Network > Interfaces > Cellular
Table of Contents
                    
  Expand all | Collapse all
  - 
          
                - Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
 
- 
          
                
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > SaaS Tenant List
- Objects > Custom Objects > SaaS User List
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > AI Security
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
 
- 
          
                - 
      
            - Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
 
- Network > Traffic Objects
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > Interfaces > PoE
- Network > Interfaces > Cellular
- Network > Interfaces > Fail Open
- Network > VLANs
- Network > Virtual Wires
- 
      
            - Network > Routing > Logical Routers > General
- Network > Routing > Logical Routers > Static
- Network > Routing > Logical Routers > OSPF
- Network > Routing > Logical Routers > OSPFv3
- Network > Routing > Logical Routers > RIPv2
- Network > Routing > Logical Routers > BGP
- Network > Routing > Logical Routers > Multicast
 
- 
      
            - Network > Routing > Routing Profiles > BGP
- Network > Routing > Routing Profiles > BFD
- Network > Routing > Routing Profiles > OSPF
- Network > Routing > Routing Profiles > OSPFv3
- Network > Routing > Routing Profiles > RIPv2
- Network > Routing > Routing Profiles > Filters
- Network > Routing > Routing Profiles > Multicast
 
- Network > Proxy
- 
      
            - Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
- Network > Network Profiles > MACsec Profile
 
 
- 
      
            
- 
          
                - Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > ACE
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > IoT Security > DHCP Server Log Ingestion
- Device > Device Quarantine
- 
      
            - Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
 
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > SCP
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
- Device > Policy Recommendation > IoT or SaaS > Import Policy Rule
 
- 
          
                
- Device > User Identification > Connection Security
- Device > User Identification > Terminal Server Agents
- Device > User Identification > Group Mapping Settings
- Device > User Identification> Trusted Source Address
- Device > User Identification > Authentication Portal Settings
- Device > User Identification > Cloud Identity Engine
 
- 
          
                
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
 
- 
          
                - Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Firewall Clusters
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
 
Network > Interfaces > Cellular
Learn how to configure a 5G cellular interface. 
    Click Add and use the following fields to configure a cellular
            interface:
  | Cellular Interface Settings | Configure In | Description | 
|---|---|---|
| Slot | Cellular Interface | Select the Slot that you want to use for the
                                interface: 
 | 
| Interface Name | Select the Interface Name that you want to
                                use. | |
| Comment | Optionally enter a Comment about the interface. | |
| Netflow Profile | If you want to export unidirectional IP traffic that traverses an
                                ingress interface to a NetFlow server, select the server profile or
                                click Netflow Profile to define a new profile
                                (see Device > Server Profiles > NetFlow). Select
                                    None to remove the current NetFlow server
                                assignment from the interface. | |
| Virtual Router | Cellular InterfaceConfig | Assign a virtual router to the interface, or click New
                                    Virtual Router to define a new one (see Network > Virtual Routers). Select
                                    None to remove the current virtual router
                                assignment from the interface. | 
| Logical Router | Assign a logical router to the interface, or click New Logical Router to define a new one (see Network > Routing > Logical Routers). Select None to remove the current logical router assignment from the interface. | |
| Security Zone | Select a security zone for the interface, or click New
                                    Zone to define a new zone. Select
                                    None to remove the current zone
                                assignment from the interface. | |
| Radio | Select the Radio setting. 
 This option allows you to reset the radio settings during
                                troubleshooting. | |
| GPS | Select the GPS setting.  To enable the GPS option, you must select
                                    On for the Radio
                                option as well as the GPS option.  
 | |
| Primary SIM Slot | Select the Primary SIM Slot that contains the SIM card you want the firewall or Panorama to use for the interface. | |
| (PAN-OS 11.2.3 and later
                                    releases, SD-WAN plugin 3.3.1 and later releases) Enable
                                SD-WAN | Cellular InterfaceIPv4 | Select this option to enable
                                SD-WAN on the cellular interface. SD-WAN enabled cellular interface
                                support automatic traffic steering based on the collected metrics
                                amongst qualified paths/links for the cellular and wireless WAN
                                connection.  | 
| Automatically create default route pointing to network provided
                                default gateway | Select whether you want the firewall or Panorama to
                                    Automatically create default route pointing to
                                    network provided default gateway. This option is
                                enabled by default and creates a default route to the
                                default gateway provided by the network. | |
| Default Route Metric | Specify the Default Route Metric to define the
                                metric for the route. When a routing protocol has more than one
                                route to the same destination network, it prefers the route with the
                                lowest metric value. The default is 10; the range is 1 to 65535. | |
| (PAN-OS 11.2.3 and later releases) Enable IPv6 on the
                                interface | Cellular InterfaceIPv6 | Select to enable IPv6 addressing on the interface.  | 
| (PAN-OS 11.2.3 and later releases) EUI-64 | Enter the Extended Unique Identifier (EUI-64) in hexadecimal format
                                (for example, 00:32:07:FE:4A:12:4C:33). If you leave this field
                                blank, the firewall uses the EUI-64 generated from the MAC address
                                of the physical interface. | |
| (PAN-OS 11.2.3 and later releases) Automatically create
                                default route pointing to network provided default gateway | This option is enabled by default and creates a default route to the
                                default gateway provided by the network. | |
| (PAN-OS 11.2.3 and later releases) Default Route Metric | Specify the Default Route Metric to define the
                                metric for the route. When a routing protocol has more than one
                                route to the same destination network, it prefers the route with the
                                lowest metric value. The default is 10; the range is 1 to 65535. | |
| (PAN-OS 11.2.3 and later releases, SD-WAN plugin 3.3.1 and later
                                    releases) SD-WAN Interface Profile | Cellular InterfaceSD-WAN | Select an existing SD-WAN interface profile
                                or create a new SD-WAN interface profile. SD-WAN interface profile
                                defines the characteristics of ISP connections and specifies the
                                speed of links and how frequently the firewall monitors the link,
                                and specify a Link Tag for the link. | 
| (PAN-OS 11.2.3 and later releases, SD-WAN plugin 3.3.1 and later
                                    releases) Upstream NAT | Enable—Select this option if you are adding an
                                SD-WAN hub or branch device that is behind a NAT device. NAT IP Address Type—Static
                                    IP. Select IP Address or
                                    FQDN and enter a single IP address or
                                FQDN of the public-facing interface on the upstream, NAT-performing
                                device. Auto VPN configuration uses this address as the tunnel endpoint of
                                the hub or branch. | |
| Link Settings | Cellular InterfaceAdvanced | Select the Link State for the
                            interface. 
 | 
| Slot | Cellular InterfaceAdvancedSIM SettingsSlot | Select the Slot. Only one SIM slot can be active at a time. By default, SIM1 is the active SIM slot. If the firewall or Panorama can't establish a session within 5 minutes, it attempts to establish the session with the alternate SIM slot. | 
| Pin | To require a PIN to prevent unauthorized use of the SIM slots, enter a Pin for the slot. | |
| Confirm Pin | Enter the PIN again to Confirm Pinfor the slot. | |
| APN Profile | Specify the APN profile that you want the SIM card to use by default. The SIM slot uses this APN profile unless you override it with a custom APN profile. If you don't specify an APN profile, the firewall or Panorama uses the default auto APN profile. If you need to specify a custom APN profile, you can do so by selecting Cellular InterfaceAdvancedAPN Profile. | |
| APN Profile | Cellular InterfaceAdvancedAPN Profile | Add the default APN Profile. | 
| Authentication Type | Select the Authentication Type. 
 | |
| APN | Enter the APN. | |
| (PAN-OS 11.2.3 and later releases) PDP Type | Select the packet data protocol (PDP) type that the APN profile allows: IPv4 (default); IPv6, or both. | |
| Username | Enter the Username for the account. | |
| Password | Enter the Password for the account. | |
| Confirm Password | Enter the password again to Confirm Password for the account. | |
| Management Profile | Cellular InterfaceAdvancedOther Info | Select the Management Profile you want to use for the interface (see Network > Network Profiles > Interface Mgmt. | 
| MTU | Specify the maximum transfer unit (MTU) value. The default value is 1428 bytes; the range is 576—1500 bytes. | |
| Adjust TCP MSS | To adjust the packet size if you encounter latency issues, you can Adjust TCP MSS to configure the maximum segment size. | |
| IPv4 MSS Adjustment | Specify the IPv4 MSS Adjustment value. The default is 40; the range is 40—300. | 
