Set up Zero Touch Provisioning (ZTP) to simplify and streamline initial firewall deployments by automating the new managed firewall on-boarding without the need for network administrators to manually provision the firewall.
ZTP onboarding requires cabling the Eth1/1 interface on the ZTP firewall with an outbound internet connection before the ZTP firewall is powered on. This is required to successfully onboard the ZTP firewall to Panorama management, register your ZTP firewall with the Customer Support Portal (CSP), and push the policy and network configurations from Panorama.
Only Panorama administrators with Superuser privileges can access the ZTP settings required to set up ZTP.
To successfully leverage the ZTP service, on-board your ZTP firewalls with the factory default PAN-OS version before upgrading to PAN-OS 10.0.0 or later release.
The ZTP plugin is supported on PAN-OS 9.1.4 and later releases.
Zero Touch Provisioning (ZTP) is designed to simplify and automate the on-boarding of new firewalls to the Panorama™ management server. ZTP streamlines the initial firewall deployment process by allowing network administrators to ship managed firewalls directly to their branches and automatically add the firewall to the Panorama™ management server after the ZTP firewall successfully connects to the Palo Alto Networks ZTP service. This allows businesses to save on time and resources when deploying new firewalls at branch locations by removing the need for IT administrators to manually provision the new managed firewall. After successful on-boarding, Panorama provides the means to configure and manage your ZTP configuration and firewalls.
The ZTP cloud service supports a direct internet connection to successfully onboard a ZTP firewall to Panorama management. The ZTP cloud service does not support an explicit web proxy and is unable to onboard a ZTP firewall to Panorama management if an explicit web proxy is configured as a gateway to the internet for your ZTP firewalls and Panorama.
Review and subscribe to ZTP Service Status events to be notified about scheduled maintenance windows, outages, and workarounds.
ZTP is supported on the following ZTP firewalls:
Before you begin setting up ZTP on Panorama, review the Firewall Hardware Quick Start and Reference Guides to understand how to correctly install your firewall to successfully leverage ZTP.
This flowchart outlines the main steps performed on Panorama to prepare for ZTP onboarding.
The following elements work together to allow you to quickly on-board newly deployed ZTP firewalls by automatically adding them to the Panorama management server using the ZTP service.
installeradmin
admin role for ZTP firewall on-boarding. This admin user has limited access to the Panorama web interface, only allowing access to enter the ZTP firewall serial number and claim key.
Panorama > Managed Devices > Summary
). If the firewall's current version is lower, it will attempt to upgrade.
Important: Panorama can only manage firewalls running a PAN-OS release equal to or less than the PAN-OS version installed on Panorama.
After you successfully install the ZTP plugin on Panorama and register Panorama with the ZTP service, the ZTP onboarding process continues as follows:
Panorama > Managed Devices
).
This diagram shows the sequence of interactions between the different components during the ZTP onboarding process for a new firewall.
Simplify the on-boarding and management of ZTP firewalls by installing the ZTP plugin on your Panorama management server.
Panorama > Plugins
and search for the
ztp
plugin.
After installing the ZTP plugin, register Panorama with the ZTP service. For new deployments, this process can also automatically generate the initial device group and template needed for ZTP connectivity.
Assets > ZTP Service
and click
Associate Panorama(s)
.
Panorama > Zero Touch Provisioning > Setup
and edit the
General
ZTP settings.
ZTP-Onboarding-DG
).
ZTP-Onboarding-Template
).
Warning: Palo Alto Networks recommends giving the ZTP device group and template descriptive names. Do not modify the core ZTP connectivity settings (Panorama IP, eth1/1 interface, loopback.900, default zones/rules) within this auto-generated template/DG, as it can break future ZTP onboarding.
Important: Moving a ZTP-onboarded firewall to a different device group or template stack *after* onboarding using these auto-generated objects is generally not supported and can cause connectivity issues or config reverts.
Commit
and
Commit to Panorama
.
Panorama > Zero Touch Provisioning > Setup
) and verify that the Panorama Sync Status displays as
In Sync
.
If you already have a suitable device group and template stack configured for ZTP, you can register Panorama without automatically creating new ones.
Assets > ZTP Service
and click
Associate Panorama(s)
or
Modify Association
.
Panorama > Zero Touch Provisioning > Setup
and edit the
General
ZTP settings.
Commit
and
Commit to Panorama
.
The ZTP installer admin user is an administrator account with limited privileges, designed for non-IT staff or installation contractors to register new ZTP firewalls on Panorama using the serial number and claim key.
Panorama > Admin Roles
and verify that the
installeradmin
admin role exists (it's automatically created when the ZTP plugin is installed).
Panorama > Administrators
and click
Add
.
ztp-installer
).
installeradmin
.
Commit
and
Commit to Panorama
.
Log in to Panorama as a Superuser, Panorama admin, or the ZTP installer admin to add a ZTP firewall. This involves entering the serial number and claim key, which registers the firewall with the CSP via Panorama and associates it with your ZTP service instance.
Prerequisites:
Important Notes:
Panorama > Zero Touch Provisioning > Firewall Registration
(or just
Firewall Registration
if logged in as installer).
Panorama > Managed Devices > Summary
and verify the ZTP firewall appears in the list. Check the
To SW Version
column and adjust if necessary to prevent unintended upgrades/downgrades (ZTP requires PAN-OS 10.0.1+, and target version must be <= Panorama version).
Panorama > Device Groups
, select the ZTP device group created earlier, and add the serial number of the new firewall.
Panorama > Templates
, select the ZTP template stack created earlier, and add the serial number of the new firewall.
This step is crucial for the firewall to show as 'Connected' and receive its configuration push.
Panorama > Managed Licenses
or similar path).
Panorama > Device Deployment > Dynamic Updates
).
You can add multiple ZTP firewalls simultaneously by importing a CSV file containing their serial numbers and claim keys.
Prerequisites and Notes: Same as for adding a single firewall (DHCP required, eth1/1 connected, no local commits, no HA support with ZTP enabled, migration not supported).
Panorama > Zero Touch Provisioning > Firewall Registration
(or just
Firewall Registration
).
Panorama > Managed Devices > Summary
and verify all ZTP firewalls appear. Check and adjust
To SW Version
if needed.
Panorama > Device Groups
, select the ZTP device group, and add the serial numbers of the new firewalls.
Panorama > Templates
, select the ZTP template stack, and add the serial numbers of the new firewalls.
Several CLI commands are available on both the firewall and Panorama for ZTP-related tasks and status checks.
Task | Command |
---|---|
Display connection status to ZTP service. |
show system ztp status
|
Display connection status to Panorama. |
show panorama status
|
Display ZTP model & system info. |
show system info
|
Enable ZTP state machine (PA-5400, PA-400 series, PA-1400, PA-3400 only).
Note: Initiates soft factory reset. |
set system ztp enable
|
Disable ZTP state machine (PA-220-ZTP, PA-8xx-ZTP, PA-32xx-ZTP).
Note: Initiates soft factory reset. Cannot be re-enabled via CLI; requires full factory reset. |
request disable-ztp
|
Disable ZTP state machine (PA-5400, PA-400 series, PA-1400, PA-3400 only).
Note: Initiates soft factory reset. |
set system ztp disable
|
Task | Command |
---|---|
Create ZTP device group & template. |
request plugins ztp create dgroup-template device-group
|
Add a single ZTP firewall for registration. |
request plugins ztp firewall-add
|
Modify details of an added firewall (before registration). |
request plugins ztp firewall-add-modify firewall
|
Delete a firewall from the registration list. |
request plugins ztp firewall-delete firewall
|
Re-enter info for a firewall that failed registration. |
request plugins ztp firewall-re-enter-info firewall
|
Register Panorama with ZTP service (part of initial setup). |
request plugins ztp panorama-registration
|
Register a specific firewall with ZTP service. |
request plugins ztp firewall-registration firewall
|
Retry registration for a firewall that failed. |
request plugins ztp firewall-register-retry firewall
|
Import multiple firewalls from CSV. |
request plugins ztp ztp-add-import import-path
|
Retrieve list of registered firewalls from ZTP service. |
request plugins ztp ztp-service-info
|
Show list of firewalls added but pending registration. |
show plugins ztp device-add-list
|
Show registration status of firewalls. |
show plugins ztp device-reg-status
|
Show ZTP service sync status. |
request plugins ztp ztp-sync-status
|
Tail management server log (for troubleshooting ZTP connectivity). |
tail follow yes mp-log ms.log
|
Follow these steps to remove the ZTP configuration and uninstall the plugin from Panorama. Repeat on HA peers if applicable.
Panorama > Administrators
, select the ZTP installer account, and click
Delete
.
Panorama > Admin Roles
, select the
installeradmin
role, and click
Delete
.
Panorama > Plugins
.