This site requires JavaScript to be enabled
An updated version of this article is available

Getting Started with Palo Alto Networks

182 views

7.0 - Last modified on 2026-02-10 Revised by Annie Zhang

6.0 - Last modified on 2026-01-07 Revised by Annie Zhang

5.0 - Last modified on 2025-03-07 Revised by John Ives

4.0 - Last modified on 2022-09-02 Revised by itsm kb_api

3.0 - Last modified on 2022-09-02 Revised by itsm kb_api

2.0 - Last modified on 2020-02-19 Revised by John Ives

1.0 - Created on 2019-04-10 Authored by John Ives

Getting Started with Palo Alto Networks

UC Berkeley Information Security and Policy (ISP)

 

Recommended Training Modules for VSYS Administrators

The following training modules are recommended for VSYS (Virtual System/Firewall) administrators. To save time, it is recommended you focus on the modules that in bold as VSYS administrators will not need to manage the other features or will not have access to them.

To access this course, login to the PAN Support Portal at https://support.paloaltonetworks.com. Navigate to the Learning Center > Browse Online Learning and make sure you are enrolled in the Firewall 8.0 Essentials: Configuration and Management (EDU-110) course, then click Open Curriculum.

Firewall 8.0 Essentials: Configuration and Management (EDU-110):

Key Highlights of the Palo Alto Networks Next Generation Firewall

App-ID

One of the main differences between legacy port-based firewalls and the Palo Alto Networks (PAN) Next Generation Firewall (NGFW), is that the NGFW can classify and identify applications traversing the network and apply firewall policies to that traffic. This PAN feature is known as App-ID, and it can identify applications irrespective or port or protocol.

This means that you can create firewall policies that match specific applications and take actions to either allow or deny that traffic. A traditional firewall rule might look like this:

ActionAllow
Source 192.168.1.1
Destination 192.168.2.1
Port 80
ProtocolTCP

This would allow any TCP network traffic from 192.168.1.1 to reach 192.168.2.1 on port 80.

In the PAN NGFW, you could specify a rule that looks more like this:

ActionAllow
Source192.168.1.1
Destination192.168.2.1
Port80
ProtocolTCP
App-IDsharepoint-base

By specifying the App-ID “sharepoint-base”, the NGFW will only permit traffic that it decodes and identifies as matching its “sharepoint-base” application signature. This means only traffic for Microsoft Sharepoint’s “base” functions would be permitted. However, these other Sharepoint functions for which there are separate App-ID signatures, and all other traffic, would be blocked by the firewall:

App-ID gives you fine grained control over what applications are permitted to traverse your firewall. In a legacy port-based firewall, any TCP traffic destined for 192.168.2.1 port 80/TCP would be allowed through, including things like application or web server exploits. By utilizing App-ID, this type of traffic would not match the allowed application and would be blocked by the PAN NGFW.

Learn more about App-ID here:

Zones

In Palo Alto Networks NGFWs, security zones are a way to group physical and virtual interfaces on the firewall in order to segment and control traffic on the network. Initially, your VSYS will be configured to have one security zone per network subnet. In the future, it may be possible to merge subnets into a single zone to simplify security policy where it makes sense.

Security policy rules are applied on traffic between zones. Key concepts:

VSYS administrators will not be able to configure their own zones and interfaces, this must be performed by the Network Operations and Services (NOS) team.

Learn more about security zones here:

 

Security Profiles

Security profiles allow traffic and content on the network to be scanned for threats such as malware, spyware, viruses, and exploits.

Security profiles are not the same as security policy (or “firewall rules”), and must be attached to existing security policy in order to be applied. When a rule/policy matches traffic and a security profile is attached to that policy, the security profile is applied for further content inspection and scanning such as:

A security profile group is a set of security profiles that can be treated as a unit and then easily added to security policies. When you create new firewall policies, there will be a provided default security profile group that was configured by Information Security & Policy and attached to the new policy. The default security profile group will be applied to any new rule you create.

You’re encouraged to utilize the provided default security profile group, and only remove or customize it for troubleshooting purposes.

Firewall rules migrated from the Cisco ASAs will also have security profile attached to them. For more information, see the bSecure ISP Customer Handout which contains details on the default security profiles provisioned by ISP for bSecure customers.

Learn more about security profiles here:

Additional Resources

It is recommended that you subscribe to the PAN YouTube channel. It contains many useful tutorials and instructional videos:

Tips & Tricks: Filtering the Security Policy

Questions & Comments

For general questions about security within the Palo Alto Networks NGFW deployment, email security@berkeley.edu.

To request a new firewall service in the campus Data Center, or modification of an existing service, place a request via the Telecommunications Catalog at http://tc.berkeley.edu/. Support for existing firewall services can be obtained via Campus Shared Services at https://berkeley.service-now.com/ess/.