4: Check the proxy-id configuration. This is usually not required when the tunnel is between two Palo Alto Networks firewalls, but when the peer is from another vendor, IDs usually need to be configured.A mismatch would be indicated under the system logs, or by using the command: > less ...
You should keep configuration information, such as rules and address wildcards, in CSV files in a Git repository. This article shows you how to use automation to apply these files to Palo Alto. To understand the configuration to be applied to Palo Alto, seeCustomer responsibilities for running...
You will want to ensure that the certificates remain valid. You will need to update them from time to time. You should see a certificate error in the logs once they have expired as they should be rejected when the service attempts to check in. Result codes that you wil...
How to map similar extracted fields from Palo Alto logs with similar fields from Check Point OPSEC logs? splunker12er Motivator 11-15-2015 04:22 AM More than Splunk, this question is related to firewall logs - any help is very much appreciated....
4: Check the proxy-id configuration. This is usually not required when the tunnel is between two Palo Alto Networks firewalls, but when the peer is from another vendor, IDs usually need to be configured.A mismatch would be indicated under the system logs, or by using the command: ...
How to find application in Palo Alto (by tcp/udp ports) Go to solution FabioGarcia L3 Networker 03-01-2013 11:18 AM Dears, I am working on a migration from Check Point to Palo Alto. We used that PA Migration Tool for CP rules into PA. The main problem is all ...
how to check AD replication latency between 2 different sites domain controllers? How to check AD users last log on time stamp? How to check for LDAP problems? (logs, events etc) How to check if AD has any errors or problems? How to check if clients still use SSL2, SSL3 prior d...
How to use DispatchProxy for AOP in .NET Core Nov 14, 20247 mins how-to Why use aspect-oriented programming Oct 31, 20245 mins how-to How to use Task.WhenEach in .NET 9 Oct 17, 20246 mins how-to How to use extension methods in C# ...
To resolve, first ensure the service account username is the sAMAccountName (service_account_username=username) and that the passwords are correct in the config file. If using encrypted passwords, specify the "protected" version of the parameter in your configuration file (service_account_password_...
How to use the new Lock object in C# 13 Jan 09, 20258 mins how-to How to split strings efficiently in C# Dec 26, 20247 mins how-to How to chunk data using LINQ in C# Dec 12, 20247 mins how-to How to use ref structs in C# 13 ...