<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Palo Alto Networks</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/security/palo-alto-networks.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:43:17 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/security/palo-alto-networks.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>The Ultimate Guide to Palo Alto Networks Software NGFW (Flex) Credits. How NGFW credits work, Renewal considerations, Online Credit Estimator, Deployment Profiles</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/complete-guide-to-palo-alto-ngfw-flex-credits.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/complete-guide-to-palo-alto-ngfw-flex-credits.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/palo-alto-firewalls/software-ngfw-flex-credits/palo-alto-ngfw-credits-intro.webp" alt="Palo Alto Networks Software NGFW (Flex) Credits" width="500" height="300" loading="lazy"></p><p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/software-ngfw-flex-credits/01-palo-alto-ngfw-flex-credits-intro.png" alt="Palo Alto Networks - Introduction to Software NFGW Flex Credits" width="250" height="150" style="margin: 7px; border: 1px solid #000000; float: left;" title="Palo Alto Networks - Introduction to Software NFGW Flex Credits" />Discover the ins and outs of using <strong>Palo Alto Networks’ Software NGFW (Flex) credits</strong> to seamlessly <strong>renew</strong> your <strong>cloud-based</strong> or <strong>virtualized software</strong> <strong>NGFW devices</strong>! Dive into this exciting guide where we unravel the <strong>mysteries of software NGFW credits</strong>, show you how they're <strong>allocated</strong> to your <strong>deployment profile</strong>, and walk you through the <strong>renewal</strong> and <strong>verification process</strong>.</p>
<p style="text-align: justify;">Learn to <strong>calculate your required NGFW credits</strong> with the <strong>online Credit Estimator</strong> and much more. Get ready to master your <strong>NGFW credits</strong> and keep your network security top-notch!</p>
<p><strong>Key Topics:</strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/complete-guide-to-palo-alto-ngfw-flex-credits.html#basics-of-software-ngfw-credits" title="Grasping the Basics of Software NGFW (Flex) Credits">Grasping the Basics of Software NGFW (Flex) Credits</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/complete-guide-to-palo-alto-ngfw-flex-credits.html#ngfw-credit-estimator" title="Estimating Your NGFW Credit Needs with the Credit Estimator">Estimating Your NGFW Credit Needs with the Credit Estimator</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/complete-guide-to-palo-alto-ngfw-flex-credits.html#renewing-deployment-profile" title="Renewing Your Deployment Profile with NGFW Credits">Renewing Your Deployment Profile with NGFW Credits</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/complete-guide-to-palo-alto-ngfw-flex-credits.html#summary" title="Summary">Summary</a></li>
</ul>
<h2><a id="basics-of-software-ngfw-credits">Grasping the Basics of Software NGFW (Flex) Credits</a></h2>
<p>Palo Alto Networks’ <strong>Cloud-based</strong> (Azure, AWS, GCP) and <strong>virtualized</strong> (<a href="https://www.firewall.cx/operating-systems/virtualization-vm-backup.html" target="_blank" title="VMware ESXi">ESXi</a>, <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Microsoft Hyper-V">Hyper-V</a>, KVM) deployments, aka <strong>software NGFW devices</strong>, are licensed using <strong>Software NGFW credits</strong> (<strong>Flex Credits</strong>). When deploying a software NGFW device, you are required to purchase the correct amount of <strong>NGFW credits</strong> to allow the deployment, licensing and operation of the device. The amount of <strong>NGFW credits</strong> required, depend on the specifications of your NGFW device which include:</p>
<ul>
<li>Number and type (VM-Series or CN-Series) of firewalls deployed.</li>
<li>Number of vCPUs per firewall.</li>
<li>Subscriptions e.g Threat Prevention, URL Filtering, Wildfire etc.</li>
<li>Management Options e.g Panorama Management, Panorama Log Collector etc.</li>
<li>Support Options e.g <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html" target="_blank" title="How to register Palo Alto Networks firewall and activate licenses">Premium or Platinum support</a>.</li>
</ul>
<p style="text-align: justify;"><strong>NGFW credits</strong> are <strong>subscription-based</strong>, meaning they expire <strong>12</strong> or <strong>36 months</strong> after purchase (depending on your contract), regardless of how many credits you use.&nbsp; For example, if you purchase <strong>100 NGFW credits</strong> 12-month subscription and use <strong>80 NGFW credits</strong> for your deployment, the remaining 20 <strong>NGFW credits</strong> will be available for consumption, but expire at the end of the contract.</p>
<p class="box-info">It's crucial to purchase the right amount of NGFW credits to minimize any that go unused.</p>
<h2><a id="ngfw-credit-estimator">Estimating Your NGFW Credit Needs with the Credit Estimator</a></h2>
]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Fri, 21 Jun 2024 11:35:18 +1000</pubDate>
		</item>
		<item>
			<title>Configuring QoS on Palo Alto Firewalls: Class-based Policies, QoS Profiles, Enabling QoS on Firewall Interfaces</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/palo-alto-firewalls/qos-concepts-configuration/palo-alto-qos-configuration.webp" alt="Palo Alto Firewalls - Understanding and configuring QoS" width="500" height="300" loading="lazy"></p><p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/qos-concepts-configuration/1-intro-palo-alto-cpu-qos.jpg" alt="Palo Alto Firewalls - Understanding and configuring QoS" width="320" height="200" style="margin: 7px; float: left;" title="Palo Alto Firewalls - Understanding and configuring QoS" />This article’s purpose is to help you quickly master <strong>Palo Alto QoS concepts</strong> and <strong>learn to configure QoS</strong> on <strong>Palo Alto Firewalls </strong>in a simple and efficient way. <strong>QoS</strong> is considered a complicated topic however thanks to Palo Alto’s intuitive firewall GUI interface and our real-scenarios, you’ll quickly grasp all necessary <strong>QoS basics</strong> and be ready to implement your own <strong>QoS policies</strong>!</p>
<p style="text-align: justify;">You’ll learn <strong>basic QoS terms</strong> such as <strong>Ingress</strong> and <strong>Egress </strong><strong>traffic</strong>, <strong>Differentiated Service Code Point</strong> (<strong>DSCP</strong>), <strong>Traffic Policing</strong>, <strong>Traffic Shaping</strong>, <strong>Palo Alto QoS Classes</strong>, <strong>Palo Alto QoS Policies</strong>, <strong>how to build Palo Alto QoS policies</strong>, <strong>how to configure Palo Alto QoS Classes</strong> and finally <strong>how to enable and monitor QoS on Palo Alto firewall interfaces</strong> (both standalone &amp; AE Aggregate interfaces), view <strong>QoS bandwidth graphs</strong> and more!</p>
<p><strong>Key Topics:</strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html#intro-to-palo-alto-qos" title="Introduction to Palo Alto QoS">Introduction to Palo Alto QoS</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html#palo-alto-qos-classes" title="Palo Alto QoS Classes">Palo Alto QoS Classes</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html#palo-alto-qos-policies" title="Palo Alto QoS Policies">Palo Alto QoS Policies</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html#configuring-qos-policies-profiles" title="Configuring QoS Class-based Policies &amp; Profiles">Configuring QoS Class-based Policies &amp; Profiles</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html#enabling-qos-on-palo-alto-interfaces" title="Enabling QoS on Palo Alto Firewall Physical &amp; Aggregate (AE) Interfaces">Enabling QoS on Palo Alto Firewall Physical &amp; Aggregate (AE) Interfaces</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/configuring-qos-on-palo-alto-firewalls.html#summary" title="Summary">Summary</a></li>
</ul>
<p class="box-info">Find more great articles by visiting our&nbsp;<a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Firewall Section">Palo Alto Firewall Section</a>.</p>
<h2><a id="intro-to-palo-alto-qos">Introduction to Palo Alto QoS</a></h2>
<p style="text-align: justify;">QoS was born from the IEEE group during 1995-1998 by establishing the standard IEEE 802.1P. The main purpose of QoS is to prioritise desired traffic over other type of traffic or to limit the amount of bandwidth applications can consume, by utilizing different mechanisms. This ensures <a href="https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html" target="_blank" title="Measuring Network Performance">network performance</a>, avoids bottlenecks, congestion or overutilization of network links. A frequently used example of QoS is the <strong>prioritising Real-time traffic</strong> e.g voice or video, over other type of traffic:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/qos-concepts-configuration/1-palo-alto-qos-packet-prioritization.png" alt="Palo Alto Firewall - QoS Priority Queues &amp; Packet Prioritization" width="591" height="304" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Firewall - QoS Priority Queues &amp; Packet Prioritization" />QoS Priority Queues - Packet classification and prioritization</p>
<p style="text-align: justify;">In the example above, <strong>voice packets</strong> (blue) are given a <strong>higher priority</strong> against others, therefore immediately being forwarded by the firewall out via the <strong>output interface</strong>. Since voice packets are very sensitive to delay, they are usually handled with priority to avoid issues in a real-time voice streams e.g <a href="https://www.firewall.cx/cisco/cisco-callmanager-ccme.html" target="_blank">VoIP telephone call</a> between two endpoints.</p>
<h2>Overview of QoS Configuration on Palo Alto Firewalls</h2>
]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Fri, 01 Mar 2024 11:46:33 +1100</pubDate>
		</item>
		<item>
			<title>How to Manually Download, Import &amp; Install PAN-OS on Palo Alto Firewalls via CLI &amp; Web GUI interface</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/palo-alto-firewalls/manual-update-pan-os/pan-os-upgrade.webp" alt="How to Manually Upgrade Update Install PAN-OS" width="500" height="300" loading="lazy"></p><p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/manual-update-pan-os/intro-pan-os-upgrade.webp" alt="Palo Alto PAN-OS Manual update - upload - upgrade" width="320" height="200" style="margin: 7px; float: left;" title="Palo Alto PAN-OS Manual update - upload - upgrade" />This article provides comprehensive guidance on the manual processes involved in <strong>downloading</strong>, <strong>uploading</strong>, and <strong>installing</strong> (import) any <strong>PAN-OS version</strong> on a <strong>Palo Alto Firewall</strong>. It details the steps for searching and downloading the desired PAN-OS version, as well as the supported methods for uploading the software to your Palo Alto Firewall, including <strong>Web</strong>, <strong>TFTP</strong>, and <strong>SCP</strong>. Additionally, the article offers valuable tips aimed at facilitating a smooth and successful upgrade process.</p>
<p style="text-align: justify;">The necessity for a manual upgrade of a Palo Alto firewall arises in instances where the system operates within an <strong>isolated environment</strong> employing <strong>air-gap architecture</strong> and lacks direct internet access. This requirement is further applicable in scenarios where the firewall is <strong>devoid of valid licenses</strong>, remains <strong>unregistered</strong>, or serves as a <strong>replacement unit</strong> as exemplified in a Return Merchandise Authorization (RMA) context.</p>
<p style="text-align: justify;">Whether performing upgrades manually or automatically, it is crucial to consider the same upgrade path rules outlined in our article <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-upgrade-standalone-palo-alto-firewall-pan-os.html" target="_blank" title="Complete guide to upgrading Palo Alto firewalls">Complete guide to upgrading Palo Alto firewalls</a>. Individuals unfamiliar with these rules are strongly encouraged to review the article before initiating any PAN-OS upgrade.</p>
<p><strong>Key Topics:</strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#downloading-pan-os">Downloading PAN-OS Software</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#uploading-pan-os-software">Uploading PAN-OS Software Images to the Firewall</a>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#uploading-pan-os-software-web-gui">Uploading via Web GUI</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#uploading-pan-os-software-via-tftp">Uploading via TFTP</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#uploading-pan-os-software-via-scp">Uploading via SCP</a></li>
</ul>
</li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#verifying-pan-os">Verifying Uploaded PAN-OS Software Images (GUI &amp; CLI)</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#installing-pan-os">Installing PAN-OS Software Images</a>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#installing-pan-os-via-gui">Installation via Web GUI</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#installing-pan-os-via-cli">Installation via CLI</a></li>
</ul>
</li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html#summary">Summary</a></li>
</ul>
<p class="box-info">Explore our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Dedicated Palo Alto Section">dedicated Palo Alto section</a> to access a collection of high-quality technical articles.</p>
<h2><a id="downloading-pan-os">Downloading PAN-OS Software</a></h2>
<p style="text-align: justify;">Begin by downloading the needed software from the <a href="https://support.paloaltonetworks.com" target="_blank" rel="nofollow noopener" title="Palo Alto Networks support page">Palo Alto Networks support page</a>. Make sure you have a <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html" target="_blank" rel="nofollow" title="Palo Alto Support Contracts">valid support contract</a>.</p>
<p>Once logged in, select <strong>Updates</strong> on the <strong>left pane</strong>, followed by <strong>Software Updates</strong> from the <strong>right pane</strong>:</p>
]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Mon, 18 Dec 2023 09:25:52 +1100</pubDate>
		</item>
		<item>
			<title>Complete Guide: Configuring IPSec VPN between Palo Alto Firewall &amp; Meraki MX Security Appliance</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/palo-alto-firewalls/palo-alto-firewall-meraki-ipsec-vpn/palo-alto-meraki-ipsec-vpn.webp" alt="IPSec VPN - Palo Alto Firewall and Meraki MX" width="500" height="300" loading="lazy"></p><p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/palo-alto-firewall-meraki-ipsec-vpn/palo-alto-meraki-ipsec-vpn.webp" alt="configuring IPSec VPN between Palo Alto firewall and Meraki MX" width="300" height="198" style="margin: 7px; float: left;" title="network security engineer configuring firewalls" />This article will show you <strong>how to configure</strong> an <strong>IPSec VPN tunnel</strong> between a <strong>Palo Alto firewall</strong> (all PANOS versions) and <strong>Meraki MX security appliance</strong>. Our comprehensive guide includes <strong>IPSec VPN setup</strong> for <strong>static &amp; dynamic IP endpoints</strong>, <strong>Full tunnel VPN configuration</strong>, <strong>Split tunnel VPN configuration</strong>, special considerations for Full &amp; Split tunnel modes,&nbsp; <strong>IPSec Phase 1 - IKE gateway</strong> &amp; <strong>crypto policies</strong>, <strong>IPSec Phase 2</strong> – <strong>Tunnel encryption algorithms &amp; authentication</strong> plus more.</p>
<p>&nbsp;<strong>Key Topics:</strong></p>
<p><strong>Palo Alto Firewall Setup<br /></strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#create-tunnel-interface">Step 1 – Create a Tunnel Interface</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-ike-crypto-profile">Step 2 – Configure IKE Crypto Profile (IKEv1 - Phase 1)</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-ike-gateway">Step 3 – Configure IKE Gateway</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-ipsec-crypto-profile">Step 4 – Configure IPSec Crypto Profile – (IKE Phase 2)</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#create-ipsec-tunnel">Step 5 – Create IPSec Tunnel</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-vpn-routing">Step 6 – Configure VPN Routing (Remote Site Traffic)</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-security-policies">Step 7 – Configure Security Policies (IKE/IPSec &amp; Remote Site Traffic)</a></li>
</ul>
<p><strong>Meraki MX Security Appliance Setup<br /></strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#enable-site-to-site-vpn">Step 1 – Enable Site-to-Site VPN</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#enable-vpn-mode-for-local-networks">Step 2 – Enable VPN Mode for Local Networks</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-non-meraki-vpn-peer">Step 3 – Configure Non-Meraki VPN Peer, IKE Version, Auth ID, Subnets &amp; Preshared Secret</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#configure-ipsec-policies">Step 4 – Configure IPSec Policies (Phase 1 &amp; Phase 2)</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#split-tunnel-full-tunnel-mode">Step 5 – Split Tunnel and Full Tunnel Mode</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#initiate-test-vpn-tunnel">Step 6 - Initiate and Test the VPN Tunnel</a></li>
<li><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-meraki-mx-ipsec-vpn-setup.html#summary">Summary</a><span></span></li>
</ul>
<p style="text-align: justify;">This article assumes both<strong> Palo Alto firewall</strong> and <strong>Meraki MX</strong> are fully configured to allow local clients access to the internet. We’ll first begin with the configuration of the Palo Alto firewall and then work on the Meraki MX appliance.</p>
<p class="box-info" style="text-align: justify;">Visit our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Firewall section">Palo Alto Firewall section</a> for more articles covering <strong>Palo Alto technologies</strong>.</p>
<h2><a id="create-tunnel-interface">Step 1 – Create a Tunnel Interface</a></h2>
<p style="text-align: justify;">Under <strong>Network</strong>, select <strong>Interfaces</strong> then the <strong>Tunnel</strong> menu option. The firewall will now show all configured tunnel interfaces. The interface ‘<strong>tunnel’</strong>, as shown below, by default exists on all firewalls:</p>
]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Thu, 12 Oct 2023 19:42:27 +1100</pubDate>
		</item>
		<item>
			<title>Complete Guide to Upgrading Palo Alto Firewall PAN-OS &amp; Panorama. Prerequisites, Upgrade Paths, Config Backup, Application &amp; Threats Update &amp; More</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/how-to-upgrade-standalone-palo-alto-firewall-pan-os.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/how-to-upgrade-standalone-palo-alto-firewall-pan-os.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Upgrading</strong> your <strong>Palo Alto Firewall</strong> or <strong>Panorama Management System</strong> to the <strong>preferred PAN-OS release</strong> is always recommended as it ensures it remains <strong>stable</strong>, <strong>safe</strong> from known <strong>vulnerabilities and exploits</strong> but also allows you to take advantage of <strong>new features</strong>.</p>
<p style="text-align: justify;">This article will show you <strong>how to upgrade your standalone Firewall PAN-OS,</strong> explain the differences between a <strong>Base Image</strong> and a <strong>Maintenance Release Image</strong>. We’ll also explain the <strong>PAN-OS upgrade paths</strong>, show <strong>how to backup and export</strong> your <strong>configuration</strong>, deal with common PAN-OS install errors (<strong>upgrading requires greater content version</strong>). Finally, we will explain why <strong>newer PAN-OS</strong> releases might <strong>not be visible for download</strong> in your firewall’s software section.</p>
<p class="box-info" style="text-align: justify;">While the same process described below can be used to upgrade <strong>Panorama PAN-OS</strong>, it is important to ensure the Panorama PAN-OS version is <strong>equal</strong> or <strong>greater</strong> than the firewalls. When upgrading PAN-OS for both<strong> Panorama and Firewall appliances</strong>, always upgrade <strong>Panorama first</strong>.</p>
<p style="text-align: left;"><strong>Key Topics</strong>:</p>
<ul>
<li style="text-align: left;"><a href="https://www.firewall.cx/#prerequisites-for-pan-os" title="Prerequisites for PAN-OS Upgrades">Prerequisites for PAN-OS Upgrades</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#understanding-pan-os-upgrade-paths" title="Understanding PAN-OS Upgrade Paths">Understanding PAN-OS Upgrade Paths</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#backup-and-export-firewall-configuration" title="Backing Up &amp; Exporting Firewall Configuration">Backing Up &amp; Exporting Firewall Configuration</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#download-install-pan-os-software" title="Downloading &amp; Installing PAN-OS Software">Downloading &amp; Installing PAN-OS Software</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#common-install-errors" title="Dealing with Common Install Errors: Upgrading Requires Greater Content Version">Dealing with Common Install Errors: Upgrading Requires Greater Content Version</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#latest-pan-os-not-available" title="Why Aren’t the Latest PAN-OS Releases Available for Download?">Why Aren’t the Latest PAN-OS Releases Available for Download?</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#summary" title="Summary">Summary</a></li>
</ul>
<p class="box-note">Our article <a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html" target="_blank" title="How to Manually Download, Import &amp; Install PAN-OS on Palo Alto Firewalls via CLI &amp; Web GUI interface">How to Manually Download, Import &amp; Install PAN-OS on Palo Alto Firewalls via CLI &amp; Web GUI interface</a> provides detailed instructions and insights on PAN-OS upgrades for <strong>unlicensed</strong>/<strong>unregistered</strong> Palo Alto Firewalls .</p>
<h2 style="text-align: left;"><a name="prerequisites-for-pan-os">Prerequisites for PAN-OS Upgrades</a></h2>
<p style="text-align: justify;">It is important to note that <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html" target="_blank" title="How to register your Palo Alto Firewall for Support and Updates"><strong>only eligible Palo Alto customers</strong></a>, that is, those with an active contract, can receive updates for their firewalls. Our article <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html" target="_blank" title="How to Register and Activate Palo Alto Support, Subscription Servers, and Licenses">How to Register and Activate Palo Alto Support, Subscription Servers, and Licenses</a> covers this process in great detail.</p>
<h2 style="text-align: left;"><a name="understanding-pan-os-upgrade-paths">Understanding PAN-OS Upgrade Paths</a></h2>
<p style="text-align: justify;">Direct (one-step) upgrade to the latest PAN-OS depends on the current version your firewall is running. When upgrading from a fairly old to a newer PAN-OS version, multi-step upgrades might be necessary. This ensures the device’s configuration is migrated to the PAN-OS's newer supported features and that nothing “breaks” during the upgrade process.</p>
<p style="text-align: justify;">Like most vendors, Palo Alto Networks produce a <strong>base image</strong> and <strong>maintenance releases. Maintenance releases</strong> are small upgrades of the <strong>base image</strong> and deal with <strong>bug fixes</strong> and sometimes introduce small enhancements.</p>
<p style="text-align: justify;">As a rule of thumb, firewalls should be running the Palo Alto <a href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank" rel="nofollow noopener" title="preferred PAN-OS release">preferred PAN-OS release</a> (requires account login), and it is generally a good practice to install these releases as they are published.</p>
<p style="text-align: justify;">When upgrading your PAN-OS to the <strong>latest maintenance release</strong> of a <strong>newer base release</strong>, the firewall <strong>will likely require</strong> you to <strong>download the new base release</strong> before allowing you to install its <strong>latest maintenance release</strong>.</p>
<p style="text-align: justify;">For example, our firewall is currently running version <strong>9.0.3-h3</strong>, noted by the ‘<strong>tick</strong>’ on the <strong>Currently Installed</strong> column, and our goal is to upgrade to version <strong>9.1.4 (preferred release)</strong> as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/pan-os-upgrade-path.png" alt="Palo Alto PAN-OS upgrade path" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto PAN-OS upgrade path" /></p>
<p style="text-align: justify;">When attempting to <strong>download version 9.1.4</strong>, a<strong> maintenance release for base 9.1.0</strong>, we received an error (see screenshot below) explaining that we need to <strong>download</strong> <strong>9.1.0 base image</strong> first (no installation required). Once downloaded, we can proceed with the <strong>download and installation</strong> of <strong>version 9.1.4</strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-upgrading-requires-greater-content-version.png" alt="palo alto firewall upgrading requires greater content version" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall upgrading requires greater content version" /></p>
<h2 style="text-align: left;"><a name="backup-and-export-firewall-configuration">Backing Up &amp; Exporting Firewall Configuration</a></h2>
<p style="text-align: justify;">It is imperative to backup and export the configuration before attempting to upgrade. To create a backup go to <strong>Devices &gt; Setup,</strong> then select the <strong>Operations</strong> (3) tab and <strong>Save named configuration snapshot</strong> (4):</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/backup-current-palo-alto-firewall-configuration.png" alt="backup current palo alto firewall configuration" style="display: block; margin-left: auto; margin-right: auto;" title="backup current palo alto firewall configuration" /></p>
<p style="text-align: justify;">Once the backup is complete, it is highly recommend to export the configuration by selecting <strong>Export named configuration snapshot</strong> (5) and saving it in a safe place.</p>
<h2 style="text-align: left;"><a name="download-install-pan-os-software">Downloading &amp; Installing PAN-OS Software</a></h2>
<p style="text-align: justify;">We will be upgrading our firewall from <strong>PAN-OS 9.0.3-h3</strong> to <strong>9.1.4</strong>. As explained previously, for this process, we will <strong>download base 9.1.0</strong> and then <strong>download &amp; install maintenance release 9.1.4</strong>.</p>
<p style="text-align: justify;">Newer PAN-OS versions can be downloaded directly from the firewall GUI (recommended). Alternatively, they can be downloaded from <a href="https://support.paloaltonetworks.com/" target="_blank" rel="nofollow noopener" title="https://support.paloaltonetworks.com"><strong>https://support.paloaltonetworks.com&nbsp;</strong>&nbsp;</a>and then upload it manually.</p>
<p style="text-align: justify;">From the GUI, go to <strong>Device &gt; Software</strong>, then <strong>click</strong> on <strong>Check Now</strong> (3) to update the software list. When complete, <strong>click</strong> on <strong>Download</strong> (4) for <strong>base image 9.1.0</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/download-install-pan-os-on-palo-firewall.png" alt="download install pan-os on palo alto firewall" style="display: block; margin-left: auto; margin-right: auto;" title="download install pan-os on palo alto firewall" /></p>
<p style="text-align: justify;">When complete, <strong>click</strong> on <strong>Download</strong> (5) on <strong>version 9.1.4</strong>, then <strong>install </strong>(option will be available once the image has downloaded). During the installation a progress bar will be displayed:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-installing-pan-os-software.png" alt="palo alto firewall installing pan-os software" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall installing pan-os software" /></p>
<p style="text-align: left;">As soon as the installation process is complete, the firewall will ask to reboot:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-reboot-after-pan-os-installation.png" alt="palo alto firewall reboot after pan-os installation" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall reboot after pan-os installation" /></p>
<h2 style="text-align: left;"><a name="common-install-errors">Dealing with Common Install Errors: Upgrading Requires Greater Content Version</a></h2>
<p style="text-align: justify;">A common error users are faced with when attempting to install a newer PAN-OS is the “<strong>Error: Upgrading from xxx to xxx requires a content version 8226 or greater and found 8165-5521</strong>” error as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-upgrading-requires-greater-content-version.png" alt="palo alto firewall upgrade requires greater content version" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall upgrade requires greater content version" /></p>
