Requirements and Caveats

Please read before using the IronSkillet configuration templates.


Using IronSkillet branch version panos_v10.0 requires the following to properly load into Panorama and/or the NGFW


The links are specific to PAN-OS v10.0 and users may switch to 9.1, 9.0, or 8.1 based on deployed release


Threat Prevention and the antivirus content update are both required to gain access to the Palo Alto Networks provided External Dynamic Lists (EDLs) used in the security policies.


URL Filtering, DNS Cloud Service, and Wildfire subscriptions are not required to load the configuration but are highly recommended as part of the best practice to utilize IronSkillet elements such as the URL Filtering, Spyware, and Wildifre security profiles and associated profile groups


Please review the following to understand any limitations or recommendations regarding the IronSkillet templates

  • Be sure to edit or the default administrative superuser account if not part of initial configuration

  • The current version only supports IPv4 management interface configuration

    • IPv6 to be considered based on customer demand

  • IronSkillet loaded into a VM-50 will utilize the full profile capacity

  • The Panorama full configuration template is based on a fully shared model