<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Get a full list of security rules with IPS Profiles in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/460989#M2887</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136552"&gt;@ryan.slater&lt;/a&gt;, are you targeting NGFWs with the Ansible playbook? An do the NGFWs only have rules pushed from Panorama? If so, I see the same behaviour. I -do not- see an empty list if I target NGFWs with locally configured rules.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jan 2022 20:15:26 GMT</pubDate>
    <dc:creator>JimmyHolland</dc:creator>
    <dc:date>2022-01-25T20:15:26Z</dc:date>
    <item>
      <title>Get a full list of security rules with IPS Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/459325#M2883</link>
      <description>&lt;P&gt;I am trying to create a playbook that will go through a devices active policy and for any Allow rule list out the IPS profile defined for that rule.&amp;nbsp; Currently I have not been able to get my playbook to provide the output of the rules so I can filter, so I know I must be doing something wrong.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the playbook that I am currently using:&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;tasks&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - &lt;/SPAN&gt;&lt;SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;Get a list of all security rules&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;paloaltonetworks.panos.panos_security_rule_facts&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;provider&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;'{{ device }}'&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;details&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;true&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;rulebase&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;rulebase&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;register&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;sec_rules&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;environment&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;'{{ proxy_env }}'&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - &lt;/SPAN&gt;&lt;SPAN&gt;debug&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;msg&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;'{{ sec_rules.rule_details }}'&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;And here is the output that I am currently getting when I run this playbook against a firewall:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;ok: [FW-LAB] =&amp;gt; {&lt;BR /&gt;"msg": []&lt;BR /&gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;What am I missing to be able to see the full list of rules so I can start to create my filter?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;RS&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 Jan 2022 19:51:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/459325#M2883</guid>
      <dc:creator>ryan.slater</dc:creator>
      <dc:date>2022-01-18T19:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Get a full list of security rules with IPS Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/460989#M2887</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136552"&gt;@ryan.slater&lt;/a&gt;, are you targeting NGFWs with the Ansible playbook? An do the NGFWs only have rules pushed from Panorama? If so, I see the same behaviour. I -do not- see an empty list if I target NGFWs with locally configured rules.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 20:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/460989#M2887</guid>
      <dc:creator>JimmyHolland</dc:creator>
      <dc:date>2022-01-25T20:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Get a full list of security rules with IPS Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/464686#M2918</link>
      <description>&lt;P&gt;Sorry for the late reply.&amp;nbsp; Yes I am targeting the NGFW directly with the playbook, and the NGFW's are managed via a Panorama appliance.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 01:42:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/get-a-full-list-of-security-rules-with-ips-profiles/m-p/464686#M2918</guid>
      <dc:creator>ryan.slater</dc:creator>
      <dc:date>2022-02-10T01:42:37Z</dc:date>
    </item>
  </channel>
</rss>

