Not sure what to put in a field in the PAN-OS 9.0 Web Interface? Not sure when or why to choose one option over another? Use the topics in this site to find reference information about the PAN-OS and Panorama Web Interface.
Internet Gateway Best Practice Security Policy
To protect your network from cyberattack and improve your overall security posture, implement a best practice internet gateway security policy. Use the guidelines in this site to plan, deploy, and maintain your internet gateway best practice security policy.
Best Practices for Applications and Threats Content Updates
Learn the best practices for keeping application and threat content signatures up-to-date seamlessly.
Web Interface Basics
Learn the basics of how to administer your firewall using the Web Interface.
Objects > External Dynamic Lists
Host EDLs on an external web server to enable the firewall to enforce policy on the objects—IP addresses, URLs, domains—included in the list and enforce policy.
Web Interface Access Privileges
Learn how to set admin role privileges to the different parts of the web interface to ensure that administrators have access only to the areas of the interface they need.
Use the Dashboard to see general firewall information, such as the software version, the operational status of each interface, resource utilization, and up to 10 of the most recent entries in the threat, configuration, and system logs.
The Task Manager displays details about all the operations that you and other administrators initiated (such as manual commits) or that the firewall initiated (such as scheduled report generation) since the last firewall reboot. You can use the Task Manager to troubleshoot failed operations, investigate warnings associated with completed commits, view details about queued commits, or cancel pending commits.
Network > Interfaces
The next-gen firewall can operate in multiple deployments at once because the deployments occur at the interface level. Learn about all the supported interface types.
User-ID™ enables you to identify all users on your network using a variety of techniques to ensure that you can identify users in all locations using a variety of techniques. Knowing who your users are instead of just their IP addresses enables user-based visibility and policy control.
Monitor > Packet Capture
All next-gen firewalls allow you to take packet captures (pcaps) of traffic that traverses the management interface and network interfaces on the firewall. These pcaps can be very useful in helping you troubleshoot.
Device > High Availability
High availability (HA) is a deployment in which two firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network.