554007bf5f128b9510b049d9_panorama1-700x151.jpg

This is webpage is created by Kartik for his interview purpose only.

Central Management System from Palo Alto Networks

Panorama is a central Management System for Palo Alto Networks Firewalls.

554009575f128b9510b04a39_palo-alto-networks-product-overview-15-638.jpg

The visual presentation below shows the how panorama interacts with Palo Alto Networks Firewalls.

554009ef0c9d871c3f113c31_pan2.png

Panorama Highlights
- It provides a global view of the firewall network.
- It is a centralized configuration management.
- Centralized logging and reporting.
- Centralized deployment management.
- Supports High Availability (HA)
- Supports file shares, so we can work with SAN, NAS, and NFS (for logging).
- It provides multiple access method – CLI, GUI, and XML API.
- Can support up to 1000 devices.
- Management works over TCP port 3978.
- Provides Dynamic updates – It pulls the updates and then can push them to the firewalls.
- Provides role based administration control – We can have global admins, template admins, device group admins, local admins.
- We can have shared policies which can be applied to multiple firewalls. Furthermore, Panorama provides the concept of pre- and post-rules to provide control over the order in which policies are applied
– We can have shared groups, device groups, and local groups. Local groups can over ride device groups, and device groups can over ride shared groups.
- Panorama policies are tried to the device groups. They can be sent to a whole device group or to an individual firewall. Once pushed down they can’t edited on the local device but can be overridden or reordered.
– We can have “combined rules preview” to see where the rule is going to fit and how it is going to be applied to a device.
- Panorama also provides an option to “commit” first at the Panorama level to check for any errors and then it can pushed to the devices.
- Panorama can ‘proxy a management connection’ to an individual device. This is called “Context Switching”. We can move from global admin down to an individual administration.
- Zone Names can be specified in  Panorama template or configured on the local device. Any policy that is tagged with a non-existent zone will be dropped. 
Yellow dot means that something we applied is overridden by a local policies.
- In large deployments, we can have multiple M100 (Panorama) set up as log collectors, so we can spread our disk usage, processing power to collect logs and separate them for actua management function.
- Robust Reporting Engine: We can aggregate logs from all the devices and can run custom reports to filter out important information.

Panorama screen shots

554019d3c04c41fe1bd6b304_sc5.png554019e8da5687864a03d6ec_sc6.png554019fdda5687864a03d716_sc1.png55401a10ce7ee8fd1bda0f11_sc2.png55401a31ce7ee8fd1bda0f14_sc3.png55401a41ce7ee8fd1bda0f16_sc4.png55401a51c04c41fe1bd6b30b_sc7.png55401a5fcc975b894a927d07_sc8.png55401a6dce7ee8fd1bda0f1b_sc9.png55401a79ce7ee8fd1bda0f1f_sc10.png55401a8dce7ee8fd1bda0f21_sc11.png55401a9bcc975b894a927d14_sc12.png