1. Home
Location
    Techdocs Logo Techdocs Logo
    • Documentation Home
    • Palo Alto Networks
    • Support
    • Live Community
    • Knowledge Base
    1. Home
    2. PAN-OS
    3. PAN-OS® Web Interface Reference
    4. Web Interface Basics
    5. Commit Changes
    Download PDF
    Last Updated:
    Fri Nov 19 17:18:33 PST 2021
    Current Version:
    8.0 (EoL)
    • Version 10.2
    • Version 10.1
    • Version 10.0 (EoL)
    • Version 9.1
    • Version 9.0 (EoL)
    • Version 8.1 (EoL)
    • Version 8.0 (EoL)
    • Version 7.1 (EoL)
    End-of-Life (EoL)

    Table of Contents


    Search the Table of Contents
    Web Interface Basics
    Firewall Overview
    Features and Benefits
    Last Login Time and Failed Login Attempts
    Message of the Day
    Task Manager
    Language
    Alarms
    Commit Changes
    Save Candidate Configurations
    Revert Changes
    Lock Configurations
    Global Find
    Threat Details
    AutoFocus Intelligence Summary
    Dashboard
    Dashboard Widgets
    ACC
    A First Glance at the ACC
    ACC Tabs
    ACC Widgets
    ACC Actions
    Working with Tabs and Widgets
    Working with Filters—Local Filters and Global Filters
    Monitor
    Monitor > Logs
    Log Types
    Log Actions
    Monitor > External Logs
    Monitor > Automated Correlation Engine
    Monitor > Automated Correlation Engine > Correlation Object...
    Monitor > Automated Correlation Engine > Correlated Events
    Monitor > Packet Capture
    Packet Capture Overview
    Building Blocks for a Custom Packet Capture
    Enable Threat Packet Capture
    Monitor > App Scope
    App Scope Overview
    App Scope Summary Report
    App Scope Change Monitor Report
    App Scope Threat Monitor Report
    App Scope Threat Map Report
    App Scope Network Monitor Report
    App Scope Traffic Map Report
    Monitor > Session Browser
    Monitor > Block IP List
    Block IP List Entries
    View or Delete Block IP List Entries
    Monitor > Botnet
    Managing Botnet Reports
    Configuring the Botnet Report
    Monitor > PDF Reports
    Monitor > PDF Reports > Manage PDF Summary
    Monitor > PDF Reports > User Activity Report
    Monitor > PDF Reports > SaaS Application Usage
    Monitor > PDF Reports > Report Groups
    Monitor > PDF Reports > Email Scheduler
    Monitor > Manage Custom Reports
    Monitor > Reports
    Policies
    Policy Types
    Move or Clone a Policy Rule
    Policies > Security
    Security Policy Overview
    Building Blocks in a Security Policy Rule
    Creating and Managing Policies
    Overriding or Reverting a Security Policy Rule
    Policies > NAT
    NAT Policies General Tab
    NAT Original Packet Tab
    NAT Translated Packet Tab
    NAT Active/Active HA Binding Tab
    Policies > QoS
    Policies > Policy Based Forwarding
    Policy Based Forwarding General Tab
    Policy Based Forwarding Source Tab
    Policy Based Forwarding Destination/Application/Service Tab
    Policy Based Forwarding Forwarding Tab
    Policies > Decryption
    Decryption General Tab
    Decryption Source Tab
    Decryption Destination Tab
    Decryption Service/URL Category Tab
    Decryption Options Tab
    Policies > Tunnel Inspection
    Building Blocks in a Tunnel Inspection Policy
    Policies > Application Override
    Application Override General Tab
    Application Override Source Tab
    Application Override Destination Tab
    Application Override Protocol/Application Tab
    Policies > Authentication
    Building Blocks of an Authentication Policy Rule
    Create and Manage Authentication Policy
    Policies > DoS Protection
    DoS Protection General Tab
    DoS Protection Source Tab
    DoS Protection Destination Tab
    DoS Protection Option/Protection Tab
    Objects
    Move, Clone, Override, or Revert Objects
    Move or Clone an Object
    Override or Revert an Object
    Objects > Addresses
    Objects > Address Groups
    Objects > Applications
    Objects > Regions
    Applications Overview
    Actions Supported on Applications
    Defining Applications
    Objects > Application Groups
    Objects > Application Filters
    Objects > Services
    Objects > Service Groups
    Objects > Tags
    Create Tags
    Use the Tag Browser
    Manage Tags
    Objects > External Dynamic Lists
    Objects > Custom Objects
    Objects > Custom Objects > Data Patterns
    Data Pattern Settings
    Syntax for Regular Expression Data Patterns
    Regular Expression Data Pattern Examples
    Objects > Custom Objects > Spyware/Vulnerability
    Objects > Custom Objects > URL Category
    Objects > Security Profiles
    Actions in Security Profiles
    Objects > Security Profiles > Antivirus
    Objects > Security Profiles > Anti-Spyware Profile
    Objects > Security Profiles > Vulnerability Protection
    Objects > Security Profiles > URL Filtering
    URL Filtering General Settings
    URL Filtering Categories
    URL Filtering Overrides
    URL Filtering Settings
    User Credential Detection
    Objects > Security Profiles > File Blocking
    Objects > Security Profiles > WildFire Analysis
    Objects > Security Profiles > Data Filtering
    Objects > Security Profiles > DoS Protection
    Objects > Security Profiles > GTP Protection
    Objects > Security Profile Groups
    Objects > Log Forwarding
    Objects > Authentication
    Objects > Decryption Profile
    Decryption Profile General Settings
    Settings to Control Decrypted SSL Traffic
    Settings to Control Traffic that is not Decrypted
    Settings to Control Decrypted SSH Traffic
    Objects > Schedules
    Network
    Network > Virtual Wires
    Network > Interfaces
    Firewall Interfaces Overview
    Common Building Blocks for Firewall Interfaces
    Common Building Blocks for PA-7000 Series Firewall Interfac...
    PA-7000 Series Layer 2 Interface
    PA-7000 Series Layer 2 Subinterface
    PA-7000 Series Layer 3 Interface
    Layer 3 Subinterface
    Virtual Wire Interface
    Virtual Wire Subinterface
    Tap Interface
    Log Card Interface
    Log Card Subinterface
    Decrypt Mirror Interface
    Aggregate Ethernet (AE) Interface Group
    Aggregate Ethernet (AE) Interface
    HA Interface
    Network > Interfaces > VLAN
    Network > Interfaces > Loopback
    Network > Interfaces > Tunnel
    Network > Virtual Routers
    General Settings of a Virtual Router
    Static Routes
    Route Redistribution
    RIP
    RIP Interfaces Tab
    RIP Timers Tab
    RIP Auth Profiles Tab
    RIP Export Rules Tab
    OSPF
    OSPF Areas Tab
    OSPF Auth Profiles Tab
    OSPF Export Rules Tab
    OSPF Advanced Tab
    OSPFv3
    OSPFv3 Areas Tab
    OSPFv3 Auth Profiles Tab
    OSPFv3 Export Rules Tab
    OSPFv3 Advanced Tab
    BGP
    Basic BGP Settings
    BGP General Tab
    BGP Advanced Tab
    BGP Peer Group Tab
    BGP Import and Export Tabs
    BGP Conditional Adv Tab
    BGP Aggregate Tab
    BGP Redist Rules Tab
    IP Multicast
    Multicast Rendezvous Point Tab
    Multicast Interfaces Tab
    Multicast SPT Threshold Tab
    Multicast Source Specific Address Tab
    Multicast Advanced Tab
    ECMP
    ECMP Settings
    More Runtime Stats for a Virtual Router
    Routing Tab
    RIP Tab
    BGP Tab
    Multicast Tab
    BFD Summary Information Tab
    Network > Zones
    Security Zone Overview
    Building Blocks of Security Zones
    Network > VLANs
    Network > IPSec Tunnels
    IPSec VPN Tunnel Management
    IPSec Tunnel General Tab
    IPSec Tunnel Proxy IDs Tab
    IPSec Tunnel Status on the Firewall
    IPSec Tunnel Restart or Refresh
    Network > DHCP
    DHCP Overview
    DHCP Addressing
    DHCP Server
    DHCP Relay
    DHCP Client
    Network > DNS Proxy
    DNS Proxy Overview
    DNS Proxy Settings
    Additional DNS Proxy Actions
    Network > QoS
    QoS Interface Settings
    QoS Interface Statistics
    Network > LLDP
    LLDP Overview
    Building Blocks of LLDP
    Network > Network Profiles
    Network > Network Profiles > GlobalProtect IPSec Crypto
    Network > Network Profiles > IKE Gateways
    IKE Gateway Management
    IKE Gateway General Tab
    IKE Gateway Advanced Options Tab
    IKE Gateway Restart or Refresh
    Network > Network Profiles > IPSec Crypto
    Network > Network Profiles > IKE Crypto
    Network > Network Profiles > Interface Mgmt
    Network > Network Profiles > Monitor
    Network > Network Profiles > Zone Protection
    Building Blocks of Zone Protection Profiles
    Flood Protection
    Reconnaissance Protection
    Packet Based Attack Protection
    IP Drop
    TCP Drop
    ICMP Drop
    IPv6 Drop
    ICMPv6 Drop
    Protocol Protection
    Network > Network Profiles > LLDP Profile
    Network > Network Profiles > BFD Profile
    BFD Overview
    Building Blocks of a BFD Profile
    View BFD Summary and Details
    Network > Network Profiles > QoS
    Device
    Device > Setup
    Device > Setup > Management
    Device > Setup > Operations
    Enable SNMP Monitoring
    Device > Setup > HSM
    Hardware Security Module Provider Settings
    HSM Authentication
    Hardware Security Module Provider Configuration and Status
    Hardware Security Module Status
    Device > Setup > Services
    Configure Services for Global and Virtual Systems
    Global Services Settings
    IPv4 and IPv6 Support for Service Route Configuration
    Destination Service Route
    Device > Setup > Interfaces
    Device > Setup > Telemetry
    Device > Setup > Content-ID
    Device > Setup > WildFire
    Device > Setup > Session
    Session Settings
    Session Timeouts
    TCP Settings
    Decryption Settings: Certificate Revocation Checking
    Decryption Settings: Forward Proxy Server Certificate Setti...
    VPN Session Settings
    Device > High Availability
    HA Lite
    Important Considerations for Configuring HA
    Configure HA Settings
    Device > Config Audit
    Device > Password Profiles
    Username and Password Requirements
    Device > Administrators
    Device > Admin Roles
    Device > Access Domain
    Device > Authentication Profile
    Configure an Authentication Profile
    Export SAML Meta data from an Authentication Profile
    Device > Authentication Sequence
    Device > VM Information Sources
    Settings to Enable VM Information Sources for VMware ESXi a...
    Settings to Enable VM Information Sources for AWS VPC
    Device > Virtual Systems
    Device > Shared Gateways
    Device > Certificate Management
    Device > Certificate Management > Certificates
    Manage Firewall and Panorama Certificates
    Other Supported Actions to Manage Certificates
    Manage Default Trusted Certificate Authorities
    Device > Certificate Management > Certificate Profile
    Device > Certificate Management > OCSP Responder
    Device > Certificate Management > SSL/TLS Service Profile
    Device > Certificate Management > SCEP
    Device > Certificate Management > SSL Decryption Exclusion
    Device > Response Pages
    Device > Log Settings
    Select Log Forwarding Destinations
    Define Alarm Settings
    Clear Logs
    Device > Server Profiles
    Device > Server Profiles > SNMP Trap
    Device > Server Profiles > Syslog
    Device > Server Profiles > Email
    Device > Server Profiles > HTTP
    Device > Server Profiles > NetFlow
    Device > Server Profiles > RADIUS
    Device > Server Profiles > TACACS+
    Device > Server Profiles > LDAP
    Device > Server Profiles > Kerberos
    Device > Server Profiles > SAML Identity Provider
    Device > Server Profiles > DNS
    Device > Server Profiles > Multi Factor Authentication
    Device > Local User Database > Users
    Device > Local User Database > User Groups
    Device > Scheduled Log Export
    Device > Software
    Device > Dynamic Updates
    Device > Licenses
    Behavior on License Expiry
    Device > Support
    Device > Master Key and Diagnostics
    User Identification
    Device > User Identification > User Mapping
    Enable WMI Authentication
    Enable Client Probing
    Enable Server Monitoring
    Configure Cache Timeouts for User Mapping Entries
    Enable NTLM Authentication
    Enable Redistribution of User Mappings Among Firewalls
    Manage Syslog Message Filters
    Manage the User Ignore List
    Monitor Servers
    Configure Access to Monitored Servers
    Manage Access to Monitored Servers
    Include or Exclude Subnetworks for User Mapping
    Device > User Identification > Connection Security
    Device > User Identification > User-ID Agents
    Configure Access to User-ID Agents
    Manage Access to User-ID Agents
    Device > User Identification > Terminal Services Agents
    Device > User Identification > Group Mapping Settings
    Device > User Identification > Captive Portal Settings
    GlobalProtect
    Network > GlobalProtect > Portals
    GlobalProtect Portals General Tab
    GlobalProtect Portals Authentication Configuration Tab
    GlobalProtect Portals Agent Configuration Tab
    GlobalProtect Portals Agent Authentication Tab
    GlobalProtect Portals Agent User/User Group Tab
    GlobalProtect Portals Agent Internal Tab
    GlobalProtect Portals Agent External Tab
    GlobalProtect Portals Agent App Tab
    GlobalProtect Portals Agent Data Collection Tab
    GlobalProtect Portals Clientless Configuration Tab
    GlobalProtect Portal Satellite Configuration Tab
    Network > GlobalProtect > Gateways
    GlobalProtect Gateways General Tab
    GlobalProtect Gateway Authentication Tab
