![palo alto panorama palo alto panorama](https://www.paloguard.com/images/M200/front-panel-M-200.png)
features are fully integrated into how the primary ruleset works is a huge improvement. Their logging (both on box and with Panorama) is vastly better than CP, and the fact that the IPS, Application ID, etc.
Palo alto panorama software#
There was a rough spot in software QA around version 4 or so, and a period where their support department was really not scaling well, but once those got cleared up we were really happy with them overall. Having used both platforms pretty extensively, PA is generally better in pretty much every way I can think of. Possibly looking at SAAS FW instead of direct appliances to lower costs and management.Īlso ripping out one for the other seems like more work than we'd want especially if there's no drastic difference. The other issue we're looking to over come is needing actual FWs for remote sites that we're moving DIA from MPLS. Fortigate I have 0 experience with, but was also warned about their product stability and fixing bugs. Not a particular fan of Sonic wall or firepower. Our vendors that also sell PA say really they're not all that different in terms of maintenance, bugs or general quirks. I have another close friend that loves their PA, and no issues with it. (Their IPS stuff is honestly one of the best security tools I have)Īlso coming in R80.40 the https inspection is getting an overhaul. And when I did it was pre panorama.īut as a security guy CP does some really nice things in terms of IPS/IDS and the ability to correlate logs track threats etc. Our new Architect is pretty well at wits end, and likes PA. The other kicker is no we touched nothing in regards to this traffic or rules impacting it. It recently started dropping "hello" TLS packets for one particular application only (Also sharing the same certificate as other traffic that did get through) but gave no indications or logs that this traffic was getting error-ed or denied.
![palo alto panorama palo alto panorama](https://sites.google.com/site/paloaltonetworksstudy/_/rsrc/1413609483479/home/121-panorama-elearn/Creating%20users%20one%20slide.png)
Currently Checkpoint is bugging out on us quite a lot. Attempts to restart the management daemon on panorama did not help, still trying to wonder why recent traffic or threat logs dont show up.Įdit: - When i go to collector configuration on Panorama GUI and hit statistics, no data is shown.Looking to see what others Opinions are experiences are on various other firewalls. Below outputs show the collector is sending config and system 'only' which are indeed visible.Ĭollector is 'in-sync' and connected. However Panorama still doesnt show any recent logs and last logs seen are 2 weeks ago.
![palo alto panorama palo alto panorama](https://www.paloguard.com/images/PA-Series/PA5200/pa-5220-hero-l-440-196.jpg)
We also have log collector setup to forwarded to an external server which was receiving the latest logs too.
![palo alto panorama palo alto panorama](https://live.staticflickr.com/8519/8676742816_67befd44fb_b.jpg)
We recently encountered this problem after which, restarted the log and management daemons on the collector and starting seeing the logs on collector. Here's the environment,ħ or 8 firewalls forwarding logs to a dedicated collector/group which is just 1 m-100 appliance running in logger mode. I am in the middle of trying to fix an issue with Panorama unable to view traffic or threat logs.