Configuration Table Export
Description of how to export your policy rule base, objects, managed devices, and interfaces in PDF or CSV format from the web interface.
Administrative users can export the data on policy rulebase, objects, managed devices, and interfaces in tabular format in either a PDF file or a CSV file. The data that is exported is the visible data on the web interface. For filtered data, only data matching the filter is exported. If you don’t apply any filter, then all data is exported.
All sensitive data, such as a password, is hidden with wildcard (*) symbols.
A system log and download link are generated on successful configuration table export. Use the download link to save the PDF or CSV file locally. After you close the window that contains the download link, the download link for that specific export is no longer available.
To export table data, click PDF/CSV and configure the following settings:
Enter a name (maximum of 32 characters) to identify the exported data. This name becomes the name of the downloaded file that is generated by the export.
Select the type of export output to generate. You can choose either PDF or CSV format.
The default page size is Letter (8.5 by 11.0 inches). You cannot change the page size. By default, the PDF is generated in portrait orientation and changes to landscape orientation to accommodate the maximum number of columns.
Enter a description (maximum of 255 characters) to provide context and additional information about the export.
Shows the table data that will be exported. If you need to clear the filtering settings that you set previously, click Show All Columns to show all policy rules under the selected policy type. Then you can add or remove columns and apply filters as needed.
Show All Columns
Remove all filters and show all table columns.
Click Export to generate the configuration table download link.
Export Configuration Table Data
Export table data from your Panorama™ or firewall configurations in either PDF or CSV format to demonstrate compliance with industry regulations or audits ...
IKE Gateway Management
IKE Gateway Management Network > Network Profiles > IKE Gateways The following table describes how to manage IKE gateways. Manage IKE Gateways Description Add To ...
Other Supported Actions to Manage Certificates
Other Supported Actions to Manage Certificates After you generate the certificate, its details display on the page and the following actions are available: Other Supported ...
Managed Firewall Administration
Managed Firewall Administration You can perform the following administrative tasks on firewalls. Task Description Add Add firewalls and enter their serial numbers (one per row) ...
Actions Supported on Applications
Actions Supported on Applications You can perform any of the following actions on this page: Actions Supported for Applications Description Filter by application To search ...
Manage Access to User-ID Agents
Manage Access to User-ID Agents Perform the following tasks for managing connections from the firewall to User-ID agents or redistribution points. Task Description Display information ...
IPSec VPN Tunnel Management
IPSec VPN Tunnel Management Network > IPSec Tunnels The following table describes how to manage your IPSec VPN tunnels. Fields to Manage IPSec VPN Tunnels ...
Device > User Identification > Terminal Services Agents
Device > User Identification > Terminal Services Agents On a system that supports multiple users who share the same IP address, a Terminal Services (TS) ...
Creating and Managing Policies
Creating and Managing Policies Select the Policies Security page to add , modify, and manage security policies: Task Description Add Add a new policy rule ...