<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.staffordnet.uk/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.staffordnet.uk/feed.php">
        <title>Saucepan - paloaltonetworks:configuration</title>
        <description></description>
        <link>https://www.staffordnet.uk/</link>
        <image rdf:resource="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico" />
       <dc:date>2026-04-05T20:04:39+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:alerts&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:bgp&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:blank_configuration&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:captive_portal&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:certificates&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:cortex_data_lake&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:credential_phishing_prevention&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:data_filtering&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:decryption&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dns_sinkhole&amp;rev=1748249233&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dos_protection&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dynamic_routing_example&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dynamic_updates&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:edl&amp;rev=1747908679&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:evasion&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:file_blocking&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:globalprotect&amp;rev=1757577605&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:high_availability&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:http_calls&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:initial_setup&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ipv6&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:kerberos&amp;rev=1743450179&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lacp&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ldap&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lldp&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:log_retention&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lsvpn&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:management_interface&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:master_key&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multicast&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multi_vr&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multi_vsys&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:nat&amp;rev=1673345785&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ospf&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:panorama&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:panorama_variables&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:policy_format&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:qos&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:radius&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:response_pages&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:routing_flags&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:scheduled_log_export&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:sd_wan&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:security_profiles&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:set_commands&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:show_commands&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:snmp&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:subscriptions&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:url_filtering&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:url_override&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:useful_security_policies&amp;rev=1748248292&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id_group_mapping&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id_terminal_services&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vpn&amp;rev=1736077040&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vpn_monitoring&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vsys&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:xpanse&amp;rev=1712051253&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:xpath&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:zone_protection&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ztp&amp;rev=1669207782&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico">
        <title>Saucepan</title>
        <link>https://www.staffordnet.uk/</link>
        <url>https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico</url>
    </image>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:alerts&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>alerts</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:alerts&amp;rev=1669207782&amp;do=diff</link>
        <description>Palo Alerts

Certificate Expiry

If you want an alert when a certificate is expiring, you need to enable “Certificate Expiration Check” under Device&gt; Setup&gt; Management&gt; General Settings.

Note: Please note that the certificate check is only for the Device Certificate of the FW and not for all the certificates present on the firewall under Device</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:bgp&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>bgp</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:bgp&amp;rev=1669207782&amp;do=diff</link>
        <description>BGP

If your PAN-OS firewall has two seperate eBGP peering relationships with two seperate networks that have the same AS number (e.g. AS 1111), the firewall (assuming it is AS 2222) will not export routes that are learned from one neightbout to the other. This is because it is trying to prevent a routing loop.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:blank_configuration&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>blank_configuration</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:blank_configuration&amp;rev=1669207782&amp;do=diff</link>
        <description>Blank Configuration

	*  Username: admin
	*  Password: Password1!

&lt;?xml version=&quot;1.0&quot;?&gt;
&lt;config urldb=&quot;paloaltonetworks&quot; version=&quot;9.0.0&quot;&gt;
  &lt;mgt-config&gt;
    &lt;users&gt;
      &lt;entry name=&quot;admin&quot;&gt;
        &lt;phash&gt;$1$bgymjqlr$3ONAzRb1fsw8noJAl0ZBW/&lt;/phash&gt;
        &lt;permissions&gt;
          &lt;role-based&gt;
            &lt;superuser&gt;yes&lt;/superuser&gt;
          &lt;/role-based&gt;
        &lt;/permissions&gt;
      &lt;/entry&gt;
    &lt;/users&gt;
  &lt;/mgt-config&gt;
  &lt;shared/&gt;
  &lt;devices&gt;
    &lt;entry name=&quot;localhost.localdomain&quot;&gt;
      &lt;ne…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:captive_portal&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>captive_portal</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:captive_portal&amp;rev=1669207782&amp;do=diff</link>
        <description>Captive Portal

When troubleshooting captive portal, if you find that you cannot get the Redirect mode to work when you are redirecting to an IP that is on a loopback interface on the firewall, you need to enable “Response Pages” on the interface that is</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:certificates&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>certificates</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:certificates&amp;rev=1669207782&amp;do=diff</link>
        <description>Certificates

You can test ciphers being used with the following

nmap --script ssl-enum-ciphers -p 443 1.2.3.4

Free Certificates with Lets Encrypt

You can get free certificates for Palo Alto Networks devices using Lets Encrypt.

Details are here.

Certificate Chains</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:cortex_data_lake&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cortex_data_lake</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:cortex_data_lake&amp;rev=1669207782&amp;do=diff</link>
        <description>Cortex Data Lake

To enable enhanced application logging on the CLI

set deviceconfig setting logging enhanced-application-logging enable yes

request logging-service-forwarding customer info fetch
request logging-service-forwarding certificate info
delete license key Logging_Service_2021_03_16.key
request license fetch
request logging-service-forwarding certificate delete
request logging-service-forwarding certificate fetch-noproxy pre-shared-key ==put-psk-here==
debug software restart process …</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:credential_phishing_prevention&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>credential_phishing_prevention</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:credential_phishing_prevention&amp;rev=1669207782&amp;do=diff</link>
        <description>Credential Phishing Prevention

Whitelist

Remember, PAN-OS does not do credential phishing prevention for certain sites regardless of what you configure it to do.

Full list is here.

Logging

Remember, the logs for crediential phishing prevention will be in the URL</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:data_filtering&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>data_filtering</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:data_filtering&amp;rev=1669207782&amp;do=diff</link>
        <description>Data Filtering

When you are applying a data filtering profile, look for hits in the Data Filtering section under the monitoring tab.

In Panorama, you have to use the threatID (which refers to the id of the object in Objects-&gt;Data Pattern and NOT Objects</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:decryption&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>decryption</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:decryption&amp;rev=1669207782&amp;do=diff</link>
        <description>SSL Decryption

Overview

You will find that SSL decryption on Palo Alto devices has its limitations. If SSL decryption is enabled and yet some sites do not work in HTTPS mode, you may find that the site does not support any of the ciphers listed below.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dns_sinkhole&amp;rev=1748249233&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-26T08:47:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dns_sinkhole</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dns_sinkhole&amp;rev=1748249233&amp;do=diff</link>
        <description>DNS Sinkhole

DNS Testing

More details here

DNS Sinkhole IP

For DNS Sinkholing, Palo have an offering on their system which was 72.5.65.111 but is now (as of 2025), 198.135.184.22.

Bogon IP addresses are reserved address spaces that are filtered out on the Internet but are not typically filtered in enterprise WAN environments and will therefore get routed to the Internet perimeter.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dos_protection&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dos_protection</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dos_protection&amp;rev=1669207782&amp;do=diff</link>
        <description>DoS Protection Profiles

Remember, you should not have TCP-SYN enabled on both Zone Protection and DoS policies at the same time.

Remember, for DoS Protection Profiles, firewalls with multiple dataplane processors (DPs) distribute connections across DPs. In general, the firewall divides the CPS threshold settings equally across its DPs. For example, if a firewall has five DPs and you set the Alarm Rate to 20,000 CPS, each DP has an Alarm Rate of 4,000 CPS (20,000 / 5 = 4,000), so if the new ses…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dynamic_routing_example&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dynamic_routing_example</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dynamic_routing_example&amp;rev=1669207782&amp;do=diff</link>
        <description>Dynamic Routing Example

This page describes how to configure dynamic routing between an end user and two data centres. The scenario involves going through a pair of external firewalls and then a pair of internal firewalls at each location. In practice, I would suggest that merging the external firewalls into the internal firewalls and then making the two firewalls in each data centre an active/passive HA pair will drastically simplify what can be seen as an over complicated design. Still, it is…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dynamic_updates&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dynamic_updates</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:dynamic_updates&amp;rev=1669207782&amp;do=diff</link>
        <description>Dynamic Updates

Update Servers

Normally, you would use updates.paloaltonetworks.com and wildfire.paloaltonetworks.com or eu.wildfire.paloaltonetworks.com to get dynamic udpates for Palo Alto Networks appliances.

However, if you want to use static IPs, use the following</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:edl&amp;rev=1747908679&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-22T10:11:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>edl</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:edl&amp;rev=1747908679&amp;do=diff</link>
        <description>External Dynamic Lists

Palo have a public list for Microsoft Azure and Microsoft 365 here.

There are other SaaS products to manage EDL

	*  EDL Manager
	*  ipEngine

Also, when downloading a dynamic list over SSL (HTTPS), you will need to use a certificate profile that includes the root certificate. However, some certificates are signed by two chains. Your web browser may only show one chain. You can use</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:evasion&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>evasion</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:evasion&amp;rev=1669207782&amp;do=diff</link>
        <description>Evasion

In this case, we are accessing 1.2.3.4 as if it were host.corp.com. If we see a threat, we log this because PAN-OS resolves 1.2.3.4 to some other FQDN

( subtype eq spyware ) and ( ( name-of-threatid eq &#039;Suspicious TLS Evasion Found&#039; ) or ( name-of-threatid eq &#039;Suspicious HTTP Evasion Found&#039; ) ) and ( addr.dst in 1.2.3.4 ) and ( url eq &#039;host.corp.com/&#039; )</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:file_blocking&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>file_blocking</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:file_blocking&amp;rev=1669207782&amp;do=diff</link>
        <description>File Blocking

Palo Alto Networks have a page that lists all the file types here.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:globalprotect&amp;rev=1757577605&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-09-11T08:00:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>globalprotect</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:globalprotect&amp;rev=1757577605&amp;do=diff</link>
        <description>GlobalProtect

SAML for GlobalProtect

This page is a good guide.

Licence Requirements

Palo Alto Networks list the licence requirements here.

You need a licence to

	*  Performs HIP checks
	*  Supports the GlobalProtect app for mobile endpoints
	*  Supports the GlobalProtect app for Linux endpoints</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:high_availability&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>high_availability</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:high_availability&amp;rev=1669207782&amp;do=diff</link>
        <description>High Availability

Latency

Recomended but not enforced. Ensure &lt;= 20ms latency between HA members.

HA2 Link

If HA2 Backup has been configured but isn&#039;t showing on the dashboard widget on one or both of the firewalls in the HA pair, reboot the firewall(s) and it should appear on reboot.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:http_calls&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>http_calls</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:http_calls&amp;rev=1669207782&amp;do=diff</link>
        <description>HTTP Server Calls

You can use the HTTP Server profiles to allow your PAN-OS appliance to send messages to Slack and Teams.

Slack

This page has details on how to configure Slack integration. Manage existing Apps here (There should be an option for &#039;Incoming Webhooks&#039;).</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:initial_setup&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>initial_setup</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:initial_setup&amp;rev=1669207782&amp;do=diff</link>
        <description>Initial Setup

	*  Create User Account on Palo Alto Networks support portal. We suggest that the first account be a generic (fireawalladmins@example.com). You can then create individual accounts for yourself and your team.
	*  Register the firewalls on the support portal.
	*  Activate the Authorisation Codes for</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ipv6&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipv6</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ipv6&amp;rev=1669207782&amp;do=diff</link>
        <description>IPv6 on PAN-OS

ping inet6 yes source 2001:db8:1:1::2 host 2001:4860:4860::8888

An IPv6 Bogon address that can be used for sinkholing is 

2600:5200::1/128

Clientless VPN

Clientless VPN works fine from outside the network when the target webserver is dual stacked AND has both public AAAA record and A record.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:kerberos&amp;rev=1743450179&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-03-31T19:42:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>kerberos</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:kerberos&amp;rev=1743450179&amp;do=diff</link>
        <description>Kerberos

Knowledgebase Articles

Two good articles on setting up Kerberos SSO for User ID / Access to the Internet are

	*  here.
	*  here.

KeyTab File

You will need to create a service account on the active directory domain. You need a service account for each gateway you are using (e.g. if you are using a redirect FQDN for Captive Portal and a couple of GlobalProtect gateways, you will need that number of service accounts. This is because a service account is required for each SPN (server P…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lacp&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lacp</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lacp&amp;rev=1669207782&amp;do=diff</link>
        <description>LACP

When configuring LACP on the Palo Alto Networks firewalls, if you are connecting to devices other than another Palo Alto Networks devices, use slow timers for LACP.

Switch is active. Palo Alto Networks firewall is passive. Transmission rate should be set to slow on both the firewall and the switch(s).</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ldap&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ldap</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ldap&amp;rev=1669207782&amp;do=diff</link>
        <description>LDAP

When configuring a Global Protect portal to authenticate users against an LDAP server (in my case, Windows Server 2012 R2), I had to remember the following few details.

Firstly, when you edit the LDAP profile Web GUI-&gt;Device Tab-&gt;Server Profiles</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lldp&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lldp</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lldp&amp;rev=1669207782&amp;do=diff</link>
        <description>LLDP

For Palo Alto Networks firewalls, these are the supported TLV fields for LLDP:

	*  Chassis ID
	*  Port ID 
	*  Port Description
	*  Time-to-live
	*  End of LLDPDU
	*  System Name
	*  System Description
	*  System Capabilities
	*  Managment Address</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:log_retention&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>log_retention</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:log_retention&amp;rev=1669207782&amp;do=diff</link>
        <description>Log Retention

Tell firewall to keep log capacity to no more than 95%.

debug software disk-usage aggressive-cleaning enable</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lsvpn&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lsvpn</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:lsvpn&amp;rev=1669207782&amp;do=diff</link>
        <description>LSVPN

Do not set &#039;External Certificate Authority&#039; when createing the IPsec tunnel on the Satellite site.

You have to open up TCP-443 and UDP-4501 for LSVPN to work.

Unless we are doing dynamic routing, we do not need to put an IP on the tunnel interface of the satellite as it will get an IP anyway.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:management_interface&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>management_interface</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:management_interface&amp;rev=1669207782&amp;do=diff</link>
        <description>Management Interface

Enable Management HTTPS From CLI

If https has been disabled on the management interface, it can be enabled from the command line.

Connect to the CLI through through SSH or the console port and log in as an administrator.

Use the</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:master_key&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>master_key</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:master_key&amp;rev=1669207782&amp;do=diff</link>
        <description>Master Key

The default master key for Palo Alto Networks PAN-OS is 

p1a2l3o4a5l6t7o8</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multicast&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>multicast</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multicast&amp;rev=1669207782&amp;do=diff</link>
        <description>Multicast

Info on Multicast

	*  224.0.0.0/4 - Multicast IP Range
		*  224.0.0.0/24 - Link Local multicast
			*  224.0.0.5 OSPF - to send information to all OSPF routers
			*  224.0.0.6 OSPF - to send information to DR/BDR routers. 
			*  224.0.0.13 PIMv2
			*  224.0.0.18 VRRP</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multi_vr&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>multi_vr</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multi_vr&amp;rev=1669207782&amp;do=diff</link>
        <description>Multiple Virtual Routers

You may want to configure several virtual router objects on your Palo Alto devices to connect to the same network. To get this working properly, ensure that each virtual router&#039;s interface that connects to a given network are assigned separate zones. If, several interfaces are assigned to the same network and the same zone, the fact that they are on different routers will not stop the Palo Alto Networks firewalls from failing to route because of the logic flow.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multi_vsys&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>multi_vsys</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:multi_vsys&amp;rev=1669207782&amp;do=diff</link>
        <description>Multi-VSYS

Collapsing Multi-Vsys

Collapsing multivsys firewalls controlled by Panorama into single vsys firewalls. In this case, the two VSYS were external and internal were effectively a perimeter firewall and a core firewall.

	*  Perform pre-cutover config checks.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:nat&amp;rev=1673345785&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-10T10:16:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>nat</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:nat&amp;rev=1673345785&amp;do=diff</link>
        <description>NAT

For Games Consoles, you can may try,
&lt;/code&gt;set system setting persistent-dipp enable yes&lt;/code&gt; and then reboot.

