In Panorama, Device Groups are fundamental organizational containers used to manage Policies (Security, NAT, QoS, Decryption, etc.) and related Objects (Addresses, Services, Security Profiles, etc.) that are pushed to groups of managed firewalls.
Just as firewalls often have varying network configurations (handled by Templates), they also frequently require different sets of policies based on their function, location, or trust level. Panorama allows administrators to create a hierarchy of Device Groups to manage these policy sets efficiently through inheritance.
Understanding Device Group hierarchies is crucial for scalable, maintainable, and logically structured policy management in Panorama.
graph TD Shared[Shared Scope\nGlobal Objects/Policies] --> DG_Corp(DG: Corporate-Base\nCommon Policies/Objects) DG_Corp --> DG_Region(DG: Region-NA\nNA-Specific Policies) DG_Region --> DG_Branch(DG: Branch-Type-A\nBranch-Specific Policies) DG_Region --> DG_DC(DG: DC-Primary\nDC-Specific Policies) DG_Branch --> FW1[FW1 - Branch A] DG_Branch --> FW2[FW2 - Branch A] DG_DC --> FW3[FW3 - DC Primary] style Shared fill:#eaf2f8,stroke:#aed6f1,stroke-width:2px style DG_Corp fill:#d5f5e3,stroke:#58d68d,stroke-width:1px style DG_Region fill:#d5f5e3,stroke:#58d68d,stroke-width:1px style DG_Branch fill:#fdebd0,stroke:#f5b041,stroke-width:1px style DG_DC fill:#fdebd0,stroke:#f5b041,stroke-width:1px style FW1 fill:#e9ecef,stroke:#adb5bd style FW2 fill:#e9ecef,stroke:#adb5bd style FW3 fill:#e9ecef,stroke:#adb5bd linkStyle 0 stroke-dasharray: 5 5 linkStyle 1 stroke-width:2px linkStyle 2 stroke-width:2px linkStyle 3 stroke-width:2px linkStyle 4 stroke-width:2pxExample Device Group Hierarchy. FW1 inherits from Shared, Corporate-Base, Region-NA, and Branch-Type-A.
Within each Device Group (including Shared), policies are further divided into Pre-rules and Post-rules .
When Panorama pushes the merged configuration, the firewall evaluates rules in this strict order:
This order ensures that broader, inherited rules (especially cleanup rules in Post-rules) don't inadvertently override more specific rules defined closer to the device (Child DG or Local FW rules).
For the PCNSE exam, concerning Device Group Hierarchies:
1. What types of configurations are primarily managed within Panorama Device Groups?
2. What is the main benefit of creating a Device Group hierarchy (parent-child structure)?
3. What is the difference between Pre-rules and Post-rules within a Device Group configuration?
4. A firewall belongs to `DG-Branch-A`, which is a child of `DG-Region-NA`, which is a child of `DG-Corporate`. Which Device Group's policies/objects are applied to the firewall?
5. In the overall firewall policy evaluation order, where do rules created locally on the firewall typically fall?
6. An administrator wants to create a baseline Security Policy rule to block specific high-risk applications for ALL firewalls managed by Panorama. Where is the most appropriate place to configure this rule?
7. Which configuration component is typically managed using Templates/Template Stacks rather than Device Groups?
8. What is the maximum depth allowed for a Device Group hierarchy below the 'Shared' scope?
9. If an Address Object with the name 'Server-A' is defined in both a Parent Device Group and a Child Device Group, which definition will be used by a policy rule within the Child Device Group?
10. Where are Post-rules typically used in a Device Group hierarchy?