index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
1,091
Policy Thus, a single Security policy rule that uses an address object with wildcard address 10.132.1.2/0.0.2.255 as the destination address matches the addresses of 512 devices (256 cash registers + 256 printers), which is an efficient way to apply a rule to many devices. The wildcard mask must begin with at least one...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,092
Policy earlier releases, such a deployment did not work because only the match to the rule with the longest prefix in the wildcard mask was processed and other rules were not considered. Beginning with PAN-OS 10.2.1, you can enable Wildcard Top Down Match Mode so that if a packet with an IP address matches prefixes in ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,093
Policy Client B with source IP address 10.160 2.1 (0000 1010 1010 0000 0000 0010 0000 0001) does not fully match the address in Rule 1 and does not match the prefix in Rule 2. Client B’s address fully matches Rule 3, which is the first matching rule in top-down order. Assuming other rule criteria match, the packet from...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,094
Policy Create a Security Policy Rule Before you create a Security policy rule, make sure you understand that the set of IPv4 addresses is treated as a subset of the set of IPv6 addresses, as described in detail in Policy. STEP 1 | (Optional) Delete the default Security policy rule. By default, the firewall includes a s...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,095
Policy STEP 5 | Specify the application that the rule will allow or block. As a best practice, always use application-based security policy rules instead of port￾based rules and always set the Service to application-default unless you are using a more restrictive list of ports than the standard ports for an application...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,096
Policy STEP 10 | Click Commit to save the policy rule to the running configuration on the firewall. STEP 11 | To verify that you have set up your basic security policies effectively, test whether your security policy rules are being evaluated and determine which security policy rule applies to a traffic flow. The outpu...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,097
Policy Policy Objects A policy object is a single object or a collective unit that groups discrete identities such as IP addresses, URLs, applications, or users. With policy objects that are a collective unit, you can reference the object in security policy instead of manually selecting multiple objects one at a time. ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,098
Policy Policy Object Description or for a particular service, or to achieve a particular policy goal. See Create an Application Group. Service/Service Groups Allows you to specify the source and destination ports and protocol that a service can use. The firewall includes two pre-defined services —service-http and servi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,099
Policy Security Profiles While Security policy rules enable you to allow or block traffic on your network, Security Profiles help you define an allow but scan rule, which scans allowed applications for threats, such as virus, malware, spyware, and DDoS attacks. When traffic matches the allow rule defined in the Securit...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,100
Policy Profile Type Description default action is displayed in parentheses. For example, default (alert) in the threat or Anti-Spyware signature. • Allow—Permits the application traffic. The Allow action does not generate logs related to the signatures or profiles. • Alert—Generates an alert for each application traffi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,101
Policy Profile Type Description • Strict—Overrides the default action of critical, high, and medium severity threats to the block action, regardless of the action defined in the signature file. This profile still uses the default action for low and informational severity signatures. When the firewall detects a threat e...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,102
Policy Profile Type Description Anti-Spyware and Vulnerability Protection profiles are configured similarly. Vulnerability Protection Profiles Vulnerability Protection profiles stop attempts to exploit system flaws or gain unauthorized access to systems. While Anti-Spyware profiles help identify infected hosts as traff...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,103
Policy Profile Type Description • Reset Both—For TCP, resets the connection on both client and server ends. For UDP, drops the connection. In some cases, when the profile action is set to reset￾both, the associated threat log might display the action as reset-server. This occurs when the firewall detects a threat at th...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,104
Policy Profile Type Description To get started, Set Up Data Filtering. File Blocking Profiles The firewall uses file blocking profiles to block specified file types over specified applications and in the specified session flow direction (inbound/outbound/both). You can set the profile to alert or block on upload and/or...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,105
Policy Profile Type Description WildFire Analysis Profiles Use a WildFire Analysis profile to enable the firewall to forward unknown files or email links for WildFire analysis. Specify files to be forwarded for analysis based on application, file type, and transmission direction (upload or download). Files or email lin...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,106
