Add A Firewall As A Managed Device
Add A Firewall As A Managed Device
html)
Table of Contents
To use a Panorama™ management server to manage your firewalls, you need to enable a connection between the firewall and
the Panorama management server. To strengthen your Security posture when onboarding a new firewall, you must create a
unique device registration authentication key on the Panorama management server for mutual authentication between the
new firewall and the server on first connection. A successful first connection requires that you add the Panorama IP address
on each firewall the server will manage, add the serial number on the server for each firewall, and specify the device
registration authentication key on both the server and the firewall. When you add a firewall as a managed device, you can also
associate the new firewall with a device group, template stack, collector group, and Log Collector during the initial
deployment. Additionally, you have the option to automatically push the configuration to your newly added firewall when the
firewall first connects to the Panorama server, which ensures that firewalls are immediately configured and ready to secure
your network.
If you are adding a firewall to Panorama in a high availability (HA) configuration, the device registration authentication key is
required only to add the firewall to the primary peer. Panorama in HA configuration synchronize the Certificate Authority (CA)
certificate that allows the secondary peer to manage firewalls in event of HA failover.
Adding a firewall as a managed device requires that the total count of managed firewalls not exceed the
device management license (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-
panorama/register-panorama-and-install-licenses.html) activated on Panorama. Select Panorama >
Licenses to view the Device Management License active on Panorama and the maximum number of man-
aged firewalls supported.
If the firewall you are attempting to add exceeds the device management license limit, the operation is
blocked and you are prompted with a warning indicating that adding the firewall to Panorama manage-
ment failed.
The firewall uses the Panorama management server IP address for registration with the server. The Panorama server and the
firewall authenticate with each other using 2,048-bit certificates and AES-256 encrypted SSL connections for configuration
management and log collection.
To configure the device registration authentication key, specify the key lifetime and the number of times you can use the
authentication key to onboard new firewalls. Additionally, you can specify one or more firewall serial numbers for which the
authentication key is valid.
The authentication key expires 90 days after the key lifetime expires. After 90 days, you are prompted to re-certify the
authentication key to maintain its validity. If you do not re-certify, then the authentication key becomes invalid. A system log
is generated each time a firewall uses the Panorama-generated authentication key. The firewall uses the authentication key to
authenticate the Panorama server when it delivers the device certificate that is used for all subsequent communications.
For firewalls running a PAN-OS 10.1 release, Panorama running PAN-OS 10.1.3 or later release supports
onboarding firewalls running PAN-OS 10.1.3 or later release only. You cannot add a firewall running PAN-
OS 10.1.2 or earlier PAN-OS 10.1 release to Panorama management if Panorama is running PAN-OS 10.1.3
or later release.
Panorama running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release— Firewalls running PAN-OS 10.1.2
or earlier PAN-OS 10.1 release, and firewalls running PAN-OS 10.0 or earlier PAN-OS release.
Panorama running PAN-OS 10.1.3 or later release— Firewalls running PAN-OS 10.1.3 or later release,
and firewalls running PAN-OS 10.0 or earlier PAN-OS release.
If you are experiencing issues adding a firewall to Panorama management, you may need to recover man-
aged device connectivity to Panorama (/content/techdocs/en_US/panorama/10-1/panorama-
admin/troubleshooting/recover-managed-device-connectivity-to-panorama.html).
STEP 1 -
Set up the firewall.
firewall so that it is accessible and can communicate with the Panorama server over the network.
STEP 2 -
Create a device registration authentication key.
interface.html#id60bb9ed6-4859-441a-8c86-f2a81f2cb38e).
B Select Panorama > Device Registration Auth Key and Add a new authentication key.
Count—Specify how many times you can use the authentication key to onboard new firewalls.
Device Type—Specify that this authentication key is used to authenticate only a Firewall.
You can select Any to use the device registration authentication key to onboard fire-
( Optional ) Devices—Enter one or more device serial numbers to specify for which firewalls the
authentication key is valid.
D Click OK.
STEP 3 -
Add firewalls to a Panorama management server. You can manually add one or more firewalls or bulk import
firewalls using a CSV file.
You can bulk import only single-vsys firewalls to the Panorama management server You
cannot bulk import firewalls with more than one virtual system (vsys).
A Select Panorama > Managed Devices > Summary and Add a new firewall.
B Enter the firewall Serial number. If you are adding multiple firewalls, enter each serial number on a separate
line.
C ( Optional ) Select Associate Devices to associate the firewall with a device group, template stack, Log
Collector, or Collector group when the firewall first connect to the Panorama management server.
E Click OK.
with Panorama.
1. Assign the Device Group, Template Stack, Collector Group, and Log Collector as needed from the drop-
2. Enable Auto Push on 1st connect to automatically push the device group and template stack
configuration to the new devices when they first successfully connect to the Panorama server.
The Auto Push on 1st Connect option is supported only on firewalls running PAN-
OS® 8.1 and later releases. The commit all job executes from Panorama to managed
devices running PAN-OS 8.1 and later releases.
3. ( Optional ) Select a PAN-OS release version (To SW Version column) to begin automatically upgrading
the managed firewall to the specified PAN-OS version upon successful connection to the Panorama
management server.
content-and-software-versions/associated-content-and-software-versions-for-pan-
os-10-1.html) for that PAN-OS release before adding the firewall as a managed de-
Leave this column empty if you do not want to automatically upgrade the managed firewall.
A Select Panorama > Managed Devices > Summary and Add your new firewalls.
C Click Import.
D Download Sample CSV and edit the downloaded CSV file with the firewalls you are adding. You can choose
to assign the firewalls to a device group, template stack, Collector Group, and Log Collector from the CSV or
enter only the firewall serial numbers and assign them from the web interface. Save the CSV after you finish
editing.
E Browse to and select the CSV file you edited in the previous step.
F If not already assigned in the CSV, assign the firewalls a Device Group, Template Stack, Collector Group,
and Log Collector as needed from the drop-down in each column
G If not already enabled in the CSV, enable Auto Push on 1st connect to automatically push the device group
and template stack configuration to the new devices when they first successfully connect to the Panorama
server.
H ( Optional ) Select a PAN-OS release version (To SW Version column) to begin automatically upgrading the
managed firewall to the specified PAN-OS version upon successful connection to the Panorama server.
To upgrade a managed firewall to a target PAN-OS release on first connection, you must
install the minimum content release version required
(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-release-notes/associated-
content-and-software-versions/associated-content-and-software-versions-for-pan-os-
10-1.html) for that PAN-OS release before adding the firewall as a managed device. To
do this, you must register the firewall (https://docs.paloaltonetworks.com/pan-os/10-
Leave this column empty if you do not want to automatically upgrade the managed firewall.
STEP 4 -
Configure the firewall to communicate with the Panorama management server.
Repeat this step for each firewall the Panorama server will manage.
1. Select Device > Setup > Management and edit the Panorama Settings.
(/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-panorama/set-up-
the-panorama-virtual-appliance/install-the-panorama-virtual-appliance/install-
3. ( Optional ) If you have configured a high availability (HA) pair in Panorama, enter the IP address of the
secondary Panorama in the second field.
5. Click OK.
STEP 5 -
( Optional ) Add a Tag. Tags make it easier for you to find a firewall from a large list; they help you dynamically
filter and refine the list of firewalls in your display. For example, if you add a tag called branch office, you can
filter for all branch office firewalls across your network.
B Click Add, enter a string of up to 31 characters (no empty spaces), and click OK.
STEP 6 -
If your deployment is using custom certificates for authentication between Panorama and managed devices,
deploy the custom client device certificate. For more information, see Set Up Authentication Using Custom
Certificates (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-panorama/set-up-
authentication-using-custom-certificates.html#id14acb184-5a00-497c-979b-5a4b5fcac48b) and Add New
Client Devices (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-panorama/set-up-
authentication-using-custom-certificates/add-new-client-devices.html#ida057da50-c5e9-4713-a07b-
889f899fc152).
STEP 7 -
Select Commit > Commit to Panorama and Commit your changes.
STEP 8 -
Verify that the firewall is connected to Panorama.
A Click Panorama > Managed Devices > Summary.
B Verify that the Device State for the new device shows as Connected.
Next
Technical Documentation Co
(https://www.facebook.com/PaloAltoNetworks) (https://w
(https://www.youtube.com/channel/UCPRouchFt58TZnjoI65aelA)