Security deployments are complex and overload IT teams with

Security deployments are complex and overload IT teams with
Security deployments are complex and overload IT teams with
convoluted security rules and mountains of data from multiple
sources. Panorama™ network security management empowers
you with easy-to-implement, consolidated policy creation and
centralized management features. Set up and control firewalls
centrally with industry-leading functionality and an efficient rule
base, and gain insight into network-wide traffic and threats.
Key Security Features:
• Deploy corporate policies centrally to be
used in conjunction with local policies for
maximum flexibility.
• Simplified Powerful Policy
• Enterprise Class Management
• Unmatched Visibility
Data Center
• Delegate appropriate levels of administrative control at the device level or globally
with role-based management.
• Group devices into logical, hierarchical
device groups for greater management
• Utilize template stacks for easy device and
network configuration.
• Easily import existing device configurations into Panorama.
• Automatically correlate indicators
of threats for improved visibility and
confirmation of compromised hosts across
your network.
• Centrally analyze, investigate and report
on n
­ etwork traffic, security incidents and
administrative modifications.
• View a highly customizable graphical
summary of applications, users, content,
and security threats.
• Generate actionable, customizable reports
to view application and threat traffic,
SaaS usage, and user behavior across your
Palo Alto Networks | Panorama Datasheet
Remote Offices
Branch Offices
Regional Offices
Figure 1: Panorama deployment
Simplified Powerful Policy — Panorama provides static rules in an ev-
er-changing network and threat landscape. Manage your network security
with a single security rule base for firewall, threat prevention, URL filtering, application awareness, user identification, sandboxing, file blocking,
and data filtering. This crucial simplification, along with dynamic security
updates, reduces workload on administrators while improving your overall
security posture.
Enterprise Class Management — Panorama keeps the enterprise user in
mind. Control your Internet and data center edge, and private and public
cloud deployments, all from one single console. Panorama can be deployed via virtual appliances, a choice of appropriately sized appliances, or
a combination of the two. Use appliances as Panorama management units,
or as log collectors in hierarchical deployment options. As your network
grows, you just need to add the log collectors — we take care of the rest!
Unmatched Automated Visibility and Awareness — Automated
threat correlation, with a predefined set of correlation
objects, cuts through the clutter of monstrous amounts of
data. It identifies compromised hosts and surfaces correlated
malicious behavior that would otherwise be buried in the
noise of too much information. This reduces the dwell
time of critical threats in your network. A clean and fully
customizable Application Command Center (ACC) provides
comprehensive insight into current and historical network
and threat data.
Simple Policy Control: Safely Enable Applications
Safely enabling applications means allowing access to specific
applications, but protecting them with specific threat prevention, QoS, and file, data, or URL filtering policies. Panorama
empowers you to set policy with a single security rule base,
and simplifies the process of importing, duplicating or modifying rules across your network. The combination of centralized
and local administrative control over policies and objects lets
you strike a balance between consistent security at the global
level and flexibility at the local level.
Enterprise Class Management
Deploying hierarchical device groups ensures that lower-level
groups inherit the settings of higher-level groups. This streamlines central management and enables you to organize devices
based on function and location without redundant configuration. Template stacking allows for streamlined configuration of
networks and devices. Furthermore, a common user interface
for both next-generation firewalls and management makes
management intuitive. Features such as Global Find and
Tag-based Rule Grouping empower IT administrators to take
advantage of all the information in your network with ease.
Global Shared Group
DG Business Unit X
DG Branches
Figure 1: ACC
Powerful Network Visibility: Application Command Center
Using Application Command Center (ACC) from Panorama
provides you with a highly interactive, graphical view of application, URL, threat and data (files and patterns) traversing
your Palo Alto Networks® firewalls. ACC includes a tabbed
view of network activity, threat activity, and blocked activity,
and each tab includes pertinent widgets for better visualization of traffic patterns on your network. Custom tabs can be
created, which include widgets that enable you to drill down
into the information that is most important to the administrator. ACC provides a comprehensive, fully customizable
view of not only current but also historical data.
Additional data on URL categories and threats provides a
complete and well-rounded picture of network activity. The
visibility from ACC enables you to make informed policy
decisions and respond quickly to potential security threats.
Reduced Response Times: Automated Correlation Engine
The automated correlation engine built into the NGFW
surfaces critical threats that may be hidden in your network.
It includes correlation objects that are defined by the Palo
Alto Networks threat research team. These objects identify
suspicious traffic patterns or a sequence of events that
indicates a malicious outcome. Some correlation objects can
identify dynamic patterns that have been observed from
malware samples in WildFire™.
Palo Alto Networks | Panorama Datasheet
DG Data Centers
DG Headquarters
DC West
DC East
Figure 2: Device Group Hierarchy
Branch Template
DC Template
Branch Template
East Template
West Template
Global Template
Figure 3: Template Stacking
Traffic Monitoring: Analysis, Reporting and Forensics
Panorama utilizes the same set of powerful monitoring and
reporting tools available at the local device management level.
As you perform log queries and generate reports, Panorama
dynamically pulls the most current data directly from firewalls
under management or from logs forwarded to Panorama.
• Log Viewer: For either an individual device or all devices,
you can quickly view log activities using dynamic log filtering by clicking on a cell value and/or using the expression
builder to define the sort criteria. Results can be saved for
future queries or exported for further analysis.
• Custom Reporting: Predefined reports can be used as is,
customized, or grouped together as one report in order to
suit specific requirements.
• User Activity Reports: A user activity report shows the
­applications used, URL categories visited, websites visited,
and all URLs visited over a specified period of time for individual users. Panorama builds the reports using an aggregate view of users’ activity, no matter which firewall they
are protected by, or which IP or device they may be using.
• SaaS Reports: A SaaS usage and threat report provides
detailed visibility into all SaaS activity and related threats.
• Log Forwarding: Panorama aggregates logs collected from
all of your Palo Alto Networks firewalls, both physical
and virtual form factor, and forwards them to a remote
destination for purposes such as long-term storage,
forensics or compliance reporting. Panorama can forward
all or selected logs, SNMP traps, and email notifications to
a remote logging destination, such as a syslog server (over
Specific individuals can be given appropriate access to the
tasks that are pertinent to their job while making other
access either hidden or read-only.
Software, Content and License Update Management: As
your deployment grows in size, you may want to make sure
that updates are sent to downstream boxes in an organized
manner. For instance, security teams may prefer to centrally
qualify a software update before it is delivered via Panorama
to all production firewalls at once. Using Panorama, the update process can be centrally managed for software updates,
content (application updates, antivirus signatures, threat
signatures, URL filtering database, etc.), and licenses.
M-100 M-500
Panorama Management Architecture
Panorama enables organizations to manage their
Palo Alto Networks firewalls using a model that provides
both central oversight and local control. Panorama provides
a number of ­­­tools for centralized administration:
• Templates/Template Stacks: Panorama manages common
device and network configuration through templates.
Templates can be used to manage configuration centrally and then push the changes to all managed firewalls.
This approach avoids making the same individual firewall
change repeatedly across many devices. To make things
even easier, templates can be stacked and used like building blocks during device and network configuration.
• Hierarchical Device Groups: Panorama manages common
policies and objects through hierarchical device groups.
Multi-level device groups are used to centrally manage
the policies across all deployment locations with common
requirements. Device group examples may be determined
geographically (e.g., Europe and North America). Each device group could have a functional sub-device group (e.g.,
perimeter or data center). This allows for common policy
sharing across different virtual systems on a device.
You can use shared policies for central control while still
providing your local firewall administrator with the autonomy
to make specific adjustments for local requirements. At the
device group level, you can create shared policies that are
defined as the first set of rules (pre-rules) and the last set
of rules (post-rules) to be evaluated against match criteria.
Pre- and post-rules can be viewed on a managed firewall, but
they can only be edited from Panorama within the context
of the administrative roles that have been defined. Local
device rules (those between pre- and post-rules) can be edited
by either your local firewall administrator or by a Panorama
administrator who has switched to a local firewall context. In
addition, an organization can use shared objects defined by a
Panorama administrator, which can be referenced by locally
managed device rules.
• Role-Based Administration: Role-based administration is
used to delegate feature-level administrative access, including a­ vailability of data (enabled, read-only, or disabled
and hidden from view) to different members of your staff.
Palo Alto Networks | Panorama Datasheet
Log Collector
M-100 M-500
Log Collector
M-100 M-500
Log Collector
M-100 M-500
Figure 3: Panorama architecture
Using templates, device groups, role-based administration,
and update management, you can delegate appropriate
access to all management functions, visualization tools, policy
creation, reporting and logging at a global level as well as the
local level.
Deployment Flexibility
Organizations can deploy Panorama either with hardware
appliances or as virtual appliances.
Hardware Appliances
Panorama can be deployed on the M-100 or the M-500
management appliances, and individual management and
logging components can be separated in a distributed manner
to accommodate large volumes of log data. Panorama running
on these appliances can be deployed in the following ways:
• Centralized: In this scenario, all Panorama management
and logging functions are consolidated into a single device
(with the option for high availability).
• Distributed: You can separate the management and
logging functions across multiple devices, splitting the
functions between managers and log collectors.
