PCNSE Objective Focus
This topic directly relates to PCNSE objectives concerning the initial setup and ongoing management of firewalls using Panorama, covering both adding new devices and incorporating existing device configurations.
-
Identify the methods for managing configurations using Panorama.
-
Identify the procedure to add and register firewalls with Panorama.
-
Identify the methods to import configurations into Panorama.
-
Understand the relationship between Panorama, Device Groups, and Templates.
-
Understand the impact of Panorama management on firewall configurations.
Overview: Central Management and Configuration Import
Integrating a Palo Alto Networks firewall with
Panorama
enables centralized management. There are two primary approaches when bringing a firewall under Panorama's control:
-
Assigning to Existing DG/Template:
Suitable for new or reset devices. Panorama pushes its pre-defined configuration (from the assigned Device Group and Template) down to the firewall, typically overwriting any local settings.
-
Importing Device Configuration Bundle:
Used for existing, configured firewalls. Panorama pulls the firewall's current running configuration *up* into Panorama, preserving its unique settings within the Panorama structure initially.
This document covers both methods, with specific details on importing an existing configuration bundle.
Key Components involved:
-
Panorama:
The central management platform.
-
Managed Device:
The firewall being imported and managed by Panorama.
-
Device Group (DG):
Logical group for shared policies/objects.
-
Template / Template Stack:
Bundle for device/network settings.
-
Device Configuration Bundle/Device State:
The firewall's specific running configuration that can be imported into Panorama.
Import Methods (Version 11.0)
Method A: Assigning Firewall to Existing DG/Template (Overwrite)
This method is ideal for new, factory-reset, or pre-staged firewalls where the desired configuration already exists in Panorama's DGs and Templates.
-
Firewall Prep:
Point the firewall to Panorama (CLI: `set deviceconfig system panorama-server
` or GUI). Commit on firewall.
-
Panorama - Add Serial:
Go to
Panorama > Managed Devices > Summary
, click
Add
, enter Serial Number, click OK.
-
Panorama - Assign DG/Template:
Select the new device, click
Edit
, choose the target
Device Group
and
Template/Stack
, click OK.
Do this quickly after adding the serial number.
-
Connect & Sync:
The firewall connects. Panorama pushes the assigned DG/Template configuration, overwriting local settings. Monitor sync status. A Commit/Push from Panorama might be needed.
This method replaces the firewall's local configuration with the one defined centrally in Panorama.
Method B: Importing Device Configuration Bundle (Capture Existing Config)
Use this method when you want to bring an existing, uniquely configured firewall under Panorama management *while preserving* its specific configuration within Panorama initially.
-
Firewall Prep:
Point the firewall to Panorama (CLI: `set deviceconfig system panorama-server
` or GUI). Commit on firewall. Ensure the config you want to import is active.
-
Panorama - Add Serial:
Go to
Panorama > Managed Devices > Summary
, click
Add
, enter Serial Number, click OK.
-
Connect & Initial Handshake:
Allow the firewall to connect to Panorama. It will appear in the list, likely showing 'Out of sync' or 'Connection status mismatch' because it hasn't received a configuration push yet, and Panorama doesn't have its state.
-
Panorama - Import Configuration:
-
Navigate to
Panorama > Managed Devices > Summary
.
-
Select the checkbox next to the connected, but not yet fully managed, firewall.
-
Click the
Import
button (or it might be under an 'Actions' or similar menu depending on minor UI variations).
-
Confirm the import action. Panorama will now pull the firewall's running configuration (policies, objects, network settings etc.) into its own database.
-
Configuration Placement:
Panorama stores the imported configuration.
-
Network/Device settings (interfaces, zones, routing) are typically placed under the
Templates > [Firewall-Serial-Number]
hierarchy or a temporary template associated with the device.
-
Policies and Objects (Security rules, NAT rules, addresses) are typically placed under the
Device Groups > [Firewall-Serial-Number]
hierarchy or a temporary device group.
-
Essentially, Panorama creates device-specific containers for the imported config.
-
Commit & Sync:
After the import, you need to commit the changes *on Panorama* to save this imported state. A subsequent push might be needed to fully align the state if further changes are made in Panorama. Monitor the sync status until 'In sync'.
This method pulls the firewall's *existing* configuration *into* Panorama, creating device-specific rules and settings within the Panorama hierarchy, rather than overwriting it immediately.
Post-Import Considerations (After Importing a Bundle)
After successfully importing a device's configuration bundle (Method B):
-
Review Imported Config:
Carefully examine the device-specific policies, objects, and network settings created within Panorama.
-
Standardization/Migration:
This is the key next step. Manually analyze the imported configuration. Identify common settings or policies that can be moved from the device-specific area into your shared Device Groups and Templates. This reduces redundancy and enforces standards.
-
Move common network settings to shared Templates/Stacks.
-
Move common policies/objects to shared Device Groups.
-
Clean Up:
Remove redundant or device-specific configurations from Panorama once they are successfully migrated to shared locations.
-
Commit Changes:
Every migration/cleanup step requires committing the changes in Panorama and potentially pushing them to the firewall to take effect.
Importing the bundle is often just the *first step* in fully integrating an existing firewall. The real work involves standardizing its configuration within Panorama's shared structures.