<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failed to add imported nodes into Panorama in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/341825#M85735</link>
    <description>&lt;P&gt;Also me I had this problem, Why the TAC doesn't update the procedure? Also a footnote would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Aug 2020 11:03:27 GMT</pubDate>
    <dc:creator>VittoriaLorusso</dc:creator>
    <dc:date>2020-08-03T11:03:27Z</dc:date>
    <item>
      <title>Failed to add imported nodes into Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/235376#M67485</link>
      <description>&lt;P&gt;Hey Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought I would share my experiences with adding firewalls into Panorama and receiving the error message in the subject. The scenario&amp;nbsp;is a HA pair with multi-vsys compatibility enabled - and 5 virtual systems. In all cases, adding the Primary/Active firewall to Panorama works perfectly fine; the issue lies with adding the Secondary/Passive firewall after doing the operation "Import device configuration to Panorama" the message "Failed to add imported nodes into Panorama" is shown.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After looking at the confd logs with TAC we can see that its failing because it mentions that the device group names already exist. In step 5.3 in the below documentation, the device group names for the Secondary/Passive firewall have already been prefixed with a character to avoid name duplicates yet the issue still arises.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/panorama/panorama_adminguide/manage-firewalls/transition-a-firewall-to-panorama-management/migrate-a-firewall-ha-pair-to-panorama-management" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/panorama/panorama_adminguide/manage-firewalls/transition-a-firewall-to-panorama-management/migrate-a-firewall-ha-pair-to-panorama-management&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Upon further investigation from TACs side they gave us a workaround to modify the names of the virtual systems on the Secondary/Passive firewall then proceed once more with the import - this seems to work. As this is of course a workaround and not an actual solution they looked into this further and found that this is actually expected behaviour, but the documentation should be updated to include the below steps which also work - if anyone has ever faced this before let me know but this issue does seem specific to importing HA firewalls with multiple virtual systems so I'm surprised it hasn't been raised before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Import device group from HA peer-1 followed by panorama commit.&lt;BR /&gt;2. Export, Push and commit the configuration bundle to HA Peer-1.&lt;BR /&gt;3. Delete Device groups from Panorama after Push&amp;amp;Commit to HA Peer-1.&lt;BR /&gt;4. Import device group from HA peer-2 followed by panorama commit.&lt;BR /&gt;5. Export, Push and commit the configuration bundle to HA Peer-2.&lt;BR /&gt;6. Associate HA peer-1 and HA peer-2 into one device group (the one created during HA Peer-2 import)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The steps are also the same and also work if you start with the Secondary/Passive unit and resume "HA-peer-1" is the Passive device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Luke.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Oct 2018 14:58:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/235376#M67485</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-15T14:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to add imported nodes into Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/333177#M84166</link>
      <description>&lt;P&gt;This was a great solution to this problem! its crazy this isn't documented! I was running PANOS 9.0.8 on both the firewall (PA-3220) and the Panorama-VM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose PANW thinks folks are going to start the multi-vsys configuration from&amp;nbsp;Panorama? Like you mentioned, perhaps there aren't enough people facing this issue to rewrite that article.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 13:47:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/333177#M84166</guid>
      <dc:creator>JD-SECD</dc:creator>
      <dc:date>2020-06-12T13:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to add imported nodes into Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/341825#M85735</link>
      <description>&lt;P&gt;Also me I had this problem, Why the TAC doesn't update the procedure? Also a footnote would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 11:03:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/failed-to-add-imported-nodes-into-panorama/m-p/341825#M85735</guid>
      <dc:creator>VittoriaLorusso</dc:creator>
      <dc:date>2020-08-03T11:03:27Z</dc:date>
    </item>
  </channel>
</rss>

