Table of Contents

Introduction to Zero Touch Provisioning

Set up Zero Touch Provisioning (ZTP) to simplify and streamline initial firewall deployments by automating the new managed firewall on-boarding without the need for network administrators to manually provision the firewall.

ZTP onboarding requires cabling the Eth1/1 interface on the ZTP firewall with an outbound internet connection before the ZTP firewall is powered on. This is required to successfully onboard the ZTP firewall to Panorama management, register your ZTP firewall with the Customer Support Portal (CSP), and push the policy and network configurations from Panorama.

Only Panorama administrators with Superuser privileges can access the ZTP settings required to set up ZTP.

To successfully leverage the ZTP service, on-board your ZTP firewalls with the factory default PAN-OS version before upgrading to PAN-OS 10.0.0 or later release.

The ZTP plugin is supported on PAN-OS 9.1.4 and later releases.

Zero Touch Provisioning (ZTP) is designed to simplify and automate the on-boarding of new firewalls to the Panorama™ management server. ZTP streamlines the initial firewall deployment process by allowing network administrators to ship managed firewalls directly to their branches and automatically add the firewall to the Panorama™ management server after the ZTP firewall successfully connects to the Palo Alto Networks ZTP service. This allows businesses to save on time and resources when deploying new firewalls at branch locations by removing the need for IT administrators to manually provision the new managed firewall. After successful on-boarding, Panorama provides the means to configure and manage your ZTP configuration and firewalls.

The ZTP cloud service supports a direct internet connection to successfully onboard a ZTP firewall to Panorama management. The ZTP cloud service does not support an explicit web proxy and is unable to onboard a ZTP firewall to Panorama management if an explicit web proxy is configured as a gateway to the internet for your ZTP firewalls and Panorama.

Review and subscribe to ZTP Service Status events to be notified about scheduled maintenance windows, outages, and workarounds.

ZTP is supported on the following ZTP firewalls:

Before you begin setting up ZTP on Panorama, review the Firewall Hardware Quick Start and Reference Guides to understand how to correctly install your firewall to successfully leverage ZTP.

ZTP Setup Flowchart (Panorama Side)

graph TD A[Start: Prepare Panorama] --> B(Install Panorama Device Cert); B --> C{Install ZTP Plugin?}; C -- Yes --> D[Install/Update ZTP Plugin]; C -- No --> E[Verify ZTP Plugin Installed]; D --> F; E --> F; F(Register/Associate Panorama in CSP); F --> G(Configure ZTP Settings in Panorama
- Enable Service
- Set Panorama IP/FQDN); G --> H{Create New DG/Template?}; H -- Yes --> I[Add ZTP Device Group & Template]; H -- No --> J[Ensure Existing DG/Template are Ready]; I --> K; J --> K; K(Configure Installer Admin Account); K --> L(Commit to Panorama); L --> M(Sync to ZTP Service); M --> N[Ready to Add Firewalls];

This flowchart outlines the main steps performed on Panorama to prepare for ZTP onboarding.

ZTP Configuration Elements

The following elements work together to allow you to quickly on-board newly deployed ZTP firewalls by automatically adding them to the Panorama management server using the ZTP service.

Important: Panorama can only manage firewalls running a PAN-OS release equal to or less than the PAN-OS version installed on Panorama.

After you successfully install the ZTP plugin on Panorama and register Panorama with the ZTP service, the ZTP onboarding process continues as follows:

  1. An Installer or IT administrator registers ZTP firewalls by adding them to Panorama using the firewall serial number and claim key.
  2. Panorama registers the firewalls with the CSP. After the firewalls are successfully registered, the firewall is associated with the same ZTP tenant as the Panorama in the ZTP service. ZTP firewalls successfully registered are automatically added as managed devices on Panorama ( Panorama > Managed Devices ).
  3. When the firewall connects to the Internet (via DHCP on eth1/1), it requests a device certificate from the CSP in order to connect to the ZTP service.
  4. The ZTP service pushes the configured Panorama IP or FQDN to the ZTP firewalls.
  5. The ZTP firewalls connect to Panorama, and the assigned device group and template configurations are pushed from Panorama to the ZTP firewalls.
Diagram illustrating ZTP workflow: Installer adds SN/Claim Key to Panorama, Panorama registers with CSP, Firewall powers on, gets DHCP, connects to ZTP service via CSP, ZTP service provides Panorama IP, Firewall connects to Panorama, Panorama pushes config.

