Panorama supports up to 1,024 templates. To configure a template, Add one and configure the settings as described in the following table.
After configuring a template, you must commit your changes in Panorama (see Panorama Commit Operations). After you configure the network and device settings of firewalls assigned to the template, you must perform a template commit to push the settings to the firewalls.
Deleting a template, or removing a firewall from one, does not delete the values that Panorama has pushed to the firewall. When you remove a firewall from a template, Panorama no longer pushes new updates to that firewall.
Enter a template name (up to 31 characters). The name is case-sensitive, must be unique, and can contain only letters, numbers, spaces, hyphens, periods, and underscores.
In the Device and Network tabs, this name appears in the Template drop-down. The settings you modify in these tabs apply only to the selected Template.
Select a virtual system if you want Panorama to push configurations specific to that virtual system (such as interfaces) to firewalls that don’t have multiple virtual systems.
Enter a description for the template.
Select each firewall that you want to add to the template. You can assign a given firewall to only one template or stack. Therefore, if you will use the template only within a stack, do not assign firewalls to the template, just to the stack (see Template Stacks).
If the list of firewalls is long, you can filter it by Platforms, Device Groups, Tags, and HA Status. For each of these categories, the dialog displays the number of managed firewalls.
You can assign firewalls that have non-matching modes (VPN mode, multiple virtual systems mode, or operational mode) to the same template. Panorama pushes mode-specific settings only to firewalls that support those modes.
Selects every firewall in the list.
Deselects every firewall in the list.
Group HA Peers
Select to group firewalls that are high availability (HA) peers. The list then displays the active firewall (or active-primary firewall in an active/active configuration) first and displays the passive firewall (or active-secondary firewall in an active/active configuration) in parentheses. This enables you to easily identify firewalls that have an HA configuration and, when pushing template settings, you can push to the grouped pair instead of to each firewall individually.
To display only specific firewalls, select the firewalls and then Filter Selected.
Add a Template
Add a Template You must add at least one template before Panorama will display the Device and Network tabs required to define the network set ...
Template Stacks A template stack is a combination of templates. By assigning firewalls to a stack, you can push all the necessary settings to them ...
Configure a Template Stack
Configure a Template Stack A template stack is a combination of templates: Panorama pushes the settings from every template in the stack to the firewalls ...
Panorama Commit Operations
Panorama Commit Operations Click Commit at the top right of the web interface and select an operation for pending changes to the Panorama configuration and ...
Templates and Template Stacks
Templates and Template Stacks You use templates to configure the settings that enable firewalls to operate on the network. Templates enable you to define a ...
Manage Templates and Template Stacks
Manage Templates and Template Stacks Use templates and template stacks to define the common base configurations that enable firewalls to operate in your network. See ...
Migrate a Firewall to Panorama Management
Migrate a Firewall to Panorama Management When you import a firewall configuration, Panorama automatically creates a template to contain the imported network and device settings. ...
Create Template(s) and Device Group(s) on Panorama
Create Template(s) and Device Group(s) on Panorama To manage the VM-Series firewalls for NSX using Panorama, the firewalls must belong to a device group and ...
Panorama > Device Groups
Panorama > Device Groups Device groups comprise firewalls and virtual systems you want to manage as a group, such as the firewalls that manage a ...