<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Error When Adding IP Address to Address Group via the XML API in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/error-when-adding-ip-address-to-address-group-via-the-xml-api/m-p/524649#M1281</link>
    <description>&lt;P&gt;I am working on a SOAR automation workflow that automatically adds an IP address to a Block List if Palo Alto identifies it as a “CRITICAL” or “HIGH” vulnerability coming from outside to inside our network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am getting an error once the workflow reaches the part where it attempts to add the IP address to the block list. The error is the response to the XML API request and is:&amp;nbsp;&lt;CODE&gt;{"line": "&amp;lt;ADDRESS_GROUP_NAME&amp;gt; -&amp;gt; ip-netmask unexpected here"}&lt;/CODE&gt;&amp;nbsp;where &amp;lt;ADDRESS_GROUP_NAME&amp;gt; is the name of the address group IP addresses get added to where they get auto-denied from entry to our network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm&amp;nbsp;using the Panorama “SET” action, and the XPATH I’ve specified is:&lt;/P&gt;
&lt;P&gt;&lt;CODE&gt;/config/devices/entry[@name='localhost.localdomain']/device-group/entry[@name='&amp;lt;DEVICE_LOCATION&amp;gt;']/address-group/entry[@name='&amp;lt;ADDRESS_GROUP_NAME&amp;gt;']&lt;/CODE&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;The element I’ve specified is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;static&amp;gt;
	&amp;lt;member&amp;gt;
		{{["Action 1"].[event].[entryObject].[source_ip]}}
	&amp;lt;/member&amp;gt;
&amp;lt;/static&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; The odd-looking variable in the middle is a dynamic variable used by the SOAR tool that will put the Source IP of the vulnerability detection in there.&lt;/P&gt;
&lt;P&gt;&lt;CODE class="language-jsx"&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;I came across some Palo Alto documentation here:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CleqCAC" target="_blank" rel="noopener"&gt;Add a Shared Address Object Using XML API to Panorama&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This documentation mentions that the Network Mask needs to be specified in CIDR notation for the IP address to be added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where does that netmask come from? Is it based on the source IP being submitted, or is it based on our internal network?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2022 22:01:58 GMT</pubDate>
    <dc:creator>RyanWittmers</dc:creator>
    <dc:date>2022-12-20T22:01:58Z</dc:date>
    <item>
      <title>Error When Adding IP Address to Address Group via the XML API</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/error-when-adding-ip-address-to-address-group-via-the-xml-api/m-p/524649#M1281</link>
      <description>&lt;P&gt;I am working on a SOAR automation workflow that automatically adds an IP address to a Block List if Palo Alto identifies it as a “CRITICAL” or “HIGH” vulnerability coming from outside to inside our network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am getting an error once the workflow reaches the part where it attempts to add the IP address to the block list. The error is the response to the XML API request and is:&amp;nbsp;&lt;CODE&gt;{"line": "&amp;lt;ADDRESS_GROUP_NAME&amp;gt; -&amp;gt; ip-netmask unexpected here"}&lt;/CODE&gt;&amp;nbsp;where &amp;lt;ADDRESS_GROUP_NAME&amp;gt; is the name of the address group IP addresses get added to where they get auto-denied from entry to our network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm&amp;nbsp;using the Panorama “SET” action, and the XPATH I’ve specified is:&lt;/P&gt;
&lt;P&gt;&lt;CODE&gt;/config/devices/entry[@name='localhost.localdomain']/device-group/entry[@name='&amp;lt;DEVICE_LOCATION&amp;gt;']/address-group/entry[@name='&amp;lt;ADDRESS_GROUP_NAME&amp;gt;']&lt;/CODE&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;The element I’ve specified is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;static&amp;gt;
	&amp;lt;member&amp;gt;
		{{["Action 1"].[event].[entryObject].[source_ip]}}
	&amp;lt;/member&amp;gt;
&amp;lt;/static&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; The odd-looking variable in the middle is a dynamic variable used by the SOAR tool that will put the Source IP of the vulnerability detection in there.&lt;/P&gt;
&lt;P&gt;&lt;CODE class="language-jsx"&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;I came across some Palo Alto documentation here:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CleqCAC" target="_blank" rel="noopener"&gt;Add a Shared Address Object Using XML API to Panorama&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This documentation mentions that the Network Mask needs to be specified in CIDR notation for the IP address to be added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where does that netmask come from? Is it based on the source IP being submitted, or is it based on our internal network?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 22:01:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/error-when-adding-ip-address-to-address-group-via-the-xml-api/m-p/524649#M1281</guid>
      <dc:creator>RyanWittmers</dc:creator>
      <dc:date>2022-12-20T22:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: Error When Adding IP Address to Address Group via the XML API</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/error-when-adding-ip-address-to-address-group-via-the-xml-api/m-p/524890#M1286</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I understand what you are attempting to accomplish and here are a few things to think about.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Inspect inbound traffic with Anti-Virus, Anti-Spyware, and Vulnerability protection
&lt;UL&gt;
&lt;LI&gt;This should drop/block the traffic&lt;/LI&gt;
&lt;LI&gt;Anti-Spyware policies can be made to automatically block traffic from the source for up to 1 hour.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure a Zone Protection Policy for your external interfaces (and internal). These can also block sources for up to and hour.&lt;/LI&gt;
&lt;LI&gt;Configure DoS Protection and apply it to your inbound security profiles.&lt;/LI&gt;
&lt;LI&gt;Utilize and block traffic to/from the predefined External Dynamic Lists&lt;/LI&gt;
&lt;LI&gt;Turn on telemetry and send the data back to Palo Alto
&lt;UL&gt;
&lt;LI&gt;This way Palo Alto can update their signatures&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Whitelist the incoming IP's, if practical.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These are dynamic and require no input or additional resources to accomplish. Honestly play IP whack-a-mole is not a very good method. If the firewall is blocking it, then its doing its job.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices" target="_blank"&gt;https://docs.paloaltonetworks.com/best-practices&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just my thoughts.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 20:17:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/error-when-adding-ip-address-to-address-group-via-the-xml-api/m-p/524890#M1286</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-12-22T20:17:04Z</dc:date>
    </item>
  </channel>
</rss>

