- 12 Mar 2025
- 4 Minutes to read
- Print
- DarkLight
- PDF
Palo Alto Networks Panorama
- Updated on 12 Mar 2025
- 4 Minutes to read
- Print
- DarkLight
- PDF
The Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters.
Types of Assets Fetched
This adapter fetches the following types of assets:
- Devices
- Users
- Networks
- Firewall Rules
About Palo Alto Networks Panorama
Use cases the adapter solves
Connecting Panorama to Axonius will allow you to quickly identify which assets are accessing the network over VPN. Specifically, Axonius can identify which private IP address is being used on the organization's internal network and identify which public IP address was used to access the VPN.
Data retrieved by Panorama
Network interface data about how the client connected to the VPN.
Additional note
Because it leverages the PanOS API, the Palo Alto Panorama adapter can be used to connect directly to Palo Alto firewalls if a Panorama endpoint is not available.
Parameters
- Panorama Domain (required) - The hostname or IP address of the Palo Alto Panorama server or PA Firewall server.
- User Name and Password (optional) - The credentials for a user account that has the Required Permissions to fetch assets.
- API Key (optional) - An API Key associated with a user account that has the Required Permissions to fetch assets.
If User Name and Password are supplied, this field will be ignored.
- Verify SSL - Select whether to verify the SSL certificate offered by the value supplied in Panorama Domain. For more details, see SSL Trust & CA Settings.
To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Advanced Settings
Advanced settings can either apply to all connections for this adapter, or to a specific connection. Refer to Advanced Configuration for Adapters.
- Fetch ARP data (required, default: true) - By default this adapter fetches ARP data from the Palo Alto Networks Panorama server. Clear this option to not fetch ARP data from the Palo Alto Networks Panorama server.
- Force logout of the user - Select this option to force logout of the account used to query the Palo alto Panorama data.
- Fetch Firewall Policies - Select this option to fetch firewall security and NAT policies.
- Fetch Network Entities (Addresses, Ethernet Interfaces) - Select this option to fetch Addresses as an asset and to fetch Ethernet interfaces as a new device type.
- Set the firewall last seen to the “connected-at” date if it is within the last X days - Enter the amount of days necessary in order to set the firewall last seen to the “connected-at” date.
- Extend NAT Rules as connected devices - Select this option to connect NAT firewall rules (public to private IPs only) with Network assets.
- Extend Access Rules as connected devices - Select this option to connect Access firewall rules (from untrust sources) with Network assets.
- Fetch Users From Login Logs - Select this option to fetch the one-day-old VPN login logs to parse users of type
LOGIN LOG
. - Fetch Rules Hit Count - Select this option to count the number of firewall rules.
- Internet Facing Zones (optional, default: any, untrust, outside) - Enter a list of zones that are exposed to the Internet. This field will allow Axonius systems to tag devices that receive public traffic.
- CIDRs to be considered as internal/private - Enter a list of CIDRs to be considered internal/private (IPs can be inserted with the suffix /32). Assets within the range of these CIDRs will be treated as belonging to internal systems.
- Addresses to be considered as internal/private - Enter a list of Panorama addresses to be considered internal/private. Assets within the range of these addresses will be treated as belonging to internal systems.
Both the above settings are used by the adapter to identify which firewall rules are exposing public traffic to internal systems.
You should only use these fields in very specific cases. Normally using the Internet-facing zones is enough.
To learn more about Adapter Configuration tab advanced settings, see Adapter Advanced Settings.
Required Permissions
If you have supplied a User Name - the username must be provided the ’Superuser (read-only)' role.
Instructions for associating this role with an account can be found here.If you have supplied an API Key - You can obtain an API key by following the instructions here as an alternative to using a username/password as described above (once the API has been enabled as described here).
The following API permissions are required for basic Panorama configuration:
- XML API (Configuration) - Required for fetching Firewalls, Firewall Rules, ARPs, and VPN Users.
- REST API (Panorama) - Required for fetching Device Groups.
- REST API (Objects) - Fetch Address Groups.
- REST API (Networks) - Fetch Networks associated with Device Groups to correlate with Firewall Rules.
Optional API Permission:
- XML API (Log permission) - Fetch users' login logs
APIs
Axonius uses the Palo Alto Networks XML API and REST API.