Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

Palo Alto API for End of Life services.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Palo Alto API for End of Life services.

L1 Bithead

Team,

Any aware if Palo Alto provides any API's which can help with End of Life dates? e.g. check for a device by serial number, by model number, check for the PAN OS version etc.

 

Regards,

Nikson.

1 accepted solution

Accepted Solutions

Community Team Member

Hi @tech_geek2023 ,

 

The only information about end-of-life or end-of-support I know off is listed on the EoL Resources page where you'll find information for hardware and software EoL plus end-of-sale announcements.

 

With the extracted script info you should be able to match the model with the hardware EoL and the PAN-OS version with the software EoL dates on those pages. Or are you looking for something more specific ?

 

Kind regards,

-Kim.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

View solution in original post

3 REPLIES 3

Community Team Member

Hi @tech_geek2023 ,

 

The "show system info" api call will give you information such as model, PAN-OS version, serial number and more:

XML API Url
/api/?type=op&cmd=<show><system><info></info></system></show>
 
<response status="success">
<result>
<system>
<hostname>xxxxxx</hostname>
<ip-address>xxxxx</ip-address>
<public-ip-address>unknown</public-ip-address>
<netmask>255.255.255.255</netmask>
<default-gateway>xxxxx</default-gateway>
<is-dhcp>yes</is-dhcp>
<ipv6-address>unknown</ipv6-address>
<ipv6-link-local-address>xxxxxx</ipv6-link-local-address>
<mac-address>42:01:64:40:64:14</mac-address>
<time>Tue Sep 12 01:17:38 2023 </time>
<uptime>102 days, 6:26:12</uptime>
<devicename>xxxxxxx</devicename>
<family>vm</family>
<model>PA-VM</model>
<serial>YOURSERIAL</serial>
<vm-mac-base>7C:89:C1:A6:4F:00</vm-mac-base>
<vm-mac-count>256</vm-mac-count>
<vm-uuid>xxxxxxxx</vm-uuid>
<vm-cpuid>xxxxxxxx</vm-cpuid>
<vm-license>VM-100</vm-license>
<vm-cap-tier>6.5 GB</vm-cap-tier>
<vm-cores>8</vm-cores>
<vm-mem>30865416</vm-mem>
<relicense>0</relicense>
<vm-mode>GCE</vm-mode>
<cloud-mode>cloud</cloud-mode>
<sw-version>11.0.0</sw-version>
<global-protect-client-package-version>6.1.0</global-protect-client-package-version>
<device-dictionary-version>93-429</device-dictionary-version>
<device-dictionary-release-date>2023/09/08 11:36:02 PDT</device-dictionary-release-date>
<app-version>8751-8269</app-version>
<app-release-date>2023/09/05 12:59:12 PDT</app-release-date>
<av-version>4571-5088</av-version>
<av-release-date>2023/09/10 12:24:37 PDT</av-release-date>
<threat-version>8751-8269</threat-version>
<threat-release-date>2023/09/05 12:59:12 PDT</threat-release-date>
<wf-private-version>0</wf-private-version>
<wf-private-release-date>unknown</wf-private-release-date>
<url-db>paloaltonetworks</url-db>
<wildfire-version>802720-806502</wildfire-version>
<wildfire-release-date>2023/09/12 00:57:51 PDT</wildfire-release-date>
<wildfire-rt>Disabled</wildfire-rt>
<url-filtering-version>20230912.20125</url-filtering-version>
<global-protect-datafile-version>unknown</global-protect-datafile-version>
<global-protect-datafile-release-date>unknown</global-protect-datafile-release-date>
<global-protect-clientless-vpn-version>0</global-protect-clientless-vpn-version>
<logdb-version>11.0.0</logdb-version>
<plugin_versions>
<entry name="vm_series" version="4.0.0">
<pkginfo>vm_series-4.0.0</pkginfo>
</entry>
<entry name="dlp" version="4.0.0">
<pkginfo>dlp-4.0.0</pkginfo>
</entry>
</plugin_versions>
<platform-family>vm</platform-family>
<vpn-disable-mode>off</vpn-disable-mode>
<multi-vsys>off</multi-vsys>
<operational-mode>normal</operational-mode>
<advanced-routing>off</advanced-routing>
<device-certificate-status>Valid</device-certificate-status>
</system>
</result>
</response>
 
Kind regards,
-Kim.
LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Thanks Kim. I have managed to write a python script to extract that information from the device.

 

The challenge is what can I do next?

I will have to send this PAN OS version or the serial number to some database, right?

 

Does Palo Alto have any such Public API's features where we can send the details?

 

 

Regards,

Nikson.

Community Team Member

Hi @tech_geek2023 ,

 

The only information about end-of-life or end-of-support I know off is listed on the EoL Resources page where you'll find information for hardware and software EoL plus end-of-sale announcements.

 

With the extracted script info you should be able to match the model with the hardware EoL and the PAN-OS version with the software EoL dates on those pages. Or are you looking for something more specific ?

 

Kind regards,

-Kim.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 1 accepted solution
  • 2141 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!