- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
07-29-2020 11:40 AM
I have remote PA firewalls deployed with IPSec tunnels back to our data center firewalls. The remote management interface is not used; I created a loopback and configured all service route items to use the loopback. However, in Panorama Managed Device Summary, it still shows the remote management interface IP (which is not connected to anything).
How can I change to Panorama shows the loopback IP in Device Management?
08-01-2020 01:22 AM
This isn't possible. In panorama you will always see the management IP. Specially in case of an active passive HA cluster you would have the same loopback interface and IP ond both firewalls, then it would be somehow wrong to show both firewalls with the same loopback IP in panorama (besides the fact, that in this case it simply wouldn't really work).
@RamprakashRT You are right, the communication is bidirectional, but the connection is initiated from the firewall towards panorama and not otherwise. Over this connection coming from the firewall, panorama is then able to connect back to the firewall (for pushing updates, context switch to the firewall, ...)
07-31-2020 09:07 AM
Hi ,
Please make sure that loopback IP is reachable to Panorma on required ports and Viceversa.
If NAT is involved make sure it is bidirectional NAT as communication between Panorma and firewall is bidirectional.
Thanks,
Ram
08-01-2020 01:22 AM
This isn't possible. In panorama you will always see the management IP. Specially in case of an active passive HA cluster you would have the same loopback interface and IP ond both firewalls, then it would be somehow wrong to show both firewalls with the same loopback IP in panorama (besides the fact, that in this case it simply wouldn't really work).
@RamprakashRT You are right, the communication is bidirectional, but the connection is initiated from the firewall towards panorama and not otherwise. Over this connection coming from the firewall, panorama is then able to connect back to the firewall (for pushing updates, context switch to the firewall, ...)
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!