Date

By Source

By Technology

By Services

By Audience

Displaying 10381 to 10410 of 11418

Lock Your Online Doors

  • 0
  • 1337

Browser-based Filesharing Usage: Work or Entertainment?

For some time now, we have been watching the browser-based filesharing market which has expanded to where we saw 65 different application offerings in the latest Application Usage and Risk Report.  A large number in any market, but particularly one that is quite young and has only gathered adoption among consumers — not businesses – for now. As with any market expansion, segmentation into distinct uses cases is occurring: work/productivity and entertainment. Lately, we’ve seen lots of media headlines about companies such as DropBox and Box.net, both of which we include …
Matt Keil,
  • 0
  • 0

Don't Tell the Boss: You Tweet From Work Like a Maniac

A new study by network security firm Palo Alto Networks shows "explosive" growth in the use of social networks in the workplace, with a 300 percent increase in social media activity in the latter half of 2011 compared with the same period of 2010.
  • 0
  • 1413

What is the difference between saving and committing a config?

Overview Saving a config change is basically saving the xml configuration to a file.  It doesn't apply the changes into the current config. Commit is basically save and apply the changes. You always need to commit the configuration change to see the effect of the change. If the changes are
panagent,
  • 0
  • 2

How to Allow Ping and ICMP on Layer 3 Interface of Your Palo Alto Networks Device

Overview To allow Ping and other management traffic, configure an Interface Management Profile and apply it to the interface. Steps Go to Network > Network Profiles > Interface Mgmt Create a profile allowing ping: Go to Network > Interfaces and assign the profile, created above, to the interface under the
panagent,
  • 0
  • 0

How to Determine the Number of Rejected Non-SYN TCP Packets

To check the current setting (default value=true) > show session info | match non-SYN   TCP - reject non-SYN first packet:             True To enable the rejection of Non-SYN TCP packets, run the following CLI command: > set session tcp-reject-non-syn yes Note: The above command will not be permanent unless issued
panagent,
  • 0
  • 0

What happens on a HA sync-to-peer?

The following is what occurs on a HA sync-to-peer (in PAN-OS 4.0 and 3.1): A transform is done on the running/candidate xml locally The transformed config is transferred over a socket from mgmtsrvr to ha_agent (start of timeout period) ha_agent transfers this config to the peer ha_agent (call it ha_peer)
panagent,
  • 0
  • 1

How to Eliminate Alarm Message: Log Database Exceeds Alarm Threshold Value

Symptom Here is an example of a full alarm message: Current size (57197 MB) of traffic log database exceeds alarm threshold value(90%) of total allowed size(63072 MB).   Issue Logs are purged when the quota size is exhausted, which is why it has been recommended to set the overall quota
panagent,
  • 0
  • 0

Commit Force not Triggering Session Rematch

Issue On the Device Tab > Setup, there is an active Session Rematch. Doing a commit force is not rematching the sessions. Resolution Rematch session applies only to security policies and not any other policy. Rematch session only happens when there is a policy change. To view a list of
panagent,
  • 0
  • 0

Domain Check in HIP Profile

Issue If a user authenticates successfully as the logs say, why is the domain not shown in the command: show global-protect-gateway current user? Resoltuion The DNS domain name might not work since the Palo Alto Networks firewall is looking for the domain name associated with the AD machine account name,
panagent,
  • 0
  • 0

Is a cross-over cable required with Hard Coded Speed/Duplex Settings?

When the Interface setting is hard coded, the auto duplex discovery will be disabled.  Therefore, on some devices a cross-over cable may be needed, depending on how the hardware wiring is set up for the transmit and receive pairs.   owner: panagent
panagent,
  • 0
  • 0

NAT Rule Error: Mismatch Static IP

Issue Receiving the following error message on commit: device: nat rule 'NAT_rule': Mismatch static-ip address range between original address and translated addressFailed to parse nat policyCommit failed   Cause Using a subnet /24 to translate to one static IP.  This is not allowed or supported.   Resolution Need to use
panagent,
  • 0
  • 4

“Active” Social Networking Up 300%; Twitter Skyrockets 700%

In last week’s blog entry, Rene’ aptly termed 2011 as the Year of Me; the year when social media and a wide range of other personal applications were used in abundance on corporate networks. We predict that the usage patterns will continue and we need look no further than the latest edition of our Application Usage and Risk Report (December 2011) which highlights a significant shift from the passive or voyeuristic use we saw in October 2010to the more active, action oriented use that we see in this report. Social-plugins, …
Matt Keil,
  • 0
  • 0

Palo Alto Networks Appoints Mark Anderson as Senior Vice-President of Worldwide Field Operations

Palo Alto Networks Appoints Mark Anderson as Senior Vice-President of Worldwide Field Operations
Santa Clara, CA
  • 0
  • 1253

How to determine the correct value to put in the PAN IKE peer KEYID field?

When configuring a Cisco ASA key-id field, how do you determine the correct value to put in the PAN IKE peer KEYID field? The Cisco-ASA allows any ASCII string input. This ASCII string key-id must be converted to hexadecimal before using it in the PAN’s dynamic IKE Peer KEYID field.
panagent,
  • 0
  • 0

Elevated Privileges and User ID in Active Directory Environments

This document examines the interaction of multiple user accounts that are used by the same employee for different tasks and how User Identification can be used in this scenario. This document applies to all versions of PAN-OS through 4.1. owner: npiagentini
panagent,
  • 0
  • 1

Applications that can be used in Data Filtering Profiles

Overview The following applications can be used inside Data Filtering profiles: 2ch-posting 4shared 51.com-base 51.com-bbs 51.com-mail 51.com-posting 51.com-webdisk ad-selfservice adobe-meeting adobe-online-office adrive aim-express-base aim-mail akamai-client amazon-cloud-drive amazon-cloud-drive-base amazon-cloud-drive-uploading amazon-cloud-player ameba-blog-posting ameba-now-base ameba-now-posting any apple-appstore ariel avaya-webalive-base babylon backpack-editing badongo badoo baidu-webmessenger batchbook bebo-mail bebo-posting bigupload blackboard blog-posting bonpoo boxnet-base boxnet-editing
panagent,
  • 0
  • 4

Employees Three Times More Active on Social Networking Applications Than Previous Year

Employees Three Times More Active on Social Networking Applications Than Previous Year
Santa Clara, CA
  • 0
  • 210

Facebook Luring Employees to Hog Bandwidth

Social-network users are hogging more computer-network bandwidth -- from the cubicle next door.
  • 0
  • 1504

Zynga Rises As Rivals Falter

  • 0
  • 1405

Report: Facebook Usage at Work Is Still Risin

Companies that are still fighting to keep their employees from using Facebook are apparently losing the battle, with games from Zynga scoring some significant victories, according to the latest research from Palo Alto Networks.
  • 0
  • 1714
Displaying 10381 to 10410 of 11418