Bulk import firewall to be managed by a Panorama™ Node
on Panorama Interconnect.
You can import multiple firewall to be managed
by a Panorama™ Node using a CSV template provided to you during
the import procedure. Importing multiple firewalls at once allows
you to quickly add multiple firewalls to Panorama Nodes, and assign them
to a template stack and device group to centralize its configuration
When importing multiple firewalls, you can add
firewalls to different Panorama Nodes, and different template stacks
and device groups. For example, you have deployed Panorama Node
A and Panorama Node B, each with two template stacks and two device
groups. If you are importing 100 firewalls, they can be imported
in the following way:
Add 50 firewalls to Panorama
Assign 25 firewalls to template stack A1 and
device group A1.
Assign 25 firewalls to template stack A2 and device group
Add 50 firewalls to Panorama Node B:
30 firewalls to template stack B1 and device group B1.
Assign 20 firewalls to template stack B2 and device group
any pending configurations changes on the
Panorama Controller. Importing multiple firewalls requires that
there be no pending changes to the Panorama Controller or the import
Download Sample CSV
a template of the CSV file with the correct format to upload multiple
Fill out the downloaded CSV. Enter the appropriate values
fields. The Panorama Node, device
group, and template stack must already be added and created on the Panorama
Controller before importing the firewalls and are required to successfully
add the firewall. Once you have finished entering the firewall information,
You also have the ability to assign the firewalls to content
schedules. These are not required for the firewall import.
the CSV column order is not supported. The firewall import fails if
the column order re-ordered.
Back in the Panorama web interface,
to browse and select the CSV file containing the
A firewall with required information
missing in the bulk import causes the entire import to fail. You
are prompted with an error message indicating the location of issues
in the import file if an error is encountered.
) Check (enable)
all existing devices
to delete all managed firewalls
added to the Panorama Node and replace them with the managed firewalls
in the import CSV. By default, imported firewalls are appended to
the end of the list of
the Panorama Node.
All imported firewalls must be new
firewalls that are not currently managed by the Panorama Node. The
import fails if any of the imported firewalls being imported are
part of the running configuration on the Panorama Controller or Panorama
Skip this step if the imported firewalls are not currently
part of the Panorama Controller or Panorama Node configuration and
you do not want to delete the existing managed firewalls.
to add the firewalls
as managed devices.
to finish adding the firewalls.
Required for firewalls running PAN-OS 10.1 and later
) Obtain the device registration authentication key
required for onboarding new firewalls.
locate the Panorama Node you added firewalls to.
Click the value in the Auth Keys column to display
the device registration authentication key.
The device registration authentication key is automatically
generated for the Panorama Node.
Copy the Auth Key.
Configure the firewall to communicate with the Panorama