Workflow
Palo Alto Panorama - Modular Workflows
Overview
This contains modular workflows that operate when integrated with the Palo Alto Panorama application. Once installed teams will be able to quickly automate common manual tasks for creating security rules or performing software upgrades, saving a significant amount of time and effort. This library can be used as modular components with other libraries and automations to build comprehensive end-to-end orchestrated workflows with Itential's low-code platform.
Workflows
Name | Overview |
---|---|
Commit - Palo Alto - Panorama - REST | Commit staged changes to Palo Alto Panorama |
Create Security Post Rule - Palo Alto - Panorama - REST | Creates security post rule on Palo Alto Panorama |
Create Security Pre Rule - Palo Alto - Panorama - REST | Creates security pre rule on Palo Alto Panorama |
Activate Firewall - Palo Alto - Panorama - REST | Activate suspended firewall in Palo Alto Panorama |
Download Software on Firewall - Palo Alto - Panorama - REST | Download the software to the firewall in Palo Alto Panorama |
Install Software on Firewall - Palo Alto - Panorama - REST | Install the software on the firewall in Palo Alto Panorama |
Suspend Firewall - Palo Alto - Panorama - REST | Suspend an active firewall in Palo Alto Panorama |
Reboot Firewall - Palo Alto - Panorama - REST | Reboot the firewall in Palo Alto Panorama |
Standalone Software Upgrade - Palo Alto - Panorama - REST | Upgrade a firewall to a software version in Palo Alto Panorama |
HA Pair Software Upgrade - Palo Alto - Panorama - REST | Upgrade PAN-OS on a firewall set up as active-passive high-availability (HA) pair in Palo Alto Panorama |
For further technical details on how to install and use this Workflow Project, please click the Technical Documentation tab.
Table of Contents
- Getting Started
- Using this Workflow Project
- Activate Firewall - Palo Alto - Panorama - REST
- Commit - Palo Alto - Panorama - REST
- Create Security Post Rule - Palo Alto - Panorama - REST
- Create Security Pre Rule - Palo Alto - Panorama - REST
- Download Software on Firewall - Palo Alto - Panorama - REST
- HA Pair Software Upgrade - Palo Alto - Panorama - REST
- Install Software on Firewall - Palo Alto - Panorama - REST
- Reboot Firewall - Palo Alto - Panorama - REST
- Standalone Software Upgrade - Palo Alto - Panorama - REST
- Suspend Firewall - Palo Alto - Panorama - REST
- Additional Information
Getting Started
This section is helpful for deployments as it provides you with pertinent information on prerequisites and properties.
Helpful Background Information
Workflows often include logic that varies from business to business. As a result, we often find that our Workflow Projects are more useful as modular components that can be incorporated into a larger process. In addition, they often can add value as a learning tool on how we integrate with other systems and how we do things within the Itential Automation Platform.
While these can be utilized, you may find more value in using them as a starting point to build around.
Prerequisites
Itential Workflow Projects are built and tested on particular versions of IAP. In addition, Workflow Projects are often dependent on external systems and as such, these Workflow Projects will have dependencies on these other systems. This version of Palo Alto - Panorama - REST has been tested with:
- IAP 2023.2
External Dependencies
Name | OS Version | API Version |
---|---|---|
Palo Alto Panorama | 9.1 |
Adapters
Name | Version | Configuration Notes |
---|---|---|
adapter-panorama | ^0.14.5 |
How to Install
To install the Workflow Project:
- Verify you are running a supported version of the Itential Automation Platform (IAP) as listed above in the Supported IAP Versions section in order to install the Example Project.
- Import the Example Project in Admin Essentials.
Testing
Cypress is generally used to test all Itential Example Projects. While Cypress is an opensource tool, at Itential we have internal libraries that have been built around Cypress to allow us to test with a deployed IAP.
When certifying our Example Projects for a release of IAP we run these tests against the particular version of IAP and create a release branch in GitLab. If you do not see the Example Project available in your version of IAP please contact Itential.
While Itential tests this Example Project and its capabilities, it is often the case the customer environments offer their own unique circumstances. Therefore, it is our recommendation that you deploy this Example Project into a development/testing environment in which you can test the Example Project.
Using this Workflow Project
Workflow Projects contain 1 or more workflows. Each of these workflows have different inputs and outputs.
Activate Firewall - Palo Alto - Panorama - REST
Activate suspended firewall in Palo Alto Panorama
Capabilities include:
- The workflow is used to activate a suspended firewall in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run Activate Firewall - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Activate Firewall - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Activate Firewall - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
serialNumber | string | yes | Serial number of the firewall | 123456789876 |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for Activate Firewall - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for Activate Firewall - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "serialNumber": "123456789876", "adapterId": "panorama" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade PAN-OS on Multiple HA Firewalls through Panorama using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-pan-os-on-multiple-ha-firewalls-through-panorama-api | Public |
Commit - Palo Alto - Panorama - REST
Commit staged changes to Palo Alto Panorama
Capabilities include:
- Commits staged changes to Palo Alto Panorama.
- Displays commit error if failure occurs.
Entry Point IAP Component
The primary IAP component to run Commit - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Commit - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Commit - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
adapterId | string | yes | The adapter-panorama instance to use to call commit | panorama |
Outputs
The following table lists the outputs for Commit - Palo Alto - Panorama - REST:
Name | Type | Description | Example Value |
---|---|---|---|
commitResult | object | Result of commit | {
"icode": "AD.200",
"response": " |
Query Output
The following items show how to query successful results from the output of Commit - Palo Alto - Panorama - REST:
Commit Response
commitResult.response
Example Inputs and Outputs
Example 1
Input:
{ "adapterId": "panorama" }
Output:
{ "commitResult": { "icode": "AD.200", "response": "" } } Commit job enqueued with jobid 404 404
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Commit API Overview | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-request-types/commit-configuration-api/commit#id4e36ab51-cce0-4bd1-8953-2413189ab1c6 | Public |
Create Security Post Rule - Palo Alto - Panorama - REST
Creates security post rule on Palo Alto Panorama
Capabilities include:
- Checks existence of security post rule and creates rule if none exists
Entry Point IAP Component
The primary IAP component to run Create Security Post Rule - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Create Security Post Rule - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Create Security Post Rule - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
name | string | yes | Name of security post rule | postRule1 |
description | string | yes | Description of security post rule | Post Rule 1 description |
ruleLocation | string | yes | Location of security post rule | shared |
ruleType | string | yes | Type of security post rule | universal |
schedule | string | yes | Schedule of when to apply security post rule | Overnight |
logStart | string | yes | Whether log at session start will generate time for each start event | yes |
logEnd | string | yes | Whether log at session end will generate time when session has ended | yes |
fromMembers | array | yes | List of from members | [
{
"member": "any"
}
] |
toMembers | array | yes | List of to members | [
{
"member": "10.0.0.0"
},
{
"member": "10.0.0.1"
}
] |
sourceMembers | array | yes | List of source members | [
{
"member": "any"
}
] |
destinationMembers | array | yes | List of destination members | [
{
"member": "any"
}
] |
action | string | yes | Action to apply to rule | allow |
adapterId | string | yes | Name of Panorama adapter | panorama |
Outputs
The following table lists the outputs for Create Security Post Rule - Palo Alto - Panorama - REST:
Name | Type | Description | Example Value |
---|---|---|---|
createSecurityRulesResult | object | Result of call to create security post rule | {
"icode": "AD.200",
"response": {
"@status": "success",
"@code": "20",
"msg": "command succeeded"
}
} |
postCheckResult | object | Result of post-check to confirm security post rule created successfully | {
"icode": "AD.200",
"response": {
"@status": "success",
"@code": "19",
"result": {
"@total-count": "1",
"@count": "1",
"entry": [
{
"@name": "postRule3",
"@uuid": "80b87da7-e289-4ee5-a6b5-42ebb69801f3",
"@location": "shared",
"from": {
"member": [
"any"
]
},
"to": {
"member": [
"10.10.0.99"
]
},
"source": {
"member": [
"10.10.1.99"
]
},
"source-user": {
"member": [
"any"
]
},
"destination": {
"member": [
"any"
]
},
"service": {
"member": [
"application-default"
]
},
"category": {
"member": [
"any"
]
},
"application": {
"member": [
"any"
]
},
"schedule": "Overnight",
"negate-source": "no",
"negate-destination": "no",
"disabled": "no",
"description": "Post Rule 3",
"hip-profiles": {
"member": [
"any"
]
},
"action": "deny",
"icmp-unreachable": "no",
"rule-type": "universal",
"option": {
"disable-server-response-inspection": "no"
},
"log-start": "yes",
"log-end": "no"
}
]
}
}
} |
createSecurityRulesError | object | Result of call to create security post rule if error occurs | {
"icode": "AD.500",
"response": {
"code": 6,
"message": "Name Not Unique",
"details": [
{
"@type": "CauseInfo",
"causes": [
{
"code": 9,
"module": "panui_mgmt",
"description": "Name Not Unique: rule1 'rule1' is already in use."
}
]
}
]
}
} |
Query Output
The following items show how to query successful results from the output of Create Security Post Rule - Palo Alto - Panorama - REST:
Create Security Rules Result Status
createSecurityRulesResult.response.@status
Post-Check Result Status
postCheckResult.response.@status
The following items show how to query failure results from the output of Create Security Post Rule - Palo Alto - Panorama - REST:
Create Security Rules Error Message
createSecurityRulesError.response.message
Example Inputs and Outputs
Example 1
Input:
{ "name": "postRule1", "description": "Post Rule 1 description", "ruleLocation": "shared", "ruleType": "universal", "schedule": "Overnight", "logStart": "yes", "logEnd": "yes", "fromMembers": [ { "member": "any" } ], "toMembers": [ { "member": "10.0.0.0" }, { "member": "10.0.0.1" } ], "sourceMembers": [ { "member": "any" } ], "destinationMembers": [ { "member": "any" } ], "action": "allow", "adapterId": "panorama" }
Output:
{ "createSecurityRulesResult": { "icode": "AD.200", "response": { "@status": "success", "@code": "20", "msg": "command succeeded" } }, "postCheckResult": { "icode": "AD.200", "response": { "@status": "success", "@code": "19", "result": { "@total-count": "1", "@count": "1", "entry": [ { "@name": "postRule1", "@uuid": "80b87da7-e289-4ee5-a6b5-42ebb69801f3", "@location": "shared", "from": { "member": [ "any" ] }, "to": { "member": [ "10.10.0.99" ] }, "source": { "member": [ "10.10.1.99" ] }, "source-user": { "member": [ "any" ] }, "destination": { "member": [ "any" ] }, "service": { "member": [ "application-default" ] }, "category": { "member": [ "any" ] }, "application": { "member": [ "any" ] }, "schedule": "Overnight", "negate-source": "no", "negate-destination": "no", "disabled": "no", "description": "Post Rule 1 description", "hip-profiles": { "member": [ "any" ] }, "action": "deny", "icmp-unreachable": "no", "rule-type": "universal", "option": { "disable-server-response-inspection": "no" }, "log-start": "yes", "log-end": "no" } ] } } } }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Create Security Policy Rule API Overview | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/get-started-with-the-pan-os-rest-api/create-security-policy-rule-rest-api | Public |
Create Security Pre Rule - Palo Alto - Panorama - REST
Creates security pre rule on Palo Alto Panorama
Capabilities include:
- Checks existence of security pre rule and creates rule if none exists
Entry Point IAP Component
The primary IAP component to run Create Security Pre Rule - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Create Security Pre Rule - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Create Security Pre Rule - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
name | string | yes | Name of security post rule | preRule1 |
description | string | yes | Description of security pre rule | Pre Rule 1 description |
ruleLocation | string | yes | Location of security pre rule | shared |
ruleType | string | yes | Type of security pre rule | universal |
schedule | string | yes | Schedule of when to apply security pre rule | Overnight |
logStart | string | yes | Whether log at session start will generate time for each start event | yes |
logEnd | string | yes | Whether log at session end will generate time when session has ended | yes |
fromMembers | array | yes | List of from members | [
{
"member": "any"
}
] |
toMembers | array | yes | List of to members | [
{
"member": "10.0.0.0"
},
{
"member": "10.0.0.1"
}
] |
sourceMembers | array | yes | List of source members | [
{
"member": "any"
}
] |
destinationMembers | array | yes | List of destination members | [
{
"member": "any"
}
] |
action | string | yes | Action to apply to rule | allow |
adapterId | string | yes | Name of Panorama adapter | panorama |
Outputs
The following table lists the outputs for Create Security Pre Rule - Palo Alto - Panorama - REST:
Name | Type | Description | Example Value |
---|---|---|---|
createSecurityRulesResult | object | Result of call to create security pre rule | {
"icode": "AD.200",
"response": {
"@status": "success",
"@code": "20",
"msg": "command succeeded"
}
} |
postCheckResult | object | Result of post-check to confirm security pre rule created successfully | {
"icode": "AD.200",
"response": {
"@status": "success",
"@code": "19",
"result": {
"@total-count": "1",
"@count": "1",
"entry": [
{
"@name": "preRule1",
"@uuid": "932b87ac-d6b1-4103-9a49-03cac901d815",
"@location": "shared",
"from": {
"member": [
"any"
]
},
"to": {
"member": [
"10.10.0.99"
]
},
"source": {
"member": [
"10.10.1.99"
]
},
"source-user": {
"member": [
"any"
]
},
"destination": {
"member": [
"any"
]
},
"service": {
"member": [
"application-default"
]
},
"category": {
"member": [
"any"
]
},
"application": {
"member": [
"any"
]
},
"schedule": "Overnight",
"negate-source": "no",
"negate-destination": "no",
"disabled": "no",
"description": "Pre Rule 1 description",
"hip-profiles": {
"member": [
"any"
]
},
"action": "deny",
"icmp-unreachable": "no",
"rule-type": "universal",
"option": {
"disable-server-response-inspection": "no"
},
"log-start": "yes",
"log-end": "yes"
}
]
}
}
} |
createSecurityRulesError | object | Result of call to create security pre rule if error occurs | {
"icode": "AD.500",
"response": {
"code": 6,
"message": "Name Not Unique",
"details": [
{
"@type": "CauseInfo",
"causes": [
{
"code": 9,
"module": "panui_mgmt",
"description": "Name Not Unique: rule1 'rule1' is already in use."
}
]
}
]
}
} |
Query Output
The following items show how to query successful results from the output of Create Security Pre Rule - Palo Alto - Panorama - REST:
Create Security Rules Result Status
createSecurityRulesResult.response.@status
Post-Check Result Status
postCheckResult.response.@status
The following items show how to query failure results from the output of Create Security Pre Rule - Palo Alto - Panorama - REST:
Create Security Rules Error Message
createSecurityRulesError.response.message
Example Inputs and Outputs
Example 1
Input:
{ "name": "preRule1", "description": "Pre Rule 1 description", "ruleLocation": "shared", "ruleType": "universal", "schedule": "Overnight", "logStart": "yes", "logEnd": "yes", "fromMembers": [ { "member": "any" } ], "toMembers": [ { "member": "10.0.0.0" }, { "member": "10.0.0.1" } ], "sourceMembers": [ { "member": "any" } ], "destinationMembers": [ { "member": "any" } ], "action": "allow", "adapterId": "panorama" }
Output:
{ "createSecurityRulesError": { "icode": "AD.200", "response": { "@status": "success", "@code": "20", "msg": "command succeeded" } }, "postCheckResult": { "icode": "AD.200", "response": { "@status": "success", "@code": "19", "result": { "@total-count": "1", "@count": "1", "entry": [ { "@name": "preRule1", "@uuid": "932b87ac-d6b1-4103-9a49-03cac901d815", "@location": "shared", "from": { "member": [ "any" ] }, "to": { "member": [ "10.10.0.99" ] }, "source": { "member": [ "10.10.1.99" ] }, "source-user": { "member": [ "any" ] }, "destination": { "member": [ "any" ] }, "service": { "member": [ "application-default" ] }, "category": { "member": [ "any" ] }, "application": { "member": [ "any" ] }, "schedule": "Overnight", "negate-source": "no", "negate-destination": "no", "disabled": "no", "description": "Pre Rule 1 description", "hip-profiles": { "member": [ "any" ] }, "action": "deny", "icmp-unreachable": "no", "rule-type": "universal", "option": { "disable-server-response-inspection": "no" }, "log-start": "yes", "log-end": "yes" } ] } } } }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Create Security Policy Rule API Overview | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/get-started-with-the-pan-os-rest-api/create-security-policy-rule-rest-api | Public |
Download Software on Firewall - Palo Alto - Panorama - REST
Download the software to the firewall in Palo Alto Panorama
Capabilities include:
- The workflow is used to download the software to the firewall in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run Download Software on Firewall - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Download Software on Firewall - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Download Software on Firewall - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
serialNumber | string | yes | Serial number of the firewall | 123456789876 |
softwareVersion | string | yes | Version of the software that the firewall will be upgraded to | 10.0.0 |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for Download Software on Firewall - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for Download Software on Firewall - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "serialNumber": "123456789876", "adapterId": "panorama", "softwareVersion": "10.0.0" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade a Firewall to the Latest PAN-OS Version using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-a-firewall-to-the-latest-pan-os-version-api | Public |
HA Pair Software Upgrade - Palo Alto - Panorama - REST
Upgrade PAN-OS on a firewall set up as active-passive high-availability (HA) pair in Palo Alto Panorama
Capabilities include:
- The workflow is used to upgrade PAN-OS on a firewall set up as active-passive high-availability (HA) pair in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run HA Pair Software Upgrade - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | HA Pair Software Upgrade - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for HA Pair Software Upgrade - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
targetVersion | string | yes | Version of the software that the firewall will be upgraded to | 10.0.0 |
firewall | string | yes | Name of the active firewall | FW-A |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for HA Pair Software Upgrade - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for HA Pair Software Upgrade - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "targetVersion": "10.0.0", "firewall": "FW-A", "adapterId": "panorama" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade PAN-OS on Multiple HA Firewalls through Panorama using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-pan-os-on-multiple-ha-firewalls-through-panorama-api | Public |
Install Software on Firewall - Palo Alto - Panorama - REST
Install the software on the firewall in Palo Alto Panorama
Capabilities include:
- The workflow is used to install the software on the firewall in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run Install Software on Firewall - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Install Software on Firewall - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Install Software on Firewall - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
serialNumber | string | yes | Serial number of the firewall | 123456789876 |
softwareVersion | string | yes | Version of the software that the firewall will be upgraded to | 10.0.0 |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for Install Software on Firewall - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for Install Software on Firewall - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "serialNumber": "123456789876", "adapterId": "panorama", "softwareVersion": "10.0.0" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade a Firewall to the Latest PAN-OS Version using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-a-firewall-to-the-latest-pan-os-version-api | Public |
Reboot Firewall - Palo Alto - Panorama - REST
Reboot the firewall in Palo Alto Panorama
Capabilities include:
- The workflow is used to reboot a firewall in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run Reboot Firewall - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Reboot Firewall - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Reboot Firewall - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
serialNumber | string | yes | Serial number of the firewall | 123456789876 |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for Reboot Firewall - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for Reboot Firewall - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "serialNumber": "123456789876", "adapterId": "panorama" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade a Firewall to the Latest PAN-OS Version using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-a-firewall-to-the-latest-pan-os-version-api | Public |
Standalone Software Upgrade - Palo Alto - Panorama - REST
Upgrade a firewall to a software version in Palo Alto Panorama
Capabilities include:
- The workflow is used to upgrade a firewall to a software version in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run Standalone Software Upgrade - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Standalone Software Upgrade - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Standalone Software Upgrade - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
serialNumber | string | yes | Serial number of the firewall | 123456789876 |
softwareVersion | string | yes | Version of the software that the firewall will be upgraded to | 10.0.0 |
backupFilename | string | yes | The backup of the current Panorama configuration file to save to restore the configuration if problems occurs during upgrade | LAB-FW3.xml |
deviceName | string | yes | Name of the firewall | LAB-FW3 |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for Standalone Software Upgrade - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for Standalone Software Upgrade - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "backupFilename": "LAB-FW3.xml", "deviceName": "LAB-FW3", "softwareVersion": "10.0.0", "serialNumber": "123456789876", "adapterId": "panorama" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade a Firewall to the Latest PAN-OS Version using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-a-firewall-to-the-latest-pan-os-version-api | Public |
Suspend Firewall - Palo Alto - Panorama - REST
Suspend an active firewall in Palo Alto Panorama
Capabilities include:
- The workflow is used to suspend an active firewall in Palo Alto Panorama
Entry Point IAP Component
The primary IAP component to run Suspend Firewall - Palo Alto - Panorama - REST is listed below:
IAP Component Name | IAP Component Type | Suspend Firewall - Palo Alto - Panorama - REST | Workflow |
---|
Inputs
The following table lists the inputs for Suspend Firewall - Palo Alto - Panorama - REST:
Name | Type | Required | Description | Example Value |
---|---|---|---|---|
serialNumber | string | yes | Serial number of the firewall | 123456789876 |
adapterId | string | yes | The adapter-panorama instance to use | panorama |
Outputs
There are no outputs for Suspend Firewall - Palo Alto - Panorama - REST.
Query Output
There are no query output examples for Suspend Firewall - Palo Alto - Panorama - REST.
Example Inputs and Outputs
Example 1
Input:
{ "serialNumber": "123456789876", "adapterId": "panorama" }
API Links
API Name | API Documentation Link | API Link Visibility |
---|---|---|
Upgrade PAN-OS on Multiple HA Firewalls through Panorama using API | https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-panorama-api/pan-os-xml-api-use-cases/upgrade-pan-os-on-multiple-ha-firewalls-through-panorama-api | Public |
Additional Information
Support
Please use your Itential Customer Success account if you need support when using this Workflow Project.