Wildfire Admin
Wildfire Admin
Wildfire Admin
Version 10.0
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2020-2021 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
April 19, 2021
iv TABLE OF CONTENTS
WildFire Appliance Software CLI Command Conventions.............................................. 151
WildFire Appliance CLI Command Messages..................................................................... 151
WildFire Appliance Command Option Symbols................................................................. 152
WildFire Appliance Privilege Levels...................................................................................... 153
WildFire CLI Command Modes...........................................................................................................155
WildFire Appliance CLI Configuration Mode......................................................................155
WildFire Appliance CLI Operational Mode......................................................................... 157
Access the WildFire Appliance CLI....................................................................................................158
Establish a Direct Console Connection................................................................................ 158
Establish an SSH Connection..................................................................................................158
WildFire Appliance CLI Operations................................................................................................... 159
Access WildFire Appliance Operational and Configuration Modes...............................159
Display WildFire Appliance Software CLI Command Options........................................159
Restrict WildFire Appliance CLI Command Output.......................................................... 160
Set the Output Format for WildFire Appliance Configuration Commands..................161
WildFire Appliance Configuration Mode Command Reference..................................................162
set deviceconfig cluster............................................................................................................162
set deviceconfig high-availability........................................................................................... 163
set deviceconfig setting management.................................................................................. 165
set deviceconfig setting wildfire............................................................................................ 166
set deviceconfig system eth2................................................................................................. 168
set deviceconfig system eth3................................................................................................. 169
set deviceconfig system panorama-server.......................................................................... 170
set deviceconfig system panorama-server-2...................................................................... 171
set deviceconfig system update-schedule........................................................................... 172
set deviceconfig system vm-interface.................................................................................. 173
WildFire Appliance Operational Mode Command Reference..................................................... 175
clear high-availability.................................................................................................................176
create wildfire api-key.............................................................................................................. 177
delete high-availability-key......................................................................................................178
delete wildfire api-key.............................................................................................................. 179
delete wildfire-metadata.......................................................................................................... 180
disable wildfire............................................................................................................................180
edit wildfire api-key.................................................................................................................. 181
load wildfire api-key..................................................................................................................182
request cluster decommission................................................................................................ 183
request cluster reboot-local-node......................................................................................... 184
request high-availability state.................................................................................................185
request high-availability sync-to-remote............................................................................. 186
request system raid................................................................................................................... 188
request wildfire sample redistribution..................................................................................189
request system wildfire-vm-image........................................................................................ 190
request wf-content....................................................................................................................191
save wildfire api-key................................................................................................................. 192
set wildfire portal-admin..........................................................................................................193
show cluster all-peers...............................................................................................................193
show cluster controller.............................................................................................................195
show cluster data migration status....................................................................................... 195
show cluster membership........................................................................................................196
show cluster task....................................................................................................................... 199
show high-availability all.......................................................................................................... 200
show high-availability control-link......................................................................................... 202
show high-availability state..................................................................................................... 203
show high-availability transitions...........................................................................................204
show system raid....................................................................................................................... 205
TABLE OF CONTENTS v
submit wildfire local-verdict-change..................................................................................... 206
show wildfire...............................................................................................................................207
show wildfire global.................................................................................................................. 209
show wildfire local.....................................................................................................................212
test wildfire registration...........................................................................................................218
vi TABLE OF CONTENTS
WildFire Overview
WildFire™ provides detection and prevention of zero-day malware using a combination of
dynamic and static analysis to detect threats and create protections to block malware. WildFire
extends the capabilities of Palo Alto Networks next-generation firewalls to identify and block
targeted and unknown malware.
7
8 WILDFIRE ADMINISTRATOR'S GUIDE | WildFire Overview
© 2021 Palo Alto Networks, Inc.
About WildFire
The WildFire Analysis Environment identifies previously unknown malware and generates signatures that
Palo Alto Networks firewalls can use to then detect and block the malware. When a Palo Alto Networks
firewall detects an unknown sample (a file or a link included in an email), the firewall can automatically
forward the sample for WildFire analysis. Based on the properties, behaviors, and activities the sample
displays when analyzed and executed in the WildFire sandbox, WildFire determines the sample to be
benign, grayware, phishing, or malicious. WildFire then generates signatures to recognize the newly-
discovered malware, and makes the latest signatures globally available for retrieval in real-time. All Palo Alto
Networks firewalls can then compare incoming samples against these signatures to automatically block the
malware first detected by a single firewall.The following workflow describes the WildFire process lifecycle
from when a user downloads a file carrying an advanced VM-aware payload to the point where WildFire
generates a signature package used by Palo Alto Networks firewalls to protect against future exposure to
malware.
In this example, the following assumptions are made:
• A firewall is registered to the WildFire cloud and is configured to forward supported file types.
• The malware found in the file attachment is an advanced VM-aware threat and has not been
encountered before.
• The file download is logged if the data filtering logs and WildFire submissions logs are configured to be
forwarded to the firewall.
To learn more about WildFire, or to get started with WildFire now, see the following topics:
Samples
Samples are all file types and email links submitted for WildFire analysis from the firewall and the public
API. See File Analysis and Email Link Analysis for details on the file types and links that a firewall can submit
for WildFire analysis.
Firewall Forwarding
The firewall forwards unknown samples, as well as blocked files that match antivirus signatures, for
WildFire analysis based on the configured WildFire Analysis profile settings (Objects > Security Profiles >
WildFire Analysis). In addition to detecting links included in emails, files that are attached to emails, and
browser-based file downloads, the firewall leverages the App-ID to detect file transfers within applications.
For samples that the firewall detects, the firewall analyzes the structure and content of the sample and
compares it against existing signatures. If the sample matches a signature, the firewall applies the default
action defined for the signature (allow, alert, or block). If the sample matches an antivirus signature or if the
sample remains unknown after comparing it against WildFire signatures, the firewall forwards it for WildFire
analysis.
By default, the firewall also forwards information about the session in which an unknown sample was
detected. To manage the session information that the firewall forwards, select Device > Setup > WildFire
and edit Session Information Settings.
Analysis Environment
WildFire reproduces a variety of analysis environments, including the operating system, to identify
malicious behaviors within samples. Depending on the characteristics and features of the sample, multiple
analysis environments may be used to determine the nature of the file. WildFire uses static analysis with
machine learning to initially determine if known and variants of known samples are malicious. Based on the
initial verdict of the submission, WildFire sends the unknown samples to analysis environment(s) to inspect
the file in greater detail by extracting additional information and indicators from dynamic analysis. If the file
has been obfuscated using custom or open source methods, the WildFire cloud decompresses and decrypts
the file in-memory within the dynamic analysis environment before analyzing it using static analysis. During
dynamic analysis, WildFire observes the file as it would behave when executed within client systems and
looks for various signs of malicious activities, such as changes to browser security settings, injection of code
into other processes, modification of files in operating system folders, or attempts by the sample to access
malicious domains. Additionally, PCAPs generated during dynamic analysis in the WildFire cloud undergo
deep inspection and are used to create network activity profiles. Network traffic profiles can detect known
malware and previously unknown malware using a one-to-many profile match.
WildFire operates analysis environments that replicate the following operating systems:
• Microsoft Windows XP 32-bit
• Microsoft Windows 7 64-bit
• Microsoft Windows 7 32-bit (Supported as an option for WildFire appliance only)
• Microsoft Windows 10 64-bit (WildFire Cloud Analysis and WildFire appliance running PAN-OS 10.0 or
later)
• Mac OS X (WildFire Cloud Analysis only)
• Android (WildFire Cloud Analysis only)
• Linux (WildFire Cloud Analysis only)
The WildFire public cloud also analyzes files using multiple versions of software to accurately identify
malware that target specific versions of client applications. The WildFire private cloud does not support
multi-version analysis, and does not analyze application-specific files across multiple versions.
Verdicts
When WildFire analyzes a previously unknown sample in one of the Palo Alto Networks-hosted WildFire
public clouds or a locally-hosted WildFire private cloud, a verdict is produced to identify samples as
malicious, unwanted (grayware is considered obtrusive but not malicious), phishing, or benign:
• Benign—The sample is safe and does not exhibit malicious behavior.
• Grayware—The sample does not pose a direct security threat, but might display otherwise obtrusive
behavior. Grayware typically includes adware, spyware, and Browser Helper Objects (BHOs).
• Phishing—The link directs users to a phishing site and poses a security threat. Phishing sites are sites
that attackers disguise as legitimate websites with the aim to steal user information, especially corporate
passwords that unlock access to your network. The WildFire appliance does not support the phishing
verdict and continues to classify these types of links as malicious.
• Malicious—The sample is malware and poses a security threat. Malware can include viruses, worms,
Trojans, Remote Access Tools (RATs), rootkits, and botnets. For files identified as malware, WildFire
generates and distributes a signature to prevent against future exposure to the threat.
Each WildFire cloud—global (U.S.), regional, and private—analyzes samples and generates WildFire verdicts
independently of the other WildFire clouds. With the exception of WildFire private cloud verdicts, WildFire
verdicts are shared globally, enabling WildFire users to access a worldwide database of threat data.
Verdicts that you suspect are either false positives or false negatives can be submitted to
the Palo Alto Networks threat team for additional analysis. You can also manually change
verdicts of samples submitted to WildFire appliances.
flash Adobe Flash applets and Flash content embedded in web pages.
ms-office Microsoft Office files, including documents (DOC, DOCX, RTF), workbooks
(XLS, XLSX), and PowerPoint (PPT, PPTX) presentations, and Office Open
XML (OOXML) 2007+ documents.
pe Portable Executable (PE) files. PEs include executable files, object code, DLLs,
FON (fonts), and LNK files. A subscription is not required to forward PE files
for WildFire analysis, but is required for all other supported file types.
MacOSX Mach-O, DMG, and PKG files are supported with content version 599. You
can also manually or programmatically submit all Mac OS X supported file
types for analysis (including application bundles, for which the firewall does
not support automatic forwarding).
email-link HTTP/HTTPS links contained in SMTP and POP3 email messages. See Email
Link Analysis.
archive Roshal Archive (RAR) and 7-Zip (7z) archive files. Multi-volume archives are
that are split into several smaller files cannot be submitted for analysis.
Only RAR files encrypted with the password infected or virus are decrypted
and analyzed by the WildFire cloud.
URL Analysis
The WildFire global cloud (U.S.) and regional clouds can analyze URLs, and by extension, email links, to
provide standardized verdicts and reports through the WildFire API. By aggregating threat analysis details
from all Palo Alto Networks services, including PAN-DB, WildFire is able to generate a more accurate
verdict and provide consistent URL analysis data.
The URL analyzers operating in the WildFire global cloud (U.S.) processes URL feeds, correlated URL
sources (such as email links), NRD (newly registered domain) lists, PAN-DB content, and manually uploaded
URLs, to provide all WildFire clouds with the improved capabilities, without affecting GDPR compliance.
After a URL has been processed, you can retrieve the WildFire URL analysis report, which includes the
verdict, detection reasons with evidence, screenshots, and analysis data generated for the web request. You
can also retrieve web page artifacts (downloaded files and screenshots) seen during URL analysis to further
investigate anomalous activity.
No additional configuration is necessary to take advantage of this feature, however, if you want to
automatically submit email links for analysis (which are now analyzed through this service), you must
configure your firewall to forward email link (PAN-OS 8.1, 9.0, 9.1, 10.0).
Verdicts that you suspect are either false positives or false negatives can be submitted (PAN-OS 8.1, 9.0,
9.1, 10.0) to the Palo Alto Networks threat team for additional analysis.
RAR and 7-Zip archive files are not decoded by the firewall. All processing of these files
occurs in the WildFire public cloud.
WildFire Signatures
WildFire can discover zero-day malware in web traffic (HTTP/HTTPS), email protocols (SMTP, IMAP, and
POP), and FTP traffic and can quickly generate signatures to identify and protect against future infections
from the malware it discovers. WildFire automatically generates a signature based on the malware payload
of the sample and tests it for accuracy and safety.
Each WildFire cloud—global, regional, and private—analyzes samples and generates malware signatures
independently of the other WildFire clouds. With the exception of WildFire private cloud signatures,
WildFire signatures are shared globally, enabling WildFire users worldwide to benefit from malware
coverage regardless of the location in which the malware was first detected. Because malware evolves
rapidly, the signatures that WildFire generates address multiple variants of the malware.
Firewalls with an active WildFire license can retrieve the latest WildFire signatures in real-time, as soon
as they become available. If you do not have a WildFire subscription, signatures are made available within
24-48 hours as part of the antivirus update for firewalls with an active Threat Prevention license.
As soon as the firewall downloads and installs the new signature, the firewall can block the files that contain
that malware (or a variant of the malware). Malware signatures do not detect malicious and phishing links;
to enforce these links, you must have a PAN-DB URL Filtering license. You can then block user access to
malicious and phishing sites.
The FedRAMP Program Management Office (PMO) reviews the form and typically
issues a temporary 30 day access to the WildFire FedRAMP package.
4. Review the FedRAMP security package for the WildFire U.S. Government cloud. Complete any
internal processes required to deploy the WildFire U.S. Government cloud into your organization.
5. Issue the ATO.
6. Send a request to the FedRAMP PMO for permanent access to the WildFire U.S. government cloud.
2. U.S. Government Contractors
U.S. government contractors who use or access the WildFire U.S. government cloud must meet the
following requirements.
1. Must be a citizen of the United States.
2. Hold an active contract (or subcontract) with a U.S. federal government agency with an occupational
requirement for information exchange using the Internet, such as email correspondence, sharing of
documents, and other forms of Internet communication.
3. Upon termination of a contractor’s employment, the user must cease using or accessing the WildFire
U.S. government cloud.
4. Abide by the confidentiality provisions contained within the Palo Alto Networks EULA.
After your organization issues an Authorization to Operate (ATO) or when applicable U.S. government
contractors meet all usage requirements, only then can a request be made to access the WildFire U.S.
Government cloud by contacting your Palo Alto Networks Account team.
1. Contact your FedRAMP Program Management Office (PMO) to determine the viability of the U.S.
Government cloud for your security needs.
2. Contact the Palo Alto Networks point of contact specified in the FedRAMP Marketplace. The point
of contact provides additional information about the service, as well as any other operational details
pertinent to your particular WildFire deployment.
3. Contact the Palo Alto Networks Account Team to begin the on-boarding process. The Account Team will
request the following information regarding customer details and deployment specifics.
• Contact information.
• A brief description for migrating to the WildFire U.S. Government cloud.
• A statement of organizational compliance with the confidentiality provisions outlined within the Palo
Alto Networks EULA.
• Egress IP addresses of all firewall gateways (including management planes), as well as all instances of
Panorama.
4. After WildFire Program Management grants approval to use the WildFire U.S. Government cloud
(typically in one to three business days), Palo Alto Networks Development Operations applies the
appropriate controls.
5. After access to the WildFire U.S. Government cloud is granted, reconfigure the firewall to forward
unknown files and email links for analysis using the following URL: wildfire.gov.paloaltonetworks.com.
For more information, see Forward Files for Wildfire Analysis. If you require any additional assistance,
contact Palo Alto Networks Customer Support.
File Types Supported WildFire Public Cloud (all WildFire U.S. WildFire Private Cloud
for Analysis regions) Government Cloud (WildFire appliance)
Links contained in
emails
Android application
package (APK) files
Portable executable
(PE) files
Portable document
format (PDF) files
Mac OS X files
If you are running PAN-OS 10.0 or later, it is a best practice to use real-time WildFire
updates instead of scheduling recurring updates.
Select Device > Dynamic Updates to enable the firewall to get the latest WildFire signatures. Depending
on your WildFire deployment, you can set up one or both of the following signature package updates:
• WildFire—Get the latest signatures from the WildFire public cloud.
• WF-Private—Get the latest signatures from a WildFire appliance that is configured to locally generate
signatures and URL categories (PAN-OS 8.1, 9.0, 9.1, 10.0).
• WildFire Inline ML—(PAN-OS 10.0 and later) Prevent malicious variants of portable executables,
executable and linked format (ELF) files, and PowerShell scripts from entering your network in real-time
using machine learning (ML) on the firewall dataplane. By utilizing WildFire® Cloud analysis technology
on the firewall, WildFire Inline ML dynamically detects malicious files of a specific type by evaluating
various file details, including decoder fields and patterns, to formulate a high probability classification
of a file. This protection extends to currently unknown as well as future variants of threats that match
characteristics that Palo Alto Networks identified as malicious. WildFire inline ML complements your
existing Antivirus profile protection configuration. Additionally, you can specify file hash exceptions to
exclude any false-positives that you encounter, which enables you to create more granular rules in your
profiles to support your specific security needs.
• WildFire Advanced File Type Support—In addition to PEs, forward advanced file types for WildFire
analysis, including APKs, Flash files, PDFs, Microsoft Office files, Java Applets, Java files (.jar and .class),
and HTTP/HTTPS email links contained in SMTP and POP3 email messages. (WildFire private cloud
analysis does not support APK, Mac OS X, Linux (ELF), archive (RAR/7-Zip), and script (JS, BAT, VBS,
Shell Script, PS1, and HTA) files).
• WildFire API—Access to the WildFire API, which enables direct programmatic access to the WildFire
public cloud or a WildFire private cloud. Use the WildFire API to submit files for analysis and to retrieve
the subsequent WildFire analysis reports. The WildFire API supports up to 1,000 file submissions and up
to 10,000 queries a day.
• WildFire Private and Hybrid Cloud Support—Forward Files to a WildFire Appliance (PAN-OS 8.1, 9.0,
9.1, 10.0). WildFire private cloud and WildFire hybrid cloud deployments both require the firewall to be
This example uses a web site that uses SSL encryption. In this case, the firewall has
decryption (PAN-OS 8.1, 9.0, 9.1, 10.0)enabled, including the option to forward decrypted
content for analysis.
STEP 1 | The sales person from the partner company uploads a sales tool file named sales-tool.exe to his
Dropbox account and then sends an email to the Palo Alto Networks sales person with a link to
the file.
STEP 2 | The Palo Alto sales person receives the email from the sales partner and clicks the download
link, which takes her to the Dropbox site. She then clicks Download to save the file to her
desktop.
STEP 3 | The firewall that is protecting the Palo Alto sales rep has a WildFire Analysis profile rule
attached to a security policy rule that will look for files in any application that is used to
download or upload any of the supported file types. The firewall can also be configured to
forward the email-link file type, which enables the firewall to extract HTTP/HTTPS links
contained in SMTP and POP3 email messages. As soon as the sales rep clicks download, the
firewall forwards the sales-toole.exe file to WildFire, where the file is analyzed for zero-day
malware. Even though the sales rep is using Dropbox, which is SSL encrypted, the firewall is
configured to decrypt traffic, so all traffic can be inspected. The following screen shots show
the WildFire Analysis profile rule, the security policy rule configured with the WildFire analysis
profile rule attached, and the option to allow forwarding of decrypted content enabled.
STEP 5 | After WildFire has completed the file analysis, it sends a WildFire log back to the firewall with
the analysis results. In this example, the WildFire log shows that the file is malicious.
STEP 7 | The security administrator identifies the user by name (if User-ID is configured), or by IP
address if User-ID is not enabled. At this point, the administrator can shut down the network
or VPN connection that the sales representative is using and will then contact the desktop
support group to work with the user to check and clean the system.
By using the WildFire detailed analysis report, the desktop support person can determine if the user
system is infected with malware by looking at the files, processes, and registry information detailed in
the WildFire analysis report. If the user runs the malware, the support person can attempt to clean the
system manually or re-image it.
STEP 8 | Now that the administrator has identified the malware and the user system is being checked,
how do you protect from future exposure? Answer: In this example, the administrator set a
schedule on the firewall to download and install WildFire signatures every 15 minutes and to
download and install Antivirus updates once per day. In less than an hour and a half after the
sales rep downloaded the infected file, WildFire identified the zero-day malware, generated a
All of this occurs well before most antivirus vendors are even aware of the zero-day malware. In this
example, within a very short period of time, the malware is no longer considered zero-day because Palo
Alto Networks has already discovered it and has provided protection to customers to prevent future
exposure.
STEP 1 | Get your WildFire Subscription. If you do not have a WildFire subscription, you can still
forward PEs for WildFire analysis (PAN-OS 8.1, 9.0, 9.1, 10.0).
STEP 3 | (WildFire private and hybrid cloud only) Set up and manage a WildFire appliance (PAN-OS 8.1,
9.0, 9.1, 10.0), including upgrading the WildFire appliance (PAN-OS 8.1, 9.0, 9.1, 10.0) to the
latest release version. Firewalls connected to the appliance must be running the same release
version.
It is a recommended WildFire best practice to set the File Size for PEs to the
maximum size limit of 10 MB, and to leave the File Size for all other file types set to
the default value.
4. Click OK to save the WildFire General Settings.
STEP 6 | Enable the firewall to forward decrypted SSL traffic for WildFire analysis (PAN-OS 8.1, 9.0, 9.1,
10.0).
As a best practice, use the WildFire Analysis default profile to ensure complete
WildFire coverage for traffic the firewall allows. If you still decide to create a custom
WildFire Analysis profile, set the profile to forward Any file type—this enables the
firewall to automatically start forwarding newly-supported file types for analysis.
2. For each profile rule, set the WildFire Deployments Destination to which you want the firewall to
forward samples for analysis—public-cloud or the private-cloud.
3. Attach the WildFire analysis profile to a security policy rule (PAN-OS 8.1, 9.0, 9.1, 10.0). Traffic
matched to the policy rule is forwarded for WildFire analysis (Policies > Security and Add or modify a
security policy rule).
As new WildFire signatures are available every five minutes, this setting ensures
the firewall retrieves these signatures within a minute of availability.
4. Enable the firewall to Download and Install these updates as the firewall retrieves them.
5. Click OK.
• PAN-OS 10.0 and later
1. Select Device > Dynamic Updates:
2. Check that the WildFire updates are displayed.
3. Select Schedule to configure the update frequency and then use the Recurrence field to configure
the firewall to retrieve WildFire signatures in Real-time.
4. Click OK.
STEP 9 | Start scanning traffic for threats (PAN-OS 8.1, 9.0, 9.1, 10.0), including malware that WildFire
identifies.
Attach the default Antivirus profile to a security policy rule to scan traffic the rules allows based on
WildFire antivirus signatures (select Policies > Security and add or a modify the defined Actions for a
rule).
STEP 10 | Control site access to web sites where WildFire has identified the associated link as malicious
or phishing.
31
32 WILDFIRE ADMINISTRATOR'S GUIDE | WildFire Deployment Best Practices
© 2021 Palo Alto Networks, Inc.
WildFire Best Practices
Follow the best practices (PAN-OS 8.1, 9.0, 9.1, 10.0) to secure your network from Layer 4 and Layer
7 evasions to ensure reliable content identification and analysis. Specifically, make sure that you
implement the best practices for TCP settings (Device > Setup > Session > TCP Settings) and Content-
ID™ settings (Device > Setup > Content-ID > Content-ID Settings).
Also make sure that you have an active Threat Prevention subscription (PAN-OS 8.1, 9.0, 9.1, 10.0).
®
Together, WildFire and Threat Prevention enable comprehensive threat detection and prevention.
Download and install content updates (PAN-OS 8.1, 9.0, 9.1, 10.0) on a daily basis to receive the latest
product updates and threat protections generated by Palo Alto Networks. Review the instructions for
installing content and software updates (PAN-OS 8.1, 9.0, 9.1, 10.0) for more information about what is
included in the update packages.
If you are running PAN-OS 10.0 or later, configure your firewall to retrieve WildFire signatures in real-
time. This provides access to newly-discovered malware signatures as soon as the WildFire public cloud
can generate them, thereby preventing successful attacks by minimizing your exposure time to malicious
activity.
If you configured your firewall to decrypt SSL traffic (PAN-OS 8.1, 9.0, 9.1, 10.0), then enable the
firewall to Forward Decrypted SSL Traffic for WildFire Analysis (PAN-OS 8.1, 9.0, 9.1, 10.0). Only a
superuser can enable this option.
Use the default WildFire Analysis profile to define the traffic that the firewall should forward for
WildFire analysis (Objects > Security Profiles > WildFire Analysis). The default WildFire Analysis profile
ensures complete WildFire coverage for all traffic that your Security policy allows—it specifies that all
supported file types across all applications are forwarded for WildFire analysis regardless whether the
files are uploaded or downloaded.
If you choose to create a custom WildFire Analysis profile, it is a best practice to still set the profile
to forward any file type. This enables the firewall to automatically begin forwarding file types as they
become supported for WildFire analysis.
For details on applying a WildFire Analysis profile to firewall traffic, review how to Forward Files for
WildFire Analysis (PAN-OS 8.1, 9.0, 9.1, 10.0).
WildFire Action settings in the Antivirus profile may impact traffic if the traffic generates
a WildFire signature that results in a reset or a drop action. You can exclude internal
traffic, such as software distribution applications through which you deploy custom-
built programs, to transition safely (PAN-OS 9.0, 9.1, 10.0)to best practices because
WildFire may identify custom-built programs as malicious and generate a signature for
them. Check Monitor > Logs > WildFire Submissions to see if any internal custom-built
programs trigger WildFire signatures.
While you are configuring the firewall to forward files for WildFire analysis (PAN-OS 8.1, 9.0, 9.1, 10.0),
review the file Size Limit for all supported file types. Set the Size Limit for all file types to the default
limits. (Select Device > Setup > WildFire and edit the General Settings to adjust file size limits based on
file type. You can view the Help information to find the default size limit for each file type).
About the Default File Size Limits for WildFire Forwarding
The default file size limits on the firewall are designed to include the majority of malware in the wild
(which is smaller than the default size limits) and to exclude large files that are very unlikely to be
malicious and that can impact WildFire file-forwarding capacity. Because the firewall has a specific
capacity reserved to forward files for WildFire analysis, forwarding high numbers of large files can cause
the firewall to skip forwarding of some files. This condition occurs when the maximum file size limits are
configured for a file type that is traversing the firewall at a high rate. In this case, a potentially malicious
file might not get forwarded for WildFire analysis. Consider this possible condition if you would like to
increase the size limit for files other than PEs beyond their default size limit.
Figure 3: Recommended File Size Limits to Catch Uncommonly Large Malicious Files
If you are concerned specifically about uncommonly large malicious files, then you can increase file size
limits beyond the default settings. In these cases, the following settings are recommended to catch rare,
very large malicious files.
Select Device > Setup > WildFire and edit General Settings to adjust the Size Limit for each file type:
File Type PAN-OS 9.0 and later File-Forwarding PAN-OS 8.1 File-
Maximum Size Recommendations Forwarding Maximum Size
Recommendations
pe 16MB 10MB
35
36 WILDFIRE ADMINISTRATOR'S GUIDE | Submit Files for WildFire Analysis
© 2021 Palo Alto Networks, Inc.
Forward Files for WildFire Analysis
Configure Palo Alto Networks firewalls to forward unknown files or email links and blocked files that match
existing antivirus signatures for analysis. Use the WildFire Analysis profile to define files to forward to the
WildFire cloud (use the public cloud or a private cloud), and then attach the profile to a security rule to
trigger inspection for zero-day malware.
Specify traffic to be forwarded for analysis based on the application in use, the file type detected, links
contained in email messages, or the transmission direction of the sample (upload, download, or both). For
example, you can set up the firewall to forward Portable Executables (PEs) or any files that users attempt
to download during a web-browsing session. In addition to unknown samples, the firewall forwards blocked
files that match existing antivirus signatures. This provides Palo Alto Networks a valuable source of threat
intelligence based on malware variants that signatures successfully prevented but neither WildFire nor the
firewall has seen before.
If you are using a WildFire appliance to host a WildFire private cloud, you can extend WildFire analysis
resources to a WildFire hybrid cloud, by configuring the firewall to continue to forward sensitive files to
your WildFire private cloud for local analysis, and forward less sensitive or unsupported file types to the
WildFire public cloud.
Additionally, you can dedicate WildFire appliance resources to analyze specific file types: either documents
(Microsoft Office files and PDFs) or PEs. For example, if you deploy a WildFire hybrid cloud to analyze
documents locally and PEs in one of the WildFire public clouds, you can dedicate all analysis environments
to documents. This allows you to offload analysis of PEs to the public cloud, allowing you to allocate
additional WildFire appliance resources to process sensitive documents.
Before you begin:
• If another firewall resides between the firewall you are configuring to forward files and the WildFire
cloud or WildFire appliance, make sure that the firewall in the middle allows the following ports:
Port Usage
443 • Registration
• PCAP Downloads
• Sample Downloads
• Report Retrieval
• File Submission
• PDF Report Downloads
• (PA-7000 Series Firewalls Only) To enable a PA-7000 Series firewall to forward files and email links for
WildFire analysis, you must first configure a data port on an NPC as a Log Card interface.
STEP 1 | Specify the WildFire deployments to which you want to forward samples.
Select Device > Setup > WildFire and edit the General Settings based on your WildFire cloud
deployment (public, government, private, or hybrid).
The WildFire U.S. Government Cloud is only available to U.S. Federal agencies as an
optional analysis environment.
STEP 2 | Define the size limits for files the firewall forwards and configure WildFire logging and
reporting settings.
Continue editing WildFire General Settings (Device > Setup > WildFire).
• Review the File Size Limits for files forwarded from the firewall.
It is a recommended WildFire best practice to set the File Size for PEs to the
maximum size limit of 10 MB, and to leave the File Size for all other file types set to
the default value.
• Select Report Benign Files to allow logging for files that receive a WildFire verdict of benign.
• Select Report Grayware Files to allow logging for files that receive a WildFire verdict of grayware.
• Define what session information is recorded in WildFire analysis reports by editing the Session
Information Settings. By default, all session information is displayed in WildFire analysis reports. Clear
the check boxes to remove the corresponding fields from WildFire analysis reports and click OK to
save the settings.
STEP 3 | (Panorama Only) Configure Panorama to gather additional information about samples collected
from firewalls running a PAN-OS version prior to PAN-OS 7.0.
If you have a WildFire appliance set up, you can use both the private cloud and the public
cloud in a hybrid cloud deployment. Analyze sensitive files locally on your network, while
sending all other unknown files to the WildFire public cloud for comprehensive analysis
and prompt verdict returns.
1. Select Objects > Security Profiles > WildFire Analysis, Add a new WildFire analysis profile, and give
the profile a descriptive Name.
2. Add a profile rule to define traffic to be forwarded for analysis and give the rule a descriptive Name,
such as local-PDF-analysis.
3. Define for the profile rule to match to unknown traffic and to forward samples for analysis based on:
• Applications—Forward files for analysis based on the application in use.
• File Types—Forward files for analysis based on file types, including links contained in email
messages. For example, select PDF to forward unknown PDFs detected by the firewall for
analysis.
• Direction—Forward files for analysis based the transmission direction of the file (upload,
download, or both). For example, select both to forward all unknown PDFs for analysis, regardless
of the transmission direction.
4. Set the Analysis location to which the firewall forwards files matched to the rule.
• Select public-cloud to forward matching samples to the WildFire public cloud for analysis.
• Select private-cloud to forward matching samples to a WildFire private cloud for analysis.
For example, to analyze PDFs that could contain sensitive or proprietary information without
sending these documents out of your network, set the Analysis location for the rule local-PDF-
analysis to private-cloud.
Different rules can forward matched samples to different analysis locations, depending
on your needs. The example above shows a rule that forwards sensitive file types for
local analysis in a WildFire private cloud. You could create another rule to forward
less sensitive file types, such as PEs, to the WildFire public cloud. This flexibility is
supported with a WildFire hybrid cloud deployment.
In a hybrid cloud deployment, files that match to both private-cloud and public-cloud
rules are forwarded only to the private cloud as a cautionary measure.
5. (Optional) Continue to add rules to the WildFire analysis profile as needed. For example, you could
add a second rule to the profile to forward Android application package (APK), Portable Executable
(PE), and Flash files to the WildFire public cloud for analysis.
6. Click OK to save the WildFire analysis profile.
STEP 5 | (Optional) Allocate WildFire appliance resources to analyze either documents or executables.
If you are deploying a hybrid cloud to analyze specific file types locally and in the WildFire
public cloud, you can dedicate analysis environments to process a file type. This allows
you to better allocate resources according to your analysis environment configuration. If
you do not dedicate resources for an analysis environment, resources are allocated using
default settings.
admin@WF-500# set
| executables | default
software status
Forwarding decrypted SSL traffic for WildFire analysis is a WildFire best practice.
STEP 1 | Download one of the malware test files. You can select from PE, APK, MacOSX, and ELF.
Before downloading an encrypted WildFire sample malware file, you must temporarily
disable the *.wildfire.paloaltonetworks.com entry from the exclude from decryption list
on the Device > Certificate Management > SSL Decryption Exclusion page, otherwise
the sample will not download correctly. After conducting a verification test, be sure to re-
enable the *.wildfire.paloaltonetworks.com entry on the SSL decryption exclusion page.
• If you have SSL decryption enabled on the firewall, use one of the following URLs:
• PE—https://wildfire.paloaltonetworks.com/publicapi/test/pe
• APK—https://wildfire.paloaltonetworks.com/publicapi/test/apk
• MacOSX—https://wildfire.paloaltonetworks.com/publicapi/test/macos
• ELF—wildfire.paloaltonetworks.com/publicapi/test/elf
• If you do not have SSL decryption enabled on the firewall, use one of the following URLs instead:
• PE—http://wildfire.paloaltonetworks.com/publicapi/test/pe
• APK—http://wildfire.paloaltonetworks.com/publicapi/test/apk
• MacOSX—http://wildfire.paloaltonetworks.com/publicapi/test/macos
• ELF—wildfire.paloaltonetworks.com/publicapi/test/elf
The test file is named wildfire-test-file_type-file.exe and each test file has a unique SHA-256 hash value.
You can also use the WildFire API to retrieve a malware test file. See the WildFire API
Reference for details.
STEP 2 | On the firewall web interface, select Monitor > WildFire Submissions to confirm that the file
was forwarded for analysis.
Please wait at least five minutes for analysis results to be displayed for the file on the WildFire
Submissions page. The verdict for the test file will always display as malware.
The example output confirms that the firewall is connected to the WildFire private cloud, and is not
connected to the WildFire public cloud (public cloud registration fails).
If the firewall is configured in a hybrid cloud deployment, check that the firewall is successfully
registered with and connected to both the WildFire public cloud and a WildFire private cloud.
• Verify the status of the firewall connection to the WildFire public and/or private cloud,
including the total number of files forwarded by the firewall for analysis.
Use the show wildfire status command to:
• Check the status of the WildFire public and/or private cloud to which the firewall is connected. The
status Idle indicates that the WildFire cloud (public or private) is ready to receive files for analysis.
• Confirm the configured size limits for files forwarded by the firewall (Device > Setup > WildFire).
• Monitor file forwarding, including how the total count of files forwarded by the firewall for WildFire
analysis. If the firewall is in a WildFire hybrid cloud deployment, the number of files forwarded to the
WildFire public cloud and the WildFire private cloud are also displayed.
The following example shows the show wildfire status output for a firewall in a WildFire private
cloud deployment:
• View samples forwarded by the firewall according to file type (including email links).
Use this option to confirm that email links are being forwarded for WildFire analysis,
since only email links that receive a malicious or phishing verdict are logged as WildFire
Submissions entries on the firewall, even if logging for benign and grayware samples is
enabled. This is due to the sheer number of WildFire Submissions entries that would be
logged for benign email links.
Use the show wildfire statistics command to confirm the file types being forwarded to the
WildFire public or private cloud:
• The command displays the output of a working firewall and shows counters for each file type that the
firewall forwards for WildFire analysis. If a counter field shows 0, the firewall is not forwarding that
file type.
• Confirm that email links are being forwarded for analysis by checking that the following counters do
not show zero:
• FWD_CNT_APPENDED_BATCH—Indicates the number of email links added to a batch waiting for
upload to WildFire.
• FWD_CNT_LOCAL_FILE— Indicates the total number of email links uploaded to WildFire.
• Confirm that samples that have not yet received a WildFire verdict were correctly forwarded by
the firewall. Because WildFire Submissions are logged on the firewall only when WildFire analysis
is complete and the sample has received a WildFire verdict, use this option to verify the firewall
forwarded a sample that is currently undergoing WildFire analysis.
• Track the status for a single file or email link that was allowed according to your security policy,
matched to a WildFire Analysis profile, and then forwarded for WildFire analysis.
• Check that a firewall in a hybrid cloud deployment is forwarding the correct file types and email links
to either the WildFire public cloud or a WildFire private cloud.
Execute the following CLI commands on the firewall to view samples the firewall has forwarded WildFire
analysis:
• View all samples forwarded by the firewall with the CLI command debug wildfire upload-log.
• View only samples forwarded to the WildFire public cloud with the CLI command debug wildfire
upload-log channel public.
• View only samples forwarded to the WildFire private cloud with the CLI command debug
wildfire upload-log channel private.
The following example shows the output for the three commands listed above when issued on a firewall
in a WildFire public cloud deployment:
STEP 1 | Manually upload files or URLs to the WildFire portal for analysis.
1. Log in to the WildFire Portal.
2. Click Upload Sample on the menu bar.
• To submit files for analysis, select File Upload and Open the files you want to submit for WildFire
analysis.Click Start to begin WildFire analysis of a single file, or click Start Upload to submit all the
files you added for WildFire analysis.
• To submit a URL for analysis, click URL Upload, enter a URL, and Submit for WildFire analysis.
STEP 2 | View the WildFire verdict and analysis results for the file.
Please wait at least five minutes for WildFire to analyze the sample.
Because a manual upload is not associated with a specific firewall, manual uploads do
not show session information in the reports.
If the firewall that originally submitted the sample for WildFire private cloud analysis has
packet captures (PCAPs) enabled, the PCAPs for the malware will also be forwarded to
the WildFire public cloud.
If the WildFire appliance is enabled to Submit Malware to the WildFire Public Cloud, you
do not need to also enable the appliance to submit malware reports to the public cloud.
When malware is submitted to the WildFire public cloud, the public cloud generates a new
malware report for the sample.
To enable the WildFire appliance to automatically submit malware reports to the WildFire public cloud
(and not the malware sample), execute the following CLI command on the WildFire appliance:
STEP 1 | Create a text file with a list of SHA256 or MD5 hashes of the samples to be deleted. Each hash
must be on an individual line in the file and can include up to 100 samples.
Only files that are unique to your environment can be deleted. If files are found to be
available in other public or private feeds, only the session and upload data for a given
account is removed.
STEP 2 | Log in to the WildFire cloud using your Palo Alto Networks support credentials or your
WildFire account.
STEP 4 | Click Choose File and select the hash list text file that you created in step 1 and then Remove
Samples. You will receive a confirmation upon a successful file upload.
STEP 5 | After the samples are removed from the WildFire cloud, you will receive a confirmation email
with the details of the request. This includes a list of the samples that were requested to be
deleted, and the removal status of each sample. This process can take up to 7 days.
The speed at which the firewall can forward files to WildFire also depends on the bandwidth
of the upload link from the firewall.
VM-50 5 100MB
VM-100 10 100MB
VM-200 15 200MB
VM-300 25 200MB
VM-500 30 250MB
VM-700 40 250MB
PA-220 20 100MB
PA-820 75 300MB
PA-850 75 300MB
53
54 WILDFIRE ADMINISTRATOR'S GUIDE | Set Up and Manage a WildFire Appliance
© 2021 Palo Alto Networks, Inc.
About the WildFire Appliance
The WildFire appliance provides an on-premises WildFire private cloud, enabling you to analyze suspicious
files in a sandbox environment without requiring the firewall to sends files out of network. To use the
WildFire appliance to host a WildFire private cloud, configure the firewall to submit samples to the WildFire
appliance for analysis. The WildFire appliance sandboxes all files locally and analyzes them for malicious
behaviors using the same engine the WildFire public cloud uses. Within minutes, the private cloud returns
analysis results to the firewall WildFire Submissions logs.
You can enable a WildFire appliance to:
Locally generate antivirus and DNS signatures for discovered malware, and to assign a URL category
to malicious links. You can then enable connected firewalls to retrieve the latest signatures and URL
categories every five minutes.
Submit malware to the WildFire public cloud. The WildFire public cloud re-analyzes the sample and
generates a signature to detect the malware—this signature can be made available within minutes to
protect global users
Submit locally-generated malware reports (without sending the raw sample content) to the WildFire
public cloud, to contribute to malware statistics and threat intelligence.
You can configure up to 100 Palo Alto Networks firewalls, each with valid WildFire subscriptions, to
forward to a single WildFire appliance. Beyond the WildFire firewall subscriptions, no additional WildFire
subscription is required to enable a WildFire private cloud deployment.
You can manage WildFire appliances using the local appliance CLI, or you can centrally Manage WildFire
Appliances with Panorama. Starting with PAN-OS 8.0.1, you can also group WildFire appliances into
WildFire Appliance Clusters and manage the clusters locally or from Panorama.
STEP 2 | Connect a computer to the appliance using the MGT or Console port and power on the
appliance.
1. Connect to the console port or the MGT port. Both are located on the back of the appliance.
• Console Port—This is a 9-pin male serial connector. Use the following settings on the console
application: 9600-8-N-1. Connect the provided cable to the serial port on the management
computer or USB-To-Serial converter.
• MGT Port—This is an Ethernet RJ-45 port. By default, the MGT port IP address is 192.168.1.1.
The interface on your management computer must be on the same subnet as the MGT port. For
example, set the IP address on the management computer to 192.168.1.5.
2. Power on the appliance.
The appliance will power on as soon as you connect power to the first power supply
and a warning beep will sound until you connect the second power supply. If the
appliance is already plugged in and is in the shutdown state, use the power button on
the front of the appliance to power on.
The following output indicates that the appliance is registered with one of the Palo Alto Networks
WildFire cloud servers.
Test wildfire
Starting with PAN-OS 9.0.4, the predefined, default administrator password (admin/
admin) must be changed on the first login on a device. The new password must be
a minimum of eight characters and include a minimum of one lowercase and one
uppercase character, as well as one number or special character.
Be sure to use the best practices for password strength to ensure a strict password.
3. Type exit to log out and then log back in to confirm that the new password is set.
admin@WF-500> configure
2. Set the IP information:
Configure a secondary DNS server by replacing primary with secondary in the above
command, excluding the other IP parameters. For example:
admin@WF-500# commit
STEP 6 | Activate the appliance with the WildFire authorization code that you received from Palo Alto
Networks.
Though it will function without an auth-code, the WildFire appliance cannot retrieve
software or content updates without a valid auth-code.
admin@WF-500# exit
2. Fetch and install the WildFire license:
Information about the support site and the support contract date is displayed. Confirm that the date
displayed is valid.
The time stamp that will appear on the WildFire detailed report will use the time zone
set on the appliance. If administrators in various regions will view reports, consider
setting the time zone to UTC.
• To configure the WildFire appliance to synchronize with an NTP server, enter the following
commands:
admin@WF-500> configure
admin@WF-500# set deviceconfig system ntp-servers primary-ntp-server ntp-
server-address <NTP primary server IP address>
admin@WF-500# set deviceconfig system ntp-servers secondary-ntp-server
ntp-server-address <NTP secondary server IP address>
The WildFire appliance does not prioritize the primary or secondary NTP server; it
synchronizes with either server.
Continue to enter the key-ID (1 - 65534), choose the algorithm to use in NTP authentication (MD5
or SHA1), and then enter and confirm the authentication algorithm authentication-key.
• Use autokey (public key cryptography) to authenticate the NTP server time updates:
STEP 9 | Choose the virtual machine image for the appliance to use to analyze files.
The image should be based on the attributes that most accurately represent the software installed
on your end user computers. Each virtual image contains different versions of operating systems and
software, such as Windows XP or Windows 7 32-bit or 64-bit and specific versions of Adobe Reader,
and Flash. Although you configure the appliance to use one virtual machine image configuration, the
appliance uses multiple instances of the image to improve performance.
• To view a list of available virtual machines to determine which one best represents your environment:
STEP 10 | Enable the WildFire appliance to observe malicious behaviors where the file being analyzed
seeks network access.
Set Up the WildFire Appliance VM Interface.
STEP 11 | (Optional) Enable the WildFire appliance to perform quick verdict lookups and synchronize
verdicts with the WildFire public cloud.
STEP 12 | (Optional) Enable the WildFire appliance to get daily Palo Alto Networks content updates to
facilitate and improve malware analysis.
Enable WildFire Appliance Analysis Features
STEP 13 | (Optional) Enable the WildFire appliance to generate DNS and antivirus signatures and URL
categories, and to distribute new signatures and URL categorizations to connected firewalls.
Enable Local Signature and URL Category Generation
STEP 14 | (Optional) Automatically submit malware the WildFire private cloud discovers to the WildFire
public cloud, to support global protection against the malware.
Submit Malware to the WildFire Public Cloud..
STEP 15 | (Optional) If you do not want to forward malware samples outside of the WildFire private
cloud, instead submit WildFire analysis reports to the WildFire public cloud.
If you do not want to submit locally-discovered malware to the WildFire public cloud, it
is a best practice to enable malware analysis report submissions to improve and refine
WildFire threat intelligence.
admin@WF-500> configure
2. Create the user account:
STEP 1 | Obtain key pairs and certificate authority (CA) certificates for the WildFire appliance and
firewall or Panorama.
STEP 2 | Import the CA certificate to validate the certificate one the firewall.
1. Log in to the CLI on the WildFire appliance and enter configuration mode.
admin@WF-500> configure
2. Use TFTP or SCP to import the certificate.
STEP 3 | Use TFTP or SCP to import the keypair that contains the server certificate and private key for
the WildFire appliance.
STEP 4 | Configure a certificate profile that includes the root CA and intermediate CA. This certificate
profile defines how the WildFire appliance and the firewalls will authenticate mutually.
1. In the CLI of the WildFire appliance, enter configuration mode.
admin@WF-500> configure
2. Name the certificate profile.
STEP 5 | Configure an SSL/TLS profile for the WildFire appliance. This profile defines the certificate and
SSL/TLS protocol range that WildFire appliance and firewalls use for SSL/TLS services.
1. Identify the SSL/TLS profile.
PAN-OS 8.0 and later releases support TLS 1.2 and later TLS versions only. You must
set the max version to TLS 1.2 or max.
• While it is recommended that you enable the VM interface, it is very important that you
do not connect the interface to a network that allows access to any of your servers/hosts
because malware that runs in the WildFire virtual machines could potentially use this
interface to propagate itself.
• This connection can be a dedicated DSL line or a network connection that only allows
direct access from the VM interface to the Internet and restricts any access to internal
servers/client hosts.
• The VM interface on WildFire appliances operating in FIPS/CC mode is disabled.
The following illustration shows two options for connecting the VM interface to the network.
STEP 1 | Set the IP information for the VM interface on the WildFire appliance. The following IPv4
values are used in this example, but the appliance also supports IPv6 addresses:
• IP address - 10.16.0.20/22
• Subnet Mask - 255.255.252.0
• Default Gateway - 10.16.0.1
• DNS Server - 10.0.0.246
The VM interface cannot be on the same network as the management interface (MGT).
admin@WF-500> configure
2. Set the IP information for the VM interface:
admin@WF-500# set
deviceconfig system vm-interface ip-address 10.16.0.20 netmask
255.255.252.0
default-gateway 10.16.0.1 dns-server 10.0.0.246
You can only configure one DNS server on the VM interface. As a best practice, use
the DNS server from your ISP or an open DNS service.
admin@WF-500# set
deviceconfig setting wildfire vm-network-enable yes
2. Commit the configuration:
admin@WF-500# commit
admin@WF-500> ping
source 10.16.0.20 host ip-or-hostname
For example:
admin@WF-500> ping
source 10.16.0.20 host 10.16.0.1
admin@WF-500# set
deviceconfig setting wildfire vm-network-use-tor
2. Commit the configuration:
admin@WF-500# commit
STEP 5 | (Optional) Verify that the Tor network connection is active and healthy.
1. Issue the following CLI commands to search for Tor event IDs in the appliance logs. A properly
configured and operational WildFire appliance should not generate any event IDs:
• admin@WF-500(active-controller)>showlog system direction equal backward
| match anonymous-network-unhealthy—The Tor service is down or otherwise non-
operational. Consider restarting your Tor service and verify that it is operating properly.
• admin@WF-500(active-controller)>show log systemdirection equal backward
| match anonymous-network-unavailable—The Tor service is operating normally but
the WildFire appliance VM interface is unable to establish a connection. Verify your network
connections and settings and re-test.
STEP 1 | Configure the interface on the firewall that the VM interface will connect to and set the virtual
router.
The wf-vm-zone should only contain the interface (ethernet1/3 in this example) used to
connect the VM interface on the appliance to the firewall. This is done to avoid having any
traffic generated by the malware from reaching other networks.
1. From the web interface on the firewall, select Network > Interfaces and then select an interface, for
example Ethernet1/3.
2. In the Interface Type drop-down, select Layer3.
3. On the Config tab, from the Security Zone drop-down box, select New Zone.
4. In the Zone dialog Name field, enter wf-vm-zone and click OK.
5. In the Virtual Router drop-down box, select default.
6. To assign an IP address to the interface, select the IPv4 or IPv6 tab, click Add in the IP section, and
enter the IP address and network mask to assign to the interface, for example 10.16.0.0/22 (IPv4) or
2001:db8:123:1::1/64 (IPv6).
7. To save the interface configuration, click OK.
If there are concerns that someone might inadvertently add other interfaces to the wf-
vm-zone, clone the WildFire VM Interface security policy and then in the Action tab
for the cloned rule, select Deny. Make sure this new security policy is listed below the
WildFire VM interface policy. This will override the implicit intra-zone allow rule that
allows communications between interfaces in the same zone and will deny/block all
intra-zone communication.
The command queries the Palo Alto Networks Update Server and provides information about
available updates and identifies the version that is currently installed on the appliance.
If the appliance cannot connect to the update server, you will need to allow connectivity from the
appliance to the Palo Alto Networks Update Server (updates.paloaltonetworks.com), or download
and install the update using SCP as described in Install WildFire Content Updates from an SCP-
Enabled Server.
You can run show jobs pending to view pending jobs. The following output shows that the
download (job id 5) has finished downloading (Status FIN):
Run the show jobs all command again to monitor the status of the install.
The following shows an example output with content update version 2-253 installed:
admin@WF-500# commit
STEP 1 | Retrieve the content update file from the update server.
1. Log in to the Palo Alto Networks Support Portal and click Dynamic Updates.
2. In the WildFire Appliance section, locate the latest WildFire appliance content update and download
it.
3. Copy the content update file to an SCP-enabled server and note the file name and directory path.
For example:
If your SCP server is running on a non-standard port or if you need to specify the
source IP, you can also define those options in the scp import command.
2. Install the update:
Even if you’re using the WildFire appliance for local file analysis, you can also enable
connected firewalls to receive the latest signatures distributed by the WildFire public cloud.
admin@WF-500# set
deviceconfig setting wildfire signature-generation av yes dns yes
url yes
3. Commit the configuration:
admin@WF-500# commit
You can display the status of a signature for signatures generated in the WildFire 8.0.1
or later environment using the command:
admin@WF-500# show
wildfire global signature-status sha256 equal <sha-256
value>
WildFire appliances cannot display the status for signatures generated before the upgrade to
WildFire 8.0.1.
STEP 3 | Set the schedule for connected firewalls to retrieve the signatures and URL categories the
WildFire appliance generates.
It is a best practice to configure your firewalls to retrieve content updates from both the
WildFire public cloud and WildFire appliance. This ensures that your firewalls receive
If the firewall that originally submitted the sample for WildFire private cloud analysis
has packet captures (PCAPs) enabled, the PCAPs for the malware will also be
forwarded to the WildFire public cloud.
2. Go to the WildFire portal to view analysis reports for malware automatically submitted to the
WildFire public cloud. When malware is submitted to the WildFire public cloud, the public cloud
generates a new analysis report for the sample.
If you have enabled the WildFire appliance to automatically submit malware to the
WildFire public cloud, you do not need to enable this option—the WildFire public cloud will
generate a new analysis report for the sample.
STEP 1 | If you’re setting up a WildFire appliance for the first time, start by configuring the WildFire
appliance.
admin@WF-500> show
wildfire latest samples
If you do not want to wait for the WildFire appliance to finish analyzing recently-
submitted samples, you can continue to the next step. However, consider that the
WildFire appliance then drops pending samples from the analysis queue.
admin@WF-500> request
wf-content upgrade install version latest
If you do not have direct connectivity to the Palo Alto Networks Update Server, you can download and
Install WildFire Content Updates from an SCP-Enabled Server.
STEP 4 | Download the PAN-OS 10.0 software version to the WildFire appliance.
You cannot skip any major release versions when upgrading the WildFire appliance. For example, if you
want to upgrade from PAN-OS 6.1 to PAN-OS 7.1, you must first download and install PAN-OS 7.0.
The examples in this procedure demonstrate how to upgrade to PAN-OS 10.0. Replace 10.0 with the
appropriate target release for your upgrade.
admin@WF-500>
show jobs all
• Without Internet Connectivity:
1. Navigate to the Palo Alto Networks Support site and in the Tools section, click on Software
Updates.
2. Download the WildFire appliance software image file to be installed to a computer running SCP
server software.
3. Import the software image from the SCP server:
admin@WF-500>
scp import software from <username@ip_address>/<folder_name>/
<imagefile_name>
For example:
admin@WF-500>
show jobs all
admin@WF-500> show
system software status
admin@WF-500> request
system software install version 10.0.0
admin@WF-500> show
jobs all
Enqueued Dequeued ID Type Status Result Completed
---------------------------------------------------
admin@WF-500> request
restart system
The upgrade process could take 10 minutes or over an hour, depending on the
number of samples stored on the WildFire appliance.
STEP 8 | Check that the WildFire appliance is ready to resume sample analysis.
1. Verify that the sw-version field shows 10.0:
admin@WF-500> show
system info | match sw-version
2. Confirm that all processes are running:
admin@WF-500> show
system software status
3. Confirm that the auto-commit (AutoCom) job is complete:
admin@WF-500> show
jobs all
STEP 9 | (Optional) Enable the VM image the WildFire appliance uses to perform analysis. Each available
VM image represents a single operating system, and supports several different analysis
environments based on that operating system.
If your network environment has a mix of Windows 7 32-bit and Windows 7 64-bit
systems, it is recommended that you choose the Windows 7 64-bit image, so WildFire will
analyze both 32-bit and 64-bit PE files.
• View the active virtual machine image by running the following command and refer to the
SelectedVM field:
admin@WF-500> show
wildfire status
• View a list of available virtual machines images:
admin@WF-500> show
wildfire vm-images
The following output shows that vm-5 is the Windows 7 64-bit image:
vm-5 Windows 7 64bit, Adobe Reader 11, Flash 11, Office 2010. Support PE,
PDF, Office 2010 and earlier
• Set the image to be used for analysis:
admin@WF-500# set
admin@WF-500# set
deviceconfig setting wildfire active-vm vm-5
admin@WF-500# commit
The AutoFocus threat intelligence portal provides a different lens through which to view
WildFire analysis details for a sample. AutoFocus layers statistics over WildFire analysis data to
indicate high-risk artifacts found during sample analysis (such as an IP address or a domain).
81
82 WILDFIRE ADMINISTRATOR'S GUIDE | Monitor WildFire Activity
© 2021 Palo Alto Networks, Inc.
About WildFire Logs and Reporting
You can Monitor WildFire Activity on the firewall, with the WildFire portal, or with the WildFire API.
For each sample WildFire analyzes, WildFire categorizes the sample as malware, phishing, grayware, or
benign and details sample information and behavior in the WildFire analysis report. WildFire analysis
reports can be found on the firewall that submitted the sample and the WildFire cloud (public or private)
that analyzed the sample, or can be retrieved using the WildFire API:
• On the firewall—All samples submitted by a firewall for WildFire analysis are logged as WildFire
Submissions entries (Monitor > WildFire Submissions). The Action column in the WildFire Submissions
log indicates whether a file was allowed or blocked by the firewall. For each WildFire submission entry
you can open a detailed log view to view the WildFire analysis report for the sample or to download the
report as a PDF.
• On the WildFire portal—Monitor WildFire activity, including the WildFire analysis report for each
sample, which can also be downloaded as a PDF. In a WildFire private cloud deployment, the WildFire
portal provides details for samples that are manually uploaded to the portal and samples submitted by a
WildFire appliance with cloud intelligence enabled.
The option to view WildFire analysis reports on the portal is only supported for WildFire
appliances with the cloud intelligence feature is enabled.
• With the WildFire API—Retrieve WildFire analysis reports from a WildFire appliance or from the
WildFire public cloud.
STEP 1 | Select Device > Setup > WildFire, edit General Settings.
STEP 2 | Select Report Benign Files and/or Report Grayware Files and click OK to save the settings.
Session information can help you to quickly track down and remediate threats detected in
email attachments or links, including how to identify recipients who have downloaded or
accessed malicious content.
STEP 2 | Edit the Session Information Settings section and enable one or more of the options (Email
sender, Email recipient, and Email subject).
STEP 3 | To view samples submitted by a firewall to a WildFire public, private, or hybrid cloud, select
Monitor > Logs > WildFire Submissions. When WildFire analysis of a sample is complete,
the results are sent back to the firewall that submitted the sample and are accessible in the
WildFire Submissions logs. The submission logs include details about a given sample, including
the following information:
• The Verdict column indicates whether the sample is benign, malicious, phishing, or grayware.
• The Action column indicates whether the firewall allowed or blocked the sample.
• The Severity column indicates how much of a threat a sample poses to an organization using the
following values: critical, high, medium, low, and informational.
The values for the following severity levels are determined by a combination of verdict
and action values.
• Low—Grayware samples with the action set to allow.
• High—Malicious samples with the action set to allow.
• Informational:
• Benign samples with the action set to allow.
• Samples with any verdict with the action set to block.
STEP 4 | For any entry, select the Log Details icon to open a detailed log view for each entry:
The detailed log view displays Log Info and the WildFire Analysis Report for the entry. If the firewall has
packet captures (PCAPs) enabled, the sample PCAPs are also displayed.
STEP 3 | Configure a log forwarding profile to enable WildFire logs to be forwarded to Panorama, an
email account, SNMP, a syslog server, and as HTTP requests.
In this example you will set up email logs for when a sample is determined to be malicious. You can also
enable Benign and Grayware logs to be forwarded, which will produce more activity if you are testing.
The firewall does not forward WildFire logs for blocked files to an email account.
STEP 4 | Add the log forwarding profile to a security policy being used for WildFire forwarding (with a
WildFire Analysis profile attached).
The WildFire Analysis profile defines the traffic that the firewall forwards for WildFire analysis. To set up
a WildFire analysis profile and attach it to a security policy rule, see Forward Files for WildFire Analysis.
1. Select Policies > Security and click on the policy that is used for WildFire forwarding.
2. In the Actions tab Log Setting section, select the Log Forwarding profile you configured.
3. Click OK to save the changes and then Commit the configuration.
STEP 2 | Configure the time zone for the WildFire cloud account.
Select a time zone from the Set Time Zone drop-down and Update Time Zone to save the change.
The time stamp that appears on WildFire analysis reports is based on the time zone
configured for the WildFire cloud account.
STEP 3 | (Optional) Delete WildFire logs hosted on the cloud for specific firewalls.
1. In the Delete WildFire Reports drop-down, select a firewall (by serial number) and Delete Reports
to remove logs for that firewall from WildFire portal. This action does not delete logs stored on the
firewall.
2. Click OK to proceed with the deletion.
The WildFire portal does not send alerts for blocked files that the firewall forwarded for
WildFire analysis.
1. In the Configure Alerts section, select Malware, Phishing, Grayware, and/or Benign check boxes to
receive email notifications based on those verdicts:
• Select the verdict check boxes in the All row to receive verdict notifications for all samples
uploaded to the WildFire cloud.
• Select the verdict check boxes in the Manual row to receive verdict notifications for all samples
that are manually uploaded to the WildFire public cloud using the WildFire portal.
STEP 1 | Select the account for which you want to add users who can access the WildFire portal.
WildFire portal users can view data for all firewalls associated with the support account.
1. Log in to the Palo Alto Networks Support Portal.
2. Under Manage Account, click on Users and Accounts.
3. Select an existing account or sub-account.
The only restriction when adding a user is that the email address cannot be from
a free web-based email account (such as Gmail, Hotmail, and Yahoo). If an email
address is entered for a domain that is not supported, a pop-up warning is displayed.
STEP 3 | Assign firewalls to the new user account and access the WildFire cloud.
Select the firewall(s) by serial number for which you want to grant access and fill out the optional
account details.
Users with an existing support account will receive an email with a list of the firewalls that are now
available for WildFire report viewing. If the user does not have a support account, the portal sends an
email with instructions on how to access the portal and how to set a new password.
The new user can now log in to the WildFire cloud and view WildFire reports for the firewalls to which
they have been granted access. Users can also configure automatic email alerts for these devices in
order to receive alerts on files analyzed. They can choose to receive reports on malicious and/or benign
files.
STEP 1 | Access the CLI and one of the following commands based on the analysis environment for
which you want to see utilization statistics for.
• Portable Executable Analysis Environment Utilization—showwildfire wf-vm-pe-utilization
• Document Analysis Environment Utilization—showwildfire wf-vm-doc-utilization
• Email Link Analysis Environment Utilization—showwildfire wf-vm-elinkda-utilization
• Archive Analysis Environment Utilization—showwildfire wf-vm-archive-utilization
For a given analysis environment, the appliance indicates how many are in use and how many are
available:
{
available: 2,
in_use: 1,
}
STEP 2 | View the number and breakdown of WildFire appliance samples that are waiting to be
analyzed. Samples are processed as analysis environments become available.
show wildfire wf-sample-queue-status
{
DW-ARCHIVE: 4,
DW-DOC: 2,
DW-ELINK: 0,
DW-PE: 21,
DW-URL_UPLOAD_FILE: 2,
}
STEP 1 | View the number of samples processed locally within a specified timespan or based on a
maximum number of samples.
show wildfire local sample-processed {time [last-12-hrs | last-15-minutes |
last-1-hr | last-24-hrs | last-30-days | last-7-days | last-calender-day |
last-calender-month] \ count <number_of_samples>}.
STEP 2 | Identify the device(s) that submitted a specified sample for WildFire analysis.
show wildfire global sample-device-lookup sha256 equal <SHA_256>.
Sample 1024609813c57fe174722c53b3167dc3cf5583d5c7abaf4a95f561c686a2116e
last seen on following devices:
+------------------------------------------------------------------
+-----------+-----------+---------------------+
| SHA256 |
Device ID | Device IP | Submitted Time |
+------------------------------------------------------------------
+-----------+-----------+---------------------+
| 1024609813c57fe174722c53b3167dc3cf5583d5c7abaf4a95f561c686a2116e |
Manual | Manual | 2019-08-05 19:24:39 |
+------------------------------------------------------------------
+-----------+-----------+---------------------+
STEP 1 | Launch the terminal emulation software and select the type of connection (Serial or SSH).
• To establish an SSH connection, enter the WildFire hostname or IP address of the device you want to
connect to and set the port to 22.
• To establish a Serial connection, connect a serial interface on management computer to the Console
port on the device. Configure the Serial connection settings in the terminal emulation software as
follows:
• Data rate: 9600
• Data bits: 8
• Parity: none
• Stop bits: 1
• Flow control: none
When viewing a WildFire report for a file that was manually uploaded to the WildFire portal
or by using the WildFire API, the report will not show session information because the traffic
did not traverse the firewall. For example, the report would not show the Attacker/Source and
Victim/Destination.
File Information • File Type—Flash, PE, PDF, APK, JAR/Class, archive, linux, script, or MS
Office. This field is named URL for HTTP/HTTPS email link reports
and will display the URL that was analyzed.
• File Signer—The entity that signed the file for authenticity purposes.
• Hash Value—A file hash is much like a fingerprint that uniquely
identifies a file to ensure that the file has not been modified in any
way. The following lists the hash versions that WildFire generates for
each file analyzed:
• SHA-1—Displays the SHA-1 value for the file.
• SHA-256—Displays the SHA-256 value for the file.
• MD5—Displays the MD5 information for the file.
• File Size—The size (in bytes) of the file that WildFire analyzed.
• First Seen Timestamp—If the WildFire system has analyzed the file
previously, this is the date/time that it was first observed.
• Verdict—Displays analysis verdicts.
• Sample File—Click the Download File link to download the sample file
to your local system. Note that you can only download files with the
malware verdict, not benign.
Coverage Status Click the Virus Total link to view endpoint antivirus coverage information
for samples that have already been identified by other vendors. If the file
has never been seen by any of the listed vendors, file not found appears.
In addition, when the report is rendered on the firewall, up-to-date
information about what signature and URL filtering coverage that Palo
Alto Networks currently provides to protect against the threat will
also be displayed in this section. Because this information is retrieved
dynamically, it will not appear in the PDF report.
The following coverage information is provided for active signatures:
• Coverage Type—The type of protection provided by Palo Alto
Networks (virus, DNS, WildFire, or malware URL).
• Signature ID—A unique ID number assigned to each signature that
Palo Alto Networks provides.
Session Information Contains session information based on the traffic as it traversed the
firewall that forwarded the sample. To define the session information that
WildFire will include in the reports, select Device > Setup > WildFire >
Session Information Settings.
The following options are available:
• Source IP
• Source Port
• Destination IP
• Destination Port
• Virtual System (If multi-vsys is configured on the firewall)
• Application
• User (If User-ID is configured on the firewall)
• URL
• Filename
• Email sender
• Email recipient
• Email subject
By default, session information includes the field Status, which indicates
if the firewall allowed or blocked the sample.
