Palo Vm-Series-Deployment
Palo Vm-Series-Deployment
Version 10.1
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2021 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
December 17, 2021
VM-Series Deployment Guide Version 10.1 2 ©2023 Palo Alto Networks, Inc.
Table of Contents
About the VM-Series Firewall...................................................................... 15
VM-Series Deployments..........................................................................................................16
VM-Series in High Availability............................................................................................... 17
Upgrade the VM-Series Firewall........................................................................................... 19
Upgrade the PAN-OS Software Version (Standalone Version)...........................19
Upgrade the PAN-OS Software Version (HA Pair)................................................21
Upgrade the PAN-OS Software Version Using Panorama...................................25
Upgrade the PAN-OS Software Version (VM-Series for NSX)........................... 28
Upgrade the VM-Series Model.................................................................................. 34
Upgrade the VM-Series Model in an HA Pair........................................................ 35
Downgrade a VM-Series Firewall to a Previous Release..................................... 36
VM-Series Plugin....................................................................................................................... 38
Configure the VM-Series Plugin on the Firewall................................................... 38
Upgrade the VM-Series Plugin...................................................................................39
Enable Jumbo Frames on the VM-Series Firewall............................................................ 42
Hypervisor Assigned MAC Addresses................................................................................. 44
Custom PAN-OS Metrics Published for Monitoring.........................................................46
Interface Used for Accessing External Services on the VM-Series Firewall................48
PacketMMAP and DPDK Driver Support........................................................................... 49
Enable NUMA Performance Optimization on the VM-Series........................................ 51
Enable ZRAM on the VM-Series Firewall........................................................................... 53
VM-Series Deployment Guide Version 10.1 3 ©2023 Palo Alto Networks, Inc.
Table of Contents
Transfer Credits..............................................................................................................93
Renew Your Software NGFW Credits......................................................................95
Amend and Extend a Credit Pool.............................................................................. 96
Deactivate License (Software NGFW Credits)....................................................... 97
Delicense Ungracefully Terminated Firewalls.........................................................99
Set the Number of Licensed vCPUs.......................................................................100
Create and Apply a Subscription-Only Auth Code............................................. 101
Customize Dataplane Cores..................................................................................... 104
Migrate a Firewall to a Flexible VM-Series License............................................105
Software NGFW Licensing API................................................................................119
VM-Series Models.................................................................................................................. 129
VM-Series System Requirements............................................................................130
CPU Oversubscription................................................................................................132
VM-50 Lite Mode....................................................................................................... 133
VM-Series Model License Types............................................................................. 133
Activate VM-Series Model Licenses.......................................................................145
Register the VM-Series Firewall.............................................................................. 151
Install a Device Certificate on the VM-Series Firewall...................................... 154
Switch Between the BYOL and the PAYG Licenses...........................................156
Switch Between VM-Series Model Licenses........................................................ 157
Deactivate License(s).................................................................................................. 161
Renew VM-Series Firewall License Bundles.........................................................166
Licensing API................................................................................................................ 168
What Happens When Licenses Expire?............................................................................ 175
Licenses for Cloud Security Service Providers (CSSPs)................................................. 178
Get the Auth Codes for CSSP License Packages.................................................178
Register the VM-Series Firewall with a CSSP Auth Code................................. 179
Add End-Customer Information for a Registered VM-Series Firewall............180
VM-Series Deployment Guide Version 10.1 4 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 5 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 6 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 7 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 8 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 9 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 10 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 11 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 12 ©2023 Palo Alto Networks, Inc.
Table of Contents
bootstrap.xml............................................................................................................. 1049
Generate the VM Auth Key on Panorama.....................................................................1050
Create the init-cfg.txt File..................................................................................................1052
init-cfg.txt File Components...................................................................................1053
Sample init-cfg.txt File.............................................................................................1056
Create the bootstrap.xml File............................................................................................1059
Prepare the Licenses for Bootstrapping......................................................................... 1060
Prepare the Bootstrap Package........................................................................................ 1061
Bootstrap the VM-Series Firewall on AWS................................................................... 1063
Bootstrap the VM-Series Firewall on Azure..................................................................1067
Bootstrap the VM-Series Firewall on Azure Stack HCI.............................................. 1071
Bootstrap the VM-Series Firewall on ESXi.................................................................... 1082
Bootstrap the VM-Series Firewall on ESXi with an ISO.................................. 1082
Bootstrap the VM-Series Firewall on ESXi with a Block Storage Device.... 1082
Bootstrap the VM-Series Firewall on Google Cloud Platform.................................. 1084
Bootstrap the VM-Series Firewall on Hyper-V.............................................................1086
Bootstrap the VM-Series Firewall on Hyper-V with an ISO...........................1086
Bootstrap the VM-Series Firewall on Hyper-V with a Block Storage
Device.......................................................................................................................... 1086
Bootstrap the VM-Series Firewall on KVM................................................................... 1089
Bootstrap the VM-Series Firewall on KVM with an ISO.................................1089
Bootstrap the VM-Series Firewall on KVM With a Block Storage Device.. 1089
Bootstrap the VM-Series Firewall on OCI..................................................................... 1091
Verify Bootstrap Completion............................................................................................ 1093
Bootstrap Errors................................................................................................................... 1094
VM-Series Deployment Guide Version 10.1 13 ©2023 Palo Alto Networks, Inc.
Table of Contents
VM-Series Deployment Guide Version 10.1 14 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
The Palo Alto Networks VM-Series firewall is the virtualized form of the Palo Alto
Networks next-generation firewall. It is positioned for use in a virtualized or cloud
environment where it can protect and secure east-west and north-south traffic.
> VM-Series Deployments > Custom PAN-OS Metrics Published
> VM-Series in High Availability for Monitoring
> Upgrade the VM-Series Firewall > Interface Used for Accessing
External Services on the VM-Series
> VM-Series Plugin Firewall
> Enable Jumbo Frames on the VM- > PacketMMAP and DPDK Driver
Series Firewall Support
> Hypervisor Assigned MAC Addresses > Enable NUMA Performance
Optimization on the VM-Series
> Enable ZRAM on the VM-Series
Firewall
15
About the VM-Series Firewall
VM-Series Deployments
The VM-Series firewall can be deployed on the following platforms:
VM-Series for VMware vSphere Hypervisor (ESXi) and vCloud Air
You can deploy any VM-Series model as a guest virtual machine on VMware ESXi; ideal for
cloud or networks where virtual form factor is required.
For details, see Set Up a VM-Series Firewall on an ESXi Server and Set Up the VM-Series
Firewall on vCloud Air.
VM-Series on VMware NSX-T
You can deploy the VM-100, VM-300, VM-500, or VM-700 in your NSX-T environment.
For details, see Set Up the VM-Series Firewall on VMware NSX-T (North-South).
VM-Series for Amazon Web Services (AWS)
You can deploy any VM-Series model, except the VM-50, on EC2 instances on the AWS Cloud.
For details, see Set Up the VM-Series Firewall on AWS.
VM-Series for Google Cloud Platform
You can deploy any VM-Series model, except the VM-50 and the VM-50 Lite on Google
Compute Engine instances. For details, see Set Up the VM-Series Firewall on Google Cloud
Platform.
VM-Series for Kernel Virtualization Module (KVM)
You can deploy any VM-Series model on a Linux server that is running the KVM hypervisor.
For details, see Set Up the VM-Series Firewall on KVM.
VM-Series for Microsoft Hyper-V
You can deploy any VM-Series model on a Windows Server 2012 R2 server with the Hyper-V
role add-on enabled or a standalone Hyper-V 2012 R2 server. For details, see Set Up the VM-
Series Firewall on Hyper-V.
VM-Series for Microsoft Azure
You can deploy any VM-Series model, except the VM-50, on the Azure VNet.
For details, see Set up the VM-Series Firewall on Azure.
VM-Series Deployment Guide Version 10.1 16 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Features/ Links Supported ESX KVM AWS NSX-NSX-Hyper- Azure GCP OCI
V T V
(N/
S)
HA2—(session synchronization and Yes Yes Yes No Yes Yes Yes Yes Yes
keepalive)
HA1 and HA2 support for the VM-Series on GCP requires PAN-OS 10.0x or later and VM-
Series plugin 2.0.5 or later.
VM-Series Deployment Guide Version 10.1 17 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
High availability for the VM-Series firewall on NSX-T (E/W) is achieved through the NSX-T
feature called service health check. This NSX-T feature allows you to simulate high availability in
the case of a service instance failing. When configured with the VM-Series firewall, if a VM-Series
service instance fails, any traffic directed to that firewall is redirect to another firewall instance in
the cluster (for service cluster deployments) or a firewall instance on another host (for host-based
deployments). See Configure the Service Definition on Panorama for the VM-Series firewall on
NSX-T (E/W) for more information.
VM-Series Deployment Guide Version 10.1 18 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Verify the VM-Series System Requirements for your firewall model before you upgrade.
If your firewall has less than 5.5GB memory, the system capacity (number of sessions,
rules, security zones, address objects, etc) on the firewall will be limited to that of the
VM-50 Lite.
To avoid impacting traffic, plan to upgrade within the outage window. Ensure the firewall
is connected to a reliable power source. A loss of power during an upgrade can make the
firewall unusable.
STEP 1 | Verify that enough hardware resources are available to the VM-Series firewall.
Refer to the VM-Series System Requirements to see the resource requirements for each VM-
Series model. Allocate additional hardware resources before continuing the upgrade process;
the process for assigning additional hardware resources differs on each hypervisor.
If the VM-Series firewall does not have the required resources for the model, it defaults to the
capacity associated with the VM-50.
VM-Series Deployment Guide Version 10.1 19 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 2 | From the web interface, navigate to Device > Licenses and make sure you have the correct
VM-Series firewall license and that the license is activated.
On the VM-Series firewall standalone version, navigate to Device > Support and make sure
that you have activated the support license.
1. Select Device > Setup > Operations and click Export named configuration snapshot.
2. Select the XML file that contains your running configuration (for example, running-
config.xml) and click OK to export the configuration file.
3. Save the exported file to a location external to the firewall. You can use this backup to
restore the configuration if you have problems with the upgrade.
STEP 4 | If you have enabled User-ID, after you upgrade, the firewall clears the current IP address-
to-username and group mappings so that they can be repopulated with the attributes from
the User-ID sources. To estimate the time required for your environment to repopulate the
mappings, run the following CLI commands on the firewall.
• For IP address-to-username mappings:
• show user user-id-agent state all
• show user server-monitor state all
• For group mappings: show user group-mapping statistics
STEP 5 | Ensure that the firewall is running the latest content release version.
1. Select Device > Dynamic Updates and see which Applications or Applications and
Threats content release version is Currently Installed.
2. If the firewall is not running the minimum required content release version or a later
version required for PAN-OS, Check Now to retrieve a list of available updates.
3. Locate and Download the desired content release version.
After you successfully download a content update file, the link in the Action column
changes from Download to Install for that content release version.
4. Install the update.
VM-Series Deployment Guide Version 10.1 20 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
2. Log in to the VM-Series firewall and check the dashboard to view the plugin version.
3. Select Device > Plugins to view the plugin version. Use Check Now to check for
updates.
4. Select the version of the plugin and click Install in the Action column to install the plugin.
If your firewall does not have internet access from the management port, you can
download the software image from the Palo Alto Networks Customer Support
Portal and then manually Upload it to your firewall.
1. Select Device > Software and click Check Now to display the latest PAN-OS updates.
2. Locate and Download the target PAN-OS version.
3. After you download the image (or, for a manual upgrade, after you upload the image),
Install the image.
4. After the installation completes successfully, reboot using one of the following methods:
• If you are prompted to reboot, click Yes.
• If you are not prompted to reboot, select Device > Setup > Operations and click
Reboot Device.
At this point, the firewall clears the User-ID mappings, then connects to the
User-ID sources to repopulate the mappings.
5. If you have enabled User-ID, use the following CLI commands to verify that the firewall
has repopulated the IP address-to-username and group mappings before allowing traffic.
• show user ip-user-mapping all
• show user group list
6. If you are upgrading to an XFR release for the first time, repeat this step to upgrade to
the corresponding XFR release.
VM-Series Deployment Guide Version 10.1 21 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
To avoid downtime when upgrading firewalls that are in a high availability (HA) configuration,
update one HA peer at a time: For active/active firewalls, it doesn’t matter which peer you
upgrade first (though for simplicity, this procedure shows you how to upgrade the active-
secondary peer first). For active/passive firewalls, you must upgrade the passive peer first,
suspend the active peer (fail over), update the active peer, and then return that peer to a
functional state (fail back). To prevent failover during the upgrade of the HA peers, you must
make sure preemption is disabled before proceeding with the upgrade. You only need to disable
preemption on one peer in the pair.
To avoid impacting traffic, plan to upgrade within the outage window. Ensure the firewalls
are connected to a reliable power source. A loss of power during an upgrade can make
firewalls unusable.
STEP 1 | Verify that enough hardware resources are available to the VM-Series firewall.
Refer to the VM-Series System Requirements to see the resource requirements for each VM-
Series model. Allocate additional hardware resources before continuing the upgrade process;
the process for assigning additional hardware resources differs on each hypervisor.
If the VM-Series firewall does not have the required resources for the model, it defaults to the
capacity associated with the VM-50.
STEP 2 | From the web interface, navigate to Device > Licenses and make sure you have the correct
VM-Series firewall license and that the license is activated.
On the VM-Series firewall standalone version, navigate to Device > Support and make sure
that you have activated the support license.
STEP 4 | If you have enabled User-ID, after you upgrade, the firewall clears the current IP address-
to-username and group mappings so that they can be repopulated with the attributes from
the User-ID sources. To estimate the time required for your environment to repopulate the
mappings, run the following CLI commands on the firewall.
• For IP address-to-username mappings:
• show user user-id-agent state all
• show user server-monitor state all
• For group mappings: show user group-mapping statistics
VM-Series Deployment Guide Version 10.1 22 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 5 | Ensure that each firewall in the HA pair is running the latest content release version.
Refer to the release notes for the minimum content release version you must install for a PAN-
OS 10.1 release. Make sure to follow the Best Practices for Application and Threat Updates.
1. Select Device > Dynamic Updates and check which Applications or Applications and
Threats to determine which update is Currently Installed.
2. If the firewalls are not running the minimum required content release version or a later
version required for the software version you are installing, Check Now to retrieve a list
of available updates.
3. Locate and Download the desired content release version.
After you successfully download a content update file, the link in the Action column
changes from Download to Install for that content release version.
4. Install the update. You must install the update on both peers.
2. Log in to the VM-Series firewall and check the dashboard to view the plugin version.
3. Select Device > Plugins to view the plugin version. Use Check Now to check for
updates.
4. Select the version of the plugin and click Install in the Action column to install the plugin.
When installing the plugin on VM-Series firewalls in an HA pair, install the higher version
VM-Series plugin on the active peer before the passive peer. After installing the plugin
on the active peer it transitions the passive peer to a non-functional state. Installing the
plugin on the passive peer returns the passive peer to a functional state.
STEP 7 | Disable preemption on the first peer in each pair. You only need to disable this setting on
one firewall in the HA pair but ensure that the commit is successful before you proceed with
the upgrade.
1. Select Device > High Availability and edit the Election Settings.
2. If enabled, disable (clear) the Preemptive setting and click OK.
3. Commit the change.
STEP 8 | Install the PAN-OS release on the first peer. If you are upgrading to an XFR release, install
the version that corresponds to the XFR release.
To minimize downtime in an active/passive configuration, upgrade the passive peer first. For
an active/active configuration, upgrade the secondary peer first. As a best practice, if you are
VM-Series Deployment Guide Version 10.1 23 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
using an active/active configuration, we recommend upgrading both peers during the same
maintenance window.
If you want to test that HA is functioning properly before the upgrade, consider
upgrading the active peer in an active/passive configuration first to ensure that
failover occurs without incident.
1. On the first peer, select Device > Software and click Check Now for the latest updates.
2. Locate and Download the target PAN-OS version.
If your firewall does not have internet access from the management port, you
can download the software image from the Palo Alto Networks Support Portal
and then manually Upload it to your firewall.
3. After you download the image (or, for a manual upgrade, after you upload the image),
Install the image.
4. After the installation completes successfully, reboot using one of the following methods:
• If you are prompted to reboot, click Yes.
• If you are not prompted to reboot, select Device > Setup > Operations and Reboot
Device.
5. After the device finishes rebooting, view the High Availability widget on the Dashboard
and verify that the device you just upgraded is still the passive or active-secondary peer
in the HA configuration.
STEP 9 | Install the PAN-OS release on the second peer. If you are upgrading to an XFR release, install
the version that corresponds to the XFR release.
1. (Active/passive configurations only) Suspend the active peer so that HA fails over to the
peer you just upgraded.
1. On the active peer, select Device > High Availability > Operational Commands and
click Suspend local device.
2. View the High Availability widget on the Dashboard and verify that the state changes
to Passive.
3. On the other peer, verify that it is active and is passing traffic (Monitor > Session
Browser).
2. On the second peer, select Device > Software and click Check Now for the latest
updates.
3. Locate and Download the target PAN-OS version.
4. After you download the image, Install it.
5. After the installation completes successfully, reboot using one of the following methods:
• If you are prompted to reboot, click Yes.
• If you are not prompted to reboot, select Device > Setup > Operations and Reboot
Device.
6. (Active/passive configurations only) From the CLI of the peer you just upgraded, run the
following command to make the firewall functional again:
request high-availability state functional
VM-Series Deployment Guide Version 10.1 24 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 10 | (PAN-OS XFR upgrade only) Upgrade the first peer and second peer to PAN-OS XFR by
repeating Step 8 and Step 9.
If you enabled HA2 keep-alive, the hardware interface counters on the passive
peer will show both transmit and receive packets. This occurs because HA2
keep-alive is bi-directional, which means that both peers transmit HA2 keep-
alive packets.
• In an active/active configuration, you will see packets received and packets transmitted
on both peers.
If Panorama is unable to connect directly to the update server, follow the procedure for
deploying updates to firewalls when Panorama is not internet-connected so that you
can manually download images to Panorama and then distribute the images to firewalls.
VM-Series Deployment Guide Version 10.1 25 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Ensure that firewalls are connected to a reliable power source. A loss of power during an
upgrade can make a firewall unusable.
STEP 1 | After upgrading Panorama, commit and push the configuration to the firewalls you are
planning to upgrade.
STEP 2 | Verify that enough hardware resources are available to the VM-Series firewall.
Refer to the VM-Series System Requirements to see the resource requirements for each VM-
Series model. Allocate additional hardware resources before continuing the upgrade process;
the process for assigning additional hardware resources differs on each hypervisor.
If the VM-Series firewall does not have the required resources for the model, it defaults to the
capacity associated with the VM-50.
STEP 3 | From the web interface, navigate to Device > Licenses and make sure you have the correct
VM-Series firewall license and that the license is activated.
On the VM-Series firewall standalone version, navigate to Device > Support and make sure
that you have activated the support license.
STEP 4 | Save a backup of the current configuration file on each managed firewall you plan to
upgrade.
1. From the Panorama web interface, select Panorama > Setup > Operations and
click Export Panorama and devices config bundle to generate and export the latest
configuration backup of Panorama and of each managed appliance.
2. Save the exported file to a location external to the firewall. You can use this backup to
restore the configuration if you have problems with the upgrade.
STEP 5 | Update the content release version on the firewalls you plan to upgrade.
Refer to the Release Notes for the minimum content release version required for PAN-OS 9.1.
Make sure to follow the Best Practices for Application and Threat Updates when deploying
content updates to Panorama and managed firewalls.
1. Select Panorama > Device Deployment > Dynamic Updates and Check Now for the
latest updates. If an update is available, the Action column displays a Download link.
2. If not already installed, Download the latest content release version.
3. Click Install, select the firewalls on which you want to install the update, and click OK. If
you are upgrading HA firewalls, you must update content on both peers.
STEP 6 | (HA firewall upgrades only) If you will be upgrading firewalls that are part of an HA pair,
disable preemption. You need only disable this setting on one firewall in each HA pair.
1. Select Device > High Availability and edit the Election Settings.
2. If enabled, disable (clear) the Preemptive setting and click OK.
3. Commit your change. Make sure the commit is successful before you proceed with the
upgrade.
VM-Series Deployment Guide Version 10.1 26 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 27 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 9 | (HA firewall upgrades only) Upgrade the second HA peer in each HA pair.
1. (Active/passive upgrades only) Suspend the active device in each active/passive pair you
are upgrading.
1. Switch context to the active firewall.
2. In the High Availability widget on the Dashboard, verify that Local firewall state is
Active and the Peer is Passive).
3. Select Device > High Availability > Operational Commands > Suspend local device.
4. Go back to the High Availability widget on the Dashboard and verify that Local
changed to Passive and Peer changed to Active.
2. Go back to the Panorama context and select Panorama > Device Deployment >
Software.
3. Click Install in the Action column that corresponds to the firewall models of the HA pairs
you are upgrading.
4. In the Deploy Software file dialog, select all firewalls that you want to upgrade. This
time, select only the peers of the HA firewalls you just upgraded.
5. Make sure Group HA Peers is not selected.
6. Select Reboot device after install.
7. To begin the upgrade, click OK.
8. After the installation completes successfully, reboot using one of the following methods:
• If you are prompted to reboot, click Yes.
• If you are not prompted to reboot, select Device > Setup > Operations and Reboot
Device.
9. (Active/passive upgrades only) From the CLI of the peer you just upgraded, run the
following command to make the firewall functional again:
request high-availability state functional
STEP 10 | (PAN-OS XFR upgrade only) Upgrade the first peer and second peer to PAN-OS XFR by
repeating Step 8 and Step 9.
STEP 11 | Verify the software and content release version running on each managed firewall.
1. On Panorama, select Panorama > Managed Devices.
2. Locate the firewalls and review the content and software versions in the table.
For HA firewalls, you can also verify that the HA Status of each peer is as expected.
STEP 12 | (HA firewall upgrades only) If you disabled preemption on one of your HA firewalls before
you upgraded, then edit the Election Settings (Device > High Availability) and re-enable the
Preemptive setting for that firewall and then Commit the change.
VM-Series Deployment Guide Version 10.1 28 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
• Upgrade the VM-Series for NSX During a Maintenance Window—use this option to upgrade
the VM-Series firewall during a maintenance window without changing the OVF URL in the
service definition.
• Upgrade the VM-Series for NSX without disrupting traffic—use this option to upgrade the VM-
Series firewall without disrupting service to the guest VMs or changing the OVF URL in the
service definition.
The following graphics displays the currently supported combinations of Panorama and the
Panorama plugin for VMware NSX, as well as the upgrade paths you are required to follow to
upgrade successfully.
• Each box below represents a supported combination.
• When upgrading the Panorama plugin for NSX or Panorama in an HA pair, upgrade the passive
Panorama peer first, followed by the active HA peer.
Before upgrading your VM-Series for VMware NSX deployment, review the upgrade paths shown
below to understand the upgrade steps to arrive at the plugin and PAN-OS combination that best
suits your environment.
VM-Series Deployment Guide Version 10.1 29 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 30 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 3 | Save a backup of the current configuration file on each managed firewall that you plan to
upgrade.
1. Select Device > Setup > Operations and click Export Panorama and devices config
bundle. This option is used to manually generate and export the latest version of the
configuration backup of Panorama and of each managed device.
2. Save the exported file to a location external to the firewall. You can use this backup to
restore the configuration if you have problems with the upgrade.
STEP 4 | Check the Release Notes to verify the Content Release version required for the PAN-OS
version.
The firewalls you plan to upgrade must be running the Content Release version required for
the PAN-OS version.
1. Select Panorama > Device Deployment > Dynamic Updates.
2. Check for the latest updates. Click Check Now (located in the lower left-hand corner
of the window) to check for the latest updates. The link in the Action column indicates
whether an update is available. If a version is available, the Download link displays.
3. Click Download to download a selected version. After successful download, the link in
the Action column changes from Download to Install.
4. Click Install and select the devices on which you want to install the update. When the
installation completes, a check mark displays in the Currently Installed column.
If your firewalls are configured in HA, make sure to clear the Group HA Peers check
box and upgrade one HA peer at a time.
STEP 6 | Verify the software and Content Release version running on each managed device.
1. Select Panorama > Managed Devices.
2. Locate the device(s) and review the content and software versions on the table.
VM-Series Deployment Guide Version 10.1 31 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 2 | Save a backup of the current configuration file on each managed firewall that you plan to
upgrade.
1. Select Device > Setup > Operations and click Export Panorama and devices config
bundle. This option is used to manually generate and export the latest version of the
configuration backup of Panorama and of each managed device.
2. Save the exported file to a location external to the firewall. You can use this backup to
restore the configuration if you have problems with the upgrade.
STEP 3 | Check the Release Notes to verify the Content Release version required for the PAN-OS
version.
The firewalls you plan to upgrade must be running the Content Release version required for
the PAN-OS version.
1. Select Panorama > Device Deployment > Dynamic Updates.
2. Check for the latest updates. Click Check Now (located in the lower left-hand corner
of the window) to check for the latest updates. The link in the Action column indicates
whether an update is available. If a version is available, the Download link displays.
3. Click Download to download a selected version. After successful download, the link in
the Action column changes from Download to Install.
4. Click Install and select the devices on which you want to install the update. When the
installation completes, a check mark displays in the Currently Installed column.
VM-Series Deployment Guide Version 10.1 32 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 4 | Download the PAN-OS image to all VM-Series firewalls in the cluster.
1. Login to Panorama.
2. Select Panorama > Device Deployment > Software.
3. Click Refresh to view the latest software release and also review the Release Notes to
view a description of the changes in a release and to view the migration path to install
the software.
4. Click Download to retrieve the software then click Install.
Do not reboot the VM-Series firewalls after installing the new software image.
7. Click OK.
STEP 5 | Upgrade the VM-Series firewall on the first ESXi host in the cluster.
1. Login to vCenter.
2. Select Hosts and Clusters.
3. Right-click the host and select Maintenance Mode > Enter Maintenance Mode.
4. Migrate (automatically or manually) all VMs, except the VM-Series firewall, off of the
host.
5. Power off the VM-Series firewall. This should happen automatically upon entering
maintenance mode on the host.
6. (Optional) Assign additional CPUs or memory to the VM-Series firewall before
continuing with the upgrade process.
Verify that enough hardware resources are available to the VM-Series firewall. Refer to
the VM-Series models to see the new resource requirements for each VM-Series model.
7. Right-click the host and select Maintenance Mode > Exit Maintenance Mode. Exiting
maintenance mode causes the NSX ESX Agent Manager (EAM) to power on the VM-
Series firewall. The firewall reboots with the new PAN-OS version.
8. Migrate (automatically or manually) all VMs back to the original host.
STEP 6 | Repeat this process for each VM-Series firewall on each ESXi host.
VM-Series Deployment Guide Version 10.1 33 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 7 | Verify the software and Content Release version running on each managed device.
1. Select Panorama > Managed Devices.
2. Locate the device(s) and review the content and software versions on the table.
STEP 2 | Retrieve the license API key from the Customer Support portal.
1. Log in to the Customer Support Portal.
Make sure that you are using the same account that you used to register the
initial license.
2. From the menu on the left, select Assets > API Key Management.
3. Copy the API key.
VM-Series Deployment Guide Version 10.1 34 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 3 | On the firewall, use the CLI to install the API key copied in the previous step.
STEP 4 | (If you have internet access) Enable the firewall to Verify Update Server identity on Device >
Setup > Service.
STEP 5 | Commit your changes. Ensure that you have a locally-configured user on the firewall.
Panorama pushed users might not be available after the deactivation if the configuration
exceeds the non-licensed PA-VM objects limit.
Verify the VM-Series System Requirements for your firewall model before you upgrade.
If your firewall has less than 5.5GB memory, the capacity (number of sessions, rules,
security zones, address objects, etc) on the firewall will be limited to that of the VM-50
Lite.
This process is similar to that of upgrading a pair of hardware-based firewalls that are in an HA
configuration. During the capacity upgrade process, session synchronization continues, if you
have it enabled. To avoid downtime when upgrading firewalls that are in a high availability (HA)
configuration, update one HA peer at a time.
VM-Series Deployment Guide Version 10.1 35 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Do not make configuration change to the firewalls during the upgrade process. During the
upgrade process, configuration sync is automatically disabled when a capacity mismatch
is detected and is then re-enabled when both HA peers have matching capacity licenses.
If the firewalls in the HA pair have different major software versions (such as 9.1 and 9.0)
and different capacities, both devices will enter the Suspended HA state. Therefore, it is
recommended that you make sure both firewalls are running the same version of PAN-OS
before upgrading capacity.
You cannot downgrade the VM-Series firewall from version 10.0.4 or later to version
10.0.3 or earlier.
VM-Series Deployment Guide Version 10.1 36 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 37 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series Plugin
The VM-Series firewalls include the VM-Series plugin, a built-in plugin architecture for integration
with public cloud providers or private cloud hypervisors. The VM-Series plugin can be manually
upgraded independent of PAN-OS, enabling Palo Alto Networks® to accelerate the release of
new features, fixes, or integrations with new cloud providers or hypervisors.
The VM-Series plugin enables you to manage cloud-specific interactions between the VM-
Series firewalls and the supported public cloud platforms—AWS, GCP, and Azure. The plugin
enables publishing custom metrics to cloud monitoring services (such as AWS CloudWatch),
bootstrapping, configuring user credential provisioning information from public cloud
environments, and seamless updates for cloud libraries or agents on PAN-OS.
The VM-Series plugin does not manage capabilities that are common to both VM-Series
firewalls and hardware-based firewalls. For example, VM Monitoring is not part of the
VM-Series plugin because it is a core PAN-OS feature that helps you enforce policy
consistently on your virtual machine workloads from both VM-Series firewalls and
hardware-based firewalls.
The VM-Series plugin does not manage Panorama plugins. For the difference between the
VM-Series plugin and Panorama plugins, see VM-Series Plugin and Panorama Plugins.
The VM-Series plugin is a built-in component that can be upgraded or downgraded, but not
removed. Each PAN-OS release includes a specific VM-Series plugin version that corresponds
to the PAN-OS software version. When you downgrade to an earlier PAN-OS software version,
the plugin version is downgraded to the version compatible with the PAN-OS version. You can
upgrade or downgrade the VM-Series plugin locally on the virtual firewall, or manage the plugin
version centrally from Panorama.
To enable Panorama to manage the VM-Series plugin version itself, or cloud-specific metrics
publishing your managed firewalls, you must manually install the VM-Series plugin on Panorama
as described in Panorama Plugins.
• Configure the VM-Series Plugin on the Firewall
• Upgrade the VM-Series Plugin
VM-Series Deployment Guide Version 10.1 38 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
If your firewall is deployed on a hypervisor or cloud without a public interface (for example,
VMware ESXi), the tab is named VM-Series and displays a general message.
VM-Series Deployment Guide Version 10.1 39 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 2 | Log in to the VM-Series firewall and check the dashboard to view the plugin version.
STEP 3 | Select Panorama > Plugins and type vm_series in the search field.
Select Check Now to view the available versions.
STEP 5 | When the download finishes, click Install in the Actions column.
The firewall automatically uninstalls the previously installed version of the plugin.
VM-Series Deployment Guide Version 10.1 40 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 6 | View the Dashboard to verify that the plugin upgraded successfully.
VM-Series Deployment Guide Version 10.1 41 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series firewall instances deployed with multiple NUMA nodes, come up in packet
MMAP mode when jumbo frame support is enabled. You must disable jumbo frame
support to use DPDK on VM-Series firewall instance deployed with multiple NUMA nodes.
STEP 1 | Enable jumbo frames and set a default global MTU value.
1. Select Device > Setup > Session and edit the Session Settings section.
2. Select Enable Jumbo Frame.
3. Enter a value for Global MTU.
The default value is 9192. The range of acceptable values is: 512 - 9216.
4. Click OK.
A message is displayed that informs you that enabling or disabling Jumbo Frame mode
requires a reboot and that Layer 3 interfaces inherit the Global MTU value.
5. Click Yes.
A message is displayed to inform you that Jumbo Frame support has been enabled and
reminds you that a device reboot is required for this change to be activated.
6. Click OK.
7. Click Commit.
VM-Series Deployment Guide Version 10.1 42 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 2 | Set the MTU value for a Layer 3 interface and reboot the firewall.
The value set for the interface overrides the global MTU value.
VM-Series Deployment Guide Version 10.1 43 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
There is no option to enable or disable the use of hypervisor assigned MAC addresses on
AWS and Azure. It is enabled by default for both platforms and cannot be disabled.
If you are deploying the VM-Series firewall in Layer 2, virtual wire, or tap interface modes, you
must enable promiscuous mode on the virtual switch to which the firewall is connected. The use
of hypervisor assigned MAC address is only relevant for Layer 3 deployments where the firewall is
typically the default gateway for the guest virtual machines.
When hypervisor assigned MAC address functionality is enabled on the VM-Series firewall, make
note of the following requirements:
• IPv6 Address on an Interface—In an active/passive HA configuration (see VM-Series in High
Availability), Layer 3 interfaces using IPv6 addresses must not use the EUI-64 generated
address as the interface identifier (Interface ID). Because the EUI-64 uses the 48-bit MAC
address of the interface to derive the IPv6 address for the interface, the IP address is not static.
This results in a change in the IP address for the HA peer when the hardware hosting the VM-
Series firewall changes on failover, and leads to an HA failure.
• Lease on an IP Address—When the MAC address changes, DHCP client, DHCP relay and
PPPoE interfaces might release the IP address because the original IP address lease could
terminate.
• MAC address and Gratuitous ARP—VM-Series firewalls with hypervisor assigned MAC
addresses in a high-availability configuration behave differently than the hardware appliances
with respect to MAC addressing. Hardware firewalls use self-generated floating MAC
addresses between devices in an HA pair, and the unique MAC address used on each dataplane
interface (say eth 1/1) is replaced with a virtual MAC address that is common to the dataplane
interface on both HA peers. When you enable the use of the hypervisor assigned MAC address
on the VM-Series firewall in HA, the virtual MAC address is not used. The dataplane interface
on each HA peer is unique and as specified by the hypervisor.
Because each dataplane interface has a unique MAC address, when a failover occurs, the now
active VM-Series firewall must send a gratuitous ARP so that neighboring devices can learn the
updated MAC/IP address pairing. Hence, to enable a stateful failover, the networking devices
must not block or ignore gratuitous ARPs; make sure to disable the anti-ARP poisoning feature
on the internetworking devices, if required.
Perform the following steps to configure the VM-Series firewall to use the interface MAC
addresses provided by the host/hypervisor.
STEP 1 | Select Device > Management > Setup > General Settings.
VM-Series Deployment Guide Version 10.1 44 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 5 | Commit the change on the firewall. You do not need to reboot the firewall.
VM-Series Deployment Guide Version 10.1 45 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Metric Description
Dataplane CPU Utilization (%) Monitors dataplane CPU usage and measures the traffic
load on the firewall.
Dataplane Packet Buffer Monitors dataplane buffer usage and measures buffer
Utilization (%) utilization. If you have a sudden burst in traffic, monitoring
your buffer utilization allows you to ensure that the
firewall does not deplete the dataplane buffer, which
results in dropped packets.
Sessions Active Monitors the total number of sessions that are active on
the firewall. An active session is a session that is in the
flow lookup table for which packets will be inspected and
forwarded, as required by policy.
Session Utilization (%) Monitors the TCP, UDP, ICMP and SSL sessions that are
currently active and the packet rate, new connection
VM-Series Deployment Guide Version 10.1 46 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Metric Description
establish rate, and firewall throughput to determine
session utilization.
VM-Series Deployment Guide Version 10.1 47 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 48 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
SR-IOV
Why use SR-IOV? SR-IOV is a packet acceleration technology that allows a virtual machine to
directly access packets from the NIC. In contrast, when using a virtual switch, the host processes
the packets, send the packets through a virtual switch, and then the virtual machine receives its
packets.
In the Compatibility Matrix, PacketMMAP Driver Versions lists both the host version and the
native driver version on the VM-Series firewall. For example, i40e on the host, and on the firewall,
i40e (for PCI-passthrough) and i40evf (for SR-IOV).
For SR-IOV, let's consider a NIC that uses the i40e PF driver. The host communicates with
the NIC via the i40e driver. The VM-Series firewall can use its VF driver (i40evf) to directly
communicate with the host's PF driver. This allows VM-Series firewall direct access, which
improves packet processing speed. To ensure compatibility, install a host PF driver version that is
later than the native PF driver version.
PCI-Passthrough
Why does VM-Series firewall have native PF drivers? As mentioned in Options for Attaching
VM-Series on the Network, when using PCI-passthrough, the NIC is reserved for the VM-Series
firewall, so the host (or other guests on the host) cannot access the NIC. In a PCI-passthrough
configuration, the VM-Series firewall uses its native PF driver to communicate directly with the
host NIC.
VM-Series Deployment Guide Version 10.1 49 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
Refer to the PacketMMAP Driver Versions list to determine which PF driver version to install on
the host. Install a PF version that is higher than VM-Series firewall native PF driver.
Refer to Enable SR-IOV on ESXi and Enable SR-IOV on KVM for PCI-Passthrough.
DPDK
PAN-OS has two packet processing modes—DPDK (default) and MMAP—and each mode has a
corresponding native driver on the VM-Series firewall. For example, if the firewall is in DPDK
mode, the firewall uses the DPDK i40evf driver version to communicate with the host's i40e
driver (when using SR-IOV). Alternatively, when the firewall is Packet MMAP, it will use a
different i40evf driver version to communicate with the host's i40e driver.
You can enable DPDK on the host (the hypervisor), or on the guest (the VM-Series firewall).
Enabling both yields the best results.
• Compiling OVS with DPDK is part of enabling DPDK on the host.
Refer to Configure OVS and DPDK on the Host.
• VM-Series DPDK enables the native DPDK driver on the VM-Series firewall, so DPDK does
not need to be enabled on the host, but it is recommended for best performance.
VM-Series Deployment Guide Version 10.1 50 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
If the number of cores assigned to your VM-Series firewall exceeds the number of vCPUs
on Node 0, the VM-Series uses all the cores on Node 0 but does not use any cores from
other nodes. For example, if you assign 30 cores to your VM-Series firewall but Node 0
has only 24 cores, the VM-Series firewall will only use the 24 cores on Node 0 for the
dataplane.
STEP 3 | After the reboot is complete, log in to the VM-Series CLI and verify that NUMA optimization
was enabled.
show plugins vm_series numa-perf-optimize
NUMA performance optimization: Enabled
VM-Series Deployment Guide Version 10.1 51 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 5 | To disable NUMA performance optimization, use the following command. This command
requires you to reboot the VM-Series firewall.
request plugins vm_series numa-perf-optimize enable off
VM-Series Deployment Guide Version 10.1 52 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
STEP 2 | Find the total memory on the VM by using the following CLI command.
grep pattern “KiB Mem :” mp-log mp-monitor.log
STEP 3 | Convert the above total memory from KB to MB. For example:
9202656 / 1024 = 8987 MB
Take note of the total memory value in MB. You will need this value in the next step.
VM-Series Deployment Guide Version 10.1 53 ©2023 Palo Alto Networks, Inc.
About the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 54 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series firewall supports two license types (BYOL and PayGo), and two different
licensing models—Software Next Generation Firewall Credits (Software NGFW) for
flexible configurations that you specify with a deployment profile, and fixed VM-
Series Model configurations. Both models also license Security services and other
features.
If you are an authorized CSSP partner, see Licenses for Cloud Security Service
Providers (CSSPs) for information that pertains to you.
See the following topics for details on creating a support account and managing
licenses:
> VM-Series Firewall Licensing > Use Panorama-Based Software
> Create a Support Account Firewall License Management
> Serial Number and CPU ID Format > Software NGFW Credits
for the VM-Series Firewall > VM-Series Models
> Licensing API > What Happens When Licenses
> Install a License API Key Expire?
> Licenses for Cloud Security Service
Providers (CSSPs)
55
License the VM-Series Firewall
License Types
New capacity licenses (non-Software NGFW Credits) are no longer available for purchase.
However, you one (1) year renewals for capacity (perpetual and term-based) licenses are
available.
Palo Alto Networks currently supports two license types: Bring Your Own License (BYOL) and
PAYG (Pay-As-You-Go, also called PayGo).
Type Description
BYOL VM-Series Model licenses—Available for use with all PAN-OS releases. The number
of vCPUs is fixed according to your chosen VM-Series model.
Flexible vCPUs, available with PAN-OS 10.0.4 and later, support advanced
features and more vCPUs.
The capacity license cost is based on the VM-Series model, the device memory,
storage costs, and the support entitlement. Security services and a Panorama
deployment to manage your firewalls are additional costs. The capacity license types
are:
• VM-Series Enterprise License Agreement (Multi-Model ELA)—A comprehensive
one- or three-year licensing agreement for VM-Series firewalls. An individual
license can include a model, security services, a support entitlement, and an
optional device management license for Panorama.
Multi-Model ELA features a token pool from which you allocate tokens to license
VM-Series firewalls. (It is unique to the ELA, and is not the same as the Software
NGFW Credits pool.)
• Perpetual VM-Series model capacity license with a support entitlement and/or
security services bundle 1 or bundle 2.
VM-Series Deployment Guide Version 10.1 56 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Type Description
• Term firewall capacity license with a support entitlement and your choice of
security services.
PayGo Purchased from a public cloud marketplace (such as AWS, Azure, or GCP), or a Cloud
Security Service Provider (CSSP). Available on the PAN-OS version your provider
supports.
On PAN-OS versions earlier than 9.1.1, PayGo supported only the VM-Series
VM-300 model. For PAN-OS 9.1.1 and later PayGo can support fixed Models.
The traditional VM models, such as VM-100, VM-300, VM-500, and VM-700 are
supported.
Description Cost is based on the number of Cost is based on the VM-Series model
vCPUs and your chosen Security capacity license, device memory,
services. and storage. Panorama and Security
services are separate purchases.
There is no cost for Panorama other
than the vCPUs it consumes. • VM-Series Enterprise License
Agreement (Multi-Model ELA)—A
You purchase reusable Software
comprehensive one- or three-year
NGFW credits that expire at the
licensing agreement for VM-Series
end of a predetermined term. After
firewalls.
activating your credits you can
portion them into credit pools. Multi-Model ELA features a token
pool from which you allocate
To use your credits, choose a credit
tokens to license VM-Series
profile and create one or more
firewalls.
deployment profiles. Choose your
own combination of firewall-as-a- • Perpetual VM-Series model
platform components: VM-Series capacity license with a support
vCPUs, security services, virtual entitlement and/or security
Panorama for Management or services bundle 1 or bundle 2.
Dedicated Log Collection, and a • Term firewall capacity license with
support entitlement. All firewalls a support entitlement and your
deployed with a profile are licensed choice of security services.
with the same auth code, and you can
manage them from the deployment
profile.
VM-Series Deployment Guide Version 10.1 57 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Deployment Flexible. A deployment profile can be VM-Series model capacity does not
Configuration changed at any time. Changes to the change, but if you have an ELA, you
profile propagate to all firewalls that an can add Security services.
share the deployment profile auth
Perpetual and Term licenses are
code.
configured and paid for in advance
and do not change.
Deployment After credit activation, create a Accept the VM-Series ELA. Deploy
deployment profile for a specific and configure the VM-Series firewall.
environment or use case (such as Activate the model license and
“Protect my NSX Environment”) and register the firewall.
configure firewall vCPUs, security
services, and an optional virtual
VM-Series Deployment Guide Version 10.1 58 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 59 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 60 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Enter the corporate email address to associate with the support account.
STEP 3 | Choose one of the following options and fill in the details in the user registration form:
For a usage-based license in AWS
1. Click Register your Amazon Web Services VM-Series Instance.
2. On the AWS Management Console, find the AWS Instance ID, AWS Product Code, and
the AWS Zone in which you deployed the firewall.
3. Fill in the other details.
For all other licenses
1. Click Register device using Serial Number or Authorization Code.
2. Enter the capacity auth code and the sales order number or customer ID.
3. Fill in the other details.
STEP 4 | Submit the form. You will receive an email with a link to activate your user account.
Complete the steps to activate the account. After your account is verified and the registration
is complete, you can log in to the support portal.
VM-Series Deployment Guide Version 10.1 61 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
AWSMP:1234567890abcdef0:
6kxdw3bbmdeda
3o6i1ggqt4km:us-west1
VM-Series Deployment Guide Version 10.1 62 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Pay-as-you-go (PAYG) licenses are not supported for use with this plugin.
Do not use the Software Firewall License plugin to license the VM-Series firewall for
VMware NSX. The Panorama plugin for VMware NSX automatically licenses VM-Series
firewalls deployed in NSX and NSX-T
.
Also, do not use this plugin to license firewalls deployed in device groups that include
instances of the VM-Series firewall deployed in NSX-T.
To install the Panorama Software Firewall License plugin, you must be using Panorama 10.0.0 or
later and VM-Series plugin 2.0.4 or later. Your VM-Series firewalls must be running PAN-OS 9.1.0
or later.
The VM-Series firewall for Azure requires VM-Series plugin 2.0.7 or later.
If you have a standalone Panorama or two Panorama appliances installed in an HA pair with
multiple plugins installed, plugins might not receive updated IP-tag information if one or more of
the plugins is not configured. This occurs because Panorama will not forward IP-tag information
to unconfigured plugins. Additionally, this issue can occur if one or more of the Panorama plugins
is not in the Registered or Success state (positive state differs on each plugin). Ensure that your
plugins are in the positive state before continuing or executing the commands described below.
If you encounter this issue, there are two workarounds:
• Uninstall the unconfigured plugin or plugins. It is recommended that you do not install a plugin
that you do not plan to configure right away
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
VM-Series Deployment Guide Version 10.1 63 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Install the Software Firewall License Plugin for Panorama.
1. Log in to the Panorama web interface.
2. Select Panorama > Plugins.
3. Click Check Now to get the list of available plugins.
4. Search for sw_fw_license to locate the plugin.
5. Select Download and Install the Software Licensing plugin.
After you successfully install, Panorama refreshes and the Software Licensing plugin displays
on the Panorama tab.
VM-Series Deployment Guide Version 10.1 64 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 65 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Deactivate is set to Never by default. You can set the deactivation time, in hours, from
one to 24.
Before deactivating, set the API key using:
request license api-key set key <key>
STEP 4 | (Optional) Create an init-cfg.txt file for bootstrap the VM-Series firewall. After
configuring a license manager, you can copy and paste bootstrap parameters generated
by Panorama when deploy your VM-Series firewalls. Depending on your deployment, the
parameters displayed might be a subset of those shown in the image below. For example,
if your Panorama appliance is deployed in a public cloud, the bootstrap parameters will
not include the public IP address for Panorama. In that case, you must manually enter the
public IP address in the init-cfg.txt file. Panorama will always generate the auth-key
VM-Series Deployment Guide Version 10.1 66 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
If you use the auth key displayed here in your init-cfg.txt file, do not use a manually
generated VM auth key.
STEP 5 | (Optional) View and deactivate a managed VM-Series firewall. From the Show Devices
dialogue, you can view the devices associated with a given license manager. You can view
the name, serial number, management IP address, connection status, and amount of time
Panorama waits to deactivate a disconnected firewall. Additionally, you can manually
deactivate the license of managed VM-Series firewall.
1. Select Panorama > SW Firewall License > License Managers.
2. In the Action column of a given license manager, click Show Devices.
3. To manually deactivate a connected or disconnected (but not yet deactivated) managed
VM-Series firewall, select a one or more listed VM-Series firewalls and click Deactivate.
VM-Series Deployment Guide Version 10.1 67 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 6 | (Optional) Verify that Panorama has completed the necessary API calls to license connected
firewalls.
1. Log in to the Panorama command line interface.
2. Execute the following command.
show plugins sw_fw_license panorama-api-requests
VM-Series Deployment Guide Version 10.1 68 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 69 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
For all memory profiles listed above, the minimum vCPUs is 2. You can enable Lite mode if you
choose 4.5GB. Lite mode is an alternative operating mode for environments where resources are
limited. See VM-50 Lite Mode for more information.
Lite mode requires minimum 32GB of hard drive space. However, because the VM-Series
base image is common for all vCPU combinations, you must allocate 60GB of hard drive
space until you license a VM-Series firewall with 4.5GB memory.
To achieve the best performance, all of the required cores should be available on a single
CPU socket.
The distribution of vCPUs assigned to the management plane and the dataplane differs depending
on the total number of vCPUs assigned to the VM-Series firewall. Refer to the following tables
(1-16 vCPUs and 17-32 vCPUs) to find out the number of dataplane vCPUs automatically
allocated for a particular combination of memory profile and total vCPUs. For example, with
a memory profile of 16GB and a total of 15 vCPUs, 11 are assigned to the dataplane and the
remaining 4 are assigned to the management plane.
4.5GB 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
5.5GB 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
6.5GB 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2
9GB 1 2 3 3 4 4 4 4 4 4 4 4 4 4 4
16GB 1 2 3 3 4 5 6 6 7 8 9 9 10 11 12
56GB 1 2 3 3 4 5 6 6 7 8 9 9 10 11 12
VM-Series Deployment Guide Version 10.1 70 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
4.5GB 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
5.5GB 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
6.5GB 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
9GB 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4
16GB 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12
56GB 12 13 14 15 15 16 17 18 18 19 20 21 21 22 23 24
VM-Series Deployment Guide Version 10.1 71 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
The memory profile and the total number of vCPUs determine how many cores are automatically
assigned to the management plane and the dataplane. If you are running PAN-OS version 10.0.1
or later, you have the option to customize the distribution of the dataplane cores.
If you are using SW NGFW licensing you can choose a memory profile that supports your
requirements for one or more of the following resources:
Sessions
Policies
Tunnel content inspection rules 100 100 100 500 500 2,000
Policy based forwarding rules 100 100 100 500 500 2,000
VM-Series Deployment Guide Version 10.1 72 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Security Zones
Members per address group 2,500 2,500 2,500 2,500 2,500 2,500
Members per service group 500 500 500 500 500 500
* Firewall throughput measured with App-ID and User-ID features enabled utilizing AppMix
transactions.
Security Profiles
VM-Series Deployment Guide Version 10.1 73 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
App-ID
User-ID
IP-User mappings (data plane) 64,000 64,000 64,000 64,000 512,000 512,000
Active and unique groups used 1,000 1,000 1,000 1,000 10,000 10,000
in policy (aggregate of LDAP
groups, XML API Groups, and
Dynamic User Group).*
Monitored servers for User-ID 100 100 100 100 100 100
*Firewall throughput measured with App-ID and User-ID features enabled utilizing AppMix
transactions.
SSL Decryption
Max SSL inbound certificates 1,000 1,000 1,000 1,000 1,000 1,000
VM-Series Deployment Guide Version 10.1 74 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
URL Filtering
Total entries for allow 25,000 25,000 25,000 25,000 25,000 100,000
list, block list and custom
categories
Max custom categories (virtual 500 500 500 500 500 500
system specific)
Dataplane cache size for URL 90,000 90,000 90,000 90,000 90,000 250,000
filtering
EDL
Max number of IPs per 50,000 50,000 50,000 50,000 50,000 50,000
system
Max number of DNS Domains 50,000 50,000 50,000 5000,000 2,000,000 2,000,00
per system
Max number of URL per 50,000 50,000 50,000 100,000 100,000 100,000
system
VM-Series Deployment Guide Version 10.1 75 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Interfaces
Mgmt - out-of-band NA NA NA NA NA NA
Traffic - 10/100/1000 NA NA NA NA NA NA
Traffic - 100/1000/10000 NA NA NA NA NA NA
802.1q tags per device 4,094 4,094 4,094 4,094 4,094 4,094
802.1q tags per physical interface 4,094 4,094 4,094 4,094 4,094 4,094
Max interfaces (logical and physical) 512 512 2,048 2,048 4,096 40,96
Virtual Routers
Virtual Wires
Virtual wires 2 4 12 12 12 12
VM-Series Deployment Guide Version 10.1 76 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Virtual Systems
Routing
IPv4 forwarding table size* 1,000 2,500 5,000 10,000 32,000 100,000
(Entries shared across virtual
routers)
IPv6 forwarding table size* 1,000 1,000 5,000 10,000 32,000 100,000
(Entries shared across virtual
routers)
System total forwarding table size 1,000 1,000 5,000 10,000 32,000 100,000
Max routing peers (protocol 500 500 500 500 1,000 1,000
dependent)
Static entries - DNS proxy 1,024 1,024 1,024 1,024 1,024 1,024
*Firewall throughput measured with App-ID and User-ID features enabled utilizing AppMix
transactions.
L2 Forwarding
ARP table size per device 1,500 1,500 2,500 10,000 32,000 128,000
IPv6 neighbor table size 500 500 2,500 10,000 32,000 128,000
VM-Series Deployment Guide Version 10.1 77 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
MAC table size per device 1,500 1,500 2,500 5,000 32,000 128,000
Max ARP entries per broadcast 1,500 1,500 2,500 10,000 32,000 128,000
domain
Max MAC entries per broadcast 1,500 1,500 2,500 5,000 32,000 128,000
domain
NAT
Total NAT rule capacity 160 400 3,000 5,000 8,000 8,000
Max NAT rules (static)* 160 400 3,000 5,000 8,000 8,000
(Configuring static NAT rules
to full capacity requires that no
other NAT rule types are used.)
Max NAT rules (DIP)* 160 400 2,000 3,000 8,000 8,000
(Configuring DIP NAT rules to
full capacity requires that no
other NAT rule types are used.)
Max NAT rules (DIPP) 160 200 400 800 2,000 2,000
Max translated IPs (DIP) 16,000 16,000 128,000 128,000 160,000 160,000
Max translated IPs (DIPP)* 200 200 400 800 2,000 2,000
(DIPP translated IP capacity is
proportional to the DIPP pool
oversubscription value. The
capacity shown here is based on
an oversubscription value of 1x.)
*Firewall throughput measured with App-ID and User-ID features enabled utilizing AppMix
transactions.
VM-Series Deployment Guide Version 10.1 78 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Address Assignment
Max number of assigned addresses 64,000 64,000 64,000 64,000 64,000 64,000
*Firewall throughput measured with App-ID and User-ID features enabled utilizing AppMix
transactions.
High Availability
Devices supported 2 2 2 2 2 2
QoS
Subinterfaces supported NA NA NA NA NA NA
IPSec VPN
VM-Series Deployment Guide Version 10.1 79 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Site to site (with proxy id) 25 250 1,000 2,000 4,000 8,000
Max tunnels (SSL, IPSec, and IKE 25 250 500 2,000 6,000 12,000
with XAUTH)
Multicast
Activate Credits
Within your organization you can create many accounts, each with a different purpose. During
activation you can choose only one account per default credit pool. Once you the credit pool is
active, users granted the credit administrator role can allocate the credits for deployments, and
even transfer credits to other pools.
If you have an existing CSP account and are a superuser or an admin, the system automatically
adds the credit admin role to your profile. If you do not have an existing account, the CSP
automatically creates an account for you and adds the credit admin role to your profile.
You (the purchaser) receive an email detailing the subscription, the credit pool ID, the subscription
start and end date, the amount of credits purchased, and the description of the default credit pool
(see “default credit pools” in VM-Series Firewall Licensing).
STEP 1 | In the email, click Start Activation to view your available credit pools.
VM-Series Deployment Guide Version 10.1 80 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Select the credit pool you want to activate. You can use the search field to filter your
account list by number or name.
If you have purchased multiple credit pools (see Software NGFW Credits), they are
automatically selected. The check marks represent activation links for onboarding credits.
You are prompted to authenticate or sign in.
If you deselect a credit pool, you see a reminder that if you want to activate those
credits, you must return to the email and click the Start Activation link.
STEP 4 | Select the support account (you can search by account number or name).
STEP 7 | (optional) If this is your first credit activation, you see the Create Deployment Profile dialog.
Continue to Create a Deployment Profile.
VM-Series Deployment Guide Version 10.1 81 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | (optional) Hover over the question mark following Protect more, save more to see how your
credit allocation affects savings.
STEP 4 | Click Calculate Estimated Cost to view the credit total, and the number of credits available
before the deployment.
(optional) Hover over the question mark following the estimate to view the credit breakdown
for each component.
VM-Series Deployment Guide Version 10.1 82 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | On the far right, select the vertical ellipsis (More Options) and select Edit Profile.
VM-Series Deployment Guide Version 10.1 83 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 5 | Select the Audit Trail tab and use search to locate your profile.
Use search to locate your profile, and expand the row to view the configuration you specified
when you created the profile.
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Clone Profile.
STEP 3 | Change the profile name, make any other changes, and select Create Deployment Profile.
STEP 4 | Select the Audit Trail tab and use search to locate your profile.
Expand the row to view the configuration you cloned. It is a new configuration with a different
Profile Name and auth code.
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Transfer Profile.
VM-Series Deployment Guide Version 10.1 84 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Delete.
VM-Series Deployment Guide Version 10.1 85 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Use the following steps if the firewall is able to connect to the CSP:
1. Log in to the CSP with your account credentials.
2. Select Assets > Software NFGW Credits.
Locate your credit pool and view Details.
3. View Current Deployment Profiles and choose (or create) a profile.
You will use the auth code from this profile for licensing any firewall you create with it.
An auth code for a flexible firewall license begins with the letter D.
4. Log in to the VM-Series firewall web interface.
5. Verify the Palo Alto Networks update server configuration.
1. Select Device > Setup > Services.
2. Confirm that Update Server is set to updates.paloaltonetworks.com.
3. Confirm that Verify Update Server Identity is selected.
6. Select Device > Licenses.
1. Select the Activate feature using authorization code link.
2. Enter the VM-Series authorization code from the deployment profile.
3. Click OK to confirm the license upgrade.The firewall contacts the Palo Alto Networks
update server and consumes the tokens required for your firewall based on the VM-
Series model.
7. Confirm that the Dashboard displays a valid serial number and that the PA-VM license
displays in the Device > Licenses tab.
8. Verify your firewall is registered on the CSP:
• Select Assets > Software NFGW Credits
• Auth Code column, View Devices and locate the serial number for your deployment.
• In the credit pool, Credits Consumed, Firewalls Deployed, and vCPUs consumed
should be incremented to reflect your deployment.
VM-Series Deployment Guide Version 10.1 86 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Use the following steps if the firewall is not able to connect to the CSP:
This workflow adds your firewall to the support database. Because the firewall can’t connect
to the license server, you must manually pass the licenses from the CSP to the firewall.
1. Log in to the CSP with your account credentials.
2. Select the new profile and Select the vertical ellipsis (More Options) and Register
Firewall.
This opens the device registration form. Enter the information for your firewall and
Submit:
VM-Series Deployment Guide Version 10.1 87 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
This associates the firewall with the profile and its authcode and assigns a serial number.
3. Click View Devices to see associated firewalls in Software NGFW Devices.
In the License column, download each license key to a location from which you can
safely transfer the files to the firewall.
4. Log in to the firewall and select Device > Licenses.
License keys must be installed through the web interface. The firewall does not
support license key installation through SCP or FTP.
Provision Panorama
This option is only visible if you selected Panorama when the deployment profile was created. You
can edit the profile, if necessary.
STEP 1 | Select Assets > Software NGFW Credits and click the Details button on the credit pool you
used to create your profile.
VM-Series Deployment Guide Version 10.1 88 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Provision Panorama,
and Provision. You see the list of firewalls provisioned for the current deployment profile.
This creates a Panorama, assigns a serial number and the model type PAN-PRA-1000-CP, and
registers the Panorama as an asset. The Panorama you just provisioned is the last Panorama
listed. Note the auth code starts with F (so it is not the same as the deployment profile), but
the expiration date is the same as your profile’s credit pool.
Copy the serial number.
STEP 3 | From the deployment profile, View Devices, and select Panorama on the Software NGFW
Devices page. This displays all SW NGFW Panoramas.
Search By serial number using the serial number you copied.
You can also select Assets > Software NGFW Devices and Search By serial number with the
serial number you copied.
STEP 4 | After setting up your Panorama Virtual Appliance, add the serial number to Panorama.
1. Log in to Panorama.
2. Select Panorama > Setup > Management > General Settings and click the Edit icon.
3. Enter the serial number you copied from the CSP in the Serial Number field.
4. Click OK to save your changes.
5. Commit your configuration changes.
Select Commit > Commit to Panorama and Commit your changes.
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Provision Panorama
and then click Migrate Existing.
The CSP displays all virtual Panorama devices associated with your account.
VM-Series Deployment Guide Version 10.1 89 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | Select the check box for each virtual Panorama to be migrated.
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Provision Panorama
and then click Migrate Existing.
The CSP displays all virtual Panorama devices associated with your account.
VM-Series Deployment Guide Version 10.1 90 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Migrate a Standalone Panorama that Cannot Access the CSP to a Flexible License
Complete the following procedure to migrate your VM-ELA or perpetual virtual Panorama license
to a Software NGFW license even though your Panorama cannot access the CSP. Migration
without the CSP requires a serial number change, but it allows your Panorama devices to migrate
to Software NGFW licenses and retain your existing policies.
The minimum version for Panorama support is 8.1. If you must upgrade PAN-OS, do it
before you start the migration process. If you want to manage firewalls that are using
flexible vCPUs and advanced services, the PAN-OS version must be 10.0.4 or later.
STEP 1 | On your Panorama, upgrade if necessary, and note the serial number and the current support
expiration date.
VM-Series Deployment Guide Version 10.1 91 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | In the CSP, select Assets > Software NGFW Credits and click the Details link on a credit
pool. Select a deployment profile, or create one.
STEP 3 | On the far right, select the vertical ellipsis (More Options) and select Provision Panorama
and select Migrate Existing.
The CSP displays all virtual Panorama devices associated with your account.
STEP 5 | On Panorama, replace the serial number with the serial number from the Panorama you
provisioned in the CSP. Wait one minute, then refresh the page.
STEP 6 | In the CSP select your provisioned Panorama and download all licenses (the support license,
the management license, and Panorama as a log manager if your deployment profile includes
it.
Securely pass the licenses to your Panorama.
STEP 8 | Verify that the Current Support Expiration Date has been updated. Additionally, you can
expand each row to view the support license and/or logging license applied to the selected
Panorama.
STEP 2 | On the far right, select the vertical ellipsis (More Options) and select Provision Panorama.
The CSP displays all virtual Panorama devices associated with the current support account.
STEP 3 | Select Provision New, and check the box for each virtual Panorama to be migrated and
select Migrate.
The migrated Panoramas are displayed as Software NGFW Devices.
VM-Series Deployment Guide Version 10.1 92 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 4 | Verify that the Current Support Expiration Date has been updated. Additionally, you can
expand each line to view the individual licenses applied to the selected Panorama.
Transfer Credits
From the Customer Support Portal (CSP), transfer credits to a credit pool in the same account, or
to a credit pool in a different account that you can access.
Credits must be transferred between the pools within the same contract (parent/child).
VM-Series Deployment Guide Version 10.1 93 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | Go to the source credit pool and click Transfer Credits on the bottom left.
STEP 6 | To view credit transactions for a pool, select Details and select Audit Trail.
STEP 3 | Go to the source credit pool and select Transfer Credits on the bottom left.
VM-Series Deployment Guide Version 10.1 94 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 6 | To view credit transactions for a pool, select Details and select Audit Trail.
If you want to transfer credits between pools, the expiration dates must be the same on both
credit pools.
After renewal, you might notice some changes between your deployment profiles before.
The Prisma NGFW Credits and Virtual NGFW Credits credit pools are now both called
Software NGFW Credits credit pools. Additionally, the number of credits in your pool
might change after renewal due to changes in the product pricing model.
VM-Series Deployment Guide Version 10.1 95 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 5 | Click the Renew icon and then click Renew to confirm.
VM-Series Deployment Guide Version 10.1 96 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
After receiving your confirmation email, you can verify the changes to your credit pool by logging
in to the Palo Alto Networks Customer Support Portal. An amended and extended credit pool
displays the notification shown in the image below and displays the date the change occurred. If
your credit pool was amended but not extended, the notification says Amend only.
VM-Series Deployment Guide Version 10.1 97 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
profile. After you deactivate the license you must delete the firewall or it will continue to
consume credits.
If you don’t have internet access, you must export the license token from the firewall. Then, in
the CSP, start deactivation and upload the token (or paste in the token text) to complete the
deactivation.
