| Both sides previous revisionPrevious revisionNext revision | Previous revision |
| paloaltonetworks:tools:pan_configurator [2020/05/19 09:43] – bstafford | paloaltonetworks:tools:pan_configurator [2022/11/23 12:49] (current) – external edit 127.0.0.1 |
|---|
| ====== PAN Configurator ====== | ====== PAN Configurator ====== |
| In these examples, '''10.1.1.1''' is a Panorama appliance. | ===== Overview ===== |
| | [[https://github.com/cpainchaud/pan-configurator|PAN-Configurator]] is a PHP library for running actions on PAN-OS. |
| | |
| | There is a [[https://github.com/cpainchaud/pan-configurator-windows-package|Windows package]] for making it easy to run commands on Windows. |
| | |
| | Assuming you have plaged everything in "C:\Program Files\PAN Configurator" (Make sure your user has read/write access to this folder and sub-folders) |
| | |
| | Update the PATH variable with the following three entries |
| | * C:\Program Files\PAN Configurator\php; |
| | * C:\Program Files\PAN Configurator\Console2; |
| | * C:\Program Files\PAN Configurator\git\bin |
| | |
| | Create the following variables and values |
| | * PS1=\w> |
| | * PANCDIR=C:\Program Files\PAN Configurator\pan-configurator |
| | * HOME=C:\Program Files\PAN Configurator |
| | |
| | ===== Examples ===== |
| | In these examples, ''10.1.1.1'' is a Panorama appliance. |
| |
| Set all security policies to have 'default' as the log forwarding profile. | Set all security policies to have 'default' as the log forwarding profile. |
| <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=logSetting-set:default</code> | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=logSetting-set:default</code> |
| | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=logSetting-set:default 'filter=!( logprof is.set )'</code> |
| Set all security policies to have 'default' as the security profile group. | Set all security policies to have 'default' as the security profile group. |
| <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=securityProfile-Group-Set:default</code> | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=securityProfile-Group-Set:default</code> |
| | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=securityProfile-Group-set:default 'filter=!( secprof is.set )'</code> |
| Set security policies to have 'SPG_Outbound' as the security profile group. Only set it on policies that have the tag 'outbound'. | Set security policies to have 'SPG_Outbound' as the security profile group. Only set it on policies that have the tag 'outbound'. |
| <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=securityProfile-Group-Set:SPG_Outbound 'filter=(tag has outbound)'</code> | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=securityProfile-Group-Set:SPG_Outbound 'filter=(tag has outbound)'</code> |
| * nat | * nat |
| * decryption | * decryption |
| | * pbf |
| | |
| | ===== Replace one app with another ===== |
| | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=app-Add:app-grp-icmp 'filter=( app has icmp )'</code> |
| | <code>pa_rule-edit in=api://10.1.1.1 ruleType=security location=DeviceGroupName actions=app-Remove:icmp 'filter=( app has app-grp-icmp )'</code> |
| | |