<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CLI commands for Palo Alto configuration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198848#M58996</link>
    <description>&lt;P&gt;You should be able to get everything you need from CLI commands using ' | match'.&amp;nbsp; You'll probably just have to figure out the exact syntax for each item you want, like 'show | match snmp' or 'show | match download'.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Feb 2018 16:54:02 GMT</pubDate>
    <dc:creator>rmfalconer</dc:creator>
    <dc:date>2018-02-05T16:54:02Z</dc:date>
    <item>
      <title>CLI commands for Palo Alto configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198146#M58839</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any CLI commands which we can use to assess all the checks listed in the CIS Palo Alto Firewall 7 Benchmark?&lt;/P&gt;&lt;P&gt;&amp;nbsp;For Example:&lt;/P&gt;&lt;P&gt;Check : Ensure 'Minimum Password Complexity' is enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Navigate to Device &amp;gt; Setup &amp;gt; Management &amp;gt; Minimum Password Complexity.&lt;/P&gt;&lt;P&gt;Verify Enabled is checked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any CLI command on Palo Alto Firewall device for getting configuration such kind of configuration?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 11:25:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198146#M58839</guid>
      <dc:creator>Arti_K</dc:creator>
      <dc:date>2018-02-01T11:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: CLI commands for Palo Alto configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198258#M58863</link>
      <description>&lt;P&gt;As long as you know the syntax of the command you are searching for, you can find it pretty easily.&lt;/P&gt;&lt;P&gt;I prefer to use the set-based output on the CLI:&lt;/P&gt;&lt;P&gt;fw&amp;gt; set cli config-output-format set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then just do a match on the string you're trying to find:&lt;/P&gt;&lt;P&gt;fw# show | match complexity&lt;BR /&gt;set mgt-config password-complexity enabled yes&lt;BR /&gt;set mgt-config password-complexity minimum-length 8&lt;BR /&gt;set mgt-config password-complexity minimum-lowercase-letters 1&lt;BR /&gt;set mgt-config password-complexity minimum-numeric-letters 1&lt;BR /&gt;set mgt-config password-complexity minimum-special-characters 1&lt;BR /&gt;set mgt-config password-complexity minimum-uppercase-letters 1&lt;BR /&gt;set mgt-config password-complexity block-repeated-characters 3&lt;BR /&gt;set mgt-config password-complexity block-username-inclusion yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 16:08:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198258#M58863</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2018-02-01T16:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: CLI commands for Palo Alto configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198263#M58866</link>
      <description>&lt;P&gt;If you are using Panorama to push configs you would need to log into that instead and run.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff"&gt;Panorama&amp;gt; set cli config-output-format set&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT color="#0000ff"&gt;Panorama&amp;gt; configure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;Panorama# show device-group MY_FIREWALL | match complexity&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;This is the same result but if you push from Panorama the local firewall does not show those configs.&amp;nbsp; You would have to view them in the view not config mode and there is no output format option so it is all xml.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 16:23:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198263#M58866</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-01T16:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: CLI commands for Palo Alto configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198779#M58982</link>
      <description>&lt;P&gt;Thanks for the quick response. That's helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need to do configuration assessment for palo alto firewall device as per the CIS benchmark&lt;/P&gt;&lt;P&gt;recommendations.&lt;/P&gt;&lt;P&gt;Can anyone let me know if there are any CLI commands to set and get the following configurations:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'V3' is selected for SNMP polling&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'Verify Update Server Identity' is enabled&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;Ensure that User-ID is only enabled for internal trusted interfaces&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'Passive Link State' and 'Preemptive' are configured appropriately&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'Antivirus Update Schedule' is set to download and install updates hourly&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'Applications and Threats Update Schedule' is set to download and install updates daily&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure that WildFire file size upload limits are maximized&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure forwarding is enabled for all applications and file types in WildFire file blocking profiles&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure a WildFire file blocking profile is enabled for all security policies allowing Internet traffic flows&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure forwarding of decrypted content to WildFire is enabled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure all WildFire session information settings are enabled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure alerts are enabled for malicious files detected by WildFire&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'WildFire Update Schedule' is set to download and install updates every 15 minutes&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure at least one antivirus profile is set to block on all decoders except 'imap' and 'pop3'&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure a secure antivirus profile is applied to all relevant security policies&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threats&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure DNS sinkholing is configured on all anti-spyware profiles in use&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in use&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the Internet&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure a Vulnerability Protection Profile is set to block attacks against critical and high vulnerabilities, and set to default on medium, low, and informational vulnerabilities&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing traffic&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure that PAN-DB URL Filtering is used&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure that URL Filtering uses the action of “block” or “override” on the &amp;lt;enterprise approved value&amp;gt; URL categories&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure that access to every URL is logged&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure all HTTP Header Logging options are enabled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure secure URL filtering is enabled for all security policies allowing traffic to the Internet&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the Internet&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure that a Zone Protection Profile with an enabled SYN Flood Action of SYN Cookies is attached to all untrusted zones&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actions&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure all zones have Zone Protection Profiles that drop specially crafted packets&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is configured&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ensure 'SSL Inbound Inspection' is required for all untrusted traffic destined for servers using SSL or TLS&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 05 Feb 2018 08:37:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198779#M58982</guid>
      <dc:creator>Arti_K</dc:creator>
      <dc:date>2018-02-05T08:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: CLI commands for Palo Alto configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198848#M58996</link>
      <description>&lt;P&gt;You should be able to get everything you need from CLI commands using ' | match'.&amp;nbsp; You'll probably just have to figure out the exact syntax for each item you want, like 'show | match snmp' or 'show | match download'.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 16:54:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198848#M58996</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2018-02-05T16:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: CLI commands for Palo Alto configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198900#M59003</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82305"&gt;@Arti_K&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;SOme of these that you have listed won't be answered by using the 'match' command without quite a bit of CLI knowledge to ensure nothing get's overlooked. I&amp;nbsp;&lt;EM&gt;highly&lt;/EM&gt; recommend that you actually review the configuration to ensure each recommendation is acutally being followed by physically looking over the configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 22:04:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-commands-for-palo-alto-configuration/m-p/198900#M59003</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-05T22:04:06Z</dc:date>
    </item>
  </channel>
</rss>

