I got this document from a friend of mine, but Im sure its on Palo Alto's site. Here is a list of useful CLI commands. I thought it was worth posting here for reference if anyone needs it.
General system health
show system info –provides the system’s management IP, serial number and code version
show system statistics – shows the real time throughput on the device
show system software status – shows whether various system processes are running
show jobs processed – used to see when commits, downloads, upgrades, etc. are completed
show system disk--space-- show percent usage of disk partitions
show system logdb--quota – shows the maximum log file sizes
debug dataplane internal vif link – show management interface (eth0) counters
To monitor CPUs
show system resources -- shows processes running in the management plane similar to “top” command
show running resource--monitor – used to see the resource utilization in the data plane, such as dataplane CPU utilization
less mp--log mp--monitor.log – Every 15 minutes the system runs a script to monitor management plane resource usage, output is stored in this file.
less dp--log dp--monitor.log -- Every 15 minutes the system runs a script to monitor dataplane resource usage, output is stored in this file.
General dropped packet troubleshooting
ping source <IP_addr_src_int> host <IP_addr_host> -- allows to ping from the specified FW source interface
ping host <IP> -- ping from the MGT interface
show session all | match – used to show specific sessions in the session table. You can
enter any text after the word match. A good example would be a source or destination IP or an application
show session all | filter destination <IP> dest--port <port>-- shows all sessions going to a particular dest IP and port
show session id – shows the specifics behind a particular session by entering the ID number after the word "id”
show counter interface – shows interface counters
show counter global | match drop – used to troubleshoot dropped packets
show counter global delta yes | match [ drop | error | frag ] – show counter changes
since last time ran this command, filter on particular keyword
show running nat--policy-- shows current NAT policy table
show running ippool-- use to see if NAT pool leak
test nat--policy--match – simulate traffic going through the device, what NAT policy will it match?
show routing route – displays the routing table
test routing fib--lookup virtual--router <VR_name> ip <IP_addr_trying_reach> -- finds which route in the routing table will be used to reach the IP address that you are testing
show running security--policy – shows the current policy set
test security--policy--match from trust to untrust destination <IP>-- simulate a packet going through the system, which policy will it match?
show user pan--agent statistics – used to see if the agent is connected and operational. Status should be connected OK and you should see numbers under users, groups and IPs.
show pan--agent user--IDs -- used to see if the FW has pulled groups from the PANAgent
show user ip--user--mapping – used to see IP to username mappings on the FW
clear user--cache all – clears the user--ID cache
debug device--server reset pan--agent <name> -- reset the firewall’s connection to the specified agent
test url <url or IP> – used to test the categorization of a URL on the FW
tail follow yes mp--log pan_bc_download.log – shows the BrightCloud database update logs
request url--filtering download status – shows the status of the database download (essentially the very last line from the pan_bc_download.log file)
debug dataplane show url--cache statistics– shows statistics on the URL cache
show counter global | match url – shows statistics on URL processing
clear url--cache – used to clear the URL cache-- cache contains 100k of the most popular URLs on this network
show log url direction equal backward-- view the URL log, most recent entries first
To test connectivity to the BrightCloud servers:
ping host service.brightcloud.com
ping host database.brightcloud.com
Log viewing / deleting1
show log [ system | traffic | threat ] direction equal backward – will take you to the end of the specified log
show log [ system | traffic | threat ] direction equal forward – will take you to beginning of the specified log
clear log [ traffic | threat | acc ] – clear everything in the specified log
Software, Content, and Licenses
To upgrade the software on the FW:
tftp import software from <IP_addr_tftp_server> file <filename>
request system software install file <filename>
request restart system
request system software [info | check | download | install ] –manipulate PANOS software from the CLI
To upgrade the content on the FW:
tftp import content from <IP_addr_tftp_server> file <filename>
request content upgrade install file <filename>
request content downgrade install previous –downgrade to the previous content version
request system private--data--reset-- to clear config and logs/reports
debug swm [ status | list | revert ] – will show possible code to install, or code that was installed. “revert” is used to revert to last running OS version without having to do a
factory reset (such as from 4.0 to back to 3.1)
request license info – shows the license installed on the device
delete license key ? – use to delete a license file if having issues and want to retrieve new licenses, use question mark to list file names, only delete the files you see fit
Config diff/force/cli format
show config diff-- compares two versions of the config
commit force-- perform a commit, even if there are errors
set cli config--output--format set-- use to view the config in “set” format from within the configure prompt (#)
To view detailed debug information for IPSec tunneling:
1. debug ike global on debug
2. less mp--log ikemgr.log
set deviceconfig setting session tcp--reject--non--syn no – used to ignore SYN when creating sessions; confirm command took effect with show session info
set deviceconfig setting session offload no –-- makes all packets go through CPU, otherwise all fastpath packets just go through EZ chip (turns off session offload to fastpath); confirm command took effect with show session info
debug dataplane pool statistics -- this will show the different dataplane buffers and can e used to see if the system is nearing capacity in certain functionality.
This is the retired Shane Killen personal blog, an IT technical blog about configs and topics related to the Network and Security Engineer working with Cisco, Brocade, Check Point, and Palo Alto and Sonicwall. I hope this blog serves you well. -- May The Lord bless you and keep you. May He shine His face upon you, and bring you peace.
Tuesday, February 25, 2014
Palo Alto: Useful CLI Commands
Subscribe to: Post Comments (Atom)
thanks, this is very useful to us newbs to palo.ReplyDelete
Shane, this is great. Thanks for posting. Can you put another post on "Getting Started with your PAN-PA?"ReplyDelete
Yeah, give me a few weeks. Its been very busy here. Ill get something together, as that will be a good topic for sure.ReplyDelete
Hi - does anyone know how to check the rule usage through cli? I want to see an increment in counters similar to what Juniper have. Is that possible?ReplyDelete
Most populace don't make use of the command line on a usual foundation, so it can be a bit thorny to come across the foremost time. The Windows in service system doesn't flush have a appropriate command line built in -- to accomplish these commands, you will have to install one. Foe this Mac OS X, Linux and window re usefulReplyDelete
I installed the Palo Alto 6.0 on VMWARE workstation for learning purpose and all is working fine but what i see that when i go to Monitor->Logs->Traffic option no logs found so may i know that to see the traffic logs do we need to configure because i have already enabled log settings in policies but not able to see any traffic logs.
Does firewall locally store the logs or require to configure the log server?
So could you please help me on this.Thanks!
The Palo does store locally. Logs should happen automatically. If you want to troubleshoot further, email me at Shane.Killen@Gmail.com.Delete
I face the same problem on VM machine .Did we find something on why the logs dont appear on monitor ?Delete
Is there a solution to get Traffic Logs working on a VM ?Delete
How to add route on palo alto firewall using CLIReplyDelete
Hi Shane Killen, thanks to publish this list of useful commands. This blog is helping me to learn a little more about Palo Alto Firewall.ReplyDelete
How can we run a debug command to monitor the dataplane pool statistics using scripts or APIReplyDelete
You are over my head on that one. I'll have to research.Delete
show system browser shows the port statistics. Click Shift L and hit enter on <port_statsReplyDelete
They press Y and U.
The question I have is what does the L and /s determine?
Good stuff! I am just cracking into getting experience with Palo Altos. This is very helpful. Thank you!ReplyDelete
Hello all - I'm working on a project that requires a controlled shutdown of a Palo Alto firewall following a UPS alert event. Can the request shutdown and y inputs be scripted in any way, please?ReplyDelete
Can you please provide command to view ACL's in PaloAlto Firewall PA-5220
can please share on how we can be able to enter the switch mode operation interfaceReplyDelete