Network Security
Addresses Fields
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Addresses Fields
Where Can I Use This? | What Do I Need? |
---|---|
|
When you create an Address object, you can
configure any or all of the following fields:
Address Object Settings | Description |
---|---|
Name | A name (up to 63 characters) that describes
the addresses to include as part of this object. This name appears
in the address list when defining security rules. The name
is case-sensitive, must be unique, and can contain only letters,
numbers, spaces, hyphens, and underscores. |
Shared (Panorama only) | Specifies whether this address object will
be shared with:
|
Disable override (Panorama only) | Prevents administrators from overriding
the settings of this address object in device groups that inherit
this object. By default, this selection is disabled, which means
administrators can override the settings for any device group that
inherits the object. |
Description | Description for the object (up to 1,023
characters). |
Type | Type of address object and the entry:
|
Resolve | After selecting the address type and entering
an IP address or FQDN, click Resolve to see
the associated FQDN or IP addresses, respectively (based on the
DNS configuration). You can change an address object from
an FQDN to an IP Netmask or vice versa. To change from an FQDN to
an IP Netmask, click Resolve to see the IP
addresses that the FQDN resolves to, then select one and Use
this address. The address object Type dynamically changes
to IP Netmask and the IP address you selected appears in the text
field. Alternatively, to change an address object from an IP Netmask to an FQDN, click
Resolve to see the DNS name that the IP
Netmask resolves to, then select the FQDN and Use this
FQDN. The Type changes to FQDN, and the FQDN appears
in the text field. |
Tags | The tags that you want to apply to this
address object. You can define a tag here or use the Tags tab
to create new tags. |