&lt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/networking-features/persistent-nat-for-dipp&gt;

You may also need to reduce NAT oversubscription.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ospf&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ospf</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ospf&amp;rev=1669207782&amp;do=diff</link>
        <description>OSPF

Show Routes Learned

To see routes being learned by OSPF, use the following command

show routing protocol ospf lsdb

Get general routing data with

show routing route

Oi means ospf intra-area and is the subnet in which the virtual router has established OSPF peering relationships. If you have several /32 addresses in the same subnet as the larger /x on the interface, those /32 routes will also have Oi routes created with a metric of</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:panorama&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>panorama</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:panorama&amp;rev=1669207782&amp;do=diff</link>
        <description>Panorama

Setting Up Logging

When setting up Panorama to be a log collector, you may need to run the following (or just reboot the VM).

debug software restart process management-server

Disk Management

If the disks disappear when setting up a new Panorama, you can re-add them with</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:panorama_variables&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>panorama_variables</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:panorama_variables&amp;rev=1669207782&amp;do=diff</link>
        <description>Panorama Variables

Adding Variables Using CLI

Set variable

set template Core variable $tunnel-fwhq-local type ip-netmask 169.254.10.1/30
set template Core variable $tunnel-fwhq-remote type ip-netmask 169.254.10.2
set template Core variable $tunnel-fwhq-peer type ip-netmask 1.2.3.4</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:policy_format&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>policy_format</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:policy_format&amp;rev=1669207782&amp;do=diff</link>
        <description>Policy Format

Security Policy

	*  Destination Zone = Post Translation Zone
	*  Destination IP = Pre Translation IP

Destination NAT Policy

	*  Destination Zone = Pre Translation Zone
	*  Destination IP = Pre Translation IP

PBF Policy

	*  Destination Zone = No Destination Zone</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:qos&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>qos</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:qos&amp;rev=1669207782&amp;do=diff</link>
        <description>QoS

To control upload and download speeds with respect to internal endpoints browsing the web, apply the following.

	*  You will need a QoS policy that says “From Internal zone to External Zone”, then apply application and service details as appropriate. Finally, set the class to a value between 1 and 8. Remember, QoS policy applies after all other policy and that means &#039;source IP&#039; will be the external IP if you apply Source Nat to traffic. That is why just using Zones can be good.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:radius&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>radius</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:radius&amp;rev=1669207782&amp;do=diff</link>
        <description>RADIUS

Azure MFA

Azure NPS

RADIUS: Vendor specific
vendor code 25461

Vendor Specific Attribute: Add:
//Vendor-Specific Attribute Information
Vendor Code: 35461
Yes, It Confirms
Configure Attribute:
	// Configure VSA (RFC Compliant)
	Vendor-assigned attribute number: 1
	Attribute format: String
	Attribute value: AD Group Name</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:response_pages&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>response_pages</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:response_pages&amp;rev=1669207782&amp;do=diff</link>
        <description>Response Pages
PAN-OS HTML Variable  Description  &lt;appname/&gt; Application type of the blocked request. &lt;category/&gt; URL filtering category of the blocked request. &lt;certname/&gt; The name of the certificate used for SSL decryption. Other cert variables include: &lt;issuer/&gt;, &lt;status/&gt;, &lt;reason/&gt;, &lt;badcert/&gt;</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:routing_flags&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>routing_flags</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:routing_flags&amp;rev=1669207782&amp;do=diff</link>
        <description>Routing Flags

When running the show routing route command or when the virtual router runtime stats are viewed, a set of flags are displayed next to each route. 

Routes that start with A are active

	*  AS - Active and static
	*  AR - Active and learned via RIP</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:scheduled_log_export&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>scheduled_log_export</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:scheduled_log_export&amp;rev=1669207782&amp;do=diff</link>
        <description>Scheduled Log Export

On the firewall, if you schedule a log export, whatever time is set, it is the previous full day of logs that will be exported.

The export from firewalls will be in CSV format.

