====== Technical Support File ======
===== Device State File ======
Device Group Data
device_state_cfg\device_state_cfg\sp\vsys1\sp-config.xml
Template Data
device_state_cfg\device_state_cfg\template\template-config.xml
Local Data
device_state_cfg\device_state_cfg\running-config.xml
===== File Location =====
* ''./opt/pancfg\mgmt/saved-configs/merged-running-config.xml'' - main config file.
* ''./tmp/cli/techsupport_hostname_date_time.txt'' - Lots of output from lots of commands
* ''./tmp/cli/logs/*'' - half a dozen files with cmd output and history
* ''./var/log/appweb/*'' - web server log files
* ''./var/log/*'' loads of log files
* ''./opt/pancfg/mgmt/'' - configuration files
* ''./opt/pancfg/mgmt/saved-configs/'' - this is where you can find running-config.xml
===== Edit Local Firewall Configuration =====
To get a configuration out of a tech support file, unzip the file and go to ''\opt\pancfg\mgmt\saved-configs'' and open ''running-config.xml''
To get system info ''tmp\cli''
===== Edit Panorama Pre Rules =====
If you break access from a remote site to Panorama by putting a “deny all” in pre-rules, you can’t override the rule to fix the issue.
I used to disable/copy Panorama rules to make the config local, fix the issue, reconnected and force a push from Panorama.
I’ve just found out that you can on the firewall,
- export the device state file from the firewall.
- open the zip file
- copy ''sp-config.xml'' from ''device_state_cfg.tar\sp\vsys1\sp-config.xml'' to anther folder (e.g. Desktop)
- edit it to remove the bad rule
- copy the file back in to the zip file
- save it
- import device state to firewall
- commit to firewall
Much simpler than disconnecting from Panorama, fixing and reconnecting.
Alternatively PAN-OS 9.1+ has a feature where the firewall checks connectivity to Panorama after a commit and rolls back if the commit breaks Panorama access.