ST Vid11285-Agd2
ST Vid11285-Agd2
Version 10.1
docs.paloaltonetworks.com
Contact Informaon
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support.html
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
©2021–2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks menoned herein may be trademarks of their respecve
companies.
Last Revised
February 22, 2022
Panorama Administrator's Guide Version Version 10.1 2 ©2022 Palo Alto Networks, Inc.
Table of Contents
Panorama Overview........................................................................................ 11
About Panorama........................................................................................................................ 12
Panorama Models......................................................................................................................14
Centralized Firewall Configuraon and Update Management........................................17
Context Switch—Firewall or Panorama.................................................................... 17
Total Configuraon Size for Panorama.....................................................................18
Templates and Template Stacks..................................................................................18
Device Groups................................................................................................................ 20
Centralized Logging and Reporng....................................................................................... 26
Managed Collectors and Collector Groups..............................................................26
Local and Distributed Log Collecon........................................................................27
Caveats for a Collector Group with Mulple Log Collectors...............................28
Log Forwarding Opons...............................................................................................30
Centralized Reporng................................................................................................... 31
Data Redistribuon Using Panorama................................................................................... 33
Role-Based Access Control..................................................................................................... 34
Administrave Roles......................................................................................................34
Authencaon Profiles and Sequences....................................................................36
Access Domains............................................................................................................. 36
Administrave Authencaon....................................................................................37
Panorama Commit, Validaon, and Preview Operaons................................................. 39
Plan Your Panorama Deployment..........................................................................................40
Deploy Panorama: Task Overview........................................................................................ 42
Set Up Panorama............................................................................................. 43
Determine Panorama Log Storage Requirements..............................................................44
Manage Large-Scale Firewall Deployments........................................................................ 46
Determine the Opmal Large-Scale Firewall Deployment Soluon.................. 46
Increased Device Management Capacity for M-600 and Panorama Virtual
Appliance..........................................................................................................................46
Set Up the Panorama Virtual Appliance.............................................................................. 50
Setup Prerequisites for the Panorama Virtual Appliance..................................... 50
Install the Panorama Virtual Appliance.................................................................... 54
Perform Inial Configuraon of the Panorama Virtual Appliance....................114
Set Up The Panorama Virtual Appliance as a Log Collector..............................118
Set Up the Panorama Virtual Appliance with Local Log Collector................... 125
Set up a Panorama Virtual Appliance in Panorama Mode................................. 130
Set up a Panorama Virtual Appliance in Management Only Mode..................131
Expand Log Storage Capacity on the Panorama Virtual Appliance..................132
Panorama Administrator's Guide Version Version 10.1 3 ©2022 Palo Alto Networks, Inc.
Table of Contents
Panorama Administrator's Guide Version Version 10.1 4 ©2022 Palo Alto Networks, Inc.
Table of Contents
Change Cerficates.....................................................................................................273
Panorama Administrator's Guide Version Version 10.1 5 ©2022 Palo Alto Networks, Inc.
Table of Contents
Panorama Administrator's Guide Version Version 10.1 6 ©2022 Palo Alto Networks, Inc.
Table of Contents
Panorama Administrator's Guide Version Version 10.1 7 ©2022 Palo Alto Networks, Inc.
Table of Contents
Troubleshoong..............................................................................................593
Troubleshoot Panorama System Issues..............................................................................594
Generate Diagnosc Files for Panorama............................................................... 594
Diagnose Panorama Suspended State....................................................................594
Monitor the File System Integrity Check.............................................................. 594
Panorama Administrator's Guide Version Version 10.1 8 ©2022 Palo Alto Networks, Inc.
Table of Contents
Panorama Administrator's Guide Version Version 10.1 9 ©2022 Palo Alto Networks, Inc.
Table of Contents
Panorama Administrator's Guide Version Version 10.1 10 ©2022 Palo Alto Networks, Inc.
Panorama Overview
The Panorama™ management server provides centralized monitoring and
management of mulple Palo Alto Networks next-generaon firewalls and of WildFire
appliances and appliance clusters. It provides a single locaon from which you can
oversee all applicaons, users, and content traversing your network, and then use
this knowledge to create applicaon enablement policies that protect and control the
network. Using Panorama for centralized policy and firewall management increases
operaonal efficiency in managing and maintaining a distributed network of firewalls.
Using Panorama for centralized WildFire appliance and WildFire appliance cluster
management increases the number of firewalls a single network supports, provides
high availability for fault tolerance, and increases management efficiency.
11
Panorama Overview
About Panorama
Panorama enables you to effecvely configure, manage, and monitor your Palo Alto Networks
firewalls with central oversight. The three main areas in which Panorama adds value are:
• Centralized configuraon and deployment—To simplify central management and rapid
deployment of the firewalls and WildFire appliances on your network, use Panorama to pre-
stage the firewalls and WildFire appliances for deployment. You can then assemble the firewalls
into groups, and create templates to apply a base network and device configuraon and use
device groups to administer globally shared and local policy rules. See Centralized Firewall
Configuraon and Update Management.
• Aggregated logging with central oversight for analysis and reporng—Collect informaon
on acvity across all the managed firewalls on the network and centrally analyze, invesgate
and report on the data. This comprehensive view of network traffic, user acvity, and the
associated risks empowers you to respond to potenal threats using the rich set of policies to
securely enable applicaons on your network. See Centralized Logging and Reporng.
• Distributed administraon—Enables you to delegate or restrict access to global and local
firewall configuraons and policies. See Role-Based Access Control for delegang appropriate
levels of access for distributed administraon.
Four Panorama Models are available: the Panorama virtual appliance, M-600 appliance,
M-500 appliance, and M-200 appliance are supported in PAN-OS 10.0. Panorama Centralized
Management illustrates how you can deploy Panorama in a high availability (HA) configuraon to
manage firewalls.
Panorama Administrator's Guide Version Version 10.1 12 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Panorama Administrator's Guide Version Version 10.1 13 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Panorama Models
Panorama is available as one of the following virtual or physical appliances, each of which
supports licenses for managing up to 25, 100, or 1,000 firewalls. Addionally, M-600 appliances
support licenses for managing up to 5,000 firewalls and similarly resourced Panorama virtual
appliances support licenses for managing up to 2,500 firewalls:
• Panorama virtual appliance—This model provides simple installaon and facilitates server
consolidaon for sites that need a virtual management appliance. You can install Panorama on
Alibaba Cloud, Amazon Web Services (AWS), AWS GovCloud, Microso Azure, Google Cloud
Plaorm (GCP), KVM, Hyper-V, Oracle Cloud Infrastructure (OCI), a VMware ESXi server, or
on VMware vCloud Air. The virtual appliance can collect firewall logs locally at rates of up to
20,000 logs per second and can manage Dedicated Log Collectors for higher logging rates. The
virtual appliance can funcon as a dedicated management server, a Panorama management
server with local log collecon capabilies, or as a Dedicated Log Collector. For the supported
interfaces, log storage capacity, and maximum log collecon rates, see the Setup Prerequisites
for the Panorama Virtual Appliance. You can deploy the virtual appliance in the following
modes:
• Panorama mode—In this mode, the Panorama virtual appliance supports a local Log
Collector with 1 to 12 virtual logging disks (see Deploy Panorama Virtual Appliances with
Local Log Collectors). Each logging disk has 2TB of storage capacity for a total maximum of
24TB on a single virtual appliance and 48TB on a high availability (HA) pair. Only Panorama
mode enables you to add mulple virtual logging disks without losing logs on exisng disks.
Panorama mode also provides the benefit of faster report generaon. In Panorama mode,
the virtual appliance does not support NFS storage.
As a best pracce, deploy the virtual appliance in Panorama mode to opmize log
storage and report generaon.
• Legacy mode (ESXi and vCloud Air only)—In this mode, the Panorama virtual appliance
receives and stores firewall logs without using a local Log Collector (see Deploy Panorama
Virtual Appliances in Legacy Mode with Local Log Collecon). By default, the virtual
appliance in Legacy mode has one disk paron for all data. Approximately 11GB of the
paron is allocated to log storage. If you need more local log storage, you can add one
virtual disk of up to 8TB on ESXi 5.5 and later versions or on vCloud Air. Earlier ESXi
versions support one virtual disk of up to 2TB. If you need more than 8TB, you can mount
the virtual appliance in Legacy mode to an NFS datastore but only on the ESXi server, not in
vCloud Air. This mode is only available if your Panorama virtual appliance is in Legacy mode
on upgrade to PAN-OS 10.0. On upgrade to PAN-OS 9.0 and later releases, Legacy mode is
no longer available if you change to any other mode. If you change your Panorama virtual
appliance from Legacy mode to one of the available modes, you will no longer be able to
change back into Legacy mode.
Panorama Administrator's Guide Version Version 10.1 14 ©2022 Palo Alto Networks, Inc.
Panorama Overview
except for config and system logs and requires a Dedicated Log Collector to these store logs.
By default, the virtual appliance in Management Only mode has only one disk paron for
all data so all logs forwarded to a Panorama virtual appliance in Management Only mode
are dropped. Therefore, to store the log data from your managed appliances, you must
configure log forwarding in order to store the log data from your managed devices. For more
informaon, see Increased Device Management Capacity Requirements.
• Log Collector mode—The Panorama virtual appliance funcons as a Dedicated Log
Collector. If mulple firewalls forward large volumes of log data, a Panorama virtual
appliance in Log Collector mode provides increased scale and performance. In this mode, the
appliance does not have a web interface for administrave access; it has only a command
line interface (CLI). However, you can manage the appliance using the web interface of the
Panorama management server. CLI access to a Panorama virtual appliance in Log Collector
mode is necessary only for inial setup and debugging. For configuraon details, see Deploy
Panorama with Dedicated Log Collectors.
• M-Series appliance—The M-200, M-500, and M-600 appliances are dedicated hardware
appliances intended for large-scale deployments. In environments with high logging rates
(over 10,000 logs per second) and log retenon requirements, these appliances enable scaling
of your log collecon infrastructure. For the supported interfaces, log storage capacity, and
maximum log collecon rates, see M-Series Appliance Interfaces. All M-Series models share the
following aributes:
• RAID drives to store firewall logs and RAID 1 mirroring to protect against disk failures
• SSD to store the logs that Panorama and Log Collectors generate
• MGT, Eth1, Eth2, and Eth3 interfaces that support 1Gbps throughput
• Redundant, hot-swappable power supplies
• front-to-back airflow
The M-600 and M-500 appliances have the following addional aributes, which make them
more suitable for data centers:
• Eth4 and Eth5 interfaces that support 10Gbps throughput
Addionally, the following aribute makes the M-600 appliance more suitable for large-scale
firewall deployments:
• The M-600 appliance in Management Only mode can manage up to 5,000 firewalls.
You can deploy the M-Series appliances in the following modes:
• Panorama mode—The appliance funcons as a Panorama management server to manage
firewalls and Dedicated Log Collectors. The appliance also supports a local Log Collector to
aggregate firewall logs. Panorama mode is the default mode. For configuraon details, see
Deploy Panorama M-Series Appliances with Local Log Collectors.
• Management Only mode—The Panorama appliance is a dedicated management appliance
for your managed devices and Dedicated Log Collectors. The Panorama appliance has no
log collecon capabilies except for config and system logs and your deployment requires
a Dedicated Log Collector to store these logs. By default, the Panorama appliance in
Management Only mode has only one disk paron for all data so all logs forwarded to a
Panorama virtual appliance in Management Only mode are dropped. Therefore, to store the
Panorama Administrator's Guide Version Version 10.1 15 ©2022 Palo Alto Networks, Inc.
Panorama Overview
log data from your managed appliances, you must configure log forwarding in order to store
the log data from your managed devices.
• Log Collector mode—The appliance funcons as a Dedicated Log Collector. If mulple
firewalls forward large volumes of log data, an M-Series appliance in Log Collector mode
provides increased scale and performance. IIn this mode, the appliance does not have a web
interface for administrave access; it has only a command line interface (CLI). However, you
can manage the appliance using the web interface of the Panorama management server. CLI
access to an M-Series appliance in Log Collector mode is necessary only for inial setup and
debugging. For configuraon details, see Deploy Panorama with Dedicated Log Collectors.
For more details and specificaons for the M-Series appliances, see the M-Series Appliance
Hardware Reference Guides.
Panorama Administrator's Guide Version Version 10.1 16 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Panorama Administrator's Guide Version Version 10.1 17 ©2022 Palo Alto Networks, Inc.
Panorama Overview
During the context switch, Panorama validates if the admin has access to a specific vsys or for all
vsys. If the admin has access to all vsys, then Panorama uses the device admin role context switch.
If the admin has access to one or some of the vsys, then Panorama uses the vsys admin role to
context switch.
M-500 120MB
M-600 150MB
Panorama Administrator's Guide Version Version 10.1 18 ©2022 Palo Alto Networks, Inc.
Panorama Overview
with locaon- or funcon-specific sengs and then stack the templates in descending order of
priority so that firewalls inherit the sengs based on the order of the templates in the stack.
Both templates and template stacks support variables. Variables allow you to create placeholder
objects with their value specified in the template or template stack based on your configuraon
needs. Create a template or template stack variable to replace IP addresses, Group IDs, and
interfaces in your configuraons. Template variables are inherited by the template stack and you
can override them to create a template stack variable. However, templates do not inherit variables
defined in the template stack. When a variable is defined in the template or template stack and
pushed to the firewall, the value defined for the variable is displayed on the firewall.
Use templates to accommodate firewalls that have unique sengs. Alternavely, you can push
a broader, common base configuraon and then override certain pushed sengs with firewall-
specific values on individual firewalls. When you override a seng on the firewall, the firewall
saves that seng to its local configuraon and Panorama no longer manages the seng. To
restore template values aer you override them, use Panorama to force the template or template
stack configuraon onto the firewall. For example, aer you define a common NTP server in a
template and override the NTP server configuraon on a firewall to accommodate a local me
zone, you can later revert to the NTP server defined in the template.
When defining a template stack, consider assigning firewalls that are the same hardware model
and require access to similar network resources, such as gateways and syslog servers. This enables
you to avoid the redundancy of adding every seng to every template stack. The following figure
illustrates an example configuraon in which you assign data center firewalls in the Asia-Pacific
(APAC) region to a stack with global sengs, one template with APAC-specific sengs, and one
template with data center-specific sengs. To manage firewalls in an APAC branch office, you can
then re-use the global and APAC-specific templates by adding them to another stack that includes
a template with branch-specific sengs. Templates in a stack have a configurable priority order
that ensures Panorama pushes only one value for any duplicate seng. Panorama evaluates the
templates listed in a stack configuraon from top to boom with higher templates having priority.
The following figure illustrates a data center stack in which the data center template has a higher
priority than the global template: Panorama pushes the idle meout value from the data center
template and ignores the value from the global template.
Panorama Administrator's Guide Version Version 10.1 19 ©2022 Palo Alto Networks, Inc.
Panorama Overview
You cannot use templates or template stacks to set firewall modes: virtual private network (VPN)
mode, mulple virtual systems (mul-vsys) mode, or operaonal modes (normal or FIPS-CC mode).
For details, see Template Capabilies and Excepons. However, you can assign firewalls that
have non-matching modes to the same template or stack. In such cases, Panorama pushes mode-
specific sengs only to firewalls that support those modes. As an excepon, you can configure
Panorama to push the sengs of the default vsys in a template to firewalls that don’t support
virtual systems or that don’t have any virtual systems configured.
For the relevant procedures, see Manage Templates and Template Stacks.
Device Groups
To use Panorama effecvely, you have to group the firewalls in your network into logical units
called device groups. A device group enables grouping based on network segmentaon, geographic
locaon, organizaonal funcon, or any other common aspect of firewalls that require similar
policy configuraons. Using device groups, you can configure policy rules and the objects they
reference. You can organize device group hierarchically, with shared rules and objects at the top,
and device group-specific rules and objects at subsequent levels. This enables you to create a
hierarchy of rules that enforce how firewalls handle traffic. For example, you can define a set of
shared rules as a corporate acceptable use policy. Then, to allow only regional offices to access
peer-to-peer traffic such as BitTorrent, you can define a device group rule that Panorama pushes
only to the regional offices (or define a shared security rule and target it to the regional offices).
For the relevant procedures, see Manage Device Groups. The following topics describe device
group concepts and components in more detail:
• Device Group Hierarchy
• Device Group Policies
Panorama Administrator's Guide Version Version 10.1 20 ©2022 Palo Alto Networks, Inc.
Panorama Overview
For details on the order in which firewalls evaluate policy rules in a device group hierarchy, see
Device Group Policies. For details on overriding the values of objects that device groups inherit
from ancestor device groups, see Device Group Objects.
In a mulple Panorama plugin deployment to perform, a device group containing firewalls
deployed in a parcular hypervisor cannot be the child or parent of a device group containing
firewalls deployed in a different hypervisor. For example, if Panorama receives IP address updates
from VMware NSX-V and AWS, you cannot create a device group of NSX-V VM-Series firewalls
that is a child of an AWS VM-Series firewall device group.
Panorama Administrator's Guide Version Version 10.1 21 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Panorama Administrator's Guide Version Version 10.1 22 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Shared pre-rules Panorama pushes shared pre-rules These rules are visible on firewalls
to all the firewalls in all device but you can only manage them in
Device group pre- groups. Panorama pushes device Panorama.
rules group-specific pre-rules to all the
firewalls in a parcular device group
and its descendant device groups.
If a firewall inherits rules from
device groups at mulple levels
in the device group hierarchy, it
evaluates pre-rules in the order of
highest to lowest level. This means
the firewall first evaluates shared
rules and last evaluates the rules of
device groups with no descendants.
You can use pre-rules to enforce
the acceptable use policy of an
organizaon. For example, a pre-
rule might block access to specific
URL categories or allow Domain
Name System (DNS) traffic for all
users.
Local firewall Local rules are specific to a single A local firewall administrator, or
rules firewall or virtual system (vsys). a Panorama administrator who
switches to a local firewall context,
can edit local firewall rules.
Device group Panorama pushes shared post- These rules are visible on firewalls
post-rules rules to all the firewalls in all device but you can only manage them in
groups. Panorama pushes device Panorama.
Shared post-rules group-specific post-rules to all the
firewalls in a parcular device group
and its descendant device groups.
If a firewall inherits rules from
device groups at mulple levels
in the device group hierarchy, it
evaluates post-rules in the order
of lowest to highest level. This
means the firewall first evaluates
the rules of device groups with no
descendants and last evaluates
shared rules.
Post-rules typically include rules
to deny access to traffic based on
the App-ID™ signatures, User-ID™
Panorama Administrator's Guide Version Version 10.1 23 ©2022 Palo Alto Networks, Inc.
Panorama Overview
intrazone-default The default rules apply only to Default rules are inially read-
the Security rulebase, and are only, either because they are part
interzone-default
predefined on Panorama (at the of the predefined configuraon
Shared level) and the firewall (in or because Panorama pushed
each vsys). These rules specify how them to firewalls. However, you
PAN-OS handles traffic that doesn’t can override the rule sengs for
match any other rule. tags, acon, logging, and security
profiles. The context determines
The intrazone-default rule allows all
the level at which you can override
traffic within a zone. The interzone-
the rules:
default rule denies all traffic
between zones. • Panorama—At the Shared or
device group level, you can
If you override default rules, their
override default rules that
order of precedence runs from
are part of the predefined
the lowest context to the highest:
configuraon.
overridden sengs at the firewall
level take precedence over sengs • Firewall—You can override
at the device group level, which default rules that are part of
take precedence over sengs at the predefined configuraon
the Shared level. on the firewall or vsys, or that
Panorama pushed from the
Shared locaon or a device
group.
Panorama Administrator's Guide Version Version 10.1 24 ©2022 Palo Alto Networks, Inc.
Panorama Overview
configure Panorama to push only referenced objects. For details, see Manage Unused Shared
Objects.
• Precedence of ancestor and descendant objects—By default, when device groups at mulple
levels in the hierarchy have an object with the same name but different values (because of
overrides, as an example), policy rules in a descendant device group use the object values in
that descendant instead of object values inherited from ancestor device groups or Shared.
Oponally, you can reverse this order of precedence to push values from Shared or the highest
ancestor containing the object to all descendant device groups. For details, see Manage
Precedence of Inherited Objects.
Panorama Administrator's Guide Version Version 10.1 25 ©2022 Palo Alto Networks, Inc.
Panorama Overview
If you forward logs to a Panorama virtual appliance in Legacy mode, it stores the logs
locally without a Log Collector.
Panorama Administrator's Guide Version Version 10.1 26 ©2022 Palo Alto Networks, Inc.
Panorama Overview
For local log collecon, you can also forward logs to a Panorama virtual appliance in
Legacy mode, which stores the logs without using a Log Collector as a logical container.
Dedicated Log Collectors are M-600, M-500, M-200, or Panorama virtual appliance in Log
Collector mode. Because they perform only log collecon, not firewall management, Dedicated
Log Collectors allow for a more robust environment than local Log Collectors. Dedicated Log
Collectors provide the following benefits:
• Enable the Panorama management server to use more resources for management funcons
instead of logging.
• Provide high-volume log storage on a dedicated hardware appliance.
• Enable higher logging rates.
• Provide horizontal scalability and redundancy with RAID 1 storage.
• Opmize bandwidth resources in networks where more bandwidth is available for firewalls to
send logs to nearby Log Collectors than to a remote Panorama management server.
• Enable you to meet regional regulatory requirements (for example, regulaons might not allow
logs to leave a parcular region).
Panorama Administrator's Guide Version Version 10.1 27 ©2022 Palo Alto Networks, Inc.
Panorama Overview
You can deploy the Panorama management server in an HA configuraon but not the
Dedicated Log Collectors.
FW1 L1,L2,L3
FW2 L4,L5,L6
Panorama Administrator's Guide Version Version 10.1 28 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Using this list, FW1 will forward logs to L1 so long as that primary Log Collector is available.
However, based on the hash algorithm, Panorama might choose L2 as the owner that writes the
logs to its disks. If L2 becomes inaccessible or has a chassis failure, FW1 will not know because it
can sll connect to L1.
In the case where a Collector Group has only one Log Collector and the Log Collector fails, the
firewall stores the logs to its HDD/SSD (the available storage space varies by firewall model). As
soon as connecvity is restored to the Log Collector, the firewall resumes forwarding logs where it
le off before the failure occurred.
In the case of a Collector Group with mulple Log Collectors, the firewall does not buffer logs to
its local storage if only one Log Collector is down. In the example scenario where L2 is down, FW1
connues sending logs to L1, and L1 stores the log data that would be sent to L2. Once L2 is back
up, L1 no longer stores log data intended for L2 and distribuon resumes as expected. If one of
the Log Collectors in a Collector Group goes down, the logs that would be wrien to the down
Log Collector are redistributed to the next Log Collector in the preference list.
Palo Alto Networks recommends adding at least three Log Collectors to a Collector Group
to avoid split brain and log ingeson issues should one Log Collector go down. See the
changes to default Collector Group behavior for more informaon.
Palo Alto Networks recommends the following migaons if using mulple Log Collectors in a
Collector Group:
• Enable log redundancy when you Configure a Collector Group. This ensures that no logs are
lost if any one Log Collector in the Collector Group becomes unavailable. Each log will have
Panorama Administrator's Guide Version Version 10.1 29 ©2022 Palo Alto Networks, Inc.
Panorama Overview
two copies and each copy will reside on a different Log Collector. Log redundancy is available
only if each Log Collector has the same number of logging disks.
Because enabling redundancy creates more logs, this configuraon requires more
storage capacity. When a Collector Group runs out of space, it deletes older logs.
Enabling redundancy doubles the log processing traffic in a Collector Group, which
reduces its maximum logging rate by half, as each Log Collector must distribute a copy
of each log it receives.
• Obtain an On-Site-Spare (OSS) to enable prompt replacement if a Log Collector failure occurs.
• In addion to forwarding logs to Panorama, configure forwarding to an external service as
backup storage. The external service can be a syslog server, email server, SNMP trap server, or
HTTP server.
You can configure each Collector Group to forward logs to different desnaons.
Panorama Administrator's Guide Version Version 10.1 30 ©2022 Palo Alto Networks, Inc.
Panorama Overview
• Forward logs from firewalls to Panorama and to external services in parallel—In this
configuraon, both Panorama and the external services are endpoints of separate log
forwarding flows; the firewalls don’t rely on Panorama to forward logs to external services. This
configuraon is best for deployments in which the connecons between firewalls and external
services have sufficient bandwidth to sustain the logging rate, which is oen the case when the
connecons are local.
Centralized Reporng
Panorama aggregates logs from all managed firewalls and enables reporng on the aggregated
data for a global view of applicaon use, user acvity, and traffic paerns across the enre
network. As soon as the firewalls are added to Panorama, the ACC can display all traffic traversing
Panorama Administrator's Guide Version Version 10.1 31 ©2022 Palo Alto Networks, Inc.
Panorama Overview
your network. With logging enabled, clicking into a log entry in the ACC provides direct access to
granular details about the applicaon.
For generang reports, Panorama uses two sources: the local Panorama database and the remote
firewalls that it manages. The Panorama database refers to the local storage on Panorama that
is allocated for storing both summarized logs and some detailed logs. If you have a distributed
Log Collecon deployment, the Panorama database includes the local storage on Panorama
and all the managed Log Collectors. Panorama summarizes the informaon—traffic, applicaon,
threat— collected from all managed firewalls at 15-minute intervals. Using the local Panorama
database allows for faster response mes, however, if you prefer to not forward logs to Panorama,
Panorama can directly access the remote firewall and run reports on data that is stored locally on
the managed firewalls.
Panorama offers more than 40 predefined reports that can be used as is, or they can be
customized by combining elements of other reports to generate custom reports and report groups
that can be saved. Reports can be generated on demand, on a recurring schedule, and can be
scheduled for email delivery. These reports provide informaon on the user and the context so
that you correlate events and idenfy paerns, trends, and potenal areas of interest. With the
integrated approach to logging and reporng, the ACC enables correlaon of entries from mulple
logs relang to the same event.
For more informaon, see Monitor Network Acvity.
Panorama Administrator's Guide Version Version 10.1 32 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Panorama Administrator's Guide Version Version 10.1 33 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Instead of using the default account for all administrators, it is a best pracce to create a
separate administrave account for each person who needs access to the administrave
or reporng funcons on Panorama. This provides beer protecon against unauthorized
configuraon changes and enables Panorama to log and idenfy the acons of each
administrator.
• Administrave Roles
• Authencaon Profiles and Sequences
• Access Domains
• Administrave Authencaon
Administrave Roles
You configure administrator accounts based on the security requirements of your organizaon,
any exisng authencaon services that your network uses, and the required administrave roles.
A role defines the type of system access that is available to an administrator. You can define and
restrict access as broadly or granularly as required, depending on the security requirements of
your organizaon. For example, you might decide that a data center administrator can have access
to all device and networking configuraons, but a security administrator can control only security
policy definions, while other key individuals can have limited CLI or XML API access. The role
types are:
• Dynamic Roles—These are built-in roles that provide access to Panorama and managed
firewalls. When new features are added, Panorama automacally updates the definions of
dynamic roles; you never need to manually update them. The following table lists the access
privileges associated with dynamic roles.
Panorama Administrator's Guide Version Version 10.1 34 ©2022 Palo Alto Networks, Inc.
Panorama Overview
• Admin Role Profiles—To provide more granular access control over the funconal areas of the
web interface, CLI, and XML API, you can create custom roles. When new features are added
to the product, you must update the roles with corresponding access privileges: Panorama does
not automacally add new features to custom role definions. You select one of the following
profile types when you Configure an Admin Role Profile.
Panorama For these roles, you can assign read-write access, read-only access,
or no access to all the Panorama features that are available to
the superuser dynamic role except the management of Panorama
administrators and Panorama roles. For the laer two features, you can
assign read-only access or no access, but you cannot assign read-write
access.
An example use of a Panorama role would be for security administrators
who require access to security policy definions, logs, and reports on
Panorama.
Custom Panorama admin roles have the following limitaons:
• No access to Reboot Panorama (Panorama > Setup > Operaons)
• No access to Generate Tech Support File, Generate Stats Dump File,
and Download Core Files (Panorama > Support)
Device Group and For these roles, you can assign read-write access, read-only access, or
Template no access to specific funconal areas within device groups, templates,
and firewall contexts. By combining these roles with Access Domains,
you can enforce the separaon of informaon among the funconal or
regional areas of your organizaon. Device Group and Template roles
have the following limitaons:
• No access to the CLI or XML API
Panorama Administrator's Guide Version Version 10.1 35 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Access Domains
Access domains control administrave access to specific Device Groups and templates, and also
control the ability to switch context to the web interface of managed firewalls. Access domains
apply only to administrators with Device Group and Template roles. Mapping Administrave
Roles to access domains enables very granular control over the informaon that administrators
access on Panorama. For example, consider a scenario where you configure an access domain
that includes all the device groups for firewalls in your data centers and you assign that access
domain to an administrator who is allowed to monitor data center traffic but who is not allowed
to configure the firewalls. In this case, you would map the access domain to a role that enables
all monitoring privileges but disables access to device group sengs. Addionally, Device Group
and Template admins can perform administrave tasks for managed firewalls in their access
Panorama Administrator's Guide Version Version 10.1 36 ©2022 Palo Alto Networks, Inc.
Panorama Overview
domain such as viewing the configuraon and system logs, perform configuraon audits, review
pending tasks, and directly access firewall operaons such as reboot, generang a tech support
file, execung a stats dump, and exporng a core file.
You configure access domains in the local Panorama configuraon and then assign them to
administrave accounts and roles. You can perform the assignment locally or use an external
SAML, TACACS+, or RADIUS server. Using an external server enables you to quickly reassign
access domains through your directory service instead of reconfiguring sengs on Panorama.
To use an external server, you must define a server profile that enables Panorama to access the
server. You must also define Vendor-Specific Aributes (VSAs) on the RADIUS or TACACS+ server,
or SAML aributes on the SAML IdP server.
For example, if you use a RADIUS server, you would define a VSA number and value for each
administrator. The value defined has to match the access domain configured on Panorama.
When an administrator tries to log in to Panorama, Panorama queries the RADIUS server for the
administrator access domain and aribute number. Based on the response from the RADIUS
server, the administrator is authorized for access and is restricted to the firewalls, virtual systems,
device groups, and templates that are assigned to the access domain.
For the relevant procedures, see:
• Configure an Access Domain.
• Configure RADIUS Authencaon for Panorama Administrators.
• Configure TACACS+ Authencaon for Panorama Administrators.
• Configure SAML Authencaon for Panorama Administrators.
Administrave Authencaon
You can configure the following types of authencaon and authorizaon (Administrave Roles
and Access Domains) for Panorama administrators:
AuthencaonAuthorizaon Descripon
Method Method
SSH Keys Local The administrave accounts are local to Panorama, but
authencaon to the CLI is based on SSH keys. You use Panorama
to assign administrave roles and access domains to the accounts.
For details, see Configure an Administrator with SSH Key-Based
Authencaon for the CLI.
Panorama Administrator's Guide Version Version 10.1 37 ©2022 Palo Alto Networks, Inc.
Panorama Overview
AuthencaonAuthorizaon Descripon
Method Method
You use Panorama to assign administrave roles and access
domains to the accounts. For details, see Configure a Panorama
Administrator with Cerficate-Based Authencaon for the Web
Interface.
Panorama Administrator's Guide Version Version 10.1 38 ©2022 Palo Alto Networks, Inc.
Panorama Overview
For details on candidate and running configuraons, see Manage Panorama and Firewall
Configuraon Backups.
To prevent mulple administrators from making configuraon changes during concurrent
sessions, see Manage Locks for Restricng Configuraon Changes.
When pushing configuraons to managed firewalls, Panorama pushes the running
configuraon. Because of this, Panorama does not let you push changes to managed
firewalls unl you first commit the changes to Panorama.
Panorama Administrator's Guide Version Version 10.1 39 ©2022 Palo Alto Networks, Inc.
Panorama Overview
Panorama Administrator's Guide Version Version 10.1 40 ©2022 Palo Alto Networks, Inc.
Panorama Overview
and the number of days for which you want to store logs on Panorama. For details, see
Determine Panorama Log Storage Requirements.
• Do you need to forward logs to external services (such as a syslog server) in addion to
Panorama? See Log Forwarding Opons.
• Do you want to own or manage your own log storage on premises, or do you want to
leverage the Cortex Data Lake provided by Palo Alto Networks?
• If you need a long-term storage soluon, do you have a Security Informaon and Event
Management (SIEM) soluon, such as Splunk or ArcSight, to which you can forward logs?
• Do you need redundancy in logging?
If you configure a Collector Group with mulple Log Collectors, you can enable redundancy
to ensure that no logs are lost if any one Log Collector becomes unavailable (see Caveats for
a Collector Group with Mulple Log Collectors).
If you deploy Panorama virtual appliances in Legacy mode in an HA configuraon, the
managed firewalls can send logs to both HA peers so that a copy of each log resides on
each peer. This redundancy opon is enabled by default (see Modify Log Forwarding and
Buffering Defaults).
• Will you log to a Network File System (NFS)? If the Panorama virtual appliance is in Legacy
mode and does not manage Dedicated Log Collectors, NFS storage is the only opon for
increasing log storage capacity beyond 8TB. NFS storage is available only if Panorama runs
on an ESXi server. If you use NFS storage, keep in mind that the firewalls can send logs only
to the primary peer in the HA pair; only the primary peer is mounted to the NFS and can
write to it.
Determine which role-based access privileges administrators require to access managed
firewalls and Panorama. See Set Up Administrave Access to Panorama.
Plan the required Device Groups. Consider whether to group firewalls based on funcon,
security policy, geographic locaon, or network segmentaon. An example of a funcon-based
device group is one that contains all the firewalls that a Research and Development team uses.
Consider whether to create smaller device groups based on commonality, larger device groups
to scale more easily, or a Device Group Hierarchy to simplify complex layers of administraon.
Plan a layering strategy for administering policies. Consider how firewalls inherit and evaluate
policy rules within the Device Group Hierarchy, and how to best implement shared rules,
device-group rules, and firewall-specific rules to meet your network needs. For visibility and
centralized policy management, consider using Panorama for administering rules even if you
need firewall-specific excepons for shared or device group rules. If necessary, you can Push a
Policy Rule to a Subset of Firewalls within a device group.
Plan the organizaon of your firewalls based on how they inherit network configuraon
sengs from Templates and Template Stacks. For example, consider assigning firewalls to
templates based on hardware models, geographic proximity, and similar network needs for me
zones, a DNS server, and interface sengs.
Panorama Administrator's Guide Version Version 10.1 41 ©2022 Palo Alto Networks, Inc.
Panorama Overview
STEP 2 | Perform inial configuraon to enable network access to Panorama. See Set Up the
Panorama Virtual Appliance or Set Up the M-Series Appliance.
STEP 5 | (Recommended) Set up Panorama in a high availability configuraon. See Panorama High
Availability.
STEP 7 | Add a Device Group or Create a Device Group Hierarchy, Add a Template, and (if applicable)
Configure a Template Stack.
STEP 8 | (Oponal) Configure log forwarding to Panorama and/or to external services. See Manage
Log Collecon.
STEP 9 | Monitor Network Acvity using the visibility and reporng tools on Panorama.
Panorama Administrator's Guide Version Version 10.1 42 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
For centralized reporng and cohesive policy management across all the firewalls
on your network, you can deploy the Panorama™ management server as a virtual
appliance or as a hardware appliance (the M-200, M-500 or M-600 appliance).
The following topics describe how to set up Panorama on your network:
> Determine Panorama Log Storage > Install the Panorama Device
Requirements Cerficate
> Manage Large-Scale Firewall > Transion to a Different Panorama
Deployments Model
> Set Up the Panorama Virtual > Access and Navigate Panorama
Appliance Management Interfaces
> Set Up the M-Series Appliance > Set Up Administrave Access to
> Register Panorama and Install Panorama
Licenses > Set Up Authencaon Using Custom
Cerficates
43
Set Up Panorama
If your organizaon requires the removal of logs aer a certain period, you can set the
expiraon period for each log type. You can also set a storage quota for each log type
as a percentage of the total space if you need to priorize log retenon by type. For
details, see Manage Storage Quotas and Expiraon Periods for Logs and Reports.
• If Panorama is already collecng logs, run the following command at the CLI of
each appliance that receives logs (Panorama management server or Dedicated Log
Panorama Administrator's Guide Version Version 10.1 44 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Collector) and calculate the total rates. This command gives the average logging rate
for the last five minutes.
You can also use an SNMP manager to determine the logging rates of Log
Collectors (see the panLogCollector MIB, OID 1.3.6.1.4.1.25461.1.1.6) and
firewalls (see the panDeviceLogging, OID 1.3.6.1.4.1.25461.2.1.2.7).
2. Calculate the average of the sampled rates.
3. Calculate the daily logging rate by mulplying the average logs-per-second by 86,400.
This formula provides only an esmate; the exact amount of required storage will differ
from the formula result.
Panorama Administrator's Guide Version Version 10.1 45 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 46 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
mode. Managing such large deployments from a single Panorama management server alleviates
the operaonal complexity of configuraon management and reduces the security and compliance
risk of managing mulple Panorama management servers.
For log collecon, a single Panorama management server is ideal because it provides a centralized
locaon to view and analyze log data from managed devices rather than requiring you to access
each individual Panorama management server. To provide redundancy in the event of system or
network failure, Palo Alto Networks recommends deploying two Panorama management servers
in a high availability (HA) configuraon. For Panorama system and config logs, an addional disk
with a minimum 92GB capacity is required. This addional disk is automacally detected by the
Panorama virtual appliance when Panorama is rebooted and mounted as a paron for system
and config log storage.
For generang pre-defined reports, you must enable Panorama to use Panorama data for pre-
defined reports. This generates pre-defined reports using log data already collected by Panorama
or the Dedicated Log Collector, which reduces the resource ulizaon when generang reports.
Enabling this seng is required, otherwise Panorama performance may be impacted, and
Panorama may become unresponsive.
To manage up to 5,000 firewalls, the Panorama management server must meet the following
minimum requirements:
CPUs 56 28
Panorama Administrator's Guide Version Version 10.1 47 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Logging and Reporng Enable the Use Panorama Data for Pre-Defined Reports seng
(Panorama > Setup > Management > Logging and Reporng
Sengs > Log Export and Reporng)
STEP 3 | Change the Panorama management server to Management Only mode if Panorama is not
already in this mode.
• Begin at Step 5 to Set Up an M-Series Appliance in Management Only Mode.
• Set up a Panorama Virtual Appliance in Management Only Mode.
Panorama Administrator's Guide Version Version 10.1 48 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Select Panorama > Licenses and verify that the device management license is successfully
acvated.
If you are acvang a new device management license on a Panorama, you can
manage up to 5,000 firewalls with an M-600 appliance, or up to 2,500 firewalls with a
Panorama virtual appliance, but the Descripon sll displays Device management
license to manage up to 1000 devices or more.
Panorama Administrator's Guide Version Version 10.1 49 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
These topics assume you are familiar with the public and private hypervisor products
required to create the virtual appliance, and don’t cover any related concepts or
terminology.
Panorama Administrator's Guide Version Version 10.1 50 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
whether you will run the virtual appliance in Panorama mode or Management Only mode. For
details on the modes, see Panorama Models.
If you install Panorama on VMware vCloud Air, you set the system sengs during
installaon.
Review the minimum resource requirements for deploying the Panorama virtual appliance on
Alibaba Cloud, Amazon Web Services (AWS), AWS GovCloud, Microso Azure, Google Cloud
Plaorm (GCP), Hyper-V, KVM, Oracle Cloud Infrastructure (OCI), and VMware ESXi to ensure
that the virtual machine meets the minimum required resources for the desired mode (Panorama,
Management Only, or Log Collector). The minimum resource requirements for the Panorama
virtual appliance are designed to help you achieve the maximum number of logs per second (LPS)
for log collecon in Panorama and Log Collector mode. If you add or remove virtual logging disks
that results in a configuraon that does not meet or exceed the number of virtual logging disks
recommended (below), your LPS will be reduced.
If the minimum resource requirements are not met for Panorama mode when you Install the
Panorama Virtual Appliance, Panorama defaults to Management Only mode for all supported
public (Alibaba Cloud, AWS, AWS GovCloud, Azure, GCP, and OCI) and private (Hyper-V,
KVM, and VMware ESXi) hypervisors. If the minimum resource requirements are not met for
Management Only mode, Panorama defaults to Maintenance mode for all supported public
hypervisors, Hyper-V, and KVM. If the minimum resource requirements for Management Only
mode are not met when you Install Panorama on VMware, Panorama defaults to Legacy mode.
Virtual • VMware ESXi and vCloud Air—64-bit kernel-based VMware ESXi 6.0, 6.5, 6.7,
hardware or 7.0. The supported version of the virtual hardware family type (also known
version as the VMware virtual hardware version) on the ESXi server is vmx-10
• Hyper-V—Windows Server 2016 with Hyper-V role or Hyper-V 2016
• KVM—Ubuntu version 16.04 or CentOS7
In Panorama mode, the virtual appliance running on any ESXi version supports
up to 12 virtual logging disks with 2TB of log storage each, for a total maximum
capacity of 24TB.
(VMware ESXi and vCloud Air only) In Legacy mode, the virtual appliance
supports one virtual logging disk. ESXi 5.5 and later versions supports one disk of
up to 8TB. Earlier ESXi versions support one disk of up to 2TB.
Panorama Administrator's Guide Version Version 10.1 51 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
(ESXi and To install the Panorama virtual appliance and manage its resources, you must
vCloud Air install a VMware vSphere Client or VMware Infrastructure Client that is
only) compable with your ESXi server.
Client
computer
Minimum • 16 CPUs The minimum resources below do not take LPS into
CPUs and • 32GB memory consideraon and are only required for the Panorama
memory virtual appliance to funcon based on the number of
Panorama Administrator's Guide Version Version 10.1 52 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Supported Interfaces
Interfaces can be used for device management, log collecon, Collector Group communicaon,
licensing and soware updates. The Panorama virtual appliance supports up to six interfaces
(MGT and Eth1 - Eth5).
Panorama Administrator's Guide Version Version 10.1 53 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
As a best pracce, install the virtual appliance in Panorama mode to opmize log storage
and report generaon. For details on Panorama and Legacy mode, see Panorama Models.
Panorama Administrator's Guide Version Version 10.1 54 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 55 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The virtual appliance boots up in Panorama mode if you allocate sufficient CPUs
and Memory and add a virtual logging disk (later in this procedure). Otherwise,
the appliance boots up in Management Only mode. For details on the modes, see
Panorama Models.
3. Set the SCSI Controller to LSI Logic Parallel.
4. (Oponal) Add a virtual logging disk.
1. Add a disk, select Hard Disk as the hardware type, and click Next.
2. Create a new virtual disk and click Next.
3. Set the Disk Size to exactly 2TB.
In Panorama mode, you can later add addional logging disks (for a total
of 12) with 2TB of storage each. Expanding the size of a logging disk that is
already added to Panorama is not supported.
4. Select your preferred Disk Provisioning disk format.
Consider your business needs when selecng the disk provisioning format. For more
informaon regarding the disk provisioning performance consideraons, refer to the
VMware Thick vs Thin Disks and All Flash Arrays document, or addional VMware
documentaon.
When adding mulple logging disks, it is a best pracce to select the same
Disk Provisioning format for all disks to avoid any unexpected performance
issues that may arise.
5. Select Specify a datastore or datastore structure as the locaon, Browse to a
datastore that has sufficient storage, click OK, and click Next.
6. Select a SCSI Virtual Device Node (you can use the default selecon) and click Next.
Panorama will fail to boot if you select a format other than SCSI.
Panorama Administrator's Guide Version Version 10.1 56 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
STEP 6 | Increase the System Disk for Panorama on an ESXi Server if you intend to use the Panorama
virtual appliance for the following:
• Manage your SD-WAN deployment in Panorama mode.
• Requires addional storage space for dynamic updates when managing large-scale firewall
deployments.
Panorama Administrator's Guide Version Version 10.1 57 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on an ESXi Server as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on an ESXi Server.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
• For SD-WAN deployments.
1. Increase the System Disk for Panorama on an ESXi Server
To leverage SD-WAN on Panorama deployed on ESXi, you must increase the system disk
to 224GB.
You cannot migrate back to a 81GB system disk aer successfully increasing the
system disk to 224GB.
2. Set up a Panorama Virtual Appliance in Management Only Mode.
3. Add a Virtual Disk to Panorama on an ESXi Server.
To leverage SD-WAN, you must add a single 2TB logging disk to Panorama in
Management Only mode.
Panorama Administrator's Guide Version Version 10.1 58 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | Download the Panorama 10.1 base image Open Virtual Appliance (OVA) file.
1. Go to the Palo Alto Networks soware downloads site. (If you can’t log in, go to the Palo
Alto Networks Customer Support web site for assistance.)
2. In the Download column in the Panorama Base Images secon, download the Panorama
10.1 release OVA file (Panorama-ESX-10.0.0.ova).
5. Use a browser to access the vCloud Air web console, select your Virtual
Private Cloud OnDemand locaon, and record the browser URL. You will
use the URL informaon to complete the next step. The URL format is:
https://<virtual‑cloud‑location>.vchs.vmware.com/compute/
cloud/org/<vCloud‑account‑number>/#/catalogVAppTemplateList?
catalog=<catalog‑ID>.
6. Import the OVF package, using the informaon from the vCloud Air URL to complete the
<virtual#cloud#locaon>, <vCloud#account#number>, and <catalog#ID> variables. The
other variables are your vCloud Air username and domain <user>@<domain>, a virtual
data center <datacenter>, and a vCloud Air template <template>.
Panorama Administrator's Guide Version Version 10.1 59 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
based on the Panorama virtual appliance mode. For beer logging and reporng
performance, select the SSD-Accelerated opon.
To increase the log storage capacity, you must Add a Virtual Disk to Panorama on
vCloud Air. In Panorama mode, the virtual appliance does not use the system disk for
log storage; you must add a virtual logging disk.
STEP 4 | Create vCloud Air NAT rules on the gateway to allow inbound and outbound traffic for the
Panorama virtual appliance.
Refer to Add a NAT Rule in the vCloud Air Documentaon Center for the detailed instrucons:
1. Add a NAT rule that allows Panorama to receive traffic from the firewalls and allows
administrators to access Panorama.
2. Add a NAT rule that allows Panorama to retrieve updates from the Palo Alto Networks
update server and to access the firewalls.
STEP 5 | Create a vCloud Air firewall rule to allow inbound traffic on the Panorama virtual appliance.
Outbound traffic is allowed by default.
Refer to Add a Firewall Rule in the vCloud Air Documentaon Center for the detailed
instrucons.
Panorama Administrator's Guide Version Version 10.1 60 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Create an Object Storage Service (OSS) bucket for the Panorama virtual appliance image.
1. From the Alibaba Cloud menu, select Object Storage Service > Buckets and Create
Bucket.
2. Enter a descripve Bucket Name.
3. Select the bucket Region.
This region must be in the same region you plan on deploying your Panorama virtual
appliance and in the same region as the firewalls you plan to manage with Panorama.
4. Configure the remaining OSS bucket sengs as needed.
5. Click OK.
You are automacally taken to the OSS bucket Overview page aer successful creaon.
Panorama Administrator's Guide Version Version 10.1 61 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
3. From the Alibaba Cloud menu, select Elasc Compute Service > Instances & Images >
Images and Import Image.
4. Paste the OSS Object Address for the qcow2 file.
This the file URL you copied in the previous step.
5. Enter an Image Name.
6. For the Operang System/Plaorm, select Linux CentOS.
7. For the System Disk (GiB), enter 81.
8. For the System Architecture, select x86_64.
9. For the Image Format, select QCOW2.
10. Click OK.
Panorama Administrator's Guide Version Version 10.1 62 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 63 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Set up the virtual private cloud (VPC) for your network needs.
Whether you launch the Panorama virtual appliance in an exisng VPC or you create a new
VPC, the Panorama virtual appliance must be able to receive traffic from other instances in the
VPC and perform inbound and outbound communicaon between the VPC and the internet as
needed.
Refer to the Alibaba Cloud VPC documentaon for more informaon.
1. Create a VPC and Configure Networks or use an exisng VPC.
2. Verify that the network and security components are appropriately defined.
• Create an internet gateway to enable internet access to the subnet of your Panorama
virtual appliance. Internet access is required to install soware and content updates,
acvate licenses, and leverage Palo Alto Networks cloud services. Otherwise, you
must manually install updates and acvate licenses.
• Create subnets. Subnets are segments of the IP address range assigned to the VPC in
which you can launch Alibaba Cloud instances. It is recommended that the Panorama
virtual appliance belong to the management subnet so that you can configure it to
access the internet if needed.
• Add routes to the route table for a private subnet to ensure traffic can be routed
across subnets in the VPC and from the internet if applicable.
Ensure you create routes between subnets to allow communicaon between:
• Panorama, managed firewalls, and Log Collectors.
• (Oponal) Panorama and the internet.
• Ensure that the following ingress security rules are allowed for the VPC to manage
VPC traffic. The ingress traffic source for each rule is unique to your deployment
topology.
See Ports Used for Panorama for more informaon.
• Allow SSH (port 22) traffic to enable access to the Panorama CLI.
• Allow HTTPS (port 443 and 27280) traffic to enable access to the Panorama web
interface.
• Allow traffic on port 3978 to enable communicaon between Panorama, manage
firewalls, and managed Log Collectors. This port is also used by Log Collectors to
forward logs to Panorama.
• Allow traffic on port 28443 to enable managed firewalls to get soware and
content updates from Panorama.
STEP 4 | Select Elasc Compute Service > Instances & Images > Instances and click Create Instance
in the upper right corner.
Panorama Administrator's Guide Version Version 10.1 64 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 65 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
• Instance Name—Enter a descripve name for the Panorama virtual appliance. This the
name displayed for the instance throughout the Alibaba Cloud Console.
• Host—Enter a hostname for the Panorama virtual appliance instance.
STEP 8 | (Oponal) Select Next: Grouping to configuring grouping for all Alibaba Cloud resources
associated with the Panorama virtual appliance instance.
STEP 10 | View and check the ECS Terms of Service and Product Terms of Service.
Panorama Administrator's Guide Version Version 10.1 66 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 13 | Log in to the Panorama CLI using the SSH to configure the Panorama virtual appliance
network sengs.
You must configure the system IP address , netmask, and default gateway. Addionally, you
must add the Alibaba Cloud DNS servers to successfully connect to the Palo Alto Networks
update server.
You can also access the Panorama CLI from the Alibaba console. To access the
Panorama CLI from the Alibaba console, select Elasc Compute Service > Instances &
Images > Instances and select the Panorama virtual appliance instance. In the Instance
Details, select Connect.
You are prompted to create a VCN password for the Panorama virtual appliance
instance on first connecon from the Alibaba VCN. Be sure to save this password as it
cannot be recovered and is required to connect using the VCN or update the password
in the future.
STEP 14 | Configure the inial network sengs for the Panorama virtual appliance.
admin> configure
The default gateway on Alibaba Cloud ends in .253. For example, if the private IP
address for your Panorama virtual appliance instance is 192.168.100.20, the default
gateway is 192.168.100.253.
admin# commit
Panorama Administrator's Guide Version Version 10.1 67 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 15 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
STEP 16 | Complete configuring the Panorama virtual appliance for your deployment needs.
• (Management Only mode) Set up a Panorama Virtual Appliance in Management Only Mode.
• (Log Collector mode) Begin at Step 6 to Switch from Panorama mode to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you Add the Log
Collector as a managed collector to the Panorama management server. You cannot
specify the IP Address, Netmask, or Gateway.
• (Panorama and Management Only mode) Configure a Managed Collector to add a Dedicated
Log Collector to the Panorama virtual appliance. Management Only mode does not support
local log collecon, and requires a Dedicated Log Collector to store managed device logs.
Panorama Administrator's Guide Version Version 10.1 68 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 17 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on Alibaba Cloud as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on Alibaba Cloud as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
STEP 2 | Set up the virtual private cloud (VPC) for your network needs.
Whether you launch the Panorama virtual appliance in an exisng VPC or you create a new
VPC, the Panorama virtual appliance must be able to receive traffic from other instances in the
Panorama Administrator's Guide Version Version 10.1 69 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
VPC and perform inbound and outbound communicaon between the VPC and the internet as
needed.
Refer to the AWS VPC documentaon for instrucons on creang a VPC and seng it up for
access.
1. Create a new VPC or use an exisng VPC. Refer to the AWS Geng Started
documentaon
2. Verify that the network and security components are appropriately defined.
• Create an internet gateway to enable internet access to the subnet of your Panorama
virtual appliance. Internet access is required to install soware and content updates,
acvate licenses, and leverage Palo Alto Networks cloud services. Otherwise, you
must manually install updates and acvate licenses.
• Create subnets. Subnets are segments of the IP address range assigned to the VPC in
which you can launch AWS instances. It is recommended that the Panorama virtual
appliance belong to the management subnet so that you can configure it to access the
internet if needed.
• Add routes to the route table for a private subnet to ensure traffic can be routed
across subnets in the VPC and from the internet if applicable.
Ensure you create routes between subnets to allow communicaon between:
• Panorama, managed firewalls, and Log Collectors.
• (Oponal) Panorama and the internet.
• Ensure that the following inbound security rules are allowed for the VPC to manage
VPC traffic. The ingress traffic source for each rule is unique to your deployment
topology.
See Ports Used for Panorama for more informaon.
• Allow SSH (port 22) traffic to enable access to the Panorama CLI.
• Allow HTTPS (port 443) traffic to enable access to the Panorama web interface.
• Allow traffic on port 3978 to enable communicaon between Panorama, manage
firewalls, and managed Log Collectors. This port is also used by Log Collectors to
forward logs to Panorama.
• Allow traffic on port 28443 to enable managed firewalls to get soware and
content updates from Panorama.
Panorama Administrator's Guide Version Version 10.1 70 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you configure the appliance with the required resources during inial
deployment. The Panorama virtual appliance does not remain in Log Collector
mode if you resize the virtual machine aer you deploy it, and this results in a
loss of log data.
4. Configure the instance details.
1. Select Next: Configure Instance Details.
2. For the Network, select the VPC.
3. Select the Subnet.
4. To Auto-assign Public IP select Enable.
This IP must be accessible by the firewalls you plan to manage using Panorama. This
allows you to obtain a publicly accessible IP address for the management interface
of the Panorama virtual appliance. You can later aach an Elasc IP address to the
management interface. Unlike the public IP address that is disassociated from the
virtual appliance when the instance is terminated, the Elasc IP address provides
persistence and you can the IP address to a new (or replacement) instance of the
Panorama virtual appliance without the need to reconfigure the IP address whenever
the Panorama virtual appliance instance is powered off.
5. Configure any addional instance details as needed.
5. (Oponal) Configure the Panorama virtual appliance storage.
1. Select Next: Add Storage.
2. Add New Volume to add addional log storage.
(SD-WAN only) If you plan on managing your SD-WAN deployment in Management
Only mode, you must add a 2TB logging disk.
If you intend to use the Panorama virtual appliance in Panorama mode or as a
Dedicated Log Collector, add the virtual logging disks during the inial deployment.
By default, the Panorama virtual appliance is in Panorama mode for the inial
deployment when you meet the Panorama mode resource requirements and have
added at least one virtual logging disk. Otherwise, the Panorama virtual appliance
defaults to Management Only mode. Change the Panorama virtual appliance to
Management Only mode if you just want to manage devices and Dedicated Log
Collectors, and to not collect logs locally.
The Panorama virtual appliance on AWS only supports 2TB logging disks, and in total
supports up to 24TB of log storage. You are unable to add a logging disk smaller than
2TB, or a logging disk with a size not divisible by the 2TB logging disk requirement.
Panorama Administrator's Guide Version Version 10.1 71 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The Panorama virtual appliance parons logging disks larger than 2TB into 2TB
parons.
6. (Oponal) Select Next: Add Tags and add one or more tags as metadata to help you
idenfy and group the Panorama virtual appliance. For example, add a Name tag with a
Value that helps you idenfy which firewalls the Panorama virtual appliance manages.
7. Configure the instance security group.
1. Select Next: Configure Security Group.
2. Select an exisng security group to assign a security group for the Panorama virtual
appliance instance.
3. Select the security group you previously created.
You can select the default security group to allow all inbound and outbound traffic
types.
8. Review and Launch the Panorama virtual appliance instance to verify that your
selecons are accurate before you Launch.
9. Select an exisng key pair or create a new one and acknowledge the disclaimer.
If you created a new key from AWS, download and save the key to a safe
locaon. The file extension is .pem. You must load the public key into PuTTYgen
and save it in .ppk format. You cannot regenerate this key if lost.
It takes about 30 minutes to finish deploying the Panorama virtual appliance aer you
launch it on AWS. Deploying the Panorama virtual appliance may take longer depending
Panorama Administrator's Guide Version Version 10.1 72 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
on the number and size of the disks aached to the instance. View the Launch Time by
selecng the Panorama virtual appliance instance (Instances).
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you provision the appliance with the required resources. The
Panorama virtual appliance does not remain in Log Collector mode if you resize
the virtual machine aer you deploy it and this results in a loss of log data.
Panorama Administrator's Guide Version Version 10.1 73 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | Configure a new administrave password for the Panorama virtual appliance.
You must configure a unique administrave password before you can access the web interface
of the Panorama virtual appliance. To access the CLI, the private key used to launch the
Panorama virtual appliance is required.
• If you have an SSH service installed on your computer:
1. Enter the following command to log into the Panorama virtual appliance:
2. Configure a new password using the following commands and follow the on screen
prompts:
admin> configure
Panorama Administrator's Guide Version Version 10.1 74 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
3. If you need to acvate a BYOL, set the DNS server IP address so that the Panorama
virtual appliance can access the Palo Alto Networks licensing server. Enter the following
command to set the DNS server IP address:
admin# commit
4. Select Sessions and enter the public IP address of the Panorama virtual appliance. Click
Open and click Yes when the security prompt appears.
5. Log in as admin when prompted.
6. Configure a new password using the following commands and follow the onscreen
prompts:
admin> configure
Panorama Administrator's Guide Version Version 10.1 75 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
7. Set the DNS server IP address so that the Panorama virtual appliance can access the Palo
Alto Networks licensing server. Enter the following command to set the DNS server IP
address:
admin# commit
STEP 8 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
Panorama Administrator's Guide Version Version 10.1 76 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on AWS as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on AWS.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
Panorama Administrator's Guide Version Version 10.1 77 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 78 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 79 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you configure the appliance with the required resources during inial
deployment. The Panorama virtual appliance does not remain in Log Collector
mode if you resize the virtual machine aer you deploy it, and this results in a
loss of log data.
