Defining Policies on Panorama
Device Groups on Panorama™ allow you to centrally manage firewall policies. You create policies on Panorama either as Pre Rules or Post Rules; Pre Rules and Post Rules allow you to create a layered approach for implementing policy.
You can define Pre rules and Post rules in a shared context, as shared policies for all managed firewalls, or in a device group context, to make the rules specific to a device group. Because you define Pre rules and Post Rules on Panorama and then push them from Panorama to the managed firewalls, you are able to view the rules on the managed firewalls but you can edit the Pre Rules and Post Rules only in Panorama.
- Pre Rules—Rules that are added to the top of the rule order and are evaluated first. You can use pre-rules to enforce the Acceptable Use Policy for an organization. For example, you can block access to specific URL categories or allow DNS traffic for all users.
- Post Rules—Rules that are added at the bottom of the rule order and are evaluated after the pre-rules and rules that are locally defined on the firewall. Post-rules typically include rules to deny access to traffic based on the App-ID™, User-ID™, or Service.
- Default Rules—Rules that specify how the firewall handles traffic that does not match any Pre Rules, Post Rules, or local firewall rules. These rules are part of the predefined Panorama configuration. To Override and enable editing of select settings in these rules, see Overriding or Reverting a Security Policy Rule.
Preview Rules to view a list of all rules before you push the rules to the managed firewalls. Within each rulebase, the hierarchy of rules is visually demarcated for each device group (and managed firewall) to make it easier to scan through a large numbers of rules.
When you add or edit a rule in Panorama, a Target tab displays. You can use this tab to apply the rule to specific firewalls or descendant device groups of the Device Group (or Shared location) where the rule is defined. In the Target tab, you can select Any (default), which means the rule applies to all the firewalls and descendant device groups. To target specific firewalls or device groups, deselect Any and select specific firewalls or device groups by name. To exclude specific firewalls or device groups, deselect Any, select the specific firewalls and device groups by name, and select Target to all but these specified devices. If the list of device groups and firewalls is long, you can apply Filters to search the entries by attributes (such as Platforms) or by a text string for matching names.
After you successfully add and push a rule in Panorama, Rule Usage displays whether the rule is Used by all devices in the device group, Partially Used by some devices in the device group, or Unused by devices in the device group. Panorama determines rule usage based on managed firewalls with Policy Rule Hit Count (enabled by default). In the Panorama context, you can view the rule usage for a Shared policy rule across all device groups. Additionally, you can change the context to an individual device group and view the total policy rule usage across all devices in the device group. Preview Rules will show the Hit Count, Last Hit, and First Hit for each policy rule for the device group. The total traffic hit count, as well as the first and last hits timestamps, persist through reboot, upgrade, and dataplane restart events. See Monitor Policy Rule Usage.
Administrative users who have access to the Policies tab can export the policy rules that are displayed on the web interface as PDF/CSV. See Export Configuration Table Data.
To create policies, see the relevant section for each rulebase:
Monitor Policy Rule Usage
How to view rule usage for policy rules pushed to a device group from Panorama. ...
Rule Usage Tracking
Rule usage tracking helps you monitor rule usage on Panorama and firewalls to validate rules and keep your rule base organized. ...
Device Group Policies
Device Group Policies Device groups provide a way to implement a layered approach for managing policies across a network of managed firewalls. A firewall evaluates ...
Manage the Rule Hierarchy
Manage the Rule Hierarchy The order of policy rules is critical for the security of your network. Within any policy layer (shared, device group, or ...
Creating and Managing Policies
Creating and Managing Policies Select the Policies Security page to add , modify, and manage security policies: Task Description Add To add a new policy ...
Push a Policy Rule to a Subset of Firewalls
Push a Policy Rule to a Subset of Firewalls A policy target allows you to specify the firewalls in a device group to which to ...
Device Monitoring on Panorama
Use Panorama™ to monitor the health and rule usage of firewalls and to troubleshoot hardware issues and policy rule usage. ...
Manage Firewalls To use the Panorama™ management server for managing Palo Alto Networks firewalls, you must add the firewalls as managed devices and then assign ...
Set Up Your Centralized Configuration and Policies
Set Up Your Centralized Configuration and Policies In Use Case: Configure Firewalls Using Panorama , we would need to perform the following tasks to centrally ...