Device > Setup > Interfaces
Table of Contents
9.1 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Device > Setup > Interfaces
Use this page to configure connection settings, allowed
services, and administrative access for the management (MGT) interface
on all firewall models and for the auxiliary interfaces (AUX-1 and
AUX-2) on PA-5200 Series firewalls.
Palo Alto Networks recommends that you always specify the IP
address and netmask (for IPv4) or prefix length (for IPv6) and the
default gateway for every interface. If you omit any of these settings
for the MGT interface (such as the default gateway), you can access
the firewall only through the console port for future configuration
changes.
To configure the MGT interface on the M-500 appliance or
the Panorama virtual appliance, see Panorama
> Setup > Interfaces.
You can use a loopback interface
as an alternative to the MGT interface for firewall management (Network
> Interfaces > Loopback).
Item | Description |
---|---|
Type (MGT interface only) | Select one:
If
you select DHCP Client, optionally click Show
DHCP Client Runtime Info to view the dynamic IP interface
status:
Optionally,
you can Renew the DHCP lease for the IP address
assigned to the MGT interface. Otherwise, Close the
window. |
Aux 1 / Aux 2 (PA-5200 Series
firewalls only) | Select any of the following options to enable
an auxiliary interface. These interfaces provide 10Gbps (SFP+) throughput
for:
Enable HTTPS instead of HTTP for the web interface
and enable SSH instead of Telnet for the CLI.
|
IP Address (IPv4) | If your network uses IPv4, assign an IPv4
address to the interface. Alternatively, you can assign the IP address
of a loopback interface for firewall management (see Network
> Interfaces > Loopback). By default, the IP address you
enter is the source address for log forwarding. |
Netmask (IPv4) | If you assigned an IPv4 address to the interface,
you must also enter a network mask (for example, 255.255.255.0). |
Default Gateway | If you assigned an IPv4 address to the interface,
you must also assign an IPv4 address to the default gateway (the
gateway must be on the same subnet as the interface). |
IPv6 Address/Prefix Length | If your network uses IPv6, assign an IPv6
address to the interface. To indicate the netmask, enter an IPv6
prefix length (for example, 2001:db8:300::1/64). |
Default IPv6 Gateway | If you assigned an IPv6 address to the interface,
you must also assign an IPv6 address to the default gateway (the
gateway must be on the same subnet as the interface); for example,
2001:db8:300::5. |
Speed | Configure a data rate and duplex option
for the interface. The choices include 10Mbps, 100Mbps, and 1Gbps
at full or half duplex. Use the default auto-negotiate setting to
have the firewall determine the interface speed. This setting must match the port settings
on the neighboring network equipment. To ensure matching settings,
select auto-negotiate if the neighboring equipment supports that option. |
MTU | Enter the maximum transmission unit (MTU)
in bytes for packets sent on this interface (range is 576 to 1,500;
default is 1,500). |
Administrative Management Services |
|
Network Services | Select the services you want to enable on
the interface:
|
Permitted IP Addresses | Enter the IP addresses from which administrators
can access the firewall through the interface. An empty list (default)
specifies that access is available from any IP address. Do not leave the list blank; specify only the
IP addresses of firewall administrators to prevent unauthorized access. |