<p style="text-align: justify;">This error is related to the <strong>Applications and Threats version</strong> the firewall is currently running which is most likely outdated.&nbsp;</p>
<p style="text-align: justify;">To fix this, go to <strong>Device &gt; Dynamic Updates</strong> and <strong>click</strong> on the <strong>Check Now</strong> (3) button as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-upgrading-applications-threats-version.png" alt="palo alto firewall upgrading applications threats version" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall upgrading applications threats version" /></p>
<p style="text-align: justify;">Next, <strong>download</strong> (5) the latest version of <strong>Applications and Threats</strong>. Once the download is complete, the <strong>install option</strong> will become available. Proceed with the installation of the newly downloaded <strong>Applications and Threats version</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-installing-applications-and-threats.png" alt="palo alto firewall installing applications and threats" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall installing applications and threats" /></p>
<p style="text-align: justify;">Another common error is the <strong>Image File Authentication Error – Failed to Load into Software Manager</strong> error. This is covered in detail in our article <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-fix-palo-alto-firewall-image-file-authentication-error.html" target="_blank" title="Image File Authentication Error">How to Fix Palo Alto Firewall “Error: Image File Authentication Error”</a>.</p>
<h2 style="text-align: left;"><a name="latest-pan-os-not-available">Why Aren’t the Latest PAN-OS Releases Available for Download?</a></h2>
<p style="text-align: justify;">Palo Alto Networks continuously publish new PAN-OS releases; however, they might not be available/visible on your firewall if they are not compatible with the version your firewall is currently running.</p>
<p style="text-align: justify;">At the time of writing, <strong>PAN-OS 10.0</strong> was available however if you take a close look at the available software, you notice that it is not listed:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/palo-firewall-check-for-new-pan-os.png" alt="palo alto firewall check for new pan-os" style="display: block; margin-left: auto; margin-right: auto;" title="palo alto firewall check for new pan-os" /></p>
<p style="text-align: justify;"><strong>After upgrading</strong> to <strong>version 9.1.4 </strong>we went back and <strong>clicked</strong> the <strong>Check Now</strong> button. <strong>PAN-OS 10</strong> was available to download and install:</p>
<p style="text-align: left;">&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/firewall-pan-os-upgrade-standalone/pan-os-new-images-after-upgrade.png" alt="pan-os new images after upgrade" style="display: block; margin-left: auto; margin-right: auto;" title="pan-os new images after upgrade" /></p>
<h2 style="text-align: left;"><a name="summary">Summary</a></h2>
<p style="text-align: justify;">This article showed <strong>how to upgrade a standalone Palo Alto Firewall PAN-OS</strong>, it explained the <strong>different PAN-OS images</strong> (<strong>Base Image</strong>, <strong>Maintenance Release</strong>) and <strong>PAN-OS upgrade paths</strong> depending on your current PAN-OS. We also saw <strong>how to download and install the PAN-OS software</strong>, <strong>common installation errors</strong> (requires greater content version error) and finally explained <strong>why latest PAN-OS releases</strong> are <strong>not made available in your firewall’s software download section</strong>.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Tue, 27 Oct 2020 13:36:58 +1100</pubDate>
		</item>
		<item>
			<title>How to Fix Palo Alto Firewall “Error: Image File Authentication Error – Failed to Load Into Software Manager” error during PAN-OS Software Download</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/how-to-fix-palo-alto-firewall-image-file-authentication-error.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/how-to-fix-palo-alto-firewall-image-file-authentication-error.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-software-upgrade-error.jpg" alt="palo alto firewall software upgrade error" width="250" height="146" style="margin: 7px; float: left;" title="palo alto firewall software upgrade error" />Keeping your <strong>Palo Alto Firewall</strong> up to date with the <strong>latest PAN-OS software updates</strong> is an important step to ensure your organization is protected against the <strong>PAN-OS latest software vulnerabilities, software bugs </strong>but at the same time take advantage of Palo Alto’s latest <strong>security enhancements</strong> and <strong>capabilities</strong>.</p>
<p style="text-align: justify;">While <strong>Palo Alto Networks</strong> makes the <strong>software upgrade process</strong> an easy task, sometimes problems can occur. One frequently seen issue is the “<strong>Error: Image File Authentication Error – Failed to Load into Software Manager</strong>” error when trying to <strong>download a new software image</strong>.</p>
<p>Readers and also refer to our articles <a href="https://www.firewall.cx/security/palo-alto-networks/manually-download-import-install-pan-os-on-palo-alto-firewalls.html" target="_blank" title="How to Manually Download, Import &amp; Install PAN-OS on Palo Alto Firewalls via CLI &amp; Web GUI interface">How to Manually Download, Import &amp; Install PAN-OS on Palo Alto Firewalls via CLI &amp; Web GUI interface</a> and <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-upgrade-standalone-palo-alto-firewall-pan-os.html" target="_blank" title="Complete Guide to Upgrading Palo Alto Firewall PAN-OS &amp; Panorama. Prerequisites, Upgrade Paths, Config Backup, Application &amp; Threats Update &amp; More">Complete Guide to Upgrading Palo Alto Firewall PAN-OS &amp; Panorama. Prerequisites, Upgrade Paths, Config Backup, Application &amp; Threats Update &amp; More</a> for more technical insights and advice on PAN-OS upgrades.</p>
<p>This error can occur on a <strong>standalone </strong>or <strong>HA-Pair</strong> Firewall configuration:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-image-file-authentication-error.png" alt="palo alto firewall image file authentication error" style="margin: auto; display: block;" title="palo alto firewall image file authentication error" /></p>
<p class="box-info" style="text-align: left;">Additional technical articles are available in our&nbsp;<a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Firewall Section">Palo Alto Firewall Section</a>.</p>
<h2 style="text-align: left;">How To Fix The 'Image File Authentication Error'</h2>
<p style="text-align: justify;">To fix this problem, simply <strong>click</strong> the <strong>Check Now</strong> link at the bottom left corner. This will force the Palo Alto Firewall to connect to the <strong>update server</strong> and refresh the list of available software images:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-check-new-software.png" alt="palo alto firewall checking for new software" style="margin: auto; display: block;" title="palo alto firewall checking for new software" /></p>
<p style="text-align: left;">&nbsp;As soon as the above <strong>refresh process is complete</strong>, you can proceed to download the desired software image:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-new-software-image-downloading.png" alt="palo alto firewall download new software PAN-OS image" style="margin: auto; display: block;" title="palo alto firewall download new software PAN-OS image" /></p>
<p style="text-align: justify;">The screenshot below confirms the selected image has been downloaded <strong>and loaded into software manager</strong>, ready to be installed:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-new-software-image-downloaded.png" alt="palo alto firewall new PAN-OS software image downloaded" style="margin: auto; display: block;" title="palo alto firewall new PAN-OS software image downloaded" /></p>
<h2 style="text-align: left;">More Information About The Error</h2>
<p style="text-align: justify;">The “<strong>Error: Image File Authentication Error – Failed to Load into Software Manager</strong>” error is encountered after initiating the download of any image from within the <strong>Software</strong> area:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-download-software.png" alt="palo alto firewall - initiate software download" style="margin: auto; display: block;" title="palo alto firewall - initiate software download" /></p>
<p style="text-align: justify;">As soon as the user initiates the download process, the Firewall will begin downloading the selected <strong>PAN-OS version. </strong>Once the download is complete the progress bar reaches the <strong>99%</strong> mark and will pause for a significant time as shown below:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/fix-image-file-auth-error/palo-alto-firewall-download-software-in-progress.png" alt="palo alto firewall PAN-OS software download in progress" style="margin: auto; display: block;" title="palo alto firewall PAN-OS software download in progress" /></p>
<p style="text-align: left;">During this process, a closer look at the firewall logs via SSH shows the following error is produced:</p>
<div class="box-content" style="text-align: justify;">admin @ PA-850-Firewall.cx-Primary(active)&gt; <strong><strong>tail follow yes mp-log ms.log</strong></strong><br /><br />
<div style="text-align: left;">2019-10-05 17:02:52.534 +1000 client dagger reported op command was SUCCESSFUL</div>
<div style="text-align: left;">2019-10-05 17:02:55.946 +1000 get_sw_ver_info file: /opt/pancfg/mgmt/global/upgradeinfo.xml</div>
<div style="text-align: left;">2019-10-05 17:02:55.967 +1000 get_sw_ver_info file: /opt/pancfg/mgmt/global/uploadinfo.xml</div>
<div style="text-align: left;"><strong>2019-10-05 17:02:55.968 +1000 No upload information available </strong></div>
<div style="text-align: left;"><strong>sh: line 1: /tmp/pan/downloadprogress.12337: No such file or directory</strong></div>
<div style="text-align: left;">'cfg.fail-conn-on-cert': NO_MATCHES</div>
</div>
<p style="text-align: justify;">The linux <strong>tail</strong> command will continuously update the <strong>ms.log</strong> file entries so you can observe in real-time all entries within the log file.</p>
<p style="text-align: justify;">The log output seems to imply that there is a missing file or some type of information is not available. This issue is fixed as soon as the firewall is forced to check for new updates.</p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;">This article explains how to resolve the “<strong>Error: Image File Authentication Error – Failed to Load into Software Manager</strong>” error encountered when trying to <strong>download a new firewall software image</strong>. We showed the error produced by the firewall and <strong>how to fix</strong> this by forcing the firewall to <strong>Check</strong> for new software updates. We also dived into the <strong>mp-log ms.log </strong>log file and examined the messages produced there during the error.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Wed, 09 Oct 2019 23:04:52 +1100</pubDate>
		</item>
		<item>
			<title>How to Register a Palo Alto Firewall and Activate Support, Subscription Services &amp; Licenses. Covers All Models. </title>
			<link>https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-networks-logo.png" alt="palo alto networks logo" style="margin: 7px; float: left;" title="palo alto networks logo" />This article explains how to <strong>register</strong> and <strong>activate</strong> your <strong>Palo Alto Firewall Appliance</strong> to obtain <strong>technical support</strong>, <strong>RMA hardware replacement</strong>, <strong>product updates</strong>, <strong>antivirus updates</strong>, <strong>wildfire</strong>, <strong>antispam updates</strong>, <strong>Threat Prevention</strong>, <strong>URL Filtering</strong>, <strong>Global Protect</strong> and more. The article covers all Palo Alto Firewalls including: <strong>PA-220</strong>, <strong>PA-820</strong>, <strong>PA-850</strong>, <strong>PA-3220</strong>, <strong>PA-3250</strong>, <strong>PA-3260</strong>, <strong>PA-5220</strong>, <strong>PA-5250</strong>, <strong>PA-5260</strong>, <strong>PA-5280</strong>, <strong>PA-7050</strong>, <strong>PA-7080</strong> and all <strong>VM Series</strong>.</p>
<p style="text-align: justify;">Customers purchasing a new <strong>Palo Alto Firewall </strong>appliance or <strong>support contract</strong> will receive an <strong>authorization code</strong> which is required to <strong>activate</strong> their <strong>technical support, license and service subscriptions</strong> – this, plus lots more useful information is included below.</p>
<p style="text-align: justify;"><strong>Key Topics</strong>:</p>
<ul style="text-align: justify;">
<li><a href="https://www.firewall.cx/#benefits-of-a-support-account-firewall-registration-and-license-activation" target="_self" title="Benefits of a Support Account, Firewall Registering and License Activation">Benefits of a Support Account, Firewall Registering and License Activation</a></li>
<li><a href="https://www.firewall.cx/#creating-a-palo-alto-support-account-new-customers" target="_self" title="Creating a Palo Alto Support Account -- New Customers">Creating a Palo Alto Support Account – New Customers</a></li>
<li><a href="https://www.firewall.cx/#registering-a-palo-alto-device-new-and-existing-customers" target="_self" title="Registering a Palo Alto Device -- New &amp; Existing Customers">Registering a Palo Alto Device – New &amp; Existing Customers</a></li>
<li><a href="https://www.firewall.cx/#activating-palo-alto-support-and-subscription-license" target="_self" title="Activating Palo Alto Support and Subscription License">Activating Palo Alto Support and Subscription License</a></li>
<li><a href="https://www.firewall.cx/#summary" target="_self" title="Summary">Summary</a></li>
</ul>
<p class="box-info">Additional technical articles are available in our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks - Firewall Section">Palo Alto Firewall Section</a></p>
<p style="text-align: justify;">The diagram below shows the steps new customers should follow to successfully register and activate their Palo Alto products:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-license-registration-diagram.png" alt="palo alto license registration diagram" style="margin: 7px auto; display: block;" title="palo alto license registration diagram" /></p>
<h2 style="text-align: left;"><a name="benefits-of-a-support-account-firewall-registration-and-license-activation">Benefits of a Support Account, Firewall Registration and License Activation</a></h2>
<p style="text-align: justify;">Registering your security appliance has many benefits, especially when you consider that any unpatched or outdated security appliance is unable to provide adequate protection against today’s complex and intelligent security threats. Furthermore by registering your appliance you are protecting your investment as you become a ‘known’ customer to Palo Alto allowing you to engage the vendor and benefit from the wide range of services offered.</p>
<p style="text-align: justify;">By creating a <strong>Support Account</strong>, <strong>registering</strong> your <strong>Firewall</strong> appliance and <strong>activating</strong> your <strong>License</strong> you’ll be able to perform the following:</p>
<ul class="check">
<li>Register and manage your firewall appliances(s). Palo Alto call these “<strong>Assets</strong>”</li>
<li>Create and manage support cases</li>
<li>Create and manage users from your organization</li>
<li>Give members of your team access to Palo Alto support services</li>
<li>Gain access to a variety of tools found in the support portal</li>
<li>Obtain knowledge and answers to questions</li>
<li>Obtain access to the Palo Alto live community</li>
<li>Download PAN-OS (Palo Alto Operating System) software updates for your device</li>
<li>Download Antivirus updates</li>
<li>Download Antispam updates</li>
<li>Download Threat protection updates</li>
<li>Update App-ID Database on your device</li>
<li>Ensure the URL Filtering engine is up to date</li>
<li>Gain access to Wildfire which allows the firewall to safely ‘detonate’ suspicious files in the cloud</li>
</ul>
<p style="text-align: justify;">The above list is indicative and shows the variety of services offered to <strong>registered Palo Alto customers</strong> with an <strong>active subscription service</strong>.</p>
<h2 style="text-align: left;"><a name="creating-a-palo-alto-support-account-new-customers">Creating a Palo Alto Support Account - New Customers</a></h2>
<p style="text-align: justify;">Registering your account is a simple process that only takes a few minutes. During the registration process you’ll be able to <strong>register your Palo Alto Firewall</strong> appliance and later <strong>activate your support and subscription license</strong>. To begin, visit the <strong>Palo Alto Support page</strong> <a href="https://support.paloaltonetworks.com/" target="_blank" rel="nofollow noopener" title="https://support.paloaltonetworks.com/">https://support.paloaltonetworks.com/</a> and <strong>click</strong> on the <strong>Sign In</strong> link at the top right corner of the page:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-customer-support-portal.png" alt="palo alto networks customer support portal" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks customer support portal" /></p>
<p style="text-align: justify;">On the next screen, enter a <strong>valid email address</strong>, verify you’re human (reCAPTCHA) and finally <strong>click</strong> on the <strong>Submit</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-create-a-new-support-account.png" alt="palo alto networks - creating a new support account" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks - creating a new support account" /></p>
<p style="text-align: justify;">On the next page select to <strong>register your device</strong> using its <strong>Serial Number</strong> or <strong>Authorization Code</strong> or alternatively you can register a <strong>VM-Series</strong> model purchased from the <strong>public cloud marketplace</strong> or a <strong>Could Security Provider</strong> (CSSP). In our example, we’ll be selecting the first option. When ready, <strong>click</strong> on the <strong>Submit</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-create-a-new-support-account-device-registration.png" alt="palo alto create a new support account device registration" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto create a new support account device registration" /></p>
<p style="text-align: justify;">Next, enter all required details to create the new account. Towards the end of the page you can enter the <strong>Device Serial Number</strong> or <strong>Auth Code</strong>. We selected to insert the <strong>device serial number</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-new-user-registration-final-screen.png" alt="palo alto new user registration final screen" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto new user registration final screen" /></p>
<p style="text-align: justify;">The <strong>Auth Code</strong> is an <strong>8-digit code</strong> which is emailed to the customer (PDF file) as soon as the physical appliance is shipped from Palo Alto Networks. This means that under most circumstances the <strong>Auth Code</strong> is received <strong>before</strong> the physical appliance.</p>
<p style="text-align: justify;">When filling in your details keep in mind that it is important to ensure the address entered is correct as it will be used for any future RMA process.</p>
<p class="box-info" style="text-align: justify;">It is highly advisable to subscribe to all mailing lists to ensure you receive updates and security advisory notifications.</p>
<p style="text-align: justify;">Once the registration process is complete, you can proceed <strong>activating</strong> the <strong>support and software licenses</strong>.</p>
<h2 style="text-align: left;"><a name="registering-a-palo-alto-device-new-and-existing-customers">Registering a Palo Alto Device – New &amp; Existing Customers</a></h2>
<p style="text-align: justify;">Existing customers with support contracts need to follow a similar process outline below in order to <strong>register</strong> their new <strong>Palo Alto device</strong> and <strong>activate the subscription services</strong> purchased.</p>
<p style="text-align: justify;">To begin, visit the <strong>Palo Alto Support page</strong> <a href="https://support.paloaltonetworks.com/" target="_blank" rel="nofollow noopener" title="https://support.paloaltonetworks.com/">https://support.paloaltonetworks.com/</a> and <strong>click</strong> on the <strong>Sign In</strong> link at the top right corner of the page. On the next page, <strong>click</strong> on the <strong>Go to portal</strong> button:</p>
<p style="text-align: justify;"><em><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-customer-support-portal.png" alt="palo alto networks - customer support portal" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks - customer support portal" /></em></p>
<p style="text-align: justify;">Next, enter your <strong>Email Address</strong> and <strong>Password</strong> to complete the login process.</p>
<p style="text-align: justify;">Once done, you’ll be presented with the main <strong>Customer Support</strong> page where you’ll find important alerts regarding the support portal and see a summary of your recent activity as shown in the below screenshot. Now <strong>click</strong> on the <strong>Register a Device</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-networks-register-a-device-for-existing-customers.png" alt="palo alto networks register a device for existing customers" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks register a device for existing customers" /></p>
<p style="text-align: justify;">On the next page select the <strong>Device Type</strong>. Select the correct <strong>Device Type</strong>. We selected <strong>Register device using Serial Number or Authorization Code</strong> to register our firewall appliance. When ready, <strong>click</strong> on the <strong>Next</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-existing-customers-firewall-device-registration.png" alt="palo alto networks - existing customers firewall device registration" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks - existing customers firewall device registration" /></p>
<p style="text-align: justify;">Now provide the device <strong>Serial Number</strong>, <strong>Device Name</strong> (provide a meaningful name to help distinguish this device from other devices) and <strong>Location information</strong> for RMA purposes. We can tick the <strong>Device will be used offline</strong> option if the device is to be used in an isolated environment with no internet access.</p>
<p style="text-align: justify;">When ready <strong>click</strong> on the <strong>Agree and Submit</strong> button at the bottom right of the page (not shown):</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-existing-customers-firewall-registration-device-information.png" alt="palo alto networks - existing customers firewall registration device information" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="palo alto networks - existing customers firewall registration device information" /></p>
<p style="text-align: justify;">After a few seconds the support portal will confirm our Palo Alto Firewall was successfully registered and provide the <strong>highly recommended</strong> option of <strong>Run Day 1 Configuration</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-existing-customers-firewall-device-registration-successful.png" alt="palo alto networks - existing customers firewall device registration successful" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks - existing customers firewall device registration successful" /></p>
<p style="text-align: justify;">The optional <strong>Day 1 Configuration</strong> step can be run by <strong>clicking</strong> on the <strong>Run Day 1 Configuration</strong> button. If you decide to skip this step you can find this option from the <strong>main support page</strong>, under the <strong>Tools section</strong> as shown in the screenshot below:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-run-day-1-configuration-option.png" alt="palo alto run day 1 configuration option" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="palo alto networks - run day 1 configuration option" /></p>
<p style="text-align: justify;">When selecting <strong>Run Day 1 Configuration</strong>, you need to provide some basic information about your firewall such as <strong>Hostname</strong>, <strong>Management IP address</strong>, <strong>PAN-OS version</strong>, <strong>DNS Servers</strong> etc. This information is then used to generate an initial firewall <strong>configuration file</strong> (<strong>xml file</strong>) based on <strong>Palo Alto Networks Best Practices</strong>.</p>
<p style="text-align: justify;">You can then download the file and upload it to the firewall appliance using it as a base configuration.</p>
<p style="text-align: justify;">The <strong>Run Day 1 Configuration</strong> option is a great start for people with limited experience on Palo Alto Firewalls but is also a good practice to follow for any newly deployed Firewalls and therefore highly recommended.</p>
<p class="box-warning">The <strong>Run Day 1 Configuration</strong> tool is designed for new (unconfigured) firewalls! Applying to a production device will clear its configuration!</p>
<h2 style="text-align: left;"><a name="activating-palo-alto-support-and-subscription-license">Activating Palo Alto Support and Subscription License</a></h2>
<p style="text-align: justify;">Once the Firewall registration process is complete, the final step is to <strong>activate</strong> your <strong>license</strong>. When this process is complete, the Firewall appliance will be <strong>covered under warranty replacement</strong>, be able to <strong>download software PAN-OS updates</strong> and depending on the subscriptions purchased, have access to <strong>Wildfire</strong>, <strong>URL filtering</strong>, <strong>Antispyware</strong>, <strong>Threat Intelligence</strong> updates and more.</p>
<p class="box-info" style="text-align: left;">To activate licenses, your Palo Alto user account must be assigned the <strong>ELA Administrator role</strong>. You can add this role under <strong>Members &gt; Manage Users</strong></p>
<p style="text-align: justify;">To begin, from the <strong>Support Home</strong> page navigate to <strong>Assets &gt; Devices</strong>. Here you’ll see a list of all currently registered devices. Locate the device for which the license needs to be activated and <strong>click</strong> on the <strong>pencil icon</strong> under the <strong>Actions</strong> column:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-activate-support-and-subscription-services-1.png" alt="palo alto networks - activate support and subscription services - step 1" style="margin: 7px auto; display: block;" title="palo alto networks - activate support and subscription services - step 1" /></p>
<p style="text-align: justify;">On the next page select <strong>Activate Auth-Code</strong> under the <strong>Activate Licenses</strong> section and insert the <strong>Authorization Code</strong>. Now <strong>click</strong> on the <strong>Agree and Submit</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-activate-support-and-subscription-services-2.png" alt="palo alto networks - activate support and subscription services - step 2" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks - activate support and subscription services - step 2" /></p>
<p style="text-align: justify;">Once the <strong>activation process</strong> is complete a <strong>green bar</strong> will briefly appear confirming the <strong>license was successfully activated</strong>. Notice how the page has been updated to include the <strong>features activated</strong> along with their <strong>Expiration Date</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls/register-activate-firewall/palo-alto-activate-support-and-subscription-services-3.png" alt="palo alto networks - activate support and subscription services - step 3" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="palo alto networks - activate support and subscription services - step 3" /></p>
<p style="text-align: justify;">If you have multiple <strong>service (or feature) licenses purchased</strong> for your product, for example <strong>Threat Prevention License</strong>, <strong>WildFire License</strong>, <strong>Support</strong> etc, insert the <strong>Authorization Code</strong> for one service and<strong> click</strong> on the <strong>Agree and Submit</strong> button. Repeat the process until all services/features are activated.</p>
<p style="text-align: justify;">This completes the <strong>Palo Alto License Activation process. </strong>You should now have all licenses/features fully registered and able to obtain technical support for your device(s).</p>
<h2 style="text-align: left;"><a name="summary">Summary</a></h2>
