<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring GlobalProtect via Ansible in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configuring-globalprotect-via-ansible/m-p/1247850#M7275</link>
    <description>&lt;P&gt;While the official ansible-playbooks repository provides a great foundation for general firewall tasks, it currently lacks a dedicated, "out-of-the-box" playbook for a full GlobalProtect configuration. This is because GlobalProtect involves several disparate components (Certificates, Portals, Gateways, and Authentication Profiles) that often require specific environment details. To automate this, you should use the paloaltonetworks.panos collection, which contains the building blocks you need: use panos_cert_gen_ssh to handle the required SSL certificates, panos_import for GlobalProtect client software, and panos_type_cmd or panos_config_element to push the specific XML structures for the Portal and Gateway settings if a high-level module isn't available for your specific PAN-OS version. For a more comprehensive starting point, many users leverage the pan-os-ansible repository's module documentation to chain these tasks together into a custom "GlobalProtect" role.&lt;/P&gt;</description>
    <pubDate>Tue, 10 Feb 2026 09:11:37 GMT</pubDate>
    <dc:creator>erin77brown</dc:creator>
    <dc:date>2026-02-10T09:11:37Z</dc:date>
    <item>
      <title>Configuring GlobalProtect via Ansible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configuring-globalprotect-via-ansible/m-p/1247615#M7274</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I'm working on creating an automated Ansible process through which I can configure GlobalProtect in PAN Firewall.&lt;BR /&gt;&lt;BR /&gt;The automaton process I try to create it based on the official Paloalto Repository containing ansible playbooks:&lt;BR /&gt;&lt;A href="https://github.com/PaloAltoNetworks/ansible-playbooks" target="_blank"&gt;GitHub - PaloAltoNetworks/ansible-playbooks: Sample playbooks for the Palo Alto Networks Ansible modules.&lt;/A&gt;&lt;BR /&gt;Unfortunately, I cannot find any playbook in the repository that is directly used to configure GlobalProtect.&lt;BR /&gt;&lt;BR /&gt;Do you have any information which playbooks I can use to configure GlobalProtect or do you have any other repository containing Ansible playbooks used to configure GlobalProtect?&lt;BR /&gt;&lt;BR /&gt;Best regards!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 14:16:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configuring-globalprotect-via-ansible/m-p/1247615#M7274</guid>
      <dc:creator>marcin.radko</dc:creator>
      <dc:date>2026-02-06T14:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect via Ansible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configuring-globalprotect-via-ansible/m-p/1247850#M7275</link>
      <description>&lt;P&gt;While the official ansible-playbooks repository provides a great foundation for general firewall tasks, it currently lacks a dedicated, "out-of-the-box" playbook for a full GlobalProtect configuration. This is because GlobalProtect involves several disparate components (Certificates, Portals, Gateways, and Authentication Profiles) that often require specific environment details. To automate this, you should use the paloaltonetworks.panos collection, which contains the building blocks you need: use panos_cert_gen_ssh to handle the required SSL certificates, panos_import for GlobalProtect client software, and panos_type_cmd or panos_config_element to push the specific XML structures for the Portal and Gateway settings if a high-level module isn't available for your specific PAN-OS version. For a more comprehensive starting point, many users leverage the pan-os-ansible repository's module documentation to chain these tasks together into a custom "GlobalProtect" role.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 09:11:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configuring-globalprotect-via-ansible/m-p/1247850#M7275</guid>
      <dc:creator>erin77brown</dc:creator>
      <dc:date>2026-02-10T09:11:37Z</dc:date>
    </item>
  </channel>
</rss>

