{"id":7189,"date":"2014-11-11T05:05:15","date_gmt":"2014-11-11T13:05:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7189"},"modified":"2015-12-11T09:40:01","modified_gmt":"2015-12-11T17:40:01","slug":"9-new-features-topics-check-pan-os-6-1","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/11\/9-new-features-topics-check-pan-os-6-1\/","title":{"rendered":"9 New Features and Topics to Check Out in PAN-OS 6.1"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2014\/palo-alto-networks-reveals-latest-pan-os-release-expands-cloud-security-support-for-aws-and-kvm.html\">The much anticipated PAN-OS 6.1 is finally here<\/a> and with it, many new topics to read that describe new features and functionality. Here are some recommendations, hand-picked by the Technical Publications team, to add to your reading list.<\/p>\n<h3>New Feature Documentation<\/h3>\n<p><!--more--><\/p>\n<h4>Local Signature Generation Support for WF-500 Appliances<\/h4>\n<p>The WF-500 appliance can now generate signatures locally, eliminating the need to send any data to the public cloud in order to block malicious content. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/wildfire\/wf_admin\/wf-500-appliance-file-analysis\/signature-url-generation-on-a-wf-500-appliance.html\" target=\"_blank\">Signature\/URL Generation on a WF-500 Appliance<\/a>.<\/p>\n<h4>Per App VPN for GlobalProtect<\/h4>\n<p>Leveraging the GlobalProtect Mobile Security Manager App Store feature introduced in GlobalProtect Mobile Security Manager 6.1, the GlobalProtect app for iOS now supports Per App VPN. With Per App VPN, GlobalProtect can route all managed business apps through your corporate VPN, while allowing personal apps direct access to the Internet. For business apps with Per App VPN enabled, if the business app is unable to connect to the corporate VPN, the app will be unavailable to the user and will not send traffic until the secure connection is established. Users will still have access to their unmanaged apps, giving them the freedom to user their devices for personal use while protecting your critical business traffic. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/globalprotect\/globalprotect-admin-guide\/manage-business-apps-and-data-with-an-enterprise-app-store\/isolate-business-traffic.html\" target=\"_blank\">Isolate Business Traffic<\/a>.<\/p>\n<h4>Use Case: VM-Series Firewalls as GlobalProtect Gateways in AWS<\/h4>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:68.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7191 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169-500x344.jpg\" alt=\"Virtualization-169\" width=\"500\" height=\"344\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169-500x344.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169-230x158.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169-435x300.jpg 435w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169-58x40.jpg 58w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Virtualization-169.jpg 650w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>If your users are more physically distributed than the supporting network infrastructure, GlobalProtect gateways in AWS remove the barriers to providing consistent security for all your users. The VM-Series firewall in AWS melds the security and IT logistics required to consistently and reliably protect devices used by mobile users in regions where you do not have a presence. By deploying the VM-Series firewall in the AWS cloud you can quickly and easily deploy GlobalProtect gateways around the world, and extend the corporate acceptable use policy to protect mobile users from threats and risky applications.\u00a0 For more information on how to deploy this solution, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/virtualization\/virtualization\/set-up-the-vm-series-firewall-in-aws\/use-case-vm-series-firewalls-as-globalprotect-gateways-in-aws.html\" target=\"_blank\">Use Case: VM-Series Firewalls as GlobalProtect Gateways in AWS<\/a>!<\/p>\n<h4>LACP Support<\/h4>\n<p>The firewall can now use Link Aggregation Control Protocol (LACP) to manage the interfaces in an aggregate group. Enabling LACP improves device and network availability by providing redundancy within aggregate groups and automating interface failure detection. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/networking\/lacp.html\" target=\"_blank\">LACP<\/a>.<\/p>\n<h4>Session End Reason Logging Support<\/h4>\n<p>Traffic logs now include a session end reason field to help troubleshoot connectivity and application availability issues in firewall traffic. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/newfeaturesguide\/networking-features\/session-end-reason-logging.html\" target=\"_blank\">Session End Reason Logging<\/a>.<\/p>\n<h3>New Documentation on Existing Features<\/h3>\n<p>In addition to new feature documentation, we\u2019ve also expanded the depth of information about the following features.<\/p>\n<h4>Virtual Systems<\/h4>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7193 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/vsys_basic1-500x282.png\" alt=\"vsys_basic\" width=\"500\" height=\"282\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/vsys_basic1-500x282.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/vsys_basic1-230x130.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/vsys_basic1-510x288.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/vsys_basic1-70x40.png 70w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/vsys_basic1.png 711w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Virtual systems are separate, logical firewall instances within a Palo Alto Networks firewall, which provide segmented administration and scalability of a firewall, along with reduced capital and operational expenses. For more information about benefits, use cases, and configuration of virtual systems, external zones, and shared gateways, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/virtual-systems\/virtual-systems-overview.html\" target=\"_blank\">Virtual Systems<\/a>.<\/p>\n<h4>Session Settings and Timeouts<\/h4>\n<p>This new topic describes settings and timers for TCP, UDP, and ICMPv6 sessions, in addition to IPv6, NAT64, jumbo frame size, MTU, accelerated aging, and captive portal authentication settings. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/networking\/session-settings-and-timeouts.html\" target=\"_blank\">Session Settings and Timeouts<\/a>.<\/p>\n<h4>DHCP<\/h4>\n<p>This new topic describes the Dynamic Host Configuration Protocol and how to configure interfaces on the firewall to act as a DHCP server, client, or relay agent. DHCP provides network addresses along with TCP\/IP and link-layer configuration parameters to dynamically configured hosts. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/networking\/dhcp.html\" target=\"_blank\">DHCP<\/a>.<\/p>\n<h4>NAT<\/h4>\n<p>This new topic describes source and destination Network Address Translation, NAT rule capacities, and the ability to configure Dynamic IP and Port NAT oversubscription. For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/networking\/nat.html\" target=\"_blank\">NAT<\/a>.<\/p>\n<h3>Want More PAN-OS 6.1 Documentation?<\/h3>\n<p>Check out the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/newfeaturesguide.html\" target=\"_blank\">New Features Guide 6.1<\/a> and the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os-release-notes.html\" target=\"_blank\">PAN-OS 6.1 Release Notes<\/a> on the Technical Documentation Site, or select the 6.1 facet (under OS Version) on the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/document-search.html\" target=\"_blank\">Document Search page<\/a>!<\/p>\n<p>Happy reading!<\/p>\n<p>Your friendly Technical Publications team<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The much anticipated PAN-OS 6.1 is finally here and with it, many new topics to read that describe new features and functionality. Here are some recommendations, hand-picked by the Technical Publications team, &hellip;<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587],"tags":[861],"coauthors":[711],"class_list":["post-7189","post","type-post","status-publish","format-standard","hentry","category-technical-documentation","tag-pan-os-6-1"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7189"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7189\/revisions"}],"predecessor-version":[{"id":11403,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7189\/revisions\/11403"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7189"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}