<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall integration to Panorama with initial/default device Post-Rules in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558827#M113354</link>
    <description>&lt;P&gt;Hi Tom, indeed your suggestion is a perfectly valid solution, however not so practical/scalable in our particular case. The project is global with multiple, independent 3rd party providers in various global regions, working independently of each other on whichever sets of firewalls/sites are under their deliverable contract.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Due to high complexity of applications (many non-standard manufacturing, highly specialized) and the absolute non-negotiable interruption to manufacturing, the rule implementations are implemented in several waves/iterations, each more and more detailed to ensure no critical flows are missed (sessions with multi-month active/idle duration, tcp-non-syn sessions, session drop = major financial impacts, a real horror show!).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Therefore, each firewall-cluster must have local to itself, the full set of allow 'migration-temp' rules. They are indeed identical on all firewalls no matter the region/site/network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only dumb idea I have so far, is to have that 'migration-temp' policy on a linux server and wait for the firewall to be integrated to Panorama before importing the policy, but then this a 2-step process + adds complexity of having a server to host the policy, over which I have no control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ideal solution would be to implement the 'migration-temp' policy as part of my automated procedure in a template (technically doesn't seem possible), maybe I'll just have to simply add these rules CLI style to the various device groups:&lt;BR /&gt;&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; from [ &amp;lt;from1&amp;gt; &amp;lt;from2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; to [ &amp;lt;to1&amp;gt; &amp;lt;to2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; source [ &amp;lt;source1&amp;gt; &amp;lt;source2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; destination [ &amp;lt;destination1&amp;gt; &amp;lt;destination2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; service [ &amp;lt;service1&amp;gt; &amp;lt;service2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; application [ &amp;lt;application1&amp;gt; &amp;lt;application2&amp;gt;... ]&lt;/P&gt;</description>
    <pubDate>Wed, 20 Sep 2023 14:40:18 GMT</pubDate>
    <dc:creator>Nogaro-STMicro</dc:creator>
    <dc:date>2023-09-20T14:40:18Z</dc:date>
    <item>
      <title>Firewall integration to Panorama with initial/default device Post-Rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558743#M113333</link>
      <description>&lt;P&gt;Hello, firstly, apologies for the long winded background info to explain my requirements !!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've a large project with hundreds of Firewalls to deploy. All initial base-configuration and Panorama-integration will be completed via the use of various specific templates, template-stacks and parent/child/grand-child device groups, achieved via auto-generated CLI commands based on minor manual device/location/IP specific inputs from each local site network-team (generates relevant set deviceconfig / request / set template / set template-stack commands).&lt;BR /&gt;&lt;BR /&gt;The device-groups are structured in such as way as to apply common/default rules worldwide + avoid duplicated rules (site-A to site-B, no need to update many firewalls in the path, only update the destination specific firewall):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;Parent DG&lt;/EM&gt; = worldwide-access, pre-rules + default-matrix, post-rules.
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;Child DG&lt;/EM&gt; = local-site-generic (avoid local-site rule duplication), post-rules.
