Active/Active High Availability (HA) is not supported in Layer 2 mode on Palo Alto Networks firewalls. This mode is only supported in Layer 3 and Virtual Wire (vWire) deployments.
In Active/Active HA, both firewalls process traffic simultaneously. This requires synchronization of session and routing tables, which isn't feasible in Layer 2 mode.
If Layer 2 is required, Active/Passive HA is the supported alternative, where one firewall is active and the other is on standby.
Palo Alto Networks firewalls use a 6-tuple to identify and match sessions. This ensures consistent policy enforcement and stateful inspection.
The 6-tuple includes:
Session matching enables the firewall to apply security policies, NAT, QoS, and logging accurately. Changes in any of the six fields result in a new session.
The basic WildFire service included with Palo Alto Networks firewalls allows forwarding of the following file types for malware analysis:
These files are submitted to the WildFire public cloud for analysis. To enable forwarding of additional file types (such as PDFs, Microsoft Office documents, Java files, and scripts), an Advanced WildFire subscription is required.
â Rule Usage Hit Counter:
đ Highlight Unused Rules:
đ References:
GlobalProtect Gateways support the following split tunnel methods:
đ§° Prerequisites:
đ USB Flash Drive Requirements:
đ Required Files on USB:
init-cfg.txt
: Mandatory file containing bootstrap parameters.
bootstrap.xml
: Optional full configuration file exported from an existing firewall.
/license
directory.
âī¸ Preparation Steps:
init-cfg.txt
with necessary parameters (e.g., hostname, IP addresses).
bootstrap.xml
.
/config
and
/license
directories.
.tar.gz
file.
request system bootstrap-usb prepare from <bundle_name>.tar.gz
đ Bootstrapping Process:
đ References:
When analyzing traffic logs on a Palo Alto Networks firewall, the "Session End Reason" provides crucial context for why a session terminated. Understanding the difference between `incomplete`, `unknown-tcp`, and `unknown-udp` is key for troubleshooting connectivity issues.
âšī¸ Definition: This reason specifically applies to TCP sessions and indicates that the TCP three-way handshake (SYN, SYN/ACK, ACK) did not successfully complete . The firewall saw the beginning of a connection attempt, but the full handshake sequence was never observed.
đ¤ Common Causes:
âšī¸ Definition: This reason applies to TCP sessions where the three-way handshake completed successfully , but the session terminated afterwards in a way that wasn't a graceful TCP close (FIN exchange). It often means the firewall observed a TCP Reset (RST) packet.
đ¤ Common Causes:
âšī¸ Definition: This reason applies to UDP (and ICMP) sessions. Since UDP is connectionless (no handshake or formal close procedure like TCP's FIN), this essentially means the firewall created a session for the UDP flow, but then stopped seeing packets for that flow, causing the session to expire based on its inactivity timer .
đ¤ Common Causes:
đ Key Takeaway: `incomplete` relates to handshake failure (TCP only). `unknown-tcp` means the handshake succeeded, but the close was abrupt (often RST). `unknown-udp` means the UDP session timed out due to inactivity.
đ References: