PALOALTO NETWORKS PANORAMA TEMPLATES

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ย. 2024
  • Through the Device and Network tabs, you can deploy a common base configuration to multiple firewalls that require similar settings using a template or a template stack (a combination of templates). When managing firewall configurations with Panorama, you use a combination of device groups (to manage shared policies and objects) and templates (to manage shared device and network settings).

ความคิดเห็น • 41

  • @TheSurmukh
    @TheSurmukh 2 ปีที่แล้ว +1

    Easy way to understand . Thanks for the upload

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว

      Thanks for the feedback. It really helps to improve contents.

  • @damindawt
    @damindawt ปีที่แล้ว +1

    Very good explanation mate. Very helpful

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Thanks for the valuable feedback.

  • @mustafashake8565
    @mustafashake8565 2 ปีที่แล้ว +1

    Good explanation Mahesh, Its's very helpful

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว

      Thank you so much for your valuable comment. It really helps.

  • @srinu1230
    @srinu1230 2 ปีที่แล้ว +1

    Awesome explanation Bro, Its's Crystal clear and very helpful.
    Keep it up bro, Humble request you to make more videos like this...
    Thanks in Advance :)

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว +2

      Thank you so much for your valuable comment.

    • @srinu1230
      @srinu1230 2 ปีที่แล้ว

      ​@@firewalllife
      Hi
      At 24:50 you said Template stack is just a container and we don't do any config changes in Template stack but i guess its wrong. We can make Config changes in Template Stacks. I mean we can override Template config in Template stack.

  • @tanip5498
    @tanip5498 2 ปีที่แล้ว +1

    Good explanation and it’s very useful

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว

      Thank you so much for the appreciation. It helps!

  • @chandimaediriweera4816
    @chandimaediriweera4816 ปีที่แล้ว +1

    Thank you for the video

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Thank you for your valuable feedback.

  • @kasunperera4296
    @kasunperera4296 ปีที่แล้ว +1

    Great explanation BTW are you a Sri Lankan, your accent is so sri lankan

  • @info-canada9357
    @info-canada9357 2 ปีที่แล้ว

    very useful and nice explanation. keep it up bro. thanks

  • @fcanripendra
    @fcanripendra ปีที่แล้ว

    very well explained, thanks.

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Thanks for your valuable comment.

  • @sandeepkumaryadav2344
    @sandeepkumaryadav2344 ปีที่แล้ว

    Awesome, Awesome, Awesome

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Thank you for the feedback. It really helps.

  • @rizwanrafeek3811
    @rizwanrafeek3811 2 ปีที่แล้ว +2

    I have got a PAN 3020 chassis in production and want to migrate its configuration to chassis 820 device, there is no easy way import configuration from 3020 chassis to 820 chassis?
    In Cisco ASA, it is just matter of 10 to 15 minutes I could migrate the configuration from one firewall to another firewall.
    In paloalto is is nightmare and there is no assurance one could migrate from older chassis to newer chassis on Paloalto.
    Administration is nightmare in paloalto.

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว

      Thank you for your query. It really helps to improve my contents. I highly suggest you to use Palo Alto migration tool, now available under the name “Expedition”.. You can easily migrate configurations between different models of Palo Alto + Different firewall vendor such as Checkpoint to Palo Alto.

    • @rizwanrafeek3811
      @rizwanrafeek3811 2 ปีที่แล้ว +1

      @@firewalllife Yes, I downloaded Expedition and installed on Linux box and I have yet to figure out how to use Expedition.
      You sounded very much like you are from Sri Lanka.

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว +1

      @@rizwanrafeek3811 Great!. If you need me to do a demo on Palo Alto Expedition please let me know. Yes Thanks.

    • @rizwanrafeek3811
      @rizwanrafeek3811 2 ปีที่แล้ว +2

      @@firewalllife I wonder you have used Expedition to migrate configuration to Paloalto ?
      That would be awesome if you do a demo on Expedition.
      I have got installed successfully version 20.04, but no clue on how to make use of it.

  • @boh70326
    @boh70326 ปีที่แล้ว +1

    Wow amazing channel, thanks mate .
    Any suggestions on how to pass PCNSA? Cheers

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Thank you for your valuable feedback. Contact me via official email of the channel.

  • @arlonrando
    @arlonrando ปีที่แล้ว

    Struggling .. have to configure my first PA-410 with Panorama 10.1.
    PA is registered in Panorama and connected, same firmware.
    Tried for testing simplest template in a stack and assigned to that PA-410, just with one Eth1 to add interface and ip address.
    But error messagees no matter how i trie .. seigh! Tuesday date with support. Annoying.

  • @prashanthb1937
    @prashanthb1937 2 ปีที่แล้ว +1

    Hi Mahesh, using Variables we can add the IP's for interfaces or add different configurations for each firewall using variables $IP, Can you add those to this video if possible.

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว

      Thank you for your valuable comment. We will upload with requested addition asap.

  • @dhananjay3974
    @dhananjay3974 ปีที่แล้ว +1

    Very well Explained Sir
    I have one doubt below,
    In our environment we do configuration in template and push to Device directly however in this vedeo in Template stack scenario we Pushed to Stack.
    In template also we have option to pushed to multiple firewalls then is there need of template stack?
    Sir What is the difference in both cases and which method is better ?

    • @firewalllife
      @firewalllife  ปีที่แล้ว +1

      Actually this is a template behavior change happened starting from PAN OS 8.1.. Previous PAN OS versions behavior was to assign managed devices to templates but starting from PAN OS 8.1 you can assign managed devices to template stacks instead of templates. Please refer to below Palo Alto official document.
      docs.paloaltonetworks.com/pan-os/8-1/pan-os-release-notes/pan-os-8-1-release-information/changes-to-default-behavior/panorama-changes

    • @dhananjay3974
      @dhananjay3974 ปีที่แล้ว +1

      Oh I see thank you very much sir for reply
      I got it now 🙂

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      @@dhananjay3974 Thanks for your valuable contribution towards building a collaborative environment for Palo Alto knowledge sharing.

  • @Adam-ty3zz
    @Adam-ty3zz 2 ปีที่แล้ว +1

    Do you have more trainings for Palo Alto

    • @firewalllife
      @firewalllife  2 ปีที่แล้ว

      You can suggest any required topic. Thank for your valuable comment.

    • @boh70326
      @boh70326 ปีที่แล้ว +1

      @@firewalllife application filters and tags in production))

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      @@boh70326 Thank you for your valuable feedback.

  • @simpletalks4639
    @simpletalks4639 ปีที่แล้ว

    Hi
    Can we push the configuration changes through the tamplate stack?

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Yes. This behavior started from PAN OS 8.1. Previous PAN OS versions templates were used to push configuration changes.

    • @firewalllife
      @firewalllife  ปีที่แล้ว

      Thank you so much for your contribution.