<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Rules using CLI in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10348#M7613</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 400 security rules, how can i find security rule using CLI?&lt;/P&gt;&lt;P&gt;I know only IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 May 2013 18:40:59 GMT</pubDate>
    <dc:creator>Wbm</dc:creator>
    <dc:date>2013-05-28T18:40:59Z</dc:date>
    <item>
      <title>Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10348#M7613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 400 security rules, how can i find security rule using CLI?&lt;/P&gt;&lt;P&gt;I know only IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 18:40:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10348#M7613</guid>
      <dc:creator>Wbm</dc:creator>
      <dc:date>2013-05-28T18:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10349#M7614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it'll be difficult in cli as the grep lookup will skip the rule name as it scours for the value (ip address) as shown below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-200&amp;gt; show running security-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"test group" {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from L3_Trust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to L3_Untrust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application/service&amp;nbsp; any/any/any/any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; terminal yes;&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no_custom_cat {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from L3_Trust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to L3_Untrust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination 130.199.4.27;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application/service&amp;nbsp; any/tcp/any/21;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; terminal yes;&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"iPad Mini" {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from L3_Trust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source 172.16.20.211;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to L3_Untrust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category bnl;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;/196 &amp;lt;==== On the CLI, I've pressed the '/196' keys to search for that IP octet.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm then provided the first hit w/ the output below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...skipping...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source 196.165.14.2;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to L3_Untrust;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-region none;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category bnl;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application/service&amp;nbsp; any/any/any/any;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; terminal yes;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could, however, output the running security policy command to a text file and perform a ctrl+f as a recourse in looking up one of your 400 security rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 19:14:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10349#M7614</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2013-05-28T19:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10350#M7615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi , &lt;/P&gt;&lt;P&gt;Also if you have GUI access you can just type in the ip address and it will bring up all the rules matching that ip address.&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG" class="jive-image-thumbnail jive-image" height="208" src="https://live.paloaltonetworks.com/legacyfs/online/6701_Capture.JPG" style="height: 208px; width: 1317.7639751552795px;" width="1317" /&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 21:46:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10350#M7615</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-05-28T21:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10351#M7616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you could change the output of the show commands in config mode, it might help you narrow it down easier:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P dir="ltr" id="imcontent"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;admin@PA-200&amp;gt;set cli config-output-format set&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;admin@PA-200&amp;gt;&lt;/SPAN&gt;configure&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;admin@PA-200&lt;/SPAN&gt;#show rulebase security rules&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 17:45:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10351#M7616</guid>
      <dc:creator>gil_arevalo</dc:creator>
      <dc:date>2013-06-04T17:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10352#M7617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Best way you can use&lt;/P&gt;&lt;P&gt;test security-policy-match&lt;/P&gt;&lt;P&gt;this will give you the rule output directly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jun 2013 14:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10352#M7617</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-26T14:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10353#M7618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why is the search of the GUI not implemented in CLI? Comming from an other Firewall-Implementation the filtering of the rulebase is the on thing I miss most. &lt;/P&gt;&lt;P&gt;Best would be an operational Command like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show security rules from untrust to trust dst-ip 10.10.10.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But also the filtering syntax of the gui-search is acceptable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 18:58:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10353#M7618</guid>
      <dc:creator>Unibw</dc:creator>
      <dc:date>2013-08-27T18:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10354#M7619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am still thinking about this problem. JunOS has the same problem out of the box, but for JunOS I found the possibility to use so called op-scripts. Here the link to the example usable for JunOS&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.juniper.net/us/en/community/junos/script-automation/library/configuration/policy-test/" title="http://www.juniper.net/us/en/community/junos/script-automation/library/configuration/policy-test/"&gt;policy-test - Juniper Networks&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now my Idea would be to use the PanOS-API to do something similar, but I don't know whether it is possible to use the API from the CLI interface? Does anybody know? &lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Winfried&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 09:27:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10354#M7619</guid>
      <dc:creator>Unibw</dc:creator>
      <dc:date>2013-08-29T09:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10355#M7620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for answer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested you cannot find IP address example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. test security-policy-match - Does Not work if your policy rule have source-user, can't find policy which ip is used.&lt;/P&gt;&lt;P&gt;2. &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;admin@PA-200&amp;gt;set cli config-output-format set - It is almost OK if you can use | match IP_ADDRESS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;3.&amp;nbsp; GUI and txt file&amp;nbsp; no comments &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two solution:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- juniper:&lt;/P&gt;&lt;P&gt;root@router# show interfaces | display set | match 47&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;set interfaces ge-0/0/47 ether-options 802.3ad ae0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;set interfaces ge-1/0/47 ether-options 802.3ad ae0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If i can used pipe ( | ) in exe mode &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 15:18:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10355#M7620</guid>
      <dc:creator>Wbm</dc:creator>
      <dc:date>2013-10-02T15:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10356#M7621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct answer is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show running security-policy | match {\|destination{\|10.3.83.13&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Feb 2015 09:54:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/10356#M7621</guid>
      <dc:creator>Wbm</dc:creator>
      <dc:date>2015-02-05T09:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/570631#M114975</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/19280"&gt;@Wbm&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please help what is&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;{\|destination{\|10.3.83.13&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 11:46:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/570631#M114975</guid>
      <dc:creator>suba_muthuram</dc:creator>
      <dc:date>2023-12-21T11:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/570906#M115004</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/262013"&gt;@suba_muthuram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is a PaloAlto-style regular expression (regex) for filtering output from the "match" command on the CLI. Specifically, the CLI "show running security-policy" command will show all the Security Policies on the PaloAlto. The output of that is piped the to "match" command with the regex filter "&lt;SPAN&gt;{\|destination{\|10.3.83.13". This will match any line on the show command output that matches "{" or "destination{" or "10.3.83.13".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The pipe "|" is the also the OR operator in the regex, so it must be escaped with a "\|" to be interpreted as an OR in the CLI, instead of being a pipe to another command. The filter is also a bit weird as the "{" is half of another regex "{nn}" which will match nn number of characters... but apparently since the opening "{" bracket is not immediately followed by a number and closing "}" bracket, I guess it doesn't get interpreted as a regex. Note that I also think the "destination{" is wrong in this example as it would match "destination" explicitly followed by a "{" which doesn't exist in the show command output. (Perhaps it did in an earlier version of PANOS? This thread is 10 years old at this point.)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Because the "show" command outputs the Security Policies as multiple lines for the same policy and "match" only matches single lines, the given filter is kind of a hack to find all policies which might match the terms. It doesn't show just the policy with all the matching terms. So if you run a "show running security-policy" command you get an output with the entire policy set:&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;admin@PA(active)&amp;gt; show running security-policy
"Allow Trust to DMZ; index: 1" {
        from Trust;
        source [ 10.10.0.0/24 192.168.0.0/24];
        to DMZ;
        destination 192.0.2.0/24;
        application/service 0:any/any/any/any;
        action allow;
}
"Allow DMZ to Trust; index: 2" {
        from DMZ;
        source 192.0.2.0/24;
        to Trust;
        destination 10.10.0.0/24;
        application/service 0:any/any/any/any;
        action allow;
}
"Allow Internet to MailServer; index: 3" {
        from External;
        source any;
        to Trust;
        destination 192.168.0.25;
        application/service 0:any/any/any/any;
        action allow;
}
"Allow Trust to Internet; index: 4" {
        from Trust;
        source [ 10.10.0.0/24 192.168.0.0/24 ];
        to External;
        destination any;
        application/service 0:any/any/any/any;
        action allow;
}&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you wanted to find all Security Policies that might contain an internal destination or 192.168. address you could do a command like this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;admin@PA(active)&amp;gt; show running security-policy | match {\|destination\|192.168.0
"Allow Trust to DMZ; index: 1" {
        source [ 10.10.0.0/24 192.168.0.0/24];
        destination 192.0.2.0/24;
"Allow DMZ to Trust; index: 2" {
        destination 10.10.0.0/24;
"Allow Internet to MailServer; index: 3" {
        destination 192.168.0.25;
"Allow Trust to Internet; index: 4" {
        source [ 10.10.0.0/24 192.168.0.0/24 ];
        destination any;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The above is a poor example for the above stated reasons. Going back to&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/19280"&gt;@Wbm&lt;/a&gt;'s reply, I would guess it should have been more like this searching for a specific address in the Security Polices:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;admin@PA(active)&amp;gt; show running security-policy | match {\|192.168.0.25
"Allow Trust to DMZ; index: 1" {
"Allow DMZ to Trust; index: 2" {
"Allow Internet to MailServer; index: 3" {
        destination 192.168.0.25;
"Allow Trust to Internet; index: 4" {&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Dec 2023 22:32:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/570906#M115004</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-12-26T22:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Security Rules using CLI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/570995#M115010</link>
      <description>&lt;P&gt;Thanks for the clarification.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 16:24:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-rules-using-cli/m-p/570995#M115010</guid>
      <dc:creator>suba_muthuram</dc:creator>
      <dc:date>2023-12-27T16:24:59Z</dc:date>
    </item>
  </channel>
</rss>

