Get Started with the PAN-OS REST API
Table of Contents
PAN.OS 11.1
Expand all | Collapse all
-
- Upgrade a Firewall to the Latest PAN-OS Version (API)
- Show and Manage GlobalProtect Users (API)
- Query a Firewall from Panorama (API)
- Upgrade PAN-OS on Multiple HA Firewalls through Panorama (API)
- Automatically Check for and Install Content Updates (API)
- Enforce Policy using External Dynamic Lists and AutoFocus Artifacts (API)
- Configure SAML 2.0 Authentication (API)
- Quarantine Compromised Devices (API)
- Manage Certificates (API)
-
- Asynchronous and Synchronous Requests to the PAN-OS XML API
- Run Operational Mode Commands (API)
- Apply User-ID Mapping and Populate Dynamic Groups (API)
- Get Version Info (API)
-
- PAN-OS REST API
- Access the PAN-OS REST API
- Resource Methods and Query Parameters (REST API)
- PAN-OS REST API Request and Response Structure
- PAN-OS REST API Error Codes
- Work With Objects (REST API)
- Create a Security Policy Rule (REST API)
- Work with Policy Rules on Panorama (REST API)
- Create a Tag (REST API)
- Configure a Security Zone (REST API)
- Configure an SD-WAN Interface (REST API)
- Create an SD-WAN Policy Pre Rule (REST API)
- Configure an Ethernet Interface (REST API)
- Update a Virtual Router (REST API)
- Work With Decryption (APIs)
Get Started with the PAN-OS REST API
To use the PAN-OS® and Panorama™ REST API, first use
your administrative credentials to get an API key. You can then
use the API key to make API requests.
The PAN-OS REST API covers a subset of the firewall and Panorama
functions, and you’ll need to use the XML API to complete the configuration
and commit your changes.
The API requests in this guide use cURL commands. However, you
can make API requests with other tools such as Postman or a RESTClient.
By default, PAN-OS uses a self-signed certificate, so you will need
to use the -k parameter with cURL requests. Alternatively, you can replace the self-signed certificate with
one from a trusted certificate authority. If you have an internal
certificate authority, generate your own certificate and install
it on the firewall.