<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XMC/Control - Palo Alto integration in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86637#M9328</link>
    <description>Hi.&lt;BR /&gt;Share the log message the XMC receives from PA.&lt;BR /&gt;Attached document can help also&lt;BR /&gt;&lt;BR /&gt;Z.</description>
    <pubDate>Sat, 25 Dec 2021 14:46:28 GMT</pubDate>
    <dc:creator>Zdeněk_Pala</dc:creator>
    <dc:date>2021-12-25T14:46:28Z</dc:date>
    <item>
      <title>XMC/Control - Palo Alto integration</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86636#M9327</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I'm trying to get the XMC/Control - PA integration working. Goal is that if PA detects a threat, the host gets quarantined in Control.&lt;BR /&gt;PA setup is done, XMC receives the Syslog entry:&lt;BR /&gt;&lt;BR /&gt;PaloAlto: -threatIpAddress X.X.X.X -threatName "HTTP /etc/passwd Access Attempt(35107)" -severity high&lt;BR /&gt;&lt;BR /&gt;But according to the logs, this does not match the regex I've set up in Connect &amp;gt; Distributed IPS:&lt;BR /&gt;&lt;BR /&gt;2021-12-24 13:20:00,268 DEBUG [com.enterasys.netsight.api.eventlog.EventAlarmDef] matchEventEntry: Matches = false for event with message =PaloAlto: -threatIpAddress X.X.X.X -threatName "HTTP /etc/passwd Access Attempt(35107)" -severity high&lt;BR /&gt;&lt;BR /&gt;I've the same result with the below 3 regex strings:&lt;BR /&gt;-threatIpAddress $threatIpAddress -threatName $threatName -severity $severity&lt;BR /&gt;Palo Alto: -threatIpAddress $threatIpAddress -threatName $threatName -severity $severity&lt;BR /&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;Palo&lt;/SPAN&gt;&lt;SPAN class="SearchHighlight SearchHighlight2"&gt;Alto&lt;/SPAN&gt;: -threatIpAddress $threatIpAddress -threatName $threatName&lt;BR /&gt;&lt;BR /&gt;Not sure which one is correct. I've found some outdated doc (https://manualzz.com/doc/10758310/integration-guide), and the recent doc is not that extensive: &lt;BR /&gt;&lt;A data-url="https://emc.extremenetworks.com/content/oneview/docs/connect/docs/l_ov_connect_security.htm#Palo" class="embedly-content" href="https://emc.extremenetworks.com/content/oneview/docs/connect/docs/l_ov_connect_security.htm" target="_blank" rel="noopener"&gt;ExtremeConnect Security Configuration&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Anyone got this working recently?&lt;BR /&gt;&lt;BR /&gt;I'm using PANOS 10 and XMC/Control 8.5.5.32&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Fri, 24 Dec 2021 13:32:02 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86636#M9327</guid>
      <dc:creator>Fijs</dc:creator>
      <dc:date>2021-12-24T13:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: XMC/Control - Palo Alto integration</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86637#M9328</link>
      <description>Hi.&lt;BR /&gt;Share the log message the XMC receives from PA.&lt;BR /&gt;Attached document can help also&lt;BR /&gt;&lt;BR /&gt;Z.</description>
      <pubDate>Sat, 25 Dec 2021 14:46:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86637#M9328</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2021-12-25T14:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: XMC/Control - Palo Alto integration</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86638#M9329</link>
      <description>Hi Zdenek,&lt;BR /&gt;&lt;BR /&gt;Thanks for the doc, this one is more up-to-date &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;The config I already had, seems to be matching the doc, apart from a few details:&lt;BR /&gt;&lt;BR /&gt;- no LLDP active on PA (don't see why this is needed)&lt;BR /&gt;- I had not added the PA in XMC devices - is this required?&lt;BR /&gt;- I update my regex to match the one in your doc: "PaloAlto:.-threatIpAddress.$threatIpAddress.-threatName.$threatName.-severity.drop"&lt;BR /&gt;&lt;BR /&gt;Unfortunately the regex is still not matching. Syslog received in XMC /var/log/syslog&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE class="language-markup"&gt;&lt;CODE&gt;&amp;lt;3&amp;gt;Dec 26 22:55:59 PA-VM(X.X.X.X) PaloAlto: -threatIpAddress X.X.X.Y -threatName "HTTP /etc/passwd Access Attempt(35107)" -severity high​&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;XMC server.log:&lt;/P&gt;
&lt;PRE class="language-markup"&gt;&lt;CODE&gt;2021-12-26 22:56:02,402 DEBUG [com.enterasys.netsight.api.eventlog.EventAlarmDef] matchEventEntry: Severity = true Category = true Type = true
2021-12-26 22:56:02,402 DEBUG [com.enterasys.netsight.api.eventlog.EventAlarmDef] matchEventEntry: Event = true LogManager = false Subnet = true
2021-12-26 22:56:02,402 DEBUG [com.enterasys.netsight.api.eventlog.EventAlarmDef] matchEventEntry: Phrase = false
2021-12-26 22:56:02,402 DEBUG [com.enterasys.netsight.api.eventlog.EventAlarmDef] matchEventEntry: Matches = false for event with message =PaloAlto: -threatIpAddress X.X.X.Y -threatName "HTTP /etc/passwd Access Attempt(35107)" -severity high&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;(IP's are obfuscated)&lt;BR /&gt;These 4 lines are repeated quite a lot.&lt;/P&gt;
Thanks!</description>
      <pubDate>Mon, 27 Dec 2021 00:52:32 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86638#M9329</guid>
      <dc:creator>Fijs</dc:creator>
      <dc:date>2021-12-27T00:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: XMC/Control - Palo Alto integration</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86639#M9330</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;as you can see in the Example the RegEx expects the severity to be "drop". The severity is "high" in your messages from Palo Alto.&lt;BR /&gt;If you change the RegEx to "PaloAlto:.-threatIpAddress.$threatIpAddress.-threatName.$threatName.-severity.high" then it will match.&lt;BR /&gt;&lt;BR /&gt;Z.</description>
      <pubDate>Mon, 27 Dec 2021 11:19:18 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86639#M9330</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2021-12-27T11:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: XMC/Control - Palo Alto integration</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86640#M9331</link>
      <description>Hi Zdenek,&lt;BR /&gt;&lt;BR /&gt;Correct, this matches fine now.&lt;BR /&gt;I also tried with "PaloAlto:.-threatIpAddress.$threatIpAddress.-threatName.$threatName.-severity.$severity", but this does not seem to work.&lt;BR /&gt;In the end I used "PaloAlto:.-threatIpAddress.$threatIpAddress.-threatName.$threatName.-severity.*" so I don't have to make different entries in Connect to for each severity level.&lt;BR /&gt;It is however good that we can take different actions based on the severity level.&lt;BR /&gt;&lt;BR /&gt;Thanks again for your help!</description>
      <pubDate>Tue, 28 Dec 2021 17:28:56 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xmc-control-palo-alto-integration/m-p/86640#M9331</guid>
      <dc:creator>Fijs</dc:creator>
      <dc:date>2021-12-28T17:28:56Z</dc:date>
    </item>
  </channel>
</rss>

