Importing Firewalls and Configurations into Panorama (Version 11.0)

PCNSE Objective Focus

This topic directly relates to PCNSE objectives concerning the initial setup and ongoing management of firewalls using Panorama, covering both adding new devices and incorporating existing device configurations.

Overview: Central Management and Configuration Import

Integrating a Palo Alto Networks firewall with Panorama enables centralized management. There are two primary approaches when bringing a firewall under Panorama's control:

  1. Assigning to Existing DG/Template: Suitable for new or reset devices. Panorama pushes its pre-defined configuration (from the assigned Device Group and Template) down to the firewall, typically overwriting any local settings.
  2. Importing Device Configuration Bundle: Used for existing, configured firewalls. Panorama pulls the firewall's current running configuration *up* into Panorama, preserving its unique settings within the Panorama structure initially.

This document covers both methods, with specific details on importing an existing configuration bundle.

Key Components involved:

Prerequisites for Importing

These prerequisites apply to both import methods:

Import Methods (Version 11.0)

Method A: Assigning Firewall to Existing DG/Template (Overwrite)

This method is ideal for new, factory-reset, or pre-staged firewalls where the desired configuration already exists in Panorama's DGs and Templates.

  1. Firewall Prep: Point the firewall to Panorama (CLI: `set deviceconfig system panorama-server ` or GUI). Commit on firewall.
  2. Panorama - Add Serial: Go to Panorama > Managed Devices > Summary , click Add , enter Serial Number, click OK.
  3. Panorama - Assign DG/Template: Select the new device, click Edit , choose the target Device Group and Template/Stack , click OK. Do this quickly after adding the serial number.
  4. Connect & Sync: The firewall connects. Panorama pushes the assigned DG/Template configuration, overwriting local settings. Monitor sync status. A Commit/Push from Panorama might be needed.

This method replaces the firewall's local configuration with the one defined centrally in Panorama.


Method B: Importing Device Configuration Bundle (Capture Existing Config)

Use this method when you want to bring an existing, uniquely configured firewall under Panorama management *while preserving* its specific configuration within Panorama initially.

  1. Firewall Prep: Point the firewall to Panorama (CLI: `set deviceconfig system panorama-server ` or GUI). Commit on firewall. Ensure the config you want to import is active.
  2. Panorama - Add Serial: Go to Panorama > Managed Devices > Summary , click Add , enter Serial Number, click OK.
  3. Connect & Initial Handshake: Allow the firewall to connect to Panorama. It will appear in the list, likely showing 'Out of sync' or 'Connection status mismatch' because it hasn't received a configuration push yet, and Panorama doesn't have its state.
  4. Panorama - Import Configuration:
    • Navigate to Panorama > Managed Devices > Summary .
    • Select the checkbox next to the connected, but not yet fully managed, firewall.
    • Click the Import button (or it might be under an 'Actions' or similar menu depending on minor UI variations).
    • Confirm the import action. Panorama will now pull the firewall's running configuration (policies, objects, network settings etc.) into its own database.
  5. Configuration Placement: Panorama stores the imported configuration.
    • Network/Device settings (interfaces, zones, routing) are typically placed under the Templates > [Firewall-Serial-Number] hierarchy or a temporary template associated with the device.
    • Policies and Objects (Security rules, NAT rules, addresses) are typically placed under the Device Groups > [Firewall-Serial-Number] hierarchy or a temporary device group.
    • Essentially, Panorama creates device-specific containers for the imported config.
  6. Commit & Sync: After the import, you need to commit the changes *on Panorama* to save this imported state. A subsequent push might be needed to fully align the state if further changes are made in Panorama. Monitor the sync status until 'In sync'.

This method pulls the firewall's *existing* configuration *into* Panorama, creating device-specific rules and settings within the Panorama hierarchy, rather than overwriting it immediately.

Understanding the Imported Configuration Bundle

When you use the "Import device configuration" method:

Impact on Firewall Configuration

Even with Method B, once the device is managed by Panorama, pushing any changes from *shared* Device Groups or Templates that the device is later assigned to *will* overwrite the corresponding parts of the imported (now device-specific) configuration, unless specific override mechanisms are used.

Post-Import Considerations (After Importing a Bundle)

After successfully importing a device's configuration bundle (Method B):

Importing the bundle is often just the *first step* in fully integrating an existing firewall. The real work involves standardizing its configuration within Panorama's shared structures.

Best Practices

Caveats / Gotchas / Considerations

PCNSE Exam Focus (Relevant to 11.0 Concepts)

References (Version 11.0)

These links point to the relevant sections within the official Palo Alto Networks documentation for Panorama version 11.0.