    GlobalProtect Gateways Agent Tab
    Tunnel Settings Tab
    Timeout Settings Tab
    Client Settings Tab
    Network Services Tab
    HIP Notification Tab
    GlobalProtect Gateway Satellite Configuration Tab
    Network > GlobalProtect > MDM
    Network > GlobalProtect > Block List
    Network > GlobalProtect > Clientless Apps
    Network > GlobalProtect > Clientless App Groups
    Objects > GlobalProtect > HIP Objects
    HIP Objects General Tab
    HIP Objects Mobile Device Tab
    HIP Objects Patch Management Tab
    HIP Objects Firewall Tab
    HIP Objects Antivirus Tab
    HIP Objects Anti-Spyware Tab
    HIP Objects Disk Backup Tab
    HIP Objects Disk Encryption Tab
    HIP Objects Data Loss Prevention Tab
    HIP Objects Custom Checks Tab
    Objects > GlobalProtect > HIP Profiles
    Device > GlobalProtect Client
    Managing the GlobalProtect Agent Software
    Setting Up the GlobalProtect Agent
    Using the GlobalProtect Agent
    Panorama Web Interface
    Use the Panorama Web Interface
    Context Switch
    Panorama Commit Operations
    Defining Policies on Panorama
    Log Storage Partitions for a Panorama Virtual Appliance in ...
    Panorama > Setup > Interfaces
    Panorama > High Availability
    Panorama > Managed WildFire Clusters
    Managed WildFire Cluster Tasks
    Managed WildFire Appliance Tasks
    Managed WildFire Information
    Managed WildFire Cluster and Appliance Administration
    Panorama > Administrators
    Panorama > Admin Roles
    Panorama > Access Domains
    Panorama > Managed Devices
    Managed Firewall Administration
    Managed Firewall Information
    Firewall Software and Content Updates
    Firewall Backups
    Panorama > Templates
    Templates
    Template Stacks
    Panorama > Device Groups
    Panorama > Managed Collectors
    Log Collector Information
    Log Collector Configuration
    General Log Collector Settings
    Log Collector CLI Authentication Settings
    Log Collector Interface Settings
    Log Collector RAID Disk Settings
    User-ID Agent Settings
    Connection Security
    Communication Settings
    Software Updates for Dedicated Log Collectors
    Panorama > Collector Groups
    Collector Group Configuration
    Collector Group Information
    Panorama > Plugins
    Panorama > VMware NSX
    Configure a Notify Group
    Create Service Definitions
    Configure Access to the NSX Manager
    Create Steering Rules
    Panorama > Log Ingestion Profile
    Panorama > Log Settings
    Panorama > Scheduled Config Export
    Panorama > Software
    Manage Panorama Software Updates
    Display Panorama Software Update Information
    Panorama > Device Deployment
    Manage Software and Content Updates
    Display Software and Content Update Information
    Schedule Dynamic Content Updates
    Manage Firewall Licenses
    • Web Interface Basics
      • Firewall Overview
      • Features and Benefits
      • Last Login Time and Failed Login Attempts
      • Message of the Day
      • Task Manager
      • Language
      • Alarms
      • Commit Changes
      • Save Candidate Configurations
      • Revert Changes
      • Lock Configurations
      • Global Find
      • Threat Details
      • AutoFocus Intelligence Summary
    • Dashboard
      • Dashboard Widgets
    • ACC
      • A First Glance at the ACC
      • ACC Tabs
      • ACC Widgets
      • ACC Actions
        • Working with Tabs and Widgets
        • Working with Filters—Local Filters and Global Filters
    • Monitor
      • Monitor > Logs
        • Log Types
        • Log Actions
      • Monitor > External Logs
      • Monitor > Automated Correlation Engine
        • Monitor > Automated Correlation Engine > Correlation Object...