ZTP Onboarding Sequence Diagram

sequenceDiagram participant Installer participant Panorama participant CSP as Customer Support Portal participant Firewall participant ZTPService as ZTP Cloud Service participant DHCP Installer->>Panorama: Add Firewall SN & Claim Key Panorama->>CSP: Register Firewall (via ZTP Plugin) CSP-->>Panorama: Registration Status Panorama->>Installer: Show Registration Status Note over Firewall, DHCP: Firewall Powers On & Connects Eth1/1 Firewall->>DHCP: DHCP Request DHCP-->>Firewall: Provide IP, Gateway, DNS Firewall->>CSP: Request Device Certificate CSP-->>Firewall: Provide Device Certificate Firewall->>ZTPService: Connect using Device Cert (Identify Self) ZTPService->>CSP: Verify Firewall Association CSP-->>ZTPService: Confirm Association (to Panorama Tenant) ZTPService-->>Firewall: Provide Panorama IP/FQDN Firewall->>Panorama: Initiate Connection Panorama-->>Firewall: Acknowledge Connection Note over Panorama, Firewall: Firewall appears as 'Connected' Panorama->>Firewall: Push Config (Device Group/Template) Firewall-->>Panorama: Apply Config & Confirm Status

This diagram shows the sequence of interactions between the different components during the ZTP onboarding process for a new firewall.

Install the ZTP Plugin on Panorama

Simplify the on-boarding and management of ZTP firewalls by installing the ZTP plugin on your Panorama management server.

  1. Install the Panorama Device Certificate (a prerequisite for many cloud service interactions).
  2. Log in to the Panorama web interface as a superuser or Panorama administrator with access to plugins.
  3. Navigate to Panorama > Plugins and search for the ztp plugin.
  4. Download and then Install the most recent version of the ZTP plugin.

Register Panorama with the ZTP Service for New Deployments

After installing the ZTP plugin, register Panorama with the ZTP service. For new deployments, this process can also automatically generate the initial device group and template needed for ZTP connectivity.

  1. Install the Panorama Device Certificate.
  2. Log in to the Palo Alto Networks Customer Support Portal (CSP).
  3. Associate your Panorama with the ZTP Service on the CSP:
    1. Select Assets > ZTP Service and click Associate Panorama(s) .
    2. Select the serial number of the Panorama managing your ZTP firewalls.
    3. ( HA only ) Select the serial number of the Panorama HA peer. (Max 2 Panoramas, must be HA pair).
    4. Click OK .
  4. Log in to the Panorama Web Interface.
  5. Navigate to Panorama > Zero Touch Provisioning > Setup and edit the General ZTP settings.
  6. Register Panorama with the ZTP service:
    1. Check Enable ZTP Service .
    2. Enter the Panorama FQDN or IP Address . This is the address the ZTP service will provide to firewalls. Use the public-facing address.
      Note: For firewalls on PAN-OS 10.1.4 and earlier, using the IP address is recommended to avoid potential disconnects after reboots/upgrades. If using FQDN, configure a static service route.
    3. ( HA only ) Enter the Peer FQDN or IP Address .
    4. Click OK .
    Screenshot of Panorama ZTP Setup General tab showing Enable ZTP Service checkbox, Panorama FQDN/IP field, and Peer FQDN/IP field.
  7. Create the default device group and template to automatically generate the required connectivity configuration:
    1. Click Add Device Group and Template .
    2. Enter a descriptive Device Group name (e.g., ZTP-Onboarding-DG ).
    3. Enter a descriptive Template name (e.g., ZTP-Onboarding-Template ).
    4. Click OK .
    Screenshot of Panorama 'Add Device Group and Template for ZTP' dialog box with fields for Device Group Name and Template Name.