8. Enter a Username for the Panorama virtual appliance administrator. To ensure that your
username is secure, admin is not a valid entry.
9. Enter a Password or copy and paste an SSH public key for securing administrave access
to the Panorama virtual appliance.
You must enable SSH key authencaon if you plan to use this instance of the
Panorama virtual appliance in FIPS-CC operaonal mode. Although you can
deploy the Panorama virtual appliance using a username and password, you will
be unable to authencate using the username and password aer changing the
operaonal mode to FIPS-CC. Aer reseng to FIPS-CC mode, you must use the
SSH key to log in and can then configure a username and password that you can
use for subsequently logging in to the Panorama web interface. For details on
creang the SSH key, refer to the Azure documentaon.
10. Configure the Panorama virtual appliance instance Networking
1. Select an exisng Virtual network or create a new virtual network.
2. Configure the Subnet. The subnet is dependent on the virtual network you selected
or created in the previous step. If you selected an exisng virtual network, you can
choose one of the subnets for the selected virtual network.
3. Select an exisng Public IP address or create a new one. This creates the
management interface used to access your Panorama virtual appliance.
4. Select an exisng NIC network security group or create a new security group.
Network security groups control traffic to the virtual machine. Make sure that HTTPS
and SSH are allowed for the Inbound rules.
11. Configure the instance Management sengs.
1. Select whether to enable Auto-shutdown. Auto-shutdown allows you to configure
a daily me to automacally shut down the virtual machine that you disable auto-
shutdown to avoid the possibility that a new public IP address gets assigned to the
Panorama Administrator's Guide Version Version 10.1 80 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
virtual machine, that logs are dropped, that logs are not or that you are unable to
manage your firewalls while the Panorama virtual appliance is shut down.
2. Select whether to enable boot Monitoring. Select the Diagnosc storage account if
enabled. Monitoring automacally sends boot-up diagnosc logs to your Diagnoscs
storage account. For more informaon, see Overview of Monitoring in Microso
Azure.
3. Configure any other sengs as needed.
12. Review the summary, accept the terms of use and privacy policy, and Create the
Panorama virtual appliance.
STEP 5 | Verify that you the Panorama virtual appliance has been successfully deployed.
1. Select Dashboard > Resource Groups and select the resource group containing the
Panorama virtual appliance.
2. Under Sengs, select Deployments for the virtual machine deployment status.
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you correctly configured the appliance the required resources. The
Panorama virtual appliance does not remain in Log Collector mode if you resize
the virtual machine aer you deploy it and this results in a loss of log data.
2. Use a secure (hps) connecon from your web browser to log in to the Panorama virtual
appliance using the public IP address.
3. Enter the username and password of the Panorama virtual appliance. You are prompted
with a cerficate warning. Accept the cerficate warning and connue to the web page.
Panorama Administrator's Guide Version Version 10.1 81 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 8 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
STEP 9 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on Azure as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on Azure.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
Panorama Administrator's Guide Version Version 10.1 82 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 83 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Upload the Panorama virtual appliance image to the Google Cloud Plaorm.
1. Log in to the Google Cloud Console.
2. From the Products and Services menu, select Storage.
3. Click Create Bucket, configure the new storage bucket and click Create.
4. Select the storage bucket you created in the previous step, click Upload files, and select
the Panorama virtual appliance image you downloaded.
5. From the Products and Services menu, select Compute Engine > Images.
6. Click Create Image and create the Panorama virtual appliance image:
1. Name the Panorama virtual appliance image.
2. In the Source field, select Cloud Storage file from the drop-down menu.
3. Click Browse and navigate to the storage bucket where you uploaded the Panorama
virtual appliance image, and Select the uploaded image.
4. Create the Panorama virtual appliance image.
Panorama Administrator's Guide Version Version 10.1 84 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 85 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you configure the appliance with the required resources during inial
deployment. The Panorama virtual appliance does not remain in Log Collector
mode if you resize the virtual machine aer you deploy it, and this results in a
loss of log data.
The GCP zone selecon determines the CPU plaorms available to you. For more
informaon, refer to Regions and Zones for details.
Panorama Administrator's Guide Version Version 10.1 86 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Enable access to the serial port so you can manage the Panorama virtual appliance.
1. Select Management.
2. Enter the following name-value pair as Metadata:
serial-port-enable true
Panorama Administrator's Guide Version Version 10.1 87 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 88 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | Configure the SSH key. You need an SSH key to access the Panorama virtual appliance CLI to
configure the administrave user password aer the inial deployment.
• PuTTY Users
1. Select Security.
2. Select the Block project-wide SSH keys box. Only instance keys are currently supported
for logging in to the Panorama virtual appliance aer inial deployment.
3. Paste the SSH key in the comment box. For informaon on the correct SSH key format
and how to generate SSH keys for GCP, refer to Managing SSH keys in Metadata.
When generang the SSH key, save the private key in .ppk format. The private
key is required to log in to the Panorama virtual appliance aer the inial
deployment before you can configure the administrave password.
cat <panorama_key_name>.pub
Aer the output file for the SSH key is created, manually copy the SSH key contents.
3. Paste the public key into the SSH Keys secon of the GCP instance creaon.
STEP 8 | (Oponal) Add addional storage for log collecon. Repeat this step as needed to add
addional virtual logging disks.
If you intend to use the Panorama virtual appliance in Panorama mode or as a Dedicated Log
Collector, add the virtual logging disks during inial deployment. By default, the Panorama
virtual appliance is in Panorama mode for the inial deployment when you meet the Panorama
mode resource requirements and have added at least one virtual logging disk. Otherwise, the
Panorama Administrator's Guide Version Version 10.1 89 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama virtual appliance defaults to Management Only mode in which you can manage
devices and Dedicated Log Collectors, and cannot collect logs locally.
The Panorama virtual appliance on GCP only supports 2TB logging disks, and in total supports
up to 24TB of log storage. You are unable to add a logging disk smaller than 2TB, or a logging
Panorama Administrator's Guide Version Version 10.1 90 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
disk with a size not divisible by the 2TB logging disk requirement. The Panorama virtual
appliance parons logging disks larger than 2TB into 2TB parons.
1. Select Disks > Add new disk.
Panorama Administrator's Guide Version Version 10.1 91 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Create the Panorama virtual appliance. The Panorama virtual appliances takes roughly 10
minutes to boot up aer inial deployment.
STEP 10 | Configure a new administrave password for the Panorama virtual appliance.
You must configure a unique administrave password before you can access the web interface
of the Panorama virtual appliance. To access the CLI, use the private key to launch the
Panorama virtual appliance.
• If you have an SSH service installed on your computer:
1. Enter the following command to log into the Panorama virtual appliance:
• Windows Devices
• Linux Devices
2. Configure a new password using the following commands and follow the onscreen
prompts:
admin> configure
Panorama Administrator's Guide Version Version 10.1 92 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
3. If you have a BYOL that you need to, set the DNS server IP address so that the
Panorama virtual appliance can access the Palo Alto Networks licensing server. Enter the
following command to set the DNS server IP address:
admin# commit
4. Select Sessions and enter the public IP address of the Panorama virtual appliance. Then
Open and click Yes when the security prompt appears.
5. Login as admin when prompted.
6. Configure a new password using the following commands and follow the on screen
prompts:
admin> configure
Panorama Administrator's Guide Version Version 10.1 93 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
7. Set the DNS server IP address so that the Panorama virtual appliance can access the Palo
Alto Networks licensing server. Enter the following command to set the DNS server IP
address:
admin# commit
STEP 11 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
Panorama Administrator's Guide Version Version 10.1 94 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 12 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on Google Cloud Plaorm as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on Google Cloud Plaorm.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
• For SD-WAN deployments.
1. Increase the System Disk for Panorama on Google Cloud Plaorm
To leverage SD-WAN on Panorama deployed on GCP, you must increase the the system
disk to 224GB.
You cannot migrate back to a 81GB system disk aer successfully increasing the
system disk to 224GB.
2. Set up a Panorama Virtual Appliance in Management Only Mode.
3. Add a Virtual Disk to Panorama on Google Cloud Plaorm.
To leverage SD-WAN, you must add a single 2TB logging disk to Panorama in
Management Only mode.
Panorama Administrator's Guide Version Version 10.1 95 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Create a new virtual machine image and add the Panorama virtual appliance image for KVM
to the Virtual Machine Manager.
1. On the Virtual Machine Manager, select Create a new virtual machine.
2. Select Import Exisng disk image and click Forward.
3. Browse and select the Panorama virtual appliance image volume and Choose volume.
4. Click Forward.
Panorama Administrator's Guide Version Version 10.1 96 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector, ensure
that you configure the appliance with the required resources during inial deployment.
The Panorama virtual appliance does not remain in Log Collector mode if you resize the
virtual machine aer you deploy it, and this results in a loss of log data.
1. Configure the Memory based on the requirements for the desired operaonal mode.
The Virtual Machine Manager may use MiB (mebibyte) to allocate memory
depending on the version you are running. If MiB is used, be sure to correctly
convert your required memory allocaon to avoid under provisioning the
Panorama virtual appliance.
2. Configure the CPU based on the requirements for the desired operaonal mode.
3. Click Forward.
Panorama Administrator's Guide Version Version 10.1 97 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Name the Panorama virtual appliance, enable configuraon customizaon, and select the
management interface bridge.
1. Enter a descripve Name for the Panorama virtual appliance.
2. Customize configuraon before install.
3. Make a Network selecon—select the bridge for the management interface and accept
the default sengs.
4. Click Finish.
Panorama Administrator's Guide Version Version 10.1 98 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Configure the virtual machine console display to use the VNC server to interact with the
virtual machine.
1. Select Display Spice.
Connue to the next step if Display VNC is listed in the Hardware list because
the virtual machine is already configured to use the VNC server for the display.
2. In the Type drop-down, select VNC server.
3. Click Apply.
STEP 7 | (Oponal) Add addional storage for log collecon. Repeat this step as needed to add
addional virtual logging disks.
If you intend to use the Panorama virtual appliance in Panorama mode or as a Dedicated Log
Collector, add the virtual logging disks during the inial deployment. By default, the Panorama
virtual appliance is in Panorama mode for the inial deployment when you meet the Panorama
mode resource requirements and have added at least one virtual logging disk. Otherwise, the
Panorama virtual appliance defaults to Management Only mode. Change the Panorama virtual
appliance to Management Only mode if you just want to manage devices and Dedicated Log
Collectors, and to not collect logs locally.
The Panorama virtual appliance on KVM only supports 2TB logging disks, and in total supports
up to 24TB of log storage. You are unable to add a logging disk smaller than 2TB, or a logging
Panorama Administrator's Guide Version Version 10.1 99 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
disk with a size not divisible by the 2TB logging disk requirement. The Panorama virtual
appliance parons logging disks larger than 2TB into 2TB parons.
1. Add Hardware.
2. Configure the new Storage disk:
1. Create a disk image for a virtual machine and configure the virtual disk storage
capacity to 14901.2 GiB (this is equivalent to 2TB).
The Virtual Machine Manager may use GiB (gibibyte) to allocate memory
depending on the version you are running. If GiB is used, be sure to correctly
convert the required storage capacity to avoid under provisioning the virtual
logging disk and sending the Panorama virtual appliance into maintenance
mode.
2. Set the Device type to Disk device.
3. Set the Bus type to VirtIO or IDE, depending on your configuraon.
4. Go to Advanced opons and set Cache mode to writethrough.
3. Click Finish.
STEP 9 | Configure the network access sengs for the management interface.
1. Open a connecon to the console.
2. Log in to the firewall using the default username and password: admin/admin.
3. Enter configuraon mode using the following command:
admin> configure
4. Use the following commands to configure and enable access to the management
interface:
Panorama Administrator's Guide Version Version 10.1 100 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
where <Panorama-IP> is the IP address you want to assign to the management interface,
<netmask> is the subnet mask, <gateway-IP> is the IP address of the network gateway,
and <DNS-IP> is the IP address of the DNS server.
admin# commit
STEP 10 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
Panorama Administrator's Guide Version Version 10.1 101 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 11 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on KVM as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on KVM.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
Panorama Administrator's Guide Version Version 10.1 102 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Set up any vSwitch(es) that you will need. For more informaon, review the Virtual Switch
Types for more informaon.
1. From Hyper-V Manager, select the host and select Acon > Virtual Switch Manager to
open the Virtual Switch Manager window.
2. Under Create virtual switch, select the type of vSwitch to create and click Create Virtual
Switch.
1. Choose a Name and Locaon for the Panorama virtual appliance. The Panorama
virtual appliance stores the VHDX file at the specified locaon.
2. Choose Generaon 1. This is the default opon and the only version supported.
3. For Startup Memory, assign the memory based on the intended system mode. See the
Setup Prerequisites for the Panorama Virtual Appliance for the memory requirements
for each mode.
Panorama Administrator's Guide Version Version 10.1 103 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector, ensure
that you configure the appliance with the required resources during inial deployment.
The Panorama virtual appliance does not remain in Log Collector mode if you resize the
virtual machine aer you deploy it, and this results in a loss of log data.
STEP 5 | Connect at least one network adapter for the dataplane interface on the firewall. Repeat this
to create addional network interfaces on the Panorama virtual appliance.
1. Select Sengs > Hardware > Add Hardware and select the Hardware type for your
network adapter.
Legacy Network Adapter and SR-IOV are not supported. If selected, the VM-
Series firewall will boot into maintenance mode.
2. Click OK.
STEP 6 | (Oponal) Add addional storage for log collecon. Repeat this step as needed to add
addional virtual logging disks. If you want to deploy the Panorama virtual appliance in
Management Only mode, connue to Step 6.
If you intend to use the Panorama virtual appliance in Panorama mode or as a Dedicated Log
Collector, add the virtual logging disks during the inial deployment. By default, the Panorama
virtual appliance is in Panorama mode for the inial deployment when you meet the Panorama
mode resource requirements and have added at least one virtual logging disk. Otherwise, the
Panorama virtual appliance defaults to Management Only mode. Change the Panorama virtual
Panorama Administrator's Guide Version Version 10.1 104 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
appliance to Management Only mode if you just want to manage devices and Dedicated Log
Collectors, and to not collect logs locally.
The Panorama virtual appliance on Hyper-V only supports 2TB logging disks, and in total
supports up to 24TB of log storage. You are unable to add a logging disk smaller than 2TB, or a
logging disk with a size not divisible by the 2TB logging disk requirement. The Panorama virtual
appliance parons logging disks larger than 2TB into 2TB parons.
1. On the Hyper-V Manager, select the host and select Acon > New > Hard Disk.
2. If you see the Before You Begin prompt, click Next to begin adding the virtual logging
disk.
3. For the Disk Format, select VHDX. Click Next. to connue
4. For the Disk Type, select Fixed Size or Dynamically Expanding based on your needs.
Click Next to connue.
5. Specify the Name and Locaon for the virtual logging disk file. Click Next to connue.
6. To configure the disk, select Create a new virtual hard disk and enter the disk size. Click
Next to connue.
7. Review the Summary and Finish adding the virtual hard logging disk.
admin> configure
admin# set deviceconfig system ip-address <Panorama-IP>
netmask <netmask> default-gateway <gateway-IP> dns-setting
servers primary <DNS-IP>
admin# commit
Panorama Administrator's Guide Version Version 10.1 105 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
admin# exit
STEP 9 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
Panorama Administrator's Guide Version Version 10.1 106 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 10 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on Hyper-V as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on Hyper-V.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
Panorama Administrator's Guide Version Version 10.1 107 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The Pre-Authencated Request URL is required to create the custom image and
must be copied when displayed to you.
The Pre-Authencated Request URL is only displayed aer the request is created
and is not shown again.
10. Close the Pre-Authencated Request Details aer you copy the URL.
STEP 6 | Import the qcow2 file and create a custom Panorama virtual appliance image.
1. Select Compute > Custom Images and Import Image.
2. Enter a descripve Name for your image.
3. Select Import from an Object Storage URL and paste the object storage URL.
4. For the Image type, select QCOW2.
5. For the Launch Mode, select Paravirtualized Mode.
6. Import Image.
Panorama Administrator's Guide Version Version 10.1 108 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Set up the Virtual Cloud Network (VCN) for your network needs.
Whether you launch the Panorama virtual appliance in an exisng VCN or you create a new
VCN, the Panorama virtual appliance must be able to receive traffic from other instances in the
VCN and perform inbound and outbound communicaon between the VCN and the internet
as needed.
Refer to the OCI VCN documentaon for more informaon.
1. Configure a VCN or use an exisng VCN.
2. Verify that the network and security components are appropriately defined.
• Create an internet gateway to enable internet access to the subnet of your Panorama
virtual appliance. Internet access is required to install soware and content updates,
acvate licenses, and leverage Palo Alto Networks cloud services. Otherwise, you
must manually install updates and acvate licenses.
If the Panorama virtual appliance instance is part of a private subnet, you can
configure a NAT gateway to enable only outbound internet access for the subnet.
• Create subnets. Subnets are segments of the IP address range assigned to the VCN
in which you can launch OCI instances. It is recommended that the Panorama virtual
Panorama Administrator's Guide Version Version 10.1 109 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
appliance belong to the management subnet so that you can configure it to access the
internet if needed.
• Add routes to the route table for a private subnet to ensure traffic can be routed
across subnets in the VCN and from the internet if applicable.
Ensure you create routes between subnets to allow communicaon between:
• Panorama, managed firewalls, and Log Collectors.
• (Oponal) Panorama and the internet.
• Ensure that the following ingress security rules are allowed for the VCN to manage
VCN traffic. The ingress traffic source for each rule is unique to your deployment
topology.
See Ports Used for Panorama for more informaon.
• Allow SSH (port 22) traffic to enable access to the Panorama CLI.
• Allow HTTPS (port 443 and 28270) traffic to enable access to the Panorama web
interface.
• Allow traffic on port 3978 to enable communicaon between Panorama, manage
firewalls, and managed Log Collectors. This port is also used by Log Collectors to
forward logs to Panorama.
• Allow traffic on port 28443 to enable managed firewalls to get soware and
content updates from Panorama.
STEP 5 | Enter a descripve Name for the Panorama virtual appliance image.
Panorama Administrator's Guide Version Version 10.1 110 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 111 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 12 | Configure a new administrave password and the system IP address sengs for the
Panorama virtual appliance.
1. Generate a SSH Key for Panorama on OCI.
2. In the OCI console, select Instances and select the Panorama virtual appliance instance.
3. Select Console Connecon and Create Console Connecon.
4. Select Upload public key files (.pub) and upload the public SSH key you generated to
Create Console Connecon.
5. In the Instance Details screen, expand the Console Connecon opons and Copy Serial
Connecon for Linux/Mac.
6. On your Linux machine, open a terminal and paste the serial connecon.
7. Create the new admin password when prompted.
8. Configure the inial network sengs for the Panorama virtual appliance.
admin> configure
admin# commit
Panorama Administrator's Guide Version Version 10.1 112 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 13 | Register the Panorama virtual appliance and acvate the device management license and
support licenses.
1. (VM Flex Licensing Only) Provisioning the Panorama Virtual Appliance Serial Number.
When leveraging VM Flex licensing, this step is required to generate the Panorama
virtual appliance serial number needed to register the Panorama virtual appliance with
the Palo Alto Networks Customer Support Portal (CSP).
2. Register Panorama.
You must register the Panorama virtual appliance using the serial number provided by
Palo Alto Networks in the order fulfillment email.
This step is not required when leveraging VM Flex licensing as the serial number is
automacally registered with the CSP when generated.
3. Acvate the firewall management license.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is not Internet-connected.
4. Acvate a Panorama Support License.
STEP 14 | Complete configuring the Panorama virtual appliance for your deployment needs.
• For Panorama in Log Collector Mode.
1. Add a Virtual Disk to Panorama on Oracle Cloud Infrastructure (OCI) as needed.
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Log Collector mode.
2. Begin at Step 6 to switch to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
• For Panorama in Panorama mode.
1. Add a Virtual Disk to Panorama on Oracle Cloud Infrastructure (OCI).
Adding at least one virtual logging disk is required before you can change the Panorama
virtual appliance to Panorama mode.
2. Set up a Panorama Virtual Appliance in Panorama Mode.
3. Configure a Managed Collector.
• For Panorama in Management Only mode.
1. Set up a Panorama Virtual Appliance in Management Only Mode.
2. Configure a Managed Collector to add a Dedicated Log Collector to the Panorama virtual
appliance.
Management Only mode does not support local log collecon, and requires a Dedicated
Log Collector to store managed device logs.
Panorama Administrator's Guide Version Version 10.1 113 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
A Linux machine is required to generate the SSH key and access the Panorama CLI for
the inial configuraon. Generang a SSH from OCI or third-party applicaons such as
PuTTygen is not supported.
admin:~$ cd ~/.ssh
admin:~/.ssh$ ssh-keygen
When prompted, save the key in the default .ssh directory. A password for the key is
oponal.
The default name for the private key is id_rsa and the default name for the public key is
id_rsa.pub.
STEP 4 | Copy the public key from the .ssh directory to your home directory.
This step is required to upload the public key to OCI.
Panorama Administrator's Guide Version Version 10.1 114 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
To complete the configuraon of the MGT interface, you must specify the IP
address, netmask (for IPv4) or prefix length (for IPv6), and default gateway. If you
omit sengs (such as the default gateway), you can access Panorama only through
the console port for future configuraon changes. As a best pracce, always commit
a complete MGT interface configuraon.
Panorama Administrator's Guide Version Version 10.1 115 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Starng with PAN-OS 9.0.4, the predefined, default administrator password (admin/
admin) must be changed on the first login on a device. The new password must be
a minimum of eight characters and include a minimum of one lowercase and one
uppercase character, as well as one number or special character.
Be sure to use the best pracces for password strength to ensure a strict password
and review the password complexity sengs.
To ensure that the management interface remains secure, configure the Minimum
Password Complexity (Panorama > Setup > Management).
1. Click the admin link on the le side of the web interface footer.
2. Enter the Old Password and the New Password and record the new password in a safe
locaon.
3. Click OK.
STEP 4 | Configure the network access sengs for the MGT interface.
Panorama uses the MGT interface for management traffic, high availability synchronizaon, log
collecon, and communicaon within Collector Groups.
1. Enter the following commands, where <Panorama-IP> is the IP address you want to
assign to the Panorama management interface, <netmask> is the subnet mask, <gateway-
IP> is the IP address of the network gateway, and <DNS-IP> is the IP address of the DNS
server:
> configure
# set deviceconfig system ip-address <Panorama-IP>
netmask <netmask> default-gateway <gateway-IP> dns-setting
servers primary <DNS-IP>
# commit
Panorama Administrator's Guide Version Version 10.1 116 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
# exit
Panorama Administrator's Guide Version Version 10.1 117 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Don’t select Telnet or HTTP. These services use plaintext and are less secure
than the other services.
4. Click OK to save your changes to the interface.
Panorama Administrator's Guide Version Version 10.1 118 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Perform the following steps to set up a new virtual appliance as a Log Collector or to convert an
exisng virtual appliance that was previously deployed as a Panorama management server.
Switching the virtual appliance from Panorama mode to Log Collector mode reboots the
appliance, deletes the local Log Collector, deletes any exisng log data, and deletes all
configuraons except the management access sengs. Switching the mode does not
delete licenses, soware updates, or content updates.
STEP 1 | Set up the Panorama virtual appliance management server that will manage the Log Collector
if you have not already done so.
Perform one of the following tasks:
• Set Up the Panorama Virtual Appliance
• Set Up the M-Series Appliance
STEP 3 | Set up the Panorama virtual appliance that will serve as a Dedicated Log Collector.
If you previously deployed this appliance as a Panorama management server, you can skip this
step because the MGT interface is already configured and the licenses and updates are already
installed.
The Panorama virtual appliance in Log Collector mode does not have a web interface for
configuraon tasks, only a CLI. Therefore, before changing the mode on the Panorama virtual
appliance, use the web interface in Panorama mode to:
1. Set up the Panorama virtual appliance in one of the following supported hypervisors:
• Install Panorama on an ESXi Server
• Install Panorama on Alibaba Cloud
• Install Panorama on AWS
• Install Panorama on AWS GovCloud
• Install Panorama on Azure
• Install Panorama on Google Cloud Plaorm
• Install Panorama on Hyper-V
• Set Up Panorama on Oracle Cloud Infrastructure (OCI)
2. Perform Inial Configuraon of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Soware Updates for Panorama.
Panorama Administrator's Guide Version Version 10.1 119 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | (Panorama on AWS and Azure only) Delete all users, except for the admin user.
1. Log in to the Panorama Web Interface as admin.
2. Select Panorama > Administrators.
3. Select the exisng Administrators, except admin, and Delete.
4. Select Commit > Commit to Panorama and Commit your changes.
2. Enter Y to confirm the mode change. The virtual appliance reboots. If the reboot process
terminates your terminal emulaon soware session, reconnect to the virtual appliance
to see the Panorama login prompt.
If you see a CMS Login prompt, this means the Log Collector has not finished
reboong. Press Enter at the prompt without typing a username or password.
3. Log back in to the CLI.
4. Verify that the switch to Log Collector mode succeeded:
system-mode: logger
STEP 8 | Enable connecvity between the Log Collector and Panorama management server.
Enter the following commands at the Log Collector CLI, where <IPaddress1> is for the MGT
interface of the solitary (non-HA) or acve (HA) Panorama and <IPaddress2> is for the MGT
interface of the passive (HA) Panorama, if applicable.
> configure
Panorama Administrator's Guide Version Version 10.1 120 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 10 | Add the Log Collector as a managed collector to the Panorama management server.
1. Select Panorama > Managed Collectors and Add a managed collector.
2. In the General sengs, enter the serial number (Collector S/N) you recorded for the Log
Collector.
3. In the Panorama Server IP field, enter the IP address or FQDN of the solitary (non-HA)
or acve (HA) Panorama. For HA deployments, enter the IP address or FQDN of the
passive Panorama peer in the Panorama Server IP 2 field.
These IP addresses must specify a Panorama interface that has Device Management and
Device Log Collecon services enabled. By default, these services are enabled only on
the MGT interface. However, you might have enabled the services on other interfaces
when you Set Up the M-Series Appliance that is a Panorama management server.
4. Select Interfaces, click Management, and enter the Public IP Addressof the Dedicated
Log Collector.
5. Click OK twice to save your changes to the Log Collector.
6. Select Commit > Commit to Panorama and Commit your changes to the Panorama
configuraon.
7. Verify that Panorama > Managed Collectors lists the Log Collector you added. The
Connected column displays a check mark to indicate that the Log Collector is connected
to Panorama. You might have to wait a few minutes before the page displays the updated
connecon status.
At this point, the Configuraon Status column displays Out of Sync and the Run
Time Status column displays disconnected. The status will change to In Sync and
connected aer you configure a Collector Group.
Panorama Administrator's Guide Version Version 10.1 121 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 12 | (Recommended) Configure the Ethernet1, Ethernet2, Ethernet3, Ethernet4, and Ethernet5
interfaces if the Panorama management server and Log Collector will use them for Device
Log Collecon (receiving logs from firewalls) and Collector Group Communicaon.
If you previously deployed the Log Collector as a Panorama management server and configured
these interfaces, you must reconfigure them because switching to Log Collector mode would
have deleted all configuraons except the management access sengs.
1. Configure each interface on the Panorama management server (other than the MGT
interface) if you haven’t already:
1. Select Panorama > Setup > Interfaces and click the Interface Name.
2. Select <interface-name> to enable the interface.
3. Complete one or both of the following field sets based on the IP protocols of your
network:
• For ESXi
• IPv4—Public IP Address, IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
• For Alibaba Cloud, AWS, Azure, GCP, and OCI
• Public IP address
4. Select the Device Management Services that the interface supports:
Device Management and Device Log Collecon—You can assign one or more
interfaces.
Collector Group Communicaon—You can assign only one interface.
Device Deployment (soware and content updates)—You can assign only one
interface.
5. Click OK to save your changes.
2. Configure each interface on the Log Collector (other than the MGT interface):
1. Select Panorama > Managed Collectors and edit the Log Collector.
2. Select Interfaces and click the name of the interface.
3. Select <interface-name> to enable the interface.
4. Complete one or both of the following field sets based on the IP protocols of your
network:
• For ESXi
• IPv4—Public IP Address, IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
• For Alibaba Cloud, AWS, Azure, GCP, and OCI
• Public IP address
5. Select the Device Management Services that the interface supports:
Device Log Collecon—You can assign one or more interfaces.
Collector Group Communicaon—You can assign only one interface.
Panorama Administrator's Guide Version Version 10.1 122 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 13 | (Oponal) If your deployment is using custom cerficates for authencaon between
Panorama and managed devices, deploy the custom client device cerficate. For more
informaon, see Set Up Authencaon Using Custom Cerficates.
1. Select Panorama > Cerficate Management > Cerficate Profile and choose the
cerficate profile from the drop-down or click New Cerficate Profile to create one.
2. Select Panorama > Managed Collectors > Add > Communicaon for a Log Collector.
3. Select the Secure Client Communicaon check box.
4. Select the type of device cerficate the Type drop-down.
• If you are using a local device cerficate, select the Cerficate and Cerficate Profile
from the respecve drop-downs.
• If you are using SCEP as the device cerficate, select the SCEP Profile and Cerficate
Profile from the respecve drop-downs.
5. Click OK.
Panorama Administrator's Guide Version Version 10.1 123 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 14 | (Oponal) Configure Secure Server Communicaon Sn a Log Collector. For more informaon,
see Set Up Authencaon Using Custom Cerficates.
1. Select Panorama > Managed Collectors > Add > Communicaon.
2. Verify that the Custom Cerficate Only check box is not selected. This allows you to
connue managing all devices while migrang to custom cerficates.
When the Custom Cerficate Only check box is selected, the Log Collector
does not authencate and cannot receive logs from devices using predefined
cerficates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This
SSL/TLS service profile applies to all SSL connecons between the Log Collector and
devices sending it logs.
4. Select the cerficate profile from the Cerficate Profile drop-down.
5. Select Authorize Client Based on Serial Number to have the server check clients against
the serial numbers of managed devices. The client cerficate must have the special
keyword $UDID set as the CN to authorize based on serial numbers.
6. In Disconnect Wait Time (min), enter the number of minutes Panorama should wait
before breaking and reestablishing the connecon with its managed devices. This field is
blank by default and the range is 0 to 44,640 minutes.
The disconnect wait me does not begin counng down unl you commit the
new configuraon.
7. (Oponal) Configure an authorizaon list.
1. Click Add under Authorizaon List.
2. Select the Subject or Subject Alt Name as the Idenfier type.
3. Enter an idenfier of the selected type.
4. Click OK.
5. Select Check Authorizaon List to enforce the authorizaon list.
8. Click OK.
9. Select Commit > Commit to Panorama.
Panorama Administrator's Guide Version Version 10.1 124 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
the Eth1, Eth2, Eth3, Eth4, and Eth5 interfaces (if you configured them) in an operaonal
state on the Log Collector.
In any single Collector Group, all the Log Collectors must run on the same
Panorama model: all M-600 appliances, all M-500 appliances, all M-200
appliances, or all Panorama virtual appliances.
As a best pracce, Enable log redundancy across collectors if you add mulple
Log Collectors to a single Collector group. This opon requires each Log Collector
to have the same number of logging disks.
2. Select Panorama > Managed Collectors to verify that the Log Collector configuraon is
synchronized with Panorama.
The Configuraon Status column should display In Sync and the Run Time Status column
should display connected.
3. Access the Log Collector CLI and enter the following command to verify that its
interfaces are operaonal:
The output displays the state as up for each interface that is operaonal.
4. If the Collector Group has mulple Log Collectors, Troubleshoot Connecvity to Network
Resources to verify they can communicate with each other by performing a Ping
connecvity test for each interface that the Log Collectors use. For the source IP
address, specify the interface of one of the Log Collectors. For the host IP address,
specify the matching interface of another Log Collector in the same Collector Group.
Once you change from Legacy mode to Panorama mode, Legacy mode will no longer be
available.
Aer upgrading to Panorama 8.1, the first step is to increase the system resources on the virtual
appliance to the minimum required for Panorama mode. Panorama reboots when you increase
resources, so perform this procedure during a maintenance window. You must install a larger
system disk (81GB), increase CPUs and memory based on the log storage capacity, and add a
virtual logging disk. The new logging disk must have at least as much capacity as the appliance
Panorama Administrator's Guide Version Version 10.1 125 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
currently uses in Legacy mode and cannot be less than 2TB. Adding a virtual disk enables you to
migrate exisng logs to the Log Collector and enables the Log Collector to store new logs.
If Panorama is deployed in an HA configuraon, perform the following steps on the secondary
peer first and then on the primary peer.
STEP 1 | Determine which system resources you need to increase before the virtual appliance can
operate in Panorama mode.
You must run the command specified in this step even if you have determined that
Panorama already has adequate resources.
Enter y when prompted to connue. The output specifies the resources you must
increase. For example:
Panorama Administrator's Guide Version Version 10.1 126 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Increase the CPUs and memory, and replace the system disk with a larger disk.
1. Access the VMware ESXi vSphere Client, select Virtual Machines, right-click the
Panorama virtual appliance, and select Power > Power Off.
2. Right-click the Panorama virtual appliance and Edit Sengs.
3. Select Memory and enter the new Memory Size.
4. Select CPUs and specify the number of CPUs (the Number of virtual sockets mulplied
by the Number of cores per socket).
5. Add a virtual disk.
You will use this disk to replace the exisng system disk.
1. In the Hardware sengs, Add a disk, select Hard Disk as the hardware type, and click
Next.
2. Create a new virtual disk and click Next.
3. Set the Disk Size to exactly 81GB and select the Thick Provision Lazy Zeroed disk
format.
4. Select Specify a datastore or datastore structure as the locaon, Browse to a
datastore of at least 81GB, click OK, and click Next.
5. Select a SCSI Virtual Device Node (you can use the default selecon) and click Next.
Panorama will fail to boot if you select a format other than SCSI.
6. Verify that the sengs are correct and then click Finish and OK.
6. Right-click the Panorama virtual appliance and select Power > Power On. Wait for
Panorama to reboot before connuing.
7. Return to the Panorama CLI and copy the data from the original system disk to the new
system disk:
Panorama Administrator's Guide Version Version 10.1 127 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 128 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
suspend the secondary peer aer switching the primary peer to Panorama mode later in
this procedure.
4. Select Panorama > Collector Groupsto verify that the default collector group has been
created, and that the local Log Collector is part of the default collector group.
5. Push the configuraon to the managed devices.
• If there are no pending changes:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Collector Group and make sure the default collector group is selected.
3. Click OK and Push.
• If you have pending changes:
1. Select Commit > Commit and Push and Edit Selecons.
2. Verify that your Device Group devices and Templates are included.
3. Select Collector Group and make sure the default collector group is selected.
4. Click OK and Commit and Push.
6. Select Panorama > Managed Collectors and verify that the columns display the following
informaon for the local Log Collector:
• Collector Name—This defaults to the Panorama hostname. It should be listed under
the default Collector Group.
• Connected—Check mark
• Configuraon Status—In sync
• Run Time Status—connected
STEP 5 | (HA only) Switch the primary Panorama from Legacy mode to Panorama mode.
Panorama Administrator's Guide Version Version 10.1 129 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Palo Alto Networks recommends migrang exisng logs to the new virtual logging disks
during your maintenance window. The log migraon requires a large number of the
Panorama virtual appliance CPU cores to execute and impacts Panorama operaonal
performance.
The process duraon varies by the volume of log data you are migrang. To check the
status of the migraon, run the following command:
When the migraon finishes, the output displays: migrationhas been done.
3. Verify that the exisng logs are available.
1. Log in to the Panorama web interface.
2. Select Panorama > Monitor, select a log type that you know matches some exisng
logs (for example, Panorama > Monitor > System), and verify that the logs display.
While sll supported, switching from Legacy mode with a 50GB logging disk to Panorama
mode is not recommended for producon environments. If you switch to Panorama mode
with a 50GB logging disk, you are unable to add addional logging disks.
Panorama Administrator's Guide Version Version 10.1 130 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
2. Enter Y to confirm the mode change. The Panorama virtual appliance reboots. If the
reboot process terminates your terminal emulaon soware session, reconnect to the
Panorama virtual appliance to see the Panorama login prompt.
If you see a CMS Login prompt, this means the Panorama virtual appliance has not
finished reboong. Press Enter at the prompt without typing a username or password.
If you configured a local Log Collector, the local Log Collector sll exists on Panorama
when you change to Management Only mode despite having no log collecon capabilies.
Deleng the local Log Collector (Panorama > Managed Collectors) deletes the Eth1/1
interface configuraon the local Log Collector uses by default. If you decide to delete the
local Log Collector, you must reconfigure the Eth1/1 interface.
Panorama Administrator's Guide Version Version 10.1 131 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
2. Enter Y to confirm the mode change. The Panorama virtual appliance reboots. If the
reboot process terminates your terminal emulaon soware session, reconnect to the
Panorama virtual appliance to see the Panorama login prompt.
If you see a CMS Login prompt, this means the Panorama virtual appliance has not
finished reboong. Press Enter at the prompt without typing a username or password.
For addional log storage, you can also forward firewall logs to Dedicated Log Collectors
(see Configure a Managed Collector) or Configure Log Forwarding from Panorama to
External Desnaons.
Before expanding log storage capacity on Panorama, Determine Panorama Log Storage
Requirements.
• Preserve Exisng Logs When Adding Storage on Panorama Virtual Appliance in Legacy Mode
• Add a Virtual Disk to Panorama on an ESXi Server
• Add a Virtual Disk to Panorama on vCloud Air
• Add a Virtual Disk to Panorama on Alibaba Cloud
• Add a Virtual Disk to Panorama on AWS
Panorama Administrator's Guide Version Version 10.1 132 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Preserve Exisng Logs When Adding Storage on Panorama Virtual Appliance in Legacy
Mode
The Panorama virtual appliance in Legacy mode can use only one virtual disk for logging.
Therefore, if you add a virtual disk that is dedicated for logging, Panorama stops using the default
11GB log storage on the system disk and automacally copies any exisng logs to the new logging
disk. (Panorama connues using the system disk for data other than logs.)
If you replace an exisng dedicated logging disk of up to 2TB storage capacity with a disk of up to
8TB, you will lose the logs on the exisng disk. To preserve the logs, your choices are:
Configure log forwarding to external desnaons before you replace the virtual disk.
Set up a new Panorama virtual appliance for the new 8TB disk and maintain access to the
Panorama containing the old disk for as long as you need the logs. To forward firewall logs to
the new Panorama virtual appliance, one opon is to reconfigure the firewalls to connect with
the new Panorama IP address (select Device > Setup > Management and edit the Panorama
Sengs), add the firewalls as managed devices to the new Panorama, and Configure Log
Forwarding to Panorama. To reuse the old Panorama IP address on the new Panorama, another
opon is to export the configuraon of the old Panorama and then import and load the
configuraon on the new Panorama.
Copy logs from the old disk to the new disk. Copying can take several hours, depending on
how many logs the disk currently stores, and Panorama cannot collect logs during the process.
Contact Palo Alto Networks Customer Support for instrucons.
If Panorama loses connecvity to the new virtual disk, Panorama might lose logs during
the failure interval.
To allow for redundancy, use the virtual disk in a RAID configuraon. RAID10 provides the
best write performance for applicaons with high logging characteriscs.
If necessary, you can Replace the Virtual Disk on an ESXi Server.
Panorama Administrator's Guide Version Version 10.1 133 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
In Panorama mode, you can add disk sizes larger than 2TB and Panorama will
automacally create as many 2TB parons as possible. For example, if disk sdc
was 24TB, it will create 12 2TB parons. These disks will be named sdc1-12.
8. Select the Disk Provisioning format and click Next.
9. Specify a datastore or datastore structure, Browse to a datastore with enough space for
the specified Disk Size, click OK, and click Next.
10. Select a SCSI Virtual Device Node (you can use the default selecon) and click Next.
The selected node must be in SCSI format; Panorama will fail to boot if you
select another format.
11. Verify that the sengs are correct and then click Finish and OK.
The new disk appears in the list of devices for the virtual appliance.
12. Repeat Step 4 through Step 11 to add addional disks to the Panorama virtual appliance
if necessary.
13. Right click the Panorama virtual appliance and select Power > Power On. The virtual disk
inializes for first-me use. The size of the new disk determines how long inializaon
takes.
Name
: sdb
State : Present
Size : 2048000 MB
Panorama Administrator's Guide Version Version 10.1 134 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 5 | Verify that the Panorama Log Storage capacity has been increased.
1. Log in to the Panorama web interface.
2. Select Panorama > Collector Groups and select the Collector Group that the Panorama
virtual appliance belongs to.
3. Verify that the Log Storage capacity accurately displays the disk capacity.
Panorama Administrator's Guide Version Version 10.1 135 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If Panorama loses connecvity to the new virtual disk, Panorama might lose logs for the
duraon of the failure.
If necessary, you can Replace the Virtual Disk on vCloud Air.
In all modes, the first logging disk on the Panorama VM must be at least 2TB to add
addional disks. If the first logging disk is less than 2TB, you will be unable to add
addional disk space.
1. Access the vCloud Air web console and select your Virtual Private Cloud On Demand
region.
2. Select the Panorama virtual appliance in the Virtual Machines tab.
3. Add another disk (Acons > Edit Resources).
4. Set the Storage size. If the Panorama virtual appliance is in Panorama mode, set the size
to at least 2TB. If the appliance is in Legacy mode, you can set the size to as much as
8TB.
In Panorama mode, you can add disk sizes larger than 2TB and Panorama will
automacally create as many 2TB parons as possible. For example, if disk sdc
was 24TB, Panorama will create 12 2TB parons. These disks will be named
sdc1 through sdc12.
5. Set the storage er to Standard or SSD-Accelerated.
6. Repeat the previous steps to add addional disks to the Panorama virtual appliance as
needed.
7. Save your changes.
Name
: sdb
State : Present
Size : 2048000 MB
Status : Available
Panorama Administrator's Guide Version Version 10.1 136 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 5 | Verify that the Panorama Log Storage capacity has been increased.
1. Log in to the Panorama web interface.
2. Select Panorama > Collector Groups and select the Collector Group to which the virtual
Panorama appliance belongs.
3. Verify that the Log Storage capacity accurately displays your new disk capacity.
Panorama Administrator's Guide Version Version 10.1 137 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Select Elasc Compute Service > Instances & Images > Instances and navigate to the
Panorama virtual appliance instance.
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
Panorama Administrator's Guide Version Version 10.1 138 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Name : sdb
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 6 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to step 6.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 139 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 140 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
3. In the Volumes page, select the volume you, select Acons > Aach Volume.
4. Aach the Panorama virtual appliance Instance.
Name
Panorama Administrator's Guide Version Version 10.1 141 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
: sdb
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 5 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to step 6.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 142 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 143 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
1. In the Azure Dashboard, select the Panorama Virtual Machines to which you want to add
a logging disk.
2. Select Disks.
3. +Add data disk.
4. In the drop-down for the new disk, Create disk.
Panorama Administrator's Guide Version Version 10.1 144 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Name
: sdb
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048000 MB
Status : Available
Panorama Administrator's Guide Version Version 10.1 145 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 5 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to step 6.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 146 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
disk smaller than 2TB or a logging disk of a size that is not evenly divisible by 2TB because the
Panorama virtual appliance parons logging disks in to 2TB parons. For example, if you aach
a 4TB logging disk, Panorama will create two 2TB parons. However, you cannot add a 5TB
logging disk because the leover 1TB is not supported as a paron.
STEP 1 | Log in to the Google Cloud Console.
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
1. In the Products & Services menu, select and then Edit the Panorama virtual appliance
instance (Compute Engine > VM Instances).
2. In the Addional Disks secon, Add Item.
3. Create disk (Name drop-down).
Panorama Administrator's Guide Version Version 10.1 147 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Name
: sdb
State : Present
Size : 2048000 MB
Panorama Administrator's Guide Version Version 10.1 148 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 6 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to step 7.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 149 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Double-click the Panorama virtual appliance instance in the Virtual Machine Manager and
Show virtual hardware details .
STEP 3 | Add the virtual logging disk. Repeat this step as many mes as needed.
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
1. Create a disk image for a virtual image (Add Hardware > Storage) and configure the
virtual disk storage capacity to the appropriate 2TB value:2000GB or 14901.2GiB
depending on your Virtual Machine Manager.
Depending on the version, some Virtual Machine Managers use GiB (gibibyte)
to allocate memory. Be sure you correctly convert the required storage capacity
to avoid under provisioning the virtual logging disk and sending the Panorama
virtual appliance into maintenance mode.
2. In the Device type drop-down, select Disk device.
3. In the Bus type drop-down, select VirtIO or IDE based on your configuraon.
4. Expand Advanced opons and, in the Cache mode drop-down, select writethrough.
5. Click Finish.
Panorama Administrator's Guide Version Version 10.1 150 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Name
: sdb
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
Panorama Administrator's Guide Version Version 10.1 151 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to step 8.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 152 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Add the virtual logging disk. Repeat this step as many mes as needed.
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
1. Select the Panorama virtual appliance from the list of Virtual Machines, and select
Acon > Sengs.
2. In the Hardware list, select IDE Controller 0.
3. From the IDE Controller drives list, select Hard Drive and Add the new virtual logging
disk.
Panorama Administrator's Guide Version Version 10.1 153 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 154 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Name
: sdb
State : Present
Panorama Administrator's Guide Version Version 10.1 155 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Size : 2048000 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 7 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to Step 8.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 156 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Aach a virtual logging disk to the Panorama virtual appliance instance.
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order
to add addional disks. If the first logging disk is smaller than 2TB, you will be unable
to add addional disk space.
1. Select Compute > Instances and click the name of the Panorama virtual appliance
instance.
2. Under resources, select Aached Block Volumes and Aach Block Volume.
3. For the Volume, Select volume and select the virtual logging disk.
4. For the Access, select Read/Write.
5. Aach the virtual logging disk.
Panorama Administrator's Guide Version Version 10.1 157 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Name : sdb
State : Present
Size : 2048000 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with
the Reason : Admin disabled response:
request system disk add sdc
STEP 6 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an exisng Panorama virtual appliance, skip to step 6.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 158 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The Panorama virtual appliance in Panorama mode does not support NFS.
STEP 1 | Select Panorama > Setup > Operaons and, in the Miscellaneous secon, click Storage
Paron Setup.
STEP 4 | Enter the Log Directory path for storing the log files. For example, export/panorama.
STEP 5 | For the Protocol, select TCP or UDP, and enter the Port for accessing the NFS server.
To use NFS over TCP, the NFS server must support it. Common NFS ports are UDP/TCP
111 for RPC and UDP/TCP 2049 for NFS.
STEP 6 | For opmal NFS performance, in the Read Size and Write Size fields, specify the maximum
size of the chunks of data that the client and server pass back and forth to each other.
Defining a read/write size opmizes the data volume and speed in transferring data between
Panorama and the NFS datastore.
STEP 7 | (Oponal) Select Copy On Setup to copy the exisng logs stored on Panorama to the NFS
volume. If Panorama has a lot of logs, this opon might iniate the transfer of a large volume
of data.
STEP 8 | Click Test Logging Paron to verify that Panorama can access the NFS Server and Log
Directory.
STEP 10 | Select Commit > Commit to Panorama and Commit your changes. Unl you reboot, the
Panorama virtual appliance writes logs to the local storage disk.
STEP 11 | Select Panorama > Setup > Operaons and select Reboot Panorama in the Device
Operaons secon. Aer reboong, Panorama starts wring logs to the NFS datastore.
Panorama Administrator's Guide Version Version 10.1 159 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Right-click the Panorama virtual appliance and select Power > Power Off.
STEP 3 | Right-click the Panorama virtual appliance and select Edit Sengs.
STEP 5 | Select CPUs and specify the number of CPUs (the Number of virtual sockets mulplied by
the Number of cores per socket).
STEP 7 | Right-click the Panorama virtual appliance and select Power > Power On.
STEP 2 | In the Virtual Machines tab, select the Panorama virtual machine and Power Off.
Panorama Administrator's Guide Version Version 10.1 160 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Select Elasc Compute Service > Instances & Images > Instances and navigate to the
Panorama virtual appliance instance.
STEP 3 | In the Acons column, select More > Instance Status > Stop.
STEP 5 | In the Acons column for the Panorama virtual appliance instance, select More > Instance
Status > Start.
3. Verify that the num-cpus and ram-in-gb display the correct number of CPUs and
amount of memory as per the instance type you selected.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine aer you deploy it and this can result in a loss of log data.
Panorama Administrator's Guide Version Version 10.1 161 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | Log in to AWS Web Service console and select the EC2 Dashboard.
• Amazon Web Service Console
• AWS GovCloud Web Service Console
STEP 2 | On the EC2 Dashboard, select Instances and select the Panorama virtual appliance instance.
STEP 3 | Select Acons > Instance State > Stop to power off the Panorama virtual appliance instance.
STEP 4 | Select Acons > Instance Sengs > Change Instance Type to change the Panorama virtual
appliance instance type.
STEP 5 | Select the Instance Type to which you want to upgrade and Apply it.
STEP 6 | Select Acons > Instance State > Start to power on the Panorama virtual appliance instance.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine aer you deploy it and this can result in a loss of log data.
STEP 2 | On the Azure Dashboard, under Virtual machines, select the Panorama virtual appliance.
Panorama Administrator's Guide Version Version 10.1 162 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Choose the new virtual machine Size and then Select it.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine aer you deploy it and this can result in a loss of log data.
Panorama Administrator's Guide Version Version 10.1 163 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Save the changes to update the Panorama virtual appliance instance.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine aer you deploy it and this can result in a loss of log data.
STEP 1 | Shutdown the Panorama virtual appliance instance on the Virtual Machine Manager.
STEP 2 | Double-click the Panorama virtual appliance instance in the Virtual Machine Manager and
Show virtual hardware details .
Panorama Administrator's Guide Version Version 10.1 164 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine aer you deploy it and this can result in a loss of log data.
STEP 2 | On the Hyper-V Manager, select the Panorama virtual appliance instance form the list
of Virtual Machines, and select Acon > Sengs to edit the Panorama virtual appliance
resources.
Panorama Administrator's Guide Version Version 10.1 165 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Increase the CPUs and Memory for Panorama on Oracle Cloud Infrastructure (OCI)
You can change the instance type of the Panorama™ virtual appliance to increase the CPUs
and memory allocated to the Panorama virtual appliance instance. Be sure to review the Setup
Prerequisites for the Panorama Virtual Appliance before modifying the Panorama virtual appliance
instance CPUs and memory.
STEP 1 | Log in to the Oracle Cloud Infrastructure console.
Panorama Administrator's Guide Version Version 10.1 166 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
3. Verify that the num-cpus and ram-in-gb display the correct number of CPUs and
amount of memory as per the instance type you selected.
Decreasing the Panorama virtual appliance system disk back to 81GB is not supported.
STEP 1 | (Best Pracce) Save and Export Panorama and Firewall Configuraons.
Save and export your Panorama and firewall configuraon to ensure you can recover Panorama
if you encounter any issues.
STEP 2 | Access the VMware vSphere Client and navigate to your Panorama virtual appliance.
STEP 3 | Right-click the Panorama virtual appliance and select Power > Power Off.
Panorama Administrator's Guide Version Version 10.1 167 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Right-click the Panorama virtual appliance and select Power > Power On.
Panorama may take up to 30 minutes to inialize the new system disk. During this me
the Panorama web interface and CLI are unavailable.
Panorama Administrator's Guide Version Version 10.1 168 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Migrate disk data from the old system disk to the new system disk.
In this example, we are migrang to the newly added system disk labeled sdb.
1. Log in to the Panorama CLI.
2. Enter the following command to view the available system disks for migraon:
3. Migrate the disk data to the new system disk using the following command:
Panorama Administrator's Guide Version Version 10.1 169 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 8 | Modify the Virtual Device Node for the new system disk.
1. Expand the sengs opons for the new system disk.
2. Select SCSI(0:0) as the Virtual Device Node.
3. Click OK to save your configuraon changes.
STEP 9 | Right-click the Panorama virtual appliance and select Power > Power On.
STEP 10 | Verify that you successfully migrated to the new system disk.
1. Log in to the Panorama CLI.
2. Enter the following command to view the system disk parons.
You must add the /dev/root, /dev/sda5, /dev/sda6, and /dev/sda8 parons to
confirm the disk size is increased.
Panorama Administrator's Guide Version Version 10.1 170 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 171 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Migrate disk data from the old system disk to the new system disk.
In this example, we are migrang to the newly added system disk labeled sdb.
1. Log in to the Panorama CLI.
2. Enter the following command to view the available system disks for migraon:
3. Migrate the disk data to the new system disk using the following command:
Panorama Administrator's Guide Version Version 10.1 172 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Verify that you successfully migrated to the new system disk.
1. Log in to the Panorama CLI.
2. Enter the following command to view the system disk parons.
You must add the /dev/root, /dev/sda5, /dev/sda6, and /dev/sda8 parons to
confirm the disk size is increased.
Panorama Administrator's Guide Version Version 10.1 173 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Convert Your Evaluaon Panorama to a Producon Panorama with Local Log Collector
If you have an evaluaon Panorama™ virtual appliance in Panorama mode configured with a local
Log Collector, you can convert it to a producon Panorama by migrang the configuraon from
the evaluaon Panorama to the producon Panorama and modifying as needed.
Logs ingested by the Log Collector on a Panorama virtual appliance cannot be migrated.
If you need to maintain access to the logs stored on your evaluaon Panorama virtual
appliance, aer you migrate the evaluaon Panorama configuraon to the producon
Panorama, keep your evaluaon Panorama powered on to access the logs locally for
the remainder of the evaluaon license lifeme. Adding the evaluaon Panorama to the
producon Panorama as a managed collector is not supported.
STEP 3 | Acvate the device management license on the Palo Alto Networks Custer Support Portal
(CSP) for the producon Panorama virtual appliance.
1. Log in to the Palo Alto Networks CSP.
2. Select Assets > Devices and locate your Panorama virtual appliance.
3. In the Acon column, click the pencil icon to edit the device licenses.
4. Select Acvate Auth-Code and enter the Authorizaon Code.
5. Select Agree and Submit to acvate the device management license.
STEP 4 | Export the Panorama configuraon from the evaluaon Panorama virtual appliance.
1. Log in to the Panorama Web Interface.
2. Select Panorama > Setup > Operaons.
3. Click Export named Panorama configuraon snapshot, select running-config.xml
and click OK. Panorama exports the configuraon to your client system as an XML file.
4. Locate the running-config.xml file you exported and rename the XML file. This is
required to import the configuraon as Panorama does not support imporng an XML
file with the name running-config.xml.
Panorama Administrator's Guide Version Version 10.1 174 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Load the Panorama configuraon snapshot that you exported from the evaluaon Panorama
virtual appliance into the producon Panorama virtual appliance.
1. Log in to the Panorama Web Interface of the producon Panorama virtual appliance.
2. Select Panorama > Setup > Operaons.
3. Click Import named Panorama configuraon snapshot, Browse to the Panorama
configuraon file you exported from the Panorama virtual appliance, and click OK.
4. Click Load named Panorama configuraon snapshot, select the Name of the
configuraon you just imported, leave the Decrypon Key blank (empty), and click OK.
Panorama overwrites its current candidate configuraon with the loaded configuraon.
Panorama displays any errors that occur when loading the configuraon file.
5. If errors occurred, save them to a local file. Resolve each error to ensure the migrated
configuraon is valid.
STEP 8 | Verify that the support and device management licenses are successfully acvated.
1. Select Panorama > Licenses and Retrieve license keys from license server.
2. Verify the Device Management License displays the correct number of devices.
3. Select Panorama > Support and verify that the correct support Level and Expiry Date are
displayed.
Panorama Administrator's Guide Version Version 10.1 175 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Synchronize the producon Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the producon Panorama virtual appliance, select Panorama > Managed Devices and
verify that the Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
STEP 2 | Select Panorama > Setup > Management and edit the General Sengs.
All administrators are logged out of the Panorama web interface and CLI when
you restart the management server.
Panorama Administrator's Guide Version Version 10.1 176 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | Verify that the support and device management licenses are successfully acvated.
1. Log in to the Panorama web interface.
2. Select Panorama > Licenses and Retrieve license keys from license server.
3. Verify the Device Management License displays the correct number of devices.
4. Select Panorama > Support and verify that the correct support Level and Expiry Date are
displayed.
STEP 8 | Synchronize the producon Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the producon Panorama virtual appliance, select Panorama > Managed Devices and
verify that the Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
Convert Your Evaluaon Panorama to VM-Flex Licensing with Local Log Collector
If you have an evaluaon Panorama™ virtual appliance in Panorama mode configured with a local
Log Collector, you can convert it to a producon Panorama with VM Flex licensing by migrang
the configuraon from the evaluaon Panorama to the producon Panorama and modifying as
needed.
If a local Log Collector is not configured, see Convert Your Evaluaon Panorama to VM-Flex
Licensing without Local Log Collector.
Logs ingested by the Log Collector on a Panorama virtual appliance cannot be migrated.
If you need to maintain access to the logs stored on your evaluaon Panorama virtual
appliance, aer you migrate the evaluaon Panorama configuraon to the producon
Panorama, keep your evaluaon Panorama powered on to access the logs locally for
the remainder of the evaluaon license lifeme. Adding the evaluaon Panorama to the
producon Panorama as a managed collector is not supported.
Panorama Administrator's Guide Version Version 10.1 177 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
important details about soware versions, see Panorama, Log Collector, Firewall, and
WildFire Version Compability.
Schedule a maintenance window for the migraon.
STEP 2 | Obtain the Panorama serial number and auth code from your flexible VM-Series licensing
deployment profile.
1. Log in to the Palo Alto Networks Customer Support Portal (CSP).
2. Create a deployment profile that enables a Panorama virtual appliance.
3. Provision Panorama to generate the a serial number for Panorama.
4. Copy the Serial Number and Auth Code.
STEP 4 | Acvate the device management license on the Palo Alto Networks CSP for the producon
Panorama virtual appliance.
1. Select Assets > Devices and locate your Panorama virtual appliance.
2. In the Acon column, click the pencil icon to edit the device licenses.
3. Select Acvate Auth-Code and enter the Authorizaon Code.
4. Select Agree and Submit to acvate the device management license.
STEP 5 | Export the Panorama configuraon from the evaluaon Panorama virtual appliance.
1. Log in to the Panorama Web Interface.
2. Select Panorama > Setup > Operaons.
3. Click Export named Panorama configuraon snapshot, select running-config.xml
and click OK. Panorama exports the configuraon to your client system as an XML file.
4. Locate the running-config.xml file you exported and rename the XML file. This is
required to import the configuraon as Panorama does not support imporng an XML
file with the name running-config.xml.
STEP 6 | Load the Panorama configuraon snapshot that you exported from the evaluaon Panorama
virtual appliance into the producon Panorama virtual appliance.
1. Log in to the Panorama Web Interface of the producon Panorama virtual appliance.
2. Select Panorama > Setup > Operaons.
3. Click Import named Panorama configuraon snapshot, Browse to the Panorama
configuraon file you exported from the Panorama virtual appliance, and click OK.
4. Click Load named Panorama configuraon snapshot, select the Name of the
configuraon you just imported, leave the Decrypon Key blank (empty), and click OK.
Panorama Administrator's Guide Version Version 10.1 178 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama overwrites its current candidate configuraon with the loaded configuraon.
Panorama displays any errors that occur when loading the configuraon file.
5. If errors occurred, save them to a local file. Resolve each error to ensure the migrated
configuraon is valid.
STEP 9 | Verify that the support and device management licenses are successfully acvated.
1. Select Panorama > Licenses and Retrieve license keys from license server.
2. Verify the Device Management License displays the correct number of devices.
3. Select Panorama > Support and verify that the correct support Level and Expiry Date are
displayed.
Panorama Administrator's Guide Version Version 10.1 179 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 10 | Synchronize the producon Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the producon Panorama virtual appliance, select Panorama > Managed Devices and
verify that the Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
Convert Your Evaluaon Panorama to VM-Flex Licensing without Local Log Collector
Change the serial number of your evaluaon Panorama virtual appliance in Management Only
mode or in Panorama mode with no local Log Collector configured to convert it to a producon
Panorama virtual appliance.
If a local Log Collector is configured, see Convert Your Evaluaon Panorama to VM-Flex Licensing
with Local Log Collector.
STEP 1 | Obtain the Panorama serial number and auth code from your flexible VM-Series licensing
deployment profile.
1. Log in to the Palo Alto Networks Customer Support Portal (CSP).
2. Create a deployment profile that enables a Panorama virtual appliance.
3. Provision Panorama to generate the a serial number for Panorama.
4. Copy the Serial Number and Auth Code.
STEP 3 | Select Panorama > Setup > Management and edit the General Sengs.
Panorama Administrator's Guide Version Version 10.1 180 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
All administrators are logged out of the Panorama web interface and CLI when
you restart the management server.
STEP 8 | Verify that the support and device management licenses are successfully acvated.
1. Log in to the Panorama web interface.
2. Select Panorama > Licenses and Retrieve license keys from license server.
3. Verify the Device Management License displays the correct number of devices.
4. Select Panorama > Support and verify that the correct support Level and Expiry Date are
displayed.
STEP 9 | Synchronize the producon Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the producon Panorama virtual appliance, select Panorama > Managed Devices and
verify that the Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
Panorama Administrator's Guide Version Version 10.1 181 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
During conversion from a producon Panorama to ELA licensing, do not change the
Panorama serial number if a local Log Collector is configured.
The log on the local Log collector become inaccessible and other Log Collectors in the
Collector Group may become inaccessible and no longer ingest logs if the serial number of
a Log Collector is changed.
Panorama Administrator's Guide Version Version 10.1 182 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
below to assist in filing the support cket. Create the cket exactly as displayed below, and
select the OS Release your Panorama is running.
Connue to the next step only aer Palo Alto Networks support successfully resolves your
support cket.
• Panorama virtual appliance in Management Only mode or Panorama mode with no local
Log Collector.
1. Generate a serial number from your ELA licensing pool.
1. Log in to the Palo Alto Networks CSP.
2. Select Assets > VM-Series Auth-Codes and locate your ELA licensing pool.
3. In the Acons column, select Panorama and Provision a new serial number.
Confirm the new serial number provision when prompted.
4. Copy the newly provisioned serial number.
2. Log in to the Panorama web interface.
3. Select Panorama > Setup > Management and edit the General Sengs.
4. Enter the Serial Number you provisioned.
5. Click OK.
6. Select Commit and Commit to Panorama.
STEP 2 | Log in to the Panorama web interface if not already logged in.
STEP 3 | Select Panorama > Licenses and Retrieve new licenses from the license server.
STEP 4 | Verify that Panorama retrieved the new licenses as per your ELA agreement.
Panorama Administrator's Guide Version Version 10.1 183 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Verify that the support and device management licenses are successfully acvated.
1. Select Panorama > Licenses and verify that the correct licenses are acvated.
2. Select Panorama > Support and verify that the correct support Level and Expiry Date are
displayed.
Panorama Administrator's Guide Version Version 10.1 184 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The M-Series appliances do not support Link Aggregaon Control Protocol (LACP) for
aggregang interfaces.
Supported Interfaces
Interfaces can be used for device management, log collecon, Collector Group communicaon,
licensing and soware updates. See Configure Panorama to Use Mulple Interfaces for more
informaon on network segmentaon.
Panorama Administrator's Guide Version Version 10.1 185 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Management 1Gbps
(MGT)
Ethernet 1 1Gbps
(Eth1)
Ethernet 2 1Gbps
(Eth2)
Ethernet 3 1Gbps
(Eth3)
Ethernet 4 10Gbps —
(Eth4)
Ethernet 5 10Gbps —
(Eth5)
Logging Rates
Review the logging rates for the all M-Series appliance models. To achieve the logging rates listed
below, the M-Series appliance must be a single log collector in a collector group and you must
install all the logging disks for your M-Series model. For example, to achieve 30,000 logs/second
for the M-500 appliance, you must install all 12 logging disks with either 1TB or 2TB disks.
Maximum Log Storage 48TB (12x8TB RAID • 24TB (24x2TB 16TB (4x8TB RAID
on Appliance disk) RAID disks) disk)
• 12TB (24x1TB
RAID Disk)
Panorama Administrator's Guide Version Version 10.1 186 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Default Log Storage on 16TB (4x8TB RAID 4TB (4x2TB RAID 16TB (4x8TB RAID
Appliance disks) disks) disks)
If you are configuring an M-Series appliance in Log Collector mode with 10GB interfaces,
you must complete this enre configuraon procedure for the 10GB interfaces to display
as Up.
STEP 1 | Gather the required interface and server informaon from your network administrator.
• Gather the IP address, netmask (for IPv4) or prefix length (for IPv6), and default gateway for
each interface that you plan to configure (MGT, Eth1, Eth2, Eth3, Eth4, Eth5). Only the MGT
interface is mandatory.
Palo Alto Networks recommends that you specify all these sengs for the MGT
interface. If you omit values for some of these sengs (such as the default gateway),
you can access Panorama only through the console port for future configuraon
changes. You cannot commit the configuraons for other interfaces unless you
specify all these sengs.
If you plan to use the appliance as a Panorama management server, Palo Alto Networks
recommends using the MGT interface only for managing Panorama and using other
interfaces for managing devices, collecng logs, communicang with Collector Groups, and
deploying updates to devices (see M-Series Appliance Interfaces).
• Gather the IP addresses of the DNS servers.
Panorama Administrator's Guide Version Version 10.1 187 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Starng with PAN-OS 9.0.4, the predefined, default administrator password (admin/
admin) must be changed on the first login on a device. The new password must be
a minimum of eight characters and include a minimum of one lowercase and one
uppercase character, as well as one number or special character.
Be sure to use the best pracces for password strength to ensure a strict password
and review the password complexity sengs.
1. Click the admin link in the lower le of the web interface.
2. Enter the Old Password, New Password, and Confirm New Password, and then click OK.
Store the new password in a safe locaon.
To ensure that the MGT interface remains secure, configure Minimum Password
Complexity sengs (select Panorama > Setup > Management) and specify the
interval at which administrators must change their passwords.
Panorama Administrator's Guide Version Version 10.1 188 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Configure the network access sengs for each interface that you will use to manage
Panorama, manage devices, collect logs, communicate with Collector Groups, and deploy
updates to devices.
1. Select Panorama > Setup > Interfaces and click the Interface Name.
2. (Non-MGT interfaces only) Enable the interface.
3. Edit the network access sengs of each interface that Panorama will use. Only the MGT
interface is required. The Eth1, Eth2, Eth3, Eth4, and Eth5 interfaces are oponal and
apply only if you plan to use the M-Series appliance as a Panorama management server.
1. Complete one or both of the following field sets based on the IP protocols of your
network:
IPv4—Public IP Address, IP Address, Netmask, and Default Gateway
(MGT interface only) Disable Telnet and HTTP; these services use plaintext
and so are less secure than other services.
4. Click OK to save your changes.
Panorama Administrator's Guide Version Version 10.1 189 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
synchronized and that the process of querying logs and generang reports on Panorama
is harmonious.
3. Enter a Hostname for the server. Panorama uses this as the display name/label for the
appliance. For example, this is the name that appears at the CLI prompt. It also appears
in the Collector Name field if you add the appliance as a managed collector on the
Panorama > Managed Collectors page.
4. (Oponal) Enter the Latude and Longitude to enable accurate placement of the M-
Series appliance on the world map. The App Scope > Traffic Maps and App Scope >
Threat Maps use these values.
5. Click OK to save your entries.
STEP 6 | Configure the DNS servers and Palo Alto Networks Update Server.
1. Select Panorama > Setup > Services and edit the sengs.
2. Enter the IP address of the Primary DNS Server and (oponally) of the Secondary DNS
Server.
3. Enter the URL or stac address of the Update Server (default
updates.paloaltonetworks.com).
Select Verify Update Server Identy if you want Panorama to verify that the
Update Server from which it downloads soware or content packages has an SSL
cerficate that a trusted authority signed. This opon adds an addional level
of security for communicaon between the Panorama management server and
Update Server.
4. Click OK to save your entries.
If you plan to use the M-Series appliance as a Panorama management server and you
configured interfaces other than MGT, you must assign those interfaces to the Device
Log Collecon or Collector Group Communicaon funcons when you Configure a
Managed Collector. To make the interfaces operaonal, you must then Configure a
Collector Group for the managed collector and perform a Collector Group commit.
Panorama Administrator's Guide Version Version 10.1 190 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 8 | Verify network access to external services required for Panorama management, such as the
Palo Alto Networks Update Server.
1. Connect to the M-Series appliance in one of the following ways:
• Aach a serial cable from your computer to the Console port on the M-Series
appliance. Then use a terminal emulaon soware (9600-8-N-1) to connect.
• Use terminal emulaon soware such as PuTTY to open an SSH session to the IP
address that you specified for the MGT interface of the M-Series appliance during
inial configuraon.
2. Log in to the CLI when prompted. Use the default admin account and the password that
you specified during inial configuraon.
3. Use the Update Server Connecvity test to verify network connecvity to the Palo Alto
Networks Update Server as shown in the following example.
1. Select Panorama > Managed Devices > Troubleshoong, and select Updates Server
Connecvity from the Select Test drop-down.
2. Execute the update server connecvity test.
4. Use the following CLI command to retrieve informaon on the support entlement for
Panorama from the Update Server:
If you have connecvity, the Update Server responds with the support status for
Panorama. Because Panorama is not registered, the Update Server returns the following
message:
Contact Us
https://www.paloaltonetworks.com/company/contact-us.html
Support Home
Panorama Administrator's Guide Version Version 10.1 191 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
https://www.paloaltonetworks.com/support/tabs/overview.html
Device not found on this update server
As a best pracce, replace the default cerficate that Panorama uses to secure
HTTPS traffic over the MGT interface.
If you configured a local Log Collector, the local Log Collector sll exists on Panorama
when you change to Management Only mode despite having no log collecon capabilies.
Deleng the local Log Collector (Panorama > Managed Collectors) deletes the Eth1/1
interface configuraon the local Log Collector uses by default. If you decide to delete the
local Log Collector, you must reconfigure the Eth1/1 interface.
STEP 1 | Rack mount the M-Series appliance. Refer to the M-Series Appliance Hardware Reference
Guide for instrucons.
Panorama Administrator's Guide Version Version 10.1 192 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | Rack mount the M-Series appliance. Refer to the M-Series Appliance Hardware Reference
Guide for instrucons.
STEP 5 | Configure each array. This task is required to make the RAID disks available for logging.
Oponally, you can add disks to Increase Storage on the M-Series Appliance.
STEP 1 | Rack mount the M-Series appliance. Refer to the M-Series Appliance Hardware Reference
Guide for instrucons.
Panorama Administrator's Guide Version Version 10.1 193 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Configure each array. This task is required to make the RAID disks available for logging.
Oponally, you can add disks to Increase Storage on the M-Series Appliance.
If you are configuring an M-Series appliance in Log Collector mode with 10GB interfaces,
you must complete this enre configuraon procedure for the 10GB interfaces to display
as Up.
Switching the M-Series appliance from Panorama mode to Log Collector mode reboots
the appliance, deletes the local Log Collector, deletes any exisng log data, and deletes
all configuraons except the management access sengs. Switching the mode does not
delete licenses, soware updates, or content updates.
STEP 1 | Set up the Panorama management server that will manage the Log Collector if you have not
already done so.
Perform one of the following tasks:
• Set Up the Panorama Virtual Appliance
• Set Up the M-Series Appliance
Panorama Administrator's Guide Version Version 10.1 194 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Set up the M-Series appliance that will serve as a Dedicated Log Collector.
If you previously deployed this appliance as a Panorama management server, you can skip this
step because the MGT interface is already configured and the licenses and updates are already
installed.
The M-Series appliance in Log Collector mode does not have a web interface for configuraon
tasks, only a CLI. Therefore, before changing the mode on the M-Series appliance, use the web
interface in Panorama mode to:
1. Perform Inial Configuraon of the M-Series Appliance.
2. Register Panorama and Install Licenses.
3. Install Content and Soware Updates for Panorama.
Panorama Administrator's Guide Version Version 10.1 195 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
2. Enter Y to confirm the mode change. The M-Series appliance reboots. If the reboot
process terminates your terminal emulaon soware session, reconnect to the M-Series
appliance to see the Panorama login prompt.
If you see a CMS Login prompt, this means the Log Collector has not finished
reboong. Press Enter at the prompt without typing a username or password.
3. Log back in to the CLI.
4. Verify that the switch to Log Collector mode succeeded:
system-mode: logger
Panorama Administrator's Guide Version Version 10.1 196 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The me required to configure the drives varies from several minutes to a couple of
hours, based on the amount of data on the drives.
1. Determine which disk pairs are present for configuring as RAID pairs on the M-Series
appliance:
Perform the remaining steps to configure each disk pair that has present disks. This
example uses disk pair A1/A2.
2. To add the first disk in the pair, enter the following command and enter y when
prompted to confirm the request:
Wait for the process to finish before adding the next disk in the pair. To monitor the
progress of the RAID configuraon, re-enter:
Aer the process finishes for the first disk, the output displays the disk pair status as
Available but degraded.
3. Add the second disk in the pair:
Aer the process finishes for the second disk, the output displays the disk pair status as
Available and clean:
Panorama Administrator's Guide Version Version 10.1 197 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | Enable connecvity between the Log Collector and Panorama management server.
Enter the following commands at the Log Collector CLI, where <IPaddress1> is for the MGT
interface of the solitary (non-HA) or acve (HA) Panorama and <IPaddress2> is for the MGT
interface of the passive (HA) Panorama, if applicable.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
# exit
STEP 9 | Add the Log Collector as a managed collector to the Panorama management server.
1. Select Panorama > Managed Collectors and Add a managed collector.
2. In the General sengs, enter the serial number (Collector S/N) you recorded for the Log
Collector.
3. In the Panorama Server IP field, enter the IP address or FQDN of the solitary (non-HA)
or acve (HA) Panorama. For HA deployments, enter the IP address or FQDN of the
passive Panorama peer in the Panorama Server IP 2 field.
These IP addresses must specify a Panorama interface that has Device Management and
Device Log Collecon services enabled. By default, these services are enabled only on
the MGT interface. However, you might have enabled the services on other interfaces
when you Set Up the M-Series Appliance that is a Panorama management server.
4. Select Interfaces, click Management, and configure one or both of the following field
sets for the MGT interface based on the IP protocols of your network.
• IPv4—IP Address, Netmask, and Default Gateway
• IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
5. Click OK twice to save your changes to the Log Collector.
6. Select Commit > Commit to Panorama and Commit your changes to the Panorama
configuraon.
This step is required before you can enable logging disks.
7. Verify that Panorama > Managed Collectors lists the Log Collector you added. The
Connected column displays a check mark to indicate that the Log Collector is connected
Panorama Administrator's Guide Version Version 10.1 198 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
to Panorama. You might have to wait a few minutes before the page displays the updated
connecon status.
At this point, the Configuraon Status column displays Out of Sync and the Run
Time Status column displays disconnected. The status will change to In Sync and
connected aer you configure a Collector Group (Step Assign the Log Collector
to a Collector Group.).
STEP 11 | (Recommended) Configure the Ethernet1, Ethernet2, Ethernet3, Ethernet4, and Ethernet5
interfaces if the Panorama management server and Log Collector will use them for Device
Log Collecon (receiving logs from firewalls) and Collector Group Communicaon.
If you previously deployed the Log Collector as a Panorama management server and configured
these interfaces, you must reconfigure them because switching to Log Collector mode (Switch
Panorama Administrator's Guide Version Version 10.1 199 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
from Panorama mode to Log Collector mode.) would have deleted all configuraons except the
management access sengs.
1. Configure each interface on the Panorama management server (other than the MGT
interface) if you haven’t already:
1. Select Panorama > Setup > Interfaces and click the Interface Name.
2. Select <interface-name> to enable the interface.
3. Complete one or both of the following field sets based on the IP protocols of your
network:
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Select the Device Management Services that the interface supports:
Device Management and Device Log Collecon—You can assign one or more
interfaces.
Collector Group Communicaon—You can assign only one interface.
Device Deployment (soware and content updates)—You can assign only one
interface.
5. Click OK to save your changes.
2. Configure each interface on the Log Collector (other than the MGT interface):
1. Select Panorama > Managed Collectors and edit the Log Collector.
2. Select Interfaces and click the name of the interface.
3. Select <interface-name> to enable the interface.
4. Complete one or both of the following field sets based on the IP protocols of your
network:
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
5. Select the Device Management Services that the interface supports:
Device Log Collecon—You can assign one or more interfaces.
Collector Group Communicaon—You can assign only one interface.
6. Click OK to save your changes to the interface.
3. Click OK to save your changes to the Log Collector.
4. Select Commit > Commit to Panorama and Commit your changes to the Panorama
configuraon.
Panorama Administrator's Guide Version Version 10.1 200 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 12 | (Oponal) If your deployment is using custom cerficates for authencaon between
Panorama and managed devices, deploy the custom client device cerficate. For more
informaon, see Set Up Authencaon Using Custom Cerficates.
1. Select Panorama > Cerficate Management > Cerficate Profile and choose the
cerficate profile from the drop-down or click New Cerficate Profile to create one.
2. Select Panorama > Managed Collectors > Add > Communicaon for a Log Collector.
3. Select the Secure Client Communicaon check box.
4. Select the type of device cerficate the Type drop-down.
• If you are using a local device cerficate, select the Cerficate and Cerficate Profile
from the respecve drop-downs.
• If you are using SCEP as the device cerficate, select the SCEP Profile and Cerficate
Profile from the respecve drop-downs.
5. Click OK.
Panorama Administrator's Guide Version Version 10.1 201 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 13 | (Oponal) Configure Secure Server Communicaon on a Log Collector. For more informaon,
see Set Up Authencaon Using Custom Cerficates.
1. Select Panorama > Managed Collectors > Add > Communicaon.
2. Verify that the Custom Cerficate Only check box is not selected. This allows you to
connue managing all devices while migrang to custom cerficates.
When the Custom Cerficate Only check box is selected, the Log Collector
does not authencate and cannot receive logs from devices using predefined
cerficates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This
SSL/TLS service profile applies to all SSL connecons between the Log Collector and
devices sending it logs.
4. Select the cerficate profile from the Cerficate Profile drop-down.
5. Select Authorize Client Based on Serial Number to have the server check clients against
the serial numbers of managed devices. The client cerficate must have the special
keyword $UDID set as the CN to authorize based on serial numbers.
6. In Disconnect Wait Time (min), enter the number of minutes Panorama should wait
before breaking and reestablishing the connecon with its managed devices. This field is
blank by default and the range is 0 to 44,640 minutes.
The disconnect wait me does not begin counng down unl you commit the
new configuraon.
7. (Oponal) Configure an authorizaon list.
1. Click Add under Authorizaon List.
2. Select the Subject or Subject Alt Name as the Idenfier type.
3. Enter an idenfier of the selected type.
4. Click OK.
5. Select Check Authorizaon List to enforce the authorizaon list.
8. Click OK.
9. Select Commit > Commit to Panorama.
Panorama Administrator's Guide Version Version 10.1 202 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
the Eth1, Eth2, Eth3, Eth4, and Eth5 interfaces (if you configured them) in an operaonal
state on the Log Collector.
In any single Collector Group, all the Log Collectors must run on the same
Panorama model: all M-600 appliances, all M-500 appliances, all M-200
appliances, or all Panorama virtual appliances.
As a best pracce, Enable log redundancy across collectors if you add mulple
Log Collectors to a single Collector group. This opon requires each Log Collector
to have the same number of logging disks.
2. Select Panorama > Managed Collectors to verify that the Log Collector configuraon is
synchronized with Panorama.
The Configuraon Status column should display In Sync and the Run Time Status column
should display connected.
3. Access the Log Collector CLI and enter the following command to verify that its
interfaces are operaonal:
The output displays the state as up for each interface that is operaonal.
4. If the Collector Group has mulple Log Collectors, Troubleshoot Connecvity to Network
Resources to verify they can communicate with each other by performing a Ping
connecvity test for each interface that the Log Collectors use. For the source IP
address, specify the interface of one of the Log Collectors. For the host IP address,
specify the matching interface of another Log Collector in the same Collector Group.
The M-Series appliances leverage RAID 1 for data redundancy in the event of disk failure.
Therefore, the pair of drives in a RAID 1 array need to be idencal. However, you are free
to mix drive capacies across different RAID 1 arrays. For example, the drives in the A1/
A2 RAID 1 array can be 1TB drives, and the drives in the B1/B2 RAID 1 array can be 2TB
drives.
The following table lists the maximum number of drive bays (disks) and the available drive
capacies supported on M-Series appliances.
Panorama Administrator's Guide Version Version 10.1 203 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Because each drive pair (A1/A2 for example) is in a RAID 1 array, the total storage
capacity is half of the total drives installed. For example, if an M-500 appliance has 2TB
drives installed in drive bays A1/A2 and B1/B2, the A1/A2 array provides 2TB total
storage and the B1/B2 array provides another 2TB for a total of 4TB.
M-200 4 8TB
Appliance
M-600 12 8TB
Appliance
Before expanding log storage capacity, Determine Panorama Log Storage Requirements. If you
need more log storage than a single M-Series appliance supports, you can add Dedicated Log
Collectors (see Configure a Managed Collector) or you can Configure Log Forwarding from
Panorama to External Desnaons.
You don’t need to take the M-Series appliance offline to expand the storage when adding
drives to an M-Series appliance that is already deployed. When the addional drives
are configurable and available, the M-Series appliance redistributes the logs among all
available drives. This log redistribuon process happens in the background and does
not impact upme or the availability of the M-Series appliance. However, the process
does diminish the maximum logging rate. The Redistribuon State column (Panorama >
Collector Groups) indicates the compleon status of the process as a percentage.
STEP 2 | Access the command line interface (CLI) on the M-Series appliance.
Connect to the M-Series appliance in one of two ways:
• Connect a serial cable from your computer to the Console port and connect to the M-Series
appliance using terminal emulaon soware (9600-8-N-1).
• Use terminal emulaon soware (such as PuTTY) to open a Secure Shell (SSH) session to the
IP address of the M-Series appliance.
Panorama Administrator's Guide Version Version 10.1 204 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
The me required to mirror the data on the drive can take minutes, a few hours, or
more than a day depending on the amount of data on the drive.
2. To monitor the progress of the RAID configuraon, enter the following command:
Panorama Administrator's Guide Version Version 10.1 205 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | Access the command line interface (CLI) on the M-Series appliance.
Connect to the M-Series appliance in one of two ways:
• Connect a serial cable from your computer to the Console port and connect to the M-Series
appliance using terminal emulaon soware (9600-8-N-1).
• Use terminal emulaon soware (such as PuTTY) to open a Secure Shell (SSH) session to the
IP address of the M-Series appliance.
STEP 3 | Verify that the RAID 1 status for the installed drives shows there are at least two funconing
RAID 1 arrays. During the upgrade, you will upgrade one RAID 1 array at a me and there
must be at least one other RAID 1 array that is available to the appliance. The appliance will
show an abort error if you try to remove the only funconing array from the configuraon.
Enter the following command to view RAID status:
For example, the following shows an output from an M-500 appliance with two available arrays
(Disk Pair A and Disk Pair B). If there is only one available array, you must add a second array as
described in Add Addional Drives to an M-Series Appliance before you upgrade the drives.
Panorama Administrator's Guide Version Version 10.1 206 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Status clean
Disk id B1 Present
model : ST91000640NS
size : 953869 MB
status : active sync
Disk id B2 Present
model : ST91000640NS
size : 953869 MB
status : active sync
STEP 4 | Remove the first 1TB drive and replace it with a 2TB drive.
1. To remove the first drive from the RAID 1 array configuraon (A1 in this example), enter
the following command and enter y when prompted to confirm the request:
2. Physically remove the first drive from the drive bay. Press the ejector buon on the drive
carrier in drive bay A1 to release the ejector handle. Then pull the handle toward you and
slide the drive out of the appliance.
3. Remove a 2TB drive from its packaging and place the drive on a table next to the drive
you just removed. Take note of how the drive is installed in the carrier because you will
install the 2TB drive in this same carrier.
4. Remove the four screws holding the 1TB drive in the carrier and remove the drive from
the carrier.
5. Aach the 2TB drive to the carrier using the same four screws you removed from the
1TB drive and then reinsert the carrier with the 2TB drive into drive bay A1.
6. Enter the following command to verify the 2TB drive is recognized:
Verify that the A1 disk shows the correct model and size (about 2TB). If the model and
size are not correct, run the above command again unl the correct model and size are
shown.
If the wrong model and size are consistently shown, enter the following command:
Wait for 30 seconds once you run the above command, then remove the disk and
reinsert it and repeat the show system raid detail command to verify the size and
model.
Panorama Administrator's Guide Version Version 10.1 207 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Copy the data from the remaining installed 1TB drive in the RAID 1 array to the newly
installed 2TB drive in that array.
The me required to copy the data may vary from several minutes to a few hours,
depending on the amount of data on the drive.
1. To copy the data from the 1TB drive in drive bay A2 to the newly installed 2TB drive in
drive bay A1, enter the following command and enter y when prompted:
2. To view the status of the copy process, run the following command:
Connue running this command to view the RAID detail output unl you see that the
array (A1/A2 in this example) shows Available.
At this point, drive A2 will show not in use because there is a drive size
mismatch.
STEP 6 | Upgrade the second drive in the RAID 1 array to a 2TB drive.
1. Remove the second 1TB drive (from drive bay A2 in the current example) for the RAID 1
array configuraon:
2. Insert the carrier with the newly installed 2TB drive into drive bay A2 and add it to the
RAID 1 array configuraon:
The system will copy the data from A2 to A1 to mirror the drives.
3. To view the status of the copy process, run the following command:
Connue to view the RAID detail output unl you see that the array (A1/A2 in this
example) shows Available and both disks show active sync.
Panorama Administrator's Guide Version Version 10.1 208 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
size : 1907138 MB
status : active sync
Panorama Administrator's Guide Version Version 10.1 209 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
uses 1Gbps interfaces (Eth1 and Eth2) for managing the firewalls and uses 10Gbps interfaces
(Eth4 and Eth5) for querying and managing the Log Collectors. Each Log Collector uses its MGT
interface to respond to the queries but uses its Eth4 and Eth5 interfaces for the heavier traffic
associated with collecng logs from the firewalls.
• Soware and content updates—The firewalls and Log Collectors in both subnetworks retrieve
soware and content updates over the Eth3 interface on Panorama.
Panorama Administrator's Guide Version Version 10.1 210 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
from firewalls. Finally, configure the firewalls in each subnetwork to connect with interfaces on
Panorama.
If you are configuring an M-Series appliance in Log Collector mode with 10GB interfaces,
you must complete this enre configuraon procedure for the 10GB interfaces to display
as Up.
Palo Alto Networks recommends that you specify the IP address, netmask (for IPv4) or
prefix length (for IPv6), and default gateway for the MGT interface. If you omit one of
these sengs (such as the default gateway), you can access the M-Series appliance only
through the console port for future configuraon changes.
Perform the following steps to configure Panorama and Dedicated Log Collectors to use mulple
interfaces:
STEP 1 | Verify that the Panorama appliances and firewalls support mulple interfaces, and have the
prerequisite soware versions and configuraons.
The M-Series appliances must run Panorama 8.0 or later to use a separate interface for
deploying updates and to use mulple interfaces for device management and log collecon.
The M-200 and M-600 appliances must run Panorama 8.1 or later. Panorama appliances
deployed on ESXi, vCloud, Air, Hyper-V and KVM must run Panorama 8.1 or later.
If you deployed a Panorama or Log Collector as a virtual appliance, verify the Supported
Interfaces for the Panorama Virtual Appliance.
The M-Series appliances must run Panorama 6.1 or later to use separate interfaces for log
collecon or Collector Group communicaon.
The inial configuraon of each Panorama management server is complete. This includes
configuraon of the MGT interface.
To configure an IPv6 IP address for the Panorama MGT interface, you must
configure both an IPv4 and IPv6 to successfully configure Panorama using an IPv6
IP address. Panorama does not support configuring the MGT interface with only an
IPv6 IP address.
Log Collectors and Collector Groups are configured. This includes configuraon of the MGT
interface on the Log Collectors.
To configure an IPv6 IP address for the MGT interface of a Log Collector, you must
configure both an IPv4 and IPv6 to successfully configure Panorama using an IPv6
IP address. Panorama does not support configuring the MGT interface with only an
IPv6 IP address.
The inial configuraon of the firewalls is complete, you have added the firewalls to
Panorama as managed devices, and the firewalls in each subnetwork are assigned to a
separate template.
The inial configuraon of WildFire appliances is complete and you have added WildFire
appliances to Panorama as managed devices.
Panorama Administrator's Guide Version Version 10.1 211 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Configure the interfaces on the solitary (non-HA) or acve (HA) Panorama management
server.
Because the MGT interface was configured during inial Panorama configuraon, you
don’t have to configure it again.
STEP 3 | (HA only) Configure the interfaces on the passive Panorama management server.
1. Log in to the Panorama Web Interface of the acve Panorama management server.
2. Select Panorama > Managed Collectors and select the passive HA peer.
3. Select Interfaces and click an interface to edit.
4. Check the Enable Interface box to enable the interface.
5. Configure one or both of these field sets based on the IP protocols of your network:
• IPv4—IP Address, Netmask, and Default Gateway
• IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
6. Select the services that the interface supports:
• Device Management and Device Log Collecon—Manage firewalls, Log Collectors,
and WildFire appliances and appliance clusters, collect logs that the Log Collectors
Panorama Administrator's Guide Version Version 10.1 212 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
generate, and query the Log Collectors for report informaon. To support a
segmented network, you can enable these services on mulple interfaces.
• Collector Group Communicaon—Communicate with the Collector Groups that
Panorama manages across all subnetworks.
• Device Deployment—Deploy soware and content updates to managed firewalls, Log
Collectors, and WildFire appliances and appliance clusters across all subnetworks.
7. Click OK to save your changes to the interface.
8. Select Commit > Commit and Push to commit your changes to Panorama and to push
the changes to Collector Groups that contain the passive HA peer you modified.
> configure
# set deviceconfig system panorama-server <IPaddress1>
panorama-server-2 <IPaddress2>
# commit
Panorama Administrator's Guide Version Version 10.1 213 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | (HA only) Configure an interface on the passive Panorama management server to deploy
updates in case the acve Panorama fails over.
1. Log in to the Panorama Web Interface of the passive Panorama management server.
2. Select Panorama > Setup > Interfaces.
3. Click an Interface Name to edit the interface.
4. Select <interface-name> to enable the interface.
5. Configure one or both of these field sets based on the IP protocols of your network:
• IPv4—IP Address, Netmask, and Default Gateway
• IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
6. Select Device Deployment.
7. Click OK to save your changes.
8. Click Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 214 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Configure the interfaces that the Log Collectors will use to collect logs from firewalls and
communicate with other Log Collectors.
Because the MGT interface was configured during inial configuraon of the Log
Collectors, you don’t have to configure it again.
1. Log in to the Panorama Web Interface of the solitary (non-HA) or acve (HA) Panorama
management server.
2. Select Panorama > Managed Collectors and edit the Log Collector.
3. Select Interfaces and perform the following steps for each interface:
1. Click an interface name to edit that interface.
2. Select <interface-name> to enable the interface.
3. Configure one or both of the following field sets based on the IP protocols of your
network.
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Select the funcons that the interface supports:
Device Log Collecon—Collect logs from firewalls. You can load balance the logging
traffic by enabling mulple interfaces to perform this funcon.
Collector Group Communicaon—Communicate with other Log Collectors in the
Collector Group.
5. Click OK to save your changes to the interface.
4. Click OK to save your changes to the Log Collector.
5. Select Commit > Commit and Push to commit your changes to Panorama and to push
the changes to Collector Groups that contain the Log Collectors you modified.
6. Select Panorama > Managed Collectors to verify that the Log Collectors are
synchronized and connected with Panorama.
The Configuraon Status column should display InSync and the Run Time Status
column should display connected.
Panorama Administrator's Guide Version Version 10.1 215 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Log Collecon enabled. This step assumes that you use separate templates to configure the
firewalls in separate subnetworks.
In this example deployment, Panorama uses these interfaces to manage the firewalls
but not to collect firewall logs. You specify which Dedicated Log Collectors will collect
firewall logs when you configure Collector Groups.
1. Log in to the Panorama Web Interface of the solitary (non-HA) or acve (HA) Panorama
management server.
2. On Panorama, select Device > Setup > Management, select a Template and edit the
Panorama Sengs.
3. In the first Panorama Servers field, enter the IP address of an interface on the solitary
(non-HA) or acve (HA) Panorama.
4. (HA only) In the second Panorama Servers field, enter the IP address of an interface on
the passive Panorama that will support device management if failover occurs.
5. Click OK to save your changes.
6. Select Commit > Commit and Push to commit your changes to Panorama and push the
template changes to firewalls.
7. Select Panorama > Managed Devices to verify that the firewalls are synchronized and
connected with Panorama.
The Device State column should display Connected. The Shared Policy and Template
columns should display InSync.
Panorama Administrator's Guide Version Version 10.1 216 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you are running an evaluaon license for firewall management on your Panorama virtual
appliance and want to apply a Panorama license that you purchased, perform the tasks
Register Panorama and Acvate/Retrieve a Firewall Management License when the
Panorama Virtual Appliance is Internet-connected.
• Register Panorama
• Acvate a Panorama Support License
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is
Internet-connected
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected
• Acvate/Retrieve a Firewall Management License on the M-Series Appliance
Register Panorama
Panorama Administrator's Guide Version Version 10.1 217 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | Record the Panorama serial number or auth-code and record your Sales Order Number or
Customer ID.
For the auth-code, Sales Order Number, or Customer ID, see the order fulfillment email that
Palo Alto Networks Customer Service sent when you placed your order for Panorama.
For the serial number, the locaon depends on the model:
• M-Series appliance—Log in to the Panorama web interface and record the Serial # value in
the Dashboard tab, General Informaon secon.
• Panorama virtual appliance—See the order fulfillment email or refer to the serial number
generated when provisioning Panorama using VM Flex licensing.
Panorama Administrator's Guide Version Version 10.1 218 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Register Panorama in the Palo Alto Networks Customer Support Portal (CSP).
The steps depend on whether you already have a login for the Palo Alto Networks CSP.
• If this is the first Palo Alto Networks appliance you are registering and you do not yet have a
CSP login:
1. Go to the Palo Alto Networks CSP.
2. Click Create my account.
3. Enter Your Email Address and respond to the reCAPTCHA prompt.
4. Click Submit aer you successfully respond to the reCAPTCHA prompt.
5. Select Register device using Serial Number or Authorizaon Code and click Submit
6. Complete the fields in the Create Contact Details and Create UserID and Password
secons.
7. Enter the Panorama Device Serial Number or Auth Code.
8. Enter your Sales Order Number or Customer ID.
9. Respond to the reCAPTCHA prompt.
10.Click Submit aer you successfully respond to the reCAPTCHA prompt.
• If you already have a CSP login:
1. Log in to the Palo Alto Networks CSP.
2. Click Assets > Devices > Register New Device.
Panorama Administrator's Guide Version Version 10.1 219 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If the support license expires, Panorama can sll manage firewalls and collect logs, but
soware and content updates will be unavailable. The soware and content versions on
Panorama must be the same as or later than the versions on the managed firewalls, or
else errors will occur. For details, see Panorama, Log Collector, Firewall, and WildFire
Version Compability.
STEP 1 | Log in to the Palo Alto Networks customer support portal to acvate the auth-code.
1. Select Assets > Devices and enter your Panorama serial number to Filter by the Serial
Number.
2. Select the pencil icon in the Acon column, select Acvate Auth-Code and enter your
support license Authorizaon Code, and click Agree and Submit.
STEP 2 | Log in to the Panorama web interface, and select Panorama > Support > Acvate feature
using authorizaon code.
STEP 4 | Verify that the subscripon is acvated. Check the details (for example, the Expiry Date,
support Level, and Descripon) in the Support secon of the page.
STEP 2 | Select Panorama > Setup > Management and edit the General Sengs.
STEP 3 | Enter the Panorama Serial Number (included in the order fulfillment email) and click OK.
Panorama Administrator's Guide Version Version 10.1 220 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Select Panorama > Licenses to acvate or retrieve the firewall management license:
• Retrieve license keys from license server—Panorama automacally retrieves and acvates
the firewall management license from the Panorama Update Server.
• Acvate feature using authorizaon code—Enter the firewall management license
authorizaon code and click OK to acvate the license. The authorizaon code can be
obtained from the order fulfillment email or by logging in to the Palo Alto Networks
Customer Support web site by finding the Panorama management server.
• Manually upload license key—Log in to the Palo Alto Networks Customer Support web site,
find your Panorama management server, and download the firewall management license
key to your local device. Aer you download the license key, click Choose File to select the
license key and click OK.
Panorama Administrator's Guide Version Version 10.1 221 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Upload the Panorama virtual appliance informaon to the Customer Support website.
1. On the Retrieve Management License dialogue, click the here link to gather the UUID,
CPUID, Panorama Version and Virtual Plaorm informaon. Click Download Link to
download a XML file of the required Panorama informaon that can be uploaded to the
Customer Support Portal.
On inial deployment, may need to log out and back in to the web interface to see the
dialogue.
2. Log in to the Palo Alto Networks Customer Support web site.
3. Click Get Support in the upper right-hand corner.
4. Select Assets > Devices, find your Panorama virtual appliance and in the Acon column,
click the edit icon ( ).
5. Select Is the Panorama Offline? and enter the Panorama informaon gathered in Step 2,
or click Select files... to upload the downloaded XML file.
6. Agree and Submit the EULA.
Panorama Administrator's Guide Version Version 10.1 222 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
2. In the Panorama web interface, click Panorama > Licenses and Manually upload license
key.
3. Click Choose file, locate the downloaded device management license key and click OK.
STEP 5 | Confirm that the device management license was successfully uploaded by verify that the
Device Management License displays with the license informaon.
Panorama Administrator's Guide Version Version 10.1 223 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Manually upload the license from a host to Panorama. Panorama must have access to that host.
If Panorama is set up (you completed the task Perform Inial Configuraon of the M-Series
Appliance) but does not have a connecon to the update server, acvate the license on the
Panorama Administrator's Guide Version Version 10.1 224 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Support website, download it to a host that has a connecon to the update server, then upload
it to Panorama.
1. Acvate and download the license from the Palo Alto Networks Customer Support web
site.
1. On a host with internet access, use a web browser to access the Palo Alto Networks
Customer Support web site and log in.
2. Select Assets > Devices, find your M-Series appliance and, in the Acon column, click
the edit icon ( ).
3. Select Acvate Auth-Code, enter the Authorizaon Code and click Agree and Submit
to acvate the license.
4. In the Acon column, click the download icon and save the license key file to the host.
2. In the Panorama web interface, select Panorama > Licenses, click Manually upload
license key and click Browse.
3. Select the key file you downloaded to the host and click Open.
4. Click OK to upload the acvated license key.
Panorama Administrator's Guide Version Version 10.1 225 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you are leveraging the Cloud Services plugin, you must have Cloud Services plugin 1.5
or later release installed to successfully install the Panorama device cerficate.
STEP 1 | Register Panorama with the Palo Alto Networks Customer Support Portal (CSP).
Panorama Administrator's Guide Version Version 10.1 226 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Select Panorama > Setup > Management > Device Cerficate Sengs and Get cerficate.
STEP 6 | Enter the One-me Password you generated and click OK.
Panorama Administrator's Guide Version Version 10.1 227 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you store firewall logs on Dedicated Log Collectors (M-Series appliances in Log Collector
mode) instead of on the Panorama virtual appliance, you can maintain access to the logs
by migrang the Dedicated Log Collectors to the M-Series appliance in Panorama mode.
Panorama Administrator's Guide Version Version 10.1 228 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
appliance comes online, compleng the migraon during a maintenance window minimizes
the risk that logs will exceed the buffer capacies and be lost during the transion between
Panorama models.
Consider whether to maintain access to the Panorama virtual appliance aer the migraon
to access exisng logs. The most efficient approach is to assign a new IP address to the
Panorama virtual appliance and reuse its old IP address for the M-Series appliance. This
ensures that the Panorama virtual appliance remains accessible and that firewalls can point
to the M-Series appliance without you reconfiguring the Panorama IP address on each
firewall.
STEP 2 | Purchase the new M-Series appliance, and migrate your subscripons to the new appliance.
1. Purchase the new M-Series appliance.
2. Purchase the new support license and migraon license.
3. At the me you purchase the new M-Series appliance, provide your sales representave
the serial number and device management auth-code of the Panorama virtual appliance
you are phasing out, as well as a license migraon date of your choosing. On receipt of
your M-Series appliance, register the appliance and acvate the device management
and support licenses using the migraon and support auth-codes provided by Palo Alto
Networks. On the migraon date, the device management license on the Panorama
virtual appliance is decommissioned, and you can no longer manage devices or collect
logs using the Panorama virtual appliance. However, the support license is preserved and
the Panorama appliance remains under support. You can complete the migraon aer
the effecve date, but you are unable to commit any configuraon changes on the now
decommissioned Panorama virtual appliance.
STEP 3 | (Legacy mode only) On the old Panorama virtual appliance, change to Panorama mode .
This step is required to preserve the log data, sengs and log forwarding configuraon
of the Panorama virtual appliance. If you export the Panorama configuraon while in
Legacy mode, these sengs are lost. You must complete Step 9 if you do not change
Panorama to Panorama mode before connuing.
Connue to the next step if the Panorama virtual appliance is already in Panorama or
Management Only mode.
STEP 4 | Export the Panorama configuraon from the Panorama virtual appliance.
1. Log in to the Panorama virtual appliance and select Panorama > Setup > Operaons.
2. Click Save named Panorama configuraon snapshot, enter a Name to idenfy the
configuraon, and click OK.
3. Click Export named Panorama configuraon snapshot, select the Name of the
configuraon you just saved, and click OK. Panorama exports the configuraon to your
client system as an XML file.
Panorama Administrator's Guide Version Version 10.1 229 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Power off the Panorama virtual appliance if you won’t need to access to it aer the migraon
or assign a new IP address to its management (MGT) interface if you will need access to it.
To power off the Panorama virtual appliance, see the documentaon for your VMware product.
To change the IP address on the Panorama virtual appliance:
1. Select Panorama > Setup > Management, and edit the Management Interface Sengs.
2. Enter the new IP Address and click OK.
3. Select Commit > Commit to Panorama and Commit your changes.
STEP 7 | Load the Panorama configuraon snapshot that you exported from the Panorama virtual
appliance into the M-Series appliance.
The Panorama Policy rule Creaon and Modified dates are updated to reflect the
date you commit the imported Panorama configuraon on the new Panorama. The
universially unique idenfier (UUID) for each policy rule persists when you migrate
the Panorama configuraon.
The Creaon and Modified for managed firewalls are not impacted when you monitor
policy rule usage for a managed firewall because this data is stored locally on the
managed firewall and not on Panorama.
Panorama Administrator's Guide Version Version 10.1 230 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Add the default managed collector and Collector Group back to the M-Series appliance.
Loading the configuraon from the Panorama virtual appliance (Step 7) removes the default
managed collector and Collector Group that are predefined on each M-Series appliance.
1. Configure a Managed Collector that is local to the M-Series appliance.
2. Configure a Collector Group for the default managed collector.
3. Select Commit > Commit to Panorama and Commit your changes to the Panorama
configuraon.
STEP 10 | Synchronize the M-Series appliance with the firewalls to resume firewall management.
1. On the M-Series appliance, select Panorama > Managed Devices and verify that the
Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
Panorama Administrator's Guide Version Version 10.1 231 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Legacy mode is no longer supported in PAN-OS 8.1 or later releases. If the old Panorama
virtual appliance is in Legacy mode, you must change Panorama to Panorama mode before
migrang to the new hypervisor in order to preserve the log sengs and Log Collector forwarding
configuraons. Imporng the configuraon of the old Panorama in Legacy mode to a new
Panorama in Panorama mode causes all log and log forwarding sengs to be removed.
You cannot migrate logs from Panorama virtual appliance. Therefore, if you want to maintain
access to the logs stored on the old Panorama virtual appliance, you must connue running the
old Panorama virtual appliance in Log Collector mode aer the migraon and add it as a managed
Log Collector on the new Panorama virtual appliance. This allows the new Panorama virtual
appliance to collect the new logs that firewalls forward aer the migraon, while maintaining
access to the old log data. Aer the pre-migraon logs expire or become irrelevant due to aging,
you can shut down the Panorama virtual appliance.
If you store firewall logs on Dedicated Log Collectors (Panorama virtual appliance in Log
Collector mode) instead of on the Panorama virtual appliance, you can maintain access
to the logs by migrang the Dedicated Log Collectors to the new Panorama virtual
appliance in Panorama mode.
STEP 2 | (Legacy mode only) On the old Panorama virtual appliance, Set up a Panorama Virtual
Appliance in Panorama Mode.
This step is required to preserve the log sengs (Panorama > Log Sengs) on the old
Panorama virtual appliance. If you export the Panorama configuraon while in Legacy
mode, these sengs are lost.
Connue to the next step if the Panorama virtual appliance is already in Panorama or
Management Only mode.
Panorama Administrator's Guide Version Version 10.1 232 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Export the Panorama configuraon from the old Panorama virtual appliance.
1. Log in to the Panorama Web Interface.
2. Select Panorama > Setup > Operaons.
3. Click Export named Panorama configuraon snapshot, select running-config.xml
and click OK. Panorama exports the configuraon to your client system as an XML file.
4. Locate the running-config.xml file you exported and rename the XML file. This is
required to import the configuraon as Panorama does not support imporng an XML
file with the name running-config.xml.
STEP 5 | Migrate the serial number of the old Panorama virtual appliance to the new Panorama virtual
appliance.
This step is required to migrate all subscripons and the device management license
ed to the Panorama serial number and only if you intend to shut down the old
Panorama virtual appliance. If you do intend on maintaining access to the old
Panorama virtual appliance, connue to the next step.
You have up to 90 days to shut down the old Panorama virtual appliance. Running
mulple Panorama virtual appliances with the same serial number violates the EULA.
1. Log in to the Panorama web interface of the old Panorama virtual appliance.
2. In the Dashboard, copy the Serial # of the old Panorama virtual appliance located in
the General Informaon widget.
3. Log in to the Panorama web interface of the new Panorama virtual appliance.
4. Add the serial number of the old Panorama virtual appliance to the new Panorama virtual
appliance.
1. Select Panorama > Setup > Management and edit the General Sengs.
2. Enter (paste) the Serial Number and click OK.
3. Select Commit and Commit to Panorama.
Panorama Administrator's Guide Version Version 10.1 233 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Perform the inial setup of the new Panorama virtual appliance.
1. Perform Inial Configuraon of the Panorama Virtual Appliance to define the network
connecons required to acvate licenses and install updates.
2. (For maintaining access to the old Panorama virtual appliance only) Register Panorama.
3. (For maintaining access to the old Panorama virtual appliance only) Acvate a Panorama
Support License.
4. (For maintaining access to the old Panorama virtual appliance only) Acvate/Retrieve
a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected. Use the auth-code associated with the migraon license.
5. Install Content and Soware Updates for Panorama. Install the same versions as those on
the old Panorama virtual appliance.
This step is required before loading configuraon from the old Panorama virtual
appliance. Ensure that all required content updates are installed to avoid security
outages.
6. Select Panorama > Plugins and install all plugins that were installed on the old Panorama
virtual appliance.
STEP 7 | Power off the old Panorama virtual appliance if you won’t need to access to it aer the
migraon or assign a new IP address to its management (MGT) interface if you will need
access to it.
To power off the Panorama virtual appliance, see the supported documentaon for the
hypervisor on which the old Panorama virtual appliance has been deployed.
To change the IP address on the Panorama virtual appliance:
1. On the web interface of the old Panorama virtual appliance, select Panorama > Setup >
Management, and edit the Management Interface Sengs.
2. Enter the new IP Address and click OK.
3. Select Commit > Commit to Panorama and Commit your changes.
STEP 8 | (Prisma Access) Transfer the Prisma Access license from the old Panorama virtual appliance
to the new Panorama virtual appliance.
Panorama Administrator's Guide Version Version 10.1 234 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Load the Panorama configuraon snapshot that you exported from the old Panorama virtual
appliance into the new Panorama virtual appliance.
The Panorama Policy rule Creaon and Modified dates are updated to reflect the
date you commit the imported Panorama configuraon on the new Panorama. The
universially unique idenfier (UUID) for each policy rule persists when you migrate
the Panorama configuraon.
The Creaon and Modified for managed firewalls are not impacted when you monitor
policy rule usage for a managed firewall because this data is stored locally on the
managed firewall and not on Panorama.
1. Log in to the Panorama Web Interface of the new Panorama virtual appliance.
2. Select Panorama > Setup > Operaons.
3. Click Import named Panorama configuraon snapshot, Browse to the Panorama
configuraon file you exported from the Panorama virtual appliance, and click OK.
4. Click Load named Panorama configuraon snapshot, select the Name of the
configuraon you just imported, leave the Decrypon Key blank (empty), and click OK.
Panorama overwrites its current candidate configuraon with the loaded configuraon.
Panorama displays any errors that occur when loading the configuraon file.
5. If errors occurred, save them to a local file. Resolve each error to ensure the migrated
configuraon is valid.
Panorama Administrator's Guide Version Version 10.1 235 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 11 | Add the default managed collector and Collector Group to the new Panorama virtual
appliance.
Loading the configuraon from the old Panorama virtual appliance (Step 7) removes the default
managed collector and Collector Group that are predefined on each Panorama virtual appliance
in Panorama mode.
1. To maintain access to logs stored on the old Panorama virtual appliance, change to
Log Collector mode and add the Dedicated Log Collector to the new Panorama virtual
appliance.
1. Set Up The Panorama Virtual Appliance as a Log Collector.
2. Configure a Managed Collector.
2. Configure a Managed Collector that is local to the Panorama virtual appliance.
3. Configure a Collector Group for the default managed collector.
4. Select Commit > Commit to Panorama and Commit your changes to the Panorama
configuraon.
STEP 12 | Synchronize the new Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the new Panorama virtual appliance, select Panorama > Managed Devices and verify
that the Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
Panorama Administrator's Guide Version Version 10.1 236 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
the required device management and support licenses. See Panorama HA Prerequisites for a full
list of HA requirements.
STEP 1 | Plan the migraon.
Upgrade the M-Series appliance to PAN-OS 10.1 or later release before the migrang to
the Panorama virtual appliance. To upgrade Panorama, see Install Content and Soware
Updates for Panorama. For important details about soware versions, see Panorama, Log
Collector, Firewall, and WildFire Version Compability.
Schedule a maintenance window for the migraon. Although firewalls can buffer logs aer
the M-Series appliance goes offline and then forward the logs aer the Panorama virtual
appliance comes online, compleng the migraon during a maintenance window minimizes
the risk that logs will exceed the buffer capacies during the transion to a different
Panorama model.
STEP 2 | Purchase management and support licenses for the new Panorama virtual appliance.
1. Contact your sales representave to purchase the new device management and support
licenses.
2. Provide your sales representave the serial number of the M-Series appliance you
to plan phase out, the serial number and support auth code you received when you
purchased the new Panorama virtual appliance, and the date when you expect your
migraon from the old device to the new virtual appliance to be completed. Before the
migraon date, register the serial number and acvate support auth code on the new
virtual appliance so that you can begin your migraon. The capacity auth code on the old
M-Series appliance is automacally removed on the expected migraon compleon date
you provided.
Panorama Administrator's Guide Version Version 10.1 237 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Edit the M-Series appliance Panorama interface configuraon to only use the management
interface.
The Panorama virtual appliance supports only the management interface for device
management and log collecon.
1. Log in to the Panorama Web Interface of the M-Series appliance.
2. Select Panorama > Setup > Management.
3. Edit the General Sengs, modify the Hostname, and click OK.
4. Select Interfaces and edit the Management interface to enable the required services.
5. Disable services for the remaining interfaces.
6. Select Commit > Commit to Panorama.
Panorama Administrator's Guide Version Version 10.1 238 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 7 | Power off the M-Series appliance or assign a new IP address to the management (MGT)
interface.
If the M-Series appliance is in Panorama mode and has logs stored on the local Log
Collector that you need access on the new Panorama virtual appliance, you must
change the IP address on the M-Series appliance in order to add it to the Panorama
virtual appliance as a managed Log Collector.
STEP 8 | Load the Panorama configuraon snapshot that you exported from the M-Series appliance
into the Panorama virtual appliance.
The Panorama Policy rule Creaon and Modified dates are updated to reflect the
date you commit the imported Panorama configuraon on the new Panorama. The
universially unique idenfier (UUID) for each policy rule persists when you migrate
the Panorama configuraon.
The Creaon and Modified for managed firewalls are not impacted when you monitor
policy rule usage for a managed firewall because this data is stored locally on the
managed firewall and not on Panorama.
1. Log in to the Panorama web interface of the Panorama virtual appliance, and select
Panorama > Setup > Operaons.
2. Click Import named Panorama configuraon snapshot, Browse to the Panorama
configuraon file you exported from the M-Series appliance, and click OK.
3. Click Load named Panorama configuraon snapshot, select the Name of the
configuraon you just imported, select a Decrypon Key (the master key for Panorama),
and click OK. Panorama overwrites its current candidate configuraon with the loaded
configuraon. Panorama displays any errors that occur when loading the configuraon
file.
If errors occurred, save them to a local file. Resolve each error to ensure the migrated
configuraon is valid. The configuraon has been loaded once the commit is successful.
Panorama Administrator's Guide Version Version 10.1 239 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 9 | Change the M-Series appliance to Log Collector mode to preserve exisng log data.
Logging data is erased if you change to Log Collector mode while the logging disks are
sll inserted in the M-Series appliance. Logging disks must be removed before changing
mode to avoid log data loss.
Generang the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long me to complete. To expedite the process,
you can launch mulple CLI sessions and run the metadata regeneraon command
in each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
• Enter Y to confirm the mode change. The M-Series appliance reboots. If the reboot
process terminates your terminal emulaon soware session, reconnect to the M-
Series appliance to see the Panorama login prompt.
If you see a CMS Login prompt, this means the Log Collector has not
finished reboong. Press Enter at the prompt without typing a username or
password.
• Log back in to the CLI.
• Verify that the switch to Log Collector mode succeeded:
Panorama Administrator's Guide Version Version 10.1 240 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
6. Insert the disks back into the old M-Series appliance. For details, refer to the disk
replacement procedure in the M-Series Appliance Hardware Reference Guides.
You must maintain the disk pair associaon. Although you can place a disk pair from
slot A1/A2 on the into slot B1/B2, you must keep the disks together in the same slot;
otherwise, Panorama might not restore the data successfully.
7. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk
pair with the new appliance. The no-format argument prevents reformang of the drives
and retains the logs stored on the disks.
8. Generate the metadata for each disk pair.
For example:
9. Enable connecvity between the Log Collector and Panorama management server.
Enter the following commands at the Log Collector CLI, where <IPaddress1> is for the
MGT interface of the solitary (non-HA) or acve (HA) Panorama and <IPaddress2> is for
the MGT interface of the passive (HA) Panorama, if applicable.
> configure
# set deviceconfig system panorama-server <IPaddress1>
panorama-server-2 <IPaddress2>
# commit
# exit
Panorama Administrator's Guide Version Version 10.1 241 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 10 | Synchronize the Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the Panorama virtual appliance, select Panorama > Managed Devices and verify that
the Device State column displays the firewalls as Connected.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, and Include Device and Network
Templates.
3. Select Collector Groups, select every collector group, and click OK.
4. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
STEP 12 | (HA only) Modify the Panorama virtual appliance HA peer configuraon.
1. On an HA peer, Log in to the Panorama Web Interface, select Panorama > High
Availability and edit the Setup.
2. In the Peer HA IP Address field, enter the new IP address of the HA peer and click OK.
3. Select Commit > Commit to Panorama and Commit your change
4. Repeat these steps on the other peer in the HA peer.
Panorama Administrator's Guide Version Version 10.1 242 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
This procedure assumes you are no longer using the M-100 for device management or
log collecon. If you plan on using the decommissioned M-100 appliance as a Dedicated
Log Collector, a device management license is required on the M-100. Without a device
management license, you are unable to use the M-100 as a Dedicated Log Collector.
If you do not plan on using the M-100 appliance as a Dedicated Log Collector, but the
M-100 appliance contains log data that you must access at a later date, you may sll
query and generate reports using the exisng log data. Palo Alto Networks recommends
reviewing the log retenon policy before decommissioning the M-100 appliance.
If you will migrate only the logs and not the Panorama configuraon, perform the task
Migrate Logs to a New M-Series Appliance in Log Collector Mode or Migrate Logs to
a New M-Series Appliance in Panorama Mode.
If you will migrate to a new Panorama management server that is not deployed in an
HA configuraon and the new Panorama must access logs on exisng Dedicated Log
Collectors, perform the task Migrate Log Collectors aer Failure/RMA of Non-HA
Panorama.
Panorama Administrator's Guide Version Version 10.1 243 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
appliance in Panorama mode stores these log types on its SSD, which you cannot move
between models. You can move only the RAID drives, which store firewall logs.
• Schedule a maintenance window for the migraon. Although firewalls can buffer logs aer
the M-100 appliance goes offline and then forward the logs aer the M-500 appliance
comes online, compleng the migraon during a maintenance window minimizes the
risk that logs will exceed the buffer capacies and be lost during the transion between
Panorama models.
STEP 2 | Purchase the new M-500 appliance, and migrate your subscripons to the new appliance.
1. Purchase the new M-500 appliance.
2. Purchase the new support license and migraon license.
3. At the me you purchase the new M-500 appliance, provide your sales representave
the serial number and device management auth-code of the M-100 appliance you
are phasing out, as well as a license migraon date of your choosing. On receipt of
your M-500 appliance, register the appliance and acvate the device management
and support licenses using the migraon and support auth-codes provided by Palo
Alto Networks. On the migraon date, the device management license on the M-100
is decommissioned, and you can no longer manage devices or collect logs using the
M-100 appliance. However, the support license is preserved and the Panorama appliance
remains under support. You can complete the migraon aer the effecve date, but you
are unable to commit any configuraon changes on the now decommissioned M-100
appliance.
STEP 3 | Export the Panorama configuraon from each M-100 appliance in Panorama mode.
Perform this task on each M-100 appliance HA peer:
1. Log in to the M-100 appliance and select Panorama > Setup > Operaons.
2. Click Save named Panorama configuraon snapshot, enter a Name to idenfy the
configuraon, and click OK.
3. Click Export named Panorama configuraon snapshot, select the Name of the
configuraon you just saved, and click OK. Panorama exports the configuraon to your
client system as an XML file.
Panorama Administrator's Guide Version Version 10.1 244 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Load the Panorama configuraon snapshot that you exported from each M-100 appliance
into each M-500 appliance in Panorama mode (both HA peers).
The Panorama Policy rule Creaon and Modified dates are updated to reflect the
date you commit the imported Panorama configuraon on the new Panorama. The
universially unique idenfier (UUID) for each policy rule persists when you migrate
the Panorama configuraon.
The Creaon and Modified for managed firewalls are not impacted when you monitor
policy rule usage for a managed firewall because this data is stored locally on the
managed firewall and not on Panorama.
STEP 7 | Synchronize the configuraon between the M-500 appliance HA peers in Panorama mode.
1. On the acve M-500 appliance, select the Dashboard tab and, in the High Availability
widget, click Sync to peer.
2. In the High Availability widget, verify that the Local (primary M-500 appliance) is acve,
the Peer is passive, and the Running Config is synchronized.
Panorama Administrator's Guide Version Version 10.1 245 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 8 | Move the RAID drives from each M-100 appliance to its replacement M-500 appliance to
migrate the logs collected from firewalls.
In the following tasks, skip any steps that you already completed on the M-500 appliance.
• Migrate Logs to a New M-Series Appliance in Panorama Mode. Migrate logs from the
M-100 appliance only if it uses a default managed collector for log collecon.
• Migrate Logs to a New M-Series Appliance in Log Collector Mode.
STEP 9 | Synchronize the acve M-500 appliance in Panorama mode with the firewalls to resume
firewall management.
1. In the acve M-500 appliance, select Panorama > Managed Devices, and verify that the
Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync
for the firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selecons.
2. Select Device Groups, select every device group, Include Device and Network
Templates, and click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template
columns display In sync for the firewalls.
Panorama Administrator's Guide Version Version 10.1 246 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Log in to Panorama according to the type of authencaon used for your account. If logging
in to Panorama for the first me, use the default value admin for your username and
password.
• SAML—Click Use Single Sign-On (SSO). If Panorama performs authorizaon (role
assignment) for administrators, enter your Username and Connue. If the SAML identy
provider (IdP) performs authorizaon, Connue without entering a Username. In both cases,
Panorama redirects you to the IdP, which prompts you to enter a username and password.
Aer you authencate to the IdP, the Panorama web interface displays.
• Any other type of authencaon—Enter your user Name and Password. Read the login
banner and select I Accept and Acknowledge the Statement Below if the login page has the
banner and check box. Then click Login.
Panorama Administrator's Guide Version Version 10.1 247 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Tab Descripon
Dashboard View general informaon about the Panorama model and network
access sengs. This tab includes widgets that display informaon
about applicaons, logs, system resources, and system sengs.
ACC View the overall risk and threat level on the network, based on
informaon that Panorama gathered from the managed firewalls.
Device Groups > Policies Create centralized policy rules and apply them to mulple
firewalls/device groups.
You must Add a Device Group for this tab to display.
Device Groups > Objects Define policy objects that policy rules can reference and that
managed firewalls/device groups can share.
You must Add a Device Group for this tab to display.
Templates > Network Configure network seng, such as network profiles, and apply
them to mulple firewalls.
You must Add a Template for this tab to display.
Templates > Device Configure device sengs, such as server profiles and admin roles,
and apply them to mulple firewalls.
You must Add a Template for this tab to display.
Panorama Administrator's Guide Version Version 10.1 248 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
admin@ABC_Sydney>
admin@ABC_Sydney> configure
Panorama Administrator's Guide Version Version 10.1 249 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Enter a Name for the profile and select the Role type: Panorama or Device Group and
Template.
STEP 4 | Configure access privileges to each funconal area of Panorama (Web UI) by toggling the
icons to the desired seng: Enable (read-write), Read Only, or Disable.
If administrators with custom roles will commit device group or template changes to
managed firewalls, you must give those roles read-write access to Panorama > Device
Groups and Panorama > Templates. If you upgrade from an earlier Panorama version,
the upgrade process provides read-only access to those nodes.
STEP 5 | If the Role type is Panorama, configure access to the XML API by toggling the Enabled/
Disabled icon for each funconal area.
STEP 6 | If the Role type is Panorama, select an access level for the Command Line interface: None
(default), superuser, superreader, or panorama-admin.
STEP 7 | (Oponal) To allow Panorama administrators to Context Switch between the Panorama and
firewall web interface, enter the name of Device Admin Role you configured in Step 1.
Panorama Administrator's Guide Version Version 10.1 250 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Toggle the icons in the Device Groups tab to enable read-write or read-only access for device
groups in the access domain.
If you set the Shared Objects access to shared-only, Panorama applies read-only
access to the objects in any device groups for which you specify read-write access.
STEP 5 | Select the Templates tab and Add each template you want to assign to the access domain.
STEP 6 | Select the Device Context tab, select firewalls to assign to the access domain, and click OK.
Administrators can access the web interface of these firewalls by using the Context drop-
down in Panorama.
Panorama Administrator's Guide Version Version 10.1 251 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
You can also configure the total number of supported concurrent sessions by logging in
to the Panorama CLI.
admin> configure
admin# commit
Panorama Administrator's Guide Version Version 10.1 252 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Select an Authencaon Profile or sequence if you configured either for the administrator.
This is required if Panorama will use Kerberos SSO or an external service for authencaon.
If Panorama will use local authencaon, set the Authencaon Profile to None and enter a
Password and then Confirm Password.
STEP 6 | (Device Group and Template Admin only) In the Access Domain to Administrator Role
secon, click Add, select an Access Domain from the drop-down (see Configure an Access
Domain), click the adjacent Admin Role cell, and select an Admin Role profile.
STEP 8 | Select Commit > Commit to Panorama and Commit your changes.
If you use an external service to manage both authencaon and authorizaon (role and
access domain assignments), see:
• Configure RADIUS Authencaon for Panorama Administrators
• Configure TACACS+ Authencaon for Panorama Administrators
• Configure SAML Authencaon for Panorama Administrators
To authencate administrators without a challenge-response mechanism, you can
Configure a Panorama Administrator with Cerficate-Based Authencaon for the
Web Interface and Configure an Administrator with SSH Key-Based Authencaon
for the CLI.
Panorama Administrator's Guide Version Version 10.1 253 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | (External authencaon only) Enable Panorama to connect to an external server for
authencang administrators.
1. Select Panorama > Server Profiles, select the service type (RADIUS, TACACS+, SAML,
LDAP, or Kerberos), and configure a server profile:
• Configure RADIUS Authencaon for Panorama Administrators.
STEP 2 | (Oponal) Define password complexity and expiraon sengs if Panorama uses local
authencaon.
These sengs help protect Panorama against unauthorized access by making it harder for
aackers to guess passwords.
1. Define global password complexity and expiraon sengs for all local administrators.
1. Select Panorama > Setup > Management and edit the Minimum Password Complexity
sengs.
2. Select Enabled.
3. Define the password sengs and click OK.
2. Define a Password Profile.
You assign the profile to administrator accounts for which you want to override the
global password expiraon sengs.
1. Select Panorama > Password Profiles and Add a profile.
2. Enter a Name to idenfy the profile.
3. Define the password expiraon sengs and click OK.
Panorama Administrator's Guide Version Version 10.1 254 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If your administrave accounts are stored across mulple types of servers, you
can create an authencaon profile for each type and add all the profiles to an
authencaon sequence.
In the authencaon profile, specify the Type of authencaon service and related sengs:
• External service—Select the Type of external service and select the Server Profile you
created for it.
• Local authencaon—Set the Type to None.
• Kerberos SSO—Specify the Kerberos Realm and Import the Kerberos Keytab you created.
STEP 5 | (Device group and template administrators only) Configure an Access Domain.
Configure one or more access domains.
Panorama Administrator's Guide Version Version 10.1 255 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | Configure a cerficate profile for securing access to the web interface.
1. Select Panorama > Cerficate Management > Cerficate Profile and click Add.
2. Enter a Name for the cerficate profile and set the Username Field to Subject.
3. Select Add in the CA Cerficates secon and select the CA Cerficate you just created.
4. Click OK to save the profile.
STEP 3 | Configure Panorama to use the cerficate profile for authencang administrators.
1. Select the Panorama > Setup > Management and edit the Authencaon Sengs.
2. Select the Cerficate Profile you just created and click OK.
STEP 7 | Import the client cerficate into the client system of each administrator who will access the
web interface.
Refer to your web browser documentaon as needed to complete this step.
Panorama Administrator's Guide Version Version 10.1 256 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Configure the SSH client to use the private key to authencate to Panorama.
Perform this task on the client system of the administrator. Refer to your SSH client
documentaon as needed to complete this step.
Panorama Administrator's Guide Version Version 10.1 257 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Verify that the administrator can access the Panorama CLI using SSH key authencaon.
1. Use a browser on the client system of the administrator to go to the Panorama IP
address.
2. Log in to the Panorama CLI as the administrator. Aer entering a username, you will see
the following output (the key value is an example):
Authenticating with public key “dsa-key-20130415”
3. If prompted, enter the passphrase you defined when creang the keys.
You can use a RADIUS server to authencate administrave access to the Panorama web
interface. You can also define Vendor-Specific Aributes (VSAs) on the RADIUS server to
manage administrator authorizaon. Using VSAs enables you to quickly change the roles,
access domains, and user groups of administrators through your directory service, which is
oen easier than reconfiguring sengs on Panorama.
You can Import the Palo Alto Networks RADIUS diconary into RADIUS server to define
the authencaon aributes needed for communicaon between Panorama and the
RADIUS server.
You can also use a RADIUS server to implement mul-factor authencaon (MFA) for
administrators.
Panorama Administrator's Guide Version Version 10.1 258 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you use the server profile to integrate Panorama with an MFA service, enter an
interval that gives administrators enough me to respond to the authencaon
challenge. For example, if the MFA service prompts for a one-me password
(OTP), administrators need me to see the OTP on their endpoint device and
then enter the OTP in the MFA login page.
4. Select the Authencaon Protocol (default is CHAP) that Panorama uses to authencate
to the RADIUS server.
Select CHAP if the RADIUS server supports that protocol; it is more secure than
PAP.
5. Add each RADIUS server and enter the following:
• Name to idenfy the server
• RADIUS Server IP address or FQDN
• Secret/Confirm Secret (a key to encrypt usernames and passwords)
• Server Port for authencaon requests (default is 1812)
6. Click OK to save the server profile.
STEP 3 | Configure Panorama to use the authencaon profile for all administrators.
1. Select Panorama > Setup > Management and edit the Authencaon Sengs.
2. Select the Authencaon Profile you configured and click OK.
Panorama Administrator's Guide Version Version 10.1 259 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 4 | Configure the roles and access domains that define authorizaon sengs for administrators.
1. Configure an Admin Role Profile if the administrator uses a custom role instead of a
predefined (dynamic) role.
2. Configure an Access Domain if the administrator uses a Device Group and Template role.
If the RADIUS server profile specifies CHAP as the Authencaon Protocol, you
must define accounts with reversibly encrypted passwords. Otherwise, CHAP
authencaon will fail.
3. Define the vendor code for Panorama (25461) and define the RADIUS VSAs for the role,
access domain, and user group of each administrator.
When you predefine dynamic administrator roles for users, use lower-case to specify the
role (for example, enter superuser, not SuperUser).
STEP 7 | Verify that the RADIUS server performs authencaon and authorizaon for administrators.
1. Log in the Panorama web interface using an administrator account that you added to the
RADIUS server.
2. Verify that you can access only the web interface pages that are allowed for the role you
associated with the administrator.
3. In the Monitor, Policies, and Objects tabs, verify that you can access only the device
groups that are allowed for the access domain you associated with the administrator.
Panorama Administrator's Guide Version Version 10.1 260 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Select CHAP if the TACACS+ server supports that protocol; it is more secure
than PAP.
5. Add each TACACS+ server and enter the following:
• Name to idenfy the server
• TACACS+ Server IP address or FQDN
• Secret/Confirm Secret (a key to encrypt usernames and passwords)
• Server Port for authencaon requests (default is 49)
6. Click OK to save the server profile.
STEP 3 | Configure Panorama to use the authencaon profile for all administrators.
1. Select Panorama > Setup > Management and edit the Authencaon Sengs.
2. Select the Authencaon Profile you configured and click OK.
STEP 4 | Configure the roles and access domains that define authorizaon sengs for administrators.
1. Configure an Admin Role Profile if the administrator will use a custom role instead of a
predefined (dynamic) role.
2. Configure an Access Domain if the administrator uses a Device Group and Template role.
Panorama Administrator's Guide Version Version 10.1 261 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
If you selected CHAP as the Authencaon Protocol, you must define accounts
with reversibly encrypted passwords. Otherwise, CHAP authencaon will fail.
3. Define TACACS+ VSAs for the role, access domain, and user group of each administrator.
When you predefine dynamic administrator roles for users, use lower-case to
specify the role (for example, enter superuser, not SuperUser).
STEP 7 | Verify that the TACACS+ server performs authencaon and authorizaon for
administrators.
1. Log in the Panorama web interface using an administrator account that you added to the
TACACS+ server.
2. Verify that you can access only the web interface pages that are allowed for the role you
associated with the administrator.
3. In the Monitor, Policies, and Objects tabs, verify that you can access only the virtual
systems that are allowed for the access domain you associated with the administrator.
Panorama Administrator's Guide Version Version 10.1 262 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | (Recommended) Obtain the cerficates that the IdP and Panorama will use to sign SAML
messages.
If the cerficates don’t specify key usage aributes, all usages are allowed by default, including
signing messages. In this case, you can obtain cerficates by any method.
If the cerficates do specify key usage aributes, one of the aributes must be Digital
Signature, which is not available on cerficates that you generate on Panorama. In this case,
you must import the cerficates:
• Cerficate Panorama uses to sign SAML messages—Import the cerficate from your
enterprise cerficate authority (CA) or a third-party CA.
• Cerficate the IdP uses to sign SAML messages—Import a metadata file containing the
cerficate from the IdP (see the next step). The IdP cerficate is limited to the following
algorithms:
• Public key algorithms—RSA (1,024 bits or larger) and ECDSA (all sizes).
• Signature algorithms—SHA1, SHA256, SHA384, and SHA512.
If the IdP doesn’t provide a metadata file, select Panorama > Server Profiles > SAML
Identy Provider, Add the server profile, and manually enter the informaon (consult
your IdP administrator for the values).
1. Export the SAML metadata file from the IdP to a client system that Panorama can access.
The cerficate specified in the file must meet the requirements listed in the preceding
step. Refer to your IdP documentaon for instrucons on exporng the file.
2. Select Panorama > Server Profiles > SAML Identy Provider and Import the metadata
file onto Panorama.
3. Enter a Profile Name to idenfy the server profile.
4. Browse to the Identy Provider Metadata file.
5. (Recommended) Select Validate Identy Provider Cerficate (default) to have Panorama
validate the Identy Provider Cerficate.
Validaon occurs only aer you assign the server profile to an authencaon profile and
Commit. Panorama uses the Cerficate Profile in the authencaon profile to validate
the cerficate.
6. Enter the Maximum Clock Skew, which is the allowed difference in seconds between
the system mes of the IdP and Panorama at the moment when Panorama validates
Panorama Administrator's Guide Version Version 10.1 263 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
IdP messages (default is 60; range is 1 to 900). If the difference exceeds this value,
authencaon fails.
7. Click OK to save the server profile.
8. Click the server profile Name to display the profile sengs. Verify that the imported
informaon is correct and edit it if necessary.
When you predefine dynamic administrator roles for users, use lower-case
to specify the role (for example, enter superuser, not SuperUser). If you
manage administrator authorizaon through the IdP identy store, specify the
Admin Role Aribute and Access Domain Aribute also.
9. Select Advanced and Add the administrators who are allowed to authencate with this
authencaon profile.
10. Click OK to save the authencaon profile.
STEP 4 | Configure Panorama to use the authencaon profile for all administrators.
1. Select Panorama > Setup > Management, edit the Authencaon Sengs, and select
the Authencaon Profile you configured.
2. Select Commit > Commit to Panorama to acvate your changes on Panorama and to
validate the Identy Provider Cerficate that you assigned to the SAML IdP server
profile.
Panorama Administrator's Guide Version Version 10.1 264 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 265 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 1 | Configure a syslog server profile to forward audit logs of administrator acvity for Panorama,
managed firewalls, and Log Collectors.
This step is required to successfully store audit logs for tracking administrator acvity.
1. Select Panorama > Server Profiles > Syslog and Add a new syslog server profile.
2. Configure a syslog server profile.
Panorama Administrator's Guide Version Version 10.1 266 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
the web interface. See the CLI Operaonal Command Hierarchy for a full list of PAN-
OS operaonal and debug commands.
• UI Acons—Generate an audit log when an administrator navigates throughout
the web interface. This includes navigaon between configuraon tabs, as well as
individual objects within a tab.
For example, an audit log is generated when an administrator navigates from the
ACC to the Policies tab. Addionally, an audit log is generated when an administrator
navigates from Objects > Addresses to Objects > Tags.
• Syslog Server—Select a target syslog server profile to forward audit logs.
4. Click OK
You can only track CLI acvity for Log Collectors because Log Collectors you can
only access Log Collectors through the CLI.
Panorama Administrator's Guide Version Version 10.1 267 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 268 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
deploy cerficates from your enterprise PKI, using Simple Cerficate Enrollment Protocol
(SCEP), purchase one from a trusted third-party CA, or generate a self-signed cerficate locally.
Custom cerficates can be unique to each client device or common across all devices. The
unique device cerficates uses a hash of the serial number of the managed device and CN. The
server matches the CN or the subject alt name against the configured serial numbers of the
client devices. For client cerficate validaon based on the CN to occur, the username must be
set to Subject common-name. The client cerficate behavior also applies to Panorama HA peer
connecons.
You can configure the client cerficate and cerficate profile on each client device or push the
configuraon from Panorama to each device as part of a template.
Panorama Administrator's Guide Version Version 10.1 269 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 2 | On Panorama, configure a cerficate profile This cerficate profile defines what cerficate to
use and what cerficate field to look for the IP address or FQDN in.
1. Select Panorama > Cerficate Management > Cerficate Profile.
2. Configure a cerficate profile.
STEP 4 | Configure Secure Server Communicaon on Panorama or a Log Collector in the server role.
1. Select one of the following navigaon paths:
• For Panorama: Panorama > Setup > Management and Edit the Secure
Communicaons Sengs
• For a Log Collector: Panorama > Managed Collectors > Add > Communicaon
2. Select the Customize Secure Server Communicaon opon.
3. Verify that the Allow Custom Cerficate Only check box is not selected. This allows you
to connue managing all devices while migrang to custom cerficates.
When the Custom Cerficate Only check box is selected, Panorama does not
authencate and cannot manage devices using predefined cerficates.
4. Select the SSL/TLS Service Profile. This SSL/TLS service profile applies to all SSL
connecons between Panorama, firewalls, Log Collectors, and Panorama HA peers.
5. Select the Cerficate Profile that idenfies the cerficate to use to establish secure
communicaon with clients such as firewalls.
6. (Oponal) Configure an authorizaon list. The authorizaon list adds an addional
layer of security beyond cerficate authencaon. The authorizaon list checks the
client cerficate Subject or Subject Alt Name. If the Subject or Subject Alt Name
Panorama Administrator's Guide Version Version 10.1 270 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
presented with the client cerficate does not match an idenfier on the authorizaon
list, authencaon is denied.
You can also authorize client devices based on their serial number.
1. Add an Authorizaon List.
2. Select the Subject or Subject Alt Name configured in the cerficate profile as the
Idenfier type.
3. Enter the Common Name if the idenfier is Subject or and IP address, hostname or
email if the idenfier is Subject Alt Name.
4. Click OK.
5. Select Check Authorizaon List to enforce the authorizaon list.
7. Select Authorize Client Based on Serial Number to have the server authencate
client based on the serial numbers of managed devices. The CN or subject in the client
cerficate must have the special keyword $UDID to enable this type of authencaon.
8. Select the Data Redistribuon opon in the Customize Communicaon secon to use a
custom cerficate to secure outgoing communicaon with data redistribute clients.
9. In Disconnect Wait Time (min), specify how long Panorama should wait before
terminang the current session and reestablishing the connecon with its managed
devices. This field is blank by default and the range is 0 to 44,640 minutes. Leaving this
field blank is the same as seng it to 0.
The disconnect wait me does not begin counng down unl you commit the
new configuraon.
10. Click OK.
11. Commit your changes.
Panorama Administrator's Guide Version Version 10.1 271 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 272 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 5 | Select the incoming communicaon types for which you want to use a custom cerficate:
• HA Communicaon
• WildFire Communicaon
• Data Redistribuon
STEP 6 | Aer deploying custom cerficates on all managed devices, enforce authencaon using
custom cerficates.
The WildFire appliance does not currently support custom cerficates. If your
Panorama is managing a WildFire appliance, do not select Allow Custom Cerficates
Only.
1. Select Panorama > Setup > Management and Edit the Panorama sengs.
2. Select Allow Custom Cerficate Only.
3. Click OK.
4. Commit your changes.
Aer comming this change, all devices managed by Panorama must use custom
cerficates. If not, authencaon between Panorama and the device fails.
Change Cerficates
If a custom cerficate in your deployment has expired or been revoked and needs to be replaced,
you can complete one of the tasks below.
• Change a Server Cerficate
• Change a Client Cerficate
• Change a Root or Intermediate CA Cerficate
Panorama Administrator's Guide Version Version 10.1 273 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 3 | Reestablish the connecon between the server (Panorama or a Log Collector) and client
devices.
1. Select Panorama > Setup > Management and Edit the Panorama Sengs for Panorama
or select Panorama > Managed Collectors > Add > Communicaon for a Log Collector.
2. Set the Disconnect Wait Time.
3. Click OK.
4. Commit your changes.
Panorama Administrator's Guide Version Version 10.1 274 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
STEP 6 | Aer updang the CA cerficates on all managed devices, enforce custom-cerficate
authencaon.
1. Select Panorama > Setup > Management and Edit the Panorama Sengs.
2. Select Custom Cerficate Only.
3. Click OK.
4. Commit your changes.
Aer comming this change, all devices managed by Panorama must use custom
cerficates. If not, authencaon between Panorama and the device fails.
Panorama Administrator's Guide Version Version 10.1 275 ©2022 Palo Alto Networks, Inc.
Set Up Panorama
Panorama Administrator's Guide Version Version 10.1 276 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
To use the Panorama™ management server for managing Palo Alto Networks firewalls,
you must add the firewalls as managed devices and then assign them to device
groups and to templates or template stacks. The following tasks best suit a first-me
firewall deployment. Before proceeding, review Plan Your Panorama Deployment to
understand the deployment opons.
> Add a Firewall as a Managed Device > Schedule a Configuraon Push to
> Install the Device Cerficate for Managed Firewalls
Managed Firewalls > Redistribute Data to Managed
> Set Up Zero Touch Provisioning Firewalls
> Manage the Master Key from > Use Case: Configure Firewalls Using
Panorama Panorama
To view the Objects and Policies tabs on the Panorama web interface, you must first
create at least one device group. To view the Network and Device tabs, you must
create at least one template. These tabs contain the opons by which you configure
and manage the firewalls on your network.
277
Manage Firewalls
You can bulk import only single-vsys firewalls to the Panorama management server.
The firewall uses the Panorama management server IP address for registraon with the server.
The Panorama server and the firewall authencate with each other using 2,048-bit cerficates
and AES-256 encrypted SSL connecons for configuraon management and log collecon.
To configure the device registraon authencaon key, specify the key lifeme and the number of
mes you can use the authencaon key to onboard new firewalls. Addionally, you can specify
one or more firewall serial numbers for which the authencaon key is valid.
The authencaon key expires 90 days aer the key lifeme expires. Aer 90 days, you are
prompted to re-cerfy the authencaon key to maintain its validity. If you do not re-cerfy,
then the authencaon key becomes invalid. A system log is generated each me a firewall
uses the Panorama-generated authencaon key. The firewall uses the authencaon key to
authencate the Panorama server when it delivers the device cerficate that is used for all
subsequent communicaons.
(PAN-OS 10.1 only) For firewalls running a PAN-OS 10.1 release, Panorama running PAN-
OS 10.1.3 or later release supports onboarding firewalls running PAN-OS 10.1.3 or later
release only. You cannot add a firewall running PAN-OS 10.1.2 or earlier PAN-OS 10.1
release to Panorama management if Panorama is running PAN-OS 10.1.3 or later release.
Panorama supports onboarding firewalls running the following releases:
• Panorama running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release— Firewalls running
PAN-OS 10.1.2 or earlier PAN-OS 10.1 release, and firewalls running PAN-OS 10.0 or
earlier PAN-OS release.
• Panorama running PAN-OS 10.1.3 or later release— Firewalls running PAN-OS 10.1.3
or later release, and firewalls running PAN-OS 10.0 or earlier PAN-OS release.
There is no impact to firewalls already managed by Panorama on upgrade to PAN-OS
10.1.
Panorama Administrator's Guide Version Version 10.1 278 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
You can select Any to use the device registraon authencaon key to
onboard firewalls, Log Collectors, and WildFire appliances.
• (Oponal) Devices—Enter one or more device serial numbers to specify for which
firewalls the authencaon key is valid.
4. Click OK.
Panorama Administrator's Guide Version Version 10.1 279 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Add firewalls to a Panorama management server. You can manually add one or more firewalls
or bulk import firewalls using a CSV file.
You cannot bulk import firewalls with more than one virtual system (vsys).
5. Click OK.
6. Associate your managed firewalls as needed.
If you did not select Associate Devices, skip this step and connue to configure the
firewall to communicate with Panorama.
1. Assign the Device Group, Template Stack, Collector Group, and Log Collector as
needed from the drop-down in each column.
2. Enable Auto Push on 1st connect to automacally push the device group and
template stack configuraon to the new devices when they first successfully connect
to the Panorama server.
The Auto Push on 1st Connect opon is supported only on firewalls running
PAN-OS® 8.1 and later releases. The commit all job executes from
Panorama to managed devices running PAN-OS 8.1 and later releases.
Panorama Administrator's Guide Version Version 10.1 280 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Leave this column empty if you do not want to automacally upgrade the managed
firewall.
4. Click OK to add the devices.
Panorama Administrator's Guide Version Version 10.1 281 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
4. Download Sample CSV and edit the downloaded CSV file with the firewalls you are
adding. You can choose to assign the firewalls to a device group, template stack,
Panorama Administrator's Guide Version Version 10.1 282 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Collector Group, and Log Collector from the CSV or enter only the firewall serial numbers
and assign them from the web interface. Save the CSV aer you finish eding.
5. Browse to and select the CSV file you edited in the previous step.
6. If not already assigned in the CSV, assign the firewalls a Device Group, Template Stack,
Collector Group, and Log Collector as needed from the drop-down in each column
7. If not already enabled in the CSV, enable Auto Push on 1st connect to automacally
push the device group and template stack configuraon to the new devices when they
first successfully connect to the Panorama server.
8. (Oponal) Select a PAN-OS release version (To SW Version column) to begin
automacally upgrading the managed firewall to the specified PAN-OS version upon
successful connecon to the Panorama server.
Leave this column empty if you do not want to automacally upgrade the managed
firewall.
9. Click OK to add the firewalls.
Panorama Administrator's Guide Version Version 10.1 283 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | Configure the firewall to communicate with the Panorama management server.
Repeat this step for each firewall the Panorama server will manage.
1. Log in to the firewall web interface.
2. Configure the Panorama Sengs for the firewall.
1. Select Device > Setup > Management and edit the Panorama Sengs.
2. Enter the Panorama IP address in the first field.
STEP 5 | (Oponal) Add a Tag. Tags make it easier for you to find a firewall from a large list; they help
you dynamically filter and refine the list of firewalls in your display. For example, if you add a
tag called branch office, you can filter for all branch office firewalls across your network.
1. Select each firewall and click Tag.
2. Click Add, enter a string of up to 31 characters (no empty spaces), and click OK.
STEP 6 | If your deployment is using custom cerficates for authencaon between Panorama and
managed devices, deploy the custom client device cerficate. For more informaon, see Set
Up Authencaon Using Custom Cerficates and Add New Client Devices.
Panorama Administrator's Guide Version Version 10.1 284 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 7 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 285 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 286 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | Select Panorama > Managed Devices > Summary and select a managed firewall.
STEP 5 | Select Request OTP From CSP > Custom selected devices.
STEP 7 | Generate the One Time Password (OTP) for managed firewalls.
1. Log in to the Customer Support Portal.
2. Select Assets > Device Cerficates and Generate OTP.
3. For the Device Type, select Generate OTP for Panorama managed firewalls.
4. Paste the OTP request you copied in the previous step and Generate OTP.
5. Click Done and wait a few minutes for the OTP to successfully generate. You can refresh
the page if the new OTP does not display.
6. Copy to Clipboard or Download the OTP.
STEP 9 | Select Panorama > Managed Devices > Summary and Upload OTP.
Panorama Administrator's Guide Version Version 10.1 287 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 11 | Verify that the Device Cerficate column displays as Valid and that the Device Cerficate
Expiry Date displays an expiraon date.
Panorama Administrator's Guide Version Version 10.1 288 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Select Request OTP From CSP > Select all devices without a cerficate.
Panorama Administrator's Guide Version Version 10.1 289 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 7 | Generate the One Time Password (OTP) for managed firewalls.
1. Log in to the Customer Support Portal.
2. Select Assets > Device Cerficates and Generate OTP.
3. For the Device Type, select Generate OTP for Panorama managed firewalls.
4. Paste the OTP request you copied in the previous step and Generate OTP.
5. Click Done and wait a few minutes for the OTP to successfully generate. You can refresh
the page if the new OTP is not displayed.
6. Copy to Clipboard or Download the OTP.
STEP 9 | Select Panorama > Managed Devices > Summary and Upload OTP.
Panorama Administrator's Guide Version Version 10.1 290 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 11 | Verify that the Device Cerficate column displays as Valid and that the Device Cerficate
Expiry Date displays an expiraon date.
Panorama Administrator's Guide Version Version 10.1 291 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
To successfully leverage the ZTP service, on-board your ZTP firewalls with the factory
default PAN-OS version before upgrading to PAN-OS 10.0.0 or later release.
The ZTP plugin is supported on PAN-OS 10.0.1 and later releases.
• ZTP Overview
• Install the ZTP Plugin
• Configure the ZTP Installer Administrator Account
• Add ZTP Firewalls to Panorama
• Use the CLI for ZTP Tasks
• Uninstall the ZTP Plugin
ZTP Overview
Learn more about Zero Touch Provisioning (ZTP) and its configuraon elements.
• About ZTP
• ZTP Configuraon Elements
About ZTP
Zero Touch Provisioning (ZTP) is designed to simplify and automate the on-boarding of new
firewalls to the Panorama™ management server. ZTP streamlines the inial firewall deployment
process by allowing network administrators to ship managed firewalls directly to their branches
and automacally add the firewall to the Panorama™ management server aer the ZTP firewall
successfully connects to the Palo Alto Networks ZTP service. This allows businesses to save on
me and resources when deploying new firewalls at branch locaons by removing the need for
IT administrators to manually provision the new managed firewall. Aer successful on-boarding,
Panorama provides the means to configure and manage your ZTP configuraon and firewalls.
Review and subscribe to ZTP Service Status events to be nofied about scheduled
maintenance windows, outages, and workarounds.
Panorama Administrator's Guide Version Version 10.1 292 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Before you begin seng up ZTP on Panorama, review the Firewall Hardware Quick Start and
Reference Guides to understand how to correctly install your firewall to successfully leverage ZTP.
Panorama can only manage firewalls running a PAN-OS release equal to or less than
that installed on the Panorama.
Aer you successfully install the ZTP plugin on Panorama and register Panorama with the ZTP
service, the ZTP on boarding process connues as follows:
1. Installer or IT administrator registers ZTP firewalls by adding them to Panorama using the
firewall serial number and claim key.
2. Panorama registers the firewalls with the CSP. Aer the firewalls are successfully registered,
the firewall is associated with the same ZTP tenant as the Panorama in the ZTP service.
ZTP firewalls successfully registered with the ZTP service are automacally added as managed
firewalls (Panorama > Managed Devices) on Panorama.
3. When the firewall connects to the Internet, the ZTP firewall requests a device cerficate from
the CSP in order to connect to the ZTP service.
4. The ZTP service pushes the Panorama IP or FQDN to the ZTP firewalls.
5. The ZTP firewalls connect to Panorama and the device group and template configuraons are
pushed from Panorama to the ZTP firewalls.
Panorama Administrator's Guide Version Version 10.1 293 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Log in to the Panorama web interface as a superuser or Panorama administrator with access
to Panorama plugins (Panorama > Plugins).
STEP 3 | Select Panorama > Plugins and search for the ztp plugin.
STEP 4 | Download and Install the most recent version of the ZTP plugin.
Panorama Administrator's Guide Version Version 10.1 294 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
the device group and template configuraons required to connect your ZTP firewalls to the ZTP
service. Aer the device group and template are automacally generated, you must add your ZTP
firewalls to the device group and template so they can connect to the ZTP service aer they first
connect to Panorama.
STEP 1 | Install the Panorama Device Cerficate.
STEP 2 | Log in to the Palo Alto Networks Customer Support Portal (CSP).
STEP 3 | Associate your Panorama with the ZTP Service on the Palo Alto Networks CSP.
The ZTP Service supports associang up to two Panoramas only if they are in a high availability
(HA) configuraon. If Panorama is not in an HA configuraon, only a single Panorama can be
associated.
1. Select Assets > ZTP Service and Associate Panorama(s).
2. Select the serial number of the Panorama managing your ZTP firewalls.
3. (HA only) Select the serial number of the Panorama HA peer.
4. Click OK.
STEP 5 | Select Panorama > Zero Touch Provisioning > Setup and edit the General ZTP sengs.
Panorama Administrator's Guide Version Version 10.1 295 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
(Managed firewalls running PAN-OS 10.1.4 and earlier releases) Enter the
Panorama IP address to avoid the managed firewall disconnecng from
Panorama on reboot or aer a successful PAN-OS upgrade.
If you need to use the Panorama FQDN, configure a stac desnaon route to
avoid the managed firewall disconnecng from Panorama on reboot or aer a
successful PAN-OS upgrade.
3. (HA only) Enter the Peer FQDN or IP Address.
This is the FQDN or public IP address of the Panorama peer on which the ZTP plugin is
installed and that the CSP pushes to the ZTP firewalls in case of failover.
(Managed firewalls running PAN-OS 10.1.4 and earlier releases) Enter the
Panorama IP address to avoid the managed firewall disconnecng from
Panorama on reboot or aer a successful PAN-OS upgrade.
If you need to use the Panorama FQDN, configure a stac desnaon route to
avoid the managed firewall disconnecng from Panorama on reboot or aer a
successful PAN-OS upgrade.
4. Click OK to save your configuraon changes.
Panorama Administrator's Guide Version Version 10.1 296 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 7 | Create the default device group and template to automacally generate the required
configuraon to connect your ZTP firewalls to Panorama.
Adding the device group and template automacally generates a new device group and
template that contain the default configuraon to connect the Panorama and the ZTP firewalls.
1. Add Device Group and Template.
2. Enter the Device Group name.
3. Enter the Template name.
4. Click OK to save your configuraon changes.
STEP 8 | Add your ZTP firewalls to the device group and template specified in the previous step.
1. Select Panorama > Device Groups and select the device group that was automacally
created.
2. Select the ZTP Devices.
3. Click OK to save your configuraon changes.
4. Select Panorama > Templates and Add Stack.
5. In the Templates secon, Add the template that was automacally generated.
6. Select the ZTP Devices.
7. Click OK to save your configuraon changes.
STEP 9 | Verify that the required device group and template configuraons generated successfully.
1. Select Network > Interfaces > Ethernet and select the Template you created in the
previous step.
2. Verify that ethernet1/1 is configured with an IP Address, Virtual Router, and Security
Zone.
3. Select Network > Interfaces > Loopback and select the Template you created in the
previous step.
4. Verify that the loopback.900 interface is successfully created.
5. Select Policies > Security > Pre Rules and select the Device Group you created in the
previous step.
6. Verify that rule1 is successfully created.
7. Select Policies > NAT > Pre Rules and select the Device Group you created in the
previous step.
8. Verify that ztp-nat is successfully created.
Panorama Administrator's Guide Version Version 10.1 297 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Do not modify the IP address, virtual router, and Security zone of the ethernet1/1
interface, the loopback.900 loopback interface, the rule1 Security policy rule,
or ztp-nat NAT policy rule. These configuraons are required to connect your ZTP
firewall to Panorama.
STEP 12 | Sync to ZTP Service and verify that the Panorama Sync Status displays as In Sync.
STEP 2 | Log in to the Palo Alto Networks Customer Support Portal (CSP).
Panorama Administrator's Guide Version Version 10.1 298 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Associate your Panorama with the ZTP Service on the Palo Alto Networks CSP.
The ZTP Service supports associang up to two Panoramas only if they are in a high availability
(HA) configuraon. If Panorama is not in an HA configuraon, only a single Panorama can be
associated.
1. Select Assets > ZTP Service and Modify Associaon.
2. Select the serial number of the Panorama managing your ZTP firewalls.
3. (HA only) Select the serial number of the Panorama HA peer.
4. Click OK.
STEP 5 | Select Panorama > Zero Touch Provisioning > Setup and edit the General ZTP sengs.
Panorama Administrator's Guide Version Version 10.1 299 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
(Managed firewalls running PAN-OS 10.1.4 and earlier releases) Enter the
Panorama IP address to avoid the managed firewall disconnecng from
Panorama on reboot or aer a successful PAN-OS upgrade.
If you need to use the Panorama FQDN, configure a stac desnaon route to
avoid the managed firewall disconnecng from Panorama on reboot or aer a
successful PAN-OS upgrade.
3. (HA only) Enter the Peer FQDN or IP Address.
This is the FQDN or public IP address of the Panorama peer on which the ZTP plugin is
installed and that the CSP pushes to the ZTP firewalls in case of failover.
(Managed firewalls running PAN-OS 10.1.4 and earlier releases) Enter the
Panorama IP address to avoid the managed firewall disconnecng from
Panorama on reboot or aer a successful PAN-OS upgrade.
If you need to use the Panorama FQDN, configure a stac desnaon route to
avoid the managed firewall disconnecng from Panorama on reboot or aer a
successful PAN-OS upgrade.
4. Click OK to save your configuraon changes.
STEP 7 | Add your ZTP firewalls to the device group and template that will contain the required ZTP
configuraon.
1. Select Panorama > Device Groups and select the device group that will contain the
required ZTP configuraon.
2. Select the ZTP Devices.
3. Click OK to save your configuraon changes.
4. Select Panorama > Templates and select the template stack that contains the template
that will have the required ZTP configuraon.
5. Select the ZTP Devices.
6. Click OK to save your configuraon changes.
Panorama Administrator's Guide Version Version 10.1 300 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
A DHCP client is required for the ZTP firewalls to communicate with the ZTP
service.
5. Press OK to save your configuraon changes.
2. Create the loopback interface
1. Select Network > Interfaces > Loopback, select a Template to contain your ZTP
configuraon and Add a loopback interface.
2. For the Interface Name, enter loopback and enter the 900 suffix.
3. Select Config, select a Virtual Router, and set the Security Zone to Trust.
4. Press OK to save your configuraon changes.
3. Create the Security policy rule to allow the ZTP firewall and Panorama to communicate.
1. Select Policies > Security > Pre Rules, select the Device Group to contain your ZTP
policy rules, and Add a new rule.
2. Enter a descripve Name for the policy rule.
3. Select Source > Source Zone and Add the Trust zone.
4. Select Desnaon > Desnaon Zone and Add the Untrust zone.
5. Select Acon > Acon Sengs > Acon and select Allow.
4. Create the NAT policy rule to allow the ZTP firewall and Panorama to communicate.
1. Select Policies > NAT > Pre Rules, select the Device Group to contain your ZTP policy
rules, and Add a new rule.
2. Enter a descripve Name for the policy rule.
3. Select Original Packet and configure the following:
1. For the Source Zone, Add the Trust zone.
2. For the Desnaon Zone, select the Untrust zone.
3. For the Desnaon Interface, select the ethernet1/1 interface.
4. Click OK to save your configuraon changes.
Panorama Administrator's Guide Version Version 10.1 301 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 10 | Sync to ZTP Service and verify that the Panorama Sync Status displays as In Sync.
STEP 2 | Select Panorama > Admin Roles and verify that the installeradmin admin role is created.
The installeradmin is automacally created aer you successfully install the ZTP plugin on
Panorama.
Panorama Administrator's Guide Version Version 10.1 302 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
While adding ZTP firewalls to Panorama, do not perform any commits on the ZTP firewall
before you verify that the firewall is successfully added to Panorama in Step 4. Performing
a local commit on the ZTP firewall disables ZTP funconality and results in the failure to
successfully add the firewall to Panorama.
Panorama Administrator's Guide Version Version 10.1 303 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
You must connect the Eth1/1 interface on ZTP firewalls to successfully register ZTP
firewalls with the CSP and push the policy and network configuraons.
Panorama Administrator's Guide Version Version 10.1 304 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
The firewall must successfully register with the CSP to successfully obtain device
cerficate.
1. Select Registraon Status and verify that the ZTP firewall successfully registered with
the CSP.
STEP 5 | Add the ZTP firewall to device group and template stack.
You must add the ZTP firewall to a device group and template stack for your firewalls to display
as Connected to push policy and network configuraons.
1. Log in to the Panorama Web Interface using admin credenals.
2. Select Panorama > Device Groups, add a device group, and the ZTP firewall to the device
group.
Add a device group to create and configure a new device group to contain the policy
objects and rules for your ZTP firewalls.
3. Select Panorama > Templates, configure a template stack, and the ZTP firewall to the
template stack.
Configure a template stack to create and configure a new template stack to contain the
network configuraon for your ZTP firewalls.
Panorama Administrator's Guide Version Version 10.1 305 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
While adding ZTP firewalls to Panorama, do not perform any commits on the ZTP firewall
before you verify that the firewall is successfully added to Panorama in Step 5. Performing
a local commit on the ZTP firewall disables ZTP funconality and results in the failure to
successfully add the firewall to Panorama.
STEP 1 | Gather the serial numbers and claim keys for your ZTP firewalls.
The eight digit numeric claim key is printed on a physical label aached to the back of the ZTP
firewall you received from Palo Alto Networks.
STEP 2 | Create a CSV file containing the ZTP firewall serial numbers and claim keys. The first column
must contain the serial numbers and the second column must contain the corresponding
claim key for that firewall. Refer to the following example for reference.
You must connect the Eth1/1 interface on ZTP firewalls to successfully register ZTP
firewalls with the CSP and push the policy and network configuraons.
1. Log in to the Panorama Web Interface using the ZTP installer admin credenals.
2. Select Panorama > Zero Touch Provisioning > Firewall Registraon and Import the ZTP
firewalls.
3. Browse and select the CSV file containing the ZTP firewall informaon and click OK.
Panorama Administrator's Guide Version Version 10.1 306 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Verify the firewall successfully registered with the ZTP service.
1. Select Registraon Status and verify that the ZTP firewalls successfully registered with
the ZTP service.
2. Log in to the Panorama Web Interface using admin credenals.
3. Select Panorama > Managed Devices > Summary and verify that the ZTP firewalls are
successfully added as a managed firewall.
STEP 6 | Add the ZTP firewalls to a device group and template stack.
You must add the ZTP firewall to a device group and template stack for your firewalls to display
as Connected to push policy and network configuraons.
1. Log in to the Panorama Web Interface using admin credenals.
2. Select Panorama > Device Groups and assign the firewalls to the appropriate device
group.
Add a device group to create and configure a new device group to contain the policy
objects and rules for your ZTP firewalls.
3. Select Panorama > Templates and assign the firewalls to the appropriate template stack.
Configure a template stack to create and configure a new template stack to contain the
network configuraon for your ZTP firewalls.
Panorama Administrator's Guide Version Version 10.1 307 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 308 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
View ZTP firewall informaon and ZTP service status from Panorama
Panorama Administrator's Guide Version Version 10.1 309 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 310 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Enter a unique Name and a Descripon to idenfy the device group.
STEP 3 | In the Devices secon, select check boxes to assign firewalls to the group. To search a long
list of firewalls, use the Filters.
You can assign any firewall to only one device group. You can assign each virtual
system on a firewall to a different device group.
STEP 4 | In the Reference Template secon, Add any templates or template stacks with objects
referenced by the device group configuraon.
You must assign the appropriate template or template stack references to the device group
in order to successfully associate the template or template stack to the device group. This
allows you to reference objects configured in a template or template stack without adding an
unrelated device to a template stack.
Skip this step if the device group configuraon does not reference any objects configured in a
template or template stack.
Panorama Administrator's Guide Version Version 10.1 311 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | (Oponal) Select Group HA Peers for firewalls that are HA peers.
You can only group managed firewall HA peers if they are in the same device group.
STEP 6 | Select the Parent Device Group (default is Shared) that will be just above the device group
you are creang in the device group hierarchy.
STEP 7 | If your policy rules will reference users and groups, assign a Master firewall.
This will be the only firewall in the device group from which Panorama gathers username and
user group informaon.
STEP 9 | Select Commit > Commit and Push and then Commit and Push your changes to the
Panorama configuraon and to the device group you added.
Panorama Administrator's Guide Version Version 10.1 312 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
If you move a device group to a different parent, all its descendant device groups move
with it, along with all firewalls, policy rules, and objects associated with the device
group and its descendants. If the new parent is in another access domain, the moved
device group will no longer have membership in the original access domain. If the new
access domain has read-write access for the parent device group, it will also have
read-write access for the moved device group. If the new access domain has read-only
access for the parent, it will have no access for the moved device group. To reconfigure
access for device groups, see Configure an Access Domain.
STEP 4 | Configure, move, and clone objects and policy rules as needed to account for inheritance in
the device group hierarchy.
• Create Objects for Use in Shared or Device Group Policy, or edit exisng objects.
You can edit objects only at their locaon: the device group to which they are assigned.
Descendant device groups inherit read-only instances of the objects from that locaon.
However, you can oponally see Step Override inherited object values.
• Create or edit policies.
• Move or Clone a Policy Rule or Object to a Different Device Group.
Panorama Administrator's Guide Version Version 10.1 313 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Commit to Panorama and push to device groups aer any change to the hierarchy.
You must also push changes to templates if a template references objects in a device group
(such as interfaces referencing addresses), and a firewall assigned to the template is no longer
assigned to that device group because of a hierarchy change.
Select Commit > Commit and Push and then Commit and Push your changes to the Panorama
configuraon and to the device groups you added or changed.
See Use Dynamic Address Groups in Policy to verify the number of supported registered
IP addresses on Panorama if you intended to leverage dynamic address groups in order to
create policies that automacally adapt to changes in your network.
Panorama Administrator's Guide Version Version 10.1 314 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
The Objects tab only displays objects that are in the selected Device Group or
are inherited from an ancestor device group or the Shared locaon.
3. Verify that the device group object appears. Note that the device group name in the
Locaon column matches the selecon in the Device Group drop-down.
If you want to push ancestor values to all overridden objects instead of reverng a specific
object, see Manage Precedence of Inherited Objects.
For the steps to override values, see Step 5
For details on object inheritance and overrides, see Device Group Objects.
STEP 1 | In the Objects tab, select the object type (for example, Objects > Addresses) and select the
Device Group that has an override instance of the object.
Panorama Administrator's Guide Version Version 10.1 315 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Select the object, click Revert, and click Yes. The Name column displays a green icon for the
object, indicang that it now inherits all values from an ancestor device group.
STEP 3 | Select Commit > Commit and Push and then Commit and Push your changes to the
Panorama configuraon and to the device group where you reverted the object.
When Share Unused Address and Service Objects with Devices is disabled, Panorama
ignores the Target firewalls when you Push a Policy Rule to a Subset of Firewalls. This
means that all objects referenced by any rules are pushed to all firewalls in the device
group.
To limit the number of objects pushed to a set of managed firewalls, add the policy rules to
a child device group and reference shared objects as needed. See Create a Device Group
Hierarchy for more informaon on creang a child device group.
On lower-end models, such as the PA-220, consider pushing only the relevant shared objects to
the managed firewalls. This is because the number of objects that can be stored on the lower-end
models is considerably lower than that of the mid- to high-end models. Also, if you have many
address and service objects that are unused, clearing Share Unused Address and Service Objects
with Devices reduces the commit mes significantly on the firewalls because the configuraon
pushed to each firewall is smaller. However, disabling this opon might increase the commit
me on Panorama because Panorama has to dynamically check whether policy rules reference a
parcular object.
STEP 1 | Select Panorama > Setup > Management, and edit the Panorama Sengs.
STEP 2 | Clear the Share Unused Address and Service Objects with Devices opon to push only
the shared objects that rules reference, or select the opon to re-enable pushing all shared
objects.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 316 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
of inherited objects replace the values of any overridden objects in the descendant device groups.
The figure below demonstrates the precedence of inherited objects in a device group:
If a firewall has locally defined objects with the same name as shared or device group
objects that Panorama pushes, a commit failure occurs.
If you want to revert a specific overridden object to its ancestor values instead of pushing
ancestor values to all overridden objects, see Revert to Inherited Object Values.
STEP 1 | Select Panorama > Setup > Management and edit the Panorama Sengs.
STEP 2 | If you want to reverse the default order of precedence, select Objects defined in ancestors
will take higher precedence. The dialog then displays the Find Overridden Objects link,
which provides the opon to see how many overridden (shadowed) objects will have
ancestor values aer you commit this change. You can hover over the quanty message to
display the object names.
If you want to revert to the default order of precedence, clear Objects defined in ancestors will
take higher precedence.
Find Overridden Objects only detects a Shared device group object that shares a name
with another object in the device group.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
STEP 5 | (Oponal) If you selected Objects defined in ancestors will take higher precedence,
Panorama does not push the ancestor objects unl you push configuraon changes to device
groups: select Commit > Push to Devices and Push your changes.
Panorama Administrator's Guide Version Version 10.1 317 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
When cloning mulple policy rules, the order by which you select the rules will determine
the order they are copied to the device group. For example, if you have rules 1-4 and your
selecon order is 2-1-4-3, the device group where these rules will be cloned will display
the rules in the same order you selected. However, you can reorganize the rules as you see
fit once they have been successfully copied.
STEP 1 | Log in to Panorama and select the rulebase (for example, Policy > Security > Pre Rules) or
object type (for example, Objects > Addresses).
STEP 2 | Select the Device Group and select one or more rules or objects.
STEP 4 | In the Desnaon drop-down, select the new device group or Shared. The default is
previously selected Device Group.
STEP 6 | The Error out on first detected error in validaon check box is selected by default, which
means Panorama will display the first error it finds and stop checking for more errors.
For example, an error occurs if the Desnaon device group doesn't have an object that
is referenced in the rule you are moving. When you move or clone many items at once,
selecng this check box can simplify troubleshoong. If you clear the check box, Panorama
will find all the errors before displaying them. Regardless of this seng, Panorama won’t
move or clone anything unl you fix all the errors for all the selected items.
STEP 7 | Click OK to start the error validaon. If Panorama finds errors, fix them and retry the move or
clone operaon. If Panorama doesn't find errors, it performs the operaon.
STEP 8 | Select Commit > Commit and Push, Edit Selecons in the Push Scope, select Device Groups,
select the original and desnaon device groups, click OK, and then Commit and Push your
changes to the Panorama configuraon and to the device groups.
Panorama Administrator's Guide Version Version 10.1 318 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
By default, Panorama uses PAN-DB, a URL filtering database that is ghtly integrated into PAN-
OS and the Palo Alto Networks threat intelligence cloud. PAN-DB provides high-performance
local caching to maximize in-line performance for URL lookups. The other vendor opon is
BrightCloud, a third-party URL database.
Unlike firewalls, Panorama does not download the URL database and does not require a
URL filtering license.
The following topics describe how to change the URL filtering vendor on Panorama or on both
Panorama and managed firewalls. You can also change the URL filtering vendor on just the
firewalls.
• Must Panorama and Firewalls Have Matching URL Filtering Vendors?
• Change the URL Filtering Vendor on HA Panorama
• Change the URL Filtering Vendor on non-HA Panorama
• Migrate Panorama and HA Firewalls from BrightCloud to PAN-DB
• Migrate Panorama and non-HA Firewalls from BrightCloud to PAN-DB
Panorama Administrator's Guide Version Version 10.1 319 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Complete this task on Panorama2 (passive peer) before Panorama1 (acve peer).
STEP 2 | Verify that the URL categories are available for referencing in policies.
1. Select Objects > Security Profiles > URL Filtering.
2. Click Add and verify that the Categories tab of the URL Filtering profile dialog displays
the URL categories associated with the selected vendor.
STEP 2 | Verify that the URL categories are available for referencing in policies.
1. Select Objects > Security Profiles > URL Filtering.
2. Click Add and verify that the Categories tab of the URL Filtering profile dialog displays
the URL categories associated with the selected vendor.
Panorama Administrator's Guide Version Version 10.1 320 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 1 | Determine which firewalls require new PAN-DB URL filtering licenses.
1. Log in to Panorama and select Panorama > Device Deployment > Licenses.
2. Check the URL column to determine which firewalls have PAN-DB licenses and whether
the licenses are valid or expired.
A firewall can have valid licenses for both BrightCloud and PAN-DB, but only one license
can be acve.
If you’re not sure whether a PAN-DB URL filtering license is acve, access the
firewall web interface, select Device > Licenses, and verify that the Acve field
displays Yes in the PAN-DB URL Filtering secon.
3. Purchase a new license for each firewall that does not have a valid PAN-DB license.
In HA deployments, each firewall peer needs a disnct PAN-DB license and authorizaon
code. Palo Alto Networks sends an email containing acvaon codes for the licenses you
purchase. If you can’t find this email, contact Customer Support before proceeding.
STEP 3 | Configure the TCP session sengs on both firewall HA peers to ensure sessions that are not
yet synchronized will fail over when you suspend a peer.
Log in to the CLI of each firewall and run the following command:
Panorama Administrator's Guide Version Version 10.1 321 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | Migrate the URL filtering vendor to PAN-DB on each firewall HA peer.
Complete this task on fw2 (passive or acve-secondary peer) before fw1 (acve or
acve-primary peer).
1. Access the firewall web interface, select Device > High Availability > Operaonal
Commands, and Suspend local device.
Performing this step on fw1 triggers failover to fw2.
2. Select Device > Licenses.
3. In the License Management secon, select Acvate feature using authorizaon code,
enter the Authorizaon Code and click OK.
Acvang the PAN-DB license automacally deacvates the BrightCloud license.
4. In the PAN-DB URL Filtering secon, Download the seed file, select your region, and
click OK.
5. Commit and push your configuraon changes:
1. Access the Panorama web interface.
2. Select Commit > Commit and Push and Edit Selecons in the Push Scope
3. Select Device Groups, select the firewall, and click OK.
4. Commit and Push your changes to the Panorama configuraon and to device groups.
6. Access the firewall web interface, select Device > High Availability > Operaonal
Commands, and Make local device funconal.
When you perform this step on fw1 with preempon enabled on both firewalls, fw1
automacally reverts to acve (or acve-primary) status and fw2 reverts to passive (or
acve-secondary) status.
STEP 5 | Revert both firewall HA peers to the original TCP session sengs.
Run the following command at the CLI of each firewall:
Panorama Administrator's Guide Version Version 10.1 322 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 1 | Determine which firewalls require new PAN-DB URL filtering licenses.
1. Log in to Panorama and select Panorama > Device Deployment > Licenses.
2. Check the URL column to determine which firewalls have PAN-DB licenses and whether
the licenses are valid or expired.
A firewall can have valid licenses for both BrightCloud and PAN-DB, but only one license
can be acve.
If you’re not sure whether a PAN-DB URL filtering license is acve, access the
firewall web interface, select Device > Licenses, and verify that the Acve field
displays Yes in the PAN-DB URL Filtering secon.
3. Purchase new licenses for the firewalls that don’t have valid PAN-DB licenses.
Palo Alto Networks sends an email containing acvaon codes for the licenses you
purchase. If you can’t find this email, contact Customer Support before proceeding.
Panorama Administrator's Guide Version Version 10.1 323 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
forwarded to Panorama from managed firewalls. However, the audit comment archive is not
viewable for rules created or modified locally on the firewall. To ensure that audit comments are
captured at the me a rule is created or modified, Enforce Policy Rule, Descripon, Tag and Audit
Comment.
The ability to target a rule enables you to keep policies centralized on Panorama. Targeted rules
allow you to define the rules (as either shared or device group pre- or post-rules) on Panorama and
improve visibility and efficiency when managing the rules (see Device Group Policies). The audit
comment archive adds further visibility by allowing you to track how and why your policy rules
change over me so you can audit the rule evoluon over the course of the rule lifecycle.
STEP 1 | (Best Pracce) Enforce audit comments for policy rules.
Although this step is oponal, it is a best pracce to enforce audit comments for policy rules to
ensure that you capture the reason for creang or modifying the rule. This also helps maintain
an accurate rule history for auding purposes.
1. Select Panorama > Setup > Management and edit the Policy Rulebase Sengs.
2. Enable the opon to Require audit comment on policies.
3. Configure the Audit Comment Regular Expression to specify the audit comment format.
When creang or modifying a rule, require audit comments to adhere to a specific format
based on your business and auding needs by specifying leer and number expressions.
For example, you can use this seng to specify regular expressions to match your
ckeng number formats:
• [0-9]{<Number of digits>}—Requires the audit comment to contain a
minimum number of digits ranging from 0 to 9. For example, [0-9]{6} requires a
minimum of 6 digit numerical expression with numbers 0 to 9. Configure the minimum
number of digits as needed.
• <Letter Expression>—Requires the audit comment to contain a leer expression.
For example, Reason for Change- requires that the administrator to begin the
audit comment with this leer expression.
• <Letter Expression>-[0-9]{<Number of digits>}—Requires the audit
comment to contain a set character prefix with a minimum number of digits ranging
from 0 to 9. For example, SB-[0-9]{6} requires the audit comment format to begin
with SB-, followed by a minimum 6 digit numerical expression with numbers 0 to 9
such as SB-012345.
• (<Letter Expression>)|(<Letter Expression>)|(<Letter
Expression>)|-[0-9]{<Number of digits>}—Requires the audit comment to
contain a prefix using one of the configured set of leer expressions with a minimum
number of digits ranging from 0 to 9. For example, (SB|XY|PN)-[0-9]{6} requires
the audit comment format begin with SB-, XY-, or PN- followed by a minimum 6
Panorama Administrator's Guide Version Version 10.1 324 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
By default, although the check box for the virtual systems in the device group is
disabled, all virtual systems will inherit the rule on commit unless you select one
or more virtual systems to which you want the rule to apply.
3. (Oponal) To exclude a subset of firewalls from inhering the rule, Install on all but
specified devices and select the firewalls you want to exclude.
If you Install on all but specified devices and do not select any firewalls, the rule
is not added to any of the firewalls in the device group.
4. Click OK to add the rule.
Panorama Administrator's Guide Version Version 10.1 325 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Troubleshoot Policy Rule Traffic Match to verify that the rules allow and deny traffic as the
intended.
To understand the order in which the firewall evaluates rules by layer and by type (pre-
rules, post-rules, and default rules) across the Device Group Hierarchy, see Device
Group Policies.
Panorama Administrator's Guide Version Version 10.1 326 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
To determine which rules a firewall doesn’t currently use, select that firewall in the
Context drop-down on Panorama, select the rulebase (for example, Policies > Security),
and select the Highlight Unused Rules check box. A doed orange background
indicates the rules that the firewall doesn’t use.
1. Select the rulebase (for example, Policies > Security > Pre Rules) that contains the rule
you will delete or disable.
2. Select the Device Group that contains the rule.
3. Select the rule, and click Delete or Disable as desired. Disabled rules appear in italicized
font.
To reposion local rules on a firewall, access its web interface by selecng that firewall
in the Context drop-down before performing this step.
1. Select the rulebase (for example, Policies > Security > Pre Rules) that contains the rule
you will move.
2. Select the Device Group that contains the rule.
3. Select the rule, select Move, and select:
• Move Top—Moves the rule above all other rules in the device group (but not above
rules inherited from Shared or ancestor device groups).
• Move Up—Moves the rule above the one that precedes it (but not above rules
inherited from Shared or ancestor device groups).
• Move Down—Moves the rule below the one that follows it.
• Move Boom—Moves the rule below all other rules.
• Move to other device group—See Move or Clone a Policy Rule or Object to a
Different Device Group.
Panorama Administrator's Guide Version Version 10.1 327 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | If you modified the rules, commit and push the changes.
1. Select Commit > Commit and Push and Edit Selecons in the Push Scope
2. Select Device Groups, select the device group that contains the rules you changed or
deleted, and click OK.
3. Commit and Push your changes to the Panorama configuraon and to device groups.
Panorama Administrator's Guide Version Version 10.1 328 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
To delete a template, you must first locally Disable/Remove Template Sengs on the
firewall. Only administrators with the superuser role can disable a template.
To Manage Licenses and Updates (soware or content) for firewalls, use the
Panorama > Device Management tab opons; do not use templates.
• Renaming a vsys on a mul-vsys firewall.
Add a Template
You must add at least one template before Panorama™ displays the Device and Network tabs
required to define the network setup and device configuraon elements for firewalls. Panorama
supports up to 1,024 templates. Every managed firewall must belong to a template stack. While
templates contain managed device configuraons, template stacks allow you to manage and push
the template configuraons to all managed firewalls assigned to the template stack.
Panorama Administrator's Guide Version Version 10.1 329 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Configure a Template Stack and add the template to the template stack.
Panorama Administrator's Guide Version Version 10.1 330 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Renaming a vsys is allowed only on the local firewall, not on Panorama the result is an
enrely new vsys or the new vsys name gets mapped to the wrong vsys on the firewall.
For example, define a primary Domain Name System (DNS) server for the firewalls in the
template.
You can also Configure a Template or Template Stack Variable to push device-
specific values to managed devices.
4. Select Commit > Commit and Push and then Commit and Push your changes to the
Panorama configuraon and to the template.
Panorama Administrator's Guide Version Version 10.1 331 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Verify that the firewall is configured with the template sengs that you pushed from
Panorama.
1. In the Context drop-down, select one of the firewalls to which you pushed the template
seng.
2. Select Device > Setup > Services > Global. The IP address that you pushed from the
template appears. The Services secon header displays a template icon ( ) to indicate
that sengs in the secon have values pushed from a template.
STEP 6 | Troubleshoot Connecvity to Network Resources to verify your firewalls can access your
network resources.
Add a Template to configure interfaces, VLANs, Virtual Wires, IPSec Tunnels, DNS Proxy
and Virtual Systems. These objects must be configured and pushed from a template, and
not a template stack. Once pushed from a template, you can override these objects, except
for Virtual Systems, in the template stack.
Panorama Administrator's Guide Version Version 10.1 332 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
When planning the priority order of templates within the stack (for overlapping
sengs), you must check the order to prevent misconfiguraon. For example, consider
a stack in which the ethernet1/1 interface is of type Layer 3 in Template_A but of type
Layer 2 with a VLAN in Template_B. If Template_A has a higher priority, Panorama will
push ethernet1/1 as type Layer 3 but assigned to a VLAN.
Also note that a template configuraon can’t reference a configuraon in another template
even if both templates are in the same stack. For example, a zone configuraon in Template_A
can’t reference a zone protecon profile in Template_B.
Panorama supports only Add Stack to create a new template stack. You cannot
clone an exisng template stack.
2. Enter a unique Name to idenfy the stack.
3. For each of the templates the stack will combine (up to 8), Add and select the template.
The dialog lists the added templates in order of priority with respect to duplicate
Panorama Administrator's Guide Version Version 10.1 333 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
sengs, where values in the higher templates override those that are lower in the list. To
change the order, select a template and Move Up or Move Down.
4. In the Devices secon, select firewalls to assign them to the stack. For firewalls with
mulple virtual systems, you can’t assign individual virtual systems, only an enre
firewall. You can assign any firewall to only one template stack.
Whenever you add a new managed firewall to Panorama, you must assign it to
the appropriate template stack; Panorama does not automacally assign new
firewalls to a template or template stack. When you push configuraon changes
to a template, Panorama pushes the configuraon to every firewall assigned to
the template stack.
5. (Oponal) Select Group HA Peers to display a single check box for firewalls that are in
a high availability (HA) configuraon. Icons indicate the HA state: green for acve and
yellow for passive. The firewall name of the secondary peer is in parentheses.
For acve/passive HA, add both peers to the same template so that both will receive
the configuraons. For acve/acve HA, whether you add both peers to the same
template depends on whether each peer requires the same configuraons. For a list of
the configuraons that PAN-OS synchronizes between HA peers, see High Availability
Synchronizaon.
6. Click OK to save the template stack.
Panorama Administrator's Guide Version Version 10.1 334 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Renaming a vsys is allowed only on the local firewall. If you rename a vsys on
Panorama, the result is an enrely new vsys or the new vsys name gets mapped to the
wrong vsys on the firewall.
In an individual firewall context, you can override sengs that Panorama pushes from a stack
in the same way you override sengs pushed from a template, see Override a Template or
Template Stack Value.
1. Filter the tabs to display only the mode-specific sengs you want to edit:
• In the Mode drop-down, select or clear the Mul VSYS, Operaonal Mode, and VPN
Mode filter opons.
• Set all the Mode opons to reflect the mode configuraon of a parcular firewall by
selecng it in the Device drop-down.
2. Set up your interfaces and network connecvity. For example, Configure Zones and
Interfaces to segment your network to manage and control traffic passing through your
firewall.
3. Edit the sengs as needed.
4. Select Commit > Commit and Push, Edit Selecons in the Push Scope, select Templates,
select the firewalls assigned to the template stack, and then Commit and Push your
changes to the Panorama configuraon and to the template stack.
Panorama Administrator's Guide Version Version 10.1 335 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 6 | Troubleshoot Connecvity to Network Resources to verify your firewalls can access your
network resources.
Panorama Administrator's Guide Version Version 10.1 336 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Select Panorama > Templates and Manage (Variables column) the template or template stack
for which you want to create a variable.
STEP 5 | From the Template drop-down, select the template or template stack to which the variable
belongs.
Panorama Administrator's Guide Version Version 10.1 337 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 7 | Click Commit and Commit and Push your changes to managed firewalls.
When you push a device group configuraon with references to template or template
stack variables, you must Edit Selecons and Include Device and Network Templates.
STEP 8 | Verify that the values for all variables were pushed to the managed devices.
1. From the Context drop-down, select a firewall that belongs to the template stack for
which the variable was created.
2. Select Device > Setup > Services.
3. Sengs with values defined by a template or template stack are indicated by a template
symbol ( ). Hover over the indicator to view to which template or template stack the
Panorama Administrator's Guide Version Version 10.1 338 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
variable definion belongs. When viewing from the firewall context, the variables display
as the IP address you configured for the variable.
STEP 9 | Troubleshoot Connecvity to Network Resources to verify your firewalls can access your
network resources.
Panorama Administrator's Guide Version Version 10.1 339 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Edit the CSV file containing the template stack variables to import to Panorama in the
following format:
Values that display as #inherited# are values that are defined in the template stack.
1. Correct the number of the cells containing the firewall serial number. Repeat this step for
all firewalls in the CSV file.
1. Right-click the cell containing the firewall serial number and select Format Cells.
2. Select Number > Text and click OK.
3. Add a 0 at the beginning of the serial number.
STEP 5 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 340 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 7 | Click Commit and Commit and Push your changes to managed firewalls.
When you push a device group configuraon with references to template or template
stack variables, you must Edit Selecons and Include Device and Network Templates.
If you want to disable or remove all the template or stack sengs on a firewall instead of
overriding a single value, see Disable/Remove Template Sengs.
You can override a template or template stack value in one of the following ways:
• Override a Template Value on the Firewall or Override a Template or Template Stack Value
Using Variables—There are two ways to override values pushed from a template or template
stack. The first is to define a value locally on the firewall to override a value pushed from a
template or template stack. The second is to define firewall-specific variables to override values
pushed from a template or template stack.
• Override a Template Value Using a Template Stack—Define values or variables on the template
stack to override values pushed from a template.
Panorama Administrator's Guide Version Version 10.1 341 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | From the Template drop-down, select the template stack that will override the template
configuraon.
Panorama Administrator's Guide Version Version 10.1 342 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
You can override template or template stack variables that have not been overridden. If a
template or template stack variable is already overridden, Revert the override to create a
firewall-specific variable.
If you want to override a single seng instead of disabling or removing every template or
stack seng, see Override a Template Seng.
See Templates and Template Stacks for details on how to use these for managing
firewalls.
Panorama Administrator's Guide Version Version 10.1 343 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 1 | Access the web interface of the managed firewall as an administrator with the Superuser
role. You can directly access the firewall by entering its IP address in the browser URL field
or, in Panorama, select the firewall in the Context drop-down.
STEP 2 | Select Device > Setup > Management and edit the Panorama Sengs.
STEP 4 | (Oponal) Select Import Device and Network Template before disabling, to save the
configuraon sengs locally on the firewall. If you do not select this opon, PAN-OS will
delete all Panorama-pushed sengs from the firewall.
Panorama Administrator's Guide Version Version 10.1 344 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Palo Alto Networks recommends updang the master key from Panorama during a
planned maintenance window and with the help of Palo Alto Networks Support to avoid
network disrupons for your organizaon.
If your managed firewalls contain both local and Panorama pushed configuraon that
reference one another, you are required to either localize the configuraon to the firewall.
This removes any local overrides of a Panorama pushed configuraon which may lead to
network disrupons if not restored correctly.
For managed firewalls in a high availability (HA) configuraon, you are required to disable
HA as well.
When a master key expires, you must enter the current master key in order to configure a
new master key.
Be sure to keep track of the master key you deploy to your managed firewalls, Log
Collectors, and WildFire appliances because master keys cannot be recovered. you must
reset to factory default if you cannot provide the current master key when it expires.
STEP 2 | (Best Pracce) Select Commit and Commit and Push any pending configuraon changes.
Panorama must re-encrypt data using the new master key. To ensure all configuraon elements
are encrypted with the new master key, you should commit all pending changes before
deploying the new master key.
Panorama Administrator's Guide Version Version 10.1 345 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
This step is required only if the managed firewall has a local and Panorama pushed
configuraon that reference each other or local overrides of a Panorama pushed
configuraon.
Skip this step if your managed firewall configuraon is enrely pushed from Panorama,
or if the managed firewall configuraon contains both a local and Panorama pushed
configuraon contains no references to each other or local overrides.
Panorama Administrator's Guide Version Version 10.1 346 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
If you want to deploy a unique master key for a specific set of managed firewalls,
you can select those specific managed firewalls as well.
Panorama Administrator's Guide Version Version 10.1 347 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
5. Verify that the master key was deployed successfully to all selected managed firewalls.
A System log generates when you deploy a new master key from Panorama.
6. (Oponal) Configure the master key to automacally renew for your managed firewalls.
Configure this seng to automacally renew the master key deployed on the managed
firewalls associated with the selected template. Otherwise, the master key expires per
the configured master key lifeme and you must deploy a new master key.
1. Select Device > Master Key and Diagnosc and select the Template containing the
target managed firewalls.
2. Edit the Master Key sengs and configure the Auto Renew With Same Master Key
seng.
3. Click OK.
4. Commit and Commit and Push your configuraon changes.
Panorama Administrator's Guide Version Version 10.1 348 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 349 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 9 | (HA Firewalls only) Enable config sync for managed firewalls.
1. Select Device > High Availability > General and select the Template containing the
managed firewall HA configuraon.
2. Edit the HA Pair Sengs Setup.
3. Enable (check) Enable Config Sync and click OK.
4. Commit and Commit and Push your configuraon changes.
Panorama Administrator's Guide Version Version 10.1 350 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 11 | Push the Panorama configuraon back to managed firewalls for which you localized the
configuraon.
Perform this step with Palo Alto Networks Support and ensure you have a complete
list of all local overrides on your managed firewalls. Failure to preserve important local
firewall configuraons or restore any local overrides or references can result in network
disrupons.
Panorama Administrator's Guide Version Version 10.1 351 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
If you create mulple scheduled configuraon pushes, you must create them at a minimum
of a 5 minute interval to allow for the Panorama management server to validate the
configuraon. Scheduled configuraon pushes that are within 5 minutes of each other
may fail due to Panorama being unable to validate the first scheduled configuraon push
changes.
Aer a successful scheduled configuraon push occurs, you can view the scheduled configuraon
push execuon history to understand when the last push for a specific schedule occurred, and
how many managed firewalls were impacted. From the total number of impacted managed
firewalls, you can view how many configuraon pushes to managed firewalls were successful
and how many failed. Of the failed pushes, you can view the total number of managed firewalls
with automacally reverted configuraons due to a configuraon change that interrupted the
connecon between the managed firewall and Panorama.
STEP 1 | Log in to the Panorama Web Interface.
Panorama Administrator's Guide Version Version 10.1 352 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
You can also schedule a configuraon push to managed firewalls when you push
to devices (Commit > Push to Devices).
2. Configure name and frequency of the scheduled configuraon push.
• Name—Name of the configuraon push schedule.
• Date—Date on which the configuraon push is scheduled to occur next.
• Time—Time (hh:mm:ss) at which the configuraon push is scheduled to occur on the
scheduled configuraon push Date.
• Recurrence—Whether the scheduled configuraon push is a one me push or a
recurring scheduled push (monthly, weekly, or daily).
3. In the Push Scope Selecon, select one or more device groups, templates, or template
stacks.
You must select at least one device group, template, or template stack to successfully
schedule a config push.
All managed firewalls associated with the selected device groups, templates, or template
stacks are included in the scheduled config push.
1. Select one or more Device Groups you want to schedule to push.
2. Select one or more Templates you want to schedule to push.
3. Verify whether to Merge with Device Candidate config to merge the configuraon
changes pushed from Panorama with any pending configuraon changes implemented
locally on the firewall.
This seng is enabled by default.
4. Verify whether to Include Device and Network Templates to push both device group
changes and the associate template changes in a single operaon.
This seng is enabled by default. If disabled, Panorama pushes the device group and
associated template changes as separate operaons.
Panorama Administrator's Guide Version Version 10.1 353 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | View the execuon history to verify that the scheduled configuraon push for all managed
firewalls was successful.
1. Select Panorama > Scheduled Config Push and click the Last Executed me stamp in the
Status column.
2. View the execuon history for the scheduled configuraon push.
This includes the last me the scheduled configuraon push occurred and the total
number of impacted managed firewalls. Of the total number of impacted firewalls, you
can view how many scheduled configuraon pushes were successful, how many failed,
and how many of the managed firewalls automacally reverted their configuraon due
to a configuraon change that caused a disconnect between the managed firewall on
Panorama.
3. Click Tasks to view the full operaon details for the latest scheduled configuraon push.
Panorama Administrator's Guide Version Version 10.1 354 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 355 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 356 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
User: corpdomain\username1
From: UIA
Idle Timeout: 10229s
Max. TTL: 10229s
MFA Timestamp: first(1) - 2016/12/09 08:35:04
Group(s): corpdomain\groupname(621)
This example output shows the mestamp for a response to one authencaon
challenge (factor). For Authencaon rules that use mul-factor authencaon
(MFA), the output shows mulple mestamps.
Panorama Administrator's Guide Version Version 10.1 357 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 358 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 359 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama can import configuraons from firewalls that run PAN-OS 5.0 or later releases
and can push configuraons to those firewalls. The excepon is that Panorama 6.1 and
later releases cannot push configuraons to firewalls running PAN-OS 6.0.0 through 6.0.3.
Panorama can import configuraons from firewalls that are already managed devices but
only if they are not already assigned to device groups or templates.
If you will import mulple firewall configuraons, enter the serial number of each
one on a separate line. Oponally, you can copy and paste the serial numbers
from a Microso Excel worksheet.
3. Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 360 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
If you later decide to re-import a firewall configuraon, first remove the firewall device
groups and template to which it is a member. If the device group and template names
are the same as the firewall hostname, then you can delete the device group and
template before re-imporng the firewall configuraon or use the Device Group Name
Prefix fields to define new names for the device group and template created by the
re-import. Addionally, firewalls don’t lose logs when you remove them from device
groups or templates.
1. From Panorama, select Panorama > Setup > Operaons, click Import device
configuraon to Panorama, and select the Device.
The Import devices' shared objects into Panorama's shared context check
box is selected by default, which means Panorama compares imports objects
that belong to the Shared locaon in the firewall to Shared in Panorama. If an
imported object is not in the Shared context of the firewall, it is applied to each
device group being imported. If you clear the check box, Panorama copies will
not compare imported objects, and apply all shared firewall objects into device
groups being imported instead of Shared. This could create duplicate objects,
so selecng the check box is a best pracce in most cases. To understand the
consequences of imporng shared or duplicate objects into Panorama, see Plan
how to manage shared sengs.
4. Select a Rule Import Locaon for the imported policy rules: Pre Rulebase or Post
Rulebase. Regardless of your selecon, Panorama imports default security rules
(intrazone-default and interzone-default) into the post-rulebase.
If Panorama has a rule with the same name as a firewall rule that you import,
Panorama displays both rules. Delete one of the rules before performing a
Panorama commit to prevent a commit error.
5. Click OK. Panorama displays the import status, result, details about your selecons,
details about what was imported, and any warnings. Click Close.
6. Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 361 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Push the configuraon bundle from Panorama to the newly added firewall to remove all
policy rules and objects from its local configuraon.
This step is necessary to prevent duplicate rule or object names, which would cause commit
errors when you push the device group configuraon from Panorama to the firewall in the next
step.
Pushing the imported firewall configuraon from Panorama to remove local firewall
configuraon updates Policy rule Creaon and Modified dates to reflect the date you
pushed to your newly managed firewalls when you monitor policy rule usage for a
managed firewall. Addionally, a new universially unique idenfier (UUID) for each
policy rule is created.
If a master key is configured, Use Master Key and enter the master key before
you click OK.
4. Select Push & Commit. Panorama pushes the bundle and iniates a commit on the
firewall.
5. Click Close aer the push has commied successfully.
6. Launch the Web Interface of the firewall and ensure that the configuraon has been
successfully commied. If not, Commit the changes locally on the firewall.
7. Select Commit > Commit to Panorama and Commit your changes.
STEP 6 | Push the device group and template configuraons to complete the transion to centralized
management.
This step overwrites any local Network and Device sengs configured on the firewall.
If you are migrang mulple firewalls, perform all the preceding steps—including this one—for
each firewall before connuing.
1. Select Commit > Commit and Push and Edit Selecons in the Push Scope.
2. Select Device Groups and select the device groups that contain the imported firewall
configuraons.
3. Select Merge with Device Candidate Config, Include Device and Network Templates,
and Force Template Values.
4. Click OK to save your changes to the Push Scope.
5. Commit and Push your changes.
STEP 7 | On the Panorama web interface, select Panorama > Managed Devices > Summary and
verify that the device group and template stack are in sync for the firewall. On the firewall
Panorama Administrator's Guide Version Version 10.1 362 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
web interface, verify that configuraon objects display a green cog ( ), signifying that the
configuraon object is pushed from Panorama.
Panorama Administrator's Guide Version Version 10.1 363 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
without needing to recreate any configuraons or policies. You first import the firewall
configuraons to Panorama, which are used to create a new device group and template. You
will perform a special configuraon push of the device group and template to the firewalls to
overwrite the local firewall configuraons and synchronize the firewalls with Panorama.
STEP 1 | Plan the migraon.
See the checklist in Plan the Transion to Panorama Management.
If Panorama is already receiving logs from these firewalls, you do not need to perform
this step. Connue to Step 5.
Panorama Administrator's Guide Version Version 10.1 364 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
If Panorama is already receiving logs from these firewalls, you do not need to perform
this step. Connue to Step 5.
Do no push any device group or template stack configuraon to your managed firewalls
in this step. Pushing the device group and template stack configuraon during this step
wipes the local firewall HA configuraon in the next steps.
If you later decide to re-import a firewall configuraon, first remove the firewall device
groups and template to which it is a member. If the device group and template names
are the same as the firewall hostname, then you can delete the device group and
template before re-imporng the firewall configuraon or use the Device Group Name
Prefix fields to enter a new name for the device group and template created by the
re-import. Addionally, firewalls don’t lose logs when you remove them from device
groups or templates.
1. From Panorama, select Panorama > Setup > Operaons, click Import device
configuraon to Panorama, and select the Device.
Panorama Administrator's Guide Version Version 10.1 365 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
for each. Otherwise, the default value is the firewall name. You can’t use the names of
exisng device groups.
The Imported devices’ shared objects into Panorama’s shared context check
box is selected by default, which means Panorama compares imports objects
that belong to the Shared locaon in the firewall to Shared in Panorama. If an
imported object is not in the Shared context of the firewall, it is applied to each
device group being imported. If you clear the check box, Panorama copies will
not compare imported objects, and apply all shared firewall objects into device
groups being imported instead of Shared. This could create duplicate objects,
so selecng the check box is a best pracce in most cases. To understand the
consequences of imporng shared or duplicate objects into Panorama, see Plan
how to manage shared sengs.
4. Commit to Panorama.
5. Select Panorama > Setup > Operaons and Export or push device config bundle. Select
the Device, select OK and Push & Commit the configuraon.
The Enable Config Sync seng in Step 2 must be cleared on both firewalls before
you push the device group and template stack.
6. Launch the Web Interface of the firewall HA peer and ensure that the configuraon
pushed in the previous step commied successfully. If not, Commit the changes locally
on the firewall.
7. Repeat Step 1-6 above on the second firewall. The process creates a device group and
template stack per each firewall.
Panorama Administrator's Guide Version Version 10.1 366 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 6 | Add the HA firewall pair into the same device group and template stack.
1. Select Panorama > Device Group, select the device group of the second firewall, and
remove the second firewall from the device group.
2. Select the device group from which you removed the second firewall and Delete it.
3. Select the device group for the first firewall, select the second firewall, click OK and
Commit to Panorama to add it to the same device group as the HA peer.
4. Select Panorama > Templates, select the template stack of the second firewall, and
remove the second firewall from the template stack.
5. Select the template stack from which you removed the second firewall and Delete it.
6. Select the template stack for the first firewall, add the second firewall, select OK and
Commit to Panorama to add it to the same template stack as the HA peer.
7. Remove the HA sengs in the template associated with the newly migrated firewalls.
1. Select Device > High Availability and select the Template containing the HA
configuraon.
2. Select Remove All.
3. Commit to Panorama.
8. Push the device group and template stack configuraons to your managed firewalls.
First push the device group and template stack configuraon to your passive HA
peer and then to the acve HA peer.
Panorama Administrator's Guide Version Version 10.1 367 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
5. Launch the Web Interface of the acve HA peer and select Device > High Availability
> Operaonal Commands to Suspend local device.
Fail over to the passive HA peer before modifying the acve HA peer to maintain your
security posture while compleng the configuraon migraon.
6. Repeat steps 1-4 for the now passive HA peer.
7. Launch the Web Interface of the now acve HA peer and select Device > High
Availability > Operaonal Commands to Suspend local device.
This restores the original acve/passive HA peer roles.
9. Select Panorama > Managed Devices > Summary, and verify that the device group and
template are in sync for the passive firewall. Verify policy rules, objects and network
sengs on the passive firewall match the acve firewall.
Panorama Administrator's Guide Version Version 10.1 368 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Resolve how to manage duplicate sengs, which are those that have the same names in
Panorama as in a firewall.
Before you load a paral firewall configuraon, Panorama and that firewall might already have
duplicate sengs. Loading a firewall configuraon might also add sengs to Panorama that are
duplicates of sengs in other managed firewalls.
If Panorama has policy rules or objects with the same names as those on a firewall, a
commit failure will occur when you try to push device group sengs to that firewall.
If Panorama has template sengs with the same names as those on a firewall, the
template values will override the firewall values when you push the template.
Aer using this opon to import a firewall configuraon file, you can’t use
the Panorama web interface to load it. You must use the XML API or CLI, as
described in the next step.
Panorama Administrator's Guide Version Version 10.1 369 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Load the desired part of the firewall configuraon into Panorama.
To specify a part of the configuraon (for example, all applicaon objects), you must idenfy
the:
• Source xpath—The XML node in the firewall configuraon file from which you are loading.
• Desnaon xpath—The node in the Panorama configuraon to which you are loading.
Use the XML API or CLI to idenfy and load the paral configuraon:
1. Use the firewall XML API or CLI to idenfy the source xpath.
For example, the xpath for applicaon objects in vsys1 of the firewall is:
/config/devices/entry[@name='localhost.localdomain']/vsys/
entry[@name='vsys1']/application
2. Use the Panorama XML API or CLI to idenfy the desnaon xpath.
For example, to load applicaon objects into a device group named US-West, the xpath
is:
/config/devices/entry[@name='localhost.localdomain']/device-
group/entry[@name='US-West']/application
3. Use the Panorama CLI to load the configuraon and commit the change:
For example, enter the following to load the applicaon objects from vsys1 on an
imported firewall configuraon named fw1-config.xml into a device group named US-
West on Panorama:
STEP 6 | Push the paral configuraon from Panorama to the firewall to complete the transion to
centralized management.
1. On the firewall, delete any rules or objects that have the same names as those in
Panorama. If the device group for that firewall has other firewalls with rules or objects
Panorama Administrator's Guide Version Version 10.1 370 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
that are duplicated in Panorama, perform this step on those firewalls also. For details, see
Step 2.
2. On Panorama, push the paral configuraon to the firewall.
1. Select Commit > Commit and Push and Edit Selecons in the Push Scope.
2. Select Device Groups and select the device groups that contain the imported firewall
configuraons.
3. Select Merge with Device Candidate Config, Include Device and Network Templates,
and Force Template Values.
4. Click OK to save your changes to the Push Scope.
5. Commit and Push your changes.
3. If the firewall has a device or network seng that you won’t use Panorama to manage,
Override a Template or Template Stack Value on the firewall.
STEP 2 | (Best Pracce) Select Device > Setup > Operaons and Export device state.
Save a copy of the firewall system state, including device group and template sengs pushed
from Panorama, in the event you need to reload a known working configuraon on the
managed firewall.
STEP 3 | Disable the template configuraon to stop using template and template stacks to manage the
network configuraon objects of the managed firewall.
1. Select Device > Setup > Management and edit the Panorama Sengs.
2. Click Disable Device and Network Template.
3. (Oponal) Select Import Device and Network Template before disabling to save the
template configuraon sengs locally on the firewall. If you do not select this opon,
PAN-OS deletes all Panorama-pushed sengs from the firewall.
4. Click OK twice to connue.
Panorama Administrator's Guide Version Version 10.1 371 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | Disable the device group configuraon to stop using a device group to manage the policy and
object configuraons of the managed firewall.
1. Select Device > Setup > Management and edit the Panorama Sengs.
2. (Oponal) Select Import Panorama Policy Objects before disabling to save the policy
and object configuraons locally on the firewall. If you do not select this opon, PAN-OS
deletes all Panorama-pushed configuraons from the firewall.
3. Click OK to connue.
Do not aempt to commit your configuraon changes on the managed firewall yet as
all commits fail unl the following steps are successfully completed.
STEP 5 | Select Device > Setup > Operaons and Save named configuraon snapshot.
STEP 6 | Load named configuraon snapshot and enable (check) Regenerate Rule UUIDs for selected
named configuraon to generate new policy rule UUIDs.
This step is required to successfully localize the Panorama-pushed policy rules on the managed
firewalls.
Panorama Administrator's Guide Version Version 10.1 372 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 373 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Select Panorama > Managed Devices > Health to monitor the health of managed firewalls.
View All Devices to see a list of all managed firewalls and the monitored health metrics. Select
an individual firewall to view Detailed Device View with me-trended graphs and tables of
monitored metrics.
Panorama Administrator's Guide Version Version 10.1 374 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Select Deviang Devices to view firewalls with health metrics that deviated outside of the
calculated baseline.
Panorama lists all firewalls that are reporng metrics that deviate from the calculated baseline
and displays deviang metrics in red.
Policy rule usage data may also be useful when using Policy Opmizer to priorize which
rules to migrate or clean up first.
To view the rule usage across any Shared rule or for a specific device group:
STEP 1 | Log in to the Panorama Web Interface.
Panorama Administrator's Guide Version Version 10.1 375 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | Change the Device Group context to Shared or to the specific device group you want to
view.
Panorama Administrator's Guide Version Version 10.1 376 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Determine whether the rule is being used (Rule Usage). The policy rule usage status is one of
the following:
Firewalls must run PAN-OS 8.1 or later release with Policy Rule Hit Count enabled for
Panorama to determine rule usage.
• Used—When all firewalls in the device group—to which you pushed the policy rule—have
traffic matches for the policy rule.
• Parally Used—When some of the firewalls in the device group—to which you pushed the
policy rule—have traffic matches for the policy rule.
• Unused—When no firewalls in the device group—to which you pushed the policy rule—have
traffic matches for the policy rule.
• Em-dash (—)—When no firewalls in the device group—to which you pushed the policy rule—
have Policy Rule Hit Count enabled or available for Panorama to determine the rule usage.
• Modified—The date and me the policy rule was last modified.
• Created—The date and me the policy rule was created.
If the rule was created when Panorama was running PAN-OS 8.1 and the Policy
Rule Hit Count seng is enabled, the First Hit date and me is used as the Created
date and me on upgrade to PAN-OS 9.0 or later releases. If the rule was created in
PAN-OS 8.1 when the Policy Rule Hit Count seng was disabled or if the rule was
created when Panorama was running PAN-OS 8.0 or an earlier release, the Created
date for the rule will be the date and me you successfully upgraded Panorama to
PAN-OS 9.0 or later releases.
Panorama Administrator's Guide Version Version 10.1 377 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 6 | Click the Rule Usage status to view the list of firewalls using the rule and the hit-count data
for traffic that matches that rule on each firewall.
STEP 7 | (Oponal) View the policy rule hit-count data for individual firewalls in the device group.
1. Click Preview Rules.
2. From the Device context, select the firewall for which you want to view the policy rule
usage data.
STEP 8 | Select Policies and, in the Policy Opmizer dialog, view the Rule Usage filter.
Use the rule usage filter to evaluate the rule usage within a specified period of me. For
example, filter the selected rulebase for Unused rules within the last 30 days. You can
also evaluate rule usage with other rule aributes, such as the Created and Modified
dates, which enables you to filter for the correct set of rules to review. You can use this
data to help manage your rule lifecycle and to determine if a rule needs to be removed
to reduce your network aack surface.
1. Select the Timeframe you want to filter on, or specify a Custom me frame.
2. Select the rule Usage on which you want to filter.
3. (Oponal) If you have reset the rule usage data for any rules, check for Exclude rules
reset during the last <number of days> days and decide when to exclude a rule based
Panorama Administrator's Guide Version Version 10.1 378 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
on the number of days you specify since the rule was reset. Only rules that were reset
before your specified number of days are included in the filtered results.
4. (Oponal) Specify search filters based on addional rule data, other than the rule usage.
1. Hover your mouse over the column header, and from the drop-down select Columns.
2. Add any addional columns you want to filter with or to display.
3. Hover your mouse over the column data that you would like to filter, and select Filter
from the drop-down. For data that contain dates, select whether to filter using This
date, This date or earlier, or This date or later.
4. Click Apply Filter ( ).
Panorama Administrator's Guide Version Version 10.1 379 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 380 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
The first step in creang your central management strategy is to determine how to group the
firewalls into device groups and templates to efficiently push configuraons from Panorama. You
can base the grouping on the business funcons, geographic locaons, or administrave domains
of the firewalls. In this example, you create two device groups and three templates to administer
the firewalls using Panorama:
• Device Groups in this Use Case
• Templates in this Use Case
• Set Up Your Centralized Configuraon and Policies
Panorama Administrator's Guide Version Version 10.1 381 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
• DG_BranchAndRegional for grouping firewalls that serve as the security gateways at the
branch offices and at the regional head offices. We placed the branch office firewalls and the
regional office firewalls in the same device group because firewalls with similar funcons will
require similar policy rulebases.
• DG_DataCenter for grouping the firewalls that secure the servers at the data centers.
We can then administer shared policy rules across both device groups as well as administer
disnct device group rules for the regional office and branch office groups. Then for added
flexibility, the local administrator at a regional or branch office can create local rules that match
specific source, desnaon, and service flows for accessing applicaons and services that are
required for that office. In this example, we create the following hierarchy for security rules. you
can use a similar approach for any of the other rulebases.
Panorama Administrator's Guide Version Version 10.1 382 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 383 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Deploy the content updates to the firewalls. If you purchased a Threat Prevenon
subscripon, the content and anvirus databases are available to you. First install the
Applicaons or Applicaons and Threats database, then the Anvirus.
To review the status or progress for all tasks performed on Panorama, see Use the
Panorama Task Manager.
Panorama Administrator's Guide Version Version 10.1 384 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 2 | Define a DNS server, NTP server, syslog server, and login banner. Repeat this step for each
template.
1. In the Device tab, select the Template from the drop-down.
2. Define the DNS and NTP servers:
1. Select Device > Setup > Services > Global and edit the Services.
2. In the Services tab, enter an IP address for the Primary DNS Server.
For any firewall that has more than one virtual system (vsys), for each vsys,
add a DNS server profile to the template (Device > Server Profiles > DNS).
3. In the NTP tab, enter an IP address for the Primary NTP Server.
4. Click OK to save your changes.
3. Add a login banner: select Device > Setup > Management, edit the General Sengs,
enter text for the Login Banner and click OK.
4. Configure a Syslog server profile (Device > Server Profiles > Syslog).
STEP 3 | Enable HTTPS, SSH, and SNMP access to the management interface of the managed
firewalls. Repeat this step for each template.
1. In the Device tab, select the Template from the drop-down.
2. Select Setup > Management, and edit the Management Interface Sengs.
3. Under Services, select the HTTPS, SSH, and SNMP check boxes, and click OK.
STEP 4 | Create a Zone Protecon profile for the firewalls in the data center template (T_DataCenter).
1. Select the Network tab and, in the Template drop-down, select T_DataCenter.
2. Select Network Profiles > Zone Protecon and click Add.
3. For this example, enable protecon against a SYN flood—In the Flood Protecon tab,
select the SYN check box, set the Acon to SYN Cookies as, set the Alert packets/
second to 100, set the Acvate packets/second to 1000, and set the Maximum packets/
second to 10000.
4. For this example, enable alerts—In the Reconnaissance Protecon tab, select the Enable
check boxes for TCP Port Scan, Host Sweep, and UDP Port Scan. Ensure the Acon
values are set to alert (the default value).
5. Click OK to save the Zone Protecon profile.
Panorama Administrator's Guide Version Version 10.1 385 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 5 | Configure the interface and zone sengs in the data center template (T_DataCenter), and
then aach the Zone Protecon profile you just created.
Before performing this step, you must have configured the interfaces locally on the
firewalls. As a minimum, for each interface, you must have defined the interface type,
assigned it to a virtual router (if needed), and aached a security zone.
1. Select the Network tab and, in the Template drop-down, select T_DataCenter.
2. Select Network > Interface and, in the Interface column, click the interface name.
3. Select the Interface Type from the drop-down.
4. In the Virtual Router drop-down, click New Virtual Router. When defining the router,
ensure the Name matches what is defined on the firewall.
5. In the Security Zone drop-down, click New Zone. When defining the zone, ensure that
the Name matches what is defined on the firewall.
6. Click OK to save your changes to the interface.
7. Select Network > Zones, and select the zone you just created. Verify that the correct
interface is aached to the zone.
8. In the Zone Protecon Profile drop-down, select the profile you created, and click OK.
Panorama Administrator's Guide Version Version 10.1 386 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 3 | Define the corporate acceptable use policy for all offices. In this example, create a shared rule
that restricts access to some URL categories and denies access to peer-to-peer traffic that is
of risk level 3, 4, or 5.
1. Select the Policies tab and, in the Device Group drop-down, select Shared.
2. Select Security > Pre-Rules and click Add.
3. In the General tab, enter a Name for the security rule.
4. In the Source and Desnaon tabs, click Add and select any for the traffic Source Zone
and Desnaon Zone.
5. In the Applicaon tab, define the applicaon filter:
1. Click Add and click New Applicaon Filter in the footer of the drop-down.
2. Enter a Name, and select the Shared check box.
3. In the Risk column, select levels 3, 4, and 5.
4. In the Technology column, select peer-to-peer.
5. Click OK to save the new filter.
6. In the Service/URL Category tab, URL Category secon, click Add and select the
categories you want to block (for example, streaming-media, dang, and online-
personal-storage).
7. You can also aach the default URL Filtering profile—In the Acons tab, Profile Seng
secon, select the Profile Type opon Profiles, and select the URL Filtering opon
default.
8. Click OK to save the security pre-rule.
Panorama Administrator's Guide Version Version 10.1 387 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 4 | Allow Facebook for all users in the Markeng group in the regional offices only.
Enabling a security rule based on user and group has the following prerequisite tasks:
• Set up User-ID on the firewalls.
• Enable User-ID for each zone that contains the users you want to idenfy.
• Define a master firewall for the DG_BranchAndRegional device group (see step 1).
1. Select the Policies tab and, in the Device Group drop-down, select
DG_BranchAndRegional.
2. Select the Security > Pre-Rules rulebase.
3. Click Add and enter a Name for the security rule.
4. In the Source tab, Add the Source Zone that contains the Markeng group users.
5. In the Desnaon tab, Add the Desnaon Zone.
6. In the User tab, Add the Markeng user group to the Source User list.
7. In the Applicaon tab, click Add, type Facebook, and then select it from the drop-down.
8. In the Acon tab, set the Acon to Allow.
9. In the Target tab, select the regional office firewalls and click OK.
STEP 5 | Allow access to the Amazon cloud applicaon for the specified hosts/servers in the data
center.
1. Create an address object for the servers/hosts in the data center that need access to the
Amazon cloud applicaon.
1. Select Objects > Addresses and, in the Device Group drop-down, select
DG_DataCenter.
2. Click Add and enter a Name for the address object.
3. Select the Type, and specify an IP address and netmask (IP Netmask), range of IP
addresses (IP Range), or FQDN.
4. Click OK to save the object.
2. Create a security rule that allows access to the Amazon cloud applicaon.
1. Select Policies > Security > Pre-Rules and, in the Device Group drop-down, select
DG_DataCenter.
2. Click Add and enter a Name for the security rule.
3. Select the Source tab, Add the Source Zone for the data center, and Add the address
object (Source Address) you just defined.
4. Select the Desnaon tab and Add the Desnaon Zone.
5. Select the Applicaon tab, click Add, type amazon, and select the Amazon
applicaons from the list.
6. Select the Acon tab and set the Acon to Allow.
7. Click OK to save the rule.
Panorama Administrator's Guide Version Version 10.1 388 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
STEP 6 | To enable logging for all internet-bound traffic on your network, create a rule that matches
trust zone to untrust zone.
1. Select the Policies tab and, in the Device Group drop-down, select Shared.
2. Select the Security > Pre-Rules rulebase.
3. Click Add and enter a Name for the security rule.
4. In the Source and Desnaon tabs for the rule, Add trust_zone as the Source Zone
and untrust_zone as the Desnaon Zone.
5. In the Acon tab, set the Acon to Deny, set the Log Seng to Log at Session end, and
click OK.
STEP 3 | Verify that Panorama applied the template and policy configuraons.
1. In the Panorama header, set the Context to the firewall to access its web interface.
2. Review the template and policy configuraons to ensure your changes are there.
Panorama Administrator's Guide Version Version 10.1 389 ©2022 Palo Alto Networks, Inc.
Manage Firewalls
Panorama Administrator's Guide Version Version 10.1 390 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
All Palo Alto Networks firewalls can generate logs that provide an audit trail of firewall
acvies. For Centralized Logging and Reporng, you must forward the logs generated
on the firewalls to your on-premise infrastructure that includes the Panorama™
management server or Log Collectors or send the logs to the cloud-based Cortex Data
Lake. Oponally, you can then configure Panorama to forward the logs to external
logging desnaons (such as syslog servers).
If you forward logs to a Panorama virtual appliance in Legacy mode, you don’t
need to perform any addional tasks to enable logging. If you forward logs to Log
Collectors, you must configure them as managed collectors and assign them to
Collector Groups. A managed collector can be local to an M-Series appliance, or
Panorama virtual appliance in Panorama mode. Addionally, an M-Series appliance,
or Panorama virtual appliance in Log Collector mode can be Dedicated Log Collectors.
To determine whether to deploy either or both types of managed collectors, see Local
and Distributed Log Collecon.
To manage the System and Config logs that Panorama generates locally, see Monitor
Panorama.
> Configure a Managed Collector > Forward Logs to Cortex Data Lake
> Configure Authencaon for a > Verify Log Forwarding to Panorama
Dedicated Log Collector > Modify Log Forwarding and Buffering
> Manage Collector Groups Defaults
> Configure Log Forwarding to > Configure Log Forwarding from
Panorama Panorama to External Desnaons
> Configure Syslog Forwarding to > Log Collecon Deployments
External Desnaons
391
Manage Log Collecon
As a best pracce, retain a local Log Collector and Collector Group on the Panorama
management server, regardless whether it manages Dedicated Log Collectors.
(Panorama evaluaon only) If you are evaluang a Panorama virtual appliance with a local
Log Collector, Configure Log Forwarding from Panorama to External Desnaons to
preserve logs generated during your evaluaon period.
Logs stored on the local Log Collector cannot be preserved when you Convert Your
Evaluaon Panorama Instance to a Producon Panorama Instance with a Local Log
Collector.
Panorama Administrator's Guide Version Version 10.1 392 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
(PAN-OS 10.1 only) For Dedicated Log Collectors running a PAN-OS 10.1 release,
Panorama running PAN-OS 10.1.3 or later release supports onboarding a Dedicated
Log Collector running PAN-OS 10.1.3 or later release only. You cannot add a Dedicated
Log Collector running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release to Panorama
management if Panorama is running PAN-OS 10.1.3 or later release.
Panorama supports onboarding Dedicated Log Collectors running the following releases:
• Panorama running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release— Dedicated Log
Collectors running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release, and Dedicated Log
Collectors running PAN-OS 10.0 or earlier PAN-OS release.
• Panorama running PAN-OS 10.1.3 or later release— Dedicated Log Collectors running
PAN-OS 10.1.3 or later release, and Dedicated Log Collectors running PAN-OS 10.0 or
earlier PAN-OS release.
There is no impact to Dedicated Log Collectors already managed by Panorama on upgrade
to PAN-OS 10.1.
Panorama Administrator's Guide Version Version 10.1 393 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
You can select Any to use the device registraon authencaon key to
onboard firewalls, Log Collectors, and WildFire appliances.
• (Oponal) Devices—Enter one or more device serial numbers to specify for which Log
Collectors the authencaon key is valid.
3. Click OK.
Panorama Administrator's Guide Version Version 10.1 394 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 4 | (Dedicated Log Collector only) Add the device registraon authencaon key to the Log
Collector.
Add the device registraon authencaon key only to a Dedicated Log Collector. A Panorama
in Panorama mode does not need to authencate its own local Log Collector.
1. Log in to the Log Collector CLI.
2. Add the device registraon authencaon key.
If you set the Failed Aempts to a value other than 0 but leave the Lockout
Time at 0, then the admin user is indefinitely locked out unl another
administrator manually unlocks the locked out admin. If no other administrator
has been created, you must reconfigure the Failed Aempts and Lockout Time
sengs on Panorama and push the configuraon change to the Log Collector. To
ensure that an admin is never locked out, use the default 0 value for both Failed
Aempts and Lockout Time.
1. Enter the number of login Failed Aempts value. The range is between the default
value 0 to the maximum of 10 where the value 0 specifies unlimited login aempts.
2. Enter the Lockout Time value between the default value 0 to the maximum of 60
minutes.
4. Click OK to save your changes.
Panorama Administrator's Guide Version Version 10.1 395 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 8 | (Oponal) If your deployment is using custom cerficates for authencaon between
Panorama and managed devices, deploy the custom client device cerficate. For more
informaon, see Set Up Authencaon Using Custom Cerficates.
1. Select Panorama > Cerficate Management > Cerficate Profile and choose the
cerficate profile from the drop-down or click New Cerficate Profile to create one.
2. Select Panorama > Managed Collectors and Add a new Log Collector or select an
exisng one. Select Communicaon.
3. Select the type of device cerficate the Type drop-down.
• If you are using a local device cerficate, select the Cerficate and Cerficate Profile
from the respecve drop-downs.
• If you are using SCEP as the device cerficate, select the SCEP Profile and Cerficate
Profile from the respecve drop-downs.
4. Click OK.
Panorama Administrator's Guide Version Version 10.1 396 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 9 | (Oponal) Configure Secure Server Communicaon on a Log Collector. For more informaon,
see Set Up Authencaon Using Custom Cerficates.
1. Select Panorama > Managed Collectors and click Add. Select Communicaon.
2. Verify that the Custom Cerficate Only check box is not selected. This allows you to
connue managing all devices while migrang to custom cerficates.
When the Custom Cerficate Only check box is selected, the Log Collector
does not authencate and cannot receive logs from devices using predefined
cerficates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This
SSL/TLS service profile applies to all SSL connecons between the Log Collector and
devices sending it logs.
4. Select the cerficate profile from the Cerficate Profile drop-down.
5. Select Authorize Client Based on Serial Number to have the server check clients against
the serial numbers of managed devices. The client cerficate must have the special
keyword $UDID set as the CN to authorize based on serial numbers.
6. In Disconnect Wait Time (min), enter the number of minutes Panorama should before
breaking and reestablishing the connecon with its managed devices. This field is blank
by default and the range is 0 to 44,640 minutes.
The disconnect wait me does not begin counng down unl you commit the
new configuraon.
7. (Oponal) Configure an authorizaon list.
1. Add an Authorizaon List.
2. Select the Subject or Subject Alt Name as the Idenfier type.
3. Specify an idenfier of the selected type.
4. Click OK.
5. Enable the Log Collector to Check Authorizaon List to enforce the authorizaon list.
8. Click OK.
9. Select Commit > Commit to Panorama.
Unl you Configure a Collector Group and push configuraon changes to the
Collector Group, the Configuraon Status column displays Out of Sync, the
Run Time Status column displays disconnected, and the CLI command show
interface all displays the interfaces as down.
2. Click Stascs in the last column to verify that the logging disks are enabled.
Panorama Administrator's Guide Version Version 10.1 397 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 398 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 3 | (Oponal) Configure an authencaon profile to define the authencaon service that
validates the login credenals of the administrators who access the Dedicated Log Collector
CLI.
You must configure the administrave account with Superuser admin role privileges to
successfully configure authencaon for the Dedicated Log Collector.
Panorama Administrator's Guide Version Version 10.1 399 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 400 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the Dedicated Log Collector. These
administrators are specific to the Dedicated Log Collector for which they are created
and you manage these administrators from this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the Dedicated Log Collector.
5. Click OK to save the Dedicated Log Collector authencaon configuraon.
STEP 6 | Commit and then Commit and Push your configuraon changes.
STEP 7 | Log in to the Panorama CLI of the Dedicated Log Collector to verify you can successfully
access the Dedicated Log Collector using the local admin user.
Panorama Administrator's Guide Version Version 10.1 401 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
You can Import the Palo Alto Networks RADIUS diconary into RADIUS server to define
the authencaon aributes needed for communicaon between Panorama and the
RADIUS server.
Panorama Administrator's Guide Version Version 10.1 402 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Select CHAP if the RADIUS server supports that protocol; it is more secure
than PAP.
5. Add each RADIUS server and enter the following:
1. Name to idenfy the server.
2. RADIUS Server IP address or FQDN.
3. Secret/Confirm Secret (a key to encrypt usernames and passwords).
4. Server Port for authencaon requests (default is 1812).
6. Click OK to save the server profile.
2. Assign the RADIUS server profile to an authencaon profile.
The authencaon profile defines authencaon sengs that are common to a set of
administrators.
1. Select Panorama > Authencaon Profile and Add a profile.
2. Enter a Name to idenfy the authencaon profile.
3. Set the Type to RADIUS.
4. Select the Server Profile you configured.
5. Select Retrieve user group from RADIUS to collect user group informaon from VSAs
defined on the RADIUS server.
Panorama matches the group informaon against the groups you specify in the Allow
List of the authencaon profile.
6. Select Advanced and, in the Allow List, Add the administrators that are allowed to
authencate with this authencaon profile.
7. Click OK to save the authencaon profile.
Panorama Administrator's Guide Version Version 10.1 403 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 404 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the Dedicated Log Collector. These
administrators are specific to the Dedicated Log Collector for which they are created
and you manage these administrators from this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the Dedicated Log Collector.
5. Click OK to save the Dedicated Log Collector authencaon configuraon.
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Log in to the Panorama CLI of the Dedicated Log Collector to verify you can successfully
access the Dedicated Log Collector using the local admin user.
Panorama Administrator's Guide Version Version 10.1 405 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 406 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 407 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the Dedicated Log Collector. These
administrators are specific to the Dedicated Log Collector for which they are created
and you manage these administrators from this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the Dedicated Log Collector.
5. Click OK to save the Dedicated Log Collector authencaon configuraon.
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Log in to the Panorama CLI of the Dedicated Log Collector to verify you can successfully
access the Dedicated Log Collector using the local admin user.
Panorama Administrator's Guide Version Version 10.1 408 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
1. Select Panorama > Server Profiles > LDAP and Add a server profile.
2. Enter a Profile Name to idenfy the server profile.
3. Add the LDAP servers (up to four). For each server, enter a Name (to idenfy the server),
LDAP Server IP address or FQDN, and server Port (default 389).
If you use an FQDN address object to idenfy the server and you subsequently
change the address, you must commit the change for the new server address to
take effect.
4. Select the server Type.
5. Select the Base DN.
To idenfy the Base DN of your directory, open the Acve Directory Domains and
Trusts Microso Management Console snap-in and use the name of the top-level
domain.
6. Enter the Bind DN and Password to enable the authencaon service to authencate
the firewall.
The Bind DN account must have permission to read the LDAP directory.
7. Enter the Bind Timeout and Search Timeout in seconds (default is 30 for both).
8. Enter the Retry Interval in seconds (default is 60).
9. (Oponal) If you want the endpoint to use SSL or TLS for a more secure connecon with
the directory server, enable the opon to Require SSL/TLS secured connecon (enabled
by default). The protocol that the endpoint uses depends on the server port:
• 389 (default)—TLS (Specifically, the Dedicated Log Collector uses the StartTLS
operaon, which upgrades the inial plaintext connecon to TLS.)
• 636—SSL
• Any other port—The Dedicated Log Collector first aempts to use TLS. If the directory
server doesn’t support TLS, the Dedicated Log Collector falls back to SSL.
10. (Oponal) For addional security, enable to the opon to Verify Server Cerficate
for SSL sessions so that the endpoint verifies the cerficate that the directory server
presents for SSL/TLS connecons. To enable verificaon, you must also enable the
Panorama Administrator's Guide Version Version 10.1 409 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 410 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
• Configure the local administrators.
Configure new administrators unique to the Dedicated Log Collector. These
administrators are specific to the Dedicated Log Collector for which they are created
and you manage these administrators from this table.
1. Add one or more new local administrator.
2. Enter a Name for the local administrator.
3. Assign an Authencaon Profile you previously created.
Panorama Administrator's Guide Version Version 10.1 411 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 6 | Commit and then Commit and Push your configuraon changes.
STEP 7 | Log in to the Panorama CLI of the Dedicated Log Collector to verify you can successfully
access the Dedicated Log Collector using the local admin user.
Panorama Administrator's Guide Version Version 10.1 412 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 413 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 1 | Perform the following tasks before configuring the Collector Group.
1. Add a Firewall as a Managed Device for each firewall that you will assign to the Collector
Group.
2. Configure a Managed Collector for each Log Collector that you will assign to the
Collector Group.
Panorama Administrator's Guide Version Version 10.1 414 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
A preference list determines the order in which Log Collectors receive logs from
a firewall. If a log forwarding preference list is not assigned, you may encounter
one of the following scenarios:
• If Panorama is in Management Only mode, Panorama drops all incoming logs.
• If the local Log Collector is not configured as a managed collector when
Panorama is in Panorama mode, Panorama drops all incoming logs.
• If the local Log Collector is configured as a managed collector when Panorama
is in Panorama mode, incoming logs are received but the Panorama may act
as a boleneck because all managed firewalls are forwarding logs to the local
Log Collector first before being redistributed to other available Log Collectors.
1. In the Devices secon, Modify the list of firewalls and click OK.
2. In the Collectors secon, Add Log Collectors to the preference list.
If you enabled redundancy in Step 2, it is recommended to add at least two Log
Collectors. If you assign mulple Log Collectors, the first one will be the primary; if the
primary becomes unavailable, the firewalls send logs to the next Log Collector in the
list. To change the priority of a Log Collector, select it and Move Up (higher priority) or
Move Down (lower priority).
3. Click OK.
STEP 4 | Define the storage capacity (log quotas) and expiraon period for each log type.
1. Return to the General tab and click the Log Storage value.
If the field displays 0MB, verify that you enabled the disk pairs for logging and
commied the changes (see Configure a Managed Collector, Disks tab).
2. Enter the log storage Quota(%) for each log type.
3. Enter the Max Days (expiraon period) for each log type (1 to 2,000).
By default, the fields are blank, which means the logs never expire.
Panorama Administrator's Guide Version Version 10.1 415 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 2 | Import the CA cerficate to validate the identy of the client Log Collector, the server key
pair, and the client key pair for each Log Collector in the Collector Group.
1. Select Panorama > Cerficate Management > Cerficates > Import.
2. Import the CA cerficate, server key pair, and client key pair.
3. Repeat th step for the each Log Collector.
STEP 3 | Configure a cerficate profile that includes the root CA and intermediate CA for secure
server communicaon. This cerficate profile defines the authencaon between Log
Collectors.
1. Select Panorama > Cerficate Management > Cerficate Profile.
2. Configure a cerficate profile.
If you configure an intermediate CA as part of the cerficate profile, you must also
include the root CA.
Panorama Administrator's Guide Version Version 10.1 416 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 4 | Configure the cerficate profile for secure client communicaon. You can configure this
profile on each client Log Collector individually or you can push the configuraon from
Panorama™ to managed Log Collectors.
If you are using SCEP for the client cerficate, configure a SCEP profile instead of a
cerficate profile.
STEP 6 | Aer deploying custom cerficates on all Log Collectors, enforce custom-cerficate
authencaon.