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;Grand-child DG&lt;/EM&gt; = local-networks-specific, strictest policy, post-rules.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;All good so far.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the tricky part. Firewalls are inserted into highly critical areas of a 24/7 network, where maintenance windows are totally out of the question. Firewalls are in vWire mode with all inter-vlan L2/IP-L3 traffic flowing through the Firewalls.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;As part of the migration process therefore, initially all Firewalls need a set of 'migration-temp' allow rules to pass all traffic + permit log analysis (Expedition used for this purpose) for the creation of the final local-site/network specific policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 'migration-temp' rules are the same worldwide, however migrations will take place site-by-site, region-by-region, and only once specific policies are in place on a set of Firewalls should the 'migration-temp' rules be disabled = cannot use a common Parent/Child device-group for these 'migration-temp' rules (disable at the DG = disable for all DG members).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm looking to automate adding these 'migration-temp' rules as part of the initial semi-automated Firewall deployment phase. Since these need to be added to each separate Firewall cluster, and not to a common device-group, the only method I can think of is as follows:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;save a standard 'migration-temp'.config.xml on a linux server.&lt;/LI&gt;
&lt;LI&gt;once the firewall is integrated into Panorama, import the 'migration-temp' rules:&amp;nbsp;&lt;EM&gt;scp import configuration from name@host:path/migration-temp.config.xml&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Unless someone has a better and more elegant way to do this ? (I cannot see any possibility via a template setup, though that would be ideal, as I could then add the 'migration-temp' template to each site's template-stack and include this all within one procedure).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To those who read to the end, thank you so much !!&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 09:46:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558743#M113333</guid>
      <dc:creator>Nogaro-STMicro</dc:creator>
      <dc:date>2023-09-20T09:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration to Panorama with initial/default device Post-Rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558794#M113345</link>
      <description>&lt;P&gt;i don't know how 'leafy' your device group tree is, but have you considered adding a duplicate (grandparent) branch?&lt;/P&gt;
&lt;P&gt;branchA is premigration with the temp rules at the grandparent level, so all rules are already there + temp rules at the very top just below 'shared'&lt;/P&gt;
&lt;P&gt;branchB is the final branch without temp rules&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;all devices start in branchA, once they're in production just move them to branchB and the temp rules go away&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just trying to think of the dumbest most easiest way to do this&lt;/P&gt;
&lt;P&gt;if this does not apply to your case, let us know so we can put our thinking caps on (instead of my dunce hat)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 12:56:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558794#M113345</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-09-20T12:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration to Panorama with initial/default device Post-Rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558795#M113346</link>
      <description>&lt;P&gt;i don't know how 'leafy' your device group tree is, but have you considered adding a duplicate (grandparent) branch?&lt;/P&gt;
&lt;P&gt;branchA is premigration with the temp rules at the grandparent level, so all rules are already there + temp rules at the very top just below 'shared'&lt;/P&gt;
&lt;P&gt;branchB is the final branch without temp rules&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;all devices start in branchA, once they're in production just move them to branchB and the temp rules go away&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just trying to think of the dumbest most easiest way to do this&lt;/P&gt;
&lt;P&gt;if this does not apply to your case, let us know so we can put our thinking caps on (instead of my dunce hat)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 12:56:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558795#M113346</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-09-20T12:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration to Panorama with initial/default device Post-Rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558827#M113354</link>
      <description>&lt;P&gt;Hi Tom, indeed your suggestion is a perfectly valid solution, however not so practical/scalable in our particular case. The project is global with multiple, independent 3rd party providers in various global regions, working independently of each other on whichever sets of firewalls/sites are under their deliverable contract.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Due to high complexity of applications (many non-standard manufacturing, highly specialized) and the absolute non-negotiable interruption to manufacturing, the rule implementations are implemented in several waves/iterations, each more and more detailed to ensure no critical flows are missed (sessions with multi-month active/idle duration, tcp-non-syn sessions, session drop = major financial impacts, a real horror show!).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Therefore, each firewall-cluster must have local to itself, the full set of allow 'migration-temp' rules. They are indeed identical on all firewalls no matter the region/site/network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only dumb idea I have so far, is to have that 'migration-temp' policy on a linux server and wait for the firewall to be integrated to Panorama before importing the policy, but then this a 2-step process + adds complexity of having a server to host the policy, over which I have no control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ideal solution would be to implement the 'migration-temp' policy as part of my automated procedure in a template (technically doesn't seem possible), maybe I'll just have to simply add these rules CLI style to the various device groups:&lt;BR /&gt;&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; from [ &amp;lt;from1&amp;gt; &amp;lt;from2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; to [ &amp;lt;to1&amp;gt; &amp;lt;to2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; source [ &amp;lt;source1&amp;gt; &amp;lt;source2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; destination [ &amp;lt;destination1&amp;gt; &amp;lt;destination2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; service [ &amp;lt;service1&amp;gt; &amp;lt;service2&amp;gt;... ]&lt;BR /&gt;set device-group &amp;lt;name&amp;gt; post-rulebase security rules &amp;lt;name&amp;gt; application [ &amp;lt;application1&amp;gt; &amp;lt;application2&amp;gt;... ]&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 14:40:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-to-panorama-with-initial-default-device/m-p/558827#M113354</guid>
      <dc:creator>Nogaro-STMicro</dc:creator>
      <dc:date>2023-09-20T14:40:18Z</dc:date>
    </item>
  </channel>
</rss>

