A template stack is a combination of templates. By assigning firewalls to a stack, you can push all the necessary settings to them without the redundancy of adding every setting to every template. Panorama supports up to 1,024 stacks. To configure a template stack, Add Stack and configure the settings as described in the following table.
After configuring a template stack, commit your changes in Panorama (see Panorama Commit Operations). After you configure the network and device settings of firewalls assigned to the stack, you must perform a template commit to push the settings to the firewalls.
Deleting a template stack or removing a firewall from a template stack does not delete the values that Panorama previously pushed to that firewall; however, when you remove a firewall from a template stack, Panorama no longer pushes new updates to that firewall.
Template Stack Settings
Enter a stack name (up to 31 characters). The name is case-sensitive, must be unique, must start with a letter, and can contain only letters, numbers, and underscores.In the Device and Network tabs, the Template drop-down displays the stack name and its assigned templates.
Enter a description for the stack.
Add each template you want to include in the stack (up to 16).
If templates have duplicate settings, Panorama pushes only the settings of the higher template in the list to the assigned firewalls. For example, if Template_A is above Template_B in the list, and both templates define the ethernet1/1 interface, Panorama pushes the ethernet1/1 definition from Template_A and not from Template_B. To change the order, select a template and Move Up or Move Down.
Select each firewall that you want to add to the stack.
If the list of firewalls is long, you can filter it by Platforms, Device Groups, Tags, and HA Status.
You can assign firewalls that have non-matching modes (VPN mode, multiple virtual systems mode, or operational mode) to the same stack. Panorama pushes mode-specific settings only to firewalls that support those modes.
Selects every firewall in the list.
Deselects every firewall in the list.
Group HA Peers
Groups firewalls that are high availability (HA) peers. This enables you to easily identify firewalls that have an HA configuration. When pushing settings from the template stack, you can push to the grouped pair instead of to each firewall individually.
To display only specific firewalls, select them and then Filter Selected.
Configure a Template Stack
Configure a Template Stack A template stack is a combination of templates: Panorama pushes the settings from every template in the stack to the firewalls ...
Templates Panorama supports up to 1,024 templates. To configure a template, Add one and configure the settings as described in the following table. After configuring ...
Panorama > Templates
Panorama > Templates Through the Device and Network tabs, you can deploy a common base configuration to multiple firewalls that require similar settings using a ...
Templates and Template Stacks
Templates and Template Stacks You use templates to configure the settings that enable firewalls to operate on the network. Templates enable you to define a ...
Add a Template
Add a Template You must add at least one template before Panorama will display the Device and Network tabs required to define the network set ...
Plan Your Multi-NSX Deployment
Plan Your Multi-NSX Deployment You must carefully plan your device group hierarchy and template stacks and consider how they interact with the other components needed ...
Override a Template Setting
Override a Template Setting While Templates and Template Stacks enable you to apply a base configuration to multiple firewalls, you might want to configure firewall-specific ...
Manage Templates and Template Stacks
Manage Templates and Template Stacks Use templates and template stacks to define the common base configurations that enable firewalls to operate in your network. See ...
Disable/Remove Template Settings
Disable/Remove Template Settings If you want to stop using a template or template stack for managing the configuration on a managed firewall, you can disable ...