-
Notifications
You must be signed in to change notification settings - Fork 19
Description
Hello Team,
I’m currently working with the Nautobot Firewall Models plugin, aiming to sync all Palo Alto firewall security rules into Nautobot, with a long-term goal of achieving full automation based on Nautobot data.
While doing so, I’ve encountered a few challenges and design concerns, and I’d really appreciate your input:
🔹 1. Missing Palo Alto-Specific Fields
Palo Alto firewalls have several key attributes that aren’t currently modeled in the plugin, such as:
Security Profiles
External Dynamic Lists (EDLs)
URL Categories
Log Forwarding Profiles
Decryption profile options
Is there a recommended way to store or sync these attributes into Nautobot (e.g., via custom fields, notes, or extensions)?
Or is there any ongoing work or roadmap to incorporate these Palo Alto-specific fields into the plugin?
or is there any plan for vendor specific plugin creation.?
🔹 2. IP Address / Prefix Handling in IPAM
The plugin seems to automatically associate firewall IPs with Nautobot IPAM objects.
However, this is disrupting our existing IPAM hygiene, as many of the IPs present in firewalls are not managed by us or are external/third-party.
Would it be possible to:
Tag these as non-IPAM managed IPs, or
Have a separate tab or object category (like for FQDNs or IP ranges) to avoid polluting core IPAM data?
🔹 3. Security Zones Across Clusters and Sites
We have many HA firewall clusters (active-active, active-passive) across different sites, and we face these challenges:
Problem 1:
Currently, a Zone can only be assigned to a single device, which makes it impossible to assign the same zone name (e.g., zone_lan) to multiple firewalls in a cluster, even if they share the same function/interface names.
Problem 2:
We follow consistent zone naming conventions across locations (e.g., zone_lan, zone_dmz), but to assign them to different devices, we’re forced to create zone duplicates (e.g., zone_lan_site1, zone_lan_site2), which defeats the purpose of standardization.
Would it be possible or is there any plan to allow:
A single zone to be associated with multiple devices and multiple interfaces, e.g.:
zone_lan →
- device1 → ethernet1/1
- device2 → ethernet1/1
- deviceX → ethernet2/2
This would significantly improve reusability and alignment with real-world firewall deployments.
Any recommendations, best practices, or roadmap insights would be very helpful.
Thanks in advance for your time and support!
Best regards,
Narendra Polisetty