Pan Os Web Interface Help
Pan Os Web Interface Help
Version 10.1
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2021 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
October 6, 2021
Dashboard...........................................................................................................45
Dashboard Widgets..................................................................................................................................47
ACC.......................................................................................................................49
A First Glance at the ACC......................................................................................................................51
ACC Tabs.................................................................................................................................................... 53
ACC Widgets..............................................................................................................................................54
ACC Actions............................................................................................................................................... 56
Working with Tabs and Widgets............................................................................................. 56
Working with Filters—Local Filters and Global Filters........................................................ 57
Monitor................................................................................................................59
Monitor > Logs.......................................................................................................................................... 61
Log Types....................................................................................................................................... 61
Log Actions.................................................................................................................................... 66
Monitor > External Logs......................................................................................................................... 69
Monitor > Automated Correlation Engine..........................................................................................70
Monitor > Automated Correlation Engine > Correlation Objects.................................... 70
Monitor > Automated Correlation Engine > Correlated Events....................................... 71
Monitor > Packet Capture......................................................................................................................73
Packet Capture Overview.......................................................................................................... 73
Building Blocks for a Custom Packet Capture...................................................................... 74
Enable Threat Packet Capture.................................................................................................. 76
Monitor > App Scope.............................................................................................................................. 78
App Scope Overview...................................................................................................................78
App Scope Summary Report..................................................................................................... 78
App Scope Change Monitor Report........................................................................................ 79
App Scope Threat Monitor Report.......................................................................................... 81
App Scope Threat Map Report.................................................................................................83
Policies...............................................................................................................105
Policy Types............................................................................................................................................. 107
Move or Clone a Policy Rule...............................................................................................................108
Audit Comment Archive....................................................................................................................... 109
Audit Comments........................................................................................................................ 109
Config Logs (between commits).............................................................................................109
Rule Changes.............................................................................................................................. 110
Rule Usage Hit Count Query.............................................................................................................. 111
Device Rule Usage for Rule Hit Count Query....................................................................112
Policies > Security.................................................................................................................................. 113
Security Policy Overview.........................................................................................................113
Building Blocks in a Security Policy Rule.............................................................................114
Creating and Managing Policies.............................................................................................123
Overriding or Reverting a Security Policy Rule..................................................................126
Applications and Usage............................................................................................................ 128
Security Policy Optimizer........................................................................................................ 132
Policies > NAT.........................................................................................................................................135
NAT Policies General Tab........................................................................................................135
NAT Original Packet Tab......................................................................................................... 136
NAT Translated Packet Tab.................................................................................................... 137
NAT Active/Active HA Binding Tab..................................................................................... 139
NAT Target Tab......................................................................................................................... 140
Policies > QoS......................................................................................................................................... 141
Policies > Policy Based Forwarding................................................................................................... 145
Policy Based Forwarding General Tab................................................................................. 145
Policy Based Forwarding Source Tab................................................................................... 146
Policy Based Forwarding Destination/Application/Service Tab.....................................147
Policy Based Forwarding Forwarding Tab...........................................................................147
Policy Based Forwarding Target Tab....................................................................................149
Policies > Decryption............................................................................................................................ 150
Decryption General Tab...........................................................................................................150
Decryption Source Tab.............................................................................................................151
Decryption Destination Tab....................................................................................................152
Decryption Service/URL Category Tab................................................................................152
Decryption Options Tab.......................................................................................................... 153
Decryption Target Tab............................................................................................................. 154
iv TABLE OF CONTENTS
Policies > Network Packet Broker..................................................................................................... 155
Network Packet Broker General Tab....................................................................................155
Network Packet Broker Source Tab..................................................................................... 156
Network Packet Broker Destination Tab.............................................................................157
Network Packet Broker Application/Service/Traffic Tab................................................ 157
Network Packet Broker Path Selection Tab....................................................................... 158
Network Packet Broker Policy Optimizer Rule Usage......................................................158
Policies > Tunnel Inspection................................................................................................................160
Building Blocks in a Tunnel Inspection Policy.................................................................... 160
Policies > Application Override.......................................................................................................... 166
Application Override General Tab.........................................................................................166
Application Override Source Tab...........................................................................................167
Application Override Destination Tab..................................................................................168
Application Override Protocol/Application Tab.................................................................168
Application Override Target Tab........................................................................................... 168
Policies > Authentication......................................................................................................................170
Building Blocks of an Authentication Policy Rule..............................................................170
Create and Manage Authentication Policy..........................................................................175
Policies > DoS Protection.................................................................................................................... 176
DoS Protection General Tab...................................................................................................176
DoS Protection Source Tab.....................................................................................................177
DoS Protection Destination Tab............................................................................................178
DoS Protection Option/Protection Tab............................................................................... 178
DoS Protection Target Tab..................................................................................................... 180
Policies > SD-WAN................................................................................................................................181
SD-WAN General Tab.............................................................................................................. 181
SD-WAN Source Tab................................................................................................................182
SD-WAN Destination Tab....................................................................................................... 183
SD-WAN Application/Service Tab........................................................................................ 183
SD-WAN Path Selection Tab..................................................................................................184
SD-WAN Target Tab.................................................................................................................185
Objects.............................................................................................................. 187
Move, Clone, Override, or Revert Objects...................................................................................... 189
Move or Clone an Object........................................................................................................189
Override or Revert an Object.................................................................................................189
Objects > Addresses..............................................................................................................................191
Objects > Address Groups................................................................................................................... 193
Objects > Regions.................................................................................................................................. 195
Objects > Dynamic User Groups........................................................................................................196
Objects > Applications.......................................................................................................................... 198
Applications Overview..............................................................................................................198
Actions Supported on Applications.......................................................................................202
Defining Applications................................................................................................................205
Objects > Application Groups............................................................................................................. 209
Objects > Application Filters............................................................................................................... 210
Objects > Services..................................................................................................................................211
Objects > Service Groups.....................................................................................................................213
Objects > Tags........................................................................................................................................ 214
Create Tags................................................................................................................................. 214
View Rulebase as Groups........................................................................................................ 215
Manage Tags............................................................................................................................... 218
Objects > Devices.................................................................................................................................. 221
Objects > External Dynamic Lists...................................................................................................... 222
TABLE OF CONTENTS v
Objects > Custom Objects...................................................................................................................227
Objects > Custom Objects > Data Patterns....................................................................... 227
Objects > Custom Objects > Spyware/Vulnerability.....................................................................233
Objects > Custom Objects > URL Category....................................................................................237
Objects > Security Profiles.................................................................................................................. 239
Actions in Security Profiles..................................................................................................... 239
Objects > Security Profiles > Antivirus.............................................................................................243
Objects > Security Profiles > Anti-Spyware Profile.......................................................................246
Objects > Security Profiles > Vulnerability Protection................................................................. 251
Objects > Security Profiles > URL Filtering..................................................................................... 255
URL Filtering General Settings............................................................................................... 255
URL Filtering Categories.......................................................................................................... 256
URL Filtering Settings............................................................................................................... 258
User Credential Detection.......................................................................................................259
HTTP Header Insertion............................................................................................................ 261
URL Filtering Inline ML............................................................................................................ 262
Objects > Security Profiles > File Blocking......................................................................................264
Objects > Security Profiles > WildFire Analysis............................................................................. 266
Objects > Security Profiles > Data Filtering.................................................................................... 268
Objects > Security Profiles > DoS Protection.................................................................................270
Objects > Security Profiles > Mobile Network Protection...........................................................274
Objects > Security Profiles > SCTP Protection...............................................................................280
Objects > Security Profile Groups..................................................................................................... 285
Objects > Log Forwarding....................................................................................................................286
Objects > Authentication..................................................................................................................... 289
Objects > Decryption Profile...............................................................................................................291
Decryption Profile General Settings..................................................................................... 291
Settings to Control Decrypted Traffic..................................................................................292
Settings to Control Traffic that is not Decrypted..............................................................297
Settings to Control Decrypted SSH Traffic.........................................................................298
Objects > Packet Broker Profile......................................................................................................... 300
Objects > SD-WAN Link Management.............................................................................................303
Objects > SD-WAN Link Management > Path Quality Profile....................................... 303
Objects > SD-WAN Link Management > SaaS Quality Profile.......................................304
Objects > SD-WAN Link Management > Traffic Distribution-Profile...........................305
Objects > SD-WAN Link Management > Error Correction Profile................................ 306
Objects > Schedules.............................................................................................................................. 308
Network............................................................................................................ 309
Network > Interfaces.............................................................................................................................311
Firewall Interfaces Overview.................................................................................................. 311
Common Building Blocks for Firewall Interfaces...............................................................312
Common Building Blocks for PA-7000 Series Firewall Interfaces................................. 313
Tap Interface............................................................................................................................... 314
HA Interface................................................................................................................................315
Virtual Wire Interface............................................................................................................... 315
Virtual Wire Subinterface........................................................................................................ 317
PA-7000 Series Layer 2 Interface......................................................................................... 317
PA-7000 Series Layer 2 Subinterface.................................................................................. 319
PA-7000 Series Layer 3 Interface......................................................................................... 319
Layer 3 Interface........................................................................................................................330
Layer 3 Subinterface................................................................................................................. 339
Log Card Interface.....................................................................................................................348
Log Card Subinterface.............................................................................................................. 349
vi TABLE OF CONTENTS
Decrypt Mirror Interface......................................................................................................... 350
Aggregate Ethernet (AE) Interface Group........................................................................... 351
Aggregate Ethernet (AE) Interface........................................................................................ 354
Network > Interfaces > VLAN............................................................................................................ 360
Network > Interfaces > Loopback..................................................................................................... 368
Network > Interfaces > Tunnel...........................................................................................................370
Network > Interfaces > SD-WAN......................................................................................................372
Network > Zones....................................................................................................................................373
Security Zone Overview.......................................................................................................... 373
Building Blocks of Security Zones......................................................................................... 373
Network > VLANs.................................................................................................................................. 376
Network > Virtual Wires...................................................................................................................... 377
Network > Virtual Routers...................................................................................................................378
General Settings of a Virtual Router.....................................................................................378
Static Routes............................................................................................................................... 379
Route Redistribution................................................................................................................. 381
RIP..................................................................................................................................................383
OSPF..............................................................................................................................................385
OSPFv3.........................................................................................................................................390
BGP................................................................................................................................................395
IP Multicast..................................................................................................................................408
ECMP............................................................................................................................................ 412
More Runtime Stats for a Virtual Router............................................................................ 414
More Runtime Stats for a Logical Router............................................................................ 424
Network > Routing > Logical Routers...............................................................................................429
General Settings of a Logical Router.................................................................................... 429
Static Routes for a Logical Router.........................................................................................432
BGP Routing for a Logical Router......................................................................................... 434
Network > Routing > Routing Profiles > BGP....................................................................437
Network > IPSec Tunnels.....................................................................................................................441
IPSec VPN Tunnel Management............................................................................................441
IPSec Tunnel General Tab....................................................................................................... 441
IPSec Tunnel Proxy IDs Tab................................................................................................... 444
IPSec Tunnel Status on the Firewall..................................................................................... 445
IPSec Tunnel Restart or Refresh............................................................................................445
Network > GRE Tunnels.......................................................................................................................446
GRE Tunnels................................................................................................................................446
Network > DHCP................................................................................................................................... 448
DHCP Overview.........................................................................................................................448
DHCP Addressing...................................................................................................................... 448
DHCP Server...............................................................................................................................449
DHCP Relay.................................................................................................................................452
DHCP Client................................................................................................................................452
Network > DNS Proxy.......................................................................................................................... 454
DNS Proxy Overview................................................................................................................454
DNS Proxy Settings...................................................................................................................455
Additional DNS Proxy Actions............................................................................................... 457
Network > QoS.......................................................................................................................................458
QoS Interface Settings............................................................................................................. 458
QoS Interface Statistics............................................................................................................460
Network > LLDP.....................................................................................................................................461
LLDP Overview.......................................................................................................................... 461
Building Blocks of LLDP...........................................................................................................461
Network > Network Profiles............................................................................................................... 464
Network > Network Profiles > GlobalProtect IPSec Crypto...........................................464
Device................................................................................................................501
Device > Setup........................................................................................................................................503
Device > Setup > Management.......................................................................................................... 504
Device > Setup > Operations..............................................................................................................529
Enable SNMP Monitoring........................................................................................................ 535
Device > Setup > HSM.........................................................................................................................538
Hardware Security Module Provider Settings.................................................................... 538
HSM Authentication..................................................................................................................539
Hardware Security Operations...............................................................................................539
Hardware Security Module Provider Configuration and Status..................................... 540
Hardware Security Module Status........................................................................................ 541
Device > Setup > Services................................................................................................................... 542
Configure Services for Global and Virtual Systems...........................................................542
Global Services Settings...........................................................................................................542
IPv4 and IPv6 Support for Service Route Configuration................................................. 545
Destination Service Route....................................................................................................... 548
Device > Setup > Interfaces................................................................................................................ 549
Device > Setup > Telemetry................................................................................................................552
Device > Setup > Content-ID............................................................................................................. 553
Device > Setup > WildFire.................................................................................................................. 559
Device > Setup > Session.................................................................................................................... 562
Session Settings..........................................................................................................................562
Session Timeouts....................................................................................................................... 566
TCP Settings................................................................................................................................568
Decryption Settings: Certificate Revocation Checking.....................................................570
Decryption Settings: Forward Proxy Server Certificate Settings................................... 571
Decryption Settings: SSL Decryption Settings................................................................... 572
VPN Session Settings................................................................................................................573
Device Setup Ace................................................................................................................................... 574
Device > Setup > DLP.......................................................................................................................... 575
Device > High Availability.................................................................................................................... 576
Important Considerations for Configuring HA................................................................... 576
HA General Settings..................................................................................................................577
HA Communications................................................................................................................. 580
HA Link and Path Monitoring.................................................................................................583
HA Active/Active Config......................................................................................................... 585
Cluster Config............................................................................................................................. 587
Device > Log Forwarding Card...........................................................................................................589
Device > Config Audit...........................................................................................................................591
Device > Password Profiles................................................................................................................. 592
Username and Password Requirements...............................................................................592
Device > Administrators....................................................................................................................... 594
Device > Admin Roles...........................................................................................................................597
TABLE OF CONTENTS ix
Device > Server Profiles > HTTP....................................................................................................... 676
Device > Server Profiles > NetFlow..................................................................................................679
Device > Server Profiles > RADIUS...................................................................................................681
Device > Server Profiles > TACACS+............................................................................................... 683
Device > Server Profiles > LDAP....................................................................................................... 684
Device > Server Profiles > Kerberos................................................................................................. 686
Device > Server Profiles > SAML Identity Provider...................................................................... 687
Device > Server Profiles > DNS......................................................................................................... 690
Device > Server Profiles > Multi Factor Authentication...............................................................691
Device > Local User Database > Users............................................................................................ 693
Device > Local User Database > User Groups............................................................................... 694
Device > Scheduled Log Export......................................................................................................... 695
Device > Software..................................................................................................................................697
Device > Dynamic Updates................................................................................................................. 699
Device > Licenses...................................................................................................................................702
Device > Support....................................................................................................................................704
Device > Master Key and Diagnostics..............................................................................................705
Deploy Master Key................................................................................................................... 707
Device > Policy Recommendation > IoT.......................................................................................... 709
Device > Policy > Recommendation SaaS........................................................................................711
User Identification..........................................................................................713
Device > User Identification > User Mapping.................................................................................715
Palo Alto Networks User-ID Agent Setup...........................................................................715
Monitor Servers..........................................................................................................................723
Include or Exclude Subnetworks for User Mapping..........................................................725
Device > User Identification > Connection Security..................................................................... 727
Device > User Identification > Terminal Server Agents............................................................... 728
Device > User Identification > Group Mapping Settings Tab......................................................730
Device > User Identification > Cloud Identity Engine...................................................................734
Device > User Identification > Authentication Portal................................................................... 736
GlobalProtect...................................................................................................739
Network > GlobalProtect > Portals................................................................................................... 741
GlobalProtect Portals General Tab........................................................................................742
GlobalProtect Portals Authentication Configuration Tab................................................ 744
GlobalProtect Portals Portal Data Collection Tab............................................................. 746
GlobalProtect Portals Agent Tab........................................................................................... 746
GlobalProtect Portals Clientless VPN Tab...........................................................................767
GlobalProtect Portal Satellite Tab......................................................................................... 770
Network > GlobalProtect > Gateways..............................................................................................774
GlobalProtect Gateways General Tab.................................................................................. 774
GlobalProtect Gateway Authentication Tab....................................................................... 776
GlobalProtect Gateways Agent Tab......................................................................................777
GlobalProtect Gateway Satellite Tab....................................................................................787
Network > GlobalProtect > MDM..................................................................................................... 790
Network > GlobalProtect > Device Block List................................................................................ 791
Network > GlobalProtect > Clientless Apps....................................................................................792
Network > GlobalProtect > Clientless App Groups.......................................................................793
Objects > GlobalProtect > HIP Objects............................................................................................794
HIP Objects General Tab.........................................................................................................794
HIP Objects Mobile Device Tab............................................................................................ 796
HIP Objects Patch Management Tab................................................................................... 797
x TABLE OF CONTENTS
HIP Objects Firewall Tab.........................................................................................................798
HIP Objects Anti-Malware Tab.............................................................................................. 798
HIP Objects Disk Backup Tab................................................................................................ 799
HIP Objects Disk Encryption Tab..........................................................................................799
HIP Objects Data Loss Prevention Tab............................................................................... 800
HIP Objects Certificate Tab.................................................................................................... 800
HIP Objects Custom Checks Tab.......................................................................................... 801
Objects > GlobalProtect > HIP Profiles............................................................................................ 802
Device > GlobalProtect Client............................................................................................................ 804
Managing the GlobalProtect App Software........................................................................ 804
Setting Up the GlobalProtect App........................................................................................ 805
Using the GlobalProtect App..................................................................................................805
TABLE OF CONTENTS xi
SD-WAN Devices...................................................................................................................... 897
SD-WAN VPN Clusters............................................................................................................898
SD-WAN Monitoring................................................................................................................ 899
SD-WAN Reports.......................................................................................................................900
Panorama > VMware NSX................................................................................................................... 902
Configure a Notify Group........................................................................................................902
Create Service Definitions.......................................................................................................903
Configure Access to the NSX Manager............................................................................... 904
Create Steering Rules............................................................................................................... 905
Panorama > Log Ingestion Profile...................................................................................................... 907
Panorama > Log Settings......................................................................................................................908
Panorama > Server Profiles > SCP.....................................................................................................910
Panorama > Scheduled Config Export.............................................................................................. 911
Panorama > Software............................................................................................................................913
Manage Panorama Software Updates.................................................................................. 913
Display Panorama Software Update Information.............................................................. 914
Panorama > Device Deployment........................................................................................................915
Manage Software and Content Updates............................................................................. 915
Display Software and Content Update Information......................................................... 917
Schedule Dynamic Content Updates.................................................................................... 918
Revert Content Versions from Panorama............................................................................919
Manage Firewall Licenses........................................................................................................ 920
Panorama > Device Registration Auth Key..................................................................................... 922
Add a Device Registration Auth Key.................................................................................... 922
13
14 PAN-OS WEB INTERFACE HELP | Web Interface Basics
© 2021 Palo Alto Networks, Inc.
Firewall Overview
Palo Alto Networks® next-generation firewalls inspect all traffic (including applications, threats, and
content), and tie that traffic to the user, regardless of location or device type. The user, application, and
content—the elements that run your business—become integral components of your enterprise security
policy. This allows you to align security with your business policies, as well as write rules that are easy to
understand and maintain.
As part of our Security Operating Platform, our next-generation firewalls provide your organization with the
ability to:
• Securely enable applications (including software-as-a-service applications), users, and content by
classifying all traffic (regardless of port).
• Reduce risk of an attack using a positive enforcement model, by allowing all desired applications and
blocking everything else.
• Apply security policies to block known vulnerability exploits, viruses, ransomware, spyware, botnets, and
other unknown malware, such as advanced persistent threats.
• Protect your data centers (including virtualized data centers) by segmenting data and applications, as
well as enforcing the Zero Trust principle.
• Apply consistent security across your on-premises and cloud environments.
• Embrace secure mobile computing by extending the Security Operating Platform to users and devices,
no matter where they are located.
• Get centralized visibility and streamline network security, making your data actionable so you can
prevent successful cyberattacks.
• Identify and prevent attempts to steal credentials by stopping the submission of valid corporate
credentials to illegitimate websites, and neutralizing an attacker’s ability to use stolen credentials for
lateral movement or network compromise by enforcing authentication policies at the network layer.
After you log in to the web interface, the last login time information appears at the bottom left of the
window. If one or more failed logins occurred since the last successful login, a caution icon appears to
the right of the last login information. Hover over the caution symbol to view the number of failed login
attempts or click to view the Failed Login Attempts Summary window, which lists the administrative
account name, the source IP address, and the reason for the login failure.
If you see multiple failed login attempts that you do not recognize as your own, you should work with your
network administrator to locate the system that is performing the brute-force attack and then investigate
the user and host computer to identify and eradicate any malicious activity. If you see that the last login
date and time indicates an account compromise, you should immediately change your password and then
perform a configuration audit to determine if suspicious configuration changes were committed. Revert
the configuration to a known good configuration if you see that logs were cleared or if you have difficulty
determining if improper changes were made using your account.
Anytime the Message of the Day changes, the message appears in your next session even
if you selected Do not show again during a previous login. You must then reselect this option
to avoid seeing the modified message in subsequent sessions.
To navigate the dialog pages, click the right ( ) and left ( ) arrows along the sides of the dialog or click a
page selector ( ) along the bottom of the dialog. After you Close the dialog, you can manually reopen it
by clicking messages ( ) at the bottom of the web interface.
To configure a message of the day, select Device > Setup > Management and edit the Banners and
Messages settings.
Some columns are hidden by default. To display or hide specific columns, open the drop-
down in any column header, select Columns, and select (display) or clear (hide) the column
names.
Field/Button Description
To filter the tasks, enter a text string based on a value in one of the
columns and Apply Filter ( ). For example, entering edl will filter
the list to display only EDLFetch (fetch external dynamic lists) tasks.
To remove filtering, Remove Filter ( ).
Type The type of task, such as log request, license refresh, or commit. If
the information related to the task (such as warnings) is too long to
fit in the Messages column, you can click the Type value to see all the
details.
Job ID A number that identifies the task. From the CLI, you can use the Job
ID to see additional details about a task. For example, you can see the
position of a commit task in the commit queue by entering:
End Time The date and time when the task finished. This column is hidden by
default.
Start Time The date and time when the task started. For commit tasks, the Start
Time indicates when the commit was added to the commit queue.
Messages Displays details about the task. If the entry indicates that there are too
many messages, you can click the task Type to see the messages.
For commit tasks, the Messages include the dequeued time to indicate
when PAN-OS started performing the commit. To see the description
an administrator entered for a commit, click Commit Description. For
details, see Commit Changes.
Clear Commit Queue Cancel all pending commits initiated by administrators or PAN-OS.
This button is available only to administrators who have one of the
following predefined roles: superuser, device administrator, virtual
system administrator, or Panorama administrator.
Field/Button Description
Commit All Changes Commits all changes for which you have administrative privileges
(default). You cannot manually filter the scope of the configuration
changes that the firewall commits when you select this option.
Instead, the administrator role assigned to the account you used to log
in determines the commit scope:
• Superuser role—The firewall commits the changes of all
administrators.
• Custom role—The privileges of the Admin Role profile assigned to
your account determine the commit scope (see Device > Admin
Roles). If the profile includes the privilege to Commit For Other
Admins, the firewall commits changes configured by any and all
administrators. If your Admin Role profile does not include the
privilege to Commit For Other Admins, the firewall commits only
your changes and not those of other administrators.
If you have implemented access domains, the firewall automatically
applies those domains to filter the commit scope (see Device > Access
Domain). Regardless of your administrative role, the firewall commits
only the configuration changes in the access domains assigned to your
account.
Commit Changes Made By Filters the scope of the configuration changes the firewall commits.
The administrative role assigned to the account you used to log in
determines your filtering options:
• Superuser role—You can limit the commit scope to changes that
specific administrators made and to changes in specific locations.
• Custom role—The privileges of the Admin Role profile assigned to
your account determine your filtering options (see Device > Admin
Roles). If the profile includes the privilege to Commit For Other
Admins, you can limit the commit scope to changes configured by
specific administrators and to changes in specific locations. If your
Admin Role profile does not include the privilege to Commit For
When you commit changes to a virtual system, you must include the
changes of all administrators who added, deleted, or repositioned
rules for the same rulebase in that virtual system.
Commit Scope Lists the locations that have changes to commit. Whether the list
includes all changes or a subset of the changes depends on several
factors, as described for Commit All Changes and Commit Changes
Made By. The locations can be any of the following:
• shared-object—Settings that are defined in the Shared location.
• policy-and-objects—Policy rules or objects that are defined on a
firewall that does not have multiple virtual systems.
• device-and-network—Network and device settings that are global
(such as Interface Management profiles) and not specific to a
virtual system. This also applies to network and device settings on
a firewall that does not have multiple virtual systems.
• <virtual-system>—The name of the virtual system in which policy
rules or objects are defined on a firewall that has multiple virtual
systems. This also includes network and device settings that are
specific to a virtual system (such as zones).
Include in Commit Enables you to select the changes you want to commit. By default,
all changes within the Commit Scope are selected. This column
(Partial commit only)
displays only after you choose to Commit Changes Made By specific
administrators.
Group by Location Type Groups the list of configuration changes in the Commit Scope by
Location Type.
Preview Changes Enables you to compare the configurations you selected in the
Commit Scope to the running configuration. The preview window
uses color coding to indicate which changes are additions (green),
modifications (yellow), or deletions (red).
To help you match the changes to sections of the web interface, you
can configure the preview window to display Lines of Context before
and after each change. These lines are from the files of the candidate
and running configurations that you are comparing.
Change Summary Lists the individual settings for which you are committing changes.
The Change Summary list displays the following information for each
setting:
• Object Name—The name that identifies the policy, object, network
setting, or device setting.
• Type—The type of setting (such as Address, Security rule, or Zone).
• Location Type—Indicates whether the setting is defined in Virtual
Systems.
• Location—The name of the virtual system where the setting is
defined. The column displays Shared for settings that are not
specific to a virtual system.
• Operations—Indicates every operation (create, edit, or delete)
performed on the setting since the last commit.
• Owner—The administrator who made the last change to the
setting.
• Will Be Committed—Indicates whether the commit currently
includes the setting.
• Previous Owners—Administrators who made changes to the
setting before the last change.
Optionally, you can Group By column name (such as Type).
Select an object in the change list to view the Object Level
Difference.
Validate Commit Validates whether the firewall configuration has correct syntax and
is semantically complete. The output includes the same errors and
Description Allows you to enter a description (up to 512 characters) to help other
administrators understand what changes you made.
Commit Starts the commit or, if other commits are pending, adds your commit
to the commit queue.
Commit Status Provides progress during the commit, then provides results after the
commit. Commit results include success or failure, details of commit
changes, and commit warnings. Warnings include:
• Commit—Lists general commit warnings.
• App Dependency—Lists any app dependencies required for
existing rules.
• Rule Shadow—Lists any shadow rules.
You should periodically save your changes so that you don’t lose them if the firewall or
Panorama reboots.
Saving your changes to the candidate configuration does not activate those changes; you
must Commit Changes to activate them.
The Save Changes dialog displays the options described in the following table:
Field/Button Description
Save All Changes Saves all changes for which you have administrative privileges
(default). You cannot manually filter the scope of the configuration
changes that the firewall saves when you select this option. Instead,
the administrator role assigned to the account you used to log in
determines the save scope:
• Superuser role—The firewall saves the changes of all
administrators.
• Custom role—The privileges of the Admin Role profile assigned
to your account determine the save scope (see Device > Admin
Roles). If the profile includes the privilege to Save For Other
Admins, the firewall saves changes configured by any and all
administrators. If your Admin Role profile does not include the
privilege to Save For Other Admins, the firewall saves only your
changes and not those of other administrators.
If you have implemented access domains, the firewall automatically
applies those domains to filter the save scope (see Device > Access
Domain). Regardless of your administrative role, the firewall saves
only the configuration changes in the access domains assigned to your
account.
Save Changes Made By Filters the scope of the configuration changes the firewall saves.
The administrative role assigned to the account you used to log in
determines your filtering options:
• Superuser role—You can limit the save scope to changes that
specific administrators made and to changes in specific locations.
• Custom role—The privileges of the Admin Role profile assigned
to your account determine your filtering options (see Device >
Save Scope Lists the locations that have changes to save. Whether the list
includes all changes or a subset of the changes depends on several
factors, as described for the Save All Changes and Save Changes
Made By options. The locations can be any of the following:
• shared-object—Settings that are defined in the Shared location.
• policy-and-objects—(Firewall only) Policy rules or objects that are
defined on a firewall that does not have multiple virtual systems.
• device-and-network—(Firewall only) Network and device settings
that are global (such as Interface Management profiles) and not
specific to a virtual system.
• <virtual-system>—(Firewall only) The name of the virtual system
in which policy rules or objects are defined on a firewall that has
multiple virtual systems. This also includes network and device
settings that are specific to a virtual system (such as zones).
• <device-group>—(Panorama only) The name of the device group in
which the policy rules or objects are defined.
• <template>—(Panorama only) The name of the template or
template stack in which the settings are defined.
• <log-collector-group>—(Panorama only) The name of the Collector
Group in which the settings are defined.
• <log-collector>—(Panorama only) The name of the Log Collector in
which the settings are defined.
Location Type This column categorizes the locations where the changes were made:
• Virtual Systems—(Firewall only) Settings that are defined in a
specific virtual system.
• Device Groups—(Panorama only) Settings that are defined in a
specific device group.
• Templates—(Panorama only) Settings that are defined in a specific
template or template stack.
Include in Save Enables you to select the changes you want to save. By default, all
changes within the Save Scope are selected. This column displays only
(Partial save only)
after you choose to Save Changes Made By specific administrators.
Group by Location Type Groups the list of configuration changes in the Save Scope by
Location Type.
Preview Changes Enables you to compare the configurations you selected in the Save
Scope to the running configuration. The preview window uses color
coding to indicate which changes are additions (green), modifications
(yellow), or deletions (red).
To help you match the changes to sections of the web interface, you
can configure the preview window to display Lines of Context before
and after each change. These lines are from the files of the candidate
and running configurations that you are comparing.
Change Summary Lists the individual settings for which you are saving changes. The
Change Summary list displays the following information for each
setting:
• Object Name—The name that identifies the policy, object, network
setting, or device setting.
• Type—The type of setting (such as Address, Security rule, or Zone).
• Location Type—Indicates whether the setting is defined in Virtual
Systems.
• Location—The name of the virtual system where the setting is
defined. The column displays Shared for settings that are not
specific to a virtual system.
• Operations—Indicates every operation (create, edit, or delete)
performed on the setting since the last commit.
• Owner—The administrator who made the last change to the
setting.
• Will Be Saved—Indicates whether the save operation will include
the setting.
• Previous Owners—Administrators who made changes to the
setting before the last change.
Field/Button Description
Revert All Changes Reverts all changes for which you have administrative privileges
(default). You cannot manually filter the scope of the configuration
changes that the firewall reverts when you select this option. Instead,
the administrator role assigned to the account you used to log in
determines the revert scope:
• Superuser role—The firewall reverts the changes of all
administrators.
• Custom role—The privileges of the Admin Role profile assigned
to your account determine the revert scope (see Device > Admin
Roles). If the profile includes the privilege to Commit For Other
Admins, the firewall reverts changes configured by any and all
administrators. If your Admin Role profile does not include the
privilege to Commit For Other Admins, the firewall reverts only
your changes and not those of other administrators.
Revert Changes Made By Filters the scope of configuration changes that the firewall reverts.
The administrative role assigned to the account you used to log in
determines your filtering options:
• Superuser role—You can limit the revert scope to changes that
specific administrators made and to changes in specific locations.
• Custom role—The privileges of the Admin Role profile assigned to
your account determine your filtering options (see Device > Admin
Roles). If the profile includes the privilege to Commit For Other
Admins, you can limit the revert scope to changes configured by
specific administrators and to changes in specific locations. If your
Admin Role profile does not include the privilege to Commit For
Revert Scope Lists the locations that have changes to revert. Whether the list
includes all changes or a subset of the changes depends on several
factors, as described for the Revert All Changes and Revert Changes
Made By options. The locations can be any of the following:
• shared-object—Settings that are defined in the Shared location.
• policy-and-objects—(Firewall only) Policy rules or objects that are
defined on a firewall that does not have multiple virtual systems.
• device-and-network—(Firewall only) Network and device settings
that are global (such as Interface Management profiles) and not
specific to a virtual system.
• <virtual-system>—(Firewall only) The name of the virtual system
in which policy rules or objects are defined on a firewall that has
multiple virtual systems. This also includes network and device
settings that are specific to a virtual system (such as zones).
• <device-group>—(Panorama only) The name of the device group in
which the policy rules or objects are defined.
• <template>—(Panorama only) The name of the template or
template stack in which the settings are defined.
• <log-collector-group>—(Panorama only) The name of the Collector
Group in which the settings are defined.
• <log-collector>—(Panorama only) The name of the Log Collector in
which the settings are defined.
Location Type This column categorizes the locations where the changes were made:
• Virtual Systems—(Firewall only) Settings that are defined in a
specific virtual system.
• Device Group—(Panorama only) Settings that are defined in a
specific device group.
• Template—(Panorama only) Settings that are defined in a specific
template or template stack.
• Log Collector Group—(Panorama only) Settings that are specific to
a Collector Group configuration.
Include in Revert Enables you to select the changes you want to revert. By default,
all changes within the Revert Scope are selected. This column
(Partial revert only)
displays only after you choose to Revert Changes Made By specific
administrators.
Group by Location Type Lists the configuration changes in the Revert Scope by Location Type.
Preview Changes Enables you to compare the configurations you selected in the Revert
Scope to the running configuration. The preview window uses color
coding to indicate which changes are additions (green), modifications
(yellow), or deletions (red).
To help you match the changes to sections of the web interface, you
can configure the preview window to display Lines of Context before
and after each change. These lines are from the files of the candidate
and running configurations that you are comparing.
Change Summary Lists the individual settings for which you are reverting changes. The
Change Summary list displays the following information for each
setting:
• Object Name—The name that identifies the policy, object, network
setting, or device setting.
• Type—The type of setting (such as Address, Security rule, or Zone).
• Location Type—Indicates whether the setting is defined in Virtual
Systems.
• Location—The name of the virtual system where the setting is
defined. The column displays Shared for settings that are not
specific to a virtual system.
• Operations—Indicates every operation (create, edit, or delete)
performed on the setting since the last commit.
• Owner—The administrator who made the last change to the
setting.
• Will Be Reverted—Indicates whether the revert operation will
include the setting.
Field/Button Description
Location On a firewall with more than one virtual system (vsys), the scope of
the lock can be a specific vsys or the Shared location.
Created At The date and time when an administrator set the lock.
Logged In Indicates whether the administrator who set the lock is currently
logged in.
Take a Lock To set a lock, Take a Lock, select the Type, select the Location
(multiple virtual system firewalls only), enter optional Comments, click
OK, and then Close.
Remove Lock To release a lock, select it, Remove Lock, click OK, and then Close.
To launch global find, click the Search icon on the upper right side of the web interface. Global Find is
available from all web interface pages and locations. The following is a list of Global Find features to help
you perform successful searches:
• If you initiate a search on a firewall that has multiple virtual systems enabled or if administrative roles
are defined, Global Find will return results only for areas of the firewall for which you have permission to
access. The same applies to Panorama device groups; you will see search results only for device groups
to which you have administrative access.
• Spaces in search text are handled as AND operations. For example, if you search on corp policy, both
corp and policy must exist in the configuration item for it to be included in the search results.
• To find an exact phrase, surround the phrase in quotes.
• To re-run a previous search, click Global Find and a list of the last 20 searches are displayed. Click any
item in the list to re-run that search. The search history list is unique to each administrative account.
Global Find is available for each field that is searchable. For example, in the case of a Security policy,
you can search on the following fields: Name, Tags, Zone, Address, User, HIP Profile, Application, UUID,
and Service. To perform a search, click the drop-down next to any of these fields and click Global Find.
For example, if you click Global Find on a zone named l3-vlan-trust, Global Find will search the entire
configuration for that zone name and return results for each location where the zone is referenced. The
search results are grouped by category and you can hover over any item to view details or you can click an
item to navigate to the configuration page for that item.
Global Find does not search dynamic content that the firewall allocates to users (such as logs, address
ranges, or individual DHCP addresses). In the case of DHCP, you can search on a DHCP server attribute,
such as the DNS entry, but you cannot search for individual addresses issued to users. Another example is
usernames that the firewall collects when you enable the User-ID™ feature. In this case, a username or user
group that exists in the User-ID database is only searchable if the name or group exists in the configuration,
such as when a user group name is defined in a policy. In general, you can only search for content that the
firewall writes to the configuration.
Looking for more?
Learn more about using Global Find to search the firewall or Panorama configuration.
ID Unique threat signature ID. Select View in Threat Vault to open a Threat Vault
search in a new browser window and look up the latest information that the Palo
Alto Networks threat database has for this signature. The Threat Vault entry for
the threat signature might include additional details, including the first and last
content releases to include updates to the signature and the minimum PAN-OS
version required to support the signature.
Severity The threat severity level: informational, low, medium, high, or critical.
CVE Publicly known security vulnerabilities associated with the threat. The Common
Vulnerabilities and Exposures (CVE) identifier is the most useful identifier for
finding information about unique vulnerabilities as vendor-specific IDs commonly
encompass multiple vulnerabilities.
Vendor ID The vendor-specific identifier for a vulnerability. For example, MS16-148 is the
vendor ID for one or more Microsoft vulnerabilities and APBSB16-39 is the vendor
ID for one or more Adobe vulnerabilities.
Reference Research sources you can use to learn more about the threat.
Exempt Profiles Security profiles that define a different enforcement action for the threat signature
than the default signature action. The threat exception is only active when exempt
profiles are attached to a security policy rule (check if the exception is Used in
current security rule).
Used in current security Active threat exceptions—A check mark in this column indicates that the firewall is
rule actively enforcing the threat exception (the Exempt Profiles that define the threat
exception are attached to a security policy rule).
If this column is clear, the firewall is enforcing the threat based only on the
recommended default signature action.
Exempt IP Addresses Exempt IP addresses—You can add an IP address on which to filter the threat
exception or view existing Exempt IP Addresses. This option enforces a threat
exception only when the associated session has either a source or destination IP
address that matches the exempt IP address. For all other sessions, the threat is
enforced based on the default signature action.
If you’re having trouble viewing threat details, check for the following conditions:
• The firewall Threat Prevention license is active (Device > Licenses).
• The latest Antivirus and Threats and Applications content updates are installed.
• Threat Vault access is enabled (select Device > Setup > Management and edit the
Logging and Reporting setting to Enable Threat Vault Access).
• The default (or custom) Antivirus, Anti-Spyware, and Vulnerability Protection security
profiles are applied to your security policy.
Field/Button Description
Search AutoFocus for... Click to launch an AutoFocus search for the artifact.
Sessions The number of private sessions in which WildFire detected the artifact. Private
sessions are sessions running only on firewalls associated with your support
account. Hover over a session bar to view the number of sessions per month.
Samples Organization and global samples (files and email links) associated with the artifact
and grouped by WildFire verdict (benign, grayware, malware, phishing). Global
refers to samples from all WildFire submissions, while organization refers only to
samples submitted to WildFire by your organization.
Click on a WildFire verdict to launch an AutoFocus search for the artifact filtered
by scope (organization or global) and WildFire verdict.
Request The domain that submitted a DNS request. Click the domain to launch an
AutoFocus search for it.
Response The IP address or domain to which the DNS request resolved. Click the IP address
or domain to launch an AutoFocus search.
First Seen The date and time that the Request, Response, and Type combination was first
seen based on passive DNS history.
Last Seen The date and time that the Request, Response, and Type combination was most
recently seen based on passive DNS history.
SHA256 The SHA-256 hash for a sample. Click the hash to launch an AutoFocus search for
that hash.
Create Date The date and time that WildFire analyzed a sample and assigned a WildFire verdict
to it.
Update Date The date and time that WildFire updated the WildFire verdict for a sample.
Verdict The WildFire verdict for a sample: benign, grayware, malware, or phishing.
File Name Enter a name (maximum of 200 characters) to identify the exported data. This name
becomes the name of the downloaded file that is generated by the export.
File Type Select the type of export output to generate. You can choose either PDF or CSV
format.
Page Size The default page size is Letter (8.5 by 11.0 inches). You cannot change the page size.
By default, the PDF is generated in portrait orientation and changes to landscape
orientation to accommodate the maximum number of columns.
Description Enter a description (maximum of 255 characters) to provide context and additional
information about the export.
(PDF only)
Table Data Shows the table data that will be exported. If you need to clear the filtering settings
that you set previously, click Show All Columns to show all policy rules under the
selected policy type. Then you can add or remove columns and apply filters as
needed.
Show All Remove all filters and show all table columns.
Columns
You must have the ZTP plugin installed on your Panorama management server to access
ZTP functionality.
STEP 1 | After powering on the firewall, use a terminal emulator such as PuTTY to watch for the
following CLI prompt:
Do you want to exit ZTP mode and configure your firewall in standard mode
(yes/no)[no]?
Enter yes. The system then asks you to confirm. Enter yes again to boot the firewall in standard mode.
STEP 2 | (If you miss the above CLI prompt) You can also change your boot mode using the web interface.
Go to the firewall login screen at any point before or during the startup process. A prompt asks
if you want to continue booting in ZTP mode or if you want to switch to standard mode. Select
Standard Mode and the firewall begins rebooting in standard mode.
STEP 3 | Set up the firewall manually if using standard mode. If using ZTP mode, the device group and
template configuration defined on the Panorama management server are automatically pushed
to the firewall by the ZTP service.
• (Standard mode) Change the IP address on your computer to an address in the 192.168.1.0/24
network, such as 192.168.1.2. From a web browser, go to https://192.168.1.1. When prompted, log
in to the web interface using the default username and password (admin/admin).
• (ZTP mode) Follow the instructions provided by your Panorama administrator to register your ZTP
firewall. You must enter the serial number (12-digit number identified as S/N) and claim key (8-digit
number). These numbers are on stickers attached to the back of the device.
45
46 PAN-OS WEB INTERFACE HELP | Dashboard
© 2021 Palo Alto Networks, Inc.
Dashboard Widgets
By default, the Dashboard displays widgets in a Layout of 3 Columns but you can customize the Dashboard
to display only 2 Columns, instead.
You can also decide which widgets to display or hide so that you see only those you want to monitor. To
display a widget, select a widget category from the Widgets drop-down and select a widget to add it to the
Dashboard (widget names that appear in faded grayed-out text are already displayed). Hide (stop displaying)
a widget by closing the widget ( in the widget header). The firewalls and Panorama save your widget
display settings across logins (separately for each administrator).
Refer to the Last updated timestamp to determine when the Dashboard data was last refreshed. You can
manually refresh the entire Dashboard ( in the top right corner of the Dashboard) or you can refresh
individual widgets ( within each widget header). Use the unlabeled drop-down next to the manual
Dashboard refresh option ( ) to select the automatic refresh interval for the entire Dashboard (in
minutes): 1 min, 2 mins, or 5 mins; to disable automatic refresh for the entire Dashboard, select Manual.
Application Widgets
Top Applications Displays the applications with the most sessions. The block size indicates the
relative number of sessions (mouse over the block to view the number), and
the color indicates the security risk—from green (lowest) to red (highest). Click
an application to view its application profile.
Top High Risk Similar to Top Applications except that it displays the highest-risk applications
Applications with the most sessions.
ACC Risk Factor Displays the average risk factor (1-5) for the network traffic processed over
the past week. Higher values indicate higher risk.
System Widgets
General Information Displays the firewall or Panorama name and model, the Panorama CPU and
RAM, the Panorama system mode, the PAN-OS® or Panorama software
version, the IPv4 and IPv6 management IP information, the serial number, the
CPU ID and UUID, the application, threat, and URL filtering definition versions,
the current date and time, and the length of time since the last restart.
System Resources Displays the Management CPU usage, Data Plane usage, and the Session
Count (the number of sessions established through the firewall or Panorama).
Logged In Admins Displays the source IP address, session type (web interface or CLI), and session
start time for each administrator who is currently logged in.
Logs Widgets
Threat Logs Displays the threat ID, application, and date and time for the last 10 entries in
the Threat log. The threat ID is a malware description or URL that violates the
URL filtering profile. Displays only entries from the last 60 minutes.
URL Filtering Logs Displays the description and date and time for the last 60 minutes in the URL
Filtering log.
Data Filtering Logs Displays the description and date and time for the last 60 minutes in the Data
Filtering log.
Config Logs Displays the administrator username, client (web interface or CLI), and date
and time for the last 10 entries in the Configuration log. Displays only entries
from the last 60 minutes.
System Logs Displays the description and date and time for the last 10 entries in the System
log.
49
50 PAN-OS WEB INTERFACE HELP | ACC
© 2021 Palo Alto Networks, Inc.
A First Glance at the ACC
The following table shows the ACC tab and describes each component.
1 Tabs The ACC includes predefined tabs that provide visibility into network traffic,
threat activity, blocked activity, tunnel activity, and mobile network activity (if
GTP security is enabled). For information on each tab, see ACC Tabs.
2 Widgets Each tab includes a default set of widgets that best represent the events and
trends associated with the tab. The widgets allow you to survey the data using
the following filters: bytes (in and out), sessions, content (files and data), URL
categories, applications, users, threats (malicious, benign, grayware, phishing), and
count. For information on each widget, see ACC Widgets.
3 Time The charts and graphs in each widget provide a real-time and historic view. You
can choose a custom range or use the predefined time periods that range from the
last 15 minutes up to the last 90 days or last 30 calendar days.
The time period used to render data, by default, is the last hour. The date and time
interval are displayed on screen. For example:
4 Global Filters The global filters allow you to set the filter across all tabs. The charts and graphs
apply the selected filters before rendering the data. For information on using the
filters, see ACC Actions.
5 Application The application view allows you filter the ACC view by either the sanctioned
View and unsanctioned applications in use on your network, or by the risk level of the
applications in use on your network. Green indicates sanctioned applications, blue
6 Risk Meter The risk meter (1=lowest to 5=highest) indicates the relative security risk on your
network. The risk meter uses a variety of factors such as the type of applications
seen on the network and the risk levels associated with the applications, the
threat activity and malware as seen through the number of blocked threats, and
compromised hosts or traffic to malware hosts and domains.
7 Source The data used for the display varies between the firewall and Panorama™. You
have the following options to select what data is used to generate the views on
the ACC:
Virtual System: On a firewall that is enabled for multiple virtual systems, you can
use the Virtual System drop-down to change the ACC display to include all virtual
systems or just a selected virtual system.
Device Group: On Panorama, you can use the Device Group drop-down to
change the ACC display to include data from all device groups or just a selected
device group.
Data Source: On Panorama, you can also change the display to use Panorama or
Remote Device Data (managed firewall data). When the data source is Panorama,
you can filter the display for a specific device group.
8 Export You can export the widgets displayed in the current tab as a PDF.
You can also customize tabs and widgets as described in Working with Tabs and Widgets.
1 View You can sort the data by bytes, sessions, threats, count, users, content,
applications, URLs, malicious, benign, grayware, phishing, file(name)s, data,
profiles, objects, portals, gateways, and profiles. The available options vary by
widget.
2 Graph The graphical display options are treemap, line graph, horizontal bar graph,
stacked area graph, stacked bar graph, pie chart, and map. The available options
vary by widget and the interaction experience varies with each graph type. For
example, the widget for Applications using Non-Standard Ports allows you to
choose between a treemap and a line graph.
To drill down into the display, click on the graph. The area you click on becomes
a filter and allows you to zoom in and view more granular information about that
selection.
3 Table The detailed view of the data used to render the graph displays in a table below
the graph.
You can click and set a local filter or a global filter for elements in the table. With a
local filter, the graph is updated and the table is sorted by that filter.
With a global filter, the view across the ACC pivots to display only the information
specific to your filter.
4 Actions The following are actions available in the title bar of a widget:
For a description of each widget, see the details on using the ACC.
• Edit a tab.
Select the tab and click edit next to the tab name to edit the tab.
Example: .
• Export a tab
1. Edit a tab.
2.
Select to export the current tab. The tab downloads to your computer as a .txt file. You must
enable pop-ups to download the file.
• Import a tab
1. Add a custom tab.
2.
Select to import a tab.
3. Browse to the text (.txt) file and select it.
• To delete a widget or widget group, edit the tab and then click delete ( [X] ). You cannot undo a
deletion.
1.
Select a widget and click Filter ( ).
2.
Add ( ) filters you want to apply.
3. Click Apply. These filters are persistent across reboots.
The number of local filters applied on a widget are indicated next to the widget name.
• Remove a filter.
• Negate filters.
59
60 PAN-OS WEB INTERFACE HELP | Monitor
© 2021 Palo Alto Networks, Inc.
Monitor > Logs
The following topics provide additional information about monitoring logs.
Log Types
• Monitor > Logs
The firewall displays all logs so that role-based administration permissions are respected. Only the
information that you are permitted to see is visible, which varies depending on the types of logs you are
viewing. For information on administrator permissions, see Device > Admin Roles.
Traffic Displays an entry for the start and end of each session. Each
entry includes the date and time, source and destination zones,
addresses and ports, application name, security rule name applied
to the flow, rule action (allow, deny, or drop), ingress and egress
interface, number of bytes, and session end reason.
The Type column indicates whether the entry is for the start or
end of the session, or whether the session was denied or dropped.
A “drop” indicates that the security rule that blocked the traffic
specified “any” application, while a “deny” indicates the rule
identified a specific application.
If traffic is dropped before the application is identified, such as
when a rule drops all traffic for a specific service, the application is
shown as “not-applicable”.
Drill down in traffic logs for more details on individual entries,
artifacts, and actions:
•
Click Details ( ) to view additional details about the session,
such as whether an ICMP entry aggregates multiple sessions
between the same source and destination (the Count value will
be greater than one).
• On a firewall with an active AutoFocus™ license, hover next to
an IP address, filename, URL, user agent, threat name, or hash
Threat Displays an entry for each security alarm generated by the firewall.
Each entry includes the date and time, a threat name or URL, the
source and destination zones, addresses, and ports, the application
name, security rule name applied to the flow, and the alarm action
(allow or block) and severity.
The Type column indicates the type of threat, such as “virus” or
“spyware;” the Name column is the threat description or URL; and
the Category column is the threat category (such as “keylogger”) or
URL category.
Drill down in threat logs for more details on individual entries,
artifacts, and actions:
•
Click Details ( ) to view additional details about the threat,
such as whether the entry aggregates multiple threats of the
same type between the same source and destination (the Count
value will be greater than one).
• On a firewall with an active AutoFocus license, hover next to
an IP address, filename, URL, user agent, threat name, or hash
contained in a log entry and click the drop-down ( ) to open
the AutoFocus Intelligence Summary for that artifact.
•
If local packet captures are enabled, click Download ( ) to
access captured packets. To enable local packet captures, refer
to the subsections under Objects > Security Profiles.
• To view more details about a threat or to quickly configure
threat exemptions directly from the threat logs, click the threat
name in the Name column. The Exempt Profiles list shows all
custom Antivirus, Anti-spyware, and Vulnerability protection
profiles. To configure an exemption for a threat signature,
select the check box to the left of the security profile name and
save your change. To add exemptions for IP Addresses (up to
100 IP addresses per signature), highlight the security profile,
add the IP address(es) in the Exempt IP Addresses section and
click OK to save. To view or modify the exemption, go to the
associated security profile and click the Exceptions tab. For
example, if the threat type is vulnerability, select Objects >
Security Profiles > Vulnerability Protection, click the associated
profile then click the Exceptions tab.
• To add a device to the quarantine list (Device > Device
Quarantine), open the Host ID drop-down for the device and
Block Device (in the pop-up dialog).
URL Filtering Displays logs for URL filters, which control access to websites and
whether users can submit credentials to websites.
WildFire Submissions Displays logs for files and email links that the firewall forwarded
for WildFire™ analysis. The WildFire cloud analyzes the sample
and returns analysis results, which include the WildFire verdict
assigned to the sample (benign, malware, grayware, or phishing).
You can confirm if the firewall allowed or blocked a file based on
Security policy rules by viewing the Action column.
On a firewall with an active AutoFocus license, hover next to an IP
address, filename, URL, user agent, threat name, or hash (in the File
Digest column) contained in a log entry and click the drop-down
( ) to open the AutoFocus Intelligence Summary for the artifact.
Data Filtering Displays logs for the security policies with attached Data Filtering
profiles, to help prevent sensitive information such as credit card
or social security numbers from leaving the area protected by the
firewall, and File Blocking profiles, that prevent certain file types
from being uploaded or downloaded.
To configure password protection for access the details for a log
entry, click . Enter the password and click OK. Refer to Device >
Response Pages for instructions on changing or deleting the data
protection password.
HIP Match Displays all HIP matches that the GlobalProtect™ gateway
identifies when comparing the raw HIP data reported by the agent
to the defined HIP objects and HIP profiles. Unlike other logs, a
HIP match is logged even when it does not match a security policy.
For more information, refer to Network > GlobalProtect > Portals.
To add a device to the quarantine list (Device > Device
Quarantine), open the Host ID drop-down for the device and
Block Device (in the pop-up dialog).
IP-Tag Displays information about how and when a tag was applied to a
particular IP address. Use this information to determine when and
why a particular IP address was placed in an address group and
what policy rules impact that address. The log includes Receive
Time (the date and time when the first and last packet of the
session arrived), Virtual System, Source IP-Address, Tag, Event,
Timeout, Source Name, and Source Type.
Tunnel Inspection Displays an entry for the start and end of each inspected tunnel
session. The log includes the Receive Time (date and time the first
and last packet in the session arrived), Tunnel ID, Monitor Tag,
Session ID, Security rule applied to the tunnel traffic, and more.
See Policies > Tunnel Inspection for more information.
System Displays an entry for each system event. Each entry includes the
date and time, the event severity, and an event description.
Alarms The alarms log records detailed information on alarms that are
generated by the system. The information in this log is also
reported in Alarms. Refer to Define Alarm Settings.
You can use the Unified log set with the AutoFocus
threat intelligence portal. Set up an AutoFocus
search to add AutoFocus search filters directly to
the Unified log filter field.
Log Actions
The following table describes log actions.
Action Description
Filter Logs Each log page has a filter field at the top of the page. You can add artifacts to the field,
such as an IP address or a time range, to find matching log entries. The icons to the
right of the field enable you to apply, clear, create, save, and load filters.
• Create a filter:
• Click an artifact in a log entry to add that artifact to the filter.
•
Click Add ( ) to define new search criteria. For each criterion, select the
Connector that defines the search type (and or or), the Attribute on which to
base the search, an Operator to define the scope of the search, and a Value for
evaluation against log entries. Add each criterion to the filter field and Close
when you finish. You can then apply ( ) the filter.
Export Logs
Click Export to CSV ( ) to export all logs matched to the current filter to a CSV-
formatted report and continue to Download file. By default, the report contains up to
2,000 lines of logs. To change the line limit for generated CSV reports, select Device >
Setup > Management > Logging and Reporting Settings > Log Export and Reporting
and enter a new Max Rows in CSV Export value.
Highlight Select to highlight log entries that match the action. The filtered logs are highlighted in
Policy Actions the following colors:
• Green—Allow
• Yellow—Continue, or override
• Red—Deny, drop, drop-icmp, rst-client, reset-server, reset-both, block-continue,
block-override, block-url, drop-all, sinkhole
Monitor > External These threat events include all prevention, notification, provisional, and post-
Logs > Traps ESM > detection events that are reported by the Traps agents.
Threat
Monitor > External ESM Server system events include changes related to ESM status, licenses,
Logs > Traps ESM > ESM Tech Support files, and communication with WildFire.
System
Monitor > External Policy change events include changes to rules, protection levels, content
Logs > Traps ESM > updates, hash control logs, and verdicts.
Policy
Monitor > External Agent change events occur on the endpoint and include changes to content
Logs > Traps ESM > updates, licenses, software, connection status, one-time action rules,
Agent processes and services, and quarantined files.
Monitor > External ESM configuration change events include system-wide changes to licensing,
Logs > Traps ESM > administrative users and roles, processes, restriction settings, and conditions.
Config
Panorama can correlate discrete security events on the endpoints with events on the network to trace any
suspicious or malicious activity between the endpoints and the firewall. To view correlated events that
Panorama identifies, see Monitor > Automated Correlation Engine > Correlated Events.
What are correlation objects? Monitor > Automated Correlation Engine > Correlation Objects
What is a correlated event? Monitor > Automated Correlation Engine > Correlated Events
Where do I see the match
evidence for a correlation match?
How can I see a graphical view of See the Compromised Hosts widget in ACC.
correlation matches?
Name and Title The label indicates the type of activity that the correlation object detects.
ID A unique number identifies the correlation object. This number is in the 6000 series.
Category A summary of the kind of threat or harm posed to the network, user, or host.
State The state indicates whether the correlation object is enabled (active) or disabled
(inactive).
Description The description specifies the match conditions for which the firewall or Panorama will
analyze logs. It describes the escalation pattern or progression path that will be used
to identify malicious activity or suspicious host behavior.
Field Description
Update Time The timestamp when the match was last updated.
Object Name The name of the correlation object that triggered the match.
Source Address The IP address of the user from whom the traffic originated
Source User The user and user group information from the directory server, if User-ID™ is
enabled.
Severity A rating that classifies the risk based on the extent of damage caused.
Summary A description that summarizes the evidence gathered on the correlated event.
To view the detailed log view, click Details ( ) for an entry. The detailed log view includes all the evidence
for a match:
Match Object Details—Presents information on the correlation object that triggered the
Information match. For information on correlation objects, see Monitor > Automated Correlation
Engine > Correlation Objects.
Match Details—A summary of the match details that includes the match time, last
update time on the match evidence, severity of the event, and an event summary.
Match This tab includes all the evidence that corroborates the correlated event. It lists detailed
Evidence information on the evidence collected for each session.
See a graphical display of the information in the Correlated Events tab, see the Compromised Hosts widget
on the ACC > Threat Activity tab. In the Compromised Hosts widget, the display is aggregated by source
user and IP address and sorted by severity.
To configure notifications when a correlated event is logged, go to the Device > Log Settings or
Panorama > Log Settings tab.
The packet capture feature is CPU-intensive and can degrade firewall performance. Only
use this feature when necessary and make sure to turn it off after you collect the required
packets.
Manage Filters Configure Filtering When enabling custom packet captures, you should
define filters so that only the packets that match the
filters are captured. This will make it easier to locate the
information you need in the pcaps and will reduce the
processing power required by the firewall to perform
the packet capture.
Click Add to add a new filter and configure the
following fields:
• Id—Enter or select an identifier for the filter.
• Ingress Interface—Select the ingress interface on
which you want to capture traffic.
• Source—Specify the source IP address of the traffic
to capture.
• Destination—Specify the destination IP address of
the traffic to capture.
Filtering Configure Filtering After defining filters, set the Filtering to ON. If filtering
is OFF, then all traffic is captured.
Packet Capture Configure Capturing Click the toggle switch to turn packet capture ON or
OFF.
You must select at least one capture stage. Click Add
and specify the following:
• Stage—Indicate the point at which to capture
packets:
• drop—When packet processing encounters an
error and the packet is dropped.
• firewall—When the packet has a session match
or a first packet with a session is successfully
created.
• receive—When the packet is received on the
dataplane processor.
• transmit—When the packet is transmitted on the
dataplane processor.
Captured Files Captured Files Contains a list of custom packet captures previously
generated by the firewall. Click a file to download it to
your computer. To delete a packet capture, select the
packet capture and then Delete it.
• File Name—Lists the packet capture files. The file
names are based on the file name you specify for the
capture stage
• Date—Date the file was generated.
• Size (MB)—The size of the capture file.
After you turn on packet capture and then turn it off,
you must click Refresh ( ) before any new PCAP files
display in this list.
Clear All Settings Click Clear All Settings to turn off packet capture and to
Settings clear all packet capture settings.
Antivirus Select a custom antivirus profile and, in the Antivirus tab, select Packet Capture.
Anti-Spyware Select a custom Anti-Spyware profile, click the DNS Signatures tab and, in the
Packet Capture drop-down, select single-packet or extended-capture.
Vulnerability Select a custom Vulnerability Protection profile and, in the Rules tab, click Add to
Protection add a new rule or select an existing rule. Then select the Packet Capture drop-down
and select single-packet or extended-capture.
In Anti-Spyware and Vulnerability Protection profiles, you can also enable packet capture on
exceptions. Click the Exceptions tab and in the Packet Capture column for a signature, click
the drop-down and select single-packet or extended-capture.
(Optional) To define the length of a threat packet capture based on the number of packets captured (which
is based on a global setting), select Device > Setup > Content-ID and, in the Content-ID™ Settings section,
modify the Extended Packet Capture Length (packets) field (range is 1-50; default is 5).
After you enable packet capture on a security profile, you need to verify that the profile is part of a security
rule. For information on how to add a security profile to a security rule, see Security Policy Overview.
Each time the firewall detects a threat when packet capture is enabled on the security profile, you can
download ( ) or export the packet capture.
Top Bar
Count Sessions and Count Bytes Determines whether to display session or byte
information.
Bottom Bar
Top Bar
Bottom Bar
Each threat type is color-coded as indicated in the legend below the chart. Click a country on the map to
Zoom In and then Zoom Out as needed. This report contains the following options.
Top Bar
Zoom In and Zoom Out Zoom in and zoom out of the map.
Bottom Bar
Top Bar
Filter Applies a filter to display only the selected item. None displays
all entries.
Count Sessions and Count Bytes Determines whether to display session or byte information.
Bottom Bar
Top Bar
Count Sessions and Count Bytes Determines whether to display session or byte
information.
Zoom In and Zoom Out Zoom in and zoom out of the map.
Bottom Bar
Field Description
Block Time Month/day and hours:minutes:seconds when the IP address went on the
Block IP List.
Type Type of block action: whether the hardware (hw) or software (sw) blocked the
IP address.
When you configure a DoS Protection policy or a Security policy that uses
a Vulnerability Protection profile to block connections from source IPv4
addresses, the firewall automatically blocks that traffic in hardware before
those packets use CPU or packet buffer resources. If attack traffic exceeds
the blocking capacity of the hardware, the firewall uses software to block the
traffic.
Source IP Address Source IP address of the packet that the firewall blocked.
Ingress Zone Security zone assigned to the interface where the packet entered the firewall.
Time Remaining Number of seconds remaining for the IP address to be on the Block IP List.
Block Source Name of the classified DoS Protection profile or Vulnerability protection
object name where you specified the Block IP action.
Total Blocked IPs: x out Count of blocked IP addresses (x) out of the number of blocked IP addresses
of y (z% used) the firewall supports (y), and the corresponding percentage of blocked IP
addresses used (z).
Search for specific Select a value in a column, which enters a filter in the Filters field, and click the
Block IP List right arrow to initiate the search for entries with that value.
information
Click the X to remove the filter.
View Block IP List Enter a page number in the Page field or click the single arrows to see the Next
entries beyond the Page or Previous Page of entries. Click the double arrows to view the Last Page
current screen or First Page of entries.
View detailed Click on a Source IP Address of an entry, which links to Network Solutions Who
information about Is with information about the address.
an IP address on the
Block IP List
Clear the entire Block Click Clear All to permanently delete all entries, which means those packets are
IP List no longer blocked.
Test Run Time Frame Select the time interval for the report—Last 24 Hours (default) or Last
Calendar Day.
Run Now Click Run Now to manually and immediately generate a report. The report
displays in a new tab within the Botnet Report dialog.
No. of Rows Specify the number of rows to display in the report (default is 100).
Scheduled Select this option to automatically generate the report daily. By default, this
option is enabled.
Query Builder (Optional) Add queries to the Query Builder to filter the report
output by attributes such as source/destination IP addresses, users,
or zones. For example, if you know that traffic initiated from the IP
address 192.0.2.0 contains no potential botnet activity, you can add
not (addr.src in 192.0.2.0) as a query to exclude that host from
the report output.
• Connector—Select a logical connector (and or or). If you select Negate,
the report will exclude the hosts that the query specifies.
• Attribute—Select a zone, address, or user that is associated with the
hosts that the firewall evaluates for botnet activity.
• Operator—Select an operator to relate the Attribute to a Value.
• Value—Enter a value for the query to match.
The default Botnet report configuration is optimal. If you believe the default values identify
false positives, create a support ticket so Palo Alto Networks can reevaluate the values.
HTTP Traffic Enable and define the Count for each type of HTTP Traffic that the report
will include. The Count values you enter are the minimum number of events
of each traffic type that must occur for the report to list the associated host
with a higher confidence score (higher likelihood of botnet infection). If the
number of events is less than the Count, the report will display the lower
confidence score or (for certain traffic types) won’t display an entry for the
host.
• Malware URL visit (range is 2–1000; default is 5)—Identifies users
communicating with known malware URLs based on malware and
botnet URL filtering categories.
• Use of dynamic DNS (range is 2–1000; default is 5)—Looks for dynamic
DNS query traffic that might indicate malware, botnet communications,
or exploit kits. Generally, using dynamic DNS domains is very risky.
Malware often uses dynamic DNS to avoid IP address block lists.
Consider using URL filtering to block such traffic.
• Browsing to IP domains (range is 2–1000; default is 10)—Identifies users
who browse to IP domains instead of URLs.
• Browsing to recently registered domains (range is 2–1000; default is 5)
—Looks for traffic to domains that were registered within the past 30
days. Attackers, malware, and exploit kits often use newly registered
domains.
• Executable files from unknown sites (range is 2–1000; default is 5)—
Identifies executable files downloaded from unknown URLs. Executable
files are a part of many infections and, when combined with other types
of suspicious traffic, can help you prioritize host investigations.
Unknown Applications Define the thresholds that determine whether the report will include traffic
associated with suspicious Unknown TCP or Unknown UDP applications.
• Sessions Per Hour (range is 1–3600; default is 10)—The report includes
traffic that involves up to the specified number of application sessions
per hour.
• Destinations Per Hour (range is 1–3600; default is 10)—The report
includes traffic that involves up to the specified number of application
destinations per hour.
• Minimum Bytes (range is 1–200; default is 50)—The report includes
traffic for which the application payload equals or exceeds the specified
size.
• Maximum Bytes (range is 1–200; default is 100)—The report includes
traffic for which the application payload is equal to or less than the
specified size.
To create PDF summary reports, click Add. The PDF Summary Report page opens to show all of the
available report elements.
Managing PDF Reports
There is a maximum of 18 report elements allowed. If you have 18 already, you must
delete existing elements before you can add new ones.
To Save the report, enter a report name, and click OK.
To display PDF reports, select Monitor > Reports, click PDF Summary Report to select a report, and click a
day in the calendar to download a report for that day.
New PDF summary reports will not appear until after the report runs, which will occur
automatically every 24 hours at 2 a.m.
Name Enter a name to identify the report (up to 31 characters). The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and
underscores.
Type For User Activity Report: Select User and enter the Username or IP address
(IPv4 or IPv6) of the user who will be the subject of the report.
For Group Activity Report: Select Group and enter the Group Name.
Additional Filters Select Filter Builder to create filters for the User/Group Activity Report.
Time Period Select the time frame for the report from the drop-down.
Include Detailed (Optional) Select this option to include detailed URL logs in the report.
Browsing
The detailed browsing information can include a large volume
of logs (thousands) for the selected user or user group and
cause a report to be very large.
The Group Activity Report does not include Browsing Summary by URL Category; all other
information is common across the User Activity Report and the Group Activity Report.
To run the report on demand, click Run Now. To change the maximum number of rows that display in the
report, see Logging and Reporting Settings.
To save the report, click OK. You can then schedule the report for email delivery (Monitor > PDF Reports >
Email Scheduler).
Log Filter Text Box Write the filter you would like to apply to the log.
You can write multiple filters.
Select Apply to apply the built filter to the User Activity or Group Activity Report.
Make sure you tag applications consistently across all firewalls or device groups. If the same
application is tagged as sanctioned in one virtual system and is not sanctioned in another—
or on Panorama, if an application is unsanctioned in a parent device group but is tagged as
sanctioned in a child device group (or vice versa)—the SaaS Application Usage report will
produce overlapping results.
On the ACC, set the Application View to By Sanctioned State to visually identify applications
that have different sanctioned state across virtual systems or device groups. Green
indicates sanctioned applications, blue is for unsanctioned applications, and yellow indicates
applications that have a different sanctioned state across different virtual systems or device
groups.
To configure the report, click Add and specify the following information:
Name Enter a name to identify the report (up to 31 characters). The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and
underscores.
Time Period Select the time frame for the report from the drop-down. The report includes
data from the current day (the day on which the report is generated).
Include logs from From the drop-down, select whether you want to generate the report on
a selected user group, on a selected zone, or for all user groups and zones
configured on the firewall or Panorama.
• For a selected user group—Select the User Group for which the firewall or
Panorama will filter the logs.
• For a selected zone—Select the Zone for which the firewall or Panorama
will filter the logs.
• For all user groups and zones—You can report on all groups or choose
up to 25 user groups for which you want visibility. If you have more than
25 groups, the firewall or Panorama will display the top 25 groups in the
report and assign all remaining user groups to the Others group.
Include user group This option filters the logs for the user groups you want to include in the
information in the report. Select the manage groups or the manage groups for the selected zone
report link to choose up to 25 user groups for which you want visibility.
(Not available if you When you generate a report for specific user groups on a selected zone, users
choose to generate the who are not a member of any of the selected groups are assigned to a user
report on a Selected group called Others.
User Group.)
User group Select the user group(s) for which you want to generate the report. This
option displays only when you choose Selected User Group in the Include
logs from drop-down.
Zone Select the zone for which you want to generate the report. This option
displays only when you choose Selected Zone in the Include logs from drop-
down.
You can then select include user group information in the report.
Include detailed The SaaS Application Usage PDF report is a two-part report. By default, both
application category parts of the report are generated. The first part of the report (ten pages)
information in report focuses on the SaaS applications used on your network during the reporting
period.
Clear this option if you do not want the second part of the report that
includes detailed information for SaaS and non-SaaS applications for each
application subcategory listed in the first part of the report. This second part
of the report includes the names of the top applications in each subcategory
and information about users, user groups, files, bytes transferred, and threats
generated from these applications.
Without the detailed information, the report is ten-pages long.
Limit max subcategories Select whether you want to use all application subcategories in the SaaS
in the report to Application Usage report or whether you want to limit the maximum number
to 10, 15, 20, or 25 subcategories.
When you reduce the maximum number of subcategories, the detailed
report is shorter because you limit the SaaS and non-SaaS application activity
information included in the report.
Name Enter a name to identify the report group (up to 31 characters). The name
is case-sensitive and must be unique. Use only letters, numbers, spaces,
hyphens, and underscores.
Title Page Select this option to include a title page in the report.
Title Enter the name that will appear as the report title.
Report selection / For each report to include in the group, select the report in the left column
Widgets and Add it to the right column. You can select the following report types:
• Predefined Report
• Custom Report
• PDF Summary Report
• CSV
• Log View—Whenever you create a custom report, the firewall
automatically creates a Log View report with the same name. The Log
View report shows the logs that the firewall used to build the contents of
the custom report. To include the log view data, when creating a report
group, add your Custom Reports and then add the matching Log View
reports. The aggregate report generated for the report group displays the
custom report data followed by the log data.
After you save the report group, the Widgets column of the Report Groups
page lists the reports you added to the group.
To use the report group, refer to Monitor > PDF Reports > Email Scheduler.
Name Enter a name to identify the schedule (up to 31 characters). The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and
underscores.
Report Group Select the report group (Monitor > PDF Reports > Report Groups) or the SaaS
Application Usage report (Monitor > PDF Reports > SaaS Application Usage)
you want to schedule.
Email Profile Select the profile that defines the email settings. Refer to Device > Server
Profiles > Email for information on defining email profiles.
Recurrence Select the frequency at which to generate and send the report.
Override Email Enter an optional email address to use instead of the recipient specified in the
Addresses email profile.
Send test email Click to send a test email to the email address defined in the selected Email
Profile.
After the firewall has generated a scheduled custom report, you risk invalidating the past
results of that report if you modify its configuration to change its future output. If you need to
modify a scheduled report configuration, the best practice is to create a new report.
Add a custom report to create a new one. To base the report on an existing template, Load Template and
select the template. To generate a report on demand, instead of or in addition to the Scheduled time, click
Run Now. Specify the following settings to define the report.
Name Enter a name to identify the report (up to 31 characters). The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens,
and underscores.
Database Choose the database to use as the data source for the report.
Scheduled Select this option to run the report each night. The report then becomes
available by selecting Monitor > Reports.
Time Frame Choose a fixed time frame or choose Custom and specify a date and time
range.
Sort By Choose sorting options to organize the report, including the amount of
information to include in the report. The available options depend on the
choice of database.
Group By Choose grouping options to organize the report, including the amount of
information to include in the report. The available options depend on the
choice of database.
Columns Select Available Columns to include in the custom report and add (
) them to Selected Columns. Select Up, Down, Top, and Bottom to
reorder selected columns. As needed, you can also select and remove ( )
previously selected columns.
Query Builder To build a report query, specify the following and click Add. Repeat as
needed to construct the full query.
• Connector—Choose the connector (and or or) to precede the expression
you are adding.
• Negate—Select this option to interpret the query as a negation. In the
previous example, the negate option causes a match on entries that are
not in the past 24 hours or are not from the untrust zone.
• Attribute—Choose a data element. The available options depend on the
choice of database.
105
106 PAN-OS WEB INTERFACE HELP | Policies
© 2021 Palo Alto Networks, Inc.
Policy Types
Policies enable you to control firewall operation by enforcing rules and automating actions. The firewall
supports the following policy types:
• Basic security policies to block or allow a network session based on the application, the source and
destination zones and addresses, and—optionally—based on the service (port and protocol). Zones
identify the physical or logical interfaces that send or receive the traffic. See Policies > Security.
• Network Address Translation (NAT) policies to translate addresses and ports. See to Policies > NAT.
• Quality of Service (QoS) policies to determine how traffic is classified for treatment when it passes
through an interface with QoS enabled. See Policies > QoS.
• Policy-based forwarding policies to override the routing table and specify an egress interface for traffic.
See Policies > Policy Based Forwarding.
• Decryption policies to specify traffic decryption for security policies. Each policy can specify the
categories of URLs for the traffic you want to decrypt. SSH decryption is used to identify and control
SSH tunneling in addition to SSH shell access. See Policies > Decryption.
• Tunnel Inspection policies to enforce Security, DoS Protection, and QoS policies on tunneled traffic, and
to view tunnel activity. See Policies > Tunnel Inspection.
• Override policies to override the application definitions provided by the firewall. See Policies >
Application Override.
• Authentication policies to define authentication for end users who access network resources. See
Policies > Authentication.
• Denial of service (DoS) policies to protect against DoS attacks and take protective action in response to
rule matches. See Policies > DoS Protection.
• SD-WAN policies to determine link path management between the source and destination zones when
link path health degrades below the approved, configured health metrics. See Policies > SD-WAN.
Shared polices pushed from Panorama™ display in orange on the firewall web interface. You can edit these
shared policies only on Panorama; you cannot edit them on the firewall.
View Rulebase as Groups to view all the tag groups used in a rulebase. In rule bases with many rules,
viewing the rulebase as groups simplifies the display by presenting the tags, color code, and the number of
rules in each group while preserving the established rule hierarchy.
Selected Rules Displays the Name and current Location (virtual system or device group) of
the policy rules you selected for the operation.
Destination Select the new location for the policy or object: a virtual system, device
group, or Shared. The default value is the Virtual System or Device Group
that you selected in the Policies or Objects tab.
Error out on first detected error Select this option (selected by default) to make the firewall or Panorama
in validation display the first error it finds and stop checking for more errors. For
example, an error occurs if the Destination doesn’t include an object that is
referenced in the policy rule you are moving. If you clear this selection, the
firewall or Panorama will find all errors before displaying them.
• Audit Comments
• Config Logs (between commits)
• Rule Changes
Audit Comments
View the Audit Comment history for a selected policy rule. Apply and save filters to quickly identify specific
audit comments and to export the displayed audit comments in CSV format.
Field Description
Config Version Configuration revision version. 0 indicates the first time the policy rule was created
and committed to Panorama.
Field Description
Before Change Rule information before the change occurred. For example; if you rename a rule, the
previous name is displayed.
After Change Rule information after the change occurred. For example, if you rename a rule, the
new name is displayed.
Rule Changes
View and compare configuration version of the selected policy rule to analyze what changes occurred. In
the drop-down, select the two policy rule config versions you want to compare.
Task Description
Hit Count
Timeframe Indicate the time frame to query the selected rulebase. Select from the predetermined
time frames or set a Custom time frame.
Usage Select the rule usage to query: Any, Unused, Used, or Partially Used (Panorama only).
Since (Custom Timeframe only) Select the date and time from which to query the policy
rulebase.
Exclude rules Select this option to exclude any rules that were manually reset by a user within the
reset during specified number of days.
the last _ days
Actions
PDF/CSV Export the filtered policy rules currently displayed in PDF or CSV format.
Reset Rule Hit Reset the rule usage data for the Selected rules or for All rules that have been filtered
Counter and are currently displayed.
Tag Apply one or more group tags to one or more selected policy rules. The group tag must
already exist in order to tag the policy rule(s).
Untag Remove one or more group tags from one or more selected policy rules.
Field Description
Device Group Device group that device or virtual system belongs to.
Hit Count Total number of traffic matches for the policy rule.
Last Hit Date and time of the latest traffic match for the policy rule.
First Hit Date and time of the first traffic match for the policy rule.
Last Update Date and time of the last received rule usage information from the device to the
Received Panorama management server.
Modified Date and time the policy rule was last modified. Column is blank if the policy rule has
not been modified.
What are the fields available to Building Blocks in a Security Policy Rule
create a Security policy rule?
How can I use the web interface to Creating and Managing Policies
manage Security policy rules?
Overriding or Reverting a Security Policy Rule
Applications and Usage
Security Policy Optimizer
To ensure that end users authenticate when they try to access your network resources, the
firewall evaluates Authentication policy before Security policy. For details, see Policies >
Authentication.
For traffic that doesn’t match any user-defined rules, the default rules apply. The default rules—displayed at
the bottom of the security rulebase—are predefined to allow all intrazone traffic (within the zone) and deny
all interzone traffic (between zones). Although these rules are part of the predefined configuration and are
read-only by default, you can Override them and change a limited number of settings, including the tags,
action (allow or deny), log settings, and security profiles.
The interface includes the following tabs for defining Security policy rules.
• General—Select the General tab to configure a name and description for the Security policy rule.
• Source—Select the Source tab to define the source zone or source address from which the traffic
originates.
• User—Select the User tab to enforce policy for individual users or a group of users. If you are using
GlobalProtect™ with host information profile (HIP) enabled, you can also base the policy on information
collected by GlobalProtect. For example, the user access level can be determined HIP that notifies the
firewall about the user's local configuration. The HIP information can be used for granular access control
based on the security programs that are running on the host, registry values, and many other checks
such as whether the host has antivirus software installed.
Rule number N/A The firewall automatically numbers each rule and the order
of the rules will change as rules are moved. When you filter
rules to match specific filters, each rule displays with its
number in the context of the complete set of rules in the
rulebase and its place in the evaluation order.
Panorama independently numbers pre-rules and post-rules.
When Panorama pushes rules to a managed firewall, the
rule numbering incorporates hierarchy in pre-rules, firewall
rules, and post-rules within a rulebase and reflects the rule
sequence and its evaluation order.
Name General Enter a name to identify the rule. The name is case-sensitive
and can have up to 63 characters, which can be letters,
numbers, spaces, hyphens, and underscores. The name must
be unique on a firewall and, on Panorama, unique within its
device group and any ancestor or descendant device groups.
Rule Type Specifies whether the rule applies to traffic within a zone,
between zones, or both:
• universal (default)—Applies the rule to all matching
interzone and intrazone traffic in the specified source
and destination zones. For example, if you create a
universal rule with source zones A and B and destination
zones A and B, the rule would apply to all traffic within
zone A, all traffic within zone B, and all traffic from zone
A to zone B and all traffic from zone B to zone A.
• intrazone—Applies the rule to all matching traffic
within the specified source zones (you cannot specify a
Source Zone Source Add source zones (default is Any). Zones must be of the
same type (Layer 2, Layer 3, or virtual wire). To define new
zones, refer to Network > Zones.
Multiple zones can be used to simplify management.
For example, if you have three different internal zones
(Marketing, Sales, and Public Relations) that are all directed
to the untrusted destination zone, you can create one rule
that covers all cases.
Source Address Source Add source addresses, address groups, or regions (default
is Any). Select from the drop-down or select Address
object, Address Group, or Regions (bottom of the drop-
down) to specify the settings. Objects>Addresses and
Objects>AddressGroups describe the types of address
objects and address groups, respectively, that a Security
policy rule supports.
Selecting the Negate option will apply the rule to source
addresses from the specified zone except for the addresses
specified.
Source User Source Add the source users or groups of users subject to the
policy:
• any—Includes any traffic regardless of user data.
• pre-logon—Includes remote users that are connected to
the network using GlobalProtect, but are not logged into
Source Device Source Add the host devices subject to the policy:
• any—Includes any device.
• no-hip—HIP information is not required. This setting
enables access from third-party devices that cannot
collect or submit HIP information.
• quarantine—Includes any device that is in the quarantine
list (Device > Device Quarantine).
• select—Includes selected devices as determined by your
configuration. For example, you can add a device object
based on model, OS, OS family, or vendor.
Source HIP Profile Source Add host information profiles (HIP) to enable you to collect
information about the security status of your end hosts,
such as whether they have the latest security patches
and antivirus definitions installed. Using host information
profiles for policy enforcement enables granular security
that ensures that the remote hosts accessing your critical
resources are adequately maintained and in adherence with
your security standards before they are allowed to access
your network resources. The following source HIP profiles
are supported:
Network Slice Source Add one or more source network slices based on network
slice service type (SST) in a 5G network, as follows:
• Standardized (predefined) SST
• eMBB (enhanced Mobile Broadband)—For faster
speeds and high data rates, such as video streaming.
• URLLC (Ultra-Reliable Low-Latency Communications)
—For mission-critical applications that are sensitive
to latency, such as critical IoT (healthcare, wireless
payments, home control, and vehicle communication).
• MIoT (Massive Internet of Things)—For example,
smart metering, smart waste management, anti-theft,
asset management, and location tracking.
• Network Slice SST - Operator-Specific—You name and
specify the slice. The format of the slice name is text
followed by a comma (,) and a number (range is 128 to
255). For example, Enterprise Oil2,145.
Destination Zone Destination Add destination zones (default is any). Zones must be of the
same type (Layer 2, Layer 3, or virtual wire). To define new
zones, refer to Network > Zones.
Multiple zones can be used to simplify management.
For example, if you have three different internal zones
(Marketing, Sales, and Public Relations) that are all directed
to the untrusted destination zone, you can create one rule
that covers all cases.
Application Application Add specific applications for the Security policy rule. If an
application has multiple functions, you can select the overall
application or individual functions. If you select the overall
application, all functions are included and the application
definition is automatically updated as future functions are
added.
If you are using application groups, filters, or containers
in the Security policy rule, you can view details of these
objects by hovering over the object in the Application
column, opening the drop-down, and selecting Value. This
allows you to view application members directly from the
policy without having to navigate to the Object tab.
Service Service/URL Select the services that you want to limit to specific TCP or
Category UDP port numbers. Choose one of the following from the
drop-down:
• any—The selected applications are allowed or denied on
any protocol or port.
• application-default—The selected applications are
allowed or denied only on their default ports defined
by Palo Alto Networks®. This option is recommended
for allow policies because it prevents applications
from running on unusual ports and protocols which, if
unintentional, can be a sign of undesired application
behavior and usage.
Action Setting Actions Select the Action the firewall takes on traffic that matches
the attributes defined in a rule:
• Allow (default)—Allows the matched traffic.
• Deny—Blocks matched traffic and enforces the default
Deny Action defined for the application that is denied.
To view the deny action defined by default for an
application, view the application details (Objects >
Applications).
Because the default deny action varies by application, the
firewall could block the session and send a reset for one
application while it silently drops the session for another
application.
• Drop—Silently drops the application. A TCP reset is not
sent to the host or application unless you select Send
ICMP Unreachable.
• Reset client—Sends a TCP reset to the client-side device.
• Reset server—Sends a TCP reset to the server-side
device.
• Reset both client and server—Sends a TCP reset to both
the client-side and server-side devices.
• Send ICMP Unreachable—Available only for Layer 3
interfaces. When you configure Security policy rule to
drop traffic or to reset the connection, the traffic does
not reach the destination host. In such cases, for all UDP
traffic and for TCP traffic that is dropped, you can enable
the firewall to send an ICMP Unreachable response to
the source IP address from where the traffic originated.
Enabling this setting allows the source to gracefully
close or clear the session and prevents applications from
breaking.
To view the ICMP Unreachable Packet Rate configured
on the firewall, view Session Settings (Device > Setup >
Session).
To override the default action defined on the predefined
interzone and intrazone rules: see Overriding or Reverting a
Security Policy Rule.
Profile Setting Actions To specify the additional checking that the firewall performs
on packets that match the Security profile rule, select
individual Antivirus, Vulnerability Protection, Anti-Spyware,
URL Filtering, File Blocking, Data Filtering, WildFire Analysis,
Mobile Network Protection, and SCTP Protection profiles.
To specify a profile group rather than individual profiles,
select the Profile Type to be Group and then select a Group
Profile.
Log Setting and Actions To generate entries in the local traffic log for traffic that
Other Settings matches this rule, select the following options:
• Log At Session Start (disabled by default)—Generates a
traffic log entry for the start of a session.
You can also modify the log settings on the default rules.
Specify any combination of the following options:
• Schedule—To limit the days and times when the rule is
in effect, select a schedule from the drop-down. Define
New schedules as needed (refer to Settings to Control
Decrypted SSL Traffic).
• QoS Marking—To change the Quality of Service (QoS)
setting on packets matching the rule, select IP DSCP or
Basics Rule Usage • Rule Created—Creation date and time of the rule.
• Last Edited—The last date and time the rule was edited.
Activity Rule Usage • Hit Count—The total number of times traffic matched
(hit) the rule.
• First Hit—Time of the first rule match.
• Last Hit—Time of the last rule match.
Traffic (past 30 days) Rule Usage • Bytes—The amount of traffic on the rule over the past 30
days in bytes.
Any (target all Target Enable (check) to push the policy rule to all managed
devices) firewalls in the device group.
Panorama only
Tags Add one or more tags to push the policy rule to managed
firewalls in the device group with the specified tag.
Panorama only
Target to all but Enable (check) to push the policy rule to all managed
these specified firewalls associated with the device group except for the
devices and tags selected device(s) and tag(s).
Panorama only
Task Description
Add Add a new policy rule or select a rule on which to base a new rule and Clone Rule. The
copied rule, “rulen” is inserted below the selected rule, where n is the next available
integer that makes the rule name unique. For details on cloning, see Move or Clone a
Policy Rule.
Override and Revert actions pertain only to the default rules displayed at the bottom
of the Security rulebase. These predefined rules—allow all intrazone traffic and
deny all interzone traffic—instruct the firewall about how to handle traffic that does
not match any other rule in the rulebase. Because they are part of the predefined
configuration, you must Override them to edit select policy settings. If you are using
Panorama, you can also Override the default rules and then push them to firewalls
in a Device Group or Shared context. You can also Revert the default rules, which
restores the predefined settings or the settings pushed from Panorama. For details,
see Overriding or Reverting a Security Policy Rule.
Move Rules are evaluated from the top down and as they are enumerated on the Policies
page. To change the order in which the rules are evaluated against network traffic,
select a rule and Move Up, Move Down, Move Top, Move Bottom, or Move to a
different rulebase or device group. For details, see Move or Clone a Policy Rule.
Copy UUID Copy the UUID of the rule to the clipboard for use when searching the configuration
or the logs.
Enable/Disable To disable a rule, select and Disable it; to enable a rule that is disabled, select and
Enable it.
Monitor Rule To identify rules that have not been used since the last time the firewall was restarted,
Usage Highlight Unused Rules. Unused rules have a dotted background. You can then decide
whether to Disable a rule or Delete it. Rules not currently in use are displayed with a
dotted yellow background. When policy rule hit count is enabled, the Hit Count data is
used to determine whether a rule is unused.
Each firewall maintains a traffic flag for the rules that have a match.
Because the flag is reset when a dataplane reset occurs on a reboot
or a restart, it is best practice to monitor this list periodically to
determine whether the rule had a match since the last check before
you delete or disable it.
Reset rule Hit The Hit Count tracks the total traffic hits for the policy rule. The total traffic hit count
count persists through reboot, upgrade, and data plane restart.
Alternatively, Reset Rule Hit Counter (bottom menu). To clear the hit count statistics,
select All Rules or select specific rules and reset hit count statistics only for the
Selected rules.
View the First Hit to identify when the Security policy was first hit. The date is
formated as date hh:mm:ss year. You cannot reset this value.
View the Last Hit to identify when the Security policy was last used. The date is
formated as date hh:mm:ss year. You cannot reset this value.
Show/Hide Show or hide the columns that display under Policies. Select the column name to
columns toggle the display.
Apply filters To apply a filter to the list, select from the Filter Rules drop-down. To define a filter,
choose Filter from the item drop-down.
The default rules are not part of rulebase filtering and always show up
in the list of filtered rules.
To view the network sessions that were logged as matches against the policy, choose
Log Viewer from the rule name drop-down.
To display the current value, choose Value from the entry drop-down. You can also
edit, filter, or remove items directly from the column menu. For example, to view
addresses included in an address group, hover over the object in the Address column
and select Value from the drop-down. This allows you to quickly view the members
and the corresponding IP addresses for the address group without having to navigate
to the Object tab.
To find objects used within a policy based on their name or IP address, use the filter.
After you apply the filter, you will see only the items that match the filter. The filter
also works with embedded objects. For example, when you filter on 10.1.4.8, only the
policy that contains that address is displayed:
Preview rules Preview Rules to view a list of the rules before you push the rules to the managed
(Panorama firewalls. Within each rulebase, the hierarchy of rules is visually demarcated for each
only) device group (and managed firewall) to make it easier to scan through a large numbers
of rules.
Export Administrative roles with a minimum of read-only access can export the policy
Configuration rulebase as PDF/CSV. You can apply filters to create more specific table configuration
Table
Highlight Highlight any policy rule with no traffic matches in the Rule Usage column.
Unused Rule
Group Manage tag groups when you have the View Rulebase as Groups box checked. You
can perform the following actions:
• Move rules in group to different rulebase or device group—Move the selected tag
group to a different device group.
• Change group of all rules—Move the rules in the selected tag group to a different
tag group in the rulebase.
• Delete all rules in group—Deletes all rules in the selected tag group.
• Clone all rules in group—Clones the rules in the selected tag group to a device
group.
View Rulebase View Rulebase as Groups to view the policy rulebase using the tag used in Group
as Groups Rules by Tag . The visible policy rules are those which belong to the selected tag
group.
Test Policy Perform a test of the protection policies for the selected policy rulebase to verify that
Match the correct traffic is denied and allowed.
General Tab
Name The Name that identifies the rule is read-only; you cannot override it.
Rule Type The Rule Type is read-only; you cannot override it.
Actions Tab
Action Setting Select the appropriate Action for traffic that matches the rule.
• Allow—(default) Allows the traffic.
• Deny—Blocks traffic and enforces the default Deny Action that is
defined for the application that the firewall is denying. To view the
deny action that is defined by default for an application, view the
application details in Objects > Applications.
• Drop—Silently drops the application. The firewall does not send a
TCP reset message to the host or application.
• Reset client—Sends a TCP reset message to the client-side device.
• Reset server—Sends a TCP reset message to the server-side
device.
• Reset both—Sends a TCP reset message to both the client-side and
server-side devices.
Profile Setting Profile Type—Assign profiles or profile groups to the security rule:
• To specify the checking that the default security profiles perform,
select Profiles and then select one or more of the individual
Antivirus, Vulnerability Protection, Anti-Spyware, URL Filtering,
File Blocking, Data Filtering, WildFire Analysis, SCTP Protection,
and Mobile Network Protection profiles.
• To assign a profile group rather than individual profiles, select
Group and then select a Group Profile from the drop-down.
• To define new profiles ( Objects > Security Profiles) or profile
groups, click New in the drop-down for the corresponding profile
or group profile.
You must have a SaaS Inline Security subscription to see the New App Viewer in the
interface. The New App Viewer includes cloud-delivered applications in addition to
content-delivered applications and if you don’t have a SaaS Inline Security subscription,
you don’t receive cloud-delivered applications.
• Policies > Security > Policy Optimizer > Rules Without App Controls and then click the number in Apps
Seen or click Compare.
• Policies > Security > Policy Optimizer > Unused Apps and then click the number in Apps Seen or click
Compare.
• Policies > Security and then click the number in Apps Seen
On the Usage tab of the Security policy rule, you can also Compare Applications & Applications Seen to
access tools that help you to migrate from port-based Security policy rules to application-based Security
policy rules and to eliminate unused applications from rules in Applications & Usage.
Field Description
Apps Seen All applications seen and allowed on the firewall that matched
the rule. The number next to Apps Seen indicates how many
applications were seen on the rule.
• Applications—The applications seen on the rule. For example,
if a rule allows web-browsing traffic (as seen in Apps on Rule),
you may see many applications in the Apps Seen list because
there are many applications identified as web-browsing.
• Subcategory—The subcategory of the application.
• Risk—The risk rating of the application.
• First Seen—The first day the application was seen on the
network.
• Last Seen—The most recent day the application was seen on
the network.
Create Cloned Rule > Applications Select applications and then clone or add individual applications
to a rule:
Add to This Rule
• Name (Clone and Add Apps to Existing Rule dialogs only).
Add to Existing Rule > Applications
• Clone: Enter the name of the new cloned rule.
• Add Apps to Existing Rule: Select the rule to which to add
applications or enter the name of the rule.
• Applications:
• Add container app (default): Selects all apps in the
container, apps seen on the rule, and container apps that
have not been seen on the rule. Future apps seen for the
Create Cloned Rule > Application Select applications and then clone or add applications to a rule in
Group an Application Group in the Create Cloned Rule or Add Apps to
Existing Rule dialog box:
Add to Existing Rule > Application
Group • Cloned Rule Name or Name:
• Cloned Rule Name: Enter the name of the new cloned rule.
• Name: Select the rule to which to add the Application
Group or enter the name of the rule.
• Policy Action (Cloned rule only)—Select whether to allow or
deny the traffic in the cloned rule.
• Add to Application Group—Select an existing group or type a
new name to create a new Application Group.
• Applications:
• Add container app (default): Selects all apps in the
container, apps seen on the rule, and container apps that
have not been seen on the rule. Future apps seen for the
container will match the rule, thus future-proofing it as the
app changes.
• Add specific apps seen: Selects only apps that have actually
been seen on the rule. (You can also manually select
container apps and functional apps.)
• Application:
• The selected applications seen on the rule, highlighted
green.
Create Cloned Rule > Application Select applications and then clone or add applications to a rule in
Filter an Application Filter in the Create Cloned Rule or Add Apps to
Existing Rule dialog box:
Add to Existing Rule > Application
Filter • Cloned Rule Name or Existing Rule Name:
• Cloned Rule Name: Enter the name of the new cloned rule.
• Existing Rule Name: Select the rule to which to add the
Application Filter or enter the name of the rule.
• Policy Action (Cloned rule only)—Select whether to allow or
deny the traffic in the cloned rule.
• Application Filter Name—Select an existing filter or type a new
name to create a new Application Filter.
The Application Filter works the same way as Objects >
Application Filters (see Create an Application Filter). You can
filter cloud-based (with a SaaS Inline Security subscription) and
content-based applications and add them to existing or new
filters.
Traffic (Bytes, 30 days) Traffic (30 days)—The amount of traffic in bytes seen during the
last 30-day period.
Apps Allowed The applications that the rule allows. Open the Application dialog,
from which you can add and delete applications on the rule.
Application (New App Viewer only) The applications that the rule allows.
Apps Seen The number of applications seen on the rule. Click the number
to open the Applications & Usage dialog, which enables you
to compare the applications configured on the rule against the
applications seen on the rule and to modify the applications.
Day with No New Apps The number of days since the last new application was seen on
the rule.
(Rule Usage) Last Hit The most recent time that traffic matched the rule.
(Rule Usage) First Hit The first time that traffic matched the rule.
(Rule Usage) Hit Count The number of times that traffic matched the rule.
Modified The date and time that the rule was last modified.
Created The date and time that the rule was created.
Timeframe The time period (number of days) for which data is displayed.
Usage Displays:
• Any (all) rules on the firewall over the specified Timeframe,
regardless of whether traffic matched the rules (used rules) or
not (unused rules).
• Unused rules that traffic has not matched over the specified
Timeframe.
• Used rules that traffic has matched over the specified
Timeframe.
Exclude rules reset during the last Does not display rules for which you Reset Rule Hit Counter
xx days within the specified number of days (from 1-5,000 days). For
example, this enables you to examine older rules that have not
matched traffic over a Timeframe while excluding newer rules
that may not have had time to match traffic.
Reset Date The last date on which the rule’s hit counter was reset.
Name Enter a name to identify the rule. The name is case-sensitive and can have up to 63
characters, which can be letters, numbers, spaces, hyphens, and underscores. The
name must be unique on a firewall and, on Panorama, unique within its device group
and any ancestor or descendant device groups.
Tag If you want to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter policies. This is
useful when you have defined many policies and want to view those that are tagged
with a particular keyword.
Group Rules by Enter a tag with which to group similar policy rules. The group tag allows you to
Tag view your policy rule base based on these tags. You can group rules based on a Tag.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The audit
comment is case-sensitive and can have up to 256 characters, which can be letters,
numbers, spaces, hyphens, and underscores.
Audit Comment View previous Audit Comments for the policy rule. You can export the Audit
Archive Comment Archive CSV format.
Source Zone / Select one or more source and destination zones for the original (non-NAT)
Destination Zone packet (default is Any). Zones must be of the same type (Layer 2, Layer 3, or
virtual wire). To define new zones, refer to Network > Zones.
You can specify multiple zones to simplify management. For example, you can
configure settings so that multiple internal NAT addresses are directed to the
same external IP address.
Destination Interface Specify the destination interface of packets the firewall translates. You can
use the destination interface to translate IP addresses differently in the case
where the network is connected to two ISPs with different IP address pools.
Service Specify the service for which the firewall translates the source or destination
address. To define a new service group, select Objects > Service Groups.
Source Address / Specify a combination of source and destination addresses for the firewall to
Destination Address translate.
For NPTv6, the prefixes configured for Source Address and Destination
Address must be in the format xxxx:xxxx::/yy. The address cannot have an
interface identifier (host) portion defined. The range of supported prefix
lengths is /32 to /64.
Source Address Select the Translation Type (dynamic or static address pool) and enter an IP address
Translation or address range (address1—address2) to which the source address is translated
(Translated Address). The size of the address range is limited by the type of address
pool:
• Dynamic IP and Port—Address selection is based on a hash of the source IP
address. For a given source IP address, the firewall uses the same translated
source address for all sessions. Dynamic IP and Port (DIPP) source NAT supports
approximately 64,000 concurrent sessions on each IP address in the NAT pool.
Some models support oversubscription, which allows a single IP to host more
than 64,000 concurrent sessions.
Palo Alto Networks® DIPP NAT supports more NAT sessions than are supported
by the number of available IP addresses and ports. With oversubscription, the
firewall can use IP address and port combinations two times simultaneously on
PA-220, PA-820, PA-850, VM-50, VM-300, and VM-1000-HV firewalls, four
times simultaneously on PA-5220 firewall and PA-3200 Series firewalls, and
eight times simultaneously on PA-5250, PA-5260, PA-5280, PA-7050, PA-7080,
VM-500, and VM-700 firewalls when destination IP addresses are unique.
• Dynamic IP—Translates to the next available address in the specified range but
the port number remains unchanged. Up to 32,000 consecutive IP addresses are
supported. A dynamic IP pool can contain multiple subnets, so you can translate
your internal network addresses to two or more separate public subnets.
• Advanced (Dynamic IP/Port Fallback)—Use this option to create a fallback pool
that performs IP and port translation and is used if the primary pool runs out
of addresses. You can define addresses for the pool by using the Translated
Address option or the Interface Address option; the latter option is for interfaces
that receive an IP address dynamically. When creating a fallback pool, make sure
addresses do not overlap with addresses in the primary pool.
Source Address • Static IP—The same address is always used for the translation and the port is
Translation (cont) unchanged. For example, if the source range is 192.168.0.1—192.168.0.10
and the translation range is 10.0.0.1—10.0.0.10, address 192.168.0.2 is always
translated to 10.0.0.2. The address range is virtually unlimited.
You must use Static IP translation for NPTv6 Source Address Translation. For
NPTv6, the prefixes configured for Translated Address must be in the format
xxxx:xxxx::/yy and the address cannot have an interface identifier (host) portion
defined. The range of supported prefix lengths is /32 to /64.
Bi-directional (Optional) Enable bidirectional translation for a Static IP source address translation
if you want the firewall to create a corresponding translation (NAT or NPTv6) in the
opposite direction of the translation you configure.
Destination Configure the following options to have the firewall perform destination NAT. You
Address typically use Destination NAT to allow an internal server, such as an email server, to
Translation be accessible from the public network.
Translation Type Select the type of translation the firewall performs on the destination address:
and Translated
• None (default)
Address
• Static IP—Enter a Translated Address as an IP address or range of IP addresses
and a Translated Port number (1 to 65535) to which the original destination
address and port number are translated. If the Translated Port field is blank, the
destination port is not changed.
For NPTv6, the prefixes configured for the Destination prefix Translated
Address must be in the format xxxx:xxxx::/yy. The address cannot have an
interface identifier (host) portion defined. The range of supported prefix lengths
is /32 to /64.
Session If you select the destination NAT translation to be to Dynamic IP (with session
Distribution distribution), it’s possible that the destination translated address (to an FQDN,
Method address object, or address group) can resolve to more than one address. You can
choose how the firewall distributes (assigns) sessions among those addresses to
provide more balanced session distribution:
• Round Robin—(default) Assigns new sessions to IP addresses in rotating order.
Unless your environment dictates that you choose one of the other distribution
methods, use this method.
Enable DNS In PAN-OS 9.0.2 and later 9.0 releases, if the destination NAT policy rule type
Rewrite is ipv4 and the destination address translation type is Static IP, the Enable DNS
Rewrite option is available. You can enable DNS rewrite if you use destination
NAT and also use DNS services on one side of the firewall to resolve FQDNs for
a client on the other side of the firewall. When the DNS response traverses the
firewall, the firewall rewrites the IP address in the DNS response, relative to the
original destination address or translated destination address that the DNS response
matches in the NAT policy rule. A single NAT policy rule has the firewall perform
NAT on packets that match the rule and perform NAT on IP addresses in DNS
responses that match the rule. You must specify how the firewall performs NAT on
an IP address in a DNS response relative to the NAT rule—reverse or forward:
• reverse—(default) If the packet is a DNS response that matches the translated
destination address in the rule, translate the DNS response using the reverse
translation that the rule uses. For example, if the rule translates 1.1.1.10 to
192.168.1.10, the firewall rewrites a DNS response of 192.168.1.10 to 1.1.1.10.
• forward—If the packet is a DNS response that matches the original destination
address in the rule, translate the DNS response using the same translation
the rule uses. For example, if the rule translates 1.1.1.10 to 192.168.1.10, the
firewall rewrites a DNS response of 1.1.1.10 to 192.168.1.10.
Any (target all Enable (check) to push the policy rule to all managed firewalls in the device group.
devices)
Devices Select one or more managed firewalls associated with the device group to push the
policy rule to.
Tags Add one or more tags to push the policy rule to managed firewalls in the device
group with the specified tag.
Target to all but Enable (check) to push the policy rule to all managed firewalls associated with the
these specified device group except for the selected device(s) and tag(s).
devices and tags
General Tab
Name Enter a name to identify the rule (up to 63 characters). The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens,
and underscores.
Tag If you need to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter policies.
This is useful when you have defined many policies and want to view those
that are tagged with a particular keyword. For example, you may want
to tag certain security policies with Inbound to DMZ, decryption policies
with the words Decrypt and No-decrypt, or use the name of a specific data
center for policies associated with that location.
Group Rules by Tag Enter a tag with which to group similar policy rules. The group tag allows
you to view your policy rule base based on these tags. You can group rules
based on a Tag.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The
audit comment is case-sensitive and can have up to 256 characters, which
can be letters, numbers, spaces, hyphens, and underscores.
Audit Comment Archive View previous Audit Comments for the policy rule. You can export the
Audit Comment Archive in CSV format.
Source Tab
Source Zone Select one or more source zones (default is any). Zones must be of the same
type (Layer 2, Layer 3, or virtual wire).
Source Address Specify a combination of source IPv4 or IPv6 addresses for which the
identified application can be overridden. To select specific addresses,
choose select from the drop-down and do any of the following:
•
Select this option next to the appropriate addresses and/or address
groups in the Available column, and click Add to add your selections
to the Selected column.
• Enter the first few characters of a name in the search field to list all
addresses and address groups that start with those characters. Selecting
an item in the list enables this option in the Available column. Repeat
this process as often as needed, and then click Add.
• Enter one or more IP addresses (one per line), with or without a network
mask. The general format is: <ip_address>/<mask>
• To remove addresses, select them (Selected column) and click Delete or
select any to clear all addresses and address groups.
To add new addresses that can be used in this or other policies, click New
Address. To define new address groups, select Objects > Address Groups.
Source User Specify the source users and groups to which the QoS policy will apply.
Negate Select this option to have the policy apply if the specified information on
this tab does NOT match.
Destination Tab
Destination Zone Select one or more destination zones (default is any). Zones must be of the
same type (Layer 2, Layer 3, or virtual wire).
Destination Address Specify a combination of source IPv4 or IPv6 addresses for which the
identified application can be overridden. To select specific addresses,
choose select from the drop-down and do any of the following:
•
Select this option next to the appropriate addresses and/or address
groups in the Available column, and Add your selections to the
Selected column.
• Enter the first few characters of a name in the search field to list all
addresses and address groups that start with those characters. Selecting
an item in the list enables this option in the Available column. Repeat
this process as often as needed, and then click Add.
• Enter one or more IP addresses (one per line), with or without a network
mask. The general format is: <ip_address>/<mask>.
• To remove addresses, select them (Selected column) and click Delete or
select any to clear all addresses and address groups.
To add new addresses that can be used in this or other policies, click New
Address.
Negate Select this option to have the policy apply if the specified information on
this tab does not match.
Application Tab
Application Select specific applications for the QoS rule. To define new applications or
application groups, select Objects > Applications.
If an application has multiple functions, you can select the overall
application or individual functions. If you select the overall application,
all functions are included, and the application definition is automatically
updated as future functions are added.
If you are using application groups, filters, or container in the QoS rule, you
can view details on these objects by holding your mouse over the object in
the Application column, click the down arrow and select Value. This enables
you to easily view application members directly from the policy without
having to go to the Objects tab.
Service Select services to limit to specific TCP and/or UDP port numbers. Choose
one of the following from the drop-down:
• any—The selected applications are allowed or denied on any protocol or
port.
• application-default—The selected applications are allowed or denied
only on their default ports defined by Palo Alto Networks. This option is
recommended for allow policies.
• Select—Click Add. Choose an existing service or choose Service or
Service Group to specify a new entry.
DSCP/TOS Tab
Any Select Any (default) to allow the policy to match to traffic regardless of the
Differentiated Services Code Point (DSCP) value or the IP Precedence/Type
of Service (ToS) defined for the traffic.
Class Choose the QoS class to assign to the rule, and click OK. Class
characteristics are defined in the QoS profile. Refer to Network > Network
Profiles > QoS for information on configuring settings for QoS classes.
Schedule • Select None for the policy rule to remain active at all times.
• From the drop-down, select Schedule (calendar icon) to set a single time
range or a recurring time range during which the rule is active.
Any (target all devices) Enable (check) to push the policy rule to all managed firewalls in the device
group.
Devices Select one or more managed firewalls associated with the device group to
push the policy rule to.
Tags Add one or more tags to push the policy rule to managed firewalls in the
device group with the specified tag.
Target to all but these Enable (check) to push the policy rule to all managed firewalls associated
specified devices and tags with the device group except for the selected device(s) and tag(s).
Field Description
Name Enter a name to identify the rule. The name is case-sensitive and can have
up to 63 characters, which can be letters, numbers, spaces, hyphens, and
underscores. The name must be unique on a firewall and, on Panorama,
unique within its device group and any ancestor or descendant device
groups.
Tag If you need to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter policies.
This is useful when you have defined many policies and want to view those
that are tagged with a particular keyword. For example, you may want
to tag certain security policies with Inbound to DMZ, decryption policies
with the words Decrypt and No-decrypt, or use the name of a specific data
center for policies associated with that location.
Group Rules by Tag Enter a tag with which to group similar policy rules. The group tag allows
you to view your policy rule base based on these tags. You can group rules
based on a Tag.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The
audit comment is case-sensitive and can have up to 256 characters, which
can be letters, numbers, spaces, hyphens, and underscores.
Audit Comment Archive View previous Audit Comments for the policy rule. You can export the
Audit Comment Archive in CSV format.
Field Description
Source Zone To choose source zones (default is any), click Add and select from the drop-
down. To define new zones, refer to Network > Zones.
Multiple zones can be used to simplify management. For example, if you
have three different internal zones (Marketing, Sales, and Public Relations)
that are all directed to the untrusted destination zone, you can create one
rule that covers all cases.
Source Address Click Add to add source addresses, address groups, or regions (default
is any). Select from the drop-down, or click Address, Address Group, or
Regions at the bottom of the drop-down, and specify the settings.
Source User Click Add to choose the source users or groups of users subject to the
policy. The following source user types are supported:
• any—Include any traffic regardless of user data.
• pre-logon—Include remote users that are connected to the network
using GlobalProtect™, but are not logged into their system. When the
Pre-logon option is configured on the Portal for GlobalProtect apps, any
user who is not currently logged into their machine will be identified
with the username pre-logon. You can then create policies for pre-logon
users and although the user is not logged in directly, their machines are
authenticated on the domain as if they were fully logged in.
• known-user—Includes all authenticated users, which means any IP with
user data mapped. This option is equivalent to the “domain users” group
on a domain.
• unknown—Includes all unauthenticated users, which means IP addresses
that are not mapped to a user. For example, you could use unknown for
guest level access to something because they will have an IP on your
Field Description
Destination Address Click Add to add destination addresses or address groups (default is any).
By default, the rule applies to Any IP address. Select from the drop-down,
or click Address or Address Group at the bottom of the drop-down, and
specify the settings.
Application/Service Select specific applications or services for the PBF rule. To define new
applications, refer to Defining Applications. To define application groups,
refer to Objects > Application Groups.
You can view details on these applications by holding your mouse over the
object in the Application column, clicking the down arrow, and selecting
Value. This enables you to easily view application information directly from
the policy without having to go to the Object tabs.
Next Hop If you direct the packet to a specific interface, specify the Next Hop for the
packet in one of the following ways:
• IP Address—Select IP Address and select an address object (or create a
new address object) that uses an IPv4 or IPv6 address.
• FQDN—Select FQDN and select an address object (or create a new
address object) that uses an FQDN.
• None—There is no next hop; the packet is dropped.
Enforce Symmetric (Required for asymmetric routing environments) Select Enforce Symmetric
Return Return and enter one or more IP addresses in the Next Hop Address List.
Enabling symmetric return ensures that return traffic (such as from the
Trust zone on the LAN to the Internet) is forwarded out through the same
interface through which traffic ingresses from the internet.
Schedule To limit the days and times when the rule is in effect, select a schedule
from the drop-down. To define new schedules, refer to Settings to Control
Decrypted SSL Traffic.
Any (target all Enable (check) to push the policy rule to all managed firewalls in the device group.
devices)
Devices Select one or more managed firewalls associated with the device group to push the
policy rule to.
Tags Add one or more tags to push the policy rule to managed firewalls in the device
group with the specified tag.
Target to all but Enable (check) to push the policy rule to all managed firewalls associated with the
these specified device group except for the selected device(s) and tag(s).
devices and tags
The firewall doesn’t decrypt applications that break decryption technically, for example
because they use pinned certificates or client authentication.
Refer to the List of Applications Excluded from SSL Decryption.
Field Description
Name Enter a name to identify the rule. The name is case-sensitive and
can have up to 63 characters, which can be letters, numbers, spaces,
hyphens, and underscores. The name must be unique on a firewall
and, on Panorama, unique within its device group and any ancestor or
descendant device groups.
Tag If you need to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter
policies. This is useful when you have defined many policies and want
Group Rules by Tag Enter a tag with which to group similar policy rules. The group tag
allows you to view your policy rule base based on these tags. You can
group rules based on a Tag.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The
audit comment is case-sensitive and can have up to 256 characters,
which can be letters, numbers, spaces, hyphens, and underscores.
Audit Comment Archive View previous Audit Comments for the policy rule. You can export the
Audit Comment Archive in CSV format.
Field Description
Source Zone Click Add to choose source zones (default is any). Zones must be of the
same type (Layer 2, Layer 3, or virtual wire). To define new zones, refer to
Network > Zones.
Multiple zones can be used to simplify management. For example, if you
have three different internal zones (Marketing, Sales, and Public Relations)
that are all directed to the untrusted destination zone, you can create one
rule that covers all cases.
Source Address Click Add to add source addresses, address groups, or regions (default
is any). Select from the drop-down, or click Address, Address Group, or
Regions at the bottom of the drop-down, and specify the settings. Select
Negate to choose any address except the configured ones.
Source User Click Add to choose the source users or groups of users subject to the
policy. The following source user types are supported:
• any—Include any traffic regardless of user data.
• pre-logon—Include remote users that are connected to the network
using GlobalProtect, but are not logged into their system. When the
Pre-logon option is configured on the Portal for GlobalProtect apps, any
user who is not currently logged into their machine will be identified
with the username pre-logon. You can then create policies for pre-logon
users and although the user is not logged in directly, their machines are
authenticated on the domain as if they were fully logged in.
• known-user—Includes all authenticated users, which means any IP with
user data mapped. This option is equivalent to the “domain users” group
on a domain.
Field Description
Destination Zone Click Add to choose destination zones (default is any). Zones must
be of the same type (Layer 2, Layer 3, or virtual wire). To define
new zones, refer to Network > Zones.
Multiple zones can be used to simplify management. For example,
if you have three different internal zones (Marketing, Sales, and
Public Relations) that are all directed to the untrusted destination
zone, you can create one rule that covers all cases.
Destination Address Click Add to add destination addresses, address groups, or regions
(default is any). Select from the drop-down, or click Address,
Address Group, or Regions at the bottom of the drop-down, and
specify the settings. Select Negate to choose any address except
the configured ones.
Field Description
Service Apply the decryption policy to traffic based on specific TCP port
numbers. Choose one of the following from the drop-down:
• any—The selected applications are allowed or denied on any
protocol or port.
URL Category Tab Select URL categories for the decryption rule.
• Choose any to match any sessions regardless of the URL
category.
• To specify a category, click Add and select a specific category
(including a custom category) from the drop-down. You can
add multiple categories. Refer to for information on defining
custom categories.
Field Description
Decryption Profile Attach a decryption profile to the policy rule in order to block
and control certain aspects of the traffic. For details on creating a
decryption profile, select Objects > Decryption Profile.
Log Settings
Log Successful SSL (Optional) Creates detailed logs of successful SSL Decryption
Handshake handshakes. Disabled by default.
Log Unsuccessful SSL Creates detailed logs of unsuccessful SSL Decryption handshakes so
Handshake you can find the cause of decryption issues. Enabled by default.
Log Forwarding Specify the method and location to forward GlobalProtect SSL
handshake (decryption) logs.
Any (target all Enable (check) to push the policy rule to all managed firewalls in the device group.
devices)
Devices Select one or more managed firewalls associated with the device group to push the
policy rule to.
Tags Add one or more tags to push the policy rule to managed firewalls in the device
group with the specified tag.
Target to all but Enable (check) to push the policy rule to all managed firewalls associated with the
these specified device group except for the selected device(s) and tag(s).
devices and tags
Field Description
Name Enter a name to identify the rule. The name is case-sensitive and can have
up to 63 characters, which can be letters, numbers, spaces, hyphens, and
underscores. The name must be unique on a firewall and, on Panorama,
unique within its device group and any ancestor or descendant device
groups.
Tag If you need to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter policies.
This is useful when you have defined many policies and want to view
policies that are tagged with a particular keyword. For example, the tag
could indicate network location, Layer 3 security chains, or Layer 1 security
chains.
Group Rules by Tag Enter a tag with which to group similar policy rules. The group tag allows
you to view groups of policy rules base based on these tags.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The
audit comment is case-sensitive and can have up to 256 characters, which
can be letters, numbers, spaces, hyphens, and underscores.
Audit Comment Archive View previous Audit Comments for the policy rule. You can export the
Audit Comment Archive in CSV format.
Field Description
Source Zone To choose source zones (default is any), click Add and select from the drop-
down. To define new zones, refer to Network > Zones.
You can add multiple zones to simplify management.
Source Address Add source addresses, address groups, or regions (default is Any). Select
from the drop-down or select Address object, Address Group, or Regions
(bottom of the drop-down) to specify the settings. Objects > Addresses
and Objects > Address Groups describe the types of address objects and
address groups, respectively, that a policy rule supports.
Selecting the Negate option applies the rule to source addresses from the
specified zone except for the addresses specified.
Source User Click Add to choose the source users or groups of users subject to the
policy. The following source user types are supported:
• any—Include any traffic regardless of user data.
• pre-logon—Include remote users that are connected to the network
using GlobalProtect™, but are not logged into their system. When the
Pre-logon option is configured on the Portal for GlobalProtect apps,
any user who is not currently logged into their machine is identified
with the username pre-logon. You can then create policies for pre-logon
users and although the user is not logged in directly, their machines are
authenticated on the domain as if they were fully logged in.
• known-user—Includes all authenticated users, which means any IP with
user data mapped. This option is equivalent to the “domain users” group
on a domain.
• unknown—Includes all unauthenticated users, which means IP addresses
that are not mapped to a user. For example, you could use unknown for
guest level access to something because they will have an IP on your
network, but are not authenticated to the domain and do not have IP
address-to-user mapping information on the firewall.
• Select—Includes selected users as determined by the selection in
this window. For example, you may want to add one user, a list of
individuals, some groups, or manually add users.
Field Description
Destination Zone To choose source zones (default is any), click Add and select from the drop-
down. To define new zones, refer to Network > Zones.
You can add multiple zones to simplify management.
Destination Address Add destination addresses, address groups, or regions (default is Any).
Select from the drop-down or click Address object, Address Group, or
Regions (bottom of the drop-down) to specify address settings. Objects
> Addresses and Objects > Address Groups describe the types of address
objects and address groups, respectively, that a policy rule supports.
Selecting the Negate option applies the rule to destination addresses in the
specified zone except for the addresses specified.
Destination Device Add the host devices subject to the policy individually or select Any to
include all devices.
Field Description
Traffic Type Select the traffic type or traffic types to forward to the security chain. You
can select one, some, or all of the traffic types in one rule:
• Forward TLS(Decrypted) Traffic—(Default) Forwards decrypted TLS
traffic to the security chain specified by the Packet Broker profile
attached to the Network Packet Broker policy.
• Forward TLS(Non-Decrypted) Traffic—Forwards undecrypted TLS
traffic to the security chain specified by the Packet Broker profile
attached to the Network Packet Broker policy.
• Forward Non-TLS Traffic—Forwards cleartext (non-TLS) traffic to the
security chain specified by the Packet Broker profile attached to the
Network Packet Broker policy.
Application Add specific applications for the Network Packet Broker policy rule. If an
application has multiple functions, you can select the container application
or individual functional applications. If you select the container application,
all functional applications are included and the application definition is
automatically updated as future functional apps are added to the container
app.
Service Select the services that you want to limit to specific TCP or UDP port
numbers. Choose one of the following from the drop-down:
• any—(Default) The selected applications are forwarded on any protocol
or port.
• application-default—The selected applications are forwarded only if
they are on their default ports as defined by Palo Alto Networks®.
(Applications that run on non-standard ports and protocols, if
unintentional, can be a sign of undesired application behavior and
usage, and if intentional, can be a sign of malicious behavior. However,
internal custom applications may use non-standard ports and require
exceptions.)
• Select—Add an existing service or choose Service or Service Group to
specify a new entry. (Or select Objects > Services and Objects > Service
Groups).
Field Description
Timeframe The time period (number of days) for which data is displayed.
Usage • Any all Network Packet Broker policy rules on the firewall over the
specified Timeframe, regardless of whether traffic matched the rules
(used rules) or not (unused rules).
• Unused rules that traffic has not matched over the specified Timeframe.
• Used rules that traffic has matched over the specified Timeframe.
Exclude rules reset during Omits displaying rules for which you Reset Rule Hit Counter within the
the last “n” days specified number of days (from 1-5,000 days). For example, this enables
you to examine older rules that have not matched traffic over a particular
Timeframe while excluding newer rules that may not have had time to
match traffic.
Packet Broker • Profile—The name of the Packet Broker profile associated with the
policy rule.
• Traffic Type—The type or types of traffic the rule controls (one or more
of decrypted TLS, non-decrypted TLS, and non-TLS traffic).
Rule Usage • Hit Count—The number of times that traffic matched the rule.
• Last Hit—The most recent time that traffic matched the rule.
• First Hit—The first time that traffic matched the rule.
• Reset Date—The last date on which the rule’s hit counter was reset.
Modified The date and time that the rule was last modified.
Created The date and time that the rule was created.
What are the fields available to Building Blocks in a Tunnel Inspection Policy
create a Tunnel Inspection policy?
How can I view tunnel inspection Log Types and Severity Levels
logs?
Name General Enter a name for the Tunnel Inspection policy beginning
with an alphanumeric character and containing zero or
more alphanumeric, underscore, hyphen, period, or space
characters.
Group Rules by Tag Enter a tag with which to group similar policy rules. The
group tag allows you to view your policy rule base based
on these tags. You can group rules based on a Tag.
Audit Comment View previous Audit Comments for the policy rule. You
Archive can export the Audit Comment Archive in CSV format.
Source Zone Source Add one or more source zones of packets to which the
Tunnel Inspection policy applies (default is Any).
Destination Zone Destination Add one or more destination zones of packets to which
the Tunnel Inspection policy applies (default is Any).
Tunnel Protocol Inspection Add one or more tunnel Protocols that you want the
firewall to inspect:
• GRE—Firewall inspects packets that use Generic
Route Encapsulation in the tunnel.
Maximum Tunnel Inspection > Inspect Specify whether the firewall will inspect One
Inspection Levels Options Level (default) or Two Levels (Tunnel In Tunnel)
of encapsulation. For VXLAN, select One Level, as
inspection only occurs on the outer layer.
Drop packet if over (Optional) Drop packets that contain more levels of
maximum tunnel encapsulation than you specified for Maximum Tunnel
inspection level Inspection Levels.
Drop packet if (Optional) Drop packets that contain a protocol inside the
unknown protocol tunnel that the firewall cannot identify.
inside tunnel
Return Scanned (Optional) Enable this option to return the traffic to the
VXLAN Tunnel to originating VXLAN tunnel endpoint (VTEP). For example,
Source use this option to return the encapsulated packet to
the source VTEP. Supported only on Layer 3, Layer 3
subinterface, aggregate-interface Layer 3, and VLAN.
Enable Security Inspection > (Optional) Enable Security Options to assign security
Options Security Options zones for separate Security policy treatment of tunnel
content. The inner content source will belong to the
Tunnel Source Zone you specify and the inner content
destination will belong to the Tunnel Destination Zone
you specify.
Tunnel Source Zone If you Enable Security Options, select a tunnel zone that
you created, and the inner content will use this source
zone for the purpose of policy enforcement.
Otherwise, by default the inner content source belongs
to the same zone as the outer tunnel source, and the
policies of the outer tunnel source zone apply to the
inner content source zone also.
Monitor Name Inspection > (Optional) Enter a monitor name to group similar traffic
Monitor Options together for monitoring the traffic in logs and reports.
Monitor Tag (Optional) Enter a monitor tag number that can group
(number) similar traffic together for logging and reporting (range is
1 to 16,777,215). The tag number is globally defined.
Log at Session Start (Optional) Select this option to generate a log at the
start of a cleartext tunnel session that matches the
Tunnel Inspection policy. This setting overrides the Log
at Session Start setting in the Security Policy rule that
applies to the session.
Tunnel logs are stored separately from traffic logs. The
information with the outer tunnel session (GRE, non-
encrypted IPSec, or GTP-U) is stored in the Tunnel logs
and the inner traffic flows are stored in the Traffic logs.
This separation allows you to easily report on tunnel
activity (as opposed to inner content activity) with the
ACC and reporting features.
Log at Session End (Optional) Select this option to capture a log at the end
of a cleartext tunnel session that matches the Tunnel
Inspection policy. This setting overrides the Log at
Session End setting in the Security Policy rule that
applies to the session.
Log Forwarding (Optional) Select a Log Forwarding profile from the drop-
down to specify where to forward tunnel inspection logs.
(This setting is separate from the Log Forwarding setting
in a Security policy rule, which applies to traffic logs.)
Any (target all Target Enable (check) to push the policy rule to all managed
devices) firewalls in the device group.
Panorama only
Tags Add one or more tags to push the policy rule to managed
firewalls in the device group with the specified tag.
Panorama only
Target to all but Enable (check) to push the policy rule to all managed
these specified firewalls associated with the device group except for the
devices and tags selected device(s) and tag(s).
Panorama only
If possible, avoid using application override policies because they prevent the firewall from
using App-ID to identify applications and from performing layer 7 inspection for threats. To
support internal proprietary applications, it’s better to create custom applications that include
the application signature so the firewall performs layer 7 inspection and scans the application
traffic for threats. If a commercial application doesn’t have an App-ID, submit a request for
a new App-ID. If a public application definition (default ports or signature) changes so the
firewall no longer identifies the application correctly, create a support ticket so Palo Alto
Networks can update the definition. In the meantime, create a custom application so the
firewall continues to perform layer 7 inspection of the traffic.
Like security policies, application override policies can be as general or specific as needed. The policy rules
are compared against the traffic in sequence, so the more specific rules must precede the more general
ones.
Because the App-ID engine in PAN-OS classifies traffic by identifying the application-specific content
in network traffic, the custom application definition cannot simply use a port number to identify an
application. The application definition must also include traffic (restricted by source zone, source IP address,
destination zone, and destination IP address).
To create a custom application with application override:
• Create a custom application (see Defining Applications). It is not required to specify signatures for the
application if the application is used only for application override rules.
• Define an application override policy that specifies when the custom application should be invoked. A
policy typically includes the IP address of the server running the custom application and a restricted set
of source IP addresses or a source zone.
Use the following tables to configure an application override rule.
• Application Override General Tab
• Application Override Source Tab
• Application Override Destination Tab
• Application Override Protocol/Application Tab
• (Panorama only) Application Override Target Tab
Looking for more?
See Use Application Objects in Policy
Name Enter a name to identify the rule. The name is case-sensitive and
can have up to 63 characters, which can be letters, numbers, spaces,
hyphens, and underscores. The name must be unique on a firewall
and, on Panorama, unique within its device group and any ancestor or
descendant device groups.
Tag If you need to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter
policies. This is useful when you have defined many policies and want
to view those that are tagged with a particular keyword. For example,
you may want to tag certain security policies with Inbound to DMZ,
decryption policies with the words Decrypt and No-decrypt, or use the
name of a specific data center for policies associated with that location.
Group Rules by Tag Enter a tag with which to group similar policy rules. The group tag
allows you to view your policy rule base based on these tags. You can
select to group rules based on a Tag.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The
audit comment s case-sensitive and can have up to 256 characters,
which can be letters, numbers, spaces, hyphens, and underscores.
Audit Comment Archive View previous Audit Comments for the policy rule. Audit Comment
Archive can be exported in CSV format.
Field Description
Source Zone Add source zones (default is any). Zones must be of the same type
(Layer 2, Layer 3, or virtual wire). To define new zones, refer to
Network > Zones.
Multiple zones can be used to simplify management. For example,
if you have three different internal zones (Marketing, Sales, and
Public Relations) that are all directed to the untrusted destination
zone, you can create one rule that covers all cases.
Source Address Add source addresses, address groups, or regions (default is any).
Select from the drop-down, or click Address, Address Group, or
Regions at the bottom of the drop-down, and specify the settings.
Select Negate to choose any address except the configured ones.
Field Description
Destination Zone Click Add to choose destination zones (default is any). Zones must
be of the same type (Layer 2, Layer 3, or virtual wire). To define
new zones, refer to Network > Zones.
Multiple zones can be used to simplify management. For example,
if you have three different internal zones (Marketing, Sales, and
Public Relations) that are all directed to the untrusted destination
zone, you can create one rule that covers all cases.
Destination Address Click Add to add destination addresses, address groups, or regions
(default is any). Select from the drop-down, or click Address,
Address Group, or Regions at the bottom of the drop-down, and
specify the settings.
Select Negate to choose any address except the configured ones.
Field Description
Protocol Select the protocol (TCP or UDP) for which to allow an application override.
Port Enter the port number (0 to 65535) or range of port numbers (port1-port2)
for the specified destination addresses. Multiple ports or ranges must be
separated by commas.
Application Select the override application for traffic flows that match the above
rule criteria. When overriding to a custom application, there is no threat
inspection that is performed. The exception to this is when you override to
a pre-defined application that supports threat inspection.
To define new applications, refer to Objects > Applications).
Any (target all Enable (check) to push the policy rule to all managed firewalls in the device group.
devices)
Devices Select one or more managed firewalls associated with the device group to push the
policy rule to.
Tags Add one or more tags to push the policy rule to managed firewalls in the device
group with the specified tag.
Target to all but Enable (check) to push the policy rule to all managed firewalls associated with the
these specified device group except for the selected device(s) and tag(s).
devices and tags
What are the fields available to Building Blocks of an Authentication Policy Rule
create an Authentication rule?
How can I use the web interface Create and Manage Authentication Policy
to manage Authentication policy?
For Panorama, see Move or Clone a Policy Rule
The firewall does not prompt users to authenticate if they access non-web-based resources
(such as a printer) through a GlobalProtect™ gateway that is internal or in tunnel mode.
Instead, the users will see connection failure messages. To ensure users can access these
resources, set up an authentication portal and train users to visit it when they see connection
failures. Consult your IT department to set up an authentication portal.
The following table describes each building block or component in an Authentication policy rule. Before you
Add a rule, complete the prerequisites described in Create and Manage Authentication Policy.
Rule number N/A Each rule is automatically numbered and the order
changes as rules are moved. When you filter rules to
match specific filters, the Policies > Authentication
page lists each rule with its number in the context of the
complete set of rules in the rulebase and its place in the
evaluation order. For details, see rule sequence and its
evaluation order .
Name General Enter a name to identify the rule. The name is case-
sensitive and can have up to 63 characters, which can
be letters, numbers, spaces, hyphens, and underscores.
The name must be unique on a firewall and, on
Tag Select a tag for sorting and filtering rules (see Objects >
Tags).
Group Rules by Enter a tag with which to group similar policy rules. The
Tag group tag allows you to view your policy rule base based
on these tags. You can group rules based on a Tag.
Audit View previous Audit Comments for the policy rule. You
Comment can export the Audit Comment Archive in CSV format.
Archive
Source Zone Source Add zones to apply the rule only to traffic coming from
interfaces in the zones that you specify (default is any).
To define new zones, see Network > Zones.
Source User User Select the source users or user groups to which the rule
applies:
• any—Includes any traffic regardless of source user.
• pre-logon—Includes remote users who are not
logged into their client systems but whose client
systems connect to the network through the
GlobalProtect pre-logon feature .
• known-user—Includes all users for whom the firewall
already has IP address-to-username mappings before
the rule evokes authentication.
• unknown—Includes all users for whom the firewall
does not have IP address-to-username mappings.
After the rule evokes authentication, the firewall
Destination Destination Add zones to apply the rule only to traffic going to
Zone interfaces in the zones that you specify (default is any).
To define new zones, see Network > Zones.
Service Service/URL Category Select from the following options to apply the rule only
to services on specific TCP and UDP port numbers:
• any—Specifies services on any port and using any
protocol.
• default—Specifies services only on the default ports
that Palo Alto Networks defines.
• Select—Enables you to Add services or service
groups. To create new services and service groups,
see Objects > Services and Objects > Service
Groups.
URL Category Select the URL categories to which the rule applies:
• Select any to specify all traffic regardless of the URL
category.
• Add categories. To define custom categories, see
Objects > Custom Objects > URL Category.
Any (target all Target Enable (check) to push the policy rule to all managed
devices) firewalls in the device group.
Panorama only
Target to all Enable (check) to push the policy rule to all managed
but these firewalls associated with the device group except for
specified the selected device(s) and tag(s).
devices and
tags
Panorama only
Task Description
Add Perform the following prerequisites before creating Authentication policy rules:
Configure the User-ID™ Authentication Portal settings (see Device > User
Identification > Authentication Portal Settings). The firewall uses Authentication
Portal to display the first authentication factor that the Authentication rule
requires. Authentication Portal also enables the firewall to record the timestamps
associated with authentication Timeout periods and to update user mappings.
Configure a server profile that specifies how the firewall can access the service that
will authenticate users (see Device > Server Profiles).
Assign the server profile to an authentication profile that specifies authentication
settings (see Device > Authentication Profile).
Assign the authentication profile to an authentication enforcement object that
specifies the authentication method (see Objects > Authentication).
To create a rule, perform one of the following steps and then complete the fields
described in Building Blocks of an Authentication Policy Rule:
• Click Add.
• Select a rule on which to base the new rule and click Clone Rule. The firewall
inserts the copied rule, named <rulename>#, below the selected rule, where # is
the next available integer that makes the rule name unique, and generates a new
UUID for the cloned rule. For details, see Move or Clone a Policy Rule.
Modify To modify a rule, click the rule Name and edit the fields described in Building Blocks of
an Authentication Policy Rule.
If the firewall received the rule from Panorama, the rule is read-only;
you can edit it only on Panorama.
Move When matching traffic, the firewall evaluates rules from top to bottom in the order
that the Policies > Authentication page lists them. To change the evaluation order,
select a rule and Move Up, Move Down, Move Top, or Move Bottom. For details, see
Move or Clone a Policy Rule.
Enable/Disable To disable a rule, select and Disable it. To re-enable a disabled rule, select and Enable
it.
Highlight To identify rules that have not matched traffic since the last time the firewall was
Unused Rules restarted, Highlight Unused Rules. You can then decide whether to disable or delete
unused rules. The page highlights unused rules with a dotted yellow background.
Preview rules Click Preview Rules to view a list of the rules before you push the rules to the
(Panorama managed firewalls. Within each rulebase, the page visually demarcates the rule
only) hierarchy for each device group (and managed firewall) to facilitate scanning of
numerous rules.
Field Description
Name Enter a name to identify the DoS Protection policy rule. The name is case-sensitive
and can have up to 63 characters, which can be letters, numbers, spaces, hyphens, and
underscores. The name must be unique on a firewall and, on Panorama, unique within
its device group and any ancestor or descendant device groups.
Tags If you want to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter policies. A tag is
useful when you have defined many policies and want to view those that are tagged
with a particular keyword. For example, you may want to tag certain security policies
with Inbound to DMZ, decryption policies with the words Decrypt or No-decrypt, or
use the name of a specific data center for policies associated with that location.
Group Rules by Enter a tag with which to group similar policy rules. The group tag allows you to view
Tag your policy rule base based on these tags. You can group rules based on a Tag.
Audit Enter a comment to audit the creation or editing of the policy rule. The audit comment
Comment is case-sensitive and can have up to 256 characters, which can be letters, numbers,
spaces, hyphens, and underscores.
Audit View previous Audit Comments for the policy rule. You can export the Audit
Comment Comment Archive in CSV format.
Archive
Field Description
Type Select the type of source to which the DoS Protection policy rule applies:
• Interface —Apply the rule to traffic coming from the specified interface or group of
interfaces.
• Zone—Apply the rule to traffic coming from any interface in a specified zone.
Click Add to select multiple interfaces or zones.
Source Select Any or Add and specify one or more source addresses to which the DoS
Address Protection policy rule applies.
(Optional) Select Negate to specify that the rule applies to any addresses except those
specified.
Source User Specify one or more source users to which the DoS Protection policy rule applies:
• any—Includes packets regardless of the source user.
• pre-logon—Includes packets from remote users that are connected to the network
using GlobalProtect, but are not logged into their system. When pre-logon is
configured on the Portal for GlobalProtect apps, any user who is not currently
logged into their machine will be identified with the username pre-logon. You can
then create policies for pre-logon users and although the user is not directly logged
in, their machines are authenticated on the domain as if they were fully logged in.
• known-user—Includes all authenticated users, which means any IP address with
user data mapped. This option is equivalent to the “domain users” group on a
domain.
• unknown—Includes all unauthenticated users, which means IP addresses that are
not mapped to a user. For example, you could use unknown for guest level access
to something because they will have an IP address on your network, but will not
be authenticated to the domain and will not have IP address-to-username mapping
information on the firewall.
• Select—Includes users specified in this window. For example, you can select one
user, a list of individuals, some groups, or manually add users.
Field Description
Type Select the type of destination to which the DoS Protection policy rule applies:
• Interface—Apply the rule to packets going to the specified interface or group of
interfaces. Click Add and select one or more interfaces.
• Zone—Apply the rule to packets going to any interface in the specified zone. Click
Add and select one or more zones.
Destination Select Any or Add and specify one or more destination addresses to which the DoS
Address Protection policy rule applies.
(Optional) Select Negate to specify that the rule applies to any addresses except those
specified.
Field Description
Service Click Add and select one or more services to which the DoS Protection policy applies.
The default is Any service. For example, if the DoS policy protects web servers, specify
HTTP, HTTPS, and any other appropriate service ports for the web applications.
Action Select the action the firewall performs on packets that match the DoS Protection
policy rule:
• Deny—Drop all packets that match the rule.
• Allow—Permit all packets that match the rule.
Schedule Specify the schedule when the DoS Protection policy rule is in effect. The default
setting of None indicates no schedule; the policy is always in effect.
Alternatively, select a schedule or create a new schedule to control when the DoS
Protection policy rule is in effect. Enter a Name for the schedule. Select Shared to
share this schedule with every virtual system on a multiple virtual system firewall.
Select a Recurrence of Daily, Weekly, or Non-recurring. Add a Start Time and End
Time in hours:minutes, based on a 24-hour clock.
Log If you want to trigger forwarding of threat log entries for matched traffic to an
Forwarding external service, such as to a syslog server or Panorama, select a Log Forwarding
profile or click Profile to create a new one.
The firewall logs and forwards only traffic that matches an action in the
rule.
Aggregate Aggregate DoS Protection profiles set thresholds that apply to combined group of
devices specified in the DoS Protection rule to protect those server groups. For
example, an Alarm Rate threshold of 10,000 CPS means that when the total new CPS
to the entire group exceeds 10,000 CPS, the firewall triggers an alarm message.
Select an Aggregate DoS Protection profile that specifies the threshold rates at which
the incoming connections per second trigger an alarm, activate an action, and exceed a
maximum rate. All incoming connections (the aggregate) count toward the thresholds
specified in an Aggregate DoS Protection profile.
An Aggregate profile setting of None means there are no threshold settings in place
for the aggregate traffic. See Objects > Security Profiles > DoS Protection.
Classified Classified DoS Protection profiles set thresholds that apply to each individual device
specified in the DoS Protection rule to protect individual or small groups of critical
servers. For example, an Alarm Rate threshold of 10,000 CPS means that when the
total new CPS to any individual server specified in the rule exceeds 10,000 CPS, the
firewall triggers an alarm message.
Any (target all Enable (check) to push the policy rule to all managed firewalls in the device group.
devices)
Devices Select one or more managed firewalls associated with the device group to push the
policy rule to.
Tags Add one or more tags to push the policy rule to managed firewalls in the device
group with the specified tag.
Target to all but Enable (check) to push the policy rule to all managed firewalls associated with the
these specified device group except for the selected device(s) and tag(s).
devices and tags
Field Description
Name Enter a name to identify the rule. The name is case-sensitive and
can have up to 63 characters, which can be letters, numbers, spaces,
hyphens, and underscores. The name must be unique on a firewall
and, on Panorama, unique within its device group and any ancestor or
descendant device groups.
Tag If you need to tag the policy, Add and specify the tag.
A policy tag is a keyword or phrase that allows you to sort or filter
policies. This is useful when you have defined many policies and want
to view those that are tagged with a particular keyword. For example,
you may want to tag certain SD-WAN policies with unique tags that
identify specific hubs or branches that the rules applies to.
Group Rules by Tag Enter a tag with which to group similar policy rules. The group tag
allows you to view your policy rule base based on these tags. You can
select to group rules based on a Tag.
Audit Comment Enter a comment to audit the creation or editing of the policy rule. The
audit comment is case-sensitive and can have up to 256 characters,
which can be letters, numbers, spaces, hyphens, and underscores.
Audit Comment Archive View previous Audit Comments for the policy rule. Audit Comment
Archive can be exported in CSV format.
Field Description
Source Zone To specify a source zone, select Add and select one or more zones, or select
Any zone.
Specifying multiple zones can simplify management. For example, if you
have three branches in different zones and you want the remaining match
criteria and path selection to be the same for the three branches, you can
create one SD-WAN rule and specify the three source zones to cover the
three branches.
Source Address To specify source addresses, Add source addresses or external dynamic
lists (EDL), select from the drop-down, or select Address and create a new
address object. Alternatively, select Any source address (default).
Source User To specify certain users, select Add (the type then indicates select) and
enter a user, list of users, or groups of users. Alternatively, select a type of
user:
• any—(default) Include any user, regardless of user data.
• pre-logon—Include remote users who are connected to the network
using GlobalProtect™, but are not logged into their system. When the
Pre-logon option is configured on the Portal for GlobalProtect apps, any
user who is not currently logged into their machine will be identified
with the username pre-logon. You can then create policies for pre-logon
users and although the user is not logged in directly, their machines are
authenticated on the domain as if they were fully logged in.
• known-user—Includes all authenticated users, which means any IP
address with user data mapped. This option is equivalent to the “domain
users” group on a domain.
• unknown—Includes all unauthenticated users, which means IP addresses
that are not mapped to a user. For example, you could select unknown
for guest-level access to something because they will have an IP address
on your network, but will not be authenticated to the domain and will
not have IP address-to-user mapping information on the firewall.
Field Description
Destination Zone Add destination zones (default is any). Zones must be Layer 3. To
define new zones, refer to Network > Zones.
Add Multiple zones to simplify management. For example, if you have
three different internal zones (Marketing, Sales, and Public Relations)
that are all directed to the untrusted destination zone, you can create
one rule that covers all cases.
Destination Address Add destination addresses, address groups, External Dynamic Lists
(EDL), or regions (default is Any). Select from the drop-down, or click
Address or Address Group at the bottom of the drop-down, and
specify the settings.
Select Negate to choose any address except the configured ones.
Field Description
Path Quality Profile Select a path quality profile that determines the maximum jitter,
latency and packet loss percentage thresholds you want to apply to the
specified applications and services. If a path quality profile has not yet
been created, you can create a New SD-WAN Path Quality Profile.
SaaS Quality Profile Select a SaaS quality profile to specify the path quality thresholds for
latency, jitter, and packet loss for a hub or branch firewall that has
Direct Internet Access (DIA) link to a Software-as-a-Service (SaaS)
application. If a SaaS quality profile has not yet been created, you can
create a New SaaS Quality Profile. Default is None (disabled).
Error Correction Profile Select an Error Correction Profile or create a new Error Correction
Profile, which specifies the parameters to control forward error
correction (FEC) or path duplication for the applications or services
specified in the rule. This profile can be used by either hub or branch
firewall. Default is None (disabled).
Applications Add specific applications for the SD-WAN policy rule, or select Any. If
an application has multiple functions, select the overall application or
individual functions. If you select the overall application, all functions
Service Add specific services for the SD-WAN policy rule and select on which
ports packets from these services are allowed or denied:
• any—The selected services are allowed or denied on any protocol or
port.
• application-default—The selected services are allowed or denied
only on their default ports defined by Palo Alto Networks®. This
option is recommended for policies that specify the allow action
because it prevents services from running on unusual ports and
protocols which, if unintentional, can be a sign of undesired service
behavior and usage.
Traffic Distribution Profile From the drop-down select a traffic distribution profile, which
determines how the firewall selects an alternate path for the
application or service traffic when one of the path health metrics for
the preferred path exceeds the threshold configured in the path quality
profile for the rule.
Field Description
Any (target all devices) Enable (check) to push the SD-WAN policy rule to all devices by the
Panorama management server.
Devices Select one or more devices to which to push the SD-WAN policy rule.
You can filter devices based on device state, platform, device group,
templates, tags, or HA status.
Target to all but these Enable (check) to target and push the policy rule to all devices except
specified devices and tags for the selected Devices and Tags.
187
188 PAN-OS WEB INTERFACE HELP | Objects
© 2021 Palo Alto Networks, Inc.
Move, Clone, Override, or Revert Objects
See the following topics for options to modify existing objects:
• Move or Clone an Object
• Override or Revert an Object
Selected Objects Displays the Name and current Location (virtual system or device
group) of the policies or objects you selected for the operation.
Destination Select the new location for the policy or object: a virtual system,
device group, or Shared. The default value is the Virtual System or
Device Group that you selected in the Policies or Objects tab.
Error out on first detected Select this option (selected by default) to make the firewall or
error in validation Panorama display the first error it finds and stop checking for more
errors. For example, an error occurs if the Destination doesn’t include
an object that is referenced in the policy rule you are moving. If you
clear this selection, the firewall or Panorama will find all errors before
displaying them.
Name Enter a name (up to 63 characters) that describes the addresses you will
include as part of this object. This name appears in the address list when
defining security policy rules. The name is case-sensitive, must be unique,
and can contain only letters, numbers, spaces, hyphens, and underscores.
Shared Select this option if you want to share this address object with:
• Every virtual system (vsys) on a multi-vsys firewall—If you do not
select this option, the address object will be available only to the Virtual
System selected in the Objects tab.
• Every device group on Panorama—If you do not select this option, the
address object will be available only to the Device Group selected in the
Objects tab.
Disable override Select this option to prevent administrators from overriding the settings of
(Panorama only) this address object in device groups that inherit this object. By default, this
selection is disabled, which means administrators can override the settings
for any device group that inherits the object.
Resolve After selecting the address type and entering an IP address or FQDN, click
Resolve to see the associated FQDN or IP addresses, respectively (based on
the DNS configuration of the firewall or Panorama).
You can change an address object from an FQDN to an IP Netmask or vice
versa. To change from an FQDN to an IP Netmask, click Resolve to see
the IP addresses that the FQDN resolves to, then select one and Use this
address. The address object Type dynamically changes to IP Netmask and
the IP address you selected appears in the text field.
Alternatively, to change an address object from an IP Netmask to an FQDN,
click Resolve to see the DNS name that the IP Netmask resolves to, then
select the FQDN and Use this FQDN. The Type changes to FQDN and the
FQDN appears in the text field.
Tags Select or enter the tags that you want to apply to this address object. You
can define a tag here or use the Objects > Tags tab to create new tags.
Name Enter a name that describes the address group (up to 63 characters). This
name appears in the address list when defining security policies. The name
is case-sensitive and must be unique. Use only letters, numbers, spaces,
hyphens, and underscores.
Shared Select this option if you want the address group to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the address group will be available only to the Virtual System
selected in the Objects tab.
• Every device group on Panorama. If you clear this selection, the address
group will be available only to the Device Group selected in the Objects
tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this address group object in device groups that inherit the object. This
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the object.
For a static address group, click Add and select one or more Addresses.
Click Add to add an object or an address group to the address group. The
group can contain address objects, and both static and dynamic address
groups.
Tags Select or enter the tags that you wish to apply to this address group. For
information on tags, see Objects > Tags.
Members Count and After you add an address group, the Members Count column on the
Address Objects > Address Groups page indicates whether the objects in the group
are populated dynamically or statically.
• For a static address group, you can view the count of the members in
the address group.
• For an address group that uses tags to dynamically populate members
or has both static and dynamic members, to view the members, click the
More... link in the Address column. You can now view the IP addresses
that are registered to the address group.
• Type indicates whether the IP address is a static address object or
being dynamically registered and displays the IP address.
• Action allows you to Unregister Tags from an IP address. Click the
link to Add the registration source and specify the tags to unregister.
Name Select a name that describes the region. This name appears in the address
list when defining security policies.
Geo Location To specify latitude and longitude, select this option and specify the values
(xxx.xxxxxx format). This information is used in the traffic and threat maps
for App-Scope. Refer to Monitor > Logs.
Name Enter a Name that describes the dynamic user group (up to 63 characters).
This name appears in the source user list when defining Security policy
rules. The name must be unique and use only alphanumeric characters,
spaces, hyphens, and underscores.
Shared Select this option if you want the match criteria of the dynamic user group
to be available to every device group on Panorama.
(Panorama only)
Panorama does not share the members of the group with
device groups.
If you clear this option, the match criteria of the dynamic user group are
available only to the Device Group selected in the Objects tab.
Disable override Select this option to prevent administrators from overriding the settings
of this dynamic user group in device groups that inherit the object. This
(Panorama only)
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the object.
Match Add Match Criteria to define the members in the dynamic user group using
the AND or OR operators to include multiple tags.
Tags (Optional) Select or enter the static object tags that you want to apply to
the dynamic user group object. This tags the dynamic user group object
itself, not the members in the group. The tags you select allow you to group
related items and are not related to the match criteria. For information on
tags, see Objects > Tags.
After you add a dynamic user group, you can view the following information for the group:
Location Identifies whether the match criteria for the dynamic user
group is available to every device group on Panorama (Shared)
(Panorama only)
or to the selected device group.
Users Select more to see the list of users in the dynamic user group.
Applications Overview
The Applications page lists various attributes of each application definition, such as the application’s relative
security risk (1 to 5). The risk value is based on criteria such as whether the application can share files, is
prone to misuse, or tries to evade firewalls. Higher values indicate higher risk.
The top application browser area of the page lists the attributes that you can use to filter the display
as follows. The number to the left of each entry represents the total number of applications with that
attribute.
Weekly content releases periodically include new decoders and contexts for which you can
develop signatures.
The following table describes application details—custom applications and Palo Alto® Networks applications
might display some or all of these fields.
Additional Information Links to web sources (Wikipedia, Google, and Yahoo!) that contain
additional information about the application.
Standard Ports Ports that the application uses to communicate with the network.
Depends on List of other applications that are required for this application to run.
When creating a policy rule to allow the selected application, you
Implicitly Uses Other applications that the selected application depends on but
that you do not need to add to your Security policy rules to allow
the selected application because those applications are supported
implicitly.
Previously Identified As For a new App-ID™, or App-IDs that are changed, this indicates
what the application was previously identified as. This helps you
assess whether policy changes are required based on changes in the
application. If an App-ID is disabled, sessions associated with that
application will match policy as the previously identified as application.
Similarly, disabled App-IDs will appear in logs as the application they
were previous identified as.
Deny Action App-IDs are developed with a default deny action that dictates how
the firewall responds when the application is included in a Security
policy rule with a deny action. The default deny action can specify
either a silent drop or a TCP reset. You can override this default action
in Security policy.
Characteristics
Evasive Uses a port or protocol for something other than its originally
intended purpose with the hope that it will traverse a firewall.
Excessive Bandwidth Consumes at least 1 Mbps on a regular basis through normal use.
Prone to Misuse Often used for nefarious purposes or is easily set up to expose more
than the user intended.
Capable of File Transfer Has the capability to transfer a file from one system to another over a
network.
Tunnels Other Applications Is able to transport other applications inside its protocol.
Used by Malware Malware has been known to use the application for propagation,
attack, or data theft, or is distributed with malware.
Continue Scanning for Other Instructs the firewall to continue to try and match against other
Applications application signatures. If you do not select this option, the firewall
stops looking for additional application matches after the first
matching signature.
SaaS Characteristics
Poor Terms of Service Applications with unfavorable terms of service that can compromise
enterprise data.
Poor Financial Viability Applications with the potential to be out of business within the next
18 to 24 months.
Classification
Options
Session Timeout Period of time, in seconds, required for the application to time out due
to inactivity (range is 1-604800 seconds). This timeout is for protocols
other than TCP or UDP. For TCP and UDP, refer to the next rows in
this table.
To customize this setting, click the Customize link, enter a value, and
click OK.
TCP Timeout (seconds) Timeout, in seconds, for terminating a TCP application flow (range is
1-604800).
To customize this setting, click the Customize link, enter a value, and
click OK.
A value of 0 indicates that the global session timer will be used, which
is 3600 seconds for TCP.
UDP Timeout (seconds): Timeout, in seconds, for terminating a UDP application flow (range is
1-604800 seconds).
To customize this setting, click the Customize link, enter a value, and
click OK.
TCP Half Closed (seconds) Maximum length of time, in seconds, that a session remains in the
session table between receiving the first FIN packet and receiving the
second FIN packet or RST packet. If the timer expires, the session is
closed (range is 1-604800).
Default: If this timer is not configured at the application level, the
global setting is used.
If this value is configured at the application level, it overrides the
global TCP Half Closed setting.
TCP Time Wait (seconds) Maximum length of time, in seconds, that a session remains in the
session table after receiving the second FIN packet or a RST packet. If
the timer expires, the session is closed (range is 1-600).
Default: If this timer is not configured at the application level, the
global setting is used.
If this value is configured at the application level, it overrides the
global TCP Time Wait setting.
When the firewall is not able to identify an application using the App-ID, the traffic is classified as unknown:
unknown-tcp or unknown-udp. This behavior applies to all unknown applications except those that fully
emulate HTTP. For more information, refer to Monitor > Botnet.
You can create new definitions for unknown applications and then define security policies for the new
application definitions. In addition, applications that require the same security settings can be combined into
application groups to simplify the creation of security policies.
Filter by application • To search for a specific application, enter the application name or
description in the Search field and press Enter. The drop-down
allows you to search or filter for a specific application or view All
applications, Custom applications, Disabled applications, or Tagged
applications.
The application is listed and the filter columns are updated to show
statistics for the applications that matched the search. A search will
match partial strings. When you define security policies, you can write
rules that apply to all applications that match a saved filter. Such rules
are dynamically updated when a new application is added through a
content update that matches the filter.
• To filter by application attributes displayed on the page, click an item
to use as a basis for filtering. For example, to restrict the list to the
collaboration category, click collaboration and the list will display only
applications in this category.
View and/or customize Click the application name link, to view the application description
application details. including the standard port and characteristics of the application, risk
among other details. For details on the application settings, see Defining
Applications.
If the icon to the left of the application name has a yellow pencil ( ),
the application is a custom application.
Disable an applications You can Disable an application (or several applications) so that the
application signature is not matched against traffic. Security rules defined
to block, allow, or enforce a matching application are not applied to
the application traffic when the app is disabled. You might choose to
disable an application that is included with a new content release version
because policy enforcement for the application might change when the
application is uniquely identified. For example, an application that is
identified as web-browsing traffic is allowed by the firewall prior to a
new content version installation; after installing the content update, the
uniquely identified application no longer matches the Security rule that
allows web-browsing traffic. In this case, you could choose to disable the
application so that traffic matched to the application signature continues
to be classified as web-browsing traffic and is allowed.
Enable an application Select a disabled application and Enable it so that the firewall can manage
the application according to your configured security policies.
Import an application To import an application, click Import. Browse to select the file, and
select the target virtual system from the Destination drop-down.
Export an application To export an application, select this option for the application and click
Export. Follow the prompts to save the file.
Assess policy impact after Review Policies to assess the policy-based enforcement for applications
installing a new content before and after installing a content release version. Use the Policy
release Review dialog to review policy impact for new applications included
in a downloaded content release version. The Policy Review dialog
allows you to add or remove a pending application (an application that
is downloaded with a content release version but is not installed on
the firewall) to or from an existing Security policy rule; policy changes
for pending applications do not take effect until the corresponding
content release version is installed. You can also access the Policy Review
dialog when downloading and installing content release versions on the
Device > Dynamic Updates page.
Tag an application A predefined tag named sanctioned is available for you to tag SaaS
applications. While a SaaS application is an application that is identified
as Saas=yes in the details on application characteristics, you can use the
sanctioned tag on any application.
Select an application, click Edit Tags and from the drop-down, select
the predefined Sanctioned tag to identify any application that you want
to explicitly allow on your network. When you then generate the SaaS
Application Usage Report (see Monitor > PDF Reports > SaaS Application
Usage), you can compare statistics on the application that you have
sanctioned versus unsanctioned SaaS applications that are being used on
your network.
When you tag an application as sanctioned, the following restrictions
apply:
• The sanctioned tag cannot be applied to an application group.
• The sanctioned tag cannot be applied at the Shared level; you can tag
an application only per device group or per virtual system.
• The sanctioned tag cannot be used to tag applications included in a
container app, such as facebook-mail, which is part of the facebook
container app.
Defining Applications
Select Objects > Applications to Add a new custom application for the firewall to evaluate when applying
policies.
Configuration Tab
Name Enter the application name (up to 31 characters). This name appears in the
applications list when defining security policies. The name is case-sensitive
and must be unique. Use only letters, numbers, spaces, periods, hyphens,
and underscores. The first character must be a letter.
Shared Select this option if you want the application to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the application will be available only to the Virtual System
selected in the Objects tab.
• Every device group on Panorama. If you clear this selection, the
application will be available only to the Device Group selected in the
Objects tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this application object in device groups that inherit the object. This
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the object.
Description Enter a description of the application for general reference (up to 255
characters).
Category Select the application category, such as email or database. The category is
used to generate the Top Ten Application Categories chart and is available
for filtering (refer to ACC).
Parent App Specify a parent application for this application. This setting applies when a
session matches both the parent and the custom applications; however, the
custom application is reported because it is more specific.
Risk Select the risk level associated with this application (1=lowest to 5=highest).
Characteristics Select the application characteristics that may place the application at risk.
For a description of each characteristic, refer to Characteristics.
Advanced Tab
Port If the protocol used by the application is TCP and/or UDP, select Port and
enter one or more combinations of the protocol and port number (one
entry per line). The general format is:
<protocol>/<port>
where the <port> is a single port number, or dynamic for dynamic port
assignment.
Examples: TCP/dynamic or UDP/32.
This setting applies when using app-default in the Service column of a
Security rule.
IP Protocol To specify an IP protocol other than TCP or UDP, select IP Protocol, and
enter the protocol number (1 to 255).
ICMP Type To specify an Internet Control Message Protocol version 4 (ICMP) type,
select ICMP Type and enter the type number (range is 0-255).
ICMP6 Type To specify an Internet Control Message Protocol version 6 (ICMPv6) type,
select ICMP6 Type and enter the type number (range is 0-255).
Timeout Enter the number of seconds before an idle application flow is terminated
(range is 0-604800 seconds). A zero indicates that the default timeout of
the application will be used. This value is used for protocols other than TCP
and UDP in all cases and for TCP and UDP timeouts when the TCP timeout
and UDP timeout are not specified.
TCP Timeout Enter the number of seconds before an idle TCP application flow is
terminated (range is 0-604800 seconds). A zero indicates that the default
timeout of the application will be used.
UDP Timeout Enter the number of seconds before an idle UDP application flow is
terminated (range is 0-604800 seconds). A zero indicates that the default
timeout of the application will be used.
TCP Half Closed Enter the maximum length of time that a session remains in the session
table, between receiving the first FIN and receiving the second FIN or RST.
If the timer expires, the session is closed.
Default: If this timer is not configured at the application level, the global
setting is used (range is 1-604800 seconds).
TCP Time Wait Enter the maximum length of time that a session remains in the session
table after receiving the second FIN or a RST. If the timer expires, the
session is closed.
Default: If this timer is not configured at the application level, the global
setting is used (range is 1-600 seconds).
If this value is configured at the application level, it overrides the global TCP
Time Wait setting.
Scanning Select the scanning types that you want to allow based on Security Profiles
(file types, data patterns, and viruses).
Signatures Tab
Signatures Click Add to add a new signature, and specify the following information:
• Signature Name—Enter a name to identify the signature.
• Comment—Enter an optional description.
• Ordered Condition Match—Select if the order in which signature
conditions are defined is important.
• Scope—Select whether to apply this signature only to the current
Transaction or to the full user Session.
Specify the conditions that identify the signature. These conditions are used
to generate the signature that the firewall uses to match the application
patterns and control traffic:
• To add a condition, select Add And Condition or Add Or Condition.
To add a condition within a group, select the group and then click Add
Condition.
• Select an Operator from the drop-down. The options are Pattern
Match, Greater Than, Less Than, and Equal To and specify the following
options:
(For Pattern Match only)
• Context—Select from the available contexts. These contexts are
updated using dynamic content updates.
• Pattern— Specify a regular expression to specify unique string
context values that apply to the custom application.
It is not required to specify signatures for the application if the application is used only for
application override rules.
Name Enter a name that describes the application group (up to 31 characters).
This name appears in the application list when defining security policies.
The name is case-sensitive and must be unique. Use only letters, numbers,
spaces, hyphens, and underscores.
Shared Select this option if you want the application group to be available to:
Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the application group will be available only to the Virtual System
selected in the Objects tab.
Every device group on Panorama. If you clear this selection, the application
group will be available only to the Device Group selected in the Objects
tab.
Disable override Select this option to prevent administrators from overriding the settings of
(Panorama only) this application group object in device groups that inherit the object. This
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the object.
Applications Click Add and select applications, application filters, and/or other
application groups to be included in this group.
To filter on additional columns, select an entry in the columns. The filtering is successive: category filters
are applied first followed by subcategory filters, technology filters, risk filters, tags, and then characteristic
filters.
As you select filters, the list of applications that display on the page is automatically updated.
Name Enter the service name (up to 63 characters). This name appears in the
services list when defining Security policies. The name is case-sensitive
and must be unique. Use only letters, numbers, spaces, hyphens, and
underscores.
Shared Select this option if you want the service object to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the service object will be available only to the Virtual System
selected in the Objects tab.
• Every device group on Panorama. If you clear this selection, the service
object will be available only to the Device Group selected in the Objects
tab.
Disable override Select this option to prevent administrators from overriding the settings of
(Panorama only) this service object in device groups that inherit the object. This selection is
cleared by default, which means administrators can override the settings for
any device group that inherits the object.
Destination Port Enter the destination port number (0 to 65535) or range of port numbers
(port1-port2) used by the service. Multiple ports or ranges must be
separated by commas. The destination port is required.
Source Port Enter the source port number (0 to 65535) or range of port numbers
(port1-port2) used by the service. Multiple ports or ranges must be
separated by commas. The source port is optional.
The following settings display only if you choose to override application timeouts and create custom
session timeouts for a service:
TCP Timeout Set the maximum length of time in seconds that a TCP session can remain
open after data transmission has started. When this time expires, the
session closes.
Range is 1 - 604800. Default value is 3600 seconds.
TCP Half Closed Set the maximum length of time in seconds that a session remains
open when only one side of the connection has attempted to close the
connection.
This setting applies to:
• The time period after the firewall receives the first FIN packet (indicates
that one side of the connection is attempting to close the session) but
before it receives the second FIN packet (indicates that the other side of
the connection is closing the session).
• The time period before receiving an RST packet (indicating an attempt to
reset the connection).
If the timer expires, the session closes.
Range is 1 - 604800. Default value is 120 seconds.
TCP Wait Time Set the maximum length of time in seconds that a session remains open
after receiving the second of the two FIN packets required to terminate a
session, or after receiving an RST packet to reset a connection.
When the timer expires, the session closes.
Range is 1 - 600. Default value is 15 seconds.
Name Enter the service group name (up to 63 characters). This name appears in
the services list when defining security policies. The name is case-sensitive
and must be unique. Use only letters, numbers, spaces, hyphens, and
underscores.
Shared Select this option if you want the service group to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the service group will be available only to the Virtual System
selected in the Objects tab.
• Every device group on Panorama. If you clear this selection, the service
group will be available only to the Device Group selected in the Objects
tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this service group object in device groups that inherit the object. This
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the object.
Service Click Add to add services to the group. Select from the drop-down or click
Service at the bottom of the drop-down and specify the settings. Refer to
Objects > Services for a description of the settings.
Looking for more? • Use Tags to Group and Visually Distinguish Objects
• SD-WAN Link Tag
Create Tags
• Objects > Tags
Select Tags to create a tag, assign a color or to delete, rename, and clone tags. Each object can have up to
64 tags; when an object has multiple tags, it displays the color of the first tag applied.
On the firewall, the Tags tab displays the tags that you define locally on the firewall or push from Panorama
to the firewall. On Panorama, the Tags tab displays the tags that you define on Panorama. This tab does not
display the tags that are dynamically retrieved from the VM Information sources defined on the firewall for
forming dynamic address groups nor does it display tags that are defined using the XML or REST API.
When you create a new tag, the tag is automatically created in the Virtual System or Device Group that is
currently selected on the firewall or Panorama.
Name Enter a unique tag name (up to 127 characters). The name is not case-
sensitive.
Shared Select this option if you want the tag to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the tag is available only to the Virtual System selected in the
Objects tab.
• Every device group on Panorama. If you disable (clear) this option, the
tag will be available only to the Device Group selected in the Objects
tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this tag in device groups that inherit the tag. This selection is cleared
by default, which means administrators can override the settings for any
device group that inherits the tag.
Color Select a color from the color palette in the drop-down (default is None).
Comments Add a label or description to describe for what the tag is used.
• Add a tag: Add a tag and then fill in the following fields:
You can also create a new tag when you create or edit policy in the Policies tab. The tag is automatically
created in the Device Group or Virtual System that is currently selected.
• Edit a tag: Click a tag to edit, rename, or assign a color to a tag.
• Delete a tag: Click Delete and select the tag. You cannot delete a predefined tag.
• Move or Clone a tag: The options to move or clone a tag allow you to copy a tag or move a tag to a
different Device Group or Virtual System on firewalls with multiple virtual systems enabled.
Move or Clone and select the tag. Select the Destination location—Device Group or Virtual System.
Disable (clear) this option to Error out on first detected error in validation if you want the validation
process to discover all errors for the object before displaying the errors. This option is enabled by default
and the validation process stops when the first error is detected and only displays the error.
• Override or Revert a tag (Panorama only): The Override option is available only if you did not select
the Disable override option when you created the tag. The Override option allows you to override the
color assigned to the tag that was inherited from a shared or ancestor device group. The Location is the
current device group. You can also Disable override to prevent future override attempts.
Revert changes to undo recent modifications of a tag. When you revert a tag, the Location field displays
the device group or virtual system from where the tag was inherited.
Move Rules in Group to Move all policy rules in the selected tag group to a different rulebase or
Different Rulebase or device group.
Device Group
Change Group of All Move all rules in the selected tag group to a different tag group.
Rules
Move All Rules in Group Move all rules in the selected tag group within the rulebase.
Delete All Rules in Group Delete all rules in the selected tag group.
Clone All Rules in Group Clone all rules in the selected tag group.
Field Description
(Panorama only) Select whether to move the rules to the Pre-Rulebase or Post-Rulebase of
Destination Type the destination device group.
Rule Order Select where in the rulebase to move the rules. You can choose:
• Move Top—Move rules to the top of the rulebase of the destination
device group.
• Move Bottom—Move rules to the end of the rulebase of the destination
device group.
• Before Rule—Move rules before the selected rule in the rulebase of the
destination device group.
• After Rule—Move rules after the selected rule in the rulebase of the
destination device group.
Error out on first detected Check this box to determine how errors are displayed if encountered during
error in validation validation. If checked, each error is displayed individually. If unchecked, the
errors are aggregated and displayed as a single error.
Errors detected during validation cause the rule move job to fail, and no
rules are moved to the destination device group.
Field Description
Move Top Move Top inserts the rules at the top of the destination tag group.
Move Bottom Move bottom inserts the rules at the bottom of the destination tag group.
Field Description
Move Top Move Top inserts the rules at before the destination tag group.
Move Bottom Move bottom inserts the rules after the destination tag group.
(Panorama only) Select whether to clone the rules to the Pre-Rulebase or Post-Rulebase of
Destination Type the destination device group.
Rule Order Select where in the rulebase to clone the rules. You can choose:
• Move Top—Insert cloned rules at the top of the rulebase of the
destination device group.
• Move Bottom—Insert cloned rules at the end of the rulebase of the
destination device group.
• Before Rule—Insert cloned rules before the selected rule in the rulebase
of the destination device group.
• After Rule—Inserted cloned rules after the selected rule in the rulebase
of the destination device group.
Error out on first detected Select this option to determine how errors are displayed if encountered
error in validation during validation. If enabled, each error is displayed individually. If disabled
(cleared), the errors are aggregated and displayed as a single error.
Errors detected during validation cause the rule clone job to fail, and no
rules are cloned to the destination device group.
Manage Tags
The following table lists the actions that you can perform when grouping rules by group tags.
• Tag a rule.
1. Select View Rules as Groups.
2. Select one or more rules on the right pane.
3. From the group tag drop-down, Apply Tag to the Selected Rules.
• Untag a rule.
1. View Rulebase as Groups to view the group tags your rules are assigned to.
2. Select one or more rules on the right pane.
3. From the group tag drop-down, Apply Tag to the Selected Rules.
4. Remove tags to the selected rules. Additionally, you may Delete All tags assigned to the rule.
Select a group tag from the drop-down in the move rule window and select whether you want to Move
Before or Move After the tag selected in the drop-down.
Button/Field Description
Location The location of the device group for the device object.
Add Click Add to add a new device object. Enter a Name and
optionally, a Description. Select additional metadata for
the device, such as Category, OS, and Model. You can also
Browse the list of devices to select the device you want to
add. Click OK to confirm your changes.
Delete Select a device object you no longer need then Delete it.
Move Select the device object you want to move then Move it.
Clone Select the device object on which to base the new device
profile and Clone it.
You cannot change the external dynamic list order when lists are grouped by type.
To retrieve the latest version of the external dynamic list from the server that hosts it, select an external
dynamic list and Import Now.
You cannot delete, clone, or edit the settings of the Palo Alto Networks malicious IP address
feeds.
Add a new external dynamic list and configure the settings described in the table below.
Name Enter a name to identify the external dynamic list (up to 32 characters).
This name identifies the list for policy rule enforcement.
Shared Enable this option if you want the external dynamic list to be available
to:
(Multiple virtual systems
(multi-vsys) and Panorama • Every virtual system (vsys) on a multi-vsys firewall.
only)
If you disable (clear) this option, then the external dynamic list is
available only to the Virtual System selected in the Objects tab.
• Every device group on Panorama.
Disable override (Panorama Enable this option to prevent administrators from overriding the
only) settings of this external dynamic list object in device groups that inherit
the object. This option is disabled (cleared) by default, which means
administrators can override the settings for any device group that
inherits the object.
Test Source URL (Firewall Test Source URL to verify that the firewall can connect to the server
only) that hosts the external dynamic list.
192.168.80.150/32
2001:db8:123:1::1 or 2001:db8:123:1::/64
192.168.80.0/24
2001:db8:123:1::1 - 2001:db8:123:1::22
In the example above, the first line indicates all addresses from
192.168.80.0 through 192.168.80.255. A subnet or an IP address
range, such as 92.168.20.0/24 or 192.168.20.40 – 192.168.20.50,
counts as one IP address entry and not as multiple IP addresses.
• Domain List—Each list can contain only one domain name entry per
line. For example:
www.p301srv03.paloalonetworks.com
ftp.example.co.uk
test.domain.net
For the list of domains included in the external dynamic list, the
firewall creates a set of custom signatures of the spyware type
with medium severity so that you can use the sinkhole action for a
custom list of domains.
financialtimes.co.in
www.wallaby.au/joey
www.exyang.com/auto-tutorials/How-to-enter-Data-
for-Success.aspx
*.example.com/*
For each URL list, the default action is set to Allow. To edit the
default action, see Objects > Security Profiles > URL Filtering.
Type (cont) • Subscriber Identity List—Each list contains subscriber IDs for a 3G,
4G, or 5G network. In the Source field, enter a URL for the firewall
to access the list.
