Configure the Service Definition on Panorama
A service definition allows you to register the VM-Series firewall as a partner security service on the NSX-T Manager. The service definition must include the device group, a template stack, and an OVF URL.
- (Optional) Configure a Notify GroupCreate a notify group by specifying devices groups that should be notified of changes in the virtual environment. The firewalls included in the specified device groups receive a real-time update of security groups and IP addresses of guest VMs in them. The firewalls use this update to determine the most current list of members that constitute dynamic address groups referenced in policy.
- Selectand clickPanoramaVMwareNotify GroupAdd.
- Give your Notify Group a descriptiveName.
- Select the boxes of all devices groups that should be notified of changes to the virtual environment. If a device group does not have a check box available, it means that the device group is automatically included by virtue of the device group hierarchy.
- Add a new service definition.You can create up to 32 service definitions on Panorama.
- Select.PanoramaVMwareNSX-TService Definitions
- SelectAddto create a new service definition.
- Enter a descriptiveNamefor your service definition.
- (Optional) Add aDescriptionthat identifies the function or purpose for the VM-Series firewalls that will be deployed using this service definition.
- Assign a device group and a template stack to the service definition.Make sure to Create Template Stacks and Device Groups on Panorama.Because the firewalls deployed in this solution will be centrally administered from Panorama, you must specify theDevice Groupand theTemplate Stackthat the firewalls belong to. All the firewalls that are deployed using this service definition belong to the specified template stack and device group.
- Select the device group or device group hierarchy in theDevice Groupdrop-down.
- Select the template stack in theTemplatedrop-down.You cannot reuse a template stack or a device group assigned to one service definition in another service definition.
- Specify the location of the OVF file.Download the zip file, unzip it to extract and save the .ovf, mf and .vmdk files to the same directory. The ovf and vmdk files are used to deploy each instance of the firewall.Do not change the Panorama service definition OVF path after a successful NSX Service Deployment of VM-Series firewalls. Changing the OVF path, after a successful VM-Series firewall deployment, can result in a NSX Service Deployment failed state. You may resolve this failure in NSX-T Manager, however this may cause all VM-Series firewalls to redeploy.InOVF URL, add the location of the web server that hosts the ovf file. Both http and https are supported protocols.You can use the same ovf version or different versions across service definitions. Using different ovf versions across service definitions allows you to vary the PAN-OS version on the VM-Series firewalls in different ESXi clusters.
- (Optional) Select aNotify Group.
- SelectEast Westas theInsertion Typefor your firewall.
- (Optional)EnableHealth Check.Health check is enabled by default. Also called service health check, this NSX-T feature allows you to simulate high availability in the case of a service instance failing. When configured with the VM-Series firewall, if a VM-Series service instance fails, any traffic directed to that firewall is redirect to another firewall instance in the cluster (for service cluster deployments) or a firewall instance on another host (for host-based deployments).You cannot disable or enable Health Check in a service definition after committing and deploying VM-Series firewalls in NSX-T. Attempting to commit a change in the Health Check configuration returns commit failure. To change this, you must delete and recreate your service definition and redeploy your VM-Series firewalls.
- To automatically retrieve a device certificate when the VM-Series firewall is deployed by NSX Manager, configure the device certificate.Enable this option to apply a device certificate to newly deployed VM-Series firewalls. Only use this option when deploying the firewall using a base image OVF that supports device certificates. Panorama pushes the device certificate information to NSX Manager as part of the service definition. When a new firewall is deployed in NSX, the device certificate is installed on the firewall at bootup.For list of OVFs that support device certificates for the VM-Series firewall on VMware NSX, see the Palo Alto Networks Compatibility Matrix.If your OVF does support a device certificate, you must Enable device certificates regardless of whether or not you are using a device certificate. If your OVF does not support a device certificate, disable this option.
- If you have not done so already, log in to the Customer Support Portal and generate a Registration PIN and PIN ID.
- UnderDevice Certificate, clickEnable.
- Copy the PIN ID and enter it into theDevice Certificate PIN IDfield.
- Reenter the PIN ID into theConfirm Device Certificate PIN IDfield.
- Copy the PIN Value and enter it into theDevice Certificate PIN Valuefield.
- Reenter the PIN Value into theConfirm Device Certificate PIN Valuefield.
- ClickOKto save the service definition.
- Attach the service definition to the service manager.You cannot use a service definition in more than one service manager.
- Selectand click the link of the service manager name.PanoramaVMwareNSX-TService Manager
- Under Service Definitions, clickAddand select your service definition from the drop-down.
- Add the authorization code to license the firewalls.
- Selectand choose the device group you associated with the service definition you just created.PanoramaDevice Groups
- UnderDynamically Added Device Properties, add the authorization code you received with your order fulfillment email and, optionally, select None from theSW Versiondrop-down.When a new firewall is deployed on NSX-T it is automatically added to the device group, licensed using the authorization code you provided, and upgraded to the PAN-OS version you specified.On the support portal, you can view the total number of firewalls that you are authorized to deploy and the ratio of the number of licenses that have been used to the total number of licenses enabled by your authorization code.
- Commit to Panorama.
- On the NSX-T Manager, verify that the service definition is available.Select. The service definition is listed as a Service Instance on the NSX-T Manager.SystemService DeploymentsCatalog
Recommended For You
Recommended videos not found.