• Panorama Manager: The Panorama manager is responsible
for handling the tasks associated with policy and device
configuration across all managed devices. The manager
does not store log data locally, but rather uses separate log
collectors for handling log data. The manager analyzes the
data stored in the log collectors for centralized reporting.
• Panorama Log Collector: Organizations with high logging
volume and retention requirements can deploy dedicated
Panorama log collector devices that will aggregate log
information from multiple managed firewalls.
The separation of management and log collection enables
you to optimize your Panorama deployment in order to meet
scalability, organizational or geographical requirements.
Virtual Appliance
Panorama can also be deployed as a virtual appliance on
VMware® ESXi™, allowing organizations to support their
virtualization initiatives and consolidate rack space, which
is sometimes limited or costly in a data center.
The virtual appliance can serve as a Panorama manager and
is responsible for handling the tasks associated with policy
and device configuration across all managed devices. It can
be deployed in two ways:
Panorama Specifications
Number of Devices Supported
•Up to 1,000
High Availability
Administrator Authentication
•Local database
Management Tools and APIs
•Graphical User Interface (GUI)
•Command Line Interface (CLI)
• Centralized: All Panorama management and logging
­functions are consolidated into a single virtual appliance
(with the option for high availability).
• Distributed: Panorama distributed log collection requires a
mix of the hardware and virtual appliance.
Note: The virtual appliance may not be used as a Panorama
log collector. Panorama log collectors (M-100 or M-500
­appliances) are responsible for offloading intensive log
collection and processing tasks.
Providing the choice of either a hardware or virtualized
appliance, as well as the choice to combine or separate
the Panorama functions, provides you with the maximum
flexibility for managing multiple Palo Alto Networks firewalls
in a distributed network environment.
Virtual Appliance Specifications
Minimum Server Requirements:
•40 GB hard drive
•4 CPU cores
VMware Support
•VMware ESX 3.5, 4.0, 4.1, 5.0
Browser Support
•IE v7 or greater
•Firefox v3.6 or greater
•Safari v5.0 or greater
•Chrome v11.0 or greater
Log Storage
•VMware Virtual Disk: 8 TB maximum
Palo Alto Networks | Panorama Datasheet
Figure 4: M-100 Panorama Appliance
Figure 5: M-500 Panorama Appliance
M-100 Appliance
M-500 Appliance
•(4) 10/100/1000, [1] DB9 console serial port, (1) USB port
•Currently supported: (3) 10/100/1000, (1) DB9 console
serial port
•Maximum Supported: 4 TB RAID: 8 x 1 TB RAID Certified
HDD for 4 TB of RAID storage
Power Supply/Max Power Consumption
Max BTU/hr
•1,705 BTU/hr
•(4) 10/100/1000, (1) DB9 console serial port, (1) USB port,
(2) 10 GigE ports
•Currently supported: (3) 10/100/1000, (1) DB9 console
serial port
•Maximum Configuration: 12 TB RAID: 24 x 1 TB RAID
Certified HDD for 12 TB of RAID storage
•Currently Supported: 8 RAID pairs with 16 X 1 TB RAID
Certified HDD for 8 TB of RAID storage
•Default Shipping Configuration: 4 TB: 8 x 1TB RAID
Certified HDD for 4 TB of RAID storage
Power Supply/Max Power Consumption
Input Voltage (Input frequency)
•Dual power supplies, hot swap redundant configuration
•1200W/493W (total system)
•100-240 VAC (50-60Hz)
Max Current Consumption
Max BTU/hr
•10A @ 100 VAC
• 1,681 BTU/hr
Mean Time Between Failures (MTBF)
Input Voltage (Input frequency)
•14.5 years
• 100-240 VAC (50-60 Hz)
Rack Mountable (Dimensions)
Max Current Consumption
•1U, 19” standard rack (1.75"H x 23"D x 17.2"W)
•4.2A @ 120 VAC
Mean Time Between Failures (MTBF)
•26.7 lbs.
• 6 years
Rack Mountable (Dimensions)
• 2 U, 19” standard rack (3.5”H x 21”D x 17.5”W)
•FCC Class A, CE Class A, VCCI Class A
• 42.5 lbs.
•Operating Temperature: 40° to 104° F, 5 to 40° C
•Non-operating Temperature: -40° to 149° F, -40° to 65° C
• FCC Class A, CE Class A, VCCI Class A
• Operating Temperature 50° to 95° F, 10° to 35° C
• Non-operating Temperature -40° to 158° F, -40° to 65° C
4401 Great America Parkway
Santa Clara, CA 95054
© 2016 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark
of Palo Alto Networks. A list of our trademarks can be found at http://www. All other marks mentioned
herein may be trademarks of their respective companies.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF