Create Template Stacks and Device Groups on Panorama
To manage the VM-Series firewalls on NSX-T
using Panorama, the firewalls must belong to a device group and
a template stack. Device groups allow you to assemble firewalls
that need similar policies and objects as a logical unit; the configuration
is defined using the
on Panorama. Use template stacks to configure the settings that
are required for the VM-Series firewalls to operate on the network;
the configuration is defined using the
on Panorama. Each template stack used in your NSX-T configuration
must be associated with a service definition.
in NSX-T have two default zones and two interfaces configured in
virtual-wire mode. Ethernet1/1 is part of zone
ethernet1/2 is part of zone
. To push
policy rules from Panorama to managed firewalls, you must configure
zones and interfaces matching those on the firewall in the corresponding
template stack on Panorama.
If you change the default virtual wire or zone names,
the virtual wire and zones on Panorama must match the names used
on the firewall.
The virtual wire object named
The first zone named
The second zone named
Repeat this process for each template in your deployment.
, and select
to save the changes to the
running configuration on Panorama.
Update the DNS and NTP server information of your template
stack. You must complete this step if you are using device certificates in your
deployment. This is required to ensure the firewalls deployed in
your NSX-T environment have the correct DNS information needed to
reach the device certificate server.
Verify that you specified the correct template
stack from the