<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto and Panorama integration/availibility  question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252913#M71864</link>
    <description>&lt;P&gt;The rules are greyed out only because they came from Panorama, and to indicate that they can only be modified on Panorama instead of locally on the firewall. Generally you don't want a local firewall admin to override the rules from Panorama.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once those rules are committed to the firewall, they are part of the configuration. Connectivity to Panorama is not needed to maintain the function of the rules. If you lose connectivitiy to Panorama, the rules stay in place but you won't be able to modify them until Panorama reconnects.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can still add/remove/change policies on the local firewall itself, but not the rules pushed from Panorama.&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2019 18:15:35 GMT</pubDate>
    <dc:creator>gwesson</dc:creator>
    <dc:date>2019-03-08T18:15:35Z</dc:date>
    <item>
      <title>Palo Alto and Panorama integration/availibility  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252886#M71859</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some questions about integration between PA firewall and Panorama.&lt;/P&gt;&lt;P&gt;In my scenario, there's one cluster of PA devices and only one Panorama device.&lt;/P&gt;&lt;P&gt;The firewall policies were imported from the cluster into Panorama (Pre-Rules in the Device group).&lt;/P&gt;&lt;P&gt;I performed some changes on policies and pushed them back to the cluster. Until now, everyhting is OK...&lt;/P&gt;&lt;P&gt;After pushing, all policies are greyed out on the firewall (and marked as read only)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So...&lt;/P&gt;&lt;P&gt;what's happen if the connectivity is down between Panorama and the cluster ?&lt;/P&gt;&lt;P&gt;Can I still add/remove/change policies locally on the firewall itself ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once Panorama is UP again, can I import the change made locally to Panorama ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 14:14:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252886#M71859</guid>
      <dc:creator>licenselu</dc:creator>
      <dc:date>2019-03-08T14:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Panorama integration/availibility  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252913#M71864</link>
      <description>&lt;P&gt;The rules are greyed out only because they came from Panorama, and to indicate that they can only be modified on Panorama instead of locally on the firewall. Generally you don't want a local firewall admin to override the rules from Panorama.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once those rules are committed to the firewall, they are part of the configuration. Connectivity to Panorama is not needed to maintain the function of the rules. If you lose connectivitiy to Panorama, the rules stay in place but you won't be able to modify them until Panorama reconnects.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can still add/remove/change policies on the local firewall itself, but not the rules pushed from Panorama.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 18:15:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252913#M71864</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-03-08T18:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Panorama integration/availibility  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252931#M71869</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And what about my last question ??&lt;/P&gt;&lt;P&gt;Can I reimport the rules from the device to Panorama ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 19:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252931#M71869</guid>
      <dc:creator>slp-security</dc:creator>
      <dc:date>2019-03-08T19:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Panorama integration/availibility  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252933#M71870</link>
      <description>&lt;P&gt;Yes. On the firewall, you can disable the Policy and Objects (Device &amp;gt; Setup &amp;gt; Management &amp;gt; "Panorama Settings" section). You'll be given an option to import the Panorama items locally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama-policy.jpg" style="width: 620px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19030iF3DA8F15D45C910F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama-policy.jpg" alt="Panorama-policy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 19:27:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/252933#M71870</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-03-08T19:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Panorama integration/availibility  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/253154#M71932</link>
      <description>&lt;P&gt;My rule of thumb is that I don't make any changes to my firewalls outside of Panorama. I have never had Panorama down outside of Panorama upgrades, so it hasn't been an issue. If I did make changes locally, I would just manually recreate on Panorama. Since you only have 1 cluster, it seems unlikely that Panorama would be down and you needed to make many changes locally. I have found that the import process back into Panorama can be a challenge, especially if there is existing configuration. I believe that duplicate items can get created.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:54:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-panorama-integration-availibility-question/m-p/253154#M71932</guid>
      <dc:creator>khsieh</dc:creator>
      <dc:date>2019-03-11T22:54:53Z</dc:date>
    </item>
  </channel>
</rss>

