each zone (you can apply the same profile to similar
zones). Denial-of-service (DoS) protecon defends specific crical systems against
flood aacks, especially devices that user access from the internet such as web
servers and database servers, and protects resources from session floods. Tailor DoS
Protecon profiles and policy rules to protect each set of crical devices. Visit the
Best Pracces documentaon portal to get a checklist of Zone Protecon and DoS
Protecon best pracces.
Check and monitor firewall dataplane CPU consumpon to ensure that each firewall is properly
sized to support DoS and Zone Protecon along with any other features that consume CPU cycles,
such as decrypon. If you use Panorama to manage your firewalls, use Device Monitor (Panorama >
Managed Devices > Health) to check and monitor the CPU consumpon of all managed firewalls at
one me.
1479
Zone Protecon and DoS Protecon
PAN-OS® Administrator’s Guide Version 10.1 1480 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Tunnel zones are for non-encrypted tunnels. You can apply different security policy rules
to the tunnel content and to the zone of the outer tunnel, as described in the Tunnel
Content Inspecon Overview.
PAN-OS® Administrator’s Guide Version 10.1 1481 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Zone Defense
Zone Protecon profiles defend zones against flood, reconnaissance, packet-based, and non-
IP-protocol-based aacks. DoS Protecon profiles used in DoS Protecon policy rules defend
specific, crical devices against targeted flood and resource-based aacks. A DoS aack overloads
the network or targeted crical systems with large amounts of unwanted traffic an aempt to
disrupt network services.
Plan to defend your network against different types of DoS aacks:
• Applicaon-Based Aacks—Target weaknesses in a parcular applicaon and try to exhaust its
resources so legimate users can’t use it. An example of this is the Slowloris aack.
• Protocol-Based Aacks—Also known as state-exhauson aacks, these aacks target protocol
weaknesses. A common example is a SYN flood aack.
• Volumetric Aacks—High-volume aacks that aempt to overwhelm the available network
resources, especially bandwidth, and bring down the target to prevent legimate users from
accessing those resources. An example of this is a UDP flood aack.
There are no default Zone Protecon profiles or DoS Protecon profiles and DoS Protecon
policy rules. Configure and apply zone protecon based on each zone’s traffic characteriscs and
configure DoS protecon based on the individual crical systems you want to protect in each
zone.
• Zone Defense Tools
• How Do the Zone Defense Tools Work?
• Firewall Placement for DoS Protecon
• Zone Protecon Profiles
• Packet Buffer Protecon
• DoS Protecon Profiles and Policy Rules
PAN-OS® Administrator’s Guide Version 10.1 1482 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
zone. Zone Protecon profiles don’t take individual devices (IP addresses) into account because
the profiles apply to the aggregate traffic entering the zone.
Zone protecon profiles defend the network as a session is formed, before the firewall
performs DoS Protecon policy and Security policy rule lookups, and consume fewer CPU
cycles than a DoS Protecon policy or Security policy rule lookup. If a Zone Protecon profile
denies traffic, the firewall doesn’t spend CPU cycles on policy rule lookups.
Apply Zone Protecon profiles to every zone, both internet-facing and internal.
• DoS Protecon profiles and policy rules defend specific individual endpoints and resources
against flood aacks, especially high-value targets that users access from the internet. While
a Zone Protecon profile defends the zone from flood aacks, a DoS Protecon policy rule
with an appropriate DoS Protecon profile defends crical individual systems in a zone from
targeted flood aacks, providing a granular third layer of defense against DoS aacks.
Because the intent of DoS protecon is to defend crical devices and because it
consumes resources, DoS protecon defends only the devices you specify in a DoS
Protecon policy rule. No other devices are protected.
DoS Protecon profiles set flood protecon thresholds (new CPS limits) for individual devices
or groups of devices, resource protecon thresholds (session limits for specified endpoints and
resources), and whether the profile applies to aggregate or classified traffic. DoS Protecon
policy rules specify match criteria (source, desnaon, service ports), the acon to take when
traffic matches the rule, and the aggregate and classified DoS Protecon profiles associated
with each rule.
Aggregate DoS Protecon policy rules apply the CPS thresholds defined in an aggregate DoS
Protecon profile to the combined traffic of all the devices that meet the DoS Protecon
policy rule match criteria. For example, if you configure the aggregate DoS Protecon profile
to limit the CPS rate to 20,000, the 20,000 CPS limit applies to the aggregate number of
connecons for the enre group. In this case, one device could receive the majority of the
allowed connecons.
Classified DoS Protecon policy rules apply the CPS thresholds defined in a classified DoS
Protecon profile to each individual device that matches the policy rule. For example, if you
configure the classified DoS Protecon profile to limit the CPS rate to 4,000, then no device in
the group can accept more than 4,000 CPS. A DoS Protecon policy can have one aggregate
profile and one classified profile.
Classified profiles can classify connecons by source IP, desnaon IP, or both. For
internet-facing zones, classify by desnaon IP only because the firewall can’t scale to
hold the internet roung table.
Apply DoS Protecon only to crical devices, especially popular aack targets that users access
from the internet, such as web servers and database servers.
• For exisng sessions, Packet Buffer Protecon protects the firewall (and therefore the zone)
against single-session DoS aacks that aempt to overwhelm the firewall’s packet buffer, using
thresholds and mers to migate abusive sessions. You configure Packet Buffer Protecon
sengs globally and apply them per zone.
• Security Policy rules affect both the ingress and egress flows of a session. To establish a
session, incoming traffic must match an exisng Security policy rule. If there is no match, the
PAN-OS® Administrator’s Guide Version 10.1 1483 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
firewall discards the packet. A Security policy allows or denies traffic between zones (interzone)
and within zones (intrazone) using criteria including zones, IP addresses, users, applicaons,
services, and URL categories.
Apply the best pracce Vulnerability Protecon profile to each Security policy rule to
help defend against DoS aacks.
The default Security policy rules don’t permit traffic to travel between zones, so you need to
configure a Security policy rule if you want to allow interzone traffic. All intrazone traffic is
allowed by default. You can configure Security policy rules to match and control intrazone,
interzone, or universal (intrazone and interzone) traffic.
Zone Protecon profiles, DoS Protecon profiles and policy rules, and Security policy
rules only affect dataplane traffic on the firewall. Traffic originang on the firewall
management interface does not cross the dataplane, so the firewall does not match
management traffic against these profiles or policy rules.
• You can also search the Palo Alto Networks Threat Vault (requires a valid support account and
login) for threats by hash, CVE, signature ID, domain name, URL, or IP address.
PAN-OS® Administrator’s Guide Version 10.1 1484 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Security policy rule match for the packet, the firewall discards the packet. If the firewall finds a
matching Security policy rule, the firewall applies the rule to the packet. The firewall enforces the
Security policy rule on traffic in both direcons (c2s and s2c) for the life of the session. Apply the
best pracce Vulnerability Protecon profile to all Security policy rules to help defend against DoS
aacks.
The fourth protecon the firewall applies is packet buffer protecon, which you apply globally
to protect the device and can also apply individually to zones to prevent single-session DoS
aacks that aempt to overwhelm the firewall’s packet buffer. For global protecon, the firewall
used Random Early Drop (RED) to drop packets (not sessions) when the level of traffic crosses
protecon thresholds. For per-zone protecon, the firewall blocks the source IP address if it
violates the packet buffer thresholds. Unlike zone and DoS protecon, packet buffer protecon
applies to exisng sessions.
PAN-OS® Administrator’s Guide Version 10.1 1485 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
When you upgrade to PAN-OS 10.2.1 or later, you can install the AIOps plugin for
Panorama to proacvely enforce security checks on configuraons before you push
them to managed firewalls.
• If you use Panorama to manage your firewalls, use Device Monitoring to measure CPS coming
into a firewall. Select a device to see measurements that help you understand the CPS for
that device over a configurable me frame to help you understand the capacity of the firewall.
Device Monitoring can also show you a 90-day trend line of CPU average and peak use to help
you understand the typical available capacity of each firewall. To see how CPS impacts firewall
PAN-OS® Administrator’s Guide Version 10.1 1486 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
resources, you can overlay CPS on the same meline with metrics such as CPU ulizaon,
packet buffers, or packet descriptors:
1. Panorama > Managed Devices > Health > All Devices.
2. Click a Device Name to select a device and to view and filter device informaon.
3. Select the gear icon ( ) to access Device Monitor annotaons, overlay, and comparison
acons.
You can select tabs (not shown) at the top of the dialog box to see more metrics. The
following illustraons show the Sessions tab. The other tabs are Interfaces, Logging,
Resources, and Firewall Cluster. Each tab displays different default metrics and for
each default metric, you can overlay other metrics, compare the selected device to
other devices, including device slots and data planes, and annotate the metric.
PAN-OS® Administrator’s Guide Version 10.1 1487 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
The preceding screen shows the CPS data over the last 12 hours (Time Filter)
overlaid with Data Plane CPU Ulizaon. The next step shows you how to overlay
metrics on the default metrics in each tab.
4. Click the gear icon to see the acons you can take for overlaying other metrics on the
default metrics. You can overlay one metric at a me on each default metric over a parcular
me frame:
1. Select Overlay to see the overlay opons and then select the Metric drop-down.
PAN-OS® Administrator’s Guide Version 10.1 1488 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
2. You can overlay any of these metrics on the default metrics over the same me period to
see how the state of one metric affects another metric.
For example, on the Sessions tab, you can overlay Data Plane Packet Buffers or Data
Plane Packet Descriptors to see how high CPS, Throughput, Session Count, or Packets
Per Second (PPS) condions affect the packet buffers or packet descriptors.
Another example on the Sessions tab is to overlay CPS Throughput or PPS with the
Data Plane CPU and Packet Buffers metrics to see how traffic spikes affect the CPU and
buffers.
Another example is to select the Resources tab and then overlay Data Plane CPU over
Packet Buffers to see how packet buffer ulizaon affects the CPU.
Overlays help you see trends and correlaons such as whether high buffer ulizaon is
associated with high CPS or PPS rates, and give you an idea of how high CPS and PPS can
be before they affect the CPU, packet buffers, or packet descriptors.
