Import Multiple Firewalls to a Panorama Node
Bulk import firewall to be managed by a Panorama™ Node on Panorama Interconnect.
You can import multiple firewall to be managed by a Panorama™ Node using a CSV template provided to you during the import procedure. Importing multiple firewalls at once allows you to quickly add multiple firewalls to Panorama Nodes, and assign them to a template stack and device group to centralize its configuration management.
When importing multiple firewalls, you can add firewalls to different Panorama Nodes, and different template stacks and device groups. For example, you have deployed Panorama Node A and Panorama Node B, each with two template stacks and two device groups. If you are importing 100 firewalls, they can be imported in the following way:
- Add 50 firewalls to Panorama Node A:
- Assign 25 firewalls to template stack A1 and device group A1.
- Assign 25 firewalls to template stack A2 and device group A2.
- Add 50 firewalls to Panorama Node B:
- Assign 30 firewalls to template stack B1 and device group B1.
- Assign 20 firewalls to template stack B2 and device group B2.
To add a single firewall, see Add a Firewall to a Panorama Node.
- Perform initial configuration on the firewall so that it is accessible and can communicate with Panorama over the network.Repeat this step for all firewalls to be managed by a Panorama using the Interconnect plugin.
- Log in to the Panorama web interface of the Panorama Controller.
- ClickCommitandCommit to Panoramaany pending configurations changes on the Panorama Controller. Importing multiple firewalls requires that there be no pending changes to the Panorama Controller or the import fails.
- SelectandPanoramaInterconnectDevicesImportthe firewalls.
- ClickDownload Sample CSVto download a template of the CSV file with the correct format to upload multiple firewalls.
- Fill out the downloaded CSV. Enter the appropriate values in theserial,panorama,device-group, andtemplate-stackfields. The Panorama Node, device group, and template stack must already be added and created on the Panorama Controller before importing the firewalls and are required to successfully add the firewall. Once you have finished entering the firewall information,Savethe file.You also have the ability to assign the firewalls to content schedules. These are not required for the firewall import.Changing the CSV column order is not supported. The firewall import fails if the column order re-ordered.
- Back in the Panorama web interface,Select Fileto browse and select the CSV file containing the firewall information.A firewall with required information missing in the bulk import causes the entire import to fail. You are prompted with an error message indicating the location of issues in the import file if an error is encountered.
- (Optional) Check (enable)Delete all existing devicesto delete all managed firewalls added to the Panorama Node and replace them with the managed firewalls in the import CSV. By default, imported firewalls are appended to the end of the list ofDevicesmanaged by the Panorama Node.All imported firewalls must be new firewalls that are not currently managed by the Panorama Node. The import fails if any of the imported firewalls being imported are part of the running configuration on the Panorama Controller or Panorama Node.Skip this step if the imported firewalls are not currently part of the Panorama Controller or Panorama Node configuration and you do not want to delete the existing managed firewalls.
- ClickOKto add the firewalls as managed devices.
- ClickCommitandCommit to Panoramato finish adding the firewalls.
- SelectandPanoramaInterconnectPanorama NodesSynchronize Config.
- (Required for firewalls running PAN-OS 10.1 and later releases) Obtain the device registration authentication key required for onboarding new firewalls.
- Selectand locate the Panorama Node you added firewalls to.PanoramaInterconnectPanorama Nodes
- Click the value in the Auth Keys column to display the device registration authentication key.The device registration authentication key is automatically generated for the Panorama Node.
- Copy the Auth Key.
- Configure the firewall to communicate with the Panorama Node.Repeat this step for each firewall you imported.
- Selectand edit the Panorama Settings.DeviceSetupManagement
- Enter the Panorama Node IP address in the first field
- (Optional) If the Panorama Node is in an HA configuration, enter the IP address of the secondary Panorama Node in the second field.
- Enter the device registrationAuth Keyyou copied in the previous step.
- SelectCommitandCommityour changes.
- Verify that the newly imported firewalls areConnected.
- Find the firewalls you imported and verify that the Connection Status column displaysConnected.
- (HA only) Copy the managed firewalls added to the primary Panorama Node to the secondary Panorama Node.This step is required to successfully push the Panorama Node configuration to managed firewalls for a Panorama Node in an HA configuration.
- Selectand select the primary Panorama Node you added managed firewalls to.PanoramaInterconnectPanorama Nodes
- SelectCopy Devices.
- ClickOKwhen prompted to copy the managed firewalls from the primary Panorama Node to the secondary Panorama node.
Recommended For You
Recommended videos not found.