Filtering for security policies with DSRI enabled

Reply
Highlighted
L3 Networker

Filtering for security policies with DSRI enabled

Has anyone found the syntx to search in the security rule-base for any rule that has "disable server response inspection" enabled.

I attempted using 

disable-server-response-inspection eq 'yes' and other modifications of that similar syntax with no luck. I know searching for log settings is possible through the similar syntax log-start eq 'yes' etc....

Any help would be great.

 

Thank you

L4 Transporter

Re: Filtering for security policies with DSRI enabled

if there is a way in the GUI, I can't think of it. my gut response would be to use the CLI. and basically execute the following:

 

admin@PA-220> set cli config-output-format set
admin@PA-220> configure
Entering configuration mode
[edit]
admin@PA-220# show rulebase security | match disable-server-response-inspection
set rulebase security rules test option disable-server-response-inspection yes

 

so in the above example, the only rule that has DSRI set is the rule cryptically named 'test'

--
CCNA Security, PCNSE7
L3 Networker

Re: Filtering for security policies with DSRI enabled

Thank you bradk14

 

This is better then nothing and accomplishes the job. It would be nice if the top search bar in the GUI could parrallel search functions found in the CLI.

L0 Member

Re: Filtering for security policies with DSRI enabled

In the GUI try (option/disable-server-response-inspection eq yes )

 

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!