5. Click OK to see the data overlay and use the informaon to understand device resource
behavior under different CPS loads and condions.
• To gather CPS data over me to help with seng Zone Protecon profile thresholds, if
you use an SNMP server, you can use your own management tools to poll SNMP MIBs.
However, it is important to understand that the CPS measurements in the MIBs show
twice the actual CPS value (for example, if the true CPS measurement is 10,000, the MIBs
show 20,000 as the value; this happens because the MIBs count the C2S and S2C session
PAN-OS® Administrator’s Guide Version 10.1 1489 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
segments separately instead of as a single session). You can sll see trends from the MIBs
and you can divide the CPS values by two to derive the true values. The SNMP MIB OIDs
are: PanZoneAcveTcpCps, PanZoneAcveUdpCps, and PanZoneOtherIpCps. Because the
firewall only takes measurements and updates the SNMP server every 10 seconds, poll every
10 seconds.
• Run the operaonal CLI command show session info.
You can also see CPS values using the operaonal CLI command show counter
interface, but this command displays two mes the actual CPS value because it
counts the C2S and S2C session segments separately instead of as a single session, so
divide the CPS value by two to derive the real CPS value.
• DoS Protecon profiles can protect servers from DoS aacks and can also prevent
misconfigured or compromised servers from aacking your network. When the DoS Protecon
policy rule specifies a server as the desnaon, you’re protecng it from DoS aacks. When
a rule specifies a server as the source, you’re protecng your network from inadvertent or
malicious aacks on your network from that server.
To measure the CPS for an individual device or to see which devices have the highest CPS rates
so that you can set DoS Protecon profile thresholds, use the Applicaon Command Center
(ACC). The ACC shows you server session rates that enable you to calculate the average CPS
for individual devices (for classified DoS Protecon policy rules) and for groups of devices
(aggregate DoS Protecon policy rules). Take measurements over at least a week; longer me
periods provide a larger sample size and therefore more representave measurements. Use
the measurements to understand the normal and peak number of connecons you expect the
server to receive and base your threshold sengs on those measurements. To find the devices
that have the highest CPS rates over a parcular me period:
1. Select ACC.
2. Set the Time period over which to look at session traffic.
3. On Network Acvity, go to the Source IP Acvity widget and/or the Desnaon IP
Acvity widget and select sessions (bytes is the default). You can look at source IP acvity
and desnaon IP acvity at the same me to see how many sessions the device generates
(source IP) and how many sessions the device receives (desnaon IP).
4. In the widget’s source address table, click SESSIONS to show the source IP addresses with
the highest session counts during the selected Time.
5. To determine the CPS value for a server during the selected Time, divide the number of
sessions by the number of seconds in the Time. For example, if the Time is set to Last Hour,
then divide the number of sessions by 3,600 seconds to derive the CPS value.
The ACC gives you knowledge of average CPS values over me. You can check the number of
sessions over the last week, month, or whatever me period makes sense for your environment
PAN-OS® Administrator’s Guide Version 10.1 1490 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
to understand the session load for a device. For example, to see the session acvity over the
last week, set the Time to Last 7 Days and the source and desnaon IP widgets to sessions:
As an example of measuring CPS to protect a server from DoS aacks using ACC informaon
in the illustraon, let’s calculate the average CPS value over a seven day me period for the
server that receives the most sessions (IP address 137.145.204.10 in the Desnaon IP
Acvity widget). We divide the 1.7 million sessions by the number of seconds in seven days (7
days x 24 hours x 60 minutes x 60 seconds = 604,800 seconds). The average is a bit less than
three sessions per second for that server. Measure the CPS over me periods that represent
normal average and peak traffic for the servers you want to protect and base your inial
thresholds on those values. Observe the servers and adjust the thresholds as necessary to tune
DoS Protecon so that the servers are protected but you don’t throle legimate connecons
unnecessarily.
• Measuring CPS for classified DoS Protecon profiles—Classified DoS Protecon profiles
protect individual devices. The goal is to configure CPS thresholds in the classified DoS
Protecon profile and aach the profile to a DoS Protecon policy rule that applies to
specific servers that have similar DoS aack thresholds. For example, you can apply
classified DoS Protecon profiles to web servers or crical file servers to prevent a DoS
aack from disrupng their availability.
The thresholds you set in the profile apply to each individual device specified in the policy
rule. For example, if you set a maximum rate of 5,000 CPS in a classified DoS Protecon
PAN-OS® Administrator’s Guide Version 10.1 1491 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
profile, then each device in the associated DoS Protecon policy rule can accept up to 5,000
CPS before dropping new connecons.
To calculate the average and peak CPS value, specify the IP address of each device to which
you want to apply classified DoS protecon in Global Filters (you can specify mulple IP
addresses).
1. Select the Time frame over which to view session acvity.
2. Select sessions in the Desnaon IP Acvity widget.
3. Specify the desnaon IP address of each device to which you want to apply classified
DoS protecon in Global Filters (you can specify mulple IP addresses).
You can filter firewall Traffic logs and Threat logs for the desnaon IP addresses
of the crical devices you want to protect to obtain normal and peak session
acvity informaon.
4. Add the session values together and divide the total into the number of seconds in
the me period to derive the CPS value. For example, over a me period of 30 days
(2,592,000 seconds), if the total number of sessions is 155,300,000, then the average
CPS over that me period is approximately 60 CPS.
5. Check if the number of sessions over the me period is close enough that the inial
threshold values protect each device from DoS aacks but also don’t underulize the
devices.
6. Fine tune the threshold values to ensure that none of the protected servers become DoS
aack vicms while aaining the highest safe performance for legimate connecons.
To calculate the average peak CPS, use the graphic display in the widget to idenfy the peak
session periods and calculate the average peak CPS from that.
• Measuring CPS for aggregate DoS Protecon profiles—Aggregate DoS Protecon profiles
protect groups of devices. The goal is to configure CPS thresholds in the aggregate DoS
Protecon profile and aach the profile to a DoS Protecon policy rule that applies
to an enre group of servers. Aggregate DoS Protecon adds another layer of broad
protecon aer your dedicated large-capacity perimeter DDoS device and the firewall’s
Zone Protecon.
Aggregate profiles don’t apply the configured threshold to each individual device in the way
that classified profiles do. Instead, the threshold applies to the enre protected group. For
example, if you set a maximum CPS threshold of 20,000 sessions to a group of five servers,
then the combined total sessions that the group can support is 20,000 sessions. The only
limit for an individual server in the group is how many of the 20,000 sessions are available.
One device could receive 15,000 CPS, which leaves up to 5,000 CPS for the other four
devices combined.
Adjust the thresholds as needed. You can use the same process for finding normal and peak
CPS for classified profiles in the ACC to find average normal and peak CPS for aggregate
profiles. Keep in mind that for aggregate profiles, you need to base the thresholds on the
group’s total CPS, not on the CPS to individual servers.
• To prevent a server or servers from inadvertently or maliciously aacking your network,
base your CPS measurements on the Source IP Acvity widget, which shows the session
acvity that servers generate. Filter by sessions to see the most acve servers or use
Global Sengs to filter by the source IP address of a parcular server or servers. In the DoS
PAN-OS® Administrator’s Guide Version 10.1 1492 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Protecon policy rule for the server(s), apply a DoS Protecon profile with low thresholds so
that the server can’t disrupt the network. For example, thresholds of 10 CPS for Alarm Rate,
20 CPS for Acvate Rate, and 30 CPS for Max Rate ensure that the firewall adds the source
address to the hardware block table instead of using other system resources.
• For seng aggregate DoS Protecon profile thresholds, you can use Zone Protecon profile
threshold measurements as a starng point, especially if you intend to cover most of the
servers in a zone with aggregate DoS protecon. If the zone contains only the devices to which
you want to apply an aggregate DoS Protecon profile, then the CPS numbers are exactly the
same as the Zone Protecon profile numbers. If the zone contains both devices that you want
to protect with an aggregate DoS Protecon profile and devices that you don’t want to protect
with an aggregate DoS Protecon profile, you can use the Zone Protecon CPS measurements
as a starng point and experiment with the thresholds to tune them properly.
• Use third-party tools such as Wireshark or NetFlow to collect and analyze network traffic.
• Use scripts to automate CPS informaon collecon and connuous monitoring, and to mine
informaon from the logs.
• Configure every Security policy rule on the firewall to Log at Session End. If you have no
monitoring tools such as NetFlow or Wireshark, and cannot obtain or develop automated
scripts, Log at Session End captures the number of connecons at the session end. While
this doesn’t provide CPS informaon, it does show you the number of sessions ending in the
selected me duraon and you can make an approximate calculaon of the sessions per second
from that informaon.
• Work with applicaon teams to understand the normal and peak CPS to their servers and the
maximum CPS those servers can support.
To conserve resources, the firewall measures the aggregate CPS at ten-second intervals.
For this reason, measurements you see on the firewall may not catch bursts within the ten-
second interval. Although the average CPS measurements aren’t affected, the peak CPS
measurements may not be precise. For example, if the firewall logs report a 5,000 CPS
average in a ten-second interval, it’s possible that 4,000 CPS came in a one-second burst
and the other 1,000 CPS were spread out over the remaining nine seconds.
Create separate log forwarding profiles for flood events so the appropriate administrator receives
emails that contain only flood (potenal DoS aack) events. Set Log Forwarding for both zone
protecon and DoS protecon threshold events.
Aer you implement Zone and DoS protecon, use these methods to monitor the
deployment, so as your network evolves and traffic paerns change, you adjust flood
protecon thresholds.
In addion to configuring zone protecon and DoS protecon, apply the best pracce
Vulnerability Protecon profile to each Security policy rule to help defend against DoS
aacks.
PAN-OS® Administrator’s Guide Version 10.1 1493 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
• Flood Protecon
• Reconnaissance Protecon
• Packet-Based Aack Protecon
• Protocol Protecon
• Ethernet SGT Protecon
Flood Protecon
A Zone Protecon profile with flood protecon configured defends an enre ingress zone against
SYN, ICMP, ICMPv6, UDP, and other IP flood aacks. The firewall measures the aggregate amount
of each flood type entering the zone in new connecons-per-second (CPS) and compares the
totals to the thresholds you configure in the Zone Protecon profile. (You protect crical individual
devices within a zone with DoS Protecon profiles and policy rules.)
Measure and monitor firewall dataplane CPU consumpon to ensure that each firewall is
properly sized to support DoS and Zone Protecon and any other features that consume
CPU cycles, such as decrypon. If you use Panorama to manage your firewalls, Device
Monitoring (Panorama > Managed Devices > Health > All Devices) shows you the CPU
and memory consumpon of each managed firewall. It can also show you a 90-day trend
line of CPU average and peak use to help you understand the typical available capacity of
each firewall.
For each flood type, you set three thresholds for new CPS entering the zone, and you can set a
drop Acon for SYN floods. If you know the baseline CPS rates for the zone, use these guidelines
to set the inial thresholds, and then monitor and adjust the thresholds as necessary.
• Alarm Rate—The new CPS threshold to trigger an alarm. Target seng the Alarm Rate to
15-20% above the average CPS rate for the zone so that normal fluctuaons don’t cause alerts.
• Acvate—The new CPS threshold to acvate the flood protecon mechanism and begin
dropping new connecons. For ICMP, ICMPv6, UDP, and other IP floods, the protecon
mechanism is Random Early Drop (RED, also known as Random Early Detecon). For SYN
floods only, you can set the drop Acon to SYN Cookies or RED. Target seng the Acvate
rate to just above the peak CPS rate for the zone to begin migang potenal floods.
• Maximum—The number of connecons-per-second to drop incoming packets when RED is the
protecon mechanism. Target seng the Maximum rate to approximately 80-90% of firewall
capacity, taking into account other features that consume firewall resources.
If you don’t know the baseline CPS rates for the zone, start by seng the Maximum CPS rate
to approximately 80-90% of firewall capacity and use it to derive reasonable flood migaon
alarm and acvaon rates. Set the Alarm Rate and Acvate rate based on the Maximum rate.
For example, you could set the Alarm Rate to half the Maximum rate and adjust it depending on
how many alarms you receive and the firewall resources being consumed. Be careful seng the
Acvate Rate since it begins to drop connecons. Because normal traffic loads experience some
fluctuaon, it’s best not to drop connecons too aggressively. Err on the high side and adjust the
rate if firewall resources are impacted.
PAN-OS® Administrator’s Guide Version 10.1 1494 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
SYN Flood Protecon is the only type for which you set the drop Acon. Start by seng
the Acon to SYN Cookies. SYN Cookies treats legimate traffic fairly and only drops
traffic that fails the SYN handshake, while using Random Early Drop drops traffic
randomly, so RED may affect legimate traffic. However, SYN Cookies is more resource-
intensive because the firewall acts as a proxy for the target server and handles the
three-way handshake for the server. The tradeoff is not dropping legimate traffic (SYN
Cookies) versus preserving firewall resources (RED). Monitor the firewall, and if SYN
Cookies consumes too many resources, switch to RED. If you don’t have a dedicated DDoS
prevenon device in front of the firewall, always use RED as the drop mechanism.
When SYN Cookies is acvated, the firewall does not honor the TCP opons that the
server sends because it does not know these values at the me that it proxies the SYN/
ACK. Therefore, values such as the TCP server’s window size and MSS values cannot be
negoated during the TCP handshake and the firewall will use its own default values. In
the scenario where the MSS of the path to the server is smaller than the firewall’s default
MSS value, the packet will need to be fragmented.
The default threshold values are high so that acvang a Zone Protecon profile doesn’t
unexpectedly drop legimate traffic. Adjust the thresholds to values appropriate for your
network’s traffic. The best method for understanding how to set reasonable flood thresholds is
to take baseline measurements of average and peak CPS for each flood type to determine the
normal traffic condions for each zone and to understand the capacity of the firewall, including
the impact of other resource-consuming features such as decrypon. Monitor and adjust the flood
thresholds as needed and as your network evolves.
Firewalls with mulple dataplane processors (DPs) distribute connecons across DPs. In
general, the firewall divides the CPS threshold sengs equally across its DPs. For example,
if a firewall has five DPs and you set the Alarm Rate to 20,000 CPS, each DP has an
Alarm Rate of 4,000 CPS (20,000 / 5 = 4,000), so if the new sessions on a DP exceeds
4,000, it triggers the Alarm Rate threshold for that DP.
Reconnaissance Protecon
Similar to the military definion of reconnaissance, the network security definion of
reconnaissance is when aackers aempt to gain informaon about your network’s vulnerabilies
by secretly probing the network to find weaknesses. Reconnaissance acvies are oen preludes
to a network aack. Enable Reconnaissance Protecon on all zones to defend against port scans and
host sweeps:
• Port scans discover open ports on a network. A port scanning tool sends client requests to a
range of port numbers on a host, with the goal of locang an acve port to exploit in an aack.
Zone Protecon profiles defend against TCP and UDP port scans.
• Host sweeps examine mulple hosts to determine if a specific port is open and vulnerable.
You can use reconnaissance tools for legimate purposes such as pen tesng of network security
or the strength of a firewall. You can specify up to 20 IP addresses or netmask address objects
to exclude from Reconnaissance Protecon so that your internal IT department can conduct pen
tests to find and fix network vulnerabilies.
You can set the acon to take when reconnaissance traffic (excluding pen tesng traffic) exceeds
the configured threshold when you Configure Reconnaissance Protecon. Retain the default
PAN-OS® Administrator’s Guide Version 10.1 1495 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Interval and Threshold to log a few packets for analysis before blocking the reconnaissance
operaon.
Enabling Rematch Sessions (Device > Setup > Session > Session Sengs) is a best
pracce that applies commied newly configured or edited Security Policy rules to
exisng sessions. However, if you configure Tunnel Content Inspecon on a zone
and Rematch Sessions is enabled, you must also disable Reject Non-SYN TCP (change
the selecon from Global to No), or else when you enable or edit a Tunnel Content
Inspecon policy, the firewall drops all exisng tunnel sessions. Create a separate Zone
Protecon profile to disable Reject Non-SYN TCP only on zones that have Tunnel
Content Inspecon policies and only when you enable Rematch Sessions.
• ICMP Drop—There are no standard best pracce sengs because dropping ICMP packets
depends on how you use ICMP (or if you use ICMP). For example, if you want to block ping
acvity, you can block ICMP Ping ID 0.
• IPv6 Drop—If compliance maers, ensure that the firewall drops packets with non-compliant
roung headers, extensions, etc.
• ICMPv6 Drop—If compliance maers, ensure that the firewall drops certain packets if the
packets don’t match a Security policy rule.
Protocol Protecon
In a Zone Protecon profile, Protocol Protecon defends against non-IP protocol based aacks.
Enable Protocol Protecon to block or allow non-IP protocols between security zones on a
Layer 2 VLAN or on a virtual wire, or between interfaces within a single zone on a Layer 2 VLAN
(Layer 3 interfaces and zones drop non-IP protocols so non-IP Protocol Protecon doesn’t apply).
Configure Protocol Protecon to reduce security risks and facilitate regulatory compliance by
prevenng less secure protocols from entering a zone, or an interface in a zone.
PAN-OS® Administrator’s Guide Version 10.1 1496 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
If you don’t configure a Zone Protecon profile that prevents non-IP protocols in the
same zone from going from one Layer 2 interface to another, the firewall allows the
traffic because of the default intrazone allow Security policy rule. You can create a Zone
Protecon profile that blocks protocols such as LLDP within a zone to prevent discovery
of networks reachable through other zone interfaces.
If you need to discover which non-IP protocols are running on your network, use monitoring
tools such as NetFlow, Wireshark, or other third-party tools discover non-IP protocols on your
network. Examples of non-IP protocols you can block or allow are LLDP, NetBEUI, Spanning Tree,
and Supervisory Control and Data Acquision (SCADA) systems such as Generic Object Oriented
Substaon Event (GOOSE), among many others.
Create an Exclude List or an Include List to configure Protocol Protecon for a zone. The Exclude
List is a block list—the firewall blocks all of the protocols you place in the Exclude List and allows
all other protocols. The Include List is an allow list—the firewall allows only the protocols you
specify in the list and blocks all other protocols.
Use include lists for Protocol Protecon instead of exclude lists. Include lists specifically
sancon only the protocols you want to allow and block the protocols you don’t need or
didn’t know were on your network, which reduces the aack surface and blocks unknown
traffic.
A list supports up to 64 Ethertype entries, each idenfied by its IEEE hexadecimal Ethertype code.
Other sources of Ethertype codes are standards.ieee.org/develop/regauth/ethertype/eth.txt
and hp://www.cavebear.com/archive/cavebear/Ethernet/type.html. When you configure zone
protecon for non-IP protocols on zones that have Aggregated Ethernet (AE) interfaces, you can’t
block or allow a non-IP protocol on only one AE interface member because AE interface members
are treated as a group.
Protocol Protecon doesn’t allow blocking IPv4 (Ethertype 0x0800), IPv6 (0x86DD), ARP
(0x0806), or VLAN-tagged frames (0x8100). The firewall always implicitly allows these
four Ethertypes in an Include List even if you don’t explicitly list them and doesn’t permit
you to add them to an Exclude List.
PAN-OS® Administrator’s Guide Version 10.1 1497 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
apply to new sessions (connecons) and are granular, Packet Buffer Protecon applies to exisng
sessions and is global.
You Configure Packet Buffer Protecon globally to protect the enre firewall and you also enable
Packet Buffer Protecon on each zone to protect zones:
• Global Packet Buffer Protecon—The firewall monitors sessions from all zones (regardless
of whether Packet Buffer Protecon is enabled in a zone) and how those sessions ulize the
packet buffer. You must configure Packet Buffer Protecon globally (Device > Setup > Session
Sengs) to protect the firewall and to enable it on individual zones. When packet buffer
consumpon reaches the configured Acvate percentage, the firewall used Random Early Drop
(RED) to drop packets from the offending sessions (the firewall doesn’t drop complete sessions
at the global level).
• Per-Zone Packet Buffer Protecon—Enable Packet Buffer Protecon on each zone (Network
> Zones) to layer in a second level of protecon. When packet buffer consumpon crosses
the Acvate threshold and global protecon begins to apply RED to session traffic, that starts
the Block Hold Time mer. The Block Hold Time is the amount of me in seconds that the
offending session can connue before the firewall blocks the enre session. The offending
session remains blocked unl the Block Duraon me expires.
You must enable Packet Buffer Protecon globally in order for it to be acve in zones.
The CLI command provides a snapshot of buffer ulizaon for the specified period of me,
but is neither automated nor connuous. To automate connuous packet buffer ulizaon
measurements so you can monitor changes in behavior and anomalous events, use a script. Your
Palo Alto Networks account team can provide a sample script that you can modify to develop
your own script; however, the script is not officially supported and there is no technical support
available for script usage or modificaon.
If baseline measurements consistently show abnormally high packet buffer ulizaon, then
the firewall’s capacity may be undersized for typical traffic loads. In this case, consider resizing
the firewall deployment. Otherwise, you need to tune the Packet Buffer Protecon thresholds
carefully to prevent impacted buffers from overflowing (and to prevent dropping legimate traffic).
PAN-OS® Administrator’s Guide Version 10.1 1498 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
When firewall sizing is correct for the deployment, only an aack should cause a large spike in
buffer usage.
Overrunning the firewall packet buffer negavely impacts the firewall’s packet forwarding
capabilies. When the buffers are full, no packets can enter the firewall on any interface,
not just the interface that experienced the aack.
Network Address Translaon (NAT) (an external source that has translated its internet-
bound traffic using source NAT) can give the appearance of greater packet buffer
ulizaon because of IP address translaon acvity. If this occurs, adjust the thresholds in
a way that penalizes individual sessions but doesn’t penalize the underlying IP addresses
(so other sessions from the same IP address aren’t affected). To do this, reduce the Block
Hold Time so the firewall blocks individual sessions that overulize the buffers faster, and
reduce the Block Duraon so that the underlying IP address is not unduly penalized.
PAN-OS® Administrator’s Guide Version 10.1 1499 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
protecon based on latency can trigger the protecon before latency-sensive protocols or
applicaons are affected.
If your traffic includes protocols or applicaons that are latency-sensive, then packet buffer
protecon based on latency will be more helpful than packet buffer protecon based on buffer
ulizaon.
Packet buffer protecon based on latency includes seng a Latency Alert threshold (in
milliseconds), above which the firewall starts generang an Alert log event. The Latency Acvate
threshold indicates when the firewall acvates RED on incoming packets and starts generang an
Acvate log. The Latency Max Tolerate threshold indicates when the firewall uses with RED with
almost 100% drop probability.
The Block Hold Time and Block Duraon sengs funcon for packet buffer protecon based on
latency in the same way they do for packet buffer protecon based on ulizaon.
In addion to configuring DoS protecon and zone protecon, apply the best pracce
Vulnerability Protecon profile to each Security policy rule to help defend against DoS
aacks.
PAN-OS® Administrator’s Guide Version 10.1 1500 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
• Classified—Sets flood thresholds that apply to each individual device specified in a DoS
Protecon policy rule. For example, if you set an Max Rate of 5,000 CPS, each device specified
in the rule can accept up to 5,000 CPS before it drops new connecons. If you apply a
classified DoS Protecon policy rule to more than one device, the devices governed by the rule
should be similar in terms of capacity and how you want to control their CPS rates because
classified thresholds apply to each individual device. Classified profiles protect individual crical
resources.
When you configure a DoS Protecon policy rule with a classified DoS Protecon profile
(Opon/Protecon > Classified > Address), use the Address field to specify whether
incoming connecons count toward the profile thresholds based on matching the source-ip-
only, desnaon-ip-only, or scr-dest-ip-both (the firewall counts both the source and the
desnaon IP addresses matches toward the thresholds). Counters consume resources, so the
way you count address matches affects firewall resource consumpon. You can use classified
DoS protecon to:
• Protect crical individual devices, especially servers that users access from the internet
and are oen aack targets, such as web servers, database servers, and DNS servers. Set
appropriate flood and resource protecon thresholds in a classified DoS Protecon profile.
Create a DoS Protecon policy rule that applies the profile to each server’s IP address by
adding the IP addresses as the rule’s desnaon criteria, and set the Address to desnaon-
ip-only.
The firewall uses more resources to track src-dest-ip-both as the Address than to track
source-IP-only or desnaon-ip-only because the counters consume resources for both
the source and desnaon IP addresses instead of just one of the two.
If you apply both an aggregate and a classified DoS Protecon profile to the same DoS Protecon
policy rule, the firewall applies the aggregate profile first and then applies the classified profile
if needed. For example, we protect a group of five web servers with both types of profiles in a
DoS Protecon policy rule. The aggregate profile configuraon drops new connecons when
the combined total for the group reaches a Max Rate of 25,000 CPS. The classified profile
configuraon drops new connecons to any individual web server in the group when it reaches a
Max Rate of 6,000 CPS. There are three scenarios where new connecon traffic crosses Max Rate
thresholds:
PAN-OS® Administrator’s Guide Version 10.1 1501 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
• The new CPS rate exceeds the aggregate Max Rate but doesn’t exceed the classified Max Rate.
In this scenario, the firewall applies the aggregate profile and blocks all new connecons for the
configured Block Duraon.
• The new CPS rate doesn’t exceed the aggregate Max Rate, but the CPS to one of the web
servers exceeds the classified Max Rate. In this scenario, the firewall checks the aggregate
profile and finds that the rate for the group is less than 25,000 CPS, so the firewall doesn’t
block new connecons based on that. Next, the firewall checks the classified profile and finds
that the rate for a parcular server exceeds 6,000 CPS. The firewall applies the classified
profile and blocks new connecons to that parcular server for the configured Block Duraon.
Because the other servers in the group are within the classified profile’s Max Rate, their traffic
is not affected.
• The new CPS rate exceeds the aggregate Max Rate and also exceeds the classified Max Rate
for one of the web servers. In this scenario, the firewall checks the aggregate profile and finds
that the rate for the group exceeds 25,000 CPS, so the firewall blocks new connecons to limit
the group’s total CPS. The firewall then checks the classified profile and finds that the rate for
a parcular server exceeds 6,000 CPS (so the aggregate profile enforced the group’s combined
limit, but that wasn’t enough to protect this parcular server). The firewall applies the classified
profile and blocks new connecons to that parcular server for the configured Block Duraon.
Because the other servers in the group are within the classified profile’s Max Rate, their traffic
is not affected.
If you want both an aggregate and a classified DoS Protecon profile to apply to the same
traffic, you must apply both profiles to the same DoS Protecon policy rule. If you apply
the aggregate profile to one rule and the classified profile to a different rule, even if they
specify exactly the same traffic, the firewall can apply only one profile because when
the traffic matches the first DoS Protecon policy rule, the firewall executes the Acon
specified in that rule and doesn’t compare to the traffic to any subsequent rules, so the
traffic never matches the second rule and the firewall can’t apply its acon. (This is the
same way that Security policy rules work.)
PAN-OS® Administrator’s Guide Version 10.1 1502 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Measure and monitor firewall dataplane CPU consumpon to ensure that each firewall is
properly sized to support DoS and Zone Protecon and any other features that consume
CPU cycles, such as decrypon. If you use Panorama to manage your firewalls, Device
Monitoring (Panorama > Managed Devices > Health > All Devices) shows you the CPU
and memory consumpon of each managed firewall. It can also show you a 90-day trend
line of CPU average and peak use to help you understand the typical available capacity of
each firewall.
For each flood type, you set three thresholds for new CPS to a group of devices (aggregate) or to
individual devices (classified) and a Block Duraon, and you can set a drop Acon for SYN floods:
• Alarm Rate—When new CPS exceeds this threshold, the firewall generates a DoS alarm. For
classified profiles, set the rate to 15-20% above the device’s average CPS rate so that normal
fluctuaons don’t cause alerts. For aggregate profiles, set the rate to 15-20% above the group’s
average CPS rate.
• Acvate Rate—When new CPS exceeds this threshold, the firewall begins to drop new
connecons to migate the flood unl the CPS rate drops below the threshold. For classified
profiles, the Max Rate should be an acceptable CPS rate for the device(s) you’re protecng
(the Max Rate won’t flood the crical device(s)). You can set the Acvate Rate to the same
threshold as the Max Rate so that the firewall doesn’t use RED or SYN Cookies to begin
dropping traffic before it reaches the Max Rate. Set the Acvate Rate lower than the Max Rate
only if you want to drop traffic before it reaches the Max Rate. For aggregate profiles, set the
threshold just above the average peak CPS rate for the group to begin migang floods using
RED (or SYN Cookies for SYN floods).
• Max Rate—When new CPS exceeds this threshold, the firewall blocks (drops) all new
connecons from the offending IP address for the specified Block Duraon me period.
For classified profiles, base the Max Rate threshold on the capacity of the device(s) you’re
protecng so that the CPS rate can’t flood them. For aggregate profiles, set to 80-90% of the
group’s capacity.
• Block Duraon—When new CPS exceeds the Max Rate, the firewall blocks new connecons
from the offending IP address. The Block Duraon specifies the amount of me the
firewall connues to block the IP address’s new connecons. While the firewall blocks new
connecons, it doesn’t count incoming connecons and doesn’t increment the threshold
counters. For classified and aggregate profiles, use the default value (300 seconds) to block the
aacking session without penalizing legimate sessions from the source for too long a period
of me.
SYN Flood Protecon is the only type for which you set the drop Acon. Start by seng
the Acon to SYN Cookies. SYN Cookies treats legimate traffic fairly and only drops
traffic that fails the SYN handshake, while using Random Early Drop drops traffic
randomly, so RED may affect legimate traffic. However, SYN Cookies is more resource-
intensive because the firewall acts as a proxy for the target server and handles the
three-way handshake for the server. The tradeoff is not dropping legimate traffic (SYN
Cookies) versus preserving firewall resources (RED). Monitor the firewall, and if SYN
Cookies consumes too many resources, switch to RED. If you don’t have a dedicated DDoS
prevenon device in front of the firewall, always use RED as the drop mechanism.
The default threshold values are high so that DoS Protecon profiles don’t unexpectedly drop
legimate traffic. Monitor connecon traffic and adjust the thresholds to values appropriate for
PAN-OS® Administrator’s Guide Version 10.1 1503 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
your network. Start by taking baseline measurements of average and peak CPS for each flood
type to determine the normal traffic condions for the crical devices you want to protect.
Because normal traffic loads experience some fluctuaon, it’s best not to drop connecons too
aggressively. Monitor and adjust the flood thresholds as needed and as your network evolves.
Another method of seng flood thresholds is to use the baseline measurements to set the
maximum CPS you want to allow and work back from there to derive reasonable flood migaon
alarm and acvaon rates.
Firewalls with mulple dataplane processors (DPs) distribute connecons across DPs. In
general, the firewall divides the CPS threshold sengs equally across its DPs. For example,
if a firewall has five DPs and you set the Alarm Rate to 20,000 CPS, each DP has an
Alarm Rate of 4,000 CPS (20,000 / 5 = 4,000), so if the new sessions on a DP exceeds
4,000, it triggers the Alarm Rate threshold for that DP.
In addion to seng IP flood thresholds, you can also use DoS Protecon profiles to detect and
prevent session exhauson aacks in which a large number of hosts (bots) establish as many
sessions as possible to consume a target’s resources. On the profile’s Resources Protecon tab,
you can set the maximum number of concurrent sessions that the device(s) defined in the DoS
Protecon policy rule to which you apply the profile can receive. When the number of concurrent
sessions reaches its maximum limit, new sessions are dropped.
The maximum number of concurrent sessions to set depends on your network context.
Understand the number of concurrent sessions that the resources you are protecng (defined in
the DoS Protecon policy rule to which you aach the profile) can handle. Set the threshold to
approximately 80% of the resources’ capacity, then monitor and adjust the threshold as needed.
For aggregate profiles, the Resources Protecon threshold applies to all traffic of the devices
defined in the policy rule (source and desnaon). For classified profiles, the Resources Protecon
threshold applies to the traffic based on whether the classified policy rule applies to the source IP
only, to the desnaon IP only, or to both the source and desnaon IPs.
PAN-OS® Administrator’s Guide Version 10.1 1504 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
• Services (by port and protocol). DoS protecon applies only to the services you specify.
However, specifying services doesn’t allow the services and implicitly block all other services.
Specifying services limits DoS protecon to those services, but doesn’t block other services.
In addion to protecng service ports in use on crical servers, you can also protect
against DoS aacks on the unused service ports of crical servers. For crical systems,
you can do this by creang one DoS Protecon policy rule and profile to protect ports
with services running, and a different DoS Protecon policy rule and profile to protect
ports with no services running. For example, you can protect a web server’s normal
service ports, such as 80 and 443, with one policy/profile, and protect all of the other
service ports with the other policy/profile. Be aware of the firewall’s capacity so that
servicing the DoS counters doesn’t impact performance.
When traffic matches a DoS Protecon policy rule, the firewall takes one of three acons:
• Deny—The firewall denies access and doesn’t apply a DoS Protecon profile. Traffic that
matches the rule is blocked.
• Allow—The firewall permits access and doesn’t apply a DoS Protecon profile. Traffic that
matches the rule is allowed.
• Protect—The firewall protects the devices defined in the DoS Protecon policy rule by applying
the specified DoS Protecon profile or profiles thresholds to traffic that matches the rule. A
rule can have one aggregate DoS Protecon profile and one classified DoS Protecon profile,
and for classified profiles, you can use the source IP, desnaon IP, or both to increment the
flood threshold counters, as described in Classified Versus Aggregate DoS Protecon. Incoming
packets count against both DoS Protecon profile thresholds if the they match the rule.
The firewall applies DoS Protecon profiles only if the Acon is Protect. If the DoS Protecon
policy rule’s Acon is Protect, specify the appropriate aggregate and/or classified DoS Protecon
profiles in the rule so that the firewall applies the DoS Protecon profile’s thresholds to traffic that
matches the rule. Most rules are Protect rules.
The Allow and Deny acons enable you to make excepons within larger groups but do not apply
DoS protecon to the traffic. For example, you can deny the traffic from most of a group but allow
a subset of that traffic. Conversely, you can allow the traffic from most of a group and deny a
subset of that traffic.
You can Schedule when a DoS Protecon policy rule is acve (start and end me, recurrence
period). One use case for scheduling is to apply different flood thresholds at different mes of
the day or week. For example, if your business experiences significantly less traffic at night than
during the day, you may want to apply higher flood thresholds during the day than at night.
Another use case is to schedule special thresholds for special events, providing that the firewall
supports the CPS rates.
For easier management and granular reporng, configure Log Forwarding to separate DoS
protecon logs from other threat logs. Forward DoS threshold violaon events directly to the
administrators via email in addion to forwarding the logs to a server such an SNMP or syslog
server. Providing that the firewalls are appropriately sized, threshold breaches should not be
frequent and will be strong indicators of an aack aempt.
PAN-OS® Administrator’s Guide Version 10.1 1505 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
PAN-OS® Administrator’s Guide Version 10.1 1506 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
If you have exisng Zone Protecon profiles in place when you upgrade to PAN-OS 8.0,
the three default sengs will apply to each profile and the firewall will act accordingly.
Beginning with PAN-OS 8.1.2 and later releases, you can use a CLI command (Step 4 in this task)
to enable the firewall to generate a Threat log when the firewall receives and drops the following
types of packets, so that you can more easily analyze these occurrences and also fulfill audit and
compliance requirements:
• Teardrop aack
• DoS aack using ping of death
Furthermore, the same CLI command also enables the firewall to generate Threat logs for the
following types of packets if you enable the corresponding Packet Based Aack Protecon:
• Fragmented IP packets
• IP address spoofing
• ICMP packets larger than 1024 bytes
• Packets containing ICMP fragments
• ICMP packets embedded with an error message
• First packets for a TCP session that are not SYN packets
PAN-OS® Administrator’s Guide Version 10.1 1507 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
STEP 1 | Create a Zone Protecon profile and configure Packet-Based Aack Protecon sengs.
1. Select Network > Network Profiles > Zone Protecon and Add a new profile.
2. Enter a Name for the profile and an oponal Descripon.
3. Select Packet Based Aack Protecon.
4. On each tab (IP Drop, TCP Drop, ICMP Drop, IPv6 Drop, and ICMPv6 Drop), select the
Packet-Based Aack Protecon sengs you want to enforce to protect a zone.
5. Click OK.
STEP 2 | Apply the Zone Protecon profile to a security zone that is assigned to interfaces you want
to protect.
1. Select Network > Zones and select the zone where you want to assign the Zone
Protecon profile.
2. Add the Interfaces belonging to the zone.
3. For Zone Protecon Profile, select the profile you just created.
4. Click OK.
STEP 4 | (PAN-OS 8.1.2 and later releases) Enable the firewall to generate Threat logs for a teardrop
aack and a DoS aack using ping of death, and also generate Threat logs for the types of
packets listed above if you enable the corresponding packet-based aack protecon (in Step
1). For example, if you enable packet-based aack protecon for Spoofed IP address, using
the following CLI causes the firewall to generate a Threat log when the firewall receives and
drops a packet with a spoofed IP address.
1. Access the CLI.
2. Use the operaonal CLI command set system setting additional-threat-
log on. Default is off.
Use Case: Non-IP Protocol Protecon Between Security Zones on Layer 2 Interfaces
In this use case, the firewall is in a Layer 2 VLAN divided into two subinterfaces. VLAN 100 is
192.168.100.1/24, subinterface .6. VLAN 200 is 192.168.100.1/24, subinterface .7. Non-IP
protocol protecon applies to ingress zones. In this use case, if the Internet zone is the ingress
zone, the firewall blocks the Generic Object Oriented Substaon Event (GOOSE) protocol. If
the User zone is the ingress zone, the firewall allows the GOOSE protocol. The firewall implicitly
allows IPv4, IPv6, ARP, and VLAN-tagged frames in both zones.
PAN-OS® Administrator’s Guide Version 10.1 1508 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
STEP 2 | Configure protocol protecon in a Zone Protecon profile to block GOOSE protocol packets.
1. Select Network > Network Profiles > Zone Protecon and Add a profile.
2. Enter the Name Block GOOSE.
3. Select Protocol Protecon.
4. Choose Rule Type of Exclude List.
5. Enter the Protocol Name, GOOSE, to easily idenfy the Ethertype on the list. The
firewall doesn’t verify that the name you enter matches the Ethertype code; it uses only
the Ethertype code to filter.
6. Enter Ethertype code 0x88B8. The Ethertype must be preceded by 0x to indicate a
hexadecimal value. Range is 0x0000 to 0xFFFF.
7. Select Enable to enforce the protocol protecon. You can disable a protocol on the list,
for example, for tesng.
8. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1509 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
When configuring an Include list, include all required non-IP protocols; an incomplete
list can result in legimate non-IP traffic being blocked.
STEP 6 | Commit.
Click Commit.
STEP 7 | View the number of non-IP packets the firewall has dropped based on protocol protecon.
Access the CLI.
Use Case: Non-IP Protocol Protecon Within a Security Zone on Layer 2 Interfaces
If you don’t implement a Zone Protecon profile with non-IP protocol protecon, the firewall
allows non-IP protocols in a single zone to go from one Layer 2 interface to another. In this use
case, blocking LLDP packets ensures that LLDP for one network doesn’t discover a network
reachable through another interface in the zone.
In the following figure, the Layer 2 VLAN named Datacenter is divided into two subinterfaces:
192.168.1.1/24, subinterface .7 and 192.168.1.2/24, subinterface .8. The VLAN belongs to the
User zone. By applying a Zone Protecon profile that blocks LLDP to the User zone:
PAN-OS® Administrator’s Guide Version 10.1 1510 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
• Subinterface .7 blocks LLDP from its switch to the firewall at the red X on the le, prevenng
that traffic from reaching subinterface .8.
• Subinterface .8 blocks LLDP from its switch to the firewall at the red X on the right, prevenng
that traffic from reaching subinterface .7.
STEP 3 | Create a VLAN for the Layer2 interface and two subinterfaces.
1. Select Network > VLANs and Add a VLAN.
2. Enter the Name of the VLAN; for this example, enter Datacenter.
3. For VLAN Interface, select None.
4. For Interfaces, click Add and select the Layer 2 interface: ethernet1/1, and two
subinterfaces: ethernet1/1.7 and ethernet1/1.8.
5. Click OK.
PAN-OS® Administrator’s Guide Version 10.1 1511 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
STEP 5 | Apply the Zone Protecon profile to the security zone to which Layer 2 VLAN belongs.
1. Select Network > Zones.
2. Add a zone.
3. Enter the Name of the zone, User.
4. For Locaon, select the virtual system where the zone applies.
5. For Type, select Layer2.
6. Add an Interface that belongs to the zone, ethernet1/1.7
7. Add an Interface that belongs to the zone, ethernet1/1.8.
8. For Zone Protecon Profile, select the profile Block LLDP.
9. Click OK.
STEP 6 | Commit.
Click Commit.
STEP 7 | View the number of non-IP packets the firewall has dropped based on protocol protecon.
Access the CLI.
PAN-OS® Administrator’s Guide Version 10.1 1512 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
IP address. If one abusive user triggers packet buffer protecon and the ingress zone has packet
buffer protecon enabled, all traffic from that offending source IP address (even from non-abusive
users) can be blocked when the firewall puts the IP address on its block list.
The most effecve way to block DoS aacks against a service behind the firewall is to configure
packet buffer protecon globally and per ingress zone.
You can Enable Packet Buffer Protecon for a zone, but it is not acve unl you enable packet
buffer protecon globally and specify the sengs.
STEP 1 | Enable packet buffer protecon globally.
1. Select Device > Setup > Session and edit the Session Sengs.
2. Select Packet Buffer Protecon.
3. Define the packet buffer protecon behavior:
• Alert (%)—When packet buffer ulizaon exceeds this threshold for more than 10
seconds, the firewall creates a log event every minute. Range s 0% to 99%; default is
50%. If the value is 0%, the firewall does not create a log event.
• Acvate (%)—When packet buffer ulizaon reaches this threshold, the firewall
begins to migate the most abusive sessions by applying random early drop (RED).
Range is 0% to 99%; default is 50%. If the value is 0%, the firewall does not apply
RED. If the abuser is ingressing a zone that has Packet Buffer Protecon enabled, the
firewall can also discard the abusive session or block the offending source IP address.
Start with the default threshold and adjust it if necessary.
The firewall records alert events in the System log, and records events for
dropped traffic, discarded sessions, and blocked IP address in the Threat log.
• Block Hold Time (sec)—Number of seconds a RED-migated session is allowed to
connue before the firewall discards it. Range is 0 to 65,535; default is 60. If the value
is 0, the firewall does not discard sessions based on packet buffer protecon.
• Block Duraon (sec)—Number of seconds a session remains discarded or an IP
address remains blocked. Range is 1 to 15,999,999; default is 3,600.
4. Click OK.
5. Commit your changes.
PAN-OS® Administrator’s Guide Version 10.1 1513 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
STEP 2 | Edit the Session Sengs secon and enable Packet Buffer Protecon.
STEP 4 | Enter the Latency Alert (milliseconds) threshold above which the firewall starts generang an
Alert log event every minute; range is 1 to 20,000; default is 50.
STEP 5 | Enter the Latency Acvate (milliseconds) threshold above which the firewall acvates
random early drop (RED) on incoming packets and starts generang an Acvate log every 10
seconds; range is 1 to 20,000ms; default is 200ms.
STEP 6 | Enter the Latency Max Tolerate (milliseconds) threshold above which the firewall uses RED
with close to 100% drop probability; range is 1 to 20,000ms; default is 500ms.
If the current latency is a value between the Latency Acvate threshold and the Latency Max
Tolerate threshold, the firewall calculates the RED drop probability as follows: (current latency
- Latency Acvate threshold) / (Latency Max Tolerate threshold - Latency Acvate threshold).
For example, if the current latency is 300, Latency Acvate is 200, and Latency Max Tolerate
is 500, then (300-200)/(500-200) = 1/3, meaning the firewall uses approximately 33% RED
drop probability.
STEP 7 | Configure the Block Hold Time and Block Duraon as for Packet Buffer Protecon based on
ulizaon.
STEP 9 | Enable the second layer of protecon for each zone where you want packet buffer protecon
based on latency.
1. Select Network > Zones and select a zone.
2. Enable Packet Buffer Protecon.
STEP 10 | Commit.
PAN-OS® Administrator’s Guide Version 10.1 1514 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
STEP 2 | Apply the Zone Protecon profile to the security zone to which the Layer 2, virtual wire, or
tap interfaces belong.
1. Select Network > Zones.
2. Add a zone.
3. Enter the Name of the zone.
4. For Locaon, select the virtual system where the zone applies.
5. For Type, select Layer2, Virtual Wire, or Tap.
6. Add an Interface that belongs to the zone.
7. For Zone Protecon Profile, select the profile you created.
8. Click OK.
STEP 3 | Commit.
STEP 4 | View the global counter of packets that the firewall dropped as a result of all Zone Protecon
profiles that employ Ethernet SGT Protecon.
1. Access the CLI.
2. > show counter global name pan_flow_dos_l2_sec_tag_drop
PAN-OS® Administrator’s Guide Version 10.1 1515 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
This feature defends against DoS aacks of new sessions only, that is, traffic that has
not been offloaded to hardware. An offloaded aack is not protected by this feature.
However, this topic describes how you can create a Security policy rule to reset the client;
the aacker reiniates the aack with numerous connecons per second and is blocked by
the defenses illustrated in this topic.
DoS Protecon Profiles and Policy Rules work together to provide protecon against flooding
of many incoming SYN, UDP, ICMP, and ICMPv6 packets, and other types of IP packets. You
determine what thresholds constute flooding. In general, the DoS Protecon profile sets the
thresholds at which the firewall generates a DoS alarm, takes acon such as Random Early Drop,
and drops addional incoming connecons. A DoS Protecon policy rule configured to protect
(rather than to allow or deny packets) determines the criteria for packets to match (such as source
address) in order to be counted toward the thresholds. This flexibility allows you to block certain
traffic, or allow certain traffic and treat other traffic as DoS traffic. When the incoming rate
exceeds your maximum threshold, the firewall blocks incoming traffic from the source address.
• Mulple-Session DoS Aack
• Single-Session DoS Aack
• Configure DoS Protecon Against Flooding of New Sessions
• End a Single Session DoS Aack
• Idenfy Sessions That Use Too Much of the On-Chip Packet Descriptor
• Discard a Session Without a Commit
PAN-OS® Administrator’s Guide Version 10.1 1516 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
PAN-OS® Administrator’s Guide Version 10.1 1517 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
The 10,000 new connecons per second exceed the Max Rate
threshold. When all of the following occur:
• the threshold is exceeded,
• a Block Duraon is specified, and
• Classified is set to include source IP address,
the firewall puts the offending source IP address on the block list.
The following figure describes in more detail what happens aer an IP address that matches the
DoS Protecon policy rule is put on the block list. It also describes the Block Duraon mer.
PAN-OS® Administrator’s Guide Version 10.1 1518 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Every one second, the firewall allows the IP address to come off the block list so that the firewall
can test the traffic paerns and determine if the aack is ongoing. The firewall takes the following
acon:
• During this one-second test period, the firewall allows packets that don’t match the DoS
Protecon policy criteria (HTTP traffic in this example) through the DoS Protecon policy rules
to the Security policy for validaon. Very few packets, if any, have me to get through because
the first aack packet that the firewall receives aer the IP address is let off the block list will
match the DoS Protecon policy criteria, quickly causing the IP address to be placed back on
the block list for another second. The firewall repeats this test each second unl the aack
stops.
• The firewall blocks all aack traffic from going past the DoS Protecon policy rules (the address
remains on the block list) unl the Block Duraon expires.
The 1-second checks illustrated in the preceding figure occur on firewall models that have
mulple dataplane CPUs and a hardware network processor. All single dataplane systems
or systems without a hardware network processor perform this migaon in soware and
use a 5-second interval.
When the aack stops, the firewall does not put the IP address back on the block list. The firewall
allows non-aack traffic to proceed through the DoS Protecon policy rules to the Security policy
PAN-OS® Administrator’s Guide Version 10.1 1519 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
rules for evaluaon. You must configure a Security policy rule to allow or deny traffic because
without one, an implicit Deny rule denies all traffic.
The block list is based on a source zone and source address combinaon. This behavior allows
duplicate IP addresses to exist as long as they are in different zones belonging to separate virtual
routers.
The Block Duraon seng in a DoS Protecon profile specifies how long the firewall blocks the
[offending] packets that match a DoS Protecon policy rule. The aack traffic remains blocked
unl the Block Duraon expires, aer which the aack traffic must again exceed the Max Rate
threshold to be blocked again.
If the aacker uses mulple sessions or bots that iniate mulple aack sessions, the
sessions count toward the thresholds in the DoS Protecon profile without a Security
policy deny or drop rule in place. Hence, a single-session aack requires a Security policy
deny or drop rule in order for each packet to count toward the thresholds; a mulple-
session aack does not.
Therefore, the DoS protecon against flooding of new sessions allows the firewall to efficiently
defend against a source IP address while aack traffic is ongoing and to permit non-aack traffic
to pass as soon as the aack stops. Pung the offending IP address on the block list allows the
DoS protecon funconality to take advantage of the block list, which is designed to quaranne
all acvity from that source IP address, such as packets with a different applicaon. Quaranning
the IP address from all acvity protects against a modern aacker who aempts a rotang
applicaon aack, in which the aacker simply changes applicaons to start a new aack or uses
a combinaon of different aacks in a hybrid DoS aack. You can Monitor Blocked IP Addresses
to view the block list, remove entries from it, and get addional informaon about an IP address
on the block list.
