an export task
and configure the settings as described in the following table.
If Panorama has a high availability (HA)
configuration, you must perform these instructions on each peer
to ensure the scheduled exports continue after a failover. Panorama
does not synchronize scheduled configuration exports between HA
Scheduled Configuration Export
Enter a name to identify the configuration
export job (up to 31 characters). The name is case-sensitive and
must be unique. Use only letters, numbers, hyphens, and underscores.
Enter an optional description.
Select to enable the export job.
Scheduled export start time (daily)
Specify the time of day to start the export
(24 hour clock, format HH:MM).
Select the protocol to use to export logs
from Panorama to a remote host. Secure Copy (
is a secure protocol;
Enter the IP address or hostname of the
target SCP or FTP server.
Enter the port number on the target server.
Specify the path to the folder or directory
on the target server that will store the exported configuration.
example, if the configuration bundle is stored in a folder called
exported_config within a top level folder called Panorama, the syntax
for each server type is:
SCP server: /Panorama/exported_config
FTP server: //Panorama/exported_config
. Spaces are
not supported in the file
Enable FTP Passive Mode
Select to use FTP passive mode.
Specify the username required to access
the target system.
Password / Confirm Password
Specify the password required to access
the target system.
Use a password with maximum length of 15
characters. If the password exceeds 15 characters, the test SCP
connection will display an error because the firewall encrypts the
password when it tries to connect to the SCP server and the length
of the encrypted password can be up to 63 characters only.
Test SCP server connection
Select to test communication between Panorama
and the SCP host/server.
To enable the secure transfer of
data, you must verify and accept the host key of the SCP server.
The connection is not established until the host key is accepted.
If Panorama has an HA configuration, you must perform this verification
on each HA peer so that each one accepts the host key of the SCP