    Warning: Palo Alto Networks recommends giving the ZTP device group and template descriptive names. Do not modify the core ZTP connectivity settings (Panorama IP, eth1/1 interface, loopback.900, default zones/rules) within this auto-generated template/DG, as it can break future ZTP onboarding.

  8. Modify the ZTP device group, templates, and template stack as needed for your policies, but preserve the core ZTP connectivity configuration generated in the previous step. Ensure the ZTP-specific template has priority if stacked with others.

    Important: Moving a ZTP-onboarded firewall to a different device group or template stack *after* onboarding using these auto-generated objects is generally not supported and can cause connectivity issues or config reverts.

  9. Select Commit and Commit to Panorama .
  10. Click Sync to ZTP Service (in Panorama > Zero Touch Provisioning > Setup ) and verify that the Panorama Sync Status displays as In Sync .
  11. Screenshot of Panorama ZTP Setup page showing the 'Sync to ZTP Service' button and 'Panorama Sync Status: In Sync'.
  12. Proceed to Add ZTP Firewalls to Panorama.

Register Panorama with the ZTP Service for Existing Deployments

If you already have a suitable device group and template stack configured for ZTP, you can register Panorama without automatically creating new ones.

  1. Install the Panorama Device Certificate.
  2. Log in to the Palo Alto Networks Customer Support Portal (CSP).
  3. Associate your Panorama with the ZTP Service on the CSP (or modify association if needed):
    1. Select Assets > ZTP Service and click Associate Panorama(s) or Modify Association .
    2. Select the serial number(s) of the Panorama (and HA peer if applicable).
    3. Click OK .
  4. Log in to the Panorama Web Interface.
  5. Navigate to Panorama > Zero Touch Provisioning > Setup and edit the General ZTP settings.
  6. Register Panorama with the ZTP service:
    1. Check Enable ZTP Service .
    2. Enter the Panorama FQDN or IP Address (publicly reachable).
    3. ( HA only ) Enter the Peer FQDN or IP Address .
    4. Click OK .
    Screenshot of Panorama ZTP Setup General tab showing Enable ZTP Service checkbox, Panorama FQDN/IP field, and Peer FQDN/IP field.
  7. Ensure your existing ZTP device group and template stack contain the necessary configuration for firewall connectivity (eth1/1 config, Panorama address, required security/NAT rules, etc.).
  8. Select Commit and Commit to Panorama .
  9. Click Sync to ZTP Service and verify the status is In Sync .
  10. Screenshot of Panorama ZTP Setup page showing the 'Sync to ZTP Service' button and 'Panorama Sync Status: In Sync'.
  11. Proceed to Add ZTP Firewalls to Panorama, ensuring you assign them to your pre-existing ZTP device group and template stack.

Configure the ZTP Installer Administrator Account

The ZTP installer admin user is an administrator account with limited privileges, designed for non-IT staff or installation contractors to register new ZTP firewalls on Panorama using the serial number and claim key.

  1. Log in to the Panorama Web Interface.
  2. Navigate to Panorama > Admin Roles and verify that the installeradmin admin role exists (it's automatically created when the ZTP plugin is installed).
  3. Screenshot showing the 'installeradmin' role listed under Panorama > Admin Roles.
  4. Configure the ZTP installer administrator user:
    1. Select Panorama > Administrators and click Add .
    2. Enter a descriptive Name (e.g., ztp-installer ).
    3. Enter and confirm a secure Password .
    4. For the Administrator Type , select Custom Panorama Admin .
    5. For the Profile , select installeradmin .
    6. Click OK .
    Screenshot of Panorama 'Add Administrator' dialog showing Name, Password, Administrator Type set to 'Custom Panorama Admin', and Profile set to 'installeradmin'.
  5. Select Commit and Commit to Panorama .

Add a ZTP Firewall to Panorama

Log in to Panorama as a Superuser, Panorama admin, or the ZTP installer admin to add a ZTP firewall. This involves entering the serial number and claim key, which registers the firewall with the CSP via Panorama and associates it with your ZTP service instance.

