<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Howto validate security policies for content inspection enabled ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28882#M21100</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With a little API work, it is possible to "report on the Security rulebase".&amp;nbsp; I found a good starting point in the devcenter communities, and then tweaked the sed lines to fix a formatting problem.&amp;nbsp; Here’s a single line that calls the API with curl, and then filters it through xmllint and sed: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;curl -k '&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.1.1.155/esp/restapi.esp?type=config&amp;amp;key=KEY=&amp;amp;action=show&amp;amp;xpath=devices/entry/vsys/entry/rulebase/security"&gt;https://10.1.1.155/esp/restapi.esp?type=config&amp;amp;key=KEY=&amp;amp;action=show&amp;amp;xpath=devices/entry/vsys/entry/rulebase/security&lt;/A&gt;&lt;SPAN&gt;' | xmllint --format --recover - | sed 's/&amp;lt;member&amp;gt;//g' | sed 's/&amp;lt;\/member&amp;gt;//g' &amp;gt; PAN_rules_`date "+%Y%m%d"`.xml&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That makes a file called: PAN_rules_20120817.xml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main reason to filter it through xmllint and sed is so that you can import the file directly into Excel.&amp;nbsp; Excel will automatically build a nice pretty interface that you can filter with some simple point&amp;amp;click action:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5985_pastedImage_10.png" style="width: 968px; height: 311px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an easy way to report on things like “show me all rules that might permit inbound SSH” – just select “to trust” and “application any &amp;amp; ssh” and go from there.&amp;nbsp; The traffic log &amp;amp; custom reports can definitely do this for actual passed traffic, but not for dormant rules. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Mar 2013 22:23:53 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2013-03-12T22:23:53Z</dc:date>
    <item>
      <title>Howto validate security policies for content inspection enabled ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28877#M21095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How would it be possible to validate the security policy rules to have all a content inspection profile enabled?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because the "option" field does not allow to be selected as filter in the editor tab. (as this is the case for e.g. addresses or zones)&lt;/P&gt;&lt;P&gt;Custom reports do also not include the ability to select content profile as an attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Wim&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 14:00:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28877#M21095</guid>
      <dc:creator>wimjuste</dc:creator>
      <dc:date>2013-03-12T14:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Howto validate security policies for content inspection enabled ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28878#M21096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to filter rules which enables anti-virus profile, named 'default',&lt;/P&gt;&lt;P&gt;you can use following filter &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(profile-setting/profiles/virus eq 'default')&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it help you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 14:23:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28878#M21096</guid>
      <dc:creator>emr_1</dc:creator>
      <dc:date>2013-03-12T14:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Howto validate security policies for content inspection enabled ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28879#M21097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi emr,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reply, your answer is helpful.&lt;/P&gt;&lt;P&gt;For instance, we use a predefined set of security groups (but I didn't mentioned this one in my question)&lt;/P&gt;&lt;P&gt;Though, your feedback is applicable for security groups as well ! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(profile-setting/group eq 'my-group-reference')&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought to be smart and use the "&lt;STRONG&gt;NEQ&lt;/STRONG&gt;" operator in order to find out all rules WITHOUT a 'my-group-reference', but then, NONE rules are displayed. (suppose is would be the same as (profile-setting/profiles/virus &lt;STRONG&gt;neq&lt;/STRONG&gt; 'default')&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know perhaps how to inverse the (profile-setting/group eq 'my-group-reference') ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 14:54:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28879#M21097</guid>
      <dc:creator>wimjuste</dc:creator>
      <dc:date>2013-03-12T14:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Howto validate security policies for content inspection enabled ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28880#M21098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see same result as you saw.&lt;/P&gt;&lt;P&gt;I tried 'neq', 'ne', '!=', '&amp;lt;&amp;gt;', though nothing worked.&lt;/P&gt;&lt;P&gt;From the output of GUI debug, I guess GUI does not have criteria for negate query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;request cmd="op" cookie="3832618156237601" target-vsys="vsys1"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;operations xml="yes"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;deep-search&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;address&amp;gt;(from/member neq 'L3-Trust1')&amp;lt;/address&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/deep-search&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;/operations&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/request&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;response status="error" code="17"&amp;gt;&amp;lt;msg&amp;gt;&amp;lt;line&amp;gt;&amp;lt;![CDATA[deep-search -&amp;gt; address Invalid input]]&amp;gt;&amp;lt;/line&amp;gt;&amp;lt;/msg&amp;gt;&amp;lt;/response&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 15:26:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28880#M21098</guid>
      <dc:creator>emr_1</dc:creator>
      <dc:date>2013-03-12T15:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Howto validate security policies for content inspection enabled ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28881#M21099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Damn too bad. A technical shortcoming.&lt;/P&gt;&lt;P&gt;We already asked our PAN SE to apply for a feature request in order to have all operators available through all attribute in the policy rule editor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nevertheless, this one might do the job:&lt;/P&gt;&lt;P&gt;1) filter all rules that includes a security profile group, using profile-setting/group eq 'my-group-reference'&lt;/P&gt;&lt;P&gt;2) Once filterd, select all rules listed.&lt;/P&gt;&lt;P&gt;3) Remove the selection criteria from the policy editor.&lt;/P&gt;&lt;P&gt;Now all rules including a security profile group are selected, which should be the majority.&lt;/P&gt;&lt;P&gt;Rules that do not have security group enabled (or different) are not selected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A visual cross check will indicate the suspected rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must admit that it takes some creative thinking to come to such a nasty solution .. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Wim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 15:59:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28881#M21099</guid>
      <dc:creator>wimjuste</dc:creator>
      <dc:date>2013-03-12T15:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Howto validate security policies for content inspection enabled ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28882#M21100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With a little API work, it is possible to "report on the Security rulebase".&amp;nbsp; I found a good starting point in the devcenter communities, and then tweaked the sed lines to fix a formatting problem.&amp;nbsp; Here’s a single line that calls the API with curl, and then filters it through xmllint and sed: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;curl -k '&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.1.1.155/esp/restapi.esp?type=config&amp;amp;key=KEY=&amp;amp;action=show&amp;amp;xpath=devices/entry/vsys/entry/rulebase/security"&gt;https://10.1.1.155/esp/restapi.esp?type=config&amp;amp;key=KEY=&amp;amp;action=show&amp;amp;xpath=devices/entry/vsys/entry/rulebase/security&lt;/A&gt;&lt;SPAN&gt;' | xmllint --format --recover - | sed 's/&amp;lt;member&amp;gt;//g' | sed 's/&amp;lt;\/member&amp;gt;//g' &amp;gt; PAN_rules_`date "+%Y%m%d"`.xml&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That makes a file called: PAN_rules_20120817.xml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main reason to filter it through xmllint and sed is so that you can import the file directly into Excel.&amp;nbsp; Excel will automatically build a nice pretty interface that you can filter with some simple point&amp;amp;click action:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5985_pastedImage_10.png" style="width: 968px; height: 311px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an easy way to report on things like “show me all rules that might permit inbound SSH” – just select “to trust” and “application any &amp;amp; ssh” and go from there.&amp;nbsp; The traffic log &amp;amp; custom reports can definitely do this for actual passed traffic, but not for dormant rules. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 22:23:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/howto-validate-security-policies-for-content-inspection-enabled/m-p/28882#M21100</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-03-12T22:23:53Z</dc:date>
    </item>
  </channel>
</rss>

