Add Palo Alto Networks devices

Relevant for: AFA Administrators

This topic describes how AFA connects to Palo Alto Panorama, Palo Alto Strata Cloud Manager, and firewall devices.

Palo Alto Panorama

Panorama network connections

The following image shows how an ASMS Central Manager or Remote Agent connects to Palo Alto Panorama and Palo Alto Next Generation Firewalls (NGFWs).

Note: Log data can also be forwarded from M100/M500 collectors.

Panorama device permissions

ASMS requires the following device permissions to connect to Palo Alto Panorama devices:

Add a Palo Alto Networks Panorama

This procedure describes how to add a Palo Alto Networks Panorama device to AFA.

Do the following:

  1. Access the Devices Setup page. For details, see Access the DEVICES SETUP page.

  2. In the vendor and device selection page, select Palo Alto Networks > Panorama.

    The Access Permission page opens.

  3. Complete the fields as needed.

  4. If you enabled ActiveChange, the ActiveChange License Agreement dialog is displayed.

    Select I Agree and click OK.

  5. Click Next to continue to the Managed Devices page.

    This page lists the devices that are managed by the Panorama, including standalone devices and virtual systems.

    Tip: You can use filters to refine the list of devices.

    Do the following:

    1. Hover over the column header of the column you want to search or filter.

    2. Click to bring up the filter popup dialog.

    3. Enter the text to search or filter the devices.

  6. (Optional) To exclude a device, clear its check box in the table.

  7. Select the remaining options as needed:

    Real-time change monitoring

    Select this option to enable real-time alerting upon configuration changes.

    For details, see Configure real-time monitoring.

    Set user permissions

    Select this option to set user permissions for this device.

  8. Click Finish. The new device is added to the device tree.

    In the device tree, Panoramas are represented with a four tier hierarchy: Panorama, PA firewall, VSYS, and VR/Vwire.

  9. If you selected Set user permissions, the Edit users dialog box appears.

    In the list of users displayed, select one or more users to provide access to reports for this account.

    1. To select multiple users, press the CTRL button while selecting.

    1. Click OK to close the dialog.

A success message appears to confirm that the device is added.

Palo Alto Strata Cloud Manager

Strata Cloud Manager network connections

The following image shows how an ASMS Central Manager or Remote Agent connects to Palo Alto Strata Cloud Manager device.

Palo Alto Strata Cloud Manager required permissions

To connect to Palo Alto Strata Cloud Manager devices, ASMS requires a service account with a minimum role of View Only Administrator to access Strata Cloud Manager. Confirm the correct tenant is selected, as the service account’s location determines which tenants it can access.

Add a Palo Alto Strata Cloud Manager device

This procedure describes how to add a Palo Alto Strata Cloud Manager device to AFA.

Do the following:

  1. Access the Devices Setup page. For details, see Access the DEVICES SETUP page.

  2. In the vendor and device selection page, select Palo Alto Networks > Strata Cloud Manager.

    The Access Permission page opens.

  3. Complete the Access Information fields as needed.

    Display Name

    Enter the name to appear on in ASMS.

    TSG ID (Tenant Service Group)

    Enter the Tenant Service Group ID to define the scope of the ASMS device setup. ASMS will only collect devices that are managed by this TSG or any of its descendants. These devices will appear on the Managed Devices page in step 5, where the user can choose which to onboard.

    Client ID

    Enter the Client ID to use for accessing the device. This is typically an email address.

    Client Secret

    Enter the associated Client Secret.

  4. (Optional) Click Set Proxy Server to configure a proxy server to connect all devices defined in AFA. For more details, see Define a proxy server.

  5. Click Next to continue to the Managed Devices page.

    This page lists all the NGFW devices that are managed by the Palo Alto Strata Cloud Manager Tenant Service Group (entered on the Access Permissions page) or any of its descendents.

    Tip: You can use filters to refine the list of devices.

    Do the following:

    1. Hover over the column header of the column you want to search or filter.

    2. Click to bring up the filter popup dialog.

    3. Enter the text to search or filter the devices.

  6. (Optional) To exclude a device, clear its check box in the table.

  7. Select the remaining options as needed:

    Set user permissions

    Select this option to set user permissions for this device.

  8. Click Finish. The new device is added to the device tree.

    In the device tree, Strata Cloud Managers are represented with a four tier hierarchy: Strata Cloud Manager, PA firewall, VSYS, and LR.

  9. If you selected Set user permissions, the Edit users dialog box appears.

    In the list of users displayed, select one or more users to provide access to reports for this account.

    1. To select multiple users, press the CTRL button while selecting.

    1. Click OK to close the dialog.

A success message appears to confirm that the device is added.

Palo Alto Next Generation Firewalls

The following image shows how an ASMS Central Manager or Remote Agent connects directly to Palo Alto Next Generation Firewalls (NGFWs).

Palo Alto Networks Firewall required permissions

To connect to Palo Alto firewall devices, ASMS requires one of the following types of users:

  • Superuser (read-only)

  • Device Admin

  • Device Admin (read-only)

If the Palo Alto firewall is a version earlier than 4.1.7, is managed by Panorama, but is defined directly in AFA, ASMS requires one of the following types of users:

  • SuperUser (read/write)

  • Admin (read/write)

Add a Palo Alto Networks firewall

This procedure describes how to add a Palo Alto Networks firewall to AFA.

Note: Palo Alto Networks firewalls defined directly in AFA do not support the advanced routing analysis provided for Palo Alto Networks devices defined at the Panorama level. AFA does not identify individual VR/Vwires and therefore does not benefit from the routing information they provide.

For more details, see Add a Palo Alto Networks Panorama.

Do the following:

  1. Access the Devices Setup page. For details, see Access the DEVICES SETUP page.

  2. In the vendor device selection page, select Palo Alto NetworksFirewall.

  3. Complete the fields as needed.

  4. Click Finish.

    The new device is added to the device tree, with a two tier hierarchy: firewall and VSYS.

  5. If you selected Set user permissions, the Edit users dialog box appears.

    In the list of users displayed, select one or more users to provide access to reports for this account.

    1. To select multiple users, press the CTRL button while selecting.

    1. Click OK to close the dialog.

  6. A success message appears to confirm that the device is added.

Configure one-armed mode manually

AFA automatically identifies Palo Alto Panorama devices in one-armed mode when the device has a single interface, or a single one non-management interface. If your device has multiple non-management interfaces and one-armed mode is not identified automatically, configure this for your device manually.

Do the following:

  1. On the AFA machine, access your device configuration meta file as follows:

    /home/afa/.fa/firewalls/<device_name>/fwa.meta

    where <device_name> is the name of the device listed. If you device is listed multiple times, enter the longer name.

  2. On a new line, enter:

    is_steering_device=yes

  3. Run an analysis on the device to update the device data in AFA.

 

â See also: