Cheat Sheet - Useful CLI Commands 4.0
Cheat Sheet - Useful CLI Commands 4.0
This
document
provides
a
list
of
some
useful
CLI
commands
to
verify
and
troubleshoot
the
operation
of
a
Palo
Alto
Networks
firewall.
General
system
health
show
system
info
provides
the
systems
management
IP,
serial
number
and
code
version
show
system
statistics
shows
the
real
time
throughput
on
the
device
show
system
software
status
shows
whether
various
system
processes
are
running
show
jobs
processed
used
to
see
when
commits,
downloads,
upgrades,
etc.
are
completed
show
system
disk-space-
show
percent
usage
of
disk
partitions
show
system
logdb-quota
shows
the
maximum
log
file
sizes
debug
dataplane
internal
vif
link
show
management
interface
(eth0)
counters
To
monitor
CPUs
show
system
resources
-
shows
processes
running
in
the
management
plane
similar
to
top
command
show
running
resource-monitor
used
to
see
the
resource
utilization
in
the
data
plane,
such
as
dataplane
CPU
utilization
less
mp-log
mp-monitor.log
Every
15
minutes
the
system
runs
a
script
to
monitor
management
plane
resource
usage,
output
is
stored
in
this
file.
less
dp-log
dp-monitor.log
-
Every
15
minutes
the
system
runs
a
script
to
monitor
dataplane
resource
usage,
output
is
stored
in
this
file.
General
dropped
packet
troubleshooting
ping
source
<IP_addr_src_int>
host
<IP_addr_host>
-
allows
to
ping
from
the
specified
FW
source
interface
ping
host
<IP>
-
ping
from
the
MGT
interface
show
session
all
|
match
used
to
show
specific
sessions
in
the
session
table.
You
can
enter
any
text
after
the
word
match.
A
good
example
would
be
a
source
or
destination
IP
or
an
application
show
session
all
|
filter
destination
<IP>
dest-port
<port>-
shows
all
sessions
going
to
a
particular
dest
IP
and
port
show
session
id
shows
the
specifics
behind
a
particular
session
by
entering
the
ID
number
after
the
word
id
show
counter
interface
shows
interface
counters
show
counter
global
|
match
drop
used
to
troubleshoot
dropped
packets
show
counter
global
delta
yes
|
match
[
drop
|
error
|
frag
]
show
counter
changes
since
last
time
ran
this
command,
filter
on
particular
keyword
NAT
show
running
nat-policy-
shows
current
NAT
policy
table
show
running
ippool-
use
to
see
if
NAT
pool
leak
test
nat-policy-match
simulate
traffic
going
through
the
device,
what
NAT
policy
will
it
match?
1
Routing
show
routing
route
displays
the
routing
table
test
routing
fib-lookup
virtual-router
<VR_name>
ip
<IP_addr_trying_reach>
-
finds
which
route
in
the
routing
table
will
be
used
to
reach
the
IP
address
that
you
are
testing
Policies
show
running
security-policy
shows
the
current
policy
set
test
security-policy-match
from
trust
to
untrust
destination
<IP>-
simulate
a
packet
going
through
the
system,
which
policy
will
it
match?
PAN
Agent
show
user
pan-agent
statistics
used
to
see
if
the
agent
is
connected
and
operational.
Status
should
be
connected
OK
and
you
should
see
numbers
under
users,
groups
and
IPs.
show
pan-agent
user-IDs
-
used
to
see
if
the
FW
has
pulled
groups
from
the
PANAgent
show
user
ip-user-mapping
used
to
see
IP
to
username
mappings
on
the
FW
clear
user-cache
all
clears
the
user-ID
cache
debug
device-server
reset
pan-agent
<name>
-
reset
the
firewalls
connection
to
the
specified
agent
URL
test
url
<url
or
IP>
used
to
test
the
categorization
of
a
URL
on
the
FW
tail
follow
yes
mp-log
pan_bc_download.log
shows
the
BrightCloud
database
update
logs
request
url-filtering
download
status
shows
the
status
of
the
database
download
(essentially
the
very
last
line
from
the
pan_bc_download.log
file)
debug
dataplane
show
url-cache
statistics
shows
statistics
on
the
URL
cache
show
counter
global
|
match
url
shows
statistics
on
URL
processing
clear
url-cache
used
to
clear
the
URL
cache-
cache
contains
100k
of
the
most
popular
URLs
on
this
network
show
log
url
direction
equal
backward-
view
the
URL
log,
most
recent
entries
first
To
test
connectivity
to
the
BrightCloud
servers:
o ping
host
service.brightcloud.com
o ping
host
database.brightcloud.com
Log
viewing
/
deleting1
show
log
[
system
|
traffic
|
threat
]
direction
equal
backward
will
take
you
to
the
end
of
the
specified
log
show
log
[
system
|
traffic
|
threat
]
direction
equal
forward
will
take
you
to
beginning
of
the
specified
log
clear
log
[
traffic
|
threat
|
acc
]
clear
everything
in
the
specified
log
Arguments
that
are
shown
with
square
braces
and
pipe
symbol
mean
that
you
choose
one
of
the
arguments
listed.
For
example,
[
arg1
|
arg2
|
arg3
]
means
you
select
either
arg1
or
arg2
or
arg3.
1
IPSec
To
view
detailed
debug
information
for
IPSec
tunneling:
1. debug
ike
global
on
debug
2. less
mp-log
ikemgr.log
HA