- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-08-2025 05:59 AM
Posting here while waiting for TAC. We use Panorama to manage NGFW and Prisma Access with Prisma SDWAN integration.
We recently rebuilt Panorama Azure VM. Latest dynamic updates and plugins are installed, device cert is valid, and cloud services OTP applied. We tried loading the old Panorama running config to get everything back to normal. However, after loading the config, we get commit errors related to Prisma Access config. Is there a specific process when restoring a backup config for Panorama that is also used to manage cloud services? Or, is it as simple as loading the config and performing the initial commit?
I'm wondering if we should load the backup config with our firewall device groups and templates, exclude the remote networks groups and templates, perform the initial commit, then focus on loading the remote networks/cloud services portion.
Any help appreciated. Thank you.
05-12-2025 08:07 AM - edited 05-12-2025 08:12 AM
This happened to be a combination of Palo backend and user-induced errors. I was using a running config from a recent TSF, which apparently doesn't contain PSKs for IPSec tunnels, certs, and whatnot. Using an older manually generated Panorama config snapshot, we resolved a lot of the initial commit errors. We still needed to work with TAC to fix the Prisma Access integration that was an old-code/back-end issue but everything else after that was manageable from our perspective. For future reference, rebuilding a Panorama Azure VM managing Prisma Access involves the following high-level steps:
05-12-2025 08:07 AM - edited 05-12-2025 08:12 AM
This happened to be a combination of Palo backend and user-induced errors. I was using a running config from a recent TSF, which apparently doesn't contain PSKs for IPSec tunnels, certs, and whatnot. Using an older manually generated Panorama config snapshot, we resolved a lot of the initial commit errors. We still needed to work with TAC to fix the Prisma Access integration that was an old-code/back-end issue but everything else after that was manageable from our perspective. For future reference, rebuilding a Panorama Azure VM managing Prisma Access involves the following high-level steps:
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!