Introduction to Panorama

Panorama™ enables centralized management of Palo Alto Networks firewalls. It provides a single pane of glass for managing configurations, deploying policies, and monitoring network activity across multiple firewalls.

Panorama simplifies the administration of a large number of firewalls by allowing administrators to group devices, share configurations, and enforce consistent security policies. Key benefits include operational efficiency, consistent security posture, and comprehensive visibility.

Panorama centrally manages multiple firewalls across different locations.

Key Capabilities

Panorama Licensing

To manage firewalls, Panorama requires a Device Management License . This license dictates the maximum number of firewalls Panorama can manage.

For the PCNSE exam, understand that Panorama's capacity to manage firewalls is tied to its licensing. Each firewall in an HA pair counts as one managed device towards the license limit.

While Panorama can manage licenses for the firewalls themselves (e.g., Threat Prevention, WildFire), Panorama itself needs its own Device Management license to function as a manager.

Device Registration & Initial Connection

To manage a firewall with Panorama, a secure connection must be established. This involves mutual authentication using a Device Registration Authentication Key .

Key Steps:

  1. On Panorama: Create Device Registration Authentication Key
    • Navigate to Panorama > Device Registration Auth Key .
    • Specify Name , Lifetime (how long the key is valid), Count (how many times it can be used), and Device Type (Firewall).
    • Optionally, specify device serial numbers for which the key is valid.
    • Copy the generated authentication key.
    • This key ensures mutual authentication for the first connection.
    Panorama Device Registration Auth Key Configuration Copy Auth Key Dialog
  2. On Panorama: Add Firewall Serial Number
    • Navigate to Panorama > Managed Devices > Summary and click Add .
    • Enter the firewall's serial number.
    • Enter the device registration authentication key created in the previous step.
    • Optionally, associate with Device Group, Template Stack, Collector Group during initial deployment.
    • Optionally, enable "Auto Push on 1st connect" (for PAN-OS 8.1+ firewalls) to push configuration immediately upon connection.
    Add Firewall to Panorama Dialog Associate Devices Options
  3. On Firewall: Configure Panorama Settings
    • Log in to the firewall's web interface.
    • Navigate to Device > Setup > Management and edit Panorama Settings.
    • Select "Panorama" for "Managed By".
    • Enter the Panorama IP address(es) (primary and optional secondary for HA).
    • Paste the authentication key copied from Panorama.
    • Commit changes on the firewall.
    Firewall Panorama Settings Configuration
  4. On Panorama: Commit Changes
    • Commit changes to Panorama ( Commit > Commit to Panorama ).
  5. Verify Connection
    • On Panorama, navigate to Panorama > Managed Devices > Summary .
    • Verify the Device State for the new device shows as Connected .
    Managed Devices Summary Showing Connected State

Firewall to Panorama Registration and Connection Sequence.

The authentication key is used for the *first connection* for mutual authentication. Subsequent communications use 2,048-bit certificates and AES-256 encrypted SSL connections. For Panorama HA, the auth key is only needed for the primary Panorama; the CA certificate is synchronized for the secondary.

PAN-OS Version Compatibility

Panorama and its managed firewalls must run compatible PAN-OS versions.

Always check the Palo Alto Networks compatibility matrix for the most current version compatibility information before performing upgrades or adding new devices. Attempting to manage a firewall with an incompatible Panorama version can lead to commit failures or unpredictable behavior.

Adding Firewalls to Panorama

After the initial setup, firewalls are added to Panorama's list of managed devices. This can be done manually or by importing a CSV file.

Manual Addition:

  1. Go to Panorama > Managed Devices > Summary and click Add .
  2. Enter firewall Serial number(s) (one per line for multiple).
  3. Enter the pre-configured Device Registration Authentication Key .
  4. (Optional) Select Associate Devices to link the firewall to a Device Group, Template Stack, Log Collector, or Collector Group upon first connection.
    • If associated, you can enable Auto Push on 1st connect (for PAN-OS 8.1+) to automatically push the configuration.
    • (Optional) Specify a target PAN-OS software version ( To SW Version ) for automatic upgrade on first connect. (Requires prior content installation on the firewall).
  5. Click OK .
  6. Commit changes to Panorama.
Manually Add Firewall Dialog Associate Devices During Manual Add

Bulk Import via CSV:

  1. Go to Panorama > Managed Devices > Summary and click Add .
  2. Enter the Device Registration Authentication Key .
  3. Click Import .
  4. Download Sample CSV , edit it with firewall serial numbers and optional associations (Device Group, Template Stack, Collector Group, Log Collector, Auto Push, Target SW Version).
  5. Browse to your edited CSV file and select it.
  6. Review and assign any remaining associations if not in CSV.
  7. Click OK .
  8. Commit changes to Panorama.
Bulk Import Dialog - Auth Key & Import Button Bulk Import CSV Upload and Association Options

Bulk import using CSV is only supported for single-vsys firewalls. You cannot bulk import firewalls with multiple virtual systems (multi-vsys).

Remember to configure the firewall itself to point to Panorama (Device > Setup > Management > Panorama Settings) using the same auth key.

Device Groups: Concepts & Hierarchy

Device Groups in Panorama are used to manage policies and objects for a set of firewalls. Firewalls with similar policy requirements are typically grouped together.

Device Group Hierarchy:

Device groups can be arranged in a hierarchy, with a top-level "Shared" location.

Example of a Device Group Hierarchy with Inheritance.

Creating a Device Group:

  1. Go to Panorama > Device Groups and click Add .
  2. Enter a Name and Description .
  3. Assign Devices (firewalls or virtual systems) to the group.
  4. (Optional) Add Reference Template(s) if objects in the device group configuration refer to objects defined in those templates (e.g., zones defined in a template).
  5. (Optional) Select Group HA Peers for visual grouping.
  6. Select the Parent Device Group (default is "Shared").
  7. (Optional) Assign a Master firewall if policy rules will reference users/groups (for User-ID information gathering).
  8. Click OK and commit changes.

Device groups are fundamental for policy management. Understanding inheritance and object scope (Shared vs. Device Group-specific) is crucial. Remember that Reference Templates allow a device group to "see" network objects (like zones or interfaces) from a template that its member firewalls might not be directly assigned to, which is useful for policy creation.

Templates & Template Stacks: Concepts

Templates in Panorama are used to manage network and device settings for firewalls. This includes configurations for interfaces, zones, virtual routers, server profiles, services, etc.

Template Stacks are ordered collections of templates. A firewall is assigned to a single template stack, and the stack pushes the combined configuration of its member templates to the firewall.

Key Concepts:

Templates are combined into a Template Stack, which is then assigned to firewalls. Order within the stack determines precedence for overlapping settings.

What Templates Manage:

Templates are for network and device settings, while Device Groups are for policies and objects. A firewall must be in a template stack to receive template configurations. HA peers in active/passive mode are typically in the same template stack; active/active peers might be in different template stacks if their network configs differ significantly.

Renaming a VSYS is allowed only on the local firewall, not on Panorama. Doing so on Panorama can lead to a new VSYS being created or incorrect mappings.

Exceptions (Local Firewall Configuration Only):

Some settings can only be configured locally on each managed firewall and not via Panorama templates:

Configuring Templates & Template Stacks

Adding a Template:

  1. Go to Panorama > Templates , click Add .
  2. Enter a unique Name and optional Description .
  3. (Optional) If the template has a VSYS with configurations (e.g., interfaces) to push to firewalls without VSYS, select the template and a Default VSYS from the drop-down.
  4. Commit to Panorama.
  5. Use the Device and Network tabs, selecting your template from the dropdown, to define settings (e.g., Primary DNS Server under Device > Setup > Services ).
Configuring Primary DNS in Template Verifying Template Setting on Firewall

Configuring a Template Stack:

  1. Go to Panorama > Templates and click Add Stack . (Cloning stacks is not supported).
  2. Enter a unique Name and optional Description .
  3. (Optional for VM-Series/CN-Series) Check Automatically push content when software device registers to Panorama .
  4. Add up to 8 Templates to the stack. Order them by priority (higher templates override lower ones for duplicate settings). Use Move Up/Down .
  5. In the Devices section, select firewalls to assign to this stack. (Entire firewall for multi-vsys).
  6. (Optional) Select Group HA Peers for visual grouping.
  7. Click OK .
  8. Edit Network and Device settings for the stack if needed (stack-level overrides or configurations).
    • Use the Mode drop-down (Multi VSYS, Operational Mode, VPN Mode) to filter settings relevant to specific firewall operational modes to avoid push errors.
  9. Commit and Push ( Commit > Commit and Push , select Templates in Push Scope, select firewalls assigned to the stack).
Configuring a Template Stack Verifying Template Stack Setting on Firewall Context

Every managed firewall must belong to a template stack. When you push changes to a template, Panorama pushes the configuration to every firewall assigned to any template stack that includes that template.

A template configuration cannot reference a configuration in another template directly, even if both are in the same stack (e.g., a zone in Template_A can't reference a zone protection profile in Template_B unless that profile is in Template_A or inherited by the stack).

Template & Stack Variables

Variables allow you to create reusable template/stack configurations where certain values (like IP addresses, FQDNs, interface names) can differ per firewall or device group, without needing separate templates for each variation.

Key Features:

Creating and Using Variables:

  1. Define the Variable:
    • Go to Panorama > Templates .
    • Click Manage (Variables column) for the desired template or template stack. OR
    • Go to Panorama > Managed Devices > Summary , select a device, and click Edit (Variables column) for device-specific variables.
    • Click Add . Enter Name (e.g., $mgmt_ip ), select Type (e.g., IP Netmask), and provide the Value.
    Creating Template Variables
  2. Reference the Variable:
    • In the template/stack configuration (e.g., Device > Setup > Services ), enter the variable name (e.g., $DNS-primary for Primary DNS Server).
    Referencing Variables in Services Configuration
  3. Commit and Push:
    • Commit changes to Panorama.
    • When pushing a device group configuration that references template/stack variables, ensure to Edit Selections in the Push Scope and Include Device and Network Templates .
  4. Verify: Check the firewall context to see the resolved variable values. Verifying Pushed Variable Values on Firewall Context

Importing/Overwriting Variables via CSV:

You can export existing template stack variables to a CSV, modify values, and re-import to overwrite. This cannot be used to create new variables, only update existing ones.

  1. Panorama > Templates , select a template stack.
  2. Select Variable CSV > Export .
  3. Edit the downloaded CSV. Correct serial number formatting if needed (format as Text, add leading '0' if Excel removed it). Update variable values. Values showing as #inherited# are defined in the template stack (not device-specific overrides). Editing Exported CSV for Variables - Serial Number Formatting
  4. Save as CSV UTF-8 . Saving CSV as UTF-8
  5. In Panorama, select Variable CSV > Import , browse to your file, and click OK .
  6. Commit to Panorama, then Commit and Push.

Variables are powerful for scaling configurations. Understand the hierarchy: Device-specific overrides Template Stack, which overrides Template.

Overriding Template Settings

Overrides allow for exceptions to the base configuration pushed by templates or template stacks. This provides flexibility for firewall-specific settings.

Methods to Override:

  1. Override on the Firewall (Local Override):
    • Access the firewall's web interface (directly or via Panorama context switch).
    • Navigate to the setting (e.g., Device > Setup > Services ).
    • Click the template icon ( template icon ) next to the field to enable override.
    • Enter the new firewall-specific value. The icon changes to an override symbol ( override icon ).
    • Commit changes on the firewall.
    • This creates a local setting that takes precedence over the Panorama-pushed value for that specific firewall.
  2. Override Template Value using a Template Stack (Stack-level Override):
    • In Panorama, select the Template Stack from the Template drop-down.
    • Navigate to the setting (e.g., Device > Setup > Services ).
    • Configure the desired value. This value in the stack will override the value from any template lower in its hierarchy for all firewalls assigned to this stack.
    • Commit and Push.
  3. Override Template Value using a Template Stack Variable:
    • In Panorama, go to Panorama > Templates .
    • Click Manage (Variables column) for the Template Stack.
    • Select the variable inherited from a template and click Override .
    • Enter the new value for the variable at the stack level.
    • Commit and Push.
  4. Override Template/Stack Value using Device-Specific Variables (Panorama Managed):
    • In Panorama, go to Panorama > Managed Devices > Summary .
    • Click Edit (Variables column) for the specific firewall.
    • Select an inherited variable (from template or stack) and click Override .
    • Enter the new firewall-specific IP address and click OK .
    • Commit and Push.