• Equipment Identity List—Each list contains equipment IDs for a 3G,
4G, or 5G network. In the Source field, enter a URL for the firewall
to access the list.
Description Enter a description for the external dynamic list (up to 255 characters).
Source • If the external dynamic list is a Predefined IP List, select Palo Alto
Networks - Bulletproof IP addresses, Palo Alto Networks - High
risk IP addresses, or Palo Alto Networks - Known malicious IP
addresses as the list source.
• If the external dynamic list is a Predefined URL List, the default
setting is panw-auth-portal-exclude-list.
• If the external dynamic list is an IP List, a Domain List, or a URL List,
enter an HTTP or HTTPS URL path that contains the text file (for
example, http://192.0.2.20/myfile.txt).
• If the external dynamic list is a Domain List, you can Automatically
®
expand to include subdomains. This option enables the PAN-OS
software to evaluate all lower-level components of the domain
names listed in the external dynamic list file. This option is disabled
by default.
• If the external dynamic list is a Subscriber Identity List or Equipment
Identity List, enter a URL path that contains the list.
Certificate Profile If the external dynamic list has an HTTPS URL, select an existing
certificate profile (firewall and Panorama) or create a new Certificate
(IP List, Domain List, or URL
Profile (firewall only) for authenticating the web server that hosts
List only)
the list. For more information on configuring a certificate profile, see
Device > Certificate Management > Certificate Profile.
Default: None (Disable Cert profile)
Client Authentication Enable this option (disabled by default) to add a username and
password that the firewall will use when accessing an external dynamic
list source that requires basic HTTP authentication. This setting is
available only when the external dynamic list has an HTTPS URL.
• Username—Enter a valid username to access the list.
• Password/Confirm Password—Enter and confirm the password for
the username.
Check for updates Specify the frequency at which the firewall retrieves the list from
the web server. You can set the interval to every Every Five Minutes
(default), Hourly, Daily, Weekly, or Monthly, at which the firewall
retrieves the list. The interval is relative to the last commit. So, for the
five-minute interval, the commit occurs in 5 minutes if the last commit
was an hour ago. The commit updates all policy rules that reference the
list so that the firewall can successfully enforce policy rules.
Learn more about syntax for regular Syntax for Regular Expression Data Patterns
expression data patterns and see some
Regular Expression Data Pattern Examples
examples.
Name Enter the data pattern name (up to 31 characters). The name case-sensitive
and must be unique. Use only letters, numbers, spaces, hyphens, and
underscores.
Description Enter a description for the data pattern (up to 255 characters).
Shared Select this option if you want the data pattern to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the data pattern will be available only to the Virtual System
selected in the Objects tab.
• Every device group on Panorama. If you clear this selection, the data
pattern will be available only to the Device Group selected in the
Objects tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this data pattern object in device groups that inherit the object. This
Pattern Type Select the type of data pattern you want to create:
• Predefined Pattern
• Regular Expression
• File Properties
Predefined Pattern Palo Alto Networks provides predefined data patterns to scan for certain
types of information in files, for example, for credit card numbers or social
security numbers. To configure data filtering based on a predefined pattern,
Add a pattern and select the following:
• Name—Select a predefined pattern to use to filter for sensitive data.
When you pick a predefined pattern, the Description populates
automatically.
• Select the File Type in which you want to detect the predefined pattern.
Regular Expression Add a custom data pattern. Give the pattern a descriptive Name, set the
File Type you want to scan for the data pattern, and enter the regular
expression that defines the Data Pattern.
For regular expression data pattern syntax details and examples, see:
• Syntax for Regular Expression Data Patterns
• Regular Expression Data Pattern Examples
File Properties Build a data pattern to scan for file properties and the associated values.
For example, Add a data pattern to filter for Microsoft Word documents
and PDFs where the document title includes the words “sensitive”,
“internal”, or “confidential”.
• Give the data pattern a descriptive Name.
• Select the File Type that you want to scan.
• Select the File Property that you want to scan for a specific value.
• Enter the Property Value for which you want to scan.
Pattern length Requires 7 literal characters, which Requires two literal characters.
cannot include a period (.), an
asterisk (*), a plus sign (+), or a range
([a-z]).
Case-insensitivity Requires you to define patterns Allows you to use the i option on a
for all possible strings to match all sub-pattern.
variations of a term.
®
The regular expression syntax in PAN-OS is similar to traditional regular expression engines but every
engine is unique. The Classic Syntax and Enhanced Syntax tables describe the syntax supported in the PAN-
OS pattern-matching engines.
Classic Syntax
- Specify a range.
Example: [c-z] matches any character between c and z inclusive.
& The ampersand (& ) is a special character so, to look for & in a string,
you must use &.
Enhanced Syntax
The enhanced pattern-matching engine supports all of the Classic Syntax as well as the following syntax:
Anchor characters
Specify where to match an expression.
Option modifiers
Change the behavior of a sub-pattern. Enter (?<option>) to enable or (?-<option>) to disable.
i Enable case-insensitivity.
Example: ((?i)\bconfidential\b) matches
ConfiDential.
Weekly content releases periodically include new decoders and contexts for which you can
develop signatures.
You can optionally include a time attribute when defining custom signatures by specifying a threshold per
interval for triggering possible actions in response to an attack. Action is taken only after the threshold is
reached.
Use the Custom Spyware Signature page to define signatures for Anti-Spyware profiles. Use the Custom
Vulnerability Signature page to define signatures for Vulnerability Protection profiles.
Configuration Tab
Threat ID Enter a numeric identifier for the configuration (spyware signatures range
is 15000-18000 and 6900001 - 7000000; vulnerability signatures range is
41000-45000 and 6800001-6900000).
Shared Select this option if you want the custom signature to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the custom signature will be available only to the Virtual
System selected in the Objects tab.
• Every device group on Panorama. If you clear this selection, the custom
signature will be available only to the Device Group selected in the
Objects tab.
Disable override Select this option to prevent administrators from overriding the settings of
(Panorama only) this signature in device groups that inherit the signature. This selection is
cleared by default, which means administrators can override the settings for
any device group that inherits the signature.
Default Action Assign the default action to take if the threat conditions are met. For a list
of actions, see Actions in Security Profiles.
Direction Indicate whether the threat is assessed from the client to server, server to
client, or both.
Affected System Indicate whether the threat involves the client, server, either, or both.
Applies to vulnerability signatures, but not spyware signatures.
Vendor Specify the vendor identifier for the vulnerability as an external reference
for additional background and analysis.
Bugtraq Specify the bugtraq (similar to CVE) as an external reference for additional
background and analysis.
Signatures Tab
Standard Signature Select Standard and then Add a new signature. Specify the following
information:
• Standard—Enter a name to identify the signature.
• Comment—Enter an optional description.
• Ordered Condition Match—Select if the order in which signature
conditions are defined is important.
• Scope—Select whether to apply this signature only to the current
transaction or to the full user session.
Add a condition by clicking Add Or Condition or Add And Condition.
To add a condition within a group, select the group and then click Add
Condition. Add a condition to a signature so that the signature is generated
for traffic when the parameters you define for the condition are true.
Select an Operator from the drop-down. The operator defines the type
of condition that must be true for the custom signature to match to
traffic. Choose from Less Than, Equal To, Greater Than, or Pattern Match
operators.
• When choosing a Pattern Match operator, specify for the following to
be true for the signature to match to traffic:
• Context—Select from the available contexts.
• Pattern—Specify a regular expression. See Pattern Rules Syntax for
pattern rules for regular expressions.
• Qualifier and Value—Optionally, add qualifier/value pairs.
• Negate—Select Negate so that the custom signature matches to
traffic only when the defined Pattern Match condition is not true.
This allows you to ensure that the custom signature is not triggered
under certain conditions.
Description Enter a description for the URL category (up to 255 characters).
Shared Select this option if you want the URL category to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you disable
(clear) this option, the URL category is available only to the Virtual
System selected in the Objects tab.
• Every device group on Panorama. If you disable (clear) this option,
the URL category is available only to the Device Group selected in
the Objects tab.
Disable override (Panorama Select this option to prevent administrators from overriding the
only) settings of this custom URL object in device groups that inherit
the object. This selection is disabled by default, which means
administrators can override the settings for any device group that
inherits the object.
Sites Manage sites for the custom URL category (each URL added or
imported can have a maximum of 255 characters).
• Add—Add URLs, only one per row. Each URL can be in the
format “www.example.com” or can include wildcards, such as
“*.example.com”. For additional information on supported formats,
see Block List in Objects > Security Profiles > URL Filtering.
The
Allow
action
does
not
generate
logs
related
to the
signatures
or
profiles.
You cannot delete a profile that is used in a policy rule; you must first remove the profile from
the policy rule.
Field Description
Name Enter a profile name (up to 31 characters). This name appears in the list of
antivirus profiles when defining security policies. The name is case-sensitive
and must be unique. Use only letters, numbers, spaces, hyphens, periods, and
underscores.
Shared Select this option if you want the profile to be available to:
(Panorama only) • Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the profile will be available only to the Virtual System selected
in the Objects tab.
• Every device group on Panorama. If you clear this selection, the profile will
be available only to the Device Group selected in the Objects tab.
Disable override Select this option to prevent administrators from overriding the settings of
(Panorama only) this Antivirus profile in device groups that inherit the profile. This selection is
cleared by default, which means administrators can override the settings for
any device group that inherits the profile.
Action Tab
Specify the action for the different types of traffic, such as FTP and HTTP.
Enable Packet Capture Select this option if you want to capture identified packets.
Decoders and Actions For each type of traffic that you want to inspect for viruses, select an action
from the drop-down. You can define different actions for standard antivirus
signatures (Signature Action column), signatures generated by the WildFire
system (WildFire Signature Action column), and malicious threats detected
in real-time by the WildFire Inline ML models (WildFire Inline ML Action
column).
Some environments may have requirements for a longer soak time for
antivirus signatures, so this option enables the ability to set different actions
for the two antivirus signature types provided by Palo Alto Networks. For
For the best security, clone the default Antivirus profile and
set the Action and WildFire Action for all the decoders to
reset-both and attach the profile to all Security policy rules
that allow traffic.
Application Exceptions The Applications Exceptions table allows you to define applications that will
and Actions not be inspected. For example, to block all HTTP traffic except for a specific
application, you can define an antivirus profile for which the application is
an exception. Block is the action for the HTTP decoder, and Allow is the
exception for the application. For each application exception, select the action
to be taken when the threat is detected. For a list of actions, see Actions in
Security Profiles.
To find an application, start typing the application name in the text box. A
matching list of applications is displayed, and you can make a selection.
Only create an exception if you are sure an identified virus is not a threat (false positive).
If you believe you have discovered a false positive, open a support case with TAC so
Palo Alto Networks can analyze and fix the incorrectly identified virus signature. When
the issue is resolved, remove the exception from the profile immediately.
Threat ID To add specific threats that you want to ignore, enter one Threat ID at a time
and click Add. Threat IDs are presented as part of the threat log information.
Refer to Monitor > Logs.
Palo Alto Networks recommends forwarding samples to the WildFire cloud when Wildfire
inline ML is enabled. This allows samples that trigger a false-positive to be automatically
corrected upon secondary analysis. Additionally, it provides data for improving ML
models for future updates.
Available Models For each available WildFire inline ML Model, you can select one of the
following action settings:
• enable (inherit per-protocol actions)—Traffic is inspected according to
your selections in the WildFire Inline ML Action column in the decoders
section of the Action tab.
• alert-only (override more strict actions to alert)—Traffic is inspected
according to your selections in the WildFire Inline ML Action column
in the decoders section of the Action tab. Any action with a severity
level higher than alert (drop, reset-client, reset-server, reset-both) will be
overridden to alert, allowing traffic to pass while generating and saving an
alert in the threat logs.
• disable (for all protocols)—Traffic is allowed to pass without any policy
action.
File Exceptions The File Exceptions table allows you to define specific files that you do not
want analyzed, such as false-positives.
To create a new file exception entry, Add a new entry and provide the partial
hash, filename, and description of the file that you want to exclude from
enforcement.
To find an existing file exception, start typing the partial hash value, file name,
or description in the text box. A list of file exceptions matching any of those
values are displayed.
You can find partial hashes in the threat logs (Monitor > Logs
> Threat).
Name Enter a profile name (up to 31 characters). This name appears in the list of
Anti-Spyware profiles when defining security policies. The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens,
periods, and underscores.
Shared (Panorama only) Select this option if you want the profile to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the profile will be available only to the Virtual System selected
in the Objects tab.
• Every device group on Panorama. If you clear this selection, the profile
will be available only to the Device Group selected in the Objects tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this Anti-Spyware profile in device groups that inherit the profile. This
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the profile.
Threat Name Enter any to match all signatures, or enter text to match any signature
containing the entered text as part of the signature name.
Action Choose an action for each threat. For a list of actions, see Actions in
Security Profiles.
The Default action is based on the pre-defined action that is part of each
signature provided by Palo Alto Networks. To view the default action for
a signature, select Objects > Security Profiles > Anti-Spyware and Add or
select an existing profile. Click the Exceptions tab and then click Show all
signatures to see a list of all signatures and the associated Action.
Packet Capture Select this option if you want to capture identified packets.
Select single-packet to capture one packet when a threat is detected,
or select the extended-capture option to capture from 1 to 50 packets
(default is 5 packets). Extended-capture provides more context about the
threat when analyzing the threat logs. To view the packet capture, select
Monitor > Logs > Threat, locate the log entry you are interested in, and
then click the green down arrow in the second column. To define the
number of packets to capture, select Device > Setup > Content-ID and
then edit the Content-ID™ Settings.
If the action for a given threat is allow, the firewall does not trigger a
Threat log and does not capture packets. If the action is alert, you can
set the packet capture to single-packet or extended-capture. All blocking
actions (drop, block, and reset actions) capture a single packet. The content
package on the device determines the default action.
Exceptions Enable each threat for which you want to assign an action or select All
to respond to all listed threats. The list depends on the selected host,
category, and severity. If the list is empty, there are no threats for the
current selections.
Use IP Address Exemptions to add IP address filters to a threat exception.
If IP addresses are added to a threat exception, the threat exception action
for that signature overrides the action for a rule only when the signature is
triggered by a session with a source or destination IP address that matches
an IP address in the exception. You can add up to 100 IP addresses per
signature. With this option, you do not have to create a new policy rule and
new vulnerability profile to create an exception for a specific IP address.
You can configure specific DNS signature sources with separate policy actions, log severity level, and
packet capture settings. Hosts that perform DNS queries for malware domains will appear in the botnet
report. Additionally, you can specify sinkhole IPs in the DNS Sinkhole Settings if you are sinkholing
malware DNS queries.
DNS Signature Source Allows you to select the lists for which you want to enforce an action when
a DNS query occurs. There are two default DNS signature policy options:
• Palo Alto Networks Content—A local downloadable signature list that is
updated through dynamic content updates.
• DNS Security—A cloud-based DNS security service that performs
pro-active analysis of DNS data and provides real-time access to the
complete Palo Alto Networks DNS signature database.
Log Severity Allows you to specify the log severity level that is recorded when the
firewall detects a domain matching a DNS signature.
Policy Action Choose an action to take when DNS lookups are made to known malware
sites. The options are alert, allow, block, or sinkhole. The default action for
Palo Alto Networks DNS signatures is sinkhole.
The DNS sinkhole action provides administrators with a method of
identifying infected hosts on the network using DNS traffic, even when
the firewall is north of a local DNS server (for example, the firewall cannot
see the originator of the DNS query). When a threat prevention license
is installed and an Anti-Spyware profile is enabled in a Security Profile,
the DNS-based signatures trigger on DNS queries directed at malware
domains. In a typical deployment where the firewall is north of the local
DNS server, the threat log identifies the local DNS resolver as the source
of the traffic rather than the actual infected host. Sinkholing malware DNS
queries solves this visibility problem by forging responses to the queries
directed at malicious domains, so that clients attempting to connect to
malicious domains (for command-and-control, for example) instead attempt
connections to an IP address specified by the administrator. Infected
hosts can then be easily identified in the traffic logs because any host
that attempts to connect to the sinkhole IP are most likely infected with
malware.
Packet Capture Select this option for a given source if you want to capture identified
packets.
DNS Sinkhole Settings After sinkhole action is defined for a DNS signature source, specify an
IPv4 and/or IPv6 address that will be used for sinkholing. By default, the
sinkhole IP address is set to a Palo Alto Networks server. You can then
use the traffic logs or build a custom report that filters on the sinkhole IP
address and identify infected clients.
The following is the sequence of events that will occur when an DNS
request is sinkholed:
Malicious software on an infected client computer sends a DNS query to
resolve a malicious host on the Internet.
The client's DNS query is sent to an internal DNS server, which then
queries a public DNS server on the other side of the firewall.
The DNS query matches a DNS entry in the specified DNS signature
database source, so the sinkhole action will be performed on the query.
The infected client then attempts to start a session with the host, but uses
the forged IP address instead. The forged IP address is the address defined
in the Anti-Spyware profile DNS Signatures tab when the sinkhole action is
selected.
The administrator is alerted of a malicious DNS query in the threat log, and
can then search the traffic logs for the sinkhole IP address and can easily
locate the client IP address that is trying to start a session with the sinkhole
IP address.
Apply a Vulnerability Protection profile to every Security Policy rule that allows traffic to
protect against buffer overflows, illegal code execution, and other attempts to exploit client-
and server-side vulnerabilities.
The Rules settings specify collections of signatures to enable, as well as actions to be taken when a
signature within a collection is triggered.
The Exceptions settings allows you to change the response to a specific signature. For example, you
can block all packets that match a signature, except for the selected one, which generates an alert. The
Exception tab supports filtering functions.
The Vulnerability Protection page presents a default set of columns. Additional columns of information
are available by using the column chooser. Click the arrow to the right of a column header and select the
columns from the Columns sub-menu.
The following tables describe the Vulnerability Protection profile settings:
Name Enter a profile name (up to 31 characters). This name appears in the list of
Vulnerability Protection profiles when defining security policies. The name
is case-sensitive and must be unique. Use only letters, numbers, spaces,
hyphens, periods, and underscores.
Shared (Panorama only) Select this option if you want the profile to be available to:
• Every virtual system (vsys) on a multi-vsys firewall. If you clear this
selection, the profile will be available only to the Virtual System selected
in the Objects tab.
• Every device group on Panorama. If you clear this selection, the profile
will be available only to the Device Group selected in the Objects tab.
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this Vulnerability Protection profile in device groups that inherit the
profile. This selection is cleared by default, which means administrators can
override the settings for any device group that inherits the profile.
Rules Tab
Threat Name Specify a text string to match. The firewall applies a collection of signatures
to the rule by searching signature names for this text string.
CVE Specify common vulnerabilities and exposures (CVEs) if you want to limit
the signatures to those that also match the specified CVEs.
Each CVE is in the format CVE-yyyy-xxxx, where yyyy is the year and xxxx
is the unique identifier. You can perform a string match on this field. For
example, to find vulnerabilities for the year 2011, enter “2011”.
Host Type Specify whether to limit the signatures for the rule to those that are client
side, server side, or either (any).
Action Choose the action to take when the rule is triggered. For a list of actions,
see Actions in Security Profiles.
The Default action is based on the pre-defined action that is part of each
signature provided by Palo Alto Networks. To view the default action for
a signature, select Objects > Security Profiles > Vulnerability Protection
and Add or select an existing profile. Click the Exceptions tab and then click
Show all signatures to see a list of all signatures and the associated Action.
For the best security, set the Action for both client and
server critical, high, and medium severity events to reset-
both and use the default action for Informational and Low
severity events.
Packet Capture Select this option if you want to capture identified packets.
Select single-packet to capture one packet when a threat is detected,
or select the extended-capture option to capture from 1 to 50 packets
(default is 5 packets). Extended-capture provides more context to the
threat when analyzing the threat logs. To view the packet capture, select
Monitor > Logs > Threat and locate the log entry you are interested in
and then click the green down arrow in the second column. To define
the number of packets that should be captured, select Device > Setup >
Content-ID and then edit the Content-ID Settings.
Exceptions Tab
Enable Select Enable for each threat for which you want to assign an action, or
select All to respond to all listed threats. The list depends on the selected
host, category, and severity. If the list is empty, there are no threats for the
current selections.
ID
Vendor ID Specify vendor IDs if you want to limit the signatures to those that also
match the specified vendor IDs.
For example, the Microsoft vendor IDs are in the form MSyy-xxx, where yy
is the two-digit year and xxx is the unique identifier. For example, to match
Microsoft for the year 2009, enter “MS09” in the Search field.
Threat Name
Only create a threat exception if you are sure an identified
threat is not a threat (false positive). If you believe you
have discovered a false positive, open a support case with
TAC so Palo Alto Networks can investigate the incorrectly
identified threat. When the issue is resolved, remove the
exception from the profile immediately.
IP Address Exemptions Click into the IP Address Exemptions column to Add IP address filters to
a threat exception. When you add an IP address to a threat exception, the
threat exception action for that signature will take precedence over the
rule's action only if the signature is triggered by a session with either a
source or destination IP address matching an IP address in the exception.
You can add up to 100 IP addresses per signature. You must enter a unicast
IP address (that is, an address without a netmask), such as 10.1.7.8 or
2001:db8:123:1::1. By adding IP address exemptions, you do not have to
create a new policy rule and new vulnerability profile to create an exception
for a specific IP address.
Rule
CVE The CVE column shows identifiers for common vulnerabilities and
exposures (CVE). These unique, common identifiers are for publicly known
information security vulnerabilities.
Host
Category Select a vulnerability category if you want to limit the signatures to those
that match that category.
Severity
Action Choose an action from the drop-down, or choose from the Action drop-
down at the top of the list to apply the same action to all threats.
Packet Capture Select Packet Capture if you want to capture identified packets.
Show all signatures Enable Show all signatures to list all signatures. If Show all signatures is
disabled, only the signatures that are exceptions are listed.
Block search results if the end user is not URL Filtering Settings
using the strictest safe search settings.
Looking for more? • Learn more about how to configure URL Filtering.
• Use URL categories to prevent credential phishing.
• To create custom URL categories, select Objects >
Custom Objects > URL Category.
• To import a list of URLs that you want to enforce,
select Objects > External Dynamic Lists.
Name Enter a profile name (up to 31 characters). This name appears in the list
of URL filtering profiles when defining security policies. The name is case-
sensitive and must be unique. Use only letters, numbers, spaces, hyphens,
and underscores.
Shared Select this option if you want the profile to be available to:
Disable override Select this option to prevent administrators from overriding the settings
(Panorama only) of this URL Filtering profile in device groups that inherit the profile. This
selection is cleared by default, which means administrators can override the
settings for any device group that inherits the profile.
Category Displays the URL categories and lists for which you can define web access
and usage policy. By default, the Site Access and User Credential Submission
permissions for all categories are set to Allow.
URL categories and lists are grouped into three drop-downs:
• Custom URL Categories—Select Objects > Custom Objects > URL
Category to define a custom URL category. You can base custom URL
categories on a list of URLs or on multiple predefined categories.
• External Dynamic URL Lists— Select Objects > External Dynamic Lists to
enable the firewall to import a list of URLs from a web server.
• Pre-defined Categories—Lists all URL categories defined by PAN-DB, the
Palo Alto Networks URL, and the IP cloud database.
Site Access For each URL category, select the action to take when a user attempts to
access a URL in that category:
• alert—Allows access to the web site but adds an alert to the URL log each
time a user accesses the URL.
• none (custom URL category only)—If you created custom URL categories,
set the action to none to allow the firewall to inherit the URL filtering
category assignment from your URL database vendor. Setting the action to
none gives you the flexibility to ignore custom categories in a URL filtering
profile while allowing you to use the custom URL category as a match
criteria in policy rules (Security, Decryption, and QoS) to make exceptions
or to enforce different actions. To delete a custom URL category, you
must set the action to none in any profile where the custom category is
used. For information on custom URL categories, see Objects > Custom
Objects > URL Category.
User Credential For each URL category, select User Credential Submissions to allow or
Submission disallow users from submitting valid corporate credentials to a URL in that
category. Before you can control user credential submissions based on URL
category, you must enable credential submission detection (select the User
Credential Detection tab).
URL categories with the Site Access set to block are set to automatically also
block user credential submissions.
• alert—Allows users to submit credentials to the website, but generate
a URL Filtering log each time a user submits credentials to sites in this
category.
• allow (default)—Allows users to submit credentials to the website.
Check URL Category Click to access the PAN-DB URL Filtering database, where you can enter a
URL or IP address to view categorization information.
Dynamic URL Filtering Select to enable cloud lookup for categorizing the URL. This option is invoked
(disabled by default) if the local database is unable to categorize the URL.
(Configurable for If the URL is unresolved after a 5 second timeout, the response is displayed as
BrightCloud only) Not resolved URL.
Log container page only Select this opti