<p style="text-align: justify;">In this article we outlined the benefits of <strong>registering</strong> your <strong>Palo Alto security device</strong>. We explained in detail <strong>how to create a Palo Alto support account</strong>, <strong>register</strong> your <strong>Palo Alto Firewall</strong> and how to <strong>activate</strong> your <strong>Palo Alto License &amp; Subscription services</strong> in order to obtain <strong>technical support</strong>, <strong>RMA hardware replacement</strong>, <strong>product updates</strong>, <strong>antivirus updates</strong>, <strong>wildfire</strong>, <strong>antispam updates</strong>, <strong>Threat Prevention</strong>, <strong>URL Filtering</strong>, <strong>Global Protect</strong> and more.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Sun, 04 Aug 2019 00:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Palo Alto Firewall Configuration Options. Tap Mode, Virtual Wire, Layer 2 &amp; Layer 3 Deployment modes</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-deployment-modes.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-deployment-modes.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Our <a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-security-zones-creation-and-configuration.html" target="_blank" title="Palo Alto Firewalls make use of Security Zones">previous article</a> explained how <a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-security-zones-creation-and-configuration.html" target="_blank" title="Palo Alto Firewalls make use of Security Zones">Palo Alto Firewalls make use of Security Zones</a> to process and <strong>enforce security policies</strong>. This article will explain the different <strong>configuration options</strong> for <strong>physical Ethernet</strong> and <strong>logical interfaces</strong> available on the Palo Alto Firewall.</p>
<p style="text-align: justify;">It’s easy to mix and match the interface types and deployment options in real world deployments and this seems to be the strongest selling point of Palo Alto Networks Next-Generation Firewalls. Network segmentation becomes easier due to the flexibility offered by a single pair of Palo Alto appliances.</p>
<p style="text-align: justify;">Below is a list of the configuration options available for Ethernet (physical) interfaces:</p>
<ul class="check" style="text-align: justify;">
<li><strong>Tap Mode</strong></li>
<li><strong>Virtual Wire</strong></li>
<li><strong>Layer 2</strong></li>
<li><strong>Layer 3</strong></li>
<li><strong>Aggregate Interfaces</strong></li>
<li><strong>HA</strong></li>
</ul>
<p>Following are the Logical interface options available:</p>
<ul class="check">
<li><strong>VLAN</strong></li>
<li><strong>Loopback</strong></li>
<li><strong>Tunnel</strong></li>
<li><strong>Decrypt Mirror</strong></li>
</ul>
<p style="text-align: justify;">The various interface types offered by Palo Alto Networks Next-Generation Firewalls provide flexible deployment options.</p>
<h2 style="text-align: left;">Tap Mode Deployment Option</h2>
<p style="text-align: justify;"><strong>TAP Mode deployment</strong> allows passive monitoring of the traffic flow across a network by using the SPAN feature (also known as mirroring).</p>
<p style="text-align: justify;">A typical deployment would involve the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html" target="_blank" title="configuration of SPAN on Cisco Catalyst switches">configuration of SPAN on Cisco Catalyst switches</a> where the destination SPAN port is the switch port to which our Palo Alto Firewall connects, as shown in the diagram below:</p>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-deployment-modes-1.png" alt="Palo Alto Next Generation Firewall deployed in TAP mode" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Next Generation Firewall deployed in TAP mode" /></p>
<p style="text-align: center;">Figure 1. Palo Alto Next Generation Firewall deployed in TAP mode</p>
<p style="text-align: justify;">The advantage of this deployment model is that it allows organizations to closely monitor traffic to their servers or network without requiring any changes to the network infrastructure.</p>
<p style="text-align: justify;">During the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html" target="_blank" title="configuration of SPAN">configuration of SPAN</a> it is important to ensure the correct <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html" target="_blank" title="SPAN source">SPAN source</a> and <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html" target="_blank" title="SPAN Destination ports">SPAN Destination ports</a> are configured while also <strong>enabling Tap mode</strong> at the Firewall.</p>
<p style="text-align: justify;"><strong>Tap mode</strong> offers visibility of application, user and content, however, we must be mindful that the firewall is unable to control the traffic as no security rules can be applied in this mode. Tap mode simply offers visibility in the ACC tab of the dashboard. The catch here is to ensure that the tap interface is assigned to a security zone.</p>
<h2 style="text-align: left;">Virtual Wire&nbsp; (V-Wire) Deployment Option</h2>
<p style="text-align: justify;"><strong>Virtual Wire</strong>, also know as <strong>V-Wire</strong>, deployment options use <strong>Virtual Wire interfaces</strong>. The great thing about <strong>V-Wire deployment</strong> is that the firewall can be inserted into an existing topology without requiring any changes to the existing network topology.</p>
<p style="text-align: justify;">The <strong>V-Wire deployment options</strong> overcome the limitations of <strong>TAP mode deployment</strong>, as engineers are able to monitor and control traffic traversing the link. A <strong>Virtual Wire interface</strong> supports <strong>App-ID</strong>, <strong>User-ID</strong>, <strong>Content-ID</strong>, <strong>NAT</strong> and <strong>decryption</strong>.</p>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-deployment-modes-2.png" alt="Palo Alto Next Generation Firewall deployed in V-Wire mode" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Next Generation Firewall deployed in V-Wire mode" /></p>
<p style="text-align: center;">Figure 2. Palo Alto Next Generation Firewall deployed in V-Wire mode</p>
<h2 style="text-align: left;">Layer 2 Deployment Option</h2>
<p style="text-align: justify;">Palo Alto Networks Next Generation Firewall can also be deployed in <strong>Layer 2 mode</strong>. In this mode switching is performed between two or more network segments as shown in the diagram below:</p>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-deployment-modes-3.png" alt="Palo Alto Next Generation Firewall deployed in Layer 2 mode" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Next Generation Firewall deployed in Layer 2 mode" /></p>
<p style="text-align: center;" align="center">Figure 3. Palo Alto Next Generation Firewall deployed in Layer 2 mode</p>
<p style="text-align: justify;">In <strong>Layer 2 deployment mode</strong> the firewall is configured to perform switching between two or more network segments. Traffic traversing the firewall is examined, as per policies, providing increased security and visibility within the internal network.</p>
<p style="text-align: justify;">In this mode the firewall interfaces are capable of supporting <a href="https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html" target="_blank" title="Access or Trunk Links">Access or Trunk Links</a> (<a href="https://www.firewall.cx/networking/vlan-networks/vlan-8021q-analysis.html" target="_blank" title="802.1Q trunking">802.1Q trunking</a>) and do not participate in the <a href="https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol.html" target="_blank" title="Spanning Tree Protocol - topology">Spanning Tree topology</a>. Any <a href="https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol/spanning-tree-protocol-fundamentals.html" target="_blank" title="BPDUs - Bridge Protocol Data Unit">BPDUs</a> received on the firewall interfaces are directly forwarded to the neighboring Layer 2 switch without being processed. Routing traffic between VLAN networks or other networks can be achieved via a default Gateway which is usually a Layer 3 switch supporting <a href="https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html" target="_blank" title="InterVLAN routing">InterVLAN routing</a>, a Firewall security appliance, or even <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-8021q-router-stick.html" target="_blank" title="Router on a Stick">Router-on-a-Stick</a> design.</p>
<h2 style="text-align: left;">Layer 3 Deployment Option</h2>
<p style="text-align: justify;"><strong>Layer 3 deployment mode</strong> is a popular deployment setup. In this mode the firewall routes traffic between multiple interfaces, each of which is configured with an IP address and security zone. The Firewall interfaces can also be configured to obtain their IP address via a DHCP server and can be used to manage the security appliance.</p>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-deployment-modes-4.png" alt="Palo Alto Next Generation Firewall deployed in Layer 3 mode" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Next Generation Firewall deployed in Layer 3 mode" /></p>
<p style="text-align: center;">Figure 4 – Palo Alto Next Generation Firewall deployed in Layer 3 mode</p>
<p style="text-align: justify;">The diagram above shows a typical Layer 3 deployment setup where the Firewall routes and controls traffic between three different IP networks. Similar to other setup methods, all traffic traversing the Firewall is examined and allowed or blocked according to the security policies configured.</p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;">In this article we examined a few of the different deployment modes available for Palo Alto firewalls. We talked about <strong>Tap mode</strong>, <strong>Virtual Wire mode</strong>, <strong>Layer 2</strong> and <strong>Layer 3 deployment modes</strong>. Each deployment method is used to satisfy different security requirements and allows flexible configuration options. Visit our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks Firewall Section"><strong>Palo Alto Firewalls Section</strong></a> for more in-depth technical articles.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Tue, 01 Nov 2016 23:46:56 +1100</pubDate>
		</item>
		<item>
			<title>Palo Alto Firewalls Security Zones – Tap Zone, Virtual Wire, Layer 2 and Layer 3 Zones</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-security-zones-creation-and-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-security-zones-creation-and-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Palo Alto Networks Next-Generation Firewalls</strong> rely on the concept of <strong>security zones</strong> in order to apply <strong>security policies</strong>. This means that access lists (firewall rules) are applied to zones and not interfaces – this is similar to Cisco’s <strong>Zone-Based Firewall</strong> supported by IOS routers.</p>
<p style="text-align: justify;">Palo Alto Networks Next-Generation Firewalls zones have no dependency on their physical location and they may reside in any location within the enterprise network. This is also illustrated in the network security diagram below:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-1.png" alt="Palo Alto Firewall Security Zones can contain networks in different locations" title="Palo Alto Firewall Security Zones can contain networks in different locations" />&nbsp;</p>
<p style="text-align: center;" align="center">Figure 1. Palo Alto Firewall Security Zones can contain networks in different locations</p>
<p style="text-align: justify;">The above topology illustrated shows <strong>VLANs 10</strong>, <strong>11</strong> ,<strong>12</strong> and <strong>2</strong> managed by a <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4507re-ws-x45-sup7l-e-installation.html" target="_blank" title="Catalyst 4507R+E Switch Configuration">Cisco Catalyst 4507R+E Switch</a> and are all part of <a href="https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html" target="_blank" title="OSPF Area 0">OSPF Area 0</a> and visible as routes in the Palo Alto Firewall. A Layer 3 aggregated link has been created between the Palo Alto Firewall (Interface ae1 on each firewall) and the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4507re-ws-x45-sup7l-e-installation.html" target="_blank" title="Catalyst 4507R+E Switch Configuration">Cisco 4507R+E Switch</a> (Port-Channel 1 &amp; 2).</p>
<p style="text-align: justify;">When aggregation interface <strong>ae1.2</strong> on the Palo Alto Firewall is configured to be part of the <a href="https://www.firewall.cx/networking/network-fundamentals/firewall-topologies-dmz-zone.html" target="_blank" title="DMZ Zone">DMZ Security Zone</a>, all networks learnt by the <a href="https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html" target="_blank" title="OSPF Routing Protocol">OSPF routing protocol</a> on <strong>interface ae1.2</strong> will be part of the <strong>DMZ Security Zone</strong>.</p>
<p style="text-align: justify;">Creating a <strong>Security Zone</strong> involves tasks such as naming the zone, assigning the interfaces to the new zone created and more. Palo Alto Networks Next-Generation Firewalls won’t process traffic from any interface unless they are part of a <strong>Security Zone</strong>.</p>
<p style="text-align: justify;">The diagram below depicts the order in which packets are processed by the Palo Alto Firewall:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-2.png" alt="Initial Packet Processing – Flow Logic of Palo Alto Next-Generation Firewall" title="Initial Packet Processing – Flow Logic of Palo Alto Next-Generation Firewall" /></p>
<p style="text-align: center;" align="center">Figure 2. Initial Packet Processing – Flow Logic of Palo Alto Next-Generation Firewall</p>
<p style="text-align: justify;">It is without doubt <strong>Zone based firewalls</strong> provide greater flexibility in security design and are also considered easier to administer and maintain especially in large scale network deployments.</p>
<p style="text-align: justify;">Palo Alto Networks Next-Generation Firewalls have <strong>four main types of Zones</strong> namely as shown in the screenshot below:</p>
<ul style="text-align: justify;">
<li><strong>Tap Zone</strong>. Used in conjunction with <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html" target="_blank" title="SPAN/RSPAN">SPAN/RSPAN</a> to monitor traffic.</li>
<li><strong>Virtual Wire</strong>. Also known as Transparent Firewall.</li>
<li><strong>Layer 2</strong>. Used when switching between two or more networks.</li>
<li><strong>Layer 3</strong>. Used when routing between two or more networks. Interfaces must be assigned an IP address.</li>
</ul>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-3.png" alt="Types of Security Zones in Palo Alto Firewalls" title="Types of Security Zones in Palo Alto Firewalls" />&nbsp;</p>
<p style="text-align: center;" align="center">Figure 3. Types of Security Zones in Palo Alto Firewalls</p>
<p style="text-align: justify;">Palo Alto Networks Next-Generation Firewalls have special zone called External which is used to pass traffic between Virtual Systems (vsys) configured on the same firewall appliance. The External zone type is only available in the Palo Alto Networks Next-Generation Firewalls which are capable of Virtual Systems and also the External Zone is visible only when the multi-vsys feature is enabled.</p>
<h2 style="text-align: justify;">Creating A Security Zone</h2>
<p style="text-align: justify;">This section focuses on creating different types of <strong>Security zones</strong> in Palo Alto Networks Next-Generation Firewalls</p>
<p style="text-align: justify;">Step 1. Login to the WebUI of Palo Alto Networks Next-Generation Firewall</p>
<p style="text-align: left;" align="center">Step 2. From the menu, <strong>click</strong> <strong>Network &gt; Zones &gt; Add</strong></p>
<p style="text-align: left;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-4.png" alt="Creating a new Zone in a Palo Alto Firewall" style="display: block; margin-left: auto; margin-right: auto;" title="Creating a new Zone in a Palo Alto Firewall" /></p>
<p style="text-align: center;" align="center">Figure 4. Creating a new Zone in Palo Alto Firewall</p>
<p style="text-align: justify;">Step 3. Provide the <strong>name</strong> for the <strong>new Zone</strong>, and select the <strong>zone type</strong> and <strong>click OK</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-5.png" alt="Creating a zone in a Palo Alto Firewall" style="display: block; margin-left: auto; margin-right: auto;" title="Creating a zone in a Palo Alto Firewall" /></p>
<p style="text-align: center;" align="center">Figure 5. Creating a zone in a Palo Alto Firewall</p>
<p style="text-align: justify;">In a similar manner we can repeat steps 1 to 3 to create <strong>Tap</strong>, <strong>Virtual Wire</strong> or<strong> Layer 2 security zones</strong>.</p>
<p style="text-align: justify;">Finally it is important to note that the zone names is case sensitive, so one needs to be careful as the zone <strong>FiewallCX</strong> and <strong>firewallcx</strong> are considered different zones:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-6.png" alt="Identically named Security zones using different letter cases result in different Security zones " style="display: block; margin-left: auto; margin-right: auto;" title="Identically named Security zones using different letter cases result in different Security zones " /></p>
<p style="text-align: center;" align="center">Figure 6. Identically named Security zones using different letter cases result in different Security zones</p>
<p style="text-align: justify;">&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-7.png" alt="Example of case sensitive security zones with identical zone names" style="display: block; margin-left: auto; margin-right: auto;" title="Example of case sensitive security zones with identical zone names" /></p>
<p style="text-align: center;" align="center">Figure 7. <span style="font-size: 11pt; font-family: 'Calibri','sans-serif'; color: black;">Example of case sensitive security zones with identical zone names</span></p>
<p style="text-align: justify;"><strong>Creating a security zone</strong> in Palo Alto Networks Next-Generation Firewalls involves three steps:</p>
<p>Step 1. <strong>Specify the Zone name</strong></p>
<p>Step 2. <strong>Select the Zone type</strong></p>
<p>Step 3. <strong>Assign the Interface</strong></p>
<p style="text-align: justify;">The interfaces part will be dealt in upcoming posts as one need to understand types of interfaces Palo Alto Networks Next-Generation Firewalls offers and how they work.</p>
<p style="text-align: justify;">In Palo Alto Networks Next-Generation Firewalls zone names have no predefined meaning or policy associations, basically they are created to group the services by functions for examples one can group all the Domain Controllers in one security group no matter even if they are part of different networks.</p>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-firewall-security-zones-creation-and-configuration-8.png" alt="Example of grouping Domain Controllers in same security zone – DMZ" style="display: block; margin-left: auto; margin-right: auto;" title="Example of grouping Domain Controllers in same security zone – DMZ" /></p>
<p style="text-align: center;" align="center">Figure 8. Example of grouping Domain Controllers in same security zone – DMZ</p>
<p align="left">As mentioned Palo Alto Networks Next-Generation Firewalls works with the principle of <strong>Security zones</strong>, by default <strong>Intra-Zone traffic</strong> is <strong>allowed</strong> and <strong>Inter-Zone traffic is denied</strong>. More technical articles can be found in our <a href="https://www.firewall.cx/security/palo-alto-networks.html" title="Palo Alto Network Firewall section">Palo Alto Network Firewall section</a>.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Mon, 10 Oct 2016 23:25:47 +1100</pubDate>
		</item>
		<item>
			<title>Palo Alto Firewall Application-based Policy Enforcement (App-ID), User Identification (User-ID) and Application Control Centre (ACC) Features for Enterprise Networks</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-app-id-user-id-application-control-centre.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-app-id-user-id-application-control-centre.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Our previous article examined the <a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture.html" target="_blank" title="benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture">benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture</a> and how its combine with the <a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture.html" target="_blank" title="separate Data and Control planes">separate Data and Control planes</a> to boost firewall performance and handle large amounts of traffic without and performance impact. This article focuses on the <strong>traffic flow logic</strong> inside the <strong>Palo Alto Firewall</strong> and two unique features that separate it from the competition: <strong>Application-based policy enforcement</strong> (<strong>App-ID</strong>) &amp; <strong>User Identification</strong> (<strong>User-ID</strong>).</p>
<p style="text-align: justify;">For more Technical articles on Palo Alto Networks Firewalls, visit our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks Firewall Section">Palo Alto Networks Firewall Section.</a></p>
<h2 style="text-align: justify;">Flow Logic Of The Next-Generation Firewall</h2>
<p style="text-align: justify;">The diagram below is a simplified version of the flow logic of a packet travelling through a <strong>Palo Alto Networks Next-Generation Firewall</strong> and this can be always used a reference to study the packet processing sequence:</p>
<p><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-app-id-user-id-application-control-centre-1.jpg" alt="palo-alto-firewall-app-id-user-id-application-control-centre-1" style="display: block; margin-left: auto; margin-right: auto;" title="Flow Logic of a packet inside the Palo Alto Networks Next Generation Firewall" /></p>
<p style="text-align: center;" align="center">Figure 1. Flow Logic of a packet inside the Palo Alto Networks Next Generation Firewall</p>
<p style="text-align: justify;"><strong>Palo Alto Networks Next-Generation Firewalls</strong> works with the concepts of zones not interfaces, once a packet enters the firewall, the <strong>Palo Alto Networks Next-Generation Firewalls</strong> identifies from which zone the packet came and where it is destined to go. This is similar to <a href="https://www.firewall.cx/cisco/cisco-routers.html" target="_blank" title="Cisco IOS Routers">Cisco IOS Routers</a> Zone-based Firewalls and <a href="https://www.firewall.cx/cisco/cisco-firewalls.html" target="_blank" title="Cisco ASA Firewalls">Cisco ASA Firewalls</a>.</p>
<p style="text-align: justify;">Users interested can also download for free the Palo Alto Networks document “<a href="https://www.firewall.cx/downloads/palo-alto-firewall-datasheets.html" target="_blank" title="Day in the Life of a Packet">Day in the Life of a Packet</a>” found in our <a href="https://www.firewall.cx/downloads/palo-alto-firewall-datasheets.html" target="_blank" title="Palo Alto Networks Download section">Palo Alto Networks Download section</a> which explains in great detail the packet flow sequence inside the Palo Alto Networks Firewall.</p>
<h2 style="text-align: left;">App-ID &amp; User-ID – Features That Set Palo Alto Apart From The Competition</h2>
<p style="text-align: justify;"><strong>App-ID</strong> and <strong>User-ID</strong> are two really interesting features not found on most competitors’ firewalls and really help set Palo Alto Networks apart from the competition. Let’s take a look at what App-ID and User-ID are and how they help protect the enterprise network.</p>
<h2 style="text-align: left;">App-ID: Application-based Policy Enforcement</h2>
<p style="text-align: justify;"><strong>App-ID</strong> is the biggest asset of <strong>Palo Alto Networks Next-Generation Firewalls</strong>. Traditional firewalls block traffic based on protocol and/or ports, which years ago seemed to be the best way of securing the network perimeter, however this approach today is inadequate as applications (including SSL VPNs) can easily bypass a port-based firewall by hopping between ports or using well-known open ports such as <strong>tcp-http</strong> (80) or <strong>tcp/udp-dns</strong> (53) normally found open.</p>
<p style="text-align: justify;">A traditional firewall that allows the usage of <strong>TCP/UDP port 53</strong> for <strong>DNS lookups</strong>, will allow any application using that port to pass through without asking second questions. This means that any application can use port 53 to send/receive traffic, including evasive applications like <a href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting.html" target="_blank" title="BitTorrent for P2P file sharing, which is quite dangerous">BitTorrent for P2P file sharing, which is quite dangerous</a>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-app-id-user-id-application-control-centre-2.png" alt="Palo Alto Network’s App-ID effectively blocks unwanted BitTorrent traffic" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Network’s App-ID effectively blocks unwanted BitTorrent traffic" /></p>
<p style="text-align: center;" align="center">Figure 2. Palo Alto Network’s App-ID effectively blocks unwanted BitTorrent traffic</p>
<p style="text-align: justify;">With <strong>App-ID</strong>, Palo Alto Networks Next-Generation Firewalls uses multiple identification mechanisms to determine the exact identity of applications traversing the network. Following is the order in which traffic is examined and classified:</p>
<ol style="text-align: justify;">
<li>Traffic is classified based on the IP Address and port</li>
<li>Signatures are then applied to the allowed traffic to identify the application based on unique application properties and related transaction characteristics.</li>
<li>For evasive applications which cannot be identified though advance signature and protocol analysis Palo Alto Networks Next-Generation Firewalls applies heuristics or behavioral analysis to determine the identity of the application.</li>
</ol>
<p style="text-align: justify;">Using the above process Palo Alto Networks Next-Generation Firewalls are very successful in identifying DNS traffic not only at the port level but also at the Application level, making it extremely difficult for an evasive application like BitTorrent to use any open ports and pass through the firewall undetected.</p>
<h2 style="text-align: left;">User Identification (User-ID)</h2>
<p style="text-align: justify;"><strong>User-ID</strong> is one more key determining factor that places Palo Alto Networks Next-Generation Firewalls apart from the competition.</p>
<p style="text-align: justify;">Traditionally, security policies and rules were applied based on IP addresses. However, these days both the users and applications have a dynamic nature which means that IP addresses alone have become inefficient for monitoring and controlling user activity. A single user might access the network from multiple devices (laptops, tablets, smartphones, servers).</p>
<p style="text-align: justify;">Thanks to the User-ID feature of the Palo Alto Networks Next-Generation Firewalls administrators are able to configure and enforce firewall policies based on users and user groups instead of network zones and addresses.</p>
<p style="text-align: justify;">The Palo Alto Networks Next-Generation Firewall can communicate with many directory servers, such as Microsoft Active Directory, eDirectory, SunOne, OpenLDAP, and most other LDAP-based directory servers to provide user and group information to the firewall. With this powerful feature, large organizations are able to create security policies that are user or group based, without worrying about IP addresses associated to them.</p>
<h2 style="text-align: justify;">Threat Prevention</h2>
<p style="text-align: justify;">Palo Alto Networks Next-Generation Firewalls are very effective in preventing threats and they do offer real-time threat prevention from viruses, worms, spyware, and other malicious traffic can be varied by application and traffic source.</p>
<h2 style="text-align: justify;">Application Command Control (ACC)</h2>
<p style="text-align: justify;">Palo Alto Networks Next-Generation Firewalls offer the most interactive graphical summary of the applications, URLs, users, threats, and content traversing the network. The ACC makes use of the firewall logs to provide the visibility of the traffic patterns, information on threats, user activity, Rule usage and many other information in an interactive graphical form:</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/palo-alto-firewall-app-id-user-id-application-control-centre-3b.png" target="_blank" title="Palo Alto Application Command Center provides maximum visibility on network traffic"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-app-id-user-id-application-control-centre-3.png" alt="Palo Alto Application Command Center provides maximum visibility on network traffic (click to enlarge)" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Application Command Center provides maximum visibility on network traffic" /></a>Figure 3. Palo Alto Application Command Center provides maximum visibility on network traffic (click to enlarge)</p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">This article why <strong>Palo Alto Networks Next-Generation Firewalls</strong> are really unique in many terms. Features such as <strong>App-ID</strong> and <strong>User-ID</strong> allow in-depth control of applications and users, making it possible to fully manage small to very large enterprises without a problem. The <strong>Application Command Control</strong> (<strong>ACC</strong>) helps give the administrator a complete view of <strong>applications and services</strong> accessing the <strong>internet</strong> alongside with some very useful statistics. To discover more in-depth technical articles on Palo Alto Networks Firewalls, please visit our <a href="https://www.firewall.cx/security/palo-alto-networks.html" title="Palo Alto Networks Firewall section">Palo Alto Networks Firewall section</a>.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Sat, 28 May 2016 18:33:55 +1000</pubDate>