Policy Profile Type Description When configuring DoS protection, it is important to analyze your environment to set the correct thresholds and due to some of the complexities of defining DoS protection policy rules, this guide will not go into detailed examples. Zone Protection Profiles Zone Protection Profiles provide...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,107
Policy STEP 1 | Create a security profile group. If you name the group default, the firewall will automatically attach it to any new rules you create. This is a time saver if you have a preferred set of security profiles that you want to make sure get attached to every new rule. 1. Select Objects > Security Profile Gro...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,108
Policy (the administrator can choose to manually select different profile settings if desired). Use the following options to set up a default security profile group or to override your default settings. If no default security profile exists, the profile settings for a new security policy are set to None by default. Cre...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,109
Policy Set up a default security profile group. 1. Select Objects > Security Profile Groups and add a new security profile group or modify an existing security profile group. 2. Name the security profile group default: 3. Click OK and Commit. 4. Confirm that the default security profile group is included in new securit...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,110
Policy solution and then log or block the files that your Data Filtering profile detects based on that pattern. Create a Data Filtering Profile Data Filtering profiles can keep sensitive information from leaving your network. To get started, you’ll first create a data pattern that specifies the information types and fi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,111
Policy This selection is cleared by default, which means administrators can override the settings for any device group that inherits the object. 5. (Optional—Panorama only) Select Data Capture to automatically collect the data that is blocked by the filter. Specify a password for Manage Data Protection on the Settings ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,112
Policy MIP Label, and enter the Azure Informatin Protect label GUID as the Property Value. 9. Click OK to save the data pattern. STEP 2 | Add the data pattern object to a data filtering profile. 1. Select Objects > Security Profiles > Data Filtering and Add or modify a data filtering profile. 2. Provide a descriptive N...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,113
Policy STEP 3 | Apply the data filtering settings to traffic. 1. Select Policies > Security and Add or modify a security policy rule. 2. Select Actions and set the Profile Type to Profiles. 3. Attach the Data Filtering profile you created in Step 2 to the security policy rule. 4. Click OK. STEP 4 | (Recommended) Preven...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,114
Policy If the type of information you want to protect is not covered in the list of predefined patterns, you can use regular expressions to create custom patterns. The following is a list of available data patterns: Pattern Description Credit Card Numbers 16-digit credit card numbers Social Security Numbers 9-digit soc...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,115
Policy Pattern Description CUSIP Identification Number Committee on Uniform Security Identification Procedures Identification Number DEA Registration Number U.S. Drug Enforcement Administration Registration Number DNI Identification Number Spanish Documento nacional de identidad Identification Number number HK Identifi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,116
Policy Set Up File Blocking File Blocking Profiles allow you to identify specific file types that you want to want to block or monitor. For most traffic (including traffic on your internal network), block files that are known to carry threats or that have no real use case for upload/download. Currently, these include b...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,117
Policy STEP 1 | Create the file blocking profile. 1. Select Objects > Security Profiles > File Blocking and Add a profile. 2. Enter a Name for the file blocking profile such as Block_EXE. 3. (Optional) Enter a Description, such as Block users from downloading exe files from websites. 4. (Optional) Specify that the prof...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,118
Policy STEP 4 | To test your file blocking configuration, access an endpoint PC in the trust zone of the firewall and attempt to download an executable file from a website in the untrust zone; a response page should display. Click Continue to confirm that you can download the file. You can also set other actions, such ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,119
Policy Track Rules Within a Rulebase To keep track of rules within a rulebase, you can refer to the rule number, which changes depending on the order of a rule in the rulebase. The rule number determines the order in which the firewall applies the rule. The universally unique identifier (UUID) for a rule never changes ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,120
Policy View the numbered list of rules on Panorama. Select Policies and any rulebase under it. For example, Policies > Security > Pre-rules. After you push the rules from Panorama, view the complete list of rules with numbers on the firewall. From the web interface on the firewall, select Policies and pick any rulebase...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,121
Policy Rule UUIDs The universally unique identifier (UUID) for a rule is a 32-character string (based on data such as the network address and the timestamp of creation) that the firewall or Panorama assigns to the rule. The UUID uses the format 8-4-4-4-12 (where 8, 4, and 12 represent the number of unique characters se...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,122
Policy • To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load the named Panorama configuration snapshot. If you do not select this option, Panorama removes all previous rule UUIDs from the configuration snapshot and assigns new UUIDs to the rules on Panorama, which means it does not retain informat...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,123
Policy Display the Rule UUID column for logs and the UUID column for policy rules. To view the UUIDs, you must display the column, which does not display by default. • To display the UUID in logs: 1. Select Monitor and then expand the column header ( ). 2. Select Columns. 3. Enable Rule UUID. • To display UUIDs on the ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,124
Policy PAN-OS® Administrator’s Guide Version 10.2 1125 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,125
Policy Copy the UUID for a log or policy rule. Copying the UUID allows you to paste the UUID in to searches, the ACC, custom reports, filters, and anywhere else you want to locate a rule identified by that UUID. 1. Select the ellipses that display when you move your cursor over the entry in the Rule UUID column. 2. Cop...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,126
Policy Enforce Policy Rule Description, Tag, and Audit Comment When creating or modifying rules, you can require a rule description, tag, and audit comment to ensure your policy rulebase is correctly organized and grouped, and to preserve important rule history for auditing purposes. By requiring a rule description, ta...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,127
Policy SB-, followed by a minimum six digits in a numerical expression with values from 0 to 9. For example, SB-012345. • (<Letter Expression>)|(<Letter Expression>)|(<Letter Expression>)|-[0-9]{<Number of digits>}—Requires the audit comment to contain a prefix using any one of the predetermined letter expressions with...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,128
Policy STEP 7 | Verify that the firewall is enforcing the new policy rulebase settings. 1. Select Policies and Add a new rule. 2. Confirm that you must add a tag and enter an audit comment click OK. PAN-OS® Administrator’s Guide Version 10.2 1129 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,129
Policy Move or Clone a Policy Rule or Object to a Different Virtual System On a firewall that has more than one virtual system (vsys), you can move or clone policy rules and objects to a different vsys or to the Shared location. Moving and cloning save you the effort of deleting, recreating, or renaming rules and objec...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,130
Policy STEP 7 | Click OK to start the error validation. If the firewall displays errors, fix them and retry the move or clone operation. If the firewall doesn’t find errors, the object is moved or cloned successfully. After the operation finishes, click Commit. PAN-OS® Administrator’s Guide Version 10.2 1131 ©2025 Palo...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,131
Policy Use an Address Object to Represent IP Addresses Create an address object on the firewall to group IP addresses or to specify an FQDN, and then reference the address object in a firewall policy rule, filter, or other function to avoid having to individually specify multiple IP addresses in the rule, filter, or ot...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,132
Policy After you Create an Address Object: • You can reference an address object of type IP Netmask, IP Range, or FQDN in a policy rule for Security, Authentication, NAT, NAT64, Decryption, DoS Protection, Policy-Based Forwarding (PBF), QoS, Application Override, or Tunnel Inspection; or in a NAT address pool, VPN tunn...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,133
Policy firewall or Panorama). To change the address object type from FQDN to IP Netmask, select an IP Netmask and click Use this address. The Type changes to IP Netmask and the IP address you select appears in the text field. 3. (Optional) Enter one or more Use Tags to Group and Visually Distinguish Objects to apply to...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,134
Policy Use Tags to Group and Visually Distinguish Objects You can tag objects to group related items and add color to the tag in order to visually distinguish them for easy scanning. You can create tags for the following objects: address objects, address groups, user groups, zones, service groups, and policy rules. The...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,135
Policy STEP 1 | Create tags. To tag a zone, you must create a tag with the same name as the zone. When the zone is attached in policy rules, the tag color automatically displays as the background color against the zone name. 1. Select Objects > Tags. 2. On Panorama or a multiple virtual system firewall, select the Devi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,136
Policy Select Objects > Tags to perform any of the following operations with tags: • Click the Name to edit the properties of a tag. • Select a tag in the table and Delete the tag from the firewall. • Clone a tag to duplicate it with the same properties. A numerical suffix is added to the tag name (for example, FTP-1)....
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,137
Policy STEP 4 | View your policy rulebase as groups. 1. (Panorama only) From the Device Group, select the device group rulebase to view or view all Shared rules. 2. Click Policies and select the rulebase where you created the rules in Step 2. 3. Select the View Rulebase as Groups option (at the bottom). Rules not assig...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,138
Policy Tag Browser Tags allow you to identify the purpose or function of a policy rule and help you better organize your policy rulebase. PAN-OS 10.2.5 introduces the ability to visually group and manage your policy rulebase using the assigned tags. When viewing your policy rulebase using tags, you can perform operatio...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,139
Policy STEP 4 | Select Policies and change the policy rulebase view from the Default View to Rulebase by Tags. (Panorama-managed firewalls) You must also select a Device Group for which to manage the policy rulebase. On the left-hand size, the Tag Browser is displayed and all tags applied to all rules in the policy rul...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,140
Policy STEP 6 | Apply or remove tags from the Tag Browser. The Tag Browser allows you to both apply a tag to policy rules within the policy rulebase, and remove a tag from all policy rules where the tag is currently applied. • Apply a tag from the Tag Browser You can also drag and drop tags you want to apply from the T...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,141
Policy STEP 7 | Move tagged rules within your the policy rulebase. You can use the Tag Browser to move multiple tagged rules at once to change the policy rulebase hierarchy as needed. 1. Select the Rule Order Tag Browser display setting. 2. In the Tag Browser Rule Number column, expand the tag options and Move Rule(s)....
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,142
Policy STEP 8 | Add a new policy rule from the Tag Browser. You can add a new policy rule with tags already assigned directly from the Tag Browser. The new policy rule is added as the lowest rule in the rule order based on the selected tag. 1. Select the Rule Order Tag Browser display setting. 2. In the Tag Browser Rul...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,143
Policy STEP 9 | Filter the policy rulebase using a tag. In the Tag Browser Rule Number column, expand the tag options and Filter the policy rulebase. This allows you to apply one or more tag search filters to the policy rulebase to narrow down the list of policy rules displayed. PAN-OS® Administrator’s Guide Version 10...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,144
Policy Use an External Dynamic List in Policy An external dynamic list (formerly called dynamic block list) is a text file that you or another source hosts on an external web server so that the firewall can import objects—IP addresses, URLs, domains—to enforce policy on the entries in the list. As the list is updated, ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,145
Policy The following warning is displayed when the firewall is unable to connect or otherwise fetch the most current external dynamic list information from the server. Unable to fetch external list. Using old copy for refresh. The firewall supports these types of external dynamic lists: • Predefined IP Address—A predef...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,146
Policy • URL—This type of external dynamic list gives you the agility to protect your network from new sources of threat or malware. The firewall handles an external dynamic list with URLs like a custom URL category. You can use this list in two ways: • As a match criterion in Security policy rules, decryption policy r...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,147
Policy Model URL List Entry Limits Domain List Entry Limits PA-7000 appliances with mixed NPCs only support the standard capacities. VM-500, VM-700 100,000 2,000,000 PA-400 Series (excepting the PA-410), PA-850, PA-820, PA-3200 Series, PA-3400 Series 100,000 1,000,000 PA-7000 Series (and appliances upgraded with the PA...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,148
Policy • When parsing the list, the firewall skips entries that do not match the list type and ignores entries exceeding the maximum number supported for the model. To ensure that the entries do not exceed the limit, check the number of entries currently used in policy. Select Objects > External Dynamic Lists and click...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,149
Policy 2001:db8:123:1::1 #test IPv6 address 192.168.20.0/24 ; test internal subnet 2001:db8:123:1::/64 test internal IPv6 range 192.168.20.40-192.168.20.50 For an IP address that is blocked, you can display a notification page only if the protocol is HTTP. Domain List You can use placeholder characters in domain...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,150
Policy EDL Domain List Entry Matching Sites docs.company.com *.click all websites ending with a top-level domain of .click. When to use a caret (^) character: Use carets (^) to indicate an exact match of a subdomain. For example, ^paloaltonetworks.com matches only paloaltonetworks.com. This entry does not match to any ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,151
Policy Configure the Firewall to Access an External Dynamic List) and exclude entries from the list as needed. Configure the Firewall to Access an External Dynamic List You must establish the connection between the firewall and the source that hosts the external dynamic list before you can Enforce Policy on an External...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,152
Policy STEP 5 | (Optional) Select Shared to share the list with all virtual systems on a device that is enabled for multiple virtual systems. By default, the object is created on the virtual system that is currently selected in the Virtual Systems drop-down. As a best practice, Palo Alto Networks recommends using share...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,153
Policy STEP 10 | Enable client authentication if the list source has an HTTPS URL and requires basic HTTP authentication for list access. 1. Select Client Authentication. 2. Enter a valid Username to access the list. 3. Enter the Password and Confirm Password. STEP 11 | (Not available on Panorama or for Predefined URL ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,154
Policy Configure the Firewall to Access an External Dynamic List from the EDL Hosting Service Configure the firewall to access an external dynamic list (EDL) from the EDL Hosting Service for Software-as-a-Service (SaaS) applications • Create an External Dynamic List Using the EDL Hosting Service • Convert the GlobalSig...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,155
Policy STEP 2 | (Best Practices) Create a certificate profile to authenticate the EDL Hosting Service. 1. Download the GlobalSign Root R1 certificate. 2. Convert the GlobalSign Root R1 Certificate to PEM Format. 3. Launch the firewall web interface. 4. Import the GlobalSign Root R1 certificate. 1. Select Device > Certi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,156
Policy 6. Commit. PAN-OS® Administrator’s Guide Version 10.2 1157 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,157
Policy STEP 3 | Create an EDL using a Feed URL from the EDL Hosting Service. 1. Select Objects > External Dynamic Lists and Add a new EDL. 2. Enter a descriptive Name for the EDL. 3. Select the EDL Type. • For an IP-based EDL, select IP List. • For a URL-based EDL, select URL List. 4. (Optional) Enter a Description for...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,158
Policy STEP 4 | Enforce Policy on an External Dynamic List. When you enforce policy on an EDL from the EDL Hosting Service where the EDL is the source, be specific when configuring which users have access to the SaaS application to avoid over-provisioning access to the application. Leverage App-ID alongside EDLs in a p...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,159
Policy STEP 2 | Convert the certificate. • Mac and Linux operating systems 1. Open the terminal and convert the GlobalSign Root R1 certificate you downloaded. admin: openssl x509 -in <certificate-path>.crt -inform DER -out <target-export-path>.pem -outform PEM If no target export path is specified, the converted certi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,160
Policy Retrieve an External Dynamic List from the Web Server When you Configure the Firewall to Access an External Dynamic List, you can configure the firewall to retrieve the list from the web server on an hourly (default)five minute, daily, weekly, or monthly basis. If you have added or deleted IP addresses from the ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,161
Policy STEP 3 | Click List Entries and Exceptions and view the objects that the firewall retrieved from the list. The list might be empty if: • The EDL has not yet been applied to a Security policy rule. To apply an EDL to a Security policy rule and populate the EDL, see Enforce Policy on an External Dynamic List. • Th...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,162
Policy STEP 2 | Select up to 100 entries to exclude from the list and click Submit ( ) or manually Add a list exception. • You cannot save your changes to the external dynamic list if you have duplicate entries in the Manual Exceptions list. To identify duplicate entries, look for entries with a red underline. • A manu...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,163
Policy Use an external dynamic list of URL type as match criteria in a Security policy rule. 1. Select Policies > Security. 2. Click Add, and enter a descriptive Name for the rule. 3. In the Source tab, select a Source Zone. 4. In the Destination tab, select a Destination Zone. 5. In the Service/URL Category tab, click...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,164
