Articles
Find LIVEcommunity articles and technical documentation about Palo Alto Networks products.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Articles
Find LIVEcommunity articles and technical documentation about Palo Alto Networks products.

Browse the Community

General Articles

LIVEcommunity's General Articles area is home to how-to resources, technical documentation, and discussions with Accepted Solutions that turn into articles related to all Palo Alto Networks products.

156 Posts

Support FAQ

Support FAQ on LIVEcommunity is where customers can find answers to their most common queries, in collaboration with Palo Alto Networks Knowledge Base.

8 Posts

Activity in Articles

Tips & Tricks: Palo Alto Global Counters for Layer 1 to Layer 4 issues troubleshooting like MTU and DOS

6 min read

Hello everyone, I wanted to share some knowledge I've gained about investigating common Layer 1 to Layer 4 issues, such as MTU mismatches and DoS attacks, using key Palo Alto Networks firewall features like Global Counters, Flow Debug, and packet captures. The first steps in troubleshooting these issues are always to check your routing, run ...

nikoolayy1_3-1751356122244.png
nikoolayy1_1-1751354923520.png
nikoolayy1_0-1751354721007.png
nikoolayy1_2-1751360016326.png

Nominated Discussion: Configure Split Tunneling by Domain

1 min read

This Nominated Discussion Article is based on the post "Configure Split tunneling by domain" by @BigPalo and responded to by @Raido_Rattameister and @BPry Read on to see the discussion and solution! Hi, I just configured split tunneling by domain using this domain test: *.portal.microsoft.com (port 443) But i can not see this traffic going ...

kiwi by Community Team Member
  • 313 Views
  • 0 replies
  • 0 Likes

Support FAQ: Flood Attacks - Configuration & Troubleshooting Best Practices

13 min read

Written by Alex Laulhe. With special thanks to Anupam S. & Amogh G. for their contributions. This guide is designed to help firewall admins effectively understand flood attack prevention and troubleshoot flooding incidents detected by Palo Alto Networks firewalls. Whether the event is triggered by packet buffer protection (PBP), Zone Pro...

Title_Flood-Attacks_palo-alto-networks.jpg
Fig 1_Flood-Attacks_palo-alto-networks.jpg
Fig 2_Flood-Attacks_palo-alto-networks.jpg
Fig 3_Flood-Attacks_palo-alto-networks.jpg
emgarcia by Community Team Member
  • 6466 Views
  • 3 replies
  • 3 Likes

Tips & Tricks: App-ID Debugging

5 min read

This article is inspired from Tips & Tricks: Flow Basic Debugging written by @kiwi and I recommend reading that article first before reading this one. Palo Alto Networks NGFWs use App-ID to detect the exact application inside a traffic stream but sometimes traffic will be first classified for example as App-ID "SSL" and after the decrypti...

nikoolayy1_0-1750327626537.png
nikoolayy1_2-1750327766322.png
nikoolayy1_1-1750327679712.png
nikoolayy1_0-1750325909323.png

Demystifying Selective Push on Panorama

8 min read

What is Selective Push? Selective Push on Panorama lets you deploy specific configuration to your firewalls instead of pushing everything all at once. Terminology Push Scope: The final admin view of committed changes with an option to select the changes that will be pushed to the selected target firewalls. Config Audit Window: This window is ...

Screenshot 2025-06-09 at 9.03.11 PM.png
shv_5-1749483597680.png
shv_6-1749483707514.png
shv_7-1749483817471.png
shv by L3 Networker
  • 1868 Views
  • 0 replies
  • 0 Likes

Support FAQ: How to Troubleshoot BGP on Palo Alto Networks Firewalls

5 min read

Most days, BGP runs quietly in the background. BGP advertises routes that keep your WAN, VPN, cloud environments, and public services connected and reachable. Until it doesn’t. And when BGP breaks, it’s not just a routing issue, it’s unreachable services and frustrated users. This guide will help you troubleshoot BGP on Palo Alto Networks fire...

JayGolf by Community Team Member
  • 3619 Views
  • 0 replies
  • 3 Likes

Understanding Panorama System Mode Transitions

4 min read

This document outlines the various system modes available for Palo Alto Networks Panorama and provides guidance on transitioning between them. Panorama offers flexibility with its different modes: Panorama, Management-Only, and Logger. Reasons for changing system modes might include optimizing resource allocation by separating log collection a...

Screenshot 2025-06-02 at 3.28.33 PM (2).png
shv by L3 Networker
  • 703 Views
  • 0 replies
  • 0 Likes

Palo Alto Networks 7-byte Custom Signature Minimum Removed in Newer Versions and Why it Matters!

1 min read

Palo Alto Networks 7-byte Custom Signature Minimum Removed in Newer Versions and Why it Matters! In the newer versions after 9.1, Palo Alto Networks now does not have 7-byte minimum length limit and is really useful, as an example, to make a signature that will block traffic to a web page if too many times the login parameter "user" is seen in...

nikoolayy1_0-1746792158016.png

Palo Alto Networks NAT Session Distribution as a Way to Implement Server Load Balancing

1 min read

Palo Alto Networks NAT Session Distribution as a Way to Implement Server Load Balancing The Palo Alto Network Destination NAT Session Distribution can be used to implement similar to Load Balancer functionality by using one of the "distribution" methods. You need to allow the traffic with a with a security policy rule from the correct sour...

nikoolayy1_2-1747492747777.png
nikoolayy1_1-1747492645684.png
nikoolayy1_0-1747493140861.png
nikoolayy1_0-1747492597436.png

How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples

7 min read

How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples Palo Alto Networks NGFW and Prima Access have many predefined IPS vulnerability signatures but sometimes extra custom signatures are needed that are specific to the application being protected as this need internal domain knowledge. I'll provide e...

nikoolayy1_0-1746717480189.png
nikoolayy1_2-1746719732662.png
nikoolayy1_1-1746710994586.png
nikoolayy1_0-1746720073083.png

Best Practices with Log Collection Design in Panorama

3 min read

Logging is a critical component in network security, helping organizations maintain visibility, compliance, and forensics. Panorama, with its powerful log collection and analysis capabilities, supports distributed environments at scale. However, optimal performance depends on careful planning and adherence to best practices. This article provide...

Screenshot 2025-05-07 at 3.13.56 PM.png
shv by L3 Networker
  • 1495 Views
  • 0 replies
  • 0 Likes

Nominated Discussion - Sorting Question

2 min read

This Nominated Discussion Article is based on the post "sorting question" by @MattJakacki and responded to by @JayGolf and @Remo . Read on to see the discussion and solution! How do I remove the sort by ascending/descending in tabs like vulnerability protection profile and in URL categories, I recently accidentally activated these features a...

kiwi by Community Team Member
  • 540 Views
  • 0 replies
  • 1 Likes

Nominated Discussion: Using the REST API to Create a Bunch of Address Objects

2 min read

This Nominated Discussion Article is based on the post "Using the REST API to create a bunch of Address Objects" by @DaveFitz and responded to by @TomYoung . Read on to see the discussion and solution! I have to create a large number Address Objects and would like to use the REST API to do so. I've seen a number of examples at adding var...

TomYoung_0-1715017580446.png
kiwi by Community Team Member
  • 777 Views
  • 0 replies
  • 0 Likes
Register or Sign-in
Top Contributors
Top Liked Authors