<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Read-Only Superuser by Security Zone in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/read-only-superuser-by-security-zone/m-p/381138#M89729</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168907"&gt;@Robert-META&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way to achive your goal, that I can think of is to use virtual systems (vsys). Unfortunately this come with some drawbacks:&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Massive change for the firewall to split the existing configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Each device come with "base license" for multity vsys, but if you need more vsys you need to purchase additional license&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Each model has different max number of vsys - This could be your deal breakers. Looking at your post I can imagine, that you have one single firewall with huge amount of sub-interfaces/zones for&amp;nbsp; each school. If you want to create separate vsys for each district I am not sure that your device will be capable to handle so many. But it really depends on what model you are using. You can use "comparation tool" - &lt;A href="https://www.paloaltonetworks.com/products/product-selection" target="_blank"&gt;Next-Generation Firewalls - Product Selection - Palo Alto Networks&lt;/A&gt; (just compare your model with something random, this wil give you really nice formated table of the max capacity for your device) {I like to read it that way instead of searching datasheets}.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way while I was typing this I was thinking for another solution, but sure how doable is for you, because it will require lots of programming - use the API to read the policy. Since you only need to have read-only access, I can imagine you can do the following:&lt;/P&gt;&lt;P&gt;- Assign each school district unique tag&lt;/P&gt;&lt;P&gt;- Configure all objects and rules for specific district with that tag&lt;/P&gt;&lt;P&gt;- Using the API read the whole firewall config (at least what is relevant - rules, objects, zones, etc)&lt;/P&gt;&lt;P&gt;- With a bit of programming magic create web page that will visualise the data from the firewall API&lt;/P&gt;&lt;P&gt;- Using the tags you can create "filter" so each user will see only data that is associated with his district.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jan 2021 08:01:03 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2021-01-21T08:01:03Z</dc:date>
    <item>
      <title>Read-Only Superuser by Security Zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/read-only-superuser-by-security-zone/m-p/381015#M89724</link>
      <description>&lt;P&gt;Hello, I hope everyone is staying healthy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I work at a company that provides ISP services to public schools, each school district is divided in to separate security zones on our Palo and I am trying to see if a read-only user can be created that is able to only look at security and NAT rules for their assigned zone.&amp;nbsp; I've been fiddling around in the OS and searching online but haven't been able to find any information to answer this.&amp;nbsp; I know they can be setup to view all rules but I was hoping to narrow that down if possible.&amp;nbsp; We are running on the latest OS 10.0.3.&amp;nbsp; Thank you for any information you're able to provide.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 16:31:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/read-only-superuser-by-security-zone/m-p/381015#M89724</guid>
      <dc:creator>Robert-META</dc:creator>
      <dc:date>2021-01-20T16:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Read-Only Superuser by Security Zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/read-only-superuser-by-security-zone/m-p/381138#M89729</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168907"&gt;@Robert-META&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way to achive your goal, that I can think of is to use virtual systems (vsys). Unfortunately this come with some drawbacks:&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Massive change for the firewall to split the existing configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Each device come with "base license" for multity vsys, but if you need more vsys you need to purchase additional license&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Each model has different max number of vsys - This could be your deal breakers. Looking at your post I can imagine, that you have one single firewall with huge amount of sub-interfaces/zones for&amp;nbsp; each school. If you want to create separate vsys for each district I am not sure that your device will be capable to handle so many. But it really depends on what model you are using. You can use "comparation tool" - &lt;A href="https://www.paloaltonetworks.com/products/product-selection" target="_blank"&gt;Next-Generation Firewalls - Product Selection - Palo Alto Networks&lt;/A&gt; (just compare your model with something random, this wil give you really nice formated table of the max capacity for your device) {I like to read it that way instead of searching datasheets}.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way while I was typing this I was thinking for another solution, but sure how doable is for you, because it will require lots of programming - use the API to read the policy. Since you only need to have read-only access, I can imagine you can do the following:&lt;/P&gt;&lt;P&gt;- Assign each school district unique tag&lt;/P&gt;&lt;P&gt;- Configure all objects and rules for specific district with that tag&lt;/P&gt;&lt;P&gt;- Using the API read the whole firewall config (at least what is relevant - rules, objects, zones, etc)&lt;/P&gt;&lt;P&gt;- With a bit of programming magic create web page that will visualise the data from the firewall API&lt;/P&gt;&lt;P&gt;- Using the tags you can create "filter" so each user will see only data that is associated with his district.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 08:01:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/read-only-superuser-by-security-zone/m-p/381138#M89729</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-01-21T08:01:03Z</dc:date>
    </item>
  </channel>
</rss>