        • Monitor > Automated Correlation Engine > Correlated Events
      • Monitor > Packet Capture
        • Packet Capture Overview
        • Building Blocks for a Custom Packet Capture
        • Enable Threat Packet Capture
      • Monitor > App Scope
        • App Scope Overview
        • App Scope Summary Report
        • App Scope Change Monitor Report
        • App Scope Threat Monitor Report
        • App Scope Threat Map Report
        • App Scope Network Monitor Report
        • App Scope Traffic Map Report
      • Monitor > Session Browser
      • Monitor > Block IP List
        • Block IP List Entries
        • View or Delete Block IP List Entries
      • Monitor > Botnet
        • Managing Botnet Reports
        • Configuring the Botnet Report
      • Monitor > PDF Reports
        • Monitor > PDF Reports > Manage PDF Summary
        • Monitor > PDF Reports > User Activity Report
        • Monitor > PDF Reports > SaaS Application Usage
        • Monitor > PDF Reports > Report Groups
        • Monitor > PDF Reports > Email Scheduler
      • Monitor > Manage Custom Reports
      • Monitor > Reports
    • Policies
      • Policy Types
      • Move or Clone a Policy Rule
      • Policies > Security
        • Security Policy Overview
        • Building Blocks in a Security Policy Rule
        • Creating and Managing Policies
        • Overriding or Reverting a Security Policy Rule
      • Policies > NAT
        • NAT Policies General Tab
        • NAT Original Packet Tab
        • NAT Translated Packet Tab
        • NAT Active/Active HA Binding Tab
      • Policies > QoS
      • Policies > Policy Based Forwarding
        • Policy Based Forwarding General Tab
        • Policy Based Forwarding Source Tab
        • Policy Based Forwarding Destination/Application/Service Tab
        • Policy Based Forwarding Forwarding Tab
      • Policies > Decryption
        • Decryption General Tab
        • Decryption Source Tab
        • Decryption Destination Tab
        • Decryption Service/URL Category Tab
        • Decryption Options Tab
      • Policies > Tunnel Inspection
        • Building Blocks in a Tunnel Inspection Policy
      • Policies > Application Override
        • Application Override General Tab
        • Application Override Source Tab
        • Application Override Destination Tab
        • Application Override Protocol/Application Tab
      • Policies > Authentication
        • Building Blocks of an Authentication Policy Rule
        • Create and Manage Authentication Policy
      • Policies > DoS Protection
        • DoS Protection General Tab
        • DoS Protection Source Tab
        • DoS Protection Destination Tab
        • DoS Protection Option/Protection Tab
    • Objects
      • Move, Clone, Override, or Revert Objects
        • Move or Clone an Object
        • Override or Revert an Object
      • Objects > Addresses
      • Objects > Address Groups
      • Objects > Applications
        • Objects > Regions
        • Applications Overview
        • Actions Supported on Applications
        • Defining Applications
      • Objects > Application Groups
      • Objects > Application Filters
      • Objects > Services
      • Objects > Service Groups
      • Objects > Tags
        • Create Tags
        • Use the Tag Browser
        • Manage Tags
      • Objects > External Dynamic Lists
      • Objects > Custom Objects
        • Objects > Custom Objects > Data Patterns
          • Data Pattern Settings
          • Syntax for Regular Expression Data Patterns
          • Regular Expression Data Pattern Examples
      • Objects > Custom Objects > Spyware/Vulnerability
      • Objects > Custom Objects > URL Category
      • Objects > Security Profiles
        • Actions in Security Profiles
      • Objects > Security Profiles > Antivirus
      • Objects > Security Profiles > Anti-Spyware Profile
      • Objects > Security Profiles > Vulnerability Protection
      • Objects > Security Profiles > URL Filtering
        • URL Filtering General Settings
        • URL Filtering Categories
        • URL Filtering Overrides
        • URL Filtering Settings
        • User Credential Detection
      • Objects > Security Profiles > File Blocking
      • Objects > Security Profiles > WildFire Analysis
      • Objects > Security Profiles > Data Filtering
      • Objects > Security Profiles > DoS Protection
      • Objects > Security Profiles > GTP Protection
      • Objects > Security Profile Groups
      • Objects > Log Forwarding
      • Objects > Authentication
      • Objects > Decryption Profile
        • Decryption Profile General Settings
        • Settings to Control Decrypted SSL Traffic
        • Settings to Control Traffic that is not Decrypted
        • Settings to Control Decrypted SSH Traffic
      • Objects > Schedules
    • Network
      • Network > Virtual Wires
      • Network > Interfaces
        • Firewall Interfaces Overview
        • Common Building Blocks for Firewall Interfaces
        • Common Building Blocks for PA-7000 Series Firewall Interfac...
        • PA-7000 Series Layer 2 Interface
        • PA-7000 Series Layer 2 Subinterface
        • PA-7000 Series Layer 3 Interface
        • Layer 3 Subinterface
        • Virtual Wire Interface
        • Virtual Wire Subinterface
        • Tap Interface
        • Log Card Interface
        • Log Card Subinterface
        • Decrypt Mirror Interface
        • Aggregate Ethernet (AE) Interface Group
        • Aggregate Ethernet (AE) Interface
        • HA Interface
      • Network > Interfaces > VLAN
      • Network > Interfaces > Loopback
      • Network > Interfaces > Tunnel
      • Network > Virtual Routers
        • General Settings of a Virtual Router
        • Static Routes
        • Route Redistribution
        • RIP
          • RIP Interfaces Tab
          • RIP Timers Tab
          • RIP Auth Profiles Tab
          • RIP Export Rules Tab
        • OSPF
          • OSPF Areas Tab
          • OSPF Auth Profiles Tab
          • OSPF Export Rules Tab
          • OSPF Advanced Tab
        • OSPFv3
          • OSPFv3 Areas Tab
          • OSPFv3 Auth Profiles Tab
          • OSPFv3 Export Rules Tab
          • OSPFv3 Advanced Tab
        • BGP
          • Basic BGP Settings
          • BGP General Tab
          • BGP Advanced Tab
          • BGP Peer Group Tab
          • BGP Import and Export Tabs
          • BGP Conditional Adv Tab
          • BGP Aggregate Tab
          • BGP Redist Rules Tab
        • IP Multicast
          • Multicast Rendezvous Point Tab
          • Multicast Interfaces Tab
          • Multicast SPT Threshold Tab
          • Multicast Source Specific Address Tab
          • Multicast Advanced Tab
        • ECMP
          • ECMP Settings
        • More Runtime Stats for a Virtual Router
          • Routing Tab
          • RIP Tab
          • BGP Tab
          • Multicast Tab
          • BFD Summary Information Tab
      • Network > Zones
        • Security Zone Overview
        • Building Blocks of Security Zones
      • Network > VLANs
      • Network > IPSec Tunnels
        • IPSec VPN Tunnel Management
        • IPSec Tunnel General Tab
        • IPSec Tunnel Proxy IDs Tab
        • IPSec Tunnel Status on the Firewall
        • IPSec Tunnel Restart or Refresh
      • Network > DHCP
        • DHCP Overview
        • DHCP Addressing
        • DHCP Server
        • DHCP Relay
        • DHCP Client
      • Network > DNS Proxy
        • DNS Proxy Overview
        • DNS Proxy Settings
        • Additional DNS Proxy Actions
      • Network > QoS
        • QoS Interface Settings
        • QoS Interface Statistics
      • Network > LLDP
        • LLDP Overview
        • Building Blocks of LLDP
      • Network > Network Profiles
      • Network > Network Profiles > GlobalProtect IPSec Crypto
      • Network > Network Profiles > IKE Gateways
        • IKE Gateway Management
        • IKE Gateway General Tab
        • IKE Gateway Advanced Options Tab
        • IKE Gateway Restart or Refresh
      • Network > Network Profiles > IPSec Crypto
      • Network > Network Profiles > IKE Crypto
      • Network > Network Profiles > Interface Mgmt
      • Network > Network Profiles > Monitor
      • Network > Network Profiles > Zone Protection
        • Building Blocks of Zone Protection Profiles
        • Flood Protection
        • Reconnaissance Protection
        • Packet Based Attack Protection
          • IP Drop
          • TCP Drop
          • ICMP Drop
          • IPv6 Drop
          • ICMPv6 Drop
        • Protocol Protection
      • Network > Network Profiles > LLDP Profile
      • Network > Network Profiles > BFD Profile
        • BFD Overview
        • Building Blocks of a BFD Profile
          • View BFD Summary and Details
      • Network > Network Profiles > QoS
    • Device
      • Device > Setup
      • Device > Setup > Management
      • Device > Setup > Operations
        • Enable SNMP Monitoring
      • Device > Setup > HSM
        • Hardware Security Module Provider Settings
        • HSM Authentication
        • Hardware Security Module Provider Configuration and Status
        • Hardware Security Module Status
      • Device > Setup > Services
        • Configure Services for Global and Virtual Systems
        • Global Services Settings
        • IPv4 and IPv6 Support for Service Route Configuration
        • Destination Service Route
      • Device > Setup > Interfaces
      • Device > Setup > Telemetry
      • Device > Setup > Content-ID
      • Device > Setup > WildFire
      • Device > Setup > Session
        • Session Settings
        • Session Timeouts
        • TCP Settings
        • Decryption Settings: Certificate Revocation Checking
        • Decryption Settings: Forward Proxy Server Certificate Setti...
        • VPN Session Settings
      • Device > High Availability
        • HA Lite
        • Important Considerations for Configuring HA
        • Configure HA Settings
      • Device > Config Audit
      • Device > Password Profiles
        • Username and Password Requirements
      • Device > Administrators
      • Device > Admin Roles
      • Device > Access Domain
      • Device > Authentication Profile
        • Configure an Authentication Profile
        • Export SAML Meta data from an Authentication Profile
      • Device > Authentication Sequence
      • Device > VM Information Sources
        • Settings to Enable VM Information Sources for VMware ESXi a...
        • Settings to Enable VM Information Sources for AWS VPC
      • Device > Virtual Systems
      • Device > Shared Gateways
      • Device > Certificate Management
      • Device > Certificate Management > Certificates
        • Manage Firewall and Panorama Certificates
          • Other Supported Actions to Manage Certificates
        • Manage Default Trusted Certificate Authorities
      • Device > Certificate Management > Certificate Profile
      • Device > Certificate Management > OCSP Responder
      • Device > Certificate Management > SSL/TLS Service Profile
      • Device > Certificate Management > SCEP
      • Device > Certificate Management > SSL Decryption Exclusion
      • Device > Response Pages
      • Device > Log Settings
        • Select Log Forwarding Destinations
        • Define Alarm Settings
        • Clear Logs
      • Device > Server Profiles
      • Device > Server Profiles > SNMP Trap
      • Device > Server Profiles > Syslog
      • Device > Server Profiles > Email
      • Device > Server Profiles > HTTP
      • Device > Server Profiles > NetFlow
      • Device > Server Profiles > RADIUS
      • Device > Server Profiles > TACACS+
      • Device > Server Profiles > LDAP
      • Device > Server Profiles > Kerberos
      • Device > Server Profiles > SAML Identity Provider
      • Device > Server Profiles > DNS
      • Device > Server Profiles > Multi Factor Authentication
      • Device > Local User Database > Users
      • Device > Local User Database > User Groups
      • Device > Scheduled Log Export
      • Device > Software
      • Device > Dynamic Updates
      • Device > Licenses
        • Behavior on License Expiry
      • Device > Support
      • Device > Master Key and Diagnostics
    • User Identification
      • Device > User Identification > User Mapping
        • Enable WMI Authentication
        • Enable Client Probing
        • Enable Server Monitoring
        • Configure Cache Timeouts for User Mapping Entries
        • Enable NTLM Authentication
        • Enable Redistribution of User Mappings Among Firewalls
        • Manage Syslog Message Filters
        • Manage the User Ignore List
        • Monitor Servers
          • Configure Access to Monitored Servers
          • Manage Access to Monitored Servers
        • Include or Exclude Subnetworks for User Mapping
      • Device > User Identification > Connection Security
      • Device > User Identification > User-ID Agents
        • Configure Access to User-ID Agents
        • Manage Access to User-ID Agents
      • Device > User Identification > Terminal Services Agents
      • Device > User Identification > Group Mapping Settings
      • Device > User Identification > Captive Portal Settings
    • GlobalProtect
      • Network > GlobalProtect > Portals
        • GlobalProtect Portals General Tab
        • GlobalProtect Portals Authentication Configuration Tab
        • GlobalProtect Portals Agent Configuration Tab
          • GlobalProtect Portals Agent Authentication Tab
          • GlobalProtect Portals Agent User/User Group Tab
          • GlobalProtect Portals Agent Internal Tab
          • GlobalProtect Portals Agent External Tab
          • GlobalProtect Portals Agent App Tab
          • GlobalProtect Portals Agent Data Collection Tab
        • GlobalProtect Portals Clientless Configuration Tab
        • GlobalProtect Portal Satellite Configuration Tab
      • Network > GlobalProtect > Gateways
        • GlobalProtect Gateways General Tab
        • GlobalProtect Gateway Authentication Tab
        • GlobalProtect Gateways Agent Tab
          • Tunnel Settings Tab
          • Timeout Settings Tab
          • Client Settings Tab
          • Network Services Tab
          • HIP Notification Tab
        • GlobalProtect Gateway Satellite Configuration Tab
      • Network > GlobalProtect > MDM
      • Network > GlobalProtect > Block List
      • Network > GlobalProtect > Clientless Apps
      • Network > GlobalProtect > Clientless App Groups
      • Objects > GlobalProtect > HIP Objects
        • HIP Objects General Tab
        • HIP Objects Mobile Device Tab
        • HIP Objects Patch Management Tab
        • HIP Objects Firewall Tab
        • HIP Objects Antivirus Tab
        • HIP Objects Anti-Spyware Tab
        • HIP Objects Disk Backup Tab
        • HIP Objects Disk Encryption Tab
        • HIP Objects Data Loss Prevention Tab
        • HIP Objects Custom Checks Tab
      • Objects > GlobalProtect > HIP Profiles
      • Device > GlobalProtect Client
        • Managing the GlobalProtect Agent Software
        • Setting Up the GlobalProtect Agent
        • Using the GlobalProtect Agent
    • Panorama Web Interface
      • Use the Panorama Web Interface
      • Context Switch
      • Panorama Commit Operations
      • Defining Policies on Panorama
      • Log Storage Partitions for a Panorama Virtual Appliance in ...
