: Configure the Panorama Plugin for Nutanix
Focus
Focus

Configure the Panorama Plugin for Nutanix

Table of Contents

Configure the Panorama Plugin for Nutanix

After installing the plugin, complete the following procedure to establish a connection between Panorama and Prism Central.
  1. Log in to the Panorama web interface.
  2. Enable monitoring and set the monitoring interval.
    1. Select PanoramaNutanixSetupGeneral.
    2. Select Enable Monitoring.
    3. Set the Monitoring Interval in seconds. The monitoring interval is how often Panorama retrieves updated networking information from Prism Central.
  3. Create a notify group.
    1. Select PanoramaNutanixSetupNotify Groups.
    2. Click Add.
    3. Enter a descriptive Name for your notify group.
    4. Select the device groups in your Nutanix deployment.
  4. Add Prism Central information.
    1. Select PanoramaNutanixSetupNutanix Prism Central.
    2. Click Add.
    3. Enter a descriptive Name for your Prism Central.
    4. Enter the IP address or FQDN for Prism Central.
    5. Enter your Prism Central username.
    6. Enter and confirm your Prism Central password.
    7. Click Validate to confirm that you entered the Prism Central credentials correctly.
      If you return to the Nutanix Prism Central Info window after clicking OK, clicking the Validate button returns a credential validation error message. This is the expected behavior. Although Panorama displays dots in the password field, the field is empty; this causes the validation to fail despite Panorama being successfully connected to Prism Central.
    8. Click OK.
  5. Configure the Monitoring Definition.
    1. Select PanoramaNutanixMonitoring Definition and click Add.
    2. Enter a descriptive Name and optionally a description to identify the Prism Central for which you use this definition.
    3. Select the Prism Central and Notify Group.
    4. Click OK.
  6. Commit your changes.
  7. Verify that you can view the VM information on Panorama, and define the match criteria for dynamic address groups.
    1. Select PanoramaObjectsAddress Groups and click Add.
    2. Enter a descriptive Name for your dynamic address groups.
    3. Select Dynamic from the Type drop-down.
    4. Click Add Match Criteria. You can select dynamic tags as the match criteria to populate the members of the group. Select the And or Or operator and select the attributes that you would like to filter for or match against. and then click OK.
    5. Commit your changes.
  8. Verify that addresses in your VMs are added to dynamic address groups.
    1. Select PanoramaObjectsAddress Groups.
    2. Click More in the Addresses column of a dynamic address group.
      Panorama displays a list of IP addresses added to that dynamic address group based on the match criteria you specified.
  9. Use dynamic address groups in policy.
    1. Select PoliciesSecurity.
    2. Click Add and enter a Name and a Description for the policy.
    3. Add the Source Zone to specify the zone from which the traffic originates.
    4. Add the Destination Zone at which the traffic is terminating.
    5. For the Destination Address, select the Dynamic address group you just created.
    6. Specify the action— Allow or Deny—for the traffic, and optionally attach the default security profiles to the rule.
    7. Repeat Steps 1 through 6 to create another policy rule.
    8. Click Commit.