Panorama: how to manage Security/NAT policies

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Panorama: how to manage Security/NAT policies

L4 Transporter

This is something we're struggling with. How do you write Security Policies and NAT Policies in Panorama when each firewall uses different IPs for NAT and the Security Policies include the IPs in them?

On our FreeBSD firewalls, this was easy. We just used generic variables in our rules scripts such that the rules were the same across all the firewalls, with a separate/unique config file on each firewall that was read into the scripts (to populate the generic variables).

Is everyone just using generic Security Policies that only specify the Source/Destination Zones, the Application, and the Services?  How do you push out NAT Policies that are site-specific?

 

I have not found any way to do this in Panorama. Any pointers to documentation on best practises for this kind of setup would be nice. Having to touch 50 separate firewalls in order to add a new Security Policy is a bit of a pain. 🙂  The few bits of documentation I've found just show how to add policies into Panorama, without listing any best practises or examples.

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

You can nest device groups.

First you create Address object into parent device group.

 

Panorama-object-1.PNG

 

Then into every firewall device group with correct ip.

Panorama-object-2.PNG

 

 

Create rule in parent device group using address object.

Panorama-object-3.PNG

 

You can move around in hierarcy and verify that child device group is using IP from child device group.

Panorama-object-4.PNG

 

And if you push policy into firewall then it uses correct IP.

Panorama-object-5.PNG

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

View solution in original post

4 REPLIES 4

Cyber Elite
Cyber Elite

You can nest device groups.

First you create Address object into parent device group.

 

Panorama-object-1.PNG

 

Then into every firewall device group with correct ip.

Panorama-object-2.PNG

 

 

Create rule in parent device group using address object.

Panorama-object-3.PNG

 

You can move around in hierarcy and verify that child device group is using IP from child device group.

Panorama-object-4.PNG

 

And if you push policy into firewall then it uses correct IP.

Panorama-object-5.PNG

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Hrm, interesting.  I'll have to play around with that a bit.

 

Thanks for the tip.

 

Cheers,

Freddie

Okay, so would create a parent Device Group that will hold all of the Security Policies and NAT Policies,  and whatnot, using generic Address Object names for things.  Use a generic, non-routable IP for the value of the Address Objects.  There wouldn't be any firewalls associated with this Device Group.

 

Then create separate Device Groups for each firewall, nesting them all underneath the parent DG.  Recreate each of the Address Objects from the parent DG, assigning the correct IPs for that firewall into the AOs.

 

Did a couple of test rules using the above, and it appears to work.  Will need to play with this some, as this would also require having all the Zone configuration and whatnot configured in the Templates.

 

 

are you talking about "overriding" that address object in the lower device groups, or actually creating another object?  

  • 1 accepted solution
  • 4820 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!