Panorama Admin
Panorama Admin
Panorama Admin
Version 9.0
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2019-2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
May 5, 2020
Set Up Panorama..............................................................................................35
Determine Panorama Log Storage Requirements.............................................................................37
Set Up the Panorama Virtual Appliance............................................................................................. 39
Setup Prerequisites for the Panorama Virtual Appliance................................................... 39
Install the Panorama Virtual Appliance...................................................................................41
Perform Initial Configuration of the Panorama Virtual Appliance....................................68
Set Up The Panorama Virtual Appliance as a Log Collector..............................................71
Set Up the Panorama Virtual Appliance with Local Log Collector................................... 76
Set up a Panorama Virtual Appliance in Panorama Mode................................................. 80
Set up a Panorama Virtual Appliance in Management Only Mode..................................80
Expand Log Storage Capacity on the Panorama Virtual Appliance..................................81
Increase CPUs and Memory on the Panorama Virtual Appliance.................................... 98
Complete the Panorama Virtual Appliance Setup............................................................. 103
Set Up the M-Series Appliance...........................................................................................................104
M-Series Appliance Interfaces................................................................................................104
Perform Initial Configuration of the M-Series Appliance.................................................106
M-Series Setup Overview........................................................................................................109
Set Up the M-Series Appliance as a Log Collector........................................................... 111
Increase Storage on the M-Series Appliance......................................................................117
Configure Panorama to Use Multiple Interfaces................................................................123
Register Panorama and Install Licenses............................................................................................130
Register Panorama.....................................................................................................................130
Activate a Panorama Support License..................................................................................131
Activate/Retrieve a Firewall Management License when the Panorama Virtual
Appliance is Internet-connected............................................................................................ 132
Manage Firewalls............................................................................................185
Add a Firewall as a Managed Device................................................................................................ 187
Manage Device Groups........................................................................................................................ 191
Add a Device Group................................................................................................................. 191
Create a Device Group Hierarchy......................................................................................... 192
Create Objects for Use in Shared or Device Group Policy..............................................193
Revert to Inherited Object Values.........................................................................................194
Manage Unused Shared Objects........................................................................................... 195
Manage Precedence of Inherited Objects........................................................................... 195
Move or Clone a Policy Rule or Object to a Different Device Group...........................196
Select a URL Filtering Vendor on Panorama...................................................................... 197
Push a Policy Rule to a Subset of Firewalls........................................................................ 201
Manage the Rule Hierarchy.................................................................................................... 203
Manage Templates and Template Stacks......................................................................................... 205
Template Capabilities and Exceptions.................................................................................. 205
Add a Template.......................................................................................................................... 205
Configure a Template Stack....................................................................................................207
Configure a Template or Template Stack Variable............................................................209
Import and Overwrite Existing Template Stack Variables............................................... 211
Override a Template or Template Stack Value.................................................................. 212
Disable/Remove Template Settings...................................................................................... 214
Manage the Master Key from Panorama......................................................................................... 216
Redistribute User-ID Information to Managed Firewalls..............................................................219
Transition a Firewall to Panorama Management............................................................................222
Plan the Transition to Panorama Management..................................................................222
iv TABLE OF CONTENTS
Migrate a Firewall to Panorama Management................................................................... 223
Migrate a Firewall HA Pair to Panorama Management....................................................226
Load a Partial Firewall Configuration into Panorama....................................................... 228
Device Monitoring on Panorama........................................................................................................231
Monitor Device Health.............................................................................................................231
Monitor Policy Rule Usage......................................................................................................232
Use Case: Configure Firewalls Using Panorama.............................................................................237
Device Groups in this Use Case............................................................................................ 237
Templates in this Use Case.....................................................................................................238
Set Up Your Centralized Configuration and Policies........................................................ 239
TABLE OF CONTENTS v
Remove a WildFire Appliance from Panorama Management......................................................325
Manage WildFire Clusters....................................................................................................................326
Configure a Cluster Centrally on Panorama....................................................................... 326
View WildFire Cluster Status Using Panorama.................................................................. 336
Upgrade a Cluster Centrally on Panorama with an Internet Connection..................... 336
Upgrade a Cluster Centrally on Panorama without an Internet Connection............... 338
vi TABLE OF CONTENTS
Administer Panorama.................................................................................... 395
Preview, Validate, or Commit Configuration Changes.................................................................. 397
Manage Panorama and Firewall Configuration Backups.............................................................. 400
Schedule Export of Configuration Files............................................................................... 400
Save and Export Panorama and Firewall Configurations................................................. 401
Revert Panorama Configuration Changes............................................................................403
Configure the Maximum Number of Configuration Backups on Panorama................ 405
Load a Configuration Backup on a Managed Firewall...................................................... 405
Compare Changes in Panorama Configurations............................................................................. 406
Manage Locks for Restricting Configuration Changes.................................................................. 407
Add Custom Logos to Panorama........................................................................................................409
Use the Panorama Task Manager...................................................................................................... 410
Manage Storage Quotas and Expiration Periods for Logs and Reports.................................... 411
Log and Report Storage........................................................................................................... 411
Log and Report Expiration Periods....................................................................................... 412
Configure Storage Quotas and Expiration Periods for Logs and Reports.................... 412
Configure the Run Time for Panorama Reports.................................................................413
Monitor Panorama..................................................................................................................................414
Panorama System and Configuration Logs..........................................................................414
Monitor Panorama and Log Collector Statistics Using SNMP........................................ 414
Reboot or Shut Down Panorama....................................................................................................... 417
Configure Panorama Password Profiles and Complexity............................................................. 418
Troubleshooting.............................................................................................. 425
Troubleshoot Panorama System Issues............................................................................................ 427
Generate Diagnostic Files for Panorama............................................................................. 427
Diagnose Panorama Suspended State..................................................................................427
Monitor the File System Integrity Check.............................................................................427
Manage Panorama Storage for Software and Content Updates....................................427
Recover from Split Brain in Panorama HA Deployments................................................ 428
Troubleshoot Log Storage and Connection Issues.........................................................................430
Verify Panorama Port Usage.................................................................................................. 430
Resolve Zero Log Storage for a Collector Group.............................................................. 432
Replace a Failed Disk on an M-Series Appliance...............................................................432
Replace the Virtual Disk on an ESXi Server........................................................................433
Replace the Virtual Disk on vCloud Air............................................................................... 433
Migrate Logs to a New M-Series Appliance in Log Collector Mode............................. 434
Migrate Logs to a New M-Series Appliance in Panorama Mode................................... 439
Migrate Logs to a New M-Series Appliance Model in Panorama Mode in High
Availability....................................................................................................................................445
Migrate Logs to the Same M-Series Appliance Model in Panorama Mode in High
Availability....................................................................................................................................451
Migrate Log Collectors after Failure/RMA of Non-HA Panorama.................................457
Regenerate Metadata for M-Series Appliance RAID Pairs.............................................. 460
Replace an RMA Firewall..................................................................................................................... 461
9
10 PANORAMA ADMINISTRATOR'S GUIDE | Panorama Overview
© 2020 Palo Alto Networks, Inc.
About Panorama
Panorama enables you to effectively configure, manage, and monitor your Palo Alto Networks firewalls with
central oversight. The three main areas in which Panorama adds value are:
• Centralized configuration and deployment—To simplify central management and rapid deployment
of the firewalls and WildFire appliances on your network, use Panorama to pre-stage the firewalls
and WildFire appliances for deployment. You can then assemble the firewalls into groups, and create
templates to apply a base network and device configuration and use device groups to administer globally
shared and local policy rules. See Centralized Firewall Configuration and Update Management.
• Aggregated logging with central oversight for analysis and reporting—Collect information on activity
across all the managed firewalls on the network and centrally analyze, investigate and report on the
data. This comprehensive view of network traffic, user activity, and the associated risks empowers you
to respond to potential threats using the rich set of policies to securely enable applications on your
network. See Centralized Logging and Reporting.
• Distributed administration—Enables you to delegate or restrict access to global and local firewall
configurations and policies. See Role-Based Access Control for delegating appropriate levels of access
for distributed administration.
Five Panorama Models are available: the Panorama virtual appliance, M-600 appliance, M-500 appliance,
M-200 appliance, and M-100 appliance (M-100 appliances are supported in PAN-OS 9.0 only if they have
been upgraded to 32 GB memory from the default 16 GB). Panorama Centralized Management illustrates
how you can deploy Panorama in a high availability (HA) configuration to manage firewalls.
As a best practice, deploy the virtual appliance in Panorama mode to optimize log
storage and report generation.
• Legacy mode (ESXi and vCloud Air only)—In this mode, the Panorama virtual appliance receives and
stores firewall logs without using a local Log Collector (see Deploy Panorama Virtual Appliances in
Legacy Mode with Local Log Collection). By default, the virtual appliance in Legacy mode has one
disk partition for all data. Approximately 11GB of the partition is allocated to log storage. If you need
more local log storage, you can add one virtual disk of up to 8TB on ESXi 5.5 and later versions or on
vCloud Air. Earlier ESXi versions support one virtual disk of up to 2TB. If you need more than 8TB,
you can mount the virtual appliance in Legacy mode to an NFS datastore but only on the ESXi server,
not in vCloud Air. This mode is only available if your Panorama virtual appliance is in Legacy mode
on upgrade to PAN-OS 9.0. On upgrade to PAN-OS 9.0, Legacy mode is no longer available if you
change to any other mode. If you change your Panorama virtual appliance from Legacy mode to one
of the available modes, you will no longer be able to change back into Legacy mode.
• Management Only mode—In this mode, the Panorama virtual appliance is a dedicated management
appliance for your managed devices and Dedicated Log Collectors and, in this mode, an appropriately
resourced Panorama virtual appliance can manage up to 5,000 firewalls. The Panorama virtual
appliance has no log collection capabilities except for config and system logs and requires a
Dedicated Log Collector to these store logs. By default, the virtual appliance in Management Only
mode has only one disk partition for all data so all logs forwarded to a Panorama virtual appliance
in Management Only mode are dropped. Therefore, to store the log data from your managed
appliances, you must configure log forwarding in order to store the log data from your managed
devices. For more information, see Increased Device Management Capacity Requirements.
• Log Collector mode—The Panorama virtual appliance functions as a Dedicated Log Collector. If
multiple firewalls forward large volumes of log data, a Panorama virtual appliance in Log Collector
mode provides increased scale and performance. In this mode, the appliance does not have a web
interface for administrative access; it has only a command line interface (CLI). However, you can
manage the appliance using the web interface of the Panorama management server. CLI access to a
Panorama virtual appliance in Log Collector mode is necessary only for initial setup and debugging.
For configuration details, see Deploy Panorama with Dedicated Log Collectors.
M-100 appliances are supported in PAN-OS 9.0 only if they have been upgraded to 32GB
memory from the default 16GB. See M-100 Memory Upgrade Guide for more information.
The M-600 and M-500 appliances have the following additional attributes, which make them more
suitable for data centers:
• Eth4 and Eth5 interfaces that support 10Gbps throughput
Additionally, the following attribute makes the M-600 appliance more suitable for large-scale firewall
deployments:
• The M-600 appliance in Management Only mode can manage up to 5,000 firewalls.
You can deploy the M-Series appliances in the following modes:
• Panorama mode—The appliance functions as a Panorama management server to manage firewalls
and Dedicated Log Collectors. The appliance also supports a local Log Collector to aggregate firewall
logs. Panorama mode is the default mode. For configuration details, see Deploy Panorama M-Series
Appliances with Local Log Collectors.
• Management Only mode—The Panorama appliance is a dedicated management appliance for your
managed devices and Dedicated Log Collectors. The Panorama appliance has no log collection
capabilities except for config and system logs and your deployment requires a Dedicated Log
Collector to store these logs. By default, the Panorama appliance in Management Only mode has only
one disk partition for all data so all logs forwarded to a Panorama virtual appliance in Management
Only mode are dropped. Therefore, to store the log data from your managed appliances, you must
configure log forwarding in order to store the log data from your managed devices.
• Log Collector mode—The appliance functions as a Dedicated Log Collector. If multiple firewalls
forward large volumes of log data, an M-Series appliance in Log Collector mode provides increased
scale and performance. IIn this mode, the appliance does not have a web interface for administrative
access; it has only a command line interface (CLI). However, you can manage the appliance using
the web interface of the Panorama management server. CLI access to an M-Series appliance in Log
Collector mode is necessary only for initial setup and debugging. For configuration details, see Deploy
Panorama with Dedicated Log Collectors.
For more details and specifications for the M-Series appliances, see the M-Series Appliance Hardware
Reference Guides.
You cannot use templates or template stacks to set firewall modes: virtual private network (VPN) mode,
multiple virtual systems (multi-vsys) mode, or operational modes (normal or FIPS-CC mode). For details, see
Template Capabilities and Exceptions. However, you can assign firewalls that have non-matching modes to
the same template or stack. In such cases, Panorama pushes mode-specific settings only to firewalls that
support those modes. As an exception, you can configure Panorama to push the settings of the default
vsys in a template to firewalls that don’t support virtual systems or that don’t have any virtual systems
configured.
For the relevant procedures, see Manage Templates and Template Stacks.
For details on the order in which firewalls evaluate policy rules in a device group hierarchy, see Device
Group Policies. For details on overriding the values of objects that device groups inherit from ancestor
device groups, see Device Group Objects.
Shared pre-rules Panorama pushes shared pre-rules to These rules are visible on firewalls
all the firewalls in all device groups. but you can only manage them in
Device group pre- Panorama pushes device group- Panorama.
rules specific pre-rules to all the firewalls
in a particular device group and its
descendant device groups.
If a firewall inherits rules from device
groups at multiple levels in the
device group hierarchy, it evaluates
pre-rules in the order of highest to
lowest level. This means the firewall
first evaluates shared rules and last
evaluates the rules of device groups
with no descendants.
You can use pre-rules to enforce
the acceptable use policy of an
organization. For example, a pre-rule
might block access to specific URL
categories or allow Domain Name
System (DNS) traffic for all users.
Local firewall rules Local rules are specific to a single A local firewall administrator, or a
firewall or virtual system (vsys). Panorama administrator who switches
Device group post- Panorama pushes shared post-rules These rules are visible on firewalls
rules to all the firewalls in all device groups. but you can only manage them in
Panorama pushes device group- Panorama.
Shared post-rules specific post-rules to all the firewalls
in a particular device group and its
descendant device groups.
If a firewall inherits rules from device
groups at multiple levels in the device
group hierarchy, it evaluates post-rules
in the order of lowest to highest level.
This means the firewall first evaluates
the rules of device groups with no
descendants and last evaluates shared
rules.
Post-rules typically include rules
to deny access to traffic based on
the App-ID™ signatures, User-ID™
information (users or user groups), or
service.
intrazone-default The default rules apply only to the Default rules are initially read-only,
Security rulebase, and are predefined either because they are part of the
interzone-default
on Panorama (at the Shared level) and predefined configuration or because
the firewall (in each vsys). These rules Panorama pushed them to firewalls.
specify how PAN-OS handles traffic However, you can override the rule
that doesn’t match any other rule. settings for tags, action, logging,
and security profiles. The context
The intrazone-default rule allows all
determines the level at which you can
traffic within a zone. The interzone-
override the rules:
default rule denies all traffic between
zones. • Panorama—At the Shared or device
group level, you can override
If you override default rules, their order
default rules that are part of the
of precedence runs from the lowest
predefined configuration.
context to the highest: overridden
settings at the firewall level take • Firewall—You can override default
precedence over settings at the device rules that are part of the predefined
group level, which take precedence configuration on the firewall or
over settings at the Shared level. vsys, or that Panorama pushed from
the Shared location or a device
group.
If you forward logs to a Panorama virtual appliance in Legacy mode, it stores the logs
locally without a Log Collector.
• Dedicated Log Collector—This is an M-600, M-500, M-200, M-100 appliance or Panorama virtual
appliance in Log Collector mode. You can use an M-Series appliance in Panorama mode or a Panorama
virtual appliance in Panorama or Legacy (ESXi and vCloud Air) mode to manage Dedicated Log
Collectors. To use the Panorama web interface for managing Dedicated Log Collectors, you must add
them as managed collectors. Otherwise, administrative access to a Dedicated Log Collector is only
available through its CLI using the predefined administrative user (admin) account. Dedicated Log
Collectors don’t support additional administrative user accounts.
You can use either or both types of Log Collectors to achieve the best logging solution for your
environment (see Local and Distributed Log Collection).
For local log collection, you can also forward logs to a Panorama virtual appliance in Legacy
mode, which stores the logs without using a Log Collector as a logical container.
Dedicated Log Collectors are M-600, M-500, M-200, or M-100 appliances in Log Collector mode. Because
they perform only log collection, not firewall management, Dedicated Log Collectors allow for a more
robust environment than local Log Collectors. Dedicated Log Collectors provide the following benefits:
• Enable the Panorama management server to use more resources for management functions instead of
logging.
• Provide high-volume log storage on a dedicated hardware appliance.
• Enable higher logging rates.
• Provide horizontal scalability and redundancy with RAID 1 storage.
• Optimize bandwidth resources in networks where more bandwidth is available for firewalls to send logs
to nearby Log Collectors than to a remote Panorama management server.
• Enable you to meet regional regulatory requirements (for example, regulations might not allow logs to
leave a particular region).
Distributed Log Collection illustrates a topology in which the Panorama peers in an HA configuration
manage the deployment and configuration of firewalls and Dedicated Log Collectors.
You can deploy the Panorama management server in an HA configuration but not the
Dedicated Log Collectors.
FW1 L1,L2,L3
FW2 L4,L5,L6
Using this list, FW1 will forward logs to L1 so long as that primary Log Collector is available. However,
based on the hash algorithm, Panorama might choose L2 as the owner that writes the logs to its disks. If L2
becomes inaccessible or has a chassis failure, FW1 will not know because it can still connect to L1.
In the case where a Collector Group has only one Log Collector and the Log Collector fails, the firewall
stores the logs to its HDD/SSD (the available storage space varies by firewall model). As soon as
connectivity is restored to the Log Collector, the firewall resumes forwarding logs where it left off before
the failure occurred.
In the case of a Collector Group with multiple Log Collectors, the firewall does not buffer logs to its local
storage if only one Log Collector is down. In the example scenario where L2 is down, FW1 continues
sending logs to L1, and L1 stores the log data that would be sent to L2. Once L2 is back up, L1 no longer
stores log data intended for L2 and distribution resumes as expected. If one of the Log Collectors in a
Collector Group goes down, the logs that would be written to the down Log Collector are redistributed to
the next Log Collector in the preference list.
Palo Alto Networks recommends the following mitigations if using multiple Log Collectors in a Collector
Group:
• Enable log redundancy when you Configure a Collector Group. This ensures that no logs are lost if any
one Log Collector in the Collector Group becomes unavailable. Each log will have two copies and each
copy will reside on a different Log Collector. Log redundancy is available only if each Log Collector has
the same number of logging disks.
Because enabling redundancy creates more logs, this configuration requires more
storage capacity. When a Collector Group runs out of space, it deletes older logs.
Enabling redundancy doubles the log processing traffic in a Collector Group, which
reduces its maximum logging rate by half, as each Log Collector must distribute a copy of
each log it receives.
• Obtain an On-Site-Spare (OSS) to enable prompt replacement if a Log Collector failure occurs.
• In addition to forwarding logs to Panorama, configure forwarding to an external service as backup
storage. The external service can be a syslog server, email server, SNMP trap server, or HTTP server.
You can configure each Collector Group to forward logs to different destinations.
• Forward logs from firewalls to Panorama and to external services in parallel—In this configuration, both
Panorama and the external services are endpoints of separate log forwarding flows; the firewalls don’t
rely on Panorama to forward logs to external services. This configuration is best for deployments in
which the connections between firewalls and external services have sufficient bandwidth to sustain the
logging rate, which is often the case when the connections are local.
Centralized Reporting
Panorama aggregates logs from all managed firewalls and enables reporting on the aggregated data for
a global view of application use, user activity, and traffic patterns across the entire network. As soon as
the firewalls are added to Panorama, the ACC can display all traffic traversing your network. With logging
enabled, clicking into a log entry in the ACC provides direct access to granular details about the application.
For generating reports, Panorama uses two sources: the local Panorama database and the remote firewalls
that it manages. The Panorama database refers to the local storage on Panorama that is allocated for storing
both summarized logs and some detailed logs. If you have a distributed Log Collection deployment, the
Panorama database includes the local storage on Panorama and all the managed Log Collectors. Panorama
summarizes the information—traffic, application, threat— collected from all managed firewalls at 15-minute
intervals. Using the local Panorama database allows for faster response times, however, if you prefer to not
forward logs to Panorama, Panorama can directly access the remote firewall and run reports on data that is
stored locally on the managed firewalls.
Panorama offers more than 40 predefined reports that can be used as is, or they can be customized by
combining elements of other reports to generate custom reports and report groups that can be saved.
Reports can be generated on demand, on a recurring schedule, and can be scheduled for email delivery.
These reports provide information on the user and the context so that you correlate events and identify
patterns, trends, and potential areas of interest. With the integrated approach to logging and reporting, the
ACC enables correlation of entries from multiple logs relating to the same event.
For more information, see Monitor Network Activity.
You can redistribute user mappings collected through any method except Terminal Services
(TS) agents. You cannot redistribute username-to-group mapping or HIP match information.
Instead of using the default account for all administrators, it is a best practice to create a
separate administrative account for each person who needs access to the administrative
or reporting functions on Panorama. This provides better protection against unauthorized
configuration changes and enables Panorama to log and identify the actions of each
administrator.
• Administrative Roles
• Authentication Profiles and Sequences
• Access Domains
• Administrative Authentication
Administrative Roles
You configure administrator accounts based on the security requirements of your organization, any existing
authentication services that your network uses, and the required administrative roles. A role defines the
type of system access that is available to an administrator. You can define and restrict access as broadly
or granularly as required, depending on the security requirements of your organization. For example, you
might decide that a data center administrator can have access to all device and networking configurations,
but a security administrator can control only security policy definitions, while other key individuals can have
limited CLI or XML API access. The role types are:
• Dynamic Roles—These are built-in roles that provide access to Panorama and managed firewalls. When
new features are added, Panorama automatically updates the definitions of dynamic roles; you never
need to manually update them. The following table lists the access privileges associated with dynamic
roles.
• Admin Role Profiles—To provide more granular access control over the functional areas of the web
interface, CLI, and XML API, you can create custom roles. When new features are added to the product,
you must update the roles with corresponding access privileges: Panorama does not automatically
add new features to custom role definitions. You select one of the following profile types when you
Configure an Admin Role Profile.
Panorama For these roles, you can assign read-write access, read-only access, or no
access to all the Panorama features that are available to the superuser dynamic
role except the management of Panorama administrators and Panorama roles.
For the latter two features, you can assign read-only access or no access, but
you cannot assign read-write access.
An example use of a Panorama role would be for security administrators who
require access to security policy definitions, logs, and reports on Panorama.
Device Group and For these roles, you can assign read-write access, read-only access, or no
Template access to specific functional areas within device groups, templates, and firewall
contexts. By combining these roles with Access Domains, you can enforce
the separation of information among the functional or regional areas of your
organization. Device Group and Template roles have the following limitations:
• No access to the CLI or XML API
• No access to configuration or system logs
• No access to VM information sources
• In the Panorama tab, access is limited to:
• Device deployment features (read-write, read-only, or no access)
• The device groups specified in the administrator account (read-write,
read-only, or no access)
• The templates and managed firewalls specified in the administrator
account (read-only or no access)
An example use of this role would be for administrators in your operations
staff who require access to the device and network configuration areas of the
web interface for specific device groups and/or templates.
Access Domains
Access domains control administrative access to specific Device Groups and templates, and also control
the ability to switchcontext to the web interface of managed firewalls. Access domains apply only to
administrators with Device Group and Template roles. Mapping Administrative Roles to access domains
enables very granular control over the information that administrators access on Panorama. For example,
consider a scenario where you configure an access domain that includes all the device groups for firewalls
in your data centers and you assign that access domain to an administrator who is allowed to monitor data
center traffic but who is not allowed to configure the firewalls. In this case, you would map the access
domain to a role that enables all monitoring privileges but disables access to device group settings.
You configure access domains in the local Panorama configuration and then assign them to administrative
accounts and roles. You can perform the assignment locally or use an external SAML, TACACS+, or RADIUS
server. Using an external server enables you to quickly reassign access domains through your directory
service instead of reconfiguring settings on Panorama. To use an external server, you must define a server
profile that enables Panorama to access the server. You must also define Vendor-Specific Attributes (VSAs)
on the RADIUS or TACACS+ server, or SAML attributes on the SAML IdP server.
For example, if you use a RADIUS server, you would define a VSA number and value for each administrator.
The value defined has to match the access domain configured on Panorama. When an administrator tries to
log in to Panorama, Panorama queries the RADIUS server for the administrator access domain and attribute
number. Based on the response from the RADIUS server, the administrator is authorized for access and
is restricted to the firewalls, virtual systems, device groups, and templates that are assigned to the access
domain.
For the relevant procedures, see:
• Configure an Access Domain.
• Configure RADIUS Authentication for Panorama Administrators.
• Configure TACACS+ Authentication for Panorama Administrators.
• Configure SAML Authentication for Panorama Administrators.
Administrative Authentication
You can configure the following types of authentication and authorization (Administrative Roles and Access
Domains) for Panorama administrators:
SSH Keys Local The administrative accounts are local to Panorama, but authentication
to the CLI is based on SSH keys. You use Panorama to assign
administrative roles and access domains to the accounts. For details, see
Certificates Local The administrative accounts are local to Panorama, but authentication
to the web interface is based on client certificates. You use Panorama
to assign administrative roles and access domains to the accounts. For
details, see Configure a Panorama Administrator with Certificate-Based
Authentication for the Web Interface.
External Local The administrative accounts you define locally on Panorama serve
service as references to the accounts defined on an external Multi-Factor
Authentication, SAML, Kerberos, TACACS+, RADIUS, or LDAP server.
The external server performs authentication. You use Panorama to
assign administrative roles and access domains to the accounts. For
details, see Configure Local or External Authentication for Panorama
Administrators.
External External The administrative accounts are defined only on an external SAML,
service TACACS+, or RADIUS server. The server performs both authentication
and authorization. For authorization, you define Vendor-Specific
Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML
attributes on the SAML server. Panorama maps the attributes to
administrator roles and access domains that you define on Panorama.
For details, see:
• Configure SAML Authentication for Panorama Administrators
• Configure TACACS+ Authentication for Panorama Administrators
• Configure RADIUS Authentication for Panorama Administrators
For details on candidate and running configurations, see Manage Panorama and Firewall
Configuration Backups.
To prevent multiple administrators from making configuration changes during concurrent
sessions, see Manage Locks for Restricting Configuration Changes.
When pushing configurations to managed devices, Panorama pushes the running
configuration. Because of this, Panorama does not let you push changes to managed
devices until you first commit the changes to Panorama.
STEP 2 | Perform initial configuration to enable network access to Panorama. See Set Up the Panorama
Virtual Appliance or Set Up the M-Series Appliance.
STEP 5 | (Recommended) Set up Panorama in a high availability configuration. See Panorama High
Availability.
STEP 7 | Add a Device Group or Create a Device Group Hierarchy, Add a Template, and (if applicable)
Configure a Template Stack.
STEP 8 | (Optional) Configure log forwarding to Panorama and/or to external services. See Manage Log
Collection.
STEP 9 | Monitor Network Activity using the visibility and reporting tools on Panorama.
M-100 appliances are supported in PAN-OS 9.0 only if they have been
upgraded to 32GB memory from the default 16GB. See M-100 Memory
Upgrade Guide for more information.
35
36 PANORAMA ADMINISTRATOR'S GUIDE | Set Up Panorama
© 2020 Palo Alto Networks, Inc.
Determine Panorama Log Storage
Requirements
When you Plan Your Panorama Deployment, estimate how much log storage capacity Panorama requires
to determine which Panorama Models to deploy, whether to expand the storage on those appliances
beyond their default capacities, whether to deploy Dedicated Log Collectors, and whether to Configure
Log Forwarding from Panorama to External Destinations. When log storage reaches the maximum capacity,
Panorama automatically deletes older logs to create space for new ones.
Perform the following steps to determine the approximate log storage that Panorama requires. For details
and use cases, refer to Panorama Sizing and Design Guide.
If your organization requires the removal of logs after a certain period, you can set the
expiration period for each log type. You can also set a storage quota for each log type as
a percentage of the total space if you need to prioritize log retention by type. For details,
see Manage Storage Quotas and Expiration Periods for Logs and Reports.
• If Panorama is already collecting logs, run the following command at the CLI of each appliance
that receives logs (Panorama management server or Dedicated Log Collector) and calculate the
total rates. This command gives the average logging rate for the last five minutes.
You can also use an SNMP manager to determine the logging rates of Log Collectors
(see the panLogCollector MIB, OID 1.3.6.1.4.1.25461.1.1.6) and firewalls (see the
panDeviceLogging, OID 1.3.6.1.4.1.25461.2.1.2.7).
2. Calculate the average of the sampled rates.
3. Calculate the daily logging rate by multiplying the average logs-per-second by 86,400.
This formula provides only an estimate; the exact amount of required storage will differ
from the formula result.
These topics assume you are familiar with the public and private hypervisor products
required to create the virtual appliance, and don’t cover any related concepts or terminology.
If you install Panorama on VMware vCloud Air, you set the system settings during
installation.
Review the minimum resource requirements for deploying the Panorama virtual appliance on Amazon
Web Services (AWS), AWS GovCloud, Microsoft Azure, Google Cloud Platform (GCP), Hyper-V, KVM, and
VMware ESXi to ensure that the virtual machine meets the minimum required resources for the desired
mode (Panorama, Management Only, or Log Collector). The minimum resource requirements for the
Panorama virtual appliance are designed to help you achieve the maximum number of logs per second
(LPS) for log collection in Panorama and Log Collector mode. If you add or remove virtual logging disks that
results in a configuration that does not meet or exceed the number of virtual logging disks recommended
(below), your LPS will be reduced.
Requirements Panorama Virtual Appliance Panorama Virtual Appliance in Panorama Virtual Appliance
in Management Only Mode Panorama Mode in Log Collector Mode
Virtual • VMware ESXi and vCloud Air—64-bit kernel-based VMware ESXi 5.5, 6.0, 6.5, or 6.7.
hardware The supported version of the virtual hardware family type (also known as the VMware
version virtual hardware version) on the ESXi server is vmx-09
• Hyper-V—Windows Server 2016 with Hyper-V role or Hyper-V 2016
• KVM—Ubuntu version 16.04 or CentOS7
In Panorama mode, the virtual appliance running on any ESXi version supports up to 12
virtual logging disks with 2TB of log storage each, for a total maximum capacity of 24TB.
(VMware ESXi and vCloud Air only) In Legacy mode, the virtual appliance supports one
virtual logging disk. ESXi 5.5 and later versions supports one disk of up to 8TB. Earlier
ESXi versions support one disk of up to 2TB.
(ESXi and To install the Panorama virtual appliance and manage its resources, you must install a
vCloud Air VMware vSphere Client or VMware Infrastructure Client that is compatible with your
only) ESXi server.
Client
computer
Supported Interfaces
Interfaces can be used for device management, log collection, Collector Group communication, licensing
and software updates.
STEP 1 | Download the Panorama 9.0 base image Open Virtual Appliance (OVA) file.
1. Go to the Palo Alto Networks software downloads site. (If you can’t log in, go to the Palo Alto
Networks Customer Support web site for assistance.)
2. In the Download column in the Panorama Base Images section, download the latest version of the
Panorama release OVA file (Panorama-ESX-9.0.0.ova).
The virtual appliance boots up in Panorama mode if you allocate sufficient CPUs
and Memory and add a virtual logging disk (later in this procedure). Otherwise, the
appliance boots up in Legacy mode. For details on the modes, see Panorama Models.
3. Set the SCSI Controller to LSI Logic Parallel.
4. Add a virtual logging disk.
In Legacy mode, the appliance uses approximately 11GB on the system disk for logging by default, so
adding a dedicated logging disk to increase storage capacity is optional.
1. Add a disk, select Hard Disk as the hardware type, and click Next.
2. Create a new virtual disk and click Next.
3. Set the Disk Size to exactly 2TB.
In Panorama mode, you can later add additional logging disks (for a total of 12) with
2TB of storage each. Expanding the size of a logging disk that is already added to
Panorama is not supported.
4. Select your preferred Disk Provisioning disk format.
Consider your business needs when selecting the disk provisioning format. For more information
regarding the disk provisioning performance considerations, refer to the VMware Thick vs Thin
Disks and All Flash Arrays document, or additional VMware documentation.
When adding multiple logging disks, it is a best practice to select the same Disk
Provisioning format for all disks to avoid any unexpected performance issues that
may arise.
5. Select Specify a datastore or datastore structure as the location, Browse to a datastore that has
sufficient storage, click OK, and click Next.
6. Select a SCSI Virtual Device Node (you can use the default selection) and click Next.
Panorama will fail to boot if you select a format other than SCSI.
You are now ready to Perform Initial Configuration of the Panorama Virtual Appliance.
Install Panorama on vCloud Air
Use these instructions to install a new Panorama virtual appliance in VMware vCloud Air. If you are
upgrading a Panorama virtual appliance deployed in vCloud Air, skip to Install Content and Software
Updates for Panorama.
STEP 1 | Download the Panorama 8.1 base image Open Virtual Appliance (OVA) file.
STEP 4 | Create vCloud Air NAT rules on the gateway to allow inbound and outbound traffic for the
Panorama virtual appliance.
Refer to Add a NAT Rule in the vCloud Air Documentation Center for the detailed instructions:
1. Add a NAT rule that allows Panorama to receive traffic from the firewalls and allows administrators
to access Panorama.
2. Add a NAT rule that allows Panorama to retrieve updates from the Palo Alto Networks update server
and to access the firewalls.
STEP 1 | Log in to AWS Web Service console and select the EC2 Dashboard.
• Amazon Web Service Console
• AWS GovCloud Web Service Console
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you configure the appliance with the required resources during initial
deployment. The Panorama virtual appliance does not remain in Log Collector mode if
you resize the virtual machine after you deploy it, and this results in a loss of log data.
4. Configure the instance details.
1. Select Next: Configure Instance Details.
2. Select the Network you created in the previous step or use the default VPC provided by AWS. If
3. Select the Subnet you created in the previous step or use the default subnets provided by AWS.
4. To Auto-assign Public IP select Enable.
This IP must be accessible by the firewalls you plan to manage using Panorama. This allows you
to obtain a publicly accessible IP address for the management interface of the Panorama virtual
appliance. You can later attach an Elastic IP address to the management interface. Unlike the
public IP address that is disassociated from the virtual appliance when the instance is terminated,
the Elastic IP address provides persistence and you can the IP address to a new (or replacement)
instance of the Panorama virtual appliance without the need to reconfigure the IP address
whenever the Panorama virtual appliance instance is powered off.
5. Configure any additional instance details as needed.
5. Configure the Panorama virtual appliance storage.
1. Select Next: Add Storage.
2. Add New Volume to add additional log storage.
If you intend to use the Panorama virtual appliance in Panorama mode or as a Dedicated Log
Collector, add the virtual logging disks during the initial deployment. By default, the Panorama
virtual appliance is in Panorama mode for the initial deployment when you meet the Panorama
mode resource requirements and have added at least one virtual logging disk. Otherwise, the
Panorama virtual appliance defaults to Management Only mode. Change the Panorama virtual
appliance to Management Only mode if you just want to manage devices and Dedicated Log
Collectors, and to not collect logs locally.
The Panorama virtual appliance on AWS only supports 2TB logging disks, and in total supports
up to 24TB of log storage. You are unable to add a logging disk smaller than 2TB, or a logging
disk with a size not divisible by the 2TB logging disk requirement. The Panorama virtual appliance
partitions logging disks larger than 2TB into 2TB partitions.
6. (Optional) Select Next: Add Tags and add one or more tags as metadata to help you identify and
group the Panorama virtual appliance. For example, add a Name tag with a Value that helps you
identify which firewalls the Panorama virtual appliance manages.
7. Configure the instance security group.
1. Select Next: Configure Security Group.
2. Create a new Security Group or select an existing one with HTTPS and SSH enabled at a
minimum. This security group is for restricting access to the management interface.
If you created a new key from AWS, download and save the key to a safe location.
The file extension is .pem. You must load the public key into PuTTYgen and save it in
.ppk format. You cannot regenerate this key if lost.
It takes about 30 minutes to finish deploying the Panorama virtual appliance after you launch it on
AWS. Deploying the Panorama virtual appliance may take longer depending on the number and
size of the disks attached to the instance. View the Launch Time by selecting the Panorama virtual
appliance instance (Instances).
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you the appliance with the required resources. The Panorama virtual
appliance does not remain in Log Collector mode if you resize the virtual machine after
you deploy it, and this results in a loss of log data.
STEP 7 | Configure a new administrative password for the Panorama virtual appliance.
You must configure a unique administrative password before you can access the web interface of the
Panorama virtual appliance. To access the CLI, the private key used to launch the Panorama virtual
appliance is required.
• If you have an SSH service installed on your computer:
1. Enter the following command to log into the Panorama virtual appliance:
admin> configure
admin# set mgt-config users admin password
3. If you need to activate a BYOL, set the DNS server IP address so that the Panorama virtual appliance
can access the Palo Alto Networks licensing server. Enter the following command to set the DNS
server IP address:
admin# commit
5. Terminate the SSH session.
• If you are using PuTTY to SSH into the Panorama virtual appliance:
1. If you are using an existing key pair and have the .ppk file available, continue to the Step 7.3. If you
created a new key pair or have only the .pem file of the existing key pair, open PuTTYgen and Load
the .pem file.
2. Save the private key to a local accessible destination.
3. Open PuTTY and select SSH > Auth and then Browse to the .ppk file you saved in the previous step.
admin> configure
admin# set mgt-config users admin password
7. Set the DNS server IP address so that the Panorama virtual appliance can access the Palo Alto
Networks licensing server. Enter the following command to set the DNS server IP address:
admin# commit
9. Terminate the SSH session.
STEP 8 | Activate the device management license and support license on the Panorama virtual
appliance.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected
• Activate a Panorama Support License
STEP 9 | Complete configuring the Panorama virtual appliance for your deployment needs.
• (Management Only mode) Set up a Panorama Virtual Appliance in Management Only Mode.
• (Log Collector mode) Begin at Step 6 to Switch from Panorama mode to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you Add the Log
Collector as a managed collector to the Panorama management server. You cannot
specify the IP Address, Netmask, or Gateway.
• (Panorama and Management Only mode) Configure a Managed Collector to add a Dedicated Log
Collector to the Panorama virtual appliance. Management Only mode does not support local log
collection, and requires a Dedicated Log Collector to store managed device logs.
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you configure the appliance with the required resources during initial
deployment. The Panorama virtual appliance does not remain in Log Collector mode if
you resize the virtual machine after you deploy it, and this results in a loss of log data.
8. Enter a Username for the Panorama virtual appliance administrator. To ensure that your username is
secure, admin is not a valid entry.
9. Enter a Password or copy and paste an SSH public key for securing administrative access to the
Panorama virtual appliance.
10.Configure the Panorama virtual appliance instance Networking
1. Select an existing Virtual network or create a new virtual network.
2. Configure the Subnet. The subnet is dependent on the virtual network you selected or created in
the previous step. If you selected an existing virtual network, you can choose one of the subnets
for the selected virtual network.
3. Select an existing Public IP address or create a new one. This creates the management interface
used to access your Panorama virtual appliance.
STEP 4 | Verify that you the Panorama virtual appliance has been successfully deployed.
1. Select Dashboard > Resource Groups and select the resource group containing the Panorama virtual
appliance.
2. Under Settings, select Deployments for the virtual machine deployment status.
It takes about 30 minutes to deploy the Panorama virtual appliance. Launching the
Panorama virtual appliance may take longer depending on the resources configured
for the virtual machine. Microsoft Azure does not permit the ICMP protocol to test
whether it deployed successfully.
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you correctly configured the appliance the required resources. The
Panorama virtual appliance does not remain in Log Collector mode if you resize the
virtual machine after you deploy it and this results in a loss of log data.
STEP 7 | Activate the device management license and support license on the Panorama virtual
appliance.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected
• Activate a Panorama Support License
STEP 8 | Complete configuring the Panorama virtual appliance for your deployment needs.
1. Add a Virtual Disk to Panorama on Azure. By default, the 81GB system disk is automatically created
during the initial deployment.
Adding a virtual logging disk is required before you can change the Panorama virtual appliance to
Panorama mode or Log Collector mode.
By default, the Panorama virtual appliance on Azure is in Management Only mode on initial
deployment. If you intend to use the Panorama virtual appliance in Panorama mode or as a Dedicated
Log Collector, add the virtual logging disks after successfully deploying Panorama on Azure.
The Panorama virtual appliance on Azure only supports 2TB logging disks, and in total supports up
to 24TB of log storage. You are unable to add a logging disk smaller than 2TB, or a logging disk with
a size not divisible by the 2TB logging disk requirement. The Panorama virtual appliance partitions
logging disks larger than 2TB into 2TB partitions.
2. Change the Panorama virtual appliance mode.
By default, the Panorama virtual appliance on Azure is deployed in Management Only mode. To
change to Panorama mode or Log Collector mode, you must add at least one logging disk after the
initial deployment. Keep the Panorama virtual appliance set to Management Only mode if you just
want to manage devices and Dedicated Log Collectors and you do not want to collect logs locally.
• Set up a Panorama Virtual Appliance in Panorama Mode.
• (Log Collector mode) Begin at Step 6 to Switch from Panorama mode to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you Add the
Log Collector as a managed collector to the Panorama management server. You
cannot specify the IP Address, Netmask, or Gateway.
3. (Panorama and Management Only mode) Configure a Managed Collector to add a Dedicated Log
Collector to the Panorama virtual appliance. Management Only mode does not support local log
collection and requires a Dedicated Log Collector to store managed device logs.
STEP 2 | Upload the Panorama virtual appliance image to the Google Cloud Platform.
1. Log in to the Google Cloud Console.
2. From the Products and Services menu, select Storage.
3. Click Create Bucket, configure the new storage bucket and click Create.
4. Select the storage bucket you created in the previous step, click Upload files, and select the
Panorama virtual appliance image you downloaded.
5. From the Products and Services menu, select Compute Engine > Images.
6. Click Create Image and create the Panorama virtual appliance image:
1. Name the Panorama virtual appliance image.
2. In the Source field, select Cloud Storage file from the drop-down menu.
3. Click Browse and navigate to the storage bucket where you uploaded the Panorama virtual
appliance image, and Select the uploaded image.
4. Create the Panorama virtual appliance image.
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector,
ensure that you configure the appliance with the required resources during initial
deployment. The Panorama virtual appliance does not remain in Log Collector mode if
you resize the virtual machine after you deploy it, and this results in a loss of log data.
The GCP zone selection determines the CPU platforms available to you. For more
information, refer to Regions and Zones for details.
STEP 5 | Enable access to the serial port so you can manage the Panorama virtual appliance.
1. Select Management.
2. Enter the following name-value pair as Metadata:
serial-port-enable true
Only the single management interface is supported for log collection and device
management.
1. Select Networking.
STEP 7 | Configure the SSH key. You need an SSH key to access the Panorama virtual appliance CLI to
configure the administrative user password after the initial deployment.
1. Select Security.
2. Select the Block project-wide SSH keys box. Only instance keys are currently supported for logging
in to the Panorama virtual appliance after initial deployment.
3. Paste the SSH key in the comment box. For information on the correct SSH key format and how to
generate SSH keys for GCP, refer to Managing SSH keys in Metadata.
When generating the SSH key, save the private key in .ppk format. The private key is
required to log in to the Panorama virtual appliance after the initial deployment before
you can configure the administrative password.
STEP 10 | Configure a new administrative password for the Panorama virtual appliance.
You must configure a unique administrative password before you can access the web interface of
the Panorama virtual appliance. To access the CLI, use the private key to launch the Panorama virtual
appliance.
• If you have an SSH service installed on your computer:
1. Enter the following command to log into the Panorama virtual appliance:
admin> configure
admin# set mgt-config users admin password
3. If you have a BYOL that you need to, set the DNS server IP address so that the Panorama virtual
appliance can access the Palo Alto Networks licensing server. Enter the following command to set the
DNS server IP address:
admin# commit
4. Select Sessions and enter the public IP address of the Panorama virtual appliance. Then Open and
click Yes when the security prompt appears.
5. Login as admin when prompted.
6. Configure a new password using the following commands and follow the on screen prompts:
admin> configure
admin# set mgt-config users admin password
7. Set the DNS server IP address so that the Panorama virtual appliance can access the Palo Alto
Networks licensing server. Enter the following command to set the DNS server IP address:
admin# commit
9. Terminate the SSH session.
STEP 11 | Activate the device management license and support license on the Panorama virtual
appliance.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected
• Activate a Panorama Support License
STEP 12 | Complete configuring the Panorama virtual appliance for your deployment needs.
Enter the Public IP address of the Dedicated Log Collector when you Add the Log
Collector as a managed collector to the Panorama management server. You cannot
specify the IP Address, Netmask, or Gateway.
• (Panorama and Management Only mode) Configure a Managed Collector to add a Dedicated Log
Collector to the Panorama virtual appliance. Management Only mode does not support local log
collection, and requires a Dedicated Log Collector to store managed device logs.
STEP 2 | Create a new virtual machine image and add the Panorama virtual appliance image for KVM to
the Virtual Machine Manager.
1. On the Virtual Machine Manager, select Create a new virtual machine.
2. Select Import Existing disk image and click Forward.
3. Browse and select the Panorama virtual appliance image volume and Choose volume.
4. Click Forward.
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector, ensure
that you configure the appliance with the required resources during initial deployment.
The Panorama virtual appliance does not remain in Log Collector mode if you resize the
virtual machine after you deploy it, and this results in a loss of log data.
1. Configure the Memory based on the requirements for the desired operational mode.
The Virtual Machine Manager may use MiB (mebibyte) to allocate memory depending
on the version you are running. If MiB is used, be sure to correctly convert your
required memory allocation to avoid under provisioning the Panorama virtual
appliance.
2. Configure the CPU based on the requirements for the desired operational mode.
3. Click Forward.
STEP 4 | Name the Panorama virtual appliance, enable configuration customization, and select the
management interface bridge.
1. Enter a descriptive Name for the Panorama virtual appliance.
2. Customize configuration before install.
3. Make a Network selection—select the bridge for the management interface and accept the default
settings.
4. Click Finish.
STEP 6 | Configure the virtual machine console display to use the VNC server to interact with the virtual
machine.
1. Select Display Spice.
Continue to the next step if Display VNC is listed in the Hardware list because the
virtual machine is already configured to use the VNC server for the display.
2. In the Type drop-down, select VNC server.
3. Click Apply.
The Virtual Machine Manager may use GiB (gibibyte) to allocate memory
depending on the version you are running. If GiB is used, be sure to correctly
convert the required storage capacity to avoid under provisioning the virtual logging
disk and sending the Panorama virtual appliance into maintenance mode.
2. Set the Device type to Disk device.
3. Set the Bus type to VirtIO or IDE, depending on your configuration.
4. Go to Advanced options and set Cache mode to writethrough.
3. Click Finish.
STEP 9 | Configure the network access settings for the management interface.
1. Open a connection to the console.
2. Log in to the firewall using the default username and password: admin/admin.
3. Enter configuration mode using the following command:
admin> configure
4. Use the following commands to configure and enable access to the management interface:
where <Panorama-IP> is the IP address you want to assign to the management interface, <netmask>
is the subnet mask, <gateway-IP> is the IP address of the network gateway, and <DNS-IP> is the IP
address of the DNS server.
admin# commit
STEP 10 | Activate the device management license and support license on the Panorama virtual
appliance.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected
• Activate a Panorama Support License
STEP 11 | Complete configuring the Panorama virtual appliance for your deployment needs.
• (Management Only mode) Set up a Panorama Virtual Appliance in Management Only Mode.
• (Log Collector mode) Begin at Step 6 to Switch from Panorama mode to Log Collector mode.
STEP 2 | Set up any vSwitch(es) that you will need. For more information, review the Virtual Switch
Types for more information.
1. From Hyper-V Manager, select the host and select Action > Virtual Switch Manager to open the
Virtual Switch Manager window.
2. Under Create virtual switch, select the type of vSwitch to create and click Create Virtual Switch.
1. Choose a Name and Location for the Panorama virtual appliance. The Panorama virtual appliance
stores the VHDX file at the specified location.
2. Choose Generation 1. This is the default option and the only version supported.
Do not enable dynamic memory; the Panorama virtual appliance requires static
memory allocation.
4. Configure Networking. Select an external vSwitch to connect the management interface on the
firewall.
5. To connect the Virtual Hard Disk, select Use an existing virtual hard disk and browse to the
VHDX file you downloaded earlier.
6. Review the summary and click Finish.
If you plan to use the Panorama virtual appliance as a Dedicated Log Collector, ensure
that you configure the appliance with the required resources during initial deployment.
The Panorama virtual appliance does not remain in Log Collector mode if you resize the
virtual machine after you deploy it, and this results in a loss of log data.
STEP 5 | Connect at least one network adapter for the dataplane interface on the firewall. Repeat this to
create additional network interfaces on the Panorama virtual appliance.
1. Select Settings > Hardware > Add Hardware and select the Hardware type for your network
adapter.
Legacy Network Adapter and SR-IOV are not supported. If selected, the VM-Series
firewall will boot into maintenance mode.
2. Click OK.
admin> configure
admin# set deviceconfig system ip-address <Panorama-IP> netmask <netmask>
default-gateway <gateway-IP> dns-setting servers primary <DNS-IP>
admin# commit
admin# exit
STEP 9 | Activate the device management license and support license on the Panorama virtual
appliance.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected
• Activate a Panorama Support License
STEP 10 | Complete configuring the Panorama virtual appliance for your deployment needs.
• (Management Only mode) Set up a Panorama Virtual Appliance in Management Only Mode.
• (Log Collector mode) Begin at Step 6 to Switch from Panorama mode to Log Collector mode.
Enter the Public IP address of the Dedicated Log Collector when you Add the Log
Collector as a managed collector to the Panorama management server. You cannot
specify the IP Address, Netmask, or Gateway.
• (Panorama and Management Only mode) Configure a Managed Collector to add a Dedicated Log
Collector to the Panorama virtual appliance. Management Only mode does not support local log
collection, and requires a Dedicated Log Collector to store managed device logs.
To complete the configuration of the MGT interface, you must specify the IP address,
netmask (for IPv4) or prefix length (for IPv6), and default gateway. If you omit settings
(such as the default gateway), you can access Panorama only through the console
port for future configuration changes. As a best practice, always commit a complete
MGT interface configuration.
Starting with PAN-OS 9.0.4, the predefined, default administrator password (admin/
admin) must be changed on the first login on a device. The new password must be
a minimum of eight characters and include a minimum of one lowercase and one
uppercase character, as well as one number or special character.
Be sure to use the best practices for password strength to ensure a strict password and
review the password complexity settings.
To ensure that the management interface remains secure, configure the Minimum
Password Complexity (Panorama > Setup > Management).
1. Click the admin link on the left side of the web interface footer.
2. Enter the Old Password and the New Password and record the new password in a safe location.
3. Click OK.
STEP 4 | Configure the network access settings for the MGT interface.
Panorama uses the MGT interface for management traffic, high availability synchronization, log
collection, and communication within Collector Groups.
> configure
# set deviceconfig system ip-address <Panorama-IP> netmask <netmask>
default-gateway <gateway-IP> dns-setting servers primary <DNS-IP>
# commit
# exit
2. Troubleshoot Connectivity to Network Resources to verify network access to external services
required for firewall management, such as the default gateway, DNS server, and the Palo Alto
Networks Update Server, as shown in the following example:
Don’t select Telnet or HTTP. These services use plaintext and are less secure than
the other services.
4. Click OK to save your changes to the interface.
Switching the virtual appliance from Panorama mode to Log Collector mode reboots the
appliance, deletes the local Log Collector, deletes any existing log data, and deletes all
configurations except the management access settings. Switching the mode does not delete
licenses, software updates, or content updates.
STEP 1 | Set up the Panorama virtual appliance management server that will manage the Log Collector if
you have not already done so.
Perform one of the following tasks:
• Set Up the Panorama Virtual Appliance
• Set Up the M-Series Appliance
STEP 3 | Set up the Panorama virtual appliance that will serve as a Dedicated Log Collector.
If you previously deployed this appliance as a Panorama management server, you can skip this step
because the MGT interface is already configured and the licenses and updates are already installed.
The Panorama virtual appliance in Log Collector mode does not have a web interface for configuration
tasks, only a CLI. Therefore, before changing the mode on the Panorama virtual appliance, use the web
interface in Panorama mode to:
1. Set up the Panorama virtual appliance in one of the following supported hypervisors:
• Install Panorama on an ESXi Server
• Install Panorama on AWS.
• Install Panorama on AWS GovCloud
• Install Panorama on Azure.
• Install Panorama on Google Cloud Platform.
• Install Panorama on Hyper-V
2. Perform Initial Configuration of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Software Updates for Panorama.
STEP 5 | (Panorama on AWS and Azure only) Delete all users, except for the admin user.
1. Log in to the Panorama Web Interface as admin.
2. Select Panorama > Administrators.
3. Select the existing Administrators, except admin, and Delete.
4. Select Commit > Commit to Panorama and Commit your changes.
If you see a CMS Login prompt, this means the Log Collector has not finished
rebooting. Press Enter at the prompt without typing a username or password.
3. Log back in to the CLI.
4. Verify that the switch to Log Collector mode succeeded:
system-mode: logger
STEP 8 | Enable connectivity between the Log Collector and Panorama management server.
Enter the following commands at the Log Collector CLI, where <IPaddress1> is for the MGT interface of
the solitary (non-HA) or active (HA) Panorama and <IPaddress2> is for the MGT interface of the passive
(HA) Panorama, if applicable.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
# exit
STEP 10 | Add the Log Collector as a managed collector to the Panorama management server.
1. Select Panorama > Managed Collectors and Add a managed collector.
2. In the General settings, enter the serial number (Collector S/N) you recorded for the Log Collector.
3. In the Panorama Server IP field, enter the IP address or FQDN of the solitary (non-HA) or active (HA)
Panorama. For HA deployments, enter the IP address or FQDN of the passive Panorama peer in the
Panorama Server IP 2 field.
These IP addresses must specify a Panorama interface that has Device Management and Device
Log Collection services enabled. By default, these services are enabled only on the MGT interface.
However, you might have enabled the services on other interfaces when you Set Up the M-Series
Appliance that is a Panorama management server.
4. Select Interfaces, click Management, and enter the Public IP Addressof the Dedicated Log Collector.
5. Click OK twice to save your changes to the Log Collector.
6. Select Commit > Commit to Panorama and Commit your changes to the Panorama configuration.
At this point, the Configuration Status column displays Out of Sync and the Run
Time Status column displays disconnected. The status will change to In Sync and
connected after you configure a Collector Group.
STEP 12 | (Recommended) Configure the Ethernet1, Ethernet2, Ethernet3, Ethernet4, and Ethernet5
interfaces if the Panorama management server and Log Collector will use them for Device
Log Collection (receiving logs from firewalls) and Collector Group Communication.
If you previously deployed the Log Collector as a Panorama management server and configured these
interfaces, you must reconfigure them because switching to Log Collector mode would have deleted all
configurations except the management access settings.
1. Configure each interface on the Panorama management server (other than the MGT interface) if you
haven’t already:
1. Select Panorama > Setup > Interfaces and click the Interface Name.
2. Select <interface-name> to enable the interface.
3. Complete one or both of the following field sets based on the IP protocols of your network:
• For ESXi
• IPv4—Public IP Address, IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
• For AWS, Azure, and Google™ Cloud Platform
• Public IP address
4. Select the Device Management Services that the interface supports:
Device Management and Device Log Collection—You can assign one or more interfaces.
Collector Group Communication—You can assign only one interface.
Device Deployment (software and content updates)—You can assign only one interface.
5. Click OK to save your changes.
2. Configure each interface on the Log Collector (other than the MGT interface):
1. Select Panorama > Managed Collectors and edit the Log Collector.
2. Select Interfaces and click the name of the interface.
3. Select <interface-name> to enable the interface.
4. Complete one or both of the following field sets based on the IP protocols of your network:
• For ESXi
• IPv4—Public IP Address, IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
• For AWS and Azure
• Public IP address
STEP 13 | (Optional) If your deployment is using custom certificates for authentication between
Panorama and managed devices, deploy the custom client device certificate. For more
information, see Set Up Authentication Using Custom Certificates.
1. Select Panorama > Certificate Management > Certificate Profile and choose the certificate profile
from the drop-down or click New Certificate Profile to create one.
2. Select Panorama > Managed Collectors > Add > Communication for a Log Collector.
3. Select the Secure Client Communication check box.
4. Select the type of device certificate the Type drop-down.
• If you are using a local device certificate, select the Certificate and Certificate Profile from the
respective drop-downs.
• If you are using SCEP as the device certificate, select the SCEP Profile and Certificate Profile from
the respective drop-downs.
5. Click OK.
STEP 14 | (Optional) Configure Secure Server Communication Sn a Log Collector. For more information,
see Set Up Authentication Using Custom Certificates.
1. Select Panorama > Managed Collectors > Add > Communication.
2. Verify that the Custom Certificate Only check box is not selected. This allows you to continue
managing all devices while migrating to custom certificates.
When the Custom Certificate Only check box is selected, the Log Collector does not
authenticate and cannot receive logs from devices using predefined certificates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This SSL/TLS service
profile applies to all SSL connections between the Log Collector and devices sending it logs.
4. Select the certificate profile from the Certificate Profile drop-down.
5. Select Authorize Client Based on Serial Number to have the server check clients against the serial
numbers of managed devices. The client certificate must have the special keyword $UDID set as the
CN to authorize based on serial numbers.
6. In Disconnect Wait Time (min), enter the number of minutes Panorama should wait before breaking
and reestablishing the connection with its managed devices. This field is blank by default and the
range is 0 to 44,640 minutes.
The disconnect wait time does not begin counting down until you commit the new
configuration.
7. (Optional) Configure an authorization list.
1. Click Add under Authorization List.
2. Select the Subject or Subject Alt Name as the Identifier type.
3. Enter an identifier of the selected type.
4. Click OK.
5. Select Check Authorization List to enforce the authorization list.
8. Click OK.
9. Select Commit > Commit to Panorama.
In any single Collector Group, all the Log Collectors must run on the same Panorama
model: all M-600 appliances, all M-500 appliances, all M-200 appliances, all M-100
appliances, or all Panorama virtual appliances.
As a best practice, Enable log redundancy across collectors if you add multiple Log
Collectors to a single Collector group. This option requires each Log Collector to have
the same number of logging disks.
2. Select Panorama > Managed Collectors to verify that the Log Collector configuration is synchronized
with Panorama.
The Configuration Status column should display In Sync and the Run Time Status column should
display connected.
3. Access the Log Collector CLI and enter the following command to verify that its interfaces are
operational:
The output displays the state as up for each interface that is operational.
4. If the Collector Group has multiple Log Collectors, Troubleshoot Connectivity to Network Resources
to verify they can communicate with each other by performing a Ping connectivity test for each
interface that the Log Collectors use. For the source IP address, specify the interface of one of the
Log Collectors. For the host IP address, specify the matching interface of another Log Collector in
the same Collector Group.
Once you change from Legacy mode to Panorama mode, Legacy mode will no longer be
available.
After upgrading to Panorama 8.1, the first step is to increase the system resources on the virtual appliance
to the minimum required for Panorama mode. Panorama reboots when you increase resources, so perform
this procedure during a maintenance window. You must install a larger system disk (81GB), increase CPUs
and memory based on the log storage capacity, and add a virtual logging disk. The new logging disk must
have at least as much capacity as the appliance currently uses in Legacy mode and cannot be less than 2TB.
Adding a virtual disk enables you to migrate existing logs to the Log Collector and enables the Log Collector
to store new logs.
STEP 1 | Determine which system resources you need to increase before the virtual appliance can
operate in Panorama mode.
You must run the command specified in this step even if you have determined that
Panorama already has adequate resources.
Enter y when prompted to continue. The output specifies the resources you must increase. For
example:
Panorama mode not supported on current system disk of size 52.0 GB.
Please attach a disk of size 81.0 GB, then use 'request system clone-
system-disk' to migrate the current system disk
Please add a new virtual logging disk with more than 50.00 GB of storage
capacity.
Not enough CPU cores: Found 4 cores, need 8 cores
STEP 2 | Increase the CPUs and memory, and replace the system disk with a larger disk.
1. Access the VMware ESXi vSphere Client, select Virtual Machines, right-click the Panorama virtual
appliance, and select Power > Power Off.
2. Right-click the Panorama virtual appliance and Edit Settings.
3. Select Memory and enter the new Memory Size.
4. Select CPUs and specify the number of CPUs (the Number of virtual sockets multiplied by the
Number of cores per socket).
5. Add a virtual disk.
You will use this disk to replace the existing system disk.
1. In the Hardware settings, Add a disk, select Hard Disk as the hardware type, and click Next.
2. Create a new virtual disk and click Next.
3. Set the Disk Size to exactly 81GB and select the Thick Provision Lazy Zeroed disk format.
4. Select Specify a datastore or datastore structure as the location, Browse to a datastore of at least
81GB, click OK, and click Next.
5. Select a SCSI Virtual Device Node (you can use the default selection) and click Next.
Panorama will fail to boot if you select a format other than SCSI.
6. Verify that the settings are correct and then click Finish and OK.
6. Right-click the Panorama virtual appliance and select Power > Power On. Wait for Panorama to
reboot before continuing.
7. Return to the Panorama CLI and copy the data from the original system disk to the new system disk:
Enter y when prompted to continue. After rebooting, Panorama automatically creates a local Log
Collector (named Panorama) and creates a Collector Group (named default) to contain it. Panorama
also configures the virtual logging disk you added and divides it into separate 2TB disks. Wait for the
process to finish and for Panorama to reboot (around five minutes) before continuing.
2. Log in to the Panorama web interface.
3. In the Dashboard, General Information settings, verify that the Mode is now panorama.
In an HA deployment, the secondary peer is in a suspended state at this point because its mode
(Panorama) does not match the mode on the primary peer (Legacy). You will un-suspend the
secondary peer after switching the primary peer to Panorama mode later in this procedure.
4. Select Panorama > Collector Groupsto verify that the default collector group has been created, and
that the local Log Collector is part of the default collector group.
STEP 5 | (HA only) Switch the primary Panorama from Legacy mode to Panorama mode.
The process duration varies by the volume of log data you are migrating. To check the status of the
migration, run the following command:
When the migration finishes, the output displays: migration has been done.
3. Verify that the existing logs are available.
For additional log storage, you can also forward firewall logs to Dedicated Log Collectors
(see Configure a Managed Collector) or Configure Log Forwarding from Panorama to
External Destinations.
Before expanding log storage capacity on Panorama, Determine Panorama Log Storage Requirements.
• Preserve Existing Logs When Adding Storage on Panorama Virtual Appliance in Legacy Mode
• Add a Virtual Disk to Panorama on an ESXi Server
• Add a Virtual Disk to Panorama on vCloud Air
• Add a Virtual Disk to Panorama on AWS
• Add a Virtual Disk to Panorama on Azure
• Add a Virtual Disk to Panorama on Google Cloud Platform
• Add a Virtual Disk to Panorama on KVM
• Add a Virtual Disk to Panorama on Hyper-V
• Mount the Panorama ESXi Server to an NFS Datastore
• Configure log forwarding to external destinations before you replace the virtual disk.
• Set up a new Panorama virtual appliance for the new 8TB disk and maintain access to the
Panorama containing the old disk for as long as you need the logs. To forward firewall logs to
the new Panorama virtual appliance, one option is to reconfigure the firewalls to connect with
the new Panorama IP address (select Device > Setup > Management and edit the Panorama
Settings), add the firewalls as managed devices to the new Panorama, and Configure Log
Forwarding to Panorama. To reuse the old Panorama IP address on the new Panorama, another
option is to export the configuration of the old Panorama and then import and load the
configuration on the new Panorama.
• Copy logs from the old disk to the new disk. Copying can take several hours, depending on
how many logs the disk currently stores, and Panorama cannot collect logs during the process.
Contact Palo Alto Networks Customer Support for instructions.
If Panorama loses connectivity to the new virtual disk, Panorama might lose logs during the
failure interval.
To allow for redundancy, use the virtual disk in a RAID configuration. RAID10 provides the
best write performance for applications with high logging characteristics.
If necessary, you can Replace the Virtual Disk on an ESXi Server.
In all modes, the first logging disk on the Panorama VM must be at least 2TB in order to
add additional disks. If the first logging disk is smaller than 2TB, you will be unable to add
additional disk space.
In Panorama mode, you can add disk sizes larger than 2TB and Panorama will
automatically create as many 2TB partitions as possible. For example, if disk sdc was
24TB, it will create 12 2TB partitions. These disks will be named sdc1-12.
8. Select the Disk Provisioning format and click Next.
9. Specify a datastore or datastore structure, Browse to a datastore with enough space for the
specified Disk Size, click OK, and click Next.
10.Select a SCSI Virtual Device Node (you can use the default selection) and click Next.
The selected node must be in SCSI format; Panorama will fail to boot if you select
another format.
11.Verify that the settings are correct and then click Finish and OK.
The new disk appears in the list of devices for the virtual appliance.
12.Repeat Step 4 through Step 11 to add additional disks to the Panorama virtual appliance if necessary.
13.Right click the Panorama virtual appliance and select Power > Power On. The virtual disk initializes
for first-time use. The size of the new disk determines how long initialization takes.
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admindisabled response:
request system disk add sdc
STEP 5 | Verify that the Panorama Log Storage capacity has been increased.
1. Log in to the Panorama web interface.
2. Select Panorama > Collector Groups and select the Collector Group that the Panorama virtual
appliance belongs to.
3. Verify that the Log Storage capacity accurately displays the disk capacity.
If Panorama loses connectivity to the new virtual disk, Panorama might lose logs for the
duration of the failure.
If necessary, you can Replace the Virtual Disk on vCloud Air.
In all modes, the first logging disk on the Panorama VM must be at least 2TB to add
additional disks. If the first logging disk is less than 2TB, you will be unable to add
additional disk space.
1. Access the vCloud Air web console and select your Virtual Private Cloud On Demand region.
2. Select the Panorama virtual appliance in the Virtual Machines tab.
3. Add another disk (Actions > Edit Resources).
4. Set the Storage size. If the Panorama virtual appliance is in Panorama mode, set the size to at least
2TB. If the appliance is in Legacy mode, you can set the size to as much as 8TB.
In Panorama mode, you can add disk sizes larger than 2TB and Panorama will
automatically create as many 2TB partitions as possible. For example, if disk sdc
was 24TB, Panorama will create 12 2TB partitions. These disks will be named sdc1
through sdc12.
5. Set the storage tier to Standard or SSD-Accelerated.
6. Repeat the previous steps to add additional disks to the Panorama virtual appliance as needed.
7. Save your changes.
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admin disabled response:
request system disk add sdc
STEP 5 | Verify that the Panorama Log Storage capacity has been increased.
1. Log in to the Panorama web interface.
2. Select Panorama > Collector Groups and select the Collector Group to which the virtual Panorama
appliance belongs.
3. Verify that the Log Storage capacity accurately displays your new disk capacity.
STEP 1 | Log in to AWS Web Service console and select the EC2 Dashboard.
• Amazon Web Service Console
• AWS GovCloud Web Service Console
3. In the Volumes page, select the volume you, select Actions > Attach Volume.
4. Attach the Panorama virtual appliance Instance.
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admin disabled response:
request system disk add sdc
STEP 5 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an existing Panorama virtual appliance, skip to step 6.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admin disabled response:
request system disk add sdc
STEP 5 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an existing Panorama virtual appliance, skip to step 6.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admin disabled response:
request system disk add sdc
STEP 6 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an existing Panorama virtual appliance, skip to step 7.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
STEP 1 | Shutdown the Panorama virtual appliance instance on the Virtual Machine Manager.
STEP 2 | Double-click the Panorama virtual appliance instance in the Virtual Machine Manager and
Show virtual hardware details .
STEP 3 | Add the virtual logging disk. Repeat this step as many times as needed.
1. Create a disk image for a virtual image (Add Hardware > Storage) and configure the virtual disk
storage capacity to the appropriate 2TB value:2000GB or 14901.2GiB depending on your Virtual
Machine Manager.
Depending on the version, some Virtual Machine Managers use GiB (gibibyte) to
allocate memory. Be sure you correctly convert the required storage capacity to avoid
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admin disabled response:
request system disk add sdc
STEP 7 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an existing Panorama virtual appliance, skip to step 8.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
STEP 2 | Add the virtual logging disk. Repeat this step as many times as needed.
1. Select the Panorama virtual appliance from the list of Virtual Machines, and select Action > Settings.
2. In the Hardware list, select IDE Controller 0.
3. From the IDE Controller drives list, select Hard Drive and Add the new virtual logging disk.
Name
: sdb
State : Present
Size : 2048 MB
Status : Available
Reason : Admin enabled
Name : sdc
State : Present
Size : 2048 MB
Status : Available
Reason : Admin disabled
3. Enter the following command and confirm the request when prompted for all disks with the
Reason : Admin disabled response:
request system disk add sdc
STEP 7 | (New Panorama deployments in Panorama mode only) Configure Panorama to receive logs.
If you are adding logging disks to an existing Panorama virtual appliance, skip to Step 8.
1. Configure a Collector Group.
2. Configure Log Forwarding to Panorama.
The Panorama virtual appliance in Panorama mode does not support NFS.
STEP 1 | Select Panorama > Setup > Operations and, in the Miscellaneous section, click Storage
Partition Setup.
STEP 4 | Enter the Log Directory path for storing the log files. For example, export/panorama.
STEP 5 | For the Protocol, select TCP or UDP, and enter the Port for accessing the NFS server.
To use NFS over TCP, the NFS server must support it. Common NFS ports are UDP/TCP
111 for RPC and UDP/TCP 2049 for NFS.
STEP 7 | (Optional) Select Copy On Setup to copy the existing logs stored on Panorama to the NFS
volume. If Panorama has a lot of logs, this option might initiate the transfer of a large volume of
data.
STEP 8 | Click Test Logging Partition to verify that Panorama can access the NFS Server and Log
Directory.
STEP 10 | Select Commit > Commit to Panorama and Commit your changes. Until you reboot, the
Panorama virtual appliance writes logs to the local storage disk.
STEP 11 | Select Panorama > Setup > Operations and select Reboot Panorama in the Device
Operations section. After rebooting, Panorama starts writing logs to the NFS datastore.
STEP 1 | Access the VMware vSphere Client and select Virtual Machines.
STEP 2 | Right-click the Panorama virtual appliance and select Power > Power Off.
STEP 3 | Right-click the Panorama virtual appliance and select Edit Settings.
STEP 5 | Select CPUs and specify the number of CPUs (the Number of virtual sockets multiplied by the
Number of cores per socket).
STEP 7 | Right-click the Panorama virtual appliance and select Power > Power On.
STEP 1 | Access the vCloud Air web console and select your Virtual Private Cloud OnDemand region.
STEP 2 | In the Virtual Machines tab, select the Panorama virtual machine and Power Off.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine after you deploy it and this can result in a loss of log data.
STEP 1 | Log in to AWS Web Service console and select the EC2 Dashboard.
• Amazon Web Service Console
• AWS GovCloud Web Service Console
STEP 2 | On the EC2 Dashboard, select Instances and select the Panorama virtual appliance instance.
STEP 3 | Select Actions > Instance State > Stop to power off the Panorama virtual appliance instance.
STEP 4 | Select Actions > Instance Settings > Change Instance Type to change the Panorama virtual
appliance instance type.
STEP 5 | Select the Instance Type to which you want to upgrade and Apply it.
STEP 6 | Select Actions > Instance State > Start to power on the Panorama virtual appliance instance.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine after you deploy it and this can result in a loss of log data.
STEP 2 | On the Azure Dashboard, under Virtual machines, select the Panorama virtual appliance.
STEP 4 | Choose the new virtual machine Size and then Select it.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine after you deploy it and this can result in a loss of log data.
STEP 4 | Save the changes to update the Panorama virtual appliance instance.
A Panorama virtual appliance in Log Collector mode does not remain in Log Collector mode
if you resize the virtual machine after you deploy it and this can result in a loss of log data.
STEP 1 | Shutdown the Panorama virtual appliance instance on the Virtual Machine Manager.
STEP 2 | Double-click the Panorama virtual appliance instance in the Virtual Machine Manager and
Show virtual hardware details .
STEP 2 | On the Hyper-V Manager, select the Panorama virtual appliance instance form the list
of Virtual Machines, and select Action > Settings to edit the Panorama virtual appliance
resources.
M-100 appliances are supported in PAN-OS 9.0 only if they have been upgraded to 32GB
memory from the default 16GB. See M-100 Memory Upgrade Guide for more information.
The M-Series appliances do not support Link Aggregation Control Protocol (LACP) for
aggregating interfaces.
Supported Interfaces
Interfaces can be used for device management, log collection, Collector Group communication, licensing
and software updates. See Configure Panorama to Use Multiple Interfaces for more information on network
segmentation.
Management 1Gbps
(MGT)
Ethernet 1 1Gbps
(Eth1)
Ethernet 2 1Gbps
(Eth2)
Ethernet 3 1Gbps
(Eth3)
Ethernet 4 10Gbps — —
(Eth4)
Ethernet 5 10Gbps — —
(Eth5)
Logging Rates
Review the logging rates for the all M-Series appliance models. To achieve the logging rates listed below,
the M-Series appliance must be a single log collector in a collector group and you must install all the logging
disks for your M-Series model. For example, to achieve 30,000 logs/second for the M-500 appliance, you
must install all 12 logging disks with either 1TB or 2TB disks.
Model Capacities and M-600 Appliance M-500 Appliance M-200 Appliance M-100 Appliance
Features
Maximum Logging 60,000 logs/ 20,000 logs/ 22,000 logs/ 10,000 logs/
Rate for Panorama second second second second
in Panorama Mode
Maximum Logging Data collection 30,000 logs/ Data collection 18,000 logs/
Rate for Panorama in-progress second in-progress second
in Log Collector
Mode
Maximum Log 48TB (12 8TB • 24TB (24 2TB 16TB (4 8TB • 8TB (8 2TB
Storage on RAID disk) RAID disks) RAID disk) RAID Disk)
Appliance • 12TB (24 1TB • 4TB (8 1TB
RAID Disk) RAID Disk)
STEP 1 | Gather the required interface and server information from your network administrator.
• Gather the IP address, netmask (for IPv4) or prefix length (for IPv6), and default gateway for each
interface that you plan to configure (MGT, Eth1, Eth2, Eth3, Eth4, Eth5). Only the MGT interface is
mandatory.
Palo Alto Networks recommends that you specify all these settings for the MGT
interface. If you omit values for some of these settings (such as the default gateway),
you can access Panorama only through the console port for future configuration
changes. You cannot commit the configurations for other interfaces unless you specify
all these settings.
If you plan to use the appliance as a Panorama management server, Palo Alto Networks recommends
using the MGT interface only for managing Panorama and using other interfaces for managing
devices, collecting logs, communicating with Collector Groups, and deploying updates to devices (see
M-Series Appliance Interfaces).
• Gather the IP addresses of the DNS servers.
1. Click the admin link in the lower left of the web interface.
2. Enter the Old Password, New Password, and Confirm New Password, and then click OK. Store the
new password in a safe location.
To ensure that the MGT interface remains secure, configure Minimum Password
Complexity settings (select Panorama > Setup > Management) and specify the
interval at which administrators must change their passwords.
STEP 4 | Configure the network access settings for each interface that you will use to manage
Panorama, manage devices, collect logs, communicate with Collector Groups, and deploy
updates to devices.
1. Select Panorama > Setup > Interfaces and click the Interface Name.
2. (Non-MGT interfaces only) Enable the interface.
3. Edit the network access settings of each interface that Panorama will use. Only the MGT interface is
required. The Eth1, Eth2, Eth3, Eth4, and Eth5 interfaces are optional and apply only if you plan to
use the M-Series appliance as a Panorama management server.
1. Complete one or both of the following field sets based on the IP protocols of your network:
IPv4—Public IP Address, IP Address, Netmask, and Default Gateway
(MGT interface only) Disable Telnet and HTTP; these services use plaintext and so
are less secure than other services.
4. Click OK to save your changes.
STEP 6 | Configure the DNS servers and Palo Alto Networks Update Server.
1. Select Panorama > Setup > Services and edit the settings.
2. Enter the IP address of the Primary DNS Server and (optionally) of the Secondary DNS Server.
3. Enter the URL or static address of the Update Server (default updates.paloaltonetworks.com).
Select Verify Update Server Identity if you want Panorama to verify that the Update
Server from which it downloads software or content packages has an SSL certificate
that a trusted authority signed. This option adds an additional level of security for
communication between the Panorama management server and Update Server.
4. Click OK to save your entries.
If you plan to use the M-Series appliance as a Panorama management server and you
configured interfaces other than MGT, you must assign those interfaces to the Device Log
Collection or Collector Group Communication functions when you Configure a Managed
Collector. To make the interfaces operational, you must then Configure a Collector Group
for the managed collector and perform a Collector Group commit.
STEP 8 | Verify network access to external services required for Panorama management, such as the
Palo Alto Networks Update Server.
1. Connect to the M-Series appliance in one of the following ways:
• Attach a serial cable from your computer to the Console port on the M-Series appliance. Then use
a terminal emulation software (9600-8-N-1) to connect.
• Use terminal emulation software such as PuTTY to open an SSH session to the IP address that you
specified for the MGT interface of the M-Series appliance during initial configuration.
2. Log in to the CLI when prompted. Use the default admin account and the password that you
specified during initial configuration.
3. Use the Update Server Connectivity test to verify network connectivity to the Palo Alto Networks
Update Server as shown in the following example.
1. Select Panorama > Managed Devices > Troubleshooting, and select Updates Server Connectivity
from the Select Test drop-down.
2. Execute the update server connectivity test.
If you have connectivity, the Update Server responds with the support status for Panorama. Because
Panorama is not registered, the Update Server returns the following message:
Contact Us
https://www.paloaltonetworks.com/company/contact-us.html
Support Home
https://www.paloaltonetworks.com/support/tabs/overview.html
Device not found on this update server
As a best practice, replace the default certificate that Panorama uses to secure
HTTPS traffic over the MGT interface.
STEP 5 | Configure each array. This task is required to make the RAID disks available for logging.
Optionally, you can add disks to Increase Storage on the M-Series Appliance.
STEP 5 | See step Configure each array.. This task is required to make the RAID disks available for
logging. Optionally, you can add disks to Increase Storage on the M-Series Appliance.
Switching the M-Series appliance from Panorama mode to Log Collector mode reboots the
appliance, deletes the local Log Collector, deletes any existing log data, and deletes all
configurations except the management access settings. Switching the mode does not delete
licenses, software updates, or content updates.
STEP 1 | Set up the Panorama management server that will manage the Log Collector if you have not
already done so.
Perform one of the following tasks:
• Set Up the Panorama Virtual Appliance
• Set Up the M-Series Appliance
STEP 3 | Set up the M-Series appliance that will serve as a Dedicated Log Collector.
If you previously deployed this appliance as a Panorama management server, you can skip this step
because the MGT interface is already configured and the licenses and updates are already installed.
The M-Series appliance in Log Collector mode does not have a web interface for configuration tasks,
only a CLI. Therefore, before changing the mode on the M-Series appliance, use the web interface in
Panorama mode to:
1. Perform Initial Configuration of the M-Series Appliance.
2. Register Panorama and Install Licenses.
3. Install Content and Software Updates for Panorama.
If you see a CMS Login prompt, this means the Log Collector has not finished
rebooting. Press Enter at the prompt without typing a username or password.
3. Log back in to the CLI.
4. Verify that the switch to Log Collector mode succeeded:
system-mode: logger
The time required to configure the drives varies from several minutes to a couple of
hours, based on the amount of data on the drives.
Perform the remaining steps to configure each disk pair that has present disks. This example uses
disk pair A1/A2.
2. To add the first disk in the pair, enter the following command and enter y when prompted to confirm
the request:
Wait for the process to finish before adding the next disk in the pair. To monitor the progress of the
RAID configuration, re-enter:
After the process finishes for the first disk, the output displays the disk pair status as Available but
degraded.
3. Add the second disk in the pair:
After the process finishes for the second disk, the output displays the disk pair status as Available
and clean:
STEP 7 | Enable connectivity between the Log Collector and Panorama management server.
Enter the following commands at the Log Collector CLI, where <IPaddress1> is for the MGT interface of
the solitary (non-HA) or active (HA) Panorama and <IPaddress2> is for the MGT interface of the passive
(HA) Panorama, if applicable.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
# exit
STEP 9 | Add the Log Collector as a managed collector to the Panorama management server.
1. Select Panorama > Managed Collectors and Add a managed collector.
2. In the General settings, enter the serial number (Collector S/N) you recorded for the Log Collector.
3. In the Panorama Server IP field, enter the IP address or FQDN of the solitary (non-HA) or active (HA)
Panorama. For HA deployments, enter the IP address or FQDN of the passive Panorama peer in the
Panorama Server IP 2 field.
These IP addresses must specify a Panorama interface that has Device Management and Device
Log Collection services enabled. By default, these services are enabled only on the MGT interface.
However, you might have enabled the services on other interfaces when you Set Up the M-Series
Appliance that is a Panorama management server.
4. Select Interfaces, click Management, and configure one or both of the following field sets for the
MGT interface based on the IP protocols of your network.
• IPv4—IP Address, Netmask, and Default Gateway
• IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
5. Click OK twice to save your changes to the Log Collector.
6. Select Commit > Commit to Panorama and Commit your changes to the Panorama configuration.
This step is required before you can enable logging disks.
7. Verify that Panorama > Managed Collectors lists the Log Collector you added. The Connected
column displays a check mark to indicate that the Log Collector is connected to Panorama. You might
have to wait a few minutes before the page displays the updated connection status.
At this point, the Configuration Status column displays Out of Sync and the Run
Time Status column displays disconnected. The status will change to In Sync and
connected after you configure a Collector Group (Step Assign the Log Collector to a
Collector Group.).
STEP 11 | (Recommended) Configure the Ethernet1, Ethernet2, Ethernet3, Ethernet4, and Ethernet5
interfaces if the Panorama management server and Log Collector will use them for Device
Log Collection (receiving logs from firewalls) and Collector Group Communication.
If you previously deployed the Log Collector as a Panorama management server and configured these
interfaces, you must reconfigure them because switching to Log Collector mode (Switch from Panorama
mode to Log Collector mode.) would have deleted all configurations except the management access
settings.
1. Configure each interface on the Panorama management server (other than the MGT interface) if you
haven’t already:
1. Select Panorama > Setup > Interfaces and click the Interface Name.
2. Select <interface-name> to enable the interface.
3. Complete one or both of the following field sets based on the IP protocols of your network:
STEP 12 | (Optional) If your deployment is using custom certificates for authentication between
Panorama and managed devices, deploy the custom client device certificate. For more
information, see Set Up Authentication Using Custom Certificates.
1. Select Panorama > Certificate Management > Certificate Profile and choose the certificate profile
from the drop-down or click New Certificate Profile to create one.
2. Select Panorama > Managed Collectors > Add > Communication for a Log Collector.
3. Select the Secure Client Communication check box.
4. Select the type of device certificate the Type drop-down.
• If you are using a local device certificate, select the Certificate and Certificate Profile from the
respective drop-downs.
• If you are using SCEP as the device certificate, select the SCEP Profile and Certificate Profile from
the respective drop-downs.
5. Click OK.
STEP 13 | (Optional) Configure Secure Server Communication on a Log Collector. For more information,
see Set Up Authentication Using Custom Certificates.
1. Select Panorama > Managed Collectors > Add > Communication.
2. Verify that the Custom Certificate Only check box is not selected. This allows you to continue
managing all devices while migrating to custom certificates.
When the Custom Certificate Only check box is selected, the Log Collector does not
authenticate and cannot receive logs from devices using predefined certificates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This SSL/TLS service
profile applies to all SSL connections between the Log Collector and devices sending it logs.
4. Select the certificate profile from the Certificate Profile drop-down.
The disconnect wait time does not begin counting down until you commit the new
configuration.
7. (Optional) Configure an authorization list.
1. Click Add under Authorization List.
2. Select the Subject or Subject Alt Name as the Identifier type.
3. Enter an identifier of the selected type.
4. Click OK.
5. Select Check Authorization List to enforce the authorization list.
8. Click OK.
9. Select Commit > Commit to Panorama.
In any single Collector Group, all the Log Collectors must run on the same Panorama
model: all M-600 appliances, all M-500 appliances, all M-200 appliances or all M-100
appliances, or all Panorama virtual appliances.
As a best practice, Enable log redundancy across collectors if you add multiple Log
Collectors to a single Collector group. This option requires each Log Collector to have
the same number of logging disks.
2. Select Panorama > Managed Collectors to verify that the Log Collector configuration is synchronized
with Panorama.
The Configuration Status column should display In Sync and the Run Time Status column should
display connected.
3. Access the Log Collector CLI and enter the following command to verify that its interfaces are
operational:
The output displays the state as up for each interface that is operational.
4. If the Collector Group has multiple Log Collectors, Troubleshoot Connectivity to Network Resources
to verify they can communicate with each other by performing a Ping connectivity test for each
interface that the Log Collectors use. For the source IP address, specify the interface of one of the
Log Collectors. For the host IP address, specify the matching interface of another Log Collector in
the same Collector Group.
The M-Series appliances leverage RAID 1 for data redundancy in the event of disk failure.
Therefore, the pair of drives in a RAID 1 array need to be identical. However, you are free
to mix drive capacities across different RAID 1 arrays. For example, the drives in the A1/
A2 RAID 1 array can be 1TB drives, and the drives in the B1/B2 RAID 1 array can be 2TB
drives.
The following table lists the maximum number of drive bays and the available drive capacities supported on
M-Series appliances.
Because each drive pair (A1/A2 for example) is in a RAID 1 array, the total storage capacity
is half of the total drives installed. For example, if an M-100 appliance has 2TB drives
installed in drive bays A1/A2 and B1/B2, the A1/A2 array provides 2TB total storage and the
B1/B2 array provides another 2TB for a total of 4TB.
Before expanding log storage capacity, Determine Panorama Log Storage Requirements. If you need more
log storage than a single M-Series appliance supports, you can add Dedicated Log Collectors (see Configure
a Managed Collector) or you can Configure Log Forwarding from Panorama to External Destinations.
You don’t need to take the M-Series appliance offline to expand the storage when adding
drives to an M-Series appliance that is already deployed. When the additional drives are
configurable and available, the M-Series appliance redistributes the logs among all available
drives. This log redistribution process happens in the background and does not impact
uptime or the availability of the M-Series appliance. However, the process does diminish
the maximum logging rate. The Redistribution State column (Panorama > Collector Groups)
indicates the completion status of the process as a percentage.
The time required to mirror the data on the drive may vary from several minutes to a few
hours, depending on the amount of data on the drive.
STEP 3 | Verify that the RAID 1 status for the installed drives shows there are at least two functioning
RAID 1 arrays. During the upgrade, you will upgrade one RAID 1 array at a time and there must
be at least one other RAID 1 array that is available to the appliance. The appliance will show an
abort error if you try to remove the only functioning array from the configuration.
Enter the following command to view RAID status:
For example, the following shows an output from an M-500 appliance with two available arrays (Disk
Pair A and Disk Pair B). If there is only one available array, you must add a second array as described in
Add Additional Drives to an M-Series Appliance before you upgrade the drives.
Verify that the A1 disk shows the correct model and size (about 2TB). If the model and size are not
correct, run the above command again until the correct model and size are shown.
If the wrong model and size are consistently shown, enter the following command:
Wait for 30 seconds once you run the above command, then remove the disk and reinsert it and
repeat the show system raid detail command to verify the size and model.
STEP 5 | Copy the data from the remaining installed 1TB drive in the RAID 1 array to the newly installed
2TB drive in that array.
The time required to copy the data may vary from several minutes to a few hours,
depending on the amount of data on the drive.
1. To copy the data from the 1TB drive in drive bay A2 to the newly installed 2TB drive in drive bay A1,
enter the following command and enter y when prompted:
Continue running this command to view the RAID detail output until you see that the array (A1/A2 in
this example) shows Available.
At this point, drive A2 will show not in use because there is a drive size mismatch.
STEP 6 | Upgrade the second drive in the RAID 1 array to a 2TB drive.
The system will copy the data from A2 to A1 to mirror the drives.
3. To view the status of the copy process, run the following command:
Continue to view the RAID detail output until you see that the array (A1/A2 in this example) shows
Available and both disks show active sync.
STEP 1 | Access the command line interface (CLI) on the M-Series appliance.
Connect to the M-Series appliance in one of two ways:
• Connect a serial cable from your computer to the Console port and connect to the M-Series
appliance using terminal emulation software (9600-8-N-1).
• Use terminal emulation software (such as PuTTY) to open a Secure Shell (SSH) session to the IP
address of the M-Series appliance.
STEP 3 | Verify that the RAID 1 status for the installed drives shows there are at least two functioning
RAID 1 arrays. During the upgrade, you will upgrade one RAID 1 array at a time and there must
be at least one other RAID 1 array that is available to the appliance. The appliance will show an
abort error if you try to remove the only functioning array from the configuration.
Enter the following command to view RAID status:
For example, the following shows an output from an M-500 appliance with two available arrays (Disk
Pair A and Disk Pair B). If there is only one available array, you must add a second array as described in
Add Additional Drives to an M-Series Appliance before you upgrade the drives.
STEP 4 | Remove the first two 1TB drives from the first RAID 1 array configuration and then physically
remove the drives.
1. To remove the drives from the RAID 1 array configuration (A1 and A2 in this example), enter the
following commands and enter y when prompted to confirm each request:
The following output shows that the Disk Pair A array is Available.
Palo Alto Networks recommends that you specify the IP address, netmask (for IPv4) or prefix
length (for IPv6), and default gateway for the MGT interface. If you omit one of these settings
(such as the default gateway), you can access the M-Series appliance only through the
console port for future configuration changes.
Perform the following steps to configure Panorama and Dedicated Log Collectors to use multiple interfaces:
STEP 2 | Configure the interfaces on the solitary (non-HA) or active (HA) Panorama management server.
Because the MGT interface was configured during initial Panorama configuration, you
don’t have to configure it again.
STEP 3 | (HA only) Configure the interfaces on the passive Panorama management server.
1. Log in to the Panorama Web Interface of the active Panorama management server.
2. Select Panorama > Managed Collectors and select the passive HA peer.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
STEP 5 | (HA only) Configure an interface on the passive Panorama management server to deploy
updates in case the active Panorama fails over.
1. Log in to the Panorama Web Interface of the passive Panorama management server.
2. Select Panorama > Setup > Interfaces.
STEP 6 | Configure the interfaces that the Log Collectors will use to collect logs from firewalls and
communicate with other Log Collectors.
Because the MGT interface was configured during initial configuration of the Log
Collectors, you don’t have to configure it again.
1. Log in to the Panorama Web Interface of the solitary (non-HA) or active (HA) Panorama management
server.
2. Select Panorama > Managed Collectors and edit the Log Collector.
3. Select Interfaces and perform the following steps for each interface:
1. Click an interface name to edit that interface.
2. Select <interface-name> to enable the interface.
3. Configure one or both of the following field sets based on the IP protocols of your network.
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Select the functions that the interface supports:
Device Log Collection—Collect logs from firewalls. You can load balance the logging traffic by
enabling multiple interfaces to perform this function.
Collector Group Communication—Communicate with other Log Collectors in the Collector Group.
5. Click OK to save your changes to the interface.
4. Click OK to save your changes to the Log Collector.
5. Select Commit > Commit and Push to commit your changes to Panorama and to push the changes to
Collector Groups that contain the Log Collectors you modified.
6. Select Panorama > Managed Collectors to verify that the Log Collectors are synchronized and
connected with Panorama.
The Configuration Status column should display InSync and the Run Time Status column should
display connected.
In this example deployment, Panorama uses these interfaces to manage the firewalls but
not to collect firewall logs. You specify which Dedicated Log Collectors will collect firewall
logs when you configure Collector Groups.
1. Log in to the Panorama Web Interface of the solitary (non-HA) or active (HA) Panorama management
server.
If you are running an evaluation license for firewall management on your Panorama
virtual appliance and want to apply a Panorama license that you purchased, perform the
tasks Register Panorama and Activate/Retrieve a Firewall Management License when the
Panorama Virtual Appliance is Internet-connected.
• Register Panorama
• Activate a Panorama Support License
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not Internet-
connected
• Activate/Retrieve a Firewall Management License on the M-Series Appliance
Register Panorama
STEP 1 | Record the Panorama serial number or auth-code and record your Sales Order Number or
Customer ID.
For the auth-code, Sales Order Number, or Customer ID, see the order fulfillment email that Palo Alto
Networks Customer Service sent when you placed your order for Panorama.
For the serial number, the location depends on the model:
• M-Series appliance—Log in to the Panorama web interface and record the Serial # value in the
Dashboard tab, General Information section.
• Panorama virtual appliance—See the order fulfillment email.
STEP 2 | Register Panorama. The steps depend on whether you already have a login for the Support site.
If the support license expires, Panorama can still manage firewalls and collect logs, but
software and content updates will be unavailable. The software and content versions on
Panorama must be the same as or later than the versions on the managed firewalls, or else
errors will occur. For details, see Panorama, Log Collector, Firewall, and WildFire Version
Compatibility.
STEP 1 | Log in to the Palo Alto Networks customer support portal to activate the auth-code.
1. Select Assets > Devices and enter your Panorama serial number to Filter by the Serial Number.
2. Select the pencil icon in the Action column, select Activate Auth-Code and enter your support license
Authorization Code, and click Agree and Submit.
STEP 2 | Log in to the Panorama web interface, and select Panorama > Support > Activate feature using
authorization code.
STEP 2 | Select Panorama > Setup > Management and edit the General Settings.
STEP 3 | Enter the Panorama Serial Number (included in the order fulfillment email) and click OK.
STEP 4 | Select Panorama > Licenses to activate or retrieve the firewall management license:
• Retrieve license keys from license server—Panorama automatically retrieves and activates the
firewall management license from the Panorama Update Server.
• Activate feature using authorization code—Enter the firewall management license authorization
code and click OK to activate the license. The authorization code can be obtained from the order
fulfillment email or by logging in to the Palo Alto Networks Customer Support web site by finding the
Panorama management server.
• Manually upload license key—Log in to the Palo Alto Networks Customer Support web site, find
your Panorama management server, and download the firewall management license key to your local
device. After you download the license key, click Choose File to select the license key and click OK.
STEP 3 | Upload the Panorama virtual appliance information to the Customer Support website.
1. On the Retrieve Management License dialogue, click the here link to gather the UUID, CPUID,
Panorama Version and Virtual Platform information. Click Download Link to download a XML file of
the required Panorama information that can be uploaded to the Customer Support Portal.
On initial deployment, may need to log out and back in to the web interface to see the dialogue.
2. Log in to the Palo Alto Networks Customer Support web site.
3. Click Get Support in the upper right-hand corner.
4. Select Assets > Devices, find your Panorama virtual appliance and in the Action column, click the edit
icon ( ).
5. Select Is the Panorama Offline? and enter the Panorama information gathered in Step 2, or click
Select files... to upload the downloaded XML file.
6. Agree and Submit the EULA.
2. In the Panorama web interface, click Panorama > Licenses and Manually upload license key.
3. Click Choose file, locate the downloaded device management license key and click OK.
STEP 5 | Confirm that the device management license was successfully uploaded by verify that the
Device Management License displays with the license information.
• Manually upload the license from a host to Panorama. Panorama must have access to that host.
If Panorama is set up (you completed the task Perform Initial Configuration of the M-Series Appliance)
but does not have a connection to the update server, activate the license on the Support website,
download it to a host that has a connection to the update server, then upload it to Panorama.
1. Activate and download the license from the Palo Alto Networks Customer Support web site.
M-100 appliances are supported in PAN-OS 9.0 only if they have been upgraded to 32GB
memory from the default 16GB. See M-100 Memory Upgrade Guide for more information.
Panorama 6.1 and later versions cannot push configurations to firewalls running PAN-OS
6.0.0 through PAN-OS 6.0.3.
Panorama 9.0 can manage WildFire® appliances and WildFire appliance clusters that are running the
same or an earlier PAN-OS 9.0 release. It is recommended that the Panorama management server,
Wildfire appliances, and Wildfire appliance clusters run the same PAN-OS release.
The content release version on the Panorama management server must be the same (or earlier) version
as the content release version on any Dedicated Log Collectors or managed firewalls.
Palo Alto Networks® recommends installing the same Applications database version on
Panorama as on the Dedicated Log Collectors and firewalls.
Regardless whether your subscriptions include the Applications database or Applications and Threats
database, Panorama installs only the Applications database. Panorama and Dedicated Log Collectors
do not enforce policy rules so they do not need the threat signatures from the Threats database.
The Applications database contains threat metadata (such as threat IDs and names) that you use on
Panorama and Dedicated Log Collectors when defining policy rules to push to managed firewalls and
when interpreting threat information in logs and reports. However, firewalls require the full Applications
and Threats database to match the identifiers recorded in logs with the corresponding threat, URL, or
application names. Refer to the Release Notes for the minimum content release version required for a
Panorama release.
For M-100 appliances, Palo Alto Networks requires upgrading the memory to 32GB or more
for management and log collection tasks. See the M-100 Memory Upgrade Guide before
upgrading your M-100 appliance to PAN-OS 9.0.0.
STEP 3 | Upgrade the Panorama software on the Primary_A (currently passive) peer.
Perform one of the following tasks on the Primary_A peer:
• Install Updates for Panorama with an Internet Connection
• Install Updates for Panorama When Not Internet-Connected
After you reboot, the Primary_A peer is initially still in the passive state. Then, if preemption is enabled
(default), the Primary_A peer automatically transitions to the active state and the Secondary_B peer
reverts to the passive state.
If you disabled preemption, manually Restore the Primary Panorama to the Active State.
STEP 4 | Verify that both peers are now running any newly installed content release versions and the
newly installed Panorama release.
On the Dashboard of each Panorama peer, check the Panorama Software Version and Application
Version and confirm that they are the same on both peers and that the running configuration is
synchronized.
STEP 5 | (Local Log Collectors in a Collector Group only) Upgrade the remaining Log Collectors in the
Collector Group.
• Upgrade Log Collectors When Panorama Is Internet-Connected
• Upgrade Log Collectors When Panorama Is Not Internet-Connected
For M-100 appliances, Palo Alto Networks requires upgrading the memory to 32GB or more
for management and log collection tasks. See the M-100 Memory Upgrade Guide before
upgrading your M-100 appliance to PAN-OS 9.0.0.
STEP 1 | Verify that the updates you plan to install are appropriate for your Panorama deployment.
Refer to the Release Notes for the minimum content release version required for a Panorama
software release. If you intend to upgrade Log Collectors and firewalls to a particular release, you
must first upgrade Panorama to that (or a later) release.
For a Panorama virtual appliance that runs on a hypervisor, ensure that the instance meets the Setup
Prerequisites for the Panorama Virtual Appliance.
STEP 2 | Save a backup of the current Panorama configuration file that you can use to restore the
configuration if you have problems with the upgrade.
1. Save named Panorama configuration snapshot (Panorama > Setup > Operations), enter a Name for
the configuration, and click OK.
2. Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, click OK, and save the exported file to a location that is external to Panorama.
If Panorama is not running the minimum content versions required for the Panorama
release to which you intend to upgrade, you must update content versions to the
minimum (or later) versions before you install the software updates. Refer to Release
Notes for minimum content release version for a Panorama release.
Palo Alto Networks® highly recommends that Panorama, Log Collectors, and all managed
firewalls run the same content release version. Additionally, we recommend that you
schedule automatic, recurring updates so that you are always running the latest content
versions (refer to 9).
1. Check Now (Panorama > Dynamic Updates) for the latest updates. If the value in the Action column
is Download, an update is available.
Ensure that Panorama is running the same but not a later content release version than
is running on managed firewalls and Log Collectors.
2. (As needed) Before you update the content release version on Panorama, be sure to upgrade
managed firewalls and then Log Collectors (see Upgrade Log Collectors When Panorama Is Internet-
Connected) to the same (or a later) content release version.
If you do not need to install content updates at this time, then skip ahead to the next step.
3. Install remaining content updates, as needed. When installed, the Currently Installed column displays
a check mark.
1. Download and Install the Applications or Applications and Threats update. Regardless of your
subscription, Panorama installs and needs only the Applications content update, not the Threats
content. For details, see Panorama, Log Collector, Firewall, and WildFire Version Compatibility.
2. Download and Install other updates (Antivirus, WildFire®, or URL Filtering) as needed, one at a
time, and in any sequence.
If upgrading more than one Log Collector, streamline the process by determining the
upgrade paths for all Log Collectors you intend to upgrade before you start downloading
images.
STEP 6 | Check the status of the log format migration after a successful upgrade to PAN-OS 9.0.
1. Log in to the Panorama CLI of the Log Collector.
2. Run the following command to check the status of the log format migration:
Response
from logger 23456212: 50.98% of indices upgraded complete. Approximately
less than a minute remaining until migration is complete. Once the
log migration is complete, please run the ‘show log-collector-es-cluster
health’ command to check the ElasticSearch cluster status to verify
logging and reporting functionality is restored.
Response
from logger 23456212: 100% of indices complete. Please run the ‘show
log-collector-es-cluster health’ command to check the ElasticSearch
cluster status to verify logging and reporting functionality is
restored.
3. After the log format migration is complete, run the following command to check the status of the
ElasticSearch cluster before you continue to the next step:
Continue to the next step when the “status” of the ElasticSearch cluster health displays “green”:
admin> configure
STEP 8 | (If local Log Collector is in a Collector Group) Upgrade the remaining Log Collectors in the Collector
Group.
• Upgrade Log Collectors When Panorama Is Internet-Connected
• Upgrade Log Collectors When Panorama Is Not Internet-Connected
Panorama does not synchronize content update schedules across HA peers. You must
perform this task on both the active and passive Panorama.
In the header row for each update type (Panorama > Dynamic Updates), the Schedule is initially set to
None. Perform the following steps for each update type.
1. Click None and select the update frequency (Recurrence). The frequency options depend on the
update type.
2. Select the schedule action:
• Download And Install (Best Practice)—Panorama automatically installs updates after downloading
them.
• Download Only—You must manually install updates after Panorama downloads them.
3. Based on the best practices for the security posture of your organization, configure a delay
(Threshold) after an update becomes available before Panorama downloads the update.
4. Click OK to save your changes.
5. Select Commit > Commit to Panorama and Commit your changes.
For M-100 appliances, Palo Alto Networks requires upgrading the memory to 32GB or more
for management and log collection tasks. See the M-100 Memory Upgrade Guide before
upgrading your M-100 appliance to PAN-OS 9.0.0.
STEP 1 | Verify that the updates you plan to install are appropriate for your Panorama deployment.
Refer to the Release Notes for the minimum content release version you must install for a Panorama
software release. If you intend to upgrade Log Collectors and firewalls to a particular release, you
must first upgrade Panorama to that (or a later) release.
For a Panorama virtual appliance, ensure that the instance meets the Setup Prerequisites for the
Panorama Virtual Appliance.
STEP 2 | Save a backup of the current Panorama configuration file that you can use to restore the
configuration if you have problems with the upgrade.
1. Save named Panorama configuration snapshot (Panorama > Setup > Operations), enter a Name for
the configuration, and click OK.
2. Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, click OK, and save the exported file to a location that is external to Panorama.
Palo Alto Networks highly recommends that Panorama, Log Collectors, and all managed
firewalls run the same content release version.
1. For each content update, determine whether you need updates and which content updates you need
to download in the following step.
Ensure that Panorama is running the same but not a later content release version than
is running on managed firewalls and Log Collectors.
2. (As needed) Before you update the content release version on Panorama, be sure to upgrade
managed firewalls and then Log Collectors (see Upgrade Log Collectors When Panorama Is Internet-
Connected) to the same (or a later) content release version.
If upgrading more than one Log Collector, streamline the process by determining the
upgrade paths for all Log Collectors you intend to upgrade before you start downloading
images.
STEP 5 | (As needed) Download content updates to a host that can connect and upload content to
Panorama either over SCP or HTTPS.
If you do not need to install content updates at this time, then skip ahead to 6.
1. Use a host that has internet access to log in to the Palo Alto Networks Customer Support website.
2. Download content updates as needed:
1. Click Updates > Dynamic Updates in the Resources section.
2. Download the appropriate content updates and save the files to the host. Perform this step for
each content type you need to update.
You must install content updates before software updates and you must Upgrade
Firewalls first and then Upgrade Log Collectors before you install them on the Panorama
management server.
Install the Applications or Applications and Threats update first, and then install any other updates
(Antivirus, WildFire®, and URL Filtering), one at a time, and in any sequence.
Regardless whether your subscription includes both Applications and Threats content,
Panorama installs and needs only the Applications content. For details, see Panorama,
Log Collector, Firewall, and WildFire Version Compatibility.
In Panorama (Panorama > Dynamic Updates), perform the following steps for each content type:
STEP 7 | Download the software updates to a host that can connect and upload content to Panorama
either over SCP or HTTPS.
1. Use a host with internet access to log in to the Palo Alto Networks Customer Support web site.
2. Download software updates:
1. On the main page of Palo Alto Networks Customer Support website, click Updates > Software
Updates.
2. For the first (or next) Panorama release in your upgrade path, identify the model-specific
file. For example, to upgrade an M-Series appliance to Panorama 9.0.0, download the
Panorama_m-9.0.0 image; to upgrade a Panorama virtual appliance to Panorama 9.0.0,
download the Panorama_pc-9.0.0 image.
You can quickly locate Panorama images by selecting Panorama M Images (M-
Series appliances) or Panorama Updates (virtual appliances) from the Filter By
drop-down.
3. Click the filename and save the file to the host.
4. Repeat substep 2 above for any additional release versions in your upgrade path as determined in
Step 4.
STEP 9 | Check the status of the log format migration after a successfully upgrade to PAN-OS 9.0.
1. Log in to the Panorama CLI of the Log Collector.
2. Run the following command to check the status of the log format migration:
Response from logger 23456212: 100% of indices complete. Please run the
‘show log-collector-es-cluster health’ command to check the ElasticSearch
cluster status to verify logging and reporting functionality is restored.
3. After log format migration is completee, run the following command to check the status of the
ElasticSearch cluster before you continue to the next step:
Continue to the next step when the “status” of the ElasticSearch cluster health displays “green”:
STEP 10 | (Panorama on Azure only) Load the exported Panorama configuration from Step 2.
1. Import named Panorama configuration snapshot (Panorama > Setup > Operations), Browse and
select the Panorama configuration file, and click OK.
2. Load named Panorama configuration snapshot, select the Name of the configuration you just
imported, enter the Decryption Key if required and click OK.
3. Log in to the Panorama CLI.
4. Commit the Panorama configuration by enter the following commands:
admin> configure
STEP 11 | (If local Log Collector is in a Collector Group) Upgrade the remaining Log Collectors in the
Collector Group.
• Upgrade Log Collectors When Panorama Is Internet-Connected
• Upgrade Log Collectors When Panorama Is Not Internet-Connected
Log migration to the new format is a one time task that you must perform when you upgrade
to PAN-OS 8.0 or later release (or when you upgrade to PAN-OS 8.0 as part of your upgrade
path); you do not need to perform this migration again when you upgrade to a later PAN-OS
release.
The amount of time Panorama takes to complete the log migration process depends on the volume of new
logs being written to Panorama and the size of the log database you are migrating. Because log migration is
a CPU-intensive process, begin the migration during a time when the logging rate is lower. You can always
stop migration during peak times if you notice that CPU utilization rates are high and resume the migration
when the incoming log rate is lower.
After you Install Content and Software Updates for Panorama and upgrade the Log Collectors, migrate the
logs as follows:
High CPU utilization (close to 100%) during log migration is expected and operations
will continue to function normally. Log migration is throttled in favor of incoming logs and
other processes in the event of resource contention.
• Start migrating the logs on each Log Collector to the new format.
To begin the migration, enter the following command from the CLI of each Log Collector:
• View the log migration status to estimate the amount of time it will take to finish migrating all
existing logs to the new format.
If you store firewall logs on Dedicated Log Collectors (M-Series appliances in Log Collector
mode) instead of on the Panorama virtual appliance, you can maintain access to the logs by
migrating the Dedicated Log Collectors to the M-Series appliance in Panorama mode.
STEP 2 | Purchase the new M-Series appliance, and migrate your subscriptions to the new appliance.
1. Purchase the new M-Series appliance.
2. Purchase the new support license and migration license.
3. At the time you purchase the new M-Series appliance, provide your sales representative the serial
number and device management auth-code of the Panorama virtual appliance you are phasing out, as
well as a license migration date of your choosing. On receipt of your M-Series appliance, register the
appliance and activate the device management and support licenses using the migration and support
auth-codes provided by Palo Alto Networks. On the migration date, the device management license
on the Panorama virtual appliance is decommissioned, and you can no longer manage devices or
collect logs using the Panorama virtual appliance. However, the support license is preserved and the
Panorama appliance remains under support. You can complete the migration after the effective date,
but you are unable to commit any configuration changes on the now decommissioned Panorama
virtual appliance.
STEP 3 | (Legacy mode only) On the old Panorama virtual appliance, change to Panorama mode.
This step is required to preserve the log data, settings and log forwarding configuration of
the Panorama virtual appliance. If you export the Panorama configuration while in Legacy
mode, these settings are lost. You must complete Step 9 if you do not change Panorama
to Panorama mode before continuing.
Continue to the next step if the Panorama virtual appliance is already in Panorama or
Management Only mode.
STEP 4 | Export the Panorama configuration from the Panorama virtual appliance.
1. Log in to the Panorama virtual appliance and select Panorama > Setup > Operations.
2. Click Save named Panorama configuration snapshot, enter a Name to identify the configuration, and
click OK.
3. Click Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, and click OK. Panorama exports the configuration to your client system as an XML file.
STEP 5 | Power off the Panorama virtual appliance if you won’t need to access to it after the migration
or assign a new IP address to its management (MGT) interface if you will need access to it.
To power off the Panorama virtual appliance, see the documentation for your VMware product.
To change the IP address on the Panorama virtual appliance:
1. Select Panorama > Setup > Management, and edit the Management Interface Settings.
2. Enter the new IP Address and click OK.
3. Select Commit > Commit to Panorama and Commit your changes.
STEP 7 | Load the Panorama configuration snapshot that you exported from the Panorama virtual
appliance into the M-Series appliance.
1. On the M-Series appliance, select Panorama > Setup > Operations.
2. Click Import named Panorama configuration snapshot, Browse to the Panorama configuration file
you exported from the Panorama virtual appliance, and click OK.
3. Click Load named Panorama configuration snapshot, select the Name of the configuration you just
imported, select a Decryption Key (the master key for Panorama), and click OK. Panorama overwrites
its current candidate configuration with the loaded configuration. Panorama displays any errors that
occur when loading the configuration file.
4. If errors occurred, save them to a local file. Resolve each error to ensure the migrated configuration is
valid.
STEP 9 | Add the default managed collector and Collector Group back to the M-Series appliance.
Loading the configuration from the Panorama virtual appliance (Step 7) removes the default managed
collector and Collector Group that are predefined on each M-Series appliance.
1. Configure a Managed Collector that is local to the M-Series appliance.
2. Configure a Collector Group for the default managed collector.
3. Select Commit > Commit to Panorama and Commit your changes to the Panorama configuration.
STEP 10 | Synchronize the M-Series appliance with the firewalls to resume firewall management.
1. On the M-Series appliance, select Panorama > Managed Devices and verify that the Device State
column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync for the
firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selections.
2. Select Device Groups, select every device group, Include Device and Network Templates, and
click OK.
3. Push your changes.
3. In the Panorama > Managed Devices page, verify that the Shared Policy and Template columns
display In sync for the firewalls.
If you store firewall logs on Dedicated Log Collectors (Panorama virtual appliance in Log
Collector mode) instead of on the Panorama virtual appliance, you can maintain access to
the logs by migrating the Dedicated Log Collectors to the new Panorama virtual appliance in
Panorama mode.
STEP 2 | Purchase the new Panorama virtual appliance license, and migrate your subscriptions to the
virtual appliance.
1. Purchase the new Panorama virtual appliance license.
2. Purchase the new support license and migration license.
3. At the time you purchase the new Panorama virtual appliance license, provide your sales
representative the serial number and device management auth-code of the Panorama virtual
STEP 3 | (Legacy mode only) On the old Panorama virtual appliance, change to Panorama mode.
This step is required to preserve the log data, settings and log forwarding configuration
of the Panorama virtual appliance. If you export the Panorama configuration while in
Legacy mode, these settings are lost. You must complete Step 10 if you do not change
Panorama to Panorama mode before continuing.
Continue to the next step if the Panorama virtual appliance is already in Panorama or
Management Only mode.
STEP 4 | Export the Panorama configuration from the old Panorama virtual appliance.
1. Log in to the Panorama Web Interface.
2. Select Panorama > Setup > Operations.
3. Click Save named Panorama configuration snapshot, enter a Name to identify the configuration, and
click OK.
4. Click Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, and click OK. Panorama exports the configuration to your client system as an XML file.
STEP 5 | Power off the old Panorama virtual appliance if you won’t need to access to it after the
migration or assign a new IP address to its management (MGT) interface if you will need access
to it.
To power off the Panorama virtual appliance, see the supported documentation for the hypervisor on
which the old Panorama virtual appliance has been deployed.
To change the IP address on the Panorama virtual appliance:
1. On the web interface of the old Panorama virtual appliance, select Panorama > Setup >
Management, and edit the Management Interface Settings.
2. Enter the new IP Address and click OK.
3. Select Commit > Commit to Panorama and Commit your changes.
STEP 6 | Perform the initial setup of the new Panorama virtual appliance.
1. Set Up the Panorama Virtual Appliance.
2. Perform Initial Configuration of the Panorama Virtual Appliance to define the network connections
required to activate licenses and install updates.
3. Register Panorama.
4. Activate a Panorama Support License.
5. Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected. Use the auth-code associated with the migration license.
6. Install Content and Software Updates for Panorama. Install the same versions as those on the old
Panorama virtual appliance.
Multiple interface configurations are not supported for Panorama deployed on AWS, AWS
GovCloud, Microsoft Azure, and GCP. You must reconfigure device management, log
collection, Collector Group communication, licensing and software updates to operate
over the MGT interface if migrating to one of these hypervisors.
STEP 9 | Add the default managed collector and Collector Group to the new Panorama virtual appliance.
Loading the configuration from the old Panorama virtual appliance (Step 7) removes the default managed
collector and Collector Group that are predefined on each Panorama virtual appliance in Panorama
mode.
1. Configure a Managed Collector that is local to the Panorama virtual appliance.
2. Configure a Collector Group for the default managed collector.
3. Select Commit > Commit to Panorama and Commit your changes to the Panorama configuration.
STEP 10 | (Legacy mode only) If you exported the Panorama configuration from a Panorama virtual
appliance in Legacy mode, Configure Log Forwarding to Panorama.
STEP 11 | Synchronize the new Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the new Panorama virtual appliance, select Panorama > Managed Devices and verify that the
Device State column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync for the
firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selections.
STEP 2 | Purchase management and support licenses for the new Panorama virtual appliance.
1. Contact your sales representative to purchase the new device management and support licenses.
2. Provide your sales representative the serial number of the M-Series appliance you to plan phase
out, the serial number and support auth code you received when you purchased the new Panorama
virtual appliance, and the date when you expect your migration from the old device to the new virtual
appliance to be completed. Before the migration date, register the serial number and activate support
auth code on the new virtual appliance so that you can begin your migration. The capacity auth code
on the old M-Series appliance is automatically removed on the expected migration completion date
you provided.
STEP 7 | Power off the M-Series appliance or assign a new IP address to the management (MGT)
interface.
If the M-Series appliance is in Panorama mode and has logs stored on the local Log
Collector that you need access on the new Panorama virtual appliance, you must change
the IP address on the M-Series appliance in order to add it to the Panorama virtual
appliance as a managed Log Collector.
STEP 9 | Change the M-Series appliance to Log Collector mode to preserve existing log data.
Logging data is erased if you change to Log Collector mode while the logging disks are
still inserted in the M-Series appliance. Logging disks must be removed before changing
mode to avoid log data loss.
Generating the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long time to complete. To expedite the process,
you can launch multiple CLI sessions and run the metadata regeneration command in
each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
If you see a CMS Login prompt, this means the Log Collector has not finished
rebooting. Press Enter at the prompt without typing a username or password.
• Log back in to the CLI.
• Verify that the switch to Log Collector mode succeeded:
For example:
The force and no-format arguments are required. The force argument associates the disk pair with
the new appliance. The no-format argument prevents reformatting of the drives and retains the logs
stored on the disks.
7. Generate the metadata for each disk pair.
For example:
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
# exit
STEP 10 | Synchronize the Panorama virtual appliance with the firewalls to resume firewall
management.
1. On the Panorama virtual appliance, select Panorama > Managed Devices and verify that the Device
State column displays the firewalls as Connected.
At this point, the Shared Policy (device groups) and Template columns display Out of sync for the
firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selections.
2. Select Device Groups, select every device group, and Include Device and Network Templates.
3. Select Collector Groups, select every collector group, and click OK.
STEP 12 | (HA only) Modify the Panorama virtual appliance HA peer configuration.
1. On an HA peer, Log in to the Panorama Web Interface, select Panorama > High Availability and edit
the Setup.
2. In the Peer HA IP Address field, enter the new IP address of the HA peer and click OK.
3. Select Commit > Commit to Panorama and Commit your change
4. Repeat these steps on the other peer in the HA peer.
This procedure assumes you are no longer using the M-100 for device management or
log collection. If you plan on using the decommissioned M-100 appliance as a Dedicated
Log Collector, a device management license is required on the M-100. Without a device
management license, you are unable to use the M-100 as a Dedicated Log Collector.
If you do not plan on using the M-100 appliance as a Dedicated Log Collector, but the M-100
appliance contains log data that you must access at a later date, you may still query and
generate reports using the existing log data. Palo Alto Networks recommends reviewing the
log retention policy before decommissioning the M-100 appliance.
STEP 2 | Purchase the new M-500 appliance, and migrate your subscriptions to the new appliance.
1. Purchase the new M-500 appliance.
2. Purchase the new support license and migration license.
3. At the time you purchase the new M-500 appliance, provide your sales representative the serial
number and device management auth-code of the M-100 appliance you are phasing out, as well as a
license migration date of your choosing. On receipt of your M-500 appliance, register the appliance
and activate the device management and support licenses using the migration and support auth-
codes provided by Palo Alto Networks. On the migration date, the device management license on the
M-100 is decommissioned, and you can no longer manage devices or collect logs using the M-100
appliance. However, the support license is preserved and the Panorama appliance remains under
support. You can complete the migration after the effective date, but you are unable to commit any
configuration changes on the now decommissioned M-100 appliance.
STEP 3 | Export the Panorama configuration from each M-100 appliance in Panorama mode.
Perform this task on each M-100 appliance HA peer:
1. Log in to the M-100 appliance and select Panorama > Setup > Operations.
2. Click Save named Panorama configuration snapshot, enter a Name to identify the configuration, and
click OK.
3. Click Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, and click OK. Panorama exports the configuration to your client system as an XML file.
STEP 6 | Load the Panorama configuration snapshot that you exported from each M-100 appliance into
each M-500 appliance in Panorama mode (both HA peers).
Perform this task on each M-500 appliance HA peer:
1. Log in to the M-500 appliance and select Panorama > Setup > Operations.
2. Click Import named Panorama configuration snapshot, Browse to the configuration file you exported
from the M-100 appliance that has the same HA priority (primary or secondary) as the M-500
appliance will have, and click OK.
3. Click Load named Panorama configuration snapshot, select the Name of the configuration you just
imported, select a Decryption Key (the master key for Panorama), and click OK. Panorama overwrites
its current candidate configuration with the loaded configuration. Panorama displays any errors that
occur when loading the configuration file. If errors occurred, save them to a local file. Resolve each
error to ensure the migrated configuration is valid.
4. Select Commit > Commit to Panorama and Validate Commit. Resolve any errors before proceeding.
5. Commit your changes to the Panorama configuration.
STEP 7 | Synchronize the configuration between the M-500 appliance HA peers in Panorama mode.
1. On the active M-500 appliance, select the Dashboard tab and, in the High Availability widget, click
Sync to peer.
2. In the High Availability widget, verify that the Local (primary M-500 appliance) is active, the Peer is
passive, and the Running Config is synchronized.
STEP 8 | Move the RAID drives from each M-100 appliance to its replacement M-500 appliance to
migrate the logs collected from firewalls.
In the following tasks, skip any steps that you already completed on the M-500 appliance.
• Migrate Logs to a New M-Series Appliance in Panorama Mode. Migrate logs from the M-100
appliance only if it uses a default managed collector for log collection.
• Migrate Logs to a New M-Series Appliance in Log Collector Mode.
STEP 9 | Synchronize the active M-500 appliance in Panorama mode with the firewalls to resume
firewall management.
1. In the active M-500 appliance, select Panorama > Managed Devices, and verify that the Device State
column displays Connected for the firewalls.
At this point, the Shared Policy (device groups) and Template columns display Out of sync for the
firewalls.
2. Push your changes to device groups and templates:
1. Select Commit > Push to Devices and Edit Selections.
2. Select Device Groups, select every device group, Include Device and Network Templates, and
click OK.
3. Push your changes.
STEP 2 | Log in to Panorama according to the type of authentication used for your account. If logging in
to Panorama for the first time, use the default value admin for your username and password.
• SAML—Click Use Single Sign-On (SSO). If Panorama performs authorization (role assignment) for
administrators, enter your Username and Continue. If the SAML identity provider (IdP) performs
authorization, Continue without entering a Username. In both cases, Panorama redirects you to the
IdP, which prompts you to enter a username and password. After you authenticate to the IdP, the
Panorama web interface displays.
• Any other type of authentication—Enter your user Name and Password. Read the login banner and
select I Accept and Acknowledge the Statement Below if the login page has the banner and check
box. Then click Login.
Dashboard View general information about the Panorama model and network
access settings. This tab includes widgets that display information about
applications, logs, system resources, and system settings.
ACC View the overall risk and threat level on the network, based on
information that Panorama gathered from the managed firewalls.
Device Groups > Policies Create centralized policy rules and apply them to multiple firewalls/
device groups.
You must Add a Device Group for this tab to display.
Device Groups > Objects Define policy objects that policy rules can reference and that managed
firewalls/device groups can share.
You must Add a Device Group for this tab to display.
Templates > Network Configure network setting, such as network profiles, and apply them to
multiple firewalls.
You must Add a Template for this tab to display.
Templates > Device Configure device settings, such as server profiles and admin roles, and
apply them to multiple firewalls.
You must Add a Template for this tab to display.
Optionally, you can Configure an Administrator with SSH Key-Based Authentication for
the CLI.
admin@ABC_Sydney>
admin@ABC_Sydney> configure
STEP 2 | Enter a Name for the profile and select the Role type: Panorama or Device Group and
Template.
STEP 3 | Configure access privileges to each functional area of Panorama (Web UI) and firewalls
(Context Switch UI) by toggling the icons to the desired setting: Enable (read-write), Read Only,
or Disable.
If administrators with custom roles will commit device group or template changes to
managed firewalls, you must give those roles read-write access to Panorama > Device
Groups and Panorama > Templates. If you upgrade from an earlier Panorama version,
the upgrade process provides read-only access to those nodes.
You cannot manage access to the firewall CLI or XML API through context-switching privileges in
Panorama roles.
STEP 4 | If the Role type is Panorama, configure access to the XML API by toggling the Enabled/
Disabled icon for each functional area.
STEP 5 | If the Role type is Panorama, select an access level for the Command Line interface: None
(default), superuser, superreader, or panorama-admin.
A consequence of this option is that administrators can’t perform any operations on non-
Shared objects other than to display them. An example of why you might select this
option is for an organization that requires all objects to be in a single, global repository.
STEP 4 | Toggle the icons in the Device Groups tab to enable read-write or read-only access for device
groups in the access domain.
If you set the Shared Objects access to shared-only, Panorama applies read-only access
to the objects in any device groups for which you specify read-write access.
STEP 5 | Select the Templates tab and Add each template you want to assign to the access domain.
STEP 6 | Select the Device Context tab, select firewalls to assign to the access domain, and click OK.
Administrators can access the web interface of these firewalls by using the Context drop-down
in Panorama.
You can’t add an administrator account to a Dedicated Log Collector (M-Series appliance in
Log Collector mode). Only the predefined administrator account with the default username
(admin) is available on Dedicated Log Collectors.
STEP 3 | Select an Authentication Profile or sequence if you configured either for the administrator.
This is required if Panorama will use Kerberos SSO or an external service for authentication.
If Panorama will use local authentication, set the Authentication Profile to None and enter a Password
and then Confirm Password.
