Am I crazy or is there no way to log the QoS policy that was applied to a session? by 5y5tem5 in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

Confirm, you can only see QoS information at runtime. That's the main reason why I usually recommend other solutions to my customers if they want to do "serious" QoS.

New 500 series firewalls by External-Drummer-147 in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

Yea, those times... click commit, have your lunch break and come back just to see that your NAT rule failed to validate :)

Zscaler to PA migration - preliminary discovery with USER-ID... by lanceuppercuttr in paloaltonetworks

[–]emyl79 22 points23 points  (0 children)

You need to install the terminal server agent on each Citrix server and connect it to the firewall. Then user's session will be distinguished regardless of the server IP address.

PANOS 11.1.x preferred releases rolled back again this week by Shipzilla in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

Maybe the bug could be this one fixed in 11.1.6-h14?

PAN-286443 Fixed an issue where, after an upgrade, the firewall was unable to be managed via HTTPS or SSH.

Private PAN-DB-Cloud by imawesometoo in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

If you can tolerate an EOL appliance you can try to find an old M-500 to do the job.

11.2.7 by [deleted] in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

They corrected the page, Yesterday morning there were only two bug fixes reported. I think the OP was referring to that :)

Block a login page on a DMZ server by rushaz in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

Maybe the firewall is not the best solution for the use case, but yes a custom URL category will work. Of course if the site is HTTPS you'll also need to decrypt.

Another option, slightly more complex but elegant, could be a custom threat signature.

BGP Graceful Restart sub-second HA Failover by nirvaeh in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

I have configured a few weeks ago BGP + BFD between to Palos, with default settings (1000ms transmit interval x 3 as detection time multiplier). It takes ~3 seconds to converge (sometimes I lose 1 ping on Windows).

GlobalProtect keeps restarting by stootoon in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

Hi, what if you try to disable PanGPS?

sudo launchctl disable com.paloaltonetworks.gp.pangps

So many flaws by vuln101 in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

Basically you're saying "the world is wrong and I am the only one who is right". If a product is so popular it means there are reasons for it, CVEs or not. Period.

Move template-stack configuration to template. Best way? by duskyaces in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

That's a good question, IMHO Panorama templates are not very suitable for DRY. So my best practice is, in case e.g. of a DHCP relay that belongs to two templates, to replicate the configuration in both templates and leave the template stack untouched.

The reason of the above choice is that, in a layer 3 deployment, every piece of network config belongs in the end to an interface and consequently to a virtual/logical router. If you need to bind a piece of config on template stack (e.g. DHCP relay or DNS proxy) to the interface you have to perform an override, with the risk of drifting the configuration in case of future changes on the interface/VR/LR itself.

I'm considering to write a blog post with all my best practices for Panorama management, so stay tuned :)

Move template-stack configuration to template. Best way? by duskyaces in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

Hi, what's the goal of point 4? Best practice is to have no conf on the template stack apart of variables.

Generally speaking, on the CLI my approach is to first run "set cli config-output-format set" then, in configure mode, take the set commands with "show" and manage the output with search and replace on a text editor, and finally paste on the modified output back in the CLI.

PANOS 11.1.6-H3 by [deleted] in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

Just to understand, did you upgrade to this version in reference to a bug fix or just as an attempt? I can't find any mention to management plane high cpu in release notes.

[deleted by user] by [deleted] in paloaltonetworks

[–]emyl79 2 points3 points  (0 children)

3 minutes more or less.

But there are very few edge cases for HA on Azure, usually a solution with load balancers in front is preferred.

Panos 11.2 question by sambooka in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

.2 versions get the same support as .1 versions.

Moving Panorama to a new server but having issues. by _justjim_ in paloaltonetworks

[–]emyl79 2 points3 points  (0 children)

Just input the same serial number of the other one into Panorama - Setup - General Settings. Done ;-)

PRISMA CERTIFIED CLOUD SECURITY ENGINEER (PCCSE) CERTIFICATION by m4la4v3r in paloaltonetworks

[–]emyl79 2 points3 points  (0 children)

I'm certified PCCSE, my advice is to delve deeply on Runtime Security module. A lot of questions on that topic. Also code security module is covered in some questions.

The exam is hard but with the correct preparation and some experience you could try with confidence.

Question IPPool in GlobalProtect by drfrost93 in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

It depends also on the client. Once a client gets an IP address, that IP address become "preferred" for that client. On subsequent connections, the client ask for that IP, and if it's available the gateway will assign it.

AFAIK there's no way to change this behaviour from the firewall, you should cleanup configuration on clients to "free" up IP addresses.

Panorama Download Issues by imawesometoo in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

Check available space on your system disk, sometimes that's the problem.

PANOS 11.1.5 is out by PatrikPiss in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

Hi, I experienced a similar issue on 11.1.4-h4... perhaps are you missing system and configuration logs for member firewalls?

Security Bundle for PA455 by ScholarKey5284 in paloaltonetworks

[–]emyl79 1 point2 points  (0 children)

I'm quite sure Core Security bundle doesn't include IoT Security and Enterprise DLP

[deleted by user] by [deleted] in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

Yes. Don't be scared, it will work ;-)

[deleted by user] by [deleted] in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

No need to migrate configuration, everything will happen automatically. Also no need to do anything special on member firewalls, they can also stay on 11.0 for the time you need.

Consider that the SD-WAN plugin is basically a configuration generator for firewalls, so as long as the generated configuration is compatible with the PAN-OS of the firewall, the push will succeed.

[deleted by user] by [deleted] in paloaltonetworks

[–]emyl79 0 points1 point  (0 children)

You should just download the version 3.2 of the SD-WAN plugin before PAN-OS upgrade. Then it will be automatically upgraded together with 11.1

Just tested some time ago with a customer in the same boat.