Verify the configuration was imported properly and completely by comparing running and candidate config via Panorama > Config Audit > Go.Import the firewall configuration into Panorama. From Panorama, select Panorama > Setup > Operations, click Import device configuration to Panorama, and select the Device. Panorama can’t import a configuration from a firewall that is assigned to an existing device group or template.Set up a connection from the firewall to Panorama. Log in to the firewall, select Device > Setup, and edit the Panorama Settings. In the Panorama Servers fields, enter the IP addresses of the Panorama management server. Click OK and Commit.For the Commit Type select Panorama, and click Commit again. Add the firewall to the panorama managed devices list. Log into Panorama, select Panorama > Managed Devices and click Add. Enter the serial number of the firewall and click OK.However, Panorama releases that support configuration imports (Panorama 7.0 or later) can’t push or export configurations to firewalls running PAN-OS 6.0.3 or earlier releases. You can import configurations from firewalls that run PAN-OS 5.0 or later releases. To contain the imported policies and objects, Panorama automatically creates one device group. In order to add a locally managed firewall to panorama management, first you need to import the firewall configuration to the panorama. When importing a firewall configuration, Panorama automatically creates a template to contain the imported network and device settings.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |