Skip to content

Security Zone Configuration Object

Table of Contents

  1. Overview
  2. Core Methods
  3. Security Zone Model Attributes
  4. Network Interface Types
  5. Exceptions
  6. Basic Configuration
  7. Usage Examples
  8. Managing Configuration Changes
  9. Error Handling
  10. Best Practices
  11. Full Script Examples
  12. Related Models

Overview

The SecurityZone class manages security zone objects in Palo Alto Networks' Strata Cloud Manager. It extends from BaseObject and offers methods to create, retrieve, update, list, fetch, and delete security zones. Additionally, it provides client-side filtering for listing operations and enforces container requirements using the folder, snippet, or device parameters.

Core Methods

Method Description Parameters Return Type
create() Creates a new security zone object data: Dict[str, Any] SecurityZoneResponseModel
get() Retrieves a security zone object by its unique ID object_id: str SecurityZoneResponseModel
update() Updates an existing security zone object zone: SecurityZoneUpdateModel SecurityZoneResponseModel
list() Lists security zone objects with optional filtering folder: Optional[str], snippet: Optional[str], device: Optional[str], exact_match: bool = False, plus additional filters List[SecurityZoneResponseModel]
fetch() Fetches a single security zone by its name within a container name: str, folder: Optional[str], snippet: Optional[str], device: Optional[str] SecurityZoneResponseModel
delete() Deletes a security zone object by its ID object_id: str None

Security Zone Model Attributes

Attribute Type Required Description
name str Yes The name of the security zone
id UUID Yes* Unique identifier (response only)
enable_user_identification bool No Enables user identification
enable_device_identification bool No Enables device identification
dos_profile str No Denial of Service profile name
dos_log_setting str No DoS log setting name
network NetworkConfig No Network configuration for the zone
user_acl UserAcl No User access control list configuration
device_acl DeviceAcl No Device access control list configuration
folder str Conditionally The folder container where the security zone is defined
snippet str Conditionally The snippet container (if applicable)
device str Conditionally The device container (if applicable)

* The id field is assigned by the system and is only present in response objects.

Network Interface Types

Security zones can use different network interface types, following a mutual exclusion pattern where exactly one type must be provided:

1. Layer 3 Interfaces

Layer 3 interfaces are the most common type and define routed interfaces.

security_zone_data = {
   "name": "trust-zone",
   "network": {
      "layer3": ["ethernet1/1", "ethernet1/2"],
      "zone_protection_profile": "default",
      "enable_packet_buffer_protection": True
   },
   "folder": "Security Zones"
}

2. Layer 2 Interfaces

Layer 2 interfaces operate at the data link layer.

security_zone_data = {
   "name": "layer2-zone",
   "network": {
      "layer2": ["ethernet1/3", "ethernet1/4"],
      "log_setting": "default-log-setting"
   },
   "folder": "Security Zones"
}

3. Virtual Wire Interfaces

Virtual wire interfaces connect two interfaces together.

security_zone_data = {
   "name": "virtual-wire-zone",
   "network": {
      "virtual_wire": ["ethernet1/5", "ethernet1/6"]
   },
   "folder": "Security Zones"
}

4. Tunnel Interfaces

Tunnel interfaces are used for VPN and other tunneling technologies.

security_zone_data = {
   "name": "tunnel-zone",
   "network": {
      "tunnel": {}  # Configuration depends on the tunnel type
   },
   "folder": "Security Zones"
}

5. TAP Interfaces

TAP interfaces are used for traffic monitoring without affecting the traffic flow.

security_zone_data = {
   "name": "tap-zone",
   "network": {
      "tap": ["ethernet1/7"]
   },
   "folder": "Security Zones"
}

6. External Interfaces

External interfaces are used for connecting to external networks.

security_zone_data = {
   "name": "external-zone",
   "network": {
      "external": ["ethernet1/8"]
   },
   "folder": "Security Zones"
}

Exceptions

Exception HTTP Code Description
InvalidObjectError 400 Thrown when provided data or parameters are invalid
MissingQueryParameterError 400 Thrown when required query parameters (e.g., name or folder) are missing
NameNotUniqueError 409 Security zone name already exists
ObjectNotPresentError 404 Security zone not found
ReferenceNotZeroError 409 Security zone still referenced
AuthenticationError 401 Authentication failed
ServerError 500 Internal server error

Basic Configuration

The Security Zone service can be accessed using either the unified client interface (recommended) or the traditional service instantiation.

from scm.client import ScmClient
# Initialize clientclient = ScmClient(
client_id="your_client_id",
client_secret="your_client_secret",
tsg_id="your_tsg_id"
)
# Access the Security Zone service directly through the client# No need to create a separate SecurityZone instance# The ScmClient automatically handles authentication and token refreshzones = client.security_zone

Traditional Service Instantiation (Legacy)

from scm.client import Scm
from scm.config.network import SecurityZone
# Initialize clientclient = Scm(
client_id="your_client_id",
client_secret="your_client_secret",
tsg_id="your_tsg_id"
)
# Initialize SecurityZone object explicitlyzones = SecurityZone(client)

Note

While both approaches work, the unified client interface is recommended for new development as it provides a more streamlined developer experience and ensures proper token refresh handling across all services.

