End-of-Life (EoL)


Panorama supports up to 1,024 templates. To configure a template,
one and configure the settings as described in the following table.
After configuring a template, you must commit your changes in Panorama (see Panorama Commit Operations). After you configure the network and device settings of firewalls assigned to the template, you must perform a template commit to push the settings to the firewalls.
Deleting a template, or removing a firewall from one, does not delete the values that Panorama has pushed to the firewall. When you remove a firewall from a template, Panorama no longer pushes new updates to that firewall.
Template Settings
Enter a template name (up to 31 characters). The name is case-sensitive, must be unique, and can contain only letters, numbers, spaces, hyphens, periods, and underscores.
In the
tabs, this name appears in the
drop-down. The settings you modify in these tabs apply only to the selected
Default VSYS
Select a virtual system if you want Panorama to push configurations specific to that virtual system (such as interfaces) to firewalls that don’t have multiple virtual systems.
Enter a description for the template.
Select each firewall that you want to add to the template. You can assign a given firewall to only one template or stack. Therefore, if you will use the template only within a stack, do not assign firewalls to the template, just to the stack (see Template Stacks).
If the list of firewalls is long, you can filter it by
Device Groups
, and
HA Status
. For each of these categories, the dialog displays the number of managed firewalls.
You can assign firewalls that have non-matching modes (VPN mode, multiple virtual systems mode, or operational mode) to the same template. Panorama pushes mode-specific settings only to firewalls that support those modes.
Select All
Selects every firewall in the list.
Deselect All
Deselects every firewall in the list.
Group HA Peers
Select to group firewalls that are high availability (HA) peers. The list then displays the active firewall (or active-primary firewall in an active/active configuration) first and displays the passive firewall (or active-secondary firewall in an active/active configuration) in parentheses. This enables you to easily identify firewalls that have an HA configuration and, when pushing template settings, you can push to the grouped pair instead of to each firewall individually.
Filter Selected
To display only specific firewalls, select the firewalls and then
Filter Selected

Recommended For You