-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Panorama Support #1
Comments
I started adding plumbing to support Panorama, but I have been focused entirely on firewall support so far. This is why those namespaces, such as address objects and what not, do not appear in the Panorama support will eventually be added, I'm just not there yet. So this issue may be better categorized as "add panorama support," perhaps? |
Agreed, I changed the title. |
I also wait for the Panorama Support. |
…ce group support - #1; adding pango.Connect; adding Panorama.CommitAll(); restructuring directory a bit
Ok, first phase of basic support is done. Once I get the NAT and security policies done, I'll close this issue out. I'll open another issue for template support, so this one will be focused on Device Group Panorama support. |
…ce group support - PaloAltoNetworks/pango#1; adding pango.Connect; adding Panorama.CommitAll(); restructuring directory a bit
… for panorama; adds support for "shared" policies
…ce group support - PaloAltoNetworks/pango#1; adding pango.Connect; adding Panorama.CommitAll(); restructuring directory a bit
… for panorama; adds support for "shared" policies
Unless I'm missing something, it does not appear that Panorama Device Groups or Templates are supported. In each section of the package, such as objs/addr, it appears the XPATH is "hard coded" in the xpath function:
This needs to be modified to optionally include the
device-group/entry[@name='dg_name']/
portion if it is a Panorama device, rather than a Firewall. Since vsys is not present in the path for Panorama device-groups, perhaps we can use it to determine whether this is a Panorama as opposed to a Firewall. Probably not the best idea, but possibly the easiest / best solution without refactoring the whole package. Something like:This would restrict vsys names to those starting with "vsys" and assume anything not starting with vsys was a device group. Not ideal, but this is a hack work-around for the package not supporting Panorama configuration fully.
OR, if this is too kludgy, perhaps add a variable to Client (c.con, which is a Firewall or Panorama that implements XapiClient), and if a Panorama, what the device-group and/or template is. This would be a hack and work-around also, but likely cleaner than using vsys to indicate the device-group / template.
Thoughts?
The text was updated successfully, but these errors were encountered: