For customers who have installed the Ubuntu version of the NP-View OVF, this package is designed to update Docker and Ubuntu to the following versions:
# Docker version 27.1.2, build d01f264
# Kernel version 5.15.0-118-generic
# Ubuntu version Ubuntu 22.04.4 LTS
# Download the update package
# verify the checksum: 7D510280D6901502B7210EADC284B351F49C0AE6F40D9030A99C5A6A17B6444F
# SSH into the NP-View server
sudo su –
cd /root/
mkdir updates
cd updates
# copy update-packages-08-14-24.zip to the updates folder on the np-view server
unzip update-packages-08-14-24.zip
cd update-packages-08-14-24
# install all packages
export DEBIAN_FRONTEND=noninteractive && dpkg -i *.deb
reboot
# .zip and .deb files can be removed after reboot.
The Help Center can be found on the system menu on the upper right corner of the topology.
The Help Center will display warnings or errors identified during the import of device files.
The information in the help center is designed to provide information for the tech support team to help diagnose the issues.
There are many types of possible errors including:
Every customer has a different environment and possible device configurations. We sometimes run into a situation where the parser cannot handle the device as configured. When this happens, we request the customer to sanitize the config file on the NP Portal and upload the file for debug purposes. Support from our customers is important for us to quickly remediate parsing issues unique to a device or specific file.
The Help Center provides a download for the error log which can be submitted to technical support through the support portal.
When we improve a data or analysis feature or fix an issue, the improvement may not be visible until new data is ingested, or another action is taken.
When we improve a parser, upon next import, we will apply the new rules and import the new or corrected data. Only the workspace where the new file(s) are imported (manual or connector) will receive the new data. All views, in that workspace, that contain the imported device(s), will be updated with the new data.
No other workspaces will be impacted.
The impact of this is that some workspaces will have the new data, some will not, resulting in data discrepancies across workspaces. Additionally, only the devices being imported will contain the new or updated data within a view.
To ensure the entire workspace is current, users can manually re-import data into their existing workspace. Alternatively the user can clone an existing connector to pull data into the workspace (Note: connectors perform a checksum to see if a file has already been imported and ignore it if we have imported it already.)
When we improve merge (topology generation) or analyze (path creation), upon next import or the creation of a new view, we will apply the new rules. Only the views, in that workspace, that contain the new file(s), will be merged and analyzed. All other views will not be impacted.
The impact is that some workspaces and views will have new analysis results, some will not, resulting in data discrepancies across views and workspaces.
To ensure the entire workspace is current, users can manually re-import data into their existing views or create new views.
When we improve risk alerts, upon next import, we will apply the new policies and requirements. Only the workspace where the new file(s) are imported (manual or connector) will receive updated risks. Upon import and after the views are updated, the risk alerts will be updated. No other workspaces will be impacted.
The impact is that some workspaces will have new risk alerts, some will not, resulting in data discrepancies across workspaces.
To ensure the entire workspace is current, users can manually re-import data into their existing views or users can reset the risks for any workspace in the Policy manager which will remove all current risks and rerun the risks for that workspace.
The Connectivity Matrix illustrates port access between devices and interfaces. This allows users to analyze and confirm communication between interfaces.
Each row or column header cell contains four pieces of information.
Each cell will contain connectivity information
The Connectivity Matrix is accessible from the device Info panel
Two paths to save and document The Connectivity Matrix for your organization to use as an artifact:
When was it introduced?
What does it do?
Where are they located?
View Level Interfaces Report: Available from the Main Menu
Device Level Interfaces Report: Available from a selected device’s Information Panel
When was it introduced?
What does it do?
Where is the Routes Report located?
Available from a selected Firewall’s Information Panel
When was it introduced?
What does it do?
Where is the Routes Report located?
Available from a selected Firewall’s Information Panel
When was it introduced?
What does it do?
Where is it located?
Two paths to save and document The Zone Matrix for your organization to use as an artifact:
This section describes how to update the NP-View Server application and the underlying components if the OVF was used for the initial installation.
To update an existing NP-View Application, the steps are:
sudo -i
sh NP-View_installer.sh
(where NP-View_installer.sh is the name of the new release file downloaded in step 1).For NP-View Server:
Option 1:
ssh root@<ip-of-guest-os>
sudo -i
or sudo su
will give you admin privileges once you are logged in.cd /opt/np-live
sh ./stop_NP-Live.sh
tar -czf np-view-v4.3.5-db-backup.tar.gz db
Option 2 (This option is only available if your server is a VM):
Once you have a back up and have updated to 4.3.5, please download version 5+ and follow the instructions listed in the above section “Updating the NP-View Server Application“.
sudo -i
(This should take you to the root folder)/opt/NP-Live/NP-View_backupand_restore.sh
sudo -i
(This should take you to the root folder)/opt/NP-Live/NP-View_backupand_restore.sh
To check the version update your server URL to the following
https://<np-view_server_address>/version
/opt/np-live/stop_nplive.sh
)/opt/np-live/
, run the command: tar -zcf db_backup_$(date '+%Y_%m_%d').tgz db
(this command may take few minutes to complete)If the OVF was used for the initial installation, that package included the CentOS 7 operating system and Docker. These applications must be updated separately from the NP-View Server Application using the below instructions. The instructions cover NP-View Servers that have internet access and those that do not have internet access.
CentOS will be EOL June 30, 2024. We recommend customers to transition to Ubuntu. Our new OVF uses Ubuntu and instructions for updating Ubuntu will be coming soon.
– stop NP-Viewcd /opt/np-live/
./stop_NP-Live.sh
– run all updatesyum update -y
– reboot serverreboot
If NP-View server is installed in an environment that does not have internet access, a separate Centos 7 server with Docker that has internet access is required to create the update package. All commands below are case sensitive.
Network-Perception uses this mirror for CentOS updates and this mirror for Docker updates
– make sure you are rootsudo su -
– create packages directorycd /root/
mkdir packages
cd packages
– download all packagesyum list installed | awk {'print $1; }' | tail -n +3 | xargs yumdownloader
– you should see docker included in the output list.
– compress archive (capital -C is important)tar czf /root/packages.tar.gz *.rpm -C /root/packages/
– Copy packages.tar.gz to the offline server. The user can use the below command to scp:scp packages.tar.gz root@ipAddress:/root/
– make sure you are rootsudo su -
– stop NP-Viewcd /opt/np-live/
./stop_NP-Live.sh
– create directory and extract the archivecd /root/
mkdir packages/
mv packages.tar.gz packages/
cd packages/
tar -xf packages.tar.gz
– install all updates:yum -y localinstall *.rpm
– reboot serverreboot
– now everything is up to date on the offline server.
If you get any docker swarm errors:
– make sure you are rootsudo su -
– leave and join swarm clusterdocker swarm leave --force && docker swarm init
The Rule Usage feature helps network admins identify rules for potential elimination due to lack of use. This feature only applies to Palo Alto NGFW (not Panorama). Rule Usage Analysis (aka Hit Count) requests additional Access Rule usage information from firewalls using the connector. When setting up a new connector, the user will have the ability to enable the extraction of rule usage information:
Note that existing connectors will not be affected and cannot be edited to enable hit count data retrieval.
From the NGFW, we extract four values for each access rule:
The information is presented as additional columns in the Access Rules Table. The four columns are disabled by default and will need to be enabled by the user using the menu at the top right.
Once enabled, the hit count data will be displayed in the Access rules table: