Managing Dynamic Updates for Panorama and Managed Devices

Introduction: Centralized Content Updates

Dynamic Updates provide the latest security intelligence to Palo Alto Networks firewalls and Panorama. These updates include new application signatures, threat signatures (Antivirus, Anti-Spyware, Vulnerability Protection), WildFire signatures, URL filtering categories (PAN-DB), GlobalProtect data, and more. They are crucial for maintaining an effective security posture against evolving threats.

Managing these updates across numerous firewalls can be challenging. Panorama simplifies this process by acting as a central point for downloading, managing, and distributing these updates to its managed devices.

Key benefits of using Panorama for dynamic updates:

Dynamic Update Types

Panorama manages the distribution of several types of dynamic content updates:

Dynamic Updates are for content (signatures, categories). They are distinct from PAN-OS software updates (upgrading the firewall operating system) and plugin updates , which follow different processes.

Managing Updates for Panorama Itself

Before Panorama can distribute updates to firewalls, Panorama itself must download and process these updates . Panorama needs the latest content for its own functions (like ACC analysis using App-ID) and to know which updates are available for distribution.

Configuration and management happen under Panorama > Device Deployment > Dynamic Updates .

Scheduling Panorama Updates

You can configure Panorama to automatically check for, download, and optionally install updates on a schedule:

# Example: Schedule Panorama to download Apps/Threats daily at 3 AM, install manually
Navigate to Panorama > Device Deployment > Dynamic Updates
Select "Applications and Threats" -> Schedule
Recurrence: Daily
Time: 03:00
Action: Download Only
Click OK.
            

Manual Updates on Panorama

You can manually manage updates at any time:

Source and Connectivity

Panorama needs connectivity (typically HTTPS/443) to the Palo Alto Networks update servers ( updates.paloaltonetworks.com ). Ensure firewall rules and routing permit this traffic from Panorama's management interface or a configured Service Route.

Updating Panorama itself does NOT automatically update the managed firewalls. It only makes the content available *on* Panorama for potential distribution.

Managing Updates for Managed Firewalls via Panorama

The primary method for updating managed firewalls is configuring them to use Panorama as their update source and defining deployment schedules within Panorama Templates or Template Stacks.

Panorama as Update Source

By default, firewalls managed by Panorama will attempt to retrieve dynamic updates directly from Panorama, rather than reaching out to the internet themselves. This behavior is generally preferred for the benefits mentioned earlier (bandwidth, control, consistency).

The firewall setting controlling this is typically found under Device > Setup > Services (within the firewall's local context or pushed via Template) and implicitly directs update requests towards its managing Panorama.

Configuring Device Update Schedules

Update schedules for managed firewalls are configured within Templates or Template Stacks under Device > Dynamic Updates .

For each update type (Apps & Threats, Antivirus, WildFire, etc.), you can define:

# Example: Configure firewalls (via Template) to check Panorama hourly for Apps/Threats,
# download/install immediately, but only 120 mins after Panorama got the update.

Navigate to Objects > Templates > [Your Template/Stack]
Go to Device > Dynamic Updates
Select "Applications and Threats" -> Schedule
Recurrence: Hourly
Action: Download and Install
Threshold: 120 minutes
Click OK.
Commit and Push the Template changes.
            

Update Deployment Strategy

Monitoring Update Status

Monitor the success of updates pushed to firewalls:

Direct Firewall Updates (Bypassing Panorama)

In some specific scenarios, you might configure a firewall to download updates directly from Palo Alto Networks, even when managed by Panorama:

This is typically configured by ensuring the firewall has internet access for updates and potentially overriding specific service settings pushed by the template. However, this sacrifices the benefits of centralized management.

Best Practices

Caveats / Gotchas / Considerations

PCNSE Exam Focus

References