Panorama Overview

The Panorama™ management server provides centralized monitoring and management of multiple Palo Alto Networks next-generation firewalls and of WildFire appliances and appliance clusters. It provides a single location from which you can oversee all applications, users, and content traversing your network, and then use this knowledge to create application enablement policies that protect and control the network. Using Panorama for centralized policy and firewall management increases operational efficiency in managing and maintaining a distributed network of firewalls. Using Panorama for centralized WildFire appliance and WildFire appliance cluster management increases the number of firewalls a single network supports, provides high availability for fault tolerance, and increases management efficiency.

About Panorama

Panorama enables you to effectively configure, manage, and monitor your Palo Alto Networks firewalls with central oversight. The three main areas in which Panorama adds value are:

Six Panorama Models are available: the Panorama virtual appliance, M-600 appliance, M-500 appliance, and M-200 appliance are supported in PAN-OS 10.0 and later releases. The M-300 appliance and M-700 appliance are supported in PAN-OS 10.2 and later releases. Panorama Centralized Management illustrates how you can deploy Panorama in a high availability (HA) configuration to manage firewalls.

Panorama Centralized Management Diagram
Figure 1: Panorama Centralized Management

Panorama Models

Panorama is available as one of the following virtual or physical appliances, each of which supports licenses for managing up to 25, 100, or 1,000 firewalls. Additionally, M-600 and M-700 appliances support licenses for managing up to 5,000 firewalls and similarly resourced Panorama virtual appliances support licenses for managing up to 2,500 firewalls:

Understanding the different Panorama modes (Panorama, Management Only, Log Collector, Legacy) and their capabilities, especially regarding log collection and device management capacity, is crucial for the PCNSE exam. Note the specific capabilities of M-Series vs. Virtual Appliances.

Plan Your Panorama Deployment

Centralized Firewall Configuration and Update Management

Panorama™ uses device groups and templates to group firewalls into logical sets that require similar configuration. You use device groups and templates to centrally manage all configuration elements, policies, and objects on the managed firewalls. Panorama also enables you to centrally manage licenses, software (PAN-OS® software, SSL-VPN client software, GlobalProtect™ agent/ app software), and content updates (Applications, Threats, WildFire®, and Antivirus). All device group, template, and template stack configuration objects are required to have a unique name.

In the event an unforeseen restart of your managed firewall or Panorama occurs, all uncommitted configuration changes in your device groups and templates are preserved locally until you successfully commit the changes. For firewalls or Panorama in a high availability (HA) configuration, the uncommitted configuration changes do not automatically sync across the HA peers in the event of an unforeseen restart.

Context Switch—Firewall or Panorama

The Panorama™ web interface enables you to toggle between a Panorama-centric view and a firewall-centric view using the Context drop-down. Set the Context to Panorama to manage firewalls centrally or switch context to the web interface of a specific firewall to configure it locally. The similarity of the Panorama and firewall web interfaces enables you to seamlessly move between them.

For firewalls in an HA configuration, icons indicate the HA state (Green: Active, Yellow: Passive/Initiating, Red: Non-functional/Suspended/Tentative).

A Device Group and Template admin requires a Device Admin Role pushed to managed firewalls to enable context switching. Panorama validates vsys access for the admin during context switch.

Total Configuration Size for Panorama

Exceeding the supported total configuration file size of the Panorama management server results in reduced performance. The Panorama management server in Panorama mode supports a total configuration file size of 80MB for all template, device group, and Panorama-specific configurations. The maximum configuration file size supported by Panorama in Management Only mode depends on the Panorama model or resources allocated.

Panorama Model Virtual Resources Required Maximum Configuration File Size in Management Only Mode Maximum Configuration File Size in Panorama Mode
M-200 N/A 120 MB 80 MB
M-300 150 MB
M-500 120 MB
M-600 150 MB
M-700 180 MB
Panorama Virtual Appliance
  • 16 vCPU
  • 128GB memory
120 MB
  • 56 vCPU
  • 256GB memory
150 MB

Templates and Template Stacks

Templates and template stacks configure settings under the Network and Device tabs on Panorama™. Templates define interface/zone configs, server profiles, VPNs, etc. Template stacks layer multiple templates for a combined configuration, simplifying management by defining a common base and layering specific settings. Templates are evaluated top-to-bottom in a stack, with higher templates having priority.

Template Stacks Diagram
Figure 2: Template Stacks

Both support variables for placeholders (IPs, Group IDs, interfaces). Template variables are inherited by template stacks and can be overridden. Firewalls can also override pushed settings locally.

Templates or template stacks cannot set firewall modes (VPN, multi-vsys, operational modes like FIPS-CC). However, firewalls with non-matching modes can be assigned to the same template/stack; Panorama pushes mode-specific settings only to supportive firewalls.

Device Groups

Device groups logically unitize firewalls based on network segmentation, location, function, etc., for similar policy configurations. They are used to configure policy rules and referenced objects.

Device Group Hierarchy, Policies, and Objects

Device Group Hierarchy

You can create a device group hierarchy up to four levels. Lower-level groups inherit settings (policy rules and objects) from higher-level groups (ancestors). All device groups inherit from the Shared location at the top. This allows organizing firewalls based on common policy requirements without redundant configuration.

Device Group Hierarchy Diagram
Figure 3: Device Group Hierarchy

In a multiple Panorama plugin deployment, a device group with firewalls in one hypervisor cannot be a child/parent of a device group with firewalls in a different hypervisor.

Device Group Hierarchy with Plugin Constraint Example

Device Group Policies

A firewall evaluates policy rules by layer (shared, device group, local) and type (pre-rules, post-rules, default rules) in a specific order. The first matching rule's action is taken. Panorama-inherited rules are shaded orange on the firewall.

Policy Rule Evaluation Order
Policy Evaluation Order (CRITICAL for PCNSE):
  1. Shared pre-rules
  2. Device group pre-rules (highest to lowest ancestor)
  3. Local firewall rules
  4. Device group post-rules (lowest to highest ancestor)
  5. Shared post-rules
  6. Default rules (intrazone-default, interzone-default)
Evaluation Order Rule Scope and Description Administration Device
Shared pre-rules
Device group pre-rules
Shared pre-rules push to all firewalls. Device group-specific pre-rules push to firewalls in that group and descendants. Evaluated highest to lowest level (Shared first). Used for acceptable use policies (e.g., block URL categories, allow DNS). Visible on firewalls, managed in Panorama.
Local firewall rules Specific to a single firewall or vsys.
Device group post-rules
Shared post-rules
Shared post-rules push to all. Device group-specific post-rules push to that group and descendants. Evaluated lowest to highest level (descendants first, Shared last). Typically include rules to deny based on App-ID™, User-ID™, or service. Visible on firewalls, managed in Panorama.
intrazone-default
interzone-default
Apply to Security rulebase. Intrazone-default allows traffic within a zone. Interzone-default denies traffic between zones. Overridden settings at firewall level take precedence over device group, which takes precedence over Shared. Default rules can be overridden for tags, action, logging, security profiles at Panorama (Shared/DG) or Firewall level.

Device Group Objects

Objects (IPs, URL categories, security profiles, users, services, applications) are referenced by policy rules. Shared objects are available to all rules in the hierarchy. Device group objects are available to rules in that DG and its descendants. Inherited object values can be overridden.

Object Management:
  • Pushing unused objects: By default, Panorama pushes all objects. Can be configured to push only referenced objects.
  • Precedence of ancestor/descendant objects: By default, descendant object values take precedence. Can be reversed to push values from Shared or highest ancestor.

Panorama Commit, Validation, and Preview Operations

When ready to activate changes (candidate configuration) on Panorama or push to managed devices, you can Preview, Validate, or Commit Configuration Changes. Changes must be committed to Panorama before they can be pushed to devices. Panorama queues commit requests and prioritizes auto-commits (e.g., FQDN refreshes).

Validation checks for errors or warnings before committing, allowing fixes beforehand. A commit preview shows what changes will be activated.

Automated commit recovery is enabled by default. Managed firewalls test configurations pushed from Panorama. If a commit breaks connectivity, the firewall reverts to the previous running configuration, and its status in Panorama becomes "out of sync".
Panorama pushes its running configuration to managed firewalls. Therefore, changes must first be committed to Panorama before they can be pushed.

