Tuesday, 9 July 2019

CLI Commands for Troubleshooting Palo Alto Firewalls


Default Management Interface IP: 192.168.1.1
Login: admin
Password: admin

Palo Alto Check URL Category: https://urlfiltering.paloaltonetworks.com/

Standard Show & Restart Commands:
show system info                   //shows the uptime of the device
show system environmentals         //e.g. power supply failures
show ntp
show session info                  //packet rate, number of sessions, fastpath active, etc.
show session id <id>
show interface { all | <interface-name> }
show routing route                 //routing table (all routes)
show routing fib                   //forwarding table (only used routes)
show routing protocol <protocol> ...
show arp { all | <interface-name> }
show neighbor interface { all | <interface-name> }   //IPv6 neighbor cache
show mac all                       //only with layer 2 interfaces
show jobs all
show jobs id <id>
show running resource-monitor      //resource statistics
show system resource follow        //="top", CPU usage and processes
show system disk-space             //="df -h"
debug software restart <service>   //Restart a certain process
request restart system             //Reboot the whole device

Live Session ‘n Application Statistics:
show system statistics application
show system statistics session

Ping, Traceroute, and DNS:
ping host 8.8.8.8
ping source <layer-3-interface-ip-address> host <destination-ip-address>
traceroute host 8.8.8.8
ping host ip.webernetz.net

Test:
test routing fib-lookup virtual-router default ip <ip>
test vpn ipsec-sa tunnel <value>
test security-policy-match ?
test security-policy-match from trust to untrust source 192.168.86.5 destination 192.168.120.2 protocol 6 application ssl destination-port 443

PAN-DB URL Test:
test url <fqdn>
test url-info-cloud <fqdn>
test url-info-host <fqdn>

Windows Update URL:
*.microsoft.com
download.microsoft.com
*.download.microsoft.com
mp.microsoft.com
*.mp.microsoft.com
ntservicepack.microsoft.com
update.microsoft.com
*.update.microsoft.com
windowsupdate.microsoft.com
*.windowsupdate.microsoft.com
*.ws.microsoft.com

wustat.windows.com

windowsupdate.com
*.windowsupdate.com
download.windowsupdate.com
*.download.windowsupdate.com

How to check which security rule is used the most: