Panorama > Managed Devices > Summary
Table of Contents
                    
					9.1 (EoL)
						
				
		
  Expand all | Collapse all
  - 
          
                
- Objects > Addresses
 - Objects > Address Groups
 - Objects > Regions
 - Objects > Dynamic User Groups
 - Objects > Application Groups
 - Objects > Application Filters
 - Objects > Services
 - Objects > Service Groups
 - Objects > External Dynamic Lists
 - Objects > Custom Objects > Spyware/Vulnerability
 - Objects > Custom Objects > URL Category
 - Objects > Security Profiles > Antivirus
 - Objects > Security Profiles > Anti-Spyware Profile
 - Objects > Security Profiles > Vulnerability Protection
 - Objects > Security Profiles > File Blocking
 - Objects > Security Profiles > WildFire Analysis
 - Objects > Security Profiles > Data Filtering
 - Objects > Security Profiles > DoS Protection
 - Objects > Security Profiles > GTP Protection
 - Objects > Security Profiles > SCTP Protection
 - Objects > Security Profile Groups
 - Objects > Log Forwarding
 - Objects > Authentication
 - Objects > Decryption > Forwarding Profile
 - Objects > Schedules
 
 - 
          
                
- 
      
            
- Firewall Interfaces Overview
 - Common Building Blocks for Firewall Interfaces
 - Common Building Blocks for PA-7000 Series Firewall Interfaces
 - Tap Interface
 - HA Interface
 - Virtual Wire Interface
 - Virtual Wire Subinterface
 - PA-7000 Series Layer 2 Interface
 - PA-7000 Series Layer 2 Subinterface
 - PA-7000 Series Layer 3 Interface
 - Layer 3 Interface
 - Layer 3 Subinterface
 - Log Card Interface
 - Log Card Subinterface
 - Decrypt Mirror Interface
 - Aggregate Ethernet (AE) Interface Group
 - Aggregate Ethernet (AE) Interface
 
 - Network > Interfaces > VLAN
 - Network > Interfaces > Loopback
 - Network > Interfaces > Tunnel
 - Network > Interfaces > SD-WAN
 - Network > VLANs
 - Network > Virtual Wires
 - 
      
            
- Network > Network Profiles > GlobalProtect IPSec Crypto
 - Network > Network Profiles > IPSec Crypto
 - Network > Network Profiles > IKE Crypto
 - Network > Network Profiles > Monitor
 - Network > Network Profiles > Interface Mgmt
 - Network > Network Profiles > QoS
 - Network > Network Profiles > LLDP Profile
 - Network > Network Profiles > SD-WAN Interface Profile
 
 
 - 
      
            
 - 
          
                
- Device > Setup
 - Device > Setup > Management
 - Device > Setup > Interfaces
 - Device > Setup > Telemetry
 - Device > Setup > Content-ID
 - Device > Setup > WildFire
 - Device > Log Forwarding Card
 - Device > Config Audit
 - Device > Administrators
 - Device > Admin Roles
 - Device > Access Domain
 - Device > Authentication Sequence
 - 
      
            
- Security Policy Match
 - QoS Policy Match
 - Authentication Policy Match
 - Decryption/SSL Policy Match
 - NAT Policy Match
 - Policy Based Forwarding Policy Match
 - DoS Policy Match
 - Routing
 - Test Wildfire
 - Threat Vault
 - Ping
 - Trace Route
 - Log Collector Connectivity
 - External Dynamic List
 - Update Server
 - Test Cloud Logging Service Status
 - Test Cloud GP Service Status
 
 - Device > Virtual Systems
 - Device > Shared Gateways
 - Device > Certificate Management
 - Device > Certificate Management > Certificate Profile
 - Device > Certificate Management > OCSP Responder
 - Device > Certificate Management > SSL/TLS Service Profile
 - Device > Certificate Management > SCEP
 - Device > Certificate Management > SSL Decryption Exclusion
 - Device > Response Pages
 - Device > Server Profiles
 - Device > Server Profiles > SNMP Trap
 - Device > Server Profiles > Syslog
 - Device > Server Profiles > Email
 - Device > Server Profiles > HTTP
 - Device > Server Profiles > NetFlow
 - Device > Server Profiles > RADIUS
 - Device > Server Profiles > TACACS+
 - Device > Server Profiles > LDAP
 - Device > Server Profiles > Kerberos
 - Device > Server Profiles > SAML Identity Provider
 - Device > Server Profiles > DNS
 - Device > Server Profiles > Multi Factor Authentication
 - Device > Local User Database > Users
 - Device > Local User Database > User Groups
 - Device > Scheduled Log Export
 - Device > Software
 - Device > Dynamic Updates
 - Device > Licenses
 - Device > Support
 
 - 
          
                
- Network > GlobalProtect > MDM
 - Network > GlobalProtect > Device Block List
 - Network > GlobalProtect > Clientless Apps
 - Network > GlobalProtect > Clientless App Groups
 - Objects > GlobalProtect > HIP Profiles
 
 - 
          
                
- Use the Panorama Web Interface
 - Context Switch
 - Panorama Commit Operations
 - Defining Policies on Panorama
 - Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
 - Panorama > Setup > Interfaces
 - Panorama > High Availability
 - Panorama > Administrators
 - Panorama > Admin Roles
 - Panorama > Access Domains
 - Panorama > Device Groups
 - Panorama > Plugins
 - Panorama > Log Ingestion Profile
 - Panorama > Log Settings
 - Panorama > Scheduled Config Export
 
 
                            End-of-Life (EoL)
                        
                    Panorama > Managed Devices > Summary
A Palo Alto Networks firewall that Panorama manages
is called a managed device. Panorama can manage firewalls
running the same major release or earlier major releases but Panorama
cannot manage firewalls running a later major release. For example,
Panorama running PAN-OS 9.1 can manage firewalls running PAN-OS
9.1 and earlier. Additionally, it is not recommended to manage firewalls
running a later maintenance release than Panorama as this may result
in features not working as expected. For example, it is not recommended
to manage firewalls running PAN-OS 9.1.1 or later maintenance releases
if Panorama is running PAN-OS 9.1.0. For more information on release
information, see the PAN-OS 9.1 Release Notes. For more information
on supported PAN-OS versions, see the End-of-Life Summary.