-
Notifications
You must be signed in to change notification settings - Fork 172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implementation of a TS Agent class for UserID #443
base: develop
Are you sure you want to change the base?
Implementation of a TS Agent class for UserID #443
Conversation
🎉 Thanks for opening this pull request! We really appreciate contributors like you! 🙌 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm, thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, actually, looks like the acctests are failing. There's no parent defined.
Seems this needs to be added to the CHILDTYPES
of at least panos.firewall.Firewall
and panos.device.Vsys
.
I have updated both CHILDTYPES, hopefully the acctests should now pass. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have updated both CHILDTYPES for this class
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated CHILDTYPES
Some acctests are failing. You can do |
Changes completed under following pull : |
Description
I have implemented the ability to add TS Agent objects directly to the firewall.
https://docs.paloaltonetworks.com/compatibility-matrix/terminal-services-ts-agent
Motivation and Context
The company I work for uses Azure Virtual Desktop, we have different host pools in different regions and corresponding PA-VMs in the regions. Due to the dynamic nature of host creation, this has allowed us to add 30 hosts' (which have the TS agent installed) corresponding IP addresses and port numbers in a matter of seconds to our firewalls.
How Has This Been Tested?
We don't have a testing environment but at the time we had a spare physical PA device which the implementation was tested on, after running the tests, the TS agent objects were successfully added to the firewall. This was then tested in production and we began to instantly see users mapped to traffic on the newly added AVD hosts.
Types of changes
Checklist
Forgive me for not ticking the test tick boxes as this is my first ever pull request, I would love to work on other aspects of this project and implement different classes under guidance of understanding the API in full. Whilst I was able to read the code to implement this class I do not fully understand how I would implement decryption exlusion/decryption profile classes which I do have a need for.