Dynamic Analysis If a file is low risk and WildFire can easily determine that it is safe, only
static analysis is performed on the file, instead of dynamic or bare metal
Files analysis.
analyzed
When dynamic or bare metal analysis is performed, this section contains
using bare
tabs showing analysis results for each environment type that the sample
metal are
was run in. For example, the Virtual Machine 1 tab might show an
shown as
analysis environment operating Windows XP, Adobe Reader 9.3.3, and
a virtual
Office 2003 and Virtual Machine 3 might have similar attributes, but
machine
running in a bare metal environment. Samples are analyzed using bare
configuration
metal in addition to dynamic analysis if it displays characteristics of an
under
advanced VM-aware threat.
dynamic
analysis.
On the WildFire appliance, only one virtual machine
is used for the analysis, which you select based on
analysis environment attributes that best match your local
environment. For example, if most users have Windows 7
32-bit, that virtual machine would be selected.
Behavior Summary Each Virtual Machine tab summarizes the behavior of the sample file in
the specific environment. Examples include whether the sample created
or modified files, started a process, spawned new processes, modified the
registry, or installed browser helper objects.
Submit Malware Use this option to manually submit the sample to Palo Alto Networks.
The WildFire cloud will then re-analyze the sample and generate a
signatures if it determines that the sample is malicious. This is useful
on a WildFire appliance that does not have signature generation or
cloud intelligence enabled, which is used to forward malware from the
appliance to the WildFire cloud.
Report an Incorrect Verdict Click this link to submit the sample to the Palo Alto Networks threat team
if you feel the verdict is a false positive or false negative. The threat team
will perform further analysis on the sample to determine if it should be
reclassified. If a malware sample is determined to be safe, the signature
for the file is disabled in an upcoming antivirus signature update or if a
benign file is determined to be malicious, a new signature is generated.
After the investigation is complete, you will receive an email describing
the action that was taken.
99
100 WILDFIRE ADMINISTRATOR'S GUIDE | WildFire Appliance Clusters
© 2021 Palo Alto Networks, Inc.
WildFire Appliance Cluster Resiliency and
Scale
WildFire appliance clusters aggregate the sample analysis and storage capacity of up to twenty WildFire
appliances so that you can support large firewall deployments on a single network. You have the flexibility
to manage and Configure a Cluster Locally on WildFire Appliances using the CLI, or manage and Configure
a Cluster Centrally on Panorama M-Series or virtual appliance servers. A WildFire appliance cluster
environment includes:
• From 2 to 20 WildFire appliances that you want to group and manage as a cluster. At a minimum, a
cluster must have two WildFire appliances configured in a high-availability (HA) pair.
• Firewalls that forward samples to the cluster for traffic analysis and signature generation.
• (Optional) One or two Panorama appliances for centralized cluster management if you choose not to
manage the cluster locally. To provide HA, use two Panorama appliances configured as an HA pair.
Each WildFire appliance you add to a WildFire appliance cluster becomes a node in that cluster (as opposed
to a standalone WildFire appliance). Panorama can manage up to 10 WildFire appliance clusters with a total
of 200 WildFire cluster nodes (10 clusters, each with the maximum of 20 nodes).
Benefit Description
Scale A WildFire appliance cluster increases the analysis throughput and storage
capacity available on a single network so that you can serve a larger network
of firewalls without segmenting your network.
High availability If a cluster node goes down, HA configuration provides fault tolerance to
prevent the loss of critical data and services. If you manage clusters centrally
using Panorama, Panorama HA configuration provides central management
fault tolerance.
Single signature All firewalls connected to a cluster receive the same signature package,
package distribution regardless of the cluster node that received or analyzed the data. The
signature package is based on the activity and results of all cluster members,
which means that each connected firewall benefits from the combined cluster
knowledge.
Centralized You save time and simplify the management process when you use Panorama
management to manage WildFire appliance clusters. Instead of using the CLI and scripting
(Panorama) to manage a WildFire appliance or cluster, Panorama provides a single-
pane-of-glass view of your network devices. You can also push common
configurations, configuration updates, and software upgrades to multiple
WildFire appliance clusters, and you can do all of this using the Panorama
web interface instead of the WildFire appliance CLI.
Load balancing When a cluster has two or more active nodes, the cluster automatically
distributes and load balances analysis, report generation, signature creation,
storage, and WildFire content distribution among the nodes.
Do not configure a cluster with only one controller node. Each cluster should have an HA
controller pair. A cluster should have a single controller node only in temporary situations, for
example, when you swap controller nodes or if a controller node fails.
In a two-node cluster HA pair, if one controller node fails, the other controller node cannot process
samples. For the remaining cluster node to process samples, you must configure it to function as a
standalone WildFire appliance: delete the HA and cluster configurations on the remaining cluster node and
reboot the node. The node comes back up as a standalone WildFire appliance.
Three-node clusters operate a HA pair with the addition of server node to provide additional redundancy.
The server operates the same database and server infrastructure services as a controller, but does not
generate signatures. This deployment enables the cluster to function if a controller node fails.
Additional nodes that are added to a WildFire cluster function as a worker or server node. The third node is
automatically configured as a server, while each subsequent addition is added as a worker.
Category Description
Cluster operation and Configure all cluster nodes identically to ensure consistency in analysis and
configuration appliance-to-appliance communication:
• All cluster nodes must run the same version of PAN-OS (PAN-OS 8.0.1
or later). Panorama must run the same software version as the cluster
nodes or a newer version. Firewalls can run the same software versions
that enable them to submit samples to a WildFire appliance. Firewalls do
not require a particular software version to submit samples to a WildFire
appliance cluster.
• Cluster nodes inherit their configuration from the controller node, with
the exception of interface configuration. Cluster members monitor the
controller node configuration and update their own configurations when
the controller node commits an updated configuration. Worker nodes
inherit settings such as content update server settings, WildFire cloud
server settings, the sample analysis image, sample data retention time
frames, analysis environment settings, signature generation settings, log
settings, authentication settings, and Panorama server, DNS server, and
NTP server settings,
• When you manage a cluster with Panorama, the Panorama appliance
pushes a consistent configuration to all cluster nodes. Although you can
change the configuration locally on a WildFire appliance node, Palo Alto
Networks does not recommend that you do this, because the next time
the Panorama appliance pushes a configuration, it replaces the running
configuration on the node. Local changes to cluster nodes that Panorama
manages often cause Out of Sync errors.
• If the cluster node membership list differs on the two controller nodes,
the cluster generates an Out of Sync warning. To avoid a condition where
both controller nodes continually update the out-of-sync membership
list for the other node, cluster membership enforcement stops. When
this happens, you can synchronize the cluster membership lists from the
local CLI on the controller and controller backup nodes by running the
operational command request high-availability sync-to-
remote running-configuration. If there is a mismatch between
the primary controller node’s configuration and the configuration on
the controller backup node, the configuration on the primary controller
node overrides the configuration on the controller backup node. On each
controller node, run show cluster all-peers and compare and
correct the membership lists.
• A cluster can have only two controller nodes (primary and backup);
attempts to locally add a third controller node to a cluster fail. (The
Panorama web interface automatically prevents you from adding a third
controller node.) The third and all subsequent nodes added to a cluster
must be worker nodes.
• A characteristic of HA configurations is that the cluster distributes and
retains multiple copies of the database, queuing services, and sample
Cluster data retention Data retention policies determine how long the WildFire appliance cluster
policies stores different types of samples.
• Benign and grayware samples—The cluster retains benign and grayware
samples for 1 to 90 days (default is 14).
• Malicious samples—The cluster retains malicious samples for a minimum
of 1 day (default is indefinite—never deleted). Malicious samples may
include phishing verdict samples.
Configure the same data retention policy throughout a cluster (4 in Configure
General Cluster Settings Locally or 4in Configure General Cluster Settings on
Panorama).
Dedicated cluster The dedicated cluster management interface enables the controller nodes to
management interface manage the cluster and is a different interface than the standard management
interface (Ethernet0). Panorama enforces configuring a dedicated cluster
management interface.
DNS You can use the controller node in a WildFire appliance cluster as the
authoritative DNS server for the cluster. (An authoritative DNS server serves
the actual IP addresses of the cluster members, as opposed to a recursive
DNS server, which queries the authoritative DNS server and passes the
requested information to the host that made the initial request.)
Firewalls that submit samples to the WildFire appliance cluster should send
DNS queries to their regular DNS server, for example, an internal corporate
DNS server. The internal DNS server forwards the DNS query to the WildFire
appliance cluster controller (based on the query’s domain). Using the cluster
controller as the DNS server provides many advantages:
• Automatic load balancing—When the cluster controller resolves the
service advertisement hostname, the host cluster nodes are in a random
order, which has the effect of organically balancing the load on the nodes.
• Fault tolerance—If one cluster node fails, the cluster controller
automatically removes it from the DNS response, so firewalls send new
requests to nodes that are up and running.
• Flexibility and ease of management—When you add nodes to the cluster,
because the controller updates the DNS response automatically, you don’t
need to make any changes on the firewall and requests automatically go to
the new nodes as well as the previously existing nodes.
Although the DNS record should not be cached, for troubleshooting, if the
DNS lookup succeeds, the TTL is 0. However, when the DNS lookup returns
NXDOMAIN, the TTL and “minimum TTL” are both 0.
Administration You can administer WildFire clusters using the local WildFire CLI or through
Panorama. There are two administrative roles available locally on WildFire
cluster nodes:
• Superreader—Read-only access.
• Superuser—Read and write access.
Firewall registration WildFire appliance clusters push a registration list that contains all of the
nodes in a cluster to every firewall connected to a cluster node. When you
register a firewall with an appliance in a cluster, the firewall receives the
registration list. When you add a standalone WildFire appliance that already
has connected firewalls to a cluster so that it becomes a cluster node, those
firewalls receive the registration list.
If a node fails, the connected firewalls use the registration list to register with
the next node on the list.
Data Migration To provide data redundancy, WildFire appliance nodes in a cluster share
database, queuing service, and sample submission content, however the
precise location of this data depends on the cluster topology. As a result,
WildFire appliances in a cluster undergo data migration or data rearrangement
whenever topology changes are made. Topology changes include adding and
removing nodes, as well as changing the role of a pre-existing node. Data
migration can also occur when databases are converted to a newer version, as
with the upgrade from WildFire 7.1 to 8.0.
STEP 1 | Upgrade your WildFire appliances locally to PAN-OS 8.0.1 or later, the minimum supported
release to operate clusters.
STEP 6 | (Optional) Upgrade the WildFire appliances that are already enrolled in a cluster.
• Upgrade a Cluster Locally with an Internet Connection
• Upgrade a Cluster Locally without an Internet Connection
• Upgrade a Cluster Centrally on Panorama withan Internet Connection
• Upgrade a Cluster Centrally on Panorama withoutan Internet Connection
To create WildFire appliance clusters, you must upgrade all of the WildFireappliances that
you want to place in a cluster to PAN-OS 8.0.1 or later. On each WildFire appliance that you
want to add to a cluster, run show system info | match version on the WildFire
appliance CLI to ensure that the appliance is running PAN-OS 8.0.1 or later.
When your WildFire appliances are available, perform the appropriate tasks:
• Configure a Cluster and Add Nodes Locally
• Configure General Cluster Settings Locally
• Remove a Node from a Cluster Locally
STEP 1 | Ensure that each WildFire appliance that you want to add to the cluster is running PAN-OS
8.0.1 or later.
On each WildFire appliance, run:
STEP 2 | Verify that the WildFire appliances are not analyzing samples and are in standalone state (not
members of another cluster).
1. On each appliance, display whether the appliance is analyzing samples:
No sample should show as pending. All samples should be in a finished state. If samples are
pending, wait for them to finish analysis. Pending samples display separately from malicious and
non-malicious samples. Finish Date displays the date and time the analysis finished.
2. On each appliance, verify that the all processes are running:
The highlighted lines show that the node is in standalone mode and is ready to be converted from a
standalone appliance to a cluster node.
admin@WF-500# commit
The prompt (active-controller) and the highlighted Application status lines show that the
node is in controller mode, is ready, and is the primary controller node.
The prompt (passive-controller) and the highlighted Application status lines show that the
node is in controller mode, is ready, and is the backup controller node.
STEP 9 | Manually synchronize the high availability configurations on the controller nodes.
Synchronizing the controller nodes ensures that the configurations match and should only need to be
done one time. After the high availability configurations are synchronized, the controller nodes keep the
configurations synchronized and you do not need to synchronize them again.
1. On the primary controller node, synchronize the high availability configuration to the remote peer
controller node:
If there is a mismatch between the primary controller node’s configuration and the configuration
on the controller backup node, the configuration on the primary controller node overrides the
configuration on the controller backup node.
2. Commit the configuration:
admin@WF-500# commit
To verify firewall-related information, you must first connect at least one firewall to a
cluster node by selecting Device > Setup > WildFire and editing the General Settings to
point to the node.
1. Display the cluster peers to ensure that both controllers are cluster members:
admin@WF-500(active-controller)> configure
admin@WF-500(active-controller)# set deviceconfig cluster mode controller
worker-list <ip>
The <ip> is the cluster management interface IP address of the worker node you want to add to the
cluster. Use separate commands to add each worker node to the cluster.
2. Commit the configuration the controller node:
admin@WF-500(active-controller)# commit
3. On the WildFire appliance you want to convert to a cluster worker node, configure the cluster to join,
set the cluster communications interface, and place the appliance in worker mode:
admin@WF-500> configure
admin@WF-500# set deviceconfig cluster cluster-name <name> interface eth2
mode worker
The cluster communications interface must be the same interface specified for intracluster
communications on the controller nodes. In this example, eth2 is the interface configured on the
controller nodes for cluster communication.
4. Commit the configuration on the worker node:
admin@WF-500# commit
5. Wait for all services to come up on the worker node. Run show cluster membership and check
the Applicationstatus, which shows all services and the siggen-db in a Ready state when all
services are up.
6. On either cluster controller node, check to ensure that the worker node was added:
The worker node you added appears in the list of cluster nodes. If you accidentally added the wrong
WildFire appliance to a cluster, you can Remove a Node from a Cluster Locally.
STEP 1 | Configure the general settings for the WildFire cluster. This process is similar to Configuring
the WildFire Appliance settings.
1. (Recommended) Reset the admin password.
2. Configure the management interface settings. Set WildFire appliance cluster node IP addresses and
the default gateway. Each WildFire appliance cluster node must have a static IP address in the same
subnet. Also set the DNS server IP addresses.
3. Set the WildFire appliance clock. Set the clock either manually or by specifying NTP servers, and set
NTP Server authentication.
4. Choose the virtual machine image for the appliance to use to analyze files.
5. (Optional) Allow additional users to manage the WildFire appliance. Add administrator accounts and
assign them roles to manage the cluster.
6. Configure RADIUS authentication for administrator access.
STEP 2 | (Optional) Connect the cluster to the WildFire public cloud and configure the cloud services the
cluster will use.
If business reasons don’t prevent you from connecting the WildFire appliance cluster to the public
WildFire cloud, connecting the cluster to the cloud provides benefits such as:
• Using the cloud’s resources to perform sample analysis in multiple environments, using different
methods.
• Automatically querying the cloud for verdicts before performing local analysis to offload work from
the cluster. (Disabled by default.)
• Benefiting from and contributing to the intelligence of the global WildFire community.
The features described in this table row are not cluster-specific You can also configure
these features on standalone WildFire appliances.
1. Benefit from the intelligence gathered from all connected WildFire appliances:
The default value for the WildFire public cloud server hostname is wildfire-public-cloud. You
can Forward Files for WildFire Analysis to any public WildFire cloud.
2. If you connect the cluster to a WildFire public cloud, configure whether to automatically query the
public cloud for verdicts before performing local analysis. Querying the public cloud first reduces the
load on the local WildFire cluster:
STEP 3 | (Optional) Configure the controller node to publish the service status using the DNS protocol.
STEP 4 | (Optional) Configure data retention policies for malicious and benign or grayware samples.
1. Select the amount of time to retain different types of data:
The default for retaining malicious samples is indefinite (do not delete). The default for retaining non-
malicious (benign and grayware) samples is 14 days.
The decommission command only works with clusters that have three or more
nodes. Do not use decommission to remove a node in a two-node cluster.
2. Confirm that decommissioning the node was successful:
This command reports decommission: success after the worker node is removed from the
cluster. If the command does not display successful decommission, wait a few minutes to allow the
decommission to finish and then run the command again.