Understanding override precedence is key: Device-specific overrides beat Template Stack overrides, which beat Template values. Use overrides judiciously to maintain clarity.

To disable/remove all template settings from a firewall (reverting to local management or preparing for migration):

  1. Access the firewall's web interface.
  2. Go to Device > Setup > Management , edit Panorama Settings.
  3. Click Disable Device and Network Template .
  4. (Optional) Check Import Device and Network Template before disabling to save current settings locally. Otherwise, Panorama-pushed settings are deleted.
  5. Click OK .

Master Key Management

The master key encrypts sensitive configuration elements (passwords, private keys). It's crucial for security to replace the default master key.

Configuring a Unique Master Key for a Managed Firewall:

  1. (Firewall HA only) Disable Config Sync on the firewall HA pair via template.
  2. Panorama > Managed Devices > Summary , click Deploy Master Key .
  3. Select managed firewall(s) and click Change . Deploy Master Key to Managed Firewall
  4. Configure the master key: New key, Confirm, Lifetime, Reminder. Change Master Key Dialog for Firewall
  5. Click OK (key is pushed automatically). Verify System log.
  6. (Optional) Configure auto-renewal via template.

Configuring Master Key on Panorama:

  1. (Panorama HA only) Disable Panorama HA.
  2. Panorama > Master Key and Diagnostics , configure new key, lifetime, reminder. Click OK.
  3. (Optional) Configure auto-renewal for Panorama's master key. Commit to Panorama.
  4. (Panorama HA only) Repeat steps on the secondary Panorama peer with the identical key.

Deploying Master Key to Log Collectors / WildFire Appliances:

Similar process via Panorama > Managed Collectors or Panorama > Managed WildFire Appliances . Key must be identical to Panorama's.

Commit any pending configuration changes *before* deploying a new master key to ensure all elements are re-encrypted correctly.

Always store master keys securely. They cannot be recovered if lost.

Scheduled Configuration Push

Panorama allows scheduling configuration pushes to managed firewalls, reducing operational overhead. This can be a one-time or recurring event.

Creating a Scheduled Push:

  1. Go to Panorama > Scheduled Config Push and click Add (or via Commit > Push to Devices ).
  2. Configure: Name, Admin Scope, Date & Time, Recurrence.
  3. Push Scope Selection: Select Device Groups, Templates, or Template Stacks.
    • Merge with Device Candidate config: (Default: enabled).
    • Include Device and Network Templates: (Default: enabled).
    • Force Template Values is NOT supported for scheduled pushes.
  4. Click OK , then Commit to Panorama .
Scheduled Config Push Configuration Dialog

Viewing Execution History:

Go to Panorama > Scheduled Config Push and click the timestamp in the Status column. Click Tasks for full details.

Scheduled pushes are useful for applying changes during maintenance windows without manual intervention.

Data Redistribution

Panorama can redistribute User-ID and other contextual data (IP-User Mappings, IP Tags, User Tags, HIP, Quarantine List) among managed firewalls and User-ID agents. This ensures consistent data for policy enforcement.

Configure Panorama to Redistribute Data:

  1. Add Redistribution Agents to Panorama: ( Panorama > Data Redistribution > Add ). Specify Host, Port, Data types.
  2. Enable Panorama MGT Interface for Queries: ( Panorama > Setup > Interfaces > Management , select User-ID).
  3. Commit to Panorama .

Configure Firewalls to Receive Redistributed Data (via Template):

  1. Device > Data Redistribution > Agents (select Template). Add agent (Panorama serial or Host/Port).
  2. Commit and Push .

Verification:

Data redistribution ensures all firewalls in a device group have consistent User-ID mappings for policy enforcement.

Device Group Objects (Shared vs. DG)

Objects (Addresses, Services, URL Categories, Security Profiles, etc.) are configuration elements referenced by policies. In Panorama, objects can be created at the Shared level or within specific Device Groups .

Object Scope and Inheritance in Device Groups.

Managing Unused Shared Objects:

Default: Panorama pushes all shared objects. To push only referenced shared objects: Panorama > Setup > Management , edit Panorama Settings, clear Share Unused Address and Service Objects with Devices . This may increase Panorama commit time.

Use Shared objects for global items, DG-specific for granular control.

Object Management (Create, Override, Revert)

Creating Objects:

Overriding Inherited Object Values:

Applicable to DG objects inherited from an ancestor (not Shared objects).

  1. In Objects , select the DG and the inherited object (green icon). Click Override .
  2. Edit values. Icon becomes yellow-overlapping-green ( override icon ). Commit and Push.

Reverting to Inherited Object Values:

  1. Select the overridden object. Click Revert . Icon turns green. Commit and Push.

Managing Precedence of Inherited Objects:

Default: Lower-level DG objects take precedence. To reverse: Panorama > Setup > Management , edit Panorama Settings, check Objects defined in ancestors will take higher precedence . Commit to Panorama, then Push to Devices.

Object Precedence Diagram

Object overrides offer flexibility. The "Find Overridden Objects" link (when changing precedence) is helpful.

Policy Rule Hierarchy & Evaluation

Panorama manages policies in layers. Understanding evaluation order is critical.

Rule Evaluation Order (e.g., Security Rulebase):

  1. Panorama Pre-Rules (Shared -> Parent DGs -> Local DG)
  2. Local Firewall Rules
  3. Panorama Post-Rules (Local DG -> Parent DGs -> Shared)
  4. Default Rules

Simplified Policy Rule Evaluation Order.

Use Policies > Preview Rules in Panorama to see the effective rulebase for a specific device.

"Preview Rules" is invaluable. Place specific rules before general ones.

Policy Targeting & Rule Usage

Pushing Policy Rules to a Subset of Firewalls (Targeting):

Within a device group, target specific policy rules to apply only to certain firewalls.

Policy Rulebase Settings - Require Audit Comment

Monitoring Policy Rule Usage:

Tracks rule usage for managed firewalls (PAN-OS 8.1+ with Policy Rule Hit Count enabled).

Regularly monitor rule usage. Enforce audit comments ( Panorama > Setup > Management ) for policy changes.

Managing Multi-VSYS Firewalls

Specific considerations for configuration pushes and shared objects on multi-VSYS firewalls.

Device Group Push to Multi-VSYS Firewall:

Shared Objects Pushed to Multi-VSYS Firewall:

Many shared objects go to a Panorama Shared location on the firewall, accessible by all VSYS.

Shared Objects on Multi-VSYS Firewall Overview

Transitioning Firewalls: Planning

Migrating existing, locally configured firewalls to Panorama management requires careful planning.

Key Planning Steps:

  1. Scope & Inventory: Identify firewalls, check PAN-OS versions, verify Panorama licenses.
  2. Configuration Audit & Normalization: Plan DGs/Templates, normalize names (zones, objects).
  3. Backup & Maintenance Window: Schedule window, backup firewall states and Panorama config.
  4. Migration Strategy: Reuse existing config or push new? If from another Panorama, localize first.
  5. Post-Migration Test Plan: Define verification tasks.

Thorough planning, especially normalization of names, is crucial.

Migrating Standalone Firewalls

Importing an existing firewall's configuration into Panorama to reuse it.

Process Overview:

  1. Plan Migration.
  2. Add Firewall as Managed Device in Panorama: Create Auth Key, add serial to Panorama.
  3. Connect Firewall to Panorama: Configure Panorama IP and Auth Key on firewall. Verify connection.
  4. Import Firewall Configuration into Panorama: ( Panorama > Setup > Operations > Import device configuration... ). Auto-creates Template/DG. Choose rule import location. Commit to Panorama.
  5. Push Config Bundle from Panorama to Firewall (CRITICAL): ( Panorama > Setup > Operations > Export or push device config bundle... > Push & Commit ). Removes local policies/objects on firewall. Commit to Panorama again.
  6. Push Device Group and Template Configurations: ( Commit > Commit and Push ). Check "Include Device and Network Templates" and "Force Template Values".
  7. Verify & Fine-Tune.
  8. Perform Post-Migration Test Plan.
Verify Connected State during Migration

The "push device config bundle" step is vital to clear local firewall config. "Force Template Values" makes Panorama's settings authoritative.

Migrating HA Pairs

Similar to standalone, with extra steps for HA state and sync.

