<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Convert Local Security Policies to Panorama Policies in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227626#M389</link>
    <description>&lt;P&gt;"&lt;SPAN&gt;because the device serial #'s stick in the Panorama firewall rules." - in what, the targets of the rules? Yeesh, that sounds like a bad situation. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think what I would do, honestly, is go get the "set" commands from the local firewalls that consitute their firewall policies, and then do some clever find/replace, and put those rules into Panorama as Pre-Rules via Panorama's CLI. You'd have to do things like set device groups, etc in the text you would paste into Panorama's cli, etc. Without seeing it in total, its hard to say, but on the surface, that sounds like the direction I would go.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Don't get me wrong, there might be a case to use Expedtiion for this, but it sounds to me like something that would be easier to do with a little "manual" effort.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Aug 2018 16:42:54 GMT</pubDate>
    <dc:creator>Tim_Grossner</dc:creator>
    <dc:date>2018-08-20T16:42:54Z</dc:date>
    <item>
      <title>Convert Local Security Policies to Panorama Policies</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227622#M385</link>
      <description>&lt;P&gt;We have quite a few Palo Altos that we inherited that have many local policies. We would like to manage these policies via Panorama.&amp;nbsp;Is it possible to convert Local Security Policies to Panorama Policies using Expedition? If so is there a guide on how to do that?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 16:10:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227622#M385</guid>
      <dc:creator>CZellars</dc:creator>
      <dc:date>2018-08-20T16:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Convert Local Security Policies to Panorama Policies</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227624#M387</link>
      <description>&lt;P&gt;In such as situation, I would do an import of the local firewall config into Panorama via the function "Import device configuration to Panorama" , which will import the devices config into Panorama as a device group and template. Expedition doesn't really gain you anything that I am aware.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 16:29:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227624#M387</guid>
      <dc:creator>Tim_Grossner</dc:creator>
      <dc:date>2018-08-20T16:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: Convert Local Security Policies to Panorama Policies</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227625#M388</link>
      <description>&lt;P&gt;Tim Thank you for responding. The firewalls in question are already in Panorama and currently use a combination of Panorama pre/post rules as well as local rules. Are you saying that it is&amp;nbsp;possible to import a firewall configuration into Panorama that is already in Panorama? We tried removing the firewalls from Panorama in order to then import them but ran into a situation where we cannot automatically remove any firewalls from Panorama because the device serial #'s stick in the Panorama firewall rules. We would then have to go to each rule and remove the firewalls serial individually and there are 1000's of rules and close to 50 firewalls.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 16:35:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227625#M388</guid>
      <dc:creator>CZellars</dc:creator>
      <dc:date>2018-08-20T16:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Convert Local Security Policies to Panorama Policies</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227626#M389</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;because the device serial #'s stick in the Panorama firewall rules." - in what, the targets of the rules? Yeesh, that sounds like a bad situation. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think what I would do, honestly, is go get the "set" commands from the local firewalls that consitute their firewall policies, and then do some clever find/replace, and put those rules into Panorama as Pre-Rules via Panorama's CLI. You'd have to do things like set device groups, etc in the text you would paste into Panorama's cli, etc. Without seeing it in total, its hard to say, but on the surface, that sounds like the direction I would go.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Don't get me wrong, there might be a case to use Expedtiion for this, but it sounds to me like something that would be easier to do with a little "manual" effort.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 16:42:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227626#M389</guid>
      <dc:creator>Tim_Grossner</dc:creator>
      <dc:date>2018-08-20T16:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: Convert Local Security Policies to Panorama Policies</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227643#M390</link>
      <description>&lt;P&gt;Thank you Tim for your advice. I agree with you that this may be best to attack from the CLI and possibly using the "&lt;SPAN&gt;load config partial" commands. Looking at the policies on one of my 5000 units I see close to 700 local policies and am wondering how the address objects will play a role in the load config partial functionality. I appreciate your help again.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 19:23:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/227643#M390</guid>
      <dc:creator>CZellars</dc:creator>
      <dc:date>2018-08-20T19:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Convert Local Security Policies to Panorama Policies</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/228190#M400</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to the firewall panorama setting and disable device group and template settings. When you doing that it will popup window to tick import panorama objects and policies. Enable that tick and commit then all the panorama objects and policies will be available on the local firewall. After get a backup from firewall and import it to the panorama and do the force commit ( When importing config to panorama it will create default name for the device group and template you can change it ).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see the attached screenshot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama Settings.PNG" style="width: 666px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16342i04577DDE294D432F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama Settings.PNG" alt="Panorama Settings.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Aug 2018 14:16:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/convert-local-security-policies-to-panorama-policies/m-p/228190#M400</guid>
      <dc:creator>gayanr</dc:creator>
      <dc:date>2018-08-24T14:16:31Z</dc:date>
    </item>
  </channel>
</rss>

