<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to onboard palo in to panorama in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/how-to-onboard-palo-in-to-panorama/m-p/509704#M1028</link>
    <description>&lt;P&gt;Thank you for the post&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165847"&gt;@rbabu0&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in nutshell, unless Firewall's related setting (serial number registration, assignment to DG/TS, log collector assignment) has been deleted from Panorama side, all you have to is to make sure that Firewall is configured with Panorama's IP address and all the required ports are enabled between Firewall and Panorama, then all should work again. Below is detailed break down:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order to re-enable Firewall to be registered and managed by Panorama make sure that below settings are in place on Firewall side:&lt;/P&gt;
&lt;P&gt;- Navigate to Device &amp;gt; Setup &amp;gt; Management &amp;gt; Panorama Settings &amp;gt; Edit &amp;gt; Panorama Servers. Make sure that Firewall has configured IP address of Panorama (Secondary IP address is used only in the case you have Panorama in HA).&lt;/P&gt;
&lt;P&gt;- Make sure that Firewall can reach Panorama IP address. By default management interface will be used for registration to Panorama.&lt;/P&gt;
&lt;P&gt;- If your L3 Team has used the feature: "Disable Panorama Policy and Objects" &amp;amp; "Disable Device and Network Template", then refer to this KB for recovery:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClffCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClffCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On Panorama side, make sure that below configuration is in place:&lt;/P&gt;
&lt;P&gt;- Panorama registers Firewall with Firewall's serial number. Since you mentioned that it was previously registered, likely you do not have to do anything unless somebody has completely deleted the Firewall from Panorama. Make sure that Device State under: Panorama &amp;gt; Managed Devices &amp;gt; Summary is reporting status: "Connected".&lt;/P&gt;
&lt;P&gt;- If you have to onboard Firewall to Panorama from scratch, please refer to this documentation for PAN-OS 9.1:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device" target="_blank"&gt;https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For PAN-OS 10.1 and higher refer to this document:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/panorama/10-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device" target="_blank"&gt;https://docs.paloaltonetworks.com/panorama/10-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device&lt;/A&gt;&amp;nbsp;The only difference between these 2 versions is the step to add authentication key.&lt;/P&gt;
&lt;P&gt;- Make sure that Firewall is added to Device Group and Template Stack for configuration pushing and log collector group for log collection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jul 2022 23:47:36 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2022-07-22T23:47:36Z</dc:date>
    <item>
      <title>How to onboard palo in to panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/how-to-onboard-palo-in-to-panorama/m-p/509637#M1027</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our palo already onboarded in to the panorama. Due to some reason our L3 team disabled panorama setting in the palo. Now we need to re-add in to the panorama. Please tell me how need to do?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Palo we need to enable pano setting only enough&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. or we need to import the config in the panorama as well ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 16:19:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/how-to-onboard-palo-in-to-panorama/m-p/509637#M1027</guid>
      <dc:creator>rbabu0</dc:creator>
      <dc:date>2022-07-22T16:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to onboard palo in to panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/how-to-onboard-palo-in-to-panorama/m-p/509704#M1028</link>
      <description>&lt;P&gt;Thank you for the post&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165847"&gt;@rbabu0&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in nutshell, unless Firewall's related setting (serial number registration, assignment to DG/TS, log collector assignment) has been deleted from Panorama side, all you have to is to make sure that Firewall is configured with Panorama's IP address and all the required ports are enabled between Firewall and Panorama, then all should work again. Below is detailed break down:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order to re-enable Firewall to be registered and managed by Panorama make sure that below settings are in place on Firewall side:&lt;/P&gt;
&lt;P&gt;- Navigate to Device &amp;gt; Setup &amp;gt; Management &amp;gt; Panorama Settings &amp;gt; Edit &amp;gt; Panorama Servers. Make sure that Firewall has configured IP address of Panorama (Secondary IP address is used only in the case you have Panorama in HA).&lt;/P&gt;
&lt;P&gt;- Make sure that Firewall can reach Panorama IP address. By default management interface will be used for registration to Panorama.&lt;/P&gt;
&lt;P&gt;- If your L3 Team has used the feature: "Disable Panorama Policy and Objects" &amp;amp; "Disable Device and Network Template", then refer to this KB for recovery:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClffCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClffCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On Panorama side, make sure that below configuration is in place:&lt;/P&gt;
&lt;P&gt;- Panorama registers Firewall with Firewall's serial number. Since you mentioned that it was previously registered, likely you do not have to do anything unless somebody has completely deleted the Firewall from Panorama. Make sure that Device State under: Panorama &amp;gt; Managed Devices &amp;gt; Summary is reporting status: "Connected".&lt;/P&gt;
&lt;P&gt;- If you have to onboard Firewall to Panorama from scratch, please refer to this documentation for PAN-OS 9.1:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device" target="_blank"&gt;https://docs.paloaltonetworks.com/panorama/9-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For PAN-OS 10.1 and higher refer to this document:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/panorama/10-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device" target="_blank"&gt;https://docs.paloaltonetworks.com/panorama/10-1/panorama-admin/manage-firewalls/add-a-firewall-as-a-managed-device&lt;/A&gt;&amp;nbsp;The only difference between these 2 versions is the step to add authentication key.&lt;/P&gt;
&lt;P&gt;- Make sure that Firewall is added to Device Group and Template Stack for configuration pushing and log collector group for log collection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 23:47:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/how-to-onboard-palo-in-to-panorama/m-p/509704#M1028</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-07-22T23:47:36Z</dc:date>
    </item>
  </channel>
</rss>

