0% found this document useful (0 votes)
72 views7 pages

Add A Firewall As A Managed Device

The document provides a comprehensive guide on adding a firewall as a managed device to the Panorama management server, detailing the necessary steps for configuration, including creating a device registration authentication key and ensuring proper communication between the firewall and Panorama. It emphasizes the importance of mutual authentication and the need to adhere to device management license limits. Additionally, it outlines the process for bulk importing firewalls and configuring settings for effective management and security.

Uploaded by

bibist
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views7 pages

Add A Firewall As A Managed Device

The document provides a comprehensive guide on adding a firewall as a managed device to the Panorama management server, detailing the necessary steps for configuration, including creating a device registration authentication key and ensuring proper communication between the firewall and Panorama. It emphasizes the importance of mutual authentication and the need to adhere to device management license limits. Additionally, it outlines the process for bulk importing firewalls and configuring settings for effective management and security.

Uploaded by

bibist
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

(/content/techdocs/en_US.

html)

Updated on Mar 13, 2025

Home (/) | Panorama (/content/techdocs/en_US/panorama.html)


| Panorama Administrator's Guide (/content/techdocs/en_US/panorama/10-1/panorama-admin.html)
| Manage Firewalls (/content/techdocs/en_US/panorama/10-1/panorama-admin/manage-firewalls.html)
| Add a Firewall as a Managed Device (/content/techdocs/en_US/panorama/10-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-
managed-device.html)

DOWNLOAD PDF (/CONTENT/DAM/TECHDOCS/EN_US/PDF/PANORAMA/10-1/PANORAMA-ADMIN/PANORAMA-


ADMIN.PDF)

Panorama Administrator's Guide


(/content/techdocs/en_US/panorama/10-
1/panorama-admin.html)
Add a Firewall as a Managed Device

Table of Contents

To use a Panorama™ management server to manage your firewalls, you need to enable a connection between the firewall and
the Panorama management server. To strengthen your Security posture when onboarding a new firewall, you must create a
unique device registration authentication key on the Panorama management server for mutual authentication between the
new firewall and the server on first connection. A successful first connection requires that you add the Panorama IP address
on each firewall the server will manage, add the serial number on the server for each firewall, and specify the device
registration authentication key on both the server and the firewall. When you add a firewall as a managed device, you can also
associate the new firewall with a device group, template stack, collector group, and Log Collector during the initial
deployment. Additionally, you have the option to automatically push the configuration to your newly added firewall when the
firewall first connects to the Panorama server, which ensures that firewalls are immediately configured and ready to secure
your network.

If you are adding a firewall to Panorama in a high availability (HA) configuration, the device registration authentication key is
required only to add the firewall to the primary peer. Panorama in HA configuration synchronize the Certificate Authority (CA)
certificate that allows the secondary peer to manage firewalls in event of HA failover.

Adding a firewall as a managed device requires that the total count of managed firewalls not exceed the
device management license (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-
panorama/register-panorama-and-install-licenses.html) activated on Panorama. Select Panorama >
Licenses to view the Device Management License active on Panorama and the maximum number of man-
aged firewalls supported.

If the firewall you are attempting to add exceeds the device management license limit, the operation is
blocked and you are prompted with a warning indicating that adding the firewall to Panorama manage-
ment failed.

The firewall uses the Panorama management server IP address for registration with the server. The Panorama server and the
firewall authenticate with each other using 2,048-bit certificates and AES-256 encrypted SSL connections for configuration
management and log collection.
To configure the device registration authentication key, specify the key lifetime and the number of times you can use the
authentication key to onboard new firewalls. Additionally, you can specify one or more firewall serial numbers for which the
authentication key is valid.

The authentication key expires 90 days after the key lifetime expires. After 90 days, you are prompted to re-certify the
authentication key to maintain its validity. If you do not re-certify, then the authentication key becomes invalid. A system log
is generated each time a firewall uses the Panorama-generated authentication key. The firewall uses the authentication key to
authenticate the Panorama server when it delivers the device certificate that is used for all subsequent communications.

For firewalls running a PAN-OS 10.1 release, Panorama running PAN-OS 10.1.3 or later release supports
onboarding firewalls running PAN-OS 10.1.3 or later release only. You cannot add a firewall running PAN-
OS 10.1.2 or earlier PAN-OS 10.1 release to Panorama management if Panorama is running PAN-OS 10.1.3
or later release.

Panorama supports onboarding firewalls running the following releases:

Panorama running PAN-OS 10.1.2 or earlier PAN-OS 10.1 release— Firewalls running PAN-OS 10.1.2
or earlier PAN-OS 10.1 release, and firewalls running PAN-OS 10.0 or earlier PAN-OS release.

Panorama running PAN-OS 10.1.3 or later release— Firewalls running PAN-OS 10.1.3 or later release,
and firewalls running PAN-OS 10.0 or earlier PAN-OS release.

There is no impact to firewalls already managed by Panorama on upgrade to PAN-OS 10.1.

If you are experiencing issues adding a firewall to Panorama management, you may need to recover man-
aged device connectivity to Panorama (/content/techdocs/en_US/panorama/10-1/panorama-
admin/troubleshooting/recover-managed-device-connectivity-to-panorama.html).

STEP 1 -
Set up the firewall.

A Perform initial configuration (https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-


started/integrate-the-firewall-into-your-management-network/perform-initial-configuration.html) on the

firewall so that it is accessible and can communicate with the Panorama server over the network.

B Configure each data interface (https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-


admin/configure-interfaces.html) you plan to use on the firewall and attach it to a security zone so that you
can push configuration settings and policy rules from the Panorama server.

STEP 2 -
Create a device registration authentication key.

A Log in to the Panorama Web Interface (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-


up-panorama/access-and-navigate-panorama-management-interfaces/log-in-to-the-panorama-web-

interface.html#id60bb9ed6-4859-441a-8c86-f2a81f2cb38e).

B Select Panorama > Device Registration Auth Key and Add a new authentication key.

C Configure the authentication key.

Name—Add a descriptive name for the authentication key.


Lifetime—Specify the key lifetime to limit how long you can use the authentication key to onboard new
firewalls.

Count—Specify how many times you can use the authentication key to onboard new firewalls.

Device Type—Specify that this authentication key is used to authenticate only a Firewall.

You can select Any to use the device registration authentication key to onboard fire-

walls, Log Collectors, and WildFire appliances.

( Optional ) Devices—Enter one or more device serial numbers to specify for which firewalls the
authentication key is valid.

D Click OK.

E Copy Auth Key and Close.

STEP 3 -
Add firewalls to a Panorama management server. You can manually add one or more firewalls or bulk import
firewalls using a CSV file.

You can bulk import only single-vsys firewalls to the Panorama management server You
cannot bulk import firewalls with more than one virtual system (vsys).

Add one or more firewalls manually.

A Select Panorama > Managed Devices > Summary and Add a new firewall.

B Enter the firewall Serial number. If you are adding multiple firewalls, enter each serial number on a separate
line.

C ( Optional ) Select Associate Devices to associate the firewall with a device group, template stack, Log
Collector, or Collector group when the firewall first connect to the Panorama management server.

D Enter the device registration authentication key you created.

E Click OK.

F Associate your managed firewalls as needed.


If you did not select Associate Devices, skip this step and continue to configure the firewall to communicate

with Panorama.

1. Assign the Device Group, Template Stack, Collector Group, and Log Collector as needed from the drop-

down in each column.

2. Enable Auto Push on 1st connect to automatically push the device group and template stack

configuration to the new devices when they first successfully connect to the Panorama server.

The Auto Push on 1st Connect option is supported only on firewalls running PAN-

OS® 8.1 and later releases. The commit all job executes from Panorama to managed
devices running PAN-OS 8.1 and later releases.

3. ( Optional ) Select a PAN-OS release version (To SW Version column) to begin automatically upgrading
the managed firewall to the specified PAN-OS version upon successful connection to the Panorama

management server.

To upgrade a managed firewall to a target PAN-OS release on first connection, you

must install the minimum content release version required


(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-release-notes/associated-

content-and-software-versions/associated-content-and-software-versions-for-pan-
os-10-1.html) for that PAN-OS release before adding the firewall as a managed de-

vice. To do this, you must register the firewall


(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-

started/register-the-firewall), activate the support license


(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-

admin/subscriptions/activate-subscription-licenses), and install the content update


(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/software-and-

content-updates/install-content-and-software-updates.html) before adding the fire-


wall to Panorama management.

Leave this column empty if you do not want to automatically upgrade the managed firewall.

4. Click OK to add the devices.

Bulk import multiple firewalls using a CSV file.

A Select Panorama > Managed Devices > Summary and Add your new firewalls.

B Add the device registration authentication key you created.

C Click Import.

D Download Sample CSV and edit the downloaded CSV file with the firewalls you are adding. You can choose
to assign the firewalls to a device group, template stack, Collector Group, and Log Collector from the CSV or
enter only the firewall serial numbers and assign them from the web interface. Save the CSV after you finish

editing.

E Browse to and select the CSV file you edited in the previous step.

F If not already assigned in the CSV, assign the firewalls a Device Group, Template Stack, Collector Group,
and Log Collector as needed from the drop-down in each column

G If not already enabled in the CSV, enable Auto Push on 1st connect to automatically push the device group
and template stack configuration to the new devices when they first successfully connect to the Panorama
server.

H ( Optional ) Select a PAN-OS release version (To SW Version column) to begin automatically upgrading the
managed firewall to the specified PAN-OS version upon successful connection to the Panorama server.

To upgrade a managed firewall to a target PAN-OS release on first connection, you must
install the minimum content release version required

(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-release-notes/associated-
content-and-software-versions/associated-content-and-software-versions-for-pan-os-

10-1.html) for that PAN-OS release before adding the firewall as a managed device. To
do this, you must register the firewall (https://docs.paloaltonetworks.com/pan-os/10-

1/pan-os-admin/getting-started/register-the-firewall), activate the support license


(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-

admin/subscriptions/activate-subscription-licenses), and install the content update


(https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/software-and-con-

tent-updates/install-content-and-software-updates.html) before adding the firewall to


Panorama management.

Leave this column empty if you do not want to automatically upgrade the managed firewall.

I Click OK to add the firewalls.

STEP 4 -
Configure the firewall to communicate with the Panorama management server.

Repeat this step for each firewall the Panorama server will manage.

A Log in to the firewall web interface (https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-


admin/firewall-administration/use-the-web-interface/launch-the-web-interface.html).

B Configure the Panorama Settings for the firewall.

1. Select Device > Setup > Management and edit the Panorama Settings.

2. Enter the Panorama IP address in the first field.


Panorama issues a single IP address for device management, log collection, reporting,

and dynamic updates. Enter the external, Internet-bound IP address to ensure


Panorama can successfully access existing and new managed devices and Log

Collectors. If an internal Panorama IP address is configured, you may be unable to man-

 age some devices. For example, if you Install Panorama on AWS

(/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-panorama/set-up-
the-panorama-virtual-appliance/install-the-panorama-virtual-appliance/install-

panorama-in-aws.html#id17AUAD00E8Y) and enter the internal IP address, Panorama


is unable to manage devices or Log Collectors outside of the AWS security group.

3. ( Optional ) If you have configured a high availability (HA) pair in Panorama, enter the IP address of the
secondary Panorama in the second field.

4. Enter the Auth key you created on Panorama.

5. Click OK.

6. Commit your changes.

STEP 5 -
( Optional ) Add a Tag. Tags make it easier for you to find a firewall from a large list; they help you dynamically
filter and refine the list of firewalls in your display. For example, if you add a tag called branch office, you can
filter for all branch office firewalls across your network.

A Select each firewall and click Tag.

B Click Add, enter a string of up to 31 characters (no empty spaces), and click OK.

STEP 6 -
If your deployment is using custom certificates for authentication between Panorama and managed devices,
deploy the custom client device certificate. For more information, see Set Up Authentication Using Custom
Certificates (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-panorama/set-up-
authentication-using-custom-certificates.html#id14acb184-5a00-497c-979b-5a4b5fcac48b) and Add New
Client Devices (/content/techdocs/en_US/panorama/10-1/panorama-admin/set-up-panorama/set-up-
authentication-using-custom-certificates/add-new-client-devices.html#ida057da50-c5e9-4713-a07b-
889f899fc152).

STEP 7 -
Select Commit > Commit to Panorama and Commit your changes.

STEP 8 -
Verify that the firewall is connected to Panorama.
A Click Panorama > Managed Devices > Summary.

B Verify that the Device State for the new device shows as Connected.

Next

Previous Install the (/content/techdocs/en_US/panorama/10-


(/content/techdocs/en_US/panorama/10- Device 1/panorama-admin/manage-
Manage
1/panorama-admin/manage-firewalls.html) Certificate firewalls/install-the-device-certificate-
Firewalls for-managed-firewalls.html)
for Managed
Firewalls

Technical Documentation Co

Release Notes (/content/techdocs/en_US/release-notes.html) Abo


Search (/content/techdocs/en_US/search.html) Care
Blog (https://www.paloaltonetworks.com/blog/category/technical- Cus
documentation/) LIVE
Compatibility Matrix (/content/techdocs/en_US/compatibility- Kno
matrix.html)
OSS Listings (/content/techdocs/en_US/oss-listings.html)
Sitemap (/content/techdocs/en_US/sitemap.html)

(https://www.facebook.com/PaloAltoNetworks) (https://w
(https://www.youtube.com/channel/UCPRouchFt58TZnjoI65aelA)

(/content/techdocs/en_US.html) © 2025 Palo Alto Ne

You might also like