Palo Alto Networks QoS: Overview & Core Concepts

Quality of Service (QoS) within the Palo Alto Networks ecosystem is a critical mechanism for managing network traffic to ensure that essential applications and users receive the necessary bandwidth and priority, especially during periods of network congestion. PAN-OS provides a robust QoS implementation that leverages its unique capabilities like App-ID and User-ID for granular traffic control.

Why QoS on Palo Alto Networks Firewalls?

Palo Alto Networks firewalls, being at the heart of network security and traffic management, are ideally positioned to enforce QoS policies. Unlike traditional QoS mechanisms that might only rely on IP addresses and port numbers, PAN-OS QoS can differentiate traffic based on:

Key Network Characteristics Managed by PAN-OS QoS

PAN-OS QoS helps manage and optimize the following network characteristics:

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand that PAN-OS QoS is applied on the egress interface . This is a fundamental concept frequently tested. Also, be clear on how App-ID and User-ID enhance QoS capabilities beyond traditional methods.

Common QoS Goals in a Palo Alto Networks Environment

Each Palo Alto Networks firewall model has a maximum number of physical interfaces on which QoS can be enabled. Always consult the specific hardware datasheet on the Palo Alto Networks support portal for these limits.

Conceptual flow of traffic identification and QoS processing within a Palo Alto Networks firewall, highlighting the roles of App-ID and User-ID in QoS policy evaluation.

Conceptual flow of traffic identification and QoS processing within a Palo Alto Networks firewall, highlighting the roles of App-ID and User-ID in QoS policy evaluation.

CRITICAL (Palo Alto Networks): QoS on Palo Alto Networks firewalls is stateful and session-based . Once a session is classified and a QoS class is assigned, that classification typically remains for the life of the session. However, some application shifts (e.g. web-browsing to facebook-posting) might be re-evaluated by App-ID.

Palo Alto Networks QoS: Key Components & Traffic Flow

A complete QoS solution on a Palo Alto Networks firewall is built using three primary configurable components. Understanding how these components interact is crucial for effective QoS implementation.

Core QoS Components in PAN-OS

  1. QoS Policy Rule:
    • Purpose: To identify and classify traffic that requires specific QoS treatment.
    • Location: Policies > QoS in the PAN-OS GUI or Panorama.
    • Matching Criteria: Leverages the full power of PAN-OS identification, including:
      • Source/Destination Zones
      • Source/Destination Addresses (pre-NAT for source)
      • User-ID (source users/groups)
      • App-ID (applications, application filters, application groups)
      • Service (ports, service groups)
      • URL Category
      • DSCP/ToS markings
    • Action: Assigns matched traffic to one of eight QoS Classes (1-8).
    • Evaluation: QoS Policy rules are evaluated after Security Policy and NAT policy evaluation. However, for matching purposes, QoS policies generally use pre-NAT source IP addresses and pre-NAT destination IP addresses but post-NAT destination zones.
  2. QoS Profile:
    • Purpose: To define the specific bandwidth allocations (guaranteed and maximum) and priority levels for each of the eight QoS Classes.
    • Location: Network > Network Profiles > QoS Profiles .
    • Key Settings per Class (1-8):
      • Priority: Real-time, High, Medium, Low. This determines the dequeuing preference from the hardware queues.
      • Egress Max: The absolute maximum bandwidth a class can consume on the interface where the profile is applied. Specified in Mbps, Kbps, or as a percentage of the interface's Egress Max bandwidth.
      • Egress Guaranteed: The minimum bandwidth reserved for a class during congestion. Specified in Mbps, Kbps, or as a percentage. Unused guaranteed bandwidth can be utilized by other classes.
    • Overall Settings: A QoS Profile can also have an overall Egress Max and Egress Guaranteed bandwidth limit that applies to all traffic shaped by that profile on an interface.
  3. QoS Egress Interface Configuration:
    • Purpose: To enable QoS on a physical egress interface and apply a QoS Profile to shape the traffic exiting that interface.
    • Location: Network > QoS . Here you associate a physical interface with QoS settings.
    • Key Settings:
      • Interface Selection: The physical interface (e.g., ethernet1/1) on which QoS will be enforced.
      • Turn on QoS: Checkbox to enable QoS processing for this interface.
      • Interface Egress Max: The total maximum bandwidth available for QoS shaping on this physical interface. This is a critical value as class percentages are calculated based on this.
      • Default QoS Profile (Clear Text): The QoS Profile applied to non-tunneled traffic exiting this interface.
      • Default QoS Profile (Tunneled Traffic): The QoS Profile applied to tunneled traffic (e.g., IPsec) exiting this interface.
      • Granular Rules: Ability to apply different QoS Profiles for clear text traffic based on source subnets/interfaces, and for tunneled traffic based on specific tunnel interfaces.
Gotcha! (Palo Alto Networks): A common misconfiguration is forgetting to set an appropriate Interface Egress Max value when enabling QoS on an interface. If this is left at 0 or an incorrect value, percentage-based bandwidth allocations in the QoS Profile will not work as expected. It should reflect the actual usable bandwidth of the link connected to that interface.

PAN-OS QoS Traffic Flow

Palo Alto Networks QoS Traffic Flow Diagram
Diagram illustrating traffic flow through a Palo Alto Networks firewall, showing QoS Policy matching, class assignment, and shaping by a QoS Profile on the egress interface.

The general flow is as follows:

  1. Traffic ingresses the firewall.
  2. Standard firewall processing occurs: Ingress interface processing, session lookup/creation, Security Policy evaluation, NAT policy evaluation.
  3. QoS Policy Evaluation: The firewall evaluates QoS Policy rules based on the (mostly) original packet information (pre-NAT source IP, pre-NAT destination IP, post-NAT destination zone, App-ID, User-ID, etc.).
  4. If a QoS Policy rule is matched, the traffic is assigned the QoS Class specified in that rule.
  5. If no QoS Policy rule is matched, the traffic is assigned the default QoS Class (Class 4, unless modified globally via CLI, which is rare).
  6. The traffic is routed to its egress interface.
  7. QoS Enforcement on Egress: If QoS is enabled on the egress interface:
    • The QoS Profile associated with that interface (and potentially specific rules for clear text/tunneled traffic) is applied.
    • The traffic is placed into one of the eight hardware queues corresponding to its assigned QoS Class.
    • Packets are dequeued based on the priority settings (real-time, high, medium, low) and shaped according to the Egress Guaranteed and Egress Max bandwidth limits defined in the QoS Profile for that class.
    • Weighted Random Early Detection (WRED) is used to manage queue congestion proactively.
  8. Traffic egresses the firewall.
Detailed packet flow for QoS processing in PAN-OS, showing policy evaluation stages and enforcement on the egress interface.

Detailed packet flow for QoS processing in PAN-OS, showing policy evaluation stages and enforcement on the egress interface.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Remember the order of operations: Security/NAT policies are evaluated before QoS policies. QoS policy matching uses pre-NAT source IP. QoS enforcement (shaping) happens on egress . Traffic not matching any QoS policy rule gets Class 4 by default.

Palo Alto Networks QoS: QoS Classes & Priority Queuing

Palo Alto Networks firewalls provide eight distinct QoS classes to categorize and manage traffic. The priority assigned to these classes dictates how traffic is handled, especially during network congestion.

QoS Classes

PAN-OS supports eight QoS classes, numbered 1 through 8. These classes are fundamental to the QoS framework:

PAN-OS QoS Profile showing Class definitions
PAN-OS QoS Profile configuration window, illustrating settings for Priority, Egress Max, and Egress Guaranteed bandwidth for each of the eight classes.

While there are eight classes, it's a common best practice to use a subset of them for distinct traffic types. For example:

QoS Priority Queuing

Within a QoS Profile, each of the eight classes is assigned a priority level. This priority determines the order in which packets are dequeued from the hardware queues of the egress interface, especially when the interface is congested.

PAN-OS supports four priority levels:

CRITICAL (Palo Alto Networks): The priority settings are only truly effective during periods of network congestion on the egress interface. If there is no congestion (i.e., available bandwidth exceeds demand), all traffic will generally pass through without significant queuing delays, regardless of priority.

How Priority Works:

Palo Alto Networks firewalls implement a form of strict priority queuing combined with weighted fairness for classes at the same priority level. In essence:

  1. Packets in 'Real-time' queues are serviced before any packets in 'High', 'Medium', or 'Low' priority queues.
  2. Packets in 'High' priority queues are serviced before 'Medium' or 'Low'.
  3. Packets in 'Medium' priority queues are serviced before 'Low'.
  4. Within the same priority level, if multiple classes share that priority, bandwidth is distributed among them based on their configured guaranteed/maximum rates and current demand, often employing a weighted mechanism.

It's important not to over-assign traffic to 'Real-time' or 'High' priority, as this can starve lower-priority (but still important) traffic. A well-balanced QoS strategy is key.

Conceptual representation of priority queuing on a Palo Alto Networks firewall. Packets are enqueued based on their QoS class's priority, and the scheduler services higher priority queues first.

Conceptual representation of priority queuing on a Palo Alto Networks firewall. Packets are enqueued based on their QoS class's priority, and the scheduler services higher priority queues first.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Know the four priority levels (Real-time, High, Medium, Low) and their order of precedence. Understand that Class 4 is the default for unclassified traffic. The effectiveness of priority queuing is most apparent during network congestion.

Palo Alto Networks QoS: Bandwidth Management

Effective bandwidth management is a cornerstone of QoS on Palo Alto Networks firewalls. It involves allocating and limiting bandwidth for different traffic classes to prevent congestion, ensure fairness, and guarantee performance for critical applications. This is primarily achieved through Egress Guaranteed and Egress Max settings within a QoS Profile.

Key Bandwidth Parameters

These parameters are configured per QoS class within a QoS Profile ( Network > Network Profiles > QoS Profiles ) and can also be set for the overall profile or interface.

Gotcha! (Palo Alto Networks): The sum of Egress Guaranteed bandwidths for all classes within a QoS Profile applied to an interface should not exceed 100% of the Interface Egress Max (or Profile Egress Max if used as the reference). Over-subscribing guaranteed bandwidth can lead to unpredictable behavior as the firewall cannot fulfill all guarantees simultaneously. PAN-OS will typically allow configuration beyond 100% but it's a logical error.

Relationship with Interface and Profile Bandwidth

PCNSE/PCNSA Exam Note (Palo Alto Networks): Distinguish clearly between Egress Guaranteed and Egress Max. Understand how percentages are calculated (relative to Interface Egress Max or Profile Egress Max). Be aware of the recommendation not to oversubscribe total Egress Guaranteed bandwidth.

Weighted Random Early Detection (WRED)

Palo Alto Networks firewalls utilize Weighted Random Early Detection (WRED) as part of their queue management mechanism. WRED is a congestion avoidance algorithm, not a congestion management algorithm. It works by:

WRED helps to:

While WRED parameters are not typically user-tunable in PAN-OS GUI for QoS, its presence is important for understanding how queues are managed effectively in conjunction with bandwidth limits and priorities.

Hierarchical view of bandwidth allocation: Interface Egress Max is the total. QoS Profiles manage this bandwidth, and within profiles, classes have Guaranteed and Max limits. Unused guaranteed bandwidth is dynamically shared.

Hierarchical view of bandwidth allocation: Interface Egress Max is the total. QoS Profiles manage this bandwidth, and within profiles, classes have Guaranteed and Max limits. Unused guaranteed bandwidth is dynamically shared.

Palo Alto Networks QoS: General Configuration Steps

Configuring QoS on a Palo Alto Networks firewall involves a systematic approach. Following these steps ensures that traffic is correctly identified, classified, and shaped according to your organization's requirements.

  1. Identify Traffic & Determine Egress Interface(s):
    • Objective: Understand which applications, users, or services need QoS treatment and which firewall interface(s) this traffic will exit from.
    • Tools:
      • Application Command Center (ACC) ( ACC tab): Provides a graphical overview of traffic patterns, top applications, users, source/destination zones, and interfaces. Filter by time range, zones, applications, etc., to pinpoint the traffic of interest.
        ACC showing application traffic and interfaces
        Palo Alto Networks ACC tab showing top applications and associated interfaces. This helps identify traffic needing QoS.
      • Traffic Logs ( Monitor > Logs > Traffic ): Offer detailed, session-level information. Crucially, the Egress Interface column (add it if not visible) shows the exit interface for each session. You can also see App-ID, User-ID, source/destination IP, and zones.
        Traffic logs showing Egress I/F column
        Palo Alto Networks Traffic Logs with the 'Egress I/F' column selected, vital for determining the egress interface for QoS.
        Detailed traffic log view showing Egress Interface
        Detailed view of a traffic log entry in PAN-OS, highlighting the Egress Interface field.
    • Consideration: Remember that QoS is applied on egress. For traffic from your internal network to the internet (upload), the egress interface is typically your external-facing (e.g., 'untrust') interface. For traffic from the internet to your internal network (download), the egress interface is your internal-facing (e.g., 'trust') interface. You might need QoS on multiple interfaces.
  2. Create/Modify QoS Profile(s) ( Network > Network Profiles > QoS Profile ):
    • Objective: Define the bandwidth (Egress Guaranteed, Egress Max) and Priority (Real-time, High, Medium, Low) for each of the eight QoS classes.
    • Steps:
      1. Click Add to create a new profile or select an existing one to modify.
      2. Give the profile a descriptive Name (e.g., "Critical_Apps_QoS", "VoIP_Profile").
      3. (Optional but recommended) Set an Overall Egress Max and/or Egress Guaranteed for the entire profile if you want to cap the total bandwidth this profile can manage on an interface.
      4. For each QoS Class (1-8) that you plan to use in your QoS Policies:
        • Select the Priority .
        • Set Egress Max (in Mbps, Kbps, or %).
        • Set Egress Guaranteed (in Mbps, Kbps, or %).
        QoS Profile configuration window
        PAN-OS QoS Profile configuration: Setting overall limits and per-class Priority, Egress Max, and Egress Guaranteed values.
      5. Click OK .
  3. Create QoS Policy Rule(s) ( Policies > QoS ):
    • Objective: Classify the identified traffic and assign it to a specific QoS Class (which is then handled by the QoS Profile).
    • Steps:
      1. Click Add to create a new QoS policy rule.
      2. General Tab: Give it a descriptive Name (e.g., "VoIP_to_Class1", "CEO_Web_High_Priority"). Add Tags if used.
      3. Source Tab: Define Source Zone(s), Source Address(es)/Address Group(s). If using User-ID, specify Source User(s)/Group(s). Remember to use pre-NAT source IP addresses for matching.
      4. Destination Tab: Define Destination Zone(s) (usually post-NAT for traffic to internet), Destination Address(es)/Address Group(s).
      5. Application/Service Tab:
        • Application: Specify Applications, Application Filters, or Application Groups (leveraging App-ID). This is a key differentiator for PAN-OS QoS.
        • Service/URL Category: Specify Services (TCP/UDP ports), Service Groups, or URL Categories.
      6. DSCP/ToS Tab (Optional): If classifying based on existing DSCP/ToS markings, configure them here.
      7. Other Settings Tab:
        • From the Class dropdown, select the QoS Class (1-8) to assign to traffic matching this rule. This class number corresponds to the class configured in your QoS Profile.
      8. Click OK . Arrange rules in the correct order (more specific rules usually go higher).
  4. Enable QoS on Egress Interface(s) & Apply Profile ( Network > QoS ):
    • Objective: Activate QoS processing on the physical egress interface(s) and link the appropriate QoS Profile.
    • Steps:
      1. Click Add or select an existing interface configuration to modify.
      2. Select the physical Interface Name (e.g., ethernet1/1, ethernet1/2) identified in Step 1.
      3. Set the Egress Max bandwidth for this physical interface (e.g., 1000 Mbps for a 1Gbps link). This value is critical for percentage-based calculations in QoS Profiles.
      4. Check the box: Turn on QoS feature on this interface .
      5. Clear Text Traffic Tab:
        • Select the Default Profile (e.g., the QoS Profile created in Step 2) to apply to all clear text (non-tunneled) traffic exiting this interface that is classified by QoS Policies.
        • (Optional) Add specific rules to apply different QoS Profiles based on Source Interface or Source Subnet.
      6. Tunneled Traffic Tab (Optional):
        • Select a Default Profile for all tunneled traffic (e.g., IPsec VPNs).
        • (Optional) Add rules to apply specific QoS Profiles to individual Tunnel Interfaces.
        QoS Interface configuration window
        PAN-OS QoS Interface configuration: Enabling QoS, setting Interface Egress Max, and assigning default QoS Profiles for clear text and tunneled traffic.
      7. Click OK .
  5. Commit Changes:
    • Click Commit in the PAN-OS GUI to apply the configuration. Select "Commit All Changes" or "Commit changes made by me" as appropriate.
  6. Verify and Monitor QoS Operation: (Covered in more detail in "Verification & Monitoring" section)
    • QoS Statistics ( Network > QoS > Statistics tab): Select the QoS-enabled interface to view real-time bandwidth usage per class, active sessions, top applications within each class, etc.
      QoS Statistics page
      PAN-OS QoS Statistics page, showing bandwidth graphs, session counts, and application details per QoS class for a selected interface.
    • Session Browser ( Monitor > Session Browser ): Check individual sessions to see if they are being matched by a QoS Policy rule and what QoS Class they have been assigned (look for QoS Rule and QoS Class columns).
    • Traffic Logs ( Monitor > Logs > Traffic ): Confirm traffic is matching the intended QoS policy rules.
PCNSE/PCNSA Exam Note (Palo Alto Networks): Know these configuration steps in order. Pay special attention to setting the Interface Egress Max correctly and understanding that QoS Policies use pre-NAT source IPs for matching while QoS is enforced on the egress interface.

Palo Alto Networks QoS: QoS Policy Deep Dive

QoS Policy rules ( Policies > QoS ) are the heart of traffic classification for QoS in PAN-OS. They determine *which* traffic gets *what* QoS Class. A nuanced understanding of their matching criteria and behavior is essential for effective QoS.

QoS Policy Rule Structure and Matching

A QoS Policy rule consists of several tabs to define matching criteria:

CRITICAL (Palo Alto Networks): The QoS Policy rule evaluation logic is crucial. It uses the original (pre-NAT) source IP and source zone , but the final (post-NAT) destination zone for matching. Applications are identified by App-ID based on the actual data payload, not just ports.

QoS Policy Evaluation Order

QoS policies are evaluated top-down, similar to Security policies. The first rule that matches the traffic characteristics will be applied, and no further QoS rules are evaluated for that session.

Interaction with Security and NAT Policies

The order of operations within the firewall's datapath is important for QoS:

  1. Ingress Processing
  2. Session Lookup / Creation
  3. Security Policy Evaluation (and App-ID, User-ID identification)
  4. NAT Policy Evaluation (Source NAT, Destination NAT)
  5. QoS Policy Evaluation (uses results from previous steps, e.g., identified App-ID, User-ID, pre-NAT source, post-NAT destination zone)
  6. Routing and Egress Interface Determination
  7. QoS Enforcement (shaping) on Egress Interface

This means that when you write a QoS Policy rule:

Gotcha! (Palo Alto Networks): A common point of confusion is source IP matching in QoS policies when SNAT is involved. Always use the original, internal source IP address in the QoS policy's source address field, even if that traffic is later source NATted to a public IP. The firewall "remembers" the original source for QoS policy lookup. For destination matching, if DNAT is involved, you generally match on the post-DNAT internal IP address .

Limitations

Palo Alto Networks explicitly states that QoS (including DSCP marking) cannot be applied to traffic that is being decrypted or inspected via:

For such traffic, QoS classification and enforcement would occur on the encrypted traffic before decryption or after re-encryption, based on the outer headers and App-ID of the encrypted protocol (e.g., 'ssl', 'ssh').

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand the matching criteria for QoS policies, especially the use of pre-NAT source IP, post-NAT destination zone, App-ID, and User-ID. Be aware of the limitations regarding SSL/SSH decrypted traffic. The top-down evaluation order is also key.

Palo Alto Networks QoS: QoS Profile Deep Dive

The QoS Profile ( Network > Network Profiles > QoS Profiles ) is where the actual "shaping" parameters—bandwidth guarantees, maximums, and priorities—are defined for each of the eight QoS classes. A well-configured QoS Profile is essential for translating QoS Policy classifications into tangible traffic management.

QoS Profile Structure

When you create or edit a QoS Profile, you encounter the following key areas:

Key Considerations for QoS Profile Design

Gotcha! (Palo Alto Networks): If you set Egress Max for a class to 0 Mbps/Kbps, it effectively blocks all traffic in that class. If Egress Guaranteed is set higher than Egress Max for the same class, the Egress Max takes precedence, and the guarantee cannot be met beyond that maximum. Logical consistency is important.

Example Scenario: Profile for Mixed Traffic

Imagine an interface with 100 Mbps capacity (Interface Egress Max = 100 Mbps).

Class Assigned Traffic (Example) Priority Egress Guaranteed Egress Max Notes
Class 1 VoIP (SIP, RTP) Real-time 10 Mbps (or 10%) 15 Mbps (or 15%) Dedicated for voice quality.
Class 2 Video Conferencing, Critical Web App High 20 Mbps (or 20%) 40 Mbps (or 40%) Important interactive apps.
Class 3 General Business Apps, Salesforce Medium 30 Mbps (or 30%) 70 Mbps (or 70%) Standard business use. Can burst.
Class 4 Default (General Web, Email) Medium 10 Mbps (or 10%) 80 Mbps (or 80%) Best effort, can use available.
Class 6 Bulk Downloads, Software Updates Low 5 Mbps (or 5%) 20 Mbps (or 20%) Background, less critical.

Analysis of Example:

PCNSE/PCNSA Exam Note (Palo Alto Networks): For the exam, be prepared to interpret QoS Profile settings. Understand how Egress Max and Egress Guaranteed work, how percentages are derived, and the implications of different priority settings. The concept of not oversubscribing total guaranteed bandwidth is important.

Palo Alto Networks QoS: Egress Interface Configuration

The final step in activating QoS is configuring it on the physical egress interface(s) ( Network > QoS ). This is where you enable the QoS engine for an interface, set its total available bandwidth, and associate QoS Profiles with different types of traffic exiting that interface.

Diagram showing upload/download egress interfaces
Conceptual diagram illustrating that for upload traffic (internal to external), the egress interface is the external-facing one. For download traffic (external to internal), the egress interface is the internal-facing one. QoS is applied on these respective egress points.

Interface QoS Settings ( Network > QoS )

When you click Add or modify an existing entry in this section, you configure QoS for a specific physical interface:

Differentiating Clear Text and Tunneled Traffic

PAN-OS allows you to apply different QoS treatments for clear text (unencrypted) traffic versus tunneled traffic (primarily IPsec VPNs) on the same physical egress interface.

QoS Interface configuration with profile selection
PAN-OS QoS Interface configuration: Setting Interface Egress Max, enabling QoS, and assigning default QoS Profiles for Clear Text and Tunneled traffic. Note the tabs for granular rules.
Gotcha! (Palo Alto Networks): For tunneled traffic, the QoS classification (QoS Policy) happens on the inner, original packet (pre-encryption). However, the QoS shaping (QoS Profile application) happens on the outer, encrypted packet as it egresses the physical interface. The "Tunneled Traffic" tab in Network > QoS ensures the correct profile is applied to these already-classified-but-now-encrypted packets.

QoS on Aggregate Ethernet (AE) Interfaces

QoS is fully supported on Aggregate Ethernet (AE) interfaces. The configuration is similar to a physical interface:

The firewall distributes traffic across the member links of the AE interface based on its hashing algorithm. QoS will then shape the traffic on a per-member-link basis according to the total AE interface capacity and profile settings.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand that QoS is enabled per physical (or AE) egress interface. The "Interface Egress Max" is paramount. Know how to apply different profiles for clear text vs. tunneled traffic, and especially how to target specific Tunnel Interfaces for QoS.

Palo Alto Networks QoS: Verification & Monitoring

After configuring QoS, it's crucial to verify that it's working as expected and to monitor its ongoing performance. PAN-OS provides several tools for this purpose.

1. QoS Statistics ( Network > QoS > Statistics Tab)

This is the primary real-time monitoring tool for QoS.

QoS Statistics page in PAN-OS
Palo Alto Networks QoS Statistics page: Visualizing bandwidth per class, session counts, and top applications for a selected QoS-enabled interface. This is key for verifying QoS operation.

What to look for:

2. Session Browser ( Monitor > Session Browser )

The Session Browser provides details for individual, active sessions passing through the firewall.

What to look for:

3. Traffic Logs ( Monitor > Logs > Traffic )

Traffic logs record details for every session at its conclusion (or intermittently for long-lived sessions).

What to look for:

4. PAN-OS CLI Commands

Several CLI commands can provide insights into QoS status and statistics. These are useful for scripting or quick checks.

show qos interface <interface_name> statistics
show qos interface <interface_name> class <class_id>
show qos policy
show running qos-profile name <profile_name>
        
PCNSE/PCNSA Exam Note (Palo Alto Networks): For the exam, know that QoS Statistics ( Network > QoS > Statistics ) is the primary GUI tool for real-time monitoring. Understand what information it provides (bandwidth per class, apps per class). Be aware that Session Browser can show the QoS Rule and Class for active sessions.

Troubleshooting Common QoS Issues

Palo Alto Networks Advanced QoS: Lockless QoS (PAN-OS 11.0.3+)

Starting with PAN-OS 11.0.3, Palo Alto Networks introduced "Lockless QoS" on specific newer hardware platforms. This feature aims to improve QoS performance and reduce latency by optimizing how CPU resources are utilized for QoS processing.

Understanding Legacy vs. Lockless QoS

Lockless QoS is particularly beneficial for environments with high bandwidth requirements and stringent latency demands for QoS-managed traffic.

Supported Platforms and Considerations

Configuration via CLI

Lockless QoS is managed via the PAN-OS command-line interface (CLI). There is no GUI option for this feature.

PCNSE/PCNSA Exam Note (Palo Alto Networks): For PCNSE, be aware of Lockless QoS as a newer feature for performance enhancement on specific platforms. Know that it's CLI-configured, requires a reboot, and might have different performance characteristics for LAG interfaces compared to legacy QoS. The specific platforms supported are also good to note.
Conceptual difference between Legacy QoS (sharing CPU resources) and Lockless QoS (using dedicated CPU cores for QoS processing) on Palo Alto Networks firewalls.

Conceptual difference between Legacy QoS (sharing CPU resources) and Lockless QoS (using dedicated CPU cores for QoS processing) on Palo Alto Networks firewalls.

CRITICAL (Palo Alto Networks): Before enabling Lockless QoS in a production environment, carefully review Palo Alto Networks' official documentation for the latest supported platforms, specific performance implications (especially for LAGs), and any known limitations. Thorough testing in a lab environment is recommended.

Palo Alto Networks Advanced QoS: QoS for Virtual Systems (vsys)

Palo Alto Networks firewalls that support multiple virtual systems (vsys) allow for independent QoS configurations within each vsys. This enables different tenants or logical departments sharing the same physical firewall to have their own tailored QoS policies and bandwidth management without interfering with each other, up to the physical capabilities of the hardware and shared interfaces.

QoS in a Multi-VSYS Environment

When a firewall is in multi-vsys mode:

QoS in a multi-vsys environment
Conceptual diagram of a Palo Alto Networks firewall with two virtual systems (VSYS1, VSYS2). Each vsys can have its own QoS policies, and QoS profiles are applied on the shared physical egress interfaces to shape traffic per vsys needs.

Configuration Steps for QoS in a VSYS

The process is largely similar to configuring QoS on a non-vsys firewall, but with vsys context awareness:

  1. Select VSYS Context: In the PAN-OS GUI (or Panorama), ensure you are in the context of the specific vsys for which you want to configure QoS.
    ACC view filtered by Virtual System
    Palo Alto Networks ACC with the Virtual System dropdown, allowing administrators to focus on traffic and configurations for a specific vsys.
  2. Identify Traffic & Egress Interface (within vsys context):
    • Use ACC (filtered by the current vsys) and Traffic Logs to identify applications, users, and egress interfaces for the traffic specific to this vsys.
    • The egress interface will be a physical interface allocated to (or shared by) this vsys.
  3. Create QoS Profile(s) ( Network > Network Profiles > QoS Profiles - within vsys context):
    • Define QoS Profiles with class bandwidths and priorities tailored to the needs of this vsys. These profiles are local to this vsys.
  4. Create QoS Policy Rule(s) ( Policies > QoS - within vsys context):
    • Define QoS Policy rules. Critically, the Source Zone and Destination Zone in these rules must be zones that belong to the current vsys.
    • Use App-ID, User-ID (if vsys-specific or shared), addresses, etc., relevant to this vsys.
    • Assign traffic to QoS Classes defined in the vsys-local QoS Profile.
  5. Enable QoS on Egress Interface & Apply Profile ( Network > QoS - global context, but with vsys awareness):
    • This part is configured globally (not within a specific vsys context switch in GUI typically, but affects all vsys using that interface).
    • Select the physical egress interface.
    • Enable QoS and set the Interface Egress Max.
    • When applying a Default Profile (for Clear Text or Tunneled Traffic), you select a QoS Profile. If you've created vsys-specific profiles, you'd typically create a "master" or "aggregate" QoS profile globally, or use rules on the interface to direct traffic based on source subnets (which might map to vsys) to different profiles. More commonly, the single QoS profile applied to the interface will have classes that are targeted by QoS policies from different vsys. For example, VSYS1 policies send traffic to Class 1, VSYS2 policies send traffic to Class 2, and the single QoS profile on the egress interface defines behavior for both Class 1 and Class 2.
    • The key is that the QoS Policy within each vsys correctly classifies its traffic into one of the 8 classes, and the global QoS profile on the egress interface then handles those classes.
  6. Commit Changes.
  7. Verify QoS Operation:
    • Use QoS Statistics ( Network > QoS > Statistics ), selecting the relevant physical interface. You'll see aggregate statistics for all vsys using that interface, but you can often infer vsys-specific traffic by observing which classes (mapped by vsys policies) are active.
    • Use Session Browser and Traffic Logs, filtering by vsys if possible, to check QoS Rule and Class assignment.
PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand that QoS Policies and Profiles can be vsys-specific. However, the QoS enablement and profile application on a physical interface ( Network > QoS ) is a global setting that affects all vsys using that interface. Proper zone definition within vsys QoS Policies is key to isolating and classifying traffic correctly.

Bandwidth Sharing and Guarantees Between VSYS

While each vsys can define its priorities, the actual bandwidth allocation on a shared physical interface is governed by the single QoS Profile applied to that interface and its class settings. If multiple vsys direct traffic to the same QoS class (e.g., both VSYS1 and VSYS2 policies send their "high priority" traffic to Class 2), they will share the bandwidth allocated to Class 2 in the interface's QoS Profile.

To provide hard bandwidth guarantees per vsys on a shared interface, you would typically need to:

  1. Dedicate different QoS classes to different vsys in their QoS policies (e.g., VSYS1 uses Classes 1-2, VSYS2 uses Classes 3-4).
  2. In the QoS Profile applied to the shared physical interface, configure the Egress Guaranteed and Egress Max for those classes (1-4) according to each vsys's needs.

Alternatively, if vsys have dedicated IP subnets, the rule-based QoS profile application on the egress interface ( Network > QoS > Clear Text Traffic > Add Rule by Source Subnet ) could be used to apply entirely different QoS Profiles for traffic originating from subnets belonging to different vsys.

Gotcha! (Palo Alto Networks): Simply creating QoS policies within each vsys isn't enough if the shared egress interface doesn't have a QoS profile that appropriately handles the classes those policies assign. The global QoS configuration on the physical interface is paramount for actual enforcement.

Palo Alto Networks Advanced QoS: Enforce QoS Based on DSCP Classification

Palo Alto Networks firewalls can leverage Differentiated Services Code Point (DSCP) values in IP packet headers for QoS classification. This allows the firewall to honor QoS markings set by upstream devices (like routers, switches, or IP phones) or to mark traffic itself for downstream devices to honor.

Understanding DSCP

DSCP is a 6-bit field in the IP header (formerly the Type of Service - ToS byte) used to specify a per-hop behavior (PHB) for traffic. Common DSCP values and their associated PHBs include:

Palo Alto Networks firewalls allow you to match on these standard DSCP values or define custom codepoints.

Using DSCP for QoS Classification (QoS Policy)

You can use incoming DSCP values as a matching criterion in a QoS Policy rule ( Policies > QoS ):

  1. Navigate to the QoS Policy rule you want to modify or create a new one.
  2. Go to the DSCP/ToS tab within the rule.
  3. Under "Codepoints to Match Traffic," click Add .
  4. In the "DSCP Match" window:
    • Type: Select the DSCP type (e.g., assured-forwarding , expedited-forwarding , class-selector , custom-binary , custom-hex , ip-precedence ).
    • Codepoint: Based on the type, select the specific value (e.g., for assured-forwarding , select af11 , af22 , etc.; for expedited-forwarding , ef is the option). For custom, enter the binary or hex value.
  5. Click OK . You can add multiple DSCP values to match in a single rule.
  6. On the Other Settings tab of the QoS Policy rule, assign the traffic matching these DSCP values (and other criteria in the rule) to the desired PAN-OS QoS Class (1-8).

This way, the firewall can take traffic already marked by, for example, an IP phone with EF, and map it to your "Real-time" PAN-OS QoS Class for appropriate local shaping.

Marking Traffic with DSCP (Security Policy)

Palo Alto Networks firewalls can also *set* or *modify* DSCP values on traffic egressing the firewall. This is configured within a Security Policy rule ( Policies > Security ), not the QoS Policy.

  1. Navigate to the Security Policy rule that handles the traffic you want to mark.
  2. Go to the Actions tab.
  3. Find the QoS Marking section.
    • Type: Choose DSCP or IP Precedence/ToS .
    • Codepoint: Select the specific DSCP value you want to apply (e.g., ef , af21 ) or a custom value.
    • Follow C2S Flow: A very useful option. If checked, the firewall will mark the server-to-client (return) traffic of that session with the same DSCP value it received from the client-to-server flow (if that flow had a DSCP mark that the firewall is recognizing or setting). This ensures symmetrical marking. If you are setting a new mark here, this option ensures the return traffic also gets it.

Use Case: If you've classified VoIP traffic using App-ID in a QoS Policy and assigned it to Class 1 (Real-time priority), you can then go to the Security Policy rule that allows that VoIP traffic and configure QoS Marking to set the DSCP value to EF (46). This ensures that downstream devices in your network (and potentially across a WAN if the provider supports it) will honor this EF marking.

CRITICAL (Palo Alto Networks): DSCP classification for QoS happens in the QoS Policy. DSCP *marking* (setting/changing DSCP values) happens in the Security Policy. These are two distinct functions.
Flow showing how a Palo Alto Networks firewall can honor an incoming DSCP mark for QoS classification (via QoS Policy) and then re-mark or confirm the mark on outgoing traffic (via Security Policy) for downstream devices.

Flow showing how a Palo Alto Networks firewall can honor an incoming DSCP mark for QoS classification (via QoS Policy) and then re-mark or confirm the mark on outgoing traffic (via Security Policy) for downstream devices.

Limitations

As mentioned previously, QoS/DSCP classification and marking cannot be applied to traffic undergoing active SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy decryption/inspection by the firewall. For such traffic, any DSCP operations would apply to the encrypted envelope.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand the difference between DSCP matching in QoS Policy (for classification) and DSCP marking in Security Policy (for setting values). Know common DSCP values like EF and AF series. The "Follow C2S Flow" option for symmetrical marking is also a key concept.

Palo Alto Networks Advanced QoS: QoS and Tunnels (IPsec/GlobalProtect)

Applying Quality of Service to tunneled traffic, such as IPsec VPNs (site-to-site or remote access) and GlobalProtect, requires special consideration on Palo Alto Networks firewalls. The key is to understand that classification happens on the inner (original) packet, while shaping happens on the outer (encrypted) tunnel packet.

QoS for IPsec VPN Tunnels

For IPsec tunnels:

  1. QoS Policy for Inner Traffic:
    • Create QoS Policy rules ( Policies > QoS ) that match the original, unencrypted traffic destined to go through the IPsec tunnel.
    • Use App-ID, User-ID, pre-NAT source/destination IPs of the actual hosts/applications.
    • Assign this inner traffic to a specific PAN-OS QoS Class (1-8).
  2. QoS on the Egress Physical Interface ( Network > QoS ):
    • Identify the physical interface through which the encrypted IPsec tunnel packets will egress the firewall.
    • Enable QoS on this physical interface and set its Egress Max bandwidth.
    • Navigate to the Tunneled Traffic tab.
    • Here you have two main options:
      • Default Profile: Apply a single QoS Profile to ALL tunneled traffic exiting this physical interface. The classes defined in this profile will then shape the encrypted packets based on the QoS class assigned to their inner, original contents.
      • Add Rule (Per Tunnel Interface): This is more granular and often preferred. Click Add and specify:
        • Tunnel Interface: Select the logical tunnel.x interface corresponding to your IPsec VPN.
        • Profile: Select a specific QoS Profile to apply *only* to traffic exiting via this particular tunnel interface. This allows different IPsec tunnels to have different QoS treatments.
        QoS for specific tunnel interface
        PAN-OS QoS Interface configuration: Applying a specific QoS Profile to a designated Tunnel Interface (e.g., tunnel.1) under the 'Tunneled Traffic' tab.

How it works: The firewall first classifies the inner packet (e.g., an RDP session from UserA to ServerB over the VPN) and assigns it a QoS Class (say, Class 2). When this packet is encrypted and becomes an ESP packet, the firewall "remembers" that the original contents were Class 2. As the ESP packet (which is now "tunneled traffic") egresses the physical interface, the QoS settings on the "Tunneled Traffic" tab for that physical interface (specifically for that tunnel.x if a rule exists, or the default) will apply the shaping parameters defined for Class 2 in the chosen QoS Profile.

Gotcha! (Palo Alto Networks): You do NOT apply QoS directly on the logical tunnel.x interface itself in its interface configuration ( Network > Interfaces > Tunnel ). QoS for tunneled traffic is managed via the physical egress interface's QoS settings under the "Tunneled Traffic" tab.

QoS for GlobalProtect Remote Access VPNs

GlobalProtect traffic is essentially a type of IPsec (or SSL VPN, depending on configuration) tunnel. The principles are similar:

Consider QoS in both directions for GlobalProtect:

This means you may need QoS enabled on both your internet-facing interface (for traffic going out to GP clients) and an internal-facing interface (if that's the egress for traffic coming in from GP clients and going to internal servers).

DSCP Marking and Tunnels

If you are using DSCP, you can:

If DSCP is copied to the outer header, then QoS policies on intermediate Palo Alto Networks firewalls (or other vendor devices) could potentially key off that outer header DSCP for further QoS.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Key takeaway: QoS for tunnels is configured on the *physical egress interface's* "Tunneled Traffic" tab, not the logical tunnel interface. Classification is on inner packet, shaping on outer. Understand how to apply specific profiles per tunnel interface.

Palo Alto Networks QoS: Use Case - Single User Prioritization

This use case demonstrates how to prioritize network traffic for a specific critical user, such as a CEO or a key executive, ensuring their applications receive preferential treatment even during network congestion. This leverages User-ID and standard QoS components.

Scenario: The CEO (username: ceo_user , IP: 192.168.1.10 ) needs guaranteed performance for all their outbound internet traffic, especially for web-browsing and collaboration tools.

