In Panorama, Device Groups are fundamental organizational containers used to manage Policies (Security, NAT, QoS, Decryption, etc.) and related Objects (Addresses, Services, Security Profiles, etc.) that are pushed to groups of managed firewalls.
Just as firewalls often have varying network configurations (handled by Templates/Template Stacks), they also frequently require different sets of policies based on their function, location, or trust level. Panorama allows administrators to create a hierarchy of Device Groups to manage these policy sets efficiently through inheritance.
Understanding Device Group hierarchies and the resulting policy evaluation order on the firewall is crucial for scalable, maintainable, and logically structured policy management in Panorama.
graph TD Shared[Shared Scope\nGlobal Objects/Policies] --> DG_Corp(DG: Corporate-Base\nCommon Policies/Objects) DG_Corp --> DG_Region(DG: Region-NA\nNA-Specific Policies) DG_Region --> DG_Branch(DG: Branch-Type-A\nBranch-Specific Policies) DG_Region --> DG_DC(DG: DC-Primary\nDC-Specific Policies) DG_Branch --> FW1[FW1 - Branch A] DG_Branch --> FW2[FW2 - Branch A] DG_DC --> FW3[FW3 - DC Primary] style Shared fill:#eaf2f8,stroke:#aed6f1,stroke-width:2px style DG_Corp fill:#d5f5e3,stroke:#58d68d,stroke-width:1px style DG_Region fill:#d5f5e3,stroke:#58d68d,stroke-width:1px style DG_Branch fill:#fdebd0,stroke:#f5b041,stroke-width:1px style DG_DC fill:#fdebd0,stroke:#f5b041,stroke-width:1px style FW1 fill:#e9ecef,stroke:#adb5bd style FW2 fill:#e9ecef,stroke:#adb5bd style FW3 fill:#e9ecef,stroke:#adb5bd linkStyle 0 stroke-dasharray: 5 5 linkStyle 1 stroke-width:2px linkStyle 2 stroke-width:2px linkStyle 3 stroke-width:2px linkStyle 4 stroke-width:2pxExample Device Group Hierarchy. FW1 inherits policies and objects from Shared, Corporate-Base, Region-NA, and Branch-Type-A.
Within each Device Group (including 'Shared'), policies are further divided into Pre-rules and Post-rules . These designations, along with the Device Group hierarchy and any local firewall rules, dictate the final sequence in which security policies are evaluated by the firewall.
When Panorama pushes the merged policy configuration, the firewall evaluates Security Policy rules in this strict order:
intrazone-default
which defaults to 'allow', and interzone-default
which defaults to 'deny'. These apply only if no explicit rule above has matched the traffic.)
This explicit order ensures that broader, inherited rules (especially cleanup rules in Post-rules) don't inadvertently override more specific rules defined closer to the device (Child DG or potentially Local FW rules if permitted). Template Stacks, which manage Network and Device settings, operate distinctly from this policy evaluation order.
For the PCNSE exam, concerning Device Group Hierarchies:
1. What types of configurations are primarily managed within Panorama Device Groups?
2. What is the main benefit of creating a Device Group hierarchy (parent-child structure)?
3. What is the difference between Pre-rules and Post-rules within a Device Group configuration?
4. A firewall belongs to `DG-Branch-A`, which is a child of `DG-Region-NA`, which is a child of `DG-Corporate`. Which Device Group's policies/objects are applied to the firewall?
5. In the overall firewall policy evaluation order, where do the firewall's default security rules (e.g., interzone-default) get evaluated?
6. An administrator wants to create a baseline Security Policy rule to block specific high-risk applications for ALL firewalls managed by Panorama. Where is the most appropriate place to configure this rule to ensure it's evaluated early?
7. Which configuration component is typically managed using Templates/Template Stacks rather than Device Groups?
8. What is the maximum depth allowed for a Device Group hierarchy below the 'Shared' scope?
9. If an Address Object with the name 'Server-A' (e.g., 10.1.1.1) is defined in a Parent Device Group, and another Address Object also named 'Server-A' (e.g., 192.168.1.1) is defined in a Child Device Group, which IP address will 'Server-A' represent for a policy rule within the Child Device Group?
10. Where are Post-rules in the 'Shared' scope evaluated in the comprehensive firewall policy evaluation order?