Date

By Source

By Technology

By Services

By Audience

Displaying 9181 to 9210 of 10218

Applications that can be used in Data Filtering Profiles

Overview The following applications can be used inside Data Filtering profiles: 2ch-posting 4shared 51.com-base 51.com-bbs 51.com-mail 51.com-posting 51.com-webdisk ad-selfservice adobe-meeting adobe-online-office adrive aim-express-base aim-mail akamai-client amazon-cloud-drive amazon-cloud-drive-base amazon-cloud-drive-uploading amazon-cloud-player ameba-blog-posting ameba-now-base ameba-now-posting any apple-appstore ariel avaya-webalive-base babylon backpack-editing badongo badoo baidu-webmessenger batchbook bebo-mail bebo-posting bigupload blackboard blog-posting bonpoo boxnet-base boxnet-editing

panagent,
  • 0
  • 2

Facebook Luring Employees to Hog Bandwidth

Social-network users are hogging more computer-network bandwidth -- from the cubicle next door.

  • 0
  • 950

Report: Facebook Usage at Work Is Still Risin

Companies that are still fighting to keep their employees from using Facebook are apparently losing the battle, with games from Zynga scoring some significant victories, according to the latest research from Palo Alto Networks.

  • 0
  • 1006

Employees Three Times More Active on Social Networking Applications Than Previous Year

Employees Three Times More Active on Social Networking Applications Than Previous Year

Santa Clara, CA
  • 0
  • 132

Zynga Rises As Rivals Falter

  • 0
  • 854

How to allow/block Dropbox application

Dropbox has both a web browser interface and a desktop client (a special folder). Traffic from both the interfaces is SSL based and is identified as ‘dropbox’ App-ID. To identify uploads and downloads: Configure a SSL decryption rule for the traffic and inspect the content inside. With the browser interface,

panagent,
  • 0
  • 1

What order does the PAN use to check for URL categories?

The order in which the device checks for URL categories is as follows: Block list Allow list Custom categories Device cache BrightCloud downloaded database Cloud lookup (if enabled) Note: If you've included a specific URL in a block list, it will always be blocked, regardless of how it is categorized

panagent,
  • 0
  • 1

Where are the HTTP/HTTPS timeout values set?

On the Objects tab, select Applications. Search for web-browsing and then open it to view and adjust the TCP/UDP timeout values.   owner: panagent

panagent,
  • 0
  • 0

How to disable State Synchronization in HA (Active/Passive)

Palo Alto Newtworks Tech Support recommends disabling the State Synchronization feature on the active device first. Then disable this feature on the passive device. If you disable this feature on the passive device first, it will cause the active to become non-functional and initiate a failover. owner: panagent

panagent,
  • 0
  • 1

Can QoS Classes be Modified to Use Names Instead of Numbers?

No. The QoS class is predefined as a number from 1 to 8. There is no option available to change the QoS class number to a name.   owner: mzhou

panagent,
  • 0
  • 0

How does the PAN Handle Packets that Arrive out of Order?

Q: How does the PAN Handle Packets that Arrive out of Order? A: If packets arrive out-of-order they will be buffered to order them. Q: How does the PAN handle cases in which stream-based inspection poses special difficulties. Example: TCP and UDP packets may arrive out of order (which is

panagent,
  • 0
  • 0

Which has precedence Interface Management Profiles or Security Policies?

The security policy will take precedence over the Interface Management Profile. owner: panagent

panagent,
  • 0
  • 1

Troubleshooting URL Filtering issue

Issue Sites are being blocked by the policy using custom URL block list. Sites not blocked by custom URL block list but belong to blocked categories are not being blocked. Resolution Verify the URL database has been downloaded by checking under Device > Dynamic Updates. The version should not be

panagent,
  • 0
  • 2

Is SSL Decryption Set up on a Per-Rule Basis?

Question: Is SSL Decryption Set up on a Per-Rule Basis?   Answer: Yes, the SSL decryption rules are a separate rule base and are created, configured and processed on a per rule basis. Rules are located under: Policies > Decryption   owner: panagent

panagent,
  • 0
  • 0

SSL Decryption Not Working due to Unsupported Cipher Suites

Issue With Inbound SSL decryption, after the required configuration and import of all required certificates, the inbound SSL decryption is not working on the web server.   Similarly when using SSL Forward Proxy, sessions are either not getting decrypted and continue to show as application"ssl", or connections are not allowed

panagent,
  • 0
  • 1

What Does Device 'Profile Compiler: Block patterns dlp parsing error mean?'

There is an error in a custom pattern.  You need at least 7 characters for a pattern match (8 to be on the safe side), or before any regex expression. owner: panagent

panagent,
  • 0
  • 0

Is it possible to customize the thresholds used for brute force attack signatures?

Overview This functionality is available in the custom objects definition: This can be found/created inside Objects > Custom Objects > Vulnerability. Select the Combination instead of Standard signature. Define the signature, either a custom or predefinded signature. Apply a time attribute to the signature, which is the threshold count over a specified

panagent,
  • 0
  • 0

How to allow LinkedIn but block LinkedIn Mail application

The following Applipedia screenshot shows the subdivision of LinkedIn Mail from LinkedIn Base, which is the general Application. If you allow the LinkedIn Base Rule, then succeed it with a new rule of blocking the LinkedIn Mail application (followed by a Commit); this will allow LinkedIn but block the Mail

panagent,
  • 0
  • 1

What Happens to the Logs if Panorama is Unavailable?

If Panorama is unavailable, the Palo Alto Networks firewall will store-and-forward the logs. This means that the logs are stored on the firewall and then forwarded to Panorama once connection is reestablished.   owner: gserrano

panagent,
  • 0
  • 0

How to Check the DHCP logs?

DHCP logs appear under the System Logs when the IP address lease expires or when there is a duplicate IP allocation request. To view the logs from CLI, run the following command based on the PAN-OS version running on the device: PAN-OS 6.0 > less mp-log pan_dhcpd.log Prior to PAN-OS

panagent,
  • 0
  • 0

Unable to Delete Old Software via GUI or CLI

Issue Attempted to delete the old software version via the GUI or CLI, the following error is returned: Can't purge image 'panos-4.0.1 installed on active or backup sysroot Resolution The error indicates 4.0.1 is currently installed on the second partition, which can be verified from the CLI with the command:

panagent,
  • 0
  • 3

How Does Detection of Bittorrent Work on the Palo Alto Networks Firewall?

Details Due to the way the Palo Alto Networks firewall handles detection of p2p apps, the user may see a confusing startlog indicating that bittorrent is allowed, even though a deny rule is in place and the traffic is actually denied.  The following is an explanation of how the detection

panagent,
  • 0
  • 0

How to Configure Email Alerts

To configure email alerts Create a profile for your email server: Go to Device > Server Profiles > Email then click Add.Name your profile, determine the appropriate VSYS if applicable, fill in the Servers tab and Custom Log Format tab if desired.  Click ? for help with information on the

panagent,
  • 0
  • 1

What Do the CPU Usage Values Mean?

Overview Run the following CLI command: > show system resources Returns: Cpu(s): 28.9%us, 16.0%sy, 4.9%ni, 48.9%id, 0.8%wa, 0.0%hi, 0.5%si, 0.0%st     us user Percentage of CPU time running user-initiated programs, such as  running queries and reports sy system Percentage of CPU time running system-initiated programs, kernel processes ni nice

panagent,
  • 0
  • 1

Is it Possible to Create a Single Policy to Allow Specific Applications and Specific TCP Ports?

Combining applications and services in a single rule can be done, but only if they are associated with each other.   Examples: App web browsing - service tcp80 will limit the traffic for that rule to port 80 and any traffic identified as something other than web browsing will be

panagent,
  • 0
  • 1
Displaying 9181 to 9210 of 10218