Next-Generation Firewall
New Features in November 2023
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
Cloud Management and AIOps for NGFW
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
New Features in November 2023
These are the new features introduced in November 2023 for AIOps for NGFW Free, and
for AIOps for NGFW Premium.
These are the new features introduced in November 2023 for AIOps for NGFW Free, and for
AIOps for NGFW Premium (use Strata Cloud Manager app). AIOps for NGFW Premium updates
include new features to support Cloud Management for NGFWs. See New Features in November 2023 in Strata Cloud
Manager to review the latest feature updates for all the products supported
with Strata Cloud Manager.
Cloud Management for NGFWs: Capacity Analyzer Alerts
November 20, 2023
Capacity Analyzer has been enhanced to include support for
alerts, assisting you in the following:
Now supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
|
Sometimes, you can encounter a predicament where particular features on
your Next-Generation Firewalls (NGFW) approach their capacity thresholds, resulting
in diminished system performance and operational disruptions. Dealing with
capacity-related issues can be time-consuming, and unfortunately, these issues tend
to come to light only after the limits are breached.
The Capacity Analyzer feature allows
monitoring of device resource capacity by tracking metrics usage based on model
types. This feature includes a heatmap visualization to display resource consumption
rates and locations for each metric. It also enables planning for upgrading to
higher capacity firewalls based on specific needs. This proactive approach ensures
that you know about potential capacity constraints, allowing you to take preemptive
action to safeguard your business operations.

AIOps for NGFW Premium: Application Name Update
November 8, 2023
This application tile name change to Strata Cloud Manager applies
only to AIOps for NGFW premium instances. AIOps for NGFW Free
remains a standalone app.
|
The application tile names on the hub for Prisma Access, Prisma SD-WAN, and
AIOps for NGFW (the premium app only) are now changed to Strata Cloud
Manager. With this update, the application URL has also changed to stratacloudmanager.paloaltonetworks.com, and
you’ll also now see the Strata Cloud Manager logo on the left navigation
pane.

Moving forward, continue using the Strata Cloud Manager app to manage and
monitor your deployments.
Cloud Management for NGFWs: IPSec VPN Monitoring
November 7, 2023
Supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
|
You can now view the status of the IPSec VPN tunnels
to know whether or not valid IKE and IPSec SAs have been established, and whether
the tunnel interface is up and available for passing traffic.
Because the tunnel interface is a logical interface, it can’t indicate a
physical link status. Therefore, you must use IPSec tunnel monitoring so that the
tunnel interface can verify connectivity to an IP address and determine if the path
is still usable. If the IP address is unreachable, the firewall will either wait for
the tunnel to recover or failover. When a failover occurs, the existing tunnel is
torn down, and routing changes are triggered to set up a new tunnel and redirect
traffic.
With the IPSec VPN tunnel monitoring feature, you can view the tunnel status:
- VPN cluster tunnel status
- IPSec tunnel status
- IKE gateway status
- VPN tunnel status
View the overall status of all the IPSec tunnels, IPSec tunnel status per device, and
detailed status of each IPSec tunnel.
Cloud Management for NGFWs: PA-450R Next-Generation Firewall Support
November 7, 2023
Supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
Introduced with PAN-OS 11.1
|
The PA-450R is a new rugged firewall appliance
that upgrades the PA-220R firewall. The PA-450R is designed for industrial,
commercial, and government deployments. The hardware is suited for installation in
harsh environments with extreme temperatures and high humidity levels.
The PA-450R is supported on PAN-OS 11.1 and later versions. The
firewall features two SFP/RJ-45 combo ports and six RJ-45 ports. The RJ-45 ports
include two fail-open ports that can be configured to provide a pass-through
connection in the event of a power failure.
The PA-450R is powered by DC power and optionally supports power
redundancy. The device has a fanless design and can be installed on a flat surface,
wall, and equipment rack. The hardware is compliant with ICS/SCADA system
architecture.
Cloud Management for NGFWs: PA-5445 Next-Generation Firewall
November 7, 2023
Supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
Introduced with PAN-OS 11.1
|
The PA-5445 adds the highest performance fixed
form-factor model to the Palo Alto Networks® Next-Generation Firewall lineup. This
firewall, supported on PAN-OS 11.1 and later versions, features hardware resources
dedicated to networking, security, signature matching, and management. The PA-5445
is ideal for deployments in enterprise data centers, headquarters, and regional
offices.
The PA-5445 has the highest App-ID speed (93Gbps), L7 threat
inspection rate (70Gbps), and session count (48M) in a fixed form-factor
firewall.
The PA-5445 features eight RJ-45 ports, twelve SFP+ ports, four
SFP28 ports, and four form-factor pluggable QSFP28 ports that support breakout mode.
The firewall also features dedicated HSCI and HA1 ports for high availability
control.
The PA-5445 can be powered by AC or DC power supplies and
optionally supports power redundancy. The hardware takes up 2RU of rack space and
should be mounted in a 19” equipment rack.
Cloud Management for NGFWs: VM-Series Device Management
November 7, 2023
Supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
Introduced with PAN-OS 11.1
|
This release adds support for a bootstrapping process that allows you to configure
newly deployed firewalls without manually configuring them prior to deployment.
Previously, a firewall image was created for your cloud environments that required
you to manually include information such as DNS entries and IP addresses in the
init.cfg file.
This new process associates the firewall with a Panorama management host to automate
the onboarding and configuration of your software firewall. With this functionality,
the bootstrapping process:
- Automatically instantiates, onboards, and configures the firewall instance without prior knowledge of the firewall serial number.
- Automatically onboards the Strata Cloud Manager tenant, from which the tenant receives the initial configuration and becomes fully operational without manual intervention.
Create the bootstrap package with the following fields:
- panorama-server. Use this field to specify cloud management for your Panorama host. This field initiates a TLS connection to the Strata Cloud Manager service edge. For example, panorama-server=cloud. Values other than cloud are interpreted as a Panorama Internet Protocol or FQDN, and will initiate a Panorama management connection. A value defined for panorama-server-2 is ignored when panorama-server=cloud.
- dgname. This field is used to define the Cloud Management folder in which the firewall is mapped.
- vm-series-auto-registration-pin-id. Include the VM-Series registration PIN ID. This automates the process of instantiating the firewall instance by establishing the connection to the Strata Cloud Manager service edge.
- vm-series-auto-registration-pin-value. Include the VM-Series
registration PIN VALUE to automate the process of instantiating the firewall
instance by establishing the connection to the Strata Cloud Manager service
edge.The PIN ID and PIN VALUE fields are use to request a Thermite certificate. This certificate is used to authenticate the device and build a secure connection to the cloud service, such as Strata Cloud Manager.
Cloud Management for NGFWs: IP Protocol Scan Protection
November 7, 2023
Supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
Introduced with PAN-OS 11.1
|
Palo Alto Networks now offers reconnaissance protection for IP protocol
scans. IP protocol scans cycle through IP protocol numbers to determine the IP
protocols and services supported by target machines. Malicious actors use this
scanning technique to identify and exploit open and insecure protocols. This feature
enables your firewall to detect and block, allow, or alert on these scans. For
example, you can configure the firewall to drop subsequent packets from a host
exhibiting behavior consistent with IP protocol scans.
You can configure protection against IP protocol scans in the Reconnaissance
Protection settings of a Zone Protection profile. The firewall identifies IP
protocol scans based on the specified number of scan events that occurs within a
specified interval. If necessary, you can exclude the IP addresses of trusted
internal groups performing vulnerability testing from reconnaissance protection.
Details of each detected scan are available in the Threat logs.
Cloud Management for NGFWs: TLSv1.3 Support for SSL/TLS Service Profiles (Administrative Access)
November 7, 2023
Supported for Cloud Management for
NGFWs (with an AIOps for NGFW Premium
license)
Introduced with PAN-OS 11.1
|
You can now configure TLSv1.3 in SSL/TLS service profiles to secure
administrative access to management interfaces. TLSv1.3 delivers several performance
and security enhancements, including shorter SSL/TLS handshakes and more secure
cipher suites. In an SSL/TLS service profile, you can select TLSv1.3 as the minimum
or maximum supported protocol version for connections to the management interface.
Selecting TLSv1.3 automatically enables the following TLSv1.3 cipher suites:
-
TLS-AES-128-GCM-SHA256
-
TLS-AES-256-GCM-SHA384
-
TLS-CHACHA20-POLY1305-SHA256TLS-CHACHA20-POLY1305-SHA256 is not supported in FIPS-CC mode.
However, you can deselect any key exchange algorithms, encryption algorithms,
or authentication algorithms as needed. In addition to offering TLSv1.3 support, SSL/TLS
service profiles now enable customization of the key exchange algorithms, encryption
algorithms, and authentication algorithms supported.