Panorama Port Used

0 views
Skip to first unread message

Darth Gupta

unread,
Aug 5, 2024, 6:50:39 AM8/5/24
to onunrida
thiswill not be logs only, it's the communication channel between firewall and panorama and will contain everything from keepalives, configuration, dynamic updates and logs. if you're browsing the panorama GUI and set the 'aspect' to firewall, this channel will also be used, so the total data will be a collection of all of the above

A firewall will only be able to log the total size of a session after it ends, which in the case of a panorama connection may be 'never' or after a long while so could give you a distorted view of the transferred data. you may want to disable logging for this connection so reporting is not influenced


1) As per PBF session, first few packets will go thorgh normal routing table and wont take PBF. untill the aplication identified. in this case as it is Panorama traffc it is never ending traffic. So this stayes at 1 ISP only. We have to manually kill Session an then next sessio will take 2 nd ISP.


2) another scenarion, lets assume my 1st ISP down, then panorama traffic will take 2nd ISP( non prefereed). But even if 1st ISP came up also, as panorama is never ending session, it will continue on 2 nd ISP untll we clear manually.


As a general recommendation, management interfaces for Panorama and Log Collectors should not have direct Internet access without a security device such as a Palo Alto Networks firewall inline. It is important to understand what traffic and protocols are expected to and from Panorama and Log Collectors to ensure proper firewalls rules can be applied in order to provide protection bi-directionally and block unexpected traffic. This post outlines what are expected protocols and ports for Panorama and Log Collectors.






It is generally suggested to allow Panorama or Log Collector communication ports and applications to or from specific IP Address(es) if known and deny all else. If certain ports or protocols are not leveraged, then it is not necessary to allow such traffic. Below is a table of all inbound and outbound communication to and from Panorama or Log Collectors.




Please note, ports for user-defined services like external authentication and syslog servers are user-controlled. The default ports for these services are listed in the table below. Please review your server profile configurations to determine if non-standard ports are used in your environment.


Port used to send logs to a syslog server if you Configure Syslog Monitoring, and the ports that the PAN-OS integrated User-ID agent or Windows-based User-ID agent listens on for authentication syslog messages.


Skype for Business Server requires that specific ports on the external and internal firewalls are open. Additionally, if Internet Protocol security (IPsec) is deployed in your organization, IPsec must be disabled over the range of ports used for the delivery of audio, video, and panorama video.


While this might seem a bit daunting, the heavy lifting for planning this can be done using the Skype for Business Server 2015 Planning Tool. Once you've gone through the wizard's questions about what features you plan to use, for each site you define you can view the Firewall Report within the Edge Admin Report, and use the information listed there to create your firewall rules. You can also make adjustments to many of the names and IP addresses used, for details see Review the Firewall Report. Keep in mind you can export the Edge Admin Report to an Excel spreadsheet, and the Firewall Report will be one of the worksheets in the file.


When Skype for Business Server starts, it opens the required ports in the Windows Firewall. Windows Firewall should already be running in most normal applications, but if it is not being used Skype for Business Server will function without it.


Some remote call control scenarios require a TCP connection between the Front End Server or Director and the PBX. Although Skype for Business Server no longer uses TCP port 5060, during remote call control deployment you create a trusted server configuration, which associates the RCC Line Server FQDN with the TCP port that the Front End Server or Director will use to connect to the PBX system. For details, see the CsTrustedApplicationComputer cmdlet in the Skype for Business Server Management Shell documentation.


Your Front End pools and Director pools that use DNS load balancing also must have a hardware load balancer deployed. The following table shows the ports that need to be open on these hardware load balancers.


The ports that are used for external user access are required for any scenario in which the client must traverse the organization's firewall (for example, any external communications or meetings hosted by other organizations).


For enterprise networks where Internet Protocol security (IPsec) (see IETF RFC 4301-4309) has been deployed, IPsec must be disabled over the range of ports used for the delivery of audio, video, and panoramic video. The recommendation is motivated by the need to avoid any delay in the allocation of media ports due to IPsec negotiation.


Great start to your review! We just sailed on Panorama last October and did the 8-day, same as you. Our itinerary had to be rearranged due to Tropical Storm, then Hurricane Lidia. Instead of our first port being Cabo, we had a sea day. La Paz and Mazatlan were as scheduled. We missed Puerto Vallarta but went to Cabo instead for one full day and were in Cabo again the next day for a half day. We loved Panorama, nice layout. The largest ships we've been on prior were the Conquest Class so wasn't sure how we'd feel about being on a ship as large as Panorama but we really thought the layout was designed well and it never felt crowded/or were sailing with almost double the amount of passengers we're used to. I'm looking forward to following along for the rest and thank you for taking the time to do a review. I've done reviews in the past but failed to do one for Panorama. We just took in the cruise this time.


That's a great idea turning them into ornaments. I agree that the port needs to expand, especially now that they will have 3 large ships sailing out of there. They need to consider putting in another parking structure.


Hi! This was the largest ship we have sailed on. I've always said that my favorite are the Spirit class ships. My only gripe about this ship was the aft elevator bank. We waited upwards of 15 minutes for an elevator only for it to arrive packed, even though we pushed our selected floor 4 times to accommodate for our family.


A port scanner is an application which is made to probe a host or server to identify open ports. Bad actors can use port scanners to exploit vulnerabilities by finding network services running on a host. They can also be used by security analysts to confirm network security policies.


Running a port scan on a network or server reveals which ports are open and listening (receiving information) as well as revealing the presence of security devices, such as firewalls, that are present between the sender and the target. This technique is known as fingerprinting.


For bad actors, locating open ports is the mission. This creates a challenge for security personnel faced with the task of blocking open ports with firewalls (while avoiding cutting off access for authorized users).


Although the port is closed, it can still be accessed, and therefore useful in confirming that a host is present on an IP address. Security personnel should continuously monitor closed ports and consider barricading them with firewalls (making them filtered ports).


Port scanning is one of the most popular tactics bad actors use when in search of a vulnerable server, according to the SANS Institute. When targeting networks, port scanning is typically the first step. The port scan delivers useful information about the network environment, such as:


This type of information is highly valuable to malicious actors who are looking for vulnerabilities in software. Being able to identify that an organization is running a specific DNS or web server makes finding those vulnerabilities much easier. There are several TCP protocol techniques that allow bad actors to use decoy traffic for port scans, hiding their network address and location entirely.


Splashtop is used to connect to the SYSCON Customer Connect Windows PC to provide our development team and support team with tools to manage the APU and DCMs. Splashtop requirements follow the Ninja requirements.




If your firewall allows the use of wildcards, the following URLs may be whitelisted to cover the NinjaRMMAgent & patcher, Cloud RDP rendezvous points, File Explorer rendezvous points, and websocket rendezvous points. However, if your firewall does not allow the use of wildcards, the full lists of URLs are provided below.

3a8082e126
Reply all
Reply to author
Forward
0 new messages