Palo Alto Networks Panorama - Disable Firewall Rule

Palo Alto Networks Panorama - Disable Firewall Rule disables firewall rules in Palo Alto Networks Panorama for:

  • Assets that match the results of the selected saved query, and match the Enforcement Action Conditions, if defined, or assets selected on the relevant asset page.

See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.

📘

Note


Required Fields

These fields must be configured to run the Enforcement Action.

  • Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
  • Configure Dynamic Values (optional) - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.
  • Use stored credentials from the Palo Alto Networks Panorama adapter - Select this option to use credentials from the adapter connection. By default, the first connection is selected.
    • When you select this option, the Select Adapter Connection drop-down becomes available. Select the adapter connection to use for this Enforcement Action.

      📘

      Note

      To use this option, you must successfully configure a Palo Alto Networks Panorama adapter connection.

  • Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Working with Axonius Compute Nodes.

Additional Fields

These fields are optional.

  • Commit Changes (default: selected) - Automatically commit the configuration changes to Panorama after disabling the firewall rule. When enabled, the changes are immediately applied. When disabled, the rule is disabled in the candidate configuration but requires manual commit.
💡

Connection and Credentials

When Use stored credentials from the adapter is toggled off, some of the connection fields below are required to create the connection, while other fields are optional.

  • Panorama Domain - The hostname or IP address of the Panorama server.
  • User Name - User name of the account used to access the Panorama server.
  • Password - Password for the user account.
  • API Key - An API Key associated with a user account that has the Required Permissions.
  • Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.

  • Gateway Name - Select the Gateway through which to connect to perform the action.

APIs

Axonius uses the PAN-OS XML API.

Required Ports

Axonius must be able to communicate via the following ports:

  • Port 443 (HTTPS)

Required Permissions

The stored credentials, or those provided in Connection and Credentials, must have the following permission(s) to perform this Enforcement Action:

  • Permissions to modify firewall rules and commit configuration changes in Palo Alto Networks Panorama.
📘

Note

The exact permission names should be confirmed with your Palo Alto Networks administrator or Palo Alto Networks support, as specific role-based access control (RBAC) configurations may vary.



For more details about other enforcement actions available, see Action Library.