- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
04-28-2021 01:33 PM
Does anyone have any idea how we can do access rule simulation from monitoring logs in PAN 820. Any automation or tool recommended?
04-29-2021 01:00 AM
Hey @ENMAXAdmin ,
Can you explain a bit more, what are you trying to achive?
From PAN-OS 9.0 and later there is "test policy" tool build-in to the GUI. You can access it either from Device > Troubleshooting, or as button at the bottom of the Policy tab
You can use the CLI tool as well:
> test security-policy-match
+ application Application name
+ category Category name
+ check-hip-mask check hip mask
+ destination destination IP address
+ destination-port Destination port
+ from from
+ protocol IP protocol value
+ show-all show all potential match rules until first allow rule
+ source source IP address
+ source-user Source User
+ to to
| Pipe through a command
<Enter> Finish input
But I don't understand what you meand by "from monitoring logs". The each log entry contain the name of the rule that this traffic has matched.
04-30-2021 02:02 PM
Hello,
There is a GUI version of the policy tester as well. In policies at the bottom "Test policy Match".
Hope that helps.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!