Use Case - Onboarding New Next-Generation Firewalls to Panorama
Expand all | Collapse all
Use Case - Onboarding New Next-Generation Firewalls to Panorama
Best practice for onboarding new Next-Generation firewalls
to your Panorama™ management server.
- Associate Devices or Import multiple
firewalls to streamline the onboarding process.
If you are adding a large number of firewalls, import all
your new firewalls to Panorama in a CSV file. This CSV file allows
you to associate all your firewalls with a device group, template
stack, Collector Group, and Log Collector rather than manually associating
them. This option is especially beneficial when adding a large number
of firewalls where manually associating the firewalls would take
a long time to complete.
- Enable Auto Push on 1st Connect and configure
the To SW Version to automatically push the device
group and template stack configurations to your managed firewalls
when they first successfully connect to Panorama and upgrade your managed firewalls to
a specified PAN-OS version of your choosing. This includes automatically
installing all required content updates for each PAN-OS version
in the PAN-OS upgrade path.
- After you successfully add your firewalls to Panorama, create and apply tags to
make your managed firewalls easier to search and filter. This helps
you keep your managed firewalls organized as the number of firewalls
you manage using Panorama grows.
- If you are deploying firewalls in remote sites with little
to no IT staff, set up Zero Touch Provisioning (ZTP)
to streamline initial firewall deployment by automating new managed
firewall onboarding without the need for network or IT administrators
at the remote site.