Policy Use an external dynamic list of IP address type as a Source or Destination Address Object in a Security policy rule. This capability is useful if you deploy new servers and want to allow access to the newly deployed servers without requiring a firewall commit. 1. Select Policies > Security. 2. Click Add, and ent...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,165
Policy background traffic, such as updates and other trusted services. This ensures that the firewall does not block the necessary traffic for these services and that application maintenance is not interrupted. 1. Select Policies > Authentication. 2. In the Service/URL Category tab, select the predefined URL external d...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,166
Policy Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP), the server may also fail authentication if: • The certificate is revoked. • The revocation status of the certificate is unknown. • The connection times out as the firewall is attempting to connect to the CRL/OCSP service. For more in...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,167
Policy STEP 2 | Enter the appropriate CLI command for the list type: • IP Address set external-list <external dynamic list name> type ip certificate-profile None • Domain set external-list <external dynamic list name> type domain certificate-profile None • URL set external-list <external dynamic list name> type url ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,168
Policy Register IP Addresses and Tags Dynamically To mitigate the challenges of scale, lack of flexibility, and performance, network architectures today allow for virtual machines (VMs) and applications to be provisioned, changed, and deleted on demand. This agility, though, poses a challenge for security administrator...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,169
Policy whenever the firewall generates a threat log, you can configure the firewall to tag the source IP address in the threat log with a specific tag name. For more information, refer to Use Auto￾Tagging to Automate Security Actions. Additionally, you can configure the firewall to dynamically unregister a tag after a ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,170
Policy Use Dynamic User Groups in Policy Dynamic user groups help you to create policy that provides auto-remediation for anomalous user behavior and malicious activity while maintaining user visibility. After you create the group and commit the changes, the firewall registers the users and associated tags then automat...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,171
Policy STEP 2 | Define the membership of the dynamic user group. 1. Enter a Name for the group. 2. (Optional) Enter a Description for the group. 3. Add Match Criteria using dynamic tags to define the members in the dynamic user group. 4. (Optional) Use the And or Or operators with the tag(s) that you want to use to fil...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,172
Policy STEP 6 | (Optional) Refine the group’s membership and define the registration source for the user-to￾tag mapping updates. If the initial user-to-tag mapping retrieves users who should not be members or if it does not include users who should be, modify the members of the group to include the users for whom you w...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,173
Policy Use Auto-Tagging to Automate Security Actions Auto-tagging allows the firewall or Panorama to tag a policy object when it receives a log that matches specific criteria and establish IP address-to-tag or user-to-tag mapping. For example, when the firewall generates a threat log, you can configure the firewall to ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,174
Policy STEP 4 | (Remote User-ID only) Configure an HTTP server profile to forward logs to a remote User-ID agent. 1. Select Device > Server Profiles > HTTP. 2. Add a profile and specify a Name for the server profile. 3. (Virtual systems only) Select the Location. The profile can be Shared across all virtual systems or ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,175
Policy STEP 9 | (Optional) Configure a timeout to remove the tag from the policy object after the specified time has elapsed. Specify the amount of time (in minutes) that passes before the firewall removes the tag from the policy object. The range is from 0 to 43,200. If you set the timeout to zero, the IP address￾to-t...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,176
Policy Monitor Changes in the Virtual Environment To secure applications and prevent threats in an environment where new users and servers are constantly emerging, your security policy must be nimble. To be nimble, the firewall must be able to learn about new or modified IP addresses and consistently apply policy witho...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,177
Policy • When monitoring ESXi hosts that are part of the VM-Series NSX edition solution, use Dynamic Address Groups instead of using VM Information Sources to learn about changes in the virtual environment. For the VM-Series NSX edition solution, the NSX Manager provides Panorama with information on the NSX security gr...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,178