Beginning with PAN-OS 7.0.2, it is a change in behavior that the firewall places the
aacking source IP address on the block list. When the aack stops, non-aack traffic is
allowed to proceed to Security policy enforcement. The aack traffic that matched the
DoS Protecon profile and DoS Protecon policy rules remains blocked unl the Block
Duraon expires.
PAN-OS® Administrator’s Guide Version 10.1 1520 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
that have not triggered the DoS Protecon policy threshold; oponal for mulple-session
aack migaon).
This step is one of the steps typically performed to stop an exisng aack. See End a
Single Session DoS Aack.
Because flood aacks can occur over mulple protocols, as a best pracce, acvate
protecon for all of the flood types in the DoS Protecon profile.
1. Select Objects > Security Profiles > DoS Protecon and Add a profile Name.
2. Select Classified as the Type.
3. For Flood Protecon, select all types of flood protecon:
• SYN Flood
• UDP Flood
• ICMP Flood
• ICMPv6 Flood
• Other IP Flood
4. When you enable SYN Flood, select the Acon that occurs when connecons per
second (cps) exceed the Acvate Rate threshold:
1. Random Early Drop—The firewall uses an algorithm to progressively start dropping
that type of packet. If the aack connues, the higher the incoming cps rate (above
the Acvate Rate) gets, the more packets the firewall drops. The firewall drops
packets unl the incoming cps rate reaches the Max Rate, at which point the firewall
drops all incoming connecons. Random Early Drop (RED) is the default acon for
SYN Flood, and the only acon for UDP Flood, ICMP Flood, ICMPv6 Flood, and
Other IP Flood. RED is more efficient than SYN Cookies and can handles larger
aacks, but doesn’t discern between good and bad traffic.
2. SYN Cookies—Rather than immediately sending the SYN to the server, the firewall
generates a cookie (on behalf of the server) to send in the SYN-ACK to the client. The
client responds with its ACK and the cookie; upon this validaon the firewall then
sends the SYN to the server. The SYN Cookies acon requires more firewall resources
than Random Early Drop; it’s more discerning because it affects bad traffic.
5. (Oponal) On each of the flood tabs, change the following thresholds to suit your
environment:
• Alarm Rate (connecons/s)—Specify the threshold rate (cps) above which a DoS alarm
is generated. (Range is 0-2,000,000; default is 10,000.)
• Acvate Rate (connecons/s)—Specify the threshold rate (cps) above which a DoS
response is acvated. When the Acvate Rate threshold is reached, Random Early
PAN-OS® Administrator’s Guide Version 10.1 1521 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
Drop occurs. Range is 0-2,000,000; default is 10,000. (For SYN Flood, you can select
the acon that occurs.)
• Max Rate (connecons/s)—Specify the threshold rate of incoming connecons per
second that the firewall allows. When the threshold is exceeded, new connecons
that arrive are dropped. (Range is 2-2,000,000; default is 40,000.)
The default threshold values in this step are only starng points and might not
be appropriate for your network. You must analyze the behavior of your network
to properly set inial threshold values.
6. On each of the flood tabs, specify the Block Duraon (in seconds), which is the length
of me the firewall blocks packets that match the DoS Protecon policy rule that
references this profile. Specify a value greater than zero. (Range is 1-21,600; default is
300.)
Set a low Block Duraon value if you are concerned that packets you incorrectly
idenfy as aack traffic will be blocked unnecessarily.
Set a high Block Duraon value if you are more concerned about blocking volumetric
aacks than you are about incorrectly blocking packets that aren’t part of an aack.
7. Click OK.
STEP 3 | Configure a DoS Protecon policy rule that specifies the criteria for matching the incoming
traffic.
The firewall resources are finite, so you wouldn’t want to classify using source address
on an internet-facing zone because there can be an enormous number of unique
IP addresses that match the DoS Protecon policy rule. That would require many
counters and the firewall would run out of tracking resources. Instead, define a DoS
Protecon policy rule that classifies using the desnaon address (of the server you are
protecng).
1. Select Policies > DoS Protecon and Add a Name on the General tab. The name is case-
sensive and can be a maximum of 31 characters, including leers, numbers, spaces,
hyphens, and underscores.
2. On the Source tab, choose the Type to be a Zone or Interface, and then Add the zone(s)
or interface(s). Choose zone or interface depending on your deployment and what you
PAN-OS® Administrator’s Guide Version 10.1 1522 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
want to protect. For example, if you have only one interface coming into the firewall,
choose Interface.
3. (Oponal) For Source Address, select Any for any incoming IP address to match the rule
or Add an address object such as a geographical region.
4. (Oponal) For Source User, select any or specify a user.
5. (Oponal) Select Negate to match any sources except those you specify.
6. (Oponal) On the Desnaon tab, choose the Type to be a Zone or Interface, and then
Add the desnaon zone(s) or interface(s). For example, enter the security zone you
want to protect.
7. (Oponal) For Desnaon Address, select Any or enter the IP address of the device you
want to protect.
8. (Oponal) On the Opon/Protecon tab, Add a Service. Select a service or click Service
and enter a Name. Select TCP or UDP. Enter a Desnaon Port. Not specifying a
parcular service allows the rule to match a flood of any protocol type without regard to
an applicaon-specific port.
9. On the Opon/Protecon tab, for Acon, select Protect.
10. Select Classified.
11. For Profile, select the name of the DoS Protecon profile you created.
12. For Address, select source-ip-only or src-dest-ip-both, which determines the type of IP
address to which the rule applies. Choose the seng based on how you want the firewall
to idenfy offending traffic:
• Specify source-ip-only if you want the firewall to classify only on the source IP
address. Because aackers oen test the enre network for hosts to aack, source-
ip-only is the typical seng for a wider examinaon.
• Specify src-dest-ip-both if you want to protect against DoS aacks only on the server
that has a specific desnaon address, and you also want to ensure that every source
IP address won’t surpass a specific cps threshold to that server.
13. Click OK.
STEP 4 | Commit.
Click Commit.
PAN-OS® Administrator’s Guide Version 10.1 1523 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
STEP 2 | Create a DoS Protecon policy rule that will block the aacker’s IP address aer the aack
thresholds are exceeded.
STEP 3 | Create a Security policy rule to deny the source IP address and its aack traffic.
STEP 4 | End any exisng aacks from the aacking source IP address by execung the clear
session all filter source <ip-address> operaonal command.
Alternavely, if you know the session ID, you can execute the clear session id <value>
command to end that session only.
Aer you end the exisng aack session, any subsequent aempts to form an aack session
are blocked by the Security policy. The DoS Protecon policy counts all connecon aempts
toward the thresholds. When the Max Rate threshold is exceeded, the source IP address is
blocked for the Block Duraon, as described in Mulple-Session DoS Aack.
PAN-OS® Administrator’s Guide Version 10.1 1524 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
The command displays a maximum of the top five sessions that each use 2% or more of the on-
chip packet descriptor.
The sample output above indicates that Session 6 is using 92% of the on-chip packet
descriptor with TCP packets (protocol 6) coming from source IP address 192.168.2.35.
• SESS-ID—Indicates the global session ID that is used in all other show session
commands. The global session ID is unique within the firewall.
• GRP-ID—Indicates an internal stage of processing packets.
• COUNT—Indicates how many packets are in that GRP-ID for that session.
• APP—Indicates the App-ID extracted from the Session informaon, which can help you
determine whether the traffic is legimate. For example, if packets use a common TCP or
UDP port but the CLI output indicates an APP of undecided, the packets are possibly
aack traffic. The APP is undecided when Applicaon IP Decoders cannot get enough
informaon to determine the applicaon. An APP of unknown indicates that Applicaon
IP Decoders cannot determine the applicaon; a session of unknown APP that uses a high
percentage of the on-chip packet descriptor is also suspicious.
To restrict the display output:
On a PA-7000 Series model only, you can limit output to a slot, a dataplane, or both. For
example:
On PA-5200 Series and PA-7000 Series models only, you can limit output to a dataplane. For
example:
STEP 2 | Use the command output to determine whether the source at the source IP address using a
high percentage of the on-chip packet descriptor is sending legimate or aack traffic.
In the sample output above, a single-session aack is likely occurring. A single session (Session
ID 6) is using 92% of the on-chip packet descriptor for Slot 1, DP 1, and the applicaon at that
point is undecided.
• If you determine a single user is sending an aack and the traffic is not offloaded, you can
End a Single Session DoS Aack. At a minimum, you can Configure DoS Protecon Against
Flooding of New Sessions.
• On a hardware model that has a field-programmable gate array (FPGA), the firewall offloads
traffic to the FPGA when possible to increase performance. If the traffic is offloaded to
PAN-OS® Administrator’s Guide Version 10.1 1525 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
hardware, clearing the session does not help because then it is the soware that must
handle the barrage of packets. You should instead Discard a Session Without a Commit.
To see whether a session is offloaded or not, use the show session id <session-id>
operaonal command in the CLI as shown in the following example. The layer7processing
value indicates completed for sessions offloaded or enabled for sessions not offloaded.
PAN-OS® Administrator’s Guide Version 10.1 1526 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
firewall. One reason why this can occur is because the traffic is denied due to a configured
Security policy rule.
> show session id xxxxxxxxxx
Session xxxxxxxxxx
Bad Key: c2s: ‘c2s’
Bad Key: s2c: ‘s2c’
index(local): : yyyyyyy
PAN-OS® Administrator’s Guide Version 10.1 1527 ©2022 Palo Alto Networks, Inc.
Zone Protecon and DoS Protecon
PAN-OS® Administrator’s Guide Version 10.1 1528 ©2022 Palo Alto Networks, Inc.
Cerficaons
The following topics describe how to configure Palo Alto Networks® firewalls and
appliances to support the Common Criteria and the Federal Informaon Processing
Standard 140-2 (FIPS 140-2), which are security cerficaons that ensure a standard
set of security assurances and funconalies. These cerficaons are oen required
by civilian U.S. government agencies and government contractors.
For details about product cerficaons and third-party validaon, refer to the
Cerficaons page. For details about pending cryptographic modules refer to the
Cryptographic Module Validaon Program and search for Palo Alto Networks.
1529
Cerficaons
When you enable FIPS-CC mode, the firewall will reset to the factory default sengs; all
configuraon will be removed.