1. Select Panorama > Collector Groups and select the Collector Group.
2. On the General tab, Enable secure inter LC Communicaon.
If you enable secure inter LC communicaon and your Collector Group includes a local
Log Collector, a link should appear that stang that the Log Collector on local Panorama
is using the secure client configuraon from Panorama > Secure Communicaon
Sengs. You can click this link to open the Secure Communicaon Sengs dialog and
configure the secure server and secure client sengs for the Local Log Collector from
there.
3. Click OK.
4. Commit your changes.
Panorama Administrator's Guide Version Version 10.1 417 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
client cerficate Subject or Subject Alt Name. If the Subject or Subject Alt Name
presented with the client cerficate does not match an idenfier in the authorizaon list,
authencaon is denied.
1. Add an Authorizaon List.
2. Select the Subject or Subject Alt Name configured in the cerficate profile as the
Idenfier type.
3. Enter the Common Name if the idenfier is Subject or an IP address, hostname, or
email if the idenfier is Subject Alt Name.
4. Click OK.
5. Enable the Check Authorizaon List opon to configure Panorama to enforce the
authorizaon list.
9. Click OK.
10. Commit your changes.
Aer comming these changes, the disconnect wait me countdown begins. When the
wait me ends, Log Collectors in the Collector Group cannot connect without the configured
cerficates.
When a Log Collector is local to an M-600, M-500, or M-200 in Panorama mode, move
it only if the appliance is the passive peer in a high availability (HA) configuraon. HA
synchronizaon applies the configuraons associated with the new Collector Group. Never
move a Log Collector that is local to the acve HA peer.
In any single Collector Group, all the Log Collectors must run on the same Panorama
model: all M-600 appliances, all M-500 appliances, all M-200 appliances, or all Panorama
virtual appliances.
Log redundancy is available only if each Log Collector has the same number of logging
disks. To add disks to a Log Collector, see Increase Storage on the M-Series Appliance.
Panorama Administrator's Guide Version Version 10.1 418 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
To reassign the firewalls, Add the new Log Collector to which they will
forward logs.
3. Click OK twice to save your changes.
4. Select Panorama > Managed Collectors and then select and Delete the Log Collector
you will move.
When you push changes to the Collector Group configuraon, Panorama starts
redistribung logs across the Log Collectors. This process can take hours for each
terabyte of logs. During the redistribuon process, the maximum logging rate is
reduced. In the Panorama > Collector Groups page, the Log Redistribuon State
column indicates the compleon status of the process as a percentage.
STEP 3 | Configure Log Forwarding to Panorama for the new Collector Group you configured.
STEP 4 | Select Commit > Commit and Push to commit your changes to Panorama and push the
changes to device groups, templates, and Collector Groups if you have not already done so.
To temporarily remove the log forwarding preference list on the firewall, you can delete
it using the CLI on the firewall. You must however, remove the assigned firewalls in the
Collector Group configuraon on Panorama. Otherwise, the next me you push changes
to the Collector Group, the firewall will be reconfigured to send logs to the assigned Log
Collector.
STEP 1 | Select Panorama > Collector Groups and edit the Collector Group.
STEP 2 | Select Device Log Forwarding, click the firewall in the Devices list, Modify the Devices list,
clear the check box of the firewall, and click OK three mes.
Panorama Administrator's Guide Version Version 10.1 419 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 3 | Select Commit > Commit and Push and then Commit and Push your changes to Panorama
and the Collector Group from which you removed the firewall.
Panorama Administrator's Guide Version Version 10.1 420 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
If Panorama manages firewalls running soware versions earlier than PAN-OS 7.0, specify
a WildFire® server from which Panorama can gather analysis informaon for WildFire
samples that those firewalls submit. Panorama uses the informaon to complete WildFire
Submissions logs that are missing field values introduced in PAN-OS 7.0. Firewalls running
earlier releases won’t populate those fields. To specify the server, select Panorama > Setup
> WildFire, edit the General Sengs, and enter the WildFire Private Cloud name. The
default is wildfire-public-cloud, which is the WildFire cloud hosted in the United States.
You can also forward firewall logs to external services (such as a syslog server). For details,
see Log Forwarding Opons.
STEP 1 | Add a Device Group for the firewalls that will forward logs.
Panorama requires a device group to push a Log Forwarding profile to firewalls. Create a new
device group or assign the firewalls to an exisng device group.
STEP 2 | Add a Template for the firewalls that will forward logs.
Panorama requires a template to push log sengs to firewalls. Create a new template or assign
the firewalls to an exisng template.
Panorama Administrator's Guide Version Version 10.1 421 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 4 | Assign the Log Forwarding profile to policy rules and network zones.
Security, Authencaon, and DoS Protecon rules support log forwarding. In this example, you
assign the profile to a Security rule.
Perform the following steps for each rule that will trigger log forwarding:
1. Select the rulebase (for example, Policies > Security > Pre Rules), select the Device
Group of the firewalls that will forward logs, and edit the rule.
2. Select Acons and select the Log Forwarding profile you created.
3. Set the Profile Type to Profiles or Group, and then select the security profiles or Group
Profile required to trigger log generaon and forwarding for:
• Threat logs—Traffic must match any security profile assigned to the rule.
• WildFire logs—Traffic must match a WildFire Analysis profile assigned to the rule.
4. For Traffic logs, select Log At Session Start and/or Log At Session End.
5. Click OK to save the rule.
Panorama Administrator's Guide Version Version 10.1 422 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 5 | Configure the desnaons for System logs, Configuraon logs, User-ID™ logs, and HIP
Match logs.
Panorama generates Correlaon logs based on the firewall logs it receives, rather than
aggregang Correlaon logs from firewalls.
1. Select Device > Log Sengs and select the Template of the firewalls that will forward
logs.
2. For each log type that the firewall will forward, see step Add one or more match list
profiles.
STEP 6 | (PA-7000 Series firewalls only) Configure a log card interface to perform log forwarding.
When you configure a data port on one of the PA-7000 Series Network Processing Cards
(NPCs) as a Log Card interface, the firewall will automacally begin using this interface to
forward logs to the logging desnaons you configure and forward files for WildFire analysis.
Panorama Administrator's Guide Version Version 10.1 423 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Make sure that the interface you configure can reach the log forwarding desnaons and the
WildFire cloud, WildFire appliance, or both.
Because PA-7000 Series firewall can now forward logs to Panorama, Panorama no
longer treats the PA-7000 Series firewalls it manages as Log Collectors. If you have
not configured the PA-7000 Series firewalls to forward logs to Panorama, all logs a
managed PA-7000 Series firewall generates are only viewable from the local firewall
and not from Panorama. If you do not yet have a log forwarding infrastructure that is
capable of handling the logging rate and volume from the PA-7000 Series firewalls,
starng with PAN-OS 8.0.8 you can enable Panorama to directly query PA-7000
Series firewalls when monitoring logs. To use this funconality, both Panorama and the
PA-7000 Series firewalls must be running PAN-OS 8.0.8 or later. Enable Panorama to
directly query PA-7000 Series firewalls by entering the following command from the
Panorama CLI:
Aer running this command, you will be able to view logs for managed PA-7000 Series
firewalls on the Panorama Monitor tab. Addionally, as with all managed devices, you
can also generate reports that include PA-7000 Series log data by selecng Remote
Device Data as the Data Source. If you later decide to enable the PA-7000 Series
firewalls to forward logs to Panorama, you must first disable this opon using the
debug reportd send-request-to-7k no command.
1. Select Network > Interfaces > Ethernet, select the Template of the firewalls that will
forward logs, and Add Interface.
2. Select the Slot and Interface Name.
3. Set the Interface Type to Log Card.
4. Enter the IP Address, Default Gateway, and (for IPv4 only) Netmask.
5. Select Advanced and specify the Link Speed, Link Duplex, and Link State.
These fields default to auto, which specifies that the firewall automacally
determines the values based on the connecon. However, the minimum
recommended Link Speed for any connecon is 1000 (Mbps).
6. Click OK to save your changes.
If you will forward logs to a Panorama virtual appliance in Legacy mode, you can skip
this step.
1. For each Log Collector that will receive logs, Configure a Managed Collector.
2. Configure a Collector Group to assign firewalls to specific Log Collectors for log
forwarding.
Panorama Administrator's Guide Version Version 10.1 424 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
3. Commit and Push your changes to Panorama and push the changes to the device groups,
templates, and Collector Groups.
4. Verify Log Forwarding to Panorama to confirm that your configuraon is successful.
To change the log forwarding mode that the firewalls use to send logs to
Panorama, you can Modify Log Forwarding and Buffering Defaults. You can
also Manage Storage Quotas and Expiraon Periods for Logs and Reports.
Panorama Administrator's Guide Version Version 10.1 425 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 426 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
You can only on a single Ethernet interface on the local Log Collector.
You can only on a single Ethernet interface on the Dedicated Log Collector.
Panorama Administrator's Guide Version Version 10.1 427 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
• Configure an Ethernet interface on the local Log Collector or Dedicated Log Collector from
the Panorama CLI.
To successfully configure syslog forwarding over an Ethernet interface from the CLI, you
must first disable syslog forwarding on the management interface and then enable syslog
forwarding on the Ethernet interface from the CLI; Panorama does not automacally disable
syslog forwarding over the management interface you enable syslog forwarding on an
Panorama Administrator's Guide Version Version 10.1 428 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Ethernet interface from the CLI so syslog forwarding connues over the management
interface if you enable it on both the management and Ethernet interfaces.
1. Log in to the Panorama CLI
2. Disable syslog forwarding on the management interface:
admin@Panorama> configure
admin@Panorama> configure
admin@Panorama> commit
Panorama Administrator's Guide Version Version 10.1 429 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 430 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 2 | If you configured Log Collectors, verify that each firewall has a log forwarding preference list.
If the Collector Group has only one Log Collector, the output will look something like this:
Forward to all: No
Log collector Preference List
Serial Number: 003001000024
IP Address: 10.2.133.48
IPV6 Address: unknown
For successful forwarding, the output indicates that the log forwarding agent is acve.
• For a Panorama virtual appliance, the agent is Panorama.
• For an M-Series appliance, the agent is a LogCollector.
• For the Cortex Data Lake, the agent is Log CollectionService.. And the
Panorama Administrator's Guide Version Version 10.1 431 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 4 | View the average logging rate. The displayed rate will be the average logs/second for the last
five minutes.
• If Log Collectors receive the logs, access the Panorama web interface, select Panorama >
Managed Collectors and click the Stascs link in the far-right column.
• If a Panorama virtual appliance in Legacy mode receives the logs, access the Panorama CLI
and run the following command: debug log-collector log-collection-stats
show incoming-logs
Panorama Administrator's Guide Version Version 10.1 432 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
(Best Pracce) Buffered Log Allows each managed firewall to buffer logs and send the logs
Forwarding from Device at 30-second intervals to Panorama (not user configurable).
Default: Enabled Buffered log forwarding is very valuable when the firewall loses
connecvity to Panorama. The firewall buffers log entries to its
local hard disk and keeps a pointer to record the last log entry
that was sent to Panorama. When connecvity is restored the
firewall resumes forwarding logs from where it le off.
The disk space available for buffering depends on the log
storage quota for the firewall model and the volume of logs
that are pending roll over. If the firewall was disconnected for
a long me and the last log forwarded was rolled over, all the
logs from its local hard disk will be forwarded to Panorama on
reconnecon. If the available space on the local hard disk of
the firewall is consumed, the oldest entries are deleted to allow
logging of new events.
Live Mode Log Forwarding In live mode, the managed firewall sends every log transacon
from Device to Panorama at the same me as it records it on the firewall.
This opon is enabled when
the check box for Buffered
Log Forwarding from Device
is cleared.
• Define log forwarding preference on a Panorama virtual appliance in Legacy mode that is
deployed in a high availability (HA) configuraon:
• When logging to a virtual disk, enable logging to the local disk on the primary Panorama
peer only. By default, both Panorama peers in the HA configuraon receive logs.
For the 5200 and 7000 series firewalls, only the acve peer receive logs.
• When logging to an NFS (ESXi server only), enable the firewalls to send only newly
generated logs to a secondary Panorama peer, which is promoted to primary, aer a failover.
Panorama Administrator's Guide Version Version 10.1 433 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Only Acve Primary Logs to Panorama virtual Allows you to configure only the
Local Disk appliance in Legacy mode primary Panorama peer to save
that is logging to a virtual logs to the local disk.
Default: Disabled
disk and is deployed in an
HA configuraon.
Get Only New Logs on Panorama virtual With NFS logging, when you
Convert to Primary appliance in Legacy mode have a pair of Panorama servers
that is mounted to a configured in a high availability
Default: Disabled
Network File System configuraon, only the primary
(NFS) datastore, runs on Panorama peer mounts the NFS
a VMware ESXi server, datastore. Therefore, the firewalls
and is deployed in an HA can only send logs to the primary
configuraon Panorama peer, which can write
to the NFS datastore.
When an HA failover occurs,
the Get Only New Logs on
Convert to Primary opon allows
an administrator to configure
the managed firewalls to send
only newly generated logs to
Panorama. This event is triggered
when the priority of the acve-
secondary Panorama is promoted
to primary and it can begin
logging to the NFS. This behavior
is typically enabled to prevent
the firewalls from sending a large
volume of buffered logs when
connecvity to Panorama is
restored aer a significant period
of me.
Panorama Administrator's Guide Version Version 10.1 434 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
To forward logs to external services, start by configuring the firewalls to forward logs to Panorama.
Then you must configure the server profiles that define how Panorama and Log Collectors connect
to the services. Lastly, you assign the server profiles to the log sengs of Panorama and to
Collector Groups.
STEP 1 | Configure the firewalls to forward logs to Panorama.
Configure Log Forwarding to Panorama.
STEP 2 | Configure a server profile for each external service that will receive log informaon.
1. Select Panorama > Server Profiles and select the type of server that will receive the log
data: SNMP Trap, Syslog, Email, or HTTP.
2. Configure the server profile:
• Configure an SNMP Trap server profile. For details on how SNMP works for Panorama
and Log Collectors, refer to SNMP Support.
• Configure a Syslog server profile. If the syslog server requires client authencaon,
use the Panorama > Cerficate Management > Cerficates page to create a
cerficate for securing syslog communicaon over SSL.
• Configure an Email server profile.
• Configure an HTTP server profile.
Panorama Administrator's Guide Version Version 10.1 435 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 4 | Configure desnaons for firewall logs that Log Collectors receive.
Each Collector Group can forward logs to different desnaons. If the Log Collectors
are local to a high availability (HA) pair of Panorama management servers, you must
log into each HA peer to configure log forwarding for its Collector Group.
1. Select Panorama > Collector Groups and edit the Collector Group that receives the
firewall logs.
2. (Oponal, SNMP trap forwarding only) Select Monitoring and configure the SNMP
sengs.
3. Select Collector Log Forwarding and Add configured match list profiles as necessary.
4. Click OK to save your changes to the Collector Group.
STEP 5 | (Syslog forwarding only) If the syslog server requires client authencaon and the
firewalls forward logs to Dedicated Log Collectors, assign a cerficate that secures syslog
communicaon over SSL.
Perform the following steps for each Dedicated Log Collector:
1. Select Panorama > Managed Collectors and edit the Log Collector.
2. Select the Cerficate for Secure Syslog and click OK.
STEP 6 | (SNMP trap forwarding only) Enable your SNMP manager to interpret traps.
Load the Supported MIBs and, if necessary, compile them. For the specific steps, refer to the
documentaon of your SNMP manager.
Panorama Administrator's Guide Version Version 10.1 436 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 437 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
The deployments in these topics all describe Panorama in a high availability (HA)
configuraon. Palo Alto Networks recommends HA because it enables automac recovery
(in case of server failure) of components that are not saved as part of configuraon
backups. In HA deployments, the Panorama management server only supports an acve/
passive configuraon.
If you will assign more than one Log Collector to a Collector Group, see Caveats for a
Collector Group with Mulple Log Collectors to understand the requirements, risks, and
recommended migaons.
Panorama Administrator's Guide Version Version 10.1 438 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Perform the following steps to deploy Panorama with Dedicated Log Collectors. Skip any steps
you have already performed (for example, the inial setup).
Panorama Administrator's Guide Version Version 10.1 439 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 1 | Perform the inial setup of the Panorama management server (virtual appliances or M-Series
appliances) and the Dedicated Log Collectors.
For each M-Series appliance:
1. Rack mount the M-Series appliance. Refer to the M-Series Hardware Reference Guide for
instrucons.
2. Perform Inial Configuraon of the M-Series Appliance.
Palo Alto Networks recommends reserving the management (MGT) interface for
administrave access to Panorama and dedicang separate M-Series Appliance
Interfaces to other Panorama services.
3. Configure each array. This task is required to make the RAID disks available for logging.
Oponally, you can add disks to Increase Storage on the M-Series Appliance.
4. Register Panorama and Install Licenses.
5. Install Content and Soware Updates for Panorama.
For each virtual appliance (if any):
1. Install the Panorama Virtual Appliance.
2. Perform Inial Configuraon of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Soware Updates for Panorama.
For the Panorama management server (virtual appliance or M-Series appliance), you must also
Set Up HA on Panorama.
Panorama Administrator's Guide Version Version 10.1 440 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 2 | Switch from Panorama mode to Log Collector mode on each Panorama management server
that will be a Dedicated Log Collector.
Switching the mode of an M-Series or Panorama virtual appliance deletes any exisng
log data and deletes all configuraons except the management access sengs. Aer
the switch, the M-Series or Panorama virtual appliance retains CLI access but loses
web interface access.
4. Enter Y to confirm the mode change. The Panorama management server reboots. If
the reboot process terminates your terminal emulaon soware session, reconnect to
Panorama to see the Panorama login prompt.
If you see a CMS Login prompt, this means the Log Collector has not finished
reboong. Press Enter at the prompt without typing a username or password.
5. Log back in to the CLI.
6. Verify that the switch to Log Collector mode succeeded:
system-mode: logger
STEP 3 | Enable connecvity between each Log Collector and the Panorama management server.
This step is required before you can enable logging disks on the Log Collectors.
Enter the following commands at the CLI of each Log Collector. <IPaddress1> is for the MGT
interface of the acve Panorama and <IPaddress2> is for the MGT interface of the passive
Panorama.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
Panorama Administrator's Guide Version Version 10.1 441 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
# exit
If you configure a Public IP Address for the interface, Log Collectors in the
Collector Group always use the public IP address for communicaon within
the Collector Group. To ensure Log Collectors in a Collector use the private IP
address to communicate, do not configure a public IP address.
Panorama Administrator's Guide Version Version 10.1 442 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
connected to Panorama. You might have to wait a few minutes before the page displays
the updated connecon status.
At this point, the Configuraon Status column displays Out of Sync and the Run
Time Status column displays disconnected. The status will change to In Sync and
connected aer you configure a Collector Group (Step 9).
STEP 7 | (Recommended) Configure the Ethernet1, Ethernet2, Ethernet3, Ethernet4, and Ethernet5
interfaces if the Log Collector will use them for Device Log Collecon (receiving logs from
firewalls) and Collector Group Communicaon.
By default, the Log Collector uses the MGT interface for log collecon and Collector Group
communicaon. Assigning other interfaces to these funcons enables you to reserve the MGT
interface for management traffic. In an environment with heavy log traffic, consider using the
10Gbps interfaces (Ethernet4 and Ethernet5) on the M-500 appliance for log collecon and
Collector Group communicaon. To load balance the logging traffic across interfaces, you can
enable Device Log Collecon on mulple interfaces.
Use the web interface of the primary Panorama management server peer to perform these
steps for each Log Collector:
1. Select Panorama > Managed Collectors, edit the Log Collector, and select Interfaces.
2. Perform the following steps for each interface:
1. Click the name of the interface to edit it.
2. Select <interface-name> to enable the interface.
3. Complete one or both of the following field sets based on the IP protocols of your
network:
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Select the Device Management Services that the interface supports:
Device Log Collecon—You can assign one or more interfaces.
Collector Group Communicaon—You can assign only one interface.
5. Click OK to save your changes to the interface.
3. Click OK to save your changes to the Log Collector.
4. Select Commit > Commit to Panorama and Commit your changes to the Panorama
configuraon.
Panorama Administrator's Guide Version Version 10.1 443 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
In any single Collector Group, all the Log Collectors must run on the same
Panorama model: all M-600 appliances, all M-500 appliances, all M-200
appliances, or all Panorama virtual appliances.
4. (Best Pracce) Enable log redundancy across collectors if you add mulple Log
Collectors to a single Collector group. This opon requires each Log Collector to have the
same number of logging disks.
5. (Oponal) Select Monitoring and configure the sengs if you will use SNMP to monitor
Log Collector stascs and traps.
6. Select Device Log Forwarding and configure the Log Forwarding Preferences list. This list
defines which firewalls forward logs to which Log Collectors. Assign firewalls according
to the number of Log Collectors in this Collector Group:
• Single—Assign the firewalls that will forward logs to that Log Collector, as illustrated in
Single Dedicated Log Collector Per Collector Group.
• Mulple—Assign each firewall to both Log Collectors for redundancy. When you
configure the preferences, make Log Collector 1 the first priority for half the firewalls
and make Log Collector 2 the first priority for the other half, as illustrated in Mulple
Dedicated Log Collectors Per Collector Group.
7. Click OK to save your changes to the Collector Group.
8. Select Commit > Commit and Push and then Commit and Push your changes to
Panorama and to the Collector Groups you added.
9. Select Panorama > Managed Collectors to verify that the Log Collector configuraon is
synchronized with Panorama.
The Configuraon Status column should display In Sync and the Run Time Status column
should display connected.
Panorama Administrator's Guide Version Version 10.1 444 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
If you will assign more than one Log Collector to a Collector Group, see Caveats for a
Collector Group with Mulple Log Collectors to understand the requirements, risks, and
recommended migaons.
Aer implemenng this deployment, if the logging rate increases beyond 10,000 logs per
second, Palo Alto Networks recommends that you add Dedicated Log Collectors (M-Series
appliances in Log Collector mode) as described in Deploy Panorama with Dedicated
Log Collectors. Such an expansion might require reassigning firewalls from the local Log
Collectors to Dedicated Log Collectors.
Panorama Administrator's Guide Version Version 10.1 445 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Perform the following steps to deploy Panorama with local Log Collectors. Skip any steps you have
already performed (for example, the inial setup).
STEP 1 | Perform the inial setup of each M-Series appliance.
1. Rack mount the M-Series appliance. Refer to the M-Series Hardware Reference Guides
for instrucons.
2. Perform Inial Configuraon of the M-Series Appliance.
Palo Alto Networks recommends reserving the management (MGT) interface for
administrave access to Panorama and dedicang separate M-Series Appliance
Interfaces to other Panorama services.
3. Configure each array. This task is required to make the RAID disks available for logging.
Oponally, you can add disks to Increase Storage on the M-Series Appliance.
4. Register Panorama and Install Licenses.
5. Install Content and Soware Updates for Panorama.
6. Set Up HA on Panorama.
Panorama Administrator's Guide Version Version 10.1 446 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 2 | Perform the following steps to prepare Panorama for log collecon.
1. Connect to the primary Panorama in one of the following ways:
• Aach a serial cable from your computer to the Console port on the primary
Panorama. Then use terminal emulaon soware (9600-8-N-1) to connect.
• Use terminal emulaon soware such as PuTTY to open an SSH session to the IP
address that you specified for the MGT interface of the primary Panorama during
inial configuraon.
2. Log in to the CLI when prompted. Use the default admin account and the password that
you specified during inial configuraon.
3. Enable the primary Panorama to connect to the secondary Panorama by entering the
following command, where <IPaddress2> represents the MGT interface of the secondary
Panorama:
> configure
# set deviceconfig system panorama-server <IPaddress2>
# commit
> configure
# set deviceconfig system panorama-server <IPaddress1>
# commit
# exit
6. In the CLI of the secondary Panorama, enter the following command to display the serial
number, and then record it:
You need the serial number to add the Log Collector of the secondary Panorama as a
managed collector to the primary Panorama.
STEP 3 | Edit the Log Collector that is local to the primary Panorama.
Use the web interface of the primary Panorama to perform these steps:
1. Select Panorama > Managed Collectors and select the default (local) Log Collector.
2. Select Disks and Add each logging disk pair.
3. Click OK to save your changes.
Panorama Administrator's Guide Version Version 10.1 447 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 4 | Configure the Log Collector that is local to the secondary Panorama.
Panorama treats this Log Collector as remote because it’s not local to the primary
Panorama. Therefore you must manually add it on the primary Panorama.
Use the web interface of the primary Panorama to Configure a Managed Collector:
1. Select Panorama > Managed Collectors and Add the Log Collector.
2. Enter the serial number (Collector S/N) you recorded for the Log Collector of the
secondary Panorama.
3. Enter the IP address or FQDN of the primary and secondary Panorama HA peers in the
Panorama Server IP field and Panorama Server IP 2 field respecvely.
Both of these fields are required.
4. Select Interfaces and configure each interface that the Log Collector will use. The
Management interface is required. Perform the following steps for each interface:
1. Click the interface name.
2. Configure one or both of the following field sets based on the IP protocols of your
network.
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
3. (Management interface only) Select SNMP if you will use an SNMP manager to
monitor Log Collector stascs.
Using SNMP requires addional steps besides configuring the Log Collector (see
Monitor Panorama and Log Collector Stascs Using SNMP).
4. Click OK to save your changes to the interface.
5. Click OK to save your changes to the Log Collector.
6. Select Commit > Commit to Panorama and Commit your changes.
This step is required before you can enable logging disks.
7. Edit the Log Collector by clicking its name.
8. Select Disks, Add each RAID disk pair, and click OK.
9. Select Commit > Commit to Panorama and Commit your changes.
STEP 6 | Edit the default Collector Group that is predefined on the primary Panorama.
Use the web interface of the primary Panorama to Configure a Collector Group:
1. Select Panorama > Collector Groups and edit the default Collector Group.
2. Add the local Log Collector of the secondary Panorama to the Collector Group Members
list if you are adding mulple Log Collectors to a single Collector group. By default, the
Panorama Administrator's Guide Version Version 10.1 448 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
list displays the local Log Collector of the primary Panorama because it is pre-assigned to
the default Collector Group.
In any single Collector Group, all the Log Collectors must run on the same
Panorama model: all M-600 appliances, all M-500 appliances, all M-200
appliances, or all Panorama virtual appliances.
3. (Best Pracce) Enable log redundancy across collectors if you add mulple Log
Collectors to a single Collector group. This opon requires each Log Collector to have the
same number of logging disks.
4. (Oponal) Select Monitoring and configure the sengs if you will use SNMP to monitor
Log Collector stascs and traps.
5. Select Device Log Forwarding and configure the Log Forwarding Preferences list. This list
defines which firewalls forward logs to which Log Collectors. Assign firewalls according
to the number of Log Collectors in this Collector Group:
• Single—Assign the firewalls that will forward logs to the local Log Collector of the
primary Panorama, as illustrated in Single Local Log Collector Per Collector Group.
• Mulple—Assign each firewall to both Log Collectors for redundancy. When you
configure the preferences, make Log Collector 1 the first priority for half the firewalls
and make Log Collector 2 the first priority for the other half, as illustrated in Mulple
Local Log Collectors Per Collector Group.
6. Click OK to save your changes.
STEP 7 | Configure a Collector Group that contains the Log Collector of the secondary Panorama.
Required if each Collector Group has only one Log Collector.
Use the web interface of the primary Panorama to Configure a Collector Group:
1. Select Panorama > Collector Groups and Add the Collector Group.
2. Enter a Name to idenfy the Collector Group.
3. Add the local Log Collector of the secondary Panorama to the Collector Group Members
list.
4. (Oponal) Select Monitoring and configure the sengs if you will use an SNMP manager
to monitor Log Collector stascs and traps.
5. Select Device Log Forwarding and Add an entry to the Log Forwarding Preferences list:
1. Modify the Devices list, select the firewalls that will forward logs to the local Log
Collector of the secondary Panorama (see Single Local Log Collector Per Collector
Group), and click OK.
2. Add the local Log Collector of the secondary Panorama to the Collectors list and click
OK.
6. Click OK to save your changes.
STEP 8 | Commit and push your changes to the Panorama configuraon and the Collector Groups.
In the web interface of the primary Panorama, select Commit > Commit and Push and then
Commit and Push your changes to Panorama and the Collector Groups you added.
Panorama Administrator's Guide Version Version 10.1 449 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 9 | Manually fail over so that the secondary Panorama becomes acve.
Use the web interface of the primary Panorama to perform the following steps:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operaonal Commands secon.
STEP 10 | On the secondary Panorama, configure the network sengs of the Log Collector that is local
to the primary Panorama.
Use the web interface of the secondary Panorama to perform the following steps:
1. In the Panorama web interface, select Panorama > Managed Collectors and select the
Log Collector that is local to the primary Panorama.
2. Enter the IP address or FQDN of the primary and secondary Panorama HA peers in the
Panorama Server IP field and Panorama Server IP 2 field respecvely.
Both of these fields are required.
3. Select Interfaces, click Management, and complete one or both of the following field
sets (based on the IP protocols of your network) with the MGT interface values of the
primary Panorama:
• IPv4—IP Address, Netmask, and Default Gateway
• IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Click OK to save your changes.
5. Select Commit > Commit and Push and then Commit and Push your changes to
Panorama and the Collector Groups you added.
STEP 11 | Manually fail back so that the primary Panorama becomes acve.
Use the web interface of the secondary Panorama to perform the following steps:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operaonal Commands secon.
You can assign separate external server profiles to each Panorama HA peer. For
example, you might want each peer to forward logs to a different syslog server.
To make each Panorama peer forward logs to different external services, log in to
the web interface of each peer, select Panorama > Collector Groups, select the
Collector Group, select Collector Log Forwarding, assign the server profiles, and
click OK.
Panorama Administrator's Guide Version Version 10.1 450 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
If you will assign more than one Log Collector to a Collector Group, see Caveats for a
Collector Group with Mulple Log Collectors to understand the requirements, risks, and
recommended migaons.
Panorama Administrator's Guide Version Version 10.1 451 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Perform the following steps to deploy Panorama with local Log Collectors. Skip any steps you have
already performed (such as the inial setup).
STEP 1 | Perform the inial setup of each Panorama virtual appliance.
1. Install the Panorama Virtual Appliance. You must configure the following resources to
ensure the virtual appliance starts in Panorama mode:
• System disk with exactly 81GB of storage.
• CPUs and memory that are sufficient for the quanty of logs that Panorama will
receive and store.
• Virtual logging disk with 2–24TB of storage.
Panorama automacally divides the new disk into 2TB parons, each of which
will funcon as a separate virtual disk.
2. Perform Inial Configuraon of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Soware Updates for Panorama.
Panorama Administrator's Guide Version Version 10.1 452 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 453 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama treats this Log Collector as remote because it does not run locally on the
primary Panorama.
Panorama Administrator's Guide Version Version 10.1 454 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
In any single Collector Group, all the Log Collectors must run on the same
Panorama model: all M-600 appliances, all M-500 appliances, all M-200
appliances, or all Panorama virtual appliances.
3. (Best Pracce) Enable log redundancy across collectors if you add mulple Log
Collectors to a single Collector group. This opon requires each Log Collector to have the
same number of virtual logging disks.
Enabling redundancy doubles the amount of logs and log processing traffic in a
Collector Group. If necessary, Expand Log Storage Capacity on the Panorama
Virtual Appliance.
4. Select Device Log Forwarding and configure the Log Forwarding Preferences list. This list
defines which firewalls forward logs to which Log Collectors. Assign firewalls according
to the number of Log Collectors in this Collector Group:
• Single—Assign the firewalls that will forward logs to the Log Collector that is local to
the primary Panorama, as illustrated in Single Log Collector Per Collector Group.
• Mulple—Assign each firewall to both Log Collectors for redundancy. When you
configure the preference list, make Log Collector 1 the first priority for half the
firewalls and make Log Collector 2 the first priority for the other half, as illustrated in
Mulple Log Collectors Per Collector Group.
5. Click OK to save your changes.
6. Select Commit > Commit and Push and then Commit and Push your changes to
Panorama and the Collector Groups you added.
STEP 7 | Trigger failover on the primary Panorama so that the secondary Panorama becomes acve.
On the primary Panorama:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operaonal Commands secon.
Panorama Administrator's Guide Version Version 10.1 455 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
STEP 8 | Configure the connecon from the secondary Panorama to the Log Collector that is local to
the primary Panorama.
On the secondary Panorama:
1. In the Panorama web interface, select Panorama > Managed Collectors and select the
Log Collector that is local to the primary Panorama.
2. Enter the IP address or FQDN of the primary and secondary Panorama HA peers in the
Panorama Server IP field and Panorama Server IP 2 field respecvely.
Both of these fields are required.
3. Click OK to save your changes.
4. Select Commit > Commit and Push and then Commit and Push your changes to
Panorama and the Collector Groups.
STEP 9 | Trigger fail-back on the secondary Panorama so that the primary Panorama becomes acve.
On the secondary Panorama:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operaonal Commands secon.
If the logging rate increases beyond 10,000 logs per second, it is recommended that you
Deploy Panorama with Dedicated Log Collectors.
Panorama Administrator's Guide Version Version 10.1 456 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Figure 22: Panorama Virtual Appliances in Legacy Mode with Local Log Collection
Perform the following steps to deploy Panorama virtual appliances with local log collecon. Skip
any steps you have already performed (for example, the inial setup).
STEP 1 | Perform the inial setup of each Panorama virtual appliance.
1. Install the Panorama Virtual Appliance. To ensure the virtual appliance starts in Panorama
mode, do not add a virtual logging disk during installaon.
By default, Panorama uses an 11GB paron on its system disk for log storage.
If you want more storage, you can add a dedicated virtual logging disk of up to
8TB aer the installaon.
2. Perform Inial Configuraon of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Soware Updates for Panorama.
STEP 3 | Perform the following steps to prepare Panorama for log collecon.
1. Add a Firewall as a Managed Device for each one that will forward logs to Panorama.
2. Configure Log Forwarding to Panorama.
Panorama Administrator's Guide Version Version 10.1 457 ©2022 Palo Alto Networks, Inc.
Manage Log Collecon
Panorama Administrator's Guide Version Version 10.1 458 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
You can manage up to 200 standalone WildFire appliances and WildFire appliance
cluster nodes centrally using a Panorama M-Series or virtual appliance. Compared
to managing WildFire appliances and appliance clusters individually using the local
CLI, using Panorama provides centralized management and monitoring of mulple
appliances and appliance clusters. Centralized management enables you to push
common configuraons, configuraon updates, and soware upgrades to all or
a subset of the managed WildFire appliances, which makes it easy to ensure that
WildFire appliances and appliance clusters have consistent configuraons.
When you use Panorama to manage WildFire appliance clusters, Panorama must run
an equal or later version than the WildFire appliances being managed.
459
Manage WildFire Appliances
(PAN-OS 10.1 only) For WildFire appliances running a PAN-OS 10.1 release, Panorama
running PAN-OS 10.1.3 or later release supports onboarding a WildFire appliance running
PAN-OS 10.1.3 or later release only. You cannot add a WildFire appliance running PAN-
OS 10.1.2 or earlier PAN-OS 10.1 release to Panorama management if Panorama is
running PAN-OS 10.1.3 or later release.
Panorama supports onboarding WildFire appliances running the following releases:
• Panorama running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release— WildFire
appliances running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release, and WildFire
appliances running PAN-OS 10.0 or earlier PAN-OS release.
• Panorama running PAN-OS 10.1.3 or later release— WildFire appliances running PAN-
OS 10.1.3 or later release, and WildFire appliances running PAN-OS 10.0 or earlier
PAN-OS release.
There is no impact to WildFire appliances already managed by Panorama on upgrade to
PAN-OS 10.1.
STEP 1 | Using the local CLI, verify that each WildFire appliance that you want to manage on a
Panorama management server is running PAN-OS 8.1.0 or a later release.
Panorama Administrator's Guide Version Version 10.1 460 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 2 | On each Panorama appliance you want to use to manage WildFire appliances, verify that the
Panorama management server is running PAN-OS 8.1.0 or a later release.
Dashboard > General Informaon > Soware Version displays the running soware version.
STEP 3 | If you aren’t sure whether a WildFire appliance belongs to a WildFire appliance cluster or is
a standalone appliance on the local WildFire appliance CLI, check the Node mode to ensure
that the status is stand_alone and check the Applicationstatus to ensure that the
global-db-service and global-queue-service indicate ReadyStandalone.
STEP 4 | If the WildFire appliances you want to manage with Panorama are new, check Get
Started with WildFire to ensure that you complete basic steps such as confirming your
WildFire license is acve, enabling logging, connecng firewalls to WildFire appliances, and
configuring basic WildFire features.
Panorama Administrator's Guide Version Version 10.1 461 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 6 | On the local CLI of each WildFire appliance the Panorama server will manage, configure the
IP address of the Panorama server and add the device registraon authencaon key.
Before you register standalone WildFire appliances to a Panorama appliance, you must first
configure the Panorama IP address or FQDN and add the device registraon authencaon
key on each WildFire appliance. This enables each WildFire appliance to securely connect
Panorama Administrator's Guide Version Version 10.1 462 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
to the Panorama appliance that manages the WildFire appliance. The device registraon
authencaon key is used only for the inial connecon to the Panorama server.
1. Configure the IP address or FQDN of the management interface for the primary
Panorama server.
2. If you use a backup Panorama appliance for high availability (recommended), configure
the IP address or FQDN of the management interface for the backup Panorama server:
Several local CLI commands display the WildFire appliance serial number, including show
cluster membership.
3. Click OK.
If it is available, informaon about configuraon that is already commied on the
WildFire appliances displays, such as IP address and soware version.
STEP 8 | (Oponal) Import WildFire appliance configuraons into the Panorama appliance.
1. Select the appliances that have configuraons you want to import from the list of
managed WildFire appliances.
2. Import Config.
3. Select Yes.
Imporng configuraons updates the displayed informaon and makes the imported
configuraons part of the Panorama appliance candidate configuraon.
4. Commit to Panorama to make the imported WildFire appliance configuraons part of the
Panorama running configuraon.
Panorama Administrator's Guide Version Version 10.1 463 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 10 | Commit the configuraon on the Panorama appliance and push it to the appliance or to
mulple appliances.
1. Commit and Push.
2. If there are configuraons on the Panorama appliance that you do not want to push,
Edit Selecons to choose the appliances to which you want to push configuraons. The
pushed configuraon overwrites the running configuraon on a WildFire appliance.
Panorama Administrator's Guide Version Version 10.1 464 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Many sengs are pre-populated with either defaults, informaon from previously exisng
sengs on the WildFire appliance, or the sengs you configured when adding the
WildFire appliance to Panorama.
STEP 3 | (Oponal) Configure an authencaon profile to define the authencaon service that
validates the login credenals of the administrators who access the WildFire appliance CLI.
Panorama Administrator's Guide Version Version 10.1 465 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
You must configure the administrave account with Superuser admin role privileges to
successfully configure authencaon for the WildFire appliance.
Panorama Administrator's Guide Version Version 10.1 466 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the WildFire appliancer. These
administrators are specific to the WildFire appliance for which they are created and
you manage these administrators from this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the WildFire appliance.
5. Click OK to save the WildFire appliance authencaon configuraon.
STEP 6 | Commit and then Commit and Push your configuraon changes.
STEP 7 | Access the WildFire appliance CLI to verify you can successfully access the WildFire
appliance using the local admin user.
Panorama Administrator's Guide Version Version 10.1 467 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
You can Import the Palo Alto Networks RADIUS diconary into RADIUS server to define
the authencaon aributes needed for communicaon between Panorama and the
RADIUS server.
Panorama Administrator's Guide Version Version 10.1 468 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Select CHAP if the RADIUS server supports that protocol; it is more secure
than PAP.
5. Add each RADIUS server and enter the following:
1. Name to idenfy the server.
2. RADIUS Server IP address or FQDN.
3. Secret/Confirm Secret (a key to encrypt usernames and passwords).
4. Server Port for authencaon requests (default is 1812).
6. Click OK to save the server profile.
2. Assign the RADIUS server profile to an authencaon profile.
The authencaon profile defines authencaon sengs that are common to a set of
administrators.
1. Select Panorama > Authencaon Profile and Add a profile.
2. Enter a Name to idenfy the authencaon profile.
3. Set the Type to RADIUS.
4. Select the Server Profile you configured.
5. Select Retrieve user group from RADIUS to collect user group informaon from VSAs
defined on the RADIUS server.
Panorama matches the group informaon against the groups you specify in the Allow
List of the authencaon profile.
6. Select Advanced and, in the Allow List, Add the administrators that are allowed to
authencate with this authencaon profile.
7. Click OK to save the authencaon profile.
Panorama Administrator's Guide Version Version 10.1 469 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 470 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the WildFire appliance. These
administrators are specific to the WildFire appliance for which they are created and
you manage these administrators from this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the WildFire appliance.
5. Click OK to save the WildFire appliance authencaon configuraon.
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Access the WildFire appliance CLI to verify you can successfully access the WildFire
appliance using the local admin user.
Panorama Administrator's Guide Version Version 10.1 471 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 472 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 473 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the WildFire appliancer. These
administrators are specific to the WildFire appliance for which they are created and
you manage these administrators from this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the WildFire appliance.
5. Click OK to save the WildFire appliance authencaon configuraon.
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Access the WildFire appliance CLI to verify you can successfully access the WildFire
appliance using the local admin user.
Panorama Administrator's Guide Version Version 10.1 474 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
1. Select Panorama > Server Profiles > LDAP and Add a server profile.
2. Enter a Profile Name to idenfy the server profile.
3. Add the LDAP servers (up to four). For each server, enter a Name (to idenfy the server),
LDAP Server IP address or FQDN, and server Port (default 389).
If you use an FQDN address object to idenfy the server and you subsequently
change the address, you must commit the change for the new server address to
take effect.
4. Select the server Type.
5. Select the Base DN.
To idenfy the Base DN of your directory, open the Acve Directory Domains and
Trusts Microso Management Console snap-in and use the name of the top-level
domain.
6. Enter the Bind DN and Password to enable the authencaon service to authencate
the firewall.
The Bind DN account must have permission to read the LDAP directory.
7. Enter the Bind Timeout and Search Timeout in seconds (default is 30 for both).
8. Enter the Retry Interval in seconds (default is 60).
9. (Oponal) If you want the endpoint to use SSL or TLS for a more secure connecon with
the directory server, enable the opon to Require SSL/TLS secured connecon (enabled
by default). The protocol that the endpoint uses depends on the server port:
• 389 (default)—TLS (Specifically, the WildFire appliance uses the StartTLS operaon,
which upgrades the inial plaintext connecon to TLS.)
• 636—SSL
• Any other port—The WildFire appliance first aempts to use TLS. If the directory
server doesn’t support TLS, the WildFire appliance falls back to SSL.
10. (Oponal) For addional security, enable to the opon to Verify Server Cerficate
for SSL sessions so that the endpoint verifies the cerficate that the directory server
presents for SSL/TLS connecons. To enable verificaon, you must also enable the
Panorama Administrator's Guide Version Version 10.1 475 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 476 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
• Configure the local administrators.
Configure new administrators unique to the WildFire appliances. These administrators
are specific to the WildFire appliance for which they are created and you manage
these administrators from this table.
1. Add one or more new local administrator.
2. Enter a Name for the local administrator.
3. Assign an Authencaon Profile you previously created.
Panorama Administrator's Guide Version Version 10.1 477 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Access the WildFire appliance CLI to verify you can successfully access the WildFire
appliance using the local admin user.
Panorama Administrator's Guide Version Version 10.1 478 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 2 | Import the CA cerficate to validate the identy of the firewall and the key pair for the
WildFire appliance.
1. Select Panorama > Cerficate Management > Cerficates > Import.
2. Import the CA cerficate and the key pair on Panorama.
STEP 3 | Configure a cerficate profile that includes the root CA and intermediate CA. This cerficate
profile defines how the WildFire appliance and the firewalls authencate mutually.
1. Select Panorama > Cerficate Management > Cerficate Profile.
2. Configure a cerficate profile.
If you configure an intermediate CA as part of the cerficate profile, you must also
include the root CA.
Panorama Administrator's Guide Version Version 10.1 479 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
PAN-OS 8.0 and later releases support only TLS 1.2 and higher so ou must set the max
version to TLS 1.2 or max.
STEP 6 | Import the CA cerficate to validate the cerficate for the WildFire appliance.
1. Log in to the firewall web interface.
2. Import the CA cerficate.
Panorama Administrator's Guide Version Version 10.1 480 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 8 | Configure the cerficate profile for the firewall or Panorama. You can configure this profile on
each client firewall or Panorama appliance individually or you can use a template to push the
configuraon from Panorama to managed firewalls.
1. Select Device > Cerficate Management > Cerficate Profile for firewalls or Panorama >
Cerficate Management > Cerficate Profile for Panorama.
2. Configure a Cerficate Profile.
STEP 10 | Aer deploying custom cerficates on all managed devices, enforce custom-cerficate
authencaon.
1. Log in to Panorama.
2. Select Panorama > Managed WildFire Clusters or Panorama > Managed WildFire
Appliances and select a cluster or appliance.
3. Select Communicaon.
4. Select Custom Cerficate Only.
5. Click OK.
6. Commit your changes.
Aer comming this change, WildFire immediately begins the enforcement of custom
cerficates.
Panorama Administrator's Guide Version Version 10.1 481 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 2 | Configure a cerficate profile that includes the root cerficate authority (CA) and the
intermediate CA. This cerficate profile defines the authencaon between the WildFire
cluster (client) and the Panorama appliance (server).
1. Select Panorama > Cerficate Management > Cerficate Profile.
2. Configure a cerficate profile.
If you configure an intermediate CA as part of the cerficate profile, you must also
include the root CA.
STEP 5 | Configure a unique hostname (DNS name) on each node in the cluster or use a string with
a single wildcard that matches all custom DNS names set on the WildFire appliances in the
cluster.
If using a single-wildcard string, see RFC-6125,Secon 6.4.3 for requirements and limitaons
of wildcard string values. Make sure you understand these requirements and limitaons when
configuring your custom DNS names.
1. Log in to the WildFire CLI on a node.
2. Use the following command to assign a unique custom DNS name to the node.
admin@WF-500> configure
STEP 6 | On Panorama, generate a client cerficate for all nodes in the cluster. Under Cerficate
Aributes, add a hostname entry for each custom DNS name you assigned to the cluster
nodes or add one hostname entry with a one-wildcard string that matches all of the node
hostnames, such as *.example.com; you can do this only if each custom DNS name shares a
common string.
STEP 7 | On Panorama, configure the cerficate profile for the cluster client cerficate.
1. Select Panorama > Cerficate Management > Cerficate Profile for Panorama.
2. Configure a Cerficate Profile.
Panorama Administrator's Guide Version Version 10.1 482 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 8 | Deploy custom cerficates on each node. This cerficate profile must contain the CA
cerficate that signed the Panorama server cerficate.
1. Select Panorama > Managed WildFire Clusters and click on the cluster name.
2. Select Communicaons.
3. Under Secure Client Communicaons, select the Cerficate Type, Cerficate, and
Cerficate Profile.
4. Click OK.
5. Commit your changes.
STEP 2 | Import the CA cerficate to validate the idenfy of the WildFire appliance and the key pair
for Panorama.
1. Select Panorama > Cerficate Management > Cerficates > Import.
2. Import the CA cerficate and the key pair on Panorama.
STEP 3 | Configure a cerficate profile that includes the root CA and intermediate CA. This cerficate
profile defines the authencaon between the WildFire appliance (client) and the Panorama
virtual or M-Series appliance (server).
1. Select Panorama > Cerficate Management > Cerficate Profile.
2. Configure a cerficate profile.
If you configure an intermediate CA as part of the cerficate profile, you must also
include the root CA.
Panorama Administrator's Guide Version Version 10.1 483 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 484 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 10 | Aer deploying custom cerficates on all managed WildFire appliances, enforce custom-
cerficate authencaon.
1. Select Panorama > Setup > Management and Edit the Secure Communicaons Sengs.
2. Allow Custom Cerficate Only.
3. Click OK.
4. Commit your changes.
Aer comming this change, the disconnect wait me begins counng down. When the
wait me ends, Panorama and its managed WildFire appliances cannot connect without the
configured cerficates.
Panorama Administrator's Guide Version Version 10.1 485 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 2 | Select the WildFire appliance or appliances you want to remove from Panorama management
by selecng the checkbox next to each appliance or by clicking in an appliance’s row.
Panorama Administrator's Guide Version Version 10.1 486 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
To create WildFire appliance clusters, you must upgrade all of the WildFire appliances
that you want to place in a cluster to PAN-OS 8.0.1 or later. If you use Panorama to
manage WildFire appliance clusters, Panorama also must run PAN-OS 8.0.1 or later. On
each WildFire appliance that you want to add to a cluster, run show system info |
match version on the WildFire appliance CLI to ensure that the appliance is running
PAN-OS 8.0.1 or later. On each Panorama appliance you use to manage clusters (or
standalone appliances), Dashboard > General Informaon > Soware Version displays
the running soware version.
When your WildFire appliances are available, perform the appropriate tasks:
• Configure a Cluster and Add Nodes on Panorama
• Configure General Cluster Sengs on Panorama
• Configure Authencaon for a WildFire Cluster
• Remove a Cluster from Panorama Management
Removing a node from a cluster using Panorama is not supported. Instead, Remove a
Node from a Cluster Locally using the local WildFire CLI.
Panorama Administrator's Guide Version Version 10.1 487 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Each WildFire appliance cluster node must have a stac IP address in the same subnet and
have low-latency connecons.
STEP 1 | Using the local CLI, configure the IP address of the Panorama server that will manage the
WildFire appliance cluster.
Before you register cluster or standalone WildFire appliances to a Panorama appliance, you
must first configure the Panorama IP address or FQDN on each WildFire appliance using the
local WildFire CLI. This is how each WildFire appliance knows which Panorama appliance
manages it.
1. On each WildFire appliance, configure the IP address or FQDN of the primary Panorama
appliance’s management interface:
2. On each WildFire appliance, if you use a backup Panorama appliance for high availability
(recommended), configure the IP address or FQDN of the backup Panorama appliance’s
management interface:
admin@WF-500# commit
Panorama Administrator's Guide Version Version 10.1 488 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
appliances that already belong to a cluster (for example, because of local cluster
configuraon) display their cluster informaon and connecon status.
STEP 3 | (Oponal) Import WildFire appliance configuraons into the Panorama appliance.
Imporng configuraons saves me because you can reuse or edit the configuraons on
Panorama and then push them to one or more WildFire appliance clusters or standalone
WildFire appliances. If there are no configuraons you want to import, skip this step. When
you push a configuraon from Panorama, the pushed configuraon overwrites the local
configuraon.
1. Select Panorama > Managed WildFire Appliances, and select the appliances that have
configuraons you want to import from the list of managed WildFire appliances.
2. Import Config.
3. Select Yes.
Imporng configuraons updates the displayed informaon and makes the imported
configuraons part of the Panorama appliance candidate configuraon.
4. Commit to Panorama to make the imported WildFire appliance configuraons part of the
Panorama running configuraon.
Panorama Administrator's Guide Version Version 10.1 489 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 6 | Configure the Management, Analysis Environment Network, HA, and cluster management
interfaces.
Configure the Management, Analysis Environment Network, and cluster management
interfaces on each cluster member (controller and worker nodes) if they are not already
configured. The cluster management interface is a dedicated interface for management and
communicaon within the cluster and is not the same as the Management interface.
Configure the HA interfaces individually on both the controller node and the controller backup
node. The HA interfaces connect the primary and backup controller nodes and enable them to
remain in sync and ready to respond to a failover.
Cluster nodes need IP addresses for each of the four WildFire appliance interfaces. You
cannot configure HA services on worker nodes.
Worker nodes in the cluster automacally inherit the controller node’s sengs
for the dedicated management and communicaon interface.
Panorama Administrator's Guide Version Version 10.1 490 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 7 | Commit the configuraon on the Panorama appliance and push it to the cluster.
1. Commit and Push.
2. If there are configuraons on the Panorama appliance that you do not want to push,
Edit Selecons to choose the appliances to which you push configuraons. The pushed
configuraon overwrites the running configuraon on the cluster nodes so that all
cluster nodes run the same configuraon.
STEP 9 | Using the local CLI on the primary controller node (not the Panorama web interface), check
to ensure that the configuraons are synchronized.
If they are not synchronized, manually synchronize the high availability configuraons on the
controller nodes and commit the configuraon.
Even though you can perform most other configuraon on Panorama, synchronizing the
controller node high availability configuraons must be done on the primary controller node’s
CLI.
1. On the primary controller node, check to ensure that the configuraons are
synchronized:
Configuration Synchronization:
Enabled: yes
Panorama Administrator's Guide Version Version 10.1 491 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
If there is a mismatch between the primary controller node’s configuraon and the
configuraon on the controller backup node, the configuraon on the primary controller
node overrides the configuraon on the controller backup node.
3. Commit the configuraon:
admin@WF-500# commit
Panorama Administrator's Guide Version Version 10.1 492 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
wfpc.service.<cluster-name>.<domain>
For example, a cluster named mycluster in the paloaltonetworks.com domain would have
the domain name:
wfpc.service.mycluster.paloaltonetworks.com
4. Enter the Content Update Server for the cluster. Use the default
updates.paloaltonetworks.com FQDN to connect to the closest server. Check
Server Identy to confirm the update server identy by matching the common name
(CN) in the cerficate with the IP address or FQDN of the server (this is checked by
default).
5. (Oponal) Enter the public WildFire Cloud Server locaon or use the default
wildfire.paloaltonetworks.com so that the cluster (or standalone appliance
managed by Panorama) can send informaon to the closest WildFire cloud server. If you
leave this field blank and do not connect to a WildFire cloud server, the cluster can’t
receive signature updates directly from the WildFire public cloud, and can’t send samples
for analysis or contribute data to the public cloud.
6. If you connect the cluster to the public WildFire cloud, select the cloud services you
want to enable:
• Send Analysis Data—Send an XML report about local malware analysis. If you send
the actual samples, the cluster doesn’t send reports.
• Send Malicious Samples—Send malware samples.
• Send Diagnoscs—Send diagnosc data.
• Verdict Lookup—Automacally query the WildFire public cloud for verdicts before
performing local analysis to reduce the load on the local WildFire appliance cluster.
7. Select the Sample Analysis Image to use, based on the types of samples the cluster will
analyze.
8. Configure the amount of me for the cluster to retain Benign/Grayware sample
data (1-90 day range, 14 day default) and Malicious sample data (minimum 1 day, no
Panorama Administrator's Guide Version Version 10.1 493 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 3 | Check to ensure that the primary and backup Panorama servers are configured.
If you did not configure a backup Panorama server and want to do so, you can add the backup
Panorama server.
1. Select the cluster.
2. Select Appliance.
3. Check (or enter) the IP address or FQDN of the primary Panorama Server and of
the backup Panorama Server 2 if you are using a high availability configuraon for
centralized cluster management.
STEP 4 | (Oponal) Configure system and configuraon log sengs for the cluster, including log
forwarding.
1. Select the cluster.
2. Select Logging.
3. Select System or Configuraon to configure a system or configuraon log, respecvely.
The process for configuring them is similar.
4. Add ( ) and Name the log forwarding instance, select the Filter, and configure the
Forward Method (SNMP, Email, Syslog, or HTTP).
STEP 6 | Commit the configuraon on the Panorama appliance and push it to the cluster.
1. Commit and Push.
2. If there are configuraons on the Panorama appliance that you do not want to push,
Edit Selecons to choose the appliances to which you push configuraons. The pushed
configuraon overwrites the running configuraon on the cluster nodes so that all
cluster nodes run the same configuraon.
Panorama Administrator's Guide Version Version 10.1 494 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
When you Configure and push administrators from Panorama, you overwrite the exisng
administrators for all WildFire appliances in the WildFire cluster with those you configure on
Panorama.
• Configure an Administrave Account for a WildFire Cluster
• Configure RADIUS Authencaon for a WildFire Cluster
• Configure TACACS+ Authencaon for a WildFire Cluster
• Configure LDAP Authencaon for a WildFire Cluster
Configure an Administrative Account for a WildFire Cluster
Create one or more administrators with granular authencaon parameters for all WildFire
appliances in a WildFire cluster to manage from the Panorama™ management server. Addionally,
you can configure local administrators from Panorama that can be configured directly on the CLI
of the WildFire appliance. However, pushing new configuraon changes to the WildFire appliance
will overwrites local administrators with the administrators configured for the WildFire appliance.
STEP 1 | Log in to the Panorama Web Interface.
STEP 3 | (Oponal) Configure an authencaon profile to define the authencaon service that
validates the login credenals of the administrators who access the WildFire appliance CLI.
You must configure the administrave account with Superuser admin role privileges to
successfully configure authencaon for Wildfire appliances in the WildFire cluster.
Panorama Administrator's Guide Version Version 10.1 495 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 5 | Configure the authencaon for the WildFire appliances in the WildFire cluster.
1. Select Panorama > Managed WildFire Clusters and select the WildFire cluster you
previously configured.
2. (Oponal) Select the Authencaon Profile you configured in the previous step.
3. Configure the authencaon Timeout Configuraon for the WildFire appliances.
1. Enter the number of Failed Aempts before a user is locked out of the WildFire
appliance CLI.
2. Enter the Lockout Time, in minutes, for which a WildFire appliance locks out a user
account aer that user reaches the configured number of Failed Aempts.
3. Enter the Idle Timeout, in minutes, before the user account is automacally logged
out due to inacvity.
4. Enter the Max Session Count to set how many user accounts can simultaneously
access a WildFire appliance.
5. Enter the Max Session Time the administrator can be logged in before being
automacally logged out.
4. Add the WildFire appliance administrators.
Administrators may either be added as a local administrator or as an imported Panorama
administrator—but not both. Adding the same administrator as both a local administrator
and as an imported Panorama administrator is not supported and causes the Panorama
commit to fail. For example, the commit to Panorama fails if you add admin1 as both a
local and Panorama administrator.
1. Add and configure new administrators unique to the WildFire appliances in the
WildFire cluster. These administrators are specific to the WildFire appliances in the
Panorama Administrator's Guide Version Version 10.1 496 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
WildFire cluster for which they are created and you manage these administrators from
this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the WildFire appliances in the WildFire cluster.
5. Click OK to save the WildFire cluster authencaon configuraon.
STEP 6 | Commit and then Commit and Push your configuraon changes.
STEP 7 | Access the WildFire appliance CLI to verify you can successfully access a WildFire appliance
using the local admin user.
You can Import the Palo Alto Networks RADIUS diconary into RADIUS server to define
the authencaon aributes needed for communicaon between Panorama and the
RADIUS server.
Panorama Administrator's Guide Version Version 10.1 497 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Select CHAP if the RADIUS server supports that protocol; it is more secure
than PAP.
5. Add each RADIUS server and enter the following:
1. Name to idenfy the server.
2. RADIUS Server IP address or FQDN.
3. Secret/Confirm Secret (a key to encrypt usernames and passwords).
4. Server Port for authencaon requests (default is 1812).
6. Click OK to save the server profile.
2. Assign the RADIUS server profile to an authencaon profile.
The authencaon profile defines authencaon sengs that are common to a set of
administrators.
1. Select Panorama > Authencaon Profile and Add a profile.
2. Enter a Name to idenfy the authencaon profile.
3. Set the Type to RADIUS.
4. Select the Server Profile you configured.
5. Select Retrieve user group from RADIUS to collect user group informaon from VSAs
defined on the RADIUS server.
Panorama matches the group informaon against the groups you specify in the Allow
List of the authencaon profile.
6. Select Advanced and, in the Allow List, Add the administrators that are allowed to
authencate with this authencaon profile.
7. Click OK to save the authencaon profile.
Panorama Administrator's Guide Version Version 10.1 498 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 499 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
WildFire cluster for which they are created and you manage these administrators from
this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the WildFire appliances in the WildFire cluster.
5. Click OK to save the WildFire cluster authencaon configuraon.
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Access the WildFire appliance CLI to verify you can successfully access a WildFire appliance
using the local admin user.
Panorama Administrator's Guide Version Version 10.1 500 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 501 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 502 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
WildFire cluster for which they are created and you manage these administrators from
this table.
2. Add any administrators configured on Panorama. These administrators are created on
Panorama and imported to the WildFire appliances in the WildFire cluster.
5. Click OK to save the WildFire cluster authencaon configuraon.
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Access the WildFire appliance CLI to verify you can successfully access a WildFire appliance
using the local admin user.
Panorama Administrator's Guide Version Version 10.1 503 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
1. Select Panorama > Server Profiles > LDAP and Add a server profile.
2. Enter a Profile Name to idenfy the server profile.
3. Add the LDAP servers (up to four). For each server, enter a Name (to idenfy the server),
LDAP Server IP address or FQDN, and server Port (default 389).
If you use an FQDN address object to idenfy the server and you subsequently
change the address, you must commit the change for the new server address to
take effect.
4. Select the server Type.
5. Select the Base DN.
To idenfy the Base DN of your directory, open the Acve Directory Domains and
Trusts Microso Management Console snap-in and use the name of the top-level
domain.
6. Enter the Bind DN and Password to enable the authencaon service to authencate
the firewall.
The Bind DN account must have permission to read the LDAP directory.
7. Enter the Bind Timeout and Search Timeout in seconds (default is 30 for both).
8. Enter the Retry Interval in seconds (default is 60).
9. (Oponal) If you want the endpoint to use SSL or TLS for a more secure connecon with
the directory server, enable the opon to Require SSL/TLS secured connecon (enabled
by default). The protocol that the endpoint uses depends on the server port:
• 389 (default)—TLS (Specifically, the WildFire appliance uses the StartTLS operaon,
which upgrades the inial plaintext connecon to TLS.)
• 636—SSL
• Any other port—The WildFire appliance first aempts to use TLS. If the directory
server doesn’t support TLS, the WildFire appliance falls back to SSL.
10. (Oponal) For addional security, enable to the opon to Verify Server Cerficate
for SSL sessions so that the endpoint verifies the cerficate that the directory server
presents for SSL/TLS connecons. To enable verificaon, you must also enable the
Panorama Administrator's Guide Version Version 10.1 504 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
Panorama Administrator's Guide Version Version 10.1 505 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
cluster for which they are created and you manage these administrators from this
table.
1. Add one or more new local administrator.
2. Enter a Name for the local administrator.
3. Assign an Authencaon Profile you previously created.
Panorama Administrator's Guide Version Version 10.1 506 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 5 | Commit and then Commit and Push your configuraon changes.
STEP 6 | Access the WildFire appliance CLI to verify you can successfully access the WildFire
appliance using the local admin user.
STEP 2 | Click OK. The cluster backup controller node and worker nodes populate automacally.
STEP 2 | Verify that your WildFire appliance cluster has been properly configured and is operang in a
healthy state.
STEP 3 | On Panorama, select Panorama > Managed WildFire Clusters > WF_cluster_name>
Communicaon.
Panorama Administrator's Guide Version Version 10.1 507 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 5 | (Recommended) Enable HA Traffic Encrypon. This oponal seng encrypts the HA traffic
between the HA pair and is a Palo Alto Networks recommended best pracce.
STEP 2 | Verify that your WildFire appliance cluster has been properly configured and is operang in a
healthy state.
STEP 3 | Review your exisng WildFire secure communicaons configuraon. Keep in mind,
if you previously configured the WildFire appliance and the firewall for secure
Panorama Administrator's Guide Version Version 10.1 508 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
communicaons using a custom cerficate, you can also use that custom cerficate for
secure communicaons between WildFire appliances.
1. Select Panorama >Managed WildFire Clusters> WF_cluster_name> Communicaon.
2. If Customize Secure Server Communicaon has been enabled and you would like to
use that cerficate, idenfy the details of the custom cerficate being used. Otherwise
proceed to Step 5 to begin the process of installing a new custom cerficate.
3. Determine the custom cerficate FQDN (DNS name) that will be used to define the
firewall registraon address in Step 4.
Make sure to note the custom cerficate name and the associated FQDN. These
are referenced several mes during the configuraon process.
STEP 5 | Configure WildFire Secure Server Communicaon sengs on Panorama. If you already
configured secure communicaons between the firewall and the WildFire cluster and are
using the exisng custom cerficate, proceed to Step 4 below.
1. On Panorama, select Panorama> Managed WildFire Clusters> WF_cluster_name>
Communicaon.
2. Click Customize Secure Server Communicaon.
3. Configure and deploy custom cerficates used by the WildFire appliances and the
associated firewall. The SSL/TLS service profile defines the custom cerficate used by
WildFire appliances to communicate with WildFire appliance peers and to the firewall.
Panorama Administrator's Guide Version Version 10.1 509 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
You must also configure the custom cerficate sengs on the firewall associated with
the WildFire appliance cluster. This is configured later in Step 9.
1. Open the SSL/TLS Service Profile drop-down and click SSL/TLS Service Profile.
Configure an SSL/TLS service profile with the custom cerficate that you want to use.
Aer you configure the SSL/TLS service profile, click OK and select the newly created
SSL/TLS Service profile.
2. Open the Cerficate Profile drop-down and click Cerficate Profile. Configure a
Cerficate Profile that idenfies the custom cerficate used to establish secure
connecons between the firewall and WildFire appliances, as well as between peer
WildFire appliances. Aer you configure the Cerficate Profile, click OK and select the
newly created profile.
4. Select the Custom Cerficate Only check box. This allows you to use the custom
cerficates that you configured instead of the default preconfigured cerficates.
5. (Oponal) Configure an authorizaon list. The authorizaon list checks the custom
cerficate Subject or Subject Alt Name; if the Subject or Subject Alt Name presented
with the custom cerficate does not match an idenfier on the authorizaon list,
authencaon is denied.
1. Add an Authorizaon List.
2. Select the Subject or Subject Alt Name configured in the custom cerficate profile as
the Idenfier type.
3. Enter the Common Name if the idenfier is Subject or and IP address, hostname or
email if the idenfier is Subject Alt Name.
4. Click OK.
5. Select Check Authorizaon List to enforce the authorizaon list.
6. Click OK.
Panorama Administrator's Guide Version Version 10.1 510 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 7 | (Recommended) Enable HA Traffic Encrypon. This oponal seng encrypts the HA traffic
between the HA pair and is a Palo Alto Networks recommended best pracce.
STEP 9 | Configure the firewall Secure Communicaon Sengs on Panorama to associate the
WildFire appliance cluster with the firewall custom cerficate. This provides a secure
communicaons channel between the firewall and WildFire appliance cluster. If you already
configured secure communicaons between the firewall and the WildFire appliance cluster
and are using the exisng custom cerficate, proceed to the next step.
1. Select Device > Setup > Management > Secure Communicaon Sengs and click the
Edit icon in Secure Communicaon Sengs to configure the firewall custom cerficate
sengs.
2. Select the Cerficate Type, Cerficate, and Cerficate Profile from the respecve drop-
downs and configure them to use the custom cerficate.
3. Under Customize Communicaon, select WildFire Communicaon.
4. Click OK.
Palo Alto Networks recommends using the WildFire appliance CLI to verify the status of
your WildFire cluster. Addional status details that are not visible from Panorama are
displayed in the command output.
STEP 1 | On the primary Panorama appliance, select Panorama > Managed WildFire Clusters.
Panorama Administrator's Guide Version Version 10.1 511 ©2022 Palo Alto Networks, Inc.
Manage WildFire Appliances
STEP 4 | In the Connected column, verify that the configured WildFire appliances show a status of
Connected.
Panorama Administrator's Guide Version Version 10.1 512 ©2022 Palo Alto Networks, Inc.
Manage Licenses and Updates
You can use the Panorama™ management server to centrally manage licenses,
soware updates, and content updates on firewalls and Dedicated Log Collectors.
When you deploy licenses or updates, Panorama checks in with the Palo Alto
Networks® licensing server or update server, verifies the request validity, and then
allows retrieval and installaon of the license or update. This capability facilitates
deployment by eliminang the need to repeat the same tasks on each firewall or
Dedicated Log Collector. It is parcularly useful for managing firewalls that don’t have
direct internet access or for managing Dedicated Log Collectors, which don’t have a
web interface.
Before deploying updates, see Panorama, Log Collector, Firewall, and WildFire Version
Compability for important details about update version compability.
You must acvate a support subscripon directly on each firewall; you cannot use
Panorama to deploy support subscripons.
To acvate licenses or install updates on the Panorama management server, see
Register Panorama and Install Licenses and Install Content and Soware Updates for
Panorama.
513
Manage Licenses and Updates
You cannot use Panorama to acvate the support license for firewalls. You must access the
firewalls individually to acvate their support licenses.
To acvate licenses for Panorama, see Register Panorama and Install Licenses.
Check that the WildFire Analysis profile rules include the advanced file types
that the WildFire subscripon supports.
Panorama Administrator's Guide Version Version 10.1 514 ©2022 Palo Alto Networks, Inc.
Manage Licenses and Updates
license, deploys it to the firewalls, and updates the licensing status on the Panorama web
interface.
3. (Enterprise Data Loss Prevenon (DLP) license only) Push the updated license to the
managed firewalls leveraging Enterprise DLP.
1. Select Commit and Commit to Panorama.
2. Select Commit > Push to Devices and Edit Selecons.
3. Select Templates and select the template stack associated with the managed firewalls
leveraging Enterprise DLP.
Click OK to connue.
4. Push the template configuraon to successfully update the Enterprise DLP license.
Panorama Administrator's Guide Version Version 10.1 515 ©2022 Palo Alto Networks, Inc.
Manage Licenses and Updates
Panorama Administrator's Guide Version Version 10.1 516 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
The Panorama™ management server provides a comprehensive, graphical view of
network traffic. Using the visibility tools on Panorama—the Applicaon Command
Center (ACC), logs, and report generaon capabilies—you can centrally analyze,
invesgate and report on all network acvity, idenfy areas with potenal security
impact, and translate them into secure applicaon enablement policies.
This secon covers the following topics:
517
Monitor Network Acvity
Device Group and Template admins can only network and ACC data for device groups
within their access domains.
Use the ACC and the AppScope to answer quesons such as:
Panorama Administrator's Guide Version Version 10.1 518 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
• What are the top applicaons used on • What are the applicaon usage trends
the network and how many are high-risk —what are the top five applicaons that
applicaons? Who are the top users of have gained use and the top five that have
high-risk applicaons on the network? decreased in use?
• What are the top URL categories being • How has user acvity changed over the
viewed in the last hour? current week as compared to last week or
last month?
• What are the top bandwidth-using • Which users and applicaons take up most
applicaons? Who are the users/hosts of the network bandwidth? And how has
that consume the highest bandwidth? this consumpon changed over the last 30
• What content or files are being blocked days?
and are there specific users who trigger • What are the threats on the network, and
this File Blocking/Data Filtering rule? how are these incoming and outgoing traffic
• What is the amount of traffic exchanged threats distributed geographically?
between two specific IP addresses or
generated by a specific user? Where is
the desnaon server or client located
geographically?
You can then use the informaon to maintain or enforce changes to the traffic paerns on your
network. See Use Case: Monitor Applicaons Using Panorama for a glimpse into how the visibility
tools on Panorama can influence how you shape the acceptable use policies for your network.
Here are a few ps to help you navigate the ACC:
Panorama Administrator's Guide Version Version 10.1 519 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
• Switch from a Panorama view to a Device view—Use the Context drop-down to access the
web interface of any managed firewall. For details, see Context Switch—Firewall or Panorama.
• Change Device Group and Data Source—The default Data Source used to display the stascs
on the charts in the ACC is Panorama local data, and the default Device Group seng is All.
Using the local data on Panorama provides a quick load me for the charts. You can, however,
change the data source to Remote Device Data if all the managed firewalls are on PAN-OS
7.0 or a later release. If the managed firewalls have a mix of PAN-OS 7.0 and earlier releases,
you can only view Panorama data. When configured to use Remote Device Data, Panorama
will poll all the managed firewalls and present an aggregated view of the data. The onscreen
display indicates the total number of firewalls being polled and the number of firewalls that
have responded to the query for informaon.
• Select the Tabs and Widgets to View—The ACC includes three tabs and an array of widgets
that allow you to find the informaon that you care about. With the excepon of the
applicaon usage widget and host informaon widget, all the other widgets display data only if
the corresponding feature has been licensed on the firewall, and you have enabled logging.
• Tweak Time Frame and Refine Data—The reporng me period in the ACC ranges from the
last 15 minutes to the last hour, day, week, month, or any custom-defined me. By default,
each widget displays the top 10 items and aggregates all the remaining items as others. You
can sort the data in each widget using various aributes—for example, sessions, bytes, threats,
content, and URLs. You can also set local filters to filter the display within the table and graph
in a widget, and then promote the widget filter as a global filter to pivot the view across all the
widgets in the ACC.
If Panorama will manage firewalls running soware versions earlier than PAN-OS 7.0,
specify a WildFire server from which Panorama can gather analysis informaon for
WildFire samples that those firewalls submit. Panorama uses the informaon to complete
WildFire Submissions logs that are missing field values introduced in PAN-OS 7.0. Firewalls
running earlier releases won’t populate those fields. To specify the server, select Panorama
> Setup > WildFire, edit the General Sengs, and enter the WildFire Private Cloud name.
The default is wildfire-public-cloud, which is the WildFire cloud hosted in the United
States.
Panorama Administrator's Guide Version Version 10.1 520 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
To do this, you must first enable the feature from the Panorama CLI by entering
A regular commit will not enable this change. Instead, you must switch to configuraon
mode:
admin@Panorama> configure
and enter
It is recommended that you install matching soware releases on Panorama and the
firewalls for which you will generate reports. For example, if the Panorama management
server runs Panorama 10.0, install PAN-OS 10.1 on its managed firewalls before
generang the reports. This pracce avoids issues that might occur if you create reports
that include fields supported in the Panorama release but not supported in an earlier PAN-
OS release on the firewalls.
Panorama Administrator's Guide Version Version 10.1 521 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
Enabling this seng is recommended for VM-50, VM-50 Lite and PA-200
firewalls.
3. Select Pre-Defined Reports and enable (check) predefined reports to push from
Panorama.
4. Select Commit > Commit to Panorama and Commit your configuraon changes.
5. (VM-50, VM-50 Lite, and PA-200 firewalls only) Access the firewall CLI to enable
predefined reports..
This command must be run on each VM-50, VM-50 Lite, and PA-200 firewall.
STEP 2 | Configure Panorama to receive and store user and user group informaon that it receives
from firewalls.
Required to generate reports based on usernames and groups instead of just IP addresses.
1. If you want Panorama to include user group informaon in reports, upgrade the
managed firewalls to PAN-OS 8.1 or a later release. Panorama cannot synchronize group
informaon from firewalls running earlier releases.
2. Select Panorama > Setup > Management, edit the Panorama Sengs, and Enable
reporng and filtering on groups.
3. Add a Device Group if you haven’t already. For each device group:
• Select a Master Device, which is the firewall that provides user and user group
informaon to Panorama.
• Enable Panorama to Store users and groups from Master Device.
Panorama Administrator's Guide Version Version 10.1 522 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
Scheduled and Run Now summary reports for the same database and meframe have
discrepancies in the data displayed in each report. This is due to how Log Collectors
and firewalls aggregate logs during hourly aggregaon.
Panorama Administrator's Guide Version Version 10.1 523 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
Panorama Administrator's Guide Version Version 10.1 524 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
The default minimum key limit is based on the Sort By and Group By values configured for the
scheduled report using the following calculaon:
<Sort By value> x 100 x <Group By value>
For example, if Sort By is configured as Top 25 and Group By is configured as 5 Groups, the
default minimum key limit is 12,500 keys. The Group By value is not factored into the calculaon
when set to None. The default minimum key limit is limited to and cannot exceed the maximum
key limit.
You can only configure the key limits for the M-Series appliances and Panorama virtual
appliances. The PA-7000 series key limits are not configurable.
The supported maximum and minimum keys are increased for the following Panorama models:
STEP 2 | Configure the maximum key limit using the following command:
You can set the maximum key limit between 0 and 50, where 50 equals 50,000 keys. In this
example, we are seng the maximum key limit for the Panorama virtual appliance to 30,000
keys.
Panorama Administrator's Guide Version Version 10.1 525 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
STEP 3 | Configure the minimum key limit using the following command:
You can set the minimum key limit between 0 and 15, where 15 equals 15,000 keys. In this
example, we are seng the minimum key limit for the Panorama virtual appliance to 15,000
keys.
STEP 4 | (Oponal) Set the minimum key limit to the default seng.
STEP 5 | Commit the new maximum and minimum key limits to Panorama using the following
command:
admin@Panorama> commit-all
Panorama Administrator's Guide Version Version 10.1 526 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
Panorama Administrator's Guide Version Version 10.1 527 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
receivers, you must configure Panorama as a syslog receiver in the Syslog sengs (for Traps
ESM 3.4, see Enable Log Forwarding to an External Logging Plaorm).
For Traps ESM 4.0 and later releases:
1. From the ESM Console, select Sengs > ESM > Panorama, and Enable log forwarding to
Panorama.
2. Enter the Panorama hostname or IP address as the Panorama Server and the Panorama
Server Port on which Panorama is listening. Repeat this step for an oponal Panorama
Failover Server.
3. Select the Transport layer Communicaon Protocol: TCP, TCP with SSL, or UDP. If
you select TCP with SSL, the ESM Server requires a server cerficate to enable client
authencaon.
From Panorama, you must export the root CA cerficate for the Inbound Cerficate for
Secure Syslog, and import the cerficate in to the trusted root cerficate store of the
host on which you have installed the ESM Server.
Panorama Administrator's Guide Version Version 10.1 528 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
The data source for this display is the applicaon stascs database; it does not use the Traffic
logs and is generated whether or not you have enabled logging for security rules. This view into
the traffic on your network depicts everything that is allowed on your network and is flowing
through unblocked by any policy rules that you have defined.
In the ACC tab, you can select and toggle the Data Source to be local on Panorama or you
can query the managed firewalls (Remote Device Data) for the data; Panorama automacally
aggregates and displays the informaon. For a speedier flow, consider using Panorama as the
data source (with log forwarding to Panorama enabled) because the me to load data from the
managed firewalls varies by the me period for which you choose to view data and the volume of
traffic that is generated on your network. If your managed firewalls have a combinaon of PAN-
OS 7.0 and earlier versions, Remote Device Data is not available.
The Dashboard example in Figure 24: Top Applicaons Widget shows DNS as a popular
applicaon. If you click the DNS applicaon block, Panorama opens the ACC > Network Acvity
tab with DNS applied as a global filter and shows informaon on the applicaon, users who
accessed the applicaon, and the details on the risk level and characteriscs of the applicaon.
Panorama Administrator's Guide Version Version 10.1 529 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
In the User Acvity widget, you can see how many users are using DNS and the volume of traffic
being generated. If you have enabled User-ID, you can view the names of the users who are
generang this traffic, and drill in to review all the sessions, content or threats associated with
each user.
In the Threat Acvity tab, view the Compromised Hosts widget to see what correlaon objects
were matched on, and view the match evidence associated with the user and applicaon. You can
also view the threat name, category and ID in the Threat Acvity widget.
With DNS set as a global filter, use the Desnaon IP Acvity and the Desnaon Regions
widgets to verify where the traffic was desned. You can also view the ingress and egress zones
and the security rule that is leng this connecon through.
For more detailed informaon, jump into the Traffic logs for a filtered view and review each
log entry for ports used, packets sent, bytes sent and received. Adjust the columns to view more
informaon or less informaon based on your needs.
The Monitor > App-Scope > Traffic Map tab displays a geographical map of the traffic flow and
provides a view of incoming versus outgoing traffic. You can also use the Monitor > App-Scope >
Change Monitor tab to view changes in traffic paerns. For example, compare the top applicaons
used over this hour to the last week or month to determine if there is a paern or trend.
With all the informaon you have now uncovered, you can evaluate what changes to make to your
policy configuraons. Here are some suggesons to consider:
• Be restricve and create a pre-rule on Panorama to block or allow all DNS traffic. Then use
Panorama device groups to create and push this policy rule to one or more firewalls.
Panorama Administrator's Guide Version Version 10.1 530 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
• Enforce bandwidth use limits and create a QoS profile and policy rule that de-priorizes non-
business traffic. Use Panorama device groups and templates to configure QoS and then push
rules to one or more firewalls.
• Schedule a custom report group that pulls together the acvity for the specific user and that of
top applicaons used on your network to observe that paern for another week or two before
taking acon.
Besides checking for a specific applicaon, you can also check for any unknown applicaons in
the list of top applicaons. These are applicaons that did not match a defined App-ID™ signature
and display as unknown-udp and unknown-tcp. To delve into these unknown applicaons, click on
the name to drill down to the details for the unclassified traffic.
Use the same process to invesgate the top source IP addresses of the hosts that iniated the
unknown traffic along with the IP address of the desnaon host to which the session was
established. For unknown traffic, the traffic logs, by default, perform a packet capture (pcap) when
an unknown applicaon is detected. The green arrow in the le column represents the packet
capture snippet of the applicaon data. Clicking on the green arrow displays the pcap in the
browser.
Having the IP addresses of the servers (desnaon IP), the desnaon port, and the packet
captures, you will be beer posioned to idenfy the applicaon and make a decision on how
you would like to take acon on your network. For example, you can create a custom applicaon
that idenfies this traffic instead of labeling it as unknown TCP or UDP traffic. Refer to the arcle
Idenfying Unknown Applicaons for more informaon on idenfying unknown applicaon and
Custom Applicaon Signatures for informaon on developing custom signatures to discern the
applicaon.
Panorama Administrator's Guide Version Version 10.1 531 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
Incident Noficaon
There are several ways that you could be alerted to an incident depending on how you’ve
configured the Palo Alto Networks firewalls and which third-party tools are available for further
analysis. You might receive an email noficaon that was triggered by a log entry recorded
to Panorama or to your syslog server, or you might be informed through a specialized report
generated on your SIEM soluon, or a third-party paid service or agency might nofy you. For this
example, let’s say that you receive an email noficaon from Panorama. The email informs you of
an event that was triggered by an alert for a Zero Access gent.Gen Command And Control Traffic
that matched against a spyware signature. Also listed in the email are the IP address of the source
and desnaon for the session, a threat ID and the mestamp of when the event was logged.
Panorama Administrator's Guide Version Version 10.1 532 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
If you see a DNS-based spyware signature, the IP address of your local DNS server might
display as the Vicm IP address. Oen this is because the firewall is located north of the
local DNS server, and so DNS queries show the local DNS server as the source IP rather
than showing the IP address of the client that originated the request.
If you see this issue, enable the DNS sinkholing acon in the An-Spyware profile in
security rules to idenfy the infected hosts on your network. DNS sinkholing allows you
to control outbound connecons to malicious domains and redirect DNS queries to an
internal IP address that is unused; the sinkhole that does not put out a response. When a
compromised host iniates a connecon to a malicious domain, instead of going out to the
internet, the firewall redirects the request to the IP address you defined and it is sinkholed.
Now, reviewing the traffic logs for all hosts that connected to the sinkhole allows you
locate all compromised hosts and take remedial acon to prevent the spread.
To connue with the invesgaon on the incident, use the informaon on the aacker and the
vicm IP address to find out more informaon, such as:
• Where is the aacker located geographically? Is the IP address an individual IP address or a
NATed IP address?
• Was the event caused by a user being tricked into going to a website, a download, or was it
sent through an email aachment?
• Is the malware being propagated? Are there other compromised hosts/endpoints on the
network?
• Is it a zero-day vulnerability?
The log details for each log entry display the related logs for the event. This informaon points
you to the Traffic, Threat, URL Filtering or other logs that you can review and correlate the events
that led to the incident. For example, filter the Traffic log (Monitor > Logs > Traffic) using the IP
Panorama Administrator's Guide Version Version 10.1 533 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
address as both the source and the desnaon IP to get a complete picture of all the external and
internal hosts/clients with which this vicm IP address has established a connecon.
Access to the WildFire logs from Panorama requires the following: a WildFire subscripon,
a File Blocking profile that is aached to a Security rule, and Threat log forwarding to
Panorama.
If Panorama will manage firewalls running soware versions earlier than PAN-OS 7.0,
specify a WildFire server from which Panorama can gather analysis informaon for
WildFire samples that those firewalls submit. Panorama uses the informaon to complete
WildFire Submissions logs that are missing field values introduced in PAN-OS 7.0. Firewalls
running earlier releases won’t populate those fields. To specify the server, select Panorama
> Setup > WildFire, edit the General Sengs, and enter the WildFire Private Cloud name.
The default is wildfire-public-cloud, which is the WildFire cloud hosted in the United
States.
If WildFire determines that a file is malicious, a new anvirus signature is created within 24-48
hours and made available to you. If you have a WildFire subscripon, the signature is made
available within 30-60 minutes as part of the next WildFire signature update. As soon as the Palo
Alto Networks next-generaon firewall has received a signature for it, if your configuraon is
configured to block malware, the file will be blocked and the informaon on the blocked file will
be visible in your threat logs. This process is ghtly integrated to protect you from this threat and
stems the spread of malware on your network.
Panorama Administrator's Guide Version Version 10.1 534 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
regions for incoming and outgoing traffic. It is parcularly useful for viewing unusual acvity that
could indicate a possible aack from outside, such as a DDoS aack. If, for example, you do not
have many business transacons with Eastern Europe, and the map reveals an abnormal level of
traffic to that region, click into the corresponding area of the map to launch and view the ACC
informaon on the top applicaons, traffic details on the session count, bytes sent and received,
top sources and desnaons, users or IP addresses, and the severity of the threats detected, if
any. The threat monitor (Monitor > AppScope > Threat Monitor) displays the top ten threats on
your network, or the list of top aackers or top vicms on the network.
Panorama Administrator's Guide Version Version 10.1 535 ©2022 Palo Alto Networks, Inc.
Monitor Network Acvity
Panorama Administrator's Guide Version Version 10.1 536 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
To provide redundancy in case of a system or network failure, you can deploy two
Panorama™ management servers in a high availability (HA) configuraon. Panorama
supports an HA configuraon in which one peer is the acve-primary and the other
is the passive-secondary. If a failure occurs on the primary peer, it automacally fails
over and the secondary peer becomes acve.
537
Panorama High Availability
Panorama HA Prerequisites
To configure Panorama in HA, you require a pair of idencal Panorama servers with the following
requirements on each:
• The same form factor—The peers must be the same model: both M-600 appliances, M-500
appliances, M-200 appliances, or both deployed on the same supported hypervisor for
Panorama virtual appliances. For example, to successfully configure HA for a Panorama virtual
appliance deployed on AWS in Panorama mode, the HA peer must also be deployed on AWS
and be in Panorama mode.
• The same mode—The peers must be in the same Panorama mode: both running in Panorama
mode, Management Only mode, or Legacy mode (ESXi and vCloud Air only).
Panorama appliances in Log Collector mode do not support HA.
• The same Panorama OS version—Must run the same Panorama version to synchronize
configuraon informaon and maintain parity for a seamless failover.
• The same set of licenses—Must have the same firewall management capacity license.
• (Panorama virtual appliance only) FIPCS-CC Mode—FIPS-CC mode must be enabled or disabled
on both Panorama HA peers.
• (Panorama virtual appliance only) Virtual Appliance Resources—Must have the same number of
vCPU cores and memory allocated to successfully synchronize configuraon informaon.
• (Panorama virtual appliance only) Unique serial number—Must have unique serial numbers; if
the serial number is the same for both Panorama instances, they will be in suspended mode
unl you resolve the issue.
While it is recommended to match the number of logging disk and the logging disk
capacies between the Panorama HA peers, having a different number logging disks
or different logging disk capacies between the Panorama HA peers does not impact
configuraon synchronizaon or HA failover
.
Panorama Administrator's Guide Version Version 10.1 538 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
The Panorama servers in the HA configuraon are peers and you can use either (acve or passive)
to centrally manage the firewalls, Log Collectors, and WildFire appliances and appliance clusters,
with a few excepons (see Synchronizaon Between Panorama HA Peers). The HA peers use
the management (MGT) interface to synchronize the configuraon elements pushed to the
managed firewalls, Log Collectors, and WildFire appliances and appliance clusters to maintain state
informaon. Typically, Panorama HA peers are geographically located in different sites, so you
need to make sure that the MGT interface IP address assigned to each peer is routable through
your network. HA connecvity uses TCP port 28 with encrypon enabled. If encrypon is not
enabled, ports 28769 and 28260 are used for HA connecvity and to synchronize configuraon
between the HA peers. We recommend less than 500ms latency between the peers. To determine
the latency, use Ping during a period of normal traffic.
Panorama Administrator's Guide Version Version 10.1 539 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
Panorama Administrator's Guide Version Version 10.1 540 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
Failover Triggers
When a failure occurs on the acve Panorama and the passive Panorama takes over the task of
managing the firewalls, the event is called a failover. A failover is triggered when a monitored
metric on the acve Panorama fails. This failure transions the state on the primary Panorama
from acve-primary to passive-primary, and the secondary Panorama becomes acve-secondary.
The condions that trigger a failover are:
• The Panorama peers cannot communicate with each other and the acve peer does not
respond to health and status polls; the metric used is HA Heartbeat Polling and Hello
Messages.
When the Panorama peers cannot communicate with each other, the acve one monitors
whether the peers are sll connected before a failover is triggered. This check helps in avoiding
a failover and causing a split-brain scenario, where both Panorama peers are in an acve state.
• One or more of the desnaons (IP addresses) specified on the acve peer cannot be reached;
the metric used is HA Path Monitoring.
In addion to the failover triggers listed above, a failover also occurs when the administrator
places the Panorama peer in a suspended state or when preempon occurs. Preempon is a
preference for the primary Panorama to resume the acve role aer recovering from a failure (or
user-iniated suspension). By default, preempon is enabled and when the primary Panorama
recovers from a failure and becomes available, the secondary Panorama relinquishes control and
returns to the passive state. When preempon occurs, the event is logged in the System log.
If you are logging to an NFS datastore, do not disable preempon because it allows the primary
peer (that is mounted to the NFS) to resume the acve role and write to the NFS datastore. For all
other deployments, preempon is only required if you want to make sure that a specific Panorama
is the preferred acve peer.
HA Path Monitoring
Path monitoring checks the network connecvity and link state for an IP address or group of IP
addresses (path group). The acve peer uses ICMP pings to verify that one or more desnaon
IP addresses can be reached. For example, you can monitor the availability of interconnected
networking devices like a router or a switch, connecvity to a server, or some other vital device
that is in the flow of traffic. Make sure that the node/device configured for monitoring is not likely
to be unresponsive, especially when it comes under load, as this could cause a path monitoring
failure and trigger a failover.
The default ping interval is 5,000ms. An IP address is considered unreachable when three
consecuve pings (the default value) fail, and a peer failure is triggered when any or all of the IP
Panorama Administrator's Guide Version Version 10.1 541 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
addresses monitored become unreachable. By default, if any one of the IP addresses becomes
unreachable, the HA state transions to non-funconal.
Panorama Administrator's Guide Version Version 10.1 542 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
By default, when the managed firewalls cannot connect to Panorama, they buffer the logs;
when the connecon is restored, they resume sending logs from where it was last le off.
The logging opons on the hardware-based Panorama and on the Panorama virtual appliance
differ:
• Logging Failover on a Panorama Virtual Appliance in Legacy Mode
• Logging Failover on an M-Series Appliance or Panorama Virtual Appliance in Panorama Mode
Virtual disk By default, the managed firewalls send logs as independent streams
to each Panorama HA peer. By default, if a peer becomes unavailable,
the managed firewalls buffer the logs and when the peer reconnects it
resumes sending logs from where it had le off (subject to disk storage
capacity and duraon of the disconnecon).
The maximum log storage capacity depends on the virtual plaorm
(VMware ESXi or vCloud Air); see Panorama Models for details.
Network File System You can mount NFS storage only to a Panorama virtual appliance that
(NFS) runs on a VMware ESXi server. Only the acve-primary Panorama
mounts to the NFS-based log paron and can receive logs. On failover,
the primary device goes into a passive-primary state. In this scenario,
unl preempon occurs, the acve-secondary Panorama manages the
firewalls, but it does not receive the logs and it cannot write to the
NFS. To allow the acve-secondary peer to log to the NFS, you must
manually switch it to primary so that it can mount to the NFS paron.
For instrucons, see Switch Priority aer Panorama Failover to Resume
NFS Logging.
Panorama Administrator's Guide Version Version 10.1 543 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
All the Log Collectors for any parcular Collector Group must be the same model: all
M-200 appliances all M-500 appliances, all M-600 appliances or all Panorama virtual
appliances in Panorama mode.
Because enabling redundancy creates more logs, this configuraon requires more storage
capacity. Enabling redundancy doubles the log processing traffic in a Collector Group,
which reduces its maximum logging rate by half, as each Log Collector must distribute a
copy of each log it receives. (When a Collector Group runs out of space, it deletes older
logs.)
Panorama Administrator's Guide Version Version 10.1 544 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
If you use a master key to encrypt the private keys and cerficates on Panorama, you
must use the same master key on both HA peers. If the master keys differ, Panorama
cannot synchronize the HA peers.
• Password for the Panorama admin administrator
For more informaon, see Panorama HA Prerequisites or Set Up HA on Panorama.
Panorama Administrator's Guide Version Version 10.1 545 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
Set Up HA on Panorama
Review the Panorama HA Prerequisites before performing the following steps.
Panorama Administrator's Guide Version Version 10.1 546 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
If both peers have the same priority seng, the peer with the higher serial
number will be placed in a suspended state.
3. Define the Preempve behavior. By default preempon is enabled. The preempon
selecon—enabled or disabled—must be the same on both peers.
If you are using an NFS for logging and you have disabled preempon, to resume
logging to the NFS see Switch Priority aer Panorama Failover to Resume
NFS Logging.
Panorama Administrator's Guide Version Version 10.1 547 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
STEP 5 | (Oponal) Select the failure condion for path monitoring on Panorama.
1. Select Panorama > High Availability and edit the Path Monitoring secon.
2. Select a Failure Condion:
• all triggers a failover only when all monitored path groups fail.
• any triggers a failover when any monitored path group fails.
3. Click OK.
Panorama Administrator's Guide Version Version 10.1 548 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
or if the HA peer or managed firewalls do not have the correct cerficate, or have an expired
cerficate.
All traffic on the link established by configuring the Secure Communicaon Sengs is always
encrypted.
STEP 2 | Configure a cerficate profile that includes the root CA and intermediate CA.
1. Select Panorama > Cerficate Management > Cerficate Profile.
2. Configure a cerficate profile.
Panorama Administrator's Guide Version Version 10.1 549 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
1. Select Panorama > Setup > Management and Edit the Secure Communicaon Sengs.
2. For the Cerficate Type, select Local.
3. Select the Cerficate and Cerficate Profile you configured in the previous steps.
4. Check (enable) HA Communicaon, WildFire Communicaon, and Data Redistribuon.
5. Check (enable) Customize Secure Server Communicaon.
6. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This
SSL/TLS service profile applies to all SSL connecons between Panorama, firewalls, Log
Collectors, and Panorama’s HA peers.
7. Select the cerficate profile from the Cerficate Profile drop-down.
8. Configure an authorizaon list.
When Allow Custom Cerficate Only check box is selected, Panorama does not
authencate and cannot manage devices using predefined cerficates.
10. In Disconnect Wait Time (min), enter the number of minutes Panorama should before
breaking and reestablishing the connecon with its managed devices. This field is blank
by default and the range is 0 to 44,640 minutes.
The disconnect wait me does not begin counng down unl you commit the
new configuraon.
1. Click OK.
2. Commit and Commit to Panorama.
3. Repeat this step on the secondary Panorama HA peer.
When you configure Secure Communicaon Sengs on the secondary Panorama HA
peer, add the primary HA peer to the authorizaon list as described above.
Panorama Administrator's Guide Version Version 10.1 550 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
STEP 3 | Verify that the passive Panorama peer has taken over as acve.
On the Panorama Dashboard, High Availability widget, verify that the state of the Local
passive server is acve and the state of the Peer is suspended.
STEP 4 | Restore the suspended peer to a funconal state. Wait for a couple minutes, and then verify
that preempon has occurred, if preempve is enabled.
On the Panorama you previously suspended:
1. Select Panorama > High Availability and, in the Operaonal Commands secon, click
Make local Panorama funconal.
2. In the High Availability widget on the Dashboard, confirm that this (Local) Panorama has
taken over as the acve peer and that the other peer is now in a passive state.
Panorama Administrator's Guide Version Version 10.1 551 ©2022 Palo Alto Networks, Inc.
Panorama High Availability
STEP 1 | Log in to the currently passive-primary Panorama, select Panorama > Setup > Operaons
and, in the Device Operaons secon, click Shutdown Panorama.
STEP 2 | Log in to the acve-secondary Panorama, select Panorama > High Availability, edit the
Elecon Sengs, and set the Priority to Primary.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Do not reboot when prompted.
STEP 5 | Log in to the Panorama CLI and enter the following command to change the ownership of the
NFS paron to this peer: request high-availability convert-to-primary
STEP 6 | Select Panorama > Setup > Operaons and, in the Device Operaons secon, click Reboot
Panorama.
STEP 7 | Power on the Panorama peer that you powered off in step 1. This peer will now be in a
passive-secondary state.
STEP 2 | Verify that the status indicates that the Panorama was suspended at user request.
On the Dashboard, High Availability widget, verify that the Local state is suspended.
A failover is triggered when you suspend a peer, and the other Panorama takes over as the
acve peer.
Panorama Administrator's Guide Version Version 10.1 552 ©2022 Palo Alto Networks, Inc.
Administer Panorama
This secon describes how to administer and maintain the Panorama™ management
server. It includes the following topics:
> Preview, Validate, or Commit > Use the Panorama Task Manager
Configuraon Changes > Manage Storage Quotas and
> Enable Automated Commit Recovery Expiraon Periods for Logs and
> Manage Panorama and Firewall Reports
Configuraon Backups > Monitor Panorama
> Compare Changes in Panorama > Reboot or Shut Down Panorama
Configuraons > Configure Panorama Password
> Manage Locks for Restricng Profiles and Complexity
Configuraon Changes
> Add Custom Logos to Panorama
For instrucons on compleng inial setup, including defining network access sengs,
licensing, upgrading the Panorama soware version, and seng up administrave
access to Panorama, see Set Up Panorama.
553
Administer Panorama
To commit the changes of other administrators, the account you used to log in
must be assigned the Superuser role or an Admin Role profile with the Commit
For Other Admins privilege enabled.
3. (Oponal) To filter the commit scope by administrator, select Commit Changes Made By,
click the adjacent link, select the administrators, and click OK.
4. (Oponal) To filter by locaon, select Commit Changes Made By and clear any changes
that you want to exclude from the Commit Scope.
Panorama Administrator's Guide Version Version 10.1 554 ©2022 Palo Alto Networks, Inc.
Administer Panorama
When you preview changes aer you delete and then re-add the same device to
a policy rule, Panorama displays that same device as both deleted in the running
configuraon and as added in the candidate configuraon. Addionally, the order of
devices in the device target list in the running configuraon may then be different from
the candidate configuraon and display as a change when you preview changes even
when there aren't any configuraon changes.
This can be useful if, for example, you don’t remember all your changes and you’re not sure you
want to acvate all of them.
Panorama compares the configuraons you selected in the Commit Scope to the running
configuraon. The preview window displays the configuraons side-by-side and uses color
coding to indicate which changes are addions (green), modificaons (yellow), or deleons
(red).
Preview Changes and select the Lines of Context, which is the number of lines from the
compared configuraon files to display before and aer the highlighted differences. These
lines help you correlate the preview output to sengs in the web interface. Close the preview
window when you finish reviewing the changes.
Because the preview results display in a new window, your browser must allow pop-up
windows. If the preview window does not open, refer to your browser documentaon
for the steps to unblock pop-up windows.
STEP 3 | Preview the individual sengs for which you are comming changes.
This can be useful if you want to know details about the changes, such as the types of sengs
and who changed them.
1. Click Change Summary.
2. (Oponal) Group By a column name (such as the Type of seng).
3. Close the Change Summary dialog when you finish reviewing the changes.
STEP 4 | Validate the changes before comming to ensure the commit will succeed.
1. Validate Changes.
The results display all the errors and warnings that an actual commit would display.
2. Resolve any errors that the validaon results idenfy.
Panorama Administrator's Guide Version Version 10.1 555 ©2022 Palo Alto Networks, Inc.
Administer Panorama
If you select Commit > Push to Devices, the push scope includes all locaons
associated with devices that are out of sync with the Panorama running configuraon.
1. No Default Selecons to manually select specific devices. The default devices Panorama
pushes to are based on the impacted device group and template configuraon changes.
2. Edit Selecons and select:
• Device Groups—Select device groups or individual firewalls or virtual systems.
• Templates—Select templates, template stacks, or individual firewalls.
• Collector Groups—Select Collector Groups.
3. Click OK to save your changes to the Push Scope.
STEP 6 | Validate the changes you will push to device groups or templates.
1. Validate Device Group Push or Validate Template Push.
The results display all the errors and warnings that an actual push operaon would
display.
2. Resolve any errors that the validaon results idenfy.
STEP 7 | Commit your changes to Panorama and push the changes to devices.
Commit and Push the configuraon changes.
Use the Panorama Task Manager to see details about commits that are pending
(oponally, you can cancel these), in progress, completed, or failed.
Panorama Administrator's Guide Version Version 10.1 556 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 2 | Select Device > Setup > Management and select the desired Template or Template Stack
from the Template context drop-down.
Panorama Administrator's Guide Version Version 10.1 557 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 4 | Commit > Commit and Push and Commit and Push your changes.
STEP 5 | Verify that the automated commit recovery feature is enabled on your managed firewalls.
1. Launch the Firewall Web Interface.
2. Select Device > Setup > Management and, in the Panorama Sengs, verify that Enable
automated commit recovery is enabled (checked).
Panorama Administrator's Guide Version Version 10.1 558 ©2022 Palo Alto Networks, Inc.
Administer Panorama
See Panorama Commit, Validaon, and Preview Operaons for more informaon on
comming configuraon changes to Panorama and pushing the changes to managed
devices.
Aer a commit on a local firewall that runs PAN-OS 5.0 or later, a backup is sent of its running
configuraon to Panorama. Any commits performed on the local firewall will trigger the backup,
including commits that an administrator performs locally on the firewall or automac commits that
PAN-OS iniates (such as an FQDN refresh). By default, Panorama stores up to 100 backups for
each firewall, though this is configurable. To store Panorama and firewall configuraon backups
on an external host, you can schedule exports from Panorama or export on demand. You can also
import configuraons from firewalls into Panorama device groups and templates to Transion a
Firewall to Panorama Management.
(VMware ESXi and vCloud Air only) VMware snapshot funconality is not supported for a
Panorama virtual appliance deployed on VMware ESXi and vCloud Air. Taking snapshots of a
Panorama virtual appliance can impact performance, result in intermient and inconsistent packet
loss, and Panorama may become unresponsive. Addionally, you may lose access to the Panorama
CLI and web interface and switching to Panorama mode is not supported. Instead, save and export
your named configuraon snapshot to any network locaon.
• Schedule Export of Configuraon Files
• Save and Export Panorama and Firewall Configuraons
• Revert Panorama Configuraon Changes
• Configure the Maximum Number of Configuraon Backups on Panorama
• Load a Configuraon Backup on a Managed Firewall
Panorama Administrator's Guide Version Version 10.1 559 ©2022 Palo Alto Networks, Inc.
Administer Panorama
If Panorama has a high availability (HA) configuraon, you must perform these instrucons
on each peer to ensure the scheduled exports connue aer a failover. Panorama does not
synchronize scheduled configuraon exports between HA peers.
To export backups on demand, see Save and Export Panorama and Firewall
Configuraons.
STEP 1 | Select Panorama > Scheduled Config Export and click Add.
STEP 2 | Enter a Name and Descripon for the scheduled file export and Enable it.
STEP 3 | Using the 24-hour clock format, enter a daily Scheduled Export Start Time or select one from
the drop-down.
If you are configuring a scheduled export to two or more servers, stagger the start me
of the scheduled exports. Scheduling mulple exports at the same start me results in
discrepancies between the exported configuraons.
STEP 4 | Set the export Protocol to Secure Copy (SCP) or File Transfer Protocol (FTP).
STEP 5 | Enter the details for accessing the server, including: Hostname or IP address, Port, Path for
uploading the file, Username, and Password.
The Path supports the following characters: .(period), +, { and }, /, -, _, 0-9, a-z, and A-Z.
Spaces are not supported in the file Path.
If you are exporng to an FTP server using an IPv6 address as the Hostname,
you must enter the address enclosed in square brackets ([ ]). For example,
[2001:0db8:0000:0000:0000:8a2e:0370:7334].
If you are exporng to a BSD server, you will need to modify the SSHD password
prompt to <username>@<hostname> <password>: .
STEP 6 | (SCP only) Click Test SCP server connecon. To enable the secure transfer of data, you must
verify and accept the host key of the SCP server. Panorama doesn’t establish the connecon
unl you accept the host key. If Panorama has an HA configuraon, perform this step on
each HA peer so that each one accepts the host key of the SCP server. If Panorama can
successfully connect to the SCP server, it creates and uploads the test file named ssh-export-
test.txt.
STEP 8 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 560 ©2022 Palo Alto Networks, Inc.
Administer Panorama
if a system event or administrator acon causes Panorama to reboot. Aer reboong, Panorama
automacally reverts to the current version of the running configuraon, which Panorama stores
in a file named running-config.xml. Saving backups is also useful if you want to revert to
a Panorama configuraon that is earlier than the current running configuraon. Panorama does
not automacally save the candidate configuraon to persistent storage. You must manually save
the candidate configuraon as a default snapshot file (.snapshot.xml) or as a custom-named
snapshot file. Panorama stores the snapshot file locally but you can export it to an external host.
You don’t have to save a configuraon backup to revert the changes made since the
last commit or reboot; just select Config > Revert Changes (see Revert Panorama
Configuraon Changes).
Palo Alto Networks recommends that you back up any important configuraons to an
external host.
Panorama Administrator's Guide Version Version 10.1 561 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Config > Save Changes at the top of the web interface, select Save All Changes and
Save.
• To overwrite the default snapshot (.snapshot.xml) with changes made by administrators
to specific device group, template, or template stack configuraons:
1. Select Panorama > Setup > Operaons, Save candidate Panorama configuraon, and
Select Device Group & Templates.
2. Select the specific device groups, templates, or template stacks to revert.
3. Click OK to confirm the operaon.
4. (Oponal) Select Commit > Commit to Panorama and Commit your changes to overwrite
the running configuraon with the snapshot.
• To create a snapshot that includes all the changes that all administrators made but without
overwring the default snapshot file:
1. Select Panorama > Setup > Operaons and Save named Panorama configuraon
snapshot.
2. Specify the Name of a new or exisng configuraon file.
3. Click OK and Close.
• To save only specific changes to the candidate configuraon without overwring any part of
the default snapshot file:
1. Log in to Panorama with an administrave account that has the role privileges required to
save the desired changes.
2. Select Config > Save Changes at the top of the web interface.
3. Select Save Changes Made By.
4. To filter the Save Scope by administrator, click <administrator-name>, select the
administrators, and click OK.
5. To filter the Save Scope by locaon, clear any locaons that you want to exclude. The
locaons can be specific device groups, templates, Collector Groups, Log Collectors,
shared sengs, or the Panorama management server.
6. Click Save, specify the Name of a new or exisng configuraon file, and click OK.
• To save a specific device group, template, or template stack configuraon:
1. Select Panorama > Setup > Operaons, Save named Panorama configuraon snapshot,
and Select Device Group & Templates.
2. Select the specific device groups, templates, or template stacks to save.
3. Click OK to confirm the operaon.
Panorama Administrator's Guide Version Version 10.1 562 ©2022 Palo Alto Networks, Inc.
Administer Panorama
you specify. Select Device Group & Templates to specify the device group, template, or
template stack configuraons to export.
• Export Panorama configuraon version—Select a Version of the running configuraon
to export as an XML file. Select Device Group & Templates to specify the device group,
template, or template stack configuraons to export as an XML file.
• Export Panorama and devices config bundle—Generate and export the latest version of the
running configuraon backup of Panorama and of each managed firewall. To automate the
process of creang and exporng the configuraon bundle daily to a Secure Copy (SCP) or
FTP server, see Schedule Export of Configuraon Files.
• Export or push device config bundle—Aer you import a firewall configuraon
into Panorama, Panorama creates a firewall configuraon bundle named
<firewall_name>_import.tgz, in which all local policies and objects are removed. You can
then Export or push device config bundle to perform one of the following acons:
• Push & Commit the configuraon bundle to the firewall to remove any local
configuraon from it, enabling you to manage the firewall from Panorama.
• Export the configuraon to the firewall without loading it. When you are ready to load
the configuraon, log in to the firewall CLI and run the configuraon mode command
load device-state. This command cleans the firewall in the same way as the Push &
Commit opon.
Panorama Administrator's Guide Version Version 10.1 563 ©2022 Palo Alto Networks, Inc.
Administer Panorama
The privileges that control commit operaons also control revert operaons.
Panorama Administrator's Guide Version Version 10.1 564 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Panorama Administrator's Guide Version Version 10.1 565 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 2 | Select Log Export and Reporng and enter the Number of Versions for Config Backups
(default is 100; range is 1 to 1,048,576).
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 566 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 4 | Log in to the firewall web interface and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 567 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Device Group and Template admins can only compare configuraons for device groups and
templates within their access domains.
Panorama Administrator's Guide Version Version 10.1 568 ©2022 Palo Alto Networks, Inc.
Administer Panorama
If you are changing sengs that are unrelated to the sengs other administrators are
changing in concurrent sessions, you don’t need configuraon locks to prevent commit
conflicts. Panorama queues commit operaons and performs them in the order that
administrators iniate the commits. For details, see Panorama Commit, Validaon, and
Preview Operaons.
A template or device group configuraon push will fail if a firewall assigned to the template
or device group has a commit or config lock that an administrator set locally on that
firewall.
Panorama Administrator's Guide Version Version 10.1 569 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Lock a configuraon.
Read-only administrators who cannot modify firewall or Panorama configuraons cannot set
locks.
1. Click the padlock icon at the top of the web interface.
The icon varies based on whether exisng locks are ( ) or are not ( ) set.
2. Take a Lock and select the lock Type:
• Config—Blocks other administrators from changing the candidate configuraon.
A custom role administrator who cannot commit changes can set a Config lock
and save the changes to the candidate configuraon. However, because that
administrator cannot commit the changes, Panorama does not automacally
release the lock aer a commit; the administrator must manually remove the
Config lock aer making the required changes.
Unlock a configuraon.
Only a superuser or the administrator who locked the configuraon can manually unlock it.
However, Panorama automacally removes a lock aer compleng the commit operaon that
the administrator who set the lock iniated.
1. Click the locked padlock ( ) at the top of the web interface.
2. Select the lock entry in the list.
3. Click Remove Lock, OK, and Close.
Configure Panorama to automacally lock the running configuraon when you change the
candidate configuraon. This seng applies to all Panorama administrators.
1. Select Panorama > Setup > Management and edit the General Sengs.
2. Select Automacally Acquire Commit Lock and click OK.
3. Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 570 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 3 | Click the Upload logo icon and select an image for any of the following opons: the login
screen, the le corner of the main user interface, the PDF report tle page and the PDF
report footer.
STEP 4 | Click Open to add the image. To preview the image, click the preview logo icon.
STEP 5 | (Oponal) To clear the green background header on the Panorama web interface, select the
check box for Remove Panorama background header.
STEP 7 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 571 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Device Group and Template admins can only view tasks for tasks within their access
domains.
STEP 2 | Show the Running (in progress) tasks or All tasks (the default), oponally filter by type
(Reports; Log Requests; or commit, download, and installaon Jobs), and select Panorama
(default) or the firewall for which you want to see the tasks.
Panorama Administrator's Guide Version Version 10.1 572 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Panorama Administrator's Guide Version Version 10.1 573 ©2022 Palo Alto Networks, Inc.
Administer Panorama
mode or are in a Dedicated Log Collector (M-Series appliance in Log Collector mode). You edit
the log storage quotas on the RAID disks when you Configure a Collector Group.
For details on the log storage opons and capacies, see Panorama Models. You can
Expand Log Storage Capacity on the Panorama Virtual Appliance by adding virtual
logging disks or NFS storage. You can Increase Storage on the M-Series Appliance by
adding RAID drives or by upgrading from 1TB drives to 2TB drives.
Panorama Administrator's Guide Version Version 10.1 574 ©2022 Palo Alto Networks, Inc.
Administer Panorama
If you reduce a storage quota such that the current logs exceed it, aer you commit the
change, Panorama removes the oldest logs to fit the quota.
1. Select Panorama > Setup > Management and edit the Logging and Reporng Sengs.
2. In the Log Storage sengs, enter the storage Quota (%) for each log type.
When you change a percentage value, the page refreshes to display the corresponding
absolute value (Quota GB/MB column) based on the total alloed storage on Panorama.
3. Enter the Max Days (expiraon period) for each log type (range is 1 to 2,000).
By default, the fields are blank, which means the logs never expire.
Restore Defaults if you want to reset the quotas and expiraon periods to the
factory defaults.
STEP 2 | Configure the expiraon period for reports that Panorama generates.
1. Select Log Export and Reporng and enter the Report Expiraon Period in days (range is
1 to 2,000).
By default, the field is blank, which means reports never expire.
2. Click OK to save your changes.
Panorama Administrator's Guide Version Version 10.1 575 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 3 | Configure the storage quotas and expiraon periods for logs of all types (except App Stats
logs) that M-600, M-500, M-200 appliances, or Panorama virtual appliance in Panorama
mode receives from firewalls.
The local or Dedicated Log Collectors store these logs.
You configure these storage quotas at the Collector Group level, not for individual Log
Collectors.
1. Select Panorama > Collector Groups and edit the Collector Group.
2. In the General sengs, click the Log Storage value.
A value doesn’t display unless you assigned Log Collectors to the Collector
Group. If the field displays 0MB aer you assign Log Collectors, verify that you
enable the disk pairs when you Configure a Managed Collector and that you
commied the changes (Panorama > Managed Collectors > Disks).
3. Enter the storage Quota(%) for each log type.
When you change a percentage value, the page refreshes to display the corresponding
absolute value (Quota GB/MB column) based on the total storage alloed to the
Collector Group.
4. Enter the Max Days (expiraon period) for each log type (range is 1 to 2,000).
By default, the fields are blank, which means the logs never expire.
Restore Defaults if you want to reset the quotas and expiraon periods to the
factory defaults.
5. Click OK to save your changes.
STEP 4 | Commit the changes to Panorama and push the changes to the Collector Group.
1. Select Commit > Commit and Push and Edit Selecons in the Push Scope.
2. Select Collector Groups, select the Collector Group you modified, and click OK.
3. Commit and Push your changes.
You can also verify the Collector Group storage quotas by logging in to a Log
Collector CLI and entering the operaonal command show log-diskquota-
pct.
Panorama Administrator's Guide Version Version 10.1 576 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 2 | Select Log Export and Reporng and set the Report Runme to an hour in the 24-hour clock
schedule (default is 02:00; range is 00:00 [midnight] to 23:00).
STEP 3 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 577 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Monitor Panorama
To monitor Panorama and its managed collectors, you can periodically view their System and
Config logs (filter logs by type), configure an SNMP manager to collect (GET) Panorama stascs
on a regular basis, or configure SNMP traps or email alerts that nofy you when a monitored
metric changes state or reaches a threshold on Panorama. Email alerts and SNMP traps are
useful for immediate noficaon about crical system events that need your aenon. To
configure email alerts or SNMP traps, see Configure Log Forwarding from Panorama to External
Desnaons.
• Panorama System and Configuraon Logs
• Monitor Panorama and Log Collector Stascs Using SNMP
Panorama regularly connects to the IoT Edge Service to download policy recommendaons
for IoT based policies. This connecon is aempted by Panorama regardless of whether the
IoT license is acve on any managed firewalls..
A high severity gRPC connecon failure system log is generated in the event of connecon
failure or if Panorama manages no IoT licensed firewall. No acon is needed regarding
these system logs if you are not leveraging the policy recommendaon capabilies of IoT or
if you are not managing any IoT licensed firewalls.
If you are leveraging the policy recommendaon capabilies of IoT, review the gRPC
connecon failure system log to understand what is causing the connecon issue between
Panorama and the IoT Edge Service.
Panorama does not support querying configuraon logs in the ACC or when monitoring
configuraon logs (Monitor > Logs) using the filters:
before-change-preview-contains
after-change-preview-contains
Severity Descripon
Crical Indicates a failure and the need for immediate aenon, such as a hardware
failure, including high availability (HA) failover and link failures.
High Serious issues that will impair the operaon of the system, including
disconnecon of a Log Collector or a commit failure.
