Panorama in NSX deployment not showing interfaces within the template

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Panorama in NSX deployment not showing interfaces within the template

L3 Networker

Hello community!

 

I have an issue you maybe can help me with:

I´m deploying PAN-VM firewall on NSX and noticed that the template where I added the VM doesn´t have interfaces.

The VM is connected to the Panorama and the template is in sync, I push a new zone and this creates a new vwire pair of sub-interfaces on the VM as it should be but in Panorama if I go to Interfaces tab within the template there are no interfaces at all, not even the default vwire pair ethernet1/1 and ethernet1/2. Is this normal behavior? 

 

Thank you in advance,

Marcos.

2 REPLIES 2

Cyber Elite
Cyber Elite

Hi Marcos you can add the interfaces where you want to push templates to manually

 

add interface.png

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Hi Reaper,

 

Thank you for the answer.

 

The problem is that I want to add a netflow profile on the VM firewall´s virtual wire subinterfaces. Please consider the following:

 

Use template stacks to configure the settings that are required for the VMSeries firewalls to operate on the network and associate; the configuration is defined using the Device
and Network tabs on Panorama. And each template stack with zones used in your NSX configuration on
Panorama must be associated with a service definition; at a minimum, you must create a zone within the
template stack so that the NSX Manager can redirect traffic to the VM-Series firewall.
Each virtual wire zone belonging to the NSX-related template becomes available as a service profile on
the Service Composer on the NSX Manager. When you create NSX-related zone on Panorama, Panorama
pushes the zone as a part of the template stack configuration to the firewall, and the firewall automatically
creates a pair of virtual wire subinterfaces, for example ethernet1/1.3 and ethernet 1/2.3, to isolate traffic
for a tenant or sub-tenant. On the firewall, you can then Create Security Groups and Steering Rules to
secure traffic that arrives on the virtual wire subinterface pair that maps to the zone "

 

So I´d like to add a netflow profile to those ethernet1/1.3 and ethernet1/2.3 on the VM firewall. Is this possible to achieve from the Panorama?

 

Thank you,

Marcos.

 

  • 3441 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!