  1. Create a QoS Profile for CEO Traffic:
    • Navigate to Network > Network Profiles > QoS Profiles .
    • Click Add .
      • Name: QoS_Profile_CEO
      • Define Class 1 (or any preferred class):
        • Priority: High (or Real-time if specific apps warrant it)
        • Egress Guaranteed: e.g., 20 Mbps (ensure this is reasonable for the interface capacity)
        • Egress Max: e.g., 50 Mbps (or a higher percentage of interface capacity)
      • Configure other classes as needed for default traffic or leave them at system defaults if this profile is solely for the CEO's high priority.
      QoS Profile for CEO traffic
      Example QoS Profile "CEO_traffic" (similar to QoS_Profile_CEO) in PAN-OS, with Class 1 configured for high priority and guaranteed bandwidth.
    • Click OK .
  2. Create a QoS Policy Rule for the CEO:
    • Navigate to Policies > QoS .
    • Click Add .
      • Name: QoS_Policy_CEO_Traffic
      • Source Tab:
        • Source Zone: e.g., trust (where CEO's workstation resides)
        • Source Address: 192.168.1.10 (CEO's IP, if static and known. User-ID is better if IP can change).
        • Source User: your_domain\ceo_user (Leveraging User-ID is more robust).
        QoS Policy matching CEO username
        Example QoS Policy rule in PAN-OS, matching on Source User "ceo_user" (ensure correct domain format). Source Address can also be used as a fallback or primary identifier.
      • Destination Tab:
        • Destination Zone: e.g., untrust (for internet traffic)
        • Destination Address: any
      • Application/Service Tab:
        • Application: any (to prioritize all CEO's traffic), or specify critical apps like web-browsing , ssl , ms-office365 , collaboration app names.
        • Service: any or application-default .
      • Other Settings Tab:
        • Class: Select Class 1 (matching the class configured in QoS_Profile_CEO ).
        QoS class assignment for CEO policy
        Assigning the CEO's traffic to QoS Class 1 in the PAN-OS QoS Policy rule.
    • Click OK . Ensure this rule is placed appropriately (e.g., near the top if it's highly critical).
  3. Enable QoS on the Egress Interface and Apply Profile:
    • Navigate to Network > QoS .
    • Select the external-facing interface (e.g., ethernet1/2 if that's the internet gateway).
      • Set Egress Max for the interface (e.g., your total internet bandwidth, say 500 Mbps ).
      • Check Turn on QoS feature on this interface .
      • Clear Text Traffic Tab:
        • Set Default Profile: QoS_Profile_CEO . (If other users also use this interface, you might need a more general default profile, and the CEO's traffic gets shaped by Class 1 within that profile). For simplicity here, we assume this profile is broadly applicable or the CEO is the primary concern for this specific setup. A better approach for multiple user types is a single comprehensive profile with different classes for different users/apps.
        Enabling QoS on interface and assigning CEO profile
        PAN-OS QoS configuration for interface ethernet1/2, enabling QoS and assigning the "CEO_traffic" profile.
    • Click OK .
  4. Commit Changes.
  5. Verify:
    • Use Network > QoS > Statistics for the egress interface (e.g., ethernet1/2 ). Observe traffic in Class 1 when the CEO is active.
      Confirming CEO_traffic profile on interface
      Confirmation in PAN-OS that the "CEO_traffic" profile is enabled on ethernet1/2.
      QoS statistics showing CEO traffic in Class 1
      Example QoS statistics on PAN-OS, ideally showing CEO's traffic being processed under Class 1 with its defined bandwidth and priority.
    • Check Monitor > Session Browser for CEO's sessions to confirm they match the QoS_Policy_CEO_Traffic rule and are assigned to Class 1.

This setup ensures that the CEO's traffic, when matched, is placed into Class 1, which the QoS_Profile_CEO then gives high priority and guaranteed bandwidth on the ethernet1/2 interface.

Palo Alto Networks QoS: Use Case - Voice and Video Applications

Prioritizing Voice over IP (VoIP) and video conferencing traffic is one of the most common and critical use cases for QoS. These applications are highly sensitive to latency, jitter, and packet loss. Palo Alto Networks App-ID is instrumental in accurately identifying this traffic.

Scenario: Employees are experiencing poor quality on VoIP calls (e.g., using SIP and RTP) and video conferences (e.g., WebEx, Zoom). The goal is to ensure these applications get top priority and sufficient bandwidth.

  1. Create a QoS Profile for Real-time Applications:
    • Navigate to Network > Network Profiles > QoS Profiles .
    • Click Add .
      • Name: QoS_Profile_Realtime_Apps
      • Define Class 1 (or another dedicated class):
        • Priority: Real-time
        • Egress Guaranteed: e.g., 50 Mbps (or a percentage based on expected concurrent call/video volume and interface capacity. This needs careful calculation.)
        • Egress Max: e.g., 80 Mbps (allowing some burst but preventing runaway consumption)
        QoS Profile for VoIP/Video
        Example QoS Profile "ensure voip-video traffic" in PAN-OS, configuring Class 2 (could be Class 1) with 'real-time' priority for voice and video applications.
      • Configure other classes for other traffic types (e.g., Class 4 for default).
    • Click OK .
  2. Create a QoS Policy Rule for VoIP and Video Apps:
    • Navigate to Policies > QoS .
    • Click Add .
      • Name: QoS_Policy_VoIP_Video
      • Source Tab:
        • Source Zone: e.g., trust , wifi_users (any zone where users initiate calls/video)
        • Source Address: any (or specific subnets if applicable)
      • Destination Tab:
        • Destination Zone: e.g., untrust (for cloud services), or internal zones if calls are internal.
        • Destination Address: any
      • Application/Service Tab:
        • Application: Add specific App-IDs:
          • For VoIP: sip , rtp , h323 , skype , etc.
          • For Video: webex , zoom-meeting , ms-teams-audio-video , google-meet , etc.
          • Alternatively, use an Application Filter. Create one ( Objects > Application Filters ) with criteria like Subcategory = voip-video or collaboration , Technology = client-server or browser-based , Risk = low.
            Application Filter for VoIP/Video
            Example Application Filter in PAN-OS targeting applications in the 'voip-video' subcategory.
          QoS Policy using App Filter for VoIP/Video
          Example PAN-OS QoS Policy rule using an Application Filter to identify VoIP and Video traffic.
      • Other Settings Tab:
        • Class: Select Class 1 (matching the class configured in QoS_Profile_Realtime_Apps ).
        QoS class assignment for VoIP/Video
        Assigning the identified VoIP/Video traffic to QoS Class 2 (or your designated real-time class) in the PAN-OS QoS Policy rule.
    • Click OK . Place this rule high in the QoS policy list.
  3. Enable QoS on Egress Interfaces and Apply Profile:

    VoIP/Video traffic is bidirectional. You need to apply QoS on egress interfaces for both directions of the flow.

    • Outbound Traffic (e.g., internal user to cloud service):
      • Egress Interface: Your external-facing interface (e.g., ethernet1/2 - internet link).
      • Navigate to Network > QoS , select ethernet1/2 .
      • Set Egress Max (total internet bandwidth).
      • Check Turn on QoS feature on this interface .
      • Clear Text Traffic Tab: Set Default Profile to QoS_Profile_Realtime_Apps .
        Enabling QoS on external interface for VoIP/Video
        PAN-OS QoS configuration for the external interface (e.g., ethernet1/2), applying the VoIP/Video profile for outbound real-time traffic.
    • Inbound Traffic (e.g., cloud service to internal user, or peer-to-peer call return):
      • Egress Interface: Your internal-facing interface (e.g., ethernet1/1 - trust interface).
      • Navigate to Network > QoS , select ethernet1/1 .
      • Set Egress Max (e.g., 1000 Mbps for a 1Gbps internal link, or less if it's a bottleneck).
      • Check Turn on QoS feature on this interface .
      • Clear Text Traffic Tab: Set Default Profile to QoS_Profile_Realtime_Apps .
        Enabling QoS on internal interface for VoIP/Video
        PAN-OS QoS configuration for the internal interface (e.g., ethernet1/1), applying the VoIP/Video profile for inbound real-time traffic shaping.
    • Click OK for both interface configurations.
  4. Commit Changes.
  5. Verify:
    • Use Network > QoS > Statistics for both ethernet1/1 and ethernet1/2 . During calls/video conferences, you should see traffic in Class 1.
      QoS enabled on both interfaces
      Confirmation in PAN-OS that QoS is enabled on both relevant internal and external interfaces.
    • Use DSCP marking in Security Policies (e.g., mark VoIP RTP as EF) to signal downstream devices if needed.

