Privilege levels determine which commands an administrator
can run as well as what information is viewable. Each administrative
role has an associated privilege level. You can use dynamic roles,
which are predefined roles that provide default privilege levels.
Or, you can create custom firewall administrator roles or Panorama administrator roles and
assign one of the following CLI privilege levels to each role:
Has full access to the Palo Alto Networks
device (firewall or Panorama) and can define new administrator accounts
and virtual systems. You must have superuser privileges to create
an administrative user with superuser privileges.
Has complete read-only access to the device.
Has access to selected virtual systems (vsys)
on the firewall to create and manage specific aspects of virtual
systems. A virtual system administrator doesn’t have access to network
interfaces, VLANs, virtual wires, virtual routers, IPSec tunnels,
GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles.
Has read-only access to selected virtual
systems on the firewall and specific aspects of virtual systems.
A virtual system administrator with read-only access doesn’t have
access to network interfaces, VLANs, virtual wires, virtual routers,
IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network
Has full access to all firewall settings
except for defining new accounts or virtual systems.
Has read-only access to all firewall settings
except password profiles (no access) and administrator accounts
(only the logged in account is visible).
Has full access to Panorama except for the
Create, modify, or delete Panorama
or device administrators and roles.
Export, validate, revert, save, load, or import a configuration.