Prerequisites:

Important Notes:

  1. Log in to the Panorama Web Interface (Superuser, Admin, or Installer role).
  2. Add the ZTP firewall details:
    1. Navigate to Panorama > Zero Touch Provisioning > Firewall Registration (or just Firewall Registration if logged in as installer).
    2. Click Add .
    3. Enter the Serial Number of the ZTP firewall.
    4. Enter the Claim Key (8-digit numeric key found on the firewall label).
    5. Image of a sample ZTP firewall claim key label showing an 8-digit number.
    6. Click OK .
    Screenshot showing the ZTP Firewall Registration page in Panorama with 'Add' button and fields for Serial Number and Claim Key.
  3. Register the ZTP firewall with the CSP via Panorama:
    1. Select the newly added ZTP firewall in the list.
    2. Click Register .
    3. When prompted, click Yes to confirm.
  4. Verify successful registration:
    1. Click Registration Status and verify the status shows success for the firewall.
    2. Screenshot showing the Registration Status dialog with firewall serial number and successful registration status.
    3. (Log in as Superuser/Admin) Navigate to Panorama > Managed Devices > Summary and verify the ZTP firewall appears in the list. Check the To SW Version column and adjust if necessary to prevent unintended upgrades/downgrades (ZTP requires PAN-OS 10.0.1+, and target version must be <= Panorama version).
      Note: Upgrading ZTP firewalls from PAN-OS 10.2 to 11.1+ using the 'To SW Version' field may cause issues due to intermediate base versions. Manual upgrades are recommended after initial onboarding in such cases.
  5. Assign the ZTP firewall to the appropriate Device Group and Template Stack:
    1. (Log in as Superuser/Admin) Go to Panorama > Device Groups , select the ZTP device group created earlier, and add the serial number of the new firewall.
    2. Go to Panorama > Templates , select the ZTP template stack created earlier, and add the serial number of the new firewall.

    This step is crucial for the firewall to show as 'Connected' and receive its configuration push.

  6. Complete the firewall setup:
    1. Log in locally to the firewall web interface and activate the Support license.
    2. Log back into Panorama and activate any additional licenses for the firewall ( Panorama > Managed Licenses or similar path).
    3. Install the latest dynamic content updates on the managed firewall via Panorama ( Panorama > Device Deployment > Dynamic Updates ).
    4. (Optional) Upgrade the firewall PAN-OS version via Panorama if needed.

Import Multiple ZTP Firewalls to Panorama

You can add multiple ZTP firewalls simultaneously by importing a CSV file containing their serial numbers and claim keys.

Prerequisites and Notes: Same as for adding a single firewall (DHCP required, eth1/1 connected, no local commits, no HA support with ZTP enabled, migration not supported).

  1. Gather the serial numbers and claim keys for all ZTP firewalls. Image of a sample ZTP firewall claim key label showing an 8-digit number.
  2. Create a CSV file. The first column must contain the serial numbers, and the second column must contain the corresponding claim keys (no header row needed). Example CSV file format showing two columns: Serial Number and Claim Key, with sample data.
  3. Import the ZTP firewalls into Panorama:
    1. Log in to the Panorama Web Interface (Superuser, Admin, or Installer role).
    2. Navigate to Panorama > Zero Touch Provisioning > Firewall Registration (or just Firewall Registration ).
    3. Click Import .
    4. Browse and select the CSV file you created, then click OK .
  4. Register the imported ZTP firewalls:
    1. Select all the newly imported firewalls in the list.
    2. Click Register .
    3. When prompted, click Yes to confirm.
  5. Verify successful registration:
    1. Click Registration Status and check the status for all imported firewalls.
    2. (Log in as Superuser/Admin) Navigate to Panorama > Managed Devices > Summary and verify all ZTP firewalls appear. Check and adjust To SW Version if needed.
  6. Assign the ZTP firewalls to the Device Group and Template Stack:
    1. (Log in as Superuser/Admin) Go to Panorama > Device Groups , select the ZTP device group, and add the serial numbers of the new firewalls.
    2. Go to Panorama > Templates , select the ZTP template stack, and add the serial numbers of the new firewalls.
  7. Complete the setup for the newly onboarded firewalls:
    1. Log in locally to each firewall web interface and activate its Support license.
    2. Log back into Panorama and activate any additional licenses for the firewalls.
    3. Install the latest dynamic content updates on the managed firewalls via Panorama.
    4. (Optional) Upgrade the firewalls' PAN-OS versions via Panorama if needed.

Use the CLI for ZTP Tasks

Several CLI commands are available on both the firewall and Panorama for ZTP-related tasks and status checks.

Firewall CLI Commands

Task Command
Display connection status to ZTP service. show system ztp status
Display connection status to Panorama. show panorama status
Display ZTP model & system info. show system info
Enable ZTP state machine (PA-5400, PA-400 series, PA-1400, PA-3400 only).
Note: Initiates soft factory reset.
set system ztp enable
Disable ZTP state machine (PA-220-ZTP, PA-8xx-ZTP, PA-32xx-ZTP).
Note: Initiates soft factory reset. Cannot be re-enabled via CLI; requires full factory reset.
request disable-ztp
Disable ZTP state machine (PA-5400, PA-400 series, PA-1400, PA-3400 only).
Note: Initiates soft factory reset.
set system ztp disable

Panorama CLI Commands (via ZTP Plugin)

Task Command
Create ZTP device group & template. request plugins ztp create dgroup-template device-group template
Add a single ZTP firewall for registration. request plugins ztp firewall-add claim-key
Modify details of an added firewall (before registration). request plugins ztp firewall-add-modify firewall claim-key new-serial
Delete a firewall from the registration list. request plugins ztp firewall-delete firewall
Re-enter info for a firewall that failed registration. request plugins ztp firewall-re-enter-info firewall claim-key
Register Panorama with ZTP service (part of initial setup). request plugins ztp panorama-registration
Register a specific firewall with ZTP service. request plugins ztp firewall-registration firewall claim-key
Retry registration for a firewall that failed. request plugins ztp firewall-register-retry firewall claim-key
Import multiple firewalls from CSV. request plugins ztp ztp-add-import import-path
Retrieve list of registered firewalls from ZTP service. request plugins ztp ztp-service-info
Show list of firewalls added but pending registration. show plugins ztp device-add-list
Show registration status of firewalls. show plugins ztp device-reg-status
Show ZTP service sync status. request plugins ztp ztp-sync-status
Tail management server log (for troubleshooting ZTP connectivity). tail follow yes mp-log ms.log

Uninstall the ZTP Plugin

Follow these steps to remove the ZTP configuration and uninstall the plugin from Panorama. Repeat on HA peers if applicable.

  1. Log in to the Panorama Web Interface.
  2. Delete the ZTP installer administrator account:
    1. Go to Panorama > Administrators , select the ZTP installer account, and click Delete .
    2. Go to Panorama > Admin Roles , select the installeradmin role, and click Delete .
    3. Commit to Panorama .
  3. Uninstall the ZTP plugin:
    1. Go to Panorama > Plugins .
    2. Find the ZTP plugin and click Remove Config in the Actions column. Confirm when prompted.
    3. Commit to Panorama .
    4. Find the ZTP plugin again and click Uninstall . Confirm when prompted.

?? Interactive ZTP Quiz

1. Which firewall interface MUST be connected to the internet via DHCP for ZTP onboarding to succeed?

2. What is the primary role of the 'installeradmin' account in Panorama for ZTP?

3. Where does a ZTP firewall initially obtain the IP address or FQDN of its managing Panorama?

4. What action should you AVOID performing on a ZTP firewall before it has successfully connected to Panorama?

5. What is the purpose of the 8-digit 'Claim Key' found on a ZTP firewall?

6. Can ZTP-onboarded firewalls be configured in High Availability (HA)?

7. Which Panorama CLI command is used to add a single ZTP firewall for registration?

8. What is required for Panorama to communicate with the ZTP service and CSP?

9. If you choose "Add Device Group and Template" during ZTP setup in Panorama, what is automatically configured?

10. What minimum PAN-OS version is generally required on a firewall for ZTP functionality?