Policy host cannot be accessed or does not respond, the firewall will close the connection to the source. • Add the credentials (Username and Password) to authenticate to the server specified above. • Define the Source—hostname or IP address. • (Optional) Modify the Update interval to a value between 5-600 seconds. By ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,179
Policy VM Information Sources—On a hardware or a VM-Series firewall you can monitor virtual machine instances and retrieves changes as you provision or modify the guests configured on the monitored sources—AWS, ESXi or vCenter Server, or AWS. For each firewall (and/or virtual system if your firewall has multiple virtua...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,180
Policy Attributes Monitored on a VMware Source Guest OS VM State — the power state can be poweredOff, poweredOn, standBy, and unknown. Annotation Version Network — Virtual Switch Name, Port Group Name, and VLAN ID Container Name —vCenter Name, Data Center Object Name, Resource Pool Name, Cluster Name, Host, Host IP add...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,181
Policy Attributes Monitored on the AWS-VPC VM Information Source on the Firewall AWS Plugin on Panorama Owner ID No Yes Placement— Tenancy Yes Yes Placement—Group Name Yes Yes Placement— Availability Zone Yes Yes Private DNS Name Yes No Public DNS Name Yes Yes Subnet ID Yes Yes Security Group ID No Yes Security Group N...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,182
Policy Attributes Monitored on Microsoft Azure Azure Plugin on Panorama VM Name Yes VM Size No Network Security Group Name Yes OS Type Yes OS Publisher Yes OS Offer Yes OS SKU Yes Subnet Yes VNet Yes Azure Region Yes Resource Group Name Yes Subscription ID Yes User Defined Tags Yes Up to a maximum of 15 user defined ta...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,183
Policy Attributes Monitored on Google Compute Engine Source (OS type) Status Subnetwork VPC Network Use Dynamic Address Groups in Policy Dynamic Address Groups are used in policy. They allow you to create policy that automatically adapts to changes—adds, moves, or deletions of servers. It also enables the flexibility t...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,184
Policy Model Maximum number of dynamically registered IP addresses PA-3430, PA-3440, PA-3200 Series, VM-300 200,000 PA-3410, PA-3420 150,000 PA-7000 Series, PA-5450, PA-450, PA-460 100,000 PA-440 50,000 PA-850, VM-100 2,500 PA-820, PA-410, PA-220, VM-50 1,000 An IP set, such as an IP range or subnet, is considered as a...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,185
Policy STEP 2 | Create Dynamic Address Groups on the firewall. View the tutorial to see a big picture view of the feature. 1. Log in to the web interface of the firewall. 2. Select Object > Address Groups. 3. Click Add and enter a Name and a Description for the address group. 4. Select Type as Dynamic. 5. Define the ma...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,186
Policy STEP 4 | Use Dynamic Address Groups in policy. View the tutorial. 1. Select Policies > Security. 2. Click Add and enter a Name and a Description for the policy. 3. Add the Source Zone to specify the zone from which the traffic originates. 4. Add the Destination Zone at which the traffic is terminating. 5. For th...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,187
Policy CLI Commands for Dynamic IP Addresses and Tags The Command Line Interface on the firewall and Panorama give you a detailed view into the different sources from which tags and IP addresses are dynamically registered. It also allows you to audit registered and unregistered tags. The following examples illustrate t...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,188
Policy Example CLI Command Display the count for IP addresses registered from all sources. show object registered-ip all option count Clear IP addresses registered from all sources debug object registered-ip clear all Add or delete tags for a given IP address that was registered using the XML API. debug object registe...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,189
Policy Example CLI Command • To view tags registered from the XML API: show log iptag datasource_type equ al xml-api • To view tags registered from VM Information sources: show log iptag datasource_type equ al vm-monitor • To view tags registered from the Windows User￾ID agent: show log iptag datasource_type equ al xml...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,190
Policy Enforce Policy on Endpoints and Users Behind an Upstream Device If you have an upstream device, such as an explicit proxy server or load balance, deployed between the users on your network and the firewall, the firewall might see the upstream device IP address as the source IP address in HTTP/HTTPS traffic that ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf