Device > Setup > Interfaces
Table of Contents
Expand all | Collapse all
-
- Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > Interfaces > PoE
- Network > Interfaces > Cellular
- Network > Interfaces > Fail Open
- Network > VLANs
- Network > Virtual Wires
-
- Network > Routing > Logical Routers > General
- Network > Routing > Logical Routers > Static
- Network > Routing > Logical Routers > OSPF
- Network > Routing > Logical Routers > OSPFv3
- Network > Routing > Logical Routers > RIPv2
- Network > Routing > Logical Routers > BGP
- Network > Routing > Logical Routers > Multicast
-
- Network > Routing > Routing Profiles > BGP
- Network > Routing > Routing Profiles > BFD
- Network > Routing > Routing Profiles > OSPF
- Network > Routing > Routing Profiles > OSPFv3
- Network > Routing > Routing Profiles > RIPv2
- Network > Routing > Routing Profiles > Filters
- Network > Routing > Routing Profiles > Multicast
- Network > Proxy
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
- Network > Network Profiles > MACsec Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > ACE
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > IoT Security > DHCP Server Log Ingestion
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > SCP
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
- Device > Policy Recommendation > IoT or SaaS > Import Policy Rule
-
- Device > User Identification > Connection Security
- Device > User Identification > Terminal Server Agents
- Device > User Identification > Group Mapping Settings
- Device > User Identification> Trusted Source Address
- Device > User Identification > Authentication Portal Settings
- Device > User Identification > Cloud Identity Engine
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Firewall Clusters
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
Device > Setup > Interfaces
Use this page to configure connection settings, allowed
services, and administrative access for the management (MGT) interface
on all firewall models and for the auxiliary interfaces (AUX-1 and
AUX-2) on PA-5200 Series firewalls.
Palo Alto Networks recommends that you always specify the IP
address and netmask (for IPv4) or prefix length (for IPv6) and the
default gateway for every interface. If you omit any of these settings
for the MGT interface (such as the default gateway), you can access
the firewall only through the console port for future configuration
changes.
To configure the MGT interface on the M-500 appliance or
the Panorama virtual appliance, see Panorama
> Setup > Interfaces.
You can use a loopback interface
as an alternative to the MGT interface for firewall management (Network
> Interfaces > Loopback).
Item | Description |
---|---|
IPv4 or IPv6
(MGT interface only)
|
Select IPv4 or
IPv6.
|
Type (MGT interface only) | For IPv4, for Type, select one:
For
IPv6, Enable IPv6.
For
Type, select one:
|
Show DHCP Client Runtime Info
|
If you select DHCP Client, optionally click
Show DHCP Client Runtime Info to view the
dynamic IP interface status:
Optionally, you can Renew the DHCP lease for
the IP address assigned to the MGT interface. Otherwise,
Close the window.
|
Aux 1 / Aux 2 (PA-5200 Series
firewalls only) | Select any of the following options to enable an auxiliary interface. These interfaces provide 10
Gbps (SFP+) throughput for:
Enable HTTPS instead of HTTP for the web interface
and enable SSH instead of Telnet for the CLI.
|
IP Address (IPv4 Static) | If you chose IPv4 Static, assign an IPv4 address to the interface. Alternatively, you can assign
the IP address of a loopback interface for firewall management (see
Network > Interfaces > Loopback). By default, the IP
address you enter is the source address for log forwarding. |
Netmask (IPv4 Static) | If you assigned an IPv4 address to the interface,
you must also enter a network mask (for example, 255.255.255.0). |
Default Gateway (IPv4) | If you assigned an IPv4 address to the interface,
you must also assign an IPv4 address to the default gateway (the
gateway must be on the same subnet as the interface). |
IPv6 Address/Prefix Length (Static) | If you chose IPv6 Static, assign an IPv6 address to the interface. To indicate the netmask,
include the prefix length (for example, 2001:db8:300::1/64). |
IPv6 Address Type (Dynamic)
|
If you chose IPv6 Type to be Dynamic, the MGT
interface is an IPv6 SLAAC/DHCPv6 client. Select any combination of
DHCPv6 client options:
|
Default Gateway Type (IPv6)
|
If you assigned an IPv6 address to the interface, you must also
assign or receive a Default IPv6 Gateway
Address. Select the type of address assignment for
the default gateway:
If you choose Dynamic, you can Show Gateway Address
Info.
|
Speed | Configure a data rate and duplex option for the interface. The choices include 10 Mbps, 100 Mbps,
and 1 Gbps at full or half duplex. Use the default autonegotiate
setting to have the firewall determine the interface speed. This setting must match the port settings
on the neighboring network equipment. To ensure matching settings,
select auto-negotiate if the neighboring equipment supports that option. |
MTU | Enter the maximum transmission unit (MTU) in bytes for packets sent on this interface (range is
576 to 1,500; default is 1,500). |
Administrative Management Services |
|
Network Services | Select the services you want to enable on
the interface:
|
Permitted IP Addresses | Enter the IP addresses from which administrators
can access the firewall through the interface. An empty list (default)
specifies that access is available from any IP address. Don't leave the list blank; specify only the IP addresses of firewall administrators to prevent
unauthorized access. |