Palo Alto Networks Panorama
  • 02 Jun 2024
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Palo Alto Networks Panorama

  • Dark
    Light
  • PDF

Article summary

The Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters.

Types of Assets Fetched

This adapter fetches the following types of assets:

  • Devices
  • Users
  • Networks
  • Firewall Rules

About Palo Alto Networks Panorama

Use cases the adapter solves

Connecting Panorama to Axonius will allow you to quickly identify which assets are accessing the network over VPN. Specifically, Axonius can identify which private IP address is being used on the organization's internal network and identify which public IP address was used to access the VPN.

Data retrieved by Panorama

Network interface data about how the client connected to the VPN.

Additional note

Because it leverages the PanOS API, the Palo Alto Panorama adapter can be used to connect directly to Palo Alto firewalls if a Panorama endpoint is not available.

Parameters

  1. Panorama Domain (required) - The hostname or IP address of the Palo Alto Panorama server or PA Firewall server.
  2. User Name and Password (optional) - The credentials for a user account that has the Required Permissions to fetch assets.
  3. API Key (optional) - An API Key associated with a user account that has the Required Permissions to fetch assets.
Note:

If User Name and Password are supplied, this field will be ignored.

  1. Verify SSL - Select whether to verify the SSL certificate offered by the value supplied in Panorama Domain. For more details, see SSL Trust & CA Settings.

To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.

image.png

Advanced Settings

Note:

Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to ​Advanced Configuration for Adapters

  1. Fetch ARP data (required, default: True) - Select whether to fetch ARP data from the Palo Alto Panorama server.

    • If enabled, all connections for this adapter will fetch ARP data from Palo Alto Panorama.
    • If disabled, all connections for this adapter will not fetch ARP data from Palo Alto Panorama.
  2. Force logout of the user - Select this option to force logout of the account used to query the Palo alto Panorama data.

  3. Fetch Firewall Policies - Select this option to fetch firewall security and NAT policies.

  4. Fetch Network Entities (Addresses, Ethernet Interfaces) - Select this option to fetch Addresses as an asset and to fetch Ethernet interfaces as a new device type.

  5. Set the firewall last seen to the “connected-at” date if it is within the last X days - Enter the amount of days necessary in order to set the firewall last seen to the “connected-at” date.

  6. Extend NAT Rules as connected devices - Select this option to connect NAT firewall rules (public to private IPs only) with Network assets.

  7. Extend Access Rules as connected devices - Select this option to connect Access firewall rules (from untrust sources) with Network assets.

  8. Fetch Users From Login Logs - Select this option to fetch the one-day-old VPN login logs to parse users of type LOGIN LOG.

Required Permissions

Note:
As a best practice, ensure that you create a separate, dedicated account for API access to Palo Alto Panorama.
  • If you have supplied a User Name - the username must be provided the ’Superuser (read-only)' role.
    Instructions for associating this role with an account can be found here.

  • If you have supplied an API Key - You can obtain an API key by following the instructions here as an alternative to using a username/password as described above (once the API has been enabled as described here).

  • The following API permissions are required for basic Panorama configuration:

    • XML API (Configuration) - Required for fetching Firewalls, Firewall Rules, ARPs, and VPN Users.
    • REST API (Panorama) - Required for fetching Device Groups.
    • REST API (Objects) - Fetch Address Groups.
    • REST API (Networks) - Fetch Networks associated with Device Groups to correlate with Firewall Rules.
  • Optional API Permission:

    • XML API (Log permission) - Fetch users' login logs

APIs

Axonius uses the Palo Alto Networks XML API and REST API.


Was this article helpful?