<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Populating Panorama from an existing firewall. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47289#M34758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to the &lt;A __default_attr="13347" __jive_macro_name="message" class="jive_macro jive_macro_message" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; such feature request is done already a year ago.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's actually very strange, that vendor, whose only product is firewall, is so behind with common features, that every other firewall vendor have. PaloAlto must do serious jump, as right now I feel that simple the term "next generation" doesn't ring the bell anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also others vendors have made progress. I almost regret moving from CheckPoint to PaloAlto as I miss so much common features...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Mar 2013 09:53:40 GMT</pubDate>
    <dc:creator>ksuuk</dc:creator>
    <dc:date>2013-03-18T09:53:40Z</dc:date>
    <item>
      <title>Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47284#M34753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a lab PA2050 that I have tweaked to exactly where I want it to be. We are now trying to add it to a lab Panorama and I would like to populate Panorama with all of the policies and objects from the lab 2050. I exported the running config to an xml and imported it to the Panorama instance and just changed the server information (IP, gateway, DNS servers, etc...) It kept spitting up errors about administration.&lt;/P&gt;&lt;P&gt;Without modding the xml by hand, is there an easy way to import the policies and objects from the 2050 in Panorama?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Mar 2013 13:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47284#M34753</guid>
      <dc:creator>bgranholm</dc:creator>
      <dc:date>2013-03-06T13:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47285#M34754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not possible to directly import the device config to Panorama.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to do some manual tasks.Here is a document that describes the process&amp;nbsp; &lt;A __default_attr="1742" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's also possible to use the migration tool to migrate policies and objects into Panorama.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Mar 2013 15:58:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47285#M34754</guid>
      <dc:creator>torm</dc:creator>
      <dc:date>2013-03-06T15:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47286#M34755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a program called 'panto.py' in the PAN-ksteves package&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(&lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" data-containerid="2010" data-containertype="14" data-objectid="3533" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-3533"&gt;https://live.paloaltonetworks.com/docs/DOC-3533&lt;/A&gt;&lt;SPAN&gt;) that can&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;assist with Panorama migration.&amp;nbsp; It uses a panxapi program&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;from either PAN-perl (&lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" data-containerid="2010" data-containertype="14" data-objectid="1910" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1910"&gt;https://live.paloaltonetworks.com/docs/DOC-1910&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;or PAN-python (&lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" data-containerid="2010" data-containertype="14" data-objectid="4762" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-4762"&gt;https://live.paloaltonetworks.com/docs/DOC-4762&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;to do the migration tasks using the XML API.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If for example you wanted to migrate address object, groups, security&lt;/P&gt;&lt;P&gt;and nat rulebase your input file to panto.py could be something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set panxapi-program panxapi.py&lt;/P&gt;&lt;P&gt;set panxapi-from-tag pa-2020&lt;/P&gt;&lt;P&gt;set panxapi-to-tag panorama&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;setvar CONFIG_VSYS '/config/devices/entry/vsys/entry'&lt;/P&gt;&lt;P&gt;setvar DEVICE_GROUP 'finance-dg'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;migrate from-xpath $CONFIG_VSYS/address to-xpath-device-group $DEVICE_GROUP&lt;/P&gt;&lt;P&gt;migrate from-xpath $CONFIG_VSYS/address-group to-xpath-device-group $DEVICE_GROUP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;migrate from-xpath $CONFIG_VSYS/rulebase/security to-xpath-device-group $DEVICE_GROUP pre-rulebase&lt;/P&gt;&lt;P&gt;migrate from-xpath $CONFIG_VSYS/rulebase/nat to-xpath-device-group $DEVICE_GROUP post-rulebase&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the panto.py program would create the panxapi commands to show and&lt;/P&gt;&lt;P&gt;delete the configuration on PAN-OS, and set the configuration on&lt;/P&gt;&lt;P&gt;Panorama.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Mar 2013 21:45:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47286#M34755</guid>
      <dc:creator>ksteves1</dc:creator>
      <dc:date>2013-03-09T21:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47287#M34756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This all is very confusing. Device to Panorama official manual is outdated, some scripts have done, but lack of documentation, so I still can't figure out how to migrate existing device config to Panorama? Seems with official set &amp;amp;copy/paste method I can't migrate the whole config. Second option is manually copy/paste config parts from device XML to Panorama XML.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both methods seems crazy in year 2013, when others vendors do it automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So Your script sounds good. Can I migrate the whole config?&amp;nbsp; But please explain more, how to export data from device and import it into Panorama. Where to add device IP, Panorama IP etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 09:29:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47287#M34756</guid>
      <dc:creator>ksuuk</dc:creator>
      <dc:date>2013-03-18T09:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47288#M34757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think your best option is to contact your SE and make sure that a feature request is filed towards the HQ that the Panorama in 2013 should be able to simply just import any PA device (so the admin doesnt have to either redo all work or run all sort of scripts and read outdated docs).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 09:42:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47288#M34757</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-18T09:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47289#M34758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to the &lt;A __default_attr="13347" __jive_macro_name="message" class="jive_macro jive_macro_message" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; such feature request is done already a year ago.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's actually very strange, that vendor, whose only product is firewall, is so behind with common features, that every other firewall vendor have. PaloAlto must do serious jump, as right now I feel that simple the term "next generation" doesn't ring the bell anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also others vendors have made progress. I almost regret moving from CheckPoint to PaloAlto as I miss so much common features...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 09:53:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47289#M34758</guid>
      <dc:creator>ksuuk</dc:creator>
      <dc:date>2013-03-18T09:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47290#M34759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am really sorry to hear that ksuuk.&amp;nbsp; We are constantly evaluating feature requests and although, this is an important feature, there is a work around with the script.&amp;nbsp;&amp;nbsp; Hopefully once you do the import, you will find that the UI is intuitive and easy to use.&amp;nbsp; With that said, your feedback is important, and contacting your SE to re-enforce the request is the best way for product management to prioritize features for future release.&amp;nbsp; Thank you and please know we are listening.&amp;nbsp; Thank you,&lt;/P&gt;&lt;P&gt;~Jamie &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 18:34:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47290#M34759</guid>
      <dc:creator>Jamiefitzgerald</dc:creator>
      <dc:date>2013-03-18T18:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47291#M34760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;This is a much needed feature..&amp;nbsp; Why?&amp;nbsp; Because most people buy the firewalls first and as they buy more they see a need for Panorama.&amp;nbsp; Well it is hard to use Panorama to it's fullest features when you can't import the current devices configs to the Panorama Server.&amp;nbsp;&amp;nbsp; It is very hard to manually put all that into Panorama especially with policies and tons of url and address objects.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 19:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47291#M34760</guid>
      <dc:creator>netslh</dc:creator>
      <dc:date>2013-04-18T19:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Populating Panorama from an existing firewall.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47292#M34761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I really, sincerely hope this feature request was implemented in Panorama 6.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's &lt;STRONG&gt;ridiculous&amp;nbsp; &lt;/STRONG&gt;that a centralized management solution created by a firewall company isn't able to import device configs. I feel this concept should have been included on a feature requirements document that was incorporated into Panorama 1.0 honestly, not that we're still going to be waiting for it in 2014.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Dec 2013 16:34:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/populating-panorama-from-an-existing-firewall/m-p/47292#M34761</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-12-18T16:34:19Z</dc:date>
    </item>
  </channel>
</rss>

