Skip to content


Switch branches/tags

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time

Palo Alto Firewall Shell

Release date: April 2021

Shell version: 2.0.0

Document version: 2.0

In This Guide


A shell integrates a device model, application or other technology with CloudShell. A shell consists of a data model that defines how the device and its properties are modeled in CloudShell, along with automation that enables interaction with the device via CloudShell.

Firewall Shells

CloudShell's Firewall shells enable you to manage your Firewall device similar to your networking equipment but without connectivity. In CloudShell, a Firewall shell runs commands, such as Autoload, Load, and Save Configuration.

Palo Alto Firewall Shell

Palo Alto Firewall Shell provides you with management capabilities such as device structure discovery and power management for the Palo Alto Firewall.

For more information on the Palo Alto Firewall, see the official Palo Alto product documentation.

Standard version

Palo Alto Firewall Shell 1.0.0 is based on the cloudshell firewall standard 3.0.1.

For detailed information about the shell’s structure and attributes, see the cloudshell firewall standard 3.0.1.( in GitHub.

Supported OS

PanOS 8.1.0


Release: Palo Alto Firewall Shell 1.0.0

  • CloudShell 8.0 and above

Data Model

The shell's data model includes all shell metadata, families, and attributes.

Palo Alto Firewall Families and Models

The Palo Alto Firewall families and models are listed in the following table:

Palo Alto Firewall Attributes

The attribute names and types are listed in the following table:


This section describes the automation (drivers or scripts) associated with the data model. The shell’s driver is provided as part of the shell package. There are two types of automation processes, Autoload and Resource. Autoload is executed when creating the resource in the Inventory dashboard, while resource commands are run in the Sandbox, providing that the resource has been discovered and is online.

Downloading the Shell

The Palo Alto Firewall Shell 1.0.0 is available from the Quali Community Integrations page.

Download the files into a temporary location on your local machine.

The shell comprises:

File name Description
Palo Alto Firewall Palo Alto Firewall shell package Shell Python dependencies (for offline deployments only)

Importing and Configuring the Shell

This section describes how to import the Palo Alto Firewall Shell 1.0.0 and configure and modify the shell’s devices.

Importing the shell into CloudShell

To import the shell into CloudShell:

  1. Make sure you have the shell’s zip package. If not, download the shell from the Quali Community's Integrations page.

  2. In CloudShell Portal, as Global administrator, open the Manage – Shells page.

  3. Click Import.

  4. In the dialog box, navigate to the shell's zip package, select it and click Open.

The shell is displayed in the Shells page and can be used by domain administrators in all CloudShell domains to create new inventory resources, as explained in Adding Inventory Resources.

Offline installation of a shell

Note: Offline installation instructions are relevant only if CloudShell Execution Server has no access to PyPi. You can skip this section if your execution server has access to PyPi. For additional information, see the online help topic on offline dependencies.

In offline mode, import the shell into CloudShell and place any dependencies in the appropriate dependencies folder. The dependencies folder may differ, depending on the CloudShell version you are using:

Adding shell and script packages to the local PyPi Server repository

If your Quali Server and/or execution servers work offline, you will need to copy all required Python packages, including the out-of-the-box ones, to the PyPi Server's repository on the Quali Server computer (by default C:\Program Files (x86)\QualiSystems\CloudShell\Server\Config\Pypi Server Repository).

For more information, see Configuring CloudShell to Execute Python Commands in Offline Mode.

To add Python packages to the local PyPi Server repository:

  1. If you haven't created and configured the local PyPi Server repository to work with the execution server, perform the steps in Add Python packages to the local PyPi Server repository (offlinemode).

  2. For each shell or script you add into CloudShell, do one of the following (from an online computer):

    • Connect to the Internet and download each dependency specified in the requirements.txt file with the following command: pip download -r requirements.txt. The shell or script's requirements are downloaded as zip files.

    • In the Quali Community's Integrations page, locate the shell and click the shell's Download link. In the page that is displayed, from the Downloads area, extract the dependencies package zip file.

  3. Place these zip files in the local PyPi Server repository.

Setting the python PythonOfflineRepositoryPath configuration key

Before PyPi Server was introduced as CloudShell’s python package management mechanism, the PythonOfflineRepositoryPath key was used to set the default offline package repository on the Quali Server machine, and could be used on specific Execution Server machines to set a different folder.

To set the offline python repository:

  1. Download the [Shell Offline Requirements .zip File Name] file, see Downloading the Shell.

  2. Unzip it to a local repository. Make sure the execution server has access to this folder.

  3. On the Quali Server machine, in the ~\CloudShell\Server\customer.config file, add the following key to specify the path to the default python package folder (for all Execution Servers):
    <add key="PythonOfflineRepositoryPath" value="repository full path"/>

  4. If you want to override the default folder for a specific Execution Server, on the Execution Server machine, in the ~TestShell\Execution Server\customer.config file, add the following key:
    <add key="PythonOfflineRepositoryPath" value="repository full path"/>

  5. Restart the Execution Server.

Configuring a new resource

This section explains how to create a new resource from the shell.

In CloudShell, the component that models the device is called a resource. It is based on the shell that models the device and allows the CloudShell user and API to remotely control the device from CloudShell.

You can also modify existing resources, see Managing Resources in the Inventory.

To create a resource for the device:

  1. In the CloudShell Portal, in the Inventory dashboard, click Add New.

  2. From the list, select [Shell Name].

  3. Enter the Name and IP address of the [Device Name] (if applicable).

  4. Click Create.

  5. In the Resource dialog box, enter the device's settings, see Device Name Attributes.

  6. Click Continue.

CloudShell validates the device’s settings and updates the new resource with the device’s structure (if the device has a structure).

Updating Python Dependencies for Shells

This section explains how to update your Python dependencies folder. This is required when you upgrade a shell that uses new/updated dependencies. It applies to both online and offline dependencies.

Updating offline Python dependencies

To update offline Python dependencies:

  1. Download the latest Python dependencies package zip file locally.

  2. Extract the zip file to the suitable offline package folder(s).

  3. Restart any execution server that has a live instance of the relevant driver or script. This requires running the Execution Server's configuration wizard, as explained in the Configure the Execution Server topic of the CloudShell Suite Installation guide.

Updating online Python dependencies

In online mode, the execution server automatically downloads and extracts the appropriate dependencies file to the online Python dependencies repository every time a new instance of the driver or script is created.

To update online Python dependencies:

  • If there is a live instance of the shell's driver or script, restart the execution server, as explained above. If an instance does not exist, the execution server will download the Python dependencies the next time a command of the driver or script runs.

Typical Workflow and Scenarios

Scenario 1 - Save configuration

  1. In CloudShell Portal, add the device resource to your blueprint and reserve the blueprint.

  2. Run the Save command on the device with the following inputs:

    • Folder Path: For example, tftp://ipaddress/shared folder
    • Configuration Type: Running or Startup

The configuration is saved to a file named <startup/running-config>-, which will reside in the folder path you entered.

Scenario 2 - Restore Configuration

  1. In CloudShell Portal, add the device resource to your blueprint and reserve the blueprint.

  2. Run the Restore resource command.

  3. Enter the following parameters:

    • Path (mandatory): Enter the full path of the configuration file.
    • Restore Method (optional): Append or Override. If you do not enter any value in this field, the Append method will be used.
    • Configuration Type (mandatory): Startup or Running.

Scenario 3 - Load firmware

  1. In CloudShell Portal, add the device resource to your blueprint and reserve the blueprint.

  2. Run the Load Firmware resource command.

  3. Enter the following parameters:

    • Path (mandatory): Enter the full path of the firmware file on the remote host. For example, tftp://


To download and share integrations, see Quali Community's Integrations.

For instructional training and documentation, see Quali University.

To suggest an idea for the product, see Quali's Idea box.

To connect with Quali users and experts from around the world, ask questions and discuss issues, see Quali's Community forums.

Release Notes

What's New

For release updates, see the shell's GitHub releases page.

Known Issues

  • PaloAlto PanOS supports the following SNMP v3 encryption configuration only: authentication protocol - SHA and privacy protocol - AES-128
  • PaloAlto PanOS doesn't support saving/restoring configuration files to/from FTP location, please use TFTP or SCP.