Managed Firewall Information
to display the following information for each managed firewall.
Managed Firewall Information
Displays the name of the device group in which the firewall is a member. By default, this column is hidden, though you can display it by selecting the drop-down in any column header and selecting
The page displays firewalls in clusters according to their device group. Each cluster has a header row that displays the device group name, the total number of assigned firewalls, the number of connected firewalls, and the device group path in the hierarchy. For example,
would indicate that a device group named
Data center (2/4 Devices Connected): Shared
Data centerhas four member firewalls (two of which are connected) and is a child of a device group named
Europe. You can collapse or expand any device group to hide or display its firewalls.
Displays the hostname or serial number of the firewall.
For the VM-Series NSX edition firewall, the firewall name appends the hostname of the ESXi host. For example, PA-VM: Host-NY5105
Lists the virtual systems available on a firewall that is in Multiple Virtual Systems mode.
Displays the firewall model.
Displays the tags defined for each firewall/virtual system.
Displays the serial number of the firewall.
Displays the operational mode of the firewall. Can be FIPS-CC or Normal.
Displays the IP address of the firewall/virtual system.
IPv4—IPv4 address of the firewall/virtual system.
IPv6—IPv6 address of the firewall/virtual system.
Create device specific variable definitions by copying them from a device in the template stack, or Edit existing variable definitions to create unique variables for the device. This column will be empty if the device is not associated with a template stack. By default, variables are inherited from the template stack. See Create or Edit Variable Definition on a Device.
Displays the template stack to which the firewall is assigned.
Device State—Indicates the state of the connection between Panorama and the firewall: Connected or Disconnected.
A VM-Series firewall can have two additional states:
HA Status—Indicates whether the firewall is:
Shared Policy—Indicates whether the policy and object configurations on the firewall are synchronized with Panorama.
Template—Indicates whether the network and device configurations on the firewall are synchronized with Panorama.
Certificate—Indicates the managed device’s client certificate status.
Last Commit State—Indicates whether the last commit failed or succeeded on the firewall.
Software Version | Apps and Threat | Antivirus | URL Filtering | GlobalProtect™ Client | WildFire
On each firewall commit, PAN-OS automatically sends a firewall configuration backup to Panorama. Click
Manageto view the available configuration backups and optionally load one. For details, see Firewall Backups.
Last Master Key Push
Displays the status of the master key deployment from Panorama to the firewall.
Status—Displays the latest master key push status. Can be
Unknownis displayed if a master key has not been pushed to the firewall from Panorama.
Timestamp—Displays the date and time of the latest master key push from Panorama.
Containers—If you deployed the CN-Series firewall to secure your containerized application workloads on Kubernetes clusters, use the following columns.
Container Number of Nodes
Displays the number of containerized firewall data plane (CN-NGFW) that are connected to the Management plane (CN-Mgmt) registered to Panorama.
The value can be 0—30 CN-NGFW pods for each pair of CN-Mgmt pods.
Create Device Variable Definition
When a device is added to a template stack, the user has the option of creating device specific variables by copying existing overridden variables from a device in the same template stack, or override the template or template stack variables individually for the device.
When a device is first added to a template stack, you have the option to create device-specific variable definitions copied from devices in the template stack or you can edit the template variable definitions through
. By default, all variable definitions are inherited from the template stack and you can only override, and —not delete—the variable definitions for an individual device. You can use variables to replace IP address objects and IP address literals (IP Netmask, IP Range, FQDN) in all areas of the configuration, interfaces in the IKE Gateway configuration (Interface) and HA configuration (Group ID).
Create Device Variable Definition Information
Clone device variable definition from another device in the template stack?
View the existing variable definitions and edit as needed. See Panorama > Templates > Template Variables.
Select a device in the drop-down from which to clone variable definitions and then select the specific variable definitions you want to clone.
Recommended For You
Recommended videos not found.