3. Delete the cluster configuration from the worker node’s CLI:
admin@WF-500># commit
5. Check that all processes are running:
admin@WF-500(active-controller)# commit
8. On the controller node, check to ensure that the worker node was removed:
The worker node you removed does not appear in the list of cluster nodes.
admin@WF-500(passive-controller)> configure
admin@WF-500(passive-controller)# delete deviceconfig high-availability
3. Delete the cluster configuration:
admin@WF-500(passive-controller)# commit
5. Wait for services to come back up. Run show cluster membership and check the Application
status, which shows all services and the siggen-db in a Ready state when all services are up. The
Node mode should be stand_alone.
6. On the remaining cluster node, check to ensure that the node was removed:
The controller node you removed does not appear in the list of cluster nodes.
7. If you have another WildFire appliance ready, add it to the cluster as soon as possible to restore high-
availability (Configure a Cluster and Add Nodes Locally).
If you do not have another WildFire appliance ready to replace the removed cluster node, you should
remove the high availability and cluster configurations from the remaining cluster node because one-
node clusters are not recommended and do not provide high availability. It is better to manage a
single WildFire appliance as a standalone appliance, not as a one-node cluster.
To remove the high availability and cluster configurations from the remaining node (in this example,
the primary controller node):
admin@WF-500(active-controller)> configure
admin@WF-500(active-controller)# delete deviceconfig high-availability
admin@WF-500(active-controller)# delete deviceconfig cluster
admin@WF-500(active-controller)# commit
Wait for services to come back up. Run show cluster membership and check the Application
status, which shows all services and the siggen-db in a Ready state when all services are up. The
Node mode should be stand_alone.
If the WildFire appliances in your cluster uses FIPS/CC mode, encryption is automatically
enabled using predefined certificates.
Depending on how you want to deploy appliance to appliance encryption, perform one of the following
tasks:
• Configure Appliance-to-Appliance Encryption UsingPredefined Certificates Centrally on Panorama
• Configure Appliance-to-Appliance Encryption UsingCustom Certificates Centrally on Panorama
• Configure Appliance-to-Appliance Encryption Using Predefined Certificates Through the CLI
• Configure Appliance-to-Appliance Encryption Using Custom Certificates Through the CLI
STEP 2 | Verify that your WildFire appliance cluster has been properly configured and is operating in a
healthy state.
STEP 3 | Enable secure cluster communication on the WildFire appliance designated as the active-
controller.
STEP 4 | (Recommended) Enable HA Traffic Encryption. This optional setting encrypts the HA traffic
between the HA pair and is a Palo Alto Networks recommended best practice.
STEP 5 | (Appliance clusters with 3 or more nodes only) Repeat steps 2-4 for the third WildFire
appliance server node enrolled in the cluster.
STEP 2 | Verify that your WildFire appliance cluster has been properly configured and is operating in a
healthy state.
STEP 3 | Import (or optionally, generate) a certificate with a private key and its CA certificate. Keep
in mind, if you previously configured the WildFire appliance and the firewall for secure
communications using a custom certificate, you can also use that custom certificate for secure
communications between WildFire appliances.
1. To import a custom certificate, enter the following from the WildFire appliance CLI: scp import
certificate from <value> file <value> remote-port <1-65535> source-ip <ip/
netmask> certificate-name <value> passphrase <value> format <value>
2. To generate a custom certificate, enter the following from the WildFire appliance CLI: request
certificate generate certificate-name name digest country-code state
locality organization email filename ca signed-by | ocsp-responder-
url days-till-expiry hostname [ ... ] request certificate generate
certificate-name name digest country-code state locality organization
email filename ca signed-by | ocsp-responder-url days-till-expiry ip
[ ... ] request certificate generate certificate-name name
STEP 4 | Import the WildFire appliance keypair containing the server certificate and private key.
scp import keypair from <value> file <value> remote-port <1-65535> source-
ip <ip/netmask> certificate-name <value> passphrase <value> format <pkcs12|
pem>
STEP 5 | Configure and specify a SSL/TLS profile to define the certificate and protocol that WildFire
appliances use for SSL/TLS services.
set deviceconfig setting management secure-conn-server ssl-tls-service-
profile <profile name>
1. Create the SSL/TLS profile.
STEP 6 | Configure and specify a certificate profile to define the certificate and protocol that WildFire
appliances use for SSL/TLS services.
1. Create the certificate profile.
STEP 10 | Specify the DNS name used for authentication found in the custom certificate (typically
the SubjectName or the SubjectAltName). For example, the default domain name is
wfpc.service.mycluster.paloaltonetworks.com
set deviceconfig setting wildfire custom-dns-name <custom_dns_name>.
STEP 11 | (Appliance clusters with 3 or more nodes only) Repeat steps 2-10 for the third WildFire
appliance server node enrolled in the cluster.
The CLI displays information that is not available from Panorama. It’s highly recommended
to use the WildFire CLI when troubleshooting cluster-related issues.
You can view the current status of a WildFire controller node by executing a series of show commands from
the WildFire CLI. The commands display configuration details, the current applications and services running
on the appliance, as well as status/error messages. You can then use these details to determine the status
of your cluster. Viewing the status does not interrupt any WildFire services and can be run at any time.
See the following sections for details on monitoring your WildFire appliance:
• View WildFire Cluster Status Using the CLI
• View WildFire Cluster Status Using Panorama
• WildFire Application States
• WildFire Service States
• Recently removed nodes might be present but displays as Disconnected. It can take several days
for a disconnected node to be removed from the cluster node list.
• The active controller node displays siggen-db: ReadyMaster.
• The passive controller node displays siggen-db: ReadySlave.
For more information about general WildFire application and service status details,
refer to WildFire Application States and WildFire Service States.
• TheDiag report displays cluster system events and error messages:
Unexpected server serial number The unexpected presence of a server node has
been detected.
The following example shows a 3-node WildFire cluster operating in a healthy state:
Diag report:
2.2.2.14: reported leader '2.2.2.15', age 0.
2.2.2.15: local node passed sanity check.
For more information about WildFire application and service status details, refer to
WildFire Application States and WildFire Service States.
Diag report:
2.2.2.14: reported leader '2.2.2.15', age 0.
2.2.2.15: local node passed sanity check.
The log messages returned by the WildFire appliance(s) are shown from newest
to oldest. If you do not use the direction equal backward command
argument as shown in the above procedure, the WildFire appliance CLI returns
the log messages from oldest to newest.
Passive Controller
The log messages returned by the WildFire appliance(s) are shown from newest
to oldest. If you do not use the direction equal backward command
argument as shown in the above procedure, the WildFire appliance CLI returns
the log messages from oldest to newest.
• WildFire appliance clusters operating normally return the following status readouts for each node in a
3-node cluster. Healthy WildFire cluster nodes have differing status readouts based on the role of an
appliance.
Use the following checklist to verify that the WildFire appliance services are running correctly in your
cluster deployment.
• Active Controller
The log messages returned by the WildFire appliance(s) are shown from newest
to oldest. If you do not use the direction equal backward command
argument as shown in the above procedure, the WildFire appliance CLI returns
the log messages from oldest to newest.
• Passive Controller
The log messages returned by the WildFire appliance(s) are shown from newest to
oldest. If you do not use the direction equal backward command argument
as shown in the above procedure, the WildFire appliance CLI returns the log
messages from oldest to newest.
• Server Node
The log messages returned by the WildFire appliance(s) are shown from newest to
oldest. If you do not use the direction equal backward command argument
infra Indicates that a WildFire cluster All nodes Displays in CLI status
infrastructure service is operating on a screen when the service
given node. is operating. If these
services are not present
wfpc Indicates that the file sample analysis for a given node, verify
service (WildFire Private Cloud) is the configuration of the
capable of file analysis and report appliance.
generation.
• All nodes in a cluster must run the same version of the operating system.
• Panorama can manage WildFire appliances and appliance clusters running PAN-OS
software versions 8.0.1 or later.
• Ensure the devices are connected to a reliable power source. A loss of power during an
upgrade can make the devices unusable.
Depending on your deployment, perform one of the following tasks to upgrade your WildFire cluster:
• Upgrade a Cluster Centrally on Panorama with an Internet Connection
• Upgrade a Cluster Centrally on Panorama without an Internet Connection
• Upgrade a Cluster Locally with an Internet Connection
• Upgrade a Cluster Locally without an Internet Connection
admin@WF-500(passive-controller)> show
wildfire latest samples
If you do not want to wait for the WildFire appliance to finish analyzing recently-
submitted samples, you can continue to the next step. However, consider that the
WildFire appliance then drops pending samples from the analysis queue.
admin@WF-500(passive-controller)> request
wf-content upgrade install version latest
admin@WF-500(passive-controller)> request
system software check
STEP 4 | Download the PAN-OS 9.0 software version to the WildFire appliance.
You cannot skip any major release version when upgrading the WildFire appliance. For example, if you
want to upgrade from PAN-OS 6.1 to PAN-OS 7.1, you must first download and install PAN-OS 7.0.
Download the 9.0.0 software version.
admin@WF-500(passive-controller)> request
system software download version 9.0.0
admin@WF-500(passive-controller)> show
jobs all
admin@WF-500(passive-controller)> show
system software status
admin@WF-500(passive-controller)> request
system software install version 9.0.0
admin@WF-500(passive-controller)> show
jobs all
admin@WF-500(passive-controller)> request
cluster reboot-local-node
The upgrade process could take 10 minutes or over an hour, depending on the
number of samples stored on the WildFire appliance.
STEP 8 | Repeat steps 1-7 for each WildFire worker node in the cluster.
STEP 9 | (Optional) View the status of the reboot tasks on the WildFire controller node.
admin@WF-500(active-controller)> show
cluster task pending
STEP 10 | Check that the WildFire appliance is ready to resume sample analysis.
1. Verify that the sw-version field shows 9.0.0:
admin@WF-500(passive-controller)> show
system info | match sw-version
2. Confirm that all processes are running:
admin@WF-500(passive-controller)> show
system software status
3. Confirm that the auto-commit (AutoCom) job is complete:
admin@WF-500(passive-controller)> show
jobs all
4. Confirm that data migration has successfully completed. Run show cluster data-migration-
status to view the progress of the database merge. After the data merge is complete the
completion timestamp displays:
The duration of a data merge depends on the amount of data stored on the WildFire
appliance. Be sure to allot at least several hours for recovery as the data merge can
be a lengthy process.
admin@WF-500(passive-controller)> show
wildfire latest samples
STEP 2 | Retrieve the content update file from the update server.
1. Log in to the Palo Alto Networks Support Portal and click Dynamic Updates.
2. In the WildFire Appliance section, locate the latest WildFire appliance content update and download
it.
3. Copy the content update file to an SCP-enabled server and note the file name and directory path.
admin@WF-500> scp
import wf-content from username@host:path
For example:
admin@WF-500> scp
import wf-content from bart@10.10.10.5:c:/updates/panup-all-
wfmeta-2-253.tgz
If your SCP server is running on a non-standard port or if you need to specify the
source IP, you can also define those options in the scp import command.
2. Install the update:
admin@WF-500> request
wf-content upgrade install file panup-all-wfmeta-2-253.tgz
3. View the status of the installation:
admin@WF-500> show
jobs all
admin@WF-500> show
system info | match wf-content-version
STEP 5 | Verify that the WildFire appliance software version you want to install is available.
admin@WF-500(passive-controller)> request
system software check
STEP 6 | Download the PAN-OS 9.0 software version to the WildFire appliance.
For example:
admin@WF-500(passive-controller)> show
system software status
admin@WF-500(passive-controller)> request
system software install version 9.0.0
admin@WF-500(passive-controller)> show
jobs all
admin@WF-500(passive-controller)> request
cluster reboot-local-node
The upgrade process could take 10 minutes or over an hour, depending on the
number of samples stored on the WildFire appliance.
STEP 10 | Repeat steps 1-9 for each WildFire worker node in the cluster.
admin@WF-500(active-controller)> show
cluster task pending
STEP 12 | Check that the WildFire appliance is ready to resume sample analysis.
1. Verify that the sw-version field shows 9.0:
admin@WF-500(passive-controller)> show
system info | match sw-version
2. Confirm that all processes are running:
admin@WF-500(passive-controller)> show
system software status
3. Confirm that the auto-commit (AutoCom) job is complete:
admin@WF-500(passive-controller)> show
jobs all
4. Confirm that data migration has successfully completed. Run show cluster data-migration-
status to view the progress of the database merge. After the data merge is complete, the
completion timestamp displays:
The duration of a data merge depends on the amount of data stored on the WildFire
appliance. Be sure to allot at least several hours for recovery as the data merge can
be a lengthy process.
3-node WildFire appliance clusters should not experience split-brain conditions when
properly configured because of the additional redundancy provided by the third server node.
Palo Alto Networks recommends using a direct cable connection for the HA1 and the
cluster interface link.
• Unhealthy WildFire node.
The affected WildFire cluster node displays Cluster:splitbrain next to Service Summary.
Diag report:
2.2.2.114: reported leader '2.2.2.114', age 0.
2.2.2.114: local node passed sanity check.
STEP 2 | (Panorama only) On the Panorama appliance that is managing the WildFire cluster:
1. Select Panorama > Managed WildFire Clusters.
2. In the Cluster Status column, check for the presence of cluster [splitbrain]. This indicates that the
appliance is in split-brain mode.
STEP 1 | Verify that your network is operating normally and that the WildFire appliance is transmitting
and receiving traffic.
1. Enable the ability to ping on a WildFire appliance interface.
STEP 2 | Determine which WildFire appliance is unhealthy. Refer to View WildFire Cluster Status Using
the CLI or View WildFire Cluster Status Using Panorama to view the status of the appliance.
STEP 3 | Gracefully restart the unhealthy node using the following command:
request cluster reboot-local-node
The WildFire appliance that is rebooted should auto-enroll into the WildFire cluster it was configured
for.
The remaining controller node that is in split-brain mode must be in a healthy state.
STEP 4 | Wait for the Data Migration to complete. Run show cluster data-migration-status to
view the progress of the database merge. After the data merge is complete the completion
timestamp displays:
The duration of a data merge depends on the amount of data stored on the WildFire
appliance. Be sure to allot at least several hours for recovery as the data merge can be a
lengthy process.
STEP 5 | Verify the status of the cluster on Panorama or through the WildFire appliance CLI.
149
150 WILDFIRE ADMINISTRATOR'S GUIDE | Use the WildFire Appliance CLI
© 2021 Palo Alto Networks, Inc.
WildFire Appliance Software CLI Concepts
This section introduces and describes how to use the WildFire appliance software command line interface
(CLI):
• WildFire Appliance Software CLI Structure
• WildFire Appliance Software CLI Command Conventions
• WildFire Appliance CLI Command Messages
• WildFire Appliance Command Option Symbols
• WildFire Appliance Privilege Levels
username@hostname>
Example:
admin@WF-500>
In Configuration mode, the current hierarchy context is shown by the [edit...] banner presented in
square brackets when a command is issued.
username@hostname# application-group
username@hostname# exit
Exiting configuration mode
username@hostname>
username@hostname> debug 17
Unrecognized command
Invalid syntax.
username@hostname>
The CLI checks the syntax of each command. If the syntax is correct, it executes the command and the
candidate hierarchy changes are recorded. If the syntax is incorrect, an invalid syntax message is presented,
as in the following example:
Symbol Description
+ There are additional command options for this command at this level.
When exiting configuration mode without issuing the save or commit command, the
configuration changes could be lost if the appliance loses power.
Maintaining a candidate configuration and separating the save and commit steps confers important
advantages when compared with traditional CLI architectures:
• Distinguishing between the save and commit concepts allows multiple changes to be made at the same
time and reduces system vulnerability.
• Commands can easily be adapted for similar functions. For example, when configuring two Ethernet
interfaces, each with a different IP address, you can edit the configuration for the first interface, copy
the command, modify only the interface and IP address, and then apply the change to the second
interface.
• The command structure is always consistent.
Configuration Hierarchy
The configuration for the appliance is organized in a hierarchical structure. To display a segment of
the current hierarchy level, use the show command. Entering show displays the complete hierarchy,
while entering show with keywords displays a segment of the hierarchy. For example, when running the
command show from the top level of configuration mode, the entire configuration is displayed. When
running the command edit mgt-config and you enter show, or by running show mgt-config, only
the mgt-config part of the hierarchy displays.
Hierarchy Paths
When entering commands, the path is traced through the hierarchy as follows:
For example, the following command assigns the primary DNS server 10.0.0.246 for the appliance:
[edit]
username@hostname# set deviceconfig system dns-setting servers primary
10.0.0.246
This command generates a new element in the hierarchy and in the output of the following show command:
[edit]
username@hostname# show deviceconfig system dns-settings
dns-setting {
servers {
primary 10.0.0.246
}
}
[edit]
username@hostname#
[edit]
indicates that the relative context is the top level of the hierarchy, whereas
[edit deviceconfig]
Level Description
edit Sets the context for configuration within the command hierarchy.
The set command issued after using the up and top commands starts from the new
context.
STEP 1 | Use terminal emulation software to establish an SSH console connection with the WildFire
appliance.
username@hostname>
username@hostname> configure
Entering configuration mode
[edit]
username@hostname#
• To leave Configuration mode and return to Operational mode, use the quit or exit command:
username@hostname# quit
Exiting configuration mode
username@hostname>
To enter an Operational mode command while in Configuration mode, use the run command. For example,
to show system resources from configure mode, use run show system resources.
username@hostname> ?
clear Clear runtime parameters
configure Manipulate software configuration information
create create commands
debug Debug and diagnose
delete Remove files from hard disk
disable disable commands
edit edit commands
exit Exit this session
find Find CLI commands with keyword
grep Searches file for lines containing a pattern match
less Examine debug file content
ping Ping hosts and networks
quit Exit this session
request Make system-level requests
scp Use scp to import / export files
set Set operational parameters
show Show operational parameters
ssh Start a secure shell to another host
submit submit commands
tail Print the last 10 lines of debug file content
• To display the available options for a specified command, enter the command followed by ?.
Example:
username@hostname> ping ?
+ bypass-routing Bypass routing table, use specified interface
+ count Number of requests to send (1..2000000000 packets)
+ do-not-fragment Don't fragment echo request packets (IPv4)
+ interval Delay between requests (seconds)
+ no-resolve Don't attempt to print addresses symbolically
+ pattern Hexadecimal fill pattern
+ size Size of request packets (0..65468 bytes)
+ source Source address of echo request
+ tos IP type-of-service value (0..255)
+ ttl IP time-to-live value (IPv6 hop-limit value) (0..255
hops)
+ verbose Display detailed output
* host Hostname or IP address of remote host
username@hostname>
The following sample displays only the system model information:
username@hostname>
Hierarchy Location
set deviceconfig
Syntax
cluster {
cluster-name <name>;
interface {eth2 | eth3};
mode {
controller {
service-advertisement dns-service enabled {no | yes};
worker-list {ip-address}
}
worker;
}
}
Options
+ cluster-name — Name the cluster. The name must be a valid domain name section.
Sample Output
Hierarchy Location
set deviceconfig
Syntax
high-availability {
enabled {no | yes};
election-option {
preemptive {no | yes};
priority {primary | secondary};
timers {
advanced {heartbeat interval <value> | hello-interval <value> |
preemption-hold-time <value> | promotion-hold-time <value>}
aggressive;
recommended;
}
}
interface {
ha1 {
Options
+ enabled — Enable HA on both controller nodes to provide fault tolerance for the cluster. Each WildFire
appliance cluster should have two controller nodes configured as an HA pair.
> election-option — Configure the preemptive, priority, and timer HA option values.
+ preemptive — Election option to enable the passive HA peer (the controller backup node) to preempt
the active HA peer (the primary controller node) based on the HA priority setting. For example, if the
primary controller node goes down, the secondary (passive) controller node takes over cluster control.
When the primary controller node comes back up, if you do not configure preemption, the secondary
controller continues to control the cluster and the primary controller acts as the controller backup node.
However, if you configure preemption on both HA peers, then when the primary controller comes back up,
it preempts the secondary controller by taking back control of the cluster. The secondary controller resumes
its former role as the controller backup node. You must configure the preemptive setting on both of the HA
peers for preemption to work.
+ priority — Election option to configure the preemption priority of each controller in the HA pair.
Configure preemption on both members of the HA controller pair.
> timers — Configure the timers for HA election options. The WildFire appliance provides two pre-
configured timer options (aggressive and recommended settings), or you can configure each timer
individually. The Advanced timers enable you to configure values individually:
• The heartbeat-interval sets the time in milliseconds to send heartbeat pings. The range of values is
1000-60,000 ms, with a default value of 2000 ms.
• The hello-interval sets the time in milliseconds to send Hello messages. The range of values is
8000-60,000 ms, with a default value of 8000 ms.
• The preemption-hold-time sets the time in minutes to remain in passive (controller backup) mode
before preempting the active (primary) controller node. The range of values is 1-60 minutes, with a
default value of 1 minute.
• The promtion-hold-time sets the time in milliseconds to change state from passive (controller
backup) to active (primary) state. The range of values is 0-60,000 ms, with a default value of 2000 ms.
> interface — Configure HA interface settings for the primary (ha1) and backup (ha1-backup) control
link interfaces. The control link interfaces enable the HA controller pair to remain synchronized and
prepared to failover in case the primary controller node goes down. Configuring both the ha1 interface and
the ha1-backup interface provides redundant connectivity between controllers in case of a link failure.
Set:
• The peer-ip-address. For each interface, configure the IP address of the HA peer. The ha1 interface
peer is the ha1 interface IP address on the other controller node in the HA pair. The ha1-backup
interface peer is the ha1-backup interface IP address on the other controller node in the HA pair.
• The port. On each controller node, configure the port to use for the ha1 interface and the port to use
for the ha-backup interface. You can use eth2, eth3, or the management port (eth0) for the HA
Sample Output
Hierarchy Location
Syntax
management {
idle-timeout {0 | <value>}
admin-lockout {
failed-attempts <value>
lockout-time <value>
}
}
Sample Output
management {
idle-timeout 0;
admin-lockout {
failed-attempts 3;
lockout-time 5;
}
}
Hierarchy Location
Syntax
wildfire {
active-vm {vm-1 | vm-2 | vm-3 | vm-4 | vm-5 | <value>};
cloud-server <value>;
custom-dns-name <value>;
preferred-analysis-environment {Documents | Executables | default};
vm-network-enable {no | yes};
vm-network-use-tor {enable
| disable};
cloud-intelligence {
cloud-query {no | yes};submit-diagnostics {no | yes};
submit-report {no | yes};
submit-sample {no | yes};
}
file-retention {
malicious {indefinite | <1-2000>};
non-malicious <1-90>
}
signature-generation {
av {no | yes};
dns {no | yes};
url {no | yes};
}
Options
+ active-vm — Select the virtual machine environment that WildFire will use for sample analysis. Each
vm has a different configuration, such as Windows XP, a specific versions of Flash, Adobe reader, etc. To
view which VM is selected, run the following command: show wildfire status and view the Selected
VM field. To view the VM environment information, run the following command : show wildfire vm-
images.
+ cloud-server — Hostname for the cloud server that the appliance will forward malicious samples/
reports to for a re-analysis. The default cloud server is wildfire-public-cloud. To configure forwarding, use
the following command: set deviceconfig setting wildfire cloud-intelligence.
+ custom-dns-name — Configure a custom DNS name to use in server certificates and the WildFire
server list instead of the default DNS name wfpc.sevice.<clustername>.<domain>.
+ preferred-analysis-environment — Allocate the majority of the resources to document analysis
or to executable analysis, depending on the type of samples most often analyzed in your environment.
The default allocation balances resources between document and executable samples. For example, to
allocate the majority of the analysis resources to documents: set deviceconfig setting wildfire
preferred-analysis-environment Documents.
+ vm-network-enable — Enable or disable the vm-network. When enabled, sample files running in the
virtual machine sandbox can access the Internet. This helps WildFire better analyze the behavior of the
malware to look for things like phone home activity.
+ vm-network-use-tor — Enable or disable the Tor network for the vm-interface. When this option is
enabled, any malicious traffic coming from the sandbox systems on the WildFire appliance during sample
analysis is sent through the Tor network. The Tor network will mask your public facing IP address, so the
owners of the malicious site cannot determine the source of the traffic.
> cloud-intelligence — Configure the appliance to submit WildFire diagnostics, reports or samples
to the Palo Alto Networks WildFire cloud, or to automatically query the public WildFire cloud before
performing local analysis to conserve WildFire appliance resources. The submit report option sends reports
for malicious samples to the cloud for statistical gathering. The submit sample option sends malicious
samples to the cloud. If submit-sample enabled, you don’t need to enable submit-report because the cloud
re-analyzes the sample and a new report and signature is generated if the sample is malicious.
> file-retention — Configure how long to save malicious (malware and phishing) samples and non-
malicious (grayware and benign) samples. The default for malicious samples is indefinite (never delete). The
default for non-malicious samples is 14 days. For example, to retain non-malicious samples for 30 days: set
deviceconfig setting wildfire file-retention non-malicious 30.
> signature-generation — Enable the appliance to generate signatures locally, eliminating the need
to send any data to the public cloud in order to block malicious content. The WildFire appliance will analyze
files forwarded to it from Palo Alto Networks firewalls or from the WildFire API and generate antivirus and
DNS signatures that block both the malicious files as well as associated command and control traffic. When
the appliance detects a malicious URL, it sends the URL to PAN-DB and PAN-DB assigns it the malware
category.
Sample Output
The following shows an example output of the WildFire settings.
Hierarchy Location
Syntax
eth2 {
default-gateway <ip-address>;
ip-address <ip-address>;
mtu <value>;
netmask <ip-netmask>;
speed-duplex {100Mbps-full-duplex | 100Mbps-half-duplex | 10Mbps-full-
duplex | 10Mbps-half-duplex | 1Gbps-full-duplex | 1Gbps-half-duplex | auto-
negotiate};
permitted-ip <ip-address/netmask>;
service disable-icmp {no | yes};
}
Options
+ default-gateway — IP address of the default gateway for the eth2 interface.
+ ip-address — IP address for the eth2 interface.
+ mtu — Maximum Transmission Unit (MTU) for the eth2 interface.
+ netmask — Netmask for the eth2 interface.
Sample Output
Hierarchy Location
Syntax
eth3 {
default-gateway <ip-address>;
ip-address <ip-address>;
mtu <value>;
netmask <ip-netmask>;
speed-duplex {100Mbps-full-duplex | 100Mbps-half-duplex | 10Mbps-full-
duplex | 10Mbps-half-duplex | 1Gbps-full-duplex | 1Gbps-half-duplex | auto-
negotiate};
permitted-ip <ip-address/netmask>;
service disable-icmp {no | yes};
}
Options
+ default-gateway — IP address of the default gateway for the eth3 interface.
Sample Output
Hierarchy Location
Syntax
Options
+ panorama-server — Configure the IP address or the fully qualified domain name (FQDN) of the
primary Panorama server you will use to manage the WildFire appliance or appliance cluster.
Sample Output
The output is truncated to show only the output stanza that displays the Panorama server settings.
Hierarchy Location
Syntax
Options
+ panorama-server-2 — Configure the IP address or the fully qualified domain name (FQDN) of the
backup Panorama server you will use to manage the WildFire appliance or appliance cluster.
Sample Output
The output is truncated to show only the output stanza that displays the Panorama server settings.
Hierarchy Location
Syntax
wf-content recurring {
daily at <value> action {download-and-install | download-only};
weekly {
action {download-and-install | download-only};
at <value>;
day-of-week {friday | monday | saturday | sunday | thursday | tuesday |
wednesday};
}
}
Options
> wf-content — WildFire content updates.
> daily — Schedule update every day.
+ action — Specify the action to take. You can schedule the appliance to download and install the update
or download only and then you install manually.
+ at — Time specification hh:mm (for example, 20:10).
> hourly — Schedule update every hour.
+ action — Specify the action to take. You can schedule the appliance to download and install the update
or download only and then you install manually.
+ at — Minutes past the hour.
> weekly — Schedule update once a week.
Sample Output
admin@WF-500# show
update-schedule {
wf-content {
recurring {
weekly {
at 19:00;
action download-and-install;
day-of-week friday;
}
}
}
}
set
deviceconfig setting wildfire vm-network-enable yes
Hierarchy Location
Syntax
set vm-interface {
default-gateway <ip_address>;
dns-server <ip_address>;
ip-address <ip_address>;
link-state;
mtu;
Options
+ default-gateway — Default gateway for the VM interface.
+ dns-server — dns server for the VM interface.
+ ip-address — IP address for VM interface.
+ link-state — Set the link state to up or down.
+ mtu — Maximum Transmission Unit for the VM interface.
+ netmask — IP netmask for the VM interface.
+ speed-duplex — Speed and duplex for the VM interface.
Sample Output
The following shows a configured vm-interface.
vm-interface {
ip-address 10.16.0.20;
netmask 255.255.252.0;
default-gateway 10.16.0.1;
dns-server 10.0.0.246;
}
Syntax
create {
high-availability {
control-link {
statistics;
}
transitions;
}
}
Options
> control-link> — Clear HA control-link statistics.
> transitions> — Clear HA transitions statistics (events that occur during HA switchovers).
Sample Output
After you clear control-link or transition statistics, the WildFire cluster resets all values to zero (0).
Syntax
create {
wildfire {
api-key {
key <value>;
name <value>;
{
{
{
Options
+ key — Create an API key by manually entering a key value. The value must be 64 alpha characters (a-z)
or numbers (0-9). If you do not specify the key option, the appliance generates a key automatically.
+ name — Optionally enter a name for the API key. An API key name is simply used to label the keys to
make it easier to identify keys assigned for specific uses and has no impact on the functionality of the key.
Sample Output
The following output shows that the appliance has three API keys and one key is named my-api-key.
admin@WF-500> show
delete high-availability-key
Description
Delete the peer encryption key used for high-availability (HA) on the cluster control links of a WildFire
appliance cluster’s controller node.
Syntax
delete {
high-availability-key;
}
Options
No additional options.
Sample Output
The highlighted line in the output shows that encryption isn’t enabled on the HA control links.
Syntax
delete {
wildfire {
api-key {
key <value>;
{
{
{
Options
+ key <value> — The key value for the key that you want to delete. To view a list of API keys, run the
following command:
admin@WF-500> show
wildfire global api-keys all
Sample Output
admin@WF-500> delete
wildfire api-key key <API KEY>
APIKey <API Key> deleted
delete wildfire-metadata
Description
Delete content updates on the WildFire appliance. For more information on content updates and how to
install them, see request wf-content.
Syntax
delete {
wildfire-metadata update <value>;
{
Options
+ update <value> — Define the content update that you want to delete.
Sample Output
The output that follows shows the deletion of an update named:
panup-all-wfmeta-2-181.candidate.tgz.
admin@WF-500> delete wildfire-metadata update panup-all-
wfmeta-2-181.candidate.tgz
successfully removed panup-all-wfmeta-2-181.candidate.tgz
disable wildfire
Description
Disables the domain signature or sample signature so that it is excluded from the next WildFire content
package release.
Syntax
disable wildfire {
domain-signature {
domain <value>;
}
OR...
sample-signature {
sha256 {
equal <value>;
}
Options
> domain-signature—Sets the status of the domain signature to disabled so that it is excluded from the
next WildFire content release.
> sample-signature—Sets the status of the sample signature to disabled so that it is excluded from the
next WildFire content release.
Sample Output
A successfully disabled sample or domain does not display any output.
Syntax
edit {
wildfire {
api-key [name | status] key <value>;
{
{
Options
+ name—Change the name of an API key.
+ status—Enable or disable an API key.
* key—Specify the key to modify.
Sample Output
The key value in this command is required. For example, to change the name of a key named stu to stu-
key1, enter the following command:
In the following command, you do not need to enter the old key name; only enter the new
key name.
admin@WF-500> edit
wildfire api-key name stu-key1 key <API KEY>
Syntax
load {
wildfire {
from <value> mode [merge | replace];
{
{
Options
* from — Specify the API key filename that you want to import. The key files use the .keys file extension.
For example, my-api-keys.keys. To view a list of keys that are available for import, enter the following
command:
+ mode — Optionally enter the mode for the import (merge/replace). For example, to replace the key
database on the appliance with the contents of the contents of the new key file, enter the following
command:
If you do not specify the mode option, the default action will merge the keys.
Hierarchy Location
request cluster
Syntax
request {
cluster {
decommission {
show;
start;
stop;
}
}
}
Options
show—Display the status of the node decommission job.
start—Begin the node decommission job.
stop—Abort the node decommission job.
Sample Output
The Node mode field confirms that the cluster node decommission worked because the mode is
stand_alone instead of controller or worker.
Hierarchy Location
request cluster
Syntax
request {
cluster {
reboot-local-node;
}
}
Options
No additional options.
Sample Output
You can verify that the local cluster node has rebooted or is in the process of rebooting in several ways:
• show cluster task local—display tasks requested on the local node.
• show cluster task current—display currently running tasks on the local node or the last
completed task (controller nodes only).
• show cluster task pending—display tasks that are queued but have not run yet on the local node
(controller nodes only).
• show cluster task history—display tasks that have been run on the local node (controller nodes
only).
For example, the following command shows that two cluster node reboot tasks have completed
successfully:
Hierarchy Location
request high-availability
Syntax
request {
high-availability {
state {
functional;
}
peer {
functional;
}
}
}
Sample Output
The highlighted lines in the output show that the HA state of the local controller node is functional in the
active (primary) controller role and that the HA state of the peer controller node is functional in the passive
(backup) controller role.
Syntax
request {
high-availability {
sync-to-remote {
candidate-config;
clock;
running-config;
}
}
}
Options
> candidate-config—Synchronize the candidate configuration on the local peer controller node to the
remote HA peer controller node.
> clock—Synchronize the clock (time and date) on the local peer controller node to the remote HA peer
controller node.
> running-config—Synchronize the running configuration on the local peer controller node to the
remote HA peer controller node.
Sample Output
The highlighted line in the output shows that the HA configuration state is synchronized on the HA peer
controller node.
Hierarchy Location
request system
Syntax
raid {
remove <value>;
OR...
copy {
from <value>;
to <value>;
}
OR...
add {
Options
> add—Add a drive into the corresponding RAID Disk Pair
> copy—Copy and migrate from one drive to other drive in the bay
> remove—Drive to remove from RAID Disk Pair
Sample Output
The following output shows a WF-500 appliance with a correctly configured RAID.
Hierarchy Location
request system
Syntax
request {
wildfire {
sample {
redistribution {
keep-local-copy {no | yes};
serial-number <value>;
}
}
}
}
Options
* keep-local-copy—Keep or do not keep a copy of the redistributed samples on the local WildFire
appliance node.
* serial-number—Serial number of the node to which you redistribute samples.
Sample Output
Storage Nodes displays the other node to which the local node redistributes samples. If the local node
is not redistributing samples, only one storage node location displays. If the local node is redistributing
samples, Storage Nodes shows two storage node locations. The highlighted output shows the two
storage nodes that store samples (the local node and the node to which the local node redistributes
samples) and verifies that sample redistribution is occurring.
+--------------------------------------------------------------------+
| Storage Nodes | Analysis Nodes | Status | File Type |
+--------------------------------------------------------------------+
| 0907:ld2_2,065:ld2_2 | qa116 | Notify Finish | Java JAR |
| 0097:ld2_2,004:ld2_2 | qa117 | Notify Finish | Java Class |
| 0524:ld2_2,006:ld2_2 | qa117 | Notify Finish | Java Class |
| 0656:ld2_2,524:ld2_2 | qa117 | Notify Finish | Java Class |
| 0024:ld2_2,056:ld2_2 | qa117 | Notify Finish | DLL |
| 0324:ld2_2,006:ld2_2 | qa117 | Notify Finish | Java JAR |
| 0682:ld2_2,006:ld2_2 | qa116 | Notify Finish | Java JAR |
| 0092:ld2_2,016:ld2_2 | qa116 | Notify Finish | DLL |
| 0682:ld2_2,002:ld2_2 | qa116 | Notify Finish | DLL |
| 0056:ld2_2,824:ld2_2 | qa117 | Notify Finish | DLL |
+--------------------------------------------------------------------*
lines 1-10
Hierarchy Location
request system
Syntax
request {
system {
wildfire-vm-image {
upgrade install file <value>;
}
}
}
Options
> wildfire-vm-image—Install Virtual Machine (VM) images.
+ upgrade install file—Perform an upgrade to the VM image. After the file option, type ? to view a
list of available VM images. For example, run the following command to list available images:
request wf-content
Perform content updates on a WildFire appliance. These content updates equip the appliance with the
most up-to-date threat information for accurate malware detection and improve the appliance's ability to
differentiate the malicious from the benign. To schedule content updates to install automatically, see set
deviceconfig system update-schedule and to delete content updates on the WildFire appliance, see delete
wildfire-metadata.
Hierarchy Location
request
Syntax
request wf-content
{
downgrade install {previous | <value>};
upgrade
{
check
download latest
info
install {
file <filename>
version latest;
}
}
}
Options
> downgrade — Installs a previous content version. Use the previous option to install the previously
installed content package or enter a value to downgrade to a specific content package number.
> upgrade — Performs content upgrade functions
> check — Obtain information on available content packages from the Palo Alto Networks Update Server
> download — Download a content package
> info — Show information about available content packages
Sample Output
To list available content updates, run the following command:
Hierarchy Location
save
Syntax
save {
wildfire {
api-key to <value>;
{
{
Options
* to — Enter the filename for key export. For example, to export all of the API keys on the WildFire
appliance to a file named my-wf-keys, enter the following command:
The portal admin account is the only account that you configure on the appliance to view
reports from the firewall or Panorama. You cannot create new accounts or change the
account name. This is not the same admin account used to manage the appliance.
Hierarchy Location
set wildfire
Syntax
set {
wildfire {
portal-admin {
password <value>;
}
}
Sample Output
The following shows the output of this command.
Hierarchy Location
show cluster
all-peers;
Options
No additional options.
Sample Output
Diag report:
10.10.10.112: reported leader '10.10.10.112', age 0.
10.10.10.14: local node passed sanity check.
Hierarchy Location
show cluster
Syntax
controller;
Options
No additional options.
Sample Output
show cluster
Syntax
data-migration-status;
Options
No additional options.
Sample Output
adminWF-500(active-controller)>
show
cluster data-migration-status
100% completed on Mon Sep 9 21:44:48 PDT 2019
Hierarchy Location
show cluster
Syntax
membership;
Options
No additional options.
Sample Output
You can display cluster membership information for WildFire appliance cluster node members (controller
and worker nodes) and standalone WildFire appliances to check whether they belong to a cluster, their
The last four digits of each WildFire appliance serial number is changed to “xxxx” in the
displays to avoid revealing real serial numbers.
Output on the primary controller node in a WildFire appliance cluster:
Hierarchy Location
show cluster
Syntax
task {
current;
history;
local;
pending;
}
Options
> current—Display tasks currently allowed on the WildFire appliance cluster. Available only on cluster
controller nodes.
> history—Display completed cluster tasks. Available only on cluster controller nodes.
> local—Display pending tasks on the local WildFire appliance cluster node.
> pending—Display pending tasks for the entire WildFire appliance cluster. Available only on cluster
controller nodes.
Sample Output
Hierarchy Location
show high-availability
Syntax
all;
Options
No additional options.
Hierarchy Location
show high-availability
Syntax
control-link {
statistics;
}
Options
> statistics—Display WildFire appliance cluster controller node HA control-link statistics.
Sample Output
Hierarchy Location
show high-availability
Syntax
state;
Options
No additional options.
Sample Output
Hierarchy Location
show high-availability
Syntax
transitions;
Options
No additional options.
Sample Output
Hierarchy Location
show system
Syntax
raid {
detail;
{
Options
No additional options.
Sample Output
The following shows the RAID configuration on a functioning WF-500 appliance.
Hierarchy Location
submit wildfire
Syntax
submit {
wildfire {
local-verdict-change {
hash <value>;
verdict <value>;
comment <value>;
}
}
Options
* hash — Specify the SHA-256 hash of the file for which you want changethe verdict.
* verdict — Enter the new file verdict: 0 indicates a benign sample; 1 indicates malware; 2 indicates
grayware.
* comment — Include a comment to describe the verdict change.
Sample Output
The following shows the output of this command.
show wildfire
Description
Shows various information about the WildFire appliance, such global and local device and sample-related
details, appliance status, , and the virtual machine that is selected to perform analysis.
Hierarchy Location
show wildfire
Syntax
Options
> status — Display the status of the appliance as well as configuration information such as the Virtual
Machine (VM) used for sample analysis, whether or not samples/reports are sent to the cloud, vm network,
and registration information.
> vm-images — Display the attributes of the available virtual machine images used for sample analysis. To
view the current active image, run the following command:
admin@WF-500>
show wildfire status
admin@WF-500>
show
wildfire status
Connection info:
Wildfire cloud: s1.wildfire.paloaltonetworks.com
Status: Idle
Submit sample: disabled
Submit report: disabled
Selected VM: vm-5
VM internet connection: disabled
VM network using Tor: disabled
Best server: s1.wildfire.paloaltonetworks.com
Device registered: yes
Service route IP address: 10.3.4.99
Signature verification: enable
Server selection: enable
Through a proxy: no
admin@WF-500>
show wildfire vm-images
Supported VM images:
vm-1
Windows XP, Adobe Reader 9.3.3, Flash 9, Office 2003. Support PE, PDF,
Office 2003 and earlier
vm-2
Windows XP, Adobe Reader 9.4.0, Flash 10n, Office 2007. Support PE, PDF,
Office 2007 and earlier
vm-3
Windows XP, Adobe Reader 11, Flash 11, Office 2010. Support PE, PDF,
Office 2010 and earlier
vm-4
Windows 7 32bit, Adobe Reader 11, Flash 11, Office 2010. Support PE, PDF,
Office 2010 and earlier
vm-5
Windows 7 64bit, Adobe Reader 11, Flash 11, Office 2010. Support PE, PDF,
Office 2010 and earlier
vm-6
Windows XP, Internet Explorer 8, Flash 11. Support E-MAIL Links
admin@WF-500>
show wildfire wf-sample-queue-status
DW-ARCHIVE: 4,
DW-DOC: 2,
DW-ELINK: 0,
DW-PE: 21,
DW-URL_UPLOAD_FILE: 2,
admin@WF-500>
show wildfire wf-vm-pe-utilization
{
available: 2,
in_use: 1,
}
Hierarchy Location
Syntax
api-keys {
all {
details;
}
key <value>;
}
devices-reporting-data;
last-device-registration {
all;
}
local-verdict-change {
all;
sha256 <value>;
}
}
sample-analysis {
number;
type;
}
}
sample-device-lookup {
sha256 {
equal <value>;
}
sample-status {
sha256 {
equal <value>;
}
}
signature-status {
sha256 {
equal <value>;
}
}
Sample Output
The following shows the output for this command.
admin@WF-500>
show wildfire global api-keys all
+------------+-----------+---------+---------------------
+---------------------+
| Apikey | Name | Status | Create Time | Last Used
Time |
+------------+-----------+---------+---------------------
+---------------------+
| <API KEY> | happykey1 | Enabled | 2017-03-01 23:21:02 | 2017-03-01
23:21:02 |
+------------+-----------+---------+---------------------
+---------------------+
admin@WF-500>
show wildfire global devices-reporting-data
+--------------+---------------------+-------------+------------
+----------+--------+
| _Device ID | Last Registered | Device IP | SW Version | HW Model
| Status |
+--------------+---------------------+-------------+------------
+----------+--------+
| 000000000000 | 2017-03-01 22:28:25 | 10.1.1.1 | 8.1.4 | PA-220
| OK |
+--------------+---------------------+-------------+------------
+----------+--------+
admin@WF-500>
show wildfire global last-device-registration
all
+--------------+---------------------+-------------+------------
+----------+--------+
| Device ID | Last Registered | Device IP | SW Version | HW Model
| Status |
+--------------+---------------------+-------------+------------
+----------+--------+
admin@WF-500>
show wildfire global sample-analysis
admin@WF-500>
show wildfire global sample-device-lookup sha256
equal d75f2f71829153775fa33cf2fa95fd377f153551aadf0a642704595100efd460
Sample 1024609813c57fe174722c53b3167dc3cf5583d5c7abaf4a95f561c686a2116e
last seen on following devices:
+------------------------------------------------------------------
+-----------+-----------+---------------------+
| SHA256 |
Device ID | Device IP | Submitted Time |
+------------------------------------------------------------------
+-----------+-----------+---------------------+
| 1024609813c57fe174722c53b3167dc3cf5583d5c7abaf4a95f561c686a2116e |
Manual | Manual | 2019-08-05 19:24:39 |
admin@WF-500>
show wildfire global sample-status sha256
equal dc9f3a2a053c825e7619581f3b31d53296fe41658b924381b60aee3eeea4c088
+---------------------+---------------------+-----------
+----------------------------+
| Finish Date | Create Date | Malicious | Storage
Nodes |
+---------------------+---------------------+-----------
+----------------------------+
| 2017-03-01 22:34:17 | 2017-03-01 22:28:23 | No |
009026:smp_27,097010smp_27 |
+---------------------+---------------------+-----------
+----------------------------+
+----------------+---------------+------------------+
| Analysis Nodes | Status | File Type |
+----------------+---------------+------------------+
| qa15 | Notify Finish | Adobe Flash File |
+----------------+---------------+------------------+
admin@WF-500>
show wildfire global signature-status sha256
equalc883b5d2e16d22b09b176ca0786128f8064d47edf26186b95845aa3678868496
Signature Name: Virus/Win32.WPCGeneric.cr
Current Status: released
Release History:
+---------------+---------------------+---------+-------------+----------+
| Build Version | Timestamp | UTID | Internal ID | Status |
+---------------+---------------------+---------+-------------+----------+
| 155392 | 2017-02-03 10:11:06 | 5000259 | 10411 | released |
+---------------+---------------------+---------+-------------+----------+
Hierarchy Location
Syntax
latest {
analysis {
filter malicious|benign;
Options
> latest — Show latest 30 activities, which include the last 30 analysis activities, the last 30 files that
were analyzed, network session information on files that were analyzed and files that were uploaded to the
public cloud server.
> sample-processed — Shows the number of samples processed locally within a specified timespan or
maximum number of samples.
> sample-status — Show wildfire sample status. Enter the SHA256 value of the file to view the current
analysis status.
> statistics — Display basic wildfire statistics.
Sample Output
The following shows the output for this command.
admin@WF-500> show
wildfire latest analysis
Latest analysis information:
+-------------+---------------------+---------------------
+---------------------+
| SHA256 | Submit Time | Start Time | Finish Time
|
+-------------+---------------------+---------------------
+---------------------+
| <HASH VALUE>| 2017-03-01 14:28:26 | 2017-03-01 14:28:26 | 2017-03-01
14:34:24 |
| <HASH VALUE>| 2017-03-01 14:28:25 | 2017-03-01 14:28:25 | 2017-03-01
14:28:41 |
| <HASH VALUE>| 2017-03-01 14:28:25 | 2017-03-01 14:28:25 | 2017-03-01
14:28:26 |
-------------------------------------------------------------------------------------
| Wildfire Stats
|
+-----------------------------------------------------------------------------------
+
|
+----------------------------------------------------------------------------------
+|
|| Executable
||
|
+---------------------------------------------------------------------------------
+|
|| FileType | Submitted | Analyzed | Pending | Malware | Grayware | Benign |
Error ||
|
+---------------------------------------------------------------------------------
+|
|| exe | 2 | 2 | 0 | 0 | 0 | 2 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| dll | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
+-----------------------------------------------------------------------------------
+
|| Non-Executable
||
|
+---------------------------------------------------------------------------------
+|
|| FileType | Submitted | Analyzed | Pending | Malware | Grayware | Benign |
Error ||
|
+---------------------------------------------------------------------------------
+|
|| pdf | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| jar | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| doc | 1 | 1 | 0 | 1 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| ppt | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| xls | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| docx | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| pptx | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| xlsx | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
|| rtf | 0 | 0 | 0 | 0 | 0 | 0 |
0 ||
+-----------------------------------------------------------------------------------
+
|| Links
||
|
+---------------------------------------------------------------------------------
+|
|| FileType | Submitted | Analyzed | Pending | Malware | Grayware | Benign |
Error ||
|
+---------------------------------------------------------------------------------
+|
|| elink | 1 | 1 | 0 | 1 | 0 | 0 |
0 ||
|
+---------------------------------------------------------------------------------
+|
----------------------------------------------------------
| General Stats |
+--------------------------------------------------------+
||+--------------------------+-----------+-+-----------+||
||| Sample Queue |||
||+-----------------+-------------------+--------------+||
||| SUBMITTED | ANALYZED | PENDING |||
||+--------------------------+-----------+-+-----------+||
||| 7 | 7 | 0 |||
||+--------------------------+-----------+-+----------+|||
|+---------------------------+--------------------------+|
||| Verdicts |||
||+--------------------------+-------------------------+||
||| Malware | Grayware | Benign | Error |||
||+-----------------------------+----------------------+||
||| 3 | 0 | 4 | 0 |||
||+--------------------------+-----------+-+----------+|||
|+---------------------------+--------------------------+|
Syntax
test {
wildfire {
registration;
}
}
Options
No additional options.
Sample Output
The following shows a successful output on a firewall that can communicate with a WildFire appliance. If
this is a WildFire appliance pointing to the Palo Alto Networks WildFire cloud, the server name of one of
the cloud servers is displayed in the select the best server: field.