Plan Your Panorama Interconnect Deployment
                             
                         
                    
                    
                    
  Expand all | Collapse all
  
    
 
                    
                        
                            
    Plan Your Panorama Interconnect Deployment
    
    Checklist for preparing your Panorama™ management servers
for the Panorama Interconnect plugin installation and deployment. 
    To successfully deploy the Panorama™ Interconnect plugin
on your Panorama management servers:
Verify that your Panoramas
and managed firewalls meet the minimum resource requirements and
that your firewalls are single-vsys firewalls.
Configuration
management is centralized to the Panorama Controller and replicated
to all Panorama Nodes managed by the Panorama Controller. Make sure that
this configuration is simple, compact, and largely identical across
all the Panorama Nodes.
Interconnect supports centralized
configuration based on device groups and templates which includes
objects, policies, firewall, and network configuration. Incremental
functionality added by Panorama Integration plugins such as NSX, SD-WAN,
and Prisma Access are not supported in a Panorama Interconnect deployment.
When designing your 
device group and 
template stack hierarchies, consider
                    the ordering of child device groups and templates within the template stack and
                    be mindful of where specific configuration objects and policy rules are created.
                    This is important to ensure the correct configurations are pushed to your
                    Panorama Nodes.
If you want to target specific firewalls managed by a Panorama Node, specify the
                        
Devices in the 
child device group and not the parent
                    device group in the device group hierarchy. This is required to push device
                    group configurations to specific firewalls managed by a Panorama node.
    
    Deploying Panorama
Interconnect on a Panorama Controller or Panorama Node in Panorama
mode with local log collection may result in decreased performance
due to high resource demand for management processes and log collection
processes.
 
 Deploy one or more Dedicated Log Collectors for log collection.
See 
Set Up Panorama for more
information on log storage requirements and procedures deploying
a Panorama management server in Log Collection mode.
Logs
and report generation are only available from the Panorama Nodes.
Ensure that the Panorama Controller and all Panorama Nodes
are in Operational mode before installing the plugin. The Panorama
Interconnect plugin does not support Panorama management servers
in FIPS mode, and may cause the Panorama management server to be
come unresponsive.
Enable HTTPS access on the Panorama Controller, Panorama
Nodes and managed firewalls so you can 
log in to the Panorama web interface and
firewall web interfaces. Panorama Interconnect does not support
CLI and API access.