When exporting configuration from Panorama (on a schedule) the export file is an XML file in a TAR GZ format.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:sd_wan&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sd_wan</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:sd_wan&amp;rev=1669207782&amp;do=diff</link>
        <description>SD-WAN

Remember, when marking interfaces for ADSL/DSL, Cable Modem, Ethernet or Fibre, those links can be added to full mesh tunnels.

MPLS and other links will form point-to-point links.

Tunnel Names

tl_0101_0123456789_0108

	*  tl = tunnel
	*  0101</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:security_profiles&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>security_profiles</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:security_profiles&amp;rev=1669207782&amp;do=diff</link>
        <description>Security Profiles

Evasion Signatures

You can run an evasion test on PAN-OS using a client that accessess this site through the firewall.

We find that the following threats are detected and blocked. Notice that a lot of them are low and informational.
 Severity</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:set_commands&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>set_commands</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:set_commands&amp;rev=1669207782&amp;do=diff</link>
        <description>Set Commands

To set configuration from the command line, you have to enter configuration mode with configure and then use the set command.

When in Panorama, the following is an example of how to set information in a specific template.

set template My_Custom_Template config network virtual-router My_VRrouting-table ip static-route &quot;CLIROUTE&quot; interface tunnel.1121 destination 10.0.0.0/16 metric 110</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:show_commands&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>show_commands</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:show_commands&amp;rev=1669207782&amp;do=diff</link>
        <description>Show Commands

To show the configuration of the Palo Alto Device, log into the CLI and run 

show config running

To show the configuration as a list of &#039;set&#039; commands, run the following

set cli config-output-format set
set cli pager off
set cli terminal width 500
configure
show</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:snmp&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>snmp</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:snmp&amp;rev=1669207782&amp;do=diff</link>
        <description>SNMP

SNMP Introduction

SNMP is Simple Network Management Protocol. It allows SNMP servers (SNMP Agents) to report data when queried by a SNMP client (SNMP Manager). SNMP servers are normally on things like switches, firewalls, etc. The SNMP client is normally installed on a network manager solution (e.g. SolarWinds). SNMP servers can also sent SNMP</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:subscriptions&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>subscriptions</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:subscriptions&amp;rev=1669207782&amp;do=diff</link>
        <description>PAN-OS Subscriptions

	*  Threat Prevention – Provides protection against viruses, malware, vulnerability attacks (e.g. SQL injection) etc found within network traffic. This licence covers IDS and IPS features.
	*  DNS Security - Provides advanced protection against DNS threats.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:url_filtering&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>url_filtering</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:url_filtering&amp;rev=1669207782&amp;do=diff</link>
        <description>PAN-OS URL Filtering

Multi-Category URL Filtering

Remember, if you manually whitelist a site, any specific sub-pages that are normally classed as malware will be allowed through (even though the list of categories will mark it as cust-list, malware).</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:url_override&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>url_override</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:url_override&amp;rev=1669207782&amp;do=diff</link>
        <description>URL Filtering - Override

Override Overview

I have been unable to get the Continue/Override pages working properly on Palo Alto Networks when set to transparent mode under Device-&gt;Setup-&gt;Content-ID-&gt;URL Admin Override. I have also been unable to get it working with loopback interfaces. I suspect the latter issue should be fixable as it implies that the administrator would be limited to response pages on one link only (and that seems crazy).</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:useful_security_policies&amp;rev=1748248292&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-26T08:31:32+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>useful_security_policies</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:useful_security_policies&amp;rev=1748248292&amp;do=diff</link>
        <description>Useful Security Policies

A list of handy rules.

Useful Methodlology

	*  Block all from IP
	*  Block all to IP
	*  Block all to sinkhole
	*  Block all to tcp/udp/port
	*  Block all from country
	*  Block all to country
	*  Block all application (e.g. quic, ssh-tunnel)</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>user_id</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id&amp;rev=1669207782&amp;do=diff</link>
        <description>User-ID

Useful User-ID information.

User-ID Requirements

Palo Doc Here.

Win-RM

Setup
Run this command on each DC. Then add the account.

winrm configSDDL default

The service account needs to belong to the &#039;Remote Management Users&#039; group in AD to allow WinRM connections from the firewall to query WMI.  This is because the service account is not an administrator on the domain, and by default PowerShell Remoting requires admin privileges.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id_group_mapping&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>user_id_group_mapping</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id_group_mapping&amp;rev=1669207782&amp;do=diff</link>
        <description>User-ID Group Mapping

Test Commands

To list the number of group mappings:

show user group list

To list the members of a particular group show in the results of 

show user group list

show user group name &quot;cn=some groupname with whitespace,ou=AnOUname,ou=AnotherOUname,dc=example,dc=com&quot;</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id_terminal_services&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>user_id_terminal_services</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:user_id_terminal_services&amp;rev=1669207782&amp;do=diff</link>
        <description>User-ID Terminal Services

Terminal Services agent caveat - (Windows 2012 R2 servers only) Disable Enhanced Protected Mode in Microsoft Internet Explorer for each user who uses that browser. Palo Alto Networks recommends that you do not disable Protected Mode, which differs from Enhanced Protected Mode. This task is not necessary for other browsers such as Google Chrome or Mozilla Firefox.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vpn&amp;rev=1736077040&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-01-05T11:37:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>vpn</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vpn&amp;rev=1736077040&amp;do=diff</link>
        <description>VPN on PAN-OS

Don&#039;t enable replay protection unless required as it impacts VPN throughput performance.

IKEv2 DH 14 or 19.

AWS-GCM-128 with SHA-256 for best throughput (if we ignore SHA-1). (See this page.)

MODP

	*  Diffie-Hellman Group 1 (768-bit)
	*  Diffie-Hellman Group 2 (1024-bit)</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vpn_monitoring&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>vpn_monitoring</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vpn_monitoring&amp;rev=1669207782&amp;do=diff</link>
        <description>VPN Monitoring

PAN-OS to PAN-OS VPN

When configuring PAN-OS to PAN-OS VPN tunnels, use IKEv2. When using IKEv1, I&#039;ve seen issues with tunnel droping on some configurations.

From Palo Alto Networks support:

PAN IKEv1 does not support overlapping IKE SA. The phase1 SA will be deleted when its lifetime expires. The phase1 SA rekey will only be triggered when Phase2 SA lifetime expires. It is not a bug. While, IKEV2 support overlapping SA, phase1 SA will be rekeyed before its lifetime expires.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vsys&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>vsys</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:vsys&amp;rev=1669207782&amp;do=diff</link>
        <description>VSYS

set system setting target-vsys vsys2

set system setting target-vsys none</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:xpanse&amp;rev=1712051253&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-04-02T09:47:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>xpanse</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:xpanse&amp;rev=1712051253&amp;do=diff</link>
        <description>Xpanse

Saw this on my web server logs

198.235.24.57 - - [22/Oct/2023:20:49:50 +0000] &quot;GET / HTTP/1.0&quot; 200 347 &quot;-&quot; &quot;Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&amp;#39; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com&quot;</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:xpath&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>xpath</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:xpath&amp;rev=1669207782&amp;do=diff</link>
        <description>XPATH Command

In addition to being used by the load partial command, you can use xpath to show config of a firewall in the CLI.

The following is an example.

show config running xpath devices/entry[@name=&#039;localhost.localdomain&#039;]/deviceconfig/system</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:zone_protection&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>zone_protection</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:zone_protection&amp;rev=1669207782&amp;do=diff</link>
        <description>Zone Protection

Remember, you should not have TCP-SYN enabled on both Zone Protection and DoS policies at the same time.

Logging

To enable the additional logging, run this operational command:

set system setting additional-threat-log on

More data</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ztp&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ztp</title>
        <link>https://www.staffordnet.uk/doku.php?id=paloaltonetworks:configuration:ztp&amp;rev=1669207782&amp;do=diff</link>
        <description>Zero Touch Provisioning

If you get a firewall with a ZTP SKU, they are the same as standard NGFWs but boot up in a different way. If for any reason you want the ZTP to function like a normal box, run the following command. 

 set system ztp disable</description>
    </item>
</rdf:RDF>
