Palo Alto Networks Zero Touch Provisioning (ZTP)

🔧 What is ZTP?

Zero Touch Provisioning (ZTP) is a provisioning mechanism that allows unconfigured devices to automatically load deployment files upon power-on, including system software, patch, and configuration files. This eliminates the need for onsite, manual configuration and deployment, reducing labor costs and improving deployment efficiency.

⚙️ How ZTP Works on Palo Alto Networks Appliances

  1. Upon powering on, a device with ZTP capability executes a boot file that configures the device's parameters.
  2. The device requests an IP address from a DHCP server.
  3. It receives additional network configuration information such as the location of a TFTP server, gateway address, and domain name.
  4. The device uses this information to connect to a file server or cloud service to retrieve the latest OS image and configuration files.
  5. The ZTP server authenticates the device, allowing it to download and install the necessary files.

Set Up Zero Touch Provisioning

✅ Benefits of ZTP

⚠️ Caveats and Considerations

About ZTP

🛠️ Administrator Steps for Zero Touch Provisioning (ZTP)

To successfully implement ZTP for Palo Alto Networks firewalls, administrators should follow these steps:

  1. Install the ZTP Plugin on Panorama:
    • Ensure Panorama is running a compatible PAN-OS version.
    • Navigate to Panorama > Plugins and install the latest ZTP plugin.
  2. Register Panorama with the ZTP Service:
    • In Panorama, go to Panorama > ZTP > Setup .
    • Enter the required information, including the Panorama FQDN or public IP address.
    • Note: Panorama must be accessible from the internet on specific ports (e.g., TCP 3978 and 28443).
  3. Configure the ZTP Installer Administrator Account:
    • Set up an administrator account with the necessary privileges to manage ZTP operations.
  4. Add ZTP Firewalls to Panorama:
    • Obtain the serial number and claim key for each firewall.
    • In Panorama, navigate to Panorama > ZTP > Devices and add the firewall details.
  5. Assign Device Groups and Templates:
    • Create or select appropriate device groups and templates that contain the desired configuration.
    • Associate these with the ZTP firewalls to ensure consistent policy deployment.
  6. Ship and Power On the Firewalls:
    • Send the firewalls to their deployment locations.
    • Upon powering on and connecting to the network, the firewalls will reach out to the ZTP service, authenticate, and retrieve their configurations from Panorama.

For detailed guidance, refer to the official documentation:

🔑 Understanding the Claim Key in Zero Touch Provisioning (ZTP)

The Claim Key is an essential component in Palo Alto Networks' Zero Touch Provisioning (ZTP) process. It is an 8-digit numeric code that uniquely identifies a ZTP-capable firewall and is required to register the device with Panorama or Strata Cloud Manager.

📍 Locating the Claim Key

📝 Using the Claim Key

  1. Registering the Firewall: During the ZTP process, administrators must enter the firewall's serial number and claim key into Panorama or Strata Cloud Manager to register the device.
  2. Onboarding: Once registered, the firewall can be onboarded automatically, receiving its configuration and policies from Panorama without manual intervention.

⚠️ Important Considerations

For detailed guidance on adding a ZTP firewall to Panorama, refer to the official documentation: Add a ZTP Firewall to Panorama

📈 ZTP Provisioning Process – Mermaid Sequence Diagram

This sequence diagram illustrates the Zero Touch Provisioning (ZTP) process for Palo Alto Networks firewalls, detailing the interactions between the firewall, DHCP server, ZTP service, and Panorama:

sequenceDiagram participant Admin as Admin participant Panorama as Panorama participant ZTPService as ZTP Service participant DHCP as DHCP Server participant Firewall as Firewall Admin->>Panorama: Register Panorama with ZTP Service Admin->>Panorama: Add firewall serial number and claim key Note over Admin,Panorama: Pre-shipment configuration Firewall->>DHCP: Request IP via DHCP DHCP-->>Firewall: Assign IP and provide network config Firewall->>ZTPService: Connect using claim key ZTPService-->>Firewall: Authenticate and provide Panorama info Firewall->>Panorama: Connect to Panorama Panorama-->>Firewall: Push configuration and policies Firewall-->>Panorama: Registration complete

📝 PCNSE Practice Questions: Zero Touch Provisioning (ZTP)

  1. Question: Which action disables Zero Touch Provisioning (ZTP) functionality on a ZTP firewall during the onboarding process?
    A. Removing the Panorama serial number from the ZTP service
    B. Performing a factory reset of the firewall
    C. Performing a local firewall commit
    D. Removing the firewall as a managed device in Panorama
    Correct Answer: C
    Explanation: Performing a local commit on the ZTP firewall disables ZTP functionality and results in the failure to successfully add the firewall to Panorama.
  2. Question: What is the primary purpose of the claim key in the ZTP process?
    A. To authenticate the firewall to the ZTP service
    B. To assign a static IP address to the firewall
    C. To encrypt the configuration file
    D. To reset the firewall to factory defaults
    Correct Answer: A
  3. Question: Where can an administrator locate the claim key required for ZTP onboarding?
    A. In the firewall's web interface under Device Settings
    B. On a sticker attached to the firewall or its packaging
    C. In the Panorama device group configuration
    D. In the system logs after initial boot
    Correct Answer: B
  4. Question: Which Palo Alto Networks firewall model supports Zero Touch Provisioning (ZTP)?
    A. PA-220
    B. PA-440
    C. PA-850
    D. PA-3200 Series
    Correct Answer: B
    Explanation: The PA-440 hardware platform supports Zero Touch Provisioning to assist in automated deployments.
  5. Question: During ZTP onboarding, which network service must be available to the firewall for successful provisioning?
    A. FTP
    B. DHCP
    C. SMTP
    D. SNMP
    Correct Answer: B

📚 References