Not sure what to put in a field in the PAN-OS 9.1 Web Interface? Not sure when or why to choose one option over another? Use the topics in this site to find reference information about the PAN-OS and Panorama Web Interface.

Get Started

Featured Topics

Internet Gateway Best Practice Security Policy

To protect your network from cyberattack and improve your overall security posture, implement a best practice internet gateway security policy. Use the guidelines in this site to plan, deploy, and maintain your internet gateway best practice security policy.

Best Practices for Applications and Threats Content Updates

What's New in PAN-OS 9.1

Get started with all of the exciting new features in PAN-OS 9.1, including SD-WAN, more App-ID and User-ID features, and more!

Translated PAN-OS Documentation

Recommended Topics

Web Interface Basics

Learn the basics of how to administer your firewall using the Web Interface.

Objects > External Dynamic Lists

Host EDLs on an external web server to enable the firewall to enforce policy on the objects—IP addresses, URLs, domains—included in the list and enforce policy.

Web Interface Access Privileges

Learn how to set admin role privileges to the different parts of the web interface to ensure that administrators have access only to the areas of the interface they need.


Use the Dashboard to see general firewall information, such as the software version, the operational status of each interface, resource utilization, and up to 10 of the most recent entries in the threat, configuration, and system logs.

Task Manager

The Task Manager displays details about all the operations that you and other administrators initiated (such as manual commits) or that the firewall initiated (such as scheduled report generation) since the last firewall reboot. You can use the Task Manager to troubleshoot failed operations, investigate warnings associated with completed commits, view details about queued commits, or cancel pending commits.

Most Popular

Network > Interfaces

The next-gen firewall can operate in multiple deployments at once because the deployments occur at the interface level. Learn about all the supported interface types.

User Identification

User-ID™ enables you to identify all users on your network using a variety of techniques to ensure that you can identify users in all locations using a variety of techniques. Knowing who your users are instead of just their IP addresses enables user-based visibility and policy control.

Monitor > Packet Capture

All next-gen firewalls allow you to take packet captures (pcaps) of traffic that traverses the management interface and network interfaces on the firewall. These pcaps can be very useful in helping you troubleshoot.

Device > High Availability

High availability (HA) is a deployment in which two firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network.



TCP Content Inspection Queue Setting Best Practices Check

Ensure that your TCP Content Inspection Queue settings follow network security best practices.

PA-3200 Series

Protection Against Phishing and Malicious Sites

UDP Content Inspection Queue Setting Best Practices Check

Ensure that your UDP Content Inspection Queue settings follow network security best practices.

Rematch Sessions Setting Best Practices Check

Ensure that your Rematch Sessions setting follows network security best practices.

TCP Out of Order Traffic Settings Best Practice Check

Ensure that your TCP Out-of-Order Traffic settings follow network security best practices.