index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
1,091 | Policy
Thus, a single Security policy rule that uses an address object with wildcard address
10.132.1.2/0.0.2.255 as the destination address matches the addresses of 512 devices (256 cash
registers + 256 printers), which is an efficient way to apply a rule to many devices. The wildcard
mask must begin with at least one... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,092 | Policy
earlier releases, such a deployment did not work because only the match to the rule with the
longest prefix in the wildcard mask was processed and other rules were not considered.
Beginning with PAN-OS 10.2.1, you can enable Wildcard Top Down Match Mode so that if a
packet with an IP address matches prefixes in ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,093 | Policy
Client B with source IP address 10.160 2.1 (0000 1010 1010 0000 0000 0010 0000 0001) does
not fully match the address in Rule 1 and does not match the prefix in Rule 2. Client B’s address
fully matches Rule 3, which is the first matching rule in top-down order. Assuming other rule
criteria match, the packet from... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,094 | Policy
Create a Security Policy Rule
Before you create a Security policy rule, make sure you understand that the set of IPv4 addresses
is treated as a subset of the set of IPv6 addresses, as described in detail in Policy.
STEP 1 | (Optional) Delete the default Security policy rule.
By default, the firewall includes a s... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,095 | Policy
STEP 5 | Specify the application that the rule will allow or block.
As a best practice, always use application-based security policy rules instead of portbased rules and always set the Service to application-default unless you are using a
more restrictive list of ports than the standard ports for an application... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,096 | Policy
STEP 10 | Click Commit to save the policy rule to the running configuration on the firewall.
STEP 11 | To verify that you have set up your basic security policies effectively, test whether your
security policy rules are being evaluated and determine which security policy rule applies to a
traffic flow.
The outpu... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,097 | Policy
Policy Objects
A policy object is a single object or a collective unit that groups discrete identities such as IP
addresses, URLs, applications, or users. With policy objects that are a collective unit, you can
reference the object in security policy instead of manually selecting multiple objects one at a
time. ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,098 | Policy
Policy Object Description
or for a particular service, or to achieve a particular policy goal. See
Create an Application Group.
Service/Service
Groups
Allows you to specify the source and destination ports and protocol
that a service can use. The firewall includes two pre-defined services
—service-http and servi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,099 | Policy
Security Profiles
While Security policy rules enable you to allow or block traffic on your network, Security Profiles
help you define an allow but scan rule, which scans allowed applications for threats, such
as virus, malware, spyware, and DDoS attacks. When traffic matches the allow rule defined in
the Securit... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,100 | Policy
Profile Type Description
default action is displayed in parentheses. For example, default
(alert) in the threat or Anti-Spyware signature.
• Allow—Permits the application traffic.
The Allow action does not generate logs related to the
signatures or profiles.
• Alert—Generates an alert for each application traffi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,101 | Policy
Profile Type Description
• Strict—Overrides the default action of critical, high, and medium
severity threats to the block action, regardless of the action defined
in the signature file. This profile still uses the default action for low
and informational severity signatures.
When the firewall detects a threat e... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,102 | Policy
Profile Type Description
Anti-Spyware and Vulnerability Protection profiles are configured
similarly.
Vulnerability
Protection Profiles
Vulnerability Protection profiles stop attempts to exploit system flaws
or gain unauthorized access to systems. While Anti-Spyware profiles
help identify infected hosts as traff... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,103 | Policy
Profile Type Description
• Reset Both—For TCP, resets the connection on both client and
server ends. For UDP, drops the connection.
In some cases, when the profile action is set to resetboth, the associated threat log might display the action
as reset-server. This occurs when the firewall detects
a threat at th... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,104 | Policy
Profile Type Description
To get started, Set Up Data Filtering.
File Blocking Profiles The firewall uses file blocking profiles to block specified file types
over specified applications and in the specified session flow direction
(inbound/outbound/both). You can set the profile to alert or block on
upload and/or... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,105 | Policy
Profile Type Description
WildFire Analysis
Profiles
Use a WildFire Analysis profile to enable the firewall to
forward unknown files or email links for WildFire analysis. Specify
files to be forwarded for analysis based on application, file type,
and transmission direction (upload or download). Files or email lin... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,106 | Policy
Profile Type Description
When configuring DoS protection, it is important to analyze your
environment to set the correct thresholds and due to some of the
complexities of defining DoS protection policy rules, this guide will not
go into detailed examples.
Zone Protection
Profiles
Zone Protection Profiles provide... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,107 | Policy
STEP 1 | Create a security profile group.
If you name the group default, the firewall will automatically attach it to any new
rules you create. This is a time saver if you have a preferred set of security profiles that
you want to make sure get attached to every new rule.
1. Select Objects > Security Profile Gro... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,108 | Policy
(the administrator can choose to manually select different profile settings if desired). Use the
following options to set up a default security profile group or to override your default settings.
If no default security profile exists, the profile settings for a new security policy are set to
None by default.
Cre... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,109 | Policy
Set up a default security profile group.
1. Select Objects > Security Profile Groups and add a new security profile group or modify
an existing security profile group.
2. Name the security profile group default:
3. Click OK and Commit.
4. Confirm that the default security profile group is included in new securit... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,110 | Policy
solution and then log or block the files that your Data Filtering profile detects based on that
pattern.
Create a Data Filtering Profile
Data Filtering profiles can keep sensitive information from leaving your network.
To get started, you’ll first create a data pattern that specifies the information types and fi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,111 | Policy
This selection is cleared by default, which means administrators can override the settings
for any device group that inherits the object.
5. (Optional—Panorama only) Select Data Capture to automatically collect the data that is
blocked by the filter.
Specify a password for Manage Data Protection on the Settings ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,112 | Policy
MIP Label, and enter the Azure Informatin Protect label GUID as the Property
Value.
9. Click OK to save the data pattern.
STEP 2 | Add the data pattern object to a data filtering profile.
1. Select Objects > Security Profiles > Data Filtering and Add or modify a data filtering
profile.
2. Provide a descriptive N... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,113 | Policy
STEP 3 | Apply the data filtering settings to traffic.
1. Select Policies > Security and Add or modify a security policy rule.
2. Select Actions and set the Profile Type to Profiles.
3. Attach the Data Filtering profile you created in Step 2 to the security policy rule.
4. Click OK.
STEP 4 | (Recommended) Preven... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,114 | Policy
If the type of information you want to protect is not covered in the list of predefined
patterns, you can use regular expressions to create custom patterns.
The following is a list of available data patterns:
Pattern Description
Credit Card Numbers 16-digit credit card numbers
Social Security Numbers 9-digit soc... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,115 | Policy
Pattern Description
CUSIP Identification Number Committee on Uniform Security Identification
Procedures Identification Number
DEA Registration Number U.S. Drug Enforcement Administration
Registration Number
DNI Identification Number Spanish Documento nacional de identidad
Identification Number number
HK Identifi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,116 | Policy
Set Up File Blocking
File Blocking Profiles allow you to identify specific file types that you want to want to block or
monitor. For most traffic (including traffic on your internal network), block files that are known to
carry threats or that have no real use case for upload/download. Currently, these include b... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,117 | Policy
STEP 1 | Create the file blocking profile.
1. Select Objects > Security Profiles > File Blocking and Add a profile.
2. Enter a Name for the file blocking profile such as Block_EXE.
3. (Optional) Enter a Description, such as Block users from downloading exe
files from websites.
4. (Optional) Specify that the prof... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,118 | Policy
STEP 4 | To test your file blocking configuration, access an endpoint PC in the trust zone of the
firewall and attempt to download an executable file from a website in the untrust zone; a
response page should display. Click Continue to confirm that you can download the file. You
can also set other actions, such ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,119 | Policy
Track Rules Within a Rulebase
To keep track of rules within a rulebase, you can refer to the rule number, which changes
depending on the order of a rule in the rulebase. The rule number determines the order in which
the firewall applies the rule.
The universally unique identifier (UUID) for a rule never changes ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,120 | Policy
View the numbered list of rules on Panorama.
Select Policies and any rulebase under it. For example, Policies > Security > Pre-rules.
After you push the rules from Panorama, view the complete list of rules with numbers on the
firewall.
From the web interface on the firewall, select Policies and pick any rulebase... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,121 | Policy
Rule UUIDs
The universally unique identifier (UUID) for a rule is a 32-character string (based on data such
as the network address and the timestamp of creation) that the firewall or Panorama assigns to
the rule. The UUID uses the format 8-4-4-4-12 (where 8, 4, and 12 represent the number of
unique characters se... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,122 | Policy
• To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load the named
Panorama configuration snapshot. If you do not select this option, Panorama removes all
previous rule UUIDs from the configuration snapshot and assigns new UUIDs to the rules on
Panorama, which means it does not retain informat... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,123 | Policy
Display the Rule UUID column for logs and the UUID column for policy rules.
To view the UUIDs, you must display the column, which does not display by default.
• To display the UUID in logs:
1. Select Monitor and then expand the column header ( ).
2. Select Columns.
3. Enable Rule UUID.
• To display UUIDs on the ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,124 | Policy
PAN-OS® Administrator’s Guide Version 10.2 1125 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,125 | Policy
Copy the UUID for a log or policy rule.
Copying the UUID allows you to paste the UUID in to searches, the ACC, custom reports,
filters, and anywhere else you want to locate a rule identified by that UUID.
1. Select the ellipses that display when you move your cursor over the entry in the Rule
UUID column.
2. Cop... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,126 | Policy
Enforce Policy Rule Description, Tag, and Audit
Comment
When creating or modifying rules, you can require a rule description, tag, and audit comment to
ensure your policy rulebase is correctly organized and grouped, and to preserve important rule
history for auditing purposes. By requiring a rule description, ta... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,127 | Policy
SB-, followed by a minimum six digits in a numerical expression with values from 0 to 9. For
example, SB-012345.
• (<Letter Expression>)|(<Letter Expression>)|(<Letter
Expression>)|-[0-9]{<Number of digits>}—Requires the audit comment to
contain a prefix using any one of the predetermined letter expressions with... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,128 | Policy
STEP 7 | Verify that the firewall is enforcing the new policy rulebase settings.
1. Select Policies and Add a new rule.
2. Confirm that you must add a tag and enter an audit comment click OK.
PAN-OS® Administrator’s Guide Version 10.2 1129 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,129 | Policy
Move or Clone a Policy Rule or Object to a Different
Virtual System
On a firewall that has more than one virtual system (vsys), you can move or clone policy rules and
objects to a different vsys or to the Shared location. Moving and cloning save you the effort of
deleting, recreating, or renaming rules and objec... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,130 | Policy
STEP 7 | Click OK to start the error validation. If the firewall displays errors, fix them and retry the
move or clone operation. If the firewall doesn’t find errors, the object is moved or cloned
successfully. After the operation finishes, click Commit.
PAN-OS® Administrator’s Guide Version 10.2 1131 ©2025 Palo... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,131 | Policy
Use an Address Object to Represent IP Addresses
Create an address object on the firewall to group IP addresses or to specify an FQDN, and then
reference the address object in a firewall policy rule, filter, or other function to avoid having to
individually specify multiple IP addresses in the rule, filter, or ot... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,132 | Policy
After you Create an Address Object:
• You can reference an address object of type IP Netmask, IP Range, or FQDN in a policy
rule for Security, Authentication, NAT, NAT64, Decryption, DoS Protection, Policy-Based
Forwarding (PBF), QoS, Application Override, or Tunnel Inspection; or in a NAT address pool,
VPN tunn... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,133 | Policy
firewall or Panorama). To change the address object type from FQDN to IP Netmask,
select an IP Netmask and click Use this address. The Type changes to IP Netmask and
the IP address you select appears in the text field.
3. (Optional) Enter one or more Use Tags to Group and Visually Distinguish Objects to
apply to... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,134 | Policy
Use Tags to Group and Visually Distinguish Objects
You can tag objects to group related items and add color to the tag in order to visually distinguish
them for easy scanning. You can create tags for the following objects: address objects, address
groups, user groups, zones, service groups, and policy rules.
The... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,135 | Policy
STEP 1 | Create tags.
To tag a zone, you must create a tag with the same name as the zone. When the zone
is attached in policy rules, the tag color automatically displays as the background color
against the zone name.
1. Select Objects > Tags.
2. On Panorama or a multiple virtual system firewall, select the Devi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,136 | Policy
Select Objects > Tags to perform any of the following operations with tags:
• Click the Name to edit the properties of a tag.
• Select a tag in the table and Delete the tag from the firewall.
• Clone a tag to duplicate it with the same properties. A numerical suffix is added to the tag
name (for example, FTP-1).... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,137 | Policy
STEP 4 | View your policy rulebase as groups.
1. (Panorama only) From the Device Group, select the device group rulebase to view or
view all Shared rules.
2. Click Policies and select the rulebase where you created the rules in Step 2.
3. Select the View Rulebase as Groups option (at the bottom).
Rules not assig... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,138 | Policy
Tag Browser
Tags allow you to identify the purpose or function of a policy rule and help you better organize
your policy rulebase. PAN-OS 10.2.5 introduces the ability to visually group and manage your
policy rulebase using the assigned tags. When viewing your policy rulebase using tags, you can
perform operatio... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,139 | Policy
STEP 4 | Select Policies and change the policy rulebase view from the Default View to Rulebase by
Tags.
(Panorama-managed firewalls) You must also select a Device Group for which to
manage the policy rulebase.
On the left-hand size, the Tag Browser is displayed and all tags applied to all rules in the policy
rul... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,140 | Policy
STEP 6 | Apply or remove tags from the Tag Browser.
The Tag Browser allows you to both apply a tag to policy rules within the policy rulebase, and
remove a tag from all policy rules where the tag is currently applied.
• Apply a tag from the Tag Browser
You can also drag and drop tags you want to apply from the T... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,141 | Policy
STEP 7 | Move tagged rules within your the policy rulebase.
You can use the Tag Browser to move multiple tagged rules at once to change the policy
rulebase hierarchy as needed.
1. Select the Rule Order Tag Browser display setting.
2. In the Tag Browser Rule Number column, expand the tag options and Move Rule(s).... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,142 | Policy
STEP 8 | Add a new policy rule from the Tag Browser.
You can add a new policy rule with tags already assigned directly from the Tag Browser. The
new policy rule is added as the lowest rule in the rule order based on the selected tag.
1. Select the Rule Order Tag Browser display setting.
2. In the Tag Browser Rul... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,143 | Policy
STEP 9 | Filter the policy rulebase using a tag.
In the Tag Browser Rule Number column, expand the tag options and Filter the policy
rulebase. This allows you to apply one or more tag search filters to the policy rulebase to
narrow down the list of policy rules displayed.
PAN-OS® Administrator’s Guide Version 10... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,144 | Policy
Use an External Dynamic List in Policy
An external dynamic list (formerly called dynamic block list) is a text file that you or another
source hosts on an external web server so that the firewall can import objects—IP addresses,
URLs, domains—to enforce policy on the entries in the list. As the list is updated, ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,145 | Policy
The following warning is displayed when the firewall is unable to connect or otherwise fetch the
most current external dynamic list information from the server.
Unable to fetch external list. Using old copy for refresh.
The firewall supports these types of external dynamic lists:
• Predefined IP Address—A predef... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,146 | Policy
• URL—This type of external dynamic list gives you the agility to protect your network from new
sources of threat or malware. The firewall handles an external dynamic list with URLs like a
custom URL category. You can use this list in two ways:
• As a match criterion in Security policy rules, decryption policy r... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,147 | Policy
Model URL List Entry Limits Domain List Entry Limits
PA-7000
appliances
with mixed
NPCs only
support the
standard
capacities.
VM-500, VM-700 100,000 2,000,000
PA-400 Series (excepting
the PA-410), PA-850,
PA-820, PA-3200 Series,
PA-3400 Series
100,000 1,000,000
PA-7000 Series (and
appliances upgraded with
the PA... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,148 | Policy
• When parsing the list, the firewall skips entries that do not match the list type and
ignores entries exceeding the maximum number supported for the model. To ensure
that the entries do not exceed the limit, check the number of entries currently used in
policy. Select Objects > External Dynamic Lists and click... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,149 | Policy
2001:db8:123:1::1 #test IPv6 address
192.168.20.0/24 ; test internal subnet
2001:db8:123:1::/64 test internal IPv6 range
192.168.20.40-192.168.20.50
For an IP address that is blocked, you can display a notification page only if the protocol is
HTTP.
Domain List
You can use placeholder characters in domain... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,150 | Policy
EDL Domain List Entry Matching Sites
docs.company.com
*.click all websites ending with a top-level domain
of .click.
When to use a caret (^) character:
Use carets (^) to indicate an exact match of a subdomain. For example,
^paloaltonetworks.com matches only paloaltonetworks.com. This entry does not match to
any ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,151 | Policy
Configure the Firewall to Access an External Dynamic List) and exclude entries from the list as
needed.
Configure the Firewall to Access an External Dynamic List
You must establish the connection between the firewall and the source that hosts the external
dynamic list before you can Enforce Policy on an External... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,152 | Policy
STEP 5 | (Optional) Select Shared to share the list with all virtual systems on a device that is enabled
for multiple virtual systems. By default, the object is created on the virtual system that is
currently selected in the Virtual Systems drop-down.
As a best practice, Palo Alto Networks recommends using share... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,153 | Policy
STEP 10 | Enable client authentication if the list source has an HTTPS URL and requires basic HTTP
authentication for list access.
1. Select Client Authentication.
2. Enter a valid Username to access the list.
3. Enter the Password and Confirm Password.
STEP 11 | (Not available on Panorama or for Predefined URL ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,154 | Policy
Configure the Firewall to Access an External Dynamic List from
the EDL Hosting Service
Configure the firewall to access an external dynamic list (EDL) from the EDL Hosting Service for
Software-as-a-Service (SaaS) applications
• Create an External Dynamic List Using the EDL Hosting Service
• Convert the GlobalSig... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,155 | Policy
STEP 2 | (Best Practices) Create a certificate profile to authenticate the EDL Hosting Service.
1. Download the GlobalSign Root R1 certificate.
2. Convert the GlobalSign Root R1 Certificate to PEM Format.
3. Launch the firewall web interface.
4. Import the GlobalSign Root R1 certificate.
1. Select Device > Certi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,156 | Policy
6. Commit.
PAN-OS® Administrator’s Guide Version 10.2 1157 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,157 | Policy
STEP 3 | Create an EDL using a Feed URL from the EDL Hosting Service.
1. Select Objects > External Dynamic Lists and Add a new EDL.
2. Enter a descriptive Name for the EDL.
3. Select the EDL Type.
• For an IP-based EDL, select IP List.
• For a URL-based EDL, select URL List.
4. (Optional) Enter a Description for... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,158 | Policy
STEP 4 | Enforce Policy on an External Dynamic List.
When you enforce policy on an EDL from the EDL Hosting Service where the EDL is the
source, be specific when configuring which users have access to the SaaS application to avoid
over-provisioning access to the application.
Leverage App-ID alongside EDLs in a p... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,159 | Policy
STEP 2 | Convert the certificate.
• Mac and Linux operating systems
1. Open the terminal and convert the GlobalSign Root R1 certificate you downloaded.
admin: openssl x509 -in <certificate-path>.crt -inform DER -out
<target-export-path>.pem -outform PEM
If no target export path is specified, the converted certi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,160 | Policy
Retrieve an External Dynamic List from the Web Server
When you Configure the Firewall to Access an External Dynamic List, you can configure the
firewall to retrieve the list from the web server on an hourly (default)five minute, daily, weekly,
or monthly basis. If you have added or deleted IP addresses from the ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,161 | Policy
STEP 3 | Click List Entries and Exceptions and view the objects that the firewall retrieved from the
list.
The list might be empty if:
• The EDL has not yet been applied to a Security policy rule. To apply an EDL to a Security
policy rule and populate the EDL, see Enforce Policy on an External Dynamic List.
• Th... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,162 | Policy
STEP 2 | Select up to 100 entries to exclude from the list and click Submit ( ) or manually Add a list
exception.
• You cannot save your changes to the external dynamic list if you have duplicate entries
in the Manual Exceptions list. To identify duplicate entries, look for entries with a red
underline.
• A manu... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,163 | Policy
Use an external dynamic list of URL type as match criteria in a Security policy rule.
1. Select Policies > Security.
2. Click Add, and enter a descriptive Name for the rule.
3. In the Source tab, select a Source Zone.
4. In the Destination tab, select a Destination Zone.
5. In the Service/URL Category tab, click... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,164 | Policy
Use an external dynamic list of IP address type as a Source or Destination Address Object in a
Security policy rule.
This capability is useful if you deploy new servers and want to allow access to the newly
deployed servers without requiring a firewall commit.
1. Select Policies > Security.
2. Click Add, and ent... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,165 | Policy
background traffic, such as updates and other trusted services. This ensures that the firewall
does not block the necessary traffic for these services and that application maintenance is not
interrupted.
1. Select Policies > Authentication.
2. In the Service/URL Category tab, select the predefined URL external d... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,166 | Policy
Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP), the server may
also fail authentication if:
• The certificate is revoked.
• The revocation status of the certificate is unknown.
• The connection times out as the firewall is attempting to connect to the CRL/OCSP service.
For more in... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,167 | Policy
STEP 2 | Enter the appropriate CLI command for the list type:
• IP Address
set external-list <external dynamic list name> type ip
certificate-profile None
• Domain
set external-list <external dynamic list name> type domain
certificate-profile None
• URL
set external-list <external dynamic list name> type url
... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,168 | Policy
Register IP Addresses and Tags Dynamically
To mitigate the challenges of scale, lack of flexibility, and performance, network architectures
today allow for virtual machines (VMs) and applications to be provisioned, changed, and deleted
on demand. This agility, though, poses a challenge for security administrator... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,169 | Policy
whenever the firewall generates a threat log, you can configure the firewall to tag the source
IP address in the threat log with a specific tag name. For more information, refer to Use AutoTagging to Automate Security Actions.
Additionally, you can configure the firewall to dynamically unregister a tag after a ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,170 | Policy
Use Dynamic User Groups in Policy
Dynamic user groups help you to create policy that provides auto-remediation for anomalous
user behavior and malicious activity while maintaining user visibility. After you create the group
and commit the changes, the firewall registers the users and associated tags then automat... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,171 | Policy
STEP 2 | Define the membership of the dynamic user group.
1. Enter a Name for the group.
2. (Optional) Enter a Description for the group.
3. Add Match Criteria using dynamic tags to define the members in the dynamic user
group.
4. (Optional) Use the And or Or operators with the tag(s) that you want to use to fil... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,172 | Policy
STEP 6 | (Optional) Refine the group’s membership and define the registration source for the user-totag mapping updates.
If the initial user-to-tag mapping retrieves users who should not be members or if it does not
include users who should be, modify the members of the group to include the users for whom
you w... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,173 | Policy
Use Auto-Tagging to Automate Security Actions
Auto-tagging allows the firewall or Panorama to tag a policy object when it receives a log that
matches specific criteria and establish IP address-to-tag or user-to-tag mapping. For example,
when the firewall generates a threat log, you can configure the firewall to ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,174 | Policy
STEP 4 | (Remote User-ID only) Configure an HTTP server profile to forward logs to a remote User-ID
agent.
1. Select Device > Server Profiles > HTTP.
2. Add a profile and specify a Name for the server profile.
3. (Virtual systems only) Select the Location. The profile can be Shared across all virtual
systems or ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,175 | Policy
STEP 9 | (Optional) Configure a timeout to remove the tag from the policy object after the specified
time has elapsed.
Specify the amount of time (in minutes) that passes before the firewall removes the tag from
the policy object. The range is from 0 to 43,200. If you set the timeout to zero, the IP addressto-t... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,176 | Policy
Monitor Changes in the Virtual Environment
To secure applications and prevent threats in an environment where new users and servers are
constantly emerging, your security policy must be nimble. To be nimble, the firewall must be
able to learn about new or modified IP addresses and consistently apply policy witho... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,177 | Policy
• When monitoring ESXi hosts that are part of the VM-Series NSX edition solution,
use Dynamic Address Groups instead of using VM Information Sources to learn about
changes in the virtual environment. For the VM-Series NSX edition solution, the NSX
Manager provides Panorama with information on the NSX security gr... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,178 | Policy
host cannot be accessed or does not respond, the firewall will close the connection to
the source.
• Add the credentials (Username and Password) to authenticate to the server specified
above.
• Define the Source—hostname or IP address.
• (Optional) Modify the Update interval to a value between 5-600 seconds. By ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,179 | Policy
VM Information Sources—On a hardware or a VM-Series firewall you can monitor virtual
machine instances and retrieves changes as you provision or modify the guests configured
on the monitored sources—AWS, ESXi or vCenter Server, or AWS. For each firewall (and/or
virtual system if your firewall has multiple virtua... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,180 | Policy
Attributes Monitored on a VMware Source
Guest OS
VM State — the power state can be poweredOff, poweredOn, standBy, and unknown.
Annotation
Version
Network — Virtual Switch Name, Port Group Name, and VLAN ID
Container Name —vCenter Name, Data Center Object Name, Resource Pool Name, Cluster
Name, Host, Host IP add... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,181 | Policy
Attributes
Monitored on the
AWS-VPC
VM Information Source on the
Firewall
AWS Plugin on Panorama
Owner ID No Yes
Placement—
Tenancy
Yes Yes
Placement—Group
Name
Yes Yes
Placement—
Availability Zone
Yes Yes
Private DNS Name Yes No
Public DNS Name Yes Yes
Subnet ID Yes Yes
Security Group ID No Yes
Security Group
N... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,182 | Policy
Attributes Monitored on Microsoft Azure Azure Plugin on Panorama
VM Name Yes
VM Size No
Network Security Group Name Yes
OS Type Yes
OS Publisher Yes
OS Offer Yes
OS SKU Yes
Subnet Yes
VNet Yes
Azure Region Yes
Resource Group Name Yes
Subscription ID Yes
User Defined Tags Yes
Up to a maximum of 15 user defined
ta... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,183 | Policy
Attributes Monitored on Google Compute Engine
Source (OS type)
Status
Subnetwork
VPC Network
Use Dynamic Address Groups in Policy
Dynamic Address Groups are used in policy. They allow you to create policy that automatically
adapts to changes—adds, moves, or deletions of servers. It also enables the flexibility t... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,184 | Policy
Model Maximum number of dynamically registered
IP addresses
PA-3430, PA-3440, PA-3200 Series,
VM-300
200,000
PA-3410, PA-3420 150,000
PA-7000 Series, PA-5450, PA-450,
PA-460
100,000
PA-440 50,000
PA-850, VM-100 2,500
PA-820, PA-410, PA-220, VM-50 1,000
An IP set, such as an IP range or subnet, is considered as a... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,185 | Policy
STEP 2 | Create Dynamic Address Groups on the firewall.
View the tutorial to see a big picture view of the feature.
1. Log in to the web interface of the firewall.
2. Select Object > Address Groups.
3. Click Add and enter a Name and a Description for the address group.
4. Select Type as Dynamic.
5. Define the ma... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,186 | Policy
STEP 4 | Use Dynamic Address Groups in policy.
View the tutorial.
1. Select Policies > Security.
2. Click Add and enter a Name and a Description for the policy.
3. Add the Source Zone to specify the zone from which the traffic originates.
4. Add the Destination Zone at which the traffic is terminating.
5. For th... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,187 | Policy
CLI Commands for Dynamic IP Addresses and Tags
The Command Line Interface on the firewall and Panorama give you a detailed view into the
different sources from which tags and IP addresses are dynamically registered. It also allows you
to audit registered and unregistered tags. The following examples illustrate t... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,188 | Policy
Example CLI Command
Display the count for IP addresses
registered from all sources. show object registered-ip all option
count
Clear IP addresses registered from all
sources debug object registered-ip clear all
Add or delete tags for a given IP
address that was registered using the
XML API.
debug object registe... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,189 | Policy
Example CLI Command
• To view tags registered from the XML API:
show log iptag datasource_type equ
al xml-api
• To view tags registered from VM Information
sources:
show log iptag datasource_type equ
al vm-monitor
• To view tags registered from the Windows UserID agent:
show log iptag datasource_type equ
al xml... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,190 | Policy
Enforce Policy on Endpoints and Users Behind an
Upstream Device
If you have an upstream device, such as an explicit proxy server or load balance, deployed
between the users on your network and the firewall, the firewall might see the upstream device IP
address as the source IP address in HTTP/HTTPS traffic that ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.