Palo Alto Networks firewalls support granular Role-Based Access Control (RBAC) through Admin Role Profiles that define permissions per function and area of the firewall (e.g., policy, objects, network).
Device > Admin Roles
Device > Administrators
This ensures users only have access to what their role requires, enhancing security and management efficiency.
For more details, refer to the official documentation on Configuring an Admin Role Profile .
You can authenticate administrators using:
Create an
Authentication Profile
under
Device > Authentication Profile
and attach it to the administrator account.
For more information, see the guide on Administrative Authentication .
Authentication Sequences define the order of multiple authentication sources. For example, try LDAP first, fallback to local.
Device > Authentication Sequence
Refer to the documentation on Configuring an Authentication Profile and Sequence for detailed steps.
To configure admin accounts:
Device > Administrators
Detailed instructions are available in the guide on Configuring Administrative Accounts and Authentication .
Use Command Logging and Configuration Audit to track admin activities.
Monitor > Logs > System
– View login/logout
Monitor > Logs > Configuration
– Track who changed what
Device > Setup > Management > Logging and Reporting Settings
– Customize logging behavior
For more information, refer to the documentation on Viewing Logs and Audit Trails .
To secure device access:
Navigate to
Network > Network Profiles > Interface Mgmt
to create and apply profiles.
For detailed steps, see the guide on Configuring Administrative Access to the Firewall .
To enhance security, it's crucial to isolate the management network:
For detailed guidance, refer to the Deploy Administrative Access Best Practices .
Enhance administrator authentication by implementing MFA:
For more information, see the guide on Administrative Authentication .
Maintain the security and stability of your firewalls by:
Refer to the Manage Software and Content Updates guide for detailed instructions.
Implement monitoring and auditing to track administrative actions:
For comprehensive monitoring strategies, consult the View Logs and Audit Trails documentation.