This comprehensive approach ensures that latency-sensitive voice and video applications receive the highest priority and dedicated bandwidth in both directions of communication, significantly improving user experience.

Palo Alto Networks QoS: Best Practices & Troubleshooting Tips

Implementing QoS effectively requires careful planning, adherence to best practices, and knowing how to troubleshoot common issues within the Palo Alto Networks ecosystem.

Palo Alto Networks QoS Best Practices

Common Troubleshooting Scenarios & Tips

Symptom Potential Palo Alto Networks Cause(s) Troubleshooting Steps (PAN-OS)
Critical application (e.g., VoIP) has poor quality. - Incorrect QoS Policy (not matching app, wrong class assigned).
- Insufficient Egress Guaranteed bandwidth in QoS Profile.
- Incorrect Priority in QoS Profile (not Real-time/High).
- Interface Egress Max set too low or incorrectly.
- QoS not enabled on the correct egress interface(s).
- Congestion elsewhere in the network (outside firewall).
- Check Session Browser: Is VoIP session matching the correct QoS Rule and Class?
- Verify App-ID for VoIP apps (sip, rtp, specific vendor app) in QoS Policy.
- Examine QoS Profile: Is Class for VoIP 'Real-time' with adequate Guaranteed BW?
- Check Network > QoS : Is Interface Egress Max correct? Is QoS enabled? Is correct Profile applied?
- Check QoS Statistics for drops in the VoIP class.
Traffic not being classified into the expected QoS Class. - QoS Policy rule order: A more general rule above is matching first.
- Incorrect matching criteria (Source IP pre-NAT, Dest Zone post-NAT, App-ID, User-ID).
- Application is 'unknown-tcp/udp' (App-ID not identifying it).
- Review QoS Policy order. Move specific rule up.
- Verify all matching criteria in the QoS Policy rule against Traffic Logs / Session Browser details for the specific session.
- If 'unknown', consider custom app signature or allowing the generic App-ID and Service if trusted.
Bandwidth limits (Egress Max) don't seem to be enforced. - Interface Egress Max ( Network > QoS ) is 0 or not set.
- QoS Profile not correctly applied to the interface.
- Percentage-based Egress Max in Profile is too high relative to Interface Egress Max.
- QoS feature not turned on for the interface.
- Verify Interface Egress Max is accurately set on Network > QoS .
- Confirm the correct QoS Profile is selected for Clear Text/Tunneled traffic on the interface.
- Double-check Egress Max % in Profile.
- Ensure "Turn on QoS feature on this interface" is checked.
QoS statistics show no traffic or incorrect traffic in classes. - No traffic actually matching QoS Policies.
- QoS not enabled on the monitored interface.
- Incorrect interface selected in QoS Statistics view.
- Test with traffic known to match a policy.
- Ensure QoS is enabled on the interface ( Network > QoS ).
- Select the correct interface in Network > QoS > Statistics .
High packet drops in a specific QoS class. - Egress Max for that class is too low for the demand.
- Sustained congestion and Egress Guaranteed is also insufficient or shared.
- Overall interface saturation.
- In QoS Profile, increase Egress Max for the class. If possible, increase Egress Guaranteed.
- Consider if overall Interface Egress Max needs to be re-evaluated (link upgrade?).
- Identify sources of heavy traffic in that class using QoS Statistics (Top Apps).
PCNSE/PCNSA Exam Note (Palo Alto Networks): Many best practices revolve around accurate traffic identification (App-ID, User-ID), correct interface bandwidth settings, and logical policy/profile construction. For troubleshooting, knowing where to look (QoS Statistics, Session Browser, Traffic Logs) and what to check (QoS rule match, class assignment, bandwidth settings) is key.

PCNSE Knowledge Check: Palo Alto Networks QoS

1. On a Palo Alto Networks firewall, where is QoS shaping and prioritization primarily enforced for a given traffic flow?

2. Which three components are essential for configuring QoS on a Palo Alto Networks firewall?

3. When a QoS Policy rule is configured to match traffic based on the source IP address, and Source NAT (SNAT) is applied to that traffic, which IP address should be used in the QoS Policy's source address field?

4. What is the default QoS Class assigned to traffic that does not match any user-defined QoS Policy rule on a Palo Alto Networks firewall?

5. In a PAN-OS QoS Profile, what does the "Egress Guaranteed" bandwidth setting for a class signify?

6. Which Palo Alto Networks feature is primarily used in QoS Policies to identify specific applications like 'salesforce-base' or 'rtp' for classification, regardless of port or protocol?

7. When configuring QoS on a physical interface in PAN-OS ( Network > QoS ), the "Interface Egress Max" value is critical because:

8. To apply a specific QoS Profile to traffic traversing a particular IPsec site-to-site VPN tunnel (e.g., tunnel.5), where should this be configured?

9. Which priority level in a PAN-OS QoS Profile is typically recommended for latency-sensitive applications like VoIP media (RTP) traffic?

10. If you want a Palo Alto Networks firewall to set a DSCP value (e.g., EF 46) on outgoing VoIP traffic, where is this "QoS Marking" configured?

11. What is the primary purpose of Lockless QoS, introduced in PAN-OS 11.0.3+ on specific platforms?

12. When configuring QoS for a Virtual System (vsys) on a multi-vsys firewall, how are QoS Profiles typically applied to the physical egress interface shared by multiple vsys?

13. Which PAN-OS tool is best for real-time monitoring of bandwidth utilization per QoS class and top applications within each class on a specific QoS-enabled interface?

14. What happens if the sum of "Egress Guaranteed" bandwidth for all active classes in a QoS Profile exceeds the "Interface Egress Max" of the physical interface where it's applied?

15. Palo Alto Networks firewalls use Weighted Random Early Detection (WRED) primarily for what purpose within the QoS mechanism?

16. QoS and DSCP marking cannot be applied by a Palo Alto Networks firewall to which of the following types of traffic while it is actively being processed by that feature?

17. An administrator wants to ensure that if an employee's PC initiates a VoIP call (client-to-server marked with DSCP EF), the return traffic from the server-to-client is also marked with DSCP EF by the Palo Alto Networks firewall. Which Security Policy setting helps achieve this?

18. When is priority queuing (Real-time, High, Medium, Low) defined in a QoS Profile most impactful on traffic handling?

19. If a QoS Policy rule uses both App-ID (e.g., 'google-drive-web') and User-ID (e.g., 'marketing-group') as matching criteria, what is the logical relationship?

20. An administrator notices that their percentage-based bandwidth allocations in a QoS Profile are not working as expected (e.g., 10% guarantee is providing far less bandwidth). What is a primary setting to check on the QoS-enabled physical interface configuration ( Network > QoS )?