PAN-OS® Administrator’s Guide Version 10.1 1530 ©2022 Palo Alto Networks, Inc.
Cerficaons
Access the MRT on hardware firewalls and appliances (such as PA-220 firewalls, PA-7000
Series firewalls, or M-Series appliances).
1. Establish a serial console session to the firewall or appliance.
1. Connect a serial cable from the serial port on your computer to the console port on
the firewall or appliance.
If your computer does not have a 9-pin serial port but does have a USB port,
use a serial-to-USB converter to establish the connecon. If the firewall has a
micro USB console port, connect to the port using a standard Type-A USB
to micro USB cable.
2. Open terminal emulaon soware on your computer and set to 9600-8-N-1 and then
connect to the appropriate COM port.
On a Windows system, you can go to the Control Panel to view the COM port
sengs for Device and Printers to determine which COM port is assigned to
the console.
3. Log in using an administrator account. (The default username/password is admin/
admin.)
2. Enter the following CLI command and press y to confirm:
3. Aer the firewall or appliance boots to the MRT welcome screen (in approximately 2 to 3
minutes), press Enter on Continue to access the MRT main menu.
You can also access the MRT by reboong the firewall or appliance and entering
maint at the maintenance mode prompt. A direct serial console connecon is
required.
Aer the firewall or appliance boots into the MRT, you can access the MRT remotely by
establishing an SSH connecon to the management (MGT) interface IP address. At the
login prompt, enter maint as the username and the firewall or appliance serial number
as the password.
PAN-OS® Administrator’s Guide Version 10.1 1531 ©2022 Palo Alto Networks, Inc.
Cerficaons
Access the MRT on VM-Series firewalls deployed in a private cloud (such as on a VMware ESXi
or KVM hypervisor).
1. Establish an SSH session to the management IP address of the firewall and log in using an
administrator account.
2. Enter the following CLI command and press y to confirm:
It will take approximately 2 to 3 minutes for the firewall to boot to the MRT.
During this me, your SSH session will disconnect.
3. Aer the firewall boots to the MRT welcome screen, log in based on the operaonal
mode:
• Normal mode—Establish an SSH session to the management IP address of the firewall
and log in using maint as the username and the firewall or appliance serial number as
the password.
• FIPS-CC mode—Access the virtual machine management ulity (such as the vSphere
client) and connect to the virtual machine console.
4. From the MRT welcome screen, press Enter on Continue to access the MRT main
menu.
Access the MRT on VM-Series firewalls deployed in the public cloud (such as AWS or Azure).
1. Establish an SSH session to the management IP address of the firewall and log in using an
administrator account.
2. Enter the following CLI command and press y to confirm:
It will take approximately 2 to 3 minutes for the firewall to boot to the MRT.
During this me, your SSH session will disconnect.
3. Aer the firewall boots to the MRT welcome screen, log in based on the virtual machine
type:
• AWS—Log in as ec2-user and select the SSH public key associated with the virtual
machine when you deployed it.
• Azure—Enter the credenals you created when you deployed the VM-Series firewall.
• GCP—Log in as gcp-user and select the SSH public key associated with the virtual
machine when you deployed it.
4. From the MRT welcome screen, press Enter on Continue to access the MRT main
menu.
PAN-OS® Administrator’s Guide Version 10.1 1532 ©2022 Palo Alto Networks, Inc.
Cerficaons
When the appliance is in FIPS-CC mode, you will not be able to configure any sengs via
the console, including the management interface sengs. Before enabling FIPS-CC mode,
make sure that your network is set up to allow access to the management interface via
SSH or the web interface. The management interface will default to a stac address of
192.168.1.1 if using a PA-Series firewall or to an address retrieved via DHCP if it is a VM-
Series firewall. The WildFire, virtual Panorama, and M-series Panorama appliances will
default to a stac address of 192.168.1.1.
Once FIPS-CC mode is enabled, all configuraons and sengs are erased. If an
administrator has configuraons or sengs they would like to reuse aer FIPS-CC mode is
enabled, the administrator can save and export the configuraon before changing to FIPS-
CC mode. The configuraon can then be imported once the operaonal mode change is
complete. The imported configuraon must be edited per the FIPS-CC Security Funcons
or else the import process will fail.
Keys, passwords, and other crical security parameters cannot be shared across modes.
If you change the operaonal mode of a firewall or Dedicated Log Collector managed by
a Panorama management server to FIPS-CC mode, you must also change the operaonal
mode of Panorama to FIPS-CC mode. This is required to secure password hashes for local
admin passwords pushed from Panorama.
STEP 1 | (Exisng HA Configuraon only) Disable the high availability (HA) configuraon.
This is required to successfully change the operaonal mode to FIPS-CC mode for firewalls
already in an HA configuraon.
1. Log in to the firewall web interface of the primary HA peer.
2. Select Device > High Availability > General and edit the HA Pair Sengs Setup.
3. Uncheck (disable) Enable HA and click OK.
4. Commit.
STEP 2 | (Public Cloud VM-Series firewalls or Public Cloud Panorama Virtual Appliances only) Create
an SSH key and log in to the firewall or Panorama.
On some public cloud plaorms, such as Microso Azure, you must have an SSH key to
prevent an authencaon failure aer changing to FIPS-CC mode. Verify that you have
deployed the firewall to authencate using the SSH key. Although on Azure you can deploy
the VM-Series firewall or Panorama and log in using a username and password, you will be
unable to authencate using the username and password aer changing the operaonal mode
to FIPS-CC. Aer reseng to FIPS-CC mode, you must use the SSH key to log in and can then
configure a username and password that you can use for subsequently logging in to the firewall
web interface.
STEP 3 | Connect to the firewall or appliance and Access the Maintenance Recovery Tool (MRT).
PAN-OS® Administrator’s Guide Version 10.1 1533 ©2022 Palo Alto Networks, Inc.
Cerficaons
STEP 5 | Select Enable FIPS-CC Mode. The mode change operaon begins a full factory reset and
a status indicator shows the progress. Aer the mode change is complete, the status shows
Success.
All configuraons and sengs are erased and cannot be retrieved once the mode
change is complete.
If you change the operaonal mode on a VM-Series firewall deployed in the public
cloud and you lose your SSH connecon to the MRT before you are able to Reboot,
you must wait 10-15 minutes for the mode change to complete, log back into the MRT,
and then reboot the firewall to complete the operaon. Aer reseng to FIPS-CC
mode, on some virtual form factors (Panorama or VM-Series) you can only log in using
the SSH key, and if you have not set up authencaon using an SSH key, you can no
longer log in to the firewall on reboot.
Aer you switch to FIPS-CC mode, you see the following status: FIPS-CC mode enabled
successfully.
In addion, the following changes are in effect:
• FIPS-CC displays at all mes in the status bar at the boom of the web interface.
• The default administrator login credenals change to admin/paloalto.
See FIPS-CC Security Funcons for details on the security funcons that are enforced in FIPS-
CC mode.
PAN-OS® Administrator’s Guide Version 10.1 1534 ©2022 Palo Alto Networks, Inc.
Cerficaons
PAN-OS® Administrator’s Guide Version 10.1 1535 ©2022 Palo Alto Networks, Inc.
Cerficaons
(Exisng HA Deployment) Before you change the operaonal mode to FIPS-CC mode for
firewalls in a high availability (HA) configuraon, you must first disable HA (Device > High
Availability > General) before changing the operaonal mode to FIPS-CC mode.
Aer you change the operaonal mode to FIPS-CC mode for both HA peers, re-enable HA and
enable encrypon for the HA1 control link as described above.
The serial console port in FIPS-CC mode funcons as a limited status output port only; CLI
access is not available.
The serial console port on hardware and private-cloud VM-Series firewalls booted into the
MRT provides interacve access to the MRT.
Interacve console access is not supported in the hypervisor environment private-cloud VM-
Series firewalls booted into the MRT; you can access the MRT only using SSH.
You must manually configure a new master key before the old master key expires; Auto Renew
Master Key is not supported in FIPS-CC mode.
If the master key expires, the firewall or Panorama automacally reboots in Maintenance mode.
You must then Reset the Firewall to Factory Default Sengs.
Zero Touch Provisioning (ZTP) mode is disabled on the PA-5450 Firewall and the PA-400 Series
Firewalls if FIPS-CC mode is enabled.
(Panorama managed devices) Review the Panorama support of firewalls and Log Collectors
when FIPS-CC is enabled.
(PA-7000 Series Firewalls only) Review the Palo Alto Networks Hardware End of Life Dates and
Compability Matrix to confirm you have a supported line card. Line cards that have reached
End-of-Life or are running an unsupported PAN-OS release may cause the PA-7000 Series
firewall to enter maintenance mode.
Review the requirements to import cerficates in FIPS-CC mode.
• To import a cerficate and corresponding private key, the private key must be in PKCS8
standard syntax (PEM format) and encrypted with a FIPS compliant cipher.
• To import a leaf cerficate, you must first successfully import the enre Cerficate Authority
(CA) chain.
PAN-OS® Administrator’s Guide Version 10.1 1536 ©2022 Palo Alto Networks, Inc.
Cerficaons
If you send a firewall that is managed by Panorama in for repair, see Before Starng RMA
Firewall Replacement.
STEP 4 | Verify that the scrub completed successfully. View the System log and filter on the word
swap. The System log indicates the scrub status for each swap paron (either one or two
parons depending on the model) and also displays a log entry that indicates the overall
status of the scrub. If the scrub completed successfully on all swap parons, the System log
shows Swap space scrub was successful.
If the scrub failed on one or more swap parons, the System log shows Swap space scrub
was unsuccessful. The following screen capture shows the log results for a firewall that
has two parons.
To view the scrub logs using the CLI, run the show log system | match swap
command.
If you iniate the scrub using the shutdown command, the firewall or appliance will
power off aer the scrub completes. Before you can power on the firewall or appliance,
you must first disconnect and reconnect the power source.
PAN-OS® Administrator’s Guide Version 10.1 1537 ©2022 Palo Alto Networks, Inc.
Cerficaons
PAN-OS® Administrator’s Guide Version 10.1 1538 ©2022 Palo Alto Networks, Inc.