Default Management Interface IP: 192.168.1.1
Login: admin
Password: admin
Palo Alto Check URL Category: https://urlfiltering.paloaltonetworks.com/
Standard Show & Restart Commands:
show system info //shows the uptime of the device
Standard Show & Restart Commands:
show system info //shows the uptime of the device
show system environmentals
//e.g. power supply failures
show ntp
show session info
//packet rate, number of sessions, fastpath
active, etc.
show session id <id>
show interface { all | <interface-name> }
show routing route
//routing table (all routes)
show routing fib
//forwarding table (only used routes)
show routing protocol <protocol> ...
show arp { all | <interface-name> }
show neighbor interface { all | <interface-name> } //IPv6 neighbor
cache
show mac all
//only with layer 2 interfaces
show jobs all
show jobs id <id>
show running resource-monitor
//resource statistics
show system resource follow
//="top", CPU usage and processes
show system disk-space
//="df -h"
debug software restart <service>
//Restart a certain process
request restart system
//Reboot the whole device
Live Session ‘n Application Statistics:
show system statistics application
show system
statistics session
Ping, Traceroute, and DNS:
ping host 8.8.8.8
ping source <layer-3-interface-ip-address> host <destination-ip-address>
traceroute host 8.8.8.8
ping host ip.webernetz.net
Test:
test routing fib-lookup virtual-router default ip <ip>
Ping, Traceroute, and DNS:
ping host 8.8.8.8
ping source <layer-3-interface-ip-address> host <destination-ip-address>
traceroute host 8.8.8.8
ping host ip.webernetz.net
Test:
test routing fib-lookup virtual-router default ip <ip>
test vpn
ipsec-sa tunnel <value>
test
security-policy-match ?
test
security-policy-match from trust to untrust source 192.168.86.5 destination
192.168.120.2 protocol 6 application ssl destination-port 443
PAN-DB URL Test:
test url <fqdn>
PAN-DB URL Test:
test url <fqdn>
test
url-info-cloud <fqdn>
test url-info-host <fqdn>Windows Update URL:
*.microsoft.com
download.microsoft.com
*.download.microsoft.com
mp.microsoft.com
*.mp.microsoft.com
ntservicepack.microsoft.com
update.microsoft.com
*.update.microsoft.com
windowsupdate.microsoft.com
*.windowsupdate.microsoft.com
*.ws.microsoft.com
wustat.windows.com
windowsupdate.com
*.windowsupdate.com
download.windowsupdate.com
*.download.windowsupdate.com
How to check which security rule is used the most: