<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Limited CLI Rights in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219519#M123182</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/568060593"&gt;@edroche3rd&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Howdy All!&lt;/P&gt;
&lt;P&gt;We are in need of finding a way to give a help desk individual limited access to the CLI to run a Python script to clear addresses from the DoS Blocked-Table. The 2 commands it is running is the&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;debug dataplane show dos block-table&lt;/LI&gt;
&lt;LI&gt;debug dataplane reset dos zone &amp;lt;zone&amp;gt; block-table source &amp;lt;ip address&amp;gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I have found so far at a high level is either full, read, or none. Any thoughts or ideas please feel free to respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;Ed&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This isn't too difficult of a task, but you'd need to create and use a TACAS+ authentication method.&amp;nbsp; Using TACACS+ you can specify what commands can be executed.&amp;nbsp; However you'd first need a TACACS+ device capable auth server, like ISE or Clearpass.&amp;nbsp; If you have either of these things, then the request is simple.&amp;nbsp; Without it I don't think Palo has an built in RBAC capability to do what you're asking.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Feb 2025 15:00:32 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2025-02-05T15:00:32Z</dc:date>
    <item>
      <title>Limited CLI Rights</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219394#M123172</link>
      <description>&lt;P&gt;Howdy All!&lt;/P&gt;
&lt;P&gt;We are in need of finding a way to give a help desk individual limited access to the CLI to run a Python script to clear addresses from the DoS Blocked-Table. The 2 commands it is running is the&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;debug dataplane show dos block-table&lt;/LI&gt;
&lt;LI&gt;debug dataplane reset dos zone &amp;lt;zone&amp;gt; block-table source &amp;lt;ip address&amp;gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I have found so far at a high level is either full, read, or none. Any thoughts or ideas please feel free to respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219394#M123172</guid>
      <dc:creator>edroche3rd</dc:creator>
      <dc:date>2025-02-04T18:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Limited CLI Rights</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219519#M123182</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/568060593"&gt;@edroche3rd&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Howdy All!&lt;/P&gt;
&lt;P&gt;We are in need of finding a way to give a help desk individual limited access to the CLI to run a Python script to clear addresses from the DoS Blocked-Table. The 2 commands it is running is the&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;debug dataplane show dos block-table&lt;/LI&gt;
&lt;LI&gt;debug dataplane reset dos zone &amp;lt;zone&amp;gt; block-table source &amp;lt;ip address&amp;gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I have found so far at a high level is either full, read, or none. Any thoughts or ideas please feel free to respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;Ed&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This isn't too difficult of a task, but you'd need to create and use a TACAS+ authentication method.&amp;nbsp; Using TACACS+ you can specify what commands can be executed.&amp;nbsp; However you'd first need a TACACS+ device capable auth server, like ISE or Clearpass.&amp;nbsp; If you have either of these things, then the request is simple.&amp;nbsp; Without it I don't think Palo has an built in RBAC capability to do what you're asking.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 15:00:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219519#M123182</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2025-02-05T15:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Limited CLI Rights</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219521#M123183</link>
      <description>&lt;P&gt;Perhaps not as granular, but could you not also setup XML API access for a specific account?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/568060593"&gt;@edroche3rd&lt;/a&gt;&amp;nbsp;for reference, here is some additional documentation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-an-admin-role-profile#id168f0789-fa2d-49f7-bd3a-8b37b306ad42" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-an-admin-role-profile#id168f0789-fa2d-49f7-bd3a-8b37b306ad42&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 05 Feb 2025 15:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219521#M123183</guid>
      <dc:creator>nohash4u</dc:creator>
      <dc:date>2025-02-05T15:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Limited CLI Rights</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219542#M123187</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/568060593"&gt;@edroche3rd&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I don't think you'll find an "easy" way to do this. Either you grant that permission via TACACS+ as &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt; mentioned or create a script to do it that you would then give your helpdesk staff the ability to run.The XML API permissions themselves are a bit more restrictive, but you would still be granting them the ability to issue any operational request. Since we're talking about debug commands here, none of the built-in capability solely through PAN is going to really fit the bill.&lt;/P&gt;
&lt;P&gt;I'd kind of question if DoS is tuned properly if this is something that is being ran into enough that it's not a rare enough occurrence that helpdesk is seeking to do it themselves. If you're seeing regular violations of your limits, they may just be set a bit too low if they're regularly being surpassed by "real" clients.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll just caution that doing this "properly" to not over provision access and limiting the ability to just this simple task isn't without issue. The TACACS+ method is going to provide the most amount of flexibility in allowing &lt;EM&gt;exactly &lt;/EM&gt;what you want them to do outside of taking the time to script it and have the helpdesk run the script from a secure platform. I personally wouldn't want to give the ability to run operational commands directly to helpdesk staff; there's quite a bit of risk in those credentials getting out to more people. &lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 22:30:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219542#M123187</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-02-05T22:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Limited CLI Rights</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219677#M123205</link>
      <description>&lt;P&gt;Hi All!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for sharing your ideas and thoughts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-L6-Presenter lia-component-message-view-widget-author-username"&gt;&lt;A id="link_18" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300" target="_self" aria-label="View Profile of Brandon_Wertz"&gt;&lt;SPAN class=""&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt; we do have a ISE device that we use for our Cisco devices currently. I wasn't sure if ISE would work with other manufactures but to be able to restrict to specific commands makes this the ideal way.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-L6-Presenter lia-component-message-view-widget-author-username"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/65137099"&gt;@nohash4u&lt;/a&gt;&amp;nbsp;I did go looking down the API rabbit hole but was unable to find the proper command to view and clear the table.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-L6-Presenter lia-component-message-view-widget-author-username"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;We have the script created already and the permission part is the last step. We have tuned it at this point as well and not seeing as many as we were when first implementing. Since we already have an ISE device this will definitely be the best way to go.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-L6-Presenter lia-component-message-view-widget-author-username"&gt;Thanks again for the replies they were much appriciated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-L6-Presenter lia-component-message-view-widget-author-username"&gt;Ed&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 17:44:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limited-cli-rights/m-p/1219677#M123205</guid>
      <dc:creator>edroche3rd</dc:creator>
      <dc:date>2025-02-06T17:44:34Z</dc:date>
    </item>
  </channel>
</rss>

