<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to pull policies from a firewall managed by Panorama in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219156#M157</link>
    <description>&lt;P&gt;That does help to install older versions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other issue that I experienced after adding Panorama to 1.0.84 and a firewall to the project is that I was unable to machine learn from a specific rule even though I have added the exported logs to the machine learning path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What else could I try to ge this working?&lt;/P&gt;</description>
    <pubDate>Mon, 25 Jun 2018 17:36:31 GMT</pubDate>
    <dc:creator>PAN-Expert</dc:creator>
    <dc:date>2018-06-25T17:36:31Z</dc:date>
    <item>
      <title>Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218770#M130</link>
      <description>&lt;P&gt;I am running latest version 1.0.91. I have a user at both Panorama and the firewall with the API key that is associated with Expedition. Panorama holds all of the config, but I am unable to pull it from either the firewall or Panorama. The devices are added fine, they pull all of the information about licenses and other information, but it does not pull any policies objects or network information. I am not sure if this is limitation by the tool where it is not able to handle Panorama, but I cannot import any information from them. The firewall import imports 3 default services and that is it and Panorama import says following message&amp;nbsp;&lt;/P&gt;
&lt;DIV id="toast-6731" class="x-window x-toast x-layer x-window-default x-border-box" tabindex="-1"&gt;
&lt;DIV id="toast-6731-bodyWrap" class="x-window-bodyWrap" data-ref="bodyWrap"&gt;
&lt;DIV id="toast-6731-body" class="x-window-body x-window-body-default x-window-body-default x-noborder-trbl" data-ref="body"&gt;
&lt;DIV id="toast-6731-outerCt" class="x-autocontainer-outerCt" data-ref="outerCt"&gt;
&lt;DIV id="toast-6731-innerCt" class="x-autocontainer-innerCt" data-ref="innerCt"&gt;There is no configuration downloaded for the Device [Panorama]&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="toast-6732" class="x-window x-toast x-layer x-window-default x-border-box" tabindex="-1"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 21 Jun 2018 21:06:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218770#M130</guid>
      <dc:creator>PAN-Expert</dc:creator>
      <dc:date>2018-06-21T21:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218840#M138</link>
      <description>&lt;P&gt;If this happens, please STOP the Task Manager from the Main Screen after Login and Start it Again. Then try to Retrieve the configuration again and try to import the device into the project again. Let us know how it goes&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 10:39:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218840#M138</guid>
      <dc:creator>alestevez</dc:creator>
      <dc:date>2018-06-22T10:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218924#M145</link>
      <description>&lt;P&gt;I tried this, but it did not help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 16:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218924#M145</guid>
      <dc:creator>PAN-Expert</dc:creator>
      <dc:date>2018-06-22T16:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218996#M150</link>
      <description>&lt;P&gt;I re-deployed another VM with version 1.0.84 and this one does not have the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Two points for this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. The latest version should be fixed&lt;/P&gt;
&lt;P&gt;2. We should have a way of reverting to the older version&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 21:57:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/218996#M150</guid>
      <dc:creator>PAN-Expert</dc:creator>
      <dc:date>2018-06-22T21:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219144#M155</link>
      <description>&lt;P&gt;since are ubuntu packages im pretty sure you can uninstall a version and request another one, they are in the repository so can you can ask to install like .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;sudo apt-get install expedition-beta=1.0.84&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jun 2018 16:58:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219144#M155</guid>
      <dc:creator>alestevez</dc:creator>
      <dc:date>2018-06-25T16:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219156#M157</link>
      <description>&lt;P&gt;That does help to install older versions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other issue that I experienced after adding Panorama to 1.0.84 and a firewall to the project is that I was unable to machine learn from a specific rule even though I have added the exported logs to the machine learning path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What else could I try to ge this working?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jun 2018 17:36:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219156#M157</guid>
      <dc:creator>PAN-Expert</dc:creator>
      <dc:date>2018-06-25T17:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219230#M161</link>
      <description>&lt;P&gt;Besides adding the csv files from a Firewall, we need to preprocess the files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Afterwards, within the Project, we need to create a log connector that specifies which sources (devices-vsys) do we want to consider for the ML purposes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You must have imported the config from the device in order to correctly create the Log Connector. Do not fill in the fields manually to specify the Device and the VSys (or DGs), but use the options within the Menus. If the menius show empty, then the device configuration may have not been correctly imported.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2018 07:27:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219230#M161</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2018-06-26T07:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219291#M167</link>
      <description>&lt;P&gt;I was able to do that part with a standalone firewall, but it does not work with Panorama owned firewall which also includes that firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I exported the csv log from both Panorama and the firewall, but it does not process it, just hangs in "Pending" state for hours. It does not even show progress, so I assume it is not running as CPU and Memory untilization are not high.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Log connector will show up with Panorama, but it will not with firewall, but that is fine as I have export of logs from both. However they do not want to be processed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Therefore my best guess is that this was fixed in version after 1.0.84, but the upgrade command that was mentioned earlier does not work. It only works if I specify latest version. However I need to upgrade one version at the time at which Policies will still import from Panorama (which is broken in newest versions), but will fix the current issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is the log from my attempt&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;root@Expedition:/# sudo apt -o "Acquire::AllowInsecureRepositories=true" -o "Acquire::AllowDowngradeToInsecureRepositories=true" update
Hit:1 http://us.archive.ubuntu.com/ubuntu xenial InRelease
Hit:2 http://us.archive.ubuntu.com/ubuntu xenial-updates InRelease
Hit:3 http://us.archive.ubuntu.com/ubuntu xenial-backports InRelease
Hit:4 http://security.ubuntu.com/ubuntu xenial-security InRelease
Hit:5 http://ppa.launchpad.net/adiscon/v8-stable/ubuntu xenial InRelease
Hit:6 http://sgp1.mirrors.digitalocean.com/mariadb/repo/10.1/ubuntu xenial InRelease
Ign:7 https://conversionupdates.paloaltonetworks.com expedition-updates/ InRelease
Ign:8 https://conversionupdates.paloaltonetworks.com expedition-updates/ Release
Hit:9 http://www.rabbitmq.com/debian testing InRelease
Ign:10 https://conversionupdates.paloaltonetworks.com expedition-updates/ Packages.diff/Index
Ign:11 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en_US
Ign:12 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en
Ign:13 https://conversionupdates.paloaltonetworks.com expedition-updates/ Packages
Ign:11 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en_US
Ign:12 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en
Ign:13 https://conversionupdates.paloaltonetworks.com expedition-updates/ Packages
Ign:11 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en_US
Ign:12 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en
Ign:13 https://conversionupdates.paloaltonetworks.com expedition-updates/ Packages
Ign:11 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en_US
Ign:12 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en
Hit:13 https://conversionupdates.paloaltonetworks.com expedition-updates/ Packages
Ign:11 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en_US
Ign:12 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en
Ign:11 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en_US
Ign:12 https://conversionupdates.paloaltonetworks.com expedition-updates/ Translation-en
Reading package lists... Done
Building dependency tree
Reading state information... Done
34 packages can be upgraded. Run 'apt list --upgradable' to see them.
W: The repository 'https://conversionupdates.paloaltonetworks.com expedition-updates/ Release' does not have a Release file.
N: Data from such a repository can't be authenticated and is therefore potentially dangerous to use.
N: See apt-secure(8) manpage for repository creation and user configuration details.
root@Expedition:/# apt-get install expedition-beta=1.0.85
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Version '1.0.85' for 'expedition-beta' was not found
root@Expedition:/# apt-get install expedition-beta=1.0.90
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Version '1.0.90' for 'expedition-beta' was not found
root@Expedition:/# apt-get install expedition-beta=1.0.93
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
  linux-headers-4.4.0-124 linux-headers-4.4.0-124-generic linux-headers-4.4.0-31 linux-headers-4.4.0-31-generic linux-image-4.4.0-124-generic linux-image-4.4.0-31-generic linux-image-extra-4.4.0-124-generic
  linux-image-extra-4.4.0-31-generic
Use 'sudo apt autoremove' to remove them.
The following packages will be upgraded:
  expedition-beta
1 upgraded, 0 newly installed, 0 to remove and 33 not upgraded.
Need to get 40.1 MB of archives.
After this operation, 0 B of additional disk space will be used.
WARNING: The following packages cannot be authenticated!
  expedition-beta
Install these packages without verification? [y/N] N
E: Some packages could not be authenticated
root@Expedition:/#
&lt;/PRE&gt;</description>
      <pubDate>Tue, 26 Jun 2018 16:12:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219291#M167</guid>
      <dc:creator>PAN-Expert</dc:creator>
      <dc:date>2018-06-26T16:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219452#M183</link>
      <description>&lt;P&gt;By now you have to say YES to this question&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Install these packages without verification? [y/N] y&lt;/PRE&gt;
&lt;P&gt;Our server has invalid certificate still, as soon we change to the new package&amp;nbsp;named expedition instead of expedition-beta we will add a valid certificate then. Sorry for the confusion.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jun 2018 13:36:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219452#M183</guid>
      <dc:creator>alestevez</dc:creator>
      <dc:date>2018-06-27T13:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219454#M185</link>
      <description>&lt;P&gt;That was not the point of my comment, check the entire log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attempted to do this:&lt;/P&gt;
&lt;PRE&gt;apt-get install expedition-beta=1.0.85
&lt;/PRE&gt;
&lt;P&gt;I also attempted some other versions. However the expedition-beta=version# does not work, it only works if I put in the latest version. I need other interim versions as well, but that does not work, only latest one.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jun 2018 13:38:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219454#M185</guid>
      <dc:creator>PAN-Expert</dc:creator>
      <dc:date>2018-06-27T13:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to pull policies from a firewall managed by Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219456#M187</link>
      <description>&lt;P&gt;Probably is related we are not encrypting the Release file who contains the list of available version. We will request to have it when we move the packate expedition-beta to expedition. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jun 2018 13:42:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/unable-to-pull-policies-from-a-firewall-managed-by-panorama/m-p/219456#M187</guid>
      <dc:creator>alestevez</dc:creator>
      <dc:date>2018-06-27T13:42:48Z</dc:date>
    </item>
  </channel>
</rss>

