Network > Network Profiles > Interface Mgmt

An Interface Management profile protects the firewall from unauthorized access by defining the services and IP addresses that a firewall interface permits. You can assign an Interface Management profile to Layer 3 Ethernet interfaces (including subinterfaces) and to logical interfaces (aggregate group, VLAN, loopback, and tunnel interfaces). To assign an Interface Management profile, see Network > Interfaces.
Field
Description
Name
Enter a profile name (up to 31 characters). This name appears in the list of Interface Management profiles when configuring interfaces. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Permitted Services
  • Ping—Use to test connectivity with external services. For example, you can ping the interface to verify it can receive PAN-OS software and content updates from the Palo Alto Networks Update Server.
  • Telnet—Use to access the firewall CLI. Telnet uses plaintext, which is not as secure as SSH.
Enable SSH instead of Telnet for management traffic on the interface.
  • SSH—Use for secure access to the firewall CLI.
  • HTTP—Use to access the firewall web interface. HTTP uses plaintext, which is not as secure as HTTPS.
Enable HTTPS instead of HTTP for management traffic on the interface.
Permitted IP Addresses
Enter the list of IPv4 or IPv6 addresses from which the interface allows access.

Related Documentation