		</item>
		<item>
			<title>The Benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) and Hardware Architecture</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture.html</guid>
			<description><![CDATA[<p style="text-align: justify;">What makes <strong>Palo Alto Networks Next-Generation Firewall</strong> (<strong>NGFW</strong>) so different from its competitors is its <strong>Platform</strong>, <strong>Process</strong> and <strong>Architecture</strong>. Palo Alto Networks delivers all the next generation firewall features using the <strong>single platform</strong>, <strong>parallel processing</strong> and <strong>single management systems</strong>, unlike other vendors who use different modules or multiple management systems to offer NGFW features.</p>
<p class="box-info" style="text-align: justify;">More technical and how-to articles covering Palo Alto's Firewalls can be found in our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks Firewall Section">Palo Alto Networks Firewall Section</a></p>
<p style="text-align: justify;"><strong>Palo Alto Networks Next-Generation Firewall’s</strong> main strength is its <strong>Single Pass Parallel Processing</strong> (<strong>SP3</strong>) <strong>Architecture</strong>, which comprises two key components:</p>
<ol style="text-align: justify;">
<li><strong>Single Pass Software</strong></li>
<li><strong>Parallel Processing Hardware</strong></li>
</ol>
<p align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-1.png" alt="palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-1" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Networks Firewall Single Pass Parallel Processing Architecture" /></p>
<p style="text-align: center;" align="center">Figure 1.&nbsp;&nbsp; Palo Alto Networks Firewall Single Pass Parallel Processing Architecture</p>
<h2 style="text-align: justify;">Single Pass Software</h2>
<p style="text-align: justify;"><strong>Palo Alto Networks Next-Generation Firewall</strong> is empowered with <strong>Single Pass Software</strong>, which processes the packet to perform functions like networking, user identification (User-ID), policy lookup, traffic classification with application identification (App-ID), decoding, signature matching for identifying threats and contents, which are all performed once per packet as shown in the illustration below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-2.png" alt="palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-2" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Networks Firewall - Single-Pass Architecture Traffic Flow" /></p>
<p style="text-align: center;" align="center">Figure 2: Palo Alto Networks Firewall - Single-Pass Architecture Traffic Flow</p>
<p style="text-align: justify;">This processing of a packet in one go or single pass by <strong>Palo Alto Networks Next-Generation Firewall</strong> enormously reduces the processing overhead, other vendor firewalls using a different type of architecture produce a significantly higher overhead when processing packets traversing the firewall. It’s been observed that the <strong>Unified Threat Management</strong> (<strong>UTM</strong>), which processes the traffic using multi-pass architecture, results in process overhead, latency introduction and throughput degradation.</p>
<p style="text-align: justify;">The diagram below illustrates the <strong>multi-pass architecture process</strong> used by other vendors’ firewalls, clearly showing differences to the Palo Alto Networks Firewall architecture and how the processing overhead is produced:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-3.png" alt="palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-3" style="display: block; margin-left: auto; margin-right: auto;" title="Traffic Flow for multi-pass architecture resulting in additional overhead processing" /></p>
<p style="text-align: center;" align="center">Figure 3: Traffic Flow for multi-pass architecture resulting in additional overhead processing</p>
<p style="text-align: justify;">Palo Alto Networks Next-Generation Firewall <strong>Single Pass Software</strong> scans the contents based on the same stream and it uses <strong>uniform signature matching patterns</strong> to detect and block threats. By adopting this methodology <strong>Palo Alto Networks Next-Generation Firewall</strong> is negating the use of separate scan engines and signature sets, which results in low latency and high throughput.</p>
<h2 style="text-align: justify;">Parallel Processing Hardware</h2>
<p style="text-align: justify;">Palo Alto Networks <strong>Parallel Processing hardware</strong> ensures function-specific processing is done in parallel at the hardware level which, in combination with the <strong>dedicated Data plane</strong> and <strong>Control plane</strong>, produces stunning performance results. By separating the <strong>Data plane</strong> and <strong>Control plane</strong>, Palo Alto Networks is ensuring heavy utilization of either plane will not impact the overall performance of the Platform. At the same time, this means there is no dependency on either plane as each has its own CPU and RAM as illustrated in the diagram below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-4.png" alt="palo-alto-firewall-single-pass-parallel-processing-hardware-architecture-4" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Networks Firewall Hardware Architecture – Separation of Data Plane and Control Plane" /></p>
<p style="text-align: center;" align="center">Figure 4: Palo Alto Networks Firewall Hardware Architecture – Separation of Data Plane and Control Plane</p>
<p style="text-align: justify;">The <strong>Control Plane</strong> is responsible for tasks such as management, configuration of <strong>Palo Alto Networks Next-Generation Firewall</strong> and it takes care of logging and reporting functions.</p>
<p style="text-align: justify;"><strong>Palo Alto Networks Next-Generation Firewall</strong> offers processors dedicated to specific functions that work in parallel. The <strong>Data Plane</strong> in the high-end models contains three types of processors (CPUs) connected by <strong>high-speed 1Gbps busses</strong>.</p>
<p style="text-align: justify;">The three type of processors are:</p>
<ol>
<li style="text-align: justify;"><strong>Security Matching Processor</strong>: Dedicated processor that performs vulnerability and virus detection.</li>
<li style="text-align: justify;"><strong>Security Processor</strong>: Dedicated processor that performs hardware acceleration and handles security tasks such as SSL decryption, IPsec decryption and similar tasks.</li>
<li style="text-align: justify;"><strong>Network Processor</strong>: Dedicated processor responsible for network functions such as routing, NAT, QOS, route lookup, MAC Lookup and network layer communications.</li>
</ol>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;"><strong>Palo Alto Networks</strong> unique architecture and design has played a significant role in helping place it apart from the rest of its competitors. Its <strong>Single Platform Parallel Processing architecture</strong> coupled with the <strong>single management system</strong> results in a fast and highly sophisticated <strong>Next-Generation Firewall</strong> that won’t be left behind anytime soon. For more technical information and articles covering configuration and technical features of the Palo Alto Networks Firewall, visit our&nbsp;<a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks Firewall Section">Palo Alto Networks Firewall Section</a>.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Sun, 08 May 2016 18:34:47 +1000</pubDate>
		</item>
		<item>
			<title>Palo Alto Networks Firewall - Web &amp; CLI Initial Configuration, Gateway IP, Management Services &amp; Interface, DNS – NTP Setup, Accounts, Passwords, Firewall Registration &amp; License Activation</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-initial-setup-configuration-registration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewall-initial-setup-configuration-registration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article is the second-part of our <strong><a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks Firewall technical articles">Palo Alto Networks Firewall technical articles</a></strong>. Our previous article was <strong><a href="https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewalls-introduction-features-technical-specifications.html" target="_blank" title="introduction to Palo Alto Networks Firewall appliances and technical specifications">introduction to Palo Alto Networks Firewall appliances and technical specifications</a></strong>, while this article covers <strong>basic IP management interface configuration</strong>, <strong>DNS</strong>, <strong>NTP</strong> and other services plus <strong>account password modification</strong> and <strong>appliance registration and activation</strong>.</p>
<p style="text-align: justify;">The introduction of Next Generation Firewalls has changed the dimension of management and configuration of firewalls, most of the well-known Firewall vendors have done a major revamp, be it the traditional command line mode or the GUI mode.</p>
<p style="text-align: justify;"><strong>Palo Alto Networks</strong> is no different to many of those vendors, yet it is unique in terms of its WebUI. It’s a whole new experience when you access the WebUI of <strong>Palo Alto Networks Next-Generation Firewalls</strong>.</p>
<p style="text-align: justify;">In order to start with an implementation of the <strong>Palo Alto Networks Next-Generation Firewalls</strong> one needs to configure them. <strong>Palo Alto Networks Next-Generation Firewalls</strong> can be accessed by either an out-of-band management port labelled as <strong>MGT</strong> or a <strong>Serial Console port</strong> (similar to Cisco devices). By using the <strong>MGT port</strong>, one can separate the management functions of the firewall from the data processing functions. All initial configurations must be performed either on out-of-band management interface or by using a serial console port. The serial port has default values of <strong>9600-N-1</strong> and a <strong>standard roll over cable</strong> can be used to connect to a serial port.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-1.png" alt=" Palo Alto Networks Firewall PA-5020 Management &amp; Console Port" title=" Palo Alto Networks Firewall PA-5020 Management &amp; Console Port" />&nbsp;</p>
<p style="text-align: center;" align="center">Figure 1.&nbsp;&nbsp; <span style="font-size: 11pt; font-family: 'Calibri','sans-serif'; color: black;"> Palo Alto Networks Firewall PA-5020 Management &amp; Console Port</span></p>
<p style="text-align: justify;">By default, <strong>Palo Alto Networks Next-Generation Firewalls</strong> use <strong>MGT port</strong> to retrieve license information and update the threats and application signature, therefore it is imperative the <strong>MGT port has proper DNS settings configured</strong> and is able to access the internet.</p>
<p class="box-info">Note: The instructions below apply to all Palo Alto Firewall models!</p>
<p style="text-align: justify;">To access the <strong>Palo Alto Networks Firewall</strong> for the first time through the <strong>MGT port</strong>, we need to connect a laptop to the <strong>MGT port</strong> using a <a href="https://www.firewall.cx/networking/network-cabling/network-cabling-utp-st.html" target="_blank" title="straight-thru Ethernet cable">straight-thru Ethernet cable</a>. By default, the <strong>web gui interface</strong> is accessed through the following IP Address and login credentials (note they are in lower case):</p>
<ul style="text-align: justify;">
<li>MGT Port IP Address: <strong>192.168.1.1</strong> /24</li>
<li>Username: <strong>admin</strong></li>
<li>Password: <strong>admin</strong></li>
</ul>
<p style="text-align: justify;">For security reasons it’s always recommended to change the <strong>default admin credentials</strong>. Until this condition is satisfied, the <strong>Palo Alto Networks Firewall</strong> alerts the administrator to <strong>change the default password</strong> every time he logs in, as shown in the screenshot below:</p>
<p align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-2.png" alt="Palo Alto Networks Firewall alerts the administrator to change the default password" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Networks Firewall alerts the administrator to change the default password" /></p>
<p style="text-align: center;" align="center">Figure 2. Palo Alto Networks Firewall alerts the administrator to change the default password</p>
<h2 style="text-align: left;">Performing The Initial Setup In Palo Alto Networks Firewall Check List</h2>
<p style="text-align: justify;">Below is a list of the most important initial setup tasks that should be performed on a Palo Alto Networks Firewall regardless of the model:</p>
<ul class="checkbox">
<li style="text-align: justify;">
<div>Change the default login credentials</div>
</li>
<li style="text-align: justify;">
<div>Configure the management IP Address &amp; managed services (https, ssh, icmp etc)</div>
</li>
<li style="text-align: justify;">
<div>Configure DNS &amp; NTP Settings</div>
</li>
<li style="text-align: justify;">
<div>Register and Activate the Palo Alto Networks Firewall</div>
</li>
</ul>
<p style="text-align: justify;">Let’s take a look at each step in greater detail.</p>
<h2 style="text-align: left;">Change The Default Login Credentials</h2>
<p style="text-align: justify;"><strong>Step 1</strong>: Establish connectivity with the Palo Alto Networks Firewall by connecting an Ethernet cable between the Management and the laptop’s Ethernet interface.</p>
<p style="text-align: justify;"><strong>Step 2</strong>: Configure the laptop Ethernet interface with an IP address within the 192.168.1.0/24 network. Keep in mind that we’ll find the Palo Alto Networks Firewall at 192.168.1.1 so this IP must not be used.</p>
<p style="text-align: justify;"><strong>Step 3</strong>: Open a web browser and navigate to the URL <strong>https://192.168.1.1</strong> – Take note that this is an HTTPS site. At this point the Palo Alto Networks Firewall login page appears.</p>
<p style="text-align: justify;"><strong>Step 4</strong>: Enter admin for both name and password fields.</p>