Panorama Administrator's Guide Version Version 10.1 578 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Severity Descripon
Informaonal Noficaon events such as log in or log out, any configuraon change,
authencaon success and failure noficaons, commit success, and all
other events that the other severity levels don’t cover.
Panorama stores the System and Config logs locally; the exact locaon and storage capacity varies
by Panorama model (see Log and Report Storage). Upon reaching the capacity limit, Panorama
deletes the oldest logs to create space for new logs. If you need to store the logs for longer
periods than what the local storage allows, you can Configure Log Forwarding from Panorama to
External Desnaons.
For informaon on using Panorama to monitor firewall logs, see Monitor Network
Acvity.
You can’t configure an SNMP manager to control Panorama or Log Collectors (using SET
messages); an SNMP manager can only collect stascs (using GET messages).
For details on how Panorama implements SNMP, see SNMP Support.
Panorama Administrator's Guide Version Version 10.1 579 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 1 | Configure the SNMP Manager to get stascs from Panorama and the Log Collectors.
The following steps are an overview of the tasks you perform on the SNMP manager. For the
specific steps, refer to the documentaon of your SNMP manager.
1. To enable the SNMP manager to interpret stascs, load the Supported MIBs and, if
necessary, compile them.
2. For each Panorama appliance that the SNMP manager will monitor, define its connecon
sengs (IP address and port) and authencaon sengs (SNMPv2c community string or
SNMPv3 username and password). All Panorama appliances use port 161.
The SNMP manager can use the same or different connecon and authencaon
sengs for mulple Panorama management servers and Log Collectors. The sengs
must match those you define when you configure SNMP on Panorama (see Configure the
Panorama management server to respond to stascs requests from an SNMP manager.
and Configure the Panorama management server to respond to stascs requests from
an SNMP manager.). For example, if you use SNMPv2c, the community string you define
when configuring Panorama must match the community string you define in the SNMP
manager for Panorama.
3. Determine the object idenfiers (OIDs) of the stascs you will monitor. For example,
to monitor the logging rate, a MIB browser shows that this stasc corresponds to OID
1.3.6.1.4.1.25461.2.3.30.1.1 in PAN-PRODUCT-MIB.my. For details, see Use an SNMP
Manager to Explore MIBs and Objects.
4. Configure the SNMP manager to monitor the desired OIDs.
STEP 2 | Enable SNMP traffic on the management (MGT) interface of the Panorama management
server.
1. Select Panorama > Setup > Management and edit the Management Interface Sengs.
2. In the Services secon, select the SNMP check box and click OK.
STEP 3 | Enable SNMP traffic on the management (MGT) interface of any M-Series appliances in Log
Collector mode:
1. Select Panorama > Managed Collectors and select the Log Collector.
2. Select the Management tab, select the SNMP check box, and click OK.
Panorama Administrator's Guide Version Version 10.1 580 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 4 | Configure the Panorama management server to respond to stascs requests from an SNMP
manager.
1. Select Panorama > Setup > Operaons and, in the Miscellaneous secon, click SNMP
Setup.
2. Select the SNMP Version and configure the authencaon values as follows. For version
details, see SNMP Support.
• V2c—Enter the SNMP Community String, which idenfies a community of SNMP
managers and monitored devices (Panorama, in this case), and serves as a password to
authencate the community members to each other.
Don’t use the default community string public; it is well known and
therefore not secure.
• V3—Create at least one SNMP view group and one user. User accounts and views
provide authencaon, privacy, and access control when SNMP managers get
stascs.
Views—Each view is a paired OID and bitwise mask: the OID specifies a MIB, and the
mask (in hexadecimal format) specifies which objects are accessible inside (include
matching) or outside (exclude matching) that MIB. Click Add in the first list and enter a
Name for the group of views. For each view in the group, click Add and configure the
view Name, OID, matching Opon (include or exclude), and Mask.
Users—Click Add in the second list, enter a username in the Users column, select the
View group from the drop-down, enter the authencaon password (Auth Password)
used to authencate to the SNMP manager, and enter the privacy password (Priv
Password) used to encrypt SNMP messages to the SNMP manager.
3. Click OK to save the sengs.
STEP 5 | Configure the Dedicated Log Collectors (if any) to respond to SNMP requests.
For each Collector Group:
1. Select Panorama > Collector Groups and select the Collector Group.
2. Select the Monitoring tab, configure the same sengs as in Step Configure the
Panorama management server to respond to stascs requests from an SNMP manager.,
and click OK.
STEP 6 | Commit the changes to Panorama and push the changes to Collector Groups.
1. Select Commit > Commit and Push and Edit Selecons in the Push Scope.
2. Select Collector Groups you, select the Collector Groups you edited, and click OK.
3. Commit and Push your changes.
STEP 7 | Monitor the Panorama and Log Collector stascs in an SNMP manager.
Refer to the documentaon of your SNMP manager.
Panorama Administrator's Guide Version Version 10.1 581 ©2022 Palo Alto Networks, Inc.
Administer Panorama
STEP 2 | In the Device Operaons secon, select Reboot Panorama or Shutdown Panorama.
Panorama Administrator's Guide Version Version 10.1 582 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Panorama Administrator's Guide Version Version 10.1 583 ©2022 Palo Alto Networks, Inc.
Administer Panorama
Panorama Administrator's Guide Version Version 10.1 584 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
The Panorama extensible plugin architecture enables support for third-party
integraon plugins, such as VMware NSX, and other Palo Alto Networks products,
such as the GlobalProtect cloud service. With this modular architecture, you can take
advantage of new capabilies without waing for a new PAN-OS version.
You can also configure the VM-Series plugin from Panorama. The VM-Series plugin
is a single plugin that enables integraon with public cloud environments such as
Google Cloud Plaorm (GCP), Azure, AWS and private cloud hypervisors such as
KVM, ESXi and others. The VM-Series plugin enables you to publish metrics from VM-
Series firewalls deployed in public clouds. You can use Panorama to configure the VM-
Series plugin sengs for public clouds and push your configuraon to your managed
firewalls.
585
Panorama Plugins
• Cloud Services—The Cloud Services plugin enables the use of the Cortex Data Lake and Prisma
Access. The Cortex Data Lake solves operaonal logging challenges and the Prisma Access
cloud service extends your security infrastructure to your remote network locaons and mobile
workforce.
• Enterprise Data Loss Prevenon (DLP)— Enterprise DLP is a set of tools and processes that
allow you to protect sensive informaon against unauthorized access, misuse, extracon, or
sharing. Enterprise DLP is enabled through a cloud service to help you inspect content and
analyze the data in the correct context so that you can accurately idenfy sensive data and
secure it to prevent incidents. Enterprise DLP is supported on Panorama and managed firewalls
running PAN-OS 10.0.2 and later releases.
Panorama Administrator's Guide Version Version 10.1 586 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
• GCP—Enables you to secure Kubernetes services in a Google Kubernetes Engine (GKE) cluster.
Configure the Panorama plugin for Google Cloud Plaorm (GCP) to connect to your GKE
cluster and learn about the services that are exposed to the internet.
• Panorama Interconnect—The Panorama Interconnect plugin enables you to manage large-scale
firewall deployments. Use the Interconnect plugin to set up a two-er Panorama deployment
(on Panorama running PAN-OS 8.1.3 or a later release) for a horizontal scale-out architecture.
With the Interconnect plugin, you can deploy a Panorama Controller with up to 64 Panorama
Nodes or 32 Panorama HA pairs to centrally manage a large number of firewalls.
• Nutanix—The Panorama plugin for Nutanix enables VM monitoring in your Nutanix
environment. It allows you to track the virtual machine inventory within your Nutanix Prism
Central so that you can consistently enforce security policy that automacally adapts to
changes within your Nutanix environment. As virtual machines are provisioned, de-provisioned
or moved, this soluon allows you to collect the IP addresses and associated sets of aributes
(or metadata elements) as tags. You can then use the tags to define Dynamic Address Groups
and use them in Security policy. The Panorama plugin for Nutanix requires Panorama 9.0.4 or
later.
• SD-WAN—The Soware-Defined Wide Area Network (SD-WAN) plugin allows you to use
mulple internet and private services to create an intelligent and dynamic WAN, which helps
lower costs and maximize applicaon quality and usability. Instead of using costly and me-
consuming MPLS with components such as routers, firewalls, WAN path controllers, and WAN
opmizers to connect your WAN to the internet, SD-WAN on a Palo Alto Networks firewall
allows you to use less expensive internet services and fewer pieces of equipment.
• VMware NSX—The VMware NSX plugin enables integraon between the VM-Series firewall
on VMware NSX with VMware NSX Manager. This integraon allows you to deploy the VM-
Series firewall as a service on a cluster of ESXi servers.
• VMware vCenter—The Panorama plugin for VMware vCenter allows you to monitor the virtual
machines in your vCenter environment. The plugin retrieves IP addresses of virtual machines
in your vCenter environment and converts them to tags that you can use to build policy using
dynamic address groups.
• Zero Touch Provisioning—Zero Touch Provisioning (ZTP) is designed to simplify and automate
the on-boarding of new firewalls to Panorama. ZTP streamlines the inial firewall deployment
process by allowing network administrators to ship managed firewalls directly to their branches
and automacally add the firewall to Panorama, allowing business to save on me and
resources when deploying new firewalls. ZTP is supported on PAN-OS 9.1.3 and later releases.
• IPS Signature Converter—The IPS Signature Converter plugin for Panorama provides an
automated soluon for converng rules from third-party intrusion prevenon systems—Snort
and Suricata—into custom Palo Alto Networks threat signatures. You can then register these
signatures on firewalls that belong to device groups you specify and use them to enforce policy
in Vulnerability Protecon and An-Spyware Security Profiles.
You can install mulple plugins and retrieve IP address updates from mulple sources on a single
Panorama instance. This allows you to create and enforce consistent security policy to secure
applicaons and workloads across mulple cloud environments. Retrieved IP addresses are used
in security policy through dynamic address groups; when a workload is added or removed from
your environment, Panorama registers the change and pushes the update to the firewalls. When
Panorama Administrator's Guide Version Version 10.1 587 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
deploying mulple plugins on Panorama, you must carefully plan your device group hierarchy to
ensure that updates are passed to your firewalls correctly.
Refer to the Palo Alto Networks Compability Matrix for details on the different plugin versions
and compability informaon.
If you have a version of a plugin currently installed and you Install a new version of the
plugin, Panorama replaces the currently installed version.
Panorama Administrator's Guide Version Version 10.1 588 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
When installing the plugin for the first me on a Panorama HA pair, install the plugin
on the passive peer before the acve peer. On installing the plugin on the passive peer,
it transions to a non-funconal state. Then, aer you successfully install the plugin on
the acve peer, the passive peer returns to a funconal state.
Panorama Administrator's Guide Version Version 10.1 589 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
The VM-Series plugin supports all clouds, so an upgrade might not apply to your VM-
Series firewalls. Before upgrading the plugin, consult the release notes. Update the plugin
only when there are changes relevant to your cloud.
Panorama Administrator's Guide Version Version 10.1 590 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
STEP 3 | (Oponal) Save your configuraon and push it to your managed firewalls.
STEP 4 | (Oponal) On the VM-Series firewall, select Device > VM-Series. If you have configured
the integraon for your plaorm, you see a single tab for the cloud in which the firewall is
deployed. If you have not configured an integraon, you see the default message about the
VM-Series plugin infrastructure.
Panorama Administrator's Guide Version Version 10.1 591 ©2022 Palo Alto Networks, Inc.
Panorama Plugins
Panorama Administrator's Guide Version Version 10.1 592 ©2022 Palo Alto Networks, Inc.
Troubleshoong
The following topics address issues for the Panorama™ management server and
Dedicated Log Collectors:
> Troubleshoot Panorama System > Troubleshoot Device Management
Issues License Errors
> Troubleshoot Log Storage and > Troubleshoot Automacally Reverted
Connecon Issues Firewall Configuraons
> Replace an RMA Firewall > View Task Success or Failure Status
> Troubleshoot Commit Failures > Test Policy Match and Connecvity
> Troubleshoot Registraon or Serial for Managed Devices
Number Errors > Generate a Stats Dump File for a
> Troubleshoot Reporng Errors Managed Firewall
> Recover Managed Device
Connecvity to Panorama
593
Troubleshoong
STEP 3 | Upload the file to your case on the Palo Alto Networks Customer Support web site.
Panorama Administrator's Guide Version Version 10.1 594 ©2022 Palo Alto Networks, Inc.
Troubleshoong
as part of the soware installaon process to ensure the PAN-OS soware integrity. This ensures
that the now running soware update is known good and that the Panorama or managed firewall
are not compromised to due remote or physical exploitaon.
To view the progress on the FSCK, set up console access to Panorama and view the status.
Panorama Administrator's Guide Version Version 10.1 595 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama Administrator's Guide Version Version 10.1 596 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama Administrator's Guide Version Version 10.1 597 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama and Log 3978 3978 3978 For management and log
Collector collecon/reporng.
Direcon: Iniated by the Used for communicaon
Log Collector between the local Log
Collector on a Panorama
in Panorama mode,
and for communicang
with Log Collectors in a
distributed log collecon
deployment.
Panorama Administrator's Guide Version Version 10.1 598 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Log Collector to Log 49190 28270 28270 For distribung blocks and
Collector all binary data between
Log Collectors.
Direcon: Each Log
Collector iniates a
connecon to the other
Log Collectors in the
Collector Group
Panorama Administrator's Guide Version Version 10.1 599 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | Commit the changes to Panorama and push the changes to the Collector Group.
1. Select Commit > Commit and Push and Edit Selecons in the Push Scope.
2. Select Collector Groups, select the Collector Group you modified, and click OK.
3. Commit and Push your changes.
STEP 3 | Verify the state of the Log Collectors and disk pairs.
1. Select Panorama > Managed Collectors and verify that the configuraon of each Log
Collector is synchronized with Panorama.
The Configuraon Status column should display In Sync and the Run Time Status column
should display connected.
2. Click Stascs in the last column for each Log Collector and verify that the disk pairs are
Enabled and Available.
On the Panorama virtual appliance in Legacy mode, you will lose the logs on the exisng
disk when you replace it. For the opons to preserve exisng logs, see Preserve Exisng
Logs When Adding Storage on Panorama Virtual Appliance in Legacy Mode.
Panorama Administrator's Guide Version Version 10.1 600 ©2022 Palo Alto Networks, Inc.
Troubleshoong
On the Panorama virtual appliance in Legacy mode, you will lose the logs on the exisng
disk when you replace it. For the opons to preserve exisng logs, see Preserve Exisng
Logs When Adding Storage on Panorama Virtual Appliance in Legacy Mode.
Panorama Administrator's Guide Version Version 10.1 601 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Migrang logs by removing the logging disks from any M-Series appliance and loading
them into an M-600 Panorama management server is not supported. To migrate to an
M-600 appliance, set up the M-600 appliance, configure log forwarding to the new
M-600 appliance and configure the M-Series appliance as a managed Log Collector
unl you no longer needed access to the logs stored on the M-Series appliance.
STEP 1 | Perform inial setup of the new M-Series appliance that will be a Dedicated Log Collector.
1. Rack mount the M-Series appliance. Refer to the M-Series Appliance Hardware
Reference Guides for instrucons.
2. Perform Inial Configuraon of the M-Series Appliance.
Panorama Administrator's Guide Version Version 10.1 602 ©2022 Palo Alto Networks, Inc.
Troubleshoong
If the new M-Series appliance is a different model than the old M-Series appliance, you
must purchase new licenses.
1. Log in to the Palo Alto Networks Customer Support web site.
2. Select the Assets tab and click the Spares link.
3. Click the Serial Number of the new M-Series appliance.
4. Click Transfer Licenses.
5. Select the old M-Series appliance and click Submit.
5. Acvate a firewall management license. If you are migrang from an M-100 appliance to
a M-500 appliance, enter the auth-code associated with the migraon license.
6. Install Content and Soware Updates for Panorama. For important details about
soware versions, see Panorama, Log Collector, Firewall, and WildFire Version
Compability.
7. Switch from Panorama mode to Log Collector mode:
1. Access the Log Collector CLI and switch to Log Collector mode:
2. Enter Y to confirm the mode change. The M-Series appliance reboots. If the reboot
process terminates your terminal emulaon soware session, reconnect to the M-
Series appliance to display the Panorama login prompt.
If you see a CMS Login prompt, press Enter without typing a username or
password.
8. Use the Log Collector CLI to enable connecvity between the Log Collector and
Panorama management server. <IPaddress1 is for the MGT interface of the primary
Panorama and <IPaddress2> is for the MGT interface of the secondary Panorama.
> configure
# set deviceconfig system panorama-server <IPaddress1>
panorama-server-2 <IPaddress2>
# commit
# exit
STEP 2 | On the Panorama management server, add the new Log Collector as a managed collector.
For all steps with commands that require a serial number, you must type the enre
serial number; pressing the Tab key won’t complete a paral serial number.
1. Configure the Log Collector as a managed collector using the Panorama web interface or
using the following CLI commands:
> configure
# set log-collector <LC_serial_number> deviceconfig system
hostname <LC_hostname>
Panorama Administrator's Guide Version Version 10.1 603 ©2022 Palo Alto Networks, Inc.
Troubleshoong
# exit
If the old Log Collector used interfaces other than the MGT interface for log
collecon and Collector Group communicaon, you must define those interfaces
on the new Log Collector when you configure it as a managed collector
(Panorama > Managed Collectors > Interfaces).
2. Verify that the Log Collector is connected to Panorama and that the status of its disk
pairs is present/available.
The disk pairs will display as disabled at this stage of the restoraon process.
3. Commit your changes to Panorama. Don’t commit the changes to the Collector Group
just yet.
> configure
# commit
# exit
STEP 3 | Remove the RAID disks from the old Log Collector.
1. Power off the old Log Collector by pressing the Power buon unl the system shuts
down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-
Series Appliance Hardware Reference Guides.
Generang the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long me to complete. To expedite the process,
you can launch mulple CLI sessions and run the metadata regeneraon command
in each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Insert the disks into the new Log Collector. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompable with those of the
M-500 appliance. Therefore, when migrang between these hardware models,
you must unscrew each disk from its old carrier and insert the disk in the new
carrier before inserng the disk in the new appliance.
You must maintain the disk pair associaon. Although you can place a disk pair from
slot A1/A2 on the old appliance into slot B1/B2 on the new appliance, you must keep
Panorama Administrator's Guide Version Version 10.1 604 ©2022 Palo Alto Networks, Inc.
Troubleshoong
the disks together in the same slot; otherwise, Panorama might not restore the data
successfully.
2. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates
the disk pair with the new Log Collector. The no-format argument prevents
reformang of the drives and retains the logs stored on the disks.
3. Generate the metadata for each disk pair.
For example:
From this point, only commits that are required to complete the migraon process on
Panorama and the Log Collectors. Hold off making any other changes.
You must use the Panorama CLI for this step, not the web interface.
You must assign the new Log Collector to the Collector Group that contains the old Log
Collector.
1. Assign the new Log Collector to the Collector Group and commit your changes to
Panorama.
> configure
# set log-collector-group <collector_group_name> logfwd-
setting collectors <new_LC_serial_number>
# commit
Panorama Administrator's Guide Version Version 10.1 605 ©2022 Palo Alto Networks, Inc.
Troubleshoong
# exit
2. For each disk pair, migrate the logs from the old Log Collector to the new Log Collector
and aach the disk pair to the new Log Collector.
For example:
You cannot use the CLI change the priority assignments of firewall preference
lists.
2. Delete the old Log Collector from the Collector Group.
> configure
# delete log-collector-group <group_name> logfwd-setting
collectors <old_LC_serial_number>
For example:
3. Delete the old Log Collector from the Panorama configuraon and commit your changes
to Panorama.
Panorama Administrator's Guide Version Version 10.1 606 ©2022 Palo Alto Networks, Inc.
Troubleshoong
# exit
4. Commit the Collector Group changes so that the managed firewalls can send logs to the
new Log Collector.
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the exisng RSA keys and allows Panorama to create new RSA keys.
Panorama Administrator's Guide Version Version 10.1 607 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 9 | Confirm that SearchEngine Status is Acve for all Log Collectors in the Collector Group.
Do not connue unl SearchEngine Status is Acve for all Log Collectors in the
Collector Group. This will result in purging of logs from the Log Collector being replaced.
Alternavely, you can run the following command on each Dedicated Log
Collector:
STEP 10 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number
so that the new Log Collector will not run in to purging issues, resulng in the Log Collector
being unable to purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-
serial-number> to <new-log-collector-serial-number>
Panorama Administrator's Guide Version Version 10.1 608 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Migrang logs by removing the logging disks from any M-Series appliance and loading
them into an M-600 Panorama management server is not supported. To migrate to an
M-600 appliance, set up the M-600 appliance, configure log forwarding to the new
M-600 appliance and configure the M-Series appliance as a managed Log Collector
unl you no longer needed access to the logs stored on the M-Series appliance.
This migraon procedure covers the following scenarios where you are replacing a single M-Series
appliance, not in a HA configuraon, with a managed collector (Log Collector) in a Collector Group.
STEP 1 | Forward any logs on the SSD of the old M-Series appliance to an external desnaon if you
want to preserve them.
The SSD stores the System and Config logs that Panorama and Log Collectors generate. You
cannot move the SSD between M-Series appliances.
Configure Log Forwarding from Panorama to External Desnaons.
STEP 2 | Export the Panorama configuraon from the decommissioned M-Series appliance in
Panorama mode.
1. Log in to the Panorama appliance and select Panorama > Setup > Operaons.
2. Click Save named Panorama configuraon snapshot, enter a Name to idenfy the
configuraon, and click OK.
3. Click Export named Panorama configuraon snapshot, select the Name of the
configuraon you just saved, and click OK. Panorama exports the configuraon to your
client system as an XML file.
STEP 3 | Remove the RAID disks from the old M-Series appliance.
1. Power off the old M-Series appliance by pressing the Power buon unl the system
shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-
Series Appliance Hardware Reference Guides.
Panorama Administrator's Guide Version Version 10.1 609 ©2022 Palo Alto Networks, Inc.
Troubleshoong
If the new M-Series appliance is a different model than the old M-Series appliance, you
must purchase new licenses.
1. Log in to the Palo Alto Networks Customer Support web site.
2. Select the Assets tab and click the Spares link.
3. Click the Serial Number of the new M-Series appliance.
4. Click Transfer Licenses.
5. Select the old M-Series appliance and click Submit.
5. Acvate a firewall management license. If you are migrang from an M-100 appliance to
an M-500 appliance, enter the auth-code associated with the migraon license.
6. Install Content and Soware Updates for Panorama. For important details about
soware versions, see Panorama, Log Collector, Firewall, and WildFire Version
Compability.
STEP 5 | Load the Panorama configuraon snapshot that you exported from the decommissioned M-
Series appliance into the new M-Series appliance in Panorama mode.
1. Log in to the Panorama Web Interface of the new M-Series appliance and select
Panorama > Setup > Operaons.
2. Click Import named Panorama configuraon snapshot, Browse to the configuraon file
you exported from the decommissioned M-Series appliance, and click OK.
3. Click Load named Panorama configuraon snapshot, select the Name of the
configuraon you just imported, select a Decrypon Key (the master key for Panorama),
and click OK. Panorama overwrites its current candidate configuraon with the loaded
configuraon. Panorama displays any errors that occur when loading the configuraon
file. If errors occurred, save them to a local file. Resolve each error to ensure the
migrated configuraon is valid.
To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load
the named Panorama configuraon snapshot. If you do not select this opon,
Panorama removes all previous rule UUIDs from the configuraon snapshot and
assigns new UUIDs to the rules on Panorama, which means it does not retain
informaon associated with the previous UUIDs, such as the policy rule hit
count.
4. Perform any addional configuraon changes as needed.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collecon), you must define those interfaces on
the new M-Series appliance (Panorama > Setup > Interfaces).
5. Select Commit > Commit to Panorama and Validate Commit. Resolve any errors before
proceeding.
6. Commit your changes to the Panorama configuraon.
Panorama Administrator's Guide Version Version 10.1 610 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 6 | Insert the disks into the new M-Series appliance. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompable with those of the M-500
appliance. Therefore, when migrang between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserng the disk in the new appliance.
You must maintain the disk pair associaon. Although you can place a disk pair from slot A1/A2
on the old appliance into slot B1/B2 on the new appliance, you must keep the disks together in
the same slot; otherwise, Panorama might not restore the data successfully.
STEP 7 | Contact Palo Alto Networks Customer Support to copy log collector group metadata from
the decommissioned M-Series appliance to the new M-Series appliance and restart the
mgmtsrvr process.
STEP 8 | If the M-Series appliance was part of a Collector Group, verify that the decommissioned M-
Series appliance serial number is sll part of the correct Collector Group:
debug log-collector-group show name <Log Collector Group name>
If the decommissioned M-Series appliance serial number is no longer a part of the correct
Collector Group, then the Tech Support folders were incorrectly copied in the previous step.
Contact Palo Alto Networks Customer Support again to copy the Tech Support folders to the
correct locaon.
Generang the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long me to complete. To expedite the process,
you can launch mulple CLI sessions and run the metadata regeneraon command
in each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Insert the disks into the new M-Series appliance. For details, refer to the disk
replacement procedure in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompable with those of the
M-500 appliance. Therefore, when migrang between these hardware models,
you must unscrew each disk from its old carrier and insert the disk in the new
carrier before inserng the disk in the new appliance.
You must maintain the disk pair associaon. Although you can place a disk pair from
slot A1/A2 on the old appliance into slot B1/B2 on the new appliance, you must keep
Panorama Administrator's Guide Version Version 10.1 611 ©2022 Palo Alto Networks, Inc.
Troubleshoong
the disks together in the same slot; otherwise, Panorama might not restore the data
successfully.
2. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk
pair with the new appliance. The no-format argument prevents reformang of the drives
and retains the logs stored on the disks.
3. Generate the metadata for each disk pair.
This step may take up to 6 hours depending on the volume of log data on the
disks.
For example:
STEP 10 | Configure the local Log Collector on the new M-Series appliance.
For all steps with commands that require a serial number, you must type the enre
serial number; pressing the Tab key won’t complete a paral serial number.
Don’t enable the disks on the new M-Series appliance at this point. When you successfully
migrate the logs, Panorama automacally enables the disks.
1. Configure the local Log Collector as a managed collector using the Panorama web
interface or using the following CLI commands:
admin> configure
admin# set log-collector <log-collector_SN> deviceconfig
system hostname <log-collector-hostname>
Panorama Administrator's Guide Version Version 10.1 612 ©2022 Palo Alto Networks, Inc.
Troubleshoong
admin# exit
2. Verify that the local Log Collector is connected to Panorama and that the status of its
disk pairs is present/available.
The disk pairs will display as disabled at this stage of the restoraon process.
3. Commit your changes to Panorama. Don’t commit the changes to the Collector Group
just yet.
admin> configure
admin# commit
From this point, only commits that are required to complete the migraon process on
Panorama and the Log Collectors. Hold off making any other changes.
admin> configure
admin# commit force
Panorama Administrator's Guide Version Version 10.1 613 ©2022 Palo Alto Networks, Inc.
Troubleshoong
admin# exit
The old local Log Collector sll appears in the list of members, because you haven’t
deleted it from the configuraon.
3. For each disk pair, migrate the logs to the new appliance.
For example:
admin> configure
admin# commit
You cannot use the CLI change the priority assignments of firewall preference
lists.
2. Access the Panorama CLI of the new M-Series appliance.
3. Delete the old Log Collector from the Collector Group.
For example:
4. Delete the old Log Collector from the Panorama configuraon and commit your changes
to Panorama.
Panorama Administrator's Guide Version Version 10.1 614 ©2022 Palo Alto Networks, Inc.
Troubleshoong
admin# exit
5. Commit the Collector Group changes so that the managed firewalls can send logs to the
new Log Collector.
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the exisng RSA keys and allows Panorama to create new RSA keys.
Panorama Administrator's Guide Version Version 10.1 615 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 15 | Confirm that SearchEngine Status is Acve for all Log Collectors in the Collector Group.
Do not connue unl SearchEngine Status is Acve for all Log Collectors in the
Collector Group. This will result in purging of logs from the Log Collector being replaced.
Alternavely, you can run the following command on each Dedicated Log
Collector:
STEP 16 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number
so that the new Log Collector will not run in to purging issues, resulng in the Log Collector
being unable to purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-
serial-number> to <new-log-collector-serial-number>
Panorama Administrator's Guide Version Version 10.1 616 ©2022 Palo Alto Networks, Inc.
Troubleshoong
to and from an M-500 appliance. M-100 and M-500 appliances cannot be migrated to or from
M-200 or M-600 appliances.
Migrang logs by removing the logging disks from any M-Series appliance and loading
them into an M-600 Panorama management server is not supported. To migrate to an
M-600 appliance, set up the M-600 appliance, configure log forwarding to the new
M-600 appliance and configure the M-Series appliance as a managed Log Collector
unl you no longer needed access to the logs stored on the M-Series appliance.
• Both Panorama HA peers have managed collectors that belong to a single Collector Group. For
details, see Mulple Local Log Collectors Per Collector Group.
• Both Panorama HA peers have a managed collector and each is assigned to a separate
Collector Group. For details, see Single Local Log Collector Per Collector Group.
STEP 1 | Forward any logs on the SSD of the old M-Series appliance to an external desnaon if you
want to preserve them.
The SSD stores the System and Config logs that Panorama and Log Collectors generate. You
cannot move the SSD between M-Series appliances.
Configure Log Forwarding from Panorama to External Desnaons.
Panorama Administrator's Guide Version Version 10.1 617 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | Export the Panorama configuraon from the Primary decommissioned M-Series appliance in
Panorama mode.
1. Log in to the Panorama Web Interface of the M-Series appliance you are replacing and
select Panorama > Setup > Operaons.
2. Click Save named Panorama configuraon snapshot, enter a Name to idenfy the
configuraon, and click OK.
3. Click Export named Panorama configuraon snapshot, select the Name of the
configuraon you just saved, and click OK. Panorama exports the configuraon to your
client system as an XML file.
STEP 3 | Remove the RAID disks from the old M-Series appliance.
1. Power off the old M-Series appliance by pressing the Power buon unl the system
shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-
Series Appliance Hardware Reference Guides.
Panorama Administrator's Guide Version Version 10.1 618 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 5 | Load the Panorama configuraon snapshot that you exported from the Primary
decommissioned M-Series appliance into the new Primary M-Series appliance in Panorama
mode.
1. Log in to the Panorama Web Interface of the new M-Series appliance and select
Panorama > Setup > Operaons.
2. Click Import named Panorama configuraon snapshot, Browse to the configuraon file
you exported from the decommissioned M-Series appliance, and click OK.
3. Click Load named Panorama configuraon snapshot, select the Name of the
configuraon you just imported, select a Decrypon Key (the master key for Panorama),
and click OK. Panorama overwrites its current candidate configuraon with the loaded
configuraon. Panorama displays any errors that occur when loading the configuraon
file. If errors occurred, save them to a local file. Resolve each error to ensure the
migrated configuraon is valid.
To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load
the named Panorama configuraon snapshot. If you do not select this opon,
Panorama removes all previous rule UUIDs from the configuraon snapshot and
assigns new UUIDs to the rules on Panorama, which means it does not retain
informaon associated with the previous UUIDs, such as the policy rule hit
count.
4. Perform any addional configuraon changes as needed.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collecon), you must define those interfaces on
the new M-Series appliance (Panorama > Setup > Interfaces).
5. Select Commit > Commit to Panorama and Validate Commit. Resolve any errors before
proceeding.
6. Commit your changes to the Panorama configuraon. Once commied, the Panorama
configuraon is synced across the HA peers.
STEP 6 | Insert the disks into the new M-Series appliance. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
Repeat this step for each of the new M-Series appliances in the HA configuraon.
The disk carriers of the M-100 appliance are incompable with those of the M-500
appliance. Therefore, when migrang between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserng the disk in the new appliance.
You must maintain the disk pair associaon. Although you can place a disk pair from slot A1/A2
on the old appliance into slot B1/B2 on the new appliance, you must keep the disks together in
the same slot; otherwise, Panorama might not restore the data successfully.
STEP 7 | Contact Palo Alto Networks Customer Support to copy log collector group metadata from
the decommissioned M-Series appliance to the new M-Series appliance and restart the
mgmtsrvr process.
Panorama Administrator's Guide Version Version 10.1 619 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 8 | If the M-Series appliance was part of a Collector Group, verify that the decommissioned M-
Series appliance serial number is sll part of the correct Collector Group:
debug log-collector-group show name <Log CollectorGroup name>
If the decommissioned M-Series appliance serial number is no longer a part of the correct
Collector Group, then the Tech Support folders were incorrectly copied in the previous step.
Contact Palo Alto Networks Customer Support again to copy the Tech Support folders to the
correct locaon.
Generang the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long me to complete. To expedite the process,
you can launch mulple CLI sessions and run the metadata regeneraon command
in each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk
pair with the new appliance. The no-format argument prevents reformang of the drives
and retains the logs stored on the disks.
2. Generate the metadata for each disk pair.
This step may take up to 6 hours depending on the volume of log data on the
disks.
For example:
Panorama Administrator's Guide Version Version 10.1 620 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 10 | Configure the local Log Collector on the new M-Series appliance.
For all steps with commands that require a serial number, you must type the enre
serial number; pressing the Tab key won’t complete a paral serial number.
Don’t enable the disks on the new M-Series appliance at this point. When you successfully
migrate the logs, Panorama automacally enables the disks.
1. Configure the local Log Collector as a managed collector using the Panorama web
interface or using the following CLI commands:
admin> configure
admin# set log-collector <log-collector_SN> deviceconfig
system hostname <log-collector-hostname>
admin# exit
2. Commit your changes to Panorama. Don’t commit the changes to the Collector Group
just yet.
admin> configure
admin# commit
3. Verify that the local Log Collector is connected to Panorama and that the status of its
disk pairs is present/available.
The disk pairs will display as disabled at this stage of the restoraon process.
From this point, only commits that are required to complete the migraon process on
Panorama and the Log Collectors. Hold off making any other changes.
admin> configure
admin# commit force
Panorama Administrator's Guide Version Version 10.1 621 ©2022 Palo Alto Networks, Inc.
Troubleshoong
The old local Log Collector sll appears in the list of members, because you haven’t
deleted it from the configuraon.
3. For each disk pair, migrate the logs to the new appliance.
For example:
admin> configure
admin# commit
Panorama Administrator's Guide Version Version 10.1 622 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Log Forwarding). Give the new Log Collector the same priority in the firewall preference
lists as the old Log Collector.
You cannot use the CLI change the priority assignments of firewall preference
lists.
2. Access the Panorama CLI of the new M-Series appliance.
3. Delete the old Log Collector from the Collector Group.
For example:
4. Delete the old Log Collector from the Panorama configuraon and commit your changes
to Panorama.
5. Commit the Collector Group changes so that the managed firewalls can send logs to the
new Log Collector.
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the exisng RSA keys and allows Panorama to create new RSA keys.
Panorama Administrator's Guide Version Version 10.1 623 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 15 | Confirm that SearchEngine Status is Acve for all Log Collectors in the Collector Group.
Do not connue unl SearchEngine Status is Acve for all Log Collectors in the
Collector Group. This will result in purging of logs from the Log Collector being replaced.
Alternavely, you can run the following command on each Dedicated Log
Collector:
STEP 16 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number
so that the new Log Collector will not run in to purging issues, resulng in the Log Collector
being unable to purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-
serial-number> to <new-log-collector-serial-number>
Panorama Administrator's Guide Version Version 10.1 624 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama Administrator's Guide Version Version 10.1 625 ©2022 Palo Alto Networks, Inc.
Troubleshoong
• Both Panorama HA peers have managed collectors that belong to a single Collector Group. For
details, see Mulple Local Log Collectors Per Collector Group.
• Both Panorama HA peers have a managed collector and each is assigned to a separate
Collector Group. For details, see Single Local Log Collector Per Collector Group.
STEP 1 | Forward any logs on the SSD of the old M-Series appliance to an external desnaon if you
want to preserve them.
The SSD stores the System and Config logs that Panorama and Log Collectors generate. You
cannot move the SSD between M-Series appliances.
Configure Log Forwarding from Panorama to External Desnaons.
STEP 2 | Remove the RAID disks from the old M-Series appliance.
1. Power off the old M-Series appliance by pressing the Power buon unl the system
shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-
Series Appliance Hardware Reference Guides.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collecon), you must define those interfaces
during inial configuraon of the new M-Series appliance (Panorama > Setup >
Interfaces).
3. Register Panorama.
4. Purchase and acvate a Panorama support license or transfer licenses as follows only if
the new M-Series appliance is the same hardware model as the old M-Series appliance.
Panorama Administrator's Guide Version Version 10.1 626 ©2022 Palo Alto Networks, Inc.
Troubleshoong
If the new M-Series appliance is a different model than the old M-Series appliance, you
must purchase new licenses.
1. Log in to the Palo Alto Networks Customer Support web site.
2. Select the Assets tab and click the Spares link.
3. Click the Serial Number of the new M-Series appliance.
4. Click Transfer Licenses.
5. Select the old M-Series appliance and click Submit.
5. Acvate a firewall management license. If you are migrang from an M-100 appliance to
an M-500 appliance, enter the auth-code associated with the migraon license.
6. Install Content and Soware Updates for Panorama. For important details about
soware versions, see Panorama, Log Collector, Firewall, and WildFire Version
Compability.
7. Perform any addional configuraon changes as needed.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collecon), you must define those interfaces on
the new M-Series appliance (Panorama > Setup > Interfaces).
8. Set Up HA on Panorama. The new M-Series appliance must have the same priority as the
HA peer you are replacing.
STEP 4 | Insert the disks into the new M-Series appliance. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompable with those of the M-500
appliance. Therefore, when migrang between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserng the disk in the new appliance.
You must maintain the disk pair associaon. Although you can place a disk pair from slot A1/A2
on the old appliance into slot B1/B2 on the new appliance, you must keep the disks together in
the same slot; otherwise, Panorama might not restore the data successfully.
STEP 5 | If the M-Series appliance was part of a Collector Group, verify that the decommissioned M-
Series appliance serial number is sll part of the correct Collector Group:
debug log-collector-group show name <Log CollectorGroup name>
Panorama Administrator's Guide Version Version 10.1 627 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Generang the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long me to complete. To expedite the process,
you can launch mulple CLI sessions and run the metadata regeneraon command
in each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk
pair with the new appliance. The no-format argument prevents reformang of the drives
and retains the logs stored on the disks.
2. Generate the metadata for each disk pair.
For example:
STEP 7 | Configure the local Log Collector on the new M-Series appliance.
For all steps with commands that require a serial number, you must type the enre
serial number; pressing the Tab key won’t complete a paral serial number.
Don’t enable the disks on the new M-Series appliance at this point. When you successfully
migrate the logs, Panorama automacally enables the disks.
1. Configure the local Log Collector as a managed collector using the Panorama web
interface or using the following CLI commands:
admin> configure
admin# set log-collector <log-collector_SN> deviceconfig
system hostname <log-collector-hostname>
admin# exit
2. Commit your changes to Panorama. Don’t commit the changes to the Collector Group
just yet.
admin> configure
Panorama Administrator's Guide Version Version 10.1 628 ©2022 Palo Alto Networks, Inc.
Troubleshoong
admin# commit
3. Verify that the local Log Collector is connected to Panorama and that the status of its
disk pairs is present/available.
The disk pairs will display as disabled at this stage of the restoraon process.
From this point, only commits that are required to complete the migraon process on
Panorama and the Log Collectors. Hold off making any other changes.
admin> configure
admin# commit force
Panorama Administrator's Guide Version Version 10.1 629 ©2022 Palo Alto Networks, Inc.
Troubleshoong
admin# exit
The old local Log Collector sll appears in the list of members, because you haven’t
deleted it from the configuraon.
3. For each disk pair, migrate the logs to the new appliance.
For example:
admin> configure
admin# commit
You cannot use the CLI change the priority assignments of firewall preference
lists.
2. Delete the old Log Collector from the Collector Group.
For example:
3. Delete the old Log Collector from the Panorama configuraon and commit your changes
to Panorama.
Panorama Administrator's Guide Version Version 10.1 630 ©2022 Palo Alto Networks, Inc.
Troubleshoong
admin# exit
5. Commit the Collector Group changes so that the managed firewalls can send logs to the
new Log Collector.
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the exisng RSA keys and allows Panorama to create new RSA keys.
Panorama Administrator's Guide Version Version 10.1 631 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 12 | Confirm that SearchEngine Status is Acve for all Log Collectors in the Collector Group.
Do not connue unl SearchEngine Status is Acve for all Log Collectors in the
Collector Group. This will result in purging of logs from the Log Collector being replaced.
Alternavely, you can run the following command on each Dedicated Log
Collector:
STEP 13 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number
so that the new Log Collector will not run in to purging issues, resulng in the Log Collector
being unable to purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-
serial-number> to <new-log-collector-serial-number>
Panorama Administrator's Guide Version Version 10.1 632 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama maintains a ring file that maps the segments and parons that Dedicated Log
Collectors use to store logs. An M-Series appliance in Panorama mode stores the ring file on its
internal SSD; a Panorama virtual appliance stores the ring file on its internal disk. When a system
failure occurs, a non-HA Panorama cannot automacally recover the ring file. Therefore, when
you replace Panorama, you must restore the ring file to access the logs on the Dedicated Log
Collectors.
This procedure requires that you backed up and exported your Panorama configuraon
before the system failure occurred.
Palo Alto Networks recommends deploying Panorama in an HA configuraon. The acve
Panorama peer automacally synchronizes the ring file to the passive peer in an HA
configuraon, thereby maintaining access to logs on the Dedicated Log Collectors even if
you must replace one of the peers.
Panorama Administrator's Guide Version Version 10.1 633 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Hardware Reference Guides for instrucons on how to rack mount the new M-Series
appliance.
2. Perform Inial Configuraon of the M-Series Appliance or Perform Inial Configuraon
of the Panorama Virtual Appliance.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collecon), you must define those interfaces
during inial configuraon of the new M-Series appliance (Panorama > Setup
> Interfaces). The Panorama virtual appliance does not support interfaces other
than MGT.
3. Register Panorama.
4. Transfer licenses as follows only if the new Panorama appliance is the same model as the
old appliance. Otherwise, you must purchase new licenses.
1. Log in to the Palo Alto Networks Customer Support web site.
2. Select the Assets tab and click the Spares link.
3. Click the Serial Number of the new M-Series appliance.
4. Click Transfer Licenses.
5. Select the old appliance and click Submit.
5. Acvate a Panorama Support License.
6. Acvate a firewall management license.
7. Install Content and Soware Updates for Panorama.
The M-500 appliance requires Panorama 7.0 or a later release. M-200 and
M-600 appliances require Panorama 8.1. For important details about soware
versions, see Panorama, Log Collector, Firewall, and WildFire Version
Compability.
Panorama Administrator's Guide Version Version 10.1 634 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | Restore the configuraon from the old Panorama to the replacement Panorama.
1. Log in to the new Panorama and select Panorama > Setup > Operaons.
2. Click Import named Panorama configuraon snapshot, Browse to the backup
configuraon file, and click OK.
3. Click Load named Panorama configuraon snapshot, select the Name of the file you just
imported, and click OK.
To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load
the named Panorama configuraon snapshot. If you do not select this opon,
Panorama removes all previous rule UUIDs from the configuraon snapshot and
assigns new UUIDs to the rules on Panorama, which means it does not retain
informaon associated with the previous UUIDs, such as the policy rule hit
count.
4. Select Commit > Commit to Panorama and Commit your changes.
5. Select Panorama > Managed Collectors and verify that the Connected column displays a
check mark for the Dedicated Log Collector.
If the Dedicated Log Collector doesn’t appear, you must reconfigure it and its Collector
Group as described in the next step. Otherwise, skip the following step to Fetch the ring
file to restore access to the logs stored on the Dedicated Log Collector.
STEP 3 | Reconfigure the Dedicated Log Collector and Collector Group if they are missing on
Panorama.
1. Access the CLI of the Dedicated Log Collector and enter the following commands to
display the name of its Collector Group.
1. Enter the command:
Panorama Administrator's Guide Version Version 10.1 635 ©2022 Palo Alto Networks, Inc.
Troubleshoong
In this example, the error message indicates that the missing Collector Group has the
name CA-Collector-Group.
2. Configure the Collector Group and assign the Dedicated Log Collector to it.
> configure
# set log-collector-group <collector-group-name>
# set log-collector-group <collector-group-name> logfwd-
setting
collector <serial-number>
# commit
# exit
STEP 4 | Fetch the ring file to restore access to the logs stored on the Dedicated Log Collector.
1. Access the CLI of the new Panorama.
2. Fetch the ring file:
For example:
If you don’t know the serial number of the Dedicated Log Collector, log in to its
CLI and enter the show system info operaonal command.
3. Commit your changes to the Collector Group.
Panorama Administrator's Guide Version Version 10.1 636 ©2022 Palo Alto Networks, Inc.
Troubleshoong
For example:
The size of the RAID disks determines how long metadata regeneraon takes. On average, it
takes an hour for every 100GB. When you run the command, the CLI session is locked unl the
command is fully executed. You can use mulple CLI sessions to save me. For example, to replace
four RAID pairs of 1TB drives with a total of 4TB of log data, launch four CLI sessions and run the
command in each session to regenerate metadata simultaneously for all the pairs/slots in about 10
hours.
During metadata regeneraon, the Collector Group to which these disks belong is not available
and the disk pair is not available for any logging or reporng operaons (writes/queries). However,
you can perform other tasks such as handling new firewall connecons or managing configuraon
changes on the managed firewalls. All other Collector Groups that Panorama manages and that
aren’t part of this RMA process can perform the assigned logging and reporng funconality as
normal.
Panorama Administrator's Guide Version Version 10.1 637 ©2022 Palo Alto Networks, Inc.
Troubleshoong
logs queried, how long (in ms) it took for the query to return results, the admin that executed
the query. and any filters applied to the query.
STEP 3 | View details log query informaon about a specific job using the job ID.
Panorama Administrator's Guide Version Version 10.1 638 ©2022 Palo Alto Networks, Inc.
Troubleshoong
In an LSVPN setup, the paral device state bundle that you generate on Panorama is
not the same as the version that you export from a firewall (by selecng Device > Setup
> Operaons and clicking Export device state). If you manually ran the device state
export or scheduled an XML API script to export the file to a remote server, you can use
the exported device state in your firewall replacement workflow.
If you did not export the device state, the device state that you generate in the
replacement workflow will not include the dynamic configuraon informaon, such as
the cerficate details and registered firewalls, that is required to restore the complete
configuraon of a firewall funconing as an LSVPN portal. See Before Starng RMA
Firewall Replacement for more informaon.
Panorama does not store the device state; you generate it on request using the CLI commands
listed in Restore the Firewall Configuraon aer Replacement.
Panorama Administrator's Guide Version Version 10.1 639 ©2022 Palo Alto Networks, Inc.
Troubleshoong
You will also enter this informaon on Panorama, to replace all references to the old serial
number with the new serial number of the replacement firewall.
• (Recommended) PAN-OS version and the content database version—Installing the same
soware and content database versions, including the URL database vendor, enables you to
create the same state on the replacement firewall. If you decide to install the latest version
of the content database, you might noce differences because of updates and addions to
the database. To determine the versions installed on the firewall, access the firewall System
logs stored on Panorama.
Prepare the replacement firewall for deployment. Before you import the device state bundle
and restore the configuraon, you must:
• Verify that the replacement firewall is the same model as the old firewall and is enabled
for similar operaonal capability. Consider the following operaonal features: must the
replacement firewall have mulple virtual systems, support jumbo frames support, or
operate in CC or FIPS mode?
• Configure network access, transfer the licenses, and install the appropriate PAN-OS and
content database versions.
You must use the Panorama CLI to complete this firewall replacement process, and therefore
your administrator account must have the superuser or panorama-admin user role.
If you have an LSVPN configuraon, and are replacing a Palo Alto Networks firewall deployed
as a satellite or as an LSVPN portal, the dynamic configuraon informaon that is required
to restore LSVPN connecvity will not be available when you restore the paral device state
generated on Panorama. If you followed the recommendaon to frequently generate and
export the device state for firewalls in an LSVPN configuraon, use the device state that you
previously exported from the firewall itself instead of generang one on Panorama.
If you have not manually exported the device state from the firewall, and need to generate
a paral device state on Panorama, the missing dynamic configuraon impacts the firewall
replacement process as follows:
• If the firewall you are replacing is a GlobalProtect portal that is explicitly configured
with the serial number of the satellites (Network > GlobalProtect > Portals > Satellite
Configuraon), when restoring the firewall configuraon, although the dynamic
configuraon is lost, the portal firewall will be able to authencate the satellites successfully.
The successful authencaon will populate the dynamic configuraon informaon and
LSVPN connecvity will be reinstated.
• If you are replacing a satellite firewall, it will not be able to connect and authencate to the
portal. This failure occurs either because the serial number was not explicitly configured
on the firewall (Network > GlobalProtect > Portals > Satellite Configuraon) or, if the
serial number was explicitly configured, because the serial number of the replaced firewall
does not match that of the old firewall. To restore connecvity aer imporng the device
state bundle, the satellite administrator must log in to the firewall and enter the credenals
(username and password) for authencang to the portal. Aer authencaon, the dynamic
configuraon required for LSVPN connecvity is generated on the portal.
However, if the firewall was configured in a high availability configuraon, aer restoring the
configuraon, the firewall will automacally synchronize the running configuraon with its peer
and aain the latest dynamic configuraon required to funcon seamlessly.
Panorama Administrator's Guide Version Version 10.1 640 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | (Oponal) Set the Operaonal mode on the new firewall to match that on the old firewall.
A serial port connecon is required for this task.
1. Enter the following CLI command to access maintenance mode on the firewall:
2. For Operaonal mode, select Set FIPS Mode or Set CCEAL 4 Mode from the main
menu.
STEP 4 | (Oponal) Match the operaonal state of the new firewall with that of the old firewall. For
example, enable mul-virtual system (mul-vsys) capability for a firewall that was enabled for
mul-vsys capability.
Enter the commands that pertain to your firewall sengs:
Panorama Administrator's Guide Version Version 10.1 641 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 6 | Go to the Panorama CLI and export the device state bundle from the old firewall to a
computer using Secure Copy (SCP) or TFTP (you cannot do this from the web interface).
If you manually exported the device state from the firewall, you can skip this step.
The export command generates the device state bundle as a tar zipped file and exports it to
the specified locaon. This device state will not include the LSVPN dynamic configuraon
(satellite informaon and cerficate details).
Enter one of the following commands:
or
STEP 7 | Replace the serial number of the old firewall with that of the new replacement firewall on
Panorama.
By replacing the serial number on Panorama you allow the new firewall to connect to
Panorama aer you restore the configuraon on the firewall.
1. Enter the following command in Operaonal mode:
> configure
# commit
# exit
Panorama Administrator's Guide Version Version 10.1 642 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Exporng the device state bundle does not export the device registraon auth key
used to add the firewall to Panorama management. When you restore the firewall
configuraon aer replacement, you must create a new device registraon auth key to
add the new firewall to Panorama.
Select Any to use the device registraon auth key to onboard both firewalls
and Log Collectors.
• (Oponal) Devices—Enter one or more device serial numbers to specify for which
firewalls the authencaon key is valid.
4. Click OK.
Panorama Administrator's Guide Version Version 10.1 643 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 9 | On the new firewall, import the device state and add the device registraon auth key.
1. Log in to the firewall web interface.
2. Select Device > Setup > Operaons and click the Import Device State link in the
Configuraon Management secon.
3. Browse to locate the file and click OK.
4. Select Device > Setup > Management and edit the Panorama Sengs
5. Enter the Auth key you created on Panorama and click OK.
STEP 10 | From Panorama, verify that you successfully restored the firewall configuraon.
1. Access the Panorama web interface and select Panorama > Managed Devices.
2. Verify that the Connected column for the new firewall has a check mark.
If you need to generate reports for a period when the old firewall was sll
funconal aer you installed the new firewall, you must generate a separate
query for each firewall serial number because replacing the serial number on
Panorama does not overwrite the informaon in logs.
Panorama Administrator's Guide Version Version 10.1 644 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Template or device The ability to receive template Access the firewall web interface,
group push failure and device groups configuraon select Device > Setup, edit the
changes from Panorama is disabled Panorama Sengs, and then
on the firewall. click Enable Device and Network
Template and Enable Panorama
Policy and Objects.
Panorama Administrator's Guide Version Version 10.1 645 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | Select Panorama > Setup > Management and edit the General Sengs.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Panorama Administrator's Guide Version Version 10.1 646 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama Administrator's Guide Version Version 10.1 647 ©2022 Palo Alto Networks, Inc.
Troubleshoong
If the number of firewalls managed by the Panorama virtual appliance exceeds the device
management license limit, the following alerts appears each me you log in to the Panorama web
interface:
STEP 3 | Acvate/Retrieve a device management license based on whether the Panorama virtual
appliance is online or offline.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is
Internet-connected.
• Acvate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is
not Internet-connected.
Panorama Administrator's Guide Version Version 10.1 648 ©2022 Palo Alto Networks, Inc.
Troubleshoong
• On Panorama
1. Log in to the Panorama Web Interface.
2. Select Panorama > Managed Devices > Summary.
3. View the Shared Policy and Template sync status. If you have recently pushed a
configuraon from Panorama to your managed firewalls and it reverted, the Shared
Policy or Template display as Out of Sync (depending on what configuraon changes
were made).
STEP 2 | In the Last Merged Diff column for a managed firewall, Show Last Merged Config Diff ( )
to compare the current running configuraon and the reverted configuraon. In this example,
Panorama Administrator's Guide Version Version 10.1 649 ©2022 Palo Alto Networks, Inc.
Troubleshoong
a policy rule pushed from Panorama denied all traffic between the managed firewall and
Panorama, which caused the firewall configuraon to automacally revert.
STEP 3 | Modify configuraon objects as needed as to not break the connecon between the
managed firewalls and Panorama before you re-push the configuraon.
Panorama Administrator's Guide Version Version 10.1 650 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama Administrator's Guide Version Version 10.1 651 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | Select Panorama > Managed Devices > Troubleshoong to perform a policy match.
You may also run a policy match test from the Policies tab.
STEP 3 | Enter the required informaon to perform the policy match test. In this example, a Security
policy match test is run.
1. Select Security Policy Match from the Select Test drop-down.
2. Select device/VSYS and select the managed firewalls to test.
3. Enter the Source IP address from which traffic originated.
4. Enter the Desnaon IP address of the target device for the traffic.
5. Enter the Protocol IP used for the traffic.
6. If necessary, enter any addional informaon relevant for your Security policy rule
tesng.
Panorama Administrator's Guide Version Version 10.1 652 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 5 | Select the Security policy match Results to review the policy rules that match the test
criteria.
The Ping connecvity test is only supported for firewalls running PAN-OS 9.0 or later
releases.
STEP 2 | Select Panorama > Managed Devices > Troubleshoong to perform a connecvity test.
You may also run a policy match test from the Policies tab.
STEP 3 | Enter the required informaon to perform the connecvity test. In this example, a Log
Collector Connecvity test is run.
1. Select Log Collector Connecvity from the Select Test drop-down.
2. Select device/VSYS and select the managed firewalls to test.
3. If necessary, enter any addional informaon relevant for your connecvity tesng.
Panorama Administrator's Guide Version Version 10.1 653 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 5 | Select the log collector connecvity Results to review the Log Collector connecvity status
for the selected devices.
Panorama Administrator's Guide Version Version 10.1 654 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Stats dump file generaon for mulple managed firewalls can take mulple hours to
complete. During this me, you are unable to navigate from the stats dump file generaon
user interface so it is recommended to generate the stats dump file from the CLI so you
can connue using the Panorama web interface.
Palo Alto Networks recommends generang a stats dump file for all managed firewalls
from the Panorama CLI using the following command. Panorama must be able to reach
your SCP or TFTP server to successfully export the stats dump file.
• SCP Server
• TFTP Server
STEP 2 | Select Panorama > Support and navigate to the Stats Dump File.
Panorama Administrator's Guide Version Version 10.1 655 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 3 | Select a managed firewall for which to generate a stats dump file.
It is recommended that you generate a stats dump file for a single managed firewall from the
Panorama web interface.
A stats dump file is generated for All devices by default if you do not select a managed firewall.
STEP 5 | Click Download Stats Dump File to download the stats dump file to your local device.
The downloaded stat dumps file is in a tar.gz file format.
Panorama Administrator's Guide Version Version 10.1 656 ©2022 Palo Alto Networks, Inc.
Troubleshoong
The following firewall plaorms are not impacted by the described connecvity issues to
Panorama.
• Managed firewalls onboarded to Panorama using Zero Touch Provisioning (ZTP).
• CN-Series firewalls.
• Managed firewalls deployed on VMware NSX.
• VM-Series firewalls purchases from a public hypervisor marketplace. See PAYG
firewalls for more informaon.
Panorama Administrator's Guide Version Version 10.1 657 ©2022 Palo Alto Networks, Inc.
Troubleshoong
STEP 2 | Clear the secure connecon state a managed device on Panorama and generate a new device
registraon authencaon key.
Clearing the secure connecon state for a managed device on Panorama is irreversible.
This means that the managed device is disconnect and must be added back to
Panorama.
Where <device_SN> is the serial number of the managed device you want to clear the
connecon state for.
3. Create a new device registraon authencaon key on Panorama.
The devtype and serial arguments are oponal. Omit these two arguments
to make a general use device registraon authencaon key that is not specific
to a device type or device serial number.
4. Verify the device registraon authencaon key is successfully created and copy the Key
value.
STEP 3 | Add the device registraon authencaon key you created to the managed device.
1. Log in to the managed device CLI.
• Log in to the firewall CLI.
• Log in to the Dedicated Log Collector CLI.
• Log in to the WildFire appliance CLI.
2. Add the device registraon authencaon key you created in the previous step.
For <auth_key>, enter the Key value you copied in the previous step.
Panorama Administrator's Guide Version Version 10.1 658 ©2022 Palo Alto Networks, Inc.
Troubleshoong
If this procedure does not resolve the connecvity issue for your managed device, you
must contact Palo Alto Networks Customer Support for further assistance as a full
reset of all managed device connecons on Panorama may be required.
Panorama Administrator's Guide Version Version 10.1 659 ©2022 Palo Alto Networks, Inc.
Troubleshoong
Panorama Administrator's Guide Version Version 10.1 660 ©2022 Palo Alto Networks, Inc.