Usage Examples

Creating Security Zones

from scm.client import ScmClient
# Initialize clientclient = ScmClient(
client_id="your_client_id",
client_secret="your_client_secret",
tsg_id="your_tsg_id"
)
# Define security zone configuration with Layer 3 interfacessecurity_zone_data = {
"name": "trust-zone",
"enable_user_identification": True,
"enable_device_identification": False,
"network": {
"layer3": ["ethernet1/1", "ethernet1/2"],
"zone_protection_profile": "default",
"enable_packet_buffer_protection": True
},
"user_acl": {
"include_list": ["user1", "user2"],
"exclude_list": []
},
"folder": "Security Zones"
}
# Create a new security zonenew_security_zone = client.security_zone.create(security_zone_data)
print(f"Created security zone with ID: {new_security_zone.id}")
# Create a security zone with Layer 2 interfaceslayer2_zone_data = {
"name": "layer2-zone",
"enable_user_identification": False,
"network": {
"layer2": ["ethernet1/3", "ethernet1/4"],
"log_setting": "default-log-setting"
},
"folder": "Security Zones"
}

layer2_zone = client.security_zone.create(layer2_zone_data)
print(f"Created Layer 2 security zone with ID: {layer2_zone.id}")

Retrieving Security Zones

# Fetch by name and folderzone = client.security_zone.fetch(
name="trust-zone",
folder="Security Zones"
)
print(f"Found security zone: {zone.name}")
# Get by IDzone_by_id = client.security_zone.get(zone.id)
print(f"Retrieved security zone: {zone_by_id.name}")

Updating Security Zones

# Fetch existing security zoneexisting_zone = client.security_zone.fetch(
name="trust-zone",
folder="Security Zones"
)
# Update specific attributesif existing_zone.network and existing_zone.network.layer3:
# Add a new interface to the existing list
existing_zone.network.layer3.append("ethernet1/3")
# Update protection profileif existing_zone.network:
existing_zone.network.zone_protection_profile = "enhanced-security"
# Update user identification settingexisting_zone.enable_device_identification = True
# Perform updateupdated_zone = client.security_zone.update(existing_zone)

Listing Security Zones

# Pass filters directly into the list methodfiltered_zones = client.security_zone.list(
folder="Security Zones",
enable_user_identification=True
)
# Process resultsfor zone in filtered_zones:
print(f"Name: {zone.name}")

# Check network configuration
if zone.network:
if zone.network.layer3:
print(f" Type: Layer 3, Interfaces: {', '.join(zone.network.layer3)}")
elif zone.network.layer2:
print(f" Type: Layer 2, Interfaces: {', '.join(zone.network.layer2)}")
# Check other network types...

# Display user identification status
print(f" User ID Enabled: {zone.enable_user_identification}")
print(f" Device ID Enabled: {zone.enable_device_identification}")
# Define filter parameters as a dictionarylist_params = {
"folder": "Security Zones",
"enable_device_identification": False
}
# List zones with filters as kwargsfiltered_zones = client.security_zone.list(**list_params)

Filtering Responses

The list() method supports additional parameters to refine your query results even further. Alongside basic filters, you can leverage the exact_match, exclude_folders, exclude_snippets, and exclude_devices parameters to control which objects are included or excluded after the initial API response is fetched.

Parameters:

  • exact_match (bool): When True, only objects defined exactly in the specified container (folder, snippet, or device) are returned. Inherited or propagated objects are filtered out.
  • exclude_folders (List[str]): Provide a list of folder names that you do not want included in the results.
  • exclude_snippets (List[str]): Provide a list of snippet values to exclude from the results.
  • exclude_devices (List[str]): Provide a list of device values to exclude from the results.

Examples:

# Only return security zones defined exactly in 'Security Zones'exact_zones = client.security_zone.list(
folder='Security Zones',
exact_match=True
)

for zone in exact_zones:
print(f"Exact match: {zone.name} in {zone.folder}")
# Exclude all security zones from the 'All' folderno_all_zones = client.security_zone.list(
folder='Security Zones',
exclude_folders=['All']
)

for zone in no_all_zones:
assert zone.folder != 'All'
print(f"Filtered out 'All': {zone.name}")
# Exclude security zones that come from 'default' snippetno_default_snippet = client.security_zone.list(
folder='Security Zones',
exclude_snippets=['default']
)

for zone in no_default_snippet:
assert zone.snippet != 'default'
print(f"Filtered out 'default' snippet: {zone.name}")
# Exclude security zones associated with 'DeviceA'no_deviceA = client.security_zone.list(
folder='Security Zones',
exclude_devices=['DeviceA']
)

for zone in no_deviceA:
assert zone.device != 'DeviceA'
print(f"Filtered out 'DeviceA': {zone.name}")
# Combine exact_match with multiple exclusionscombined_filters = client.security_zone.list(
folder='Security Zones',
exact_match=True,
exclude_folders=['All'],
exclude_snippets=['default'],
exclude_devices=['DeviceA']
)

for zone in combined_filters:
print(f"Combined filters result: {zone.name} in {zone.folder}")

