Real-world PAN-OS field notes from production environments.
Practical lessons, patterns, and defensive techniques—written by a working firewall engineer.
No vendor spin • No fluff • Field-tested
What you’ll find here
Proxy / bypass reality (what actually shows up in logs)
App-ID + URL + behavior patterns that matter in production
Panorama at scale: hygiene, structure, and survivability
Take-home enforcement: PAC + pass-through proxies to keep filtering off-campus
Threat prevention ops: auto-block patterns using tags + DAGs
Decryption edge cases: what breaks, why, and how to reduce pain
Operational tradeoffs: performance, false positives, and maintainability