Migrating HA Pair and Reusing Existing Configuration:

  1. Plan. Disable Config Sync on HA Peers locally.
  2. Add both HA firewalls to Panorama Management. Verify connection.
  3. Import Configuration for EACH Firewall Separately:
    • For 1st peer: Import config. Then, Push device config bundle. Verify.
    • Repeat for 2nd peer. (Creates separate DGs/Templates).
  4. Consolidate into Single DG and Template Stack: Move 2nd firewall into 1st's DG/Stack, delete redundant DG/Stack.
  5. Push DG & Template Config to HA Pair (Phased):
    • Suspend passive/active-secondary peer locally.
    • From Panorama, Push to Devices (target suspended peer, Merge, Include Templates, Force Template Values if Panorama manages HA config).
    • Make peer functional. Suspend active/active-primary peer.
    • Repeat push from Panorama to now-suspended active peer. Make functional.
    • Verify sync.
  6. (Local HA config only) Re-enable Config Sync .
  7. Post-Migration Test Plan.

Migrating HA Pair and Pushing New Configuration:

Overwrites local configs. Plan, Disable Config Sync, Add FWs, Connect FWs. Create target DG/Stack in Panorama for both peers. Push config (phased). Verify. Re-enable local sync if needed. Test.

Disabling config sync and phased pushes (passive first) are key for HA migration.

Loading Partial Configurations

Selectively load specific settings (e.g., application objects) from a firewall into Panorama. Requires superuser, full commit on Panorama, typically uses XML API/CLI.

Process Overview:

  1. Plan & Resolve Duplicates.
  2. Export Full Firewall Configuration (as XML).
  3. Import Snapshot into Panorama ( Panorama > Setup > Operations > Import named Panorama configuration snapshot ).
  4. Load Partial Configuration (CLI/XML API):
    • Identify source XPath (from firewall XML) and destination XPath (in Panorama config).
    • Panorama CLI: load config partial mode [append|merge|replace] from-xpath <src> to-xpath <dest> from <file.xml> then commit .
  5. Push Configuration from Panorama to Firewall. (Delete local conflicting objects first).
  6. Post-Migration Test Plan.

Partial load is advanced. XPath knowledge is essential.

Localizing Panorama Configurations

Makes Panorama-pushed config local to firewall, removing it from Panorama management or preparing for migration to a different Panorama. Requires superuser on firewall GUI.

Steps:

  1. Access Firewall Web Interface.
  2. (Best Practice) Export Device State.
  3. (Active/Passive HA Only) Disable Config Sync locally on each peer.
  4. Disable Device and Network Template: ( Device > Setup > Management > Panorama Settings ). Optionally import settings locally.
  5. Disable Device Group Configuration (Panorama Policy and Objects): (Same menu). Optionally import settings locally. Do NOT commit yet.
  6. Save and Load Snapshot with New UUIDs (CRITICAL):
    • Device > Setup > Operations > Save named configuration snapshot .
    • Load named configuration snapshot (the one just saved).
    • Check: Regenerate Rule UUIDs for selected named configuration .
    • Click OK .
  7. Commit on Firewall.
  8. (Active/Passive HA Only) Re-enable Config Sync.

Regenerating Rule UUIDs is vital for localizing policies.

Changing Management Modes

Switching between Panorama and cloud services management.

Panorama to Cloud:

  1. Panorama: Remove log forwarding preferences for the firewall ( Panorama > Collector Groups > Device Log Forwarding > Delete ). Commit.
  2. Firewall: Set "Managed By" to Cloud Services ( Device > Setup > Management > Panorama Settings ). Commit.

Cloud to Panorama:

  1. Firewall: Set "Managed By" to Panorama (re-enter IP/Auth Key if needed). Commit.
  2. Firewall CLI: debug software restart process management-server .
  3. Panorama: Verify connection ( Panorama > Managed Devices > Summary ).

Restarting management-server process on firewall is key when moving from cloud to Panorama.

Device Health Monitoring

Panorama (PAN-OS 8.1+) monitors health of managed firewalls (PAN-OS 8.1+).

Stores last 90 days of stats.

Accessing Health Data:

  1. Panorama > Managed Devices > Health .
  2. All Devices View: Overview. Click metric for View Snapshot (Baseline, 24hr, 7-day, 15-day averages). Managed Firewall Health Monitoring Overview Health Metric Snapshot
  3. Detailed Device View: Select firewall for time-trended graphs. Detailed Device Health View
  4. Deviating Devices Tab: Firewalls with metrics outside baseline. Deviating Devices Tab

Helps identify performance or hardware issues. Data preserved for 90 days if firewall removed.

