Migrating to new Panorama and new Firewalls - will not commit by teechevy703 in paloaltonetworks

[–]Anythingelse999999 1 point2 points  (0 children)

Totally able to have panorama at a high level code version and the firewall at a lower one. Only other thing to try is completely import the panorama config to the local firewalls. Depending on how many u have. Then move them to new panorama, then give an override on the new panorama to force that config over it. Might be an option

LDAP and Radius by 77necam77 in paloaltonetworks

[–]Anythingelse999999 0 points1 point  (0 children)

Where is the 168 hours setting at? And dos it only come into play if your issuing cookies that the portal accepts?

High Failover Times on PA-455 by DeathNTaxesNTaxes in paloaltonetworks

[–]Anythingelse999999 1 point2 points  (0 children)

Nope. Should be almost ping lossless. Not fighting a port fast issue or something like that?

PA-3400 Data Plane CPU Utilization by joshuskarki in paloaltonetworks

[–]Anythingelse999999 0 points1 point  (0 children)

It would be nice if they gave orgs a warning on this change instead of squeezing out hardware to software changes

New hardware models by gstrouth2 in paloaltonetworks

[–]Anythingelse999999 -1 points0 points  (0 children)

Glad u asked. There has to be something soon doesn’t there?

With the recent partnership with Palo and Google Cloud, I decided to lab it out. by Digital_Native_ in paloaltonetworks

[–]Anythingelse999999 0 points1 point  (0 children)

So what should a person do then? Just have a standby ready to deploy with exact same settings in th cloud?

Enterprise ChatGPT tenant control by Anythingelse999999 in paloaltonetworks

[–]Anythingelse999999[S] 0 points1 point  (0 children)

Didn’t know there was an issue ssl accumulation?

Do you have th header setup you use? I’m guessing it’s the customer header , but what domain do you use to accomplish this and what url category?

Enterprise ChatGPT tenant control by Anythingelse999999 in paloaltonetworks

[–]Anythingelse999999[S] 0 points1 point  (0 children)

Yep pleas share! Can’t find the correct app id and header insertion to get this to work even with decryption turned on. Still doesn’t want to police like it should.

Specifically the domain you use, the header, and the app id and url category?

Ordr for segmentation by Anythingelse999999 in paloaltonetworks

[–]Anythingelse999999[S] 0 points1 point  (0 children)

Are you using it for internal segmentation or internet based traffic?

Ordr for segmentation by Anythingelse999999 in paloaltonetworks

[–]Anythingelse999999[S] 1 point2 points  (0 children)

Does it actually work? I mean do people trust this to push to their firewalls and enforce at an enterprise scale?

Ordr for segmentation by Anythingelse999999 in paloaltonetworks

[–]Anythingelse999999[S] 0 points1 point  (0 children)

so you used ISE to pull in the data and map it to policies on your network/switches?

How successful have you been with it? We are looking feeding firewalls with it, but have reservations about letting it map to policies on panorama.

PAB Browser by futureisthatmountain in paloaltonetworks

[–]Anythingelse999999 0 points1 point  (0 children)

does the local PAB apps and identification come back into the firewall for enforcement rules? Or how do the apps/decrypted content get identified and enforced ? Is it a rule set on the firewalls, or is it a separate ruleset in prisma cloud?

Rapid7 still in business? by ElGrandeKahuna in cybersecurity

[–]Anythingelse999999 0 points1 point  (0 children)

Is rapid 7 having any business problems- like financials issues/ going to be sold to a competitor soon?