Controlling Pagination with max_limit

The SDK supports pagination through the max_limit parameter, which defines how many objects are retrieved per API call. By default, max_limit is set to 2500. The API itself imposes a maximum allowed value of 5000. If you set max_limit higher than 5000, it will be capped to the API's maximum. The list() method will continue to iterate through all objects until all results have been retrieved. Adjusting max_limit can help manage retrieval performance and memory usage when working with large datasets.

Example:

from scm.client import ScmClient
from scm.config.network import SecurityZone
# Initialize clientclient = ScmClient(
client_id="your_client_id",
client_secret="your_client_secret",
tsg_id="your_tsg_id"
)
# Two options for setting max_limit:# Option 1: Use the unified client interface but create a custom SecurityZone instance with max_limitsecurity_zone_service = SecurityZone(client, max_limit=4321)
all_zones1 = security_zone_service.list(folder='Security Zones')
# Option 2: Use the unified client interface directly# This will use the default max_limit (2500)all_zones2 = client.security_zone.list(folder='Security Zones')
# Both options will auto-paginate through all available objects.# The security zones are fetched in chunks according to the max_limit.

Deleting Security Zones

# Delete by IDzone_id = "123e4567-e89b-12d3-a456-426655440000"
client.security_zone.delete(zone_id)

Managing Configuration Changes

Performing Commits

# Prepare commit parameterscommit_params = {
"folders": ["Security Zones"],
"description": "Updated security zones",
"sync": True,
"timeout": 300 # 5 minute timeout
}
# Commit the changes directly on the clientresult = client.commit(**commit_params)

print(f"Commit job ID: {result.job_id}")

Monitoring Jobs

# Get status of specific job directly from the clientjob_status = client.get_job_status(result.job_id)
print(f"Job status: {job_status.data[0].status_str}")
# List recent jobs directly from the clientrecent_jobs = client.list_jobs(limit=10)
for job in recent_jobs.data:
print(f"Job {job.id}: {job.type_str} - {job.status_str}")

Error Handling

from scm.client import ScmClient
from scm.exceptions import (
InvalidObjectError,
MissingQueryParameterError,
NameNotUniqueError,
ObjectNotPresentError,
ReferenceNotZeroError
)
# Initialize clientclient = ScmClient(
client_id="your_client_id",
client_secret="your_client_secret",
tsg_id="your_tsg_id"
)

try:
# Create security zone configuration
zone_config = {
"name": "test-zone",
"network": {
"layer3": ["ethernet1/10"],
"zone_protection_profile": "default"
},
"folder": "Security Zones",
"description": "Test zone",
"enable_user_identification": True
}

# Create the security zone using the unified client interface
new_zone = client.security_zone.create(zone_config)

# Commit changes directly from the client
result = client.commit(
folders=["Security Zones"],
description="Added test security zone",
sync=True
)

# Check job status directly from the client
status = client.get_job_status(result.job_id)

except InvalidObjectError as e:
print(f"Invalid security zone data: {e.message}")
except NameNotUniqueError as e:
print(f"Security zone name already exists: {e.message}")
except ObjectNotPresentError as e:
print(f"Security zone not found: {e.message}")
except ReferenceNotZeroError as e:
print(f"Security zone still in use: {e.message}")
except MissingQueryParameterError as e:
print(f"Missing parameter: {e.message}")

Best Practices

  1. Client Usage
  2. Use the unified client interface (client.security_zone) for streamlined code
  3. Create a single client instance and reuse it across your application
  4. Perform commit operations directly on the client object (client.commit())
  5. For custom max_limit settings, create a dedicated service instance if needed

  6. Security Zone Configuration

  7. Choose appropriate network interface types for your deployment scenario
  8. Use clear and descriptive names for security zones
  9. Configure only one network interface type per zone
  10. Enable user and device identification only when necessary for policy enforcement
  11. Use proper zone protection profiles to secure network segments

  12. Container Management

  13. Always specify exactly one container (folder, snippet, or device)
  14. Use consistent container names across operations
  15. Validate container existence before operations
  16. Group related zones logically

  17. Error Handling

  18. Implement comprehensive error handling for all operations
  19. Check job status after commits
  20. Handle specific exceptions before generic ones
  21. Log error details for troubleshooting

  22. Performance

  23. Use appropriate pagination for list operations
  24. Cache frequently accessed security zones
  25. Implement proper retry mechanisms
  26. Monitor timeout settings

  27. Security

  28. Follow the least privilege principle for zone configurations
  29. Validate input data before operations
  30. Document security implications
  31. Monitor zone usage in security policies

Full Script Examples

Refer to the security_zone.py example.