Device health status state diagram.

Device Certificate Installation (for Cloud Services)

Managed firewalls need a device certificate for Palo Alto Networks cloud services. Panorama facilitates this.

Prerequisites:

PA-400, PA-1400, PA-3400, PA-5400, PA-5450 series install cert automatically on CSP registration.

Process:

  1. (Best Practice) Configure NTP on Panorama and Firewalls.
  2. Generate OTP Request Token on Panorama: ( Panorama > Managed Devices > Summary , select FW(s) or "Select all devices without a certificate", Copy token).
  3. Generate OTP in CSP: ( Products > Device Certificates > Generate OTP , select "Generate OTP for Panorama managed firewalls", paste token, Generate OTP. View History, copy/download OTP. OTP lifetime: 60 mins. ) CSP OTP History
  4. Install Device Certificate via Panorama: ( Panorama > Managed Devices > Summary > Upload OTP , paste OTP, Upload).
  5. (WildFire Only) Refresh Firewall CLI: request wildfire registration channel public .
  6. Verify: Panorama ( Managed Devices > Summary ) shows "Valid" certificate and expiry. Verify Valid Device Certificate in Panorama

Device certs: 90-day lifetime, auto-renews 15 days prior.

Device Certificate Installation Workflow.

Where Can I Use This? What Do I Need?
  • NGFW (Managed by Panorama)
  • Device management license
  • Support license
  • Outbound internet access
  • CSP account (various roles)
  • Panorama superuser role

Ensure the following FQDNs and ports are allowed for successful certificate installation:

FQDN Ports
  • http://ocsp.paloaltonetworks.com
  • http://crl.paloaltonetworks.com
  • http://ocsp.godaddy.com
TCP 80
  • https://api.paloaltonetworks.com
  • http://apitrusted.paloaltonetworks.com
  • https://certificatetrusted.paloaltonetworks.com
  • https://certificate.paloaltonetworks.com
TCP 443
  • *.gpcloudservice.com
TCP 444 and TCP 443

PCNSE Panorama Management Quiz

Test your knowledge on managing firewalls with Panorama. Select the best answer for each question.

1. What is the primary purpose of a Device Registration Authentication Key in Panorama?

2. Which Panorama component is primarily used to manage network and device-specific settings like interfaces, zones, and services?

3. When configuring a Device Group hierarchy, how are policies and objects typically inherited?

4. A firewall is assigned to a Template Stack containing three Templates (T1, T2, T3) in that order from top to bottom (T1 highest priority). If T1 defines DNS as 1.1.1.1 and T3 defines DNS as 3.3.3.3, what DNS server will the firewall use if T2 does not define DNS?

5. What is a primary benefit of using Template Variables in Panorama?

6. When migrating an existing, locally configured firewall to Panorama management and intending to reuse its configuration, what is a critical step after importing the firewall's configuration into Panorama but BEFORE pushing the full Device Group and Template configuration?

7. An administrator wants to ensure that certain Panorama-managed firewalls in a Device Group do not receive a specific policy rule, while others in the same group do. What feature should be used?

8. What is the recommended best practice for master key management in a Panorama-managed environment with HA firewalls?

9. What is a key difference between Shared Objects and Device Group Objects in Panorama?

10. To ensure Panorama pushes only referenced shared objects to managed firewalls, what setting should be configured?

11. When migrating a firewall HA pair to Panorama management and reusing their existing configuration, what must be done BEFORE importing configurations into Panorama?

12. What is the correct order of policy evaluation on a Panorama-managed firewall that includes Pre-Rules, Post-Rules, and Local Firewall Rules?

13. To view the effective, combined rulebase for a specific firewall as managed by Panorama, including all inherited rules, which feature should an administrator use?

14. What is the maximum number of templates that can be included in a single Template Stack?

15. If you want to completely remove a firewall from Panorama management and make its configuration local, what critical action must be taken on the firewall after disabling templates and policy/objects from Panorama?

