<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Panorama Templates best practice? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10248#M7529</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm a big proponent of the second approach you mentioned.&amp;nbsp; You should be able to use one common template for every Palo Alto Networks firewall in your environment.&amp;nbsp; The biggest benefit of templates in Panorama is their ability to manage configuration elements that are&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; common a&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;cross many firewalls.&amp;nbsp; By taking this broad approach, you can make changes such as adding a new User-ID agent or changing an SNMP community string and have it apply to every firewall throughout the network just my modifying one template&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;I recommend using templates for configuration elements such as:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Server Profiles (LDAP, RADIUS, Syslog, etc)&lt;/LI&gt;&lt;LI&gt;SNMP Setup&lt;/LI&gt;&lt;LI&gt;Custom Response Pages&lt;/LI&gt;&lt;LI&gt;Logon banners&lt;/LI&gt;&lt;LI&gt;Authentication Profiles&lt;/LI&gt;&lt;LI&gt;Dynamic Update schedules&lt;/LI&gt;&lt;LI&gt;User Identification&lt;/LI&gt;&lt;LI&gt;Certificates and Certificate Profiles&lt;/LI&gt;&lt;LI&gt;Log Settings&lt;/LI&gt;&lt;LI&gt;Network Profiles&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some configuration elements that really do not belong in templates.&amp;nbsp; For instance, you can create security zones and interfaces within a template.&amp;nbsp; This may work fine if all your firewalls have identical network topologies.&amp;nbsp; However, if you need to vary from the template on any of the firewalls, you'll need to create a local override.&amp;nbsp; I've seen more than one instance when an admin puts security zones or interfaces into a template and then caused a self-inflicted outage when someone clicked on "Force Template Values" when performing a commit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;do not&lt;/STRONG&gt;&lt;/SPAN&gt; recommend using templates for device-specific configuration elements such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Interfaces&lt;/LI&gt;&lt;LI&gt;Security zones&lt;/LI&gt;&lt;LI&gt;Virtual routers&lt;/LI&gt;&lt;LI&gt;VLANS&lt;/LI&gt;&lt;LI&gt;Virtual Wires&lt;/LI&gt;&lt;LI&gt;IPsec Tunnels&lt;/LI&gt;&lt;LI&gt;GlobalProtect&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, this is how I typically utilize templates and what I recommend to my customers.&amp;nbsp; Hopefully this helps you figure out your centralized management strategy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 May 2014 14:06:23 GMT</pubDate>
    <dc:creator>rhagen</dc:creator>
    <dc:date>2014-05-01T14:06:23Z</dc:date>
    <item>
      <title>Panorama Templates best practice?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10245#M7526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Currently we are moving our stand alone firewalls to Panorama. We build device groups to manage policies and objects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now we try to create Templates but we don't know exactly how to use them. We read the following article but it didn't really help: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-4125"&gt;Panorama Templates&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main problem is that one device can only be assigned to one Template. So we consider two possibilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Every device gets it's own template. We manage all settings via Template and only few things are left to configure directly in the device.&lt;/LI&gt;&lt;LI&gt;We create a general template and assign it to all devices. Unfortunately we can only manage a few things which are equal on all devices (authentication, Zones).&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But we can't really see the benefit. Alternative 2 is not very reasonable because the main part of settings must be configured still locally. Alternative 1 shifts the configuration part from the device to Panorama. But that's all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2014 08:56:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10245#M7526</guid>
      <dc:creator>LCMember17002</dc:creator>
      <dc:date>2014-04-01T08:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama Templates best practice?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10246#M7527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Peri&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would prefer the option 1, even though all devices are having independent configuration. The benefit is, if at any point of time you replace a firewall in your network &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;one FW went down and replacing with a new one), then you can easily push all config from Panorama.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI: a helpful doc &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1742"&gt;How to Import Palo Alto Networks Firewall Configurations into Panorama&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Subhankar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2014 13:40:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10246#M7527</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-04-01T13:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama Templates best practice?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10247#M7528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's true. But I can do this even without Panorama. Just load my config Backup into my cold standby firewall &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2014 21:17:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10247#M7528</guid>
      <dc:creator>LCMember17002</dc:creator>
      <dc:date>2014-04-01T21:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama Templates best practice?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10248#M7529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm a big proponent of the second approach you mentioned.&amp;nbsp; You should be able to use one common template for every Palo Alto Networks firewall in your environment.&amp;nbsp; The biggest benefit of templates in Panorama is their ability to manage configuration elements that are&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; common a&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;cross many firewalls.&amp;nbsp; By taking this broad approach, you can make changes such as adding a new User-ID agent or changing an SNMP community string and have it apply to every firewall throughout the network just my modifying one template&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;I recommend using templates for configuration elements such as:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Server Profiles (LDAP, RADIUS, Syslog, etc)&lt;/LI&gt;&lt;LI&gt;SNMP Setup&lt;/LI&gt;&lt;LI&gt;Custom Response Pages&lt;/LI&gt;&lt;LI&gt;Logon banners&lt;/LI&gt;&lt;LI&gt;Authentication Profiles&lt;/LI&gt;&lt;LI&gt;Dynamic Update schedules&lt;/LI&gt;&lt;LI&gt;User Identification&lt;/LI&gt;&lt;LI&gt;Certificates and Certificate Profiles&lt;/LI&gt;&lt;LI&gt;Log Settings&lt;/LI&gt;&lt;LI&gt;Network Profiles&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some configuration elements that really do not belong in templates.&amp;nbsp; For instance, you can create security zones and interfaces within a template.&amp;nbsp; This may work fine if all your firewalls have identical network topologies.&amp;nbsp; However, if you need to vary from the template on any of the firewalls, you'll need to create a local override.&amp;nbsp; I've seen more than one instance when an admin puts security zones or interfaces into a template and then caused a self-inflicted outage when someone clicked on "Force Template Values" when performing a commit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;do not&lt;/STRONG&gt;&lt;/SPAN&gt; recommend using templates for device-specific configuration elements such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Interfaces&lt;/LI&gt;&lt;LI&gt;Security zones&lt;/LI&gt;&lt;LI&gt;Virtual routers&lt;/LI&gt;&lt;LI&gt;VLANS&lt;/LI&gt;&lt;LI&gt;Virtual Wires&lt;/LI&gt;&lt;LI&gt;IPsec Tunnels&lt;/LI&gt;&lt;LI&gt;GlobalProtect&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, this is how I typically utilize templates and what I recommend to my customers.&amp;nbsp; Hopefully this helps you figure out your centralized management strategy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2014 14:06:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10248#M7529</guid>
      <dc:creator>rhagen</dc:creator>
      <dc:date>2014-05-01T14:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama Templates best practice?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10249#M7530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting to see you have come to the same conclusion as myself regards what to and not to use templates for.&amp;nbsp; Can I ask how you manage a mix of vsys and non vsys firewalls.&amp;nbsp; Obviously I wouldn't want to manage any of the vsys via a template however the only solution I have found is to create two templates, one for vsys firewalls and one for non vsys firewalls.&amp;nbsp; The templates themselves are identical accept for the fact that one has virtual systems checked and the other doesn't.&amp;nbsp; This approach makes it tough to maintain the same settings in both templates but I can't really find an alternative solution.&amp;nbsp; Hopefully future releases of Panorama will support hierarchical templates which may solve this problem. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Mar 2015 16:17:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10249#M7530</guid>
      <dc:creator>CHammock</dc:creator>
      <dc:date>2015-03-05T16:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama Templates best practice?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10250#M7531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're correct. Today you need separate templates for vsys vs non-vsys platforms. Fortunately, this issue will be resolved in 7.0 along with delivering much greater flexibility in terms of how templates are used. Beta testing starts soon. Talk to your SE if you're interested in participating. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Mar 2015 17:14:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-templates-best-practice/m-p/10250#M7531</guid>
      <dc:creator>rhagen</dc:creator>
      <dc:date>2015-03-05T17:14:14Z</dc:date>
    </item>
  </channel>
</rss>

