End-of-Life (EoL)

Perform Initial Configuration of the M-Series Appliance

By default, Panorama has an IP address of and a username/password of admin/admin. For security reasons, you must change these settings before continuing with other configuration tasks. You must perform these initial configuration tasks either from the Management (MGT) interface or using a direct serial port connection to the console port on the M-500 or M-100 appliance.
  1. Gather the required interface and server information from your network administrator.
    • Gather the IP address, netmask (for IPv4) or prefix length (for IPv6), and default gateway for each interface that you plan to configure (MGT, Eth1, Eth2, Eth3, Eth4, Eth5). Only the MGT interface is mandatory.
      Palo Alto Networks recommends that you specify all these settings for the MGT interface. If you omit values for some of these settings (such as the default gateway), you can access Panorama only through the console port for future configuration changes. You cannot commit the configurations for other interfaces unless you specify all these settings.
      If you plan to use the appliance as a Panorama management server, Palo Alto Networks recommends using the MGT interface only for managing Panorama and using other interfaces for managing devices, collecting logs, communicating with Collector Groups, and deploying updates to devices (see M-Series Appliance Interfaces).
    • Gather the IP addresses of the DNS servers.
  2. Access the M-Series appliance from your computer.
    1. Connect to the M-Series appliance in one of the following ways:
      • Attach a serial cable from a computer to the Console port on the M-Series appliance and connect using terminal emulation software (9600-8-N-1).
      • Attach an RJ-45 Ethernet cable from a computer to the MGT port on the M-Series appliance. From a browser, go to Enabling access to this URL might require changing the IP address on the computer to an address in the network (for example,
    2. When prompted, log in to the appliance using the default username and password (admin/admin). The appliance starts initializing.
  3. Configure the network access settings for each interface that you will use to manage Panorama, manage devices, collect logs, communicate with Collector Groups, and deploy updates to devices.
    1. Select
      and click the Interface Name.
    2. (
      Non-MGT interfaces only
      the interface.
    3. Edit the network access settings of each interface that Panorama will use. Only the MGT interface is required. The Eth1, Eth2, Eth3, Eth4, and Eth5 interfaces are optional and apply only if you plan to use the M-Series appliance as a Panorama management server.
      1. Complete one or both of the following field sets based on the IP protocols of your network:
        IP Address
        , and
        Default Gateway
        IPv6 Address/Prefix Length
        Default IPv6 Gateway
      2. Select the Device Management Services that the interface supports:
        Device Management and Device Log Collection
        —You can assign one or more interfaces.
        Collector Group Communication
        —You can assign only one interface.
        Device Deployment
        (software and content updates)—You can assign only one interface.
      3. (
        ) Select the Network Connectivity Services that the interface supports.
        MGT interface only
        ) Disable
        ; these services use plaintext and so are less secure than other services.
      4. Click
        to save your changes.
  4. Configure the hostname, time zone, and general settings.
    1. Select
      and edit the General Settings.
    2. Align the clock on Panorama and the managed firewalls to use the same
      Time Zone
      , for example GMT or UTC. If you plan to use the Logging service, you must configure NTP so that Panorama can stay in sync with the Logging Service.
      The firewall records timestamps when it generate logs and Panorama records timestamps upon receiving the logs. Aligning the time zones ensures that the timestamps are synchronized and that the process of querying logs and generating reports on Panorama is harmonious.
    3. Enter a
      for the server. Panorama uses this as the display name/label for the appliance. For example, this is the name that appears at the CLI prompt. It also appears in the Collector Name field if you add the appliance as a managed collector on the
      Managed Collectors
    4. (
      ) Enter the
      to enable accurate placement of the M-Series appliance on the world map. The
      App Scope
      Traffic Maps
      App Scope
      Threat Maps
      use these values.
    5. Click
      to save your entries.
  5. Configure the DNS servers and Palo Alto Networks Update Server.
    1. Select
      and edit the settings.
    2. Enter the IP address of the
      Primary DNS Server
      and (optionally) of the
      Secondary DNS Server
    3. Enter the URL or static address of the
      Update Server
      (default updates.paloaltonetworks.com).
      Verify Update Server Identity
      if you want Panorama to verify that the Update Server from which it downloads software or content packages has an SSL certificate that a trusted authority signed. This option adds an additional level of security for communication between the Panorama management server and Update Server.
    4. Click
      to save your entries.
  6. Change the default admin password.
    1. Click the
      link in the lower left of the web interface.
    2. Enter the
      Old Password
      New Password
      , and
      Confirm New Password
      , and then click
      . Store the new password in a safe location.
      To ensure that the MGT interface remains secure, configure Minimum Password Complexity settings (select
      ) and specify the interval at which administrators must change their passwords.
  7. Commit your configuration changes.
    Commit to Panorama
    your changes.
    If you plan to use the M-Series appliance as a Panorama management server and you configured interfaces other than MGT, you must assign those interfaces to the
    Device Log Collection
    Collector Group Communication
    functions when you Configure a Managed Collector. To make the interfaces operational, you must then Configure a Collector Group for the managed collector and perform a Collector Group commit.
  8. Verify network access to external services required for Panorama management, such as the Palo Alto Networks Update Server.
    1. Connect to the M-Series appliance in one of the following ways:
      • Attach a serial cable from your computer to the Console port on the M-Series appliance. Then use a terminal emulation software (9600-8-N-1) to connect.
      • Use terminal emulation software such as PuTTY to open an SSH session to the IP address that you specified for the MGT interface of the M-Series appliance during initial configuration.
    2. Log in to the CLI when prompted. Use the default admin account and the password that you specified during initial configuration.
    3. Use the ping utility to verify network connectivity to the Palo Alto Networks Update Server as shown in the following example. Verify that DNS resolution occurs and the response includes the IP address for the Update Server (, in this example); the Update Server does not respond to a ping request.
      ping host updates.paloaltonetworks.com
      PING updates.paloaltonetworks.com ( 56(84) bytes of data.
      After verifying DNS resolution, press Ctrl+C to stop the ping request.
    4. Use the following CLI command to retrieve information on the support entitlement for Panorama from the Update Server:
      request support check
      If you have connectivity, the Update Server responds with the support status for Panorama. Because Panorama is not registered, the Update Server returns the following message:
      Contact Us https://www.paloaltonetworks.com/company/contact-us.html Support Home https://www.paloaltonetworks.com/support/tabs/overview.html Device not found on this update server
  9. Next steps...
    1. As a best practice, replace the default certificate that Panorama uses to secure HTTPS traffic over the MGT interface.

Recommended For You