Date

By Source

By Technology

By Services

By Audience

Displaying 10561 to 10590 of 11095

Error: opaque: flow_pktproc_x: exiting because missed too many heartbeats

Overview The flow_pktproc is a child process of the dataplane. If one of the flow_pktproc hangs and restarts, a message similar to the one below will be logged: > domain: 1 > receive_time: 2010/04/17 10:01:10 > serial: 0001A10xxxx > type: SYSTEM > subtype: general > config_ver: 0 > time_generated: 2010/04/17
nrice,
  • 0
  • 2

Top Concerns of Silicon Valley Business Leaders

For seven years the Silicon Valley Leadership Group has asked member companies in high tech, biotech, financial services and related industries to participate in a business climate survey.
  • 0
  • 1542

How to Implement and Test SSL Decryption

Overview PAN-OS can decrypt and inspect inbound and outbound SSL connections going through the Palo Alto Networks firewall. SSL decryption can occur on interfaces in virtual wire, Layer 2 or Layer 3 mode by using the SSL rulebase to configure which traffic to decrypt. In particular, decryption can be based
nrice,
  • 0
  • 3

Difference Between Drop and Drop-all-packets Action in Threat Security Profiles

Overview When configuring a security policy, two drop actions are available: Drop Drop-all-packets If the drop action is configured, the firewall will drop the first packet only. If the drop-all-packets action is configured, the firewall will drop every subsequent packet for that session. The session will be set to DISCARD
nrice,
  • 0
  • 0

How to Set Up RADIUS Authentication for Captive Portal

Overview This document describes the steps to set up Radius for Captive Portal.   Steps Enable the zone for User Identification. Set up the RADIUS Server profile. Set up the Authentication Profile. The Palo Alto Networks device forwards all requests to the RADIUS server for Captive Portal. Set up the
nrice,
  • 0
  • 0

App and Threat Compatability Mismatch in HA Pair

Issue Passive device in an HA pair doesn't update and there is a mismatch status for the app and threat compatibility.   Resolution From the passive device: Ping updates.paloaltonetworks.com: > ping host updates.paloaltonetworks.com Get the MAC address of the static device: > debug dataplane internal vif link Sample Output: eth0: mtu
nrice,
  • 0
  • 0

Palo Alto Networks Discovers Critical Vulnerability Addressed in this Week's Microsoft Security Bulletin

New Potential Security Threat Impacts Popular Media Apps
San Jose, Calif.
  • 0
  • 257

"Not-applicable" in Traffic Logs

  The application column shows not-applicable if the traffic matches an allowing/blocking security rule via a service filter rather than an application filter.   Details The firewall traffic is matched from left to right and top to bottom in the security rules. If traffic hits a security rule that's set
nrice,
  • 0
  • 0

LDAP Queries to Determine eDirectory Information

Overview The Following queries can be used to identify the version of eDirectory you are using and whether the version supports paging, which is required for the LDAP User ID Agent. An ldap search tool is required to run the commands, which is usually included on a linux or MAC
nrice,
  • 0
  • 1

Packet Drop Counters in "Show Interface Ethernet ..." Display

The following display is an abbreviated output from the command, show interface Ethernet 1/1.  Two packet drop counters appear under the counters reading the logical interface information. Conditions that may cause these counters to increment are explained below: show interface ethernet1/1 ------------------------------------------------------------------------------- Name: ethernet1/1, ID: 17 Link status: Runtime link
nrice,
  • 0
  • 3

The Battle Against Cyber Espionage 2.0

Whereas early social engineering efforts convinced someone to provide a password or other information via a convincing phone call or conversation, today’s social engineering efforts are fare more nefarious, as evidenced in great detail within the recently published report: Shadows in the Cloud: Investigating Espionage 2.0.
Matt Keil,
  • 0
  • 1

How to View SSL Decryption Information from the CLI

Overview This document describes how to view SSL Decryption Information from the CLI.   Details The following show system setting ssl-decrypt commands provide information about the SSL-decryption on the Palo Alto Networks device: Show the list of ssl-decrypt certificates loaded on the dataplane > show system setting ssl-decrypt certificate Show
nrice,
  • 0
  • 2

How to View Captive Portal User Information and Change Timeout Values

Details The following command displays the PAN-OS table of user-to-IP mappings and indicates the Captive Portal method used (CP or Captive Portal with NTLM): > show user ip-user-mapping all IP               Vsys   From    User                  IdleTimeout(s) MaxTimeout(s) ---------------  ------ ------- --------------------- -------------- ------------- 192.168.106.12   vsys1  CP      administrator         845            3497 192.168.106.11   vsys1  CP     
nrice,
  • 0
  • 0

How to Create Subordinate CA Certificates with Microsoft Certificate Server

Overview This document shows how to create a subordinate CA certificate with Microsoft Certificate Server. Access the certificate server interface by browsing to http:///certsrv. On the welcome screen, select Request a Certificate. On the next page, choose to submit an advanced certificate request. Then choose to Create
nrice,
  • 0
  • 0

Appliance Approach Secures Australian Blue Chips

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
  • 0
  • 1812

Interview: Nir Zuk, Chief Technology Officer, Palo Alto Networks

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
  • 0
  • 1871

How to View, Create and Delete Security Policies on the CLI

Overview This article describes how to view, create and delete security policies inside of the CLI (Command Line Interface).   Details To create a new security policy from the CLI: > configure (press enter) # set rulebase security rules from to destination application
nrice,
  • 0
  • 2

HA pair is not synchronizing

Issue High Availability (HA) pair does not synchronize, even though the software, threat, app and URL databases are all on the same version.   Cause The certificate does not transfer automatically from one device to the other, which prevents the devices from synchronizing.   Resolution If you have an SSL
nrice,
  • 0
  • 2

Social Networking Risks Under Little Control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks.
  • 0
  • 1612

Security Risks Rise as Enterprises Go Social

Sure, social networks are all the rage on the consumer Web, and industry observers have noted that enterprises aren't far behind. But the rush to embrace social technologies carries a heightened security risk, experts warn.
  • 0
  • 1567

Social Networks Pervasive in Regulated Industries

The spread of social networks in the enterprise is happening at a far greater rate than is generally believed, according to a report just released by network security firm Palo Alto Networks.
  • 0
  • 1619

Magic Quadrant Says Now is the Time for Next-Generation Firewalls

You've heard the buzz about next-generation firewalls -- intelligent firewalls that dig deeper than port number and into application visibility.
  • 0
  • 1597

RSA SecurID Ready Implementation Guide

Information on configuring a Palo Alto Networks firewall to use RSA Authentication Manager can be found here: https://community.emc.com/docs/DOC-38286 owner: tramos
nrice,
  • 0
  • 2

New Application Usage and Risk Report Now Available

The latest edition of the Application Usage and Risk Report from Palo Alto Networks is now available. The Application Usage and Risk Report (5th Edition, Spring 2010) provides insight into the applications and associated risks on nearly 350 enterprise networks worldwide. The global view allowed us to look at, for the first time, application usage patterns from both a geographical (EMEA, NAM, APAC) and a vertical market perspective (Healthcare, Financial Services, Universities). Key findings include: Application usage is remarkably consistent, across all regions, and within industries. From a vertical market …
Palo Alto Networks,
  • 0
  • 1

Enterprise Networking: Google Apps, Facebook Devour Enterprise Network Bandwidth

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
  • 0
  • 1606

Facebook, Google Apps Use Soars in Enterprises, Security Firm Says

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
  • 0
  • 1593

Security: Shining a Spotlight on Social Media Risks

New reports from Palo Alto Networks and Webroot indicate that security consciousness is growing among social networkers but so are the risks, especially in highly regulated industries. Channel Insider takes a closer look at what this means for the channel.
  • 0
  • 1606

Research Shows Highly Regulated Industries Have No Control Over Social Networking Applications and Risks

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network
San Jose, Calif.
  • 0
  • 259

How to View and Delete Reports from the CLI

Details The following CLI commands can be used to view the report jobs > show report (tab to view list) > custom      custom > directory-listing   directory-listing > id          By id > jobs        All jobs > predefined  predefined   Sample output showing the databases available for custom reports > show report
nrice,
  • 0
  • 1

Brute Force Signature and Related Trigger Conditions

This document lists the trigger condition for each brute force signature.   Details Trigger # Application Name Name Description 40001 FTP Login Brute Force Attempt If a session has the same source and destination but triggers our child signature, 40000, 10 times in 60 seconds, we call it a brute
nrice,
  • 0
  • 5
Displaying 10561 to 10590 of 11095