Palo Alto Standalone Firewalls
This guide is for getting the configuration(s) from standalone Palo Alto Firewalls.
Using HTTP(S)
We would recommend using HTTPS rather than HTTP for transferring your devices configuration as the latter provides no encryption. The procedure for getting the configuration from the device using HTTP(S) is as follows:
-
Using your favorite web browser, connect to the HTTP(S) service provided by your Palo Alto device for remote management. You can do this by entering "https://" (recommended) or "http://" followed by your devices IP address.
-
Logon using your administration username and password.
-
Click the Device tab and then on the side bar click the setup button. On the setup screen then click the Operations tab.
-
Click Export named configuration snapshot and then choose the configuration that you would like to export.
-
Finally click OK to save your device configuration.
PAN-OS API
PAN-OS API uses API GET requests to obtain the configuration and accurate version number from your Palo Alto PAN-OS device. PAN-OS API is available on PAN-OS version 8.0 and newer (including 9 and 10).
The following types of Administrators and Admin roles are supported:
- Dynamic roles: Superuser, Superuser (readonly), Device admin, Device admin (readonly), Vsys admin, Vsys admin (readonly)
- Role-based Admins: Device, Vsys, Panorama.
To use the PAN-OS API, you must first allow API access to the Admin role accessing the device. This is done as follows:
- Go to Device > Admin Roles and select or create an admin role. As a best practice, set up a separate Admin role and account for API access.
-
Select the XML API tab.
-
Enable the required API features from the list. Nipper only requires the Configuration feature enabled in order to audit your device.
-
Select OK to confirm your changes.
-
Go to Device > Administrators, and assign the role profile to an administrator account. Note that the Administrator Type must be set to Role Based to set the Profile.
Although Nipper generates a new secure API key for each config retrieval and does not store the key, as a best practice you should specify an API key lifetime to enforce regular key rotation - protecting against compromise and reducing the effects of accidental exposure. This is done as follows:
-
Go to Device > Setup > Management and edit Authentication Settings.
-
Set the field API Key Lifetime (min) to a suitable value (between 1-525600 minutes).
-
Refer to the audit and compliance policies for your enterprise to determine how you should specify the lifetime for which your API keys are valid.
-
Commit the changes.
Nipper can now use the PAN-OS API connection method to retrieve your configuration, with accurate version number by selecting the version 8+ (PAN-OS API) from the Version: dropdown when adding a remote Palo Alto Firewall network device.