16. Which of the following settings can ONLY be configured locally on a managed firewall and NOT via Panorama templates?

17. When Panorama is used to manage a multi-VSYS firewall (PAN-OS 10.2+), how are configuration pushes for different VSYS on the same physical device handled?

18. If an object named "Server-A" exists in the "Panorama Shared" location on a multi-VSYS firewall with IP 1.1.1.1, and another object also named "Server-A" exists in the "Panorama" location for VSYS1 with IP 2.2.2.2, which IP address will be used by a policy rule within VSYS1 referencing "Server-A"?

19. What Panorama feature allows an administrator to automatically push Device Group and Template configurations to a newly registered firewall when it first connects?

20. When installing a device certificate on a managed firewall via Panorama for cloud services, what is the lifetime of the One Time Password (OTP) generated from the Customer Support Portal (CSP)?

21. What is the primary role of the "Shared" location in the Panorama Device Group hierarchy?

22. If you clear the "Share Unused Address and Service Objects with Devices" option in Panorama settings, what is a potential consequence?

23. When would you typically use the "Force Template Values" option during a Commit and Push operation from Panorama?

24. What is the recommended procedure if a master key on Panorama or a managed firewall expires and you do NOT have the current master key?

25. In a Panorama-managed multi-VSYS firewall, which of the following object types is typically replicated to the Panorama location of each VSYS rather than being stored in the "Panorama Shared" location?

26. Which PAN-OS version introduced the capability for Panorama to bundle Device Group configuration pushes for multiple VSYS on the same firewall into a single job?

27. If a Panorama administrator wants to change the order of precedence so that objects defined in ancestor device groups take higher precedence than locally defined objects in a child device group, where is this setting configured?

28. What is a key reason to use Reference Templates when configuring a Device Group in Panorama?

29. When changing management of a firewall from Cloud Services back to Panorama, what CLI command is required on the firewall after setting "Managed By" to Panorama in the GUI?

30. For Panorama to monitor device health statistics from managed firewalls, what is the minimum PAN-OS version required for both Panorama and the managed firewalls?

31. When using Panorama to install device certificates on managed firewalls, which entity generates the One-Time Password (OTP) after receiving an OTP Request Token from Panorama?

32. What is a primary limitation of bulk importing firewalls into Panorama using a CSV file?

33. If a template configuration in Panorama references a shared object from a Device Group, what must be configured in the Device Group settings for this to work correctly?

34. What is the "Rule Usage" status if some, but not all, firewalls in a Device Group have traffic matches for a specific policy rule pushed from Panorama?

35. For Panorama to onboard a *new* firewall running PAN-OS 10.1.1, what minimum PAN-OS version must Panorama itself be running, according to the provided documentation context?

36. What is the purpose of the "Master" firewall setting within a Device Group configuration?

37. When migrating a firewall to Panorama and reusing its configuration, if an imported shared object from the firewall has the exact same name and value as an existing shared object in Panorama, what happens?

38. Which of these actions is NOT typically performed using a Panorama Template or Template Stack?

39. To import and overwrite existing template stack variable values for multiple firewalls efficiently, what file format should be used?

40. What is the "Force Template Values" option in Panorama generally NOT supported for?

41. If an administrator overrides an inherited object value in a descendant Device Group, what icon typically indicates this overridden object in the Panorama GUI?

42. When is it particularly important to ensure that zone names are normalized or consistent across firewalls before migrating them to Panorama management?

43. What happens if you attempt to add a firewall to Panorama management, and it exceeds the device management license limit?

44. Which of these Panorama features CANNOT be used to directly create or modify Security Policy rules?

45. In a Panorama HA configuration, how is the Device Registration Authentication Key handled for onboarding new firewalls?

46. When viewing the "Rule Usage" column in Panorama for a policy, what does an "Em-dash (—)" indicate?

47. What is the recommended approach for managing the network configurations of firewalls in an active/active HA configuration using Panorama Templates?

48. When an administrator localizes a Panorama pushed configuration on a managed firewall, what specific action related to rule UUIDs is critical for the process to succeed?

49. Which Panorama setting determines if objects defined in ancestor device groups take precedence over objects with the same name defined in descendant device groups?

50. If a Panorama-managed firewall's Device Health Monitoring shows a metric consistently in the "Deviating Devices" tab, what does this typically indicate?