<p style="text-align: justify;"><strong>Step 5</strong>: From the main menu, <strong>click Device &gt; Administrators &gt; admin</strong></p>
<ul style="text-align: justify;">
<li>Type the old password in the <strong>Old Password</strong> field</li>
<li>Type the new password in the <strong>New Password</strong> field</li>
<li>Type new password in the <strong>Confirm New Password</strong> field</li>
<li><strong>Click ok</strong></li>
</ul>
<h2 style="text-align: left;">Configure The Management IP Address &amp; Management Services (HTTPS, SSH, ICMP)</h2>
<p style="text-align: justify;">At this point we have connectivity to the Palo Alto Networks Firewall and need to change the management IP address:</p>
<p style="text-align: justify;"><strong>Step 1</strong>: Logon to the Palo Alto Networks Firewall using the new credentials entered in the previous section.</p>
<p style="text-align: justify;"><strong>Step 2</strong>: From the web interface <strong>click Device &gt; Setup &gt; Management</strong> and <strong>select</strong> the <strong>Management Interface Settings</strong> radio button as shown below:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-3.png" alt="Accessing the Palo Alto Networks Firewall Management IP Address tab" style="display: block; margin-left: auto; margin-right: auto;" title="Accessing the Palo Alto Networks Firewall Management IP Address tab" /></p>
<p style="text-align: center;" align="center">Figure 3. Accessing the Palo Alto Netowkrs Firewall Management IP Address tab</p>
<p style="text-align: justify;">Next, change the IP Address accordingly and enable or disable any management services as required. <strong>HTTPS</strong>, <strong>SSH</strong> and <strong>Ping</strong> (<strong>ICMP</strong>) are enabled by default. When ready <strong>click ok</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-4.png" alt="Changing the Management IP Address &amp; services on the Palo Alto Networks Firewall" style="display: block; margin-left: auto; margin-right: auto;" title="Changing the Management IP Address &amp; services on the Palo Alto Networks Firewall" /></p>
<p style="text-align: center;" align="center">Figure 4. Changing the Management IP Address &amp; services on the Palo Alto Networks Firewall</p>
<p style="text-align: justify;"><strong>Step 3</strong>: Now <strong>click</strong> on <strong>Commit</strong> on the top right corner to save and commit the changes to the new configuration</p>
<h2 style="text-align: justify;">Configure DNS &amp; NTP Settings In Palo Alto Networks</h2>
<p style="text-align: justify;">This section assumes all previous steps have been completed and we are currently logged into the Palo Alto Networks Firewall web interface.</p>
<p style="text-align: justify;"><strong>Step 1</strong>: From the menu, <strong>click Device &gt; Setup &gt; Services</strong> and configure the DNS Servers as required. When ready, <strong>click</strong> on <strong>OK</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-5.png" alt="Configuring DNS Settings on Palo Alto Networks firewall" style="display: block; margin-left: auto; margin-right: auto;" title="Configuring DNS Settings on Palo Alto Networks firewall" /></p>
<p style="text-align: center;" align="center">Figure 5. Configuring DNS Settings on Palo Alto Networks firewall</p>
<p style="text-align: justify;"><strong>Step 2</strong>: <strong>Click</strong> on the <strong>Commit</strong> button on the top right corner to commit the new changes.</p>
<h2 style="text-align: left;">Configure Management IP Address, Default Gateway, DNS &amp; NTP Settings CLI (PAN-OS)</h2>
<p style="text-align: justify;">Similar to Cisco devices, Palo Alto Networks devices can be configured by web or CLI interface. While CLI interface tends to be slightly more challenging it does provides complete control of configuration options and extensive debugging capabilities.</p>
<p style="text-align: justify;">This section shows how to configure your Palo Alto Networks firewall using the console port. The computer’s serial port must have the following settings to correctly connect and display data via the console port:</p>
<p style="text-align: justify;"><strong>Step 1</strong>: Login to the device using the default credentials (admin / admin).</p>
<p style="text-align: justify;"><strong>Step 2</strong>: Enter configuration mode by typing configure:</p>
<div class="box-content" style="text-align: justify;">admin@PA-3050&gt; <strong>configure</strong></div>
<p style="text-align: justify;"><strong>Step 3</strong>: Configure the IP address, subnet mask, default gateway and DNS Severs by using following PAN-OS CLI command in one line:</p>
<p class="box-content" style="text-align: justify;">admin@PA-3050# <strong>set deviceconfig system ip-address 192.168.1.10 netmask 255.255.255.0 default-gateway 192.168.1.1 dns-setting servers primary 8.8.8.8 secondary 4.4.4.4</strong></p>
<p style="text-align: justify;"><strong>Step 4</strong>: Commit changes</p>
<p class="box-content" style="text-align: justify;">admin@PA-3050# <strong>commit</strong></p>
<h2 style="text-align: justify;">Registering &amp; Activating Palo Alto Networks Firewall</h2>
<p style="text-align: justify;">This section assumes all previous steps have been completed and we are currently logged into the Palo Alto Networks Firewall web interface.</p>
<p style="text-align: justify;"><strong>Step 1</strong>: <strong>Click Dashboard</strong> and look for the serial information in the <strong>General Information Widget</strong>,</p>
<p style="text-align: justify;">If the widget is not added, <strong>click</strong> on <strong>Widgets &gt; Systems &gt; General Information</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-6.png" alt="Adding Widgets to the Palo Alto Networks Firewall Web Interface" style="display: block; margin-left: auto; margin-right: auto;" title="Adding Widgets to the Palo Alto Networks Firewall Web Interface" /></p>
<p style="text-align: center;" align="center">Figure 6. Adding Widgets to the Palo Alto Networks Firewall Web Interface</p>
<p style="text-align: justify;"><strong>Step 2</strong>: Create a support account with Palo Alto Support.</p>
<p style="text-align: justify;">Registering your Palo Alto Networks device is essential so you can receive product updates, firmware upgrades, support and much more.</p>
<p style="text-align: justify;">First we need to create an account at <a href="https://support.paloaltonetworks.com/" target="_blank" rel="nofollow noopener" title="Palo Alto Support">https://support.paloaltonetworks.com</a> and then proceed with the registration of our Palo Alto Networks Firewall device, during which we’ll need to provide the sales order number or customer ID, serial number of the device or authorization code provided by our Palo Alto Networks Authorized partner.</p>
<p class="box-info" style="text-align: justify;">Further details about registration and activation process can be found in our article <a href="https://www.firewall.cx/security/palo-alto-networks/how-to-register-palo-alto-firewall-and-activate-licenses.html" target="_blank" title="How to Register a Palo Alto Firewall and Activate Support, Subscription Services &amp; Licenses. Covers All Models.">How to Register a Palo Alto Firewall and Activate Support, Subscription Services &amp; Licenses. Covers All Models.</a>&nbsp;</p>
<p style="text-align: justify;"><strong>Step 3</strong>: Activate the license by <strong>clicking Device &gt; License</strong> and select <strong>Activate feature using authorization code</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewall-initial-setup-configuration-registration-7.png" alt="Activating the Palo Alto Networks Firewall license" style="display: block; margin-left: auto; margin-right: auto;" title="Activating the Palo Alto Networks Firewall license" /></p>
<p style="text-align: center;" align="center">Figure 7. Activating the Palo Alto Networks Firewall license</p>
<p style="text-align: justify;">When prompted, enter the <strong>Authorization Code</strong> and then <strong>click</strong> <strong>OK</strong>.</p>
<p style="text-align: justify;">Finally, verify that the license was successfully activated.</p>
<p style="text-align: justify;">Once the Palo Alto Networks Firewall is activated, it is ready for configuration according to our business’s needs.</p>
<p style="text-align: justify;">This article showed how to <strong>configure your Palo Alto Networks Firewall</strong> via <strong>Web interface</strong> and <strong>Command Line Interface</strong> (<strong>CLI</strong>). We covered configuration of <strong>Management interface</strong>, <strong>enable/disable management services</strong> (<strong>https, ssh</strong> etc), <strong>configure DNS</strong> and <strong>NTP settings</strong>, <strong>register</strong> and <strong>activate</strong> the <strong>Palo Alto Networks Firewall</strong>. For more in-depth technical articles make sure to visit our <a href="https://www.firewall.cx/security/palo-alto-networks.html" title="Palo Alto Networks Firewall section">Palo Alto Networks Firewall section</a>.</p>]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Sun, 17 Apr 2016 14:49:20 +1000</pubDate>
		</item>
		<item>
			<title>Introduction to Palo Alto Next-Generation Network Firewalls</title>
			<link>https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewalls-introduction-features-technical-specifications.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/palo-alto-networks/palo-alto-firewalls-introduction-features-technical-specifications.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls-introduction-features-technical-specifications-1a.png" alt="palo-alto-firewalls-introduction-features-technical-specifications-1a" style="display: block; margin: 7px; float: left;" title="Introduction to Palo Alto Firewall Appliances" />During the past decade, we’ve seen the global <strong>IT security</strong> market flooded with new <strong>network security</strong> and <strong>firewall security appliances</strong>. New vendors emerging into the market while existing well-known vendors introduce new smarter and complex firewalls that aim to <strong>keep enterprise organizations as safe as possible</strong>. <strong>Palo Alto Networks</strong> is one of the <strong>new-generation security vendors</strong> who have managed to break into a saturated market and make their stand.</p>
<p style="text-align: justify;">It’s no coincidence that Palo Alto Networks is considered to be a leader and pioneer when it comes to <strong>Next Generation Firewall appliances</strong> and <strong>Gartner</strong> seems to agree with this statement based on their <strong>Magic Quadrant report</strong> in the <strong>Next Generation Firewall Segment</strong>:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls-introduction-features-technical-specifications-1.png" alt="Magic Quadrant for Enterprise Network Firewalls" style="display: block; margin-left: auto; margin-right: auto;" title="Gartner Magic Quadrant for Enterprise Network Firewalls" /></p>
<p style="text-align: center;" align="center">Figure 1. Gartner Magic Quadrant for Enterprise Network Firewalls</p>
<p style="text-align: justify;"><strong>Palo Alto Networks Next-Generation Firewalls</strong> unique way of processing a packet using the <strong>Single &shy;&shy;&shy;Pass Parallel Processing</strong> (<strong>SP3</strong>) <strong>engine</strong> makes them a clear leader.</p>
<p class="box-info" style="text-align: justify;">Note: Read all our technical articles covering Palo Alto Firewalls by visiting our <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks Firewall Section">Palo Alto Firewall Section</a>.</p>
<p style="text-align: justify;">Basically, the <strong>SP3 engine</strong> utilizes the same <strong>stream-based signature format</strong> to process the protection features like <strong>Anti-Virus</strong>, <strong>Spyware</strong>, <strong>Vulnerability Protection</strong> and <strong>Data Filtering</strong>. By doing so the firewall saves valuable processing power, unlike other <strong>Unified Threat Management</strong> (<strong>UTM</strong>) <strong>appliances</strong> which serially process each security feature offered, this often <strong>introduces latency</strong> to the network traffic.</p>
<p style="text-align: justify;">The advanced security features like <strong>App-ID</strong>, <strong>User-ID</strong>, <strong>Content-ID</strong> along with <strong>Security profiles</strong>, comprising feature like <strong>Antivirus</strong>, <strong>Anti-Spyware</strong>, <strong>Vulnerability protection</strong>, <strong>URL Filtering</strong>, <strong>DoS Protection</strong> and <strong>Data Filtering</strong> makes Palo Alto the leader. Most importantly its malware analysis solution <strong>WildFire</strong> offers <strong>advanced protection</strong> from <strong>unknown threats</strong>.</p>
<p style="text-align: justify;">Palo Alto Networks offers its firewalls as <strong>Hardware Platforms</strong> and <strong>Virtual Platforms</strong>. Its Hardware Platforms comes in different flavors.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/palo-alto-firewalls-introduction-features-technical-specifications-2.png" alt="palo-alto-firewalls-introduction-features-technical-specifications-2" style="display: block; margin-left: auto; margin-right: auto;" title="Palo Alto Enterprise Firewall Security Appliances " /></p>
<p style="text-align: center;" align="center">Figure 2. The Palo Alto Firewall family</p>
<p style="text-align: justify;"><strong>PA-200</strong> and <strong>PA-500</strong> Series Firewalls are meant for <strong>Small Businesses</strong> and come with very limited throughput and do not support <strong>Virtual Systems</strong>. <strong>Virtual Systems</strong>, also known as <strong>VSYS</strong>, is used to create <strong>virtual firewall instances</strong> in a single-pair of Palo Alto Firewalls, in other words, <strong>Virtual Systems</strong> can be compared to <strong>contexts in Cisco ASA Firewalls</strong> or <strong>vdom in Fortinet firewalls</strong>. The <strong>PA-200</strong>, <strong>PA-500 Series Firewalls</strong> offer a very limited number of security policies like <strong>security rules</strong>, <strong>NAT rules</strong>, <strong>policy based forwarding rules</strong> and a few more.</p>
<p class="box-info" style="text-align: justify;">Datasheets on Palo Alto Firewall appliances and Virtual Servers are available at our <a href="https://www.firewall.cx/downloads/palo-alto-firewall-datasheets.html" target="_blank" title="Palo Alto Datasheets and Guides">Palo Alto Datasheets and Guides</a> download area</p>
<p style="text-align: justify;">The table below provides a clear comparison of features and technical specifications of both <strong>PA-500</strong> and <strong>PA-200</strong> firewall models:</p>
]]></description>
			<category>Palo Alto Networks</category>
			<pubDate>Tue, 29 Mar 2016 22:00:00 +1100</pubDate>
		</item>
	</channel>
</rss>