      • Panorama > Setup > Interfaces
      • Panorama > High Availability
      • Panorama > Managed WildFire Clusters
        • Managed WildFire Cluster Tasks
        • Managed WildFire Appliance Tasks
        • Managed WildFire Information
        • Managed WildFire Cluster and Appliance Administration
      • Panorama > Administrators
      • Panorama > Admin Roles
      • Panorama > Access Domains
      • Panorama > Managed Devices
        • Managed Firewall Administration
        • Managed Firewall Information
        • Firewall Software and Content Updates
        • Firewall Backups
      • Panorama > Templates
        • Templates
        • Template Stacks
      • Panorama > Device Groups
      • Panorama > Managed Collectors
        • Log Collector Information
        • Log Collector Configuration
          • General Log Collector Settings
          • Log Collector CLI Authentication Settings
          • Log Collector Interface Settings
          • Log Collector RAID Disk Settings
          • User-ID Agent Settings
          • Connection Security
          • Communication Settings
        • Software Updates for Dedicated Log Collectors
      • Panorama > Collector Groups
        • Collector Group Configuration
        • Collector Group Information
      • Panorama > Plugins
      • Panorama > VMware NSX
        • Configure a Notify Group
        • Create Service Definitions
        • Configure Access to the NSX Manager
        • Create Steering Rules
      • Panorama > Log Ingestion Profile
      • Panorama > Log Settings
      • Panorama > Scheduled Config Export
      • Panorama > Software
        • Manage Panorama Software Updates
        • Display Panorama Software Update Information
      • Panorama > Device Deployment
        • Manage Software and Content Updates
        • Display Software and Content Update Information
        • Schedule Dynamic Content Updates
        • Manage Firewall Licenses

    Document:PAN-OS® Web Interface Reference


    Commit Changes

    Download PDF
    Last Updated:
    Fri Nov 19 17:18:33 PST 2021
    Current Version:
    8.0 (EoL)
    • Version 10.2
    • Version 10.1
    • Version 10.0 (EoL)
    • Version 9.1
    • Version 9.0 (EoL)
    • Version 8.1 (EoL)
    • Version 8.0 (EoL)
    • Version 7.1 (EoL)

    Table of Contents


    Search the Table of Contents
    Web Interface Basics
    Firewall Overview
    Features and Benefits
    Last Login Time and Failed Login Attempts
    Message of the Day
    Task Manager
    Language
    Alarms
    Commit Changes
    Save Candidate Configurations
    Revert Changes
    Lock Configurations
    Global Find
    Threat Details
    AutoFocus Intelligence Summary
    Dashboard
    Dashboard Widgets
    ACC
    A First Glance at the ACC
    ACC Tabs
    ACC Widgets
    ACC Actions
    Working with Tabs and Widgets
    Working with Filters—Local Filters and Global Filters
    Monitor
    Monitor > Logs
    Log Types
    Log Actions
    Monitor > External Logs
    Monitor > Automated Correlation Engine
    Monitor > Automated Correlation Engine > Correlation Object...
    Monitor > Automated Correlation Engine > Correlated Events
    Monitor > Packet Capture
    Packet Capture Overview
    Building Blocks for a Custom Packet Capture
    Enable Threat Packet Capture
    Monitor > App Scope
    App Scope Overview
    App Scope Summary Report
    App Scope Change Monitor Report
    App Scope Threat Monitor Report
    App Scope Threat Map Report
    App Scope Network Monitor Report
    App Scope Traffic Map Report
    Monitor > Session Browser
    Monitor > Block IP List
    Block IP List Entries
    View or Delete Block IP List Entries
    Monitor > Botnet
    Managing Botnet Reports
    Configuring the Botnet Report
    Monitor > PDF Reports
    Monitor > PDF Reports > Manage PDF Summary
    Monitor > PDF Reports > User Activity Report
    Monitor > PDF Reports > SaaS Application Usage
    Monitor > PDF Reports > Report Groups
    Monitor > PDF Reports > Email Scheduler
    Monitor > Manage Custom Reports