<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Converting Cisco ASA Access Lists to PAN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153945#M50773</link>
    <description>&lt;P&gt;Is there an easy way to convert a Cisco ACL to PAN format. Right now I have a 70 line ACL and it looks like each ACL will require 14 set commands. At this point I'm thinking it might be easier to just enter the 70&amp;nbsp;ACLs into the PAN via the GUI.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other thoughts on how to speed the operation? thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set rulebase security rules Beaglerun-L2L-VPN from corpfw2-untrust&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN to corp-vpn&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN source RFC-1918&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN destination any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN source-user any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN category any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN application [ ssh ssh-tunnel]&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN service application-default&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN hip-profiles any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN action allow&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN profile-setting group Corp-Default-SecPro-Block-nourl&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN log-start yes&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN log-setting QradarSyslogForwarder&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN disabled no&lt;/P&gt;</description>
    <pubDate>Mon, 24 Apr 2017 22:14:23 GMT</pubDate>
    <dc:creator>palomed</dc:creator>
    <dc:date>2017-04-24T22:14:23Z</dc:date>
    <item>
      <title>Converting Cisco ASA Access Lists to PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153945#M50773</link>
      <description>&lt;P&gt;Is there an easy way to convert a Cisco ACL to PAN format. Right now I have a 70 line ACL and it looks like each ACL will require 14 set commands. At this point I'm thinking it might be easier to just enter the 70&amp;nbsp;ACLs into the PAN via the GUI.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other thoughts on how to speed the operation? thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set rulebase security rules Beaglerun-L2L-VPN from corpfw2-untrust&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN to corp-vpn&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN source RFC-1918&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN destination any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN source-user any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN category any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN application [ ssh ssh-tunnel]&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN service application-default&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN hip-profiles any&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN action allow&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN profile-setting group Corp-Default-SecPro-Block-nourl&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN log-start yes&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN log-setting QradarSyslogForwarder&lt;BR /&gt;set rulebase security rules Beaglerun-L2L-VPN disabled no&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 22:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153945#M50773</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2017-04-24T22:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Converting Cisco ASA Access Lists to PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153953#M50774</link>
      <description>&lt;P&gt;Not sure if MigrationTool can be of any help. To me, it is a policy-like look&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 22:30:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153953#M50774</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-24T22:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Converting Cisco ASA Access Lists to PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153954#M50775</link>
      <description>&lt;P&gt;Do you have a link to the migration tool?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 22:42:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153954#M50775</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2017-04-24T22:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Converting Cisco ASA Access Lists to PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153959#M50778</link>
      <description>&lt;P&gt;an ASA 70 line ACL probably means no more than 15 policies in PA. Personally I would just convert them myself manually in the GUI (and have).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Download-the-Migration-Tool/ta-p/56582" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Download-the-Migration-Tool/ta-p/56582&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also I don't believe all those commands, like setting source user to any is necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also it's generally considered good practice to only log at session end. logging at session start is usually done only for troubleshooting purposes (you can reference the session browser prior to the session's termination)&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 23:35:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/153959#M50778</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-24T23:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Converting Cisco ASA Access Lists to PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/154076#M50811</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/54718"&gt;@palomed&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I just wanted to make sure that you knew you could actually combine all of those set commands into just one command. It would look like the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set rulebase security rules Beaglerun-L2L-VPN from corpfw2-untrust to corp-vpn source RFC-1918 destination any application [ ssh ssh-tunnel ] service application-default action allow disabled no&amp;nbsp;log-start yes log-setting QradarSyslogForwarder profile-setting group Corp-Default-SecPro-Block-nourl&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a few notes:&lt;/P&gt;&lt;P&gt;-log-start being yes with no log-end setting is uncommon. Are you sure you didn't want to log-end yes and leave log-start as no, that would be the most common.&lt;/P&gt;&lt;P&gt;- A lot of these commands are kind of unnessassary. For example category, hip-profiles, and disabled no could all easily be left out as that is the assumed settings on a new security rule.&lt;/P&gt;&lt;P&gt;- Any set command can be combined but keep in mind that there is not an 'add' command so if you wish to add an application you will need to make sure your set command includes all applications you actually wish to have on the security policy.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 14:35:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/converting-cisco-asa-access-lists-to-pan/m-p/154076#M50811</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-25T14:35:29Z</dc:date>
    </item>
  </channel>
</rss>