Use the Panorama Task Manager (icon) to view, cancel, or see details of commits.

Panorama Commit and Push Process

Centralized Logging and Reporting

Panorama aggregates logs from managed firewalls, providing visibility across network traffic. It also audits policy modifications and configuration changes. Panorama can forward logs as SNMP traps, email, syslog, or HTTP payloads.

The cloud-based Strata Logging Service is an option for log collection, working with Panorama to augment or scale logging infrastructure.

The Application Command Center (ACC) on Panorama offers unified reporting and allows analysis of traffic and security incidents. Panorama can query logs from Strata Logging Service, its local/managed Log Collectors, or directly from managed firewalls.

Managed Collectors and Collector Groups

Panorama uses Log Collectors to aggregate logs.

A Collector Group is 1 to 16 managed collectors acting as a single logical unit. Panorama distributes logs uniformly across disks and collectors in a group. A Log Collector must be in a Collector Group to receive logs.

Local and Distributed Log Collection

A local Log Collector is easy to deploy. Dedicated Log Collectors allow Panorama to use more resources for management, provide high-volume storage, higher logging rates, scalability, and can help meet regional regulatory requirements.

Distributed Log Collection Diagram
Figure 4: Distributed Log Collection
Panorama management server can be in an HA configuration, but Dedicated Log Collectors cannot.

Caveats for a Collector Group with Multiple Log Collectors

A Collector Group with multiple Log Collectors (up to 16) ensures redundancy, increases retention, and handles high logging rates. All Log Collectors in a group must be the same Panorama model.

Typical Log Collector Group Setup
Figure 5: Example - Typical Log Collector Group Setup

Log distribution uses a hash algorithm. Even with a preference list, Panorama might choose a different collector in the list to own and write logs.

Log Collector Failure Example
Figure 6: Example - When a Log Collector Fails
Palo Alto Networks recommends adding at least three Log Collectors to a Collector Group to avoid split brain and log ingestion issues if one goes down. Two Log Collectors are supported, but the group becomes non-operational if one fails.

Mitigations for multiple Log Collectors:

Log Forwarding Options

Firewalls store logs locally by default. For centralized monitoring, configure log forwarding to Panorama (Log Collector or Strata Logging Service, or both). Logs can also go to external services (syslog, email, SNMP, HTTP) directly from firewalls or from Panorama.

• Forward logs from firewalls to Panorama and from Panorama to external services: Good for insufficient bandwidth between firewalls and external services.

• Forward logs from firewalls to Panorama and to external services in parallel: Good if bandwidth between firewalls and external services is sufficient.

Log Forwarding to Panorama and External in Parallel
Figure 8: Log Forwarding to External Services and Panorama in Parallel

Centralized Reporting

Panorama aggregates logs for a global view. The ACC displays traffic as soon as firewalls are added. Panorama uses its local database (including managed Log Collectors) and remote firewalls for report generation. It summarizes information from firewalls at 15-minute intervals. Over 40 predefined reports are available, customizable, and can be scheduled.

Simplified Log Collection and Reporting Flow

Security, Setup & Exam Focus

Data Redistribution Using Panorama

Data redistribution allows configuring a source once and redistributing multiple data types (e.g., User-ID mappings, authentication timestamps, tags) to many clients (firewalls, Panorama systems). This scales networks and provides granularity. Panorama can redistribute data in layers from firewalls to Panorama, then to other firewalls. Each firewall or Panorama can receive data from up to 100 redistribution points.

Role-Based Access Control (RBAC)

RBAC defines privileges for administrative users. Each admin account has a role and authentication method. Administrative Roles define access to Panorama and firewall contexts. For Device Group and Template admins, roles map to Access Domains (specific device groups, templates, firewalls).

Best practice: Create separate admin accounts instead of using the default 'admin' account.

Administrative Roles

Authentication Profiles and Sequences

An authentication profile defines the service (local, external: SAML, TACACS+, RADIUS, LDAP) for validating admin credentials. Some services manage auth and authorization externally. An authentication sequence ranks profiles for login attempts.

Access Domains

Access domains control admin access to specific Device Groups, templates, and context switching to managed firewalls. Apply only to Device Group and Template roles. Can be assigned locally or via external SAML/TACACS+/RADIUS servers (using VSAs or SAML attributes).

