Blocks IP addresses using Static Address Groups in Palo Alto Networks Panorama or Firewall. The playbook receives malicious IP addresses and an address group name as inputs, verifies that the addresses are not already a part of the address group, adds them and commits the configuration.
Note: The playbook does not block the address group communication using a policy block rule. This step will be taken once outside of the playbook.
This playbook uses the following sub-playbooks, integrations, and scripts.
- PAN-OS Commit Configuration
This playbook does not use any integrations.
This playbook does not use any scripts.
|IP||The IP address to block.||Address||IP||Optional|
|LogForwarding||The Panorama log forwarding object name.||-||-||Optional|
|AddressGroupName||The static address group name.||Demisto Remediation - Static Address Group||-||Optional|
|AutoCommit||Whether to commit the configuration automatically. "Yes" will commit automatically. "No" will commit manually.||No||-||Optional|
There are no outputs for this playbook.