- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
11-05-2020 04:31 AM - edited 11-05-2020 04:33 AM
11-08-2020 09:16 AM
As @BPry mentioned that is the best way to verify that applications are working.
We have so many public facing applications in our PA and whenever I do any PAN OS upgrade I send email to application team
that upgrade is done and then they verify that applications are working fine.
PA you can only see the session numbers in the GUI and traffic logs showing traffic is passing for those applications and assume all
is good.
Regards
11-08-2020 10:31 AM - edited 11-08-2020 10:34 AM
Again, a report really isn't going to tell you or the other teams much of anything. It'll tell you what the top source or destination addresses are, or you can break it down by server and get the same for every single device in your environment; the thing is, that's not helpful in establishing anything really.
If you have a proper change management process in place, all of the other major stakeholders should know that an upgrade is going to take place at x time on y date. Post upgrade, you simply ask application owners to verify that things are working as expected. If it was working before it should stay working, broken before and it should still be broken.
You can really break upgrades down into two different categories.
Major Release Upgrades
There's a chance that things go wrong here, or that newly activated dyanmic content like threat signatures or app-ids could cause issues. When I perform these upgrades I'm looking for the following things.
Maintenance Releases:
I'm looking at the same things above, but I'm going to spend less time looking at logs on my end. You aren't getting any new signatures that weren't already active (unless your also manually activating new content updates) and you shouldn't expect anything to really change. I'm still looking at logs and verifying publicly accessible things are available, but generally speaking these just work.
Helpful Hints:
The problem with what you're looking to provide is that you simply can't tell applications are actually working based off of traffic flows. You might notice something abnormal or identify a new app-id that wasn't accounted for, or a new threat signature causing false-positive matches on your internal traffic, but you won't be able to say for sure that the application is actually working as intended. You're really only able to say when it's broken from a network aspect.
I absolutely wouldn't recommend giving an all-clear following a major version upgrade on the firewall, or even really a minor upgrade. I perform the upgrade and do my basic service checks to verify that from a networking aspect the upgrade is done and appears to be working properly. It's then up to the application/service owners to verify that they're things are actually working.
11-07-2020 06:23 PM
I really wouldn't rely on a report for this. Talk to your application owners and have them verify their applications once the new firewall is installed. The firewall reports are just going to tell you what traffic is passing, but that isn't going to tell you if things are actually working properly.
11-08-2020 02:01 AM
Thanks @BPry
I am not replacing the firewall or putting a new firewall in but rather upgrading the pan-os on existing firewall.
Just need a report really as a head start so I can forward it to different teams to say that this is the current picture of the flows from the firewall side.
Is this something you can hell with please?
Kind regards,
11-08-2020 09:16 AM
As @BPry mentioned that is the best way to verify that applications are working.
We have so many public facing applications in our PA and whenever I do any PAN OS upgrade I send email to application team
that upgrade is done and then they verify that applications are working fine.
PA you can only see the session numbers in the GUI and traffic logs showing traffic is passing for those applications and assume all
is good.
Regards
11-08-2020 10:31 AM - edited 11-08-2020 10:34 AM
Again, a report really isn't going to tell you or the other teams much of anything. It'll tell you what the top source or destination addresses are, or you can break it down by server and get the same for every single device in your environment; the thing is, that's not helpful in establishing anything really.
If you have a proper change management process in place, all of the other major stakeholders should know that an upgrade is going to take place at x time on y date. Post upgrade, you simply ask application owners to verify that things are working as expected. If it was working before it should stay working, broken before and it should still be broken.
You can really break upgrades down into two different categories.
Major Release Upgrades
There's a chance that things go wrong here, or that newly activated dyanmic content like threat signatures or app-ids could cause issues. When I perform these upgrades I'm looking for the following things.
Maintenance Releases:
I'm looking at the same things above, but I'm going to spend less time looking at logs on my end. You aren't getting any new signatures that weren't already active (unless your also manually activating new content updates) and you shouldn't expect anything to really change. I'm still looking at logs and verifying publicly accessible things are available, but generally speaking these just work.
Helpful Hints:
The problem with what you're looking to provide is that you simply can't tell applications are actually working based off of traffic flows. You might notice something abnormal or identify a new app-id that wasn't accounted for, or a new threat signature causing false-positive matches on your internal traffic, but you won't be able to say for sure that the application is actually working as intended. You're really only able to say when it's broken from a network aspect.
I absolutely wouldn't recommend giving an all-clear following a major version upgrade on the firewall, or even really a minor upgrade. I perform the upgrade and do my basic service checks to verify that from a networking aspect the upgrade is done and appears to be working properly. It's then up to the application/service owners to verify that they're things are actually working.
11-09-2020 08:32 AM
Btw, what do you use to script your post/pre checks? I will try give it a shot as well.
any chance you can share your script so I can adapt it to my environment?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!