Administrative Authentication

Authentication/Authorization methods include Local, SSH Keys (CLI), Certificates (Web UI), External service with Local authorization, and External service with External authorization (SAML, TACACS+, RADIUS).

For PCNSE, understand how different admin roles (Superuser, Panorama Admin, DG/Template Admin) restrict access and how Access Domains further refine permissions for DG/Template Admins. Also, know the methods for external authentication and authorization (RADIUS VSAs, TACACS+ VSAs, SAML attributes).

Deploy Panorama: Task Overview

STEP Task
1 (M-Series appliance only) Rack mount the appliance.
2 Perform initial configuration to enable network access to Panorama.
3 Register Panorama and Install Licenses.
4 Install Content and Software Updates for Panorama.
5 (Recommended) Set up Panorama in a high availability configuration.
6 Add a Firewall as a Managed Device.
7 Add a Device Group or Create a Device Group Hierarchy, Add a Template, and (if applicable) Configure a Template Stack.
8 (Optional) Configure log forwarding to Panorama and/or to external services.
9 Monitor Network Activity using the visibility and reporting tools on Panorama.

Set Up Panorama (Summary)

Panorama can be deployed as a virtual appliance or a hardware M-Series appliance. Key setup considerations include:

PCNSE Exam Focus & Key Diagrams:
Panorama Management Compatibility: Panorama can manage firewalls running PAN-OS versions that are the same as or earlier than the Panorama version. Firewalls running newer PAN-OS versions than Panorama cannot be managed.
Multi-vsys Shared Objects: If a multi-vsys firewall managed by Panorama has a locally configured 'Shared' object with the same name as an object in Panorama's 'Shared' configuration, configuration pushes from Panorama will fail. Rename or delete the local firewall object.
Automated Commit Recovery: Enabled by default. If a pushed configuration breaks Panorama-to-firewall connectivity, the firewall reverts to its previous running configuration.

Policy Evaluation Order Flowchart

Firewall Policy Evaluation Order when Managed by Panorama

Panorama Modes (Virtual Appliance)

Panorama Virtual Appliance Deployment Modes

Panorama Knowledge Quiz

1. Which Panorama virtual appliance mode is recommended for optimizing log storage and report generation, supporting multiple virtual logging disks?

2. Which M-Series appliances, when in Management Only mode, can manage up to 5,000 firewalls?

3. In the policy evaluation order on a Panorama-managed firewall, which rules are evaluated immediately after Shared pre-rules?

4. What is the minimum recommended number of Log Collectors in a Collector Group to avoid split brain and log ingestion issues if one collector fails?

5. When Panorama pushes configurations to managed firewalls, which configuration does it push?

6. What is the PAN-OS version compatibility requirement for Panorama managing firewalls?

7. What is the maximum number of levels in a Device Group Hierarchy?

8. Which type of Panorama administrator role typically uses Access Domains to control access to specific device groups and templates?

9. To enable context switching from Panorama to a managed firewall's web interface for a Device Group and Template admin, what must be configured?

10. Can Templates or Template Stacks be used to set firewall modes (e.g., multi-vsys mode, FIPS-CC mode)?

11. By default, if objects with the same name exist at multiple levels in a Device Group hierarchy, which object's values take precedence for a descendant device group?

12. What happens if a configuration pushed from Panorama via "automated commit recovery" breaks the connection between Panorama and a managed firewall?

13. For a Panorama virtual appliance in Legacy mode, on which hypervisor platform is NFS storage supported for log collection?

14. What is a requirement for Log Collectors within a single Collector Group?

15. How many redistribution points can a single firewall or Panorama management server receive data from for data redistribution?

16. In a Template Stack, how is the priority of settings determined if multiple templates define the same setting?

17. How are Panorama-inherited rules (shared or device group) typically displayed in a managed firewall's web interface?

18. What is the maximum number of firewalls an appropriately resourced Panorama virtual appliance can manage in Management Only mode?

19. Which Panorama interface element allows an administrator to view, cancel, or see details of commit operations?

20. What is a consequence of enabling log redundancy in a Collector Group?