Device > Licenses
Table of Contents
10.0 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Device > Licenses
Select DeviceLicenses to activate licenses
on all firewall models. When you purchase a subscription from Palo
Alto Networks, you receive an authorization code to activate one
or more license keys.
On the VM-Series firewall, this page also allows you to deactivate
a virtual machine (VM).
The following actions are available on the Licenses page:
- Retrieve license keys from license server: Select to enable purchased subscriptions that require an authorization code and have been activated on the support portal.
- Activate feature using authorization code: Select to enable purchased subscriptions that require an authorization code and have not been previously activated on the support portal. Then enter your authorization code, and click OK.
- Manually upload license key: If the firewall does not have connectivity to the license server and you want to upload license keys manually, download the license key file from https://support.paloaltonetworks.com, and save it locally. Click Manually upload license key, click Browse, select the file, and then click OK.To enable licenses for URL filtering, you must install the license, download the database, and click Activate. If you are using PAN-DB for URL Filtering, you will need to Download the initial seed database first and then Activate.You can also run the CLI command request url-filtering download paloaltonetworks region < region>.
- Deactivate VM: This option is available on the VM-Series firewall with the Bring Your Own License model that supports perpetual and term-based licenses; the on-demand license model does not support this functionality. Click Deactivate VM when you no longer need an instance of the VM-Series firewall. It allows you to free up all active licenses—subscription licenses, VM-Capacity licenses, and support entitlements— using this option. The licenses are credited back to your account and you can then apply the licenses on a new instance of a VM-Series firewall, when you need it. When the license is deactivated, the VM-Series firewall functionality is disabled and the firewall is in an unlicensed state. However, the configuration remains intact.
- Click Continue Manually if the VM-Series firewall does not have direct internet access. The firewall generates a token file. Click Export license token to save the token file to your local computer and then reboot the firewall. Log in to the Palo Alto Networks Support portal, select AssetsDevices, and Deactivate VM to use this token file and complete the deactivation process.
- Click Continue to deactivate the licenses on the VM-Series firewall. Click Reboot Now to complete the license deactivation process.
- Click Cancel if you want to cancel and close the Deactivate VM window.
- Upgrade VM Capacity: This option allows you to upgrade the capacity of your currently licensed VM-Series firewall. Upon upgrading the capacity, the VM-Series firewall retains all configuration and subscriptions it had prior to the upgrade.
- If your firewall has connectivity to the license server—Select Authorization Code, enter your authorization code in the Authorization Code field, and click Continue to initiate the capacity upgrade.
- If your firewall does not have connectivity to the license server—Select License Key, click Complete Manually to generate a token file, and save the token file to your local computer. Then log in to the Palo Alto Networks Support portal, select AssetsDevices, and Deactivate License(s) to use the token file. Download the license key for your VM-Series firewall to your local computer, add the license key to the firewall, and click Continue to complete the capacity upgrade.
- If your firewall has connectivity to the license server but you do not have an Authorization Code—Select Fetch from license server, upgrade the firewall’s capacity license on the license server before you attempt to upgrade the capacity, and then after you verify that the license is upgraded on the license server, click Continue to initiate the capacity upgrade.