STEP 5 | (Device Group and Template Admin only) In the Access Domain to Administrator Role section,
click Add, select an Access Domain from the drop-down (see Configure an Access Domain),
click the adjacent Admin Role cell, and select an Admin Role profile.
STEP 7 | Select Commit > Commit to Panorama and Commit your changes.
If you use an external service to manage both authentication and authorization (role and
access domain assignments), see:
• Configure RADIUS Authentication for Panorama Administrators
• Configure TACACS+ Authentication for Panorama Administrators
• Configure SAML Authentication for Panorama Administrators
To authenticate administrators without a challenge-response mechanism, you can Configure
a Panorama Administrator with Certificate-Based Authentication for the Web Interface and
Configure an Administrator with SSH Key-Based Authentication for the CLI.
STEP 1 | (External authentication only) Enable Panorama to connect to an external server for
authenticating administrators.
1. Select Panorama > Server Profiles, select the service type (RADIUS, TACACS+, SAML, LDAP, or
Kerberos), and configure a server profile:
• Configure RADIUS Authentication for Panorama Administrators.
You can use a RADIUS server to support RADIUS authentication services or multi-
factor authentication(MFA) services.
STEP 2 | (Optional) Define password complexity and expiration settings if Panorama uses local
authentication.
These settings help protect Panorama against unauthorized access by making it harder for attackers to
guess passwords.
1. Define global password complexity and expiration settings for all local administrators.
1. Select Panorama > Setup > Management and edit the Minimum Password Complexity settings.
2. Select Enabled.
3. Define the password settings and click OK.
2. Define a Password Profile.
You assign the profile to administrator accounts for which you want to override the global password
expiration settings.
1. Select Panorama > Password Profiles and Add a profile.
2. Enter a Name to identify the profile.
3. Define the password expiration settings and click OK.
If your administrative accounts are stored across multiple types of servers, you can
create an authentication profile for each type and add all the profiles to an authentication
sequence.
In the authentication profile, specify the Type of authentication service and related settings:
• External service—Select the Type of external service and select the Server Profile you created for it.
• Local authentication—Set the Type to None.
• Kerberos SSO—Specify the Kerberos Realm and Import the Kerberos Keytab you created.
STEP 5 | (Device group and template administrators only) Configure an Access Domain.
Configure one or more access domains.
STEP 2 | Configure a certificate profile for securing access to the web interface.
1. Select Panorama > Certificate Management > Certificate Profile and click Add.
2. Enter a Name for the certificate profile and set the Username Field to Subject.
3. Select Add in the CA Certificates section and select the CA Certificate you just created.
4. Click OK to save the profile.
STEP 3 | Configure Panorama to use the certificate profile for authenticating administrators.
1. Select the Panorama > Setup > Management and edit the Authentication Settings.
2. Select the Certificate Profile you just created and click OK.
STEP 7 | Import the client certificate into the client system of each administrator who will access the
web interface.
Refer to your web browser documentation as needed to complete this step.
STEP 1 | Use an SSH key generation tool to create an asymmetric key pair on the client system of the
administrator.
The supported key formats are IETF SECSH and Open SSH. The supported algorithms are DSA (1024
bits) and RSA (768-4096 bits).
For the commands to generate the key pair, refer to your SSH client documentation.
The public key and private key are separate files. Save both to a location that Panorama can access. For
added security, enter a passphrase to encrypt the private key. Panorama prompts the administrator for
this passphrase during login.
STEP 3 | Configure the SSH client to use the private key to authenticate to Panorama.
Perform this task on the client system of the administrator. Refer to your SSH client documentation as
needed to complete this step.
STEP 4 | Verify that the administrator can access the Panorama CLI using SSH key authentication.
1. Use a browser on the client system of the administrator to go to the Panorama IP address.
You can use a RADIUS server to authenticate administrative access to the Panorama web
interface. You can also define Vendor-Specific Attributes (VSAs) on the RADIUS server to
manage administrator authorization. Using VSAs enables you to quickly change the roles,
access domains, and user groups of administrators through your directory service, which is
often easier than reconfiguring settings on Panorama.
You can Import the Palo Alto Networks RADIUS dictionary into RADIUS server to define the
authentication attributes needed for communication between Panorama and the RADIUS
server.
You can also use a RADIUS server to implement multi-factor authentication (MFA) for
administrators.
If you use the server profile to integrate Panorama with an MFA service, enter an
interval that gives administrators enough time to respond to the authentication
challenge. For example, if the MFA service prompts for a one-time password (OTP),
administrators need time to see the OTP on their endpoint device and then enter the
OTP in the MFA login page.
4. Select the Authentication Protocol (default is CHAP) that Panorama uses to authenticate to the
RADIUS server.
Select CHAP if the RADIUS server supports that protocol; it is more secure than PAP.
STEP 3 | Configure Panorama to use the authentication profile for all administrators.
1. Select Panorama > Setup > Management and edit the Authentication Settings.
2. Select the Authentication Profile you configured and click OK.
STEP 4 | Configure the roles and access domains that define authorization settings for administrators.
1. Configure an Admin Role Profile if the administrator uses a custom role instead of a predefined
(dynamic) role.
2. Configure an Access Domain if the administrator uses a Device Group and Template role.
If the RADIUS server profile specifies CHAP as the Authentication Protocol, you must
define accounts with reversibly encrypted passwords. Otherwise, CHAP authentication
will fail.
3. Define the vendor code for Panorama (25461) and define the RADIUS VSAs for the role, access
domain, and user group of each administrator.
When you predefine dynamic administrator roles for users, use lower-case to specify the role (for
example, enter superuser, not SuperUser).
STEP 7 | Verify that the RADIUS server performs authentication and authorization for administrators.
1. Log in the Panorama web interface using an administrator account that you added to the RADIUS
server.
2. Verify that you can access only the web interface pages that are allowed for the role you associated
with the administrator.
3. In the Monitor, Policies, and Objects tabs, verify that you can access only the device groups that are
allowed for the access domain you associated with the administrator.
Select CHAP if the TACACS+ server supports that protocol; it is more secure than
PAP.
5. Add each TACACS+ server and enter the following:
• Name to identify the server
• TACACS+ Server IP address or FQDN
• Secret/Confirm Secret (a key to encrypt usernames and passwords)
• Server Port for authentication requests (default is 49)
6. Click OK to save the server profile.
STEP 3 | Configure Panorama to use the authentication profile for all administrators.
1. Select Panorama > Setup > Management and edit the Authentication Settings.
2. Select the Authentication Profile you configured and click OK.
STEP 4 | Configure the roles and access domains that define authorization settings for administrators.
1. Configure an Admin Role Profile if the administrator will use a custom role instead of a predefined
(dynamic) role.
2. Configure an Access Domain if the administrator uses a Device Group and Template role.
If you selected CHAP as the Authentication Protocol, you must define accounts with
reversibly encrypted passwords. Otherwise, CHAP authentication will fail.
3. Define TACACS+ VSAs for the role, access domain, and user group of each administrator.
When you predefine dynamic administrator roles for users, use lower-case to specify
the role (for example, enter superuser, not SuperUser).
STEP 7 | Verify that the TACACS+ server performs authentication and authorization for administrators.
1. Log in the Panorama web interface using an administrator account that you added to the TACACS+
server.
2. Verify that you can access only the web interface pages that are allowed for the role you associated
with the administrator.
3. In the Monitor, Policies, and Objects tabs, verify that you can access only the virtual systems that are
allowed for the access domain you associated with the administrator.
STEP 1 | (Recommended) Obtain the certificates that the IdP and Panorama will use to sign SAML
messages.
If the certificates don’t specify key usage attributes, all usages are allowed by default, including signing
messages. In this case, you can obtain certificates by any method.
If the certificates do specify key usage attributes, one of the attributes must be Digital Signature,
which is not available on certificates that you generate on Panorama. In this case, you must import the
certificates:
• Certificate Panorama uses to sign SAML messages—Import the certificate from your enterprise
certificate authority (CA) or a third-party CA.
• Certificate the IdP uses to sign SAML messages—Import a metadata file containing the certificate
from the IdP (see the next step). The IdP certificate is limited to the following algorithms:
• Public key algorithms—RSA (1,024 bits or larger) and ECDSA (all sizes).
If the IdP doesn’t provide a metadata file, select Panorama > Server Profiles > SAML
Identity Provider, Add the server profile, and manually enter the information (consult your
IdP administrator for the values).
1. Export the SAML metadata file from the IdP to a client system that Panorama can access.
The certificate specified in the file must meet the requirements listed in the preceding step. Refer to
your IdP documentation for instructions on exporting the file.
2. Select Panorama > Server Profiles > SAML Identity Provider and Import the metadata file onto
Panorama.
3. Enter a Profile Name to identify the server profile.
4. Browse to the Identity Provider Metadata file.
5. (Recommended) Select Validate Identity Provider Certificate (default) to have Panorama validate the
Identity Provider Certificate.
Validation occurs only after you assign the server profile to an authentication profile and Commit.
Panorama uses the Certificate Profile in the authentication profile to validate the certificate.
6. Enter the Maximum Clock Skew, which is the allowed difference in seconds between the system
times of the IdP and Panorama at the moment when Panorama validates IdP messages (default is 60;
range is 1 to 900). If the difference exceeds this value, authentication fails.
7. Click OK to save the server profile.
8. Click the server profile Name to display the profile settings. Verify that the imported information is
correct and edit it if necessary.
When you predefine dynamic administrator roles for users, use lower-case to
specify the role (for example, enter superuser, not SuperUser). If you manage
administrator authorization through the IdP identity store, specify the Admin Role
Attribute and Access Domain Attribute also.
STEP 4 | Configure Panorama to use the authentication profile for all administrators.
1. Select Panorama > Setup > Management, edit the Authentication Settings, and select the
Authentication Profile you configured.
2. Select Commit > Commit to Panorama to activate your changes on Panorama and to validate the
Identity Provider Certificate that you assigned to the SAML IdP server profile.
STEP 2 | On Panorama, configure a certificate profile This certificate profile defines what certificate to
use and what certificate field to look for the IP address or FQDN in.
1. Select Panorama > Certificate Management > Certificate Profile.
2. Configure a certificate profile.
If you configure an intermediate CA as part of the certificate profile, you must include
the root CA as well.
STEP 4 | Configure Secure Server Communication on Panorama or a Log Collector in the server role.
When the Custom Certificate Only check box is selected, Panorama does not
authenticate and cannot manage devices using predefined certificates.
3. Select the SSL/TLS Service Profile. This SSL/TLS service profile applies to all SSL connections
between Panorama, firewalls, Log Collectors, and Panorama HA peers.
4. Select the Certificate Profile that identifies the certificate to use to establish secure communication
with clients such as firewalls.
5. (Optional) Configure an authorization list. The authorization list adds an additional layer of security
beyond certificate authentication. The authorization list checks the client certificate Subject or
Subject Alt Name. If the Subject or Subject Alt Name presented with the client certificate does not
match an identifier on the authorization list, authentication is denied.
You can also authorize client devices based on their serial number.
1. Add an Authorization List.
2. Select the Subject or Subject Alt Name configured in the certificate profile as the Identifier type.
3. Enter the Common Name if the identifier is Subject or and IP address, hostname or email if the
identifier is Subject Alt Name.
4. Click OK.
5. Select Check Authorization List to enforce the authorization list.
6. Select Authorize Client Based on Serial Number to have the server authenticate client based on the
serial numbers of managed devices. The CN or subject in the client certificate must have the special
keyword $UDID to enable this type of authentication.
7. In Disconnect Wait Time (min), specify how long Panorama should wait before terminating the
current session and reestablishing the connection with its managed devices. This field is blank by
default and the range is 0 to 44,640 minutes. Leaving this field blank is the same as setting it to 0.
The disconnect wait time does not begin counting down until you commit the new
configuration.
8. Click OK.
9. Commit your changes.
STEP 1 | Upgrade each managed firewall or Log Collector. All managed devices must be running PAN-
OS 8.0 or later to enforce custom certificate authentication.
Upgrade the firewall to PAN-OS 8.0 or later. After upgrade, each firewall connects to Panorama using
the default predefined certificates.
STEP 5 | After deploying custom certificates on all managed devices, enforce authentication using
custom certificates.
The WildFire appliance does not currently support custom certificates. If your Panorama
is managing a WildFire appliance, do not select Allow Custom Certificates Only.
1. Select Panorama > Setup > Management and Edit the Panorama settings.
2. Select Allow Custom Certificate Only.
3. Click OK.
4. Commit your changes.
After committing this change, all devices managed by Panorama must use custom certificates. If not,
authentication between Panorama and the device fails.
Change Certificates
If a custom certificate in your deployment has expired or been revoked and needs to be replaced, you can
complete one of the tasks below.
• Change a Server Certificate
• Change a Client Certificate
• Change a Root or Intermediate CA Certificate
STEP 3 | Reestablish the connection between the server (Panorama or a Log Collector) and client
devices.
1. Select Panorama > Setup > Management and Edit the Panorama Settings for Panorama or select
Panorama > Managed Collectors > Add > Communication for a Log Collector.
2. Set the Disconnect Wait Time.
3. Click OK.
4. Commit your changes.
STEP 6 | After updating the CA certificates on all managed devices, enforce custom-certificate
authentication.
1. Select Panorama > Setup > Management and Edit the Panorama Settings.
2. Select Custom Certificate Only.
To view the Objects and Policies tabs on the Panorama web interface, you must first create
at least one device group. To view the Network and Device tabs, you must create at least one
template. These tabs contain the options by which you configure and manage the firewalls on
your network.
185
186 PANORAMA ADMINISTRATOR'S GUIDE | Manage Firewalls
© 2020 Palo Alto Networks, Inc.
Add a Firewall as a Managed Device
To use Panorama for managing your firewalls, you need to enable a connection between the firewall and
Panorama. A successful connection requires that you enter the Panorama IP address on each firewall
that Panorama will manage and to also enter the serial number of each firewall on Panorama. When you
add a firewall as a managed device, you can associate the new firewall with a device group, template
stack, collector group, and Log Collector during the initial deployment. Additionally, you have the option
to automatically push the configuration to your newly added firewall when the firewall first connects to
Panorama, which ensures that firewalls are immediately configured and ready to secure your network.
You can only bulk import single vsys firewalls to be managed by Panorama.
The firewall uses the Panorama management server IP address to set up an SSL connection to register with
Panorama. Panorama and the firewall authenticate each other using 2,048-bit certificates and AES-256
encrypted SSL connections for configuration management and log collection. Prepare Panorama and each
firewall as follows:
The Auto Push on 1st Connect option is supported only on firewalls running
PAN-OS 8.1 or later releases. The commit all job executes from Panorama to
managed devices running PAN-OS 8.1 and later releases.
6. Click OK to add the devices.
STEP 3 | (Optional) Add a Tag. Tags make it easier for you to find a firewall from a large list; they help
you to dynamically filter and refine the list of firewalls in your display. For example, if you add a
tag called branch office, you can filter for all branch office firewalls across your network.
1. Select each firewall and click Tag.
2. Click Add, enter a string of up to 31 characters (no empty spaces), and click OK.
STEP 4 | If your deployment is using custom certificates for authentication between Panorama and
managed devices, deploy the custom client device certificate. For more information, see Set Up
Authentication Using Custom Certificates and Add New Client Devices.
STEP 2 | Enter a unique Name and a Description to identify the device group.
STEP 3 | In the Devices section, select check boxes to assign firewalls to the group. To search a long list
of firewalls, use the Filters.
You can assign any firewall to only one device group. You can assign each virtual system
on a firewall to a different device group.
STEP 4 | In the Reference Template section, Add any templates or template stacks with objects
referenced by the device group configuration.
You must assign the appropriate template or template stack references to the device group in order to
successfully associate the template or template stack to the device group. This allows you to reference
objects configured in a template or template stack without adding an unrelated device to a template
stack.
Skip this step if the device group configuration does not reference any objects configured in a template
or template stack.
STEP 5 | (Optional) Select Group HA Peers for firewalls that are HA peers.
You can only group managed firewall HA peers if they are in the same device group.
STEP 6 | Select the Parent Device Group (default is Shared) that will be just above the device group you
are creating in the device group hierarchy.
STEP 9 | Select Commit > Commit and Push and then Commit and Push your changes to the Panorama
configuration and to the device group you added.
If you move a device group to a different parent, all its descendant device groups move
with it, along with all firewalls, policy rules, and objects associated with the device group
and its descendants. If the new parent is in another access domain, the moved device
group will no longer have membership in the original access domain. If the new access
domain has read-write access for the parent device group, it will also have read-write
access for the moved device group. If the new access domain has read-only access for
the parent, it will have no access for the moved device group. To reconfigure access for
device groups, see Configure an Access Domain.
STEP 4 | Configure, move, and clone objects and policy rules as needed to account for inheritance in the
device group hierarchy.
• Create Objects for Use in Shared or Device Group Policy, or edit existing objects.
You can edit objects only at their location: the device group to which they are assigned. Descendant
device groups inherit read-only instances of the objects from that location. However, you can optionally
see Step Override inherited object values.
Commit to Panorama and push to device groups after any change to the hierarchy.
You must also push changes to templates if a template references objects in a device group (such as
interfaces referencing addresses), and a firewall assigned to the template is no longer assigned to that
device group because of a hierarchy change.
Select Commit > Commit and Push and then Commit and Push your changes to the Panorama
configuration and to the device groups you added or changed.
See Use Dynamic Address Groups in Policy to verify the number of supported registered IP
addresses on Panorama if you intended to leverage dynamic address groups in order to
create policies that automatically adapt to changes in your network.
The Objects tab only displays objects that are in the selected Device Group or are
inherited from an ancestor device group or the Shared location.
3. Verify that the device group object appears. Note that the device group name in the Location column
matches the selection in the Device Group drop-down.
If you want to push ancestor values to all overridden objects instead of reverting a specific
object, see Manage Precedence of Inherited Objects.
For the steps to override values, see Step 5
For details on object inheritance and overrides, see Device Group Objects.
STEP 1 | In the Objects tab, select the object type (for example, Objects > Addresses) and select the
Device Group that has an override instance of the object.
STEP 2 | Select the object, click Revert, and click Yes. The Name column displays a green icon for the
object, indicating that it now inherits all values from an ancestor device group.
When Share Unused Address and Service Objects with Devices is disabled, Panorama
ignores the Target firewalls when you Push a Policy Rule to a Subset of Firewalls. This means
that all objects referenced by any rules are pushed to all firewalls in the device group.
To limit the number of objects pushed to a set of managed firewalls, add the policy rules to
a child device group and reference shared objects as needed. See Create a Device Group
Hierarchy for more information on creating a child device group.
On lower-end models, such as the PA-220, consider pushing only the relevant shared objects to the
managed firewalls. This is because the number of objects that can be stored on the lower-end models is
considerably lower than that of the mid- to high-end models. Also, if you have many address and service
objects that are unused, clearing Share Unused Address and Service Objects with Devices reduces the
commit times significantly on the firewalls because the configuration pushed to each firewall is smaller.
However, disabling this option might increase the commit time on Panorama because Panorama has to
dynamically check whether policy rules reference a particular object.
STEP 1 | Select Panorama > Setup > Management, and edit the Panorama Settings.
STEP 2 | Clear the Share Unused Address and Service Objects with Devices option to push only the
shared objects that rules reference, or select the option to re-enable pushing all shared objects.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
STEP 1 | Select Panorama > Setup > Management and edit the Panorama Settings.
STEP 2 | If you want to reverse the default order of precedence, select Objects defined in ancestors
will take higher precedence. The dialog then displays the Find Overridden Objects link, which
provides the option to see how many overridden (shadowed) objects will have ancestor values
after you commit this change. You can hover over the quantity message to display the object
names.
If you want to revert to the default order of precedence, clear Objects defined in ancestors will take
higher precedence.
Find Overridden Objects only detects a Shared device group object that shares a name
with another object in the device group.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
STEP 5 | (Optional) If you selected Objects defined in ancestors will take higher precedence, Panorama
does not push the ancestor objects until you push configuration changes to device groups:
select Commit > Push to Devices and Push your changes.
When cloning multiple policy rules, the order by which you select the rules will determine
the order they are copied to the device group. For example, if you have rules 1-4 and your
STEP 1 | Log in to Panorama and select the rulebase (for example, Policy > Security > Pre Rules) or
object type (for example, Objects > Addresses).
STEP 2 | Select the Device Group and select one or more rules or objects.
STEP 4 | In the Destination drop-down, select the new device group or Shared. The default is previously
selected Device Group.
STEP 6 | The Error out on first detected error in validation check box is selected by default, which
means Panorama will display the first error it finds and stop checking for more errors. For
example, an error occurs if the Destination device group doesn't have an object that is
referenced in the rule you are moving. When you move or clone many items at once, selecting
this check box can simplify troubleshooting. If you clear the check box, Panorama will find all
the errors before displaying them. Regardless of this setting, Panorama won’t move or clone
anything until you fix all the errors for all the selected items.
STEP 7 | Click OK to start the error validation. If Panorama finds errors, fix them and retry the move or
clone operation. If Panorama doesn't find errors, it performs the operation.
STEP 8 | Select Commit > Commit and Push, Edit Selections in the Push Scope, select Device Groups,
select the original and destination device groups, click OK, and then Commit and Push your
changes to the Panorama configuration and to the device groups.
Unlike firewalls, Panorama does not download the URL database and does not require a
URL filtering license.
Complete this task on Panorama2 (passive peer) before Panorama1 (active peer).
STEP 2 | Verify that the URL categories are available for referencing in policies.
1. Select Objects > Security Profiles > URL Filtering.
2. Click Add and verify that the Categories tab of the URL Filtering profile dialog displays the URL
categories associated with the selected vendor.
STEP 2 | Verify that the URL categories are available for referencing in policies.
1. Select Objects > Security Profiles > URL Filtering.
2. Click Add and verify that the Categories tab of the URL Filtering profile dialog displays the URL
categories associated with the selected vendor.
STEP 1 | Determine which firewalls require new PAN-DB URL filtering licenses.
1. Log in to Panorama and select Panorama > Device Deployment > Licenses.
2. Check the URL column to determine which firewalls have PAN-DB licenses and whether the licenses
are valid or expired.
A firewall can have valid licenses for both BrightCloud and PAN-DB, but only one license can be
active.
If you’re not sure whether a PAN-DB URL filtering license is active, access the firewall
web interface, select Device > Licenses, and verify that the Active field displays Yes in
the PAN-DB URL Filtering section.
3. Purchase a new license for each firewall that does not have a valid PAN-DB license.
In HA deployments, each firewall peer needs a distinct PAN-DB license and authorization code. Palo
Alto Networks sends an email containing activation codes for the licenses you purchase. If you can’t
find this email, contact Customer Support before proceeding.
STEP 3 | Configure the TCP session settings on both firewall HA peers to ensure sessions that are not
yet synchronized will fail over when you suspend a peer.
Log in to the CLI of each firewall and run the following command:
STEP 4 | Migrate the URL filtering vendor to PAN-DB on each firewall HA peer.
1. Access the firewall web interface, select Device > High Availability > Operational Commands, and
Suspend local device.
Performing this step on fw1 triggers failover to fw2.
2. Select Device > Licenses.
3. In the License Management section, select Activate feature using authorization code, enter the
Authorization Code and click OK.
Activating the PAN-DB license automatically deactivates the BrightCloud license.
4. In the PAN-DB URL Filtering section, Download the seed file, select your region, and click OK.
5. Commit and push your configuration changes:
1. Access the Panorama web interface.
2. Select Commit > Commit and Push and Edit Selections in the Push Scope
3. Select Device Groups, select the firewall, and click OK.
4. Commit and Push your changes to the Panorama configuration and to device groups.
6. Access the firewall web interface, select Device > High Availability > Operational Commands, and
Make local device functional.
When you perform this step on fw1 with preemption enabled on both firewalls, fw1 automatically
reverts to active (or active-primary) status and fw2 reverts to passive (or active-secondary) status.
STEP 5 | Revert both firewall HA peers to the original TCP session settings.
Run the following command at the CLI of each firewall:
STEP 1 | Determine which firewalls require new PAN-DB URL filtering licenses.
1. Log in to Panorama and select Panorama > Device Deployment > Licenses.
2. Check the URL column to determine which firewalls have PAN-DB licenses and whether the licenses
are valid or expired.
A firewall can have valid licenses for both BrightCloud and PAN-DB, but only one license can be
active.
If you’re not sure whether a PAN-DB URL filtering license is active, access the firewall
web interface, select Device > Licenses, and verify that the Active field displays Yes in
the PAN-DB URL Filtering section.
3. Purchase new licenses for the firewalls that don’t have valid PAN-DB licenses.
Palo Alto Networks sends an email containing activation codes for the licenses you purchase. If you
can’t find this email, contact Customer Support before proceeding.
By default, although the check box for the virtual systems in the device group is
disabled, all virtual systems will inherit the rule on commit unless you select one or
more virtual systems to which you want the rule to apply.
3. (Optional) To exclude a subset of firewalls from inheriting the rule, Install on all but specified devices
and select the firewalls you want to exclude.
STEP 5 | Troubleshoot Policy Rule Traffic Match to verify that the rules allow and deny traffic as the
intended.
To understand the order in which the firewall evaluates rules by layer and by type (pre-rules,
post-rules, and default rules) across the Device Group Hierarchy, see Device Group Policies.
To determine which rules a firewall doesn’t currently use, select that firewall in the
Context drop-down on Panorama, select the rulebase (for example, Policies > Security),
and select the Highlight Unused Rules check box. A dotted orange background indicates
the rules that the firewall doesn’t use.
1. Select the rulebase (for example, Policies > Security > Pre Rules) that contains the rule you will delete
or disable.
2. Select the Device Group that contains the rule.
3. Select the rule, and click Delete or Disable as desired. Disabled rules appear in italicized font.
To reposition local rules on a firewall, access its web interface by selecting that firewall in
the Context drop-down before performing this step.
STEP 4 | If you modified the rules, commit and push the changes.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope
2. Select Device Groups, select the device group that contains the rules you changed or deleted, and
click OK.
3. Commit and Push your changes to the Panorama configuration and to device groups.
To delete a template, you must first locally Disable/Remove Template Settings on the firewall.
Only administrators with the superuser role can disable a template.
To Manage Licenses and Updates (software or content) for firewalls, use the Panorama >
Device Management tab options; do not use templates.
• Renaming a vsys on a multi-vsys firewall.
Add a Template
You must add at least one template before Panorama™ displays the Device and Network tabs required to
define the network setup and device configuration elements for firewalls. Panorama supports up to 1,024
templates. Every managed firewall must belong to a template stack. While templates contain managed
device configurations, template stacks allow you to manage and push the template configurations to all
managed firewalls assigned to the template stack.
STEP 3 | Configure a Template Stack and add the template to the template stack.
Renaming a vsys is allowed only on the local firewall, not on Panorama the result is an
entirely new vsys or the new vsys name gets mapped to the wrong vsys on the firewall.
For example, define a primary Domain Name System (DNS) server for the firewalls in the template.
You can also Configure a Template or Template Stack Variable to push device-specific
values to managed devices.
4. Select Commit > Commit and Push and then Commit and Push your changes to the Panorama
configuration and to the template.
STEP 5 | Verify that the firewall is configured with the template settings that you pushed from
Panorama.
1. In the Context drop-down, select one of the firewalls to which you pushed the template setting.
2. Select Device > Setup > Services > Global. The IP address that you pushed from the template
appears. The Services section header displays a template icon ( ) to indicate that settings in the
section have values pushed from a template.
Add a Template to configure interfaces, VLANs, Virtual Wires, IPSec Tunnels, DNS Proxy
and Virtual Systems. These objects must be configured and pushed from a template, and not
a template stack. Once pushed from a template, you can override these objects, except for
Virtual Systems, in the template stack.
When planning the priority order of templates within the stack (for overlapping settings),
you must check the order to prevent misconfiguration. For example, consider a stack
in which the ethernet1/1 interface is of type Layer 3 in Template_A but of type Layer 2
with a VLAN in Template_B. If Template_A has a higher priority, Panorama will push
ethernet1/1 as type Layer 3 but assigned to a VLAN.
Also note that a template configuration can’t reference a configuration in another template even if both
templates are in the same stack. For example, a zone configuration in Template_A can’t reference a zone
protection profile in Template_B.
4. In the Devices section, select firewalls to assign them to the stack. For firewalls with multiple virtual
systems, you can’t assign individual virtual systems, only an entire firewall. You can assign any firewall
to only one template stack.
Whenever you add a new managed firewall to Panorama, you must assign it to the
appropriate template stack; Panorama does not automatically assign new firewalls to
a template or template stack. When you push configuration changes to a template,
Panorama pushes the configuration to every firewall assigned to the template stack.
5. (Optional) Select Group HA Peers to display a single check box for firewalls that are in a high
availability (HA) configuration. Icons indicate the HA state: green for active and yellow for passive.
The firewall name of the secondary peer is in parentheses.
For active/passive HA, add both peers to the same template so that both will receive the
configurations. For active/active HA, whether you add both peers to the same template depends on
whether each peer requires the same configurations. For a list of the configurations that PAN-OS
synchronizes between HA peers, see High Availability Synchronization.
6. Click OK to save the template stack.
Renaming a vsys is allowed only on the local firewall. If you rename a vsys on Panorama,
the result is an entirely new vsys or the new vsys name gets mapped to the wrong vsys
on the firewall.
In an individual firewall context, you can override settings that Panorama pushes from a stack in the
same way you override settings pushed from a template, see Override a Template or Template Stack
Value.
1. Filter the tabs to display only the mode-specific settings you want to edit:
While Panorama pushes mode-specific settings only to firewalls that support those
modes, this selective push doesn’t adjust mode-specific values. For example, if a
template has firewalls in Federal Information Processing Standards (FIPS) mode and
an IKE Crypto profile that uses non-FIPS algorithms, the template push will fail. To
avoid such errors, use the Mode drop-down in the Network and Device tabs to filter
mode-specific features and value options.
STEP 6 | Troubleshoot Connectivity to Network Resources to verify your firewalls can access your
network resources.
STEP 3 | Select Panorama > Templates and Manage (Variables column) the template or template stack
for which you want to create a variable.
STEP 5 | From the Template drop-down, select the template or template stack to which the variable
belongs.
STEP 7 | Click Commit and Commit and Push your changes to managed firewalls.
When you push a device group configuration with references to template or template
stack variables, you must Edit Selections and Include Device and Network Templates.
STEP 8 | Verify that the values for all variables were pushed to the managed devices.
STEP 9 | Troubleshoot Connectivity to Network Resources to verify your firewalls can access your
network resources.
STEP 3 | Edit the CSV file containing the template stack variables to import to Panorama in the
following format:
Values that display as #inherited# are values that are defined in the template stack.
1. Correct the number of the cells containing the firewall serial number. Repeat this step for all firewalls
in the CSV file.
1. Right-click the cell containing the firewall serial number and select Format Cells.
2. Select Number > Text and click OK.
3. Add a 0 at the beginning of the serial number.
STEP 5 | Select Commit > Commit to Panorama and Commit your changes.
STEP 7 | Click Commit and Commit and Push your changes to managed firewalls.
When you push a device group configuration with references to template or template
stack variables, you must Edit Selections and Include Device and Network Templates.
You can override a template or template stack value in one of the following ways:
• Override a Template Value on the Firewall or Override a Template or Template Stack Value Using
Variables—There are two ways to override values pushed from a template or template stack. The first
is to define a value locally on the firewall to override a value pushed from a template or template stack.
The second is to define firewall-specific variables to override values pushed from a template or template
stack.
• Override a Template Value Using a Template Stack—Define values or variables on the template stack to
override values pushed from a template.
STEP 2 | From the Templatedrop-down, select the template stack that will override the template
configuration.
You can override template or template stack variables that have not been overridden. If a
template or template stack variable is already overridden, Revert the override to create a
firewall-specific variable.
STEP 1 | Access the web interface of the managed firewall as an administrator with the Superuser role.
You can directly access the firewall by entering its IP address in the browser URL field or, in
Panorama, select the firewall in the Context drop-down.
STEP 2 | Select Device > Setup > Management and edit the Panorama Settings.
STEP 4 | (Optional) Select Import Device and Network Template before disabling, to save the
configuration settings locally on the firewall. If you do not select this option, PAN-OS will
delete all Panorama-pushed settings from the firewall.
STEP 2 | (Best Practice) Select Commit and Commit and Push any pending configuration changes.
Panorama must re-encrypt data using the new master key. To ensure all configuration elements are
encrypted with the new master key, you should commit all pending changes before deploying the new
master key.
STEP 3 | Configure the firewall, Log Collector, and WildFire appliance master key to automatically
renew with the same master key after the lifetime of the key expires.
Automatically renewing the master key allows you to keep your configuration encrypted in the event
the key expires before a maintenance window but this is not a replacement for deploying a new master
key after the key lifetime expires. Consider the number of days until your next available maintenance
window when configuring the master key to automatically renew when the lifetime of the key expires.
1. Select Device > Master Key and Diagnostics and edit the Master Key setting.
2. Configure Panorama to Auto Renew with Same Master Key for a specified number of days or hours.
4. Verify that the master key was deployed successfully to all selected devices.
A System log generates when you deploy a new master key from Panorama.
STEP 5 | Deploy the master key to Log Collectors. The master key must be identical to the key deployed
in Step 3.
1. Select Panorama > Managed Collectors and Deploy Master Key.
2. Select all devices and Change the master key.
3. Configure the master key:
1. If renewing a master key, enter the Current Master Key. If you are replacing the default master
key with a new master key, do not specify a Current Master Key.
2. Specify the New Master Key and Confirm Master Key.
3. Configure the master key Lifetime and Time for Reminder.
4. Click OK.
4. Verify that the master key was deployed successfully to all selected devices.
STEP 6 | Deploy the master key to managed WildFire appliances. The master key must be identical to
the key deployed in Step 3.
1. Select Panorama > Managed WildFire Appliances and Deploy Master Key.
2. Select all devices and Change the master key.
3. Configure the master key:
1. If renewing a master key, enter the Current Master Key. If you are replacing the default master
key with a new master key, do not specify a Current Master Key.
2. Specify the New Master Key and Confirm Master Key.
3. Configure the master key Lifetime and Time for Reminder.
4. Click OK.
4. Verify that the master key was deployed successfully to all selected devices.
A System log generates when you deploy a new master key from Panorama.
STEP 7 | Configure the master key on Panorama. The master key must be identical to the key deployed
to firewalls, Log Collectors, and WildFire appliances in Steps 3 through 5.
1. Select Panorama > Master Key and Diagnostics and configure the master key.
1. If renewing a master key, enter the Current Master Key. If you are replacing the default master
key with a new master key, o not specify a Current Master Key.
2. Configure the New Master Key and Confirm Master Key.
3. Configure the master key Lifetime and Time for Reminder.
4. Click OK.
2. Select Commit > Commit to Panorama and Commit your changes.
A Log Collector that is local to the Panorama management server does not redistribute
User-ID information.
1. Add Panorama, firewalls, or virtual systems as User-ID redistribution points to a Log Collector:
1. Select Panorama > Managed Collectors and select the Log Collector to edit it.
2. Select User-ID Agents and Add a redistribution point.
1. Enter a Name to identify the redistribution point.
2. Enter the Host name or IP address of the interface on the firewall or Panorama that will
respond to User-ID information queries from the Log Collector.
3. Enter the Port number on which Panorama or the firewall will listen for User-ID information
queries (default is 5007).
4. If the redistribution point is a firewall or virtual system, enter the Collector Name and
Collector Pre-Shared Key.
If you are using Panorama to manage both your firewall and the Dedicated Log Collector
(DLC), and you want to configure the firewall to receive User-ID information from
Panorama or the log collectors, add the User-ID agent using the serial number to the
Panorama template, then push the template to the firewall. If you add the User-ID agent
on the firewall using the serial number, you will only see Panorama and not the DLC, and
you will need to add the DLC to the firewall using the host and port number.
1. Select Device > User Identification > User-ID Agents, select the Template to which the firewalls are
assigned, and Add one of the following as a redistribution point:
• Panorama—Add an Agent Using the Serial Number, and set the Serial Number to panorama for
the active or solitary Panorama or to panorama2 (HA only) for the passive Panorama.
• Log Collector—Add an Agent Using the Host and Port. Enter the Host name or IP address of the
MGT interface on the Log Collector. Then enter the Port number on which the Log Collector
listens for User-ID information queries (default is 5007).
2. Click OK to save the configuration.
3. Select Commit > Commit and Push to activate your changes on Panorama and push the changes to
the firewalls.
• Verify that Panorama, Log Collectors, and firewalls receive redistributed user mappings.
1. Access the CLI of a firewall, Log Collector, or Panorama management server that redistributes User-
ID information.
2. Display all the user mappings by running the following command:
This example output shows the timestamp for a response to one authentication
challenge (factor). For Authentication rules that use multi-factor authentication (MFA),
the output shows multiple timestamps.
Panorama can import configurations from firewalls that run PAN-OS 5.0 or later releases
and can push configurations to those firewalls. The exception is that Panorama 6.1 and later
releases cannot push configurations to firewalls running PAN-OS 6.0.0 through 6.0.3.
Panorama can import configurations from firewalls that are already managed devices but
only if they are not already assigned to device groups or templates.
If you will import multiple firewall configurations, enter the serial number of each one
on a separate line. Optionally, you can copy and paste the serial numbers from a
Microsoft Excel worksheet.
3. Select Commit > Commit to Panorama and Commit your changes.
If you later decide to re-import a firewall configuration, first remove the firewall device
groups and template to which it is a member. If the device group and template names are
the same as the firewall hostname, then you can delete the device group and template
before re-importing the firewall configuration or use the Device Group Name Prefix
fields to define new names for the device group and template created by the re-import.
Additionally, firewalls don’t lose logs when you remove them from device groups or
templates.
1. From Panorama, select Panorama > Setup > Operations, click Import device configuration to
Panorama, and select the Device.
The Import devices' shared objects into Panorama's shared context check box is
selected by default, which means Panorama compares imports objects that belong to
the Shared location in the firewall to Shared in Panorama. If an imported object is not
in the Shared context of the firewall, it is applied to each device group being imported.
If you clear the check box, Panorama copies will not compare imported objects, and
apply all shared firewall objects into device groups being imported instead of Shared.
This could create duplicate objects, so selecting the check box is a best practice in
most cases. To understand the consequences of importing shared or duplicate objects
into Panorama, see Plan how to manage shared settings.
4. Select a Rule Import Location for the imported policy rules: Pre Rulebase or Post Rulebase.
Regardless of your selection, Panorama imports default security rules (intrazone-default and
interzone-default) into the post-rulebase.
If Panorama has a rule with the same name as a firewall rule that you import,
Panorama displays both rules. Delete one of the rules before performing a Panorama
commit to prevent a commit error.
5. Click OK. Panorama displays the import status, result, details about your selections, details about
what was imported, and any warnings. Click Close.
6. Select Commit > Commit to Panorama and Commit your changes.
STEP 5 | Push the configuration from Panorama to the newly added device.
To prevent duplicate rule or object names, push the device group configuration from Panorama to the
firewall to avoid commit errors.
1. Log in to the Panorama Web Interface and select Panorama > Setup > Operations and click Export or
push device config bundle.
2. Click Export or push device config bundle, select the Device from the drop-down menu, and click
OK.
STEP 7 | Push the firewall configuration bundle to the firewall to remove all policy rules and objects
from its local configuration.
This step is necessary to prevent duplicate rule or object names, which would cause commit errors when
you push the device group configuration from Panorama to the firewall in the next step.
1. In Panorama, select Commit > Commit to Panorama and Commit your changes.
2. Select Panorama > Setup > Operations and click Export or push device config bundle.
3. Select the Device from which you imported the configuration, click OK, and click Push & Commit.
Panorama pushes the bundle and initiates a commit on the firewall.
STEP 8 | Push the device group and template configurations to complete the transition to centralized
management.
If you are migrating multiple firewalls, perform all the preceding steps—including this one—for each
firewall before continuing.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Device Groups and select the device groups that contain the imported firewall configurations.
3. Select Merge with Device Candidate Config, Include Device and Network Templates, and Force
Template Values.
4. Click OK to save your changes to the Push Scope.
5. Commit and Push your changes.
If Panorama is already receiving logs from these firewalls, you do not need to perform this
step. Continue to Step 5.
If you later decide to re-import a firewall configuration, first remove the firewall device
groups and template to which it is a member. If the device group and template names are
the same as the firewall hostname, then you can delete the device group and template
before re-importing the firewall configuration or use the Device Group Name Prefix
fields to enter a new name for the device group and template created by the re-import.
Additionally, firewalls don’t lose logs when you remove them from device groups or
templates.
1. From Panorama, select Panorama > Setup > Operations, click Import device configuration to
Panorama, and select the Device.
The Imported devices’ shared objects into Panorama’s shared context check box is
selected by default, which means Panorama compares imports objects that belong to
the Shared location in the firewall to Shared in Panorama. If an imported object is not
in the Shared context of the firewall, it is applied to each device group being imported.
If you clear the check box, Panorama copies will not compare imported objects, and
apply all shared firewall objects into device groups being imported instead of Shared.
This could create duplicate objects, so selecting the check box is a best practice in
most cases. To understand the consequences of importing shared or duplicate objects
into Panorama, see Plan how to manage shared settings.
4. Commit to Panorama.
5. Select Panorama > Setup > Operations and Export or push device config bundle. Select the Device,
select OK and Push & Commit the configuration.
The Enable Config Sync setting in Step 2 must be cleared on both firewalls before you
push the device group and template stack.
STEP 6 | Add the HA firewall pair into the same device group and template stack.
Skip this step if the HA firewall pair are in an active/active configuration.
Do not combine the HA firewall pair in to a single template if a unique Hostname, management
IP address, or HA configuration is configured for each HA peer. You may also configure a unique
Hostname, management IP address, or HA configuration locally on the firewalls.
1. Select Panorama > Device Group, select the device group of the second firewall and Delete it.
2. Select the device group for the first firewall, select the second firewall, click OK and Commit to
Panorama to add it to the same device group as the HA peer.
3. Select Panorama > Templates, select the template stack for the second firewall and Delete it.
4. Select the template stack for the first firewall, add the second firewall, select OK and Commit to
Panorama to add it to the same template stack as the HA peer.
5. If you add the HA peers to the same template stack, Configure a Template or Template Stack
Variable to preserve the firewall-specific HA configurations.
If you do not want to manage the firewall HA configuration from Panorama, delete
the firewall HA configuration from the template or template stack, Launch the Web
Interface of each firewall HA peer and configure the HA IP address locally.
6. Select Commit and Commit and Push the configuration changes.
7. Select Panorama > Managed Devices > Summary, and verify that the device group and template
are in sync for the passive firewall. Verify policy rules, objects and network settings on the passive
firewall match the active firewall.
STEP 2 | Resolve how to manage duplicate settings, which are those that have the same names in
Panorama as in a firewall.
Before you load a partial firewall configuration, Panorama and that firewall might already have duplicate
settings. Loading a firewall configuration might also add settings to Panorama that are duplicates of
settings in other managed firewalls.
If Panorama has policy rules or objects with the same names as those on a firewall,
a commit failure will occur when you try to push device group settings to that firewall.
If Panorama has template settings with the same names as those on a firewall, the
template values will override the firewall values when you push the template.
After using this option to import a firewall configuration file, you can’t use the
Panorama web interface to load it. You must use the XML API or CLI, as described in
the next step.
STEP 5 | Load the desired part of the firewall configuration into Panorama.
To specify a part of the configuration (for example, all application objects), you must identify the:
• Source xpath—The XML node in the firewall configuration file from which you are loading.
• Destination xpath—The node in the Panorama configuration to which you are loading.
Use the XML API or CLI to identify and load the partial configuration:
1. Use the firewall XML API or CLI to identify the source xpath.
For example, the xpath for application objects in vsys1 of the firewall is:
/config/devices/entry[@name='localhost.localdomain']/device-group/
entry[@name='US-West']/application
3. Use the Panorama CLI to load the configuration and commit the change:
For example, enter the following to load the application objects from vsys1 on an imported firewall
configuration named fw1-config.xml into a device group named US-West on Panorama:
STEP 6 | Push the partial configuration from Panorama to the firewall to complete the transition to
centralized management.
1. On the firewall, delete any rules or objects that have the same names as those in Panorama. If
the device group for that firewall has other firewalls with rules or objects that are duplicated in
Panorama, perform this step on those firewalls also. For details, see Step 2.
2. On Panorama, push the partial configuration to the firewall.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Device Groups and select the device groups that contain the imported firewall
configurations.
3. Select Merge with Device Candidate Config, Include Device and Network Templates, and Force
Template Values.
4. Click OK to save your changes to the Push Scope.
5. Commit and Push your changes.
3. If the firewall has a device or network setting that you won’t use Panorama to manage, Override a
Template or Template Stack Value on the firewall.
STEP 2 | Select Panorama > Managed Devices > Health to monitor the health of managed firewalls.
View All Devices to see a list of all managed firewalls and the monitored health metrics. Select an
individual firewall to view Detailed Device View with time-trended graphs and tables of monitored
metrics.
STEP 3 | Select Deviating Devices to view firewalls with health metrics that deviated outside of the
calculated baseline.
Panorama lists all firewalls that are reporting metrics that deviate from the calculated baseline and
displays deviating metrics in red.
Policy rule usage data may also be useful when using Policy Optimizer to prioritize which
rules to migrate or clean up first.
To view the rule usage across any Shared rule or for a specific device group:
STEP 4 | Change the Device Group context to Shared or to the specific device group you want to view.
STEP 5 | Determine whether the rule is being used (Rule Usage). The policy rule usage status is one of
the following:
Firewalls must run PAN-OS 8.1 or later release with Policy Rule Hit Count enabled for Panorama to
determine rule usage.
• Used—When all firewalls in the device group—to which you pushed the policy rule—have traffic
matches for the policy rule.
• Partially Used—When some of the firewalls in the device group—to which you pushed the policy rule
—have traffic matches for the policy rule.
• Unused—When no firewalls in the device group—to which you pushed the policy rule—have traffic
matches for the policy rule.
• Em-dash (—)—When no firewalls in the device group—to which you pushed the policy rule—have
Policy Rule Hit Count enabled or available for Panorama to determine the rule usage.
• Modified—The date and time the policy rule was last modified.
• Created—The date and time the policy rule was created.
If the rule was created when Panorama was running PAN-OS 8.1 and the Policy Rule
Hit Count setting is enabled, the First Hit date and time is used as the Created date
and time on upgrade to PAN-OS 9.0. If the rule was created in PAN-OS 8.1 when the
Policy Rule Hit Count setting was disabled or if the rule was created when Panorama
was running PAN-OS 8.0 or an earlier release, the Created date for the rule will be the
date and time you successfully upgraded Panorama to PAN-OS 9.0
STEP 7 | (Optional) View the policy rule hit-count data for individual appliances in the device group.
1. Click Preview Rules.
2. From the Device context, select the appliance for which you want to view the policy rule usage data.
STEP 8 | Select Policies and, in the Policy Optimizer dialog, view the Rule Usage filter.
1. Select the Timeframe you want to filter on, or specify a Custom time frame.
2. Select the rule Usage on which you want to filter.
3. (Optional) If you have reset the rule usage data for any rules, check for Exclude rules reset during
the last <number of days> days and decide when to exclude a rule based on the number of days you
specify since the rule was reset. Only rules that were reset before your specified number of days are
included in the filtered results.
4. (Optional) Specify search filters based on additional rule data, other than the rule usage.
1. Hover your mouse over the column header, and from the drop-down select Columns.
2. Add any additional columns you want to filter with or to display.
The first step in creating your central management strategy is to determine how to group the firewalls into
device groups and templates to efficiently push configurations from Panorama. You can base the grouping
on the business functions, geographic locations, or administrative domains of the firewalls. In this example,
you create two device groups and three templates to administer the firewalls using Panorama:
• Device Groups in this Use Case
• Templates in this Use Case
• Set Up Your Centralized Configuration and Policies
STEP 1 | For each firewall that Panorama will manage, Add a Firewall as a Managed Device.
In this example, add 12 firewalls.
STEP 2 | Deploy the content updates to the firewalls. If you purchased a Threat Prevention subscription,
the content and antivirus databases are available to you. First install the Applications or
Applications and Threats database, then the Antivirus.
To review the status or progress for all tasks performed on Panorama, see Use the
Panorama Task Manager.
STEP 1 | For each template you will use, Add a Template and assign the appropriate firewalls to each.
In this example, create templates named T_Branch, T_Regional, and T_DataCenter.
STEP 2 | Define a DNS server, NTP server, syslog server, and login banner. Repeat this step for each
template.
1. In the Device tab, select the Template from the drop-down.
2. Define the DNS and NTP servers:
1. Select Device > Setup > Services > Global and edit the Services.
2. In the Services tab, enter an IP address for the Primary DNS Server.
For any firewall that has more than one virtual system (vsys), for each vsys, add a
DNS server profile to the template (Device > Server Profiles > DNS).
3. In the NTP tab, enter an IP address for the Primary NTP Server.
4. Click OK to save your changes.
3. Add a login banner: select Device > Setup > Management, edit the General Settings, enter text for
the Login Banner and click OK.
4. Configure a Syslog server profile (Device > Server Profiles > Syslog).
STEP 3 | Enable HTTPS, SSH, and SNMP access to the management interface of the managed firewalls.
Repeat this step for each template.
1. In the Device tab, select the Template from the drop-down.
2. Select Setup > Management, and edit the Management Interface Settings.
3. Under Services, select the HTTPS, SSH, and SNMP check boxes, and click OK.
STEP 4 | Create a Zone Protection profile for the firewalls in the data center template (T_DataCenter).
1. Select the Network tab and, in the Template drop-down, select T_DataCenter.
2. Select Network Profiles > Zone Protection and click Add.
3. For this example, enable protection against a SYN flood—In the Flood Protection tab, select the SYN
check box, set the Action to SYN Cookies as, set the Alert packets/second to 100, set the Activate
packets/second to 1000, and set the Maximum packets/second to 10000.
STEP 5 | Configure the interface and zone settings in the data center template (T_DataCenter), and then
attach the Zone Protection profile you just created.
Before performing this step, you must have configured the interfaces locally on the
firewalls. As a minimum, for each interface, you must have defined the interface type,
assigned it to a virtual router (if needed), and attached a security zone.
1. Select the Network tab and, in the Template drop-down, select T_DataCenter.
2. Select Network > Interface and, in the Interface column, click the interface name.
3. Select the Interface Type from the drop-down.
4. In the Virtual Router drop-down, click New Virtual Router. When defining the router, ensure the
Name matches what is defined on the firewall.
5. In the Security Zone drop-down, click New Zone. When defining the zone, ensure that the Name
matches what is defined on the firewall.
6. Click OK to save your changes to the interface.
7. Select Network > Zones, and select the zone you just created. Verify that the correct interface is
attached to the zone.
8. In the Zone Protection Profile drop-down, select the profile you created, and click OK.
STEP 1 | Create device groups and assign the appropriate firewalls to each device group: see Add a
Device Group.
In this example, create device groups named DG_BranchAndRegional and DG_DataCenter.
When configuring the DG_BranchAndRegional device group, you must assign a Master firewall. This
is the only firewall in the device group that gathers user and group mapping information for policy
evaluation.
STEP 3 | Define the corporate acceptable use policy for all offices. In this example, create a shared rule
that restricts access to some URL categories and denies access to peer-to-peer traffic that is of
risk level 3, 4, or 5.
1. Select the Policies tab and, in the Device Group drop-down, select Shared.
2. Select Security > Pre-Rules and click Add.
3. In the General tab, enter a Name for the security rule.
4. In the Source and Destination tabs, click Add and select any for the traffic Source Zone and
Destination Zone.
5. In the Application tab, define the application filter:
1. Click Add and click New Application Filter in the footer of the drop-down.
2. Enter a Name, and select the Shared check box.
3. In the Risk column, select levels 3, 4, and 5.
4. In the Technology column, select peer-to-peer.
5. Click OK to save the new filter.
6. In the Service/URL Category tab, URL Category section, click Add and select the categories you want
to block (for example, streaming-media, dating, and online-personal-storage).
7. You can also attach the default URL Filtering profile—In the Actions tab, Profile Setting section, select
the Profile Type option Profiles, and select the URL Filtering option default.
8. Click OK to save the security pre-rule.
STEP 4 | Allow Facebook for all users in the Marketing group in the regional offices only.
Enabling a security rule based on user and group has the following prerequisite tasks:
• Set up User-ID on the firewalls.
• Enable User-ID for each zone that contains the users you want to identify.
• Define a master firewall for the DG_BranchAndRegional device group (see step 1).
1. Select the Policies tab and, in the Device Group drop-down, select DG_BranchAndRegional.
2. Select the Security > Pre-Rules rulebase.
3. Click Add and enter a Name for the security rule.
4. In the Source tab, Add the Source Zone that contains the Marketing group users.
5. In the Destination tab, Add the Destination Zone.
6. In the User tab, Add the Marketing user group to the Source User list.
7. In the Application tab, click Add, type Facebook, and then select it from the drop-down.
8. In the Action tab, set the Action to Allow.
9. In the Target tab, select the regional office firewalls and click OK.
STEP 5 | Allow access to the Amazon cloud application for the specified hosts/servers in the data
center.
1. Create an address object for the servers/hosts in the data center that need access to the Amazon
cloud application.
1. Select Objects > Addresses and, in the Device Group drop-down, select DG_DataCenter.
2. Click Add and enter a Name for the address object.
STEP 6 | To enable logging for all internet-bound traffic on your network, create a rule that matches
trust zone to untrust zone.
1. Select the Policies tab and, in the Device Group drop-down, select Shared.
2. Select the Security > Pre-Rules rulebase.
3. Click Add and enter a Name for the security rule.
4. In the Source and Destination tabs for the rule, Add trust_zone as the Source Zone and
untrust_zone as the Destination Zone.
5. In the Action tab, set the Action to Deny, set the Log Setting to Log at Session end, and click OK.
STEP 3 | Verify that Panorama applied the template and policy configurations.
1. In the Panorama header, set the Context to the firewall to access its web interface.
2. Review the template and policy configurations to ensure your changes are there.
245
246 PANORAMA ADMINISTRATOR'S GUIDE | Manage Large-Scale Firewall Deployments
© 2020 Palo Alto Networks, Inc.
Determine the Optimal Large-Scale Firewall
Deployment Solution
To ease the operational burden of managing the configuration of your large-scale firewall deployment, Palo
Alto Networks provides different firewall management options to best suit your deployment scenario.
If your large-scale firewall deployment is composed of one or very few Panorama management servers, you
can deploy an M-600 appliance to manage up to 5,000 firewalls, or Panorama virtual appliance to manage
up to 2,000 firewalls, to leverage all Panorama capabilities from a single Panorama management server. The
Increased Device Management Capacity for M-600 and Panorama Virtual Appliance is ideal for vertically
scaled deployments where you manage a large number of firewalls from a single Panorama management
server rather than deploying multiple Panorama management servers to manage fewer firewalls.
If your large-scale firewall deployment is composed of multiple Panorama management servers with
similar configurations, the Panorama Interconnect plugin allows you to manage multiple Panorama Nodes
from a single Panorama Controller. This plugin simplifies the deployment and operational management
of large scale firewall deployments because you can centrally manage policy and configuration from a
Panorama Controller. From the Panorama Controller, the device group and template stack configuration is
synchronized to the Panorama Nodes and pushed to managed devices. The Panorama Interconnect plugin is
ideal for horizontally-scaled firewall deployments with multiple distributed Panorama management servers.
Log Collection Local log collection is not Local log collection is not
supported. supported.
See Deploy Panorama with See Deploy Panorama with
Dedicated Log Collectors to set up Dedicated Log Collectors to set up
log collection. log collection.
Logging and Reporting Enable the Use Panorama Enable the Use Panorama
Data for Pre-Defined Reports Data for Pre-Defined Reports
setting (Panorama > Setup > setting (Panorama > Setup >
Management > Logging and Management > Logging and
Reporting Settings > Log Export Reporting Settings > Log Export
and Reporting) and Reporting)
STEP 1 | Contact your Palo Alto Networks sales representative to obtain the increased device
management license.
• If you are deploying an M-600 appliance, obtain the PAN-M-600-P-1K device management license.
• If you are deploying a Panorama virtual appliance, obtain the PAN-PRA-1000 device management
license.
STEP 3 | Change the Panorama management server to Management Only mode if Panorama is not
already in this mode.
• Begin at Step 5 to Set Up an M-Series Appliance in Management Only Mode.
• Set up a Panorama Virtual Appliance in Management Only Mode.
STEP 5 | Select Panorama > Licenses and verify that the device management license is successfully
activated.
If you are activating a new device management license on a Panorama, you can manage
up to 5,000 firewalls with an M-600 appliance, or up to 2,000 firewalls with a Panorama
virtual appliance, but the Description still displays Device management license to
manage up to 1000 devices or more.
STEP 1 | Increase CPUs and Memory on the Panorama Virtual Appliance if the Panorama virtual
appliance does not already meet the minimum resource requirements for increased device
management.
Review the Increased Device Management Capacity Requirements to verify whether your existing
Panorama virtual appliance meets the minimum requirements before upgrading.
STEP 3 | Change the Panorama management server to Management Only if Panorama is not already in
this mode.
• (M-600 appliances only) Begin at Step 5 to Set Up an M-Series Appliance in Management Only
Mode.
or
• Set up a Panorama Virtual Appliance in Management Only Mode.
STEP 6 | Select Panorama > Licenses and verify that the device management license is successfully
activated.
The following figure displays an example of a Panorama Interconnect Setup page for a Panorama Controller
and a Panorama Node once they have been successfully configured.
Task Details
Review the Panorama Interconnect Requirements The Panorama management servers and
firewalls must meet the system and operational
requirements in order to successfully deploy
Panorama Interconnect.
This includes installing and activating licenses,
and registering the Panorama management
server.
Enable Authentication Between the Panorama Generate or import a Certificate Authority and
Controller and Nodes issue certificates for the Nodes, and configure
a certificate profile, to secure communication
between the Panorama Controller and Panorama
Nodes.
Set Up the Panorama Interconnect Plugin Download, install, and set up the Panorama
Interconnect plugin on the Panorama Controller
and Panorama Nodes.
Prepare the Panorama Controller to Push On the Panorama Controller, Add a Device Group
Configuration to the Managed Firewalls and Configure a Template Stack to configure
policy rules, objects, and settings to enable the
firewalls to operate on the network.
Manage Firewalls with Panorama Interconnect Add one or more firewalls and push the
synchronized configuration from the Panorama
Node to the managed devices.
STEP 2 | Select Panorama > Certificate Management > Certificates and Generate a new certificate:
1. For the Certificate Type, select Local.
2. Enter a Certificate Name, such as panorama-node1_cert. The name is case-sensitive and can have
up to 31 characters. It must be unique and use only letters, numbers, hyphens, and underscores.
3. In the Common Name field, enter the serial number of the Panorama Node.
The serial number must be entered in the Common Name field in order to authenticate
the connection between the Panorama Controller and Panorama Node. The
Panorama Node cannot connect to the Panorama Controller if the serial number is not
entered in this field.
4. In the Signed By field, select the CA certificate.
5. Generate the certificate.
STEP 4 | Export the certificates for each Panorama Node generated in Step 2.
1. Select Panorama > Certificate Management > Certificates, select the certificate, and Export
Certificate.
2. Select the File Format:
• Base64 Encoded Certificate (PEM)—Allows you to export the certificate and private key
separately. If you want the exported file to include the private key, select the Export Private Key
check box.
6. Enter a descriptive file name for the certificate so that you can easily identify the Panorama Node it
needs to be imported to, and Save the certificate.
2. Enter the same Certificate Name.The name is case-sensitive and can have up to 31 characters. It
must be unique and use only letters, numbers, hyphens, and underscores.
3. Browse for the certificate you exported in Step 4.
4. Check the Import private key box.
5. Enter the Passphrase and Confirm Passphrase used to encrypt the private key.
6. Click OK to import the certificate.
STEP 3 | Generate the Panorama Node Certificate used to secure communication between the
Panorama Controller and Panorama Nodes. Repeat this step for all Panorama Nodes.
1. Select Panorama > Certificate Management > Certificate Profile and Add a new Certificate Profile.
2. Enter a Name for the Certificate Profile.
3. Add the CA certificate created in Step 2.
4. Click OK to finishing adding the Certificate Profile.
STEP 1 | Install the Panorama Interconnect plugin. You must install the plugin on the Panorama
Controller, and all Panorama Nodes.
1. Log in to the Panorama Web Interface.
STEP 2 | Enable Authentication Between the Panorama Controller and Nodes to secure authentication
between the Panorama Controller and Panorama Nodes.
STEP 3 | Set up the plugin on the Panorama Controller. Repeat this step on the high availability peer if
the Panorama Controller is in an HA configuration.
Once the Panorama has been configured as the Panorama Controller, you cannot
reconfigure the Panorama Controller as a Panorama Node. Verify that you are configuring
the correct Panorama management server as the Panorama Controller before continuing.
1. Select Panorama > Interconnect > Setup and edit the Interconnect Plugin Setup:
2. In the Server Mode field, select Yes.
3. Select the Certificate Profile you created in Step 2.
4. Click OK to save the settings.
STEP 4 | Set up the plugin on the Panorama Node. Repeat this step for all Panorama Nodes.
If your Panorama Node is in a high availability (HA) configuration, you must select the
Panorama Node certificate you imported to each Panorama Node HA peer when setting
up the Panorama Interconnect plugin on each peer.
1. Select Panorama > Interconnect > Setup and edit the Interconnect Plugin Setup:
1. In the Server Mode field, select No.
2. Manager Panorama IP—Enter the management IP address of the Panorama Controller.
3. HA Manager IP—If the Panorama Controller is in a High Availability configuration, enter the
management IP address of the HA Panorama Controller peer.
4. Select the Panorama Node certificate you imported in Step 2.
5. (HA only) Select the peer Panorama Node certificate you imported in Step 2.
2. Click OK to save the settings.
3. Click Commit and Commit to Panorama to finish adding the Panorama Node.
STEP 7 | Once the plugin has been successfully installed on the Panorama Controller and Panorama
Nodes, perform the next steps to complete setting up Panorama Interconnect:
1. On the Panorama Controller, Add a Device Group. Repeat this step to create as many device groups
as required.
2. On the Panorama Controller, Configure a Template Stack. Repeat this step to create as many
template stacks as required.
3. Synchronize Panorama Interconnect to push the Panorama-specific configuration, as well as the
template stack and device group configurations, from the Panorama Controller to the Panorama
Nodes.
4. On the Panorama Controller, add one or more firewalls to be managed by a Panorama Node.
• Add a Firewall to a Panorama Node
• Import Multiple Firewalls to a Panorama Node
5. Push the Panorama Node Configuration to Managed Devices.
STEP 2 | Select Panorama > Interconnect > Panorama Nodes and select the Panorama Nodes managing
the firewalls to push the configuration to.
STEP 3 | Push Common Config to push the Panorama-specific configurations to the Panorama Nodes.
STEP 2 | Select Panorama > Interconnect > Panorama Nodes and select the Panorama Nodes to
synchronize with the Panorama Controller.
STEP 3 | Synchronize Config to push the device group and template stack configurations to the
Panorama Nodes. This is required to push the configuration to managed devices.
STEP 3 | Select Panorama > Interconnect > Devices and Add the firewall.
STEP 6 | Click Commit and Commit to Panorama to finish adding the firewall.
STEP 7 | Select Panorama > Interconnect > Panorama Nodes and Synchronize Config.
STEP 3 | Click Commit and Commit to Panorama any pending configurations changes to the Panorama
Controller. Importing multiple firewalls requires that there be no pending changes to the
Panorama Controller, or the import fails.
STEP 4 | Select Panorama > Interconnect > Devices and Import the firewalls.
STEP 5 | Click Download Sample CSV to download a template of the CSV file with the correct format to
upload multiple firewalls.
STEP 6 | Fill out the downloaded CSV. Enter the appropriate values in the serial, panorama, device-
group, and template-stack fields. The Panorama Node, device group, and template stack must
already be added and created on the Panorama Controller before importing the firewalls and
are required to successfully add the firewall. Once you have finished entering the firewall
information, Save the file.
You also have the ability to assign the firewalls to content schedules. These are not required for the
firewall import.
Changing the CSV column order is not supported. The firewall import fails if the column
order re-ordered.
STEP 7 | Back in the Panorama web interface, Select File to browse and select the CSV file containing
the firewall information.
A firewall with required information missing in the bulk import causes the entire import
to fail. You are prompted with an error message indicating the location of issues in the
import file if an error is encountered.
STEP 8 | Append the new devices to add them to the end of the list of Devices. All imported devices
must be new devices. The import fails if any of the devices being imported are part of the
running configuration on the Panorama Controller.
De-select the Append box if you want to delete existing devices in the list and just add the
new devices that you are adding now.
STEP 11 | Select Panorama > Interconnect > Panorama Nodes and Synchronize Config.
STEP 2 | Edit the CSV file containing the template stack variables to import to Panorama Interconnect in
the following format:
Values that display as #inherited# are values that are defined in the template stack.
1. Correct the number of the cells containing the firewall serial number. Repeat this step for all firewalls
in the CSV file.
1. Right-click the cell containing the firewall serial number and select Format Cells.
2. Select Number > Text and click OK.
3. Add a 0 at the beginning of the serial number.
STEP 2 | Deploy the master key to devices managed by the Panorama Node.
Repeat this step for all Panorama Nodes.
1. Log in to the Panorama Web Interface on the Panorama Node.
2. Select Panorama > Master Key and Diagnostics and configure the master key.The new master key
must be the same key you configured on the Panorama Controller in Step 1
1. If renewing a master key, enter the Current Master Key. If you are replacing the default master
key with a new master key, do not specify a Current Master Key.
2. Configure the New Master Key and Confirm Master Key.
3. Configure the master key Lifetime and Time for Reminder.
4. Configure the Panorama Controller to Auto Renew with Same Master Key for a specified number
of days after the lifetime of the key expires.
5. Click OK.
3. Select Panorama > Managed Devices > Summary and Deploy Master Key.
4. Select all devices and Change the master key.
6. Verify that the master key was deployed successfully to all selected devices.
A System log generates when a you deploy a new master key from Panorama.
STEP 3 | Push to Devices to push the synchronized configuration from the Panorama Nodes to the
managed devices.
STEP 4 | Add the Panorama Node managing the devices to push the configuration to. Repeat this step
to push to multiple Panorama Nodes, devices groups, or templates as needed:
1. Select the Panorama Node.
2. Select the Device Group to push both the device group and template stack configurations, or select a
Template Stack to only push the template stack configuration.
3. Click OK to finish defining the push scope.
3. Wait until the plugin upgrade job is Completed. Click Panorama > Interconnect > Tasks to view the
job progress.
4. After the upgrade completes successfully, select Panorama > Interconnect > Panorama Nodes to
verify that the Plugin version is correct for the selected Panorama Nodes.
275
276 PANORAMA ADMINISTRATOR'S GUIDE | Manage Log Collection
© 2020 Palo Alto Networks, Inc.
Configure a Managed Collector
To enable the Panorama management server to manage a Log Collector, you must add it as a managed
collector. You can add two types of managed collectors:
• Dedicated Log Collector—To set up a new M-600, M-500, M-200, M-100 appliance, or Panorama virtual
appliance as a Log Collector or switch an existing M-Series appliance or Panorama virtual appliance from
Panorama mode to Log Collector mode, see Set Up the M-Series Appliance as a Log Collector. Keep in
mind that switching from Panorama Mode to Log Collector Mode removes the local Log Collector that is
predefined on the M-Series appliance in Panorama mode.
• Local Log Collector—A Log Collector can run locally on the M-600, M-500, M-200, M-100 appliance,
or Panorama virtual appliance in Panorama mode. On the M-Series appliances, the Log Collector is
predefined; on the virtual appliance, you must add the Log Collector. When the Panorama management
server has a high availability (HA) configuration, each HA peer can have a local Log Collector. However,
relative to the primary Panorama, the Log Collector on the secondary Panorama is remote, not local.
Therefore, to use the Log Collector on the secondary Panorama, you must manually add it to the primary
Panorama (for details, see Deploy Panorama M-Series Appliances with Local Log Collectors or Deploy
Panorama Virtual Appliances with Local Log Collectors). If you delete a local Log Collector, you can later
add it back. The following steps describe how to add a local Log Collector.
As a best practice, retain a local Log Collector and Collector Group on the Panorama
management server, regardless of whether it manages Dedicated Log Collectors.
If the Panorama virtual appliance is in Legacy mode, you must switch to Panorama mode
to create a Log Collector. For details, see Set Up the Panorama Virtual Appliance with Local
Log Collector.
If you set the Failed Attempts to a value other than 0 but leave the Lockout Time at
0, then the admin user is indefinitely locked out until another administrator manually
1. Enter the number of login Failed Attempts value. The range is between the default value 0 to the
maximum of 10 where the value 0 specifies unlimited login attempts.
2. Enter the Lockout Time value between the default value 0 to the maximum of 60 minutes.
4. Click OK to save your changes.
STEP 5 | (Optional) If your deployment is using custom certificates for authentication between Panorama
and managed devices, deploy the custom client device certificate. For more information, see
Set Up Authentication Using Custom Certificates.
1. Select Panorama > Certificate Management > Certificate Profile and choose the certificate profile
from the drop-down or click New Certificate Profile to create one.
2. Select Panorama > Managed Collectors and Add a new Log Collector or select an existing one. Select
Communication.
3. Select the type of device certificate the Type drop-down.
• If you are using a local device certificate, select the Certificate and Certificate Profile from the
respective drop-downs.
• If you are using SCEP as the device certificate, select the SCEP Profile and Certificate Profile from
the respective drop-downs.
4. Click OK.
STEP 6 | (Optional) Configure Secure Server Communication on a Log Collector. For more information,
see Set Up Authentication Using Custom Certificates.
1. Select Panorama > Managed Collectors and click Add. Select Communication.
2. Verify that the Custom Certificate Only check box is not selected. This allows you to continue
managing all devices while migrating to custom certificates.
When the Custom Certificate Only check box is selected, the Log Collector does not
authenticate and cannot receive logs from devices using predefined certificates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This SSL/TLS service
profile applies to all SSL connections between the Log Collector and devices sending it logs.
4. Select the certificate profile from the Certificate Profile drop-down.
5. Select Authorize Client Based on Serial Number to have the server check clients against the serial
numbers of managed devices. The client certificate must have the special keyword $UDID set as the
CN to authorize based on serial numbers.
6. In Disconnect Wait Time (min), enter the number of minutes Panorama should before breaking and
reestablishing the connection with its managed devices. This field is blank by default and the range is
0 to 44,640 minutes.
The disconnect wait time does not begin counting down until you commit the new
configuration.
Until you Configure a Collector Group and push configuration changes to the Collector
Group, the Configuration Status column displays Out of Sync, the Run Time Status
column displays disconnected, and the CLI command show interface all
displays the interfaces as down.
2. Click Statistics in the last column to verify that the logging disks are enabled.
STEP 1 | Perform the following tasks before configuring the Collector Group.
1. Add a Firewall as a Managed Device for each firewall that you will assign to the Collector Group.
2. Configure a Managed Collector for each Log Collector that you will assign to the Collector Group.
A preference list determines the order in which Log Collectors receive logs from a
firewall. If a log forwarding preference list is not assigned, you may encounter one of
the following scenarios:
• If Panorama is in Management Only mode, Panorama drops all incoming logs.
• If the local Log Collector is not configured as a managed collector when Panorama
is in Panorama mode, Panorama drops all incoming logs.
• If the local Log Collector is configured as a managed collector when Panorama
is in Panorama mode, incoming logs are received but the Panorama may act as
a bottleneck because all managed firewalls are forwarding logs to the local Log
Collector first before being redistributed to other available Log Collectors.
1. In the Devices section, Modify the list of firewalls and click OK.
2. In the Collectors section, Add Log Collectors to the preference list.
If you enable redundancy in Step 2, it is recommended to add at least two Log Collectors. If
you assign multiple Log Collectors, the first one will be the primary; if the primary becomes
unavailable, the firewalls send logs to the next Log Collector in the list. To change the priority of a
Log Collector, select it and Move Up (higher priority) or Move Down (lower priority).
3. Click OK.
STEP 4 | Define the storage capacity (log quotas) and expiration period for each log type.
1. Return to the General tab and click the Log Storage value.
If the field displays 0MB, verify that you enabled the disk pairs for logging and
committed the changes (see Configure a Managed Collector, Disks tab).
2. Enter the log storage Quota(%) for each log type.
3. Enter the Max Days (expiration period) for each log type (1 to 2,000).
By default, the fields are blank, which means the logs never expire.
STEP 1 | Obtain key pairs and certificate authority (CA) certificates for each Log Collector.
STEP 2 | Import the CA certificate to validate the identity of the client Log Collector, the server key pair,
and the client key pair for each Log Collector in the Collector Group.
1. Select Panorama > Certificate Management > Certificates > Import.
2. Import the CA certificate, server key pair, and client key pair.
3. Repeat th step for the each Log Collector.
STEP 3 | Configure a certificate profile that includes the root CA and intermediate CA for secure server
communication. This certificate profile defines the authentication between Log Collectors.
1. Select Panorama > Certificate Management > Certificate Profile.
2. Configure a certificate profile.
If you configure an intermediate CA as part of the certificate profile, you must also include the root
CA.
STEP 4 | Configure the certificate profile for secure client communication. You can configure this profile
on each client Log Collector individually or you can push the configuration from Panorama™ to
managed Log Collectors.
STEP 6 | After deploying custom certificates on all Log Collectors, enforce custom-certificate
authentication.
1. Select Panorama > Collector Groups and select the Collector Group.
2. On the General tab, Enable secure inter LC Communication.
If you enable secure inter LC communication and your Collector Group includes a local Log Collector,
a link should appear that stating that the Log Collector on local Panorama is using the secure client
configuration from Panorama > Secure Communication Settings. You can click this link to open the
Secure Communication Settings dialog and configure the secure server and secure client settings for
the Local Log Collector from there.
3. Click OK.
4. Commit your changes.
When a Log Collector is local to an M-500 or M-100 appliance in Panorama mode, move
it only if the appliance is the passive peer in a high availability (HA) configuration. HA
synchronization applies the configurations associated with the new Collector Group. Never
move a Log Collector that is local to the active HA peer.
In any single Collector Group, all the Log Collectors must run on the same Panorama model:
all M-600 appliances, all M-500 appliances, all M-200 appliances, all M-100 appliances, or all
Panorama virtual appliances.
Log redundancy is available only if each Log Collector has the same number of logging
disks. To add disks to a Log Collector, see Increase Storage on the M-Series Appliance.
To reassign the firewalls, Add the new Log Collector to which they will forward logs.
STEP 3 | Configure Log Forwarding to Panorama for the new Collector Group you configured.
STEP 4 | Select Commit > Commit and Push to commit your changes to Panorama and push the
changes to device groups, templates, and Collector Groups if you have not already done so.
To temporarily remove the log forwarding preference list on the firewall, you can delete
it using the CLI on the firewall. You must however, remove the assigned firewalls in the
Collector Group configuration on Panorama. Otherwise, the next time you push changes
to the Collector Group, the firewall will be reconfigured to send logs to the assigned Log
Collector.
STEP 1 | Select Panorama > Collector Groups and edit the Collector Group.
STEP 2 | Select Device Log Forwarding, click the firewall in the Devices list, Modify the Devices list,
clear the check box of the firewall, and click OK three times.
STEP 3 | Select Commit > Commit and Push and then Commit and Push your changes to Panorama and
the Collector Group from which you removed the firewall.
If Panorama manages firewalls running software versions earlier than PAN-OS 7.0, specify
a WildFire® server from which Panorama can gather analysis information for WildFire
samples that those firewalls submit. Panorama uses the information to complete WildFire
Submissions logs that are missing field values introduced in PAN-OS 7.0. Firewalls running
earlier releases won’t populate those fields. To specify the server, select Panorama >
Setup > WildFire, edit the General Settings, and enter the WildFire Private Cloud name. The
default is wildfire-public-cloud, which is the WildFire cloud hosted in the United States.
You can also forward firewall logs to external services (such as a syslog server). For details,
see Log Forwarding Options.
STEP 1 | Add a Device Group for the firewalls that will forward logs.
Panorama requires a device group to push a Log Forwarding profile to firewalls. Create a new device
group or assign the firewalls to an existing device group.
STEP 2 | Add a Template for the firewalls that will forward logs.
Panorama requires a template to push log settings to firewalls. Create a new template or assign the
firewalls to an existing template.
STEP 4 | Assign the Log Forwarding profile to policy rules and network zones.
Security, Authentication, and DoS Protection rules support log forwarding. In this example, you assign
the profile to a Security rule.
Perform the following steps for each rule that will trigger log forwarding:
1. Select the rulebase (for example, Policies > Security > Pre Rules), select the Device Group of the
firewalls that will forward logs, and edit the rule.
2. Select Actions and select the Log Forwarding profile you created.
3. Set the Profile Type to Profiles or Group, and then select the security profiles or Group Profile
required to trigger log generation and forwarding for:
• Threat logs—Traffic must match any security profile assigned to the rule.
• WildFire logs—Traffic must match a WildFire Analysis profile assigned to the rule.
4. For Traffic logs, select Log At Session Start and/or Log At Session End.
5. Click OK to save the rule.
STEP 5 | Configure the destinations for System logs, Configuration logs, User-ID™ logs, and HIP Match
logs.
Panorama generates Correlation logs based on the firewall logs it receives, rather than
aggregating Correlation logs from firewalls.
1. Select Device > Log Settings and select the Template of the firewalls that will forward logs.
2. For each log type that the firewall will forward, see step Add one or more match list profiles.
STEP 6 | (PA-7000 Series firewalls only) Configure a log card interface to perform log forwarding.
When you configure a data port on one of the PA-7000 Series Network Processing Cards (NPCs) as a
Log Card interface, the firewall will automatically begin using this interface to forward logs to the logging
destinations you configure and forward files for WildFire analysis. Make sure that the interface you
configure can reach the log forwarding destinations and the WildFire cloud, WildFire appliance, or both.
Because PA-7000 Series firewall can now forward logs to Panorama, Panorama no
longer treats the PA-7000 Series firewalls it manages as Log Collectors. If you have
not configured the PA-7000 Series firewalls to forward logs to Panorama, all logs a
managed PA-7000 Series firewall generates are only viewable from the local firewall and
not from Panorama. If you do not yet have a log forwarding infrastructure that is capable
of handling the logging rate and volume from the PA-7000 Series firewalls, starting with
PAN-OS 8.0.8 you can enable Panorama to directly query PA-7000 Series firewalls
when monitoring logs. To use this functionality, both Panorama and the PA-7000 Series
firewalls must be running PAN-OS 8.0.8 or later. Enable Panorama to directly query
PA-7000 Series firewalls by entering the following command from the Panorama CLI:
After running this command, you will be able to view logs for managed PA-7000 Series
firewalls on the Panorama Monitor tab. Additionally, as with all managed devices, you can
also generate reports that include PA-7000 Series log data by selecting Remote Device
Data as the Data Source. If you later decide to enable the PA-7000 Series firewalls to
1. Select Network > Interfaces > Ethernet, select the Template of the firewalls that will forward logs,
and Add Interface.
2. Select the Slot and Interface Name.
3. Set the Interface Type to Log Card.
4. Enter the IP Address, Default Gateway, and (for IPv4 only) Netmask.
5. Select Advanced and specify the Link Speed, Link Duplex, and Link State.
These fields default to auto, which specifies that the firewall automatically determines
the values based on the connection. However, the minimum recommended Link
Speed for any connection is 1000 (Mbps).
6. Click OK to save your changes.
If you will forward logs to a Panorama virtual appliance in Legacy mode, you can skip this
step.
1. For each Log Collector that will receive logs, Configure a Managed Collector.
2. Configure a Collector Group to assign firewalls to specific Log Collectors for log forwarding.
3. Commit and Push your changes to Panorama and push the changes to the device groups, templates,
and Collector Groups.
4. Verify Log Forwarding to Panorama to confirm that your configuration is successful.
STEP 2 | If you configured Log Collectors, verify that each firewall has a log forwarding preference list.
If the Collector Group has only one Log Collector, the output will look something like this:
Forward to all: No
Log collector Preference List
Serial Number: 003001000024
IP Address: 10.2.133.48
IPV6 Address: unknown
For successful forwarding, the output indicates that the log forwarding agent is active.
• For a Panorama virtual appliance, the agent is Panorama.
• For an M-Series appliance, the agent is a LogCollector.
• For the Cortex Data Lake, the agent is Log CollectionService.. And the
STEP 4 | View the average logging rate. The displayed rate will be the average logs/second for the last
five minutes.
• If Log Collectors receive the logs, access the Panorama web interface, select Panorama > Managed
Collectors and click the Statistics link in the far-right column.
• If a Panorama virtual appliance in Legacy mode receives the logs, access the Panorama CLI and run
the following command: debug log-collector log-collection-stats show incoming-
logs
(Best Practice) Buffered Log Allows each managed firewall to buffer logs and send the logs at 30-
Forwarding from Device second intervals to Panorama (not user configurable).
Default: Enabled Buffered log forwarding is very valuable when the firewall loses
connectivity to Panorama. The firewall buffers log entries to its
local hard disk and keeps a pointer to record the last log entry that
was sent to Panorama. When connectivity is restored the firewall
resumes forwarding logs from where it left off.
The disk space available for buffering depends on the log storage
quota for the firewall model and the volume of logs that are pending
roll over. If the firewall was disconnected for a long time and the last
log forwarded was rolled over, all the logs from its local hard disk will
be forwarded to Panorama on reconnection. If the available space on
the local hard disk of the firewall is consumed, the oldest entries are
deleted to allow logging of new events.
Live Mode Log Forwarding from In live mode, the managed firewall sends every log transaction to
Device Panorama at the same time as it records it on the firewall.
This option is enabled when
the check box for Buffered
Log Forwarding from Device is
cleared.
• Define log forwarding preference on a Panorama virtual appliance in Legacy mode that is deployed in a
high availability (HA) configuration:
• When logging to a virtual disk, enable logging to the local disk on the primary Panorama peer only. By
default, both Panorama peers in the HA configuration receive logs.
For the 5200 and 7000 series firewalls, only the active peer receive logs.
• When logging to an NFS (ESXi server only), enable the firewalls to send only newly generated logs to
a secondary Panorama peer, which is promoted to primary, after a failover.
Only Active Primary Logs to Panorama virtual appliance Allows you to configure only the
Local Disk in Legacy mode that is primary Panorama peer to save logs
logging to a virtual disk to the local disk.
Default: Disabled
and is deployed in an HA
configuration.
Get Only New Logs on Convert Panorama virtual appliance With NFS logging, when you
to Primary in Legacy mode that is have a pair of Panorama servers
mounted to a Network File configured in a high availability
Default: Disabled
System (NFS) datastore, runs configuration, only the primary
on a VMware ESXi server, Panorama peer mounts the NFS
and is deployed in an HA datastore. Therefore, the firewalls
configuration can only send logs to the primary
Panorama peer, which can write to
the NFS datastore.
When an HA failover occurs, the
Get Only New Logs on Convert
to Primary option allows an
administrator to configure the
managed firewalls to send only newly
generated logs to Panorama. This
event is triggered when the priority
of the active-secondary Panorama is
promoted to primary and it can begin
logging to the NFS. This behavior
is typically enabled to prevent the
firewalls from sending a large volume
of buffered logs when connectivity
to Panorama is restored after a
significant period of time.
To forward logs to external services, start by configuring the firewalls to forward logs to Panorama. Then
you must configure the server profiles that define how Panorama and Log Collectors connect to the
services. Lastly, you assign the server profiles to the log settings of Panorama and to Collector Groups.
STEP 2 | Configure a server profile for each external service that will receive log information.
1. Select Panorama > Server Profiles and select the type of server that will receive the log data: SNMP
Trap, Syslog, Email, or HTTP.
2. Configure the server profile:
• Configure an SNMP Trap server profile. For details on how SNMP works for Panorama and Log
Collectors, refer to SNMP Support.
• Configure a Syslog server profile. If the syslog server requires client authentication, use the
Panorama > Certificate Management > Certificates page to create a certificate for securing syslog
communication over SSL.
• Configure an Email server profile.
• Configure an HTTP server profile.
STEP 4 | Configure destinations for firewall logs that Log Collectors receive.
Each Collector Group can forward logs to different destinations. If the Log Collectors are
local to a high availability (HA) pair of Panorama management servers, you must log into
each HA peer to configure log forwarding for its Collector Group.
1. Select Panorama > Collector Groups and edit the Collector Group that receives the firewall logs.
2. (Optional, SNMP trap forwarding only) Select Monitoring and configure the SNMP settings.
3. Select Collector Log Forwarding and Add configured match list profiles as necessary.
4. Click OK to save your changes to the Collector Group.
STEP 5 | (Syslog forwarding only) If the syslog server requires client authentication and the firewalls
forward logs to Dedicated Log Collectors, assign a certificate that secures syslog
communication over SSL.
Perform the following steps for each Dedicated Log Collector:
1. Select Panorama > Managed Collectors and edit the Log Collector.
2. Select the Certificate for Secure Syslog and click OK.
STEP 6 | (SNMP trap forwarding only) Enable your SNMP manager to interpret traps.
Load the Supported MIBs and, if necessary, compile them. For the specific steps, refer to the
documentation of your SNMP manager.
The deployments in these topics all describe Panorama in a high availability (HA)
configuration. Palo Alto Networks recommends HA because it enables automatic recovery
(in case of server failure) of components that are not saved as part of configuration backups.
In HA deployments, the Panorama management server only supports an active/passive
configuration.
If you will assign more than one Log Collector to a Collector Group, see Caveats for a
Collector Group with Multiple Log Collectors to understand the requirements, risks, and
recommended mitigations.
Perform the following steps to deploy Panorama with Dedicated Log Collectors. Skip any steps you have
already performed (for example, the initial setup).
Palo Alto Networks recommends reserving the management (MGT) interface for
administrative access to Panorama and dedicating separate M-Series Appliance
Interfaces to other Panorama services.
3. Configure each array. This task is required to make the RAID disks available for logging. Optionally,
you can add disks to Increase Storage on the M-Series Appliance.
4. Register Panorama and Install Licenses.
5. Install Content and Software Updates for Panorama.
For each virtual appliance (if any):
1. Install the Panorama Virtual Appliance.
2. Perform Initial Configuration of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Software Updates for Panorama.
For the Panorama management server (virtual appliance or M-Series appliance), you must also Set Up
HA on Panorama.
STEP 2 | Switch from Panorama mode to Log Collector mode on each Panorama management server
that will be a Dedicated Log Collector.
Switching the mode of an M-Series appliance deletes any existing log data and deletes
all configurations except the management access settings. After the switch, the M-Series
appliance retains CLI access but loses web interface access.
If you see a CMS Login prompt, this means the Log Collector has not finished
rebooting. Press Enter at the prompt without typing a username or password.
5. Log back in to the CLI.
6. Verify that the switch to Log Collector mode succeeded:
system-mode: logger
STEP 3 | Enable connectivity between each Log Collector and the Panorama management server.
This step is required before you can enable logging disks on the Log Collectors.
Enter the following commands at the CLI of each Log Collector. <IPaddress1> is for the MGT interface
of the active Panorama and <IPaddress2> is for the MGT interface of the passive Panorama.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
# exit
At this point, the Configuration Status column displays Out of Sync and the Run
Time Status column displays disconnected. The status will change to In Sync and
connected after you configure a Collector Group (Step 9).
STEP 7 | (Recommended) Configure the Ethernet1, Ethernet2, Ethernet3, Ethernet4, and Ethernet5
interfaces if the Log Collector will use them for Device Log Collection (receiving logs from
firewalls) and Collector Group Communication.
By default, the Log Collector uses the MGT interface for log collection and Collector Group
communication. Assigning other interfaces to these functions enables you to reserve the MGT
interface for management traffic. In an environment with heavy log traffic, consider using the 10Gbps
interfaces (Ethernet4 and Ethernet5) on the M-500 appliance for log collection and Collector Group
communication. To load balance the logging traffic across interfaces, you can enable Device Log
Collection on multiple interfaces.
Use the web interface of the primary Panorama management server peer to perform these steps for
each Log Collector:
1. Select Panorama > Managed Collectors, edit the Log Collector, and select Interfaces.
2. Perform the following steps for each interface:
1. Click the name of the interface to edit it.
2. Select <interface-name> to enable the interface.
3. Complete one or both of the following field sets based on the IP protocols of your network:
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Select the Device Management Services that the interface supports:
Device Log Collection—You can assign one or more interfaces.
Collector Group Communication—You can assign only one interface.
5. Click OK to save your changes to the interface.
3. Click OK to save your changes to the Log Collector.
4. Select Commit > Commit to Panorama and Commit your changes to the Panorama configuration.
In any single Collector Group, all the Log Collectors must run on the same Panorama
model: all M-600 appliances, all M-500 appliances, all M-200 appliances, all M-100
appliances, or all Panorama virtual appliances.
4. (Best Practice) Enable log redundancy across collectors if you add multiple Log Collectors to a single
Collector group. This option requires each Log Collector to have the same number of logging disks.
5. (Optional) Select Monitoring and configure the settings if you will use SNMP to monitor Log
Collector statistics and traps.
6. Select Device Log Forwarding and configure the Log Forwarding Preferences list. This list defines
which firewalls forward logs to which Log Collectors. Assign firewalls according to the number of Log
Collectors in this Collector Group:
• Single—Assign the firewalls that will forward logs to that Log Collector, as illustrated in Single
Dedicated Log Collector Per Collector Group.
• Multiple—Assign each firewall to both Log Collectors for redundancy. When you configure the
preferences, make Log Collector 1 the first priority for half the firewalls and make Log Collector 2
the first priority for the other half, as illustrated in Multiple Dedicated Log Collectors Per Collector
Group.
7. Click OK to save your changes to the Collector Group.
8. Select Commit > Commit and Push and then Commit and Push your changes to Panorama and to the
Collector Groups you added.
9. Select Panorama > Managed Collectors to verify that the Log Collector configuration is synchronized
with Panorama.
The Configuration Status column should display In Sync and the Run Time Status column should
display connected.
If you will assign more than one Log Collector to a Collector Group, see Caveats for a
Collector Group with Multiple Log Collectors to understand the requirements, risks, and
recommended mitigations.
After implementing this deployment, if the logging rate increases beyond 10,000 logs
per second, Palo Alto Networks recommends that you add Dedicated Log Collectors (M-
Perform the following steps to deploy Panorama with local Log Collectors. Skip any steps you have already
performed (for example, the initial setup).
Palo Alto Networks recommends reserving the management (MGT) interface for
administrative access to Panorama and dedicating separate M-Series Appliance
Interfaces to other Panorama services.
3. Configure each array. This task is required to make the RAID disks available for logging. Optionally,
you can add disks to Increase Storage on the M-Series Appliance.
4. Register Panorama and Install Licenses.
5. Install Content and Software Updates for Panorama.
6. Set Up HA on Panorama.
STEP 2 | Perform the following steps to prepare Panorama for log collection.
1. Connect to the primary Panorama in one of the following ways:
• Attach a serial cable from your computer to the Console port on the primary Panorama. Then use
terminal emulation software (9600-8-N-1) to connect.
• Use terminal emulation software such as PuTTY to open an SSH session to the IP address that you
specified for the MGT interface of the primary Panorama during initial configuration.
2. Log in to the CLI when prompted. Use the default admin account and the password that you
specified during initial configuration.
3. Enable the primary Panorama to connect to the secondary Panorama by entering the following
command, where <IPaddress2> represents the MGT interface of the secondary Panorama:
> configure
# set deviceconfig system panorama-server <IPaddress2>
# commit
4. Log in to the CLI of the secondary Panorama.
5. Enable the secondary Panorama to connect to the primary Panorama by entering the following
command, where <IPaddress1> represents the MGT interface of the primary Panorama:
> configure
# set deviceconfig system panorama-server <IPaddress1>
# commit
# exit
6. In the CLI of the secondary Panorama, enter the following command to display the serial number, and
then record it:
You need the serial number to add the Log Collector of the secondary Panorama as a managed
collector to the primary Panorama.
STEP 3 | Edit the Log Collector that is local to the primary Panorama.
Use the web interface of the primary Panorama to perform these steps:
1. Select Panorama > Managed Collectors and select the default (local) Log Collector.
2. Select Disks and Add each logging disk pair.
3. Click OK to save your changes.
Panorama treats this Log Collector as remote because it’s not local to the primary
Panorama. Therefore you must manually add it on the primary Panorama.
Use the web interface of the primary Panorama to Configure a Managed Collector:
1. Select Panorama > Managed Collectors and Add the Log Collector.
2. Enter the serial number (Collector S/N) you recorded for the Log Collector of the secondary
Panorama.
3. Enter the IP address or FQDN of the primary and secondary Panorama HA peers in the Panorama
Server IP field and Panorama Server IP 2 field respectively. These fields are required.
4. Select Interfaces and configure each interface that the Log Collector will use. The Management
interface is required. Perform the following steps for each interface:
1. Click the interface name.
2. Configure one or both of the following field sets based on the IP protocols of your network.
IPv4—IP Address, Netmask, and Default Gateway
IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
3. (Management interface only) Select SNMP if you will use an SNMP manager to monitor Log
Collector statistics.
Using SNMP requires additional steps besides configuring the Log Collector (see Monitor
Panorama and Log Collector Statistics Using SNMP).
4. Click OK to save your changes to the interface.
5. Click OK to save your changes to the Log Collector.
6. Select Commit > Commit to Panorama and Commit your changes.
This step is required before you can enable logging disks.
7. Edit the Log Collector by clicking its name.
8. Select Disks, Add each RAID disk pair, and click OK.
9. Select Commit > Commit to Panorama and Commit your changes.
STEP 6 | Edit the default Collector Group that is predefined on the primary Panorama.
Use the web interface of the primary Panorama to Configure a Collector Group:
1. Select Panorama > Collector Groups and edit the default Collector Group.
2. Add the local Log Collector of the secondary Panorama to the Collector Group Members list if you
are adding multiple Log Collectors to a single Collector group. By default, the list displays the local
Log Collector of the primary Panorama because it is pre-assigned to the default Collector Group.
In any single Collector Group, all the Log Collectors must run on the same Panorama
model: all M-600 appliances, all M-500 appliances, all M-200 appliances, all M-100
appliances, or all Panorama virtual appliances.
3. (Best Practice) Enable log redundancy across collectors if you add multiple Log Collectors to a single
Collector group. This option requires each Log Collector to have the same number of logging disks.
4. (Optional) Select Monitoring and configure the settings if you will use SNMP to monitor Log
Collector statistics and traps.
STEP 7 | Configure a Collector Group that contains the Log Collector of the secondary Panorama.
Required if each Collector Group has only one Log Collector.
Use the web interface of the primary Panorama to Configure a Collector Group:
1. Select Panorama > Collector Groups and Add the Collector Group.
2. Enter a Name to identify the Collector Group.
3. Add the local Log Collector of the secondary Panorama to the Collector Group Members list.
4. (Optional) Select Monitoring and configure the settings if you will use an SNMP manager to monitor
Log Collector statistics and traps.
5. Select Device Log Forwarding and Add an entry to the Log Forwarding Preferences list:
1. Modify the Devices list, select the firewalls that will forward logs to the local Log Collector of the
secondary Panorama (see Single Local Log Collector Per Collector Group), and click OK.
2. Add the local Log Collector of the secondary Panorama to the Collectors list and click OK.
6. Click OK to save your changes.
STEP 8 | Commit and push your changes to the Panorama configuration and the Collector Groups.
In the web interface of the primary Panorama, select Commit > Commit and Push and then Commit and
Push your changes to Panorama and the Collector Groups you added.
STEP 9 | Manually fail over so that the secondary Panorama becomes active.
Use the web interface of the primary Panorama to perform the following steps:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operational Commands section.
STEP 10 | On the secondary Panorama, configure the network settings of the Log Collector that is local
to the primary Panorama.
Use the web interface of the secondary Panorama to perform the following steps:
1. In the Panorama web interface, select Panorama > Managed Collectors and select the Log Collector
that is local to the primary Panorama.
2. Enter the IP address or FQDN of the secondary Panorama in the Panorama Server IP field and the
IP address or FQDN of the primary Panorama in the Panorama Server IP 2 field. These fields are
required.
3. Select Interfaces, click Management, and complete one or both of the following field sets (based on
the IP protocols of your network) with the MGT interface values of the primary Panorama:
• IPv4—IP Address, Netmask, and Default Gateway
• IPv6—IPv6 Address/Prefix Length and Default IPv6 Gateway
4. Click OK to save your changes.
STEP 11 | Manually fail back so that the primary Panorama becomes active.
Use the web interface of the secondary Panorama to perform the following steps:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operational Commands section.
You can assign separate external server profiles to each Panorama HA peer. For
example, you might want each peer to forward logs to a different syslog server. To
make each Panorama peer forward logs to different external services, log in to the
web interface of each peer, select Panorama > Collector Groups, select the Collector
Group, select Collector Log Forwarding, assign the server profiles, and click OK.
If you will assign more than one Log Collector to a Collector Group, see Caveats for a
Collector Group with Multiple Log Collectors to understand the requirements, risks, and
recommended mitigations.
Panorama automatically divides the new disk into 2TB partitions, each of which will
function as a separate virtual disk.
2. Perform Initial Configuration of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Software Updates for Panorama.
Panorama treats this Log Collector as remote because it does not run locally on the
primary Panorama.
In any single Collector Group, all the Log Collectors must run on the same Panorama
model: all M-500 appliances, all M-100 appliances, or all Panorama virtual appliances.
3. (Best Practice) Enable log redundancy across collectors if you add multiple Log Collectors to a single
Collector group. This option requires each Log Collector to have the same number of virtual logging
disks.
Enabling redundancy doubles the amount of logs and log processing traffic in a
Collector Group. If necessary, Expand Log Storage Capacity on the Panorama Virtual
Appliance.
4. Select Device Log Forwarding and configure the Log Forwarding Preferences list. This list defines
which firewalls forward logs to which Log Collectors. Assign firewalls according to the number of Log
Collectors in this Collector Group:
• Single—Assign the firewalls that will forward logs to the Log Collector that is local to the primary
Panorama, as illustrated in Single Log Collector Per Collector Group.
• Multiple—Assign each firewall to both Log Collectors for redundancy. When you configure the
preference list, make Log Collector 1 the first priority for half the firewalls and make Log Collector
2 the first priority for the other half, as illustrated in Multiple Log Collectors Per Collector Group.
5. Click OK to save your changes.
6. Select Commit > Commit and Push and then Commit and Push your changes to Panorama and the
Collector Groups you added.
STEP 7 | Trigger failover on the primary Panorama so that the secondary Panorama becomes active.
On the primary Panorama:
1. Select Panorama > High Availability.
STEP 8 | Configure the connection from the secondary Panorama to the Log Collector that is local to
the primary Panorama.
On the secondary Panorama:
1. In the Panorama web interface, select Panorama > Managed Collectors and select the Log Collector
that is local to the primary Panorama.
2. Enter the IP address or FQDN of the secondary Panorama in the Panorama Server IP field and the IP
address or FQDN of the primary Panorama in the Panorama Server IP 2 field.
3. Click OK to save your changes.
4. Select Commit > Commit and Push and then Commit and Push your changes to Panorama and the
Collector Groups.
STEP 9 | Trigger fail-back on the secondary Panorama so that the primary Panorama becomes active.
On the secondary Panorama:
1. Select Panorama > High Availability.
2. Click Suspend local Panorama in the Operational Commands section.
If the logging rate increases beyond 10,000 logs per second, it is recommended that you
Deploy Panorama with Dedicated Log Collectors.
Perform the following steps to deploy Panorama virtual appliances with local log collection. Skip any steps
you have already performed (for example, the initial setup).
By default, Panorama uses an 11GB partition on its system disk for log storage. If you
want more storage, you can add a dedicated virtual logging disk of up to 8TB after the
installation.
2. Perform Initial Configuration of the Panorama Virtual Appliance.
3. Register Panorama and Install Licenses.
4. Install Content and Software Updates for Panorama.
STEP 3 | Perform the following steps to prepare Panorama for log collection.
1. Add a Firewall as a Managed Device for each one that will forward logs to Panorama.
2. Configure Log Forwarding to Panorama.
313
314 PANORAMA ADMINISTRATOR'S GUIDE | Manage WildFire Appliances
© 2020 Palo Alto Networks, Inc.
Add Standalone WildFire Appliances to
Manage with Panorama
You can manage up to 200 WildFire appliances with a Panorama M-Series or virtual appliance. The 200
WildFire appliance limit is the combined total of standalone appliances and WildFire appliance cluster nodes
(if you also Configure a Cluster and Add Nodes on Panorama).
Ensure that Panorama runs at least version 8.0.1, and that any WildFire appliance you add to Panorama also
runs at least version 8.0.1.
STEP 1 | Using the local CLI, verify that each WildFire appliance that you want to manage with
Panorama runs PAN-OS 8.0.1 or later.
STEP 2 | On each Panorama appliance you want to use to manage WildFire appliances, verify that
Panorama runs version 8.0.1 or later:
Dashboard > General Information > Software Version displays the running software version.
STEP 3 | If you aren’t sure if a WildFire appliance belongs to a WildFire appliance cluster or is a
standalone appliance on the local WildFire appliance CLI, check the Node mode to ensure that
the status is stand_alone and check the Application status to ensure that the global-
db-service and global-queue-service indicate ReadyStandalone.
STEP 5 | On the local CLI of each WildFire appliance the Panorama server will manage, configure the IP
address of the Panorama server.
Before you register standalone WildFire appliances to a Panorama appliance, you must first configure
the Panorama IP address or FQDN on each WildFire appliance. This is how each WildFire appliance
knows which Panorama appliance manages it.
1. Configure the IP address or FQDN of the primary Panorama appliance’s management interface:
Several local CLI commands display the WildFire appliance serial number, including show cluster
membership.
3. Click OK.
If it is available, information about configuration that is already committed on the WildFire appliances
displays, such as IP address and software version.
STEP 7 | (Optional) Import WildFire appliance configurations into the Panorama appliance.
1. Select the appliances that have configurations you want to import from the list of managed WildFire
appliances.
2. Import Config.
3. Select Yes.
Importing configurations updates the displayed information and makes the imported configurations
part of the Panorama appliance candidate configuration.
4. Commit to Panorama to make the imported WildFire appliance configurations part of the Panorama
running configuration.
STEP 9 | Commit the configuration on the Panorama appliance and push it to the appliance or to
multiple appliances.
1. Commit and Push.
2. If there are configurations on the Panorama appliance that you do not want to push, Edit Selections
to choose the appliances to which you push configurations. The pushed configuration overwrites the
running configuration on the WildFire appliance.
Many settings are pre-populated with either defaults, information from previously existing
settings on the WildFire appliance, or the settings you configured when adding the WildFire
appliance to Panorama.
STEP 1 | Obtain key pairs and certificate authority (CA) certificates for the WildFire appliance and the
firewall.
STEP 2 | Import the CA certificate to validate the identity of the firewall and the key pair for the
WildFire appliance.
1. Select Panorama > Certificate Management > Certificates > Import.
2. Import the CA certificate and the key pair on Panorama.
STEP 3 | Configure a certificate profile that includes the root CA and intermediate CA. This certificate
profile defines how the WildFire appliance and the firewalls authenticate mutually.
1. Select Panorama > Certificate Management > Certificate Profile.
2. Configure a certificate profile.
If you configure an intermediate CA as part of the certificate profile, you must also include the root
CA.
STEP 6 | Import the CA certificate to validate the certificate for the WildFire appliance.
1. Log in to the firewall web interface.
2. Import the CA certificate.
STEP 8 | Configure the certificate profile for the firewall or Panorama. You can configure this profile on
each client firewall or Panorama appliance individually or you can use a template to push the
configuration from Panorama to managed firewalls.
1. Select Device > Certificate Management > Certificate Profile for firewalls or Panorama > Certificate
Management > Certificate Profile for Panorama.
2. Configure a Certificate Profile.
STEP 10 | After deploying custom certificates on all managed devices, enforce custom-certificate
authentication.
1. Log in to Panorama.
2. Select Panorama > Managed WildFire Clusters or Panorama > Managed WildFire Appliances and
select a cluster or appliance.
3. Select Communication.
4. Select Custom Certificate Only.
5. Click OK.
6. Commit your changes.
After committing this change, WildFire immediately begins the enforcement of custom certificates.
STEP 2 | Configure a certificate profile that includes the root certificate authority (CA) and the
intermediate CA. This certificate profile defines the authentication between the WildFire
cluster (client) and the Panorama appliance (server).
1. Select Panorama > Certificate Management > Certificate Profile.
2. Configure a certificate profile.
If you configure an intermediate CA as part of the certificate profile, you must also include the root
CA.
STEP 5 | Configure a unique hostname (DNS name) on each node in the cluster or use a string with
a single wildcard that matches all custom DNS names set on the WildFire appliances in the
cluster.
admin@WF-500> configure
STEP 6 | On Panorama, generate a client certificate for all nodes in the cluster. Under Certificate
Attributes, add a hostname entry for each custom DNS name you assigned to the cluster nodes
or add one hostname entry with a one-wildcard string that matches all of the node hostnames,
such as *.example.com; you can do this only if each custom DNS name shares a common string.
STEP 7 | On Panorama, configure the certificate profile for the cluster client certificate.
1. Select Panorama > Certificate Management > Certificate Profile for Panorama.
2. Configure a Certificate Profile.
STEP 8 | Deploy custom certificates on each node. This certificate profile must contain the CA
certificate that signed the Panorama server certificate.
1. Select Panorama > Managed WildFire Clusters and click on the cluster name.
2. Select Communications.
3. Under Secure Client Communications, select the Certificate Type, Certificate, and Certificate Profile.
4. Click OK.
5. Commit your changes.
STEP 2 | Import the CA certificate to validate the identify of the WildFire appliance and the key pair for
Panorama.
1. Select Panorama > Certificate Management > Certificates > Import.
2. Import the CA certificate and the key pair on Panorama.
STEP 3 | Configure a certificate profile that includes the root CA and intermediate CA. This certificate
profile defines the authentication between the WildFire appliance (client) and the Panorama
virtual or M-Series appliance (server).
1. Select Panorama > Certificate Management > Certificate Profile.
2. Configure a certificate profile.
If you configure an intermediate CA as part of the certificate profile, you must also include the root
CA.
STEP 10 | After deploying custom certificates on all managed WildFire appliances, enforce custom-
certificate authentication.
1. Select Panorama > Setup > Management and Edit the Secure Communications Settings.
2. Allow Custom Certificate Only.
3. Click OK.
4. Commit your changes.
After committing this change, the disconnect wait time begins counting down. When the wait time ends,
Panorama and its managed WildFire appliances cannot connect without the configured certificates.
STEP 2 | Select the WildFire appliance or appliances you want to remove from Panorama management
by selecting the checkbox next to each appliance or by clicking in an appliance’s row.
To create WildFire appliance clusters, you must upgrade all of the WildFire appliances that
you want to place in a cluster to PAN-OS 8.0.1 or later. If you use Panorama to manage
WildFire appliance clusters, Panorama also must run PAN-OS 8.0.1 or later. On each
WildFire appliance that you want to add to a cluster, run show system info | match
version on the WildFire appliance CLI to ensure that the appliance is running PAN-OS
8.0.1 or later. On each Panorama appliance you use to manage clusters (or standalone
appliances), Dashboard > General Information > Software Version displays the running
software version.
When your WildFire appliances are available, perform the appropriate tasks:
• Configure a Cluster and Add Nodes on Panorama
• Configure General Cluster Settings on Panorama
• Remove a Cluster from Panorama Management
Removing a node from a cluster using Panorama is not supported. Instead, Remove a Node
from a Cluster Locally using the local WildFire CLI.
Each WildFire appliance cluster node must have a static IP address in the same subnet and
have low-latency connections.
STEP 1 | Using the local CLI, configure the IP address of the Panorama server that will manage the
WildFire appliance cluster.
Before you register cluster or standalone WildFire appliances to a Panorama appliance, you must first
configure the Panorama IP address or FQDN on each WildFire appliance using the local WildFire CLI.
This is how each WildFire appliance knows which Panorama appliance manages it.
1. On each WildFire appliance, configure the IP address or FQDN of the primary Panorama appliance’s
management interface:
admin@WF-500# commit
STEP 3 | (Optional) Import WildFire appliance configurations into the Panorama appliance.
Importing configurations saves time because you can reuse or edit the configurations on Panorama and
then push them to one or more WildFire appliance clusters or standalone WildFire appliances. If there
are no configurations you want to import, skip this step. When you push a configuration from Panorama,
the pushed configuration overwrites the local configuration.
1. Select Panorama > Managed WildFire Appliances, and select the appliances that have configurations
you want to import from the list of managed WildFire appliances.
2. Import Config.
3. Select Yes.
STEP 6 | Configure the Management, Analysis Environment Network, HA, and cluster management
interfaces.
Configure the Management, Analysis Environment Network, and cluster management interfaces on
each cluster member (controller and worker nodes) if they are not already configured. The cluster
management interface is a dedicated interface for management and communication within the cluster
and is not the same as the Management interface.
Configure the HA interfaces individually on both the controller node and the controller backup node.
The HA interfaces connect the primary and backup controller nodes and enable them to remain in sync
and ready to respond to a failover.
Cluster nodes need IP addresses for each of the four WildFire appliance interfaces. You
cannot configure HA services on worker nodes.
Worker nodes in the cluster automatically inherit the controller node’s settings for the
dedicated management and communication interface.
STEP 7 | Commit the configuration on the Panorama appliance and push it to the cluster.
1. Commit and Push.
2. If there are configurations on the Panorama appliance that you do not want to push, Edit Selections
to choose the appliances to which you push configurations. The pushed configuration overwrites the
running configuration on the cluster nodes so that all cluster nodes run the same configuration.
STEP 9 | Using the local CLI on the primary controller node (not the Panorama web interface), check to
ensure that the configurations are synchronized.
If they are not synchronized, manually synchronize the high availability configurations on the controller
nodes and commit the configuration.
Even though you can perform most other configuration on Panorama, synchronizing the controller node
high availability configurations must be done on the primary controller node’s CLI.
1. On the primary controller node, check to ensure that the configurations are synchronized:
At the end of the output, look for the Configuration Synchronization output:
If the running configuration is synchronized, you do not need to manually synchronize the
configuration. However, if the configuration is not synchronized, you need to synchronize the
configuration manually.
2. If the configuration is not synchronized, on the primary controller node, synchronize the high
availability configuration to the remote peer controller node:
If there is a mismatch between the primary controller node’s configuration and the configuration
on the controller backup node, the configuration on the primary controller node overrides the
configuration on the controller backup node.
3. Commit the configuration:
admin@WF-500# commit
wfpc.service.<cluster-name>.<domain>
For example, a cluster named mycluster in the paloaltonetworks.com domain would have the domain
name:
wfpc.service.mycluster.paloaltonetworks.com
4. Enter the Content Update Server for the cluster. Use the default
updates.paloaltonetworks.com FQDN to connect to the closest server. Check Server Identity
to confirm the update server identity by matching the common name (CN) in the certificate with the
IP address or FQDN of the server (this is checked by default).
5. (Optional) Enter the public WildFire Cloud Server location or use the default
wildfire.paloaltonetworks.com so that the cluster (or standalone appliance managed by
Panorama) can send information to the closest WildFire cloud server. If you leave this field blank and
do not connect to a WildFire cloud server, the cluster can’t receive signature updates directly from
the WildFire public cloud, and can’t send samples for analysis or contribute data to the public cloud.
6. If you connect the cluster to the public WildFire cloud, select the cloud services you want to enable:
• Send Analysis Data—Send an XML report about local malware analysis. If you send the actual
samples, the cluster doesn’t send reports.
• Send Malicious Samples—Send malware samples.
• Send Diagnostics—Send diagnostic data.
• Verdict Lookup—Automatically query the WildFire public cloud for verdicts before performing
local analysis to reduce the load on the local WildFire appliance cluster.
7. Select the Sample Analysis Image to use, based on the types of samples the cluster will analyze.
8. Configure the amount of time for the cluster to retain Benign/Grayware sample data (1-90 day
range, 14 day default) and Malicious sample data (minimum 1 day, no maximum (indefinite), default is
indefinite). Malicious sample data includes phishing verdicts.
9. (Optional) Select Preferred Analysis Environment to allocate more resources to Executables
or Documents, depending on your environment. The Default allocation is balanced between
Executables and Documents. The available resource amount depends on the number of WildFire
nodes in the cluster.
STEP 3 | Check to ensure that the primary and backup Panorama servers are configured.
If you did not configure a backup Panorama server and want to do so, you can add the backup Panorama
server.
1. Select the cluster.
2. Select Appliance.
3. Check (or enter) the IP address or FQDN of the primary Panorama Server and of the backup
Panorama Server 2 if you are using a high availability configuration for centralized cluster
management.
STEP 4 | (Optional) Configure system and configuration log settings for the cluster, including log
forwarding.
1. Select the cluster.
2. Select Logging.
STEP 6 | Commit the configuration on the Panorama appliance and push it to the cluster.
1. Commit and Push.
2. If there are configurations on the Panorama appliance that you do not want to push, Edit Selections
to choose the appliances to which you push configurations. The pushed configuration overwrites the
running configuration on the cluster nodes so that all cluster nodes run the same configuration.
STEP 1 | Select the cluster’s controller node. The cluster name populates Cluster automatically.
STEP 2 | Click OK. The cluster backup controller node and worker nodes populate automatically.
STEP 2 | Verify that your WildFire appliance cluster has been properly configured and is operating in a
healthy state.
STEP 5 | (Recommended) Enable HA Traffic Encryption. This optional setting encrypts the HA traffic
between the HA pair and is a Palo Alto Networks recommended best practice.
STEP 3 | Review your existing WildFire secure communications configuration. Keep in mind, if you
previously configured the WildFire appliance and the firewall for secure communications
using a custom certificate, you can also use that custom certificate for secure communications
between WildFire appliances.
1. Select Panorama >Managed WildFire Clusters> WF_cluster_name> Communication.
2. If Customize Secure Server Communication has been enabled and you would like to use that
certificate, identify the details of the custom certificate being used. Otherwise proceed to Step 5 to
begin the process of installing a new custom certificate.
3. Determine the custom certificate FQDN (DNS name) that will be used to define the firewall
registration address in step 4.
Make sure to note the custom certificate name and the associated FQDN. These are
referenced several times during the configuration process.
STEP 5 | Configure WildFire Secure Server Communication settings on Panorama. If you already
configured secure communications between the firewall and the WildFire cluster and are using
the existing custom certificate, proceed to step d.
1. On Panorama, select Panorama> Managed WildFire Clusters> WF_cluster_name> Communication.
2. Click Customize Secure Server Communication.
3. Configure and deploy custom certificates used by the WildFire appliances and the associated
firewall. The SSL/TLS service profile defines the custom certificate used by WildFire appliances to
communicate with WildFire appliance peers and to the firewall. You must also configure the custom
certificate settings on the firewall associated with the WildFire appliance cluster. This is configured
later in step 9.
STEP 7 | (Recommended) Enable HA Traffic Encryption. This optional setting encrypts the HA traffic
between the HA pair and is a Palo Alto Networks recommended best practice.
STEP 9 | Configure the firewall Secure Communication Settings on Panorama to associate the WildFire
appliance cluster with the firewall custom certificate. This provides a secure communications
channel between the firewall and WildFire appliance cluster. If you already configured secure
Palo Alto Networks recommends using the WildFire appliance CLI to verify the status of your
WildFire cluster. Additional status details that are not visible from Panorama are displayed in
the command output.
STEP 1 | On the primary Panorama appliance, select Panorama > Managed WildFire Clusters.
STEP 4 | In the Connected column, verify that the configured WildFire appliances show a status of
Connected.
STEP 1 | Upgrade Panorama to an equal or later release than the target software release you want to
install on the WildFire cluster.
For information on upgrading Panorama, refer to Install Content and Software Updates for Panorama.
If you do not want to wait for the WildFire appliance to finish analyzing recently-
submitted samples, you can continue to the next step. However, consider that the
WildFire appliance then drops pending samples from the analysis queue.
You must install content updates before installing software upgrades. Refer to the Release
Notes for the minimum content release version you must install for a Panorama release.
The upgrade process could take 10 minutes or over an hour, depending on the
number of samples stored on the WildFire appliance.
4. Repeat for each WildFire worker node in the cluster.
STEP 5 | (Optional) View the status of the reboot tasks on the WildFire controller node.
On the WildFire cluster controller, run the following command and look for the job type Install and
Status FIN:
STEP 6 | Check that the WildFire appliance is ready to resume sample analysis.
1. Verify that the sw-version field shows 8.0.1:
STEP 1 | Upgrade Panorama to an equal or later release than the target software release you want to
install on the WildFire cluster.
For information on upgrading Panorama, refer to Install Content and Software Updates for Panorama.
If you do not want to wait for the WildFire appliance to finish analyzing recently-
submitted samples, you can continue to the next step. However, consider that the
WildFire appliance then drops pending samples from the analysis queue.
STEP 3 | Download the WildFire content and software updates to a host that has internet access.
Panorama must have access to the host.
1. Use a host with internet access to log in to the Palo Alto Networks Customer Support web site
2. Download content updates:
1. Click Dynamic Updates in the Tools section.
2. Download the desired content update and save the file to the host. Perform this step for each
content type you will update.
3. Download software updates:
1. Return to the main page of the Palo Alto Networks Customer Support web site and click Software
Updates in the Tools section.
2. Review the Download column to determine the version to install. The filename of the update
package indicates the model and release of the upgrade: WildFire_<release>.
3. Click the filename and save the file to the host.
You must install content updates before installing software upgrades. Refer to the Release
Notes for the minimum content release version you must install for a Panorama release.
The upgrade process could take 10 minutes or over an hour, depending on the
number of samples stored on the WildFire appliance.
4. Repeat step 7 for each WildFire worker node in the cluster.
STEP 6 | (Optional) View the status of the reboot tasks on the WildFire controller node.
On the WildFire cluster controller, run the following command and look for the job type Install and
Status FIN:
STEP 7 | Check that the WildFire appliance is ready to resume sample analysis.
1. Verify that the sw-version field shows 8.0.1:
343
344 PANORAMA ADMINISTRATOR'S GUIDE | Manage Licenses and Updates
© 2020 Palo Alto Networks, Inc.
Manage Licenses on Firewalls Using Panorama
The following steps describe how to retrieve new licenses using an authentication (auth) code and push the
license keys to managed firewalls. It also describes how to manually update (refresh) the license status of
firewalls that do not have direct internet access. For firewalls that have direct internet access, Panorama™
automatically performs a daily check-in with the licensing server, retrieves license updates and renewals,
and pushes them to the firewalls. The check-in is hard-coded to occur between 1 a.m. and 2 a.m.; you
cannot change this schedule.
You cannot use Panorama to activate the support license for firewalls. You must access the
firewalls individually to activate their support licenses.
To activate licenses for Panorama, see Register Panorama and Install Licenses.
Check that the WildFire Analysis profile rules include the advanced file types that the
WildFire subscription supports.
By default, you can download up to two software or content updates of each type to
Panorama. When you start any download beyond that maximum, Panorama deletes the
oldest update of the selected type. To change the maximum, see Manage Panorama Storage
for Software and Content Updates.
• Supported Updates
• Schedule a Content Update Using Panorama
• Upgrade Log Collectors When Panorama Is Internet-Connected
• Upgrade Log Collectors When Panorama Is Not Internet-Connected
• Upgrade Firewalls When Panorama Is Internet-Connected
• Upgrade Firewalls When Panorama Is Not Internet-Connected
• Revert Content Updates from Panorama
Supported Updates
The software and content updates you can install vary based on which subscriptions are active on each
firewall, Log Collector, and WildFire® appliance and appliance cluster:
Before deploying updates, see Panorama, Log Collector, Firewall, and WildFire Version
Compatibility for important details about content release version compatibility. Refer to the
Release Notes for the minimum content release version you must install for a Panorama
release.
Panorama can download only one update at a time for updates of the same type so if you
schedule multiple updates of the same type to download during the same time interval, only
the first download will succeed. To ensure that multiple updates of the same type succeed,
stagger the updates.
If your firewalls connect directly to the Palo Alto Networks® Update Server, you can also use
Panorama templates (Device > Dynamic Updates) to push content update schedules to the
firewalls. If you want to delay the installation of updates for a period after they are released,
you must deploy schedules using templates. In rare instances, a content update includes
errors; specifying a delay increases the likelihood that Palo Alto Networks will identify and
remove such an update from the Update Server before your firewalls install it.
Perform the following steps for each update type you want to schedule.
STEP 1 | Select Panorama > Device Deployment > Dynamic Updates, click Schedules, and Add a
schedule.
STEP 2 | Specify a Name (to identify the schedule), the update Type, and the update frequency
(Recurrence). The frequency options depend on the update Type.
If you set the Type to App and Threat, Log Collectors install and need only the Applications content, not
the Threats content. Firewalls use both Applications and Threats content. For details, see Panorama, Log
Collector, Firewall, and WildFire Version Compatibility.
STEP 5 | Select Commit > Commit to Panorama and then Commit your changes.
For M-100 appliances, Palo Alto Networks requires upgrading the memory to 32GB or more
for management and log collection tasks. See the M-100 Memory Upgrade Guide before
upgrading your M-100 appliance to PAN-OS 9.0.0.
STEP 1 | Before you upgrade Log Collectors, ensure that you are running the appropriate Panorama™
software release on the Panorama management server.
Palo Alto Networks® highly recommends that Panorama and Log Collectors run the
same Panorama software release and that Panorama, Log Collectors, and all managed
firewalls run the same content release version. For important software and content
compatibility details, see Panorama, Log Collector, Firewall, and WildFire Version
Compatibility.
Panorama must be running the same (or later) software release as Log Collectors but must have the
same or an earlier content release version:
• Software release version—If your Panorama management server is not already running the same or a
later software release than the release to which you intend to update Log Collectors, then you must
install the same or a later Panorama release on Panorama (see Install Content and Software Updates
for Panorama) before you update any Log Collectors.
• Content release version—For content release versions, you should ensure that all Log Collectors are
running the latest content release version or, at minimum, running a later version than is running
Refer to the Release Notes for the minimum content release versions required for a
Panorama software release.
1. Check Now (Panorama > Device Deployment > Dynamic Updates) for the latest updates. If an
update is available, the Action column displays a Download link.
2. If not already installed, Download the appropriate content updates. After a successful download, the
link in the Action column changes from Download to Install.
3. Install the content update (Applications or Applications and Threats update) before any others:
Click Install, select the Log Collectors, and click OK.
Regardless whether your subscription includes both Applications and Threats content,
Panorama installs and needs only the Applications content. For details, see Panorama,
Log Collector, Firewall, and WildFire Version Compatibility.
4. Repeat substeps 2 and 3 above for any other updates (Antivirus, WildFire, or URL Filtering) as
needed, one at a time, and in any sequence.
If upgrading more than one Log Collector, streamline the process by determining the
upgrade paths for all Log Collectors you intend to upgrade before you start downloading
images.
STEP 4 | For all Log Collectors you intend to update to PAN-OS 9.0, continue using the upgrade path
identified in Step 3 to upgrade Log Collectors to your target Panorama release.
1. On Panorama, Check Now (Panorama > Device Deployment > Software) for the latest updates. If an
update is available, the Action column displays a Download link.
2. For each release in your upgrade path, Download the model-specific file for the release version
to which you are upgrading. For example, to upgrade an M-Series appliance to Panorama 9.0.0,
download the Panorama_m-9.0.0 image.
After a successful download, the Action column changes from Download to Install for that image.
3. Click Install for the first (or next) version in your upgrade path and select the appropriate Log
Collectors.
STEP 5 | Check the status of the log format migration after a successful upgrade to PAN-OS 9.0.
1. Log in to the Panorama CLI of the Log Collector.
2. Run the following command to check the status of the log format migration:
Response from logger 23456212: 100% of indices complete, please run the
‘show log-collector-es-culster health’ command to check the ElasticSearch
cluster status to verify logging and reporting functionality is restored.
3. After the log format migration is complete, run the following command to check the status of the
ElasticSearch cluster before you continue to the next step:
Continue to the next step when the “status” of the ElasticSearch cluster health displays “green”:
STEP 6 | Verify the software and content update versions that are installed on the Log Collector.
Enter the show system info operational command. The output will resemble the following:
sw-version: 9.0.0
app-version: 8085-5112
For M-100 appliances, Palo Alto Networks requires upgrading the memory to 32GB or more
for management and log collection tasks. See the M-100 Memory Upgrade Guide before
upgrading your M-100 appliance to PAN-OS 9.0.0.
STEP 1 | Before you upgrade Log Collectors, ensure that you are running the appropriate Panorama™
software release on the Panorama management server.
Palo Alto Networks® highly recommends that Panorama and Log Collectors run the
same Panorama software release and that Panorama, Log Collectors, and all managed
firewalls run the same content release version. For important software and content
compatibility details, see Panorama, Log Collector, Firewall, and WildFire Version
Compatibility.
Panorama must be running the same (or later) software release as Log Collectors but must have the
same or an earlier content release version:
• Software release version—If your Panorama management server is not already running the same or a
later software release than the release to which you intend to update Log Collectors, then you must
install the same or a later Panorama release on Panorama (see Install Content and Software Updates
for Panorama) before you update any Log Collectors.
• Content release version—For content release versions, you should ensure that all Log Collectors are
running the latest content release version or, at minimum, running a later version than you will install
or that is running on Panorama; if not, then first update managed firewalls (using Panorama) and then
update Log Collectors before you update the content release version on the Panorama management
server (see Install Content and Software Updates for Panorama).
To check the software and content versions:
STEP 2 | Determine which content updates you need to install on Log Collectors. Refer to the Release
Notes for the minimum content release version you must install for a Panorama release.
1. Run the show system info CLI command to view the current update versions.
2. For each content update, determine whether you need updates and take note of which content
updates you need to download in Step 4.
Ensure that Panorama is running the same but not a later content release version than
is running on managed firewalls and Log Collectors.
3. (As needed) Before you update content versions on Log Collectors, first upgrade managed firewalls to
the same or later content release versions.
If upgrading more than one Log Collector, streamline the process by determining the
upgrade paths for all Log Collectors you intend to upgrade before you start downloading
images.
STEP 4 | Download the content and software updates to a host that can connect and upload the files to
Panorama either over SCP or HTTPS.
1. Use a host with internet access to log in to the Palo Alto Networks Customer Support web site.
2. Download content updates:
1. Click Dynamic Updates in the Resources section.
2. Download the desired content updates and save the files to the host. Perform this step for each
content type you will update.
3. Download software updates:
1. Return to the main page of the Palo Alto Networks® Customer Support website and click
Software Updates in the Resources section.
2. Review the Download column to determine which version to install. The update package
filenames for M-Series appliances begin with “Panorama_m” followed by the release
number. For example, to upgrade an M-Series appliance to Panorama 9.0.0, download the
Panorama_m-9.0.0 image.
4. Click the appropriate filename and save the file to the host.
If you need to install content updates, you must do so before you install software updates.
Additionally, install content updates on firewalls first and then on Log Collectors before
you update the content release version on Panorama.
Install the Applications or Applications and Threats update first and then install any other updates
(Antivirus, WildFire®, or URL Filtering) as needed, one at a time, and in any sequence.
Regardless whether your subscription includes both Applications and Threats content,
Panorama installs and needs only the Applications content. For details, see Panorama,
Log Collector, Firewall, and WildFire Version Compatibility.
STEP 7 | Check the status of the log format migration after a success upgrade to PAN-OS 9.0.
1. Log in to the Panorama CLI of the Log Collector.
2. Run the following command to check the status of the log format migration:
Response from logger 23456212: 100% of indices complete, please run the
‘show log-collector-es-culster health’ command to check the ElasticSearch
cluster status to verify logging and reporting functionality is restored.
3. After the log format migration is complete, run the following command to check the status of the
ElasticSearch cluster before you continue to the next step:
Continue to the next step when the “status” of the ElasticSearch cluster health displays “green”:
STEP 8 | Verify the software and content versions that are installed on each Log Collector.
Log in to the Log Collector CLI and enter the show system info operational command. The output
will resemble the following:
sw-version: 9.0.0
app-version: 8085-5112
app-release-date: 2018/10/29 18:21:51
If Panorama is unable to connect directly to the updates server, follow the Upgrade Firewalls
When Panorama Is Not Internet-Connected procedure so that you can manually download
images to Panorama and then distribute the images to firewalls.
STEP 1 | Save a backup of the current configuration file on each managed firewall you plan to upgrade.
1. From the Panorama web interface, select Panorama > Setup > Operations and click Export
Panorama and devices config bundle to generate and export the latest configuration backup of
Panorama and of each managed appliance.
2. Save the exported file to a location external to the firewall. You can use this backup to restore the
configuration if you have problems with the upgrade.
STEP 2 | Update the content release version on the firewalls you plan to upgrade.
Refer to the Release Notes for the minimum content release version required for PAN-OS 8.1. Make
sure to follow the Best Practices for Application and Threat Updates when deploying content updates to
Panorama and managed firewalls.
1. Select Panorama > Device Deployment > Dynamic Updates and Check Now for the latest updates. If
an update is available, the Action column displays a Download link.
STEP 3 | (HA firewall upgrades only) If you will be upgrading firewalls that are part of an HA pair, disable
preemption. You need only disable this setting on one firewall in each HA pair.
1. Select Device > High Availability and edit the Election Settings.
2. If enabled, disable (clear) the Preemptive setting and click OK.
3. Commit your change. Make sure the commit is successful before you proceed with the upgrade.
If upgrading more than one firewall, streamline the process by determining upgrade paths
for all firewalls before you start downloading images.
STEP 7 | (HA firewall upgrades only) Upgrade the second HA peer in each HA pair.
1. (Active/passive upgrades only) Suspend the active device in each active/passive pair you are
upgrading.
1. Switch context to the active firewall.
2. In the High Availability widget on the Dashboard, verify that Local firewall state is Active and the
Peer is Passive).
3. Select Device > High Availability > Operational Commands > Suspend local device.
4. Go back to the High Availability widget on the Dashboard and verify that Local changed to
Passive and Peer changed to Active.
2. Go back to the Panorama context and select Panorama > Device Deployment > Software.
3. Click Install in the Action column that corresponds to the firewall models of the HA pairs you are
upgrading.
4. In the Deploy Software file dialog, select all firewalls that you want to upgrade. This time, select only
the peers of the HA firewalls you just upgraded.
5. Make sure Group HA Peers is not selected.
STEP 8 | Verify the software and content release version running on each managed firewall.
1. On Panorama, select Panorama > Managed Devices.
2. Locate the firewalls and review the content and software versions in the table.
For HA firewalls, you can also verify that the HA Status of each peer is as expected.
STEP 9 | (HA firewall upgrades only)If you disabled preemption on one of your HA firewalls before you
upgraded, then edit the Election Settings (Device > High Availability) and re-enable the
Preemptive setting for that firewall and then Commit the change.
STEP 1 | Before you upgrade managed firewalls, ensure that you are running the appropriate
Panorama™ software release on the Panorama management server and Log Collectors.
Palo Alto Networks® highly recommends that Panorama and Log Collectors run the
same Panorama software release and that Panorama, Log Collectors, and all managed
firewalls run the same content release version.
For important software and content compatibility details, see Panorama, Log Collector,
Firewall, and WildFire Version Compatibility.
Panorama must be running the same (or later) software release as the firewalls but must have the same
or an earlier content release version:
• Software release version—If your Panorama management server or Log Collectors are not already
running the same or a later software release than the release to which you intend to update firewalls,
then you must install the same or a later Panorama release on Panorama and then on Log Collectors
(see Install Content and Software Updates for Panorama) before you update any firewalls.
• Content release version—For content release versions, you should ensure that all firewalls are
running the latest content release version or, at minimum, are running a later version than is running
on Panorama and Log Collectors; if not, then update managed firewalls and then Upgrade Log
Collectors When Panorama Is Not Internet-Connected before you update the content release version
on the Panorama management server (see Install Content and Software Updates for Panorama).
STEP 2 | Save a backup of the current configuration file on each managed firewall you plan to upgrade.
1. Export Panorama and devices config bundle (Panorama > Setup > Operations) to generate and
export the latest configuration backup of Panorama and of each managed appliance.
2. Save the exported file to a location external to the firewall. You can use this backup to restore the
configuration if you have problems with the upgrade.
STEP 3 | Determine which content updates you need to install. Refer to Release Notes for the minimum
content release version you must install for a PAN-OS® release.
Palo Alto Networks highly recommends that Panorama, Log Collectors, and all managed
firewalls run the same content release version.
For each content update, determine whether you need updates and take note of which content updates
you need to download in Step 5.
Ensure that Panorama is running the same but not a later content release version than is
running on managed firewalls and Log Collectors.
STEP 4 | Determine the software upgrade path for the firewalls that you intend to update to Panorama
8.1. Refer to the New Features Guide for the upgrade path to PAN-OS 8.1.
Log in to Panorama, select Panorama > Managed Devices, and note the current Software Version for the
firewalls you intend to upgrade.
We highly recommend that you review the known issues and changes to default behavior
in the ReleaseNotes and upgrade/downgrade considerations in the New Features Guide
for each release through which you pass as part of your upgrade path.
STEP 5 | Download the content and software updates to a host that can connect and upload the files to
Panorama either over SCP or HTTPS.
By default, you can upload a maximum of two software or content updates of each type to a Panorama
appliance and if you download a third update of the same type, Panorama will delete the update for the
earliest version of that type. If you need to upload more than two software updates or content updates
of a single type, use the set max-num-images count <number> CLI command to increase the
maximum number of images that Panorama can store.
1. Use a host with internet access to log in to the Palo Alto Networks Customer Support web site.
2. Download content updates:
1. Click Dynamic Updates in the Resources section.
2. Download the latest content release version (or, at a minimum, the same or a later version than
you will install or is running on the Panorama management server) and save the file to the host;
repeat for each content type you need to update.
3. Download software updates:
You can quickly locate specific PAN-OS images by selecting PAN-OS for the
PA-<series/model> from the Filter By drop-down.
4. Click the appropriate filename and save the file to the host.
Install the Applications or Applications and Threats update first and then install any other updates
(Antivirus, WildFire®, or URL Filtering) as needed, one at a time, and in any sequence.
1. Select Panorama > Device Deployment > Dynamic Updates.
2. Click Upload, select the update Type, Browse to the appropriate content update file, and click OK.
3. Click Install From File, select the update Type, and select the File Name of the content update you
just uploaded.
4. Select the firewalls on which to install the update.
5. Click OK to start the installation.
6. Repeat these steps for each content update.
STEP 7 | (Firewalls serving as GlobalProtect™ portals only) Upload and activate a GlobalProtect agent/app
software update on firewalls.
You activate the update on firewalls so that users can download it to their endpoints
(client systems).
1. Use a host with internet access to log in to the Palo Alto Networks Customer Support website.
2. Download the appropriate GlobalProtect agent/app software update.
3. On Panorama, select Panorama > Device Deployment > GlobalProtect Client.
4. Click Upload, Browse to the appropriate GlobalProtect agent/app software update on the host to
which you downloaded the file, and click OK.
5. Click Activate From File and select the File Name of the GlobalProtect agent/app update you just
uploaded.
You can activate only one version of agent/app software at a time. If you activate a
new version but some agents require a previous version, you will have to reactivate
the earlier version again for those agents to download the previous update.
6. Select the firewalls on which to activate the update.
7. Click OK to activate.
1. Perform the steps that apply to your firewall configuration to install the PAN-OS software update
you just uploaded.
• Non-HA firewalls—Click Install in the Action column, select all the firewalls you are upgrading,
select Reboot device after install, and click OK.
• Active/active HA firewalls:
1. Confirm that the preemption setting is disabled on the first peer that you intend to upgrade
(Device > High Availability > Election Settings). If enabled, then edit Election Settings and
disable (clear) the Preemptive setting and Commit your change. You need only disable this
setting on one firewall in each HA pair but ensure that the commit is successful before you
proceed.
2. Click Install, disable (clear) Group HA Peers, select either HA peer, select Reboot device after
install, and click OK. Wait for the firewall to finish rebooting before you proceed.
3. Click Install, disable (clear) Group HA Peers, select the HA peer that you didn’t update in the
previous step, Reboot device after install, and click OK.
• Active/passive HA firewalls—In this example, the active firewall is named fw1 and the passive
firewall is named fw2:
1. Confirm that the preemption setting is disabled on the first peer that you intend to upgrade
(Device > High Availability > Election Settings). If enabled, then edit Election Settings and
disable (clear) the Preemptive setting and Commit your change. You need only disable this
setting on one firewall in each HA pair but ensure that the commit is successful before you
proceed.
2. Click Install in the Action column for the appropriate update, disable (clear) Group HA Peers,
select fw2, Reboot device after install, and click OK. Wait for fw2 to finish rebooting before
you proceed.
3. After fw2 finishes rebooting, verify on fw1 (Dashboard > High Availability) that fw2 is still the
passive peer (the Local firewall state is active and the Peer—fw2—is passive).
4. Access fw1 and Suspend local device (Device > High Availability > Operational Commands).
5. Access fw2 (Dashboard > High Availability) and verify that the Local firewall state is active
and the Peer is suspended.
6. Access Panorama, select Panorama > Device Deployment > Software, click Install in the
Action column for the appropriate release, disable (clear) Group HA Peers, select fw1, Reboot
device after install, and click OK. Wait for fw1 to finish rebooting before you proceed.
7. Access fw1 (Device > High Availability > Operational Commands), click Make local device
functional, and then wait two minutes before you proceed.
8. On fw1 (Dashboard> High Availability), verify that the Local firewall state is passive and the
Peer (fw2) is active.
2. After you complete the above steps for a PAN-OS release update, repeat Step 8 and Step 9 to upload
the next PAN-OS release in your upgrade path as needed until all firewalls are running the target
PAN-OS 8.1 release.
STEP 10 | Verify the software and content versions that are installed on each managed firewall.
1. Select Panorama > Managed Devices.
STEP 11 | If you disabled preemption on one of your HA firewalls before you upgraded, then edit the
Election Settings (Device > High Availability) and re-enable the Preemptive setting for that
firewall.
STEP 2 | Select Panorama > Device Deployment > Dynamic Updates and Revert Content.
STEP 4 | Select one or more firewalls on which to revert content and click OK. The content version you
revert to must be an older version than the version currently installed on the device.
365
366 PANORAMA ADMINISTRATOR'S GUIDE | Monitor Network Activity
© 2020 Palo Alto Networks, Inc.
Use Panorama for Visibility
In addition to its central deployment and firewall configuration features, Panorama also allows you to
monitor and report on all traffic that traverses your network. While the reporting capabilities on Panorama
and the firewall are very similar, the advantage that Panorama provides is that it is a single pane view
of aggregated information across all your managed firewalls. This aggregated view provides actionable
information on trends in user activity, traffic patterns, and potential threats across your entire network.
Using the Application Command Center (ACC), the App-Scope, the log viewer, and the standard,
customizable reporting options on Panorama, you can quickly learn more about the traffic traversing
the network. The ability to view this information allows you to evaluate where your current policies are
adequate and where they are insufficient. You can then use this data to augment your network security
strategy. For example, you can enhance the security rules to increase compliance and accountability for all
users across the network, or manage network capacity and minimize risks to assets while meeting the rich
application needs for the users in your network.
The following topics provide a high-level view of the reporting capabilities on Panorama, including a couple
of use cases to illustrate how you can use these capabilities within your own network infrastructure. For a
complete list of the available reports and charts and the description of each, refer to the online help.
• Monitor the Network with the ACC and AppScope
• Analyze Log Data
• Generate, Schedule, and Email Reports
• What are the top applications used on • What are the application usage trends—what are
the network and how many are high-risk the top five applications that have gained use
applications? Who are the top users of high- and the top five that have decreased in use?
risk applications on the network? • How has user activity changed over the current
• What are the top URL categories being viewed week as compared to last week or last month?
in the last hour?
• What are the top bandwidth-using • Which users and applications take up most
applications? Who are the users/hosts that of the network bandwidth? And how has this
consume the highest bandwidth? consumption changed over the last 30 days?
You can then use the information to maintain or enforce changes to the traffic patterns on your network.
See Use Case: Monitor Applications Using Panorama for a glimpse into how the visibility tools on Panorama
can influence how you shape the acceptable use policies for your network.
Here are a few tips to help you navigate the ACC:
• Switch from a Panorama view to a Device view—Use the Context drop-down to access the web
interface of any managed firewall. For details, see Context Switch—Firewall or Panorama.
• Change Device Group and Data Source—The default Data Source used to display the statistics on
the charts in the ACC is Panorama local data, and the default Device Group setting is All. Using the
local data on Panorama provides a quick load time for the charts. You can, however, change the data
source to Remote Device Data if all the managed firewalls are on PAN-OS 7.0 or a later release. If the
managed firewalls have a mix of PAN-OS 7.0 and earlier releases, you can only view Panorama data.
When configured to use Remote Device Data, Panorama will poll all the managed firewalls and present
an aggregated view of the data. The onscreen display indicates the total number of firewalls being polled
and the number of firewalls that have responded to the query for information.
• Select the Tabs and Widgets to View—The ACC includes three tabs and an array of widgets that allow
you to find the information that you care about. With the exception of the application usage widget and
host information widget, all the other widgets display data only if the corresponding feature has been
licensed on the firewall, and you have enabled logging.
If Panorama will manage firewalls running software versions earlier than PAN-OS 7.0,
specify a WildFire server from which Panorama can gather analysis information for WildFire
samples that those firewalls submit. Panorama uses the information to complete WildFire
Submissions logs that are missing field values introduced in PAN-OS 7.0. Firewalls running
earlier releases won’t populate those fields. To specify the server, select Panorama >
Setup > WildFire, edit the General Settings, and enter the WildFire Private Cloud name. The
default is wildfire-public-cloud, which is the WildFire cloud hosted in the United States.
It is recommended that you install matching software releases on Panorama and the firewalls
for which you will generate reports. For example, if the Panorama management server
runs Panorama 9.0, install PAN-OS 9.0 on its managed firewalls before generating the
reports. This practice avoids issues that might occur if you create reports that include fields
supported in the Panorama release but not supported in an earlier PAN-OS release on the
firewalls.
STEP 1 | Configure Panorama to receive and store user and user group information that it receives from
firewalls.
Required to generate reports based on usernames and groups instead of just IP addresses.
1. If you want Panorama to include user group information in reports, upgrade the managed firewalls
to PAN-OS 8.1.0 or a later release. Panorama cannot synchronize group information from firewalls
running earlier releases.
STEP 1 | Define the log ingestion profile on Panorama and attach it to a Collector Group.
The data source for this display is the application statistics database; it does not use the Traffic logs and
is generated whether or not you have enabled logging for security rules. This view into the traffic on your
network depicts everything that is allowed on your network and is flowing through unblocked by any policy
rules that you have defined.
In the ACC tab, you can select and toggle the Data Source to be local on Panorama or you can query the
managed firewalls (Remote Device Data) for the data; Panorama automatically aggregates and displays
the information. For a speedier flow, consider using Panorama as the data source (with log forwarding to
Panorama enabled) because the time to load data from the managed firewalls varies by the time period
for which you choose to view data and the volume of traffic that is generated on your network. If your
managed firewalls have a combination of PAN-OS 7.0 and earlier versions, Remote Device Data is not
available.
The Dashboard example in Figure 26: Top Applications Widget shows BitTorrent as a popular application. If
you click the BitTorrent application block, Panorama opens the ACC > Network Activity tab with BitTorrent
applied as a global filter and shows information on the application, users who accessed the application, and
the details on the risk level and characteristics of the application.
In the User Activity widget, you can see how many users are using BitTorrent and the volume of traffic
being generated. If you have enabled User-ID, you can view the names of the users who are generating this
traffic, and drill in to review all the sessions, content or threats associated with each user.
In the Threat Activity tab, view the Compromised Hosts widget to see what correlation objects were
matched on, and view the match evidence associated with the user and application. You can also view the
threat name, category and ID in the Threat Activity widget.
With BitTorrent set as a global filter, use the Destination IP Activity and the Destination Regions widgets
to verify where the traffic was destined. You can also view the ingress and egress zones and the security
rule that is letting this connection through.
For more detailed information, jump into the Traffic logs for a filtered view and review each log entry
for ports used, packets sent, bytes sent and received. Adjust the columns to view more information or less
information based on your needs.
The Monitor > App-Scope > Traffic Map tab displays a geographical map of the traffic flow and provides
a view of incoming versus outgoing traffic. You can also use the Monitor > App-Scope > Change Monitor
tab to view changes in traffic patterns. For example, compare the top applications used over this hour to the
last week or month to determine if there is a pattern or trend.
With all the information you have now uncovered, you can evaluate what changes to make to your policy
configurations. Here are some suggestions to consider:
• Be restrictive and create a pre-rule on Panorama to block all BitTorrent traffic. Then use Panorama
device groups to create and push this policy rule to one or more firewalls.
Incident Notification
There are several ways that you could be alerted to an incident depending on how you’ve configured the
Palo Alto Networks firewalls and which third-party tools are available for further analysis. You might receive
an email notification that was triggered by a log entry recorded to Panorama or to your syslog server, or
you might be informed through a specialized report generated on your SIEM solution, or a third-party paid
service or agency might notify you. For this example, let’s say that you receive an email notification from
Panorama. The email informs you of an event that was triggered by an alert for a Zero Access gent.Gen
Command And Control Traffic that matched against a spyware signature. Also listed in the email are the IP
address of the source and destination for the session, a threat ID and the timestamp of when the event was
logged.
If you see a DNS-based spyware signature, the IP address of your local DNS server might
display as the Victim IP address. Often this is because the firewall is located north of the
local DNS server, and so DNS queries show the local DNS server as the source IP rather
than showing the IP address of the client that originated the request.
If you see this issue, enable the DNS sinkholing action in the Anti-Spyware profile in security
rules to identify the infected hosts on your network. DNS sinkholing allows you to control
outbound connections to malicious domains and redirect DNS queries to an internal IP
address that is unused; the sinkhole that does not put out a response. When a compromised
host initiates a connection to a malicious domain, instead of going out to the internet,
the firewall redirects the request to the IP address you defined and it is sinkholed. Now,
reviewing the traffic logs for all hosts that connected to the sinkhole allows you locate all
compromised hosts and take remedial action to prevent the spread.
To continue with the investigation on the incident, use the information on the attacker and the victim IP
address to find out more information, such as:
• Where is the attacker located geographically? Is the IP address an individual IP address or a NATed IP
address?
• Was the event caused by a user being tricked into going to a website, a download, or was it sent through
an email attachment?
• Is the malware being propagated? Are there other compromised hosts/endpoints on the network?
• Is it a zero-day vulnerability?
The log details for each log entry display the related logs for the event. This information points you to
the Traffic, Threat, URL Filtering or other logs that you can review and correlate the events that led to
the incident. For example, filter the Traffic log (Monitor > Logs > Traffic) using the IP address as both the
source and the destination IP to get a complete picture of all the external and internal hosts/clients with
which this victim IP address has established a connection.
Access to the WildFire logs from Panorama requires the following: a WildFire subscription,
a File Blocking profile that is attached to a Security rule, and Threat log forwarding to
Panorama.
If Panorama will manage firewalls running software versions earlier than PAN-OS 7.0,
specify a WildFire server from which Panorama can gather analysis information for WildFire
samples that those firewalls submit. Panorama uses the information to complete WildFire
Submissions logs that are missing field values introduced in PAN-OS 7.0. Firewalls running
earlier releases won’t populate those fields. To specify the server, select Panorama >
Setup > WildFire, edit the General Settings, and enter the WildFire Private Cloud name. The
default is wildfire-public-cloud, which is the WildFire cloud hosted in the United States.
If WildFire determines that a file is malicious, a new antivirus signature is created within 24-48 hours and
made available to you. If you have a WildFire subscription, the signature is made available within 30-60
minutes as part of the next WildFire signature update. As soon as the Palo Alto Networks next-generation
firewall has received a signature for it, if your configuration is configured to block malware, the file will be
blocked and the information on the blocked file will be visible in your threat logs. This process is tightly
integrated to protect you from this threat and stems the spread of malware on your network.
381
382 PANORAMA ADMINISTRATOR'S GUIDE | Panorama High Availability
© 2020 Palo Alto Networks, Inc.
Panorama HA Prerequisites
To configure Panorama in HA, you require a pair of identical Panorama servers with the following
requirements on each:
• The same form factor—The peers must be the same model and mode: both M-600 appliances, M-500
appliances, M-200 appliances, M-100 appliances, Panorama virtual appliances on AWS, and Panorama
virtual appliances on Azure in Panorama mode, Management Only mode or Legacy mode (ESXi and
vCloud Air only). Panorama appliances in Log Collector mode do not support HA.
The shipping configuration of the M-100 appliance has increased memory and system
disk capacity. Because of this change, if you purchase a new M-100 appliance or
issue an RMA, you will receive an appliance with 32 GB memory and a 120 GB or 150
GB SSD. In this case, you can configure HA between an M-100 appliance with the
higher capacity and an M-100 that has 16 GB memory and 120 GB or 150 GB SSD.
It is recommended that you upgrade the memory to match, but to set up HA on the
M-100 appliance the memory does not need to match. No changes to the system disk is
necessary, if the capacities differ.
M-100 appliances are supported in PAN-OS 9.0 and later releases only if they have been
upgraded to 32GB memory from the default 16GB. See M-100 Memory Upgrade Guide
for more information.
• The same Panorama OS version—Must run the same Panorama version to synchronize configuration
information and maintain parity for a seamless failover.
• The same set of licenses—Must have the same firewall management capacity license.
• (Panorama virtual appliance only) Unique serial number—Must have unique serial numbers; if the serial
number is the same for both Panorama instances, they will be in suspended mode until you resolve the
issue.
HA Path Monitoring
Path monitoring checks the network connectivity and link state for an IP address or group of IP addresses
(path group). The active peer uses ICMP pings to verify that one or more destination IP addresses can be
reached. For example, you can monitor the availability of interconnected networking devices like a router
or a switch, connectivity to a server, or some other vital device that is in the flow of traffic. Make sure that
the node/device configured for monitoring is not likely to be unresponsive, especially when it comes under
load, as this could cause a path monitoring failure and trigger a failover.
The default ping interval is 5,000ms. An IP address is considered unreachable when three consecutive pings
(the default value) fail, and a peer failure is triggered when any or all of the IP addresses monitored become
unreachable. By default, if any one of the IP addresses becomes unreachable, the HA state transitions to
non-functional.
By default, when the managed firewalls cannot connect to Panorama, they buffer the logs;
when the connection is restored, they resume sending logs from where it was last left off.
The logging options on the hardware-based Panorama and on the Panorama virtual appliance differ:
• Logging Failover on a Panorama Virtual Appliance in Legacy Mode
• Logging Failover on an M-Series Appliance or Panorama Virtual Appliance in Panorama Mode
Virtual disk By default, the managed firewalls send logs as independent streams to each
Panorama HA peer. By default, if a peer becomes unavailable, the managed
firewalls buffer the logs and when the peer reconnects it resumes sending logs
from where it had left off (subject to disk storage capacity and duration of the
disconnection).
The maximum log storage capacity depends on the virtual platform (VMware
ESXi or vCloud Air); see Panorama Models for details.
You can choose whether to forward logs only to the active peer
(see Modify Log Forwarding and Buffering Defaults). However,
Panorama does not support log aggregation across the HA
pair. Therefore, if you log to a virtual disk, for monitoring and
reporting you must query the Panorama peer that collects the
logs from the managed firewalls.
Network File System You can mount NFS storage only to a Panorama virtual appliance that runs
(NFS) on a VMware ESXi server. Only the active-primary Panorama mounts to the
NFS-based log partition and can receive logs. On failover, the primary device
goes into a passive-primary state. In this scenario, until preemption occurs, the
active-secondary Panorama manages the firewalls, but it does not receive the
logs and it cannot write to the NFS. To allow the active-secondary peer to log
to the NFS, you must manually switch it to primary so that it can mount to the
NFS partition. For instructions, see Switch Priority after Panorama Failover to
Resume NFS Logging.
All the Log Collectors for any particular Collector Group must be the same model: all M-100
appliances, all M-200 appliances all M-500 appliances, all M-600 appliances or all Panorama
virtual appliances in Panorama mode.
Because enabling redundancy creates more logs, this configuration requires more storage
capacity. Enabling redundancy doubles the log processing traffic in a Collector Group, which
reduces its maximum logging rate by half, as each Log Collector must distribute a copy of
each log it receives. (When a Collector Group runs out of space, it deletes older logs.)
If you use a master key to encrypt the private keys and certificates on Panorama, you
must use the same master key on both HA peers. If the master keys differ, Panorama
cannot synchronize the HA peers.
For more information, see Panorama HA Prerequisites or Set Up HA on Panorama.
Set Up HA on Panorama
Review the Panorama HA Prerequisites before performing the following steps:
If both peers have the same priority setting, the peer with the higher serial number will
be placed in a suspended state.
3. Define the Preemptive behavior. By default preemption is enabled. The preemption selection—
enabled or disabled—must be the same on both peers.
STEP 5 | (Optional) Select the failure condition for path monitoring on Panorama.
1. Select Panorama > High Availability and edit the Path Monitoring section.
2. Select a Failure Condition:
• all triggers a failover only when all monitored path groups fail.
• any triggers a failover when any monitored path group fails.
3. Click OK.
When the Custom Certificate Only check box is selected, Panorama does not
authenticate and cannot manage devices using predefined certificates.
3. Select the SSL/TLS service profile from the SSL/TLS Service Profile drop-down. This SSL/TLS service
profile applies to all SSL connections between Panorama, firewalls, Log Collectors, and Panorama’s
HA peers.
4. Select the certificate profile from the Certificate Profile drop-down.
5. (Optional) Configure an authorization list.
1. Click Add under Authorization List.
2. Select the Subject or Subject Alt Name as the Identifier type.
3. Enter the Common Name
6. In Disconnect Wait Time (min), enter the number of minutes Panorama should before breaking and
reestablishing the connection with its managed devices. This field is blank by default and the range is
0 to 44,640 minutes.
The disconnect wait time does not begin counting down until you commit the new
configuration.
1. Click OK.
2. Commit your changes.
STEP 3 | Verify that the passive Panorama peer has taken over as active.
On the Panorama Dashboard, High Availability widget, verify that the state of the Local passive server is
active and the state of the Peer is suspended.
STEP 4 | Restore the suspended peer to a functional state. Wait for a couple minutes, and then verify
that preemption has occurred, if preemptive is enabled.
On the Panorama you previously suspended:
1. Select Panorama > High Availability and, in the Operational Commands section, click Make local
Panorama functional.
2. In the High Availability widget on the Dashboard, confirm that this (Local) Panorama has taken over
as the active peer and that the other peer is now in a passive state.
STEP 1 | Log in to the currently passive-primary Panorama, select Panorama > Setup > Operations and,
in the Device Operations section, click Shutdown Panorama.
STEP 2 | Log in to the active-secondary Panorama, select Panorama > High Availability, edit the
Election Settings, and set the Priority to Primary.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Do not reboot when prompted.
STEP 6 | Select Panorama > Setup > Operations and, in the Device Operations section, click Reboot
Panorama.
STEP 7 | Power on the Panorama peer that you powered off in step 1. This peer will now be in a
passive-secondary state.
STEP 2 | Verify that the status indicates that the Panorama was suspended at user request.
On the Dashboard, High Availability widget, verify that the Local state is suspended.
A failover is triggered when you suspend a peer, and the other Panorama takes over as the active peer.
For instructions on completing initial setup, including defining network access settings,
licensing, upgrading the Panorama software version, and setting up administrative access to
Panorama, see Set Up Panorama.
395
396 PANORAMA ADMINISTRATOR'S GUIDE | Administer Panorama
© 2020 Palo Alto Networks, Inc.
Preview, Validate, or Commit Configuration
Changes
You can perform Panorama Commit, Validation, and Preview Operations on pending changes to the
Panorama configuration and then push those changes to the devices that Panorama manages, including
firewalls, Log Collectors, and WildFire appliances and appliance clusters. You can filter the pending changes
by administrator or location and then commit, push, validate, or preview only those changes. The locations
can be specific device groups, templates, Collector Groups, Log Collectors, shared settings, or the Panorama
management server.
Because Panorama pushes its running configuration, you cannot push changes to devices until you first
commit them to Panorama. If the changes are not ready to activate on devices, you can select Commit >
Commit to Panorama to commit the changes to the Panorama configuration without pushing them to
devices. Later, when the changes are ready to activate on devices, you can select Commit > Push to
Devices. If the changes are ready to activate on both Panorama and the devices, select Commit > Commit
and Push as described in the following procedure.
STEP 1 | Configure the scope of configuration changes that you will commit, validate, or preview.
1. Click Commit at the top of the web interface.
2. Select one of the following options:
• Commit All Changes (default)—Applies the commit to all changes for which you have
administrative privileges. You cannot manually filter the commit scope when you select this
option. Instead, the administrator role assigned to the account you used to log in determines the
commit scope.
• Commit Changes Made By—Enables you to filter the commit scope by administrator or location.
The administrative role assigned to the account you used to log in determines which changes you
can filter.
To commit the changes of other administrators, the account you used to log in must
be assigned the Superuser role or an Admin Role profile with the Commit For Other
Admins privilege enabled.
3. (Optional) To filter the commit scope by administrator, select Commit Changes Made By, click the
adjacent link, select the administrators, and click OK.
4. (Optional) To filter by location, select Commit Changes Made By and clear any changes that you
want to exclude from the Commit Scope.
If dependencies between the configuration changes you included and excluded cause
a validation error, perform the commit with all the changes included. For example,
when you commit changes to a device group, you must include the changes of all
administrators who added, deleted, or repositioned rules for the same rulebase in that
device group.
When you preview changes after you delete and then re-add the same device to a policy
rule, Panorama displays that same device as both deleted in the running configuration
and as added in the candidate configuration. Additionally, the order of devices in the
device target list in the running configuration may then be different from the candidate
configuration and display as a change when you preview changes even when there aren't
any configuration changes.
Because the preview results display in a new window, your browser must allow pop-up
windows. If the preview window does not open, refer to your browser documentation for
the steps to unblock pop-up windows.
STEP 3 | Preview the individual settings for which you are committing changes.
This can be useful if you want to know details about the changes, such as the types of settings and who
changed them.
1. Click Change Summary.
2. (Optional) Group By a column name (such as the Type of setting).
3. Close the Change Summary dialog when you finish reviewing the changes.
STEP 4 | Validate the changes before committing to ensure the commit will succeed.
1. Validate Changes.
The results display all the errors and warnings that an actual commit would display.
2. Resolve any errors that the validation results identify.
If you select Commit > Push to Devices, the push scope includes all locations associated
with devices that are out of sync with the Panorama running configuration.
STEP 6 | Validate the changes you will push to device groups or templates.
1. Validate Device Group Push or Validate Template Push.
The results display all the errors and warnings that an actual push operation would display.
2. Resolve any errors that the validation results identify.
STEP 7 | Commit your changes to Panorama and push the changes to devices.
Commit and Push the configuration changes.
See Panorama Commit, Validation, and Preview Operations for more information on
committing configuration changes to Panorama and pushing the changes to managed
devices.
After a commit on a local firewall that runs PAN-OS 5.0 or later, a backup is sent of its running
configuration to Panorama. Any commits performed on the local firewall will trigger the backup, including
commits that an administrator performs locally on the firewall or automatic commits that PAN-OS initiates
(such as an FQDN refresh). By default, Panorama stores up to 100 backups for each firewall, though this is
configurable. To store Panorama and firewall configuration backups on an external host, you can schedule
exports from Panorama or export on demand. You can also import configurations from firewalls into
Panorama device groups and templates to Transition a Firewall to Panorama Management.
• Schedule Export of Configuration Files
• Save and Export Panorama and Firewall Configurations
• Revert Panorama Configuration Changes
• Configure the Maximum Number of Configuration Backups on Panorama
• Load a Configuration Backup on a Managed Firewall
If Panorama has a high availability (HA) configuration, you must perform these instructions
on each peer to ensure the scheduled exports continue after a failover. Panorama does not
synchronize scheduled configuration exports between HA peers.
To export backups on demand, see Save and Export Panorama and Firewall Configurations.
STEP 1 | Select Panorama > Scheduled Config Export and click Add.
STEP 2 | Enter a Name and Description for the scheduled file export and Enable it.
STEP 3 | Using the 24-hour clock format, enter a daily Scheduled Export Start Time or select one from
the drop-down.
If you are configuring a scheduled export to two or more servers, stagger the start time
of the scheduled exports. Scheduling multiple exports at the same start time results in
discrepancies between the exported configurations.
STEP 5 | Enter the details for accessing the server, including: Hostname or IP address, Port, Path for
uploading the file, Username, and Password.
The Path supports the following characters: .(period), +, { and }, /, -, _, 0-9, a-z, and A-Z. Spaces are
not supported in the file Path.
If you are exporting to a BSD server, you will need to modify the SSHD password prompt
to <username>@<hostname> <password>: .
STEP 6 | (SCP only) Click Test SCP server connection. To enable the secure transfer of data, you must
verify and accept the host key of the SCP server. Panorama doesn’t establish the connection
until you accept the host key. If Panorama has an HA configuration, perform this step on each
HA peer so that each one accepts the host key of the SCP server. If Panorama can successfully
connect to the SCP server, it creates and uploads the test file named ssh-export-test.txt.
STEP 8 | Select Commit > Commit to Panorama and Commit your changes.
You don’t have to save a configuration backup to revert the changes made since the last
commit or reboot; just select Config > Revert Changes (see Revert Panorama Configuration
Changes).
Palo Alto Networks recommends that you back up any important configurations to an
external host.
The privileges that control commit operations also control revert operations.
STEP 2 | Select Log Export and Reporting and enter the Number of Versions for Config Backups
(default is 100; range is 1 to 1,048,576).
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
If you are changing settings that are unrelated to the settings other administrators are
changing in concurrent sessions, you don’t need configuration locks to prevent commit
conflicts. Panorama queues commit operations and performs them in the order that
administrators initiate the commits. For details, see Panorama Commit, Validation, and
Preview Operations.
A template or device group configuration push will fail if a firewall assigned to the template or
device group has a commit or config lock that an administrator set locally on that firewall.
Click the locked padlock ( ) at the top of the web interface. The adjacent number indicates the number
of current locks.
• Lock a configuration.
Read-only administrators who cannot modify firewall or Panorama configurations cannot set locks.
1. Click the padlock icon at the top of the web interface.
The icon varies based on whether existing locks are ( ) or are not ( ) set.
2. Take a Lock and select the lock Type:
• Config—Blocks other administrators from changing the candidate configuration.
A custom role administrator who cannot commit changes can set a Config lock and
save the changes to the candidate configuration. However, because that administrator
cannot commit the changes, Panorama does not automatically release the lock after
a commit; the administrator must manually remove the Config lock after making the
required changes.
• Configure Panorama to automatically lock the running configuration when you change the
candidate configuration. This setting applies to all Panorama administrators.
1. Select Panorama > Setup > Management and edit the General Settings.
2. Select Automatically Acquire Commit Lock and click OK.
3. Select Commit > Commit to Panorama and Commit your changes.
STEP 3 | Click the Upload logo icon and select an image for any of the following options: the login
screen, the left corner of the main user interface, the PDF report title page and the PDF report
footer.
STEP 4 | Click Open to add the image. To preview the image, click the preview logo icon.
STEP 5 | (Optional) To clear the green background header on the Panorama web interface, select the
check box for Remove Panorama background header.
STEP 7 | Select Commit > Commit to Panorama and Commit your changes.
STEP 2 | Show the Running (in progress) tasks or All tasks (the default), optionally filter by type
(Reports; Log Requests; or commit, download, and installation Jobs), and select Panorama
(default) or the firewall for which you want to see the tasks.
For details on the log storage options and capacities, see Panorama Models. You can
Expand Log Storage Capacity on the Panorama Virtual Appliance by adding virtual logging
disks or NFS storage. You can Increase Storage on the M-Series Appliance by adding
RAID drives or by upgrading from 1TB drives to 2TB drives.
If you reduce a storage quota such that the current logs exceed it, after you commit the
change, Panorama removes the oldest logs to fit the quota.
1. Select Panorama > Setup > Management and edit the Logging and Reporting Settings.
2. In the Log Storage settings, enter the storage Quota (%) for each log type.
When you change a percentage value, the page refreshes to display the corresponding absolute value
(Quota GB/MB column) based on the total allotted storage on Panorama.
3. Enter the Max Days (expiration period) for each log type (range is 1 to 2,000).
By default, the fields are blank, which means the logs never expire.
Restore Defaults if you want to reset the quotas and expiration periods to the factory
defaults.
STEP 2 | Configure the expiration period for reports that Panorama generates.
1. Select Log Export and Reporting and enter the Report Expiration Period in days (range is 1 to 2,000).
By default, the field is blank, which means reports never expire.
2. Click OK to save your changes.
STEP 3 | Configure the storage quotas and expiration periods for logs of all types (except App Stats logs)
that M-600, M-500, M-200, M-100 appliances, or Panorama virtual appliance in Panorama
mode receives from firewalls.
You configure these storage quotas at the Collector Group level, not for individual Log
Collectors.
1. Select Panorama > Collector Groups and edit the Collector Group.
2. In the General settings, click the Log Storage value.
A value doesn’t display unless you assigned Log Collectors to the Collector Group. If
the field displays 0MB after you assign Log Collectors, verify that you enable the disk
pairs when you Configure a Managed Collector and that you committed the changes
(Panorama > Managed Collectors > Disks).
3. Enter the storage Quota(%) for each log type.
When you change a percentage value, the page refreshes to display the corresponding absolute value
(Quota GB/MB column) based on the total storage allotted to the Collector Group.
4. Enter the Max Days (expiration period) for each log type (range is 1 to 2,000).
By default, the fields are blank, which means the logs never expire.
Restore Defaults if you want to reset the quotas and expiration periods to the factory
defaults.
STEP 4 | Commit the changes to Panorama and push the changes to the Collector Group.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Collector Groups, select the Collector Group you modified, and click OK.
3. Commit and Push your changes.
You can also verify the Collector Group storage quotas by logging in to a Log Collector
CLI and entering the operational command show log-diskquota-pct.
STEP 1 | Select Panorama > Setup > Management and edit the Logging and Reporting Settings.
STEP 2 | Select Log Export and Reporting and set the Report Runtime to an hour in the 24-hour clock
schedule (default is 02:00; range is 00:00 [midnight] to 23:00).
STEP 3 | Select Commit > Commit to Panorama and Commit your changes.
Severity Description
Critical Indicates a failure and the need for immediate attention, such as a hardware failure,
including high availability (HA) failover and link failures.
High Serious issues that will impair the operation of the system, including disconnection
of a Log Collector or a commit failure.
Informational Notification events such as log in or log out, any configuration change,
authentication success and failure notifications, commit success, and all other
events that the other severity levels don’t cover.
Panorama stores the System and Config logs locally; the exact location and storage capacity varies by
Panorama model (see Log and Report Storage). Upon reaching the capacity limit, Panorama deletes the
oldest logs to create space for new logs. If you need to store the logs for longer periods than what the local
storage allows, you can Configure Log Forwarding from Panorama to External Destinations.
For information on using Panorama to monitor firewall logs, see Monitor Network Activity.
You can’t configure an SNMP manager to control Panorama or Log Collectors (using SET
messages); an SNMP manager can only collect statistics (using GET messages).
For details on how Panorama implements SNMP, see SNMP Support.
STEP 1 | Configure the SNMP Manager to get statistics from Panorama and the Log Collectors.
The following steps are an overview of the tasks you perform on the SNMP manager. For the specific
steps, refer to the documentation of your SNMP manager.
1. To enable the SNMP manager to interpret statistics, load the Supported MIBs and, if necessary,
compile them.
2. For each Panorama appliance that the SNMP manager will monitor, define its connection settings (IP
address and port) and authentication settings (SNMPv2c community string or SNMPv3 username and
password). All Panorama appliances use port 161.
The SNMP manager can use the same or different connection and authentication settings for multiple
Panorama management servers and Log Collectors. The settings must match those you define when
you configure SNMP on Panorama (see Configure the Panorama management server to respond to
statistics requests from an SNMP manager. and Configure the Dedicated Log Collectors (if any) to
respond to SNMP requests.). For example, if you use SNMPv2c, the community string you define
when configuring Panorama must match the community string you define in the SNMP manager for
Panorama.
3. Determine the object identifiers (OIDs) of the statistics you will monitor. For example, to monitor the
logging rate, a MIB browser shows that this statistic corresponds to OID 1.3.6.1.4.1.25461.2.3.30.1.1
in PAN-PRODUCT-MIB.my. For details, see Use an SNMP Manager to Explore MIBs and Objects.
4. Configure the SNMP manager to monitor the desired OIDs.
STEP 2 | Enable SNMP traffic on the management (MGT) interface of the Panorama management
server.
1. Select Panorama > Setup > Management and edit the Management Interface Settings.
2. In the Services section, select the SNMP check box and click OK.
STEP 3 | Enable SNMP traffic on the management (MGT) interface of any M-Series appliances in Log
Collector mode:
1. Select Panorama > Managed Collectors and select the Log Collector.
2. Select the Management tab, select the SNMP check box, and click OK.
STEP 4 | Configure the Panorama management server to respond to statistics requests from an SNMP
manager.
1. Select Panorama > Setup > Operations and, in the Miscellaneous section, click SNMP Setup.
2. Select the SNMP Version and configure the authentication values as follows. For version details, see
SNMP Support.
Don’t use the default community string public; it is well known and therefore not
secure.
• V3—Create at least one SNMP view group and one user. User accounts and views provide
authentication, privacy, and access control when SNMP managers get statistics.
Views—Each view is a paired OID and bitwise mask: the OID specifies a MIB, and the mask (in
hexadecimal format) specifies which objects are accessible inside (include matching) or outside
(exclude matching) that MIB. Click Add in the first list and enter a Name for the group of views.
For each view in the group, click Add and configure the view Name, OID, matching Option
(include or exclude), and Mask.
Users—Click Add in the second list, enter a username in the Users column, select the View group
from the drop-down, enter the authentication password (Auth Password) used to authenticate
to the SNMP manager, and enter the privacy password (Priv Password) used to encrypt SNMP
messages to the SNMP manager.
3. Click OK to save the settings.
STEP 5 | Configure the Dedicated Log Collectors (if any) to respond to SNMP requests.
For each Collector Group:
1. Select Panorama > Collector Groups and select the Collector Group.
2. Select the Monitoring tab, configure the same settings as in Step Configure the Panorama
management server to respond to statistics requests from an SNMP manager., and click OK.
STEP 6 | Commit the changes to Panorama and push the changes to Collector Groups.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Collector Groups you, select the Collector Groups you edited, and click OK.
3. Commit and Push your changes.
STEP 7 | Monitor the Panorama and Log Collector statistics in an SNMP manager.
Refer to the documentation of your SNMP manager.
STEP 2 | In the Device Operations section, select Reboot Panorama or Shutdown Panorama.
419
420 PANORAMA ADMINISTRATOR'S GUIDE | Panorama Plugins
© 2020 Palo Alto Networks, Inc.
About Panorama Plugins
Panorama supports an extensible plugin architecture that enables the integration and configuration of the
following capabilities:
• AWS—The AWS plugin enables you to monitor your EC2 workloads on AWS. With the plugin, you
can enable communication between Panorama (running PAN-OS 8.1.3 or a later release) and your
AWS VPCs so that Panorama can collect a predefined set of attributes (or metadata elements) as tags
for your EC2 instances and register the information to your Palo Alto Networks firewalls. When you
reference these tags in Dynamic Address Groups and match against them in Security policy rules, you
can consistently enforce policy across all assets deployed within your VPCs.
• Azure—The Azure plugin enables you to monitor your virtual machines on the Azure public cloud.
With the plugin, you can enable communication between Panorama (running PAN-OS 8.1.6 or a later
release) and your Azure subscriptions so that Panorama can collect a predefined set of attributes (or
metadata elements) as tags for your Azure virtual machines and register the information to your Palo
Alto Networks firewalls. When you reference these tags in Dynamic Address Groups and match against
them in Security policy rules, you can consistently enforce policy across all assets deployed within VNets
in your subscriptions.
• Cisco ACI—The Cisco ACI plugin enables you to monitor endpoints in your Cisco ACI fabric. With
the plugin, you enable communication between Panorama (8.1.6 and later) and your Cisco APIC so
that Panorama can collect endpoint information as tags for your Endpoint Groups and register the
information to you Palo Alto Networks firewalls. When you reference these tags in Dynamic Address
Groups and match against them in Security policy rules, you can consistently enforce policy across all
assets deployed within your Cisco ACI fabric.
• Cisco TrustSec—The Cisco TrustSec Plugin enables monitoring of endpoints in your Cisco TrustSec
environment. With the plugin, you enable communication between Panorama and your Cisco pxGrid
server so that Panorama can collect endpoint information as tags for your enpoints and register the
information to you Palo Alto Networks firewalls. When you reference these tags in Dynamic Address
Groups and match against them in security policy rules, you can consistently enforce policy across all
assets deployed within your Cisco TrustSec environment.
• Cloud Services—The Cloud Services plugin enables the use of the Cortex Data Lake and Prisma Access.
The Cortex Data Lake solves operational logging challenges and the Prisma Access cloud service extends
your security infrastructure to your remote network locations and mobile workforce.
• GCP—Enables you to secure Kubernetes services in a Google Kubernetes Engine (GKE) cluster.
Configure the Panorama plugin for Google Cloud Platform (GCP) to connect to your GKE cluster and
learn about the services that are exposed to the internet.
• Nutanix—The Panorama plugin for Nutanix enables VM monitoring in your Nutanix environment.
It allows you to track the virtual machine inventory within your Nutanix Prism Central so that you
can consistently enforce security policy that automatically adapts to changes within your Nutanix
environment. As virtual machines are provisioned, de-provisioned or moved, this solution allows you to
collect the IP addresses and associated sets of attributes (or metadata elements) as tags. You can then
use the tags to define Dynamic Address Groups and use them in Security policy. The Panorama plugin
for Nutanix requires Panorama 9.0.4 or later.
• Interconnect—The Interconnect plugin enables you to Manage Large-Scale Firewall Deployments. Use
the Interconnect plugin to set up a two-tier Panorama deployment (on Panorama running PAN-OS 8.1.3
or a later release) for a horizontal scale-out architecture. With the Interconnect plugin, you can deploy
a Panorama Controller with up to 64 Panorama Nodes or 32 Panorama HA pairs to centrally manage a
large number of firewalls.
• VMware NSX—The VMware NSX plugin enables integration between the VM-Series firewall on VMware
NSX with VMware NSX Manager. This integration allows you to deploy the VM-Series firewall as a
service on a cluster of ESXi servers.
If you have a version of a plugin currently installed and you Install a new version of the
plugin, Panorama replaces the currently installed version.
When installing the plugin for the first time on a Panorama HA pair, install the plugin on
the passive peer before the active peer. On installing the plugin on the passive peer, it
transitions to a non-functional state. Then, after you successfully install the plugin on the
active peer, the passive peer returns to a functional state.
The VM-Series plugin supports all clouds, so an upgrade might not apply to your VM-Series
firewalls. Before upgrading the plugin, consult the release notes. Update the plugin only
when there are changes relevant to your cloud.
STEP 4 | (Optional) On the VM-Series firewall, select Device > VM-Series. If you have configured
the integration for your platform, you see a single tab for the cloud in which the firewall is
deployed. If you have not configured an integration, you see the default message about the
VM-Series plugin infrastructure.
425
426 PANORAMA ADMINISTRATOR'S GUIDE | Troubleshooting
© 2020 Palo Alto Networks, Inc.
Troubleshoot Panorama System Issues
• Generate Diagnostic Files for Panorama
• Diagnose Panorama Suspended State
• Monitor the File System Integrity Check
• Manage Panorama Storage for Software and Content Updates
• Recover from Split Brain in Panorama HA Deployments
STEP 1 | Select Panorama > Support and click Generate Tech Support File.
STEP 3 | Upload the file to your case on the Palo Alto Networks Customer Support web site.
Panorama and Panorama 28769 and 28260 and 28260 and For HA connectivity and
(HA) 28260 28769 28769 synchronization if encryption
(5.1) is not enabled.
Panorama and Log Collector 3978 3978 3978 For management and log
collection/reporting.
Direction: Initiated by the
Log Collector Used for communication
between the local Log
Collector on a Panorama
in Panorama mode, and for
communicating with Log
Collectors in a distributed log
collection deployment.
Log Collector to Log 49190 28270 28270 For distributing blocks and
Collector all binary data between Log
Collectors.
Direction: Each Log Collector
initiates a connection to the
other Log Collectors in the
Collector Group
STEP 2 | Commit the changes to Panorama and push the changes to the Collector Group.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Collector Groups, select the Collector Group you modified, and click OK.
3. Commit and Push your changes.
STEP 3 | Verify the state of the Log Collectors and disk pairs.
1. Select Panorama > Managed Collectors and verify that the configuration of each Log Collector is
synchronized with Panorama.
The Configuration Status column should display In Sync and the Run Time Status column should
display connected.
2. Click Statistics in the last column for each Log Collector and verify that the disk pairs are Enabled and
Available.
On the Panorama virtual appliance in Legacy mode, you will lose the logs on the existing
disk when you replace it. For the options to preserve existing logs, see Preserve Existing
Logs When Adding Storage on Panorama Virtual Appliance in Legacy Mode.
On the Panorama virtual appliance in Legacy mode, you will lose the logs on the existing
disk when you replace it. For the options to preserve existing logs, see Preserve Existing
Logs When Adding Storage on Panorama Virtual Appliance in Legacy Mode.
Migrating logs by removing the logging disks from any M-Series appliance and loading them
into an M-600 Panorama management server is not supported. To migrate to an M-600
appliance, set up the M-600 appliance, configure log forwarding to the new M-600 appliance
and configure the M-Series appliance as a managed Log Collector until you no longer needed
access to the logs stored on the M-Series appliance.
STEP 1 | Perform initial setup of the new M-Series appliance that will be a Dedicated Log Collector.
1. Rack mount the M-Series appliance. Refer to the M-Series Appliance Hardware Reference Guides for
instructions.
2. Perform Initial Configuration of the M-Series Appliance.
If you see a CMS Login prompt, press Enter without typing a username or
password.
8. Use the Log Collector CLI to enable connectivity between the Log Collector and Panorama
management server. <IPaddress1 is for the MGT interface of the primary Panorama and
<IPaddress2> is for the MGT interface of the secondary Panorama.
> configure
# set deviceconfig system panorama-server <IPaddress1> panorama-
server-2 <IPaddress2>
# commit
# exit
STEP 2 | On the Panorama management server, add the new Log Collector as a managed collector.
For all steps with commands that require a serial number, you must type the entire serial
number; pressing the Tab key won’t complete a partial serial number.
1. Configure the Log Collector as a managed collector using the Panorama web interface or using the
following CLI commands:
> configure
# set log-collector <LC_serial_number> deviceconfig system
hostname <LC_hostname>
# exit
If the old Log Collector used interfaces other than the MGT interface for log collection
and Collector Group communication, you must define those interfaces on the new
Log Collector when you configure it as a managed collector (Panorama > Managed
Collectors > Interfaces).
2. Verify that the Log Collector is connected to Panorama and that the status of its disk pairs is present/
available.
The disk pairs will display as disabled at this stage of the restoration process.
3. Commit your changes to Panorama. Don’t commit the changes to the Collector Group just yet.
> configure
# commit
# exit
STEP 3 | Remove the RAID disks from the old Log Collector.
1. Power off the old Log Collector by pressing the Power button until the system shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-Series Appliance
Hardware Reference Guides.
Generating the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long time to complete. To expedite the process,
you can launch multiple CLI sessions and run the metadata regeneration command in
each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Insert the disks into the new Log Collector. For details, refer to the disk replacement procedure in the
M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompatible with those of the M-500
appliance. Therefore, when migrating between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserting the disk in the new appliance.
You must maintain the disk pair association. Although you can place a disk pair from slot A1/A2 on
the old appliance into slot B1/B2 on the new appliance, you must keep the disks together in the same
slot; otherwise, Panorama might not restore the data successfully.
2. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk pair
with the new Log Collector. The no-format argument prevents reformatting of the drives and
retains the logs stored on the disks.
3. Generate the metadata for each disk pair.
For example:
From this point, only commits that are required to complete the migration process on
Panorama and the Log Collectors. Hold off making any other changes.
You must use the Panorama CLI for this step, not the web interface.
> configure
# set log-collector-group <collector_group_name> logfwd-setting
collectors <new_LC_serial_number>
# commit
# exit
2. For each disk pair, migrate the logs from the old Log Collector to the new Log Collector and attach
the disk pair to the new Log Collector.
For example:
You cannot use the CLI change the priority assignments of firewall preference lists.
> configure
# delete log-collector-group <group_name> logfwd-setting
collectors <old_LC_serial_number>
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the existing RSA keys and allows Panorama to create new RSA keys.
STEP 9 | Confirm that SearchEngine Status is Active for all Log Collectors in the Collector Group.
Do not continue until SearchEngine Status is Active for all Log Collectors in the Collector
Group. This will result in purging of logs from the Log Collector being replaced.
Alternatively, you can run the following command on each Dedicated Log Collector:
STEP 10 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number so that
the new Log Collector will not run in to purging issues, resulting in the Log Collector being unable to
purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
Migrating logs by removing the logging disks from any M-Series appliance and loading them
into an M-600 Panorama management server is not supported. To migrate to an M-600
appliance, set up the M-600 appliance, configure log forwarding to the new M-600 appliance
and configure the M-Series appliance as a managed Log Collector until you no longer needed
access to the logs stored on the M-Series appliance.
This migration procedure covers the following scenarios where you are replacing a single M-Series
appliance, not in a HA configuration, with a managed collector (Log Collector) in a Collector Group.
STEP 1 | Forward any logs on the SSD of the old M-Series appliance to an external destination if you
want to preserve them.
The SSD stores the System and Config logs that Panorama and Log Collectors generate. You cannot
move the SSD between M-Series appliances.
Configure Log Forwarding from Panorama to External Destinations.
STEP 2 | Export the Panorama configuration from the decommissioned M-Series appliance in Panorama
mode.
1. Log in to the Panorama appliance and select Panorama > Setup > Operations.
2. Click Save named Panorama configuration snapshot, enter a Name to identify the configuration, and
click OK.
3. Click Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, and click OK. Panorama exports the configuration to your client system as an XML file.
STEP 3 | Remove the RAID disks from the old M-Series appliance.
1. Power off the old M-Series appliance by pressing the Power button until the system shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-Series Appliance
Hardware Reference Guides.
STEP 5 | Load the Panorama configuration snapshot that you exported from the decommissioned M-
Series appliance into the new M-Series appliance in Panorama mode.
1. Log in to the Panorama Web Interface of the new M-Series appliance and select Panorama > Setup >
Operations.
2. Click Import named Panorama configuration snapshot, Browse to the configuration file you exported
from the decommissioned M-Series appliance, and click OK.
3. Click Load named Panorama configuration snapshot, select the Name of the configuration you just
imported, select a Decryption Key (the master key for Panorama), and click OK. Panorama overwrites
its current candidate configuration with the loaded configuration. Panorama displays any errors that
occur when loading the configuration file. If errors occurred, save them to a local file. Resolve each
error to ensure the migrated configuration is valid.
To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load the
named Panorama configuration snapshot. If you do not select this option, Panorama
removes all previous rule UUIDs from the configuration snapshot and assigns
new UUIDs to the rules on Panorama, which means it does not retain information
associated with the previous UUIDs, such as the policy rule hit count.
4. Perform any additional configuration changes as needed.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collection), you must define those interfaces on the
new M-Series appliance (Panorama > Setup > Interfaces).
5. Select Commit > Commit to Panorama and Validate Commit. Resolve any errors before proceeding.
6. Commit your changes to the Panorama configuration.
STEP 6 | Insert the disks into the new M-Series appliance. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompatible with those of the M-500
appliance. Therefore, when migrating between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserting the disk in the new appliance.
You must maintain the disk pair association. Although you can place a disk pair from slot A1/A2 on the
old appliance into slot B1/B2 on the new appliance, you must keep the disks together in the same slot;
otherwise, Panorama might not restore the data successfully.
STEP 7 | Contact Palo Alto Networks Customer Support to copy log collector group metadata from the
decommissioned M-Series appliance to the new M-Series appliance and restart the mgmtsrvr
process.
STEP 8 | If the M-Series appliance was part of a Collector Group, verify that the decommissioned M-
Series appliance serial number is still part of the correct Collector Group:
debug log-collector-group show name <Log Collector Group name>
Generating the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long time to complete. To expedite the process,
you can launch multiple CLI sessions and run the metadata regeneration command in
each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Insert the disks into the new M-Series appliance. For details, refer to the disk replacement procedure
in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompatible with those of the M-500
appliance. Therefore, when migrating between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserting the disk in the new appliance.
You must maintain the disk pair association. Although you can place a disk pair from slot A1/A2 on
the old appliance into slot B1/B2 on the new appliance, you must keep the disks together in the same
slot; otherwise, Panorama might not restore the data successfully.
2. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk pair with
the new appliance. The no-format argument prevents reformatting of the drives and retains the logs
stored on the disks.
3. Generate the metadata for each disk pair.
This step may take up to 6 hours depending on the volume of log data on the disks.
For example:
STEP 10 | Configure the local Log Collector on the new M-Series appliance.
For all steps with commands that require a serial number, you must type the entire serial
number; pressing the Tab key won’t complete a partial serial number.
admin> configure
admin# set log-collector <log-collector_SN> deviceconfig system
hostname <log-collector-hostname>
admin# exit
2. Verify that the local Log Collector is connected to Panorama and that the status of its disk pairs is
present/available.
The disk pairs will display as disabled at this stage of the restoration process.
3. Commit your changes to Panorama. Don’t commit the changes to the Collector Group just yet.
admin> configure
admin# commit
From this point, only commits that are required to complete the migration process on
Panorama and the Log Collectors. Hold off making any other changes.
admin> configure
admin# commit force
The old local Log Collector still appears in the list of members, because you haven’t deleted it from
the configuration.
3. For each disk pair, migrate the logs to the new appliance.
For example:
admin> configure
admin# commit
You cannot use the CLI change the priority assignments of firewall preference lists.
For example:
For example:
STEP 15 | Confirm that SearchEngine Status is Active for all Log Collectors in the Collector Group.
Do not continue until SearchEngine Status is Active for all Log Collectors in the Collector
Group. This will result in purging of logs from the Log Collector being replaced.
Alternatively, you can run the following command on each Dedicated Log Collector:
STEP 16 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number so that
the new Log Collector will not run in to purging issues, resulting in the Log Collector being unable to
purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-serial-number>
to <new-log-collector-serial-number>
Migrating logs by removing the logging disks from any M-Series appliance and loading them
into an M-600 Panorama management server is not supported. To migrate to an M-600
appliance, set up the M-600 appliance, configure log forwarding to the new M-600 appliance
and configure the M-Series appliance as a managed Log Collector until you no longer needed
access to the logs stored on the M-Series appliance.
• Both Panorama HA peers have managed collectors that belong to a single Collector Group. For details,
see Multiple Local Log Collectors Per Collector Group.
• Both Panorama HA peers have a managed collector and each is assigned to a separate Collector Group.
For details, see Single Local Log Collector Per Collector Group.
STEP 1 | Forward any logs on the SSD of the old M-Series appliance to an external destination if you
want to preserve them.
STEP 2 | Export the Panorama configuration from the Primary decommissioned M-Series appliance in
Panorama mode.
1. Log in to the Panorama Web Interface of the M-Series appliance you are replacing and select
Panorama > Setup > Operations.
2. Click Save named Panorama configuration snapshot, enter a Name to identify the configuration, and
click OK.
3. Click Export named Panorama configuration snapshot, select the Name of the configuration you just
saved, and click OK. Panorama exports the configuration to your client system as an XML file.
STEP 3 | Remove the RAID disks from the old M-Series appliance.
1. Power off the old M-Series appliance by pressing the Power button until the system shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-Series Appliance
Hardware Reference Guides.
STEP 5 | Load the Panorama configuration snapshot that you exported from the Primary
decommissioned M-Series appliance into the new Primary M-Series appliance in Panorama
mode.
1. Log in to the Panorama Web Interface of the new M-Series appliance and select Panorama > Setup >
Operations.
2. Click Import named Panorama configuration snapshot, Browse to the configuration file you exported
from the decommissioned M-Series appliance, and click OK.
3. Click Load named Panorama configuration snapshot, select the Name of the configuration you just
imported, select a Decryption Key (the master key for Panorama), and click OK. Panorama overwrites
its current candidate configuration with the loaded configuration. Panorama displays any errors that
To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load the
named Panorama configuration snapshot. If you do not select this option, Panorama
removes all previous rule UUIDs from the configuration snapshot and assigns
new UUIDs to the rules on Panorama, which means it does not retain information
associated with the previous UUIDs, such as the policy rule hit count.
4. Perform any additional configuration changes as needed.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collection), you must define those interfaces on the
new M-Series appliance (Panorama > Setup > Interfaces).
5. Select Commit > Commit to Panorama and Validate Commit. Resolve any errors before proceeding.
6. Commit your changes to the Panorama configuration. Once committed, the Panorama configuration
is synced across the HA peers.
STEP 6 | Insert the disks into the new M-Series appliance. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
Repeat this step for each of the new M-Series appliances in the HA configuration.
The disk carriers of the M-100 appliance are incompatible with those of the M-500
appliance. Therefore, when migrating between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserting the disk in the new appliance.
You must maintain the disk pair association. Although you can place a disk pair from slot A1/A2 on the
old appliance into slot B1/B2 on the new appliance, you must keep the disks together in the same slot;
otherwise, Panorama might not restore the data successfully.
STEP 7 | Contact Palo Alto Networks Customer Support to copy log collector group metadata from the
decommissioned M-Series appliance to the new M-Series appliance and restart the mgmtsrvr
process.
STEP 8 | If the M-Series appliance was part of a Collector Group, verify that the decommissioned M-
Series appliance serial number is still part of the correct Collector Group:
debug log-collector-group show name <Log CollectorGroup name>
If the decommissioned M-Series appliance serial number is no longer a part of the correct Collector
Group, then the Tech Support folders were incorrectly copied in the previous step. Contact Palo Alto
Networks Customer Support again to copy the Tech Support folders to the correct location.
Generating the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long time to complete. To expedite the process,
you can launch multiple CLI sessions and run the metadata regeneration command in
each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Enable the disk pairs by running the following CLI command for each pair:
The force and no-format arguments are required. The force argument associates the disk pair with
the new appliance. The no-format argument prevents reformatting of the drives and retains the logs
stored on the disks.
2. Generate the metadata for each disk pair.
This step may take up to 6 hours depending on the volume of log data on the disks.
For example:
STEP 10 | Configure the local Log Collector on the new M-Series appliance.
For all steps with commands that require a serial number, you must type the entire serial
number; pressing the Tab key won’t complete a partial serial number.
Don’t enable the disks on the new M-Series appliance at this point. When you successfully migrate the
logs, Panorama automatically enables the disks.
1. Configure the local Log Collector as a managed collector using the Panorama web interface or using
the following CLI commands:
admin> configure
admin# set log-collector <log-collector_SN> deviceconfig system
hostname <log-collector-hostname>
admin# exit
2. Commit your changes to Panorama. Don’t commit the changes to the Collector Group just yet.
admin> configure
admin# commit
3. Verify that the local Log Collector is connected to Panorama and that the status of its disk pairs is
present/available.
The disk pairs will display as disabled at this stage of the restoration process.
From this point, only commits that are required to complete the migration process on
Panorama and the Log Collectors. Hold off making any other changes.
admin> configure
admin# commit force
The old local Log Collector still appears in the list of members, because you haven’t deleted it from
the configuration.
3. For each disk pair, migrate the logs to the new appliance.
For example:
admin> configure
admin# commit
You cannot use the CLI change the priority assignments of firewall preference lists.
For example:
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the existing RSA keys and allows Panorama to create new RSA keys.
STEP 15 | Confirm that SearchEngine Status is Active for all Log Collectors in the Collector Group.
Do not continue until SearchEngine Status is Active for all Log Collectors in the Collector
Group. This will result in purging of logs from the Log Collector being replaced.
Alternatively, you can run the following command on each Dedicated Log Collector:
STEP 16 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number so that
the new Log Collector will not run in to purging issues, resulting in the Log Collector being unable to
purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-serial-number>
to <new-log-collector-serial-number>
• Both Panorama HA peers have managed collectors that belong to a single Collector Group. For details,
see Multiple Local Log Collectors Per Collector Group.
• Both Panorama HA peers have a managed collector and each is assigned to a separate Collector Group.
For details, see Single Local Log Collector Per Collector Group.
STEP 1 | Forward any logs on the SSD of the old M-Series appliance to an external destination if you
want to preserve them.
The SSD stores the System and Config logs that Panorama and Log Collectors generate. You cannot
move the SSD between M-Series appliances.
Configure Log Forwarding from Panorama to External Destinations.
STEP 2 | Remove the RAID disks from the old M-Series appliance.
1. Power off the old M-Series appliance by pressing the Power button until the system shuts down.
2. Remove the disk pairs. For details, refer to the disk replacement procedure in the M-Series Appliance
Hardware Reference Guides.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collection), you must define those interfaces during
initial configuration of the new M-Series appliance (Panorama > Setup > Interfaces).
3. Register Panorama.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collection), you must define those interfaces on the
new M-Series appliance (Panorama > Setup > Interfaces).
8. Set Up HA on Panorama. The new M-Series appliance must have the same priority as the HA peer
you are replacing.
STEP 4 | Insert the disks into the new M-Series appliance. For details, refer to the disk replacement
procedure in the M-Series Appliance Hardware Reference Guides.
The disk carriers of the M-100 appliance are incompatible with those of the M-500
appliance. Therefore, when migrating between these hardware models, you must
unscrew each disk from its old carrier and insert the disk in the new carrier before
inserting the disk in the new appliance.
You must maintain the disk pair association. Although you can place a disk pair from slot A1/A2 on the
old appliance into slot B1/B2 on the new appliance, you must keep the disks together in the same slot;
otherwise, Panorama might not restore the data successfully.
STEP 5 | If the M-Series appliance was part of a Collector Group, verify that the decommissioned M-
Series appliance serial number is still part of the correct Collector Group:
debug log-collector-group show name <Log CollectorGroup name>
Generating the metadata for each disk pair rebuilds the indexes. Therefore, depending
on the data size, this process can take a long time to complete. To expedite the process,
you can launch multiple CLI sessions and run the metadata regeneration command in
each session to complete the process simultaneously for every pair. For details, see
Regenerate Metadata for M-Series Appliance RAID Pairs.
1. Enable the disk pairs by running the following CLI command for each pair:
For example:
The force and no-format arguments are required. The force argument associates the disk pair with
the new appliance. The no-format argument prevents reformatting of the drives and retains the logs
stored on the disks.
2. Generate the metadata for each disk pair.
For example:
STEP 7 | Configure the local Log Collector on the new M-Series appliance.
For all steps with commands that require a serial number, you must type the entire serial
number; pressing the Tab key won’t complete a partial serial number.
Don’t enable the disks on the new M-Series appliance at this point. When you successfully migrate the
logs, Panorama automatically enables the disks.
1. Configure the local Log Collector as a managed collector using the Panorama web interface or using
the following CLI commands:
admin> configure
admin# set log-collector <log-collector_SN> deviceconfig system
hostname <log-collector-hostname>
admin# exit
2. Commit your changes to Panorama. Don’t commit the changes to the Collector Group just yet.
admin> configure
admin# commit
3. Verify that the local Log Collector is connected to Panorama and that the status of its disk pairs is
present/available.
The disk pairs will display as disabled at this stage of the restoration process.
From this point, only commits that are required to complete the migration process on
Panorama and the Log Collectors. Hold off making any other changes.
admin> configure
admin# commit force
The old local Log Collector still appears in the list of members, because you haven’t deleted it from
the configuration.
3. For each disk pair, migrate the logs to the new appliance.
For example:
admin> configure
admin# commit
You cannot use the CLI change the priority assignments of firewall preference lists.
For example:
For example:
This command is required in order to add the new Log Collector to the Collector Group
and should only be run for the Collector Group of the Log Collector being replaced. This
step deletes the existing RSA keys and allows Panorama to create new RSA keys.
STEP 12 | Confirm that SearchEngine Status is Active for all Log Collectors in the Collector Group.
Do not continue until SearchEngine Status is Active for all Log Collectors in the Collector
Group. This will result in purging of logs from the Log Collector being replaced.
Alternatively, you can run the following command on each Dedicated Log Collector:
STEP 13 | On the new Log Collector, replace previous Log Collector serial number with the new Log
Collector serial number.
You must replace the old Log Collector serial number with the new Log Collector serial number so that
the new Log Collector will not run in to purging issues, resulting in the Log Collector being unable to
purge old data from the migrated logs when necessary.
1. Access the Log Collector CLI.
2. Replace old Log Collector serial number with new Log Collector serial number:
request log-migration-update-logger from <old-log-collector-serial-number>
to <new-log-collector-serial-number>
Panorama maintains a ring file that maps the segments and partitions that Dedicated Log Collectors use
to store logs. An M-Series appliance in Panorama mode stores the ring file on its internal SSD; a Panorama
virtual appliance stores the ring file on its internal disk. When a system failure occurs, a non-HA Panorama
cannot automatically recover the ring file. Therefore, when you replace Panorama, you must restore the ring
file to access the logs on the Dedicated Log Collectors.
If the old M-Series appliance used interfaces other than the MGT interface for
Panorama services (such as log collection), you must define those interfaces during
initial configuration of the new M-Series appliance (Panorama > Setup > Interfaces).
The Panorama virtual appliance does not support interfaces other than MGT.
3. Register Panorama.
4. Transfer licenses as follows only if the new Panorama appliance is the same model as the old
appliance. Otherwise, you must purchase new licenses.
1. Log in to the Palo Alto Networks Customer Support web site.
2. Select the Assets tab and click the Spares link.
3. Click the Serial Number of the new M-Series appliance.
4. Click Transfer Licenses.
5. Select the old appliance and click Submit.
5. Activate a Panorama Support License.
6. Activate a firewall management license.
7. Install Content and Software Updates for Panorama.
The M-500 appliance requires Panorama 7.0 or a later release. M-200 and M-600
appliances require Panorama 8.1. For important details about software versions, see
Panorama, Log Collector, Firewall, and WildFire Version Compatibility.
STEP 2 | Restore the configuration from the old Panorama to the replacement Panorama.
1. Log in to the new Panorama and select Panorama > Setup > Operations.
2. Click Import named Panorama configuration snapshot, Browse to the backup configuration file, and
click OK.
3. Click Load named Panorama configuration snapshot, select the Name of the file you just imported,
and click OK.
To replace an RMA Panorama, make sure you Retain Rule UUIDs when you load the
named Panorama configuration snapshot. If you do not select this option, Panorama
removes all previous rule UUIDs from the configuration snapshot and assigns
new UUIDs to the rules on Panorama, which means it does not retain information
associated with the previous UUIDs, such as the policy rule hit count.
4. Select Commit > Commit to Panorama and Commit your changes.
5. Select Panorama > Managed Collectors and verify that the Connected column displays a check mark
for the Dedicated Log Collector.
STEP 3 | Reconfigure the Dedicated Log Collector and Collector Group if they are missing on Panorama.
1. Access the CLI of the Dedicated Log Collector and enter the following commands to display the name
of its Collector Group.
1. Enter the command:
In this example, the error message indicates that the missing Collector Group has the name CA-
Collector-Group.
2. Configure the Collector Group and assign the Dedicated Log Collector to it.
> configure
# set log-collector-group <collector-group-name>
# set log-collector-group <collector-group-name> logfwd-setting
collector <serial-number>
3. Commit the changes to Panorama but not to the Collector Group.
# commit
# exit
STEP 4 | Fetch the ring file to restore access to the logs stored on the Dedicated Log Collector.
1. Access the CLI of the new Panorama.
2. Fetch the ring file:
For example:
For example:
The size of the RAID disks determines how long metadata regeneration takes. On average, it takes an
hour for every 100GB. When you run the command, the CLI session is locked until the command is fully
executed. You can use multiple CLI sessions to save time. For example, to replace four RAID pairs of 1TB
drives with a total of 4TB of log data, launch four CLI sessions and run the command in each session to
regenerate metadata simultaneously for all the pairs/slots in about 10 hours.
During metadata regeneration, the Collector Group to which these disks belong is not available and the
disk pair is not available for any logging or reporting operations (writes/queries). However, you can perform
other tasks such as handling new firewall connections or managing configuration changes on the managed
firewalls. All other Collector Groups that Panorama manages and that aren’t part of this RMA process can
perform the assigned logging and reporting functionality as normal.
In an LSVPN setup, the partial device state bundle that you generate on Panorama is not
the same as the version that you export from a firewall (by selecting Device > Setup >
Operations and clicking Export device state). If you manually ran the device state export
or scheduled an XML API script to export the file to a remote server, you can use the
exported device state in your firewall replacement workflow.
If you did not export the device state, the device state that you generate in the
replacement workflow will not include the dynamic configuration information, such as
the certificate details and registered firewalls, that is required to restore the complete
configuration of a firewall functioning as an LSVPN portal. See Before Starting RMA
Firewall Replacement for more information.
Panorama does not store the device state; you generate it on request using the CLI commands listed in
Restore the Firewall Configuration after Replacement.
STEP 1 | Perform initial configuration on the new firewall and verify network connectivity.
Use a serial port connection or a Secure Shell (SSH) connection to add an IP address, a DNS server IP
address, and to verify that the new firewall can access the Palo Alto Networks updates server.
STEP 2 | (Optional) Set the Operational mode on the new firewall to match that on the old firewall.
A serial port connection is required for this task.
STEP 4 | (Optional) Match the operational state of the new firewall with that of the old firewall. For
example, enable multi-virtual system (multi-vsys) capability for a firewall that was enabled for
multi-vsys capability.
Enter the commands that pertain to your firewall settings:
STEP 6 | Go to the Panorama CLI and export the device state bundle from the old firewall to a computer
using Secure Copy (SCP) or TFTP (you cannot do this from the web interface).
If you manually exported the device state from the firewall, you can skip this step.
The export command generates the device state bundle as a tar zipped file and exports it to the
specified location. This device state will not include the LSVPN dynamic configuration (satellite
information and certificate details).
Enter one of the following commands:
or
STEP 7 | Replace the serial number of the old firewall with that of the new replacement firewall on
Panorama.
By replacing the serial number on Panorama you allow the new firewall to connect to Panorama after
you restore the configuration on the firewall.
1. Enter the following command in Operational mode:
> configure
# commit
3. Exit Configuration mode.
# exit
STEP 8 | On the new firewall, import the device state and commit the changes.
1. Access the web interface of the new firewall.
2. Select Device > Setup > Operations and click the Import Device State link in the Configuration
Management section.
3. Browse to locate the file and click OK.
4. Commit your changes to the running configuration on the firewall.
STEP 9 | From Panorama, verify that you successfully restored the firewall configuration.
1. Access the Panorama web interface and select Panorama > Managed Devices.
2. Verify that the Connected column for the new firewall has a check mark.
If you need to generate reports for a period when the old firewall was still functional
after you installed the new firewall, you must generate a separate query for each
firewall serial number because replacing the serial number on Panorama does not
overwrite the information in logs.
Template or device The ability to receive template and Access the firewall web interface,
group push failure device groups configuration changes select Device > Setup, edit the
from Panorama is disabled on the Panorama Settings, and then click
firewall. Enable Device and Network Template
and Enable Panorama Policy and
Objects.
Panorama commit The Panorama management server Upgrade the Panorama management
failure or template, has an earlier software version than server to the same or a higher
device group, or the Dedicated Log Collectors or software version than the managed
Collector Group push firewalls that it manages. firewalls, Log Collectors, and WildFire
failure appliances and appliance clusters. For
details, see Panorama, Log Collector,
Firewall, and WildFire Version
Compatibility.
STEP 1 | Record the Panorama serial number from the order fulfillment email that Palo Alto Networks
sent when you placed your order for Panorama.
STEP 2 | Select Panorama > Setup > Management and edit the General Settings.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
If the number of firewalls managed by the Panorama virtual appliance exceeds the device management
license limit, the following alerts appears each time you log in to the Panorama web interface:
STEP 1 | Contact your Palo Alto Networks sales representative or your authorized reseller to purchase
the appropriate device management license.
STEP 3 | Activate/Retrieve a device management license based on whether the Panorama virtual
appliance is online or offline.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is Internet-
connected.
• Activate/Retrieve a Firewall Management License when the Panorama Virtual Appliance is not
Internet-connected.
STEP 1 | Log in to the Panorama CLI and disable load balancing for content updates:
STEP 3 | Select Panorama > Device Deployment > Dynamic Updates and Install the dynamic update.
STEP 4 | Select the managed devices that failed content update and click OK.
STEP 5 | Verify that the content update was successfully pushed to the selected managed devices.
STEP 2 | Select Panorama > Managed Devices > Troubleshooting to perform a policy match.
You may also run a policy match test from the Policies tab.
STEP 3 | Enter the required information to perform the policy match test. In this example, a Security
policy match test is run.
1. Select Security Policy Match from the Select Test drop-down.
2. Select device/VSYS and select the managed firewalls to test.
3. Enter the Source IP address from which traffic originated.
4. Enter the Destination IP address of the target device for the traffic.
5. Enter the Protocol IP used for the traffic.
6. If necessary, enter any additional information relevant for your Security policy rule testing.
STEP 5 | Select the Security policy match Results to review the policy rules that match the test criteria.
The Ping connectivity test is only supported for firewalls running PAN-OS 9.0 (or later
release).
STEP 2 | Select Panorama > Managed Devices > Troubleshooting to perform a connectivity test.
You may also run a policy match test from the Policies tab.
STEP 3 | Enter the required information to perform the connectivity test. In this example, a Log
Collector Connectivity test is run.
1. Select Log Collector Connectivity from the Select Test drop-down.
2. Select device/VSYS and select the managed firewalls to test.
3. If necessary, enter any additional information relevant for your connectivity testing.
STEP 5 | Select the log collector connectivity Results to review the Log Collector connectivity status for
the selected devices.
Review the Palo Alto Networks Compatibility Matrix to confirm that the firewalls and
appliances you intend to downgrade are compatible with the PAN-OS release to which you
intend to downgrade. For example, PA-220, PA-800 Series, PA-5200 Series and some
VM-Series firewalls are not supported on any release earlier than PAN-OS 8.0 and you
cannot manage these firewalls from Panorama after you downgrade Panorama to Panorama
7.1. For the firewalls and appliances that you can downgrade, you should also review
the Upgrade/Downgrade Considerations to ensure that you account for all features and
configuration settings that will be different or unavailable after you downgrade.
STEP 1 | Save a backup of the configuration files for Panorama and managed devices.
1. Export Panorama and device configuration snapshot (Panorama > Setup > Operations).
2. Save the exported .tgz file to a location external to Panorama, Log Collectors, and firewalls. You can
use this backup to restore the configuration if you experience problems that cause you to start over.
If downgrading more than one firewall, streamline the process by having each firewall-
specific PAN-OS 8.1 image downloaded to Panorama before you start downgrading.
For example, to downgrade your PA-220 firewall to PAN-OS 8.1.0, download the
PanOS_220-8.1.0 or PanOS_3000-8.1.0 images.
Panorama requires that all firewalls are running the same or an earlier PAN-OS release. So before you
downgrade Panorama, use and repeat the appropriate tasks below according to your environment to
downgrade all managed firewalls as needed:
1. Check Now for available images (Panorama > Device Deployment > Software).
2. Locate the PAN-OS 8.1 image for each model or series of firewalls you intend to downgrade. If the
image is not already downloaded, then Download it.
Non-HA Firewalls
Install (Action column) the appropriate PAN-OS 8.1 version, select all the firewalls you intend to
downgrade, select Reboot device after install, and click OK.
Active/Active HA Firewalls
1. Click Install, disable (clear) Group HA Peers, select either of the HA peers, select Reboot device after
install, and click OK. Wait for the firewall to finish rebooting before you proceed.
2. Click Install, disable (clear) Group HA Peers, select the HA peer that you didn’t update in the previous
step, select Reboot device after install, and click OK.
If you enabled preemption in the Election settings (Device > High Availability >
General), then fw1 will be reinstated as the active peer after reboot.
During the migration, log data is not visible in the ACC or Monitor tabs. Additionally, new
log data is not forwarded to Log Collectors until the migration is complete.