

You can read about Service routes from PAN directly here.īasically … “The firewall uses the management (MGT) interface by default to access external services, such as DNS servers, external authentication servers, Palo Alto Networks services such as software, URL updates, licenses and AutoFocus. University of California at Berkeley, June 1986.] Technical Report, UCB/Computer Science Dept., 86/302, [Welch, B., “The Sprite Remote Procedure Call System”, Specification, Draft Version”, Contract no. [M/A-COM Government Systems, “Dissimilar Gateway Protocol [Forsdick, H., “CFTP”, Network Message, Bolt Beranek and [Shuttleworth, B., “A Documentary of MFENet, a NationalĬomputer Network”, UCRL-52317, Lawrence Livermore Labs, Xerox Corporation, Stamford, CT., October 1980.]] Layer and Physical Layer Specification”, X3T51/80-50,

Specifications”, Digital, Intel and Xerox, November 1982.Īnd: XEROX, “The Ethernet, A Local Area Network: Data Link And: “The Ethernet, A LocalĪrea Network: Data Link Layer and Physical Layer Also as: “TheĮthernet – A Local Area Network”, Version 1.0, DigitalĮquipment Corporation, Intel Corporation, XeroxĬorporation, September 1980. Physical Layer Specification”, AA-K759B-TK, DigitalĮquipment Corporation, Maynard, MA. [“The Ethernet, A Local Area Network: Data Link Layer and

USC/Information Sciences Institute, May 1979.] [Haverty, J., “XNET Formats for Internet Protocol Version 4”, Internetwork Architecture”, XEROX Palo Alto Research Center,ĬSL-79-10, July 1979 also in IEEE Transactions onĬommunication, Volume COM-28, Number 4, April 1980.]] When it comes to the protocol #, you have several options to choose from like:īelow is a full list of options you can use. Many Thanks to Kerry for this work on this. For prosperity of the internet I have quotes his list as it was on his site. Where he got this info from I’m not certain, he did not reference any PAN KB’s or anything. So googling I found a nice simplified post by Kerry Cordero on his site here. However PAN uses numbers and the provided direct KB from them does not define them all (1-255). Generally you’ll use UDP or TCP, and ICMP if needing to validate ping rules. I have to often do validation on rules set created on a Palo Alto firewall, now if you’ve done this you’ll know there’s a specific requirement to define which protocol to test against.