• Internet access
• No internet access
• No internet access - Panorama management
No internet access.
1. Log in to the firewall web interface and select Device > Licenses.
2. In the License Management section, select Deactivate VM.
Verify the list of licenses/entitlements to be deactivated on the firewall.
3. Select Complete Manually to start the deactivation.
Click the Export license token link to save the token file to the client. A token filename
looks like this: 20150128_1307_dact_lic.01282015.130737.tok
At this point the license has been deactivated on the firewall, but the credits have not
been returned to the credit pool.
4. Use the token file to register the changes with the Licensing server:
1. Log into the Palo Alto Networks Customer Support website.
2. Select Assets > VM-Series Auth-Codes > Deactivate License(s).
In the Deactivate Licenses form, paste in the token text, or copy the token to a computer
with internet access and upload the token file to the CSP to complete license removal.
5. Delete the VM
VM-Series Deployment Guide Version 10.1 98 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Instead of deleting the deactivated firewalls, you can create a separate device
group and assign them to it.
STEP 3 | Choose FW Not Checked-in for (Days) from the Search By drop-down and enter the number
of days to search within.
VM-Series Deployment Guide Version 10.1 99 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 4 | To delicense a firewall, click on the More Options (three vertical dots) on the right and then
click Deactivate Firewall.
STEP 5 | Click Deactivate Firewall to confirm deactivation of the selected firewall. After deactivating
the firewall, the credits are returned to your credit pool.
You can specify the number of vCPUs to be licensed using a bootstrap plugin op command or the
VM-Series firewall CLI.
• To set the number of cores when bootstrapping a VM-Series firewall, add the following
command to your init-cfg.txt file.
plugin-op-commands=set-cores:<number-of-cores>
For example:
plugin-op-commands=set-cores:4
VM-Series Deployment Guide Version 10.1 100 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
• To set the number of cores on a VM-Series firewall that has already been deployed, use the
following CLI command.
request plugins vm_series set-cores cores <number-of-cores>
For example:
request plugins vm_series set-cores cores 16
You must reboot the VM-Series firewall for this change to take effect.
VM-Series Deployment Guide Version 10.1 101 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Click Next. A subscription-only deployment profile can only be used on VM-Series firewalls
with a fixed model VM-Series profile.
1. Profile Name.
Name the profile.
2. Number of Firewalls.
Enter the number of firewalls this profile deploys, assuming you have sufficient credits.
You do not have to deploy them all at once.
3. Firewall Model:
Choose the VM-Series model of the VM-Series firewalls to which you are adding
subscriptions.
You can only apply the subscription-only auth code to VM-Series firewall of the
chosen model.
4. Security Use Case: Choose a use case.
5. Customize Subscriptions.
After selecting a use case, you can add or remove security services.
VM-Series Deployment Guide Version 10.1 102 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | (optional) Hover over the question mark following Protect more, save more to see how your
credit allocation affects savings.
STEP 4 | Click Calculate Estimated Cost to view the credit total, and the number of credits available
before the deployment.
(optional) Hover over the question mark following the estimate to view the credit breakdown
for each component.
VM-Series Deployment Guide Version 10.1 103 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 104 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Note that you must have at least one management plane core, and having too few
cores affects performance.
STEP 4 | Use show plugins vm_series dp-cores to verify that the number of DP cores has
changed.
If the license you want to switch is for a VM-Series firewall with an ELA or perpetual
license, you must choose Fixed Models and use the same VM-Series model and number
of vCPUs when you create the SW NGFW deployment profile for the flexible license.
For example, if you are currently using a VM-100 with 2 vCPUs, when you create the
deployment profile, select Fixed Models, select VM-100, and specify 2 vCPUs. As long as
the capacity is the same, you can add new services.
VM-Series Deployment Guide Version 10.1 105 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | Log in to the CSP and Create a Deployment Profile. If the license you want to migrate is
for a VM-Series firewall with an ELA or perpetual license, you must choose Fixed Models
VM-Series Deployment Guide Version 10.1 106 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
and use the same VM-Series model and number of vCPUs when you create the SW NGFW
deployment profile for the flexible license.
You will use the auth code from this profile. An auth code for a flexible firewall license begins
with the letter D, as shown below.
VM-Series Deployment Guide Version 10.1 107 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 108 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 5 | Enter the VM-Series authorization code from the new deployment profile.
STEP 6 | Click OK to confirm the license upgrade.The firewall contacts the Palo Alto Networks update
server and consumes the tokens required for your firewall based on the VM-Series model.
STEP 8 | Repeat this process for each VM-Series firewall in your deployment.
STEP 2 | Use the CLI to use manual mode to deactivate the fixed-model license.
STEP 3 | Deactivate the VM from the Firewall using the manual procedure, and log in to the CSP and
use the token file to deactivate the VM.
STEP 4 | In the CSP, Create a Deployment Profile with the same VM-Series model, number of vCPUs,
and security subscriptions as the previous fixed model license. You will use the auth code
from this profile.
STEP 5 | Select the new profile and click the vertical ellipsis and select Register Firewall.
1. Enter the VM and firewall information and select Submit. This associates the firewall
with the profile and its authcode and assigns a serial number.
2. Click View Devices to see associated devices in Software NGFW Devices.
3. In the License column, download the license keys to a location from which you can
safely transfer the files to the host machine.
License keys must be installed through the web interface. The firewall does not support
license key installation through SCP or FTP.
STEP 7 | Click Manually Upload License and enter the license keys.
STEP 8 | Confirm that the Dashboard displays a valid serial number and that the PA-VM license
displays in the Device > Licenses tab.
VM-Series Deployment Guide Version 10.1 109 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | Verify the Palo Alto Networks update server configuration for the firewalls.
1. Select Device > Setup > Services.
2. Confirm that Update Server is set to updates.paloaltonetworks.com.
3. Confirm that Verify Update Server Identity is selected.
STEP 4 | Create a Deployment Profile for the new license if you have not done so already. This profile
is required to generate the new authorization code for the migrated Panorama.
VM-Series Deployment Guide Version 10.1 110 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 5 | Retrieve the VM-Series authorization code. A firewall authorization code for a flexible license
begins with the letter D, as shown below.
VM-Series Deployment Guide Version 10.1 111 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 112 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 113 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 114 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
5. Activate to confirm the license upgrade. Panorama contacts the Palo Alto Networks
update server and consumes the tokens required for your firewalls based on the VM-
Series model, vCPUs, and services you have chosen.
STEP 7 | (optional) o.
STEP 3 | Deactivate the VM from Panorama using the manual procedure, and log in to the CSP and
use the token file to deactivate the VM.
STEP 4 | In the CSP, Create a Deployment Profile with the same VM-Series model, number of vCPUs,
security subscriptions, and Panorama as the fixed model license. You will use the auth code
from this profile.
STEP 5 | Select the new profile and click the vertical ellipsis and select Register Firewall.
1. Enter the VM and firewall information and select Submit. This associates the firewall
with the profile and its authcode and assigns a serial number.
2. Click View Devices to see associated devices in Software NGFW Devices.
3. In the License column, download the license keys to a location from which you can
safely transfer the files to the host machine.
VM-Series Deployment Guide Version 10.1 115 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 116 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 117 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
4. Click Activate to confirm the license upgrade. Panorama contacts the Palo Alto
Networks update server and consumes the tokens required for your firewalls based on
the VM-Series model, vCPUs, and services you have chosen.
Both Panorama-managed Firewall and Panorama Do Not Have Access to the CSP
When both Panorama and a managed firewall cannot access the CSP, migrate a license on the
managed firewall.
STEP 1 | If necessary, install the license API key on your VM-Series firewall.
STEP 2 | Use the CLI to use manual mode to deactivate the fixed-model license.
STEP 3 | Deactivate the VM from the Firewall using the manual procedure, and log in to the CSP and
use the token file to deactivate the VM.
STEP 4 | In the CSP, Create a Deployment Profile with the same VM-Series model, number of vCPUs,
and security subscriptions as the previous fixed model license. You will use the auth code
from this profile.
STEP 5 | Select the new profile and click the vertical ellipsis and select Register Firewall.
1. Enter the VM and firewall information and select Submit. This associates the firewall
with the profile and its authcode and assigns a serial number.
2. Click View Devices to see associated devices in Software NGFW Devices.
3. In the License column, download the license keys to a location from which you can
safely transfer the files to the host machine.
License keys must be installed through the web interface. The firewall does not support
license key installation through SCP or FTP.
STEP 7 | Click Manually Upload License and enter the license keys.
STEP 8 | Confirm that the Dashboard displays a valid serial number and that the PA-VM license
displays in the Device > Licenses tab.
STEP 2 | Verify that all subscriptions enabled in your deployment profile are applied to your device.
STEP 3 | On the CSP, verify that the expected number of credits allocated and credits consumed
match your credit pool.
VM-Series Deployment Guide Version 10.1 118 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 4 | On the CSP, verify that the associated tokens or quantity of licenses have been returned to
your previous auth code.
After generating the token, copy the entire token from the API response for use in the other
Software NGFW APIs.
Request Body Parameters: client_id, client_secret,
grant_type=client_credentials, scope=fwflex-service
The value for grant_type must be client_credentials and the value for scope
must be fwflex-service.
VM-Series Deployment Guide Version 10.1 119 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
"access_token":eyJhifQ.eyJzY29wZSI6WyJmd2ZsZXgtc2VydmljZSJdLCJjbGllbnRfaWQiOiJj
fgZA6XPbHaml5fLpXOtsQ_IkmnxeDnJmcF-
K3akxgalQ8RA3GutHnKGoIX_JhYGqREHwHiWwgVm3ahK58ygCJDBb3z4BpOtTAnkejCp9k2ke1a4d_uR
"token_type": "Bearer"
"expires_in": 7199
}
{
"data": [
{
"creditPoolId": 31586#####,
"poolName": "Software NGFW Credits",
"supportType": "Platinum",
"expirationDate": "02/07/2026",
"totalCredits": 27.84,
"creditsAllocated": 0.0,
"creditsConsumed": 0.0,
"creditsAvailable": 27.84
},
{
"creditPoolId": 99394#####,
"poolName": "Software NGFW Credits",
VM-Series Deployment Guide Version 10.1 120 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
"supportType": "Premium",
"expirationDate": "10/27/2023",
"totalCredits": 47.0,
"creditsAllocated": 13.68,
"creditsConsumed": 0.0,
"creditsAvailable": 33.32
},
{
"creditPoolId": 90775#####,
"poolName": "Software NGFW Credits",
"supportType": "Premium Partner",
"expirationDate": "04/13/2025",
"totalCredits": 34.0,
"creditsAllocated": 0.0,
"creditsConsumed": 0.0,
"creditsAvailable": 34.0
}
]
}
{
"data": {
"creditPoolId": 97101#####,
"poolName": "Software NGFW Credits",
"supportType": "Premium",
"expirationDate": "02/20/2026",
"totalCredits": 194.0,
"creditsAllocated": 172.75,
"creditsConsumed": 43.94,
"creditsAvailable": 21.25
}
}
VM-Series Deployment Guide Version 10.1 121 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
{
"data": [
{
"profileName": "Credit Pool 1",
"dAuthCode": "D#######",
"type": "VM",
"panOsVersion": "10.0.4_or-above",
"creditsAllocated": 41.860000610351562,
"creditsConsumed": 20.930000305175781,
"vCpuConsumed": 2,
"vCpuAllocated": 4,
"fWsDeployed": 1,
"fWsPlanned": 2,
"status": "Updated"
},
{
"profileName": "Credit Pool 2",
"dAuthCode": "D#######",
"type": "VM",
"panOsVersion": "10.0.3_or-below",
"creditsAllocated": 32.200000762939453,
"creditsConsumed": 0.0,
"vCpuConsumed": 0,
"vCpuAllocated": 4,
"fWsDeployed": 0,
"fWsPlanned": 2,
"status": "Created"
}
]
}
VM-Series Deployment Guide Version 10.1 122 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
{
"data": {
"profileName": "deployment-profile-1",
"dAuthCode": "D#######",
"type": "VM",
"panOsVersion": "10.0.3_or-below",
"creditsAllocated": 43.7,
"creditsConsumed": 0.0,
"vCpuConsumed": 0,
"vCpuAllocated": 8,
"fWsDeployed": 0,
"fWsPlanned": 1,
"status": "Updated"
}
}
{
"isDeleted": true,
"dAuthcode": "D#######",
"message": "Deleted"
}
VM-Series Deployment Guide Version 10.1 123 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Parameter Description
VM-Series Deployment Guide Version 10.1 124 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Parameter Description
PAN to enable Panorama or DLC to enable
Panorama as a Dedicated Log Collector.
VM-Series Deployment Guide Version 10.1 125 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
{
"profileId": 29###,
"authCode": "D#######",
"success": true,
"message": "Deployment profile saved successfully."
}
Parameter Description
VM-Series Deployment Guide Version 10.1 126 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Parameter Description
VM-Series Deployment Guide Version 10.1 127 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
{
"profileId": 29###,
"authCode": "D#######",
"success": true,
"message": "Deployment profile saved successfully."
}
VM-Series Deployment Guide Version 10.1 128 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Models
The VM-Series firewall is available in the following fixed vCPU models—VM-50, VM-100,
VM-200, VM-300, VM-500, VM-700, and VM-1000-HV. These models are available for all
supported PAN-OS versions, unless otherwise noted below. The software package ( .xva, .ova, or
.vhdx file) that is used to deploy the VM-Series firewall is common across all models.
• All models can be deployed as guest virtual machines on VMware ESXi and vCloud Air, KVM,
Microsoft Hyper-V, Cisco ACI, Cisco ENCS, and Cisco CSP.
• In public cloud environments—Amazon Web Services, Azure, Google Cloud Platform, Oracle
Cloud Infrastructure, Alibaba Cloud—all models except the VM-50 are supported.
• For VMware NSX, only the VM-100, VM-200, VM-300, VM-500, and VM-1000-HV firewalls
are supported.
When you apply the capacity license on the VM-Series firewall, the model number and the
associated capacities are implemented on the firewall. Capacity is defined in terms of the number
of sessions, rules, security zones, address objects, IPSec VPN tunnels, and SSL VPN tunnels that
the VM-Series firewall is optimized to handle. To make sure that you purchase the correct model
for your network requirements, use the following table to understand the maximum capacity for
each model and the capacity differences by model:
VM-Series Deployment Guide Version 10.1 129 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
For information on the platforms on which you can deploy the VM-Series firewall, see VM-Series
Deployments. For more information about the VM-Series firewall models, see the Palo Alto
Networks Firewall comparison tool. You can also review general information About the VM-Series
Firewall.
• VM-Series System Requirements
• CPU Oversubscription
• VM-50 Lite Mode
• VM-Series Model License Types
• Activate VM-Series Model Licenses
• Register the VM-Series Firewall
• Install a Device Certificate on the VM-Series Firewall
• Switch Between the BYOL and the PAYG Licenses
• Switch Between VM-Series Model Licenses
• Deactivate License(s)
• Renew VM-Series Firewall License Bundles
VM-Series Deployment Guide Version 10.1 130 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
*In 10.1.X, 9 GB might be insufficient depending upon the feature set or combination of feature
sets (such as GTP or high-performance features) used on the firewall. If you experience memory
resource related issues, increase memory to 11 GB to accommodate the additional memory
requirements of some of the features or combination of features. Alternately, you can Enable
ZRAM on the VM-Series Firewall to improve memory usage.
You can enable Lite mode on the VM-50. Lite mode is an alternative operating mode for
environments where resources are limited. See VM-50 Lite Mode for more information.
To achieve the best performance, all of the needed cores should be available on a single
CPU socket.
VM-Series Deployment Guide Version 10.1 131 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
For operation, the VM-50 firewall requires minimum 32GB of hard drive space. However,
because the VM-Series base image is common to all models, you must allocate 60GB of
hard drive space until you license the VM-50.
The number of vCPUs assigned to the management plane and those assigned to the dataplane
differs depending on the total number of vCPUs assigned to the VM-Series firewall. If you assign
more vCPUs than those officially supported by the license, any additional vCPUs are assigned to
the management plane.
2 1 1
4 2 2
8 2 6
16 4 12
CPU Oversubscription
The VM-Series firewall supports CPU oversubscription on all models. CPU oversubscription allows
you deploy a higher density of VM-Series firewalls on hypervisors running on x86 architecture.
You can deploy two (2:1) to five (5:1) VM-Series firewalls per required allocation of CPUs. When
planning your deployment, use the following formula to calculate the number of VM-Series
firewalls your hardware can support.
(Total CPUs x Oversub Ratio)/CPUs per firewall = total number of VM-Series firewalls
For example, at a 5:1 ratio, a host machine with 16 physical CPU and at least 180GB of memory
(40 × 4.5GB) can support up to 40 instances to the VM-50. Each VM-50 requires two vCPUs and
five VM-50s can be associated to each pair of vCPUs.
(16 CPUs x 5)/2 = 40 VM-50 firewalls
Beyond meeting the minimum VM-Series System Requirements, no additional configuration is
required to take advantage of oversubscription. Deploy VM-Series firewalls normally and resource
oversubscription occurs automatically. When planning your deployment, consider other functions,
such as virtual switches, and guest machines on the host that require hardware resources of their
own.
VM-Series Deployment Guide Version 10.1 132 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
The following licenses and subscriptions are available for the VM-Series firewall:
VM-Series Deployment Guide Version 10.1 133 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
• Capacity License—The VM-Series firewall requires a base license, also called a capacity license,
to enable the model number (VM-50, VM-100, VM-200, VM300, VM-500, VM-700, or
VM-1000-HV) and the associated capacities on the firewall. Capacity licenses are included in a
bundle and can be perpetual or term-based:
• Perpetual License—A license with no expiration date, it allows you to use the VM-Series
firewall at the licensed capacity, indefinitely. Perpetual licenses are available for the VM-
Series capacity license only.
• Term-Based License—A term-based license allows you to use the VM-Series firewall for a
specified period of time. It has an expiration date and you will be prompted to renew the
license before it expires. Term-based licenses are available for the capacity licenses, support
entitlements, and subscriptions.
• VM-Series ELA—For high-growth enterprises, the VM-Series enterprise licensing agreement
(VM-Series ELA) provides a fixed price licensing option that allows up to unlimited deployment
of VM-Series firewalls with BYOL. The ELA is offered in one and three-year term agreements
with no true-up at the end of the term.
There are two flavors of the VM-Series ELA:
• If you purchased the VM-Series ELA before December 4, 2018, you have the legacy VM-
Series ELA which includes your choice of a single VM-Series model on any supported
hypervisor or public cloud environment. With this ELA, you receive a single license
authorization code for capacity, support, GlobalProtect, PAN-DB URL Filtering, Threat
Prevention, WildFire subscriptions for every instance of the VM-Series firewall. You
also get unlimited deployments of the Panorama virtual appliance included with a device
management license for 1000 firewalls on each.
Palo Alto Networks began phasing out the legacy VM-Series ELA on April 16, 2019. Existing
enterprise license customers will be notified by their support representative when their
account is migrated to the Multi-Model ELA. Licensing tokens will be distributed according
to your VM-Series firewall subscription agreement — no additional action is necessary for
continued operation of your firewalls. If you would like to Manage VM-Series ELA License
Tokens, you must designate an ELA administrator. Only a super user role on the Palo Alto
Networks Customer Support Portal (CSP) can assign an ELA administrator.
• The VM-Series Enterprise License Agreement (Multi-Model ELA) you purchase after
December 4, 2018 (either as a new purchase or as a repurchase of the legacy VM-Series
ELA) is called the multi-model VM-Series ELA that includes most models of the VM-Series
firewall portfolio along with the GlobalProtect, PAN-DB URL Filtering, Threat Prevention,
WildFire subscriptions, and support entitlement. You also get unlimited deployments of the
Panorama virtual appliance with a device management license for 1000 firewalls on each.
VM-Series Deployment Guide Version 10.1 134 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
• Bring Your Own License (BYOL)—A license that is purchased from a partner, reseller, or
directly from Palo Alto Networks. BYOL supports individual capacity licenses, support licenses,
and subscription bundles.
• For individual BYOL licenses, you must apply the auth code after you deploy the VM-Series
firewall.
• A BYOL license bundle has a single auth code you can include in the bootstrap package (see
Bootstrap the VM-Series Firewall). All the subscriptions included in the bundle are licensed
when the firewall launches.
A BYOL license for the VM-Series firewall on OCI GovCloud requires PAN-OS 10.1.2 or
later for FIPS and non-FIPS modes.
• Pay-as-you-go (PAYG)—Also called usage-based or pay-per-use licensing. PAYG licenses can be
purchased from your Cloud provider:
• AWS: Purchase from AWS Marketplace. Supports hourly and annual PAYG options.
• Azure: Purchase from Azure Marketplace. Supports the hourly PAYG option.
• Google Cloud Platform: Purchase from Google Cloud Platform Marketplace. Google Cloud
Platform supports per-minute PAYG option.
• Oracle Cloud Infrastructure: (PAN-OS 10.0.3 or later) Purchase from Oracle Cloud
Marketplace.
The VM-Series on OCI PAYG license does not support the VM-100.
With the PAYG license bundles, the firewall is prelicensed and ready for use as soon as you
deploy it; you do not receive an auth code. When you stop or terminate the firewall from your
Cloud console, PAYG licenses are suspended or terminated.
A PAYG license applies a VM-Series capacity license based on the hardware allocated to
the instance. the PAYG instance checks the amount of hardware resources available to the
instance and applies the largest VM-Series firewall capacity license allowed for the resources
available. For example, if the instance has 2 vCPUs and 16GB of memory, a VM-100 capacity
license is applied based on the number of vCPUs. However, if the instance has 16 vCPUs
and 16GB of memory, a VM-500 license is applied based on the amount of memory. For
more information about VM-Series model resource requirements, see VM-Series System
Requirements.
Downgrading PAN-OS is not supported on a PAYG firewall instance that was initially
deployed running PAN-OS 9.1.2. Firewall instances deployed prior to PAN-OS 9.1.2
can be downgraded to older versions of PAN-OS.
Premium Support
VM-Series Deployment Guide Version 10.1 135 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
GlobalProtect
WildFire
DNS Security
When using the VM-Series firewall CLI to view your applied PAYG license, the command
show system info displays a different value from the output displayed for the
command request license info. For PAN-OS versions 9.1.1 and earlier the
command request license info always displays the model as VM-300, regardless
of the VM-Series model that has been applied.
You cannot switch between the PAYG and the BYOL licenses. To move from PAYG to BYOL,
contact your Palo Alto Networks channel partner or sales representative to purchase a BYOL
license and get a BYOL auth code that you can use to license your firewall. If you have deployed
your firewall and want to switch the license, see Switch Between the BYOL and the PAYG
Licenses.
If you have an evaluation copy of the VM-Series firewall and would like to convert it
to a fully licensed (purchased) copy for the same license type (BYOL to BYOL), you can
deactivate the evaluation license and activate the purchased license in its place. See
Upgrade the VM-Series Firewall for instructions.
VM-Series Deployment Guide Version 10.1 136 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
• VM-300—50 tokens
• VM-500—140 tokens
• VM-700—300 tokens
With the VM-Series ELA, there is no true-up due at the end of the term which means that you
are not billed retroactively even if you deploy more firewalls than your original forecast. So, to
balance flexibility with accountability, the VM-Series ELA terms of use include a bounded and
unbounded period that explains how you can consume tokens and deploy firewalls as the need
arises. For details, refer to the ELA terms and conditions. The VM-Series firewalls that you deploy
with the VM-Series ELA do not have a perpetual license and on the expiry of the term, you must
renew the agreement to extend the support entitlement and get continued access to software and
content release updates on the firewalls.
With the ELA administrator role on the CSP, you can transfer or split the licensing tokens among
other administrators who belong to different departments with their own CSP accounts. This
sharing enables other administrators in your enterprise to deploy the VM-Series firewall on
demand as long as they have tokens available in their respective CSP accounts. See Manage VM-
Series ELA License Tokens to invite other administrators to share ELA tokens and deploy any
model of the VM-Series firewall that meets your enterprise security need. You can also reclaim
tokens to remove CSP accounts from the VM-Series ELA if you want to redistribute tokens based
on changing organizational needs.
Additional purchases and grants do not directly add to the number of available VM-
Series firewalls in a CSP account; instead, ELA license tokens are added to the VM-
Series ELA token pool. The ELA license tokens can subsequently be allocated by the ELA
administrator to a given CSP account to increase the number of available VM-Series
firewalls.
VM-Series Deployment Guide Version 10.1 137 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 1 | (Legacy VM-Series ELA Customers only) Designate an ELA administrator to manage tokens.
Existing enterprise license customers who have been migrated to the Multi-Model ELA must
designate an ELA administrator to manage VM-Series ELA license tokens. Upon conversion, no
other action is necessary for continued operation of your firewalls, however, you will not be
able to (re)allocate tokens for deploying firewalls until an ELA administrator has been assigned.
Only an administrator with a super user role on the CSP has the ability to designate an ELA
administrator, who in turn, can manage tokens or grant tokens to other administrators.
1. Log in to the Palo Alto Networks CSP.
2. Select Members > Manage Users.
3. Click on the pencil icon under Actions to edit the user to whom you want to assign the
ELA administrator role.
4. Select ELA Administrator and then click the check mark to add the new role to the
selected user.
5. Continue to step 3.
VM-Series Deployment Guide Version 10.1 138 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
how many are available to deploy within the bounded and unbounded period of the
agreement.
4. Select Assets > VM-Series Auth-Codes to view the authorization codes for deploying
each model of the VM-Series firewall and associated subscriptions included with the
ELA.
VM-Series Deployment Guide Version 10.1 139 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
administrator, you can grant access to other users who are registered with an email address on
the CSP.
VM-Series Deployment Guide Version 10.1 140 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
automatically calculated and become available for use. In this example, you are allowing
10 instances each of the VM-50 and the VM-500.
2. Verify that the accurate number of firewall instances are deposited in the account.
Select Assets > VM-Series Auth-Code to confirm the auth codes you allotted. In this
example, the account has the ability to provision 10 instances each of the VM-50 and
the VM-500. As the recipients deploy firewalls, the number of tokens are deducted from
the total available pool, and you can view the number of firewall instances that they
have provisioned as a ratio of the total quantity you allocated for them. As your security
needs evolve, you have the flexibility to allocate more quantity and allow access to a
different VM-Series firewall model as long as you have tokens available.
VM-Series Deployment Guide Version 10.1 141 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 5 | Remove a CSP account from the VM-Series ELA to reclaim tokens.
You cannot reclaim a portion of the tokens allocated to a CSP account. By reclaiming
tokens, you are removing the entirety of the CSP account from the VM-Series ELA and
reallocating all associated tokens to the token pool.
1. Verify that all tokens associated with the CSP account that you want to remove are
not being utilized by the VM-Series firewalls. Deactivate the VM-Series firewalls as
necessary to provision tokens for removal.
2. Select Assets > Enterprise Agreements > Manage VM-Series Token.
Select the account ID from whom you want to reclaim tokens from and click Reclaim
Token. If tokens are available for reclamation, you will receive a confirmation of a
successful removal.
VM-Series Deployment Guide Version 10.1 142 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 143 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
accepted the grant so that you he/she can allocate the VM-Series firewall models and
quantity that you can deploy.
If you belong to multiple accounts on the CSP and accidentally accept the grant
in to the wrong account, you must request the ELA administrator to resend the
grant to you. Do not start using the auth code to provision firewalls until you
accept the grant in the correct account.
STEP 3 | Verify which VM-Series models and how many are allocated for you.
After the ELA administrator allocates the VM-Series firewall models and number of instances
you can provision, you can select Assets > VM-Series Auth Codes to view which models and
how many of each are allocated for you. For example, the grant in the following screenshot
displays the auth codes that enable you to deploy 10 instances each of the VM-50 and the
VM-500.
As you deploy firewalls and register them to the CSP, the number of provisioned firewalls
is incremented. The Quantity of VM Provisioned displays the ratio of provisioned to total
available for each model.
VM-Series Deployment Guide Version 10.1 144 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
For usage-based models of the VM-Series firewall in the AWS Marketplace, instances with
short and long AWS instance IDs are supported.
Until you activate the license on the VM-Series firewall, the firewall does not have a serial
number, the MAC address of the dataplane interfaces are not unique, and only a minimal number
of sessions are supported. Because the MAC addresses are not unique until the firewall is
licensed, to prevent issues caused by overlapping MAC addresses, make sure that you do not have
multiple, unlicensed VM-Series firewalls.
When you activate the license, the licensing server uses the UUID and the CPU ID of the virtual
machine to generate a unique serial number for the VM-Series firewall. The capacity auth code in
conjunction with the serial number is used to validate your entitlement.
The VM-Series firewall License tab displays a standard VM-300 license file for all license
models. To find your specific license model information, view the system info in the UI, or
the use the CLI to view system info.
After you license a VM-Series firewall, if you need to delete and redeploy the VM-Series
firewall, make sure to Deactivate the License(s) on the firewall. Deactivating the license
allows you to transfer the active licenses to a new instance of the VM-Series firewall
without help from technical support.
VM-Series Deployment Guide Version 10.1 145 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
No internet access
1. Select Device > Licenses and click the Activate Feature using Auth Code link.
2. Click Download Authorization File, and download the authorizationfile.txt on the client
machine.
3. Copy the authorizationfile.txt to a computer that has access to the internet and log in to
the support portal. Click My VM-Series Auth-Codes link and select the applicable auth
code from the list and click the Register VM link.
4. On the Register Virtual Machine tab upload the authorization file. Select the PAN-OS
version and the hypervisor on which you have deployed the firewall, to complete the
VM-Series Deployment Guide Version 10.1 146 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
registration process. The serial number of your VM-Series firewall will be attached to
your account records.
5. Navigate to Assets > My Devices and search for the VM-Series device just registered
and click the PA-VM link. This will download the VM-Series license key to the client
machine.
6. Copy the license key to the machine that can access the web interface of the VM-Series
firewall and navigate to Device > Licenses.
License keys must be installed through the web interface. The firewall does not
support license key installation through SCP or FTP.
7. Click Manually Upload License link and enter the license key. When the capacity license
is activated on the firewall, a reboot occurs.
8. Log in to the device and confirm that the Dashboard displays a valid serial number and
that the PA-VM license displays in the Device > Licenses tab.
Activate the License for the VM-Series Firewall for VMware NSX
Panorama serves as the central point of administration for the VM-Series firewalls for VMware
NSX and the license activation process is automated when Panorama has direct internet access.
Panorama connects to the Palo Alto Networks update server to retrieve the licenses, and when
a new VM-Series firewall for NSX is deployed, it communicates with Panorama to obtain the
license. If Panorama is not connected to the internet, you need to manually license each instance
of the VM-Series firewall so that the firewall can connect to Panorama.
For this integrated solution, the auth code (for example, PAN-VM-1000-HV-SUB-BND-NSX2)
includes licenses for threat prevention, URL filtering and WildFire subscriptions and premium
support for the requested period.
In order to activate the license, you must have completed the following tasks:
• Registered the auth code to the support account. If you don’t register the auth code, the
licensing server will fail to create a license.
VM-Series Deployment Guide Version 10.1 147 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
• Entered the auth code in the Service Definition on Panorama. On Panorama, select VMware
Service Manager to add the Authorization Code to the VMware Service Definition.
If you have purchased an evaluation auth code, you can license up to 5 VM-Series
firewalls with the VM-1000-HV capacity license for a period of 30 or 60 days. Because
this solution allows you to deploy one VM-Series firewall per ESXi host, the ESXi cluster
can include a maximum of 5 ESXi hosts when using an evaluation license.
The following process of activating the licenses is manual. If you have a custom script or an
orchestration service, you can use the Licensing API to automate the process of retrieving the
licenses for the VM-Series firewalls.
• Activate Licenses on VM-Series Firewalls on NSX When Panorama has Internet Access
• Activate Licenses on VM-Series Firewalls on NSX When Panorama has No Internet Access
• Troubleshoot License Activation Issues
Activate Licenses on VM-Series Firewalls on NSX When Panorama has Internet Access
Complete the following procedure to activate the VM-Series firewall for NSX when Panorama has
access to the internet.
STEP 1 | Verify that the VM-Series firewall is connected to Panorama.
1. Log in to Panorama.
2. Select Panorama > Managed Devices and check that the firewall displays as Connected.
Activate Licenses on VM-Series Firewalls on NSX When Panorama has No Internet Access
Complete the following procedure to activate the VM-Series firewall for NSX when Panorama
does not have access to the internet.
STEP 1 | Locate the CPU ID and UUID of the VM-Series firewall.
1. From the vCenter server obtain the IP address of the firewall.
2. Log into the web interface and select Dashboard.
3. Get the CPU ID and the UUID for the firewall from the General Information widget.
VM-Series Deployment Guide Version 10.1 148 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Activate the auth code and generate the license keys.
1. Log in to the Palo Alto Networks Customer Support website with your account
credentials. If you need a new account, see Create a Support Account.
2. Select Assets > VM-Series Auth Codes, click Add VM-Series Auth Codes to enter the
auth code.
3. Select Register VM in the row that corresponds to the auth code that you just
registered, enter the CPU ID and the UUID of the firewall and click Submit. The portal
will generate a serial number for the firewall.
4. Select Assets > Devices and search for the serial number.
5. Click the link the Actions column to download each key locally to your laptop. In addition
to the subscription license key, you must get the capacity license and the support license
keys.
Install the capacity license key file (pa-vm.key) first. When you apply the
capacity license key, the VM-Series firewall will reboot. On reboot, the firewall
will have a serial number that you can use to register the firewall as a managed
device on Panorama.
4. Repeat the process to install each key on the firewall.
5. Select Dashboard and verify that you can see the Serial # in the General Information
widget.
Licensing a PA-VM without sufficient memory causes an error similar to the following:
To fix this problem, provision the additional memory the license requires, and fetch the license
with the command request license fetch.
If you use any other command it will fail with the following error:
VM-Series Deployment Guide Version 10.1 149 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
If you see an error that reads Failed to fetch licenses. Failed to get license info. Please try
again later or a generic communications error message displays.
• Is routing over the internet working? SSH into the firewall and ping an publicly accessible
IP address such as 4.2.2.2. Be sure to use the source option if you are using a dataplane
interface. For example: ping count 3 source 10.0.1.1 host 4.2.2.2.
• Is DNS set up correctly? SSH into the firewall and ping a DNS name such as google.com. For
example:
VM-Series Deployment Guide Version 10.1 150 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Select Assets > VM-Series Auth-Codes > Add VM-Series Auth-Code.
VM-Series Deployment Guide Version 10.1 151 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | In the Add VM-Series Auth-Code field, enter the capacity auth code you received by email,
and click the checkmark on the far right to save your input. The page will display the list of
auth codes registered to your support account.
You can track the number of VM-Series firewalls that have been deployed and the number of
licenses that are still available for use against each auth code. When all the available licenses
are used, the auth code does not display on the VM-Series Auth-Codes page. To view all the
assets that are deployed, select Assets > Devices.
Register the Usage-Based Model of the VM-Series Firewall for Public Clouds (no auth
code)
To register usage-based firewalls on the Palo Alto Networks Customer Support Portal (CSP) you
can use automatic registration or manual registration. The automatic registration of the usage-
based firewalls enables you to seamlessly register the firewall as soon as you launch it and access
the site license entitlements associated with your CSP account. For details, see Install a Device
Certificate on the VM-Series Firewall.
Use the following workflow to manually register your VM-Series firewalls. Before you begin the
manual registration process, log in to the VM-Series firewall and jot down the serial number and
the CPU ID (UUID is optional) from the dashboard.
VM-Series Deployment Guide Version 10.1 152 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 1 | Log in to the Palo Alto Networks Customer Support website, and click Assets > Devices >
Register New Devices.
VM-Series Deployment Guide Version 10.1 153 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Enter the Serial #, the CPU ID, and the UUID of the VM-Series firewall.
For example, from the Dashboard of the VM-Series firewall on your VM you will see the
following information.
If you plan to use the firewall offline, please select the Offline checkbox and enter the
PAN-OS version you plan to use.
STEP 3 | Agree and Submit to accept the EULA and register the firewall.
STEP 4 | Verify that the details on the licenses you purchased are displayed on the CSP Assets page.
VM-Series Deployment Guide Version 10.1 154 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
certificates, you can apply a device certificate to the those firewalls individually using a one-time
password.
One-time passwords and auto-registration PINs must be used before they expire. If you do not,
you must return to the CSP to generate a new one.
vm-series-auto-registration-pin-id=
vm-series-auto-registration-pin-value=
4. Log in to the firewall and verify that you can see the site license on the firewall.
VM-Series Deployment Guide Version 10.1 155 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Generate the one-time password (OTP) and manually retrieve the device certificate on the
firewall.
The firewall requires this device certificate to get the site license entitlements and securely
access the cloud services.
1. Log in to the Customer Support Portal.
Register your VM-Series firewall, if you have not already.
2. Select Assets > Device Certificates > Generate OTP.
5. Verify that the device certificate is fetched and that you can see the site license on the
firewall.
If using Panorama to manage the VM-Series firewall, see Install the device certificate on a
managed firewall.
VM-Series Deployment Guide Version 10.1 156 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
following instructions to save and export the configuration on your existing firewall, deploy a new
firewall, and then restore the configuration on the new firewall.
STEP 1 | Save a backup of the current configuration file and store it to an external server.
1. Select Device > Setup > Operations and Export named configuration snapshot.
2. Select the XML file that contains your running configuration (for example, running-
config.xml) and click OK to export the configuration file.
3. Save the exported file to a location external to the firewall.
STEP 2 | Deploy a new firewall and register or activate the license, as appropriate.
For a new PAYG instance:
1. In the AWS, Azure, or Google Cloud Platform Marketplace, select the software image for
the PAYG licensing bundle you want to deploy.
2. Deploy a new VM-Series firewall in the AWS, Azure, or Google public cloud. See Set Up
the VM-Series Firewall on AWS, Set up the VM-Series Firewall on Azure, or Set Up the
VM-Series Firewall on Google Cloud Platform.
3. Register the Usage-Based Model of the VM-Series Firewall for Public Clouds (no auth
code).
For a new BYOL instance:
1. Contact your sales representative or reseller to purchase a BYOL license, and get a
BYOL auth code that you can use to license your firewall.
2. Register the VM-Series Firewall (with auth code).
3. Deploy a new VM-Series firewall in the AWS or Azure public cloud. See Set Up the VM-
Series Firewall on AWS, Set up the VM-Series Firewall on Azure or Set Up the VM-Series
Firewall on Google Cloud Platform.
4. Activate the License for the VM-Series Firewall (Standalone Version).
STEP 3 | On the newly deployed firewall, restore the configuration that you exported.
1. Access the web interface of the newly deployed firewall.
2. Select Device > Setup > Operations, click Import named configuration snapshot,
Browse to the configuration file on the external host, and click OK.
3. Click Load named configuration snapshot, select the Name of the configuration file you
just imported, and click OK.
4. Click Commit to overwrite the running configuration with the snapshot you just
imported.
5. Verify that the configuration on the new firewall matches the firewall that you are
replacing, before you delete the firewall or deactivate the licenses on the replaced
firewall.
VM-Series Deployment Guide Version 10.1 157 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Do not use this procedure for switching ELA or perpetual licenses between PAYG and
BYOL. See Switch Between the BYOL and the PAYG Licenses for more information.
Complete one of the following procedures to perform one of the following license changes:
• Subscription bundle 1 to subscription bundle 2
• Subscription bundle 1 or 2 to an ELA
• Capacity license to subscription bundle or ELA
Before switching to an ELA license, you must allocate enough tokens to support the number of
currently-deployed VM-Series firewalls. See VM-Series Enterprise License Agreement (Multi-
Model ELA) for more information about the tokens required for each VM-Series model.
VM-Series Deployment Guide Version 10.1 158 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
1. Select Device > Licenses and select the Activate feature using authorization code
link.
2. Enter your VM-Series authorization code.
3. Click OK to confirm the license upgrade.The firewall contacts the Palo Alto Networks
update server and consume the tokens required for your firewall based on the VM-
Series model.
4. Verify the license updated successfully by checking the license expiration date.
5. Repeat this process for each VM-Series firewall in your deployment.
VM-Series Deployment Guide Version 10.1 159 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
1. Select Panorama > Device Deployment > Licenses and click Activate.
2. Enter your VM-Series authorization code.
3. Use the filters to select the managed firewalls to be licensed.
4. Enter your authorization code in the Auth Code column for each firewall.
5. Click Activate to confirm the license upgrade.Panorama contacts the Palo Alto
Networks update server and consume the tokens required for your firewalls based on
the VM-Series model.
6. Verify the license updated successfully by checking the license expiration date.
VM-Series Deployment Guide Version 10.1 160 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Deactivate License(s)
The license deactivation process enables you to self-manage licenses. Whether you want to
remove one or more active licenses or subscriptions attributed to a firewall (hardware-based
or VM-Series firewall) or you want to deactivate the VM-Series firewall and unassign all active
licenses and subscriptions, begin the deactivation process on the firewall or Panorama (not on the
Palo Alto Networks Customer Support web site).
To successfully deactivate a license, you must install a license deactivation API key and enable
verification of the update server identity (enabled by default). PAN-OS uses this deactivation API
key to authenticate with all update a license services. The deactivation API is key is not required
for manual license deactivation, where there is not connectivity between the firewall and license
server.
If the firewall/Panorama has internet access and can communicate with the Palo Alto Networks
Licensing servers, the license removal process completes automatically with a click of a button.
If the firewall/Panorama does not have internet access, you must complete the process manually
in a two-step process. In the first step, from the firewall or Panorama, you generate and export
a license token file that includes information on the deactivated keys. In the second step, while
logged in to the Palo Alto Networks Customer Support website, upload the token file to dissociate
the license keys from the firewall.
• Deactivate a Feature License or Subscription Using the CLI
• Deactivate VM
STEP 2 | View the name of the license key for the feature you want to deactivate.
request license deactivate key features
VM-Series Deployment Guide Version 10.1 161 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | View the name of the license key for the feature you want to deactivate.
request license deactivate key features
The token file uses the format dact_lic.timestamp.tok, where the timestamp is in the
dmmyyyy.hrminsec format.
VM-Series Deployment Guide Version 10.1 162 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 6 | Log into the Palo Alto Networks Customer Support portal.
1. Click the Deactivate License(s) link on the Assets tab.
2. Select Assets > VM-Series Auth-Codes and select Deactivate License(s).
3. Upload the token file to complete the deactivation.
Deactivate VM
When you no longer need a BYOL instance of the VM-Series firewall, you can free up all active
licenses (subscription licenses, model-based capacity licenses, and support entitlements) from the
web interface, the CLI, or the XML API on the firewall or Panorama. The licenses are credited back
to your account and you can use the same authorization codes on a different instance of the VM-
Series firewall.
Deactivating a VM removes all the licenses/entitlements and places the VM-Series firewall in
an unlicensed state; the firewall will not have a serial number and can support only a minimal
number of sessions. Because the configuration on the firewall is left intact, you can re-apply a set
of licenses and restore complete functionality on the firewall, if needed.
Make sure to deactivate licenses before you delete the VM-Series firewall. If you delete
the firewall before deactivating the licenses, you have two options:
Managed by Panorama—Deactivate the license from Panorama.
Not managed by Panorama—Contact Palo Alto Networks Customer Support for
deactivation assistance.
VM-Series Deployment Guide Version 10.1 163 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 4 | Pick one of the following options to start deactivating the VM:
• (Internet access to the Palo Alto Networks Licensing server) Select Continue.
You are prompted to reboot the firewall; on reboot the licenses are deactivated.
• (No internet)—Select Complete Manually.
Click the Export license token link to save the token file to your local computer. Here is a
sample token filename: 20150128_1307_dact_lic.01282015.130737.tok
You are prompted to reboot the firewall; on reboot the licenses are deactivated.
STEP 5 | (Manual Process—no internet) Use the token file to register the changes with the Licensing
server:
1. Log into the Palo Alto Networks Customer Support website.
2. Select Assets > VM-Series Auth-Codes > Deactivate License(s).
3. While logged in to the Palo Alto Networks Customer Support website, upload the token
file to complete the deactivation.
VM-Series Deployment Guide Version 10.1 164 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Deactivate VMs and select the VM-Series firewall that you want to deactivate.
VM-Series Deployment Guide Version 10.1 165 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
the firewall, select Refresh on Panorama > Device Deployment > Licenses. The firewall is
automatically rebooted.
• Complete Manually—If Panorama does not have internet access, Panorama generates a
token file.
Click the Export license token link to save the token file to your local computer. Here is a
sample token filename: 20150128_1307_dact_lic.01282015.130737.tok
The successful completion message is displayed on-screen, and the firewall is automatically
rebooted.
STEP 4 | (Manual process only—no internet) Use the token file to register the changes with the
licensing server.
1. Log into the Palo Alto Networks Customer Support website.
2. Select Assets > VM-Series Auth-Codes > Deactivate License(s).
3. Upload the token file to complete the deactivation.
Instead of deleting the firewalls, if you prefer, you can create a separate device
group and assign the deactivated VM-Series firewalls to this device group.
VM-Series Deployment Guide Version 10.1 166 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
• Renew—You can opt to renew all licenses as is, or to increase or decrease the licensed
quantity. If you decrease the number of licenses you need, you must opt to get a basic bundle
for the firewalls you are not renewing, otherwise you will forfeit the portion that you do not
renew. If you increase the license quantity, the addition is added to your existing auth code.
• Change to Basic Bundle—If you have a VM-Series bundle 1 or a bundle 2 license that includes
subscriptions, you can change to a basic bundle that includes a perpetual capacity license and
support entitlement. When you switch to the basic bundle, you retain the VM-Series firewall
model that you had previously purchased. All firewalls that are currently deployed and are
associated with the existing auth code will continue to function, and the support entitlement
will have a new expiration date. For any unprovisioned firewalls, you’ll receive a new auth code
that you can use to deploy new instances.
• Forfeit—Relinquish the licenses that you no longer need. If you have deployed the firewalls
that you don't want to renew, you need to select the serial number of the instances for which
you want to discontinue renewals. You can continue to use these firewall instances with the
software and content versions that are currently installed, but your subscriptions and support
entitlements are no longer valid. And to forfeit the license of VM-Series firewalls that you have
not provisioned, just select the quantity that you want to forfeit.
STEP 1 | Log in to the Palo Alto Networks Customer Support Portal with your account credentials.
STEP 2 | Select Assets > VM-Series Auth-Codes and find the auth code you want to renew.
The Renew option displays for auth codes that are eligible for renewal.
VM-Series Deployment Guide Version 10.1 167 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | Click the Renew link to select the serial numbers to Renew, Change to Basic Bundle, or
Forfeit.
If you have provisioned the firewall, select the appropriate option in the row that corresponds
to the Serial Number. If you have unprovisioned instances of the firewall, select the quantity
for each renewal option you choose under Unprovisioned VM Renewal Settings.
Licensing API
Use the licensing API to register auth codes, retrieve licenses attached to an auth code, renew
licenses, or deactivate all licenses on a VM-Series firewall. In addition, the licensing API enables
you to license firewalls that do not have direct internet access and cannot reach the Palo Alto
Networks license server. You can manage licenses manually or automate licensing with a custom
script or an orchestration service.
VM-Series Deployment Guide Version 10.1 168 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
You can also use the Panorama Software Firewall License plugin for licensing tasks,
including offline licensing. The plugin requires Panorama 10.0.0 or later with VM-Series
plugin 2.0.4 or later, and your managed VM-Series firewalls must be running PAN-
OS 9.1.0 or later and VM-Series plugin 2.0.4 or later; the VM-Series firewall for Azure
requires VM-Series plugin 2.0.8.
For model-based licenses, he API allows you to view the details of an auth code so that you can
track the number of unused licenses attached to an auth-code or auth-code bundle that enables
you to license more than one instance of the firewall. An auth-code bundle includes the VM-
Series model, subscriptions and support in a single, easy to order format; you can use this bundle
multiple times to license VM-Series firewalls as you deploy them.
To use the API, each support account is assigned a unique key. Each API call is a POST request,
and the request must include the API key to authenticate the request to the licensing server.
When authenticated, the licensing server sends the response in json format (content-type
application/json).
• Manage the Licensing API Key
• Use the Licensing API
• Licensing API Error Codes
• Install a License API Key
VM-Series Deployment Guide Version 10.1 169 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 1 | Retrieve the license API key from the Customer Support Portal.
1. Log in to the Customer Support Portal.
2. Select Assets > Licensing API.
3. Copy the API key.
STEP 2 | Use the CLI to install the API key copied in the previous step. Paste the key into the request:
request license api-key set key <key>
STEP 3 | (optional) To replace a license deactivation API key, use the following CLI command to delete
an installed API key.
request license api-key delete
If you delete the API key you must install another license deactivation key before you can
deactivate licenses.
VM-Series Deployment Guide Version 10.1 170 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
curl -i -H
"apikey:a103e3065360acc5e01666fb9335964fcfe668100666db6f3ff43d4544de0###"
--data-urlencode cpuid=AWS:57060500FFFBE###
--data-urlencode uuid=EC2278FF-F0CB-45E2-343B-E97984BAC###
--data-urlencode authCode=D3521###
--data-urlencode vcpu=4
--data-urlencode memory=8388608
https://api.paloaltonetworks.com/api/license/activate
• If you did not save the license keys or had network connection issues during initial license
activation, you can retrieve the license(s) for a firewall that you have previously activated.
In the API request, provide the cpuid and uuid, or, provide the serialNumber of the
firewall.
Sample request for initial license activation using Curl:
VM-Series Deployment Guide Version 10.1 171 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
[{"lfidField":"13365773","partidField":"PAN-SVC-PREM-
VM-300","featureFi--eld":
"Premium","feature_descField":"24 x 7 phone support; advanced
replacement hardware service","keyField":"m4iZEL1t3n6Oa
+6ll1L7itDZTphYw48N1AMOZXutDgExC5f5pOA52+Qg1jmAxanB
\nKOyat4FJI4k2hWiBYz9cONuKoiaNOtAGhJvAuZmYgqAZejKueWrTzCuLrwxI/iEw
\nkRGR3cYG+j6o84RitR937m2iOk2v9o8RSfLVilgX28nqmcO8LcAnTqbrRWdFtwVk
\nluz47AUMXauuqwpMipouQYjk0ZL7fTHHslhyL7yFjCyxBoYXOt3JiqQ0OCDdBdDI
\n91RkVPylEwTKgSXm3xpzbmC2ciUR5b235gyqdyW8eQXKvaThuR8YyHr1Pdw/lAjs
\npyyIVFa6FufPacfB2RHApQ==\n","auth_codeField":"","errmsgField":null,
"typeField":"SUP","regDateField":"2016-06-03T08:18:41","startDateField":"5/29/20
"vm_capacityField":null,"uuidField":null,"cpuidField":null,"mac_baseField":null,
"mac_countField":null,"drrField":null,"expirationField":"8/29/2016
12:00:00 AM","PropertyChanged":null},
{"lfidField":"13365774","partidField":"PAN-VM-300-TP",
"featureField":"Threat Prevention","feature_descField":"Threat
Prevention","keyField":"NqaXoaFG+9qj0t9Vu7FBMizDArj
+pmFaQEd6I2OqfBfAibXrvuoFKeXX/K2yXtrl\n2qJhNq3kwXBDxn181z3nrUOsQd/
eW68dyp4jb1MfAwEM8mlnCyLhDRM3EE+umS4b\ndZBRH5AQjPoaON7xZ46VMFovOR
+asOUJXTptS/Eu1bLAI7PBp3+nm04dYTF9O50O
\ndey1jmGoiBZ9wBkesvukg3dVZ7gxppDvz14+wekYEJqPfM0NZyxsC5dnoxg9pciF
\ncFelhnTYlma1lXrCqjJcFdniHRwO0RE9CIKWe0g2HGo1uo2eq1XMxL9mE5t025im
\nblMnhL06smrCdtXmb4jjtg==\n","auth_codeField":"",
"errmsgField":null,"typeField":"SUB","regDateField":"2016-06-03T08:18:41",
"startDateField":"5/29/2016","vm_capacityField":null,"uuidField":null,
"cpuidField":null,"mac_baseField":null,"mac_countField":null,"drrField":null,
"expirationField":"8/29/2016 12:00:00 AM","PropertyChanged":null}
...<truncated>
The feature_Field in the response indicates the type of key that follows in the keyField.
Copy each key to a text file and save it with the .key extension. Because the key is in
json format, it does not have newlines. Make sure to convert it to newlines if your parser
requires them. Make sure to name each key appropriately and save it to the /license folder
of the bootstrap package. For example, include the authcode with the type of key to name
it as I3306691_1pa-vm.key (for the capacity license key), I3306691_1threat.key (for the
Threat Prevention license key), I3306691_1wildfire.key (for the WildFire subscription
license key).
Sample API request for retrieving previously activated licenses using Curl:
[{"lfidField":"13365773","partidField":"PAN-SVC-PREM-
VM-300","featureField":
VM-Series Deployment Guide Version 10.1 172 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
Deactivate Licenses
URL: https://api.paloaltonetworks.com/api/license/deactivate
Parameters: encryptedToken
To deactivate the license(s) on a firewall that does not have direct internet access, you must
generate the license token file locally on the firewall and then use this token file in the API
request. For details on generating the license token file, see Deactivate VM, or Deactivate License
(Software NGFW Credits) and Deactivate a Feature License or Subscription Using the CLI.
Header: apikey
Request: https://api.paloaltonetworks.com/api/license/deactivate?encryptedtoken@<token>
Sample API request for license deactivation using Curl:
[{"serialNumField":"007200006150","featureNameField":"","issueDateField":"",
"successField":"Y","errorField":null,"isBundleField":null,"PropertyChanged":null
{"serialNumField":"007200006150","featureNameField":"","issueDateField":"",
"successField":"Y","errorField":null,"isBundleField":null,"PropertyChanged":null
{"serialNumField":"007200006150","featureNameField":"","issueDateField":"",
"successField":"Y","errorField":null,"isBundleField":null,"PropertyChanged":null
VM-Series Deployment Guide Version 10.1 173 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
{"serialNumField":"007200006150","featureNameField":"","issueDateField":"",
"successField":"Y","errorField":null,"isBundleField":null,"PropertyChanged":null
{"serialNumField":"007200006150","featureNameField":"","issueDateField":"",
"successField":"Y","errorField":null,"isBundleField":null,"PropertyChanged":null
{"serialNumField":"007200006150","featureNameField":"","issueDateField":"",
"successField":"Y","errorField":null,"isBundleField":null,
"PropertyChanged":null}]$
HTTP/1.1 200 OK
Date: Thu, 05 May 2016 20:07:16 GMT
Content-Length: 182
{"AuthCode":"I9875031","UsedCount":4,"TotalVMCount":10,"UsedDeviceDetails":
[{"UUID":"420006BD-113D-081B-F500-2E7811BE80C
9","CPUID":"D7060200FFFBAB1F","SerialNumber":"007200006142"}]}.....
VM-Series Deployment Guide Version 10.1 174 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
The precise moment of license expiry is at the beginning of the following day at 12:00 AM
(GMT). For example, if your license is scheduled to end on 1/20 you will have functionality
for the remainder of that day. At the start of the new day on 1/21 at 12:00 AM (GMT),
the license will expire. All license-related functions operate on Greenwich Mean Time
(GMT), regardless of the configured time zone on the firewall.
(Panorama license) If the support license expires, Panorama can still manage firewalls
and collect logs, but software and content updates will be unavailable. The software and
content versions on Panorama must be the same as or later than the versions on the
managed firewalls, or else errors will occur. For details, see Panorama, Log Collector,
Firewall, and WildFire Version Compatibility.
Threat Prevention Alerts appear in the System Log indicating that the license has
expired.
You can still:
• Use signatures that were installed at the time the license
expired, unless you install a new Applications-only content
update either manually or as part of an automatic schedule.
If you do, the update will delete your existing threat
signatures and you will no longer receive protection against
them.
• Use and modify Custom App-ID™ and threat signatures.
You can no longer:
VM-Series Deployment Guide Version 10.1 175 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 176 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 177 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 178 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Select CSSP > Order History, to view the list of auth codes registered to your support
account.
As you deploy firewalls, you must register each instance of the firewall against an auth code.
STEP 2 | Select CSSP > Order History, to view the list of auth codes registered to your support
account.
STEP 3 | Select CSSP > VM Provisioning Auth Codes, select an Authorization Code and click Register
VM.
VM-Series Deployment Guide Version 10.1 179 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 4 | Enter the UUID and CPUID of the VM instance and click Submit. The portal will generate a
serial number for the firewall.
You can track the number of VM-Series firewalls that have been deployed and the
number of licenses that are still available for use against each auth code. To view all
the total number of firewalls registered against a specific auth code, select CSSP > VM
Provisioning Auth Codes, then select an Authorization Code and click Provisioned
Devices.
VM-Series Deployment Guide Version 10.1 180 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 3 | Select the Serial Number and click Add End User Info.
VM-Series Deployment Guide Version 10.1 181 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
After you add account information, you can find all firewalls registered to a customer.
In Search Existing End User, enter the customer ID or customer name and click Search
to find all firewalls provisioned for the customer.
VM-Series Deployment Guide Version 10.1 182 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
STEP 2 | Use the ReportEndUserInfo API to add end-user information for a VM-Series Firewall that is
registered to a CSSP.
URL: https://api.paloaltonetworks.com/api/license/ReportEndUserInfo
Headers:
• Content-Type: application/json
• apiKey: API Key
Parameters:
• SerialNumbers: Required, provide at least one valid firewall serial number
• CustomerReferenceId: Required
• CompanyName: Required, end-user company name
• DnBNumber: Data Universal Numbering System (D-U-N-S) number
• PhoneNumber: End-user phone number
• EndUserContactEmail: Required, end-user email address
• Address: Required, end-user address
• Country: Required, ISO 2-letter country code
• City: Required, end-user city name
• Region/State: Required; for the United States and Canada, you must enter an ISO 2-
letter subdivision code; for all other countries, any alpha string is valid
• PostalCode: Required, end-user postal code
• Industry: End-user industry type, such as networking or consultancy
• WebSite: End-user website URL
• CreatedBy: System or person submitting this information
Sample request to add end-user information for a registered VM-Series firewall using Curl:
VM-Series Deployment Guide Version 10.1 183 ©2023 Palo Alto Networks, Inc.
License the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 184 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi
Server
The VM-Series firewall is distributed in the Open Virtualization Alliance (OVA) format,
which is a standard method of packaging and deploying virtual machines. You can
install this solution on any x86 device that is capable of running VMware ESXi.
In order to deploy a VM-Series firewall you must be familiar with VMware and
vSphere, including vSphere networking, ESXi host setup and configuration, and virtual
machine guest deployment.
If you want to automate the process of deploying a VM-Series firewall, you can create
a gold standard template with the optimal configuration and policies, then use the
vSphere API and the PAN-OS XML API to rapidly deploy new VM-Series firewalls in
your network.
See the following topics for information:
185
Set Up a VM-Series Firewall on an ESXi Server
VM-Series Deployment Guide Version 10.1 186 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
VM-Series Deployment Guide Version 10.1 187 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• To achieve the best performance out of the VM-Series firewall, you can make the following
adjustments to the host before deploying the VM-Series firewall. See Performance Tuning of
the VM-Series for ESXi for more information.
• Enable DPDK. DPDK allows the host to process packets faster by bypassing the Linux
kernel. Instead, interactions with the NIC are performed using drivers and the DPDK
libraries.
• Enable SR-IOV. Single root I/O virtualization (SR-IOV) allows a single PCIe physical device
under a single root port to appear to be multiple separate physical devices to the hypervisor
or guest.
Do not configure a vSwitch on the physical port on which you enable SR-IOV. To
communicate with the host or other virtual machines on the network, the VM-Series firewall
must have exclusive access to the physical port and associated virtual functions (VFs) on
that interface.
• Enable multi-queue support for NICs. Multi-queue allows network performance to scale
with the number of vCPUs and allows for parallel packet processing by creating multiple TX
and RX queues.
VM-Series Deployment Guide Version 10.1 188 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
VM-Series Deployment Guide Version 10.1 189 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
The mapping on the VM-Series Firewall remains the same no matter which vNICs you add on
ESXi. Interfaces you activate on the firewall always take the next available vNIC on ESXi.
In the following diagram, eth3 and eth4 on the VM-Series Firewall are paired to vNICs 2 and 3 on
ESXi, and eth1 and eth2 are unmapped, as shown on the left.
If you want to add two additional interfaces while maintaining the current mapping, activate
vNICs 4 and 5 and reboot down the firewall. The existing vNIC mapping is preserved because you
added the interfaces after the last-mapped inteface.
If you activate eth1 and eth2 on the VM-Series firewall, the interfaces reorder themselves as
shown on the right, resulting in a mapping mismatch that impacts traffic.
To avoid the issues described in the preceding example, you can do the following:
• When provisioning your ESXi host for the first time, activate all nine vNICs beyond the first.
Adding all nine vNICs as placeholders before powering on the VM-Series Firewall allows you to
use any VM-Series interfaces regardless of order.
• If all vNICs are active, adding additional interfaces no longer requires a reboot. Because each
vNIC on ESXi requires that you choose a network, you can create an empty port group as a
network placeholder.
• Do not remove VM-Series firewall vNICs to avoid mapping mismatches.
VM-Series Deployment Guide Version 10.1 190 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
The OVA file contains the base installation. After the base installation is complete, you
must download and install the latest PAN-OS version from the support portal. This
ensures that you have the latest fixes implemented since the base image was created.
For instructions, see Upgrade the PAN-OS Software Version (Standalone Version).
STEP 2 | Before deploying the OVA file, set up virtual standard switch(es) or virtual distributed
switch(es) that you need for the VM-Series firewall.
If you are deploying the VM-Series firewall with Layer 3 interfaces, your firewall uses
Hypervisor Assigned MAC Addresses by default. If you choose to disable hypervisor
assigned MAC address, or if you are deploying the firewall with Layer 2, virtual wire,
or tap interfaces, you must configure (set to Accept) any virtual switch attached to
the VM-Series firewall to allow the following modes: promiscuous mode, MAC address
changes, and Forged transmits.
Configure a virtual standard switch or a virtual distributed switch to receive frames for the
VM-Series firewall.
Virtual Standard Switch
1. Navigate to Home > Hosts and Clusters and select a host.
2. Click the Configure tab and view Virtual Switches. For each VM-Series firewall attached a
virtual switch, click on Properties.
3. Highlight a port group corresponding to a virtual switch and click Edit Settings. In the
vSwitch properties, click the Security tab and set Promiscuous Mode, MAC Address
Changes and Forged Transmits to Accept and then click OK. This change propagates to all
port groups on the virtual switch.
Virtual Distributed Switch
1. Select Home > Networking. Select your virtual distributed switch and highlight the
Distributed Port Group you want to edit.
2. Click Edit Settings, select Policies > Security, and set Promiscuous Mode, MAC Address
Changes and Forged Transmits to Accept and click OK.
VM-Series Deployment Guide Version 10.1 191 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
If you add additional interfaces (vNICs) to the VM-Series firewall, you must reboot
(because new interfaces are detected during the boot cycle). To minimize the need
to reboot the firewall, activate the interfaces at initial deployment or during a
maintenance window.
To view the progress of the installation, monitor the Recent Tasks list.
1. Log in to vCenter using the vSphere client. You can also go directly to the target ESXi
host if needed.
2. From the vSphere web client, go to Hosts and Clusters, right-click your host, and select
Deploy OVF Template.
3. Browse to the OVA file that you downloaded previously. Select the file, and click Next.
Review the template’s details and click Next.
4. Name the VM-Series firewall instance, and in the Inventory Location window, select a
Data Center and Folder, and click Next.
5. Select an ESXi host for the VM-Series firewall, and click Next.
6. Select the datastore to use for the VM-Series firewall, and click Next.
7. Leave the default settings for the datastore provisioning, and click Next. The default is
Thick Provision Lazy Zeroed.
8. Select the networks to use for the two initial vNICs. The first vNIC is used for the
management interface and the second vNIC for the first data port. Make sure that the
Source Networks map to the correct Destination Networks.
9. Review the details, select Power on after deployment, and click Next.
VM-Series Deployment Guide Version 10.1 192 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
10. When the deployment is complete, click the Summary tab to review the current status.
VM-Series Deployment Guide Version 10.1 193 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
STEP 3 | Configure the network access settings for the management interface.
Enter the following commands:
STEP 5 | Verify network access to external services required for firewall management, such as the
Palo Alto Networks Update Server.
1. Use the ping utility to verify network connectivity to the Palo Alto Networks Update
server as shown in the following example. Verify that DNS resolution occurs and the
response includes the IP address for the Update server (the Update server does not
respond to ping requests.) After verifying DNS resolution, press Ctrl+C to stop the ping
request.
2. Use the following CLI command to retrieve information on the support entitlement for
the firewall from the Palo Alto Networks update server: request support check If you
have connectivity, the update server responds with the support status for your firewall.
STEP 6 | Apply the capacity auth code and retrieve a license before you begin testing the VM-Series
firewall.
An unlicensed VM-Series firewall can process up to approximately 1230 concurrent sessions.
Depending on the environment, the session limit can be reached very quickly, causing
unpredictable results.
VM-Series Deployment Guide Version 10.1 194 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• In smaller deployments where you do not use Panorama, you can add a new virtual disk
to increase log storage capacity. The new virtual disk can support 60GB to 2TB of storage
capacity for logs. This task is described below.
When the virtual appliance is configured to use a virtual disk, the VM-Series firewall
no longer stores logs. If the appliance loses connectivity to the virtual disk, logs can
be lost during the failure interval. If necessary, place the newly created virtual disk
on a datastore that provides RAID redundancy. RAID10 provides the best write
performance for applications with high logging characteristics.
STEP 1 | Power off the VM-Series firewall.
STEP 2 | On the ESXi server, add the virtual disk to the firewall.
1. Select the VM-Series firewall on the ESXi server.
2. Click Edit Settings.
3. Click Add to launch the Add Hardware wizard, and select the following options when
prompted:
1. Select Hard Disk for the hardware type.
2. Select Create a new virtual disk.
3. Select SCSI as the virtual disk type.
4. Select the Thick provisioning disk format.
5. In the location field, select Store with the virtual machine option. The datastore does
not have to reside on the ESXi server.
6. Verify that the settings look correct and click Finish to exit the wizard. The new disk is
added to the list of devices for the virtual appliance.
If you reuse a virtual disk that was previously used for storing PAN-OS logs, all logs
from the existing disk are overwritten.
VM-Series Deployment Guide Version 10.1 195 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
View the IP address(es) on the management interface and the software version on the firewall
and Panorama.
In the Hosts and Cluster section on the vCenter server, select the firewall or Panorama and
view the Summary tab for information on the IP address(es) assigned to the management
interface and the software version currently installed.
View resource utilization metrics on hard disk, memory, and CPU. Use these metrics to enable
alarms on the vCenter server.
In the Hosts and Cluster section on the vCenter server, select the firewall or Panorama and
view the Monitor > Utilization tab for information on hard disk, memory, and CPU usage.
VM-Series Deployment Guide Version 10.1 196 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Gracefully shutdown or restart the firewall and Panorama from the vCenter server.
In the Hosts and Cluster section on the vCenter server, select the firewall or Panorama and
select the Actions > Power drop-down.
Create alarm definitions for events you want to be notified about, or events for which you
want to specify an automated action.
Refer to the VMware documentation for details on creating alarm definitions.
In the Hosts and Cluster section on the vCenter server, select the firewall or Panorama
and select the Manage > Alarm Definitions to add a new trigger and specify an action
when a threshold is met. For example, missing heartbeats for a specified duration, or when
memory resource usage exceeds a threshold. The following screenshot shows you how to use
notifications for heartbeat monitoring on the firewall or Panorama.
These commands are not required when using vMotion if you are running vSphere 7.0 or
later.
VM-Series Deployment Guide Version 10.1 197 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
STEP 2 | Set the heartbeat monitoring pause interval using the following command. The pause begins
as soon as the command is executed. If vMotion is taking longer than expected, you can
rerun this command to set a new, longer interval that starts when the command is executed
again.
request system heartbeat-pause set interval <pause-time-in-minutes>
You can view the time remaining in pause interval using the following command.
request system heartbeat-pause show interval
STEP 3 | (Optional) If you complete vMotion before the pause interval has elapsed, you can end the
pause by setting the interval to zero (0).
request system heartbeat-pause set interval 0
Alternatively, you can enable management interface swap as part of the init-cfg.txt File
Components when bootstrapping.
STEP 1 | Log in to the VM-Series firewall CLI and enter the following command:
set system setting mgmt-interface-swap enable yes
STEP 2 | Confirm that you want to swap the interface and use the eth1 dataplane interface as the
management interface.
STEP 3 | Reboot the firewall for the swap to take effect. Use the following command:
request restart system
STEP 4 | Verify that the interfaces have been swapped. Use the following command:
VM-Series Deployment Guide Version 10.1 198 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
VM Monitoring on vCenter
Install and configure the Panorama plugin for VMware vCenter to retrieve the IP addresses for
guests in your vCenter environment and use that information to build policy using Dynamic
Address Groups.
The Panorama plugin for VMware vCenter does not support proxy servers.
The Panorama plugin for VMware vCenter does not support tags associated to vApps or
resource pools.
VM-Series Deployment Guide Version 10.1 199 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• vcenter.<vcenter-name>_<datacenter-name>_<cluster-name>_guestos.<guest-os>—this tag
maps virtual machine IP addresses based on guest operating system.
• vcenter.<vcenter-name>_<datacenter-name>_<cluster-name>_annotation.<annotation>—this
tag maps virtual machine IP addresses based on annotation.
• vcenter.<vcenter-name>_<datacenter-name>_<cluster-name>_vlanId.<vlan-ID>—this tag
maps virtual machine IP addresses based on VLAN ID.
• vcenter.<vcenter-name>_<datacenter-name>_<cluster-name>_host-ip.<host-ip>—this tag
maps virtual machine IP addresses based on host IP address.
• vcenter.<vcenter-name>_<datacenter-name>_<cluster-name>_<tag-category>.<user-
defined-tag>—this tag maps virtual machine IP addresses based on user-defined tags created in
vCenter.
The plugin supports a maximum of 16 user-defined tags per VM. Any user-defined tags
beyond 16 are not processed.
The Panorama plugin for vCenter cannot process tags that are longer than 128 characters; this
includes letters, numbers, and special characters. Whitespace in vCenter object names is replaced
with forward slashes. Additionally, Panorama does not support non-ASCII special characters or
the following special characters—’<>&” in vCenter VM names and annotations. Panorama drops
tags containing unsupported characters.
To retrieve endpoint IP-address-to-tag mapping information, you must configure a Monitoring
Definition for each vCenter in your virtual environment. The Monitoring Definition specifies the
username and password that allows Panorama to connect to vCenter. It also specifies the device
groups and corresponding notify groups containing the firewalls to which Panorama pushes the
tags. After you configure the Monitoring Definition and the Panorama plugin for VMware vCenter
retrieves the tags, you can create DAGs and add the tags as match criteria.
VM-Series Deployment Guide Version 10.1 200 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Select Panorama > Plugins.
STEP 2 | Select Upload and click Browse to locate the plugin file.
STEP 4 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
VM-Series Deployment Guide Version 10.1 201 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
STEP 4 | Add vCenter information. The Panorama plugin for VMware vCenter supports up to 16
vCenter instances.
1. Select Panorama > VMware vCenter > Setup > vCenter.
2. Enter a descriptive Name for your vCenter.
3. Enter the IP address or FQDN for vCenter and port, if applicable.
4. Enter your vCenter username.
5. Enter and confirm your vCenter password.
6. Click Validate to verify that Panorama can connect to vCenter using the login credentials
you entered.
7. Click OK.
1. Select Panorama > VMware vCenter > Monitoring Definition and click Add.
2. Enter a descriptive Name and optionally a description to identify the vCenter for which
you use this definition.
3. Select the vCenter and Notify Group.
4. Click OK.
VM-Series Deployment Guide Version 10.1 202 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
STEP 7 | Verify that you can view the VM information on Panorama, and define the match criteria for
Dynamic Address Groups.
You must use the OR operator when using more than one tag in the match criteria;
using the AND operator does not work.
Some browser extensions may block API calls between Panorama and vCenter which
prevents Panorama from receiving match criteria. If Panorama displays no match
criteria and you are using browser extensions, disable the extensions and Synchronize
Dynamic Objects to populate the tags available to Panorama.
STEP 10 | You can update the dynamic objects from vCenter at any time by synchronizing dynamic
objects. Synchronizing dynamic objects enables you to maintain context on changes in the
virtual environment and allows you to enable applications by automatically updating the
Dynamic Address Groups used in policy rules.
1. Select Panorama > VMware vCenter > Monitoring Definition.
2. Click Synchronize Dynamic Objects.
STEP 11 | If a firewall in your vCenter deployment restarts or disconnects from Panorama, that firewall
goes out of sync with the Panorama plugin for vCenter and no receive updates. After the
firewall reconnects with Panorama, you must manually synchronize Panorama and the
firewall.
1. Log in to the Panorama CLI.
2. Execute the following command.
admin@Panorama> request plugins vmware_vcenter sync
VM-Series Deployment Guide Version 10.1 203 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Basic Troubleshooting
Recommendation for Network Troubleshooting Tools
It is useful to have a separate troubleshooting station to capture traffic or inject test
packets in the virtualized environment. It can be helpful to build a fresh OS from scratch
with common troubleshooting tools installed such as tcpdump, nmap, hping, traceroute,
iperf, tcpedit, netcat, etc. This machine can then be powered down and converted to a
template. Each time the tools are needed, the troubleshooting client (virtual machine) can
be quickly deployed to the virtual switch(es) in question and used to isolate networking
problems. When the testing is complete, the instance can simply be discarded and the
template used again the next time it is required.
For performance related issues on the firewall, first check the Dashboard from the firewall web
interface. To view alerts or create a tech support or stats dump files navigate to Device > Support.
For information in the vSphere client go to Home > Inventory > VMs and Templates, select the
VM-Series firewall instance and click the Summary tab. Under Resources, check the statistics for
consumed memory, CPU and storage. For resource history, click the Performance tab and monitor
resource consumption over time.
Installation Issues
• Issues with Deploying the OVA
• Why does the firewall boot into maintenance mode?
• How do I modify the base image file for the VM-1000-HV license?
VM-Series Deployment Guide Version 10.1 204 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• The virtual disk in the OVA image is nearly 1GB. It must be present on the computer running
the vSphere client, or it must be accessible as a URL for the OVA image.
• Make sure the network connection between the vSphere client computer and the target
ESXi host has low latency and sufficient bandwidth. If the connection is poor, the OVA
deployment can take hours, or timeout and fail.
You can minimize this problem if you host the image on a device in the same network as the
ESXi host.
• Any firewalls in the path must allow TCP ports 902 and 443 from the vSphere client to the
ESXi host(s).
• ESX 6.5.0a build 4887370 limits you to 2 CPU cores per socket. If you are deploying a
VM-300, VM-500 or VM-700 to which you want to allocate more than 2 vCPUs per socket,
refer to the VMware KB: https://kb.vmware.com/s/article/53354, for a workaround.
How do I modify the base image file for the VM-1000-HV license?
If you have purchased the VM-1000-HV license and are deploying the VM-Series firewall in
standalone mode on a VMware ESXi server, use these instructions to modify the following
attributes that are defined in the base image file (.ova or .xva) of the VM-Series firewall.
Important: Modifying values other than those listed here invalidates the base image file.
STEP 1 | Open the base image file, for example 7.0.0, with a text editing tool such as notepad.
STEP 2 | Search for 4096 and change the memory allocated to 5012 (that is 5 GB) as follows:
<Item>
<rasd:AllocationUnits>byte * 2^20</rasd:AllocationUnits>
<rasd:Description>Memory Size</rasd:Description>
<rasd:ElementName>4096MB of memory</rasd:ElementName>
<rasd:InstanceID>2</rasd:InstanceID>
<rasd:ResourceType>4</rasd:ResourceType>
<rasd:VirtualQuantity>4096</rasd:VirtualQuantity>
<Item>
<rasd:AllocationUnits>byte * 2^20</rasd:AllocationUnits>
<rasd:Description>Memory Size</rasd:Description>
<rasd:ElementName>5120MB of memory</rasd:ElementName>
<rasd:InstanceID>2</rasd:InstanceID>
<rasd:ResourceType>5</rasd:ResourceType>
<rasd:VirtualQuantity>5120</rasd:VirtualQuantity>
VM-Series Deployment Guide Version 10.1 205 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
STEP 3 | Change the number of virtual CPU cores allotted from 2 to 4 or 8 as desired for your
deployment:
<Item>
<rasd:AllocationUnits>hertz * 10^6</rasd:AllocationUnits>
<rasd:Description>Number of Virtual CPUs</
rasd:Description>
<rasd:ElementName>2 virtual CPU(s)</rasd:ElementName>
<rasd:InstanceID>1</rasd:InstanceID>
<rasd:ResourceType>3</rasd:ResourceType>
<rasd:VirtualQuantity>2</rasd:VirtualQuantity>
<vmw:CoresPerSocket ova:required="false">2</
vmw:CoresPerSocket>
</Item>
<Item>
<rasd:AllocationUnits>hertz * 10^6</rasd:AllocationUnits>
<rasd:Description>Number of Virtual CPUs</
rasd:Description>
<rasd:ElementName>4 virtual CPU(s)</rasd:ElementName>
<rasd:InstanceID>1</rasd:InstanceID>
<rasd:ResourceType>3</rasd:ResourceType>
<rasd:VirtualQuantity>4</rasd:VirtualQuantity>
<vmw:CoresPerSocket ova:required="false">2</
vmw:CoresPerSocket>
</Item>
Alternatively, you can deploy the firewall, and before you power on the VM-Series firewall,
edit the memory and virtual CPU allocation directly on the ESXi host or the vCenter server.
Licensing Issues
• Why am I unable to apply the support or feature license?
• Why does my cloned VM-Series firewall not have a valid license?
• Does moving the VM-Series firewall cause license invalidation?
VM-Series Deployment Guide Version 10.1 206 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Connectivity Issues
• Why is the VM-Series firewall not receiving any network traffic?
VM-Series Deployment Guide Version 10.1 207 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• Verify that either promiscuous mode is enabled for each port group or for the entire switch or
that you have configured the firewall to Hypervisor Assigned MAC Addresses.
Since the dataplane PAN-OS MAC addresses are different than the vNIC MAC addresses
assigned by vSphere, the port group (or the entire vSwitch) must be in promiscuous mode if
not enabled to use the hypervisor assigned MAC address:
• Check the VLAN settings on vSphere.
The use of the VLAN setting for the vSphere port group serves two purposes: It determines
which port groups share a layer 2 domain, and it determines whether the uplink ports are
tagged (802.1Q).
• Check the physical switch port settings
If a VLAN ID is specified on a port group with uplink ports, then vSphere uses 802.1Q to tag
outbound frames. The tag must match the configuration on the physical switch or the traffic
does not pass.
Check the port statistics if using virtual distributed switches (vDS); Standard switches do not
provide any port statistics
VM-Series Deployment Guide Version 10.1 208 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
$ ethtool -I vNIC4
driver: ixgbe
version: 3.21.6iov
firmware-version: 0x80000389
bus-info: 0000:04:00.0
VM-Series Deployment Guide Version 10.1 209 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Driver: ixgbe
Firmware Version: 0x80000389
Version: 3.21.6iov
Link Detected: false
Link Status: Down
Name: vNIC4
PHYAddress: 0
Pause Autonegotiate: true
Pause RX: true
Pause TX: true
Supported Ports: FIBRE
Supports Auto Negotiation: true
Supports Pause: true
Supports Wakeon: false
Transceiver: external
Wakeon: None
You must specify the absolute path to the .zip or .vib file. For example:
VM-Series Deployment Guide Version 10.1 210 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
If you disable DPDK, the NIC uses PacketMMap instead of DPDK. You can disable DPDK using
the command set system setting dpdk-pkt-io off.
See the Compatibility Matrix for ESXi hypervisor support and PacketMMAP and DPDK driver
support by PAN-OS version.
VM-Series Deployment Guide Version 10.1 211 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
STEP 1 | On the host system, set up the physical and virtual function to operate in VLAN access
mode.
1. Click Networking in the VMware Host Client inventory and click Port groups.
2. In the list that you want to edit, right-click the port group and select Edit settings.Enter a
new port group Name.Enter a new value for the VLAN ID.
VM-Series Deployment Guide Version 10.1 212 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
ethernetX.pnicFeatures = “4”
$ vmkload_mod -u ixgbe
$ vmkload_mod ixgbe RSS=”4,4,4,4,4,4”
STEP 3 | For the best performance, allocate additional CPU threads per ethernet/vSwitch device. This
is limited by the amount of spare CPU resources available on the ESXi host.
1. Open the .vmx file.
2. Add the following parameter:
ethernetX.ctxPerDev = “1”
This guidance might not apply to VM-Series deployments on top of white-box or grey-box
environments targeting SD-WAN, MSSP, or CSSP use-cases.
VM-Series Deployment Guide Version 10.1 213 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
• BIOS Settings
• Physical Settings
• Virtual NIC Settings
• NUMA and Resource Considerations
BIOS Settings
This section recommends BIOS Power Management, Hyperthreading, and Intel VT-D settings that
can enhance VM-Series firewall performance, and concludes with a sample BIOS configuration.
• Power Management
• Hyperthreading
• Intel Virtualization Technology for Directed I/O
• Sample BIOS Configuration
Power Management
For latency-sensitive applications, any form of power management adds latency to the path where
an idle system (in one of several power-saving modes) responds to an external event. VMware
recommends setting the BIOS power management setting to “static high performance” (no OS-
controlled power management), effectively disabling any form of active power management.
Servers with Intel Nehalem class and later CPUs (Intel Xeon 55xx and later) offer two other power
management options: C-states and Intel Turbo Boost.
Leaving C-states enabled can increase memory latency and is therefore not recommended for
low-latency workloads. Even the enhanced C-state, known as C1E, introduces longer latencies to
wake up the CPUs from halt (idle) states to full-power. VMware recommends disabling C1E in the
BIOS to further lower latencies.
• For HP, set Power Regulator Mode to Static High Mode and disable QPI Processor, C-state
support, and C1E Support.
• For Dell, set Power Management Mode, CPU power, and Performance Management to
Maximum Performance.
Another parameter to consider is P-states. For outright performance considerations, disable P-
state settings on BIOS.
Intel Turbo Boost can lead to performance variations over a period of time. For consistent and
deterministic performance, disable Turbo Boost.
Hyperthreading
If the hardware and BIOS support hyperthreading, ESXi automatically enables hyperthreading on
hosts. For the best performance from VM series firewalls, disable hyperthreading on ESXi hosts.
If the deployment environment warrants enabling hyperthreading, then ensure that all CPU
resources for the VM-Series firewall are reserved from the same NUMA/Socket node that has
access to the PCI devices.
VM-Series Deployment Guide Version 10.1 214 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
In general, configure the PA-VM as a single NUMA VM. See NUMA and Resource Considerations
for more details.
VM-Series Deployment Guide Version 10.1 215 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
VM-Series Deployment Guide Version 10.1 216 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Physical Settings
Most 1GbE or 10GbE network interface cards (NICs) support a feature called interrupt
moderation or interrupt throttling, which coalesces interrupts from the NIC to the host so that
the host doesn’t get overwhelmed and spend all its CPU cycles processing interrupts. However,
for latency-sensitive workloads, the time the NIC is delaying the delivery of an interrupt for a
received packet or a packet that has successfully been sent on the wire is the time that increases
the latency of the workload. For best performance on PA-VM, disable interrupt moderation. For
example, disable physical NIC interrupt moderation on the ESXi host as follows:
• Transmit Queue
• Queue Pairing
Transmit Queue
The ESXi uplink pNIC layer also maintains a software Tx queue of packets queued for
transmission, which by default holds 500 packets. If the workload is I/O intensive with large
bursts of transmit packets, this queue can overflow, leading to packets being dropped in the
uplink layer. The Tx queue size can be increased up to 10,000 packets with the following ESXi
command:
VM-Series Deployment Guide Version 10.1 217 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Depending on the physical NIC and the specific version of the ESXi driver being used on the ESXi
host, sometimes packets can be dropped in the pNIC driver because the transmit ring on the pNIC
is too small and is filled up. Most pNIC drivers allow you to increase the size of the transmit ring
using the following command:
This command increases the Tx ring size to 4096 entries. The maximum size you can set for a
specific pNIC driver, as well as the current Tx ring size in effect, can be determined using the
following command:
# ethtool -g vmnic0
Pre-set maximums:
RX: 4096
RX Mini: 0
RX Jumbo: 0
TX: 4096
Current hardware settings:
RX: 512
RX Mini: 0
RX Jumbo: 0
TX: 4096
Queue Pairing
Some pNIC drivers, such as Intel’s ixgbe and Broadcom’s bnx2x, also support “queue pairing”,
which indicates to the ESXi uplink layer that the receive thread (NetPoll) will also process
completion of transmitted packets on a paired transmit queue. For certain transmit-heavy
workloads, this can cause delays in processing transmit completions, causing the transmit ring for
the vNIC to run out of room for transmitting additional packets, and forcing the vNIC driver in the
guest OS to drop packets.
Disabling queue pairing for all pNICs on an ESXi host creates a separate thread for processing
pNIC transmit completions. As a result, completions are processed in a timely manner, freeing
space in the vNIC’s transmit ring to transmit additional packets.
The ESXi command to disable queue pairing is:
For this to take effect, you must reboot the ESXi host.
VM-Series Deployment Guide Version 10.1 218 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
SR-IOV
• Changing module parameters for an SR-IOV driver requires an ESXi host reboot.
• Disable physical NIC interrupt moderation on ESXi host as follows:
• If you enable multiqueue support, you must also enable Receive-Side Scaling (RSS) for the
driver.
• To enable RSS, set the port value to 4.
• Specify ports in a comma-separated string.
Example—Set 3 NICs with 2 ports each.
VM-Series Deployment Guide Version 10.1 219 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
> Configuration Parameters and add an entry for ethernetX.coalescingScheme with the
value disabled.
To disable virtual interrupt coalescing for all virtual NICs on the host (which affects all VMs,
not just the latency-sensitive ones), set the advanced networking performance option. Go to
Configuration > Advanced Settings > Net and set CoalesceDefaultOn to 0 (disabled).
ethernetX.pnicFeatures = “4”
ethernetX.pnicFeatures = "4"
ethernetX.ctxPerDev = "1"
Setting ethernetX.ctxPerDev = “1”, is like a binary flag (set to 1 to enable). This binary
flag adds a CPU thread to process traffic only from the port ethernetX. This leads to improved
traffic scheduling performance.
NUMA and Resource Considerations
NUMA is Non-Uniform Memory Access. Multi-Core processors have complicated designs. To
tackle performance issues in such systems, you need to be aware of all NUMA and CPU Pinning
nuances. Vital aspects to look for:
• Which cores are our threads are running on? (if hyperthreading is enabled, check
Hyperthreading)
• Which cores are our vCPUs are running on? (affinity)
• In which NUMA socket is the physical NIC card installed?
• Where has memory been allocated? (NUMA effects)
Threads running on any socket see one unified memory space – therefore they can read/write
to memory that is local to other Sockets.
• Is memory shared between different sockets on a node?
• It takes more time to access memory on different sockets than it takes to access local memory.
NUMA effects occur when threads excessively access memory on a different NUMA domain.
To avoid cross-NUMA issues, avoid Quick Path Interconnect (QPi) between Socket 0
communication and Socket 1.
For latency-sensitive VMs like PA-VM, VMware recommends that you do not over-commit vCPUs
as compared to the number of physical CPUs (processors) on the ESXi host. For example, if the
host has 8 CPU cores, limit the number of vCPUs for your VM to 7. This ensures that the ESXi
VMkernel scheduler has a better chance of placing the vCPUs on pCPUs that won’t contend with
other scheduling contexts, such as vCPUs from other VMs or ESXi helper worlds. It is a good
VM-Series Deployment Guide Version 10.1 220 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
practice to ensure that the number of vCPUs you allocate to the VM does not exceed the number
of active CPU-consuming processes or threads in the VM.
For best performance, all vCPUs should be scheduled on the same NUMA node and all VM
memory should fit and be allocated out of the local physical memory attached to that NUMA
node. This can be changed using the VM setting numa.nodeAffinity=0, 1, … where 0, 1,
and so forth, are the socket numbers.
To ensure that the VM gets exclusive access to the CPU resources, set Latency Sensitivity to
High. For the new setting to take effect, the VM CPU reservation must be set to maximum,
Memory should be reserved, and the CPU limit must be set to unlimited.
• In newer versions, use the vSphere Web Client to set the VM Latency Sensitivity option to
High (the default is Normal).
• In older versions, set sched.cpu.latencySensitivity to High.
VM-Series Deployment Guide Version 10.1 221 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Additionally, VM’s vCPUs can be pinned to host CPU cores using the VM setting Host Affinity so
that it is never scheduled to different cores. Keep NUMA and hyperthreading in mind when you
use Host Affinity. Avoid setting Host Affinity if the system is over committed. For more detail see
Potential Issues with CPU Affinity.
After you implement the tuning parameters, use esxtop or CPU charts to check CPU Ready
(%RDY) and Co Stop (%CSTP) for the VM. Both values should be close to 0% to ensure exclusive
access to CPU resources. You can also use esxtop to check for NUMA usage and ensure memory
resources for the VM are not spread across NUMA nodes. For more detail, see Interpreting
esxtop Statistics.
VM-Series Deployment Guide Version 10.1 222 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
Use Cases
Use Case 1: vSwitch Deployment
The figure below shows a deployment of a PA-VM on an ESXi host where the data ports “Port
1” and “Port 2” are linked to eth1 and eth2 of the PA-VM. Each port hosts two queue pairs (for
example, Tx0/Rx0, and Tx1/Rx1) or has multiqueue enabled.
Enabling multiqueue and RSS for load balancing packets sent/received to/from multiple queues
enhances processing performance. Based on an internal logic of vCPU to port/queue mapping (in
this case) packets arriving and being sent out from P1/Q0 and P2/Q0 are processed by dataplane
task T1 running on (i.e., pinned to) vCPU1. The data plane task T2 follows a similar association, as
shown in the vSwitch deployment diagram above.
The two data plane tasks are running on vCPU1 and vCPU2 and these are non-sibling CPUs
(means that they do not share the same core in case of hyperthreading). This means that even
with hyperthreading enabled the task assignment can be pinned to different cores for high
performance. Also these dataplane task vCPUs all belong to the same NUMA node (or socket) to
avoid NUMA-related performance issues.
Two other performance bottlenecks can be addressed with increasing the queue sizes and
dedicating a vCPU or thread to the ports that schedule traffic to and from these ports. Increasing
the queue sizes (Qsize) will accommodate large sudden bursts of traffic and prevent packet drops
under bursty traffic. Adding a dedicated CPU thread (ethernetX.ctxPerDev = 1) to port level
packet processing will allow traffic to be processed at a higher rate, thereby increasing the traffic
throughput to reach line rate.
The PA-VM packet processing technique also determines performance. This can be set to either
DPDK or PacketMMAP. DPDK uses a poll mode driver (depends on the driver type) to constantly
poll for packets received in the queues. This leads to higher throughput performance. Depending
VM-Series Deployment Guide Version 10.1 223 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
on the poll period is latency observed by the packets. If the polling is continuous (i.e., busy-poll
a setting from the PANOS cli) then the vCPU utilization for the data plane tasks will be a 100%
but will yield the best performance. Internally the software uses a millisecond-level polling time to
prevent unnecessary utilization of CPU resources.
PacketMMAP, on the other hand, has a lower performance than DPDK but it works with any
network level drivers. For DPDK the vSwitch driver must have support for DPDK. PacketMMAP
works with interrupts that are raised when a packet is received by the port and placed in the
receive queue. This means that for every packet, or group of packets, interrupts are raised and
packets are drained off the receive queue for processing. This results in lower latency in packet
processing, but reduced throughput, because interrupts must be processed every time, causing
higher CPU overhead. In general PacketMMAP will have lower packet processing latency than
DPDK (without busy poll modification).
Use Case 2: SR-IOV Deployment
The SR-IOV diagram below shows a PAVM deployment similar to the vSwitch use case, but in SR-
IOV mode.
In SR-IOV the compatible physical NIC port (manifests as a Physical Function) is essentially carved
out into multiple interfaces (manifests as Virtual Functions). The figure above shows that NIC1
Port1 has a VF named VFX that is associated as one of the PAVM dataplane interfaces — eth1,
for example. A similar association is created for Port2 VF to PAVM eth2.The chain of packet
processing is similar to that of the deployment in the vSwitch environment. The only difference
is that the SR-IOV VF drivers should be compatible with those used in PAN-OS. Also, since there
is no internal vSwitch (in the host) switching traffic, there is no need to set a dedicated thread
for traffic scheduling from a port (that is, ethernetX.ctxPerDev = 1 is not required in this
VM-Series Deployment Guide Version 10.1 224 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
setting). Interfaces with SR-IOV and DPDK will yield even higher packet processing performance
than the vSwitch use case.
References
• Tuning VMware vCloud NFV for Data-Intensive Workloads
• Best Practices for Performance Tuning of Telco and NFV Workloads in vSphere
• Potential Issues with CPU Affinity
• Interpreting esxtop Statistics
VM-Series Deployment Guide Version 10.1 225 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on an ESXi Server
VM-Series Deployment Guide Version 10.1 226 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
vCloud Air
The VM-Series firewall can be deployed in a virtual data center (vDC) on vCloud Air
using the vCloud Air portal, from the vCloud Director portal or using the vCloud Air
API.
227
Set Up the VM-Series Firewall on vCloud Air
VM-Series Deployment Guide Version 10.1 228 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
VM-Series Deployment Guide Version 10.1 229 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
STEP 2 | Extract the Open Virtualization Format (OVF) file from the OVA image and import the OVF
file in to your vCloud Air catalog.
When extracting files from the OVA image, make sure to place all the files—.mf, .ovf,
and .vmdk—within the same directory.
For instructions to extract the OVF file from the OVA image, refer to the VMware
documentation: https://www.vmware.com/support/developer/ovf/#sthash.WUp55ZyE.dpuf
When you import the OVF file, the software image for the VM-Series firewall is listed in My
Organization’s Catalogs.
VM-Series Deployment Guide Version 10.1 230 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
VM-Series Deployment Guide Version 10.1 231 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
STEP 4 | Create a vDC and a vApp that includes the VM-Series firewall.
1. Log in to vCloud Air.
2. Select VPC OnDemand and select the location in which you want to deploy the VM-
Series firewall.
3. Select Virtual Data Centers and click + to add a new Virtual Data Center.
4. Select the vDC, right click and select Manage Catalogs in vCloud Director. You will be
redirected to the vCloud Director web interface.
5. Create a new vApp that contains one or more virtual machines including the VM-Series
firewall:
1. Select My Cloud > vApps, and click Build New vApp.
2. Select Name and Location, and the Virtual Datacenter in which this vApp will
run. By default, Leases for runtime and storage never expire and the vApp is not
automatically stopped.
3. Add Virtual Machines. To add the VM-Series firewall image from the Look in: drop-
down, select My Organization’s Catalog, select the image and click Add. Click Next
4. Configure Resources to specify the Storage Policies for the virtual machines when
deployed. The VM-Series firewall uses the Standard option.
5. Configure the Virtual Machines. Name each virtual machine and select the network
to which you want it to connect. You must connect NIC 0 (for management access) to
the default routed network; NIC 1 is used for data traffic. You can add additional NICs
later.
6. Verify the settings and click Finish.
7. Continue to step 6.
VM-Series Deployment Guide Version 10.1 232 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
VM-Series Deployment Guide Version 10.1 233 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
STEP 6 | Connect the data interface(s) of the VM-Series firewall to an isolated or a routed network, as
required for your deployment.
1. In vCloud Director, select My Cloud > vApps and select the vApp you just created or
edited.
2. Select Virtual Machines and select the VM-Series firewall. Then, right-click and select
Properties.
3. Select Hardware, scroll to the NICs section and select NIC 1.
4. Attach the dataplane network interface to a vApp network or an organizational VDC
network based on your connectivity needs for data traffic to the VM-Series firewall. To
create a new network:
1. In the Network drop-down, click Add Network.
2. Select the Network Type and give it a name and click OK.
3. Verify that the new network is attached to the interface.
5. To add additional NICs to the firewall, click Add and repeat step 4 above. You can attach
a maximum of seven dataplane interfaces to the VM-Series firewall.
6. Verify that the management interface of the VM-Series firewall is attached to the default
routed subnet on the vDC and at least one dataplane interface is connected to a routed
or isolated network.
1. Select My Cloud > vApps and double-click the Name of the vApp you just edited.
2. Verify network connectivity in the vApp Diagram.
VM-Series Deployment Guide Version 10.1 234 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
STEP 7 | (Optional) Edit the hardware resources allocated for the VM-Series firewall.
Required only if you need to allot additional CPU, memory, or hard disk to the firewall.
1. Select My Cloud > vApps and double-click the Name of the vApp you just deployed.
2. Select Virtual Machine and click on the Name of the VM-Series firewall to access the
Virtual Machine Properties.
VM-Series Deployment Guide Version 10.1 235 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
STEP 10 | Define NAT rules on the vCloud Air Edge Gateway to enable Internet access for the VM-
Series firewall.
1. Select Virtual Data Centers > Gateways, select the gateway and double-click to add
NAT Rules.
2. Create two DNAT rules. One for allowing SSH access and one for HTTPS access to the
management port’s IP address on the VM-Series firewall.
3. Create a SNAT rule for translating the internal source IP address for all traffic initiated
from the management port on the VM-Series firewall to an external IP address.
To send and receive traffic from the dataplane interfaces on the firewall, you
must create additional DNAT and SNAT rules on the vCloud Air Edge Gateway.
STEP 12 | Add the auth code(s) to activate the licenses on the firewall.
Activate the License.
STEP 13 | Configure the VM-Series firewall to use the hypervisor assigned MAC address.
Hypervisor Assigned MAC Addresses
VM-Series Deployment Guide Version 10.1 236 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
VM-Series Deployment Guide Version 10.1 237 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on vCloud Air
VM-Series Deployment Guide Version 10.1 238 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
VMware NSX-T
The VM-Series firewall can be deployed on VMware NSX-T to secure North-South
and East-West traffic.
239
Set Up the VM-Series Firewall on VMware NSX-T
• Tier-0 Insertion—Tier-0 insertion deploys a VM-Series firewall to a tier-0 logical router, which
processes traffic between logical and physical networks. When you deploy the VM-Series
firewall with tier-0 insertion, NSX-T Manager uses the deployment information you configured
on Panorama to attach a firewall to a tier-0 logical router in virtual wire mode.
• Tier-1 Insertion—Tier-1 insertion deploys a VM-Series firewall to a tier-1 logical router, which
provides downlink connections to segments and uplink connection to tier-0 logical routers.
NSX-T Manager attaches VM-Series firewalls deployed with tier-1 insertions to a tier-1 logical
router in virtual wire mode.
After deploying the firewall, you configure traffic redirection rules that send traffic to the VM-
Series firewall when crossing a tier-0 or tier-1 router. Security policy rules that you configure on
Panorama are pushed to managed VM-Series firewalls and then applied to traffic passing through
the firewall.
VM-Series Deployment Guide Version 10.1 240 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VMware Components
NSX-T Manager VMware NSX-T Data Center 2.4.0 and later must
be installed and registered with the vCenter
server. The NSX-T Manager is required to deploy
the VM-Series firewall on the ESXi hosts within a
ESXi cluster.
VM-Series Deployment Guide Version 10.1 241 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 242 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Select Panorama > Plugins. See the Compatibility Matrix before installing or upgrading your
plugin.
STEP 4 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
VM-Series Deployment Guide Version 10.1 243 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 3 | Set up access to the NSX-T Manager. Repeat this procedure for each NSX-T Manager to
which you will connect Panorama.
1. Select Panorama > VMware > NSX-T > Service Managers and click Add.
2. Enter a descriptive Name for your NSX-T Manager.
3. (Optional) Add a Description for NSX-T Manager.
4. Enter the NSX Manager URL—NSX-T Manager cluster virtual IP address or FQDN—at
which to access the NSX-T Manager.
5. Enter the NSX Manager Login credentials—username and password, so that Panorama
can authenticate to the NSX-T Manager.
6. Click OK.
If you change your NSX-T Manager login password, ensure that you update the
password on Panorama immediately. An incorrect password breaks the connection
between Panorama and NSX-T Manager.
VM-Series Deployment Guide Version 10.1 244 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
and Network tabs on Panorama. Each template stack used in your NSX-T configuration must be
associated with a service definition.
Firewalls deployed in NSX-T have two default zones and two interfaces configured in virtual-wire
mode. Ethernet1/1 is part of zone south and ethernet1/2 is part of zone north. To push policy
rules from Panorama to managed firewalls, you must configure zones and interfaces matching
those on the firewall in the corresponding template stack on Panorama.
STEP 1 | Add a device group or a device group hierarchy.
1. Select Panorama > Device Groups, and click Add. You can also create a device group
hierarchy.
2. Enter a unique Name and a Description to identify the device group.
3. Click OK.
4. Click Commit and select Panorama as the Commit Type to save the changes to the
running configuration on Panorama.
VM-Series Deployment Guide Version 10.1 245 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 4 | Configure the virtual wire, interfaces, and zones. Ensure that you select the correct template
from the drop-down shown below. The objects you create must meet the following criteria:
If you change the default virtual wire or zone names, the virtual wire and zones on
Panorama must match the names used on the firewall.
STEP 5 | Click Commit, and select Panorama as the Commit Type to save the changes to the running
configuration on Panorama.
STEP 6 | Update the DNS and NTP server information of your template stack. You must complete this
step if you are using device certificates in your deployment. This is required to ensure the
firewalls deployed in your NSX-T environment have the correct DNS information needed to
reach the device certificate server.
1. Verify that you specified the correct template stack from the Template drop-down.
2. Select Device > Setup > Services and click the Edit icon.
3. On the Services tab, enter the IP address of the Primary DNS Server and Secondary
DNS Server.
4. On the NTP tab, enter the IP address of the NTP Server.
5. Click OK.
6. Commit your changes to Panorama.
VM-Series Deployment Guide Version 10.1 246 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 2 | Assign a device group and a template stack to the service definition.
Make sure to Create Template Stacks and Device Groups on Panorama.
Because the firewalls deployed in this solution will be centrally administered from Panorama,
you must specify the Device Group and the Template Stack that the firewalls belong to. All the
firewalls that are deployed using this service definition belong to the specified template stack
and device group.
1. Select the device group or device group hierarchy in the Device Group drop-down.
2. Select the template stack in the Template drop-down.
You cannot reuse a template stack or a device group assigned to one service
definition in another service definition.
Do not change the Panorama service definition OVF path after a successful NSX
Service Deployment of VM-Series firewalls. Changing the OVF path, after a successful
VM-Series firewall deployment, can result in a NSX Service Deployment failed state.
You may resolve this failure in NSX-T Manager, however this may cause all VM-Series
firewalls to redeploy.
It is recommended that you use an OVF path name that scales and allows you to change the
base image without impacting your deployed firewalls. Instead of a path such as https://
acme.com/software/PA-VM-NST.9.1.0.ovf, use something such as https://acme.com/
software/PanoSvcDef1-Cluster1.ovf. Using a static path reference will eliminate any future
need to change the OVF path. It is recommended to create a path for each Panorama
VM-Series Deployment Guide Version 10.1 247 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
service definition (vSphere cluster) in your deployment and change the PAN-OS base images
references on the web server as needed.
In OVF URL, add the location of the web server that hosts the ovf file. Both http and https are
supported protocols.
Panorama must have network connectivity with the web server to retrieve the OVF
file.
You can use the same ovf version or different versions across service definitions. Using
different ovf versions across service definitions allows you to vary the PAN-OS version on the
VM-Series firewalls in different ESXi clusters.
STEP 4 | Select North South as the Insertion Type for your firewall.
STEP 5 | To automatically retrieve a device certificate when the VM-Series firewall is deployed by
NSX Manager, configure the device certificate.
Enable this option to apply a device certificate to newly deployed VM-Series firewalls. Only
use this option when deploying the firewall using a base image OVF that supports device
certificates. Panorama pushes the device certificate information to NSX Manager as part of the
VM-Series Deployment Guide Version 10.1 248 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
service definition. When a new firewall is deployed in NSX, the device certificate is installed on
the firewall at bootup.
For list of OVFs that support device certificates for the VM-Series firewall on VMware NSX,
see the Palo Alto Networks Compatibility Matrix.
If your OVF does support a device certificate, you must Enable device certificates regardless
of whether or not you are using a device certificate. If your OVF does not support a device
certificate, disable this option.
1. If you have not done so already, log in to the Customer Support Portal and generate a
Registration PIN and PIN ID.
2. Under Device Certificate, click Enable.
3. Copy the PIN ID and enter it into the Device Certificate PIN ID field.
4. Reenter the PIN ID into the Confirm Device Certificate PIN ID field.
5. Copy the PIN Value and enter it into the Device Certificate PIN Value field.
6. Reenter the PIN Value into the Confirm Device Certificate PIN Value field.
VM-Series Deployment Guide Version 10.1 249 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 10 | On the NSX-T Manager, verify that the service definition is available.
Select System > Service Deployments > Catalog. The service definition is listed as a Service
Instance on the NSX-T Manager.
STEP 3 | Select your service definition from the Partner Service drop-down.
STEP 5 | Enter a descriptive Service Deployment Name for your VM-Series firewall.
STEP 6 | Select a tier-0 or tier-1 router under Attachment Points. NSX-T Manager attaches the VM-
Series firewall to the selected router and redirects traffic passing through that router to
VM-Series Deployment Guide Version 10.1 250 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
the VM-Series firewall for inspection. You must select a router with no service insertion
attached.
STEP 7 | Select a Compute Manager. The compute manager is the vCenter server managing your
datacenter.
STEP 8 | Select a Cluster. You can deploy the VM-Series firewall on any cluster that does not include
any Edge Transport Nodes.
STEP 11 | NSX-T Manager prepopulates the Deployment Specification and Deployment Template
based on the Partner Service you selected.
STEP 12 | Set the Failure Policy to Allow or Block. The failure policy defines how NSX-T Manager
handles traffic that is directed to the VM-Series firewall if the firewall becomes unavailable.
STEP 13 | Select the Deployment Mode for your VM-Series firewall—Standalone or High Availability.
If you have an edge node cluster and select High Availability, NSX-T Manager will deploy an
additional VM-Series firewall on the standby edge node in addition to the firewall deployed
on the active edge node.
STEP 16 | Set a secure password for the admin account on your VM-Series firewalls.
Each VM-Series firewall uses a default username and password (admin/admin), which is used
for initial login. Upon logging in for the first time, you are prompted to set a new, more secure
VM-Series Deployment Guide Version 10.1 251 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
password. The new password must be a minimum of eight characters and include a minimum
of one lowercase and one uppercase character, as well as one number or special character.
You can update the password on each firewall individually or all at once through Panorama.
• Panorama—on Panorama, you can change the default password for all firewalls in a
template or delete the admin user and create a new username and password.
1. Log in to Panorama
2. Select Device > Administrators and select the admin user.
3. Delete the user or click the user and enter a new password.
4. If you changed the password, click OK.
5. Select Commit > Push to Devices > Edit Selections > Force Template Values.
6. Click OK.
• Firewall—this procedure must be repeated on each VM-Series firewall.
1. Log in to the VM-Series firewall using the default username and password.
2. Follow the prompts to reset the password.
The reflexive rule does not appear in the NSX-T web interface.
STEP 3 | Select Security > North South Security > Network Introspection (N-S).
STEP 6 | Select a VM-Series firewall service instance from the Redirect To drop-down. NSX-T
Manager will automatically populate the Applied To field based on the service instance you
select.
VM-Series Deployment Guide Version 10.1 252 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
If your NSX-T environment has Edge Nodes in active-standby HA, you must create a
redirect rule for each Edge Node. NSX-T does not automatically apply a redirect rule to
the standby node in the event of a failover.
STEP 9 | Click on the Name field and enter a descriptive name for the rule.
STEP 10 | By default, the source is set to Any. Complete the following steps to specify a different
source.
1. Click on the edit button in the Source column.
2. Select the group or groups to set as the Source or click Add Group to create a new
group.
3. Click Apply.
STEP 11 | By default, the destination is set to Any. Complete the following steps to specify a different
destination.
1. Click on the edit button in the Destination column.
2. Select the group or groups to set as the Destination or click Add Group to create a new
group.
3. Click Apply.
VM-Series Deployment Guide Version 10.1 253 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 12 | By default, Any service is redirected to the firewall. Complete the following steps to specify
certain services and protocols.
1. Click on the edit button in the Services column.
2. Select the group or groups to set as the Service or click Add Service to create a new
service.
3. Click Apply.
STEP 13 | Select Redirect from the Action drop-down to send traffic to your VM-Series firewall.
STEP 14 | Enable the rule. NSX-T Manager publishes the redirection rule you just created and
automatically creates a reflexive rule for return traffic. The reflexive rule does not appear in
the NSX-T Manager web interface.
STEP 15 | If your VM-Series firewalls are deployed in HA, create another rule for the passive HA peer.
If return traffic is not directed to the VM-Series firewall, manually configure a traffic
redirection rule for return traffic.
VM-Series Deployment Guide Version 10.1 254 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
By default, the firewall creates a rule that allows Bidirectional Forwarding Detection
(BFD). Do not create a rule that blocks BFD. If BFD is blocked, NSX-T thinks that the
firewall is unavailable.
The VM-Series firewall on NSX-T does not support dynamic address groups for
North-South traffic.
6. Select the Application to allow. In this example, we create an Application Group that
includes a static group of specific applications that are grouped together.
1. Click Add and select New Application Group.
2. Click Add to select the application to include in the group.
3. Click OK to create the application group.
7. Specify the action— Allow or Deny—for the traffic, and optionally attach the default
security profiles for antivirus, anti-spyware, and vulnerability protection, under Profiles.
8. Click Commit, select Commit to Panorama. Click OK.
STEP 4 | (Optional) Use template to push a base configuration for network and device configuration
such as DNS server, NTP server, Syslog server, and login banner.
Refer to the Panorama Administrator’s Guide for information on using templates.
VM-Series Deployment Guide Version 10.1 255 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
specify the amount of time, in minutes, that heartbeat monitoring is paused. Heartbeat monitoring
can be paused for up to 60 minutes. When the pause interval expires or you deliberately end the
pause interval, heartbeat monitoring resumes.
vMotion of the VM-Series firewall is supported on vSphere 6.5, 6.7, and 7.0 if the ESXi hosts have
homogeneous CPU configuration.
This procedure is not required when using vMotion to move the VM-Series firewall if you
are running vSphere 7.0 or later.
STEP 2 | Set the heartbeat monitoring pause interval using the following command. The pause begins
as soon as the command is executed. If vMotion is taking longer than expected, you can
rerun this command to set a new, longer interval that starts when the command is executed
again.
request system heartbeat-pause set interval <pause-time-in-minutes>
You can view the time remaining in pause interval using the following command.
request system heartbeat-pause show interval
STEP 3 | (Optional) If you complete vMotion before the pause interval has elapsed, you can end the
pause by setting the interval to zero (0).
request system heartbeat-pause set interval 0
STEP 2 | Configure an NSX-T service definition for each NSX-V service definition in your deployment.
Do not create new device groups; instead use your existing NSX-V device groups. Using the
existing device groups allows you to apply the same security policy rules used on NSX-V to
the VM-Series firewalls deployed on NSX-T. If you have policy that reference a particular
zone, add the same template stack from your NSX-V service definition to your NSX-T service
definition. Additionally, if your device group references a particular template, ensure that you
select the template stack that includes the template referenced in the device group.
VM-Series Deployment Guide Version 10.1 256 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 3 | Configure an NSX-T service manager and associate the NSX-T service definitions to the
service manager.
STEP 4 | Prepare your NSX-T environment and deploy the VM-Series firewall. You must create your
security groups, service chains, and traffic redirection policy before launching the VM-Series
firewall.
• Deploy the VM-Series Firewall on NSX-T (North-South)
• Deploy the VM-Series Using the Operations-Centric Workflow
STEP 5 | Add the NSX-T tags to you existing dynamic address groups.
1. Select Panorama > Objects > Address Groups.
2. Click on the name of an existing NSX-V dynamic address group.
3. Click Add Match Criteria to display the tags from NSX-V and NSX-T.
4. Add the NSX-T tag to the dynamic address groups. Be sure to use the OR operator
between the tags.
5. When you have added all the necessary tags, click OK.
6. Commit your changes.
STEP 6 | After your VM workloads have successfully migrated from NSX-V to NSX-T, you remove
the NSX-V tags from your dynamic address groups if you plan to discontinue use of NSX-
V. All NSX-V tags and corresponding IP addresses are unregistered after all NSX-V related
configuration is removed from the Panorama plugin for NSX and VM-Series firewall
configuration is removed from NSX-V manager.
VM-Series Deployment Guide Version 10.1 257 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VMware Components
NSX-T Manager VMware NSX-T Data Center 2.5.0 and later must
be installed and registered with the vCenter
server. The NSX-T Manager is required to deploy
the VM-Series firewall on the ESXi hosts within a
ESXi cluster.
VM-Series Deployment Guide Version 10.1 258 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 259 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 260 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
sends it to the firewall. When the firewall gets its license, it reboots and comes back up with a
serial number.
If Panorama does not have internet access, it cannot retrieve licenses and push them to
the firewall, so you have to manually license each firewall individually. If the VM-Series
firewall does not have internet access, you must manually add the serial numbers
to Panorama to register them as managed devices, so Panorama can push template
stacks, device groups, and other configuration information. For more information, see
Activate the License for the VM-Series Firewall for VMware NSX.
4. Panorama sends security policy to the VM-Series firewall—When the firewall reconnects to
Panorama, it is added to device group and template stack defined in the service definition and
Panorama pushes the appropriate security policy to that firewall. The firewall is now ready to
secure traffic in your NSX-T data center.
5. Create network introspection rules to redirect traffic to the VM-Series firewall—On the NSX-
T Manager, create a service chain and network introspection rules that redirect traffic in your
NSX-T data center.
6. Send real-time updates from NSX-T Manager—The NSX-T Manager sends real-time updates
about changes in the virtual environment to Panorama. These updates include changes in
group membership and IP addresses of virtual machines in groups that send traffic to the VM-
Series firewall.
7. Panorama sends dynamic updates—As Panorama receives updates from NSX-T Manager, it
sends those updates from its managed VM-Series firewalls. Panorama places virtual machines
into dynamic address groups based on criteria that you determine and pushes dynamic address
group membership information to the firewalls. This allows firewalls to apply the correct
security policy to traffic flowing to and from virtual machines in your NSX-T data center.
VM-Series Deployment Guide Version 10.1 261 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
clustered deployment, you can specify a particular host within the cluster or select Any and let
NSX-T choose a host.
After deploying the firewall, you configure traffic redirection rules that send traffic to the VM-
Series firewall. Security policy rules that you configure on Panorama are pushed to managed VM-
Series firewalls and then applied to traffic passing through the firewall.
To deploy your VM-Series firewall on VMware NSX-T, you have two workflow options—
operations-centric and security-centric deployment.
• Operations-centric—in an operations-centric workflow, some portions of the deployment
procedure are performed on Panorama and the remainder are performed on NSX-T manager.
On Panorama, you must first enable communication between Panorama and NSX-T Manager,
configure the service definition, and launch the VM-Series firewall. Then, you must log in to
NSX-T Manager to continue the configuration by creating service chains and steering rules. To
complete your VM-Series deployment, you must return to Panorama to create security policy.
• Security-centric—in a security-centric workflow, you can use Panorama as a single pane
of glass to control and manage security operations. You complete the entire deployment
workflow from Panorama. The Panorama plugin for VMware NSX pushes configuration to
NSX-T Manager that creates service chains and steering rules.
VM-Series Deployment Guide Version 10.1 262 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
It is recommended that you select one deployment workflow for your VM-Series deployment on
NSX-T for ease of use. However, the VM-Series firewall for VMware NSX-T does support the use
of both workflows on the same plugin.
VM-Series Deployment Guide Version 10.1 263 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Select Panorama > Plugins.
STEP 4 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
VM-Series Deployment Guide Version 10.1 264 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 3 | Set up access to the NSX-T Manager. Repeat this procedure for each NSX-T Manager to
which you will connect Panorama.
1. Select Panorama > VMware > NSX-T > Service Managers and click Add.
2. Enter a descriptive Name for your NSX-T Manager.
3. (Optional) Add a Description for NSX-T Manager.
4. Enter the NSX Manager URL—NSX-T Manager cluster virtual IP address or FQDN—at
which to access the NSX-T Manager.
5. Enter the NSX Manager Login credentials—username and password, so that Panorama
can authenticate to the NSX-T Manager.
6. Click OK.
If you change your NSX-T Manager login password, ensure that you update the
password on Panorama immediately. An incorrect password breaks the connection
between Panorama and NSX-T Manager.
VM-Series Deployment Guide Version 10.1 265 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
stack with zones used in your NSX-T configuration on Panorama must be associated with a
service definition; at a minimum, you must create a zone within the template stack so that the
NSX-T Manager can redirect traffic to the VM-Series firewall.
Panorama can support deployments of both NSX-T North-South and NSX-T East-West at the
same time. It is recommend that you configure separate device groups, template stacks, and
service definitions for NSX-T North-South and NSX-T East-West.
STEP 1 | Add a device group or a device group hierarchy.
1. Select Panorama > Device Groups, and click Add. You can also create a device group
hierarchy.
2. Enter a unique Name and a Description to identify the device group.
3. Click OK.
4. Click Commit and select Panorama as the Commit Type to save the changes to the
running configuration on Panorama.
VM-Series Deployment Guide Version 10.1 266 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
7. Click Commit, and select Panorama as the Commit Type to save the changes to the
running configuration on Panorama.
Panorama creates a corresponding service profile on NSX-T Manager for each qualified
zone upon commit.
STEP 5 | Update the DNS and NTP server information of your template stack. You must complete this
step if you are using device certificates in your deployment. This is required to ensure the
firewalls deployed in your NSX-T environment have the correct DNS information needed to
reach the device certificate server.
1. Verify that you specified the correct template stack from the Template drop-down.
2. Select Device > Setup > Services and click the Edit icon.
3. On the Services tab, enter the IP address of the Primary DNS Server and Secondary
DNS Server.
4. On the NTP tab, enter the IP address of the NTP Server.
5. Click OK.
6. Commit your changes to Panorama.
VM-Series Deployment Guide Version 10.1 267 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
update to determine the most current list of members that constitute dynamic address groups
referenced in policy
1. Select Panorama > VMware > Notify Group and click Add.
2. Give your Notify Group a descriptive Name.
3. Select the boxes of all devices groups that should be notified of changes to the virtual
environment. If a device group does not have a check box available, it means that the
device group is automatically included by virtue of the device group hierarchy.
4. Click OK.
STEP 3 | Assign a device group and a template stack to the service definition.
Make sure to Create Template Stacks and Device Groups on Panorama.
Because the firewalls deployed in this solution will be centrally administered from Panorama,
you must specify the Device Group and the Template Stack that the firewalls belong to. All the
firewalls that are deployed using this service definition belong to the specified template stack
and device group.
1. Select the device group or device group hierarchy in the Device Group drop-down.
2. Select the template stack in the Template drop-down.
You cannot reuse a template stack or a device group assigned to one service
definition in another service definition.
Do not change the Panorama service definition OVF path after a successful NSX
Service Deployment of VM-Series firewalls. Changing the OVF path, after a successful
VM-Series firewall deployment, can result in a NSX Service Deployment failed state.
You may resolve this failure in NSX-T Manager, however this may cause all VM-Series
firewalls to redeploy.
It is recommended that you use an OVF path name that scales and allows you to change the
base image without impacting your deployed firewalls. Instead of a path such as https://
acme.com/software/PA-VM-NST.9.1.0.ovf, use something such as https://acme.com/
software/PanoSvcDef1-Cluster1.ovf. Using a static path reference will eliminate any future
VM-Series Deployment Guide Version 10.1 268 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
need to change the OVF path. It is recommended to create a path for each Panorama
service definition (vSphere cluster) in your deployment and change the PAN-OS base images
references on the web server as needed.
In OVF URL, add the location of the web server that hosts the ovf file. Both http and https are
supported protocols.
You can use the same ovf version or different versions across service definitions. Using
different ovf versions across service definitions allows you to vary the PAN-OS version on the
VM-Series firewalls in different ESXi clusters.
STEP 6 | Select East West as the Insertion Type for your firewall.
STEP 7 | (Optional) Enable Health Check. Health check is enabled by default in Panorama plugin for
VMware NSX 3.2.0 and later. In older versions of the plugin, health check is disabled by
default. Also called service health check, this NSX-T feature allows you to simulate high
availability in the case of a service instance failing. When configured with the VM-Series
firewall, if a VM-Series service instance fails, any traffic directed to that firewall is redirect to
another firewall instance in the cluster (for service cluster deployments) or a firewall instance
on another host (for host-based deployments).
You cannot disable or enable Health Check in a service definition after committing
and deploying VM-Series firewalls in NSX-T. Attempting to commit a change in the
Health Check configuration returns commit failure. To change this, you must delete
and recreate your service definition and redeploy your VM-Series firewalls.
STEP 8 | To automatically retrieve a device certificate when the VM-Series firewall is deployed by
NSX Manager, configure the device certificate.
Enable this option to apply a device certificate to newly deployed VM-Series firewalls. Only
use this option when deploying the firewall using a base image OVF that supports device
certificates. Panorama pushes the device certificate information to NSX Manager as part of the
VM-Series Deployment Guide Version 10.1 269 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
service definition. When a new firewall is deployed in NSX, the device certificate is installed on
the firewall at bootup.
For list of OVFs that support device certificates for the VM-Series firewall on VMware NSX,
see the Palo Alto Networks Compatibility Matrix.
If your OVF does support a device certificate, you must Enable device certificates regardless
of whether or not you are using a device certificate. If your OVF does not support a device
certificate, disable this option.
1. If you have not done so already, log in to the Customer Support Portal and generate a
Registration PIN and PIN ID.
2. Under Device Certificate, click Enable.
3. Copy the PIN ID and enter it into the Device Certificate PIN ID field.
4. Reenter the PIN ID into the Confirm Device Certificate PIN ID field.
5. Copy the PIN Value and enter it into the Device Certificate PIN Value field.
6. Reenter the PIN Value into the Confirm Device Certificate PIN Value field.
VM-Series Deployment Guide Version 10.1 270 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
You cannot use a service definition in more than one service manager.
1. Select Panorama > VMware > NSX-T > Service Manager and click the link of the service
manager name.
2. Under Service Definitions, click Add and select your service definition from the drop-
down.
3. Click OK.
VM-Series Deployment Guide Version 10.1 271 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 13 | On the NSX-T Manager, verify that the service definition is available.
Select System > Service Deployments > Catalog. The service definition is listed as a Service
Instance on the NSX-T Manager.
Do not edit any settings under Deployment Attributes. These values are imported from
Panorama and changing them causes the deployment to fail.
STEP 3 | Select your service definition from the Partner Service drop-down.
STEP 8 | If you selected Clustered as the Deployment Type, enter the Clustered Deployment Count
to specify the number of VM-Series firewall instances to deploy on the cluster.
STEP 9 | Select a Host if you are launching the VM-Series in a clustered deployment. Select a
particular host from the Host drop-down or Any to allow NSX-T Manager to choose the
host. This option is grayed out in Per Host deployments.
STEP 10 | Select a Data Store as the repository for the VM-Series firewall. In a clustered deployment,
select a shared data store if you choose Any for the host or select a local data store if you
specified a particular host.
VM-Series Deployment Guide Version 10.1 272 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 12 | Select or configure a Service Segment. To configure a service segment, complete the
following procedure.
1. Click Action in the Service Segments column.
STEP 13 | Select the Cluster where the service will be deployed. You must select a cluster with NSX
Configuration.
STEP 17 | Set a secure password for the admin account on your VM-Series firewalls.
Each VM-Series firewall uses a default username and password (admin/admin), which is used
for initial login. Upon logging in for the first time, you are prompted to set a new, more secure
VM-Series Deployment Guide Version 10.1 273 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
password. The new password must be a minimum of eight characters and include a minimum
of one lowercase and one uppercase character, as well as one number or special character.
You can update the password on each firewall individually or all at once through Panorama.
• Panorama—on Panorama, you can change the default password for all firewalls in a
template or delete the admin user and create a new username and password.
1. Log in to Panorama
2. Select Device > Administrators and select the admin user.
3. Delete the user or click the user and enter a new password.
4. If you changed the password, click OK.
5. Select Commit > Push to Devices > Edit Selections > Force Template Values.
6. Click OK.
• Firewall—this procedure must be repeated on each VM-Series firewall.
1. Log in to the VM-Series firewall using the default username and password.
2. Follow the prompts to reset the password.
STEP 2 | Enter a descriptive Name and Description (optional) for your service chain.
STEP 3 | Select the Service Segment that you applied when you deployed the VM-Series firewall.
STEP 4 | Set the forward path. The service chain is a logical sequence of service profiles, so traffic
moves through the services in the order you specify as the forward path.
1. Select Set Forward Path > Add Profile in Sequence.
2. Select a service profile. The service column is populated automatically based on the
service profile you select.
3. Click Add.
4. (Optional) If you have other partner service profiles in your NSX-T environment, click
Add Profile in Sequence to add them to this service chain.
You can select only one service profile per service definition.
STEP 5 | In the Reverse Path column, check Inverse ForwardPath for return traffic to move through
the service chain in reverse order.
VM-Series Deployment Guide Version 10.1 274 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 6 | (Optional) If other partner service profiles are selected, set a reverse path.
You must select the same VM-Series service profile set in the Forward Path.
STEP 7 | Set the Failure Policy—Allow or Block. This defines the action NSX-T takes if a service
profile fails.
VM-Series Deployment Guide Version 10.1 275 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 276 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 277 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
Some browser extensions may block API calls between Panorama and NSX-T
which prevents Panorama from receiving match criteria. If Panorama displays no
match criteria and you are using browser extensions, disable the extensions and
Synchronize Dynamic Objects to populate the tags available to Panorama.
6. Click Add Match Criteria.
7. Select the And or Or operator and click the plus (+) icon next to the security group name
to add it to the dynamic address group.
The security groups that display in the match criteria dialog are derived from the
groups you defined on the NSX-T Manager. Only the groups that are referenced
in the security policies and from which traffic is redirected to the VM-Series
firewall are available here.
8. Click OK.
9. Repeat these steps to create the appropriate number of dynamic address groups
required for your deployment.
10. Commit your changes.
VM-Series Deployment Guide Version 10.1 278 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 5 | Validate that the members of the dynamic address group are populated on the VM-Series
firewall.
1. From Panorama, switch device context to launch the web interface of a firewall to which
you pushed policies.
2. On the VM-Series firewall, select Policies > Security, and select a rule.
3. Select the drop-down arrow next to the address group link, and select Inspect. You can
also verify that the match criteria is accurate.
4. Click the more link and verify that the list of registered IP addresses is displayed.
Policy will be enforced for all IP addresses that belong to this address group, and are
displayed here.
VM-Series Deployment Guide Version 10.1 279 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 6 | (Optional) Use template to push a base configuration for network and device configuration
such as DNS server, NTP server, Syslog server, and login banner.
Refer to the Panorama Administrator’s Guide for information on using templates.
STEP 8 | Create a DoS Protection profile and attach it to DoS Protection policy rule.
1. Select your Device Group.
2. Select Objects > Security Profiles > DoS Protection to add and configure a new profile.
• A classified profile allows the creation of a threshold that applies to a single source IP.
For example, you can configure a max session rate for an IP address that matched the
policy, and then block that single IP address once the threshold is triggered.
• An aggregate profile allows the creation of a max session rate for all packets matching
the policy. The threshold applies to new session rate for all IP addresses combined.
Once the threshold is triggered it affects all traffic that matches the policy.
3. Create a new DoS Protection policy rule in Policy > DoS Protection, and attach the new
profile to it.
This procedure is not required when using vMotion to move the VM-Series firewall if you
are running vSphere 7.0 or later.
STEP 2 | Set the heartbeat monitoring pause interval using the following command. The pause begins
as soon as the command is executed. If vMotion is taking longer than expected, you can
VM-Series Deployment Guide Version 10.1 280 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
rerun this command to set a new, longer interval that starts when the command is executed
again.
request system heartbeat-pause set interval <pause-time-in-minutes>
You can view the time remaining in pause interval using the following command.
request system heartbeat-pause show interval
STEP 3 | (Optional) If you complete vMotion before the pause interval has elapsed, you can end the
pause by setting the interval to zero (0).
request system heartbeat-pause set interval 0
The security-centric deployment workflow requires Panorama plugin for VMware NSX
4.0.0. Additionally, you must upgrade to plugin 4.0.0 from Panorama plugin for VMware
NSX 3.2.x
If you have a Panorama HA configuration, repeat this installation process on each Panorama peer.
When installing the plugin on Panorama HA peers, install the plugin on the passive peer before
the active peer. After installing the plugin on the passive peer, it will transition to a non-functional
state. Installing the plugin on the active peer returns the passive peer to a functional state.
If you have a standalone Panorama or two Panorama appliances installed in an HA pair with
multiple plugins installed, plugins might not receive updated IP-tag information if one or more of
the plugins is not configured. This occurs because Panorama will not forward IP-tag information
to unconfigured plugins. Additionally, this issue can occur if one or more of the Panorama plugins
is not in the Registered or Success state (positive state differs on each plugin). Ensure that your
plugins are in the positive state before continuing or executing the commands described below.
VM-Series Deployment Guide Version 10.1 281 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 4 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
VM-Series Deployment Guide Version 10.1 282 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
If you change your NSX-T Manager login password, ensure that you update the
password on Panorama immediately. An incorrect password breaks the connection
between Panorama and NSX-T Manager.
VM-Series Deployment Guide Version 10.1 283 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
stack with zones used in your NSX-T configuration on Panorama must be associated with a
service definition that you will create later; at a minimum, you must create a zone within the
template stack so that the NSX-T Manager can redirect traffic to the VM-Series firewall. Later,
you will associate a device group and template to your NSX-T deployment create a service
definition.
Panorama can support deployments of both NSX-T North-South and NSX-T East-West at the
same time. You must configure separate device groups, template stacks, and service definitions
for NSX-T North-South and NSX-T East-West.
STEP 1 | Add a device group or a device group hierarchy.
1. Select Panorama > Device Groups, and click Add. You can also create a device group
hierarchy.
2. Enter a unique Name and a Description to identify the device group.
3. Click OK.
4. Click Commit and select Panorama as the Commit Type to save the changes to the
running configuration on Panorama.
STEP 3 | Create a template stack and add your newly created template.
1. Select Panorama > Templates, and click Add Stack.
2. Enter a unique Name and a Description to identify the template stack.
3. Under Templates, click Add and select the template you created in step 2 from the drop-
down.
4. Click OK.
5. Click Commit, and select Commit to Panorama to save the changes to the running
configuration on Panorama.
VM-Series Deployment Guide Version 10.1 284 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
information. In most uses cases, a single zone is sufficient. However, you must create multiple
zones for multi-tenancy
You can add up to 32 zones in each template.
1. Select Network > Zones.
2. Select the correct template in the Template drop-down.
3. Select Add and enter a zone Name.
4. Set the interface Type to Virtual Wire.
5. Click OK.
6. Verify that the zones are attached to the correct template.
7. Click Commit, and select Panorama as the Commit Type to save the changes to the
running configuration on Panorama.
STEP 5 | Update the DNS and NTP server information of your template stack. You must complete this
step if you are using device certificates in your deployment. This is required to ensure the
firewalls deployed in your NSX-T environment have the correct DNS information needed to
reach the device certificate server.
1. Verify that you specified the correct template stack from the Template drop-down.
2. Select Device > Setup > Services and click the Edit icon.
3. On the Services tab, enter the IP address of the Primary DNS Server and Secondary
DNS Server.
4. On the NTP tab, enter the IP address of the NTP Server.
5. Click OK.
6. Commit your changes to Panorama.
VM-Series Deployment Guide Version 10.1 285 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
update to determine the most current list of members that constitute dynamic address groups
referenced in policy.
1. Select Panorama > VMware > Notify Group and click Add.
2. Give your Notify Group a descriptive Name.
3. Select the boxes of all devices groups that should be notified of changes to the virtual
environment. If a device group does not have a check box available, it means that the
device group is automatically included by virtue of the device group hierarchy.
4. Click OK.
STEP 3 | Assign a device group and a template stack to the service definition.
Make sure to Create Template Stacks and Device Groups on Panorama.
Because the firewalls deployed in this solution will be centrally administered from Panorama,
you must specify the Device Group and the Template Stack that the firewalls belong to. All the
firewalls that are deployed using this service definition belong to the specified template stack
and device group.
1. Select the device group or device group hierarchy in the Device Group drop-down.
2. Select the template stack in the Template drop-down.
You cannot reuse a template stack or a device group assigned to one service
definition in another service definition.
VM-Series Deployment Guide Version 10.1 286 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
Do not change the Panorama service definition OVF path after a successful NSX
Service Deployment of VM-Series firewalls. Changing the OVF path, after a successful
VM-Series firewall deployment, can result in a NSX Service Deployment failed state.
You may resolve this failure in NSX-T Manager, however this may cause all VM-Series
firewalls to redeploy.
In OVF URL, add the location of the web server that hosts the ovf file. Both http and https are
supported protocols.
You can use the same ovf version or different versions across service definitions. Using
different ovf versions across service definitions allows you to vary the PAN-OS version on the
VM-Series firewalls in different ESXi clusters.
STEP 6 | Select East West as the Insertion Type for your firewall.
You cannot disable or enable Health Check in a service definition after committing
and deploying VM-Series firewalls in NSX-T. Attempting to commit a change in the
Health Check configuration returns commit failure. To change this, you must delete
and recreate your service definition and redeploy your VM-Series firewalls.
STEP 8 | To automatically retrieve a device certificate when the VM-Series firewall is deployed by
NSX Manager, configure the device certificate.
Enable this option to apply a device certificate to newly deployed VM-Series firewalls. Only
use this option when deploying the firewall using a base image OVF that supports device
certificates. Panorama pushes the device certificate information to NSX Manager as part of the
VM-Series Deployment Guide Version 10.1 287 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
service definition. When a new firewall is deployed in NSX, the device certificate is installed on
the firewall at bootup.
For list of OVFs that support device certificates for the VM-Series firewall on VMware NSX,
see the Palo Alto Networks Compatibility Matrix.
If your OVF does support a device certificate, you must Enable device certificates regardless
of whether or not you are using a device certificate. If your OVF does not support a device
certificate, disable this option.
1. If you have not done so already, log in to the Customer Support Portal and generate a
Registration PIN and PIN ID.
2. Under Device Certificate, click Enable.
3. Copy the PIN ID and enter it into the Device Certificate PIN ID field.
4. Reenter the PIN ID into the Confirm Device Certificate PIN ID field.
5. Copy the PIN Value and enter it into the Device Certificate PIN Value field.
6. Reenter the PIN Value into the Confirm Device Certificate PIN Value field.
VM-Series Deployment Guide Version 10.1 288 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 289 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
You cannot use a service definition in more than one service manager.
1. Select Panorama > VMware > NSX-T > Service Manager and click the link of the service
manager name.
2. Under Service Definitions, click Add and select your service definition from the drop-
down.
3. Click OK.
VM-Series Deployment Guide Version 10.1 290 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 291 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 13 | On the NSX-T Manager, verify that the service definition is available.
Select System > Service Deployments > Catalog. The service definition is listed as a Service
Instance on the NSX-T Manager.
Do not edit any settings under Deployment Attributes. These values are imported from
Panorama and changing them causes the deployment to fail.
STEP 3 | Select your service definition from the Partner Service drop-down.
STEP 8 | If you selected Clustered as the Deployment Type, enter the Clustered Deployment Count
to specify the number of VM-Series firewall instances to deploy on the cluster.
STEP 9 | Select a Host if you are launching the VM-Series in a clustered deployment. Select a
particular host from the Host drop-down or Any to allow NSX-T Manager to choose the
host. This option is grayed out in Host Based deployments.
STEP 10 | Select a Data Store as the repository for the VM-Series firewall. In a clustered deployment,
select a shared data store if you choose Any for the host or select a local data store if you
specified a particular host.
VM-Series Deployment Guide Version 10.1 292 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 12 | Select or configure a Service Segment. To configure a service segment, complete the
following procedure.
1. Click Action in the Service Segments column.
STEP 13 | Select the Cluster where the service will be deployed. You must select a cluster with NSX
Configuration.
STEP 17 | Set a secure password for the admin account on your VM-Series firewalls.
Each VM-Series firewall uses a default username and password (admin/admin), which is used
for initial login. Upon logging in for the first time, you are prompted to set a new, more secure
VM-Series Deployment Guide Version 10.1 293 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
password. The new password must be a minimum of eight characters and include a minimum
of one lowercase and one uppercase character, as well as one number or special character.
You can update the password on each firewall individually or all at once through Panorama.
• Panorama—on Panorama, you can change the default password for all firewalls in a
template or delete the admin user and create a new username and password.
1. Log in to Panorama
2. Select Device > Administrators and select the admin user.
3. Delete the user or click the user and enter a new password.
4. If you changed the password, click OK.
5. Select Commit > Push to Devices > Edit Selections > Force Template Values.
6. Click OK.
• Firewall—this procedure must be repeated on each VM-Series firewall.
1. Log in to the VM-Series firewall using the default username and password.
2. Follow the prompts to reset the password.
Each dynamic address group you create must have a unique name across each device
group configured on your Panorama.
VM-Series Deployment Guide Version 10.1 294 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 1 | Configure a dynamic address group for each security group required for your deployment.
1. Select Objects > Address Groups.
2. Verify that you are configuring the dynamic address groups in a device group associated
with an NSX-T service definition.
3. Click Add and enter a Name and Description for the address group.
4. Select Type as Dynamic.
5. Define the match criteria.
For the dynamic address group to become a security group in NSX-T Manager,
the match criteria string must be enclosed in single quotes with the prefix
_nsxt_ followed by the exact name of the Address Group. For example,
‘_nsxt_PAN_APP_NSX’.
6. Repeat this process for each security group you require.
VM-Series Deployment Guide Version 10.1 295 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
rules from your security rules, you can create your steering rules as post rules and security rules
as pre rules.
To auto generate a steering rule based on a security rules created on Panorama, the security rule
must meet the following criteria:
• Belongs to a parent or child device group registered with an NSX-T Service Manager.
• Is an intrazone policy and includes only one zone.
• Does not include a static address group, IP range, or netmask configured for the rule.
When deciding where to define your NSX-T steering rules in Panorama—pre or post rulesbase
—consider the number of security policy rules and NSX-T steering rules you will create on
Panorama and the order in which the rules are applied to traffic. Pre-rules are applied to traffic
before post-rules.
• Pre-Rules—you can use the Panorama pre-rulebase to define your NSX-T steering rules and
VM-Series firewall security policy rules. If your define the security rules and steering rules in
the same rulebase, you must consider the order of the security rules relative to the steering
rules. When you have a large rulebase that includes both steering rules and security policy
rules, it might become difficult to manage both types of rules as you scale.
• Post-Rules—separating your security policy rules used for inspection and enforcement from
the security rules used to generate NSX-T steering rules can help you scale in deployment with
a large amount of rules. When you auto generate your steering rules, the plugin generates
a steering rule for every rule in the specified rulebase that meets the necessary criteria.
Therefore, by separating the two types of rules, you can prevent unintentionally generating
extraneous steering rules. Use of the post rulebase for steering rules is recommended;
especially in deployments with large amounts of security policy rules.
The source and destination dynamic address groups you specify in the security rule. When you
auto generate a steering rule, where the rule is applied (NSX-T Distributed Firewall or Security
Group) depends on the source and destination you specified when configuring the security rule.
If you selected any for the source or destination, NSX-T Manager applies the steering rule to the
Distributed Firewall. If you select a dynamic address group for the source and destination, the
steering is applied to the guest VMs in those security groups. If you manually create steering rules,
you can specify the security group(s) where the steering rule is applied.
Ensure that your security policy that is used to define steering rules do not include dynamic
address groups configured as part of an operations-centric deployment workflow. If you do,
the steering rules source and destination will be pushed to NSX-T Manager as source-any and
destination-any. This might impact traffic in your NSX-T environment.
If you disable a security rule that you will use to auto generate a steering rule, the steering
rule will be disabled as well.
VM-Series Deployment Guide Version 10.1 296 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 2 | Click Add and enter a Name and Description for your security policy rule.
STEP 3 | Verify that you are configuring the security rules in a device group associated with an NSX-T
service definition.
STEP 4 | Set the Rule Type to intrazone (Devices with PAN-OS 6.1 or later).
STEP 5 | In the Source tab, set the source zone to the zone from the template stack associated with
the service definition. Then select a dynamic address group (NSX-T security group) you
created previously as the Source Address. Do not add any static address groups, IP ranges, or
netmasks as a Source Address.
STEP 6 | In the Destination tab, Panorama does not allow you to set a destination zone because you
set the rule type to intrazone. Then select a dynamic address group (NSX-T security group)
you created previously as the Destination Address. Do not add any static address groups, IP
ranges, or netmasks as a Destination Address.
STEP 8 | Repeat steps 1 through 7 for each steering rule you require.
VM-Series Deployment Guide Version 10.1 297 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 298 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 299 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 3 | Validate that the members of the dynamic address group are populated on the VM-Series
firewall.
1. From Panorama, switch device context to launch the web interface of a firewall to which
you pushed policies.
2. On the VM-Series firewall, select Policies > Security, and select a rule.
3. Select the drop-down arrow next to the address group link, and select Inspect. You can
also verify that the match criteria is accurate.
4. Click the more link and verify that the list of registered IP addresses is displayed.
Policy will be enforced for all IP addresses that belong to this address group, and are
displayed here.
STEP 4 | (Optional) Use template to push a base configuration for network and device configuration
such as DNS server, NTP server, Syslog server, and login banner.
Refer to the Panorama Administrator’s Guide for information on using templates.
STEP 6 | Create a DoS Protection profile and attach it to DoS Protection policy rule.
1. Select your Device Group.
2. Select Objects > Security Profiles > DoS Protection to add and configure a new profile.
• A classified profile allows the creation of a threshold that applies to a single source IP.
For example, you can configure a max session rate for an IP address that matched the
policy, and then block that single IP address once the threshold is triggered.
• An aggregate profile allows the creation of a max session rate for all packets matching
the policy. The threshold applies to new session rate for all IP addresses combined.
Once the threshold is triggered it affects all traffic that matches the policy.
3. Create a new DoS Protection policy rule in Policy > DoS Protection, and attach the new
profile to it.
VM-Series Deployment Guide Version 10.1 300 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
You create this membership criteria on the plugin and then push it to NSX-T Manager.
However, this does not apply the membership criteria to guest virtual machines in your
deployment. You must define and apply membership data, such as tags, to your guest VMs
in NSX-T Manager.
The rules that the Panorama plugin for NSX-T identifies and classifies virtual machines based
on two membership types—Virtual Machine or IP set. The keys and operators usable with each
member type are listed in the table below.
Membership criteria changes should be made only on Panorama; do not make changes
on NSX-T Manager. If you make changes on NSX-T Manager, the Panorama plugin for
VMware NSX show the service definition as out-of-sync. You should click on the Out-of-
Sync link to see the specific reason for the out-of-sync status. If a membership criteria
change is the cause, perform a configuration sync by clicking NSX-T Config-Sync.
STEP 1 | Select Panorama > VMware > NSX-T > Membership Criteria > Add.
To add or modify membership criteria for a service definition, with at least one dynamic
address group, you can click on the service definition name instead of clicking Add.
STEP 2 | From the Name, select a service definition for the Membership Criteria. The selected
service definition must have East_West insertion type and used as part of a security-centric
deployment.
VM-Series Deployment Guide Version 10.1 301 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 4 | Select a Dynamic Address Group from the drop-down. The drop-down lists the dynamic
address groups associated with the specified service definition.
The plugin UI displays dynamic and static address groups configured on Panorama.
Take care not accidently select a static address group when configuring membership
criteria.
STEP 5 | Click Add to define the criteria associated with the chosen dynamic address group.
VM-Series Deployment Guide Version 10.1 302 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
Manager. For example, if you tag virtual machines based on operating system, you can
create tags for Windows, Linux, and MacOS and then set the scope of each tag to OS.
To view the tags and scope, use the Panorama CLI (with NSX-T Manager 3.0.0 and later).
Execute the following command to view the list of tags.
request plugins vmware_nsx nsx_t nsxt-tags service-definition
<SD_name>
Execute the following command to view the scope associated with the specified tag.
request plugins vmware_nsx nsx_t nsxt-scope tag <tag_value>
service-definition <SD-name>
7. Click OK.
8. (Optional) Click Add to create additional (up to five total) rules.
VM-Series Deployment Guide Version 10.1 303 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 9 | On the Dynamic Address Group window, click OK to finish or Add to create additional
criteria (up to five total) and rules.
STEP 10 | On the Membership Criteria window, click OK to finish or Add to specify additional dynamic
address groups.
VM-Series Deployment Guide Version 10.1 304 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
default, TCP strict is disabled and the Failure Policy is set to Allow. Auto-generated policy uses
the auto_<service-def-name>_<zone-name>_steering_policy naming format.
When TCP Strict is enabled, the firewall enforces the requirement of the three-way handshake.
If the firewall picks up traffic mid-session (for example, due to asymmetric traffic) and does not
detect a three-way handshake, the session is dropped. See VMware NSX-T documentation for
more information.
The Failure Policy defines what happens to traffic if the firewall goes down. If you select Allow,
the traffic continues on to its destination. If you select Block, the traffic is dropped.
Additionally, you have the option to select all your service managers instead of selecting specific
service managers. Choosing All is not recommended if any of your service managers contain
operations-centric service definitions. The plugin will create steering policy for each zone
associated with the operation-centric service definitions and then push it to NSX-T Manager. If
you do choose All, verify that the service manager you select when you auto generating steering
policy includes only security-centric service definitions.
If you auto-generate steering policy, you must also auto-generate steering rules. And you
manually create steering policy, you must also manually create steering rules.
Steering policy changes should be made only on Panorama; do not make changes on NSX-
T Manager. If you make changes on NSX-T Manager, the Panorama plugin for VMware
NSX show the service definition as out-of-sync. You should click on the Out-of-Sync link
to see the specific reason for the out-of-sync status. If a steering policy change is the
cause, perform a configuration sync by clicking NSX-T Config-Sync.
The following steps are for specifying service managers instead of selecting All.
STEP 1 | Select Panorama > VMware > NSX-T > Network Introspection > Policy.
If you select All instead of selecting specific service managers, the plugin will generate
steering policy for each service definition associated with each service manager in your
configuration. Additionally, make sure that your selected service manager includes
security-centric service definitions.
VM-Series Deployment Guide Version 10.1 305 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 7 | Choose the Failure Policy— Allow or Block. Allow is the default.
VM-Series Deployment Guide Version 10.1 306 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
You must generate or create steering policy before generating or creating steering rules.
To auto generate a steering rule based on a security rules created on Panorama, the security rule
must meet the following criteria:
• Belongs to a parent or child device group registered with an NSX-T Service Manager.
• Is an intrazone policy and includes only one zone.
• Does not include a static address group, IP range, or netmask configured for the rule.
Auto-generated steering rules uses the auto_<device-group-name>_<device-group-rule-name>
naming format.
By default, auto-generated steering rules are configured without an NSX services specified.
Additionally, the NSX Traffic Direction is set to in-out, Logging is disabled, IP protocol is ipv4-
ipv6, and the Action is set to redirect. After auto-generating rules, you can update the steering to
change the default values.
Additionally, you have the option to select all your service managers instead of selecting specific
service managers. Choosing All is not recommended.
If you auto-generate steering policy, you must also auto-generate steering rules. And if
you manually create steering policy, you must also manually create steering rules.
Steering rules changes should be made only on Panorama; do not make changes on NSX-
T Manager. If you make changes on NSX-T Manager, the Panorama plugin for VMware
NSX show the service definition as out-of-sync. You should click on the Out-of-Sync link
to see the specific reason for the out-of-sync status. If a steering rules change is the cause,
perform a configuration sync by clicking NSX-T Config-Sync.
VM-Series Deployment Guide Version 10.1 307 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
The following steps are for specifying service managers instead of selecting All.
STEP 1 | Select Panorama > VMware > NSX-T > Network Introspection > Rule.
STEP 3 | Select the type of Security Rules from the drop-down—All, Pre Rulebase only, or Post
Rulebase only. The security rules are pulled from the service definitions specified in the
following steps.
If you regenerate steering rules, all current rules are deleted and new rules are created
based on the selected rule base. If you originally created steering rules using the Pre
Rulebase and then regenerate steering rules using the Post Rulebase, only the post-
rulebase steering rules will remain.
STEP 5 | Click Add to specify the Service Manager(s) and Service Definition(s).
STEP 9 | Click OK to finish or Add to specify additional service managers and service definitions.
STEP 10 | (Optional) Click on an auto-generated rule to modify the following default options.
VM-Series Deployment Guide Version 10.1 308 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 309 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
The Security Rule drop-down displays rules from all security rules across all device
groups of Service Definition. Ensure you select the appropriate security rule.
STEP 11 | (Optional) Click Add to specify NSX Services, such as Active Directory Server, HTTPS, DNS,
etc.
The following ALG services are not supported: FTP, TFTP, ORACLE_TNS,
SUN_RPC_TCP, SUN_RPC_UDP, MS_RPC_TCP, MS_RPC_UDP, NBNS_BROADCAST,
NBDG_BROADCAST.
STEP 12 | Applied To—DFW or Security Groups. You can select one or more security group. Security
groups are created from dynamic address groups configured on Panorama. The security
group names are formatted as follows <servicedefinition>_<dynamic-address-
group>. If you select DFW, the steering rule is applied to all guest VMs, regardless of their
security membership.
VM-Series Deployment Guide Version 10.1 310 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 2 | For a security-centric deployment, delete the steering rules and steering policy associated
with the service definition to be deleted.
1. Select Panorama > VMware > NSX-T > Network Introspection > Rules.
2. Select the steering rules to be deleted.
3. Click Delete.
4. Select Panorama > VMware > NSX-T > Network Introspection > Policy.
5. Select the steering policy to be deleted.
6. Click Delete.
STEP 4 | Delete the VM-Series firewalls deployed in NSX-T that are associated with service definition
to be deleted.
VM-Series Deployment Guide Version 10.1 311 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 5 | Delete the membership criteria associated with the service definition.
1. Select Panorama > VMware > NSX-T > Membership Criteria.
2. Select the criteria to be deleted.
3. Click Delete.
STEP 6 | Unlink the service definition from the service manager with which it is associated.
1. Select Panorama > VMware > NSX-T > Service Managers.
2. Click the service manager name.
3. Select the service definition.
4. Click Delete.
5. Click OK.
VM-Series Deployment Guide Version 10.1 312 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 2 | Modify the match criteria of your dynamic address groups to follow the format required for a
security-centric deployment.
1. Select Objects > Address Groups.
2. Verify that you are configuring the dynamic address groups in a device group associated
with an NSX-T service definition.
3. Click on the name of a previously created NSX-T dynamic address group.
4. Edit the match criteria.
For the dynamic address group to become a security group in NSX-T Manager,
the match criteria string must be enclosed in single quotes with the prefix
_nsxt_ followed by the exact name of the Address Group. For example,
‘_nsxt_PAN_APP_NSX’.
5. Repeat this process for each security group you require.
VM-Series Deployment Guide Version 10.1 313 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
as the Source Address. Do not add any static address groups, IP ranges, or netmasks as a
Source Address.
6. In the Destination tab, Panorama does not allow you to set a destination zone because
you set the rule type to intrazone. Then select a dynamic address group you created
previously as the Destination Address. Do not add any static address groups, IP ranges,
or netmasks as a Destination Address.
7. Click OK.
8. Repeat steps 1 through 7 for each steering rule you require.
9. Commit your changes.
If you select All instead of selecting specific service managers, the plugin will
generate steering policy for each service definition associated with each service
manager in your configuration.
4. Click Add to select the service manager.
5. Select a Service Manager from the drop-down.
6. Click Add to select the service definitions.
7. Select the service definition from the drop-down.
8. Click OK and click OK again.
VM-Series Deployment Guide Version 10.1 314 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
The following steps are for specifying service managers instead of selecting All.
1. Select Panorama > VMware > NSX-T > Network Introspection > Rule.
2. Click Auto Generate.
3. Select the type of Security Rules from the drop-down—All, Pre Rulebase only, or Post
Rulebase only. The security rules are pulled from the service definitions specified in the
following steps.
4. For Type, choose Select.
5. Click Add to specify the Service Manager(s) and Service Definition(s).
6. Select a Service Manager from the drop-down.
7. Click Add to select the service definition(s).
8. Click OK.
9. Click OK to finish or Add to specify additional service managers and service definitions.
10. (Optional) Click on an auto-generated rule to modify the default options.
VM-Series Deployment Guide Version 10.1 315 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 316 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 317 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 2 | Configure an NSX-T service definition for each NSX-V service definition in your deployment.
Do not create new device groups; instead use your existing NSX-V device groups. Using the
existing device groups allows you to apply the same security policy rules used on NSX-V to
the VM-Series firewalls deployed on NSX-T. If you have policy that reference a particular
zone, add the same template stack from your NSX-V service definition to your NSX-T service
definition. Additionally, if your device group references a particular template, ensure that you
select the template stack that includes the template referenced in the device group.
STEP 3 | Configure an NSX-T service manager and associate the NSX-T service definitions to the
service manager.
STEP 4 | Prepare your NSX-T environment and deploy the VM-Series firewall. You must create your
security groups, service chains, and traffic redirection policy before launching the VM-Series
firewall.
• Deploy the VM-Series Firewall on NSX-T (North-South)
• Deploy the VM-Series Using the Operations-Centric Workflow
VM-Series Deployment Guide Version 10.1 318 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 5 | Add the NSX-T tags to you existing dynamic address groups.
1. Select Panorama > Objects > Address Groups.
2. Click on the name of an existing NSX-V dynamic address group.
3. Click Add Match Criteria to display the tags from NSX-V and NSX-T.
4. Add the NSX-T tag to the dynamic address groups. Be sure to use the OR operator
between the tags.
5. When you have added all the necessary tags, click OK.
6. Commit your changes.
STEP 6 | After your VM workloads have successfully migrated from NSX-V to NSX-T, you remove
the NSX-V tags from your dynamic address groups if you plan to discontinue use of NSX-
V. All NSX-V tags and corresponding IP addresses are unregistered after all NSX-V related
configuration is removed from the Panorama plugin for NSX and VM-Series firewall
configuration is removed from NSX-V manager.
It is recommended that plan for security downtime while performing this migration.
STEP 1 | Prepare your NSX-V and NSX-T environments for migration based on the steps described by
VMware.
VM-Series Deployment Guide Version 10.1 319 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 2 | Install the Panorama Plugin for VMware NSX 3.2.0 or later. See the Panorama Plugin for
VMware NSX 3.2.0 Release Notes before upgrading.
STEP 4 | Configure an NSX-T service definition for each NSX-V service definition in your deployment.
Do not create new device groups; instead use your existing NSX-V device groups. Using the
existing device groups allows you to apply the same security policy rules used on NSX-V to
the VM-Series firewalls deployed on NSX-T. If you have policy that reference a particular
zone, add the same template stack from your NSX-V service definition to your NSX-T service
definition. Additionally, if your device group references a particular template, ensure that you
select the template stack that includes the template referenced in the device group.
STEP 5 | Configure an NSX-T service manager and associate the NSX-T service definitions to the
service manager.
STEP 7 | If you have not already done so, add a compute manager in NSX-T Manager. After you have
verified that the Registration Status and Connection Status are up, continue below.
VM-Series Deployment Guide Version 10.1 320 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 321 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 10 | Resolve Configuration issues on NSX-T Manager. While resolving configuration issues, you
must take specific actions to migrate your VM-Series firewall configuration. In most cases,
you can accept the recommendations presented by NSX-T Manager.
1. When resolving service insertion configuration, verify that you selected the correct
service definition that you previously configured on Panorama for the VM-Series on
NSX-T.
VM-Series Deployment Guide Version 10.1 322 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
2. Map the NSX-T service profile to the corresponding NSX-V service profile.
VM-Series Deployment Guide Version 10.1 323 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 324 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
STEP 15 | Add the NSX-T tags to you existing dynamic address groups.
1. Select Panorama > Objects > Address Groups.
2. Click on the name of an existing NSX-V dynamic address group.
3. Click Add Match Criteria to display the tags from NSX-V and NSX-T.
4. Add the NSX-T tag to the dynamic address groups. If you choose not to remove the
NSX-V tags, be sure to use the OR operator between the tags.
5. When you have added all the necessary tags, click OK.
6. Commit your changes.
STEP 16 | Launch the VM-Series Firewall on NSX-T (East-West). You do not need to create a new
service segment; instead select the service segment created during migration.
VM-Series Deployment Guide Version 10.1 325 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on VMware NSX-T
VM-Series Deployment Guide Version 10.1 326 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The VM-Series firewall can be deployed in the public Amazon Web Services (AWS)
cloud and AWS GovCloud. It can then be configured to secure access to the
applications that are deployed on EC2 instances and placed into a Virtual Private
Cloud (VPC) on AWS.
> About the VM-Series Firewall on > Use Case: Secure the EC2 Instances
AWS in the AWS Cloud
> Deployments Supported on AWS > Use Case: Use Dynamic Address
> Deploy the VM-Series Firewall on Groups to Secure New EC2
AWS Instances within the VPC
327
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 328 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
To secure your workloads that contain all categories of Controlled Unclassified Information (CUI)
data and government-oriented, publicly available data in the AWS GovCloud (US) Region, the
VM-Series firewall provides the same robust security features in the standard AWS public cloud
and on AWS GovCloud. The VM-Series firewall on AWS GovCloud and the standard AWS public
cloud support the same capabilities.
See AMI on AWS GovCloud to Deploy the VM-Series Firewall on AWS.
See Register the VM-Series Firewall (with auth code), to create a support account and register
the VM-Series firewall on the Palo Alto Networks Customer Support website for activating your
support entitlement with Palo Alto Networks.
AWS Terminology
This document assumes that you are familiar with the networking and configuration of the AWS
VPC. In order to provide context for the terms used in this section, here is a brief refresher on the
AWS terms (some definitions are taken directly from the AWS glossary) that are referred to in this
document:
Term Description
VM-Series Deployment Guide Version 10.1 329 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Term Description
IP address types for An EC2 instance can have different types of IP addresses.
EC2 instances
• Public IP address: An IP address that can be routed across the
internet.
• Private IP address: A IP address in the private IP address range as
defined in the RFC 1918. You can choose to manually assign an IP
address or to auto assign an IP address within the range in the CIDR
block for the subnet in which you launch the EC2 instance.
If you are manually assigning an IP address, Amazon reserves the first
four (4) IP addresses and the last one (1) IP address in every subnet for
IP networking purposes.
• Elastic IP address (EIP): A static IP address that you have allocated
in Amazon EC2 or Amazon VPC and then attached to an instance.
Elastic IP addresses are associated with your account, not with a
specific instance. They are elastic because you can easily allocate,
attach, detach, and free them as your needs change.
An instance in a public subnet can have a Private IP address, a Public
IP address, and an Elastic IP address (EIP); an instance in a private
subnet will have a private IP address and optionally have an EIP.
VM-Series Deployment Guide Version 10.1 330 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Term Description
Security groups A security group is attached to an ENI and it specifies the list of
protocols, ports, and IP address ranges that are allowed to establish
inbound/outbound connections on the interface.
VM-Series Deployment Guide Version 10.1 331 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Term Description
Route tables A set of routing rules that controls the traffic leaving any subnet that is
associated with the route table. A subnet can be associated with only
one route table.
Key pair A set of security credentials you use to prove your identity
electronically. The key pair consists of a private key and a public key.
At time of launching the VM-Series firewall, you must generate a
key pair or select an existing key pair for the VM-Series firewall. The
private key is required to access the firewall in maintenance mode.
At present, for use cases that require an ELB sandwich-type deployment to scale out
firewalls and application layer EC2 instances, swapping the management interface
will not allow you to seamlessly deploy the ELB solution. The ability to swap the
management interface only partially solves the integration with ELB.
To allow the firewall to send and receive dataplane traffic on eth0 instead of eth1, you must swap
the mapping of the ENIs within the firewall such that ENI eth0 maps to ethernet 1/1 and ENI eth1
maps to the MGT interface on the firewall as shown below.
VM-Series Deployment Guide Version 10.1 332 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
If possible, swap the management interface before you configure the firewall or define
policy rules.
Swapping how the interfaces are mapped allows ELB to distribute and route traffic to healthy
instances of the VM-Series firewall located in the same or different Availability Zones on AWS for
increased capacity and fault tolerance.
The interface swap is only required when the VM-Series firewall is behind the Amazon ELB
Service. If your requirement is to deploy the VM-Series firewalls in a traditional high availability
set up, you don’t need to configure the interface swap that is described in this section. Continue
to High Availability for VM-Series Firewall on AWS.
To swap the interfaces, you have the following options:
• At launch—When you launch the firewall, you can either enter the mgmt-interface-
swap=enable command in the User data field on the AWS management console (see Launch
the VM-Series Firewall on AWS) or CLI or you can include the new mgmt-interface-swap
operational command in the bootstrap configuration.
• After launch—After you launch the firewall, Use the VM-Series Firewall CLI to Swap the
Management Interface (set system setting mgmt-interface-swap enable yes
operational command) on the firewall.
VM-Series Deployment Guide Version 10.1 333 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• PAN-OS versions 9.0.4 and later provide DPDK support for C5 and M5 instance types by
default. When the firewall is in DPDK mode, it uses DPDK drivers. For a list of supported
drivers, see PacketMMAP and PDK Drivers on VM-Series Firewalls and the official DPDK
release notes.
• To benefit from IETF RFC 8926 (Geneve) encapsulation and improved throughput, upgrade to
PAN-OS 10.0.2 or later and refer to VM-Series Integration with AWS Gateway Load Balancer.
Use the VM-Series CLI to view your DPDK settings or enable packed I/O.
STEP 2 | View your DPDK configuration. If DPDK is enabled the output is as follows:
> show system setting dpdk-pkt-io on
VM-Series Deployment Guide Version 10.1 334 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• Deploy the VM-Series firewall for VPN access between the corporate network and the EC2
instances within the AWS Virtual Private Cloud.
To connect your corporate network with the applications deployed in the AWS Cloud, you can
configure the firewall as a termination point for an IPSec VPN tunnel. This VPN tunnel allows
users on your network to securely access the applications in the cloud.
For centralized management, consistent enforcement of policy across your entire network, and
for centralized logging and reporting, you can also deploy Panorama in your corporate network.
If you need to set up VPN access to multiple VPCs, using Panorama allows you to group the
firewalls by region and administer them with ease.
VM-Series Deployment Guide Version 10.1 335 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• Deploy the VM-Series firewall as a GlobalProtect gateway to secure access for remote users
using laptops. The GlobalProtect agent on the laptop connects to the gateway, and based
on the request, the gateway either sets up a VPN connection to the corporate network
or routes the request to the internet. To enforce security compliance for users on mobile
devices (using the GlobalProtect App), the GlobalProtect gateway is used in conjunction with
the GlobalProtect Mobile Security Manager. The GlobalProtect Mobile Security Manager
ensures that mobile devices are managed and configured with the device settings and account
information for use with corporate applications and networks.
In each of the use cases above, you can deploy the VM-Series firewall in an active/
passive high availability (HA) pair. For information on setting up the VM-Series firewall
in HA, see Use Case: Use Dynamic Address Groups to Secure New EC2 Instances
within the VPC.
• Deploy the VM-Series firewall with the Amazon Elastic Load Balancing (ELB) service, whereby
the firewall can receive dataplane traffic on the primary interface in the following scenarios
where the VM-Series firewall is behind the Amazon ELB:
• The VM-Series firewall(s) is securing traffic outbound directly to the internet without the
need for using a VPN link or a Direct Connect link back to the corporate network.
• The VM-Series firewall secures an internet-facing application when there is exactly one
back-end server, such as a web server, for each firewall. The VM-Series firewalls and web
servers can scale linearly, in pairs, behind ELB.
If you want to Auto Scale VM-Series Firewalls with the Amazon ELB Service, use the
CloudFormation Template available in the GitHub repository repository to deploy the VM-
Series in an ELB sandwich topology with an internet-facing classic ELB and an either an internal
classic load balancer or an internal application load balancer (internal ELB).
VM-Series Deployment Guide Version 10.1 336 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
You cannot configure the firewall to send and receive dataplane traffic on eth0 when the
firewall is in front of ELB. The VM-Series firewall must be placed behind the Amazon ELB.
You can either Use the VM-Series Firewall CLI to Swap the Management Interface or
enable it on bootstrap. For details, see Management Interface Mapping for Use with
Amazon ELB.
If you want to deploy a load balancer sandwich topology, see Auto Scale VM-Series
Firewalls with the Amazon ELB Service.
In addition to the links above that are covered under the Palo Alto Networks official
support policy, Palo Alto Networks provides Community supported templates in the Palo
Alto Networks GitHub repository that allow you to explore the solutions available to
jumpstart your journey into cloud automation and scale on AWS. See AWS Transit VPC
for a hub and subscribing VPC deployment that enables you to secure traffic between
VPCs, between a VPC and an on-prem/hybrid cloud resource, and secure outbound traffic
to the internet.
VM-Series Deployment Guide Version 10.1 337 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
For purchasing licenses with the BYOL option, contact your Palo Alto Networks sales engineer or
reseller.
VM-Series Deployment Guide Version 10.1 338 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Requirement Details
EC2 instance types The EC2 instance type you select must meet the VM-Series System
Requirements for the VM-Series firewall model. If you deploy the
VM-Series firewall on an EC2 instance type that does not meet these
requirements, the firewall will boot into maintenance mode
VM-Series Deployment Guide Version 10.1 339 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Requirement Details
Amazon Elastic Block The VM-Series firewall must use the Amazon Elastic Block Storage
Storage (EBS) (EBS) volume for storage. EBS optimization provides an optimized
configuration stack and additional, dedicated capacity for Amazon EBS
I/O.
Networking Because the AWS only supports Layer 3 networking capabilities, the
VM-Series firewall can only be deployed with Layer 3 interfaces. Layer
2 interfaces, virtual wire, VLANs, and subinterfaces are not supported
on the VM-Series firewall deployed in the AWS VPC.
Support entitlement For the Bring Your Own License model, a support account and a valid
and Licenses VM-Series license are required to obtain the Amazon Machine Image
(AMI) file, which is required to install the VM-Series firewall in the
AWS VPC. The licenses required for the VM-Series firewall—capacity
license, support license, and subscriptions for Threat Prevention, URL
Filtering, WildFire, etc—must be purchased from Palo Alto Networks.
To purchase the licenses for your deployment, contact your sales
representative. See VM-Series Firewall Licenses for Public Clouds.
For the usage-based licensing model, hourly and annual pricing
bundles can be purchased and billed directly to AWS. You must
however, register your support entitlement with Palo Alto Networks.
For details see, Register the Usage-Based Model of the VM-Series
Firewall for Public Clouds (no auth code).
VM-Series Deployment Guide Version 10.1 340 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
You need to replace the value in the angle brackets <> with the relevant information as shown
below:
• Use the VM-Series product code for each license type. The values are:
• Bundle 1—
e9yfvyj3uag5uo5j2hjikv74n
• Bundle 2—
hd44w1chf26uv4p52cdynb2o
• BYOL—
6njl1pau431dv1qxipg63mvah
• Use the PAN-OS version— 10.0. If there are multiple feature releases within a PAN-OS
version all the AMI-IDs are listed for you. For example, in 9.0.x, you will view a listing of the
AMI IDs for PAN-OS versions 9.0, 9.0.3.xfr, 9.0.5.xfr, and 9.0.6, and you can use the AMI-
ID for the PAN-OS version you need.
• Get the AWS region details from: https://docs.aws.amazon.com/general/latest/gr/
rande.html.
For example: To find the AMI-ID for the VM-Series Bundle 1 for PAN-OS 10.0.0 in US
California region, the CLI command is:
"ProductCodes": [
"ProductCodeId": "e9yfvyj3uag5uo5j2hjikv74n",
VM-Series Deployment Guide Version 10.1 341 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
"ProductCodeType": "marketplace"
],
"VirtualizationType": "hvm",
"Hypervisor": "xen",
"ImageOwnerAlias": "aws-marketplace",
"EnaSupport": true,
"SriovNetSupport": "simple",
"ImageId": "ami-06f7a63d7481d0ded",
"State": "available",
"BlockDeviceMappings": [
"DeviceName": "/dev/xvda",
"Ebs": {
"SnapshotId": "snap-0009036179b39824b",
"DeleteOnTermination": false,
"VolumeType": "gp2",
"VolumeSize": 60,
"Encrypted": false
],
"Architecture": "x86_64",
"ImageLocation": "aws-marketplace/PA-VM-AWS-10.0.0-
f1260463-68e1-4bfb-bf2e-075c2664c1d7-ami-06f7a63d7481d0ded.1",
"RootDeviceType": "ebs",
"OwnerId": "679593333241",
"RootDeviceName": "/dev/xvda",
VM-Series Deployment Guide Version 10.1 342 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
"CreationDate": "2020-07-20T12:45:22.000Z",
"Public": true,
"ImageType": "machine",
"Name": "PA-VM-AWS-10.0.0-f1260463-68e1-4bfb-
bf2e-075c2664c1d7-ami-06f7a63d7481d0ded.1"
You can also output to a table format. For example, to see AMI for BYOL image for PAN-OS
10.0.2:
-----------------------------------------------------------------------------
DescribeImages
|+-----------------------
+----------------------------------------------------------------------------
+-------------+| AMI | Name
| State |+-----------------------
+----------------------------------------------------------------------------
+-------------+| ami-037b90bd9b630f594| PA-VM-
AWS-10.0.2-7064e142-2859-40a4-ab62-8b0996b842e9-
ami-07a0e94019f2a2001.4 | available |+-----------------------
+----------------------------------------------------------------------------
+-------------+
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VPC CIDR
Security Groups
VM-Series Deployment Guide Version 10.1 343 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Security Groups
• Rules for Management Access
to the firewall (eth0/0)
• Rules for access to the
dataplane interfaces of the
firewall
• Rules for access to the
interfaces assigned to the
application servers.
VM-Series Deployment Guide Version 10.1 344 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 345 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Although you can add additional network interfaces (ENIs) to the VM-Series
firewall when you launch, AWS releases the auto-assigned Public IP address for the
management interface when you restart the firewall. Hence, to ensure connectivity to
the management interface you must assign an Elastic IP address for the management
interface, before attaching additional interfaces to the firewall.
If you want to conserve EIP addresses, you can assign one EIP address to the eth 1/1 interface
and use this interface for both management traffic and data traffic. To restrict services
VM-Series Deployment Guide Version 10.1 346 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
permitted on the interface or limit IP addresses that can log in the eth 1/1 interface, attach a
management profile to the interface.
1. On the EC2 Dashboard, click Launch Instance.
2. Select the VM-Series AMI. To get the AMI, see Obtain the AMI.
3. Launch the VM-Series firewall on an EC2 instance.
1. Choose the EC2 instance type for allocating the resources required for the firewall,
and click Next. See VM-Series System Requirements, for resource requirements.
2. Select the VPC.
3. Select the public subnet to which the VM-Series management interface will attach.
4. Select Automatically assign a public IP address. This allows you to obtain a publicly
accessible IP address for the management interface of the VM-Series firewall.
You can later attach an Elastic IP address to the management interface; unlike
the public IP address that is disassociated from the firewall when the instance is
terminated, the Elastic IP address provides persistence and can be reattached to
VM-Series Deployment Guide Version 10.1 347 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
a new (or replacement) instance of the VM-Series firewall without the need to
reconfigure the IP address wherever you might have referenced it.
5. Select Launch as an EBS-optimized instance.
6. Add another network interface for deployments with ELB so that you can swap the
management and data interfaces on the firewall. Swapping interfaces requires a
minimum of two ENIs (eth0 and eth1).
• Expand the Network Interfaces section and click Add Device to add another
network interface.
Make sure that your VPC has more than one subnet so that you can add additional
ENIs at launch.
VM-Series Deployment Guide Version 10.1 348 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
This key pair is required for first time access to the firewall. It is also required
to access the firewall in maintenance mode.
8. (Optional) Tagging. Add one or more tags to create your own metadata to identify
and group the VM-Series firewall. For example, add a Name tag with a Value that
helps you remember that the ENI interfaces have been swapped on this VM-Series
firewall.
9. Select an existing Security Group or create a new one. This security group is for
restricting access to the management interface of the firewall. At a minimum consider
enabling https and ssh access for the management interface.
10.If prompted, select an appropriate SSD option for your setup.
11.Select Review and Launch. Review that your selections are accurate and click Launch.
12.Select an existing key pair or create a new one, and acknowledge the key disclaimer.
13.Download and save the private key to a safe location; the file extension is .pem. You
cannot regenerate this key, if lost.
It takes 5-7 minutes to launch the VM-Series firewall. You can view the progress on
the EC2 Dashboard.When the process completes, the VM-Series firewall displays on
the Instances page of the EC2 Dashboard.
VM-Series Deployment Guide Version 10.1 349 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
On the VM-Series firewall CLI, you must configure a unique administrative password
before you can access the web interface of the firewall. To log in to the CLI, you require
the private key that you used to launch the firewall.
1. Use the public IP address to SSH into the Command Line Interface (CLI) of the VM-
Series firewall. You will need the private key that you used or created in 3 above to
access the CLI.
If you added an additional ENI to support deployments with ELB, you must first
create and assign an Elastic IP address to the ENI to access the CLI, see 6.
If you are using PuTTY for SSH access, you must convert the .pem format to a .ppk
format. See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html
2. Enter the following command to log in to the firewall:
ssh-i <private_key.pem> admin@<public-ip_address>
3. Configure a new password, using the following command and follow the onscreen
prompts:
configure
set mgt-config users admin password
4. If you have a BYOL that needs to be activated, set the DNS server IP address so that
the firewall can aceess the Palo Alto Networks licensing server. Enter the following
command to set the DNS server IP address:
set deviceconfig system dns-setting servers primary <ip_address>
5. Commit your changes with the command:
commit
6. Terminate the SSH session.
STEP 6 | Create and assign an Elastic IP address (EIP) to the ENI used for management access to the
firewall and reboot the VM-Series firewall.
1. Select Elastic IPs and click Allocate New Address.
2. Select EC2-VPC and click Yes, Allocate.
3. Select the newly allocated EIP and click Associate Address.
4. Select the Network Interface and the Private IP address associated with the
management interface and click Yes, Associate.
STEP 7 | Create virtual network interface(s) and attach the interface(s) to the VM-Series firewall. The
virtual network interfaces are called Elastic Network Interfaces (ENIs) on AWS, and serve as
VM-Series Deployment Guide Version 10.1 350 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
the dataplane network interfaces on the firewall. These interfaces are used for handling data
traffic to/from the firewall.
You will need at least two ENIs that allow inbound and outbound traffic to/from the firewall.
You can add up to seven ENIs to handle data traffic on the VM-Series firewall; check your EC2
instance type to verify the maximum number supported on it.
1. On the EC2 Dashboard, select Network Interfaces, and click Create Network Interface.
2. Enter a descriptive name for the interface.
3. Select the subnet. Use the subnet ID to make sure that you have selected the correct
subnet. You can only attach an ENI to an instance in the same subnet.
4. Enter the Private IP address to assign to the interface or select Auto-assign to
automatically assign an IP address within the available IP addresses in the selected
subnet.
5. Select the Security group to control access to the dataplane network interface.
6. Click Yes, Create.
7. To attach the ENI to the VM-Series firewall, select the interface you just created, and
click Attach.
STEP 8 | (Not required for the Usage-based licensing model) Activate the licenses on the VM-Series
firewall.
This task is not performed on the AWS management console. Access to the Palo Alto
Networks support portal and the web interface of the VM-Series firewall is required for
license activation.
VM-Series Deployment Guide Version 10.1 351 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 9 | Disable Source/Destination check on every firewall dataplane network interface(s). Disabling
this option allows the interface to handle network traffic that is not destined to the IP
address assigned to the network interface.
1. On the EC2 Dashboard, select the network interface, for example eth1/1, in the
Network Interfaces tab.
2. In the Action drop-down, select Change Source/Dest. Check.
VM-Series Deployment Guide Version 10.1 352 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 10 | Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
For an example configuration, see steps 14 through 17 in Use Case: Secure the EC2 Instances
in the AWS Cloud.
On the application servers within the VPC, define the dataplane network interface of
the firewall as the default gateway.
1. Using a secure connection (https) from your web browser, log in using the EIP address
and password you assigned during initial configuration (https://<Elastic_IP address>).
You will see a certificate warning; that is okay. Continue to the web page.
2. Select Network > Interfaces > Ethernet.
3. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example VM_Series_untrust, and then click OK.
• On the IPv4 tab, select either Static or DHCP Client.
If using the Static option, click Add in the IP section, and enter the IP address and
network mask for the interface, for example 10.0.0.10/24.
Make sure that the IP address matches the ENI IP address that you assigned earlier.
If using DHCP, select DHCP Client; the private IP address that you assigned to the
ENI in the AWS management console will be automatically acquired.
4. Click the link for ethernet 1/2 and configure as follows:
• Interface Type: Layer3
• Security Zone: VM_Series_trust
• IP address: Select the Static or DHCP Client radio button.
For static, click Add in the IP section, and enter the IP address and network mask for
the interface. Make sure that the IP address matches the attached ENI IP address that
you assigned earlier.
5. Click Commit. Verify that the link state for the interfaces are up.
For DHCP, clear the Automatically create default route to default gateway
provided by server check box. For an interface that is attached to the private
subnet in the VPC, disabling this option ensures that traffic handled by this
interface does not flow directly to the internet gateway on the VPC.
VM-Series Deployment Guide Version 10.1 353 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 11 | Create NAT rules to allow inbound and outbound traffic from the servers deployed within
the VPC.
1. Select Policies > NAT on the web interface of the firewall.
2. Create a NAT rule to allow traffic from the dataplane network interface on the firewall
to the web server interface in the VPC.
3. Create a NAT rule to allow outbound access for traffic from the web server to the
internet.
STEP 12 | Create security policies to allow/deny traffic to/from the servers deployed within the VPC.
1. Select Policies > Security on the web interface of the firewall.
2. Click Add, and specify the zones, applications and logging options that you would like to
execute to restrict and audit traffic traversing through the network.
STEP 14 | Verify that the VM-Series firewall is securing traffic and that the NAT rules are in effect.
1. Select Monitor > Logs > Traffic on the web interface of the firewall.
2. View the logs to make sure that the applications traversing the network match the
security policies you implemented.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 354 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Although you can add additional network interfaces (ENIs) to the VM-Series
firewall when you launch, AWS releases the auto-assigned Public IP address for the
management interface when you restart the firewall. Hence, to ensure connectivity to
the management interface you must assign an Elastic IP address for the management
interface, before attaching additional interfaces to the firewall.
If you want to conserve EIP addresses, you can assign one EIP address to the eth 1/1 interface
and use this interface for both management traffic and data traffic. To restrict services
VM-Series Deployment Guide Version 10.1 355 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
permitted on the interface or limit IP addresses that can log in the eth 1/1 interface, attach a
management profile to the interface.
1. On the EC2 Dashboard, click Launch Instance.
2. Select the VM-Series AMI. To get the AMI, see Obtain the AMI.
3. Launch the VM-Series firewall on an EC2 instance.
1. Choose the EC2 instance type for allocating the resources required for the firewall,
and click Next. See VM-Series System Requirements, for resource requirements.
2. Select the VPC.
3. Select the public subnet on Outpost to which the VM-Series management interface
will attach.
4. Select Automatically assign a public IP address. This allows you to obtain a publicly
accessible IP address for the management interface of the VM-Series firewall.
You can later attach an Elastic IP address to the management interface; unlike
the public IP address that is disassociated from the firewall when the instance is
terminated, the Elastic IP address provides persistence and can be reattached to
VM-Series Deployment Guide Version 10.1 356 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
a new (or replacement) instance of the VM-Series firewall without the need to
reconfigure the IP address wherever you might have referenced it.
5. Select Launch as an EBS-optimized instance.
6. Add another network interface for deployments with ELB so that you can swap the
management and data interfaces on the firewall. Swapping interfaces requires a
minimum of two ENIs (eth0 and eth1).
• Expand the Network Interfaces section and click Add Device to add another
network interface.
Make sure that your VPC has more than one subnet so that you can add additional
ENIs at launch.
If you are bootstrapping the firewall, you can also enter vmseries-
bootstrap-aws-s3bucket=<bucketname> with a comma
separator after mgmt-interface-swap=enable.
7. Accept the default Storage settings. The firewall uses volume type SSD (gp2)
This key pair is required for first time access to the firewall. It is also required
to access the firewall in maintenance mode.
8. (Optional) Tagging. Add one or more tags to create your own metadata to identify
and group the VM-Series firewall. For example, add a Name tag with a Value that
VM-Series Deployment Guide Version 10.1 357 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
helps you remember that the ENI interfaces have been swapped on this VM-Series
firewall.
9. Select an existing Security Group or create a new one. This security group is for
restricting access to the management interface of the firewall. At a minimum consider
enabling https and ssh access for the management interface.
10.If prompted, select an appropriate SSD option for your setup.
11.Select Review and Launch. Review that your selections are accurate and click Launch.
12.Select an existing key pair or create a new one, and acknowledge the key disclaimer.
13.Download and save the private key to a safe location; the file extension is .pem. You
cannot regenerate this key, if lost.
It takes 5-7 minutes to launch the VM-Series firewall. You can view the progress on
the EC2 Dashboard.When the process completes, the VM-Series firewall displays on
the Instances page of the EC2 Dashboard.
On the VM-Series firewall CLI, you must configure a unique administrative password
before you can access the web interface of the firewall. To log in to the CLI, you require
the private key that you used to launch the firewall.
1. Use the public IP address to SSH into the Command Line Interface (CLI) of the VM-
Series firewall. You will need the private key that you used or created in 3 above to
access the CLI.
If you added an additional ENI to support deployments with ELB, you must first
create and assign an Elastic IP address to the ENI to access the CLI, see 6.
If you are using PuTTY for SSH access, you must convert the .pem format to a .ppk
format. See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html
2. Enter the following command to log in to the firewall:
ssh-i <private_key.pem> admin@<public-ip_address>
3. Configure a new password, using the following command and follow the onscreen
prompts:
configure
set mgt-config users admin password
4. If you have a BYOL that needs to be activated, set the DNS server IP address so that
the firewall can aceess the Palo Alto Networks licensing server. Enter the following
command to set the DNS server IP address:
set deviceconfig system dns-setting servers primary <ip_address>
5. Commit your changes with the command:
commit
6. Terminate the SSH session.
VM-Series Deployment Guide Version 10.1 358 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | Create and assign an Elastic IP address (EIP) to the ENI used for management access to the
firewall and reboot the VM-Series firewall.
1. Select Elastic IPs and click Allocate New Address.
2. Select EC2-VPC and click Yes, Allocate.
3. Select the newly allocated EIP and click Associate Address.
4. Select the Network Interface and the Private IP address associated with the
management interface and click Yes, Associate.
STEP 7 | Create virtual network interface(s) and attach the interface(s) to the VM-Series firewall. The
virtual network interfaces are called Elastic Network Interfaces (ENIs) on AWS, and serve as
the dataplane network interfaces on the firewall. These interfaces are used for handling data
traffic to/from the firewall.
You will need at least two ENIs that allow inbound and outbound traffic to/from the firewall.
You can add up to seven ENIs to handle data traffic on the VM-Series firewall; check your EC2
instance type to verify the maximum number supported on it.
1. On the EC2 Dashboard, select Network Interfaces, and click Create Network Interface.
2. Enter a descriptive name for the interface.
3. Select the subnet. Use the subnet ID to make sure that you have selected the correct
subnet. You can only attach an ENI to an instance in the same subnet.
4. Enter the Private IP address to assign to the interface or select Auto-assign to
automatically assign an IP address within the available IP addresses in the selected
subnet.
5. Select the Security group to control access to the dataplane network interface.
6. Click Yes, Create.
7. To attach the ENI to the VM-Series firewall, select the interface you just created, and
click Attach.
VM-Series Deployment Guide Version 10.1 359 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 8 | (Not required for the Usage-based licensing model) Activate the licenses on the VM-Series
firewall.
This task is not performed on the AWS management console. Access to the Palo Alto
Networks support portal and the web interface of the VM-Series firewall is required for
license activation.
STEP 9 | Disable Source/Destination check on every firewall dataplane network interface(s). Disabling
this option allows the interface to handle network traffic that is not destined to the IP
address assigned to the network interface.
1. On the EC2 Dashboard, select the network interface, for example eth1/1, in the
Network Interfaces tab.
2. In the Action drop-down, select Change Source/Dest. Check.
VM-Series Deployment Guide Version 10.1 360 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 10 | Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
For an example configuration, see steps 14 through 17 in Use Case: Secure the EC2 Instances
in the AWS Cloud.
On the application servers within the VPC, define the dataplane network interface of
the firewall as the default gateway.
1. Using a secure connection (https) from your web browser, log in using the EIP address
and password you assigned during initial configuration (https://<Elastic_IP address>).
You will see a certificate warning; that is okay. Continue to the web page.
2. Select Network > Interfaces > Ethernet.
3. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example VM_Series_untrust, and then click OK.
• On the IPv4 tab, select either Static or DHCP Client.
If using the Static option, click Add in the IP section, and enter the IP address and
network mask for the interface, for example 10.0.0.10/24.
Make sure that the IP address matches the ENI IP address that you assigned earlier.
If using DHCP, select DHCP Client; the private IP address that you assigned to the
ENI in the AWS management console will be automatically acquired.
4. Click the link for ethernet 1/2 and configure as follows:
• Interface Type: Layer3
• Security Zone: VM_Series_trust
• IP address: Select the Static or DHCP Client radio button.
For static, click Add in the IP section, and enter the IP address and network mask for
the interface. Make sure that the IP address matches the attached ENI IP address that
you assigned earlier.
5. Click Commit. Verify that the link state for the interfaces are up.
For DHCP, clear the Automatically create default route to default gateway
provided by server check box. For an interface that is attached to the private
subnet in the VPC, disabling this option ensures that traffic handled by this
interface does not flow directly to the internet gateway on the VPC.
VM-Series Deployment Guide Version 10.1 361 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 11 | Create NAT rules to allow inbound and outbound traffic from the servers deployed within
the VPC.
1. Select Policies > NAT on the web interface of the firewall.
2. Create a NAT rule to allow traffic from the dataplane network interface on the firewall
to the web server interface in the VPC.
3. Create a NAT rule to allow outbound access for traffic from the web server to the
internet.
STEP 12 | Create security policies to allow/deny traffic to/from the servers deployed within the VPC.
1. Select Policies > Security on the web interface of the firewall.
2. Click Add, and specify the zones, applications and logging options that you would like to
execute to restrict and audit traffic traversing through the network.
STEP 14 | Verify that the VM-Series firewall is securing traffic and that the NAT rules are in effect.
1. Select Monitor > Logs > Traffic on the web interface of the firewall.
2. View the logs to make sure that the applications traversing the network match the
security policies you implemented.
VM-Series Deployment Guide Version 10.1 362 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
then use the custom AMI in the Auto Scaling VM-Series Firewalls CloudFormation Templates or
any other templates that you have created.
You can create a custom AMI with the BYOL, Bundle 1, or Bundle 2 licenses. The process of
creating a custom AMI requires you to remove all configuration from the firewall and reset it to
factory defaults, so in this workflow you’ll launch a new instance of the firewall from the AWS
Marketplace instead of using an existing firewall that you have fully configured.
When creating a custom AMI with a BYOL version of the firewall, you must first activate
the license on the firewall so that you can access and download PAN-OS software
updates to upgrade your firewall, and then deactivate the license on the firewall before
you reset the firewall to factory defaults and create the custom AMI. If you do not
deactivate the license, you lose the license that you applied on this firewall instance.
STEP 3 | Install software updates and upgrade the firewall to the PAN-OS version you plan to use.
Enter y to confirm.
The firewall reboots to initialize the default configuration.
VM-Series Deployment Guide Version 10.1 363 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
5. Verify that the custom AMI is created and has the correct product code.
1. On the EC2 Dashboard, select AMI.
2. Select the AMI that you just created. Depending on whether you selected an AMI
with the BYOL, Bundle 1, or Bundle 2 licensing options, you should see one of the
following Product Codes in the details:
• BYOL—6njl1pau431dv1qxipg63mvah
• Bundle 1—6kxdw3bbmdeda3o6i1ggqt4km
• Bundle 2—806j2of0qy5osgjjixq9gqc6g
VM-Series Deployment Guide Version 10.1 364 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 365 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
4. Select Review and launch the instance. Your instance will launch with an encrypted
Amazon EBS volume that uses the KMS key you selected.
For information on encrypting existing EBS volumes, see Encrypting an existing EBS volume.
Before you proceed, verify that the firewall has a minimum of two ENIs (eth0 and
eth1). If you launch the firewall with only one ENI, the interface swap command will
cause the firewall to boot into maintenance mode.
VM-Series Deployment Guide Version 10.1 366 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | On the EC2 Dashboard, view the IP address of the eth1 interface and verify that the AWS
Security Group rules allow connections (HTTPS and SSH) to the new management interface
(eth1).
STEP 3 | Log in to the VM-Series firewall CLI and enter the following command:
set system setting mgmt-interface-swap enable yes
STEP 4 | Confirm that you want to swap the interface and use the eth1 dataplane interface as the
management interface.
STEP 5 | Reboot the firewall for the swap to take effect. Use the following command:
request restart system
STEP 6 | Verify that the interfaces have been swapped. Use the following command:
VM-Series Deployment Guide Version 10.1 367 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Assign the appropriate permissions for the AWS Identity and Access Management (IAM) user
role that you use to deploy the VM-Series firewall on AWS.
Whether you launch a new instance of the VM-Series firewall or upgrade an existing VM-
Series firewall on AWS, the IAM role associated with your instance, must have permissions to
publish metrics to CloudWatch.
1. On the AWS console, select IAM.
2. Edit the IAM role to grant the following permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudwatch:PutMetricData"
],
"Resource": [
"*"
]
}
]
}
VM-Series Deployment Guide Version 10.1 368 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 369 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
3. Verify that you can see PAN-OS metrics in the viewing list.
To filter by hostname or AWS Instance ID of a specific firewall, select _dimensions.
VM-Series Deployment Guide Version 10.1 370 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 371 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 372 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 373 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
As part of the infrastructure setup on the AWS cloud, the plugin creates Security VPC with GWLB
Endpoints, firewalls, and NAT Gateway subnets and route tables. The plugin does not create AWS
Transit Gateway (TGW).
VM-Series firewall can inspect traffic routed between the VPCs.
The Inbound traffic flow originating in the Application VPC flows in through IGW is redirected to
the GWLB Endpoint based on edge route. The traffic enters through the GWLB Endpoint to the
firewalls in the Security VPC for inspection. After the inspection, the traffic is sent back to the
GWLB Endpoint and directed to the original application.
For Outbound and East-West traffic, this solution leverages TGW. When you create a TGW, the
plugin creates TGW attachments and route tables in the Security VPC. You have to attach your
Application VPC to the TGW used in the Security VPC configuration. You must also direct the
Outbound and East-West traffic to the TGW by adding routes to the route tables associated with
your workload subnets. You have to modify the Application VPC attachment route table to direct
the East-West and Outbound traffic to the Security VPC attachment.
The plugin monitors TGW attachments to learn any newly added and deleted VPC attachments.
When the plugin detects an existing or new attachment, it makes necessary changes in the
Security VPC to ensure that the firewall inspects the traffic entering TGW before sending it back
to the TGW. These changes include adding routes to the NAT Gateway route table to direct
Outbound traffic back to the GWLB Endpoint, and to GWLB Endpoint route table to return traffic
to the TGW after inspection. The plugin updates the TGW attachment route table to ensure
that the traffic coming back from the Security VPC to the TGW is sent to the correct Application
attachment. Traffic from the Application VPC is directed to TGW through routing. When traffic
hits the TGW attachment in Security VPC, the attachment route table sends the traffic to the
Security VPC. From there, it is directed to the existing GWLB Endpoint, then to the firewall for
inspection. The Outbound traffic flows out to the original destination address through NAT
Gateway. The East-West traffic is sent back to the TGW where the route table directs the traffic
to the original destination address.
• Prepare for an Orchestrated AWS Deployment
• Orchestrate a VM-Series Firewall Deployment in AWS
• View the Deployment Status
• Traffic Flow and Configurations
VM-Series Deployment Guide Version 10.1 374 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
profile to have the following set of permissions to declare the IAM role valid. The CFT
hyperlink under Security Account creates a policy with the following permissions.
"Statement":[
{
"Effect": "Allow",
"Action": "ec2:*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "elasticloadbalancing:*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "cloudwatch:*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "autoscaling:*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "sts:assumerole",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "cloudformation:*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"iam:Get*",
"iam:List*",
"iam:PassRole"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "ram:*",
"Resource": "*"
}
]
},
VM-Series Deployment Guide Version 10.1 375 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
called from the CFT and plugin back-end code for both Security VPC and cross-account
Application VPC.
The following permissions are not implemented in the AWS plugin for Panorama
version 3.0.1 because the detailed permissions list exceed the AWS policy size
limitation.For inline policies, you can add as many policies as you want for a user,
role, or group, but the total aggregate policy size per entity cannot exceed these
limits—user policy size cannot exceed 2048 characters, role policy size cannot
exceed 10240 characters, and groups policy size cannot exceed 5120 characters.
Due to these limitations and back-end validation time, you must use the above
mentioned permissions.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:AuthorizeSecurityGroupIngress",
"cloudwatch:PutMetricData",
"ec2:Describe*",
"cloudwatch:DeleteAlarms",
"autoscaling:DescribePolicies",
"ec2:DeleteVpcEndpoints",
"ec2:AttachInternetGateway",
"ec2:AcceptTransitGatewayVpcAttachment",
"autoscaling:ExecutePolicy",
"ec2:DeleteRouteTable",
"sts:GetSessionToken",
"cloudformation:DescribeStackEvents",
"ec2:RevokeSecurityGroupEgress",
"ec2:CreateRoute",
"ec2:CreateInternetGateway",
"cloudformation:UpdateStack",
"ec2:DeleteInternetGateway",
"iam:ListRolePolicies",
"autoscaling:TerminateInstanceInAutoScalingGroup",
"iam:ListPolicies",
"ec2:DisassociateTransitGatewayRouteTable",
"iam:GetRole",
"iam:GetPolicy",
"ec2:CreateTags",
"elasticloadbalancing:CreateTargetGroup",
"ec2:RunInstances",
"ec2:DisassociateRouteTable",
"ec2:CreateVpcEndpointServiceConfiguration",
"ec2:CreateTransitGatewayRoute",
"ec2:CreateTransitGatewayVpcAttachment",
"elasticloadbalancing:DescribeAccountLimits",
"elasticloadbalancing:AddTags",
"cloudformation:DeleteStack",
"cloudwatch:DescribeAlarms",
VM-Series Deployment Guide Version 10.1 376 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
"ec2:DeleteNatGateway",
"ram:AssociateResourceShare",
"autoscaling:DeleteAutoScalingGroup",
"ec2:CreateSubnet",
"elasticloadbalancing:ModifyLoadBalancerAttributes",
"iam:GetRolePolicy",
"ec2:ModifyVpcEndpoint",
"ec2:DisassociateAddress",
"autoscaling:DescribeAutoScalingInstances",
"ec2:ModifyVpcEndpointServicePermissions",
"ec2:CreateNatGateway",
"ec2:CreateVpc",
"ec2:ModifySubnetAttribute",
"iam:PassRole",
"autoscaling:DescribeScalingActivities",
"sts:DecodeAuthorizationMessage",
"autoscaling:DescribeLoadBalancerTargetGroups",
"iam:ListAttachedGroupPolicies",
"ec2:DeleteLaunchTemplateVersions",
"sts:GetServiceBearerToken",
"iam:ListAccessKeys",
"ram:DisassociateResourceShare",
"ec2:ReleaseAddress",
"ec2:DeleteLaunchTemplate",
"elasticloadbalancing:CreateLoadBalancer",
"ec2:AcceptVpcEndpointConnections",
"iam:ListGroupPolicies",
"iam:ListRoles",
"elasticloadbalancing:DeleteTargetGroup",
"ram:AssociateResourceSharePermission",
"ec2:CreateLaunchTemplate",
"elasticloadbalancing:DescribeTargetGroups",
"elasticloadbalancing:DeleteListener",
"ram:UpdateResourceShare",
"iam:GetPolicyVersion",
"ec2:DeleteSubnet",
"ec2:ModifyVpcEndpointServiceConfiguration",
"ec2:CreateTransitGatewayRouteTable",
"ec2:ModifyTransitGateway",
"cloudformation:DescribeStackResource",
"ec2:AssociateRouteTable",
"elasticloadbalancing:DeleteLoadBalancer",
"elasticloadbalancing:DescribeLoadBalancers",
"logs:CreateLogStream",
"ec2:GetLaunchTemplateData",
"ec2:DeleteTransitGatewayVpcAttachment",
"autoscaling:DescribeAutoScalingGroups",
"iam:ListAttachedRolePolicies",
"logs:GetLogEvents",
"autoscaling:UpdateAutoScalingGroup",
"ec2:AssociateTransitGatewayRouteTable",
"elasticloadbalancing:ModifyTargetGroupAttributes",
"autoscaling:SetDesiredCapacity",
"cloudformation:DescribeStackResources",
VM-Series Deployment Guide Version 10.1 377 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
"ec2:CreateRouteTable",
"ec2:DetachInternetGateway",
"cloudformation:DescribeStacks",
"ec2:DeleteTransitGatewayRouteTable",
"sts:AssumeRole",
"ec2:DeleteTransitGatewayRoute",
"iam:GetUserPolicy",
"iam:ListGroupsForUser",
"ec2:DeleteVpc",
"iam:GetGroupPolicy",
"ec2:AssociateAddress",
"autoscaling:CreateAutoScalingGroup",
"ram:AcceptResourceShareInvitation",
"ec2:DeleteTags",
"logs:DescribeLogStreams",
"ec2:DeleteVpcEndpointServiceConfigurations",
"autoscaling:DeletePolicy",
"elasticloadbalancing:RemoveTags",
"elasticloadbalancing:CreateListener",
"elasticloadbalancing:DescribeListeners",
"autoscaling:PutScalingPolicy",
"ec2:CreateSecurityGroup",
"iam:ListAttachedUserPolicies",
"ec2:ModifyVpcAttribute",
"ec2:ModifyInstanceAttribute",
"ec2:GetTransitGatewayRouteTableAssociations",
"ram:DeleteResourceShare",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:ModifyTransitGatewayVpcAttachment",
"iam:GetInstanceProfile",
"ram:DisassociateResourceSharePermission",
"elasticloadbalancing:DescribeTags",
"ec2:DeleteRoute",
"iam:ListUserPolicies",
"logs:PutLogEvents",
"ec2:AllocateAddress",
"ec2:CreateLaunchTemplateVersion",
"cloudwatch:PutMetricAlarm",
"cloudformation:CreateStack",
"ec2:CreateVpcEndpoint",
"ec2:DeleteSecurityGroup",
"ec2:StartVpcEndpointServicePrivateDnsVerification",
"ec2:ModifyLaunchTemplate",
"iam:ListUsers",
"ram:CreateResourceShare"
],
"Resource": "*"
}
]
VM-Series Deployment Guide Version 10.1 378 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
For Application Account—An AWS account other than the Security account that hosts
either TGW or the applications that needs to be protected. Within this account you must
create a RoleARN with the following permissions.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:Describe*",
"ec2:DisassociateTransitGatewayRouteTable",
"ec2:CreateTransitGatewayRoute",
"ec2:CreateTransitGatewayRouteTable",
"ec2:AssociateTransitGatewayRouteTable",
"ec2:DeleteTransitGatewayRouteTable",
"ec2:DeleteTransitGatewayRoute",
"ec2:GetTransitGatewayRouteTableAssociations"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"iam:Get*",
"iam:List*"
],
"Resource": "*",
"Effect": "Allow"
}
]
}
• Dedicated CIDR block—A CIDR block reserved for the Security VPC. The plugin manages
this CIDR block, using it to launch firewalls, load balancers, and other deployment resources
for the Security VPC.
• AWS transit gateway—Create a TGW and ensure that the selected AWS user has
permission to configure the TGW resources.
• Panorama
• Panorama Plugin for AWS—Version 3.0.1 or later.
• VM-Series Plugin—Version 2.0.6 or later.
• PanOS—Version 10.0.5 or later.
• Create a valid license API key configured on Panorama for delicensing the firewalls.
• Create an IAM role on the plugin under Panorama > Plugins > AWS > Setup > IAM Roles.
This configuration needs the Access Key and Secret Key associated with the user you
created in your AWS account.
VM-Series Deployment Guide Version 10.1 379 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Click Add and enter the following details under Security Account Detail.
• Enter a name for the IAM role and an optional description.
• Enter the AWS access key and secret key to validate permissions. Re-enter the secret key
to confirm the secret access key.
• Select an account type—Instance Profile or AWS Account Credentials. If your Panorama
is deployed on AWS, you can choose to either attach an instance profile with the correct
permissions to your Panorama or add the credentials associated with the IAM role on
Panorama. If your Panorama is not deployed on AWS, you must enter the credentials for
the IAM role locally on Panorama.
STEP 3 | Under Application Account Details, search and select the needed RoleARNs to provide valid
permissions to the Security account to access the resources in the Application VPC.
The status of validity of monitoring and deployment is color coded for ease of identification.
• Valid (Green)—Indicates that the secret key and access key are valid. Also, all RoleARNs
entered for application account access have valid permissions to do necessary action.
• Partially valid (Orange)—Indicates that the secret key and access key are valid but one or
more RoleARNs entered for application account access do not have valid permissions to
do necessary action. Click the status hyperlink to open the IAM and see which specific
RoleARNs do not comply.
• Invalid (Red)—Indicates that the secret key and access key entered are either invalid or do
not have permissions to do the necessary action.
• Commit Required (Gray)—Indicates that a commit is required for the role.
• Validating (Gray)—Indicates that the plugin is trying to connect to AWS to check the
necessary requirements. If this status continues for more than a few seconds, verify if the
connection to AWS is established.
Only the IAM roles with green or orange status are allowed for further deployment
configuration.
Panorama deployments on AWS with an instance profile is not supported when deployed
behind a proxy.
VM-Series Deployment Guide Version 10.1 380 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
To upgrade the Panorama plugin for AWS to version 3.0.1, you must first upgrade
the plugin to version 2.0.2. After you install the AWS plugin version 3.0.1 you cannot
downgrade to version 2.0.x or below.
If you currently have a Panorama plugin for any cloud platform installed, installing (or
uninstalling) an additional plugin requires a Panorama reboot so that you can commit
changes.
STEP 4 | Select Panorama > Plugins > AWS > Deployments to Add a new deployment.
STEP 5 | Enter the generic details of the deployment in the General tab.
• Enter a Name and an optional Description to identify the deployment in Panorama and
AWS cloud.
• Select an IAM Role from the drop-down. The list displays IAM roles that has valid or
partially valid deployment permissions.
Once an IAM role has been created and added to you deployment, you can edit
information in the IAM (such as secret key and access key). However, you cannot
edit the name of the IAM role. To change the name, you must delete the IAM and
create another.
VM-Series Deployment Guide Version 10.1 381 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | Enter the Security VPC related information in the Security VPC tab.
• Select the AWS Region in which you intend to launch the deployment. The list displays
regions based on the selected IAM role.
• Enter a VPC CIDR value to create resources in the Security VPC. This CIDR will be
managed by the AWS plugin.
• Select two or more Availability Zones from the pre-populated list and follow the same
mapping in AWS. This list is populated based on the region you selected.
STEP 7 | Select Firewall > Image and enter the following details.
• License Type—The standard license types Bring Your Own License (BYOL), Pay As you
Go-Marketplace-Bundle1, and Pay As you Go-Marketplace-Bundle2 are provided as
VM-Series Deployment Guide Version 10.1 382 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
options in the drop-down (based on the selected regions). If you select Bring Your Own
License, be prepared to enter a license authcode.
Pay as you go Bundle 1 and Bundle 2 cannot be used with an AMI custom image.
• (Optional—Appears only if you choose Bring Your Own License license type) License
Authcode—Enter the authcode for your BYOL. This authcode determines which instance
types appear on the Instance Type drop-down.
• Instance Type—Choose supported instance types from the drop-down. This list is derived
from the license authcode.
• Image Type—Select Marketplace Image or Custom Image.
If you select Marketplace Image, select from the drop-down, PanOS Version 10.0.5 or
later supported in the regions you selected when you configured the Security VPC.
If you select Custom Image, enter the Amazon Machine Image (AMI) ID and select a
PanOS Version 10.0.5 or later.
• Device Certificate—The device certificate is generated on the Customer Support portal,
and enables you to retrieve your site license entitlements for AutoFocus or Cortex Data
Link. Select Disable if you are not using these licenses. To configure the device certificate
PIN, select Enable and enter the following information:
PIN ID—Enter the PIN ID.
Confirm PIN ID—Re-enter the PIN ID.
PIN Value—Enter the PIN.
Confirm VM PIN Value—Re-enter the PIN.
VM-Series Deployment Guide Version 10.1 383 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 8 | Select Firewall > Basic and enter the following details.
• AWS Key Name—The name of a SSH key you will use to log into the firewalls after they
are deployed. This key is bootstrapped into the firewall and can be used for debugging
when the firewall is up and running.
• Existing Device Group—If you select No, the plugin creates format of the device group
name. If you select Yes, select an existing Device Group from the drop-down list.
• Primary Panorama IP—The IP address of the Panorama you are using. The drop-down
displays public and private IP addresses on the management interface. Select an IP
address from the drop-down.
If you deployed Panorama behind a proxy, you must manually enter the public IP
of the primary Panorama under Panorama > Setup > Interfaces.
• Secondary Panorama IP—If you have a Panorama HA, the drop-down displays the IP
addresses on the management interface of the secondary device. Select an IP address
from the drop-down.
If the secondary Panorama has a public IP address, it may not appear in the
drop-down. In this case, you must manually add the IP address of the secondary
Panorama.
If Panorama private IP is used, routes may need to be added to the AWS route
tables for plugin deployed firewall subnets and existing Panorama subnet, in order
to facilitate connectivity between the newly deployed firewalls and Panorama.
• Min Firewalls—The minimum number of firewalls in an Auto Scaling Group (ASG). A value
between 1 and 25.
• Max Firewalls—The maximum number of firewalls in an ASG. A value between 2 and 25.
• FirewallInstanceARN—From the drop-down, choose the assume RoleARN created on
AWS cloud that is associated with the firewall instance to publish autoscaling metrics. The
drop-down displays only the RoleARNs you entered on the Setup > IAM Roles page.
VM-Series Deployment Guide Version 10.1 384 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 9 | (Optional) Select Firewall > Advanced and enter the following details.
• Autoscaling Metric—Choose a metric from the drop-down: Data Plane CPU Util Percent
(default), Active Sessions, Data Plane Packet Buffer Util Percent, or Session Util Percent.
• Scale In Threshold—Choose a value for the scale in threshold. The value depends on your
chosen metric.
• Scale Out Threshold—Choose a value for the scale out threshold. The value depends on
your chosen metric.
• Scale Out Threshold—Choose a value for the scale out threshold. The value depends on
your chosen metric.
• Jumbo Frame—Disabled by default. You can only enable this option when preparing the
initial deployment. Select Enable to enable jumbo frame support on the firewall.
VM-Series Deployment Guide Version 10.1 385 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 10 | Select whether to connect to a Transit Gateway to handle traffic routing across Security
VPC and Application VPC.
• Choose if you want to Connect to TGW. If you select Yes, be prepared to enter a TGW ID
to which you want to attach the Security VPC.
• (Optional) Select a TGW ID to which you want to attach the Security VPC.
You have to share the TGW if you want to use them across accounts. You can
share it using Resource Access Manager (RAM) on AWS. Create RAM based on
the account where the TGW is located.
• Select Application Account Names. If the TGW and Security VPC are in the same
account, select the Application Account with which you want to share the TGW. The
plugin creates the RAM on the Security Account to share the TGW across the selected
VM-Series Deployment Guide Version 10.1 386 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Application accounts. You must accept the invitation for RAM on the account you select
here.
If the TGW and Security VPC are in the same account, select an Application
account with which you want to share the TGW. If the TGW is in an Application
account, make sure that the TGW is shared on RAM.
VM-Series Deployment Guide Version 10.1 387 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Every configuration change for the deployment must be committed so that the plugin
can pick up your changes.
• Deploying—The plugin is deploying or updating the deployment. For more information, click
the hyperlink to view the detailed status.
• Failure—Deployment has failed. Click the hyperlink and view the Detailed Status for the
Security stack.
• Not Deployed—The plugin is ready to deploy the configuration, but the deployment has not
begun.
• Success—The plugin has successfully deployed the Security stack and the firewalls have
connected to Panorama. The firewalls can pass traffic.
• Warning—Deployment has successfully finished but something external to the deployment has
failed. For example, you might see this message:
FWs have not connected after 20 minutes of the deployment completing.
Click the hyperlink and view the Security stack.
Once the deployment is deployed, the plugin allows you to modify a certain subset of parameters.
Once the changes have been made, you must do a commit before clicking the Redeploy button.
When an update happens, the plugin makes sure the Panorama config is created and accurate. It
redeploys the CFT to apply any changes, and attach or detach from the configured TGW (if this
configuration was modified).
• Deploy—After you commit your initial configuration, select Deploy to launch the deployment.
• Redeploy—Modify a deployment, commit your changes, and select Redeploy.
You must commit changes to the deployment before you click Redeploy.
To remove an existing deployment and its configuration, check a deployment and select
Delete at the bottom of the Deployments page.
Detailed Status
To access the Detailed Status, click the hyperlink in the Deployment Status column. From the
detailed status you can learn where to apply configuration, view the error message from a stack
failure, or view the deployment status when it is deploying.
• Name—The deployment name.
• Status—See Deployment Status for description of each status.
• Detail—Details on the deployment you selected in Deployment Status. For example, if the
deployment was successful, displays the date and time of the deployment, or if there was a
stack failure, displays an error message.
VM-Series Deployment Guide Version 10.1 388 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• Policy Device Group—The plugin can create a policy device group for your deployment
or you can choose an existing device group to act as the policy device group for a specific
deployment.
• Config Device Group—The plugin creates a configuration device group as a child of the policy
device group. The plugin puts configuration information for the deployment in the config
device group, ensuring that your policy device group remains untouched if you remove the
deployment.
• Template Stack—Displays the template stack associated with the VM-Series firewall. Any
custom configuration is applied to this template stack.
• External IP—Displays the public IP addresses of the NAT Gateways in the Security VPC, one
for each availability zone. The outbound public IP addresses are used for all outbound traffic
from the deployment, and for outbound traffic from the VM-Series firewall management
interface.
VM-Series Deployment Guide Version 10.1 389 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The plugin creates a VPC Service Endpoint on the Security Account. The GWLB Endpoints must
be associated with the VPC Endpoint Service.
VM-Series Deployment Guide Version 10.1 390 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 391 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Use Case: Outbound Traffic - Transit Gateway and Application is in the Security Account
The plugin scan for the attachments on the configured TGW. When the plugin detects an
existing or new attachment, it makes necessary route table modifications on the Security VPC
components.
Use Case: Outbound Traffic - Transit Gateway is in Security Account and Application is in the
Application Account
When TGW is in the Security Account, to protect the applications that are not in the Security
Account, the TGW is shared across these applications using Resource Access Manager (RAM)
in the AWS console. You can choose the accounts with which you want to share the TGW from
the plugin user interface. Once the deployment is in Deploying state, monitor the RAM on the
Application Account for an invitation to share resources.
VM-Series Deployment Guide Version 10.1 392 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Use Case: Outbound Traffic - Transit Gateway and Application are in the Application Account
When TGW is the Application Account, it must be shared with the Security Account using the
RAM. To create a TGW attachment and route table, a RoleARN from this account must be added
to the IAM role used for the deployment. Use the CFT hyperlink under Setup > Application
Account to configure the Application Account prerequisites.
VM-Series Deployment Guide Version 10.1 393 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Use Case: East-West Traffic - Transit Gateway and Application1 are in the Security Account and
Application2 is in the Security Account
VM-Series Deployment Guide Version 10.1 394 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
When TGW is in the Security Account, to protect the applications that are not in the Security
Account, the TGW is shared across these applications using Resource Access Manager (RAM)
in the AWS console. You can choose the accounts with which you want to share the TGW from
the plugin user interface. Once the deployment is in Deploying state, monitor the RAM on the
Application Account for an invitation to share resources.
Use Case: East-West Traffic - Transit Gateway and Application1 are in the Application Account
and Application2 is in the Security Account
When TGW is the Application Account, it must be shared with the Security Account using the
RAM. To create a TGW attachment and route table, a RoleARN from this account must be added
to the IAM role used for the deployment. Use the CFT hyperlink under Setup > Application
Account to configure the Application Account prerequisites.
VM-Series Deployment Guide Version 10.1 395 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 396 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The VM-Series firewall supports decryption when deployed behind a GWLB for forward
and inbound use cases, including TLS1.2 and TLS1.3 utilizing DHE/ECDHE ciphers.
Deploying the VM-Series firewall behind a GWLB requires you to configure the AWS
transit gateway.
The image below describes how the integration of GWLB with VM-Series simplifies your AWS
transit gateway (TGW) environments. You attach a centralized security VPC to your transit
gateway. The centralized security VPC includes a GWLB to scale and load-balance traffic across
the stack of VM-Series firewalls.
VM-Series Deployment Guide Version 10.1 397 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
To ensure that the VM-Series firewall can inspect traffic that is routed between VPC attachments,
you must enable appliance mode on the transit gateway VPC attachment for the security VPC
containing the VM-Series firewall. You can enable appliance mode using the command:
modify-transit-gateway-vpc-attachment --transit-gateway-attachment-id
<value> --options ApplianceModeSupport=enable
VM-Series Deployment Guide Version 10.1 398 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
When deployed with a GWLB, you can use the VM-Series firewall to protect:
• Inbound traffic—traffic originating outside the VPC and destined to resources within your
application VPC, such as web servers. VM-Series firewalls prevent malware and vulnerabilities
from entering the network in traffic allowed by AWS security groups.
• Outbound traffic—traffic originating within the application VPCs and destined to external
resources on the Internet. The VM-Series firewalls protect outbound traffic flows by ensuring
that workloads in application VPCs connect to permitted services (such as Windows Update)
and allowed URL categories and preventing data exfiltration of sensitive information.
Additionally, VM-Series security profiles prevent malware and vulnerabilities from entering the
network in the return traffic.
• East-West traffic—in a transit gateway environment, East-West traffic refers to Inter-
VPC traffic, such as the traffic between source and destination workloads in two different
application VPCs. The VM-Series firewalls protect east-west traffic flows against malware
propagation.
To protect the inbound traffic to your application VPCs:
1. Create GWLBE endpoints(GWLBE1 and GWLBE2 in the figure above) having separate subnets
associated in your spoke VPCs. Ensure that you have separate subnets for GWLB Endpoints,
ALB, and Application and Transit Gateway attachment within the application VPC.
2. Add route tables in the application VPC (in addition to the VPC local route) as follows:
1. Route table with IGW edge association - Add route destined to ALB with target as GWLBE.
2. Route table with ALB subnet association - Add route destined to 0.0.0.0/0 with target as
GWLBE.
3. Route table with GWLBE subnet association - Add route destined to 0.0.0.0/0 with target
as IGW.
With these routes in place, the inbound traffic arriving at VPC IGW is routed towards GWLBE.
The GWLBE forwards the traffic to GWLB which in turn sends the traffic to the VM-Series
Firewall in the Security VPC for inspection. The firewall sends the request traffic back to the
application VPC GWLBE, which then forwards the traffic to the application through ALB.
Response traffic to this request is sent by ALB towards the application GWLBE which then
sends the traffic to GWLB. The GWLB in turn sends the traffic to the VM-Series firewall. After
inspecting the response traffic, the firewall sends the response traffic back to the application
GWLBE which in turn sends the traffic to IGW.
To protect the outbound traffic of the application VPCs:
1. Create a GWLBE(GWLBE3 in the figure above) in the centralized firewall VPC. Ensure that you
have separate subnets for GWLB Endpoint, Transit Gateway attachment, NAT Gateway within
the Security VPC.
2. Create a NAT Gateway in the Security VPC.
VM-Series Deployment Guide Version 10.1 399 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 400 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
If you associate VPC endpoints to an interface or subinterfaces via user data while
bootstrapping and your bootstrap.xml file does not include the interface configuration,
you can configure the interfaces after the firewall boots up.
VM-Series Deployment Guide Version 10.1 401 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Set up the security VPC. See the AWS documentation for more information about creating
your security VPC.
• Create two subnets—one for management and one for data.
• Create two security groups—one for firewall management and one for data.
• The management subnet security groups should allow https and ssh for management
access.
• Ensure that the security group(s) in your data VPC allows GENEVE-encapsulated packets
(UDP port 6081).
• If your deployment includes a transit gateway and traffic that will move between VPCs, you
must enable appliance mode on security VPC attachment.
The target group of the GWLB cannot use HTTP for health checks because the VM-
Series firewall does not allow access with an unsecured protocol. Instead, use another
protocol such as HTTPS or TCP.
VM-Series Deployment Guide Version 10.1 402 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
If you set the target type to the IP address of a specific interface on the
VM-Series firewall, you do not need to enable management interface
swap.
6. Accept the default Storage settings. The firewall uses volume type SSD (gp2).
7. If prompted, select an appropriate SSD option for your setup.
8. (Optional) Tagging. Add one or more tags to create your own metadata to identify
and group the VM-Series firewall. For example, add a Name tag with a Value that
VM-Series Deployment Guide Version 10.1 403 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
helps you remember that the ENI interfaces have been swapped on this VM-Series
firewall.
9. Select the data Security Group for eth0 (data interface). Enable traffic on UDP port
6081.
If you enable health checks to the firewall, you cannot use HTTP. Instead, use another
protocol such as HTTPS or TCP.
10.Select Review and Launch. Review that your selections are accurate and click Launch.
11.Select an existing key pair or create a new one, and acknowledge the key disclaimer.
This key pair is required for first time access to the firewall. It is also required
to access the firewall in maintenance mode.
12.Download and save the private key to a safe location; the file extension is .pem. You
cannot regenerate this key, if lost.
It takes 5-7 minutes to launch the VM-Series firewall. You can view the progress on
the EC2 Dashboard.When the process completes, the VM-Series firewall displays on
the Instances page of the EC2 Dashboard.
STEP 3 | Attach the management security group to eth1 (management interface). Allow ssh and https.
See the AWS Documentation for more information.
STEP 4 | Create and assign an Elastic IP address (EIP) to the ENI used for management access (eth1) to
the firewall.
1. Select Elastic IPs and click Allocate New Address.
2. Select EC2-VPC and click Yes, Allocate.
3. Select the newly allocated EIP and click Associate Address.
4. Select the Network Interface and the Private IP address associated with the
management interface and click Yes, Associate.
VM-Series Deployment Guide Version 10.1 404 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
On the VM-Series firewall CLI, you must configure a unique administrative password
before you can access the web interface of the firewall. To log in to the CLI, you require
the private key that you used to launch the firewall.
1. Use the EIP to SSH into the Command Line Interface (CLI) of the VM-Series firewall. You
will need the private key that you used or created above and using the user name admin
to access the CLI.
If you are using PuTTY for SSH access, you must convert the .pem format to a .ppk
format. See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html
2. Enter the following command to log in to the firewall:
ssh-i <private_key.pem> admin@<public-ip_address>
3. Configure a new password, using the following command and follow the onscreen
prompts:
configure
set mgt-config users admin password
4. If you have a BYOL that needs to be activated, set the DNS server IP address so that
the firewall can aceess the Palo Alto Networks licensing server. Enter the following
command to set the DNS server IP address:
set deviceconfig system dns-setting servers primary <ip_address>
5. Commit your changes with the command:
commit
6. Terminate the SSH session.
VM-Series Deployment Guide Version 10.1 405 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | Configure the dataplane network interface as a Layer 3 interface on the firewall.
On the application servers within the VPC, define the dataplane network interface of
the firewall as the default gateway.
1. Using a secure connection (https) from your web browser, log in using the EIP address
and password you assigned during initial configuration (https://<Elastic_IP address>).
You will see a certificate warning; that is okay. Continue to the web page.
2. Select Network > Interfaces > Ethernet.
3. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default virtual router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone and leave the remaining fields with default values and then click
OK.
• On the IPv4 tab, select DHCP Client.
If using DHCP, select DHCP Client; the private IP address that you assigned to the
ENI in the AWS management console will be automatically acquired.
• On the Advanced tab, create a management profile to enable HTTP service as part of
management profile creation and allow Health check probes from GWLB.
• (optional) On the IPv6 tab, select Enable IPv6 on this Interfaceand select DHCPv6
Client.
The VM-Series for AWS behind a GWLB only supports IPv6 as part of AWS
Dualstack, meaning that clients communicate with load balancers using both
IPv4 and IPv6 addresses. IPv6 only is not supported on the AWS GWLB.
Additionally, you must create security policy that allows IPv6 traffic.
4. Click Commit. Verify that the link state for the interface is up.
Because the VM-Series treats traffic as intrazone when integrated with a GWLB, a
default intrazone rule allows all traffic. It is a best practice to override the default
intrazone rule with a deny action for traffic that does not match any of your other
security policy rules.
VM-Series Deployment Guide Version 10.1 406 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
in a single VPC to the same subinterface on the firewall. Or, if your deployment has VPCs with
overlapping IP address, you can associate endpoints in different VPCs with different subinterfaces
for differentiated policy enforcement.
You can configure interfaces and associate a VPC with firewall interfaces using the following
methods:
• Include the interface configuration in your bootstrap.xml file and the association
commands as part of the init-cfg.txt file or AWS user-data.
• After deploying the firewall, manually configure your interfaces and use the firewall CLI to
associate your VPCs with interfaces.
You can associate multiple VPC endpoints to a single interface on the VM-Series firewall.
However, you must associate each VPC endpoint individually. For example, to associate
VPC endpoint 1 and VPC endpoint 2 with subinterface ethernet1/1.2, you must execute the
association command separately for each VPC endpoint.
The table below describes the commands used to associate a VPC with an interface. You can
include the operation command in your init-cfg.txt file or in the AWS user-data.
VM-Series Deployment Guide Version 10.1 407 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
When associating a VPC endpoint using the bootstrapping init-cfg.txt file or AWS user-date, you
can list multiple interfaces or subinterfaces together. All the commands must be on a single line in
a comma-separated list with no spaces as shown in the following example.
plugin-op-commands=aws-gwlb-inspect:enable,aws-gwlb-associate-
vpce:vpce-0913731043b5c0ebc@ethernet1/1.1,aws-gwlb-associate-
vpce:vpce-08207ccb4cb23a1de@ethernet1/1.1,aws-gwlb-associate-
vpce:vpce-07b66cca88821d6e1@ethernet1/1.2,aws-gwlb-associate-
vpce:vpce-0a9a583fdb928492b@ethernet1/1.3
If you are using subinterfaces to separate traffic, create a subinterface for each VPC and associate
it to a VPC.
VM-Series Deployment Guide Version 10.1 408 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
3. Repeat this command for each interface and VPC endpoint association.
VM-Series Deployment Guide Version 10.1 409 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
--------------------------------------------------------------
vpce-0aeb1a919bd4ae609 ethernet1/1.1
vpce-0294375bfe413f04a ethernet1/1.2
STEP 4 | If necessary, you can use the following command to disassociate a VPC endpoint from a
interface.
request plugins vm_series aws gwlb disassociate vpc-endpoint <vpce-
id> interface <subinterface>
Using overlay routing in your VM-Series firewall integration the AWS GWLB allows you to
use two-zone policy to inspect traffic leaving (egressing) your AWS environment. This allows
packets to leave the VM-Series firewall through a different interface than that which they entered
through.
When overlay routing is configured, the firewall is able to perform a Layer 3 route lookup a
packet’s inner header. If the destination is the same as the ingress interface, the packet will be
directed as normal. All future packets in the session are treated as vwire; as if overlay routing
was not enabled. If the packet is going to an outbound destination, the firewall decapsulates
the packet and forwards the packet to the IGW or NAT gateway. When the packet returns, the
firewall reapplies the encapsulation.
VM-Series Deployment Guide Version 10.1 410 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 4 | Use overlay routing CLI command. This CLI command is not required if you included the
overlay routing op-command in the AWS user-data or the init-cfg.txt bootstrap file.
1. Log in to the firewall command line interface.
2. Execute the following command.
request plugins vm_series aws gwlb overlay-routing enable yes
STEP 6 | Disable Automatically create default route pointing to default gateway provided by server
on the trust (ingress) interface.
1. Select Network > Interfaces > Ethernet.
2. Click on your trust interface and then the IPv4 tab.
3. Uncheck Automatically create default route pointing to default gateway provided by
server.
4. Click OK.
VM-Series Deployment Guide Version 10.1 411 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 412 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
5. Click OK.
VM-Series Deployment Guide Version 10.1 413 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
5. Ensure that the static routes can reach all application VPC in your deployment. You
can either make a few large aggregated routes (covering all RFC1918) or application
VPC specific routes. If you use subinterfaces, you do not need to route back to the sub-
interface. The egress check looks only for the matching interface instead of the matching
subinterface.
6. Click OK.
VM-Series Deployment Guide Version 10.1 414 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
This solution provides a security VPC template and an application template. The security VPC
template deploys the VM-Series firewall auto scaling group, a GWLB, a GWLBE, GWLBE subnet,
security attachment subnet, and a NAT gateway for each availability zone. Download the
CloudFormation templates from the Palo Alto Networks GitHub Repository.
The VM-Series Auto Scaling template for integration with an AWS GWLB includes the following
building blocks:
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
Firewall Based on the number of availability zones (AZs) you choose, the firewall-
template new-vpc-v3.0.template deploys the following:
(Community
supported The template supports a maximum of four AZs.
template)
• Subnets for Lambda management, transit gateway attachments, GWLB
endpoints, and NAT gateways, as well as trust subnets.
• Routes tables for each subnet
• Transit gateway attachments and route tables
VM-Series Deployment Guide Version 10.1 415 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Auto Scaling template for AWS does not deploy a transit
gateway or Panorama. You must deploy a transit gateway and
Panorama before launching firewall-new-vpc-v3.0.template.
Application Based on the number of availability zones (AZs) you choose, the panw-aws-
template app-v3.0.template deploys the following:
(Community
supported The template supports a maximum of four AZs.
template)
• Subnets for Lambda, transit gateway attachments, GWLB endpoints,
application load balancers.
• Routes tables for each subnet, as well as an inbound route table associated
with the internet gateway to direct inbound traffic to the GWLB endpoint.
• One application load balancer
• One internet gateway
• An auto scaling group with one Ubuntu instance per AZ.
The VPC CIDR for the application template should be larger than /23.
Lambda AWS Lambda provides robust, event-driven automation without the need
functions for complex orchestration software. In addition to deploying the components
described in the rows above, the firewall-new-vpc-v3.0.template
performs the following functions:
• Adds or removes an interface (ENI) when a firewall is launched or
terminated.
• Deletes all the associated resources when you delete a stack or terminate
an instance.
• Removes a firewall as a Panorama managed device when there is a scale-in
event.
VM-Series Deployment Guide Version 10.1 416 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Bootstrap files This solution requires the init-cfg.txt file and the bootstrap.xml file so that the
VM-Series firewall has the basic configuration for handling traffic.
The
bootstrap.xml • The init-cfg.txt file includes the mgmt-interface-swap operational
file provided command to enable the firewall to receive dataplane traffic on its primary
in the GitHub interface (eth0). This auto-scaling solution requires the swapping of the
repository is dataplane and management interfaces to enable the GWLB to forward
provided for web traffic to the auto-scaling tier of VM-Series firewalls.
testing and
• The bootstrap.xml file enables basic connectivity for the firewall
evaluation
network interfaces and allows the firewall to connect to the AWS
only. For a
CloudWatch namespace that matches the stack name you enter when you
production
launch the template.
deployment,
you must
modify the
sample
credentials
in the
bootstrap.xml
prior to
launch.
If you need to delete these templates from AWS, always delete the application template
first. Attempting to delete the firewall template causes the deletion to fail.
VM-Series Deployment Guide Version 10.1 417 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
authcodes (no extensions), and put the authcodes file in the /license folder of the
bootstrap package.
• Download the files required to launch the VM-Series Gateway Load Balancer template from
the GitHub repository.
• Create a Transit Gateway. This transit gateway connects your security and application
VPCs.
• Take note of the transit gateway ID; you will need it later when deploying the template.
• You must add a 0.0.0.0/0 route to the application attachment route table pointing to the
security attachment to protect east-west and outbound traffic.
• Ensure that Default route table association and Default route table propagation are
disabled.
• The recommended VPC CIDR for the firewall and application templates should be larger
than /23.
The target group of the gateway GWLB cannot use HTTP for health checks because
the VM-Series firewall does not allow access with an unsecured protocol. Instead use
HTTPS or TCP.
VM-Series Deployment Guide Version 10.1 418 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 419 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
4. Click OK.
8. Commit your changes. This is required before proceeding to the next step.
9. Create an administrator.
1. Select Device > Administrators.
2. Enter pandemo as the Name.
3. Set the Password to demopassword and Confirm.
4. Click OK.
10. Commit your changes.
STEP 5 | Configure a template stack and add the template to the template stack.
1. Select Panorama > Templates and Add Stack.
2. Enter a unique Name to identify the stack.
3. Click Add and select the template.
4. Click OK to save the template stack.
STEP 7 | Add the license deactivation API key for the firewall to Panorama.
1. Log in to the Customer Support Portal.
2. Select Assets > API Key Management.
3. Copy the API key.
4. Use the CLI to install the API key copied in the previous step.
request license api-key set key <key>
VM-Series Deployment Guide Version 10.1 420 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 8 | After deploying Panorama, you must open the following ports as described below on the
Panorama security group in AWS.
• Port 443 (HTTPS)—Upon initial deployment of the firewall template, leave HTTPS open so
Lambda can connect to Panorama.
When you secure port 443 you specify an IP address range from which you will allow
connections, as well as the EIPs assigned to the NAT gateways. The number of NAT
gateways in your deployment depends on the number of availability zones you configure.
To find NAT gateway EIPs in AWS, go to VPC > NAT Gateways. Note the EIP information
for the security group for HTTPS.
Additionally, to allow Panorama to release the firewall license after stack deletion, you must
allow traffic from the CIDR range of the region where you deployed the firewall template.
You can find the CIDR for your region at this link.
• Port 3978—Port 3978 must be able to receive traffic from any IP address.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
STEP 1 | Modify the init-cfg.txt file and upload it to the /config folder.
Because you use Panorama to bootstrap the VM-Series firewalls, your init-cfg.txt file
should be modified as follows. No bootstrap.xml file is needed.
Ensure that you use the device group and template names you created above in the init-cfg.txt
file.
type=dhcp-client
ip-address=
default-gateway=
netmask=
ipv6-address=
ipv6-default-gateway=
hostname=
vm-auth-key=
panorama-server=
panorama-server-2=
tplname=
dgname=
dhcp-send-hostname=yes
dhcp-send-client-id=yes
dhcp-accept-server-hostname=yesdhcp-accept-server-domain=yes
plugin-op-commands=aws-gwlb-inspect:enable
VM-Series Deployment Guide Version 10.1 421 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Add the license auth code in the /license folder of the bootstrap package.
1. Use a text editor to create a new text file named authcodes (no extension).
2. Add the authcode for your BYOL licenses to this file, and save. The authcode must
represent a bundle, and it must support the number of firewalls that might be required
for your deployment. If you use individual authcodes instead of a bundle, the firewall
only retrieves the license key for the first authcode in the file.
STEP 3 | Upload Lambda code for the firewall template (panw-aws.zip) and the Application
template (app.zip) to an S3 bucket. You can use the same S3 bucket that you use for
bootstrapping.
If the Application stack is managed by a different account than the firewall, use the Application
account to create another s3 bucket in the same AWS region as the firewall template and copy
app.zip to that s3 bucket.
STEP 5 | Enter a descriptive Name for your stack. The name must be 28 characters or less.
VM-Series Deployment Guide Version 10.1 422 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 8 | Specify the keys for enabling API access to the firewall and Panorama.
1. Enter the key that the firewall must use to authenticate API calls. The default key is
based on the sample file and you should only use it for testing and evaluation. For a
production deployment, you must create a separate PAN-OS login just for the API call
and generate an associated key.
2. Enter the API Key to allow AWS Lambda to make API calls to Panorama. For a
production deployment, you should create a separate login just for the API call and
generate an associated key.
STEP 9 | Add your AWS account number(s). You must provide the account number used to deploy
any VPC that is connected to your GWLB. Add these values as a comma-separated list. You
can add additional account numbers after deploying the template.
To locate your account number, click your AWS username in the top right of the AWS console
and select My Security Credentials.
STEP 10 | Enter the transit gateway ID. The transit gateway ID is required to secure east-west and
outbound traffic. If you do not enter a transit gateway ID, the template assumes that only
inbound traffic should be inspected by firewalls integrated with the GWLB.
STEP 13 | Verify that the template has launched all required resources.
STEP 14 | Create rules allowing the NAT gateway IP address(es) on the security group where your
Panorama appliance is deployed. This is required to allow your firewalls to connect to
VM-Series Deployment Guide Version 10.1 423 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Panorama. You can find the list of NAT gateway IP addresses in the CFT security stack
output.
VM-Series Deployment Guide Version 10.1 424 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 3 | Select the application launch template you want you launch.
1. In the AWS Management Console, select CloudFormation > CreateStack
2. Select Upload a template to Amazon S3, to choose the application template to deploy
the resources that the template launches within the same VPC as the firewalls, or to a
different VPC. Click Open and Next.
3. Specify the Stack name. The stack name allows you to uniquely identify all the resources
that are deployed using this template.
STEP 4 | Select the Availability Zones (AZ) that your setup will span in Select list of AZ.
VM-Series Deployment Guide Version 10.1 425 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 7 | Select the EC2 instance type for the Ubuntu web server launched by this template.
VM-Series Deployment Guide Version 10.1 426 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 9 | Enter the name of the service configuration (Service Name) for the GWLB endpoint in the
security VPC.
1. Select DynamoDB from the Services drop-down in the AWS console.
2. Select Tables and locate your security VPC table. The table name will be <stack name>-
gwlb-<region>. For example—cft-deployment-gwlb-us-east-1.
3. Click the Items tab and copy the Service Name.
4. Paste the Service Name into the application template configuration parameters.
VM-Series Deployment Guide Version 10.1 427 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 10 | Enter the transit gateway ID. This is the same transit gateway you created before deploying
the firewall template.
STEP 12 | After the application has been deployed, you must add a route to the transit gateway route
table to enable east-west and outbound traffic inspection.
1. Log in to the AWS VPC console.
2. Select Transit Gateway Route Tables and choose your transit gateway route table.
This route table is created by the template and is called <app-stack-name>-<region>-
PANWAppAttRt.
3. Select Routes and click Create static route.
4. Enter 0.0.0.0/0 in the CIDR field.
5. From the Choose attachment drop-down, select the VM-Series firewall VPC attachment.
6. Click Create static route.
STEP 13 | (Optional) Create a bastion host (also called a jump box) to access the web server created by
the application template.
1. Create a public-facing subnet in your application VPC.
2. Add a route to this subnet from your IP address to the internet gateway.
3. Create a new EC2 instance in the public subnet with a public IP address.
4. Create a security group for this EC2 instance that allows SSH from your IP address.
VM-Series Deployment Guide Version 10.1 428 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Overview of HA on AWS
To ensure redundancy, you can deploy the VM-Series firewalls on AWS in an active/passive
high availability (HA) configuration. The active peer continuously synchronizes its configuration
and session information with the identically configured passive peer. A heartbeat connection
between the two devices ensures failover if the active device goes down. There are two options
for deploying the VM-Series firewall on AWS in HA—Secondary IP move and Dataplane Interface
(ENI) move.
To ensure that all traffic to your internet-facing applications passes through the firewall, you
have two options. You can either configure the application’s public IP address on the Untrust
interface (E1/2 in the illustration above) of the VM-Series firewall, or you can configure AWS
ingress routing. The AWS ingress routing capability allows you to associate route tables with the
AWS Internet gateway and add route rules to redirect the application traffic through the VM-
Series firewall. This redirection ensures that all internet traffic passes through the firewall without
having to reconfigure the application endpoints.
Secondary IP Move
When the active peer goes down, the passive peer detects this failure and becomes active.
Additionally, it triggers API calls to the AWS infrastructure to move the configured secondary IP
VM-Series Deployment Guide Version 10.1 429 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
addresses from the dataplane interfaces of the failed peer to itself. Additionally, AWS updates the
route tables to ensure that traffic is directed to the active firewall instance. These two operations
ensure that inbound and outbound traffic sessions are restored after failover. This option allows
you to take advantage of DPDK to improve the performance of your VM-Series firewall instances
and provides better failover time than interface-move HA, while supporting all the features
provided by interface-move.
VM-Series Deployment Guide Version 10.1 430 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
application can use upon assuming the role, refer to the AWS documentation on IAM Roles for
Amazon EC2.
The IAM policy, which is configured in the AWS console, must have permissions for the following
actions and resources (at a minimum):
The following IAM actions, permissions, and resources are required to enable HA. To
enable AWS Cloudwatch monitoring, see Enable CloudWatch Monitoring on the VM-
Series Firewall
for the required IAM action.
DetachNetworkInterface
For permission to detach the ENI
from the EC2 instance.
AssignPrivateIpAddresses
For permissions to assign
secondary IP addresses and
associated public IP addresses to
interfaces on the passive peer.
VM-Series Deployment Guide Version 10.1 431 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
ListAttachedRolePolicies
For permission to retrieve the list
of all managed policies attached to
a specified IAM role.
The following screenshot shows the access management settings for the IAM role described
above for secondary-IP HA:
VM-Series Deployment Guide Version 10.1 432 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The minimum permissions you need for interface move HA are: { "Version":"2012-10-17",
"Statement":[ { "Sid":"VisualEditor0", "Effect":"Allow", "Action":
[ "ec2:AttachNetworkInterface", "ec2:DetachNetworkInterface",
"ec2:DescribeInstances", "ec2:DescribeNetworkInterfaces" ],
"Resource":"*" } ]}
The minimum permissions you need for secondary IP move HA
are:{ "Statement": [ { "Action": [ "ec2:AttachNetworkInterface",
"ec2:DetachNetworkInterface", "ec2:DescribeInstances",
"ec2:DescribeNetworkInterfaces", "ec2:AssignPrivateIpAddresses",
"ec2:AssociateAddress", "ec2:DescribeRouteTables" ], "Effect":
"Allow", "Resource": [ "*" ], "Sid": "VisualEditor0" },
{ "Action": "ec2:ReplaceRoute", "Effect": "Allow", "Resource":
"arn:aws:ec2:*:*:route-table/*", "Sid": "VisualEditor1" } ], "Version":
"2012-10-17"}
VM-Series Deployment Guide Version 10.1 433 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
HA Links
The devices in an HA pair use HA links to synchronize data and maintain state information. on
AWS, the VM-Series firewall uses the following ports:
• Control Link—The HA1 link is used to exchange hellos, heartbeats, and HA state information,
and management plane sync for routing and User-ID information. This link is also used to
synchronize configuration changes on either the active or passive device with its peer.
The Management port is used for HA1. TCP port 28769 and 28260 for cleartext
communication; port 28 for encrypted communication (SSH over TCP).
• Data Link—The HA2 link is used to synchronize sessions, forwarding tables, IPSec security
associations and ARP tables between devices in an HA pair. Data flow on the HA2 link is
always unidirectional (except for the HA2 keep-alive); it flows from the active device to the
passive device.
Ethernet1/1 must be assigned as the HA2 link; this is required to deploy the VM-Series firewall
on AWS in HA. The HA data link can be configured to use either IP (protocol number 99) or
UDP (port 29281) as the transport.
The VM-Series firewall on AWS does not support backup links for HA1 or HA2.
VM-Series Deployment Guide Version 10.1 434 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
HA Timers
High availability (HA) timers are used to detect a firewall failure and trigger a failover. To reduce
the complexity in configuring HA timers, you can select from three profiles: Recommended,
Aggressive, and Advanced. These profiles auto-populate the optimum HA timer values for the
specific firewall platform to enable a speedier HA deployment.
Use the Recommended profile for typical failover timer settings and the Aggressive profile for
faster failover timer settings. The Advanced profile allows you to customize the timer values to
suit your network requirements.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 435 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Before you deploy the VM-Series firewalls for you HA pair, ensure the following:
• Refer to the VPC Planning Worksheet to ensure that your VPC is prepared for the VM-
Series firewall.
• Secondary IP Move HA requires VM-Series plugin 2.0.1 or later.
• Deploy both HA peers in the same AWS availability zone.
Starting with VM-Series plugin 2.0.3, you can deploy the HA peers in different availability
zones. Although this type of deployment is not recommended, it is supported.
• Create an IAM role and assign the role to the VM-Series firewalls when you deploy the
instances.
• The active and passive firewalls must have at least four interfaces each—a management
interface, an HA2 interface, an untrust interface, and a trust interface. Additionally, the trust
and untrust interfaces on the active firewall must assigned a secondary IP address.
The management interface must be used as the HA1 interface.
• Verify that the network and security components are defined suitably.
• Enable communication to the internet. The default VPC includes an internet gateway,
and if you install the VM-Series firewall in the default subnet it has access to the
internet.
• Create subnets. Subnets are segments of the IP address range assigned to the VPC in
which you can launch the EC2 instances. The VM-Series firewall must belong to the
public subnet so that it can be configured to access the internet.
• Create a data security group that includes the firewall data interfaces. Additionally,
configure the security to allow all traffic (0.0.0.0/0), so security is enforced by the
firewalls. This is required to maintain existing sessions during failover.
• Add routes to the route table for a private subnet to ensure that traffic can be routed
across subnets and security groups in the VPC, as applicable.
• If you are bootstrapping the firewall, create the necessary S3 bucket containing the
required bootstrap files.
VM-Series Deployment Guide Version 10.1 436 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 437 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
4. Click your route table and select Actions > Edit edge associations.
5. Select Internet gateways and choose your VPC internet gateway.
6. Click Save.
7. Click your route table and select Actions > Edit routes.
8. For the Target, select Network Interface and choose the untrust interface of the
active firewall.
9. Click Save routes.
STEP 3 | Configure the interfaces on the firewall. You must configure the HA2 data link and at least
two Layer 3 interfaces for your untrust and trust interfaces. Complete this workflow on the
first HA peer and then repeat the steps on the second HA peer.
1. Log in to the firewall web interface.
2. Select Network > Interfaces > Ethernet and click on your untrust interface. In this
example, the HA2 interface is 1/1, the trust interface is ethernet 1/2, and the untrust
interface is ethernet 1/3.
3. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: HA
4. Click the link for ethernet 1/2 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example trust-zone, and then click OK.
• On the IPv4 tab, select DHCP Client.
• Check Enable.
• On the untrust interface, check Automatically create default route pointing to
default gateway provided by server. This option tells the firewall to create a static
route to a default gateway.
• Repeat these steps for ethernet 1/3.
5. Repeat the above steps on the passive peer.
VM-Series Deployment Guide Version 10.1 438 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
5. Edit the Election Settings to specify a particular firewall to be the active peer. Enter a
lower numerical Device Priority value on the active firewall. If both firewalls have the
same Device Priority value, the firewall with the lowest MAC value on the HA1 control
becomes the active firewall.
6. Click OK.
7. Commit your changes.
8. Repeat the above steps on the passive peer.
STEP 5 | Set up the Control Link (HA1) to use the management port.
1. Select Device > High Availability > General, and edit the Control Link (HA1) section.
2. (Optional) Select Encryption Enabled, for secure HA communication between the peers.
To enable encryption, you must export the HA key from a device and import it into the
peer device.
1. Select Device > Certificate Management > Certificates.
2. Select Export HA key. Save the HA key to a network location that the peer device can
access.
3. On the peer device, navigate to Device > Certificate Management > Certificates, and
select Import HA key to browse to the location that you saved the key and import it
in to the peer device.
VM-Series Deployment Guide Version 10.1 439 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
7. (Optional) Modify the Threshold for HA2 Keep-alive packets. By default, HA2 Keep-
alive is enabled for monitoring the HA2 data link between the peers. If a failure occurs
and this threshold (default is 10000 ms) is exceeded, the defined action will occur. A
critical system log message is generated when an HA2 keep-alive failure occurs.
You can configure the HA2 keep-alive option on both devices, or just one device
in the HA pair. If you enable this option on one device, only that device will send
the keep-alive messages.
STEP 7 | After your finish configuring HA on both firewalls, verify that the firewalls are paired in
active/passive HA.
1. Access the Dashboard on both firewalls and view the High Availability widget.
2. On the active HA peer, click Sync to peer.
3. Confirm that the firewalls are paired and synced.
• On the passive firewall: the state of the local firewall should display Passive and the
Running Config should show as Synchronized.
• On the active firewall: the state of the local firewall should display Active and the
Running Config should show as Synchronized.
4. From the firewall command line interface, execute the following commands:
• To verify failover readiness:
show plugins vm_series aws ha state
• To show secondary IP mapping:
show plugins vm_series aws ha ips
VM-Series Deployment Guide Version 10.1 440 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
Do not attach additional dataplane interfaces to the passive firewall in the HA pair.
On failover, the dataplane interfaces from the previously active firewall are moved
—detached and then attached—to the now active (previously passive) firewall.
• The HA peers must be deployed in the same AWS availability zone. While VM-Series HA
Across AWS Availability Zones is not a recommended solution, it is supported.
STEP 3 | (VM-Series plugin 2.0.1 or later) Disable DPDK on the active and passive firewalls. DPDK
is enabled by default and interface-move HA mode does not support DPDK, so you must
disable it; enabling Packet MMAP.
1. Log in to the passive firewall CLI.
2. Disable DPDK using the following command. Executing this command restarts the
firewall.
admin@PA-VM> set system setting dpdk-pkt-io off
VM-Series Deployment Guide Version 10.1 441 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 5 | Configure ethernet 1/1 as an HA interface. This interface must be used for HA2
communication.
1. Select Network > Interfaces.
2. Confirm that the link state is up on ethernet1/1.
3. Click the link for ethernet1/1 and set the Interface Type to HA.
STEP 6 | Set up the Control Link (HA1) to use the management port.
1. Select Device > High Availability > General, and edit the Control Link (HA1) section.
2. (Optional) Select Encryption Enabled, for secure HA communication between the peers.
To enable encryption, you must export the HA key from a device and import it into the
peer device.
1. Select Device > Certificate Management > Certificates.
2. Select Export HA key. Save the HA key to a network location that the peer device can
access.
3. On the peer device, navigate to Device > Certificate Management > Certificates, and
select Import HA key to browse to the location that you saved the key and import it
in to the peer device.
VM-Series Deployment Guide Version 10.1 442 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
7. (Optional) Modify the Threshold for HA2 Keep-alive packets. By default, HA2 Keep-
alive is enabled for monitoring the HA2 data link between the peers. If a failure occurs
and this threshold (default is 10000 ms) is exceeded, the defined action will occur. A
critical system log message is generated when an HA2 keep-alive failure occurs.
You can configure the HA2 keep-alive option on both devices, or just one device
in the HA pair. If you enable this option on one device, only that device will send
the keep-alive messages.
If both firewalls have the same device priority value, the firewall with the lowest
MAC address on the HA1 control link will become the active device.
3. Select Preemptive.
You must enable preemptive on both the active and the passive device.
4. Modify the failover timers. By default, the HA timer profile is set to the Recommended
profile and is suited for most HA deployments.
VM-Series Deployment Guide Version 10.1 443 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 12 | After you finish configuring both devices, verify that the devices are paired in active/passive
HA.
1. Access the Dashboard on both devices, and view the High Availability widget.
2. On the active device, click the Sync to peer link.
3. Confirm that the devices are paired and synced, as shown below:
• On the passive device: The state of the local device should display passive and the
configuration is synchronized.
• On the active device: The state of the local device should display active and the
configuration is synchronized.
VM-Series Deployment Guide Version 10.1 444 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Upgrade the VM-Series Plugin on the passive HA peer and then the active peer.
STEP 2 | Create secondary IP address for all data interfaces on the active peer.
1. Log in to the AWS EC2 console.
2. Select Network Interface and then choose then select your network interface.
3. Select Actions > Manage IP Addresses > IPv4 Addresses > Assign new IP.
4. Leave the field blank to allow AWS to assign an IP address dynamically or enter an IP
address within the subnet range for the VM-Series firewall.
5. Click Yes and Update.
STEP 3 | Associate a secondary Elastic (public) IP address with the untrust interface of the active peer.
1. Log in to the AWS EC2 console.
2. Select Elastic IPs and then choose then select the Elastic IP address to associate.
3. Select Actions > Associate Elastic IP.
4. Under Resource Type, select Network Interface.
5. Chose the network interface with which to associate the Elastic IP address.
6. Click Associate.
STEP 4 | Create a route table pointing the subnet containing the trust interface.
1. Select Route Tables > Create route table.
2. (Optional) Enter a descriptive Name tag for your route table.
3. Select your VPC.
4. Click Create.
5. Select Subnet Associations > Edit subnet associations.
6. Select the Associate checkbox for the subnet containing the trust interface.
7. Click Save.
VM-Series Deployment Guide Version 10.1 445 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 5 | Update the IAM roles with additional actions and permissions required to migrate to
secondary IP move HA.
Wild card (*) In the ARN field use the * as a wild card.
VM-Series Deployment Guide Version 10.1 446 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | Create new interfaces (ENIs) on the passive firewall in the same subnet as the active firewall
data interfaces.
STEP 7 | Attach the new ENIs to the passive firewall instance. You must attach these ENIs to the
passive firewall in the correct order because the secondary IP HA method is based on the
network interface index assigned by AWS. For example, if eth1/2 on the active firewall is
part of subnet A and eth1/3 is part of subnet B, then you must attach the interface that is
part of subnet A and the interface that is part of subnet B. In this example, AWS has assigned
an index value of 2 to eth1/2 and a value of 3 to eth1/3. This indexing must be maintained
for the failover to occur successfully.
1. To attach the ENIs created above, select the untrust interface your created and click
Attach.
2. Select the Instance ID of the of the passive firewall and click Attach.
3. Repeat these steps for the trust interface.
STEP 8 | Log into the passive and set the interfaces to get their IP addresses through DHCP.
1. Log in to the passive VM-Series firewall web interface.
2. Select Network > Interfaces.
3. Click on the first data interface.
4. Select IPv4.
5. Select DHCP Client.
6. On the untrust interface only, select Automatically create default route pointing to
default gateway provided by server.
7. Click OK.
8. Repeat this process for each data interface.
VM-Series Deployment Guide Version 10.1 447 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 9 | If you have configure any NAT policies on the VM-Series firewall that reference the private
IP addresses of the data interfaces, those policies must be updated to reference the newly
assigned secondary IP addresses instead.
1. Access the web interface of the active VM-Series firewall.
2. Select Policies > NAT.
3. Click on the NAT policy rule to be modified and then Translated Packet.
4. Under Translated Address, click Add and enter the secondary IP address created in
AWS.
5. Delete the primary IP address.
6. Click OK.
7. Repeat these steps as necessary.
8. Commit your changes.
STEP 11 | After your finish configuring HA on both firewalls, verify that the firewalls are paired in
active/passive HA.
1. Access the Dashboard on both firewalls and view the High Availability widget.
2. On the active HA peer, click Sync to peer.
3. Confirm that the firewalls are paired and synced.
• On the passive firewall: the state of the local firewall should display Passive and the
Running Config should show as Synchronized.
• On the active firewall: the state of the local firewall should display Active and the
Running Config should show as Synchronized.
4. From the firewall command line interface, execute the following commands:
• To verify failover readiness:
show plugins vm_series aws ha state
• To show secondary IP mapping :
show plugins vm_series aws ha ips
VM-Series Deployment Guide Version 10.1 448 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Disable DPDK support on the passive HA peer. Interface-move HA mode does not support
DPDK, so you must disable it; enabling Packet MMAP.
1. Log in to the passive firewall CLI.
2. Disable DPDK using the following command. Executing this command restarts the
firewall.
admin@PA-VM> set system setting dpdk-pkt-io off
STEP 3 | Change the HA mode on the active peer from secondary-IP mode to interface-move mode.
1. Access the VM-Series firewall CLI on the active peer.
2. Execute the following command.
request plugins vm_series aws ha failover-mode interface-move
3. Commit your changes.
4. Comfirm your HA mode by executing the following command.
show plugins vm_series aws ha failover-mode
5. Repeat this command on the passive peer.
STEP 4 | Delete the data interfaces from the passive firewall instance.
1. Log in to the AWS EC2 console.
2. Select Network Interfaces.
3. Select a data interface on the passive firewall instance and click Delete.
4. In the Delete Network Interface window, click Yes, Delete.
5. Repeat this process for each data interface on the passive firewall instance.
VM-Series Deployment Guide Version 10.1 449 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The following image depicts the logical flow of traffic to/from the web server to the internet.
Traffic to/from the web server is sent to the data interface of the VM-Series firewall that is
attached to the private subnet. The firewall applies policy and processes incoming/outgoing traffic
from/to the internet gateway of the VPC. The image also shows the security groups to which the
data interfaces are attached.
VM-Series Deployment Guide Version 10.1 450 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Create a new VPC with a public subnet (or select an existing VPC).
1. Log in to the AWS console and select the VPC Dashboard.
2. Verify that you’ve selected the correct geographic area (AWS region). The VPC will be
deployed in the currently selected region.
3. Select Start VPC Wizard, and select VPC with a Single Public Subnet.
In this example, the IP CIDR block for the VPC is 10.0.0.0/16, the VPC name is Cloud
DC, the public subnet is 10.0.0.0/24, and the subnet name is Cloud DC Public subnet.
You will create a private subnet after creating the VPC.
VM-Series Deployment Guide Version 10.1 451 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
To direct outbound traffic from each subnet, you will add routes to the route table associated
with each subnet, later in this workflow.
1. Select Route Tables > Create Route Table.
2. Add a Name, for example CloudDC-public-subnet-RT, select the VPC you created in
Step 1, and click Yes, Create.
3. Select the route table, click Subnet Associations and select the public subnet.
VM-Series Deployment Guide Version 10.1 452 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 4 | Create Security Groups to restrict inbound/outbound internet access to the EC2 instances in
the VPC.
By default, AWS disallows communication between interfaces that do not belong to the same
security group.
Select Security Groups and click the Create Security Group button. In this example, we create
three security groups with the following rules for inbound access:
• CloudDC-Management that specifies the protocols and source IP addresses that can
connect to the management interface of the VM-Series firewall. At a minimum you need
SSH, and HTTPS. In this example, we enable SSH, ICMP, HTTP, and HTTPS on the network
interfaces that are attached to this security group.
The management interface (eth 0/0) of the VM-Series firewall will be assigned to CloudDC-
management-sg.
• Public-Server-CloudDC that specifies the source IP addresses that can connect over
HTTP, FTP, SSH within the VPC. This group allows traffic from the external network to the
firewall.
The dataplane interface eth1/1 of the VM-Series firewall will be assigned to Public-Server-
CloudDC.
• Private-Server-CloudDC that has very limited access. It only allows other EC2 instances on
the same subnet to communicate with each other, and with the VM-Series firewall.
The dataplane interface eth1/2 of the VM-Series firewall and the application in the private
subnet will be attached to this security group.
The following screenshot shows the security groups for this use case.
Only the primary network interface that will serve as the management interface will
be attached and configured for the firewall during the initial launch. The network
interfaces required for handling data traffic will be added in Step 6.
VM-Series Deployment Guide Version 10.1 453 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | Create and attach virtual network interface(s), referred to as Elastic Network Interfaces
(ENIs), to the VM-Series firewall. These ENIs are used for handling data traffic to/from the
firewall.
1. On the EC2 Dashboard, select Network Interfaces, and click Create Network Interface.
2. Enter a descriptive name for the interface.
3. Select the subnet. Use the subnet ID to make sure that you have selected the correct
subnet. You can only attach an ENI to an instance in the same subnet.
4. Enter the Private IP address that you want to assign to the interface or select Auto-
assign to automatically assign an IP address within the available IP addresses in the
selected subnet.
5. Select the Security group to control access to the network interface.
6. Click Yes, Create.
In this example, we create two interfaces with the following configuration:
VM-Series Deployment Guide Version 10.1 454 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 7 | Create an Elastic IP address and attach it to the firewall dataplane network interface that
requires direct internet access.
In this example, VM-Series_Untrust is assigned an EIP. The EIP associated with the interface is
the publicly accessible IP address for the web server in the private subnet.
1. Select Elastic IPs and click Allocate New Address.
2. Select EC2-VPC and click Yes, Allocate.
3. Select the newly allocated EIP and click Associate Address.
4. Select the Network Interface and the Private IP address associated with the interface
and click Yes, Associate.
STEP 8 | Disable Source/Destination check on each network interface attached to the VM-Series
firewall. Disabling this attribute allows the interface to handle network traffic that is not
destined to its IP address.
1. Select the network interface in the Network Interfaces tab.
2. In the Action drop-down, select Change Source/Dest. Check.
3. Click Disabled and Save your changes.
4. Repeat steps 1-3 for additional network interfaces, firewall-1/2 in this example.
VM-Series Deployment Guide Version 10.1 455 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 9 | In the route table associated with the public subnet (from step 3), add a default route to the
internet gateway for the VPC.
1. From the VPC Dashboard, select Route Tables and find the route table associated with
the public subnet.
2. Select the route table, select Routes and click Edit.
3. Add a route to forward packets from this subnet to the internet gateway. In this
example, 0.0.0.0.0 indicates that all traffic from/to this subnet will use the internet
gateway attached to the VPC.
STEP 10 | In the route table associated with the private subnet, add a default route to send traffic to
the VM-Series firewall.
Adding this route enables the forwarding of traffic from the EC2 instances in this private
subnet to the VM-Series firewall.
1. From the VPC Dashboard, select Route Tables and find the route table associated with
the private subnet.
2. Select the route table, select Routes and click Edit.
3. Add a route to forward packets from this subnet to the VM-Series firewall network
interface that resides on the same subnet. In this example, 0.0.0.0/0 indicates that all
traffic from/to this subnet will use eni-abf355f2 (ethernet 1/2, which is CloudDC-VM-
Series-Trust) on the VM-Series firewall.
For each web or database server deployed on an EC2 instance in the private
subnet, you must define a default route to the IP address of the VM-Series
firewall so that the firewall is the default gateway for the server.
VM-Series Deployment Guide Version 10.1 456 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
An SSH tool such as PuTTY is required to access the CLI on the firewall and change the
default administrative password. You cannot access the web interface until you SSH
and change the default password.
1. Use the public IP address you configured on the firewall, to SSH into the Command Line
Interface (CLI) of the VM-Series firewall.
You will need the private key that you used or created in Launch the VM-Series Firewall
on AWS, steps 3-12 to access the CLI.
2. Enter the following command to log in to the firewall:
ssh-i <private_key_name> admin@<public-ip_address>
3. Configure a new password, using the following command and follow the onscreen
prompts:
configure
set mgt-config users admin password
commit
4. Terminate the SSH session.
STEP 13 | Activate the licenses on the VM-Series firewall. This step is only required for the BYOL
license; the usage-based licenses are automatically activated.
See Activate the License.
VM-Series Deployment Guide Version 10.1 457 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 14 | On the VM-Series firewall, configure the dataplane network interfaces on the firewall as
Layer 3 interfaces.
1. Select Network > Interfaces > Ethernet.
2. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: Layer3
• Select the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example untrust, and then click OK.
• Select IPv4, select DHCP Client; the private IP address that you assigned to the
network interface in the AWS management console will be acquired automatically.
• On the Advanced > Other Info tab, expand the Management Profile drop-down, and
select New Management Profile.
• Enter a Name for the profile, such as allow_ping, and select Ping from the Permitted
Services list, then click OK.
• To save the interface configuration, click OK.
3. Click the link for ethernet 1/2 and configure as follows:
• Interface Type: Layer3
• Select the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example trust, and then click OK.
• Select IPv4, select DHCP Client.
• On the IPv4 tab, clear the Automatically create default route to default gateway
provided by server check box. For an interface that is attached to the private subnet
in the VPC, disabling this option ensures that traffic handled by this interface does not
flow directly to the IGW on the VPC.
• On the Advanced > Other Info, expand the Management Profile drop-down, and
select the allow_ping profile you created earlier.
• Click OK to save the interface configuration.
4. Click Commit to save the changes. Verify that the Link state for the interface is up . If
the link state is not up, reboot the firewall.
VM-Series Deployment Guide Version 10.1 458 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 15 | On the VM-Series firewall, create Destination NAT and Source NAT rules to allow inbound/
outbound traffic to/from the applications deployed within the VPC.
1. Select Policies > NAT.
2. Create a Destination NAT rule that steers traffic from the firewall to the web server.
1. Click Add, and enter a name for the rule. For example, NAT2WebServer.
2. In the Original Packet tab, make the following selections:
• Source Zone: untrust (where the traffic originates)
• Destination Zone: untrust (the zone for the firewall dataplane interface with which
the EIP for the web server is associated.)
• Source Address: Any
• Destination Address: 10.0.0.10
• In the Translated Packet tab, select the Destination Address Translation check box
and set the Translated Address: to 10.0.1.62, which is the private IP address of the
web server.
3. Click OK.
3. Create a Source NAT rule to allow outbound traffic from the web server to the internet.
1. Click Add, and enter a name for the rule. For example, NAT2External.
2. In the Original Packet tab, make the following selections:
• Source Zone: trust (where the traffic originates)
• Destination Zone: untrust (the zone for the firewall dataplane interface with which
the EIP for the web server is associated.)
• Source Address: Any
• Destination Address: Any
3. In the Translated Packet tab, make the following selections in the Source Address
Translation section:
• Translation Type: Dynamic IP and Port
• Address Type: Translated Address
• Translated Address: 10.0.0.10 (the firewall dataplane interface in the untrust
zone.)
4. Click OK.
VM-Series Deployment Guide Version 10.1 459 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Instead of entering a static IP address for the web server, use a dynamic address
group. Dynamic address groups allow you to create policy that automatically adapts
to changes so that you do not need to update the policy when you launch additional
web servers in the subnet. For details, see Use Case: Use Dynamic Address Groups
to Secure New EC2 Instances within the VPC.
VM-Series Deployment Guide Version 10.1 460 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
access to the web server, and in the last rule we modify a predefined intrazone-default
rule to log all traffic that is denied.
2. Create a rule to allow management access to the firewall.
1. Click Add and enter a Name for the rule. Verify that the Rule Type is universal.
2. In the Source tab, add untrust as the Source Zone.
3. In the Destination tab, add trust as the Destination Zone.
4. In the Applications tab, Add ping and ssh.
5. In the Actions tab, set the Action to Allow.
6. Click OK.
5. Edit the interzone-default rule to log all traffic that is denied. This predefined interzone
rule is evaluated when no other rule is explicitly defined to match traffic across different
zones.
1. Select the interzone-default rule and click Override.
VM-Series Deployment Guide Version 10.1 461 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• Traffic outbound from the web server (EC2 instance in the AWS VPC):
VM-Series Deployment Guide Version 10.1 462 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Instead of using VM Information Source on the firewall, you can opt to use Panorama as
the central point for communicating with your VPCs. Using the AWS plugin on Panorama,
you can retrieve the IP address-to-tag mapping and register the information on the
managed firewalls for which you configure notification. For more details on this option,
see VM Monitoring with the AWS Plugin on Panorama.
This workflow in the following section assumes that you have created the AWS VPC and
deployed the VM-Series firewall and some applications on EC2 instances. For instructions on
setting up the VPC for the VM-Series, see Use Case: Secure the EC2 Instances in the AWS Cloud.
STEP 1 | Configure the firewall to monitor the VPC.
1. Select Device > VM Information Sources.
2. Click Add and enter the following information:
1. A Name to identify the VPC that you want to monitor. For example, VPC-CloudDC.
2. Set the Type to AWS VPC.
3. In Source, enter the URI for the VPC. The syntax is
ec2.<your_region>.amazonaws.com
4. Add the credentials required for the firewall to digitally sign API calls made to the
AWS services. You need the following:
• Access Key ID: Enter the alphanumeric text string that uniquely identifies the user
who owns or is authorized to access the AWS account.
• Secret Access Key: Enter the password and confirm your entry.
5. (Optional) Modify the Update interval to a value between 5-600 seconds. By default,
the firewall polls every 5 seconds. The API calls are queued and retrieved within
VM-Series Deployment Guide Version 10.1 463 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
every 60 seconds, so updates may take up to 60 seconds plus the configured polling
interval.
6. Enter the VPC ID that is displayed on the VPC Dashboard in the AWS management
console.
7. Click OK, and Commit the changes.
8. Verify that the connection Status displays as connected
VM-Series Deployment Guide Version 10.1 464 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The plugin sends the IP addresses to the tags in the Panorama shared dynamic
address group objects even if the tags are not attached to any security policy.
However, for PA-VM, the IP addresses of the shared dynamic address group
objects are not visible if the tags are not attached to a security policy.
The plugin pushes the IP-tag payloads only to the device groups that are
included in the Notify Groups of the plugin configuration. Make sure to add
all child device groups in the device group hierarchy when configuring Notify
Groups to view the IP-tag mapping.
4. Select Type as Dynamic.
5. Define the match criteria.
1. Click Add Match Criteria, and select the And operator.
2. Select the attributes to filter for or match against. In this example, we select the
ExternalAccessAllowed tag that you just created and the subnet ID for the private
subnet of the VPC.
6. Click OK.
7. Click Commit.
VM-Series Deployment Guide Version 10.1 465 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 5 | Verify that members of the dynamic address group are populated on the firewall.
Policy will be enforced for all IP addresses that belong to this address group, and are displayed
here.
1. Select Policies > Security, and select the rule.
2. Select the drop-down arrow next to the address group link, and select Inspect. You can
also verify that the match criteria is accurate.
3. Click the more link and verify that the list of registered IP addresses is displayed.
VM-Series Deployment Guide Version 10.1 466 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 467 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
and the GlobalProtect app. Additionally, for access to corporate resources, you must set up an
IPSec VPN connection between the VM-Series firewalls on AWS and the firewall in the corporate
headquarters using LSVPN (a hub and spoke VPN deployment).
• The GlobalProtect agent/app is installed on each end-user system that is allowed to access
corporate applications and resources. The agent first connects to the portal to obtain
information on the gateways and then establishes a secure VPN connection to the closest
GlobalProtect gateway. The VPN connection between the end-user system and the gateway
ensures data privacy.
• The GlobalProtect portal provides the management functions for the GlobalProtect
infrastructure. Every end-user system receives configuration information from the portal,
including information about available gateways as well as any client certificates that may be
required to connect to the GlobalProtect gateway(s). In this use case, the GlobalProtect portal
is a hardware-based firewall that is deployed in the corporate headquarters.
• The GlobalProtect gateway delivers mobile threat prevention and policy enforcement based on
applications, users, content, device, and device state. In this use case, the VM-Series firewalls
on AWS function as the GlobalProtect gateways. The GlobalProtect gateway scans each user
request for malware and other threats, and, if policy allows, sends the request to the internet
or to the corporate network over the IPSec tunnel (to the LSVPN gateway).
• For LSVPN, you must configure the GlobalProtect portal, GlobalProtect gateway for LSVPN
(hub), and the GlobalProtect Satellites (spokes).
In this use case, the hardware-based firewall in the corporate office is deployed as the
GlobalProtect portal and the LSVPN gateway. The VM-Series firewalls on AWS are configured
to function as GlobalProtect satellites. The GlobalProtect satellites and gateway are configured
to establish an IPSec tunnel that terminates on the gateway. When a mobile user requests an
application or resource that resides on the corporate network, the VM-Series firewall routes
the request over the IPSec tunnel.
VM-Series Deployment Guide Version 10.1 468 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Create device groups on Panorama to define the network access policies and internet access
rules and apply them to the firewalls on AWS.
See Create device groups.
Apply the templates and the device groups to the VM-Series firewalls on AWS, and verify that
the firewalls are configured properly.
VM-Series Deployment Guide Version 10.1 469 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 470 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
device groups are part of the Notify Group, which is a configuration element in a Monitoring
Definition, that Panorama uses to register the IP address-to-tag mapping it retrieves from AWS.
Finally, to consistently enforce Security policies across the EC2 instances, you must set up
Dynamic Address Groups and reference them in policy rules that allow or deny traffic to the IP
addresses of the VMs. For streamlining your configuration and managing policies and objects
centrally from Panorama, you can define the Dynamic Address Groups and Security policy rules
on Panorama and push them to the firewalls instead of managing the Dynamic Address Groups
and Security policy rules locally on each firewall.
The AWS plugin version 3.0.1 or later is for monitoring EC2 instances for up to 1000
VPCs on the AWS public cloud, AWS GovCloud, and AWS China. However, because
Panorama cannot be deployed on AWS China, the IAM role does not support instance
profiles on AWS China; you must provide the AWS credentials.
Duplicate IP addresses are written to the plugin_aws_ret.log file that you can access
from the CLI on Panorama.
Review the requirements for Panorama and the managed firewalls:
• Minimum system requirements—Panorama virtual appliance or hardware-based Panorama
appliance.
VM-Series Deployment Guide Version 10.1 471 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Licenses Active support license and a device management license on Panorama for
managing the firewalls.
Next-generation firewalls must also have a valid support license.
• You must add the firewalls as managed devices on Panorama and create Device Groups
so that you can configure Panorama to notify these groups with the VM information it
retrieves. Device groups can include VM-Series firewalls or virtual systems on the hardware
firewalls.
• If your Panorama appliances are in a high availability configuration, you must manually
install the same version of the AWS plugin on both Panorama peers. Additionally, if you are
using instance profiles, you must attach the same instance profile to both Panorama peers.
You configure the AWS plugin on the active Panorama peer only. On commit, the
configuration is synced to the passive Panorama peer. Only the active Panorama
peer polls the AWS accounts you have configured for VM Monitoring.
• Set up the credentials/permissions that Panorama requires to digitally sign API calls to the
AWS services.
You can choose whether you want to provide the long-term credentials—Access Key ID
and Secret Access Key—that enable access to the resources within each AWS account, or
set up an Assume Role on AWS to allow access to defined AWS resources within the same
AWS account or cross-accounts. With an Assume Role, you must set up a trust relationship
and define the permissions while creating the role itself. This is specifically useful in a cross-
VM-Series Deployment Guide Version 10.1 472 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
account deployment where the querying account does not have permissions to see or
handle data from the queried account. For the Panorama plugin to successfully authenticate
to the VPC and retrieve the tags, you must configure the Assume Role to use the AWS
Security Token Service (STS) API to any AWS service. And a user from the querying account
must have STS permissions to query the Assume Role and obtain the temporary security
credentials to access resources. If your Panorama is deployed on AWS, you can opt to use
an instance profile instead of providing the AWS credentials for the IAM role. The instance
profile includes the role information and associated credentials that Panorama needs to
digitally sign API calls to the AWS services. See IAM Roles and Permissions for Panorama for
more details.
Roles and The AWS credentials associated with the AWS account that has the VPC/EC2
Permissions instances you want to monitor.
Required
The JSON format for the minimum permissions associated with the IAM role
with long-term credentials is as follows:
{ “Version”: “2012-10-17",
“Statement”: [
{
“Sid”: “VisualEditor0”,
“Effect”: “Allow”,
“Action”: [
“elasticloadbalancing:DescribeLoadBalancerAttributes”,
“elasticloadbalancing:DescribeLoadBalancers”,
“elasticloadbalancing:DescribeTags”,
“ec2:DescribeInstances”,
“ec2:DescribeNetworkInterfaces”,
“ec2:DescribeVpcs”,
“ec2:DescribeVpcEndpoints”,
“ec2:DescribeSubnets”
],
“Resource”: “*”
VM-Series Deployment Guide Version 10.1 473 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
}
]
}
Inputs on Enter the Access Key ID and Secret Access Key for the user in Panorama >
Panorama Plugins > AWS > Setup > IAM Role.
Roles and While you can use this option to monitor VPCs within the same or cross account,
Permissions this option is recommended to enable cross account access by assuming a role
Required that allows you to access resources to which you may normally have access.
To assume a role from a different account, your AWS account must be trusted
by that role and defined as a trusted entity in its trust policy. In addition, a user
who wants to access a role in a different account must have a policy with secure
token service (STS) access that specifies the role ARN.
On Account 1 that you want to monitor:
• Create an IAM role with required permissions. For VM Monitoring you need
the following permissions.
{ “Version”: “2012-10-17",
“Statement”: [
{
“Sid”: “VisualEditor0”,
“Effect”: “Allow”,
“Action”: [
“elasticloadbalancing:DescribeLoadBalancerAttributes”,
“elasticloadbalancing:DescribeLoadBalancers”,
“elasticloadbalancing:DescribeTags”,
“ec2:DescribeInstances”,
“ec2:DescribeNetworkInterfaces”,
“ec2:DescribeVpcs”,
“ec2:DescribeVpcEndpoints”,
“ec2:DescribeSubnets”
],
“Resource”: “*”
}
]
}
VM-Series Deployment Guide Version 10.1 474 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• Attach the following policy with STS permissions and modify the Role ARN to
match what you created on Account 1.
{ "Version": "2012-10-17",
"Statement":
{
"Effect": “Allow",
"Action": "sts:AssumeRole",
"Resource":"arn:aws:iam::012347211234:role/
PAN-OS-assume-role"
}
}
Inputs on • Enter the Access Key ID and Secret Access Key for the user on Account 2 on
Panorama Panorama > Plugins > AWS > Setup > IAM Role.
• Enter the Role ARN for the AWS Account 1 which you want to monitor in the
Panorama > Plugins > AWS > Monitoring Definitions.
When Panorama and the resources you want to monitor are all in a single AWS
account.
Create an IAM role with AmazonEC2ReadOnlyAccess.
Inputs on Select Instance Profile as the option in Panorama > Plugins > AWS > Setup >
Panorama IAM Role.
Roles and Use instance profile with Assume role when Panorama and the resources you
Permissions want to monitor are deployed across AWS accounts.
Required
For Panorama HA, make sure to attach the same instance profile to both
Panorama peers.
On Account 1, where your EC2 instances are deployed:
• Create an IAM role.
• To this role, add the AWS Account ID (Account 2) where your Panorama is
deployed as a trusted entity.
• Attach the JSON policies as detailed above for VM Monitoring.
VM-Series Deployment Guide Version 10.1 475 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• Copy the Role ARN.This role is required for Panorama to retrieve metadata
on your EC2 instances or EKS clusters.
On Account 2, where your Panorama is deployed:
• Create an IAM role and attach the JSON policy (with the STS policy and
resource ARN you got from Account 1).
• For each additional AWS account you want to monitor, copy the same STS
policy and modify the Role ARN.
Inputs on • Select Instance Profile as the option in Panorama > Plugins > AWS > Setup >
Panorama IAM Role
• Enter the Role ARN for the AWS account which you want to monitor in the
Panorama > Plugins > AWS > Monitoring Definitions.
For example Account 1 in this example.
After you install the AWS plugin v2.0 you cannot downgrade to v1.0.
If you have a standalone Panorama or two Panorama appliances installed in an HA pair with
multiple plugins installed, plugins might not receive updated IP-tag information if one or more of
the plugins is not configured. This occurs because Panorama will not forward IP-tag information
to unconfigured plugins. Additionally, this issue can occur if one or more of the Panorama plugins
is not in the Registered or Success state (positive state differs on each plugin). Ensure that your
plugins are in the positive state before continuing or executing the commands described below.
If you encounter this issue, there are two workarounds:
• Uninstall the unconfigured plugin or plugins. It is recommended that you do not install a plugin
that you do not plan to configure right away
VM-Series Deployment Guide Version 10.1 476 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Log in to the Panorama Web Interface, select Panorama > Plugins and click Check Now to
get the AWS plugin version that supports VM monitoring.
On the Panorama Dashboard General Information widget you can verify the
Panorama Plugin for AWS version that is installed.
VM-Series Deployment Guide Version 10.1 477 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
2. Enter a Name to identify the group of firewalls to which Panorama pushes the VM
information it retrieves.
3. Select the Device Groups, which are a group of firewalls or virtual systems, to which
Panorama will push the VM information (IP address-to-tag mapping) it retrieves from
your AWS VPCs. The firewalls use the update to determine the most current list of
members that constitute dynamic address groups referenced in policy. If you are using
VM-Series Deployment Guide Version 10.1 478 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
the Panorama plugin for Azure and AWS, you can target the same firewall or virtual
system with tags from both environments.
VM-Series Deployment Guide Version 10.1 479 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
ensures more efficient use of the CPU and memory capacity on your Panorama. Refer to
Planning Checklist for VM Monitoring on AWS for some guidelines.
VM-Series Deployment Guide Version 10.1 480 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 481 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 3 | Create a Monitoring Definition for each VPC you want to monitor.
When you add a new Monitoring definition, it is enabled by default.
• Select Panorama > Plugins > AWS > Monitoring Definition > General, to Add a new
definition.
• Enter a Name and optionally a Description to identify the AWS VPC for which you use this
definition.
• Select the IAM Role, Add the VPC ID from the VPC Dashboard on the AWS management
console, and Notify Group.
• Select AWS Regions:
• All—Select all AWS regions.
• Select—Select specific AWS regions. Search AWS regions from the Member search bar
or Add new regions.
• (Optional) Enter the Role ARN, if you have set up role chaining and IAM roles with
temporary credentials that have permissions to use the AWS STS API to access AWS
VM-Series Deployment Guide Version 10.1 482 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
resources with the same account or cross-account. The Role ARN must belong to the VPC
you want to monitor.
• Select a Notify Group, and Enable monitoring.
• On the VPC IDs tab, add the VPC IDs from the VPC dashboard on the AWS Management
Console.
VM-Series Deployment Guide Version 10.1 483 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Click Validate to verify that Panorama can authenticate using the IAM role and keys
and to communicate with the AWS VPCs you’ve entered above.
VM-Series Deployment Guide Version 10.1 484 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 5 | Verify that you can view the VM information on Panorama, and define the match criteria for
Dynamic Address Groups.
On HA failover, the newly active Panorama attempts to reconnect to the AWS cloud
and retrieve tags for all monitoring definitions. If Panorama is unable to reconnect
with even one of the monitoring definitions that you have configured and enabled,
Panorama generates a system log message
If this happens, you must log into Panorama and verify the monitoring definitions to
fix invalid credentials or remove invalid accounts. Although Panorama is disconnected
from the AWS cloud, all tags that were retrieved for the monitoring definitions before
the failover, are retained and the firewalls can continue to enforce policy on that list
of IP addresses. Panorama removes all tags associated with the accounts only when
you delete a monitoring definition. As a best practice, to monitor this issue, you can
configure action-oriented log forwarding to an HTTPS destination from Panorama so
that you can take action immediately.
VM-Series Deployment Guide Version 10.1 485 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | Know where to find the logs related to the AWS plugin on Panorama for troubleshooting.
• Use the CLI command less plugins-log to view a list of all available logs
less plugins-log plugin_aws_ret.log displays logs related to IP address and tag
retrieval.
less plugins-log plugin_aws_proc.log displays logs related to processing of the
registered IP address and tags.
less plugins-log plugin_aws.log displays logs related to the AWS plugin
configuration and daemons.
Use show plugins aws vm-mon-status for the status of the Monitoring Definitions.
VM-Series Deployment Guide Version 10.1 486 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The following table compares some high-level features of each template version.
Panorama running PAN-OS (Optional) If you choose to use (Required) Deploy the
9.0.1 or a later release in Panorama, you must configure VPC Version 2.1 templates.
Panorama mode. peering between the VM-Series
firewall VPC and the application VPCs.
VM-Series Deployment Guide Version 10.1 487 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Palo Alto Networks S3 Use your own S3 bucket or use the Use your own S3
bucket sample sample in panw-aws-autoscale-v20- bucket for the
us-west-2. deployment.
VM-Series Deployment Guide Version 10.1 488 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The following application template deploys the network load balancer depicted in the
preceding image.
• Application Template—The application template deploys a network load balancer (NLB) and
one auto scaling group (ASG) with a web server in each AZ.
The application template is community supported. This template is provided as an example to
help you get started with a basic web application. For a production environment, either use
your own application template or customize this template to meet your requirements.
These templates allow you to deploy a load balancer sandwich topology with an internet-facing
ALB and an internal NLB. The ALB is accessible from the internet and distributes traffic that
enters the VPC across a pool of VM-Series firewalls. The firewalls then route traffic using NAT
VM-Series Deployment Guide Version 10.1 489 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
policy to NLBs, which distributes traffic to an auto scaling tier of web or application servers.
The VM-Series firewalls are enabled to publish custom PAN-OS metrics to AWS CloudWatch
where you can monitor the health and resource load on the VM-Series firewalls and then use that
information to trigger auto scaling events in the appropriate ASGs on firewalls.
• What Components Does the VM-Series Auto Scaling Template for AWS (v2.0) Leverage?
• How Does the VM-Series Auto Scaling Template for AWS (v2.0) Enable Dynamic Scaling?
• Plan the VM-Series Auto Scaling Template for AWS (v2.0)
• Customize the Firewall Template Before Launch (v2.0)
• Launch the VM-Series Auto Scaling Template for AWS (v2.0)
• Customize the Bootstrap.xml File (v2.0)
• Stack Update with VM-Series Auto Scaling Template for AWS (v2.0)
• Modify Administrative Account and Update Stack
VM-Series Deployment Guide Version 10.1 490 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
What Components Does the VM-Series Auto Scaling Template for AWS (v2.0)
Leverage?
The VM-Series Auto Scaling template for AWS includes the following building blocks:
This solution includes an AWS NAT gateway that the firewalls use
to initiate outbound requests for retrieving updates, connecting to
Panorama, and publishing metrics to AWS CloudWatch.
Application template The application template deploys an NLB and an ASG with a web
server in each AZ. Because the NLB has a unique IP address for each
(Community
AZ and the NAT policy rule on the firewalls must reference a single IP
supported template)
VM-Series Deployment Guide Version 10.1 491 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Bootstrap files This solution requires the init-cfg.txt file and the bootstrap.xml file so
that the VM-Series firewall has the basic configuration for handling
The bootstrap.xml
traffic.
file provided in the
GitHub repository is
provided for testing
VM-Series Deployment Guide Version 10.1 492 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
To deploy the solution, see Launch the VM-Series Auto Scaling Template for AWS (v2.0).
How Does the VM-Series Auto Scaling Template for AWS (v2.0 and v2.1) Enable
Dynamic Scaling?
VM-Series firewall scale in and scale out using VM-Series firewalls that are deployed using auto
scaling templates based on custom PAN-OS metrics. The VM-Series firewalls natively publish
these metrics to the Amazon CloudWatch console and, based on the metrics you choose for the
scaling parameters, you can define CloudWatch alarms and policies to dynamically deploy or
terminate instances for managing the application traffic in your AWS deployment.
The firewalls publish metrics to AWS CloudWatch every five minutes (by default). When a
monitored metric reaches the configured threshold for the defined time interval, CloudWatch
triggers an alarm and initiates an auto-scaling event.
When the auto-scaling event triggers the deployment of a new firewall, the new instance
bootstraps at launch and an AWS Lambda function configures the firewall with NAT policy rules.
A NAT policy rule is created for each application and the rule references the IP addresses for each
network load balancer in your deployment. When the application load balancer receives a request,
it forwards the request to the firewall on the assigned TCP port. The firewall then inspects the
traffic and forwards it to the corresponding network load balancer, which then forwards the
request to a web server in its target group.
Plan the VM-Series Auto Scaling Template for AWS (v2.0 and v2.1)
The items in this checklist are actions and choices you must make to implement this solution.
Verify the The auto scaling template requires AWS Lambda and S3 Signature
requirements for versions 2 or 4, and can deploy VM-Series firewalls running supported
deploying the PAN-OS versions. You need to look up the list of supported regions
VM-Series Auto and the AMI IDs, to provide as an input in the firewall template.
Scaling template.
VM-Series Deployment Guide Version 10.1 493 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Assign the The user who deploys the VM-Series Auto Scaling template must
appropriate either have administrative privileges or have the permissions listed in
permissions for the iam-policy.json to launch this solution successfully. Copy and paste
the IAM user role. the permissions from this file in to a new IAM policy and then attach
the policy to a new or existing IAM role.
For a cross-account deployment, to access resources that are in a
different AWS accounts, the IAM role for the user who deploys the
application template must have full SQS access permissions and a trust
relationship that authorizes her to write to the SQS queue that belongs
to the firewall template.
Collect the details For a deployment where the firewall template and the application
required for a template are in different accounts, the account that hosts the firewall
cross-account template resources is the trusting account and the other AWS
deployment. account(s) that hold the application template resources are the trusted
accounts. To launch the application template in a cross-account
deployment, you need the following information:
• Cross-account Role Amazon Resource Name (ARN) of the account
in which you are deploying the application template.
• External ID, which you defined when creating the IAM role that
grants full SQS access to the trusting account.
• The 10-digit account number for every AWS account in which you
plan to launch the application template. Because the account that
hosts the firewall template resources serves as a trusting account,
and it owns the resources that the users of the application template
need, you need to list the account number for each trusted account
that can access the firewall resources.
Create a Support You can opt for the BYOL or PAYG licenses.
Account on
• For BYOL, you must register an auth code to your Palo Alto
the Palo Alto
Networks support account prior to launching the VM-Series Auto
Networks Support
Scaling template and add the auth-code to the /license folder
portal, if you don’t
with filename as authcodes in the bootstrap package. See Launch
already have one.
the VM-Series Auto Scaling Template for AWS (v2.0) or Launch the
Firewall Template (v2.1) for details.
• For PAYG, you must register the VM-Series firewalls to activate
your support entitlement.
(For PAYG only) In the AWS Marketplace, search for Palo Alto Networks, and select the
Review and bundle you plan to use. The VM-Series firewalls will fail to deploy if
accept the End you have not accepted the EULA for the bundle you plan to use.
User License
VM-Series Deployment Guide Version 10.1 494 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Decide whether Palo Alto Networks provides public S3 buckets in all AWS regions
you plan to use included in the supported regions list. These S3 buckets include all the
the public S3 templates, AWS Lambda code, and the bootstrap files that you need.
buckets or your
private S3 bucket Palo Alto Networks recommends using the bootstrap files
for AWS Lambda, in the public S3 bucket only for evaluating this solution.
Python scripts, For a production deployment, you must create a private S3
and templates. bucket for the bootstrap package.
VM-Series Deployment Guide Version 10.1 495 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Download the • Get the files for deploying the firewall template (application load
templates, AWS balancer and the VM-Series firewalls) from the GitHub repository.
Lambda code, and
the bootstrap files. Do not mix and match files across VM-Series Auto
Scaling template versions.
Customize the To ensure that your production environment is secure, you must
bootstrap.xml customize the bootstrap.xml file with a unique administrative
VM-Series Deployment Guide Version 10.1 496 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Decide whether Panorama is an option for administrative ease and is the best practice
you want to for managing the firewalls. It is not required to manage the auto
use Panorama scaling tier of VM-Series firewalls deployed in this solution.
for centralized
If you want to use Panorama, you can either a Panorama virtual
logging, reporting,
appliance on AWS or use an M-Series appliance or a Panorama virtual
and firewall
appliance inside your corporate network.
management.
The Panorama must be in Panorama mode and not
Management Only mode.
VM-Series Deployment Guide Version 10.1 497 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Get started Launch the VM-Series Auto Scaling Template for AWS (v2.0).
CIDR Block for the VPC The IP address space that you want to 192.168.0.0/16
use for the VPC.
Untrust Subnet CIDR Block Comma-delimited list of CIDR blocks for 192.168.1.0/24,
the Untrust subnet. 192.168.11.0/24
Trust Subnet CIDR Block Comma-delimited list of CIDR blocks for 192.168.2.0/24,
the Trust subnet. 192.168.12.0/24
VM-Series Deployment Guide Version 10.1 498 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
NAT Gateway Subnet CIDR Comma-delimited list of CIDR blocks for 192.168.100.0/24,
Block the AWS NAT Gateway. 192.168.101.0/24
Lambda Subnet CIDR Block Comma-delimited list of CIDR blocks for 192.168.200.0/24,
the Lambda functions. 192.168.201.0/24
Firewall Instance size AWS Instance Types and size that you M4.xlarge
want for the VM-Series firewalls in your
deployment.
Choose your Scaling The template publishes all the following Dataplane CPU
Parameter metrics to AWS CloudWatch: Utilization
• CPU—DataPlane CPU Utilization
You do not
need to • AS—Active Sessions
modify the • SU—Session Utilization
template for
the scaling • SSPU—SSL Proxy Utilization
parameter. • GPU—GlobalProtect Gateway
You can Utilization
set AWS • GPAT—GlobalProtect Gateway
CloudWatch Utilization ActiveTunnels
alarms on
the AWS • DPB—Dataplane Packet Buffer
console for Utilization
one or more
custom PAN-
OS metrics
on which
you want
to trigger
autoscaling.
Choose time in seconds for The period in seconds over which the 900
Scaling Period average statistic is applied. Must be a
multiple of 60.
VM-Series Deployment Guide Version 10.1 499 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
This firewall template includes an AWS NAT gateway that the firewalls use to initiate
outbound requests for retrieving updates, connecting to Panorama, and publishing metrics
to AWS CloudWatch. If you are not using Panorama to manage the firewalls, you must
deploy a jump server (a bastion host with an EIP address) that attaches to the Untrust
subnet within the VPC to enable SSH and/or HTTPS access to the VM-Series firewalls.
This jump server is required because the management interface on the VM-Series firewalls
has a private IP address only.
STEP 1 | Review the checklist for Plan the VM-Series Auto Scaling Template for AWS (v2.0).
Make sure that you have completed the following tasks:
• (For PAYG only) Reviewed and accepted the EULA for the PAYG bundle you plan to use.
• (For BYOL only) Obtained the auth code. You need to enter this auth code in the /license
folder of the bootstrap package.
• Downloaded the files required to launch the VM-Series Auto Scaling template from the
GitHub repository.
VM-Series Deployment Guide Version 10.1 500 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Modify the init-cfg.txt file. You must add the device certificate auto-registration PIN to the
init-cfg.txt file to automatically install a device certificate when your VM-Series firewall
instance is deployed.
vm-series-auto-registration-id=
vm-series-auto-registration-pin-value=
For more details read about the bootstrapping process and the init-cfg.txt file.
If you’re using Panorama to manage the firewalls, complete the following tasks:
1. Generate the VM Auth Key on Panorama. The firewalls must include a valid key in the
connection request to Panorama. Set the lifetime for the key to 8760 hours (1 year).
2. Open the init-cfg.txt file with a text editor, such as Notepad. Make sure that you do
not alter the format as this causes a failure in deploying the VM-Series Auto Scaling
template. Add the following information as name-value pairs:
• IP addresses for the primary Panorama and optionally a secondary Panorama. Enter:
panorama-server=
panorama-server-2=
• Specify the template stack name and the device group to which you want to assign
the firewall. Enter:
tplname=
dgname=
• VM auth key. Enter:
vm-auth-key=
3. Verify that you have not deleted the command for swapping the management interface
(mgmt) and the dataplane interface (ethernet 1/1) on the VM-Series firewall on AWS.
For example, the file must include name-value pairs as shown here:
op-command-modes=mgmt-interface-swap
vm-auth-key=755036225328715
panorama-server=10.5.107.20
panorama-server-2=10.5.107.21
tplname=FINANCE_TG4
dgname=finance_dg
4. Save and close the file.
STEP 3 | (For BYOL only) Add the license auth code in the /license folder of the bootstrap package.
For more information see Prepare the Bootstrap Package.
1. Create a new .txt file with a text editor, such as Notepad.
2. Add the authcode for your BYOL licenses to this file,then save the file with authcodes
(no file extension) and upload it to the /license folder. The auth code must support the
number of firewalls that may be required for your deployment. You must use an auth
code bundle instead of individual auth codes so that the firewall can simultaneously
VM-Series Deployment Guide Version 10.1 501 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
fetch all license keys associated with a firewall. If you use individual auth codes instead
of a bundle, the firewall retrieves only the license key for the first auth code included in
the file.
STEP 4 | Change the default credentials for the VM-Series firewall administrator account defined in
the bootstrap.xml file.
Required for using the VM-Series Auto Scaling template in a production environment.
The bootstrap.xml file in the GitHub repository is provided for testing and evaluation only. For
a production deployment, you must Customize the Bootstrap.xml File (v2.0) prior to launch.
VM-Series Deployment Guide Version 10.1 502 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 5 | Prepare the Amazon Simple Storage (S3) buckets for launching the VM-Series Auto Scaling
template to a production environment.
Make sure to create the S3 buckets in the same region in which you plan to deploy the
template; the bootstrapping files hosted in the public S3 bucket are provided only to
make it easier for you to evaluate the template.
6. (For BYOL only) Click the link to open the license folder and upload the txt file with
the auth code required for licensing the VM-Series firewalls.
VM-Series Deployment Guide Version 10.1 503 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
3. Upload the AWS Lambda code (panw-aws.zip file) to an S3 bucket. In this example, the
AWS Lambda code is in the same S3 bucket as the bootstrap package.
1. Click the bucket name.
2. Click Add Files to select the panw-aws.zip file, click Open.
3. Click Start Upload to add the zip file to the S3 bucket.
VM-Series Deployment Guide Version 10.1 504 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
1. Look up the AMI ID for the VM-Series firewall and enter it. Make sure that the AMI ID
matches the AWS region, PAN-OS version and the BYOL or PAYG licensing option you
opted to use.
2. Select the EC2 Key pair (from the drop-down) for launching the firewall. To log in to the
firewalls, you must provide the name of this key pair and the private key associated with
it.
3. Restrict SSH access to the firewall’s management interface. Make sure to supply a CIDR
block that corresponds to your dedicated management IP addresses or network. Do not
make the allowed source network range larger than necessary and do not ever configure
the allowed source as 0.0.0.0/0. Verify your IP address before configuring it on the
template to make sure that you do not lock yourself out.
4. Select Yes if you want to Enable Debug Log. Enabling the debug log generates more
verbose logs that help with troubleshooting issues with the deployment. These logs are
generated using the stack name and are saved in AWS CloudWatch.
By default, the template uses CPU utilization as the scaling parameter for the VM-Series
firewalls. Custom PAN-OS metrics are automatically published to the CloudWatch namespace
that matches the stack name you specified earlier.
You can use one S3 bucket for the bootstrap package and the zip file.
1. Enter the name of the S3 bucket that contains the bootstrap package.
If the bootstrap bucket is not set up properly or if you enter the bucket name incorrectly,
the bootstrap process fails and you cannot be able to log in to the firewall. Health checks
for the load balancers also fail.
2. Enter the name of the S3 bucket that contains the panw-aws.zip file.
VM-Series Deployment Guide Version 10.1 505 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 10 | Specify the keys for enabling API access to the firewall and Panorama.
1. Enter the key that the firewall must use to authenticate API calls. The default key
is based on the sample bootstrap.xml file and you should only use it for testing and
evaluation. For a production deployment, you must create a separate PAN-OS login just
for the API call and generate an associated key.
2. Enter the API Key to allow AWS Lambda to make API calls to Panorama, if you are using
Panorama for centralized management. For a production deployment, you should create
a separate login just for the API call and generate an associated key.
3. Copy and paste the license deactivation API key for your account. This key is required
to successfully deactivate licenses on your firewalls when a scale-in event occurs. To get
this key:
1. Log in to the Customer Support Portal.
2. Select Assets > API Key Management.
3. Copy the API key.
STEP 12 | (Optional) Apply tags to identify the resources associated with the VM-Series Auto Scaling
template.
Add a name-value pair to identify and categorize the resources in this stack.
Unless you customized the template, the VM-Series Auto Scaling template launches
an ASG that includes one VM-Series firewall in each AZ, behind the application load
balancer.
VM-Series Deployment Guide Version 10.1 506 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 14 | Verify that the template has launched all required resources.
1. On the AWS Management Console, select the stack name to view the Output for the list
of resources.
2. On the EC2 Dashboard, select Auto Scaling Groups. Verify that in each AZ, you have
one ASG for the VM-Series firewalls with the one firewall in each ASG. The ASG name
prefix includes the stack name.
3. Log in to the VM-Series firewall. You must deploy a jump server or use Panorama to
access the web interface on the firewall.
STEP 15 | Save the following information. You need to provide these values as inputs when deploying
the application template.
• IP addresses of the NAT Gateway in each AZ. You need this IP address to restrict HTTP
access to the web servers if you deploy the application in a different VPC. Specifying this
IP address ensures that the firewall secures access your applications in a different VPC,
and that nobody can bypass the firewall to directly access the web server. The sample
application template (panw_aws_nlb_vpc-2.0.template) displays a template validation error
if you do not enter the NAT Gateway IP addresses; you must enter the IP addresses as a
comma-separated list.
• Network Load Balancer SQS URL. An AWS Lambda function in the firewall stack monitors
this queue so that it can learn about any network load balancers that you deploy, and create
NAT policy rules (one per application) on the VM-Series firewalls that enable the firewalls to
send traffic to the network load balancer IP address.
VM-Series Deployment Guide Version 10.1 507 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
balancer and a pair of web servers behind the auto scaling group of VM-Series firewalls, which
you deployed using the firewall template. The web servers in this template have a public IP
address for direct outbound access to retrieve software updates. Use this template to evaluate
the solution, but build your own template to deploy to production. For a custom template, make
sure to enable SQS Messaging Between the Application Template and Firewall Template.
When launching the application template, you must select the template based on whether you
want to deploy the application template within the same VPC (panw_aws_nlb-2.0.template) in
which you deployed the firewall template or in a separate VPC (panw_aws_nlb_vpc-2.0.template).
For a separate VPC, the template provides supports for cross-account deployments. A cross-
account deployment requires you to create an IAM role and enable permissions and trust
relationship between the trusting AWS account and the trusted AWS account, and the account
information is required as input when launching the template.
STEP 1 | (Required only for a cross-account deployment) Create the IAM role. Refer to AWS
documentation.
This role grants access to a user who belongs to a different AWS account. This user requires
permissions to access the Simple Queue Service (SQS) resource in the firewall template. The
firewall uses this queue to learn about each network load balancer that you deploy so that
it can create NAT policy to send traffic to the web servers that are behind the network load
balancer.
• For Account ID, type the AWS account ID of the account into which you are deploying the
application template. Specifying that account ID allows you to grant access to the resources
in your account that hosts the firewall template resources.
• Select Require external ID and enter a value that is a shared secret. Specifying an external
ID allows the user to assume the role only if the request includes the correct value.
• Choose Permissons to allow Amazon SQS Full Access.
VM-Series Deployment Guide Version 10.1 508 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Use the Palo Alto Networks public S3 bucket or prepare your private (S3) bucket for
launching the application template.
1. Create a zip file with all the files in the GitHub repository, excluding the three .template
files, named nlb.zip in the screenshot below.
2. Upload the zip file to the S3 bucket you created earlier or to a new bucket.
3. Copy the pan_nlb_lambda template into the same bucket to which you copied the nlb.zip
file.
VM-Series Deployment Guide Version 10.1 509 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 4 | Configure the parameters for the VPC and network load balancer.
1. Select the two Availability Zones that your setup will span in Select list of AZ. If you are
deploying within the same VPC make sure to select the same Availability Zones that you
selected for the firewall template.
2. Enter a CIDR Block for the VPC. The default CIDR is 192.168.0.0/16.
3. (Only if you are using the panw_aws_nlb-2.0.template to deploy the applications within
the same VPC)
Select the VPC ID and the Subnet IDs associated with the trust subnet on the firewalls
in each AZ. The network load balancer is attached to the trust subnet on the firewalls, to
complete the load balancer sandwich topology.
4. Enter a name for the network load balancer.
1. Enter the S3 bucket name where nlb.zip and the pan_nlb_lambda.template is stored.
2. Enter the name of the pan_nlb_lambda.template and the zip file name.
3. Paste the SQS URL that you copied earlier.
4. Enter a unique TableName. This table stores a mapping of the port and IP address for
the applications associated with the network load balancer in your deployment.
When you delete the application stack this table is deleted. Therefore, if multiple
instances of the network load balancer write to the same table and the table is deleted,
the NAT rules on the firewalls not function properly and the application traffic maybe be
inaccurately forwarded to the wrong port/network load balancer.
STEP 6 | Modify the web server EC2 instance type to meet your deployment needs.
STEP 7 | Select the EC2 Key pair (from the drop-down) for launching the web servers. To log in to the
web servers, you must provide the key pair name and the private key associated with it.
VM-Series Deployment Guide Version 10.1 510 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 8 | (Only if you are using the panw_aws_nlb_vpc-2.0.template) Lock down access to the web
servers.
1. Restrict SSH From access to the web servers. Only the IP addresses you list here can log
in to the web servers.
2. Restrict HTTP access to the web servers. Enter the public IP addresses of the NAT
gateway from the firewall template output, and make sure to separate IP addresses with
commas. Entering the NAT gateway IP address allows you to ensure that all web traffic
to the application servers are secured by the VM-Series firewalls.
STEP 9 | (Only if you are using the panw_aws_nlb_vpc-2.0.template) Configure the other parameters
requires to launch the application template stack in a different VPC.
1. Select SameAccount true if you are deploying this application template within the same
AWS account as the firewall template, and leave the cross account role and external ID
blank; select false for a cross-account deployment.
For a cross-account deployment, enter the Amazon Resource Number (ARN) for the
CrossAccountRole and ExternalId that you defined in (Required only for a cross-account
deployment) Create the IAM role. Refer to AWS documentation.You can get the ARN
from Support > Support Center on the AWS Management Console.
2. Enter the VPC Namein which you want to deploy the application template resources.
3. Optional Change the NLBSubnetIPBlocks for the Management subnet for the network
load balancer.
VM-Series Deployment Guide Version 10.1 511 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 11 | Verify that the network load balancer is deployed and in a ready state.
STEP 12 | Get the DNS name for the application load balancer, and enter it into a web browser.
For example: http://MVpublic-elb-123456789.us-east-2.elb.amazonaws.com/
When the web page displays, you have successfully launched the auto scaling template.
STEP 13 | Verify that each firewall has a NAT policy rule to the IP address of each network load
balancer.
When you deploy the application template to launch another instance of a network load
balancer and pair of web servers, the firewall learns about the port allocated for the next
network load balancer instance and creates another NAT policy rule. So, if you deploy the
application template three times, the firewall has three NAT policy rules for ports 81, 82, and
83.
STEP 14 | If you have launched the application template more than once, you need to Enable Traffic to
the ELB Service.
In v2.0, the ILB can only be a network load balancer. In v2.1 the ILB can be an application
load balancer or a network load balancer.
VM-Series Deployment Guide Version 10.1 512 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | On the AWS management console, verify the ports allocated for each network balancer on
the DynamoDB table.
When you launch a new internal load balancer, the application template must send an SQS
message to the SQS URL you provided as input when you launched the template. The AWS
Lambda function in the firewall template monitors the SQS and adds the port mapping to the
DynamoDB table for the firewall template. Starting at port 81, the port allocated for every
additional internal load balancer you deploy increments by 1. So, the second internal load
balancer uses port 82, and the third port uses port 83.
1. Select the DynamoDB service on the AWS management console.
2. Select Tables and click the table that matches the stack name for your firewall template.
For example, MV-CFT20-firewall-us-east-2.
In the Items list, view the ports used by the internal load balancers that are publishing to
the SQS associated with the firewall template.
STEP 2 | Create a target group. The internal load balancer sends requests to registered targets using
the port and protocol that you specify for the servers in the target group.
When you add a new target group, use the port information that you verified on the
DynamoDB table.
VM-Series Deployment Guide Version 10.1 513 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 3 | Edit the listener rules on the internal load balancer to route requests to the target web
servers.
1. On the AWS management console, select Load Balancers in the Load Balancing section,
and select the internal load balancer that matches your stack name.
2. Select View/edit rules to modify the rules for the listener.
3. Select Insert rule and add a path-based route to forward traffic to the target group you
defined above as follows:
STEP 4 | Attach the target group to both VM-Series firewalls auto scaling groups.
1. Select Auto Scaling Groups in the Auto Scaling section and select an auto scaling group
that matches the stack name.
2. Select Details > Editand select the new target group from the Target Groups drop-down.
STEP 5 | Log in to each web server that was deployed by the application template, create a new
directory with the target group name and copy the index.html file into the directory. Until
you set up the path to the index.html file, the health check for this web server reports as
unhealthy.
sudo su
cd/var/www/html
mkdir <target-groupname>
cp index.html <target-groupname>
VM-Series Deployment Guide Version 10.1 514 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
If you have deployed the template and now need to change the credentials for the
administrative user or add a new administrative user and update the template stack,
see Modify Administrative Account and Update Stack.
Create a new Bootstrap File from Scratch
Launch a new VM-Series firewall on AWS using the AMI for a supported PAN-OS version (see
the compatibility matrix for Panorama plugins), without using the sample bootstrap.xml file, and
export the configuration to create a new bootstrap.xml file for use with the VM-Series Auto
Scaling template v2.0.
STEP 1 | Deploy the VM-Series Firewall on AWS (no bootstrapping required) and use the public IP
address to SSH into the Command Line Interface (CLI) of the VM-Series firewall. You will
need to configure a new administrative password for the firewall.
STEP 3 | (Optional) Configure the firewall. You can configure the dataplane interfaces, zones and
policy rules.
VM-Series Deployment Guide Version 10.1 515 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 5 | Export the configuration file and name it as bootstrap.xml. (Device > Setup > Operation
> Export Named Configuration Snapshot).
STEP 6 | Download the bootstrap.xml file from the GitHub repository, open it with a text editing tool,
and copy lines 353 to 356. These lines define the AWS CloudWatch namespace to which the
firewall publishes custom PAN-OS metrics that are required for the firewalls to auto scale.
STEP 7 | Edit the configuration file you exported earlier to include the AWS CloudWatch information.
Search for </management> and paste the lines 353 to 356 after </management>.
STEP 9 | Save the file. You can now proceed with Launch the VM-Series Auto Scaling Template for
AWS (v2.0).
VM-Series Deployment Guide Version 10.1 516 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Add an elastic network interface (ENI) and associate an elastic IP address (EIP) to it, so that
you can access the web interface on the VM-Series firewall. See Launch the VM-Series
Firewall on AWS for details.
STEP 3 | Use the EIP address to log in to the firewall web interface with admin as the username and
password.
STEP 4 | Add a secure password for the administrative user account (Device > Local User Database >
Users).
STEP 5 | (Optional) Configure the firewall for securing your production environment.
STEP 7 | Generate a new API key for the administrator account. Copy this new key to a new file. You
will need to enter this API key when you launch the VM-Series Auto Scaling template; the
AWS services use the API key to deploy the firewall and to publish metrics for auto scaling.
STEP 8 | Export the configuration file and save it as bootstrap.xml. (Device > Setup > Operation >
Export Named Configuration Snapshot).
STEP 9 | Open the bootstrap.xml file with a text editing tool and delete the management interface
configuration.
STEP 10 | (Required if you exported a PAN-OS 8.0 configuration) Ensure that the setting to validate the
Palo Alto Networks servers is disabled. Look for <server-verification>no</server-
verification>.
STEP 12 | Save the file. You can now proceed with Launch the VM-Series Auto Scaling Template for
AWS (v2.0).
VM-Series Deployment Guide Version 10.1 517 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
and then automatically create a NAT policy rule on the firewall to send traffic to the IP address
of the network load balancer. In order to route traffic properly within the AWS infrastructure,
the message must also include basic information on the DNS, VPC ID, and the AZ to which the
network load balancer belongs.
If you are building your own application template, you must set up your application template
to post two types of messages to the SQS URL that the firewall template in the VM-Series
autoscaling template version 2.0 uses to learn about network load balancers to which it must
distribute traffic in your environment:
• ADD-NLB message that informs the firewalls when a new network load balancer is available.
• DEL-NLB message that informs the firewalls when a network load balancer has been
terminated and is no longer available.
The following examples of each message type includes sample values. You need to modify these
message with values that match your deployment.
ADD-NLB Message
DEL-NLB Message
Refer to the AWS documentation for details on how to send a message to an Amazon SQS
Queue, or review the describe_nlb_dns.py in the sample application template package to see how
the application template constructs the messages.
Stack Update with VM-Series Auto Scaling Template for AWS (v2.0)
A stack update allows you to modify the resources that the VM-Series Auto Scaling template—
firewall-v2.0.template—deploys. Instead of deleting your existing deployment and redeploying the
solution, use the stack update to modify the following parameters:
• License—Switch from BYOL to PAYG and vice versa or switch from one PAYG bundle to
another.
• Other stack resources— Change the launch configuration parameters such as the Amazon
Machine Image (AMI) ID, the AWS instance type, key pair for your auto scaling groups. You can
also update the API key associated with the administrative user account on the firewall.
Changing the AMI-ID allows you to deploy new instances of the VM-Series firewalls
with a different PAN-OS version.
When you deploy the VM-Series Auto Scaling template, the auto scaling groups and the launch
configuration are automatically created for you. The launch configuration is a template that an
VM-Series Deployment Guide Version 10.1 518 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
auto scaling group uses to launch EC2 instance, and it specifies parameters such as the AMI ID,
the instance type, key pair for your auto scaling group. To launch VM-Series firewalls with your
updated parameters, you must first update the stack and then delete the existing auto scaling
groups in each AZ. To prevent service disruption, delete the auto scaling group in one AZ first, and
wait for the new firewall instances to launch with the updated stack parameters. Then, verify that
the firewalls have inherited the updates you made before you proceed to complete the changes in
the other AZ.
You can update stack directly or create change sets. The workflow in this document takes you
through the manual stack update.
STEP 1 | In the AWS CloudFormation console, select the parent stack that you want to update and
choose Actions > Update Stack.
VM-Series Deployment Guide Version 10.1 519 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
updated API key, you need to follow the workflow in Modify Administrative Account and
Update Stack.
STEP 3 | Acknowledge the notifications and review the changes and click Update to initiate the stack
update.
STEP 4 | On the EC2 dashboard > Auto Scaling Groups and pick an AZ in which to delete the ASG.
Deleting an ASG automatically triggers the process of redeploying a new ASG. The firewalls in
the new ASG use the updated stack configuration.
STEP 5 | Verify that the updated parameters are used to launch the VM-Series firewalls in the new
ASG.
Use a phased rollout process, where you test the new ASG thoroughly and ensure that the
firealls are properly handling traffic. Then, wait one hour before continuing to the next ASG.
STEP 6 | Repeat steps 4 and 5 to replace the ASG in the other AZ.
VM-Series Deployment Guide Version 10.1 520 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 1 | Log in to the web interface of the firewall and change the credentials for an existing
administrative user or create a new account.
STEP 4 | Upload this bootstrap.xml file to the S3 bootstrap folder; see Customize the Bootstrap.xml
File (v2.0).
STEP 5 | Update the API key in the stack to ensure that newly launched firewalls will have the
updated administrator account.
See Stack Update with VM-Series Auto Scaling Template for AWS (v2.0).
You can also deploy the firewall ASG in a centralized VPC and your application workloads in
separate VPCs within the same region, forming a hub and spoke architecture, as shown below.
VM-Series Deployment Guide Version 10.1 521 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
With the hub and spoke architecture you can streamline the delivery of centralized security and
connectivity for AWS deployments with many applications, VPCs, or accounts. This architecture
can increase agility. Your network security administrators manage the firewall VPC, and DevOps
administrators or application developers can manage the application VPCs.
Ensure that the application VPCs connected to the firewall VPC, do not have an Internet
Gateway (IGW), and use a continuous monitoring and security compliance service such as
Prisma Public Cloud.
You can use a single AWS account or multiple AWS accounts to monitor and secure traffic
between VPCs and the internet. Centralizing firewalls in a single VPC can reduce costs for
deployments with multiple VPCs and/or multiple accounts.
To provide flexibility with securing your application workloads, version 2.1 allows you to deploy
an application load balancer or a network load balancer for both the external load balancer
that fronts your VM-Series firewall ASG, and the internal load balancer (ILB) that fronts your
application workloads.
When an application load balancer fronts the application workloads, you can connect the firewall
VPC to the application VPC using VPC peering. When an NLB fronts the application workloads
you can use VPC Peering or an AWS Private Link to connect the firewall and application VPCs, as
summarized below:
VM-Series Deployment Guide Version 10.1 522 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
If you deploy in a single VPC you can use all the load balancing combinations in the previous table.
You can deploy the templates in both and greenfield (new VPC and applications) and brownfield
(existing VPC and applications) use cases.
What Components Do the VM-Series Auto Scaling Template for AWS (v2.1)
Leverage?
The VM-Series Auto Scaling template for AWS includes the following building blocks.
Template Description
VM-Series Deployment Guide Version 10.1 523 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Template Description
• VPC ID
• Internet Gateway ID. This is an existing gateway.
• Subnet CIDR lists for the Management, Untrust, Trust,
NAT Gateway and Lambda subnets. The template
uses the CIDRs to create these subnets.
If you choose to create a new ELB, the template
connects the firewall ASG to the ELB backend pool. If
you use an existing ELB, you must manually connect the
firewall ASG to the existing load balancer backend.
See Customize the Firewall Template Before Launch (v2.0 and v2.1) for more on these
parameters.
Application Templates
The application template deploys an internal load balancer (ILB) and one auto scaling group with a
web server in each availability zone (AZ).
Template Description
VM-Series Deployment Guide Version 10.1 524 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Template Description
• Hub account ID
• StsAssumeRoleARN (output from the Hub
template for SQS access)
Lambda Functions
AWS Lambda provides robust, event-driven automation without the need for complex
orchestration software. AWS Lambda monitors a Simple Queue Service (SQS) to learn about
load balancers (ALBs or NLBs) that publish to the queue. When the Lambda function detects
a new load balancer, it creates a new NAT policy rule and applies it to the VM-Series firewalls
within the ASG. The firewalls have a NAT policy rule for each application, and the firewalls use the
NAT policy rule (that maps the port to the load balancer IP address) to forward traffic to the load
balancer in front of the application web servers.
The Lambda functions also delete all the configuration items that Lambda added to the device
group and template stack in Panorama. This includes the NAT rule, Address Object, and Static
Routes that were pushed to the VM-Series firewall. The Lambda function handles delicensing as
well.
To learn more about the Lambda functions, refer to the
Palo Alto Networks AWS AutoScale Documentation.
Panorama
You must have Panorama management server in Panorama mode to configure Auto Scaling v2.1.
The Panorama management server provides centralized monitoring and management of multiple
Palo Alto Networks next-generation firewalls from a single location. Panorama allows you to
oversee all applications, users, and content traversing your network, and use this knowledge to
create application enablement policies that protect and control the network. If you are not familiar
with Panorama please see the Panorama Administrator’s Guide.
Managed firewalls are bootstrapped with an init-config.txt file. A sample file is included in
the GitHub repository so that you can copy the configuration from the template stack and device
group when you create them in your existing Panorama.
VM-Series Deployment Guide Version 10.1 525 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The untrust and trust zones created in Panorama must be all lower case.
• The templates configure an Administrator account named pandemo and the password
demopassword.
• Create a virtual router with the naming convention VR-<TemplateStackName>. On the virtual
router ECMP tab, enable ECMP.
• To set the DNS server address on Panorama, select Device > Setup > Services. Set the Primary
DNS Server to 169.254.169.253, the Secondary DNS Server to 8.8.8.8, and the FQDN Refresh
Time (sec) to 60. Panorama requires the AWS DNS server IP address to resolve the FQDN of
the internal load balancer on AWS. The FQDN refresh time is the interval at which Panorama
commits newly detected internal load balancers.
After the application template has launched, Lambda populates the following in Panorama:
• NAT policy
• Address object for LB in Application Template
• Static routes in the virtual router
• Tcp81 service object
The v2.1 firewall template includes an AWS NAT gateway that the firewalls use to initiate
outbound requests for retrieving updates, connecting to Panorama, and publishing metrics to
AWS CloudWatch. The NAT Gateways also have Elastic IP addresses attached to them for each
zone.
You need the following Panorama resources to work with the Auto Scale templates for AWS.
Panorama API Key You need a Panorama API key to authenticate the API. Lambda uses
your API key to autoconfigure template and device group options. To
generate the API key, see Get Your API Key.
Panorama License The template requires a license deactivation API key and the “Verify
Deactivation Key Update Server Identity” to be enabled to deactivate the license keys
from Panorama. The license deactivation key should be obtained from
Palo Alto Customer Support Portal as described in Install a License API
Key.
VM-Series Deployment Guide Version 10.1 526 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
When you secure port 443 you specify an IP address range from
which you will allow connections, as well as the EIPs assigned to
the NAT gateways. There are two NAT gateways and the EIPs
associated with them. To find NAT gateway EIPs in AWS, go to
VPC > NAT Gateways. Note the EIP information for the security
group for HTTPS.
• Port 3978—Port 3978 must be able to receive traffic from any IP
address.
Bootstrap Files
The GitHub auto scaling repository includes an init-cfg.txt file so that the VM-Series firewall
has the basic configuration to:
• Perform interface swap so the VM-Series firewall untrust traffic uses AWS ENI for eth0.
• Communicate to Panorama for device group and template configuration.
The auto scaling GitHub repository has the basic configuration to get started. This auto scaling
solution requires swapping the dataplane and management interfaces to enable the load balancer
to forward web traffic to the VM-Series firewall auto scaling tier. For details on management
interface mapping with the Amazon ELB as shown in Management Interface Mapping for Use
with Amazon ELB.
VM-Series Deployment Guide Version 10.1 527 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The templates support a hub and spoke architecture in which you can deploy the firewall template
in one AWS account and use it as a hub to secure applications (spokes) that belong to the same or
to different AWS accounts.
This workflow tells you how to deploy the external load balancer and the VM-Series firewalls
using the firewall template. The vm-auth-key must be configured on Panorama prior to launching
this template.
STEP 1 | Review the checklists in Plan to Deploy VM-Series Auto Scaling Templates for AWS (v2.1)
and Plan the VM-Series Auto Scaling Template for AWS (v2.0 and v2.1).
Verify that you have completed the following tasks:
• (For PAYG only) Review and accept the EULA for the PAYG bundle you plan to use.
• (For BYOL only) Obtain the auth code for a bundle that supports the number of firewalls
that might be required for your deployment. You must save this auth code in a text file
named authcodes (no extensions), and put the authcodes file in the /license folder of
the bootstrap package.
If you use individual auth codes instead of a bundle, the firewall only retrieves the
license key for the first auth code in the file.
• Download the files required to launch the VM-Series Auto Scaling v2.1 template from the
GitHub repository.
VM-Series Deployment Guide Version 10.1 528 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Modify the init-cfg.txt file and upload it to the /config folder.
Because you use Panorama to bootstrap the VM-Series firewalls, your init-cfg.txt file
should be modified as follows. No bootstrap.xml file is needed.
type=dhcp-client
ip-address=
default-gateway=
netmask=
ipv6-address=
ipv6-default-gateway=
hostname=
vm-auth-key=
panorama-server=
panorama-server-2=
tplname=AWS-tmplspoke1
dgname=AWS-dgspoke1
dns-primary=169.254.169.253
dns-secondary=8.8.8.8
op-command-modes=mgmt-interface-swap
dhcp-send-hostname=yes
VM-Series Deployment Guide Version 10.1 529 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
dhcp-send-client-id=yes
dhcp-accept-server-hostname=yesdhcp-accept-server-domain=yes
vm-series-auto-registration-id=
vm-series-auto-registration-pin-value=
STEP 3 | (For BYOL only) Add the license auth code in the /license folder of the bootstrap package.
1. Use a text editor to create a new text file named authcodes (no extension).
2. Add the authcode for your BYOL licenses to this file, and save. The authcode must
represent a bundle, and it must support the number of firewalls that might be required
for your deployment. If you use individual authcodes instead of a bundle, the firewall
only retrieves the license key for the first authcode in the file.
VM-Series Deployment Guide Version 10.1 530 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 4 | Upload Lambda code for the firewall template (panw-aws-zip) and the Application
template (ilb.zip) to an S3 bucket. You can use the same S3 bucket that you use for
bootstrapping.
If the Application stack is managed by a different account than the firewall, use the Application
account to create another s3 bucket in the same AWS region as the firewall template and copy
ilb.zip to that s3 bucket.
VM-Series Deployment Guide Version 10.1 531 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
2. Look up the AMI ID for the VM-Series firewall and enter it. Make sure that the AMI ID
matches the AWS region, PAN-OS version and the BYOL or PAYG licensing option you
opted to use.
3. Select the EC2 Key pair (from the drop-down) for launching the firewall. To log in to the
firewalls, you must provide the name of this key pair and the private key associated with
it.
4. For the SSH from field, the firewalls will be managed by Panorama and do NOT have an
EIP for the management interface. But just in case you decide to assign an EIP configure
the IP range you would connect from.
5. Select Yes if you want to Enable Debug Log. Enabling the debug log generates more
verbose logs that help with troubleshooting issues with the deployment. These logs are
generated using the stack name and are saved in AWS CloudWatch.
By default, the template uses CPU utilization as the scaling parameter for the VM-Series
firewalls. Custom PAN-OS metrics are automatically published to the CloudWatch namespace
that matches the stack name you specified earlier.
VM-Series Deployment Guide Version 10.1 532 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
1. Enter the name of the S3 bucket that contains the bootstrap package.
If the bootstrap bucket is not set up properly or if you enter the bucket name incorrectly,
the bootstrap process fails, and you cannot log in to the firewall. Health checks for the
load balancers also fail.
2. Enter the name of the S3 bucket that contains the panw-aws.zip file. As mentioned
earlier you can use one S3 bucket for the Bootstrap and Lambda code.
STEP 8 | Specify the keys for enabling API access to the firewall and Panorama.
1. Enter the key that the firewall must use to authenticate API calls. The default key is
based on the sample file and you should only use it for testing and evaluation. For a
production deployment, you must create a separate PAN-OS login just for the API call
and generate an associated key.
2. Enter the API Key to allow AWS Lambda to make API calls to Panorama. For a
production deployment, you should create a separate login just for the API call and
generate an associated key.
VM-Series Deployment Guide Version 10.1 533 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 11 | Verify that the template has launched all required resources.
1. On the EC2 Dashboard, select Auto Scaling Groups. Verify that in each AZ, you have one
ASG for the VM-Series firewalls. The ASG name prefix includes the stack name.
2. On the AWS Management Console, select the stack name to view the Output for the list
of resources.
3. Your output should look similar to the output in the following image.
• Take note of the Network Load Balancer Queue name.
• Take note of the Elastic Load Balancer public DNS name.
It may take up to 20 minutes for the firewalls to boot up and be available to handle
traffic.
When you are finished with a testing or a production deployment, the only way
to ensure charges stop occurring is to completely delete the stack. Shutting down
instances, or changing the ASG maximum to 0 is not sufficient.
VM-Series Deployment Guide Version 10.1 534 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 12 | Save the following firewall template information. You must provide these values as inputs
when deploying the application template.
• IP addresses of the NAT Gateway in each AZ—You need this IP address to restrict HTTPS
access to your Panorama so that Lambda can use the EIPs for the NAT Gateway to
communicate with Panorama when needed.
• Network Load Balancer SQS URL—A Lambda function in the firewall stack monitors this
queue so that it can learn about any network load balancers that you deploy and create
NAT policy rules (one per application) in the Panorama that enable the firewalls to send
traffic to the network load balancer IP address.
VM-Series Deployment Guide Version 10.1 535 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 3 | Select the application launch template you want you launch.
1. In the AWS Management Console, select CloudFormation > CreateStack
2. Select Upload a template to Amazon S3, to choose the application template to deploy
the resources that the template launches within the same VPC as the firewalls, or to a
different VPC. Click Open and Next.
3. Specify the Stack name. The stack name allows you to uniquely identify all the resources
that are deployed using this template.
STEP 4 | Configure the parameters for the VPC and network load balancer.
1. Select the two Availability Zones that your setup will span in Select list of AZ. If you are
deploying within the same VPC make sure to select the same Availability Zones that you
selected for the firewall template.
2. If deploying to a new VPC enter a CIDR Block for the VPC. The default CIDR is
192.168.0.0/16.
3. If deploying to the same VPC you will select the previous VPC and use the Trust subnets.
VM-Series Deployment Guide Version 10.1 536 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 7 | Modify the web server EC2 instance type to meet your needs.
STEP 8 | Select the EC2 Key pair (from the drop-down) for launching the web servers. To log in to the
web servers, you must provide the key pair name and the private key associated with it.
STEP 9 | Select the IP address of the network you will be accessing the servers from for management
access only. Web traffic comes through the ELBDNS name you copied when you launched
the firewall template.
VM-Series Deployment Guide Version 10.1 537 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 11 | After completion of the application template it can take up to 20 minutes for the web pages
to become active.
1. Verify that the application template load balancer is marked active.
STEP 12 | Get the DNS name you saved earlier for the application load balancer and enter it into a web
browser.
VM-Series Deployment Guide Version 10.1 538 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 13 | Upon successful launch your browser should look like this output.
When creating a custom AMI with a BYOL version of the firewall, you must first activate
the license on the firewall so that you can access and download PAN-OS content and
software updates to upgrade your firewall, and then deactivate the license on the firewall
before performing the private data reset and creating the custom AMI. If you do not
deactivate the license, you lose the license that you applied on this firewall instance.
VM-Series Deployment Guide Version 10.1 539 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
Enter y to confirm.
The firewall reboots to initialize the default configuration.
VM-Series Deployment Guide Version 10.1 540 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
5. Verify that the custom AMI is created and has the correct product code.
1. On the EC2 Dashboard, select AMI.
2. Select the AMI that you just created. Depending on whether you selected an AMI
with the BYOL, Bundle 1, or Bundle 2 licensing options, you should see one of the
following Product Codes in the details:
• BYOL—6njl1pau431dv1qxipg63mvah
• Bundle 1—6kxdw3bbmdeda3o6i1ggqt4km
• Bundle 2—806j2of0qy5osgjjixq9gqc6g
VM-Series Deployment Guide Version 10.1 541 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Locate the firewall template and application template you launched previously and delete
both templates.
For more information on deleting template stacks see, “What is AWS CloudFormation?“
SQS Messaging Between the Application Template and Firewall Template (v2.1)
VM-Series firewalls deployed using one of the firewall templates can detect and send traffic to
the load balancers to which you want to automatically distribute incoming traffic. To accomplish
this, the firewall template includes a lambda function that monitors a Simple Queue Service for
messages. The message allows the lambda function to learn about a new load balancer and then
automatically create a NAT policy rule on the firewall to send traffic to the load balancer’s IP
address. To route traffic properly within the AWS infrastructure, the message must also include
basic information on the DNS, VPC ID, and the AZ to which the load balancer belongs.
If you are building your own application template, you must set up your application template to
post ADD and DEL messages to the SQS URL that the firewall template uses to learn about load
balancers to which it must distribute traffic in your environment:
• ADD-NLB message that informs the firewalls when a new network load balancer is available.
• DEL-NLB message that informs the firewalls when a network load balancer has been
terminated and is no longer available.
• ADD-ALB message that informs the firewalls when a new application load balancer is available.
VM-Series Deployment Guide Version 10.1 542 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
• DEL-ALB message that informs the firewalls when a application load balancer has been
terminated and is no longer available.
The following examples of each message type include sample values. You must modify these
messages with values that match your deployment.
ADD-NLB Message
msg_add_nlb= {
"MSG-TYPE": "ADD-NLB",
"AVAIL-ZONES": [
"NLB-IP":"192.168.2.101",
"ZONE-NAME":"us-east-2a",
"SUBNET-ID": "subnet-2a566243"
},
"NLB-IP":"192.168.12.101",
"ZONE-NAME":"us-east-2b",
],
"DNS-NAME": "publicelb1-2119989486.us-
east-2.elb.amazonaws.com",
VM-Series Deployment Guide Version 10.1 543 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
"VPC-ID": "vpc-42ba9f2b",
"NLB-NAME": "publicelb1"
DEL-NLB Message
msg_del_nlb= {
"MSG-TYPE": "DEL-NLB",
"DNS-NAME": "publicelb1-2119989486.us-east-2.elb.amazonaws.com",
ADD-ALB
{ "AVAIL-ZONES": [
"SUBNET-CIDR": "172.32.0.0/24",
"SUBNET-ID": "subnet-0953a3a8e2a8208a9",
"ZONE-NAME": "us-east-2a"
},
"SUBNET-CIDR": "172.32.2.0/24",
"SUBNET-ID": "subnet-0a9602e4fb0d88baa",
"ZONE-NAME": "us-east-2c"
VM-Series Deployment Guide Version 10.1 544 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
},
"SUBNET-CIDR": "172.32.1.0/24",
"SUBNET-ID": "subnet-0b31ed16f308b3c4d",
"ZONE-NAME": "us-east-2b"
],
"VPC-PEERCONN-ID": "pcx-0538bb05dbe2e1b8e",
"VPC-CIDR": "172.32.0.0/16",
"ALB-NAME": "appILB-908-0",
"ALB-ARN":"arn:aws:elasticloadbalancing:us-
east-2:018147215560:loadbalancer/app/appILB-908-0/1997ed20eeb5bcef",
"VPC-ID": "vpc-0d9234597da6d9147",
"MSG-TYPE": "ADD-ALB",
"DNS-NAME": "internal-appILB-908-0-484644265.us-
east-2.elb.amazonaws.com"
DEL-ALB Message
"MSG-TYPE": "DEL-ALB",
VM-Series Deployment Guide Version 10.1 545 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
"DNS-NAME": "internal-appILB-908-0-484644265.us-
east-2.elb.amazonaws.com"
Refer to the AWS documentation for details on how to send a message to an Amazon SQS
Queue.
Stack Update with VM-Series Auto Scaling Template for AWS (v2.1)
A stack update allows you to modify the resources that the VM-Series Auto Scaling template
firewall template deploys. Instead of deleting your existing deployment and redeploying the
solution, use the stack update to modify launch configuration parameters.
You can modify the AWS instance type, the key pair for your auto scaling groups, and the APi key
associated with the adminstrative user account on the firewall.
You do not have to update the stack to modify default notifications or create auto scaling
alarms. See Change Scaling Parameters and CloudWatch Metrics (v2.1).
When you deploy the VM-Series Auto Scaling template, the auto scaling groups and the launch
configuration are automatically created for you. The launch configuration is a template that an
auto scaling group uses to launch EC2 instance, and it specifies parameters such as the instance
type, the key pair for your auto scaling group, or the API key associated with the administrative
user account on the firewall.
You can update your stack directly or create change sets. The workflow in this document takes
you through the manual stack update.
STEP 1 | In the AWS CloudFormation console, select the parent stack that you want to update and
choose Actions > Update Stack.
VM-Series Deployment Guide Version 10.1 546 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 3 | Acknowledge the notifications and review the changes and click Update to initiate the stack
update.
STEP 3 | Update the API key in the stack to ensure that newly launched firewalls have the updated
administrator account.
See Stack Update with VM-Series Auto Scaling Template for AWS (v2.0).
VM-Series Deployment Guide Version 10.1 547 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 2 | Choose a Custom Namespace link, and select the metrics link to view the custom PAN-OS
metrics.
STEP 3 | Check a box to select a metric, then select the Graphed metrics tab.
1. In the Statistics column, choose a statistic criteria (such as average, minimum and
maximum) and choose a time period.
2. In the Actions column select the bell (Create alarm).
STEP 4 | Define an alarm that removes a firewall when CPU utilization meets or falls below the criteria
you set, over the time frame you set.
1. Select Edit to change the graph title.
2. Under Alarm details fill in the Name and Description, choose an operator, and set
the minimum value to maintain the current instances. If the minimum value is not
maintained, an instance is removed.
3. Under Actions, delete the default notification.
4. Select +AutoScaling Action.
• Use the From the list to select your namespace.
• From Take this action, select the policy to remove an instance.
STEP 5 | Create a second alarm that adds a firewall when CPU utilization meets or exceeds the criteria
you set.
VM-Series Deployment Guide Version 10.1 548 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
STEP 6 | To view your alarms, select Services > CloudWatch > Alarms.
To edit an alarm from this window, check the box next to the alarm and select Action > Edit.
VM-Series Deployment Guide Version 10.1 549 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The maximum length of the tag-value (name and value included) must be 116
characters or less. If a tag is longer than 116 characters, Panorama does not retrieve
the tag and register it on the firewalls.
VM-Series Deployment Guide Version 10.1 550 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
VM-Series Deployment Guide Version 10.1 551 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on AWS
The IAM policy associated with the user must either have global read-only access such as
AmazonEC2ReadOnlyAccess, or must include individual permissions for all of the monitored
attributes. The following IAM policy example lists the permissions for initiating the API actions for
monitoring the resources in the AWS VPC:
{ “Version”: “2012-10-17",
“Statement”: [
{
“Sid”: “VisualEditor0”,
“Effect”: “Allow”,
“Action”: [
“elasticloadbalancing:DescribeLoadBalancerAttributes”,
“elasticloadbalancing:DescribeLoadBalancers”,
“elasticloadbalancing:DescribeTags”,
“ec2:DescribeInstances”,
“ec2:DescribeNetworkInterfaces”,
“ec2:DescribeVpcs”,
“ec2:DescribeVpcEndpoints”,
“ec2:DescribeSubnets”
],
“Resource”: “*”
}
]
}
VM-Series Deployment Guide Version 10.1 552 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Kernel-based Virtual Machine (KVM) is an open-source virtualization module for
servers running Linux distributions. The VM-Series firewall can be deployed on a Linux
server that is running the KVM hypervisor.
This guide assumes that you have an existing IT infrastructure that uses Linux and
have the foundation for using Linux/Linux tools. The instructions only pertain to
deploying the VM-Series firewall on KVM.
553
Set Up the VM-Series Firewall on KVM
Requirements Description
Hardware Resources See VM-Series System Requirements for the minimum hardware
requirements for your VM-Series model.
Software Versions See the supported KVM software versions in the Compatibility Matrix.
SR-IOV Drivers See PacketMMAP Driver Versions drivers in the Compatibility Matrix.
VM-Series Deployment Guide Version 10.1 554 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Requirements Description
• For PCI passthrough/SR-IOV support, the VM-Series firewall has
been tested for the following network cards:
• Intel 82576 based 1G NIC: SR-IOV support on all supported
Linux distributions; PCI-passthrough support.
• Intel 82599 based 10G NIC: SR-IOV support on all supported
Linux distributions; PCI-passthrough support.
• Intel X710 10G NIC: SR-IOV support on all supported Linux
distributions; PCI-passthrough support
• Intel X722 10G NIC: SR-IOV support on all supported Linux
distributions; PCI-passthrough support
• Broadcom 57112 and 578xx based 10G NIC: SR-IOV support on
all supported Linux distributions; No PCI-passthrough support.
• Mellanox ConnectX5 10G/25G/50G/100G NIC: SR-IOV support
on all supported Linux distributions.
• Refer to PacketMMAP Driver Versions in the Compatibility
Matrix
VM-Series Deployment Guide Version 10.1 555 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
• With a Linux bridge or OVS, data traffic uses the software bridge to connect guests on the
same host. For external connectivity, data traffic uses the physical interface to which the
bridge is attached.
• With PCI passthrough, data traffic is passed directly between the guest and the physical
interface to which it is attached. When the interface is attached to a guest, it is not available to
the host or to other guests on the host.
• With SR-IOV, data traffic is passed directly between the guest and the virtual function to
which it is attached.
VM-Series Deployment Guide Version 10.1 556 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Make sure that the link state for each interface you plan to use is Up—sometimes you have to
manually bring up the interface.
If using a Linux bridge or OVS, verify that you have set up the bridges required to send/receive
traffic to/from the firewall. If not, create bridge(s) and verify that they are up before you begin
installing the firewall.
If using SR-IOV or PCI-passthrough, verify the PCI ID of all the interfaces. To view the list, use
the following command:
Virsh nodedev-list –tree
See Verify PCI-ID for Ordering of Network Interfaces on the VM-Series Firewall.
If using SR-IOV or PCI-passthrough, verify that the virtualization extensions (VT-d/IOMMU)
are enabled in the BIOS. For example, to enable IOMMU, intel_iommu=on must be defined
in /etc/grub.conf. Refer to the documentation provided by your system vendor for
instructions.
If using PCI-passthrough, ensure that the VM-Series firewall has exclusive access to the
interface(s) that you plan to attach to it.
To allow exclusive access, you must manually detach the interface(s) from the Linux server.
Virsh nodedev-detach <pci id of interface>
For example:
Virsh nodedev-detach pci_0000_07_10_0
In some cases, you might need to edit /etc/libvirt/qemu.conf and uncomment
relaxed_acs_check = 1.
If using SR-IOV, verify that the virtual function capability is enabled for each port that you plan
to use on the network card. With SR-IOV, a single Ethernet port (physical function) can be split
into multiple virtual functions. A guest can be mapped to one or more virtual functions.
Enable virtual functions as follows:
1. Create a new file in this location: /etc/modprobe.d/
2. Use vi to edit the file to make the functions persistent:
vim /etc/modprobe.d/igb.conf
3. Enable the number of number of virtual functions required:
options igb max_vfs=4
In the above example, after you save the changes and reboot the Linux server, each
interface (or physical function) will have 4 virtual functions.
Refer to the documentation provided by your network vendor for details on the actual number
of virtual functions supported, and instructions to enable virtual functions.
Install Mellanox Software Tools
If you are using a Mellanox CX5 card, install the Mellanox software tools on the host. Before
installing, verify Linux support and your networking infrastructure.
VM-Series Deployment Guide Version 10.1 557 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 1 | From the host, download the package for Mellanox OpenFabric Enterprise Distribution for
Linux (MLNX_OFED) for your OS version from the following link:
https://www.mellanox.com/products/infiniband-drivers/linux/mlnx_ofed
# mst status
MST modules:
------------------------------------------------------------------
MST PCI module is not loaded
MST PCI configuration module loaded
MST devices:
------------------------------------------------------------------
/dev/mst/mt4121_pciconf0 - PCI configuration cycles access.
domain:bus:dev.fn=0000:3b:00.0 addr.reg=88 data.reg=92
Chip revision is: 00
Enable Virtual Functions for Mellanox CX5 NICs on the VM-Series Firewall on KVM
Install the Mellanox software tools before you enable virtual functions on Mellanox Cx5 NICs.
STEP 1 | Ensure Mellanox Software Tools (mst) are started.
STEP 2 | Enable the number of number of virtual functions required. For example:
After you save the changes and reboot the Linux server, each interface (or physical function)
in the above example will have 4 virtual functions. Refer to the documentation provided by
VM-Series Deployment Guide Version 10.1 558 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
your network vendor for details on the actual number of virtual functions supported, and the
instructions to enable virtual functions.
You might see the following error message the first time you enable virtual functions
on Mellanox Cx5 NICs:
To resolve the issue, enter the following command sequence on the Linux server:
# cat /sys/class/net/enp59s0f1/device/sriov_numvfs
(Optional) If the virtual functions are not set correctly (the status is 0 or empty), run the
following command:
STEP 4 | List the PCI devices to accurately match the number of virtual functions loaded on the
respective physical function for Mellanox:
VM-Series Deployment Guide Version 10.1 559 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
VM-Series Deployment Guide Version 10.1 560 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
VM-Series Deployment Guide Version 10.1 561 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
In another variation of this deployment, a pair of VM-Series firewalls are deployed in a high
availability set up. The VM-Series firewalls in the following illustration are deployed on a Linux
server with SR-IOV capable adapters. With SR-IOV, a single Ethernet port (physical function) can
be split into multiple virtual functions. Each virtual function attached to the VM-Series firewall is
configured as a Layer 3 interface. The active peer in the HA pair secures traffic that is routed to it
from guests that are deployed on a different Linux server.
VM-Series Deployment Guide Version 10.1 562 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
VM-Series Deployment Guide Version 10.1 563 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 1 | Create a new virtual machine and add the VM-Series Firewall for KVM image to virt-mgr.
1. On the Virt-manager, select Create a new virtual machine.
2. Add a descriptive Name for the VM-Series firewall.
3. Select Import existing disk image, browse to the image, and set the OS Type: Linux and
Version: Red Hat Enterprise Linux 6.
If you prefer, you can leave the OS Type and Version as Generic.
VM-Series Deployment Guide Version 10.1 564 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 3 | Enable configuration customization and select the management interface bridge.
1. Select Customize configuration before install.
2. Under Advanced options, select the bridge for the management interface, and accept the
default settings.
VM-Series Deployment Guide Version 10.1 565 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
If you want to use a SCSI disk bus, see Enable the Use of a SCSI Controller.
2. Expand Performance options, and set Cache mode to writethrough. This setting
improves installation time and execution speed on the VM-Series firewall.
VM-Series Deployment Guide Version 10.1 566 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
4. Select Add Hardware > PCI Host Device for PCI-passthrough or an SR-IOV capable
device.
5. In the Host Device list, select the interface on the card or the virtual function.
6. Click Apply or Finish.
VM-Series Deployment Guide Version 10.1 567 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 6 | Click Begin Installation . Wait 5-7 minutes for the installation to complete.
By default, the XML template for the VM-Series firewall is created and stored at etc/
libvirt/qemu.
STEP 8 | Configure the network access settings for the management interface.
1. Open a connection to the console.
2. Log into the firewall with username/password: admin/admin.
3. Enter configuration mode with the following command:
configure
where <Firewall-IP> is the IP address you want to assign to the management interface,
<netmask> is the subnet mask, <gateway-IP> is the IP address of the network
gateway, and <DNS-IP> is the IP address of the DNS server.
3. commit
VM-Series Deployment Guide Version 10.1 568 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 9 | Verify which ports on the host are mapped to the interfaces on the VM-Series firewall. In
order to verify the order of interfaces on the Linux host, see Verify PCI-ID for Ordering of
Network Interfaces on the VM-Series Firewall.
To make sure that traffic is handled by the correct interface, use the following command to
identify which ports on the host are mapped to the ports on the VM-Series firewall.
STEP 10 | Access the web interface of the VM-Series firewall and configure the interfaces and define
security rules and NAT rules to safely enable the applications that you want to secure.
Refer to the PAN-OS Administrator’s Guide.
VM-Series Deployment Guide Version 10.1 569 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 3 | Configure the network access settings for the management interface.
Enter the following commands:
If a single error is encountered in parsing the bootstrap file, the VM-Series firewall will
reject all the configuration in this file and boot with default values.
STEP 1 | Create the XML file and define it as a virtual machine instance.
For a sample file, see Sample XML file for the VM-Series Firewall.
In this example, the VM-Series firewall is called PAN_Firewall_DC1.
For example:
VM-Series Deployment Guide Version 10.1 570 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Use the following example as a template for the bootstrap-networkconfig file. The bootstrap-
networkconfig file can include the following parameters only:
<vm-initcfg>
<hostname>VM_ABC_Company</hostname>
<ip-address>10.5.132.162</ip-address>
<netmask>255.255.254.0</netmask>
<default-gateway>10.5.132.1</default-gateway>
<dns-primary>10.44.2.10</dns-primary>
<dns-secondary>8.8.8.8</dns-secondary>
<panorama-server-primary>10.5.133.4</panorama-server-primary>
<panorama-server-secondary>10.5.133.5</panorama-server-secondary>
</vm-initcfg>
Save the ISO file in the images directory (/var/lib/libvirt/image) or the qemu directory
(/etc/libvirt/qemu) to ensure that the firewall has read access to the ISO file.
For example:
VM-Series Deployment Guide Version 10.1 571 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
To modify the number of vCPUs assigned on the VM-Series firewall, change the value 2 to
4 or 8 vCPUs in this line of the sample XML file:
<vcpu placement="static">2</vcpu>
VM-Series Deployment Guide Version 10.1 572 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Alternatively, you can enable management interface swap as part of the init-cfg.txt File
Components when bootstrapping.
STEP 1 | Log in to the VM-Series firewall CLI and enter the following command:
set system setting mgmt-interface-swap enable yes
STEP 2 | Confirm that you want to swap the interface and use the eth1 dataplane interface as the
management interface.
STEP 3 | Reboot the firewall for the swap to take effect. Use the following command:
request restart system
STEP 4 | Verify that the interfaces have been swapped. Use the following command:
KVM on Ubuntu 12.04 does not support the virtio-scsi controller; the virtio-scsi controller
can only be enabled on the VM-Series firewall running on RHEL or CentOS.
This process requires virsh because Virt manager does not support the virtio-scsi
controller.
STEP 1 | Create an XML file for the SCSI controller. In this example, it is called virt-scsi.xml.
VM-Series Deployment Guide Version 10.1 573 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
</controller>
Make sure that the slot used for the virtio-scsi controller does not conflict with another
device.
STEP 2 | Associate this controller with the XML template of the VM-Series firewall.
STEP 4 | Edit the XML template of the VM-Series firewall. In the XML template, you must change the
target disk and the disk bus, used by the firewall.
VM-Series Deployment Guide Version 10.1 574 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
<interface type='bridge'>
<mac address='52:54:00:d7:91:52'/>
<source bridge='mgmt-br'/>
<model type='virtio'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03'
function='0x0'/>
</interface>
<interface type='bridge'>
<mac address='52:54:00:f4:62:13'/>
<source bridge='br8'/>
<model type='e1000'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x10'
function='0x0'/>
</interface>
<interface type='bridge'>
<mac address='52:54:00:fe:8c:80'/>
<source bridge='br8'/>
<model type='e1000'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x06'
function='0x0'/>
</interface>
VM-Series Deployment Guide Version 10.1 575 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
VM-Series Deployment Guide Version 10.1 576 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
[...]
<interface type='bridge'>
<mac address='52:54:00:fb:00:01'/>
<source bridge='ovsbr0'/>
<virtualport type='openvswitch'/>
<model type='virtio'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03'
function='0x0'/>
</interface>
[...]
wget http://dpdk.org/browse/dpdk/snapshot/dpdk-2.2.0.tar.gz
VM-Series Deployment Guide Version 10.1 577 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
vi GNUmakefile
wget http://openvswitch.org/releases/openvswitch-2.5.1.tar.gz
tar xzvf openvswitch-2.5.1.tar.gz
cd openvswitch-2.5.1
./configure –with-dpdk=”/root/dpdk-2.2.0/x86_64-native-linuxapp-
gcc/”
make
make install
STEP 2 | If you are replacing or reconfiguring an existing OVS-DPDK setup, execute the following
commands to reset any previous configuration. Repeat the command for each interface.
rm /usr/local/var/run/openvswitch/<interface-name>
mkdir /dev/hugepages
mkdir /dev/hugepages/libvirt
mkdir /dev/hugepages/libvirt/qemu
mount -t hugetlbfs hugetlbfs /dev/hugepages/libvirt/qemu
VM-Series Deployment Guide Version 10.1 578 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 5 | Use the following command to kill any currently existing OVS daemon.
mkdir -p /usr/local/etc/openvswitch
mkdir -p /usr/local/var/run/openvswitch
rm -f /var/run/openvswitch/vhost-user*
rm -f /usr/local/etc/openvswitch/conf.db
ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock
\
--remote=db:Open_vSwitch,Open_vSwitch,manager_options \
--private-key=db:Open_vSwitch,SSL,private_key \
--certificate=db:Open_vSwitch,SSL,certificate \
--bootstrap-ca-cert=db:Open_vSwitch,SSL,ca_cert \
--pidfile --detach
export DB_SOCK=/usr/local/var/run/openvswitch/db.sock
STEP 12 | Install the igb_uio module (network device driver) for DPDK.
cd ~/dpdk-2.2.0/x86_64-native-linuxapp-gcc/kmod
modprobe uio
insmod igb_uio.ko
cd ~/dpdk-2.2.0/tools/
VM-Series Deployment Guide Version 10.1 579 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 14 | Start the OVS daemon in DPDK mode. You can change the number of cores for ovs-
vswitchd. By changing -c 0x1 to -c 0x3, you can have two core run this daemon.
STEP 15 | Create the OVS bridge and attach ports to the OVS bridge.
STEP 17 | Set the number of hardware queues of the NIC used by the host.
STEP 19 | Set the necessary permissions for DPDK vhost user ports. In the example below, 777 is used
to give read, write, and executable permissions.
VM-Series Deployment Guide Version 10.1 580 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
<memory unit='KiB'>12582912</memory>
<currentMemory unit='KiB'>6291456</currentMemory>
<memoryBacking>
<hugepages/>
<cpu mode='host-model'>
<numa>
<cell id='0' cpus='0,2,4,6' memory='6291456' unit='KiB'
memAccess='shared'/>
<cell id='1' cpus='1,3,5,7' memory='6291456' unit='KiB'
memAccess='shared'/>
</numa>
5. Set the DPDK vhost user ports as the VM -series firewall’s network interfaces.
Additionally, set the number of virtio virtual queues provided to the VM-Series firewall
by the host.
<interface type='vhostuser'>
<mac address='52:54:00:36:83:70'/>
<source type='unix' path='/usr/local/var/run/
openvswitch/vhost-user1' mode='client'/>
<model type='virtio'/>
<driver name=’vhost’ queues=’8’/>
<address type='pci' domain='0x0000' bus='0x00'
slot='0x04' function='0x0'/>
</interface>
<interface type='vhostuser'>
<mac address='52:54:00:30:d7:94'/>
<source type='unix' path='/usr/local/var/run/
openvswitch/vhost-user2' mode='client'/>
<model type='virtio'/>
<driver name=’vhost’ qeueus=’8’>
VM-Series Deployment Guide Version 10.1 581 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
<network>
<name>passthrough</name>
<forward mode='hostdev' managed='yes'>
<pf dev='eth3'/>
</forward>
</network>
STEP 2 | To ensure that the VM-Series firewall boots in DPDK mode, edit the guest VM XML
configuration on the KVM hypervisor to add the following:
<cpu mode='host-passthrough' check='none'/>
This ensures that the CPU flags are exposed.
To verify that the CPU flags are exposed on the VM:
cat /proc/cpuinfo
In the flags output for PAN-OS 10.1 or later with DPDK 18.11, you need AVX, or AES and
SSE flags.
STEP 3 | After defining and starting the network, modify the guest XML definition to specify the
network.
<interface type='network'>
<source network='passthrough'>
VM-Series Deployment Guide Version 10.1 582 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
</interface>
STEP 1 | On the host system, set up the physical and virtual function to operate in VLAN access
mode.
ip link set [inf_name] vf [vf_num] vlan [vlan_id].
VM-Series Deployment Guide Version 10.1 583 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
<interface type='network'>
<source network='default'/>
<model type='virtio'/>
<driver name='vhost' queues='N'/>
</interface>
% virsh capabilities
<…>
<topology>
<cells num='2'>
<cell id='0'>
<memory unit='KiB'>33027228</memory>
<pages unit='KiB' size='4'>8256807</pages>
<pages unit='KiB' size='2048'>0</pages>
<distances>
<sibling id='0' value='10'/>
<sibling id='1' value='20'/>
</distances>
<cpus num='8'>
<cpu id='0' socket_id='1' core_id='0' siblings='0,8'/>
<cpu id='2' socket_id='1' core_id='1' siblings='2,10'/>
<cpu id='4' socket_id='1' core_id='2' siblings='4,12'/>
<cpu id='6' socket_id='1' core_id='3' siblings='6,14'/>
<cpu id='8' socket_id='1' core_id='0' siblings='0,8'/>
<cpu id='10' socket_id='1' core_id='1' siblings='2,10'/>
<cpu id='12' socket_id='1' core_id='2' siblings='4,12'/>
<cpu id='14' socket_id='1' core_id='3' siblings='6,14'/>
</cpus>
</cell>
VM-Series Deployment Guide Version 10.1 584 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
<cell id='1'>
<memory unit='KiB'>32933812</memory>
<pages unit='KiB' size='4'>8233453</pages>
<pages unit='KiB' size='2048'>0</pages>
<distances>
<sibling id='0' value='20'/>
<sibling id='1' value='10'/>
</distances>
<cpus num='8'>
<cpu id='1' socket_id='0' core_id='0' siblings='1,9'/>
<cpu id='3' socket_id='0' core_id='1' siblings='3,11'/>
<cpu id='5' socket_id='0' core_id='2' siblings='5,13'/>
<cpu id='7' socket_id='0' core_id='3' siblings='7,15'/>
<cpu id='9' socket_id='0' core_id='0' siblings='1,9'/>
<cpu id='11' socket_id='0' core_id='1' siblings='3,11'/>
<cpu id='13' socket_id='0' core_id='2' siblings='5,13'/>
<cpu id='15' socket_id='0' core_id='3' siblings='7,15'/>
</cpus>
</cell>
</cells>
STEP 2 | Pin vCPUs in a KVM guest to specific physical vCPUs, use the cpuset attribute in the guest
xml definition. In this example, all 8 vCPUs are pinned to physical CPUs in the first NUMA
node. If you do not wish to explicitly pin the vCPUs, you can omit the cputune block, in
which case, all vCPUs will be pinned to the range of CPUs specified in cpuset, but will not be
explicitly mapped.
<vcpu cpuset='0,2,4,6,8,10,12,14'>8</vcpu>
<cputune>
<vcpupin vcpu='0' cpuset='0'/>
<vcpupin vcpu='1' cpuset='2'/>
<vcpupin vcpu='2' cpuset='4'/>
<vcpupin vcpu='3' cpuset='6'/>
<vcpupin vcpu='4' cpuset='8'/>
<vcpupin vcpu='5' cpuset='10'/>
<vcpupin vcpu='6' cpuset='12'/>
<vcpupin vcpu='7' cpuset='14'/>
</cputune>
VM-Series Deployment Guide Version 10.1 585 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Intelligent Traffic Offload does not support the accelerated aging session setting.
VM-Series Deployment Guide Version 10.1 586 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
You can deploy only one VM-Series firewall and one BlueField-2 DPU per host.
VM-Series Deployment Guide Version 10.1 587 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
• Host physical interfaces for the BlueField-2 DPU 100GB ports (created from the host OS).
You connect the PAN-OS interfaces to the BlueField-2 DPU through SR-IOV virtual functions
(VFs) you create on the physical host (see Enable Virtual Functions).
In the following figure, the two BlueField-2 DPU ports are shown as Physical Functions PF0 and
PF1. These PFs can be observed from the host side as enp4s0f0 and enp4s0f1, and are divided
into multiple VFs for SR-IOV functionality.
High Availability
Active/Passive HA is supported for a pair of VM-Series firewalls deployed in Vwire mode on
physical hosts.
• The firewalls must be installed on physical hosts with the BlueField-2 DPU configured as
specified in Intelligent Traffic Offload Requirements.
• For the HA2 interface (see the figures in Active Packet Flow and Passive Packet Flow), use the
same Mellanox interface (cx-3, cx-4, or cx-5) on both hosts.
• (optional) To support traffic switching, the hosts must be on separate VLANs so you can use
VLAN tags to select the primary, as described in Secure Traffic Across Linux Hosts.
ITO H/A focuses on VM-Series firewall availability. Each firewall maintains a session table, and
each BlueField-2 DPU maintains a flow table. The HA configuration synchronizes the active
VM-Series Deployment Guide Version 10.1 588 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
session table, ensuring it is mirrored to the passive firewall at runtime. The session table stores
both sessions that require inspection and sessions that are marked for offload.
HA uses the PAN-OS interface eth3, which is on a NIC on the VM-Series firewall. Eth3 is used
to select the active firewall, and sync the VM-Series firewall session tables on the active/passive
pair.
VM-Series Deployment Guide Version 10.1 589 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Failover Event
A failover event occurs when there is either a notification from the active VM-Series firewall or
the passive firewall detects that the active is not responding. When this happens the network
connections to ports Pa1 and Pa2 go down and the network connections to ports Ps1 and Ps2
become active.
1. The packet is sent from the client application to the network switch.
2. The packet arrives at the switch port that is programmed to add a VLAN 100 tag to the
packets.
3. The tagged packets can only go to Port Ps1 because the interface for port Pa1 is down and
that firewall has now moved from passive to active.
4. The packet arrives at port Ps1 and VLAN 100 is removed from the packet and the packet is
delivered to the firewall eth1.
5. The firewall is running in vWire mode so the packet is processed by the firewall and then sent
out eth2.
6. The packet arrives at port Ps2 and VLAN 200 is added.
7. The packet is sent out port Ps2 and can only be delivered to port Ps because the other VLAN
200 port Pa2 is down.
8. The packet arrives at port Ps and the VLAN 200 tag is removed.
9. The packet is sent out port Ps with no VLAN tag.
10.The packet is delivered to the server.
VM-Series Deployment Guide Version 10.1 590 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
VM-Series Deployment Guide Version 10.1 591 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 2 | Allocate VFs to the VM-Series firewall from the KVM hypervisor.
The Guest PAN-OS won’t boot unless VFs are allocated to the VM.
VM-Series Deployment Guide Version 10.1 592 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
$ password:
STEP 2 | If the host network interface for the Rshim driver does not have an IP address, you must
create one.
$ ip addr add dev tmfifo_net0 192.168.100.1/24
STEP 3 | From the host machine log in to the BlueField-2 DPU subsystem.
$ ssh ubuntu@192.168.100.2
$ password: ubuntu
If this is your first login the system prompts you to replace the default password with a new
password.
$ MLNX_OFED_LINUX-5.3-0.3.3
VM-Series Deployment Guide Version 10.1 593 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 2 | Install the BFB from the Rshim boot location on the physical host.
Note, the filename below (the string starting with DOCA and ending with .bfb) does not
contain spaces. Enter the command on a single line.
$ cat DOCA_v1.0_BlueField_OS_Ubuntu_20.04-5.3-1.0.0.0-3.6.0.11699-1-
aarch64.bfb > /dev/rshim0/boot
Use the new password you created in Check the BlueField-2 DPU System.
$ ssh ubuntu@192.168.100.2
$ password:
$ password:
VM-Series Deployment Guide Version 10.1 594 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
STEP 7 | Start the opof (open offload) service on the BlueField-2 DPU. opof is a standalone service at
this time.
The VFs must exist before you start opof. See Enable Virtual Functions.
$ opof_setup
$ service opof restart
STEP 3 | On the BlueField-2 DPU check the Debian package in the repository.
$ apt search opof
Sorting... Done
Full Text Search... Done
opof/now 1.0.4 arm64 [installed,local]
Nvidia Firewall Open Offload Daemon
VM-Series Deployment Guide Version 10.1 595 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
$ admin@PA-VM>
VM-Series Deployment Guide Version 10.1 596 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
$ password: ubuntu
$ ubuntu> sudo -i
VM-Series Deployment Guide Version 10.1 597 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
PAN-OS Troubleshooting
Validate Traffic Flows
Data traffic can be generated from the client and consumed through the Intelligent Traffic Offload
setup by a server. IPERF3 can be used to generate traffic, as discussed in Run IPERF3 Tests. Once
the traffic is initiated, the first few packets of the flow are sent to the PA-VM which decides if the
flow needs to be offloaded or not.
An application override policy must be defined to identify flows for offload. A TCP flow sets
the FIN/RST flag on a control packet and sends it to the PA-VM. When the PA-VM decides
to offload the flow, use show session all to display the offloaded flows. Use show session
id <flowID> to provide information on the state of the flow. An offloaded flow has the state
Offload: yes.
The flow counters are not updated while subsequent packets of the flow are in the offload state
and are passing through the BlueField-2 DPU. Once the flow completes, the offload service
triggers an age-out timer (TCP aging configured from the CLI). When the timer expires, the service
collects the updated flow statistics and sends them to the VM-Series firewall. The firewall then
updates its flow session counters, and show session id <flowID> returns the updated
values.
VM-Series Deployment Guide Version 10.1 598 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
Session Counters
Use the following command to view session counters.
admin@PA-VM > show counter global | match flow_offload
The output columns for each counter are:
Counter Name | Value | Rate | Severity | Category | Aspect | Description.
• Value—Number of occurrences since system start.
• Rate—Frequency of counter change.
• Severity—Info, Warning, Drop. Used for Tech Support.
• Category—Flow (a component of a session).
• Aspect—Offload for an entire flow.
VM-Series Deployment Guide Version 10.1 599 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
iperf3 -c <server-ip-address> -t 60
OPOF Troubleshooting
You can also view the offload service logs to validate connectivity:
root@linux:~# service opof status
VM-Series Deployment Guide Version 10.1 600 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
The logs show that the Intelligent Traffic Offload is communicating with the VM-Series firewall
PA-VM over the server listening on IP address, and you see the VFs along with other
details of the DPDK parameters. Also attached is a log from the addition of a TCP flow that is
offloaded.
References
• NVIDIA BlueField Ethernet DPU User Guide
• NVIDIA BLUEFIELD DPU FAMILY SOFTWARE V3.5.0.11563 D
• Nvidia DPU Intelligent Traffic Offload Daemon
• OpenOffload gRPC GITHUB
• PAN-OS Administrator’s Guide
VM-Series Deployment Guide Version 10.1 601 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on KVM
VM-Series Deployment Guide Version 10.1 602 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
Hyper-V
The VM-Series firewall can be deployed on a server running Microsoft Hyper-V.
Hyper-V is packaged as a standalone hypervisor or as an add-on/role for Windows
Server.
603
Set Up the VM-Series Firewall on Hyper-V
VM-Series Deployment Guide Version 10.1 604 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
VM-Series Deployment Guide Version 10.1 605 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
DPDK is only supported with Nvidia/Mellanox(Mlx5) SRIOV devices. Trunk mode with
SR-IOV is not supported.
VM-Series Deployment Guide Version 10.1 606 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
VM-Series Deployment Guide Version 10.1 607 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
VM-Series Deployment Guide Version 10.1 608 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
VM-Series are not dropped by the virtual network adapter if the source MAC address does not
match the outgoing interface MAC address.
STEP 2 | Select Settings > Hardware > Network Adapter > Hardware Acceleration.
STEP 3 | Under Virtual machine queue, uncheck Enable virtual machine queue.
STEP 4 | Click Apply save your changes and OK to exit the VM settings.
VM-Series Deployment Guide Version 10.1 609 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
STEP 4 | Connect at least one network adapter for the dataplane interface on the firewall.
1. Select Settings > Hardware > Add Hardware and select the Hardware type for your
network adapter.
Legacy Network Adapter and SR-IOV are not supported. If selected, the VM-
Series firewall will boot into maintenance mode.
2. Click OK.
STEP 5 | (Optional) Enable MAC address spoofing on Hyper-V if you are not using Layer 3 with
hypervisor assigned MAC address.
1. Double click the dataplane virtual network adapter and click Advanced Settings.
2. Click the Enable MAC address spoofing check box and click Apply.
VM-Series Deployment Guide Version 10.1 610 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
2. Set processor count based on the VM-Series System Requirements of your VM-Series
model.
STEP 4 | Connect at least one network adapter for the management interface on the firewall.
Connect the default network adapter created during VM creation to management vSwitch.
STEP 5 | (Optional) Enable MAC address spoofing on Hyper-V if you are not using Layer 3 with
hypervisor assigned MAC address.
VM-Series Deployment Guide Version 10.1 611 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
STEP 3 | Configure the network access settings for the management interface.
Enter the following commands:
where <Firewall-IP> is the IP address you want to assign to the management interface,
<netmask> is the subnet mask, <gateway-IP> is the IP address of the network gateway, and
<DNS-IP> is the IP address of the DNS server.
VM-Series Deployment Guide Version 10.1 612 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
STEP 5 | Verify that you can view the management interface IP address from the Hyper-V Manager.
1. Select the VM-Series firewall from the list of Virtual Machines.
2. Select Networking. The first network adapter that displays in the list is used for
management access to the firewall; subsequent adapters in the list are used as the
dataplane interfaces on the firewall.
STEP 6 | Verify network access to external services required for firewall management, such as the
Palo Alto Networks Update Server.
1. Use the ping utility to verify network connectivity to the Palo Alto Networks Update
server as shown in the following example. Verify that DNS resolution occurs and the
response includes the IP address for the Update server; the update server does not
respond to a ping request.
VM-Series Deployment Guide Version 10.1 613 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Hyper-V
After verifying DNS resolution, press Ctrl+C to stop the ping request.
2. Use the following CLI command to retrieve information on the support entitlement for
the firewall from the Palo Alto Networks update server:
request support
check
If you have connectivity, the update server will respond with the support status for your
firewall.
STEP 7 | (Optional) Verify that your VM-Series jumbo frame configuration does not exceed the
maximum MTU supported on Hyper-V.
The VM-Series has a default MTU size of 9216 bytes when jumbo frames are enabled.
However, the maximum MTU size supported by the physical network adapter on the Hyper-
V host is 9000 or 9014 bytes depending on the network adapter capabilities. To verify the
configured MTU on Hyper-V:
1. In Windows Server 2012 R2, open the Control Panel and navigate to Network and
Internet > Network and Sharing Center > View network status and tasks.
2. Click on a network adapter or virtual switch from the list.
3. Click Properties.
4. Click Configure.
5. On the Advanced tab, select Jumbo Packet from the list.
6. Select 9000 or 9014 bytes from the Value drop-down menu.
7. Click OK.
If you have enabled jumbo frames on Hyper-V, Enable Jumbo Frames on the VM-Series
Firewall and set the MTU size to match that configured on the Hyper-V host.
When you enable jumbo frames on the VM-Series firewall, it is applied to all interfaces.
If you do not need to jumbo frames on all interfaces, in the case of OSPF establishment
with neighbors for example, you must manually set the MTU for the specific interface
to 1496.
STEP 8 | Access the web interface of the VM-Series firewall and configure the interfaces and define
security rules and NAT rules to safely enable the applications you want to secure.
Refer to the PAN-OS Administrator’s Guide.
VM-Series Deployment Guide Version 10.1 614 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series firewall on Azure brings the security features of Palo Alto Networks next
generation firewall as a virtual machine in the Azure Marketplace. The VM-Series
firewall provides a complete set of security functionality to ensure that your virtual
machine workloads and data are protected, and the capabilities that the firewall
enables are different from native security features such as Security Groups, Web
Application Firewalls and native, port-based firewalls.
On Azure, the VM-Series firewall is available in the bring your own license (BYOL)
model or in the pay-as-you-go (PAYG) hourly model. Microsoft Azure allows you to
deploy the firewall to secure your workloads within the virtual network in the cloud,
so that you can deploy a public cloud solution or you can extend the on-premises IT
infrastructure to create a hybrid solution.
> About the VM-Series Firewall on > Deploy the VM-Series Firewall on
Azure Azure Stack
> Deployments Supported on Azure > Deploy the VM-Series Firewall on
> Deploy the VM-Series Firewall from Azure Stack HCI
the Azure Marketplace (Solution > Enable Azure Application Insights on
Template) the VM-Series Firewall
> Deploy the VM-Series Firewall > VM Monitoring on Azure
from the Azure China Marketplace > Set up Active/Passive HA on Azure
(Solution Template)
> Use the ARM Template to Deploy
> Panorama Orchestrated the VM-Series Firewall
Deployments in Azure
> Deploy the VM-Series and Azure
> Deploy the VM-Series with the Application Gateway Template
Azure Gateway Load Balancer
> Secure Kubernetes Services on
> Create a Custom VM-Series Image Azure
for Azure
> Use Azure Security Center
Recommendations to Secure Your
Workloads
615
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 616 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
On Azure, UDRs are for traffic leaving a subnet only. You cannot create user defined
routes to specify how traffic comes into a subnet from the Internet or to route traffic
to virtual machines within a subnet. UDRs allow you to direct outbound traffic to an
interface on the VM-Series firewall so that you can always ensure that the firewall secures
traffic to the internet also.
For documentation on Microsoft Azure, refer to https://azure.microsoft.com/en-us/
documentation/.
The solution templates for deploying the VM-Series firewall that are available in the Azure
Marketplace, have three network interfaces. To Set up Active/Passive HA on Azure, you will need
to add an additional interface for the HA2 link. If you want to customize the template, use the
ARM templates that are available in the GitHub repository.
When the Azure Security Center dashboard recommends that you deploy a VM-Series firewall
to secure a workload that is exposed to the internet, you can only deploy the firewall in an new
resource group or an existing resource group that is empty. This is because Azure currently
restricts you from deploying a multi NIC appliance in an existing resource group. Therefore,
VM-Series Deployment Guide Version 10.1 617 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
after you deploy the VM-Series firewall you must manually configure it to be in the path of
traffic of the workload that you need to secure.
When you deploy the firewall from Azure Security Center, the firewall is launched with three
network interfaces—management, external facing (untrust) and internal facing (trust)—and a
user defined route (UDR) that sends all outbound traffic from the trust subnet to the trust
interface on the firewall so that internet-bound traffic is always inspected by the firewall.
The default configuration includes two example Security Policy rules—the outbound-default
rule allows all traffic from the trust zone to the untrust zone on the application default port,
and the inbound-default rule allows all web-browsing traffic from the untrust zone to the
trust zone, after inspecting traffic with the default Antivirus, Anti-spyware, and Vulnerability
Protection security profiles. The firewall also forwards all files that are intercepted with the
inbound or outbound rule to the WildFire public cloud for analysis. Both rules include a URL
Filtering profile that blocks all traffic to the URL categories copyright-infringement, dynamic-
dns, extremism, malware, phishing, and unknown. In addition to these security profiles, both
Security policy rules are enabled to log at session end and to forward Threat and WildFire
Submissions logs as security alerts to the Azure Security Center dashboard.
To make practical use of this integration and Deploy a VM-Series Firewall Based on an Azure
Security Center Recommendationwithin the same resource group as the workloads you want
to secure, you can stage a workload with a public IP address that is exposed to the internet.
When Azure Security Center detects the security risk, it triggers a recommendation to deploy
a next-generation firewall, and you can then deploy the VM-Series firewall in a new resource
group into which you can add your workloads later. You must then delete the workload that
you staged to trigger the recommendation.
• Select a VM-Series firewall that you have already deployed for securing your workloads.
If you have a Standard tier of Azure Security Center subscription, Azure Security Center
discovers and displays all existing VM-Series firewalls that you have deployed either from the
Azure Marketplace or using a customized deployment with Azure CLI, PowerShell or ARM
VM-Series Deployment Guide Version 10.1 618 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
template. The firewalls within your Azure subscription are grouped under Security Solutions on
the Azure Security Center dashboard.
Microsoft Azure does not support the discovery of existing firewalls with the Free tier
subscription.
To Connect an Existing VM-Series Firewall From Azure Security Center, you must set up a
Linux virtual machine and configure Syslog forwarding to forward firewall logs in the Common
Event Format as alerts to Azure Security Center. The additional configuration enables a single
pane of glass view for monitoring all your Azure assets.
Forwarding a large volume of logs to Azure Security Center, may result in additional
subscription cost to you.
VM-Series Deployment Guide Version 10.1 619 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
If you want to use the Azure CLI to locate all the images available from Palo Alto
Networks, you the need the following details to complete the command (show vm-
image list):
• Publisher: paloaltonetworks
• Offer: vmseries-flex
• SKU: byol, bundle1, bundle 2
• Version: 10.0.0, or latest
• Deploy the VM-Series and Azure Application Gateway Template to support a scale out
security architecture that protects your internet-facing web applications using two VM-
Series firewalls between a pair of (external and internal) Azure load balancers VM-Series and
Azure Application Gateway. This template is currently not available for Azure China.
• Use the ARM template to deploy the VM-Series firewall in to an existing Resource Group,
for example when you want to Set up Active/Passive HA on Azure.
In addition to the ARM templates above that are covered under the Palo Alto Networks official
support policy, Palo Alto Networks provides Community supported templates in the Palo Alto
Networks GitHub repository that allow you to explore the solutions available to jumpstart your
journey in to cloud automation and scale on Azure.
VM-Series Deployment Guide Version 10.1 620 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
one dataplane interface to the trust zone, and the other dataplane interface to the untrust
zone. For an HA deployment, you will need another interface for the HA2 link between the HA
peers.
Because the Azure VNet is a Layer 3 network, the VM-Series firewall on Azure supports Layer
3 interfaces only.
Permissions
The following table lists the minimum built-in roles required and the granular permissions if you
would like to customize the role.
To support Permissions
VM-Series Deployment Guide Version 10.1 621 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
To support Permissions
Enable Azure Application “Microsoft.Network/virtualNetworks/*”,
Insights on the VM-
“Microsoft.Compute/virtualMachines/read”
Series Firewall
"Microsoft.Network/publicIPPrefixes/write",
"Microsoft.Network/publicIPPrefixes/read",
"Microsoft.Network/publicIPPrefixes/delete",
"Microsoft.Network/publicIPAddresses/write",
"Microsoft.Network/publicIPAddresses/read",
"Microsoft.Network/publicIPAddresses/delete",
"Microsoft.Network/publicIPAddresses/join/
action",
"Microsoft.Network/natGateways/write",
"Microsoft.Network/natGateways/read",
"Microsoft.Network/natGateways/delete",
VM-Series Deployment Guide Version 10.1 622 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
To support Permissions
"Microsoft.Network/natGateways/join/action",
"Microsoft.Network/virtualNetworks/read",
"Microsoft.Network/virtualNetworks/write",
"Microsoft.Network/virtualNetworks/delete",
"Microsoft.Network/virtualNetworks/subnets/
write",
"Microsoft.Network/virtualNetworks/subnets/
read",
"Microsoft.Network/virtualNetworks/subnets/
delete",
"Microsoft.Network/virtualNetworks/subnets/join/
action",
"Microsoft.Network/virtualNetworks/
virtualNetworkPeerings/read",
"Microsoft.Network/networkSecurityGroups/write",
"Microsoft.Network/networkSecurityGroups/read",
"Microsoft.Network/networkSecurityGroups/
delete",
"Microsoft.Network/networkSecurityGroups/join/
action",
"Microsoft.Network/loadBalancers/write",
"Microsoft.Network/loadBalancers/read",
"Microsoft.Network/loadBalancers/delete",
"Microsoft.Network/loadBalancers/probes/join/
action",
"Microsoft.Network/loadBalancers/
backendAddressPools/join/action",
"Microsoft.Network/loadBalancers/
frontendIPConfigurations/read",
"Microsoft.Network/locations/serviceTags/read",
"Microsoft.Network/applicationGateways/read",
"Microsoft.Network/networkInterfaces/read",
VM-Series Deployment Guide Version 10.1 623 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
To support Permissions
"Microsoft.Compute/virtualMachineScaleSets/
write",
"Microsoft.Compute/virtualMachineScaleSets/
read",
"Microsoft.Compute/virtualMachineScaleSets/
delete",
"Microsoft.Compute/virtualMachineScaleSets/
virtualMachines/read",
"Microsoft.Compute/virtualMachines/read",
"Microsoft.Compute/images/read",
"Microsoft.insights/components/write",
"Microsoft.insights/components/read",
"Microsoft.insights/components/delete",
"Microsoft.insights/autoscalesettings/write"
VM-Series Deployment Guide Version 10.1 624 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Inter-Subnet —The VM-Series firewall can front your servers in a VNet and protects against
lateral threats for inter-subnet traffic between applications in a multi-tier architecture.
• Gateway—The VM-Series firewall serves as the VNet gateway to protect Internet-facing
deployments in the Azure Virtual Network (VNet). The VM-Series firewall secures traffic
destined to the servers in the VNet and it also protects against lateral threats for inter-subnet
traffic between applications in a multi-tier architecture.
• GlobalProtect—Use the Azure infrastructure to quickly and easily deploy the VM-Series
firewall as GlobalProtect™ and extend your gateway security policy to remote users and
devices, regardless of location.
You can continue with Deploy the VM-Series Firewall from the Azure Marketplace (Solution
Template), Deploy the VM-Series Firewall on Azure Stack, Deploy the VM-Series Firewall on
Azure Stack HCI, or Orchestrate a VM-Series Firewall Deployment in Azure.
You can also learn about the VM-Series Firewall Templates on Azure that you can use to deploy
the firewall.
For information on bootstrapping, see Bootstrap the VM-Series Firewall on Azure and Bootstrap
the VM-Series Firewall on Azure Stack HCI.
VM-Series Deployment Guide Version 10.1 625 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
If you are using a trial subscription, you may need to open a support request
(Help + Support > New Support Request) to increase the quota of allocated VM
cores.
VM-Series Deployment Guide Version 10.1 626 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 627 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Azure has removed the option to select an existing resource group for
Marketplace solutions that enable multiple network interface controllers
(NICs). To deploy the firewall into an existing resource group, use the ARM
template in the GitHub Repository or use your own custom ARM template.
3. Select the Azure Region in which you are deploying the firewall.
4. Enter a Username for the firewall administrator.
5. Select the Authentication type—Password or SSH Public Key.
You must enable SSH key authentication if you plan to use the firewall in
FIPS-CC operational mode. Although you can deploy the VM-Series firewall
using a username and password, you will be unable to authenticate using the
username and password after changing the operational mode to FIPS-CC.
After resetting to FIPS-CC mode, you must use the SSH key to log in and can
then configure a username and password that you can use for subsequently
logging in to the firewall web interface. For details on creating the SSH key,
refer to the Azure documentation.
6. Enter a Password (up to 31 characters) or copy and paste an SSH public key for
securing administrative access to the firewall.
2. Configure networking.
1. Select an existing Azure Virtual Network (VNet) or create a new one and enter the IP
address space for the VNet. By default, the Classless Inter-Domain Routing (CIDR) IP
address is 10.8.0.0/16.
2. Configure the subnets for the network interfaces.
If you use the default subnets, you must review the configuration. If you
use an existing VNet, you must have set up three subnets: one each for the
management,trust, and untrust interfaces. If you create a new VNet, verify or
change the prefixes for each subnet. The default subnets are 10.8.0.0/24 for the
VM-Series Deployment Guide Version 10.1 628 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
management subnet, 10.8.1.0/24 for the untrust subnet, and 10.8.2.0/24 for the trust
subnet.
3. Enter the source IP address or IP range (include the CIDR block) that can access the
VNet. Network Security Group: inbound source IP allows you to restrict inbound
access to the Azure VNet.
Restrict access to the firewall. Make sure to supply a CIDR block that
corresponds to your dedicated management IP addresses or network. Do
not make the allowed source network range larger than necessary and never
configure the allowed source as 0.0.0.0/0. Verify your IP address before you
configure it on the template to make sure that you do not lock yourself out.
2. Enter a prefix to access the firewall using a DNS name. You must combine the prefix
you enter with the suffix displayed on screen to access the web interface of the
firewall. For example: <yourname><your-region>.cloudapp.azure.com
3. Select latest VM-Series Version.
4. Enter a display name to identify the VM-Series firewall within the resource group.
VM-Series Deployment Guide Version 10.1 629 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
4. Add the information to configure the firewall at launch. See Bootstrap the VM-Series
Firewall on Azure.
1. Select yes to Enable Bootstrap.
2. Enter the Storage Account Name that holds the Bootstrap Package.
3. Enter the Storage Account Access Key. This firewall needs this access key to
authenticate to the storage account and access the files stored within.
4. Add the File share name to which you have uploaded the files required for
bootstrapping the firewall. The storage account must be in the same region in which
VM-Series Deployment Guide Version 10.1 630 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
you are deploying the firewall and it must have the correct folder structure for
bootstrapping.
5. Select the Azure virtual machine tier and size to meet your needs. Use the Change
size link to view supported instance types, and to review the Minimum System
Requirements for the VM-Series on Azure.
5. Review the summary, and OK. Then accept the terms of use and privacy policy, and
Create to launch the firewall.
STEP 4 | Attach a public IP address for the untrust interface of the VM-Series firewall. When you
create a new public IP address, you get one from the block of IP addresses that Microsoft
VM-Series Deployment Guide Version 10.1 631 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
owns, so you can’t choose a specific one. The maximum number of public IP addresses you
can assign to an interface is based on your Azure subscription.
1. On the Azure portal, select the network interface for which you want to add a public IP
address (such as the eth1 interface).
2. Select IP Configurations > Add and, for Public IP address, select Enabled. Create a new
public IP address or select one that you have available.
3. Verify that you can view the secondary IP address associated with the interface.
When you attach a secondary IP address to a network interface, the VM-Series firewall
does not automatically acquire the private IP address assigned to the interface. You
will need to manually configure the private IP address using the VM-Series firewall web
interface. See Configure the dataplane network interfaces as Layer 3 interfaces on
the firewall.
1. Using a secure (https) connection from your web browser, log in to the DNS name for
the firewall.
2. Enter the usernamepassword that you defined in the parameters file. You will see a
certificate warning but that is OK—continue to the web page.
VM-Series Deployment Guide Version 10.1 632 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 7 | Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
If you are hosting multiple websites or services with different IP addresses and SSL certificates
on a single server, you might need to configure more than one IP address on the VM-Series
firewall interfaces.
1. Select Network > Interfaces > Ethernet.
2. Click ethernet 1/1 and configure as follows:
• Set Interface Type to Layer3 (default).
• On the Config tab, assign the interface to the default router.
• Also on the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone called UnTrust, and then click OK.
• On the IPv4 tab, select DHCP Client if you plan to assign only one IP address on the
interface—the firewall will automatically acquire the private IP address assigned in
the ARM template. If you plan to assign more than one IP address, select Static and
VM-Series Deployment Guide Version 10.1 633 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
manually enter the primary and secondary IP addresses assigned to the interface on
the Azure portal.
• Disable (clear) the Automatically create default route to default gateway provided
by server to ensure that traffic handled by this interface does not flow directly to the
default gateway in the VNet.
3. Click ethernet 1/2 and configure as follows:
• Set Interface Type to Layer3 (default).
• Set Security Zone to Trust.
• Set IP address DHCP Client or Static.
• Disable (clear) the Automatically create default route to default gateway provided
by serverto ensure that traffic handled by this interface does not flow directly to the
default gateway in the VNet.
4. Commit your changes and verify that the link state for the interfaces is up.
5. Add a static route on the virtual router of the VM-Series firewall for any networks that
the firewall needs to route.
For example, to add a default route to the destination subnets for the servers that the
firewall secures:
• Select Network > Virtual Router > default >
• Select Static Routes > IPv4, and add the next hop IP address for the destination
servers. You can set x.x.x.1 as the next hop IP address for all traffic (destined to
0.0.0.0/0 from interface ethernet1/1).
VM-Series Deployment Guide Version 10.1 634 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 10 | To publish PAN-OS® metrics to Azure Application Insights, see Enable Azure Application
Insights on the VM-Series Firewall.
VM-Series Deployment Guide Version 10.1 635 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
If you are using a trial subscription, you may need to open a support request
(Help + Support > New Support Request) to increase the quota of allocated VM
cores.
VM-Series Deployment Guide Version 10.1 636 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
You can deploy the VM-Series firewall into a new Resource Group, or an
existing Resource Group that is empty. To deploy the firewall into an existing
resource group that has other resources, use the ARM template in the GitHub
Repository or your own custom ARM template. Ensure that the existing
resources match the parameter values you provide in the ARM template.
1. If you create a new resource group, enter a name for the resource group and select
the Azure China region where you want to deploy the firewall.
2. If you select an existing resource group, select the Azure China region for this
resource group, and select complete deployment.
3. Configure basic settings for the firewall.
1. Enter the storage account name for an existing account or create a new one.
2. Enter the name for the blob storage container to which the firewall vhd mage will be
copied and saved.
3. Enter a DNS name for accessing the Public IP address on the management
interface (eth0) of the firewall. To access the web interface of the firewall,
you must combine the prefix you enter with the suffix, for example
<yourDNSname><china_region>.cloudapp.azure.com.
4. Enter a Username for the firewall administrator.
5. Enter a Password for securing administrative access to the firewall.
6. Select the Azure virtual machine tier and size to meet your needs. See Minimum
System Requirements for the VM-Series on Azure.
7. Enter a VmName, which is a display name to identify the VM-Series firewall within
the resource group.
8. Use a PublicIPAddressName to label the firewall management interface within the
resource group. Microsoft Azure binds the DNS name that you defined with this
VM-Series Deployment Guide Version 10.1 637 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
name so that you can access the management interface on the firewall from the
public internet.
9. Enter a VirtualNetworkName to identify your VNet. The default IP Address Prefix for
the VNet is 10.0.0.0/16. You can change this to meet your IP addressing needs.
10.Configure the subnets for the network interfaces. If you use an existing VNet, you
must have defined three subnets, one each for the management, trust and untrust
interfaces. If you create a new VNet, verify or change the prefixes for each subnet.
The default subnets are 10.0.1.0/24, 10.0.2.0/24, and 10.0.3.0/24. You can allocate
these subnets to the management, trust, and untrust interfaces as you would like.
4. Review the summary, accept the terms of use and privacy policy, and click Immediate
deployment to deploy the firewall. The deployment maybe take 20 minutes and you can
use the link on the page to verify progress.
5. Verify that you have successfully deployed the VM-Series firewall.
1. Log in to the Azure China portal (https://portal.azure.cn) using your Microsoft
account credentials.
2. Select Dashboard > Resource Groups, select the resource group.
3. Select All Settings > Deployments > Deployment History for detailed status
VM-Series Deployment Guide Version 10.1 638 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 4 | Attach a public IP address for the untrust interface of the VM-Series firewall. This allows
you to access the interface from the public internet and is useful for any internet-facing
application or service.
1. On the Azure portal, select the network interface for which you want to add a public IP
address. For example the eth1 interface.
2. Select IP Configurations > Add and for Public IP address, select Enabled. Create a new
public IP address or select one that you have available.
3. Verify that you can view the secondary IP address associated with the interface.
When you attach a secondary IP address to a network interface, the VM-Series firewall
does not automatically acquire the private IP address assigned to the interface. You
will need to manually configure the private IP address using the VM-Series firewall web
interface. See Configure the dataplane network interfaces as Layer 3 interfaces on
the firewall.
Each interface on the VM-Series firewall on Azure can have one dynamic (default) or static
private IP address, and multiple public IP addresses (static or dynamic) associated with it.
The maximum number of public IP addresses you can assign to an interface is based on your
Azure subscription. When you create a new public IP address you get one from the block of IP
addresses Microsoft owns, so you can’t choose a specific one.
2. Using a secure connection (https) from your web browser, log in to the DNS name for
the firewall.
3. Enter the username/password you defined earlier. You will see a certificate warning; that
is okay. Continue to the web page.
VM-Series Deployment Guide Version 10.1 639 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 7 | Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
If you are hosting multiple websites or services with different IP addresses and SSL certificates
on a single server, you might need to configure more than one IP address on the VM-Series
firewall interfaces.
1. Select Network > Interfaces > Ethernet.
2. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: Layer3 (default).
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone called UnTrust, and then click OK.
• On the IPv4 tab, select DHCP Client if you plan to assign only one IP address on the
interface. The private IP address assigned in the ARM template will be automatically
acquired. If you plan to assign more than one IP address select Static and manually
enter the primary and secondary IP addresses assigned to the interface on the Azure
portal.
• Clear the Automatically create default route to default gateway provided by server
check box. Disabling this option ensures that traffic handled by this interface does not
flow directly to the default gateway in the VNet.
3. Click the link for ethernet 1/2 and configure as follows:
• Set Interface Type to Layer3 (default).
• Security Zone: Trust
• IP address: Select DHCP Client or Static.
• Clear the Automatically create default route to default gateway provided by server
check box. Disabling this option ensures that traffic handled by this interface does not
flow directly to the default gateway in the VNet.
4. Click Commit. Verify that the link state for the interfaces is up.
VM-Series Deployment Guide Version 10.1 640 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 641 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 642 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
To protect your outbound traffic and East-West traffic, add route rules in your application VNETs
to redirect traffic to the Hub stack for inspection.
Inbound Stack
An Inbound firewall stack scales independently and adds visibility and security to your
applications’ Inbound traffic.
To protect your inbound HTTP traffic, add UDRs in the Application Gateway’s subnet route
tables to route all traffic to the Inbound stack (3, Ingress Private IP in the following figure). To
protect the non-HTTP inbound traffic, use the Panorama plugin to create front-end entries for
your application endpoints (4, Ingress Public IP Front Ends in the following figure). To enable
inspection, the Panorama plugin automatically creates load balancer rules on the Azure Public
Standard Load Balancer and NAT rules on the firewalls.
If you only have HTTP/HTTPS inbound traffic you can leave out the Inbound stack and protect
that traffic with just the hub stack.
VM-Series Deployment Guide Version 10.1 643 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
See Prepare for an Orchestrated Deployment and Orchestrate a VM-Series Firewall Deployment
in Azure.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
Configuration Prerequisites
Complete the following basic tasks on Panorama and Azure.
VM-Series Deployment Guide Version 10.1 644 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Azure
• Create a service principal to enable the plugin to make API calls.
• Plan a CIDR block specifically dedicated to VM-Series firewall Transit VNet. The plugin
manages this CIDR block and uses it to deploy the initial firewall VNet and perform as future
upgrades to new template stacks.
The minimum CIDR range is /22.
• Panorama
• Ensure that you have a valid license API key configured on Panorama. This allows the plugin
to manage delicensing on scale-in autoscaling events. See Install a License Deactivation API
Key.
• Install the latest version of the VM-series plugin on Panorama to allow Application Insight
configuration to be added to template stack.
• Qualified Azure Regions
Panorama orchestrated deployments are supported in all regions that support the VM-Series
firewall. The following regions have been qualified; if you deploy in an unlisted region and you
encounter an issue, contact support.
• West US
• West US 2
• North Central US
• East US
• East US 2
• West Europe
• Germany West Central
• UAE North
• West India
• Australia Southeast
While planning your deployment please note that if you are currently running a Panorama Plugin
for Azure version 2.x, upgrading to the current version is not allowed. Along with this, once the
current version is installed, downgrading to a version 2.x plugin is not allowed. See Panorama
Plugin for Azure in the Compatibility Matrix.
Orchestration Permissions
The is a sample JSON file with permissions for the Template Deployer role. In the
AssignableScopes section, include all relevant subscriptions that must be queried, including
the subscription into which the deployment is deployed and EVERY subscription containing an
application VNET that is peered to the VM-Series firewall VNet where protected resources exist.
{
"Name": "Template Deployment",
"IsCustom": true,
"Description": "Manage template deployments.",
"Actions": [
VM-Series Deployment Guide Version 10.1 645 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
"Microsoft.Resources/subscriptions/resourcegroups/*",
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/deployments/operationStatuses/read",
"Microsoft.Resources/deployments/read",
"Microsoft.Resources/deployments/delete",
"Microsoft.Network/publicIPPrefixes/write",
"Microsoft.Network/publicIPPrefixes/read",
"Microsoft.Network/publicIPPrefixes/delete",
"Microsoft.Network/publicIPAddresses/write",
"Microsoft.Network/publicIPAddresses/read",
"Microsoft.Network/publicIPAddresses/delete",
"Microsoft.Network/publicIPAddresses/join/action",
"Microsoft.Network/natGateways/write",
"Microsoft.Network/natGateways/read",
"Microsoft.Network/natGateways/delete",
"Microsoft.Network/natGateways/join/action",
"Microsoft.Network/virtualNetworks/read",
"Microsoft.Network/virtualNetworks/write",
"Microsoft.Network/virtualNetworks/delete",
"Microsoft.Network/virtualNetworks/subnets/write",
"Microsoft.Network/virtualNetworks/subnets/read",
"Microsoft.Network/virtualNetworks/subnets/delete",
"Microsoft.Network/virtualNetworks/subnets/join/action",
"Microsoft.Network/virtualNetworks/virtualNetworkPeerings/
read",
"Microsoft.Network/networkSecurityGroups/write",
"Microsoft.Network/networkSecurityGroups/read",
"Microsoft.Network/networkSecurityGroups/delete",
"Microsoft.Network/networkSecurityGroups/join/action",
"Microsoft.Network/loadBalancers/write",
"Microsoft.Network/loadBalancers/read",
"Microsoft.Network/loadBalancers/delete",
"Microsoft.Network/loadBalancers/probes/join/action",
"Microsoft.Network/loadBalancers/backendAddressPools/join/
action",
"Microsoft.Network/loadBalancers/frontendIPConfigurations/
read",
"Microsoft.Network/locations/serviceTags/read",
"Microsoft.Network/applicationGateways/read",
"Microsoft.Network/networkInterfaces/read",
"Microsoft.Compute/virtualMachineScaleSets/write",
"Microsoft.Compute/virtualMachineScaleSets/read",
"Microsoft.Compute/virtualMachineScaleSets/delete",
"Microsoft.Compute/virtualMachineScaleSets/virtualMachines/
read",
"Microsoft.Compute/virtualMachines/read",
"Microsoft.Compute/images/read",
"Microsoft.insights/components/write",
"Microsoft.insights/components/read",
"Microsoft.insights/components/delete",
"Microsoft.insights/autoscalesettings/write"
]
"NotActions": [
],
"AssignableScopes": [
"/subscriptions/{deployment-subscription}",
VM-Series Deployment Guide Version 10.1 646 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
"/subscriptions/{app1-subscription}",
"/subscriptions/{app2-subscription}",
.
.
.
]
}
STEP 2 | Create a custom role with the permissions the plugin requires.
See Orchestration Permissions.
1. Log in to the Azure CLI.
az login
VM-Series Deployment Guide Version 10.1 647 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 3 | Associate the role with Active Directory you created in Step 1. You can use the console or
the CLI.
You must repeat this step in every subscription defined in the assignableScope
section of the custom role in Orchestration Permissions.
Console
1. On the Azure portal, navigate to Subscriptions and select your subscription.
2. On the left select Access Control (IAM) and then Role Assignments on the top bar.
3. Select Add and chose add role assignment.
• Select the role created you created in Step 3 and leave "Assign access to" as Active
Directory user.
• Select the active directory created in Step 1 and click Save.
CLI:
In the following command, <role-name> refers to the name in the sample JSON file, in the
earlier example, Template Deployment.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 648 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 649 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 650 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 651 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
If you selectYes the plugin asks for the VNET Resource Group, the VNET Name, the
Security CIDR, and the Directory Domain.
• VNET Resource Group—Choose from a list of all resource groups in your selected
region.
• VNET Name—Choose from a list of VNETS in your chosen resource group.
• Security CIDR—Enter your CIDR range. The prefix must be smaller than or equal
to /22. For example, 192.168.0.0/22.
• Directory Domain—See Find Your Azure Directory Domain Name. This string is part
of the URL for all resources in the subscription, and it helps the plugin link to your
deployments.
The VNET Resource Group and VNET name help the plugin locate your existing VNET.
Anything the plugin deploys goes into a resource group that the plugin manages.
VM-Series Deployment Guide Version 10.1 652 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 653 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 4 | Select Build > Firewall > Basic to configure information common to both Stacks.
For Image Type, select Marketplace Image or Custom Image.
• Image Resource Group—(custom image only) Choose the resource group containing your
custom image. For a custom image, the list displays all resource groups that contain an
image from the region you selected in Step 2.b.
• Image—(custom image only) The dropdown list displays all images in your chosen resource
group.
• Software Version—(Marketplace Image) Only valid software versions are displayed. Consult
the Compatibility Matrix for the minimum PAN-OS version.
• Username—The administrator user name for the firewall you create. The name must be
legal for both VM-Series firewall and Azure. Refer to What are the user name requirments
when creating a VM?
• Password—The administrator password for the firewall you create. The password must
meet the character and length requirements (31 characters) for both VM-Series firewall and
Azure. Refer to What are the password requirements when creating a VM?.
• Confirm Password—Re-enter your password.
• Primary Panorama IP—Specify the Panorama IP address the firewall can use to connect to
the Panorama when it boots up. Choose between the public or private IP address displayed
in the dropdown list, or type in the Panorama IP address.
• Secondary Panorama IP—(Only if Panorama is in HA setup.) Specify the Secondary
Panorama IP the firewall can use to connect to the Panorama when it boots up. Choose
from dropdown list or type in the correct IP.
• Configure Device Certificate PIN. Because these values are encrypted you must enter and
confirm each value.
• Device Certificate PIN ID—The device certificate ID.
• Confirm Device Certificate PIN ID
• Device Certificate PIN Value—The certificate PIN value.
• Confirm Device Certificate PIN Value
VM-Series Deployment Guide Version 10.1 654 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 5 | Select Build > Firewall > Advanced optional default values.
Check Advanced to edit the default values.
• Autoscaling Metric—Default is Data Plane CPU Util Percent.
• Scale In Threshold—Accept the default or define a scale in thresholdt.
• Scale Out Threshold—Accept the default or define a scale in threshold.
• Jumbo Frame—Disabled by default.
Click OK and commit your changes. Refresh the page until you can see the Deploy button, and
click Deploy to launch the deployment. Once the deployment starts, information is written to
the Deployments page.
If there is an entry in the Deployment Status column, click the hyperlink to view the
deployment details.
The possible status messages are:
• Commit changes—You have added a deployment for the first time but have not yet
committed the changes.
Every configuration change for the deployment must be committed so that the
plugin can pick up your changes.
• Deploying—The plugin is deploying or updating the deployment. For more information, click
the hyperlink to view the detailed status.
• Failure—Deployment has failed. Click the hyperlink and view the Detailed Status for the
Security stack.
• Not Deployed—The plugin is ready to deploy the configuration, but the deployment has not
begun.
• Success—The plugin has successfully deployed the Security stack and the firewalls have
connected to Panorama. The firewalls can pass traffic.
• Warning—Deployment has successfully finished but something external to the deployment
has failed. For example, you might see this message:
FWs have not connected after 20 minutes of the deployment
completing.
Click the hyperlink and view the Security stack.
Once the deployment is deployed, the plugin allows you to modify a certain subset of
parameters. Once the changes have been made, you must do a commit before clicking the
VM-Series Deployment Guide Version 10.1 655 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Redeploy button. When an update happens, the plugin makes sure the Panorama config is
created and accurate.
• Deploy—After you commit your initial configuration, select Deploy to launch the
deployment.
• Redeploy—Modify a deployment, commit your changes, and select Redeploy.
You must commit changes to the deployment before you click Redeploy.
If Panorama is deployed in a Public Cloud, make sure to add the Firewall Access IP
to the Panorama security group.
See Ports Used for Panorama to determine which ports you need to open to allow traffic.
• Open the link in the Deployment Status column for additional details for each stack.
• Hub-Stack—The Hub stack Public IP matches the Firewall Access IP in the deployment
summary because the NAT gateway is the same for egress traffic from the deployment
and the management traffic from the firewalls.
All outbound and East-West traffic should be routed to the Egress Private IP for
inspection. You can direct traffic to this address if you configured UDRs.
• Inbound-Stack—The Private IP is the address on the Azure internal load balancer that
fronts the firewalls. You can direct traffic to this address if you are configuring UDRs.
• Follow the links to view deployment information and Application Insights on Azure.
• The Deployment details can show Success, Warning, and Failure messages
VM-Series Deployment Guide Version 10.1 656 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 657 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 658 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series firewall integration with the Azure GWLB requires PAN-OS 10.1.4 or later and
VM-Series Plugin 2.1.4 or later.
Follow best practices to not overlap the CIDRs used by different VNets.
STEP 1 | Deploy the VM-Series firewall behind Azure GWLB using the ARM template.
VM-Series Deployment Guide Version 10.1 659 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 2 | (Optional) Add additional VM-Series firewall instances behind GWLB deployed in Step 1.
1. Create a VM using the Microsoft Azure CLI.
Provide the input parameters in the sample command below.
az vm create \
--resource-group <myResourceGroup> \
--name <myPA-VM> \
--vnet-name secVnet \
--subnet Subnet-mgmt \
--public-ip-sku Standard \
--size Standard_DS3_V2 \
--nsg networkSecurityGroup1 \
--admin-username <username> \
--admin-password <password> \
--image paloaltonetworks:vmseries-flex:bundle1:10.1.4 \
--plan-name bundle1 \
--plan-product vmseries-flex \
--plan-publisher paloaltonetworks \
VM-Series Deployment Guide Version 10.1 660 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
--custom-data "storage-account=<myStorageAccountName>,access-
key=<myAccessKey>,file-share=<FileName>,share-
directory=<SharedDirectoryName>"
plugin-op-commands=azure-gwlb-inspect:enable
• To deploy the solution with custom ports, use the sample command in the
init-cfg.txt file if custom data field is used to define the VNI and port
information. You must define the internal and external VNI identifiers in the
range of 800 to 1000.
plugin-op-commands=azure-gwlb-inspect:enable
+internal-port-<internalport>+external-port-
<externalport>+internal-vni-<internalvni>+external-
vni-<internalvni>
If you choose to use custom ports, use these sample commands to configure
the GWLB.
For more information, see Custom data and Cloud-init on Azure Virtual
Machines.
2. Create NIC in the data subnet.
VM-Series Deployment Guide Version 10.1 661 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
7. Connect to the firewall using SSH. Enter the following in the firewall CLI to verify if the
GWLB is enabled.
(Optional) If you do not bootstrap the firewall, the user data is used to configure the ports and
VNI IDs. Use the following sample commands on the firewall CLI to enable or disable GWLB,
configure custom ports and VNI IDs, and view GWLB status and port/VNI ID mapping.
The port numbers and VNI IDs must match with the ones in the GWLB backend
address pool.
Sample output:
VM-Series Deployment Guide Version 10.1 662 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
(Manual bootstrap configuration) If you did not bootstrap the VM-Series firewall with GWLB in
Step1 or Steps 2.1 to 2.7, perform the following manual processes.
1. Manually configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
1. On the VM-Series firewall web interface, select Network > Interfaces > Ethernet.
2. Click ethernet 1/1 and configure as follows:
• Set Interface Type to Layer3 (default).
• On the Config tab, assign the interface to a virtual router.
• Also on the Config tab, expand the Security Zone drop-down and select New Zone.
Define an internal and external zone, then click OK.
• On the IPv4 tab, select DHCP Client.
• Disable the Automatically create default route to default gateway provided by server
to ensure that traffic handled by this interface does not flow directly to the default
gateway in the VNet.
VM-Series Deployment Guide Version 10.1 663 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
3. On the Advanced tab, create a management profile to allow health checks to be received
by the firewall.
4. Commit your changes and verify that the link state for the interfaces is up.
2. Create a static route on the VM-Series firewall.
1. On the VM-Series firewall web interface, select Network > Virtual Routers and select
the virtual router associated with the data interface.
2. Select Static Routes and click Add.
3. Configure the static route.
VM-Series Deployment Guide Version 10.1 664 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 665 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
4. Click OK.
5. Commit your changes.
3. Create two subinterfaces under eth1/1 to enforce zone-based security policies.
1. On the VM-Series firewall web interface, select Network > Interface.
2. Highlight ethernet1/1 and click Add Subinterface.
3. Enter a numerical suffix (1 to 9,999) to identify the subinterface.
4. Enter a VLAN Tag for the subinterface. This field is required but the VLAN is not used.
VNI ID/Port for the internal tunnel is mapped to the VLAN 1 tag and external
tunnel is mapped to the VLAN 2 tag. The VLAN 1 tag and VLAN 2 tag must
always be mapped to the internal (trust) zone and external (untrust) zone
respectively.
5. Select the Virtual Router associated with the data interface.
6. Select a Security Zone.
7. On the IPv4 tab, set the Type to DHCP Client.
8. Click OK.
9. Repeat this command for the second subinterface.
10.Commit your changes.
VM-Series Deployment Guide Version 10.1 666 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
If the VM-Series firewall used to create your custom image was deployed using a premium
disk type, any VM-Series firewall deployed using the custom image must be deployed
using the same premium disk type. However, if you create an image using firewall
deployed with a standard disk type, you can deploy the firewall using a standard or
premium disk type.
STEP 4 | Upgrade the VM-Series Firewall to PAN-OS 10.0.3. Upgrading to PAN-OS 10.0.3 also
upgrades the VM-Series plugin to 2.0.3.
STEP 5 | Access the VM-Series firewall command line interface via SSH using the username and
password provided in the Azure Marketplace template.
STEP 6 | Verify that you VM-Series firewall has the correct PAN-OS, VM-Series plugin, content, and
antivirus versions.
show system info
If you are using PAN-OS 10.1, ensure that you upgrade the VM-Series plugin to
version 2.1.7 or higher.
STEP 8 | Perform a private data reset on the VM-Series firewall. This command requires the firewall to
reboot. You must wait for the VM-Series firewall to reboot complete before continuing; the
reboot can take five to seven minutes.
request system private-data-reset
VM-Series Deployment Guide Version 10.1 667 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 11 | After deploying a VM-Series firewall with your custom image, verify your deployment.
1. You should log in to the firewall using the credentials provided while bringing up the VM
from the custom image.
2. After logging in successfully, verify that your firewall is running the correct PAN-OS
version and has the correct content and antivirus versions.
show system info
VM-Series Deployment Guide Version 10.1 668 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
When you deploy new workloads within your Azure subscription that is enabled for Azure
Security Center, Azure Security Center enables you to secure these workloads in two ways. In
one workflow, Azure Security Center recommends you to deploy a new instance of the VM-Series
firewall to secure an internet-facing application workload. In the other workflow, Azure Security
Center discovers VM-Series firewalls (partner security solutions) that you have deployed within
the Azure subscription and you have to then perform additional configuration to connect the VM-
Series firewall to Azure Security Center so that you can view alerts on the dashboard. See Azure
Security Center Integration for details on the integration and the pros and cons of each workflow:
• Deploy a VM-Series Firewall Based on an Azure Security Center Recommendation
• Connect an Existing VM-Series Firewall From Azure Security Center
VM-Series Deployment Guide Version 10.1 669 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 3 | Select Add a Next Generation Firewall, select the workload you want to secure.
STEP 4 | Choose whether you want to deploy a new instance of the VM-Series firewall or use an
existing instance of the VM-Series firewall.
To use this workflow, stage a workload with a public IP address that is exposed to the internet
and deploy an instance of the VM-Series firewall in a new resource group. Then, delete the
workload you staged, and deploy your production workloads within the resource group in
which you deployed the VM-Series firewall.
• To Create New, see Deploy the VM-Series Firewall from the Azure Marketplace (Solution
Template).
• To Use existing solution, select the VM-Series firewall that you have previously deployed.
VM-Series Deployment Guide Version 10.1 670 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 2 | Select Security Solutions to view all available VM-Series firewalls within this Azure
subscription.
STEP 3 | Expand Discovered solutions, and select the VM-Series firewall instance that is in the same
resource group as the workload you want to secure and click Connect.
To view firewall logs as alerts on the Security Center dashboard, you need to follow the four-
step process that displays on screen.
VM-Series Deployment Guide Version 10.1 671 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 4 | On successfully connecting the VM-Series firewall to Security Center, the VM-Series firewall
displays in the Connected solutions list.
Click View to verify that the firewall is protecting the workload that you need to secure.
STEP 2 | From Panorama, create a template and a device group to push log forwarding settings to the
firewalls that will be forwarding logs to Azure Security Center.
VM-Series Deployment Guide Version 10.1 672 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
5. Click OK.
2. Configure forwarding of all other log types that are generated when a policy match
occurs such as Traffic, Threat, WildFire Submission, URL Filtering, Data Filtering, and
VM-Series Deployment Guide Version 10.1 673 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Authentication logs. To forward these logs, you must create and attach a log forwarding
profile to each policy rule for which you want to forward logs.
1. Select the Device Group, and then select Objects > Log Forwarding to Add a profile.
In the log forwarding profile match list, add each log type that you want to forward.
2. Select Add in Built-in Actions to enable the firewalls in the device group to forward
the logs to Azure Security Center.
3. Create basic security policy rules in the device group you just created and select
Actions to attach the Log Forwarding profile you created for forwarding logs to Azure
Security Center. Until the firewall has interfaces and zones and a basic security policy,
it will not let any traffic through, and only traffic that matches a security policy rule
will be logged (by default).
4. For each rule you create, select Actions and select the Log Forwarding profile that
allows the firewall to forward logs to Azure Security Center.
STEP 4 | Commit your changes to Panorama and push them to the template and device group you
created.
STEP 5 | Verify that the firewall logs are being forwarded to Azure Security Center.
1. Log in the Azure portal, select Azure Security Center.
2. Verify that you can see firewall logs as Security alerts on the Azure Security Center
dashboard.
VM-Series Deployment Guide Version 10.1 674 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The VM-Series firewall on Azure stack does not have support for bootstrapping, Azure
Application Insights, or the Azure Security Center integration.
Unlike on public Azure, you do not have a solution template to deploy the VM-Series firewall
on Azure Stack. Therefore, you must use an ARM template to deploy the VM-Series firewall. To
get started, you can use the community supported sample ARM template on GitHub, and then
develop your own ARM template for production deployments.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 675 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Edit template, delete all existing content in the template, and paste the JSON
template contents you copied earlier andSave.
• Edit parameters, enter the values for the required parameters and modify the defaults
if you need to, then click OK.
VM-Series Deployment Guide Version 10.1 676 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Choose the Subscription you want to use, and then click OK.
• Choose an existing Resource Group that is empty or create a new one, and click OK.
• Click Create. A new tile on the dashboard displays the progress of the template
deployment.
VM-Series Deployment Guide Version 10.1 677 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 5 | Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
VM-Series Deployment Guide Version 10.1 678 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 679 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
4. Deploy the SDN infrastructure using any one of the following methods:
• Deploy using Windows Admin Center
• Deploy using SDN Express
• Deploy at cluster creation
This document considers the Windows Admin Center option for deploying VM-Series
firewall.
After successfully deploying the SDN infrastructure, go to the SDN Infrastructure dashboard
on your Windows Admin Center and ensure that all server nodes are healthy.
VM-Series Deployment Guide Version 10.1 680 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 681 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
5. After deploying the SDN infrastructure, create a Hyper-V Network Virtualization (HNV) virtual
network.
VM-Series Deployment Guide Version 10.1 682 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 683 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
By modeling a VLAN-based network as an SDN logical network, you can apply network policies
to workloads that are attached to these networks. For more information, see Manage Tenant
Logical Network.
VM-Series Deployment Guide Version 10.1 684 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 685 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 686 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 687 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 688 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 689 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 690 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Select the Host and Path for the VM-Series firewall. Browse the VHD/VHDX FW image file.
Note: You must store the VHD/VHDX in location C:/ClusterStorage/Volumes.
• For Startup Memory, assign the memory based on the VM-Series System Requirements of
your VM-Series model.
• To configure networking, from the Virtual Network dropdown menu, select vNet.
A converged virtual switch (vSwitch) gets created while bringing up the Azure Stack
HCI cluster.
• Select Virtual Switch > Isolation Mode > Virtual Network > Virtual Subnet.
• Click Add IP Address and enter the IP address for the management interface.
• Select Network Security Group (optional).
• To connect the Virtual Hard Disk, select Use an existing virtual hard disk and browse to the
VHDX file you downloaded earlier in Step 6.
• Click Create.
VM-Series Deployment Guide Version 10.1 691 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
8. After successfully installing the VM-Series firewall on the cluster, you can add more Network
Adapters for data traffic. Perform the following to add a Network Adapter:
• Select your VM, go to Settings > Network.
VM-Series Deployment Guide Version 10.1 692 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 693 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 694 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 695 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Select Virtual Switch > Isolation Mode > Virtual Network > Virtual Subnet.
• Click Add IP Address and enter the IP address for the data interface.
• Select Network Security Group (optional).
• Click Save Network Settings.
VM-Series Deployment Guide Version 10.1 696 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 697 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Connect at least one network adapter for the data interface on the firewall. You can create
and add more Network Adapters using the same steps above.
9. (Optional) Enable MAC address spoofing if you are not using Layer 3 with MAC address.
1. Double click the dataplane virtual network adapter and click Advanced Settings.
2. Click the Enable MAC address spoofing check box and click Apply.
10.Bootstrap the VM-Series Firewall on Azure Stack HCI.
VM-Series Deployment Guide Version 10.1 698 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 699 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 700 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 701 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 2 | Enable the firewall to publish metrics to your Application Insights instance.
1. Log in to the VM-Series firewall on Azure.
2. Select Device > VM-Series > Azure.
3. Edit Azure Application Insights and enter the Instrumentation Key you copied earlier.
The default interval for publishing metrics is five minutes. You can change this to vary
from 1-60 minutes.
VM-Series Deployment Guide Version 10.1 702 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 3 | Verify that you can view the metrics on the Azure Application Insights dashboard.
1. On the Azure portal, select the Application Insights instance, and select Monitoring >
Metrics to view the PAN-OS custom metrics.
2. Select the metric(s) that you want to monitor for trends and trigger alerts. Refer to the
Microsoft Azure documentation for details on exploring metrics on Application Insights.
VM-Series Deployment Guide Version 10.1 703 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Monitoring on Azure
Monitoring on Microsoft® Azure® enables you to dynamically update security policy rules to
consistently enforce Security policy across all assets deployed within your Azure subscription.
To enable this capability, you need to install the Panorama plugin for Azure and enable API
communication between Panorama and your Azure subscriptions. Panorama can then collect
the IP address-to-tag mapping for all your Azure assets and push or distribute Azure resources
information to your Palo Alto Networks® firewall(s).
• About Monitoring on Azure
• Set Up the Azure Plugin for Monitoring on Panorama
• Attributes Monitored Using the Panorama Plugin on Azure
VM-Series Deployment Guide Version 10.1 704 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The Azure plugin is for monitoring Azure resources on the Azure public cloud. Azure
Government or Azure China are not supported.
Number of Subscriptions
100 200 300 400 500
The information in the table above was captured on an instance with 8 vCPUs and
32GB of memory.
VM-Series Deployment Guide Version 10.1 705 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Panorama can push up to 8000 IP address-to tag mappings to the firewalls or virtual system
assigned to a device group. Review the requirements for Panorama and the managed firewalls:
• Minimum system requirements (see the Panorama Plugin information in the Compatibility
Matrix):
Panorama virtual appliance or hardware-based Panorama appliance running Panorama
8.1.3 or later, with an active support license and a device management license for managing
firewalls.
Licensed next-generation firewalls running PAN-OS 8.0 or 8.1.
• You must add the firewalls as managed devices on Panorama and create Device Groups so
that you can configure Panorama to notify these groups with the information it retrieves.
Device groups can include VM-Series firewalls or virtual systems on the hardware firewalls.
• The number of tags that the Panorama plugin can retrieve and register is as follows:
On Panorama running 8.1.3 or later managing firewalls running PAN-OS 8.1.3 or lower, the
firewalls or virtual systems included within a device group can have 7000 IP addresses with
10 tags each, or 6500 IP addresses with 15 tags each.
On Panorama 8.1.3 or later managing firewalls running PAN-OS 8.0.x, 2500 IP addresses
with 10 tags each.
• If your Panorama appliances are in a high availability configuration, you must manually
install the same version of the Azure plugin on both Panorama peers.
You configure the Azure plugin on the active Panorama peer only. On commit,
the configuration is synced to the passive Panorama peer. Only the active
Panorama peer polls the Azure subscriptions you have configured for Monitoring.
If you currently have installed a Panorama plugin, the process of installing (or uninstalling)
another plugin requires a Panorama reboot to enable you to commit changes. So, install
additional plugins during a planned maintenance window to allow for a reboot.
If you have a standalone Panorama or two Panorama appliances installed in an HA pair with
multiple plugins installed, plugins might not receive updated IP-tag information if one or more of
the plugins is not configured. This occurs because Panorama will not forward IP-tag information
to unconfigured plugins. Additionally, this issue can occur if one or more of the Panorama plugins
is not in the Registered or Success state (positive state differs on each plugin). Ensure that your
plugins are in the positive state before continuing or executing the commands described below.
If you encounter this issue, there are two workarounds:
• Uninstall the unconfigured plugin or plugins. It is recommended that you do not install a plugin
that you do not plan to configure right away
VM-Series Deployment Guide Version 10.1 706 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Log in to the Panorama Web Interface, select Panorama > Plugins and click Check Now to
get the list of available plugins.
VM-Series Deployment Guide Version 10.1 707 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 708 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
2. Enter a Name and optionally a Description to identify the group of firewalls to which
Panorama pushes the information it retrieves.
3. Select the Device Groups, which are a group of firewalls or virtual systems, to which
Panorama will push the information (IP address-to-tag mapping) it retrieves from your
Azure subscriptions. The firewalls use the update to determine the most current list of
members that constitute dynamic address groups referenced in policy.
• Because a Monitoring Definition can include only one notify group, make sure
to select all the relevant Device Groups within your notify group. If you want to
deregister the tags that Panorama has pushed to a firewall included in a notify group,
you must delete the Monitoring Definition.
• To register tags to all virtual systems on a firewall enabled for multiple virtual systems,
you must add each virtual system to a separate device group on Panorama and assign
the device groups to the notify group. Panorama will register tags to only one virtual
system, if you assign all the virtual systems to one device group.
4. Verify that monitoring is enabled on the plugin. This setting must be enabled for
Panorama to communicate with the Azure public cloud for Monitoring.
The checkbox for Enable Monitoring is on Panorama > Plugins > Azure > Setup >
General.
VM-Series Deployment Guide Version 10.1 709 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 710 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 5 | Verify that you can view the information on Panorama, and define the match criteria for
Dynamic Address Groups.
Some browser extensions may block API calls between Panorama and Azure which
prevents Panorama from receiving match criteria. If Panorama displays no match
criteria and you are using browser extensions, disable the extensions and Synchronize
Dynamic Objects to populate the tags available to Panorama.
On HA failover, the newly active Panorama attempts to reconnect to the Azure cloud
and retrieve tags for all monitoring definitions. If there is an error with reconnecting
even one monitoring definition, Panorama generates a system log message
When you see this error, you must log in to Panorama and fix the issue, for example
remove an invalid subscription or provide valid credentials, and commit your changes
to enable Panorama to reconnect and retrieve the tags for all monitoring definitions.
Even when Panorama is disconnected from the Azure cloud, the firewalls have the
list of all tags that had been retrieved before failover, and can continue to enforce
policy on that list of IP addresses. Panorama removes all tags associated with the
subscription only when you delete a monitoring definition. As a best practice, to
monitor this issue, configure action-oriented log forwarding to an HTTPS destination
from Panorama so that you can take immediate action.
VM-Series Deployment Guide Version 10.1 711 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The maximum length of a tag can be 127 characters. If a tag is longer than 127
characters, Panorama does not retrieve the tag and register it on the firewalls. Also the
tags should not include non-ASCII special characters such as { or ".
The following attributes are monitored in all Panorama plugin for Azure versions.
Virtual Machine
VM Monitoring Example
VM Name azure-tag.vm-name.web_server1
OS Type azure-tag.os-type.Linux
OS Publisher azure-tag.os-publisher.Canonical
OS Offer azure-tag.os-offer.UbuntuServer
OS SKU azure-tag.os-sku.14.04.5-LTS
Subnet azure-tag.subnet.webtier
VNet azure-tag.vnet.untrustnet
Subscription ID azure.sub-id.93486f84-8de9-44f1-b4a8-
f66aed312b64
Load Balancer
VM-Series Deployment Guide Version 10.1 712 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Panorama plugin on Azure version 3.0 or later supports tags for each application gateway and
standard load balancer (both public and private IP addresses). Each load balancer has predefined
tags for resource group, load balancer name and region, and supports up to 21 user-defined tags
specific to load balancing.
Subnet/VNET
Panorama plugin on Azure version 3.0 or later supports tags for each Subnet and VNET in your
subscription. Each subnet and VNET tag is associated with the full IP CIDR range so you can
create policies based on a CIDR range rather than individual IP addresses. The plugin queries
every subnet and VNET in your subscription and creates tags for them.
VM-Series Deployment Guide Version 10.1 713 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The plugin also updates service tags for a new installation of the plugin, commit events, and
monitoring definition addition or deletion.
A sample IP-Service mapping is shown below:
VM-Series Deployment Guide Version 10.1 714 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
To enable HA on the VM-Series firewall on Azure, you must create an Azure Active Directory
application and Service Principal that includes the permissions listed in the table below.
VM-Series Deployment Guide Version 10.1 715 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 716 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Set up the Active Directory application and a Service Principal to enable programmatic API
access.
• For the firewall to interact with the Azure APIs, you need to create an Azure Active
Directory Service Principal. This Service Principle has the permissions required to
authenticate to the Azure AD and access the resources within your subscription.To
complete this set up, you must have permissions to register an application with your Azure
AD tenant, and assign the application to a role in your subscription. If you don't have the
necessary permissions, ask your Azure AD or subscription administrator to create a Service
VM-Series Deployment Guide Version 10.1 717 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Principal. See the table above for the required permissions. Copy the following details for
use later in this workflow:
• Client ID—The Application ID associated with the Active Directory (On the Azure portal,
click Home > Azure Active Directory > App registrations, select your application and
copy the ID).
• Tenant ID—The Directory ID associated with the Active Directory (On the Azure portal,
click Home > Azure Active Directory > Properties > Directory ID, select the application
and copy the ID).
• Azure Subscription ID—The Azure subscription in which you have deployed the firewalls.
You must login to your Azure portal to get this subscription ID.
• Resource Group Name— The resource group name in which you have deployed the
firewalls that you want to configure as HA peers. Both firewalls must be in the same
resource group.
VM-Series Deployment Guide Version 10.1 718 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Secret Key—The authentication key associated with the Active Directory application (On
the Azure portal, click Home > Azure Active Directory > Certificates & secrets, copy
the Value under Client secrets. If you do not have a Secret Key, create one first, then
VM-Series Deployment Guide Version 10.1 719 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
copy the value). To log in as the application, you must provide both the key value and the
Application ID.
VM-Series Deployment Guide Version 10.1 720 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 721 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Know where to get the templates you need to deploy the VM-Series firewalls within the same
Azure Resource Group.
For an HA configuration, both HA peers must belong to the same Azure Resource Group. If
you deploy the first instance of the firewall from the Azure Marketplace, and must use your
custom ARM template for deploying the second instance of the firewall into the existing
Resource Group. The reason you need a custom template or the Palo Alto Networks sample
template is because Azure does not support the ability to deploy the firewall in to an Resource
Group that is not empty.
Copy the deployment information for the first firewall instance. For example:
Match the VM Name of VM-Series firewall as shown in the screenshot above with the
Hostname on the firewall web interface. You must add the same name on Device > Setup >
Management, because the hostname of the firewall is used to trigger failover.
VM-Series Deployment Guide Version 10.1 722 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 723 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
HA2 Add a NIC Add a NIC On the active and passive peers, add a dedicated
to the to the HA2 link to enable session synchronization.
firewall from firewall from
The default interface for HA1 is the management
the Azure the Azure
interface, and you can opt to use the management
management management
interface instead of adding an additional interface
console. console.
to the firewall. For enabling data flow over the
HA2 link, you need to add an additional network
interface on the Azure portal and configure the
interface for HA2 on the firewall.
The authentication key (client secret) associated with the Active Directory application
required for setting up the VM-Series firewall in an HA configuration, is encrypted with
VM-Series plugin version 1.0.4 on the firewall and on Panorama. Because the key is
encrypted in VM-Series plugin version 1.0.4, you must install the same version of the
plugin on Panorama and the managed VM-Series firewalls in order to centrally manage
the firewalls from Panorama.
VM-Series Deployment Guide Version 10.1 724 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 1 | Deploy the VM-Series firewall using a solution template and set up the network interfaces
for HA.
1. Add a secondary IP configuration to the untrust interface of the firewall.
You must attach the secondary IP configuration—with a private IP address (any netmask)
and a public IP address—to the firewall that will be designated as the active peer. The
secondary IP configuration always stays with the active HA peer, and moves from one peer
to the another when a failover occurs.
In this workflow, this firewall will be designated as the active peer. The active HA peer
has a lower numerical value for device priority that you configure as a part of the HA
VM-Series Deployment Guide Version 10.1 725 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
configuration on the firewall, and this value indicates a preference for which firewall
assumes the role of the active peer.
2. Add a secondary IP configuration to the trust interface of the firewall.
The secondary IP configuration for the trust interface requires a static private IP address
only. This IP address moves from the active firewall to the passive firewall on failover so
VM-Series Deployment Guide Version 10.1 726 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
that traffic flows through from the untrust to the trust interface and to the destination
subnets that the firewall secures.
3. Attach a network interface for the HA2 communication between the firewall HA peers.
1. Add a subnet within the virtual network.
2. Create and attach a network interface to the firewall.
4. Set up your route table on Azure.
Your next hop should point to the floating IP address as shown here:
VM-Series Deployment Guide Version 10.1 727 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 728 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 729 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 730 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 3 | Configure the VM-Series plugin to authenticate to the Azure resource group in which you
have deployed the firewall.
Set up the Azure HA configuration on the VM-Series plugin.
To encrypt the client secret, use the VM-Series plugin version 1.0.4 or later. If using Panorama
to manage your firewalls, you must install the VM-Series plugin version 1.0.4 or later.
1. Select Device > VM-Series to enable programmatic access between the firewall plugin and
the Azure resources.
2. Enter the Client ID. The client ID is the Application ID associated with your Azure Active
Directory application.
3. Enter the Client Secret and re-enter it to confirm.
4. Enter the Tenant ID. The tenant ID is the Directory ID you saved when you set up the
Active Directory application.
5. Enter the Subscription ID for the Azure subscription you want to monitor.
6. Enter the Resource Group name.
7. (For Azure Stack deployments only) Enter the Resource Mgr Endpoint URL. This field is
mandatory ONLY for Azure Stack deployments. Do not enter a value for this field if you
are using a regular Azure Cloud deployment; HA failover will not succeed if you specify the
Resource Mgr Endpoint URL for a regular Azure Cloud deployment.
8. Click Validate to verify that the keys and IDs you entered are valid, and that VM-Series
plugin can successfully communicate with the Azure resources using the API.
VM-Series Deployment Guide Version 10.1 731 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 6 | Set up the passive HA peer within the same Azure Resource Group.
1. Deploy the second instance of the firewall.
• Download the custom template and parameters file from GitHub.
• Log in to the Azure Portal.
• Search for custom template and select Deploy from a custom template.
• Select Build your own template in the editor > Load file.
• Select the azuredeploy.json that you downloaded earlier, and Save.
• Complete the inputs, agree to the terms and Purchase.
Make sure to match the following inputs to that of the firewall instance you have
already deployed— Azure subscription, name of the Resource Group, location of
the Resource Group, name of the existing VNet into which you want to deploy the
VM-Series Deployment Guide Version 10.1 732 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
firewall, VNet CIDR, Subnet names, Subnet CIDRs, and start the IP address for the
management, trust and untrust subnets.
2. Repeat Step 1and Step 2to set up the interfaces and configure the firewall as the passive
HA peer.
3. Skip Step 3 and complete Enable HA (Step 5). In Step 4 modify the IP addresses as
appropriate for this passive HA peer.
STEP 7 | After you finish configuring both firewalls, verify that the firewalls are paired in active/
passive HA.
1. Access the Dashboard on both firewalls, and view the High Availability widget.
2. On the active firewall, click the Sync to peer link.
3. Confirm that the firewalls are paired and synced, as shown as follows:
• On the passive firewall: the state of the local firewall should display passive and the
Running Config should show as synchronized.
• On the active firewall: The state of the local firewall should display active and the
Running Config should show as synchronized.
4. On the passive peer, verify that the VM-Series plugin configuration is now synced.
Select Device > VM-Series and validate that you can view the Azure HA configuration that
you had omitted configuring on the passive peer.
VM-Series Deployment Guide Version 10.1 733 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Set up the Active Directory application and a Service Principal to enable programmatic API
access.
• For the firewall to interact with the Azure APIs, you need to create an Azure Active
Directory Service Principal. This Service Principle has the permissions required to
authenticate to the Azure AD and access the resources within your subscription.To
complete this set up, you must have permissions to register an application with your Azure
AD tenant, and assign the application to a role in your subscription. If you don't have the
necessary permissions, ask your Azure AD or subscription administrator to create a Service
VM-Series Deployment Guide Version 10.1 734 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Principal. See the table above for the required permissions. Copy the following details for
use later in this workflow:
• Client ID—The Application ID associated with the Active Directory (On the Azure portal,
click Home > Azure Active Directory > App registrations, select your application and
copy the ID).
• Tenant ID—The Directory ID associated with the Active Directory (On the Azure portal,
click Home > Azure Active Directory > Properties > Directory ID, select the application
and copy the ID).
• Azure Subscription ID—The Azure subscription in which you have deployed the firewalls.
You must login to your Azure portal to get this subscription ID.
• Resource Group Name— The resource group name in which you have deployed the
firewalls that you want to configure as HA peers. Both firewalls must be in the same
resource group.
VM-Series Deployment Guide Version 10.1 735 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Secret Key—The authentication key associated with the Active Directory application (On
the Azure portal, click Home > Azure Active Directory > Certificates & secrets, copy
the Value under Client secrets. If you do not have a Secret Key, create one first, then
VM-Series Deployment Guide Version 10.1 736 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
copy the value). To log in as the application, you must provide both the key value and the
Application ID.
VM-Series Deployment Guide Version 10.1 737 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 738 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Know where to get the templates you need to deploy the VM-Series firewalls within the same
Azure Resource Group.
For an HA configuration, both HA peers must belong to the same Azure Resource Group. If
you deploy the first instance of the firewall from the Azure Marketplace, and must use your
custom ARM template or the Palo Alto Networks sample GitHub template for deploying
the second instance of the firewall into the existing Resource Group. The reason you need
a custom template or the Palo Alto Networks sample template is because Azure does not
support the ability to deploy the firewall in to an Resource Group that is not empty.
Copy the deployment information for the first firewall instance. For example:
Match the VM Name of VM-Series firewall as shown in the screenshot above with the
Hostname on the firewall web interface. You must add the same name on Device > Setup >
Management, because the hostname of the firewall is used to trigger failover.
VM-Series Deployment Guide Version 10.1 739 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
HA2 Add a NIC to the Add a NIC to the On the active and
firewall from the firewall from the passive peers, add a
Azure management Azure management dedicated HA2 link
console. console. to enable session
synchronization.
The default interface
for HA1 is the
management interface,
and you can opt to
use the management
interface instead of
adding an additional
interface to the
firewall. For enabling
data flow over the
HA2 link, you need
to add an additional
network interface
on the Azure portal
and configure the
interface for HA2 on
the firewall.
VM-Series Deployment Guide Version 10.1 740 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The authentication key (client secret) associated with the Active Directory application
required for setting up the VM-Series firewall in an HA configuration, is encrypted with
VM-Series plugin version 1.0.9 on the firewall and on Panorama. Because the key is
encrypted in VM-Series plugin version 1.0.9, you must install the same version of the
plugin on Panorama and the managed VM-Series firewalls in order to centrally manage
the firewalls from Panorama.
STEP 1 | Deploy the VM-Series firewall using a solution template and set up the network interfaces
for HA.
For securing east west traffic within an Azure VNet, you only need a primary IP address for the
trust and untrust firewall interfaces. When a failover occurs, the UDR changes and the route
points to the primary IP address of the peer that transitions to the active state.
1. Add a Primary IP configuration to the trust interface of the active firewall peer.
In this workflow, this firewall will be designated as the active peer. The active HA peer
has a lower numerical value for device priority that you configure as a part of the HA
VM-Series Deployment Guide Version 10.1 741 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
configuration on the firewall, and this value indicates a preference for which firewall
assumes the role of the active peer.
2. Add a Primary IP configuration to the untrust interface of the active firewall peer.
3. Attach a network interface for the HA2 communication between the firewall HA peers.
VM-Series Deployment Guide Version 10.1 742 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
After failover, the next hop for the Database server to Frontend server route will change
from 10.9.2.5 to 10.9.2.4. Similarly, the next hop of Frontend server to Database server
route will change from 10.9.1.5 to 10.9.1.4.
VM-Series Deployment Guide Version 10.1 743 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 744 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 745 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 3 | Configure the VM-Series plugin to authenticate to the Azure resource group in which you
have deployed the firewall.
Set up the Azure HA configuration on the VM-Series plugin.
To encrypt the client secret, use the VM-Series plugin version 1.0.4 or later. If using Panorama
to manage your firewalls, you must install the VM-Series plugin version 1.0.4 or later.
1. Select Device > VM-Series to enable programmatic access between the firewall plugin and
the Azure resources.
2. Enter the Client ID. The client ID is the Application ID associated with your Azure Active
Directory application.
3. Enter the Client Secret and re-enter it to confirm.
4. Enter the Tenant ID. The tenant ID is the Directory ID you saved when you set up the
Active Directory application.
5. Enter the Subscription ID for the Azure subscription you want to monitor.
6. Enter the Resource Group name.
7. (For Azure Stack deployments only) Enter the Resource Mgr Endpoint URL.
8. Click Validate to verify that the keys and IDs you entered are valid, and that VM-Series
plugin can successfully communicate with the Azure resources using the API.
VM-Series Deployment Guide Version 10.1 746 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 6 | Set up the passive HA peer within the same Azure Resource Group.
1. Deploy the second instance of the firewall.
• Download the custom template and parameters file from GitHub.
• Log in to the Azure Portal.
• Search for custom template and select Deploy from a custom template.
• Select Build your own template in the editor > Load file.
• Select the azuredeploy.json that you downloaded earlier, and Save.
• Complete the inputs, agree to the terms and Purchase.
Make sure to match the following inputs to that of the firewall instance you have
already deployed— Azure subscription, name of the Resource Group, location of
the Resource Group, name of the existing VNet into which you want to deploy the
VM-Series Deployment Guide Version 10.1 747 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
firewall, VNet CIDR, Subnet names, Subnet CIDRs, and start the IP address for the
management, trust and untrust subnets.
2. Repeat Step 1and Step 2to set up the interfaces and configure the firewall as the passive
HA peer.
3. Skip Step 3 and complete Enable HA (Step 5). In Step 4 modify the IP addresses as
appropriate for this passive HA peer.
STEP 7 | After you finish configuring both firewalls, verify that the firewalls are paired in active/
passive HA.
1. Access the Dashboard on both firewalls, and view the High Availability widget.
2. On the active firewall, click the Sync to peer link.
3. Confirm that the firewalls are paired and synced, as shown as follows:
• On the passive firewall: the state of the local firewall should display passive and the
Running Config should show as synchronized.
• On the active firewall: The state of the local firewall should display active and the
Running Config should show as synchronized.
4. On the passive peer, verify that the VM-Series plugin configuration is now synced.
Select Device > VM-Series and validate that you can view the Azure HA configuration that
you had omitted configuring on the passive peer.
VM-Series Deployment Guide Version 10.1 748 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 749 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 1 | Download the two-tier sample ARM template from the GitHub repository.
Download and save the files to a local client: https://github.com/PaloAltoNetworks/azure/
tree/master/two-tier-sample
In Azure China, you must edit the path for the storage account that hosts the
VHD image required to deploy the VM-Series firewall. In the variables section of
the template file, find the parameter called userImageNameURI and replace the
value with the location where you saved the VHD image.
2. Deploy the template in the resource group you created.
--resource-group <YourResourceGroupName>
--parameters ’@<path-to-template-parameter-azureDeploy.json>’
VM-Series Deployment Guide Version 10.1 750 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The address space within the VNet uses the prefix 192.168, which is defined
in the ARM template.
5. Attach a public IP address to the untrust interface on the firewall.
VM-Series Deployment Guide Version 10.1 751 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 4 | Configure the firewall as a VNet gateway to protect your Internet-facing deployment.
1. Log in to the management interface IP address on the firewall.
2. Configure the dataplane network interfaces as Layer 3 interfaces on the firewall
(Network > Interfaces > Ethernet).
3. Add static rules to the virtual router on the firewall. To route traffic through the firewall
in this example, you need three static routes on the firewall (Network > Virtual Routers,
select the router and click Static Routes):
1. Route all outbound traffic through the UnTrust zone, ethernet1/1 to the Azure router
at 192.168.1.1.
2. Route all inbound traffic destined to the web server subnet through the Trust zone,
ethernet1/2 to the Azure router at 192.168.2.1.
3. Route all inbound traffic destined to the database server subnet through the Trust
zone, ethernet1/2 to the Azure router at 192.168.2.1.
4. Create security policy rules (Policies > Security) to allow inbound and outbound traffic
on the firewall. You also need security policy rules to allow appropriate traffic from the
web server subnet to the database server subnet and vice versa.
5. Commit the changes on the firewall.
6. Verify that the VM-Series firewall is securing traffic (Monitor > Logs > Traffic).
VM-Series Deployment Guide Version 10.1 752 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 753 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
You can use a new or an existing storage account and resource group in which to deploy all the
resources for this solution within an Azure location. It does not provide default values for the
resource group name and storage account name, you must enter a name for them. While you can
create a new or use an existing VNet, the template creates a default VNet named vnet-FW with
the CIDR block 192.168.0.0/16, and allocates five subnets (192.168.1.0/24 - 192.168.5.0/24)
for deploying the Azure Application Gateway, the VM-Series firewalls, the Azure load balancer
and the web servers. Each VM-Series firewall is deployed with three network interfaces—
ethernet0/1 in Mgmt subnet (192.168.0.0/24), ethernet1/1 in Untrust subnet (192.168.1.0/24),
and ethernet1/2 in the Trust subnet (192.168.2.0/24).
The template creates a Network Security Group (NSG) that allows inbound traffic from any source
IP address on ports 80,443, and 22. It also deploys the pair of VM-Series firewalls and the web
server pair in their respective Availability Sets to ensure that at least one instance of each is
available during a planned or unplanned maintenance window. Each Availability Set is configured
to use three fault domains and five update domains.
The Azure Application Gateway acts as a reverse-proxy service, which terminates a client
connection and forwards the requests to back-end web servers. The Azure Application Gateway is
set up with an HTTP listener and uses a default health probe to test that the VM-Series firewall IP
address (for ethernet1/1) is healthy and can receive traffic.
The template does not provide an auto-scaling solution; you must plan your capacity
needs and then deploy additional resources to Adapt the Template for your deployment.
VM-Series Deployment Guide Version 10.1 754 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
The VM-Series firewalls are not configured to receive and secure web traffic destined to the
web servers. Therefore, at a minimum, you must configure the firewall with a static route to
send traffic from the VM-Series firewalls to the default router, configure destination NAT policy
to send traffic back to the IP address of the load balancer, and configure Security policy rules.
The NAT policy rule is also required for the firewall to send responses back to the health probes
from the HTTP listener on the Azure Application Gateway. To assist you with a basic firewall
configuration, the GitHub repository includes a sample configuration file called appgw-sample.xml
that you can use to get started.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 755 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 756 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
3. Note the Public IP address or the DNS name assigned to eth0-VM-Series0 and eth0-
VM-Series1 to access the management interface of the VM-Series firewalls.
VM-Series Deployment Guide Version 10.1 757 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 758 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 4 | Log in and configure the other instance of the VM-Series firewall.
See step Configure the VM-Series firewall.
If you have used the sample configuration firewall, log in to the firewall and view the Traffic
logs generated on session start in Monitor > Logs > Traffic.
Parameter Description
Subscription The type of Azure subscription you will use to cover the cost of
the resources deployed with the template.
Location Select the Azure location to which you want to deploy the
template (no default).
Network Security Group The network security group limits the source IP addresses from
Name which the VM-Series firewalls and web servers can be accessed.
Default: nsg-mgmt
VM-Series Deployment Guide Version 10.1 759 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Parameter Description
Network Security Group The source IP addresses that can log in to the management port of
Inbound Src IP the VMs deployed by the template.
The default value 0.0.0.0/0 means you can log into the firewall
management port from any IP address.
Storage Account
Storage Account Name Create new or enter the name of an existing Storage Account (no
default). The name must be globally unique.
Storage Account Type Choose between standard and premium storage and your data
replication needs for local redundancy, geo-redundancy, and read-
access geo-redundancy.
The default option is Locally Redundant Storage (LRS). The other
options are Standard GRS, Premium LRS, and Standard RAGRS.
VNet
App Gateway DNS Enter a globally unique DNS name for the Azure Application
Name Gateway.
App Gateway Subnet Default name is AppGWSubnet and the subnet prefix is
Name and Prefix 192.168.3.0/24.
Internal Load Balancer Default name is backendSubnet and the subnet prefix is
Subnet Name and Prefix 192.168.4.0/24.
Backend Vm Size The default size is Standard tier D1 Azure VM. Use the drop-down
in the template to view the other Azure VM options available for
the backend web servers.
VM-Series Deployment Guide Version 10.1 760 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Parameter Description
Firewalls
Firewall Model Choose from BYOL or PAYG (bundle 1 or bundle 2, each bundle
includes the VM-300 and a set of subscriptions).
Firewall Vm Name and The default name for the firewall is VM-Series, and the default size
Size is Standard tier D3 Azure VM.
Use the drop-down in the template to view the other Azure VM
options available for the VM-Series firewalls
Mgmt Subnet Name and The management subnet for the VM-Series firewalls and the web
Prefix servers deployed in this solution.
Default name is Mgmt and the subnet prefix is 192.168.0.0/24.
Mgmt Public IP Address Enter a hostname to access the management interface on each
Name firewall. The names must be globally unique.
Trusted Subnet Name The subnet to which eth1/1 on the VM-Series firewall is
and Prefix connected; this subnet connects the VM-Series firewall to the
Azure Application gateway. The firewall receives web traffic
destined to the web servers on eth1/1.
Default name is Trust and the subnet prefix is 192.168.2.0/24.
Untrusted Subnet Name The subnet to which eth1/2 on the VM-Series firewall is
connected. The firewall receives return and outbound web traffic
on this interface.
Default name is Untrust and the subnet prefix is 192.168.1.0/24.
The name must be globally unique.
Username Enter the username for the administrative account on the VM-
Series firewalls and the web servers.
Authentication Type You must either enter a password for authentication or use an SSH
public key (no default).
VM-Series Deployment Guide Version 10.1 761 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Static route—The default virtual router on the firewall has a static route to 192.168.1.1, and
this IP address is accurate if you use the default template values. If you have changed the
Untrust subnet CIDR, you’ll need to update the IP address to match your setup. All traffic
coming from the backend web servers, destined for the application gateway, uses this IP
address as the next hop for delivering packets to the untrust interface on the firewall.
• NAT Policy Rule—The NAT policy rule enables destination NAT and source NAT.
• The destination NAT rule is for all traffic that arrives on the firewall’s untrust interface
(ethernet1/2), which is the firewall-untrust-IP address object. This rule translates the
destination IP address on the packet to that of the internal load balancer so that all traffic is
directed to the internal load balancer and thus to the backend web servers.
• The source NAT rule is for all traffic from the backend web server and destined to the
untrust network interface on the firewall. This rule translates the source address to the IP
address of the trust interface on the firewall (ethernet1/2).
• Security Policy Rule—Two Security policy rules are defined in the sample configuration file.
The first rule allows all inbound web-browsing traffic and generates a log at the start of a
session on the firewall. The second rule blocks all other traffic and generates a log at the start
and end of a session on the firewall. You can use these logs to monitor all traffic to the web
servers in this deployment.
• Administrative User Credentials— The sample configuration file includes a username and
password for logging in to the firewall, which is set to pandemo/demopassword. After you
import the sample configuration, you must either change the password and set it to a strong,
custom password or create a new administrator account and delete the pandemo account.
VM-Series Deployment Guide Version 10.1 762 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Requirements
This solution requires the following components. See the Panorama plugin information in the
Compatibility Matrix for the minimum version requirements.
• VM-Series firewalls.
VM-Series Deployment Guide Version 10.1 763 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• Panorama—Your Panorama version must be the same or higher than your VM-Series PAN-OS
version.
• Panorama Plugin for Azure.
• A Panorama orchestrated deployment.
• Azure AKS template version 1.0. This template creates an AKS cluster.
You must enable AKS advanced networking (CNI) for the cluster.
An AKS deployment requires advanced networking to configure VNet Peering for the hub and
spoke VNets (see A Sample Hub-and-Spoke Topology to Secure AKS Clusters).
• Auto Scaling Infrastructure—The Azure Auto Scaling templates create the messaging
infrastructure and the basic hub and spoke architecture.
• AKS Clusters—The Palo Alto Networks AKS template creates an AKS cluster in a new VNet.
Given the name of the Spoke resource group, the template tags the VNet and AKS cluster with
the Spoke resource group name, so the resource group can be discovered by the Azure Auto
Scaling plugin for Panorama. The Azure plugin for Panorama queries service IP addresses on
the Staging ILB to learn about AKS cluster services.
Only one Spoke firewall scale set can be associated with an AKS Cluster; if you expose
multiple services in a single AKS cluster, they must be protected by the same Spoke.
For each resource group, create a subnet-based address group. In the above diagram,
for example, create an address group for 10.240.0.0/24 (AKS Cluster 1).
VM-Series Deployment Guide Version 10.1 764 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
• VNet Peering—You must manually configure VNET peering to communicate with other VNets
in the same region.
You can use other automation tools to deploy AKS clusters. If you deploy in an existing
VNet (the Hub Firewall VNet, for example) you must manually configure VNet peering
to the inbound and outbound hub and spoke resource groups, and manually tag the
VNet and AKS cluster with the resource group name.
• User Defined Routes and Rules—You must manually configure user-defined routes and rules
(see User-Defined Routing). In the diagram above, incoming traffic can be redirected, according
to UDR rules, to the Firewall ILB for inspection. Outbound traffic exiting an AKS Cluster is
redirected to the Hub Firewall ILB with Azure user-defined routing (UDR) rules. The solution
assumes Allow All as a default policy for Kubernetes orchestration to function as-is, but to
apply policy you can use an allowlist or a denylist to allow or deny outbound traffic.
User-Defined Routing
You must manually create user-defined routing and routing rules to govern inbound or outbound
traffic.
Inbound
In the above diagram, inbound traffic from the Application gateway is driven to the backend pool,
and based on UDR rules, redirected to the Firewall ILB. For example, create a UDR pointing to the
VNet subnet so that the traffic for Kubernetes services is pointed to the firewall ILB.
Outbound
On the Hub firewall set, for each AKS cluster being protected, you must create static routes for
the cluster subnet CIDR, with the next hop being the gateway address of the Hub VNet trust
subnet.
All outbound traffic for an AKS cluster is directed to the Hub firewall set with a single UDR rule.
VM-Series Deployment Guide Version 10.1 765 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
apiVersion: rbac.authorization.k8s.io
kind: ClusterRoleBinding
metadata:
name: default-view
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: view
subjects:
- kind: ServiceAccount
name: default
namespace: default
VM-Series Deployment Guide Version 10.1 766 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
Add the address group to the top-level policy before you configure VNet peering or User-
Defined Routing.
Prevent Application Disruption when Workload and AKS Cluster VNets Are Peered
If an AKS cluster co-exists with VM workloads that run in separate VNets, and the VNet is peered
with both the workload spoke (Inbound) and the Hub (Outbound), you must create address groups
to differentiate the workloads and the AKS traffic, and add the address group to Top-Level Policy
as described above.
If the AKS service has any labels, the tag is as follows (one per label):
If a labelSelector tag is defined for a cluster, the plugin generates the following IP tag:
VM-Series Deployment Guide Version 10.1 767 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 2 | Unzip the build package. Edit the files azuredeploy.json and parameters.json for
your own deployment, and save.
STEP 3 | Issue the following Azure CLI commands to deploy the template.
VM-Series Deployment Guide Version 10.1 768 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
apiVersion: v1
kind: Service
metadata:
name: azure-vote-front
labels:
service: "azure-vote-front"
tier: "stagingapp"
annotations:
service.beta.kubernetes.io/azure-load-balancer-internal:
"true"
spec:
type: LoadBalancer
ports:
- port: 80
selector:
app: azure-vote-front
2. If you have not done so, create AKS cluster authentication before continuing.
3. Deploy your service on your AKS cluster.
For example, you can deploy your application through kubectl:
kubectl apply -f myapplication.yaml
For a sample, see: https://github.com/Azure-Samples/azure-voting-app-redis/blob/
master/azure-vote-all-in-one-redis.yaml
4. Use kubectl to get the service IP for the deployed service.
In the EXTERNAL-IP column 10.240.0.97 is for the ILB, according to your annotation in
Step a. Use the service IP to create a user defined route on Azure.
VM-Series Deployment Guide Version 10.1 769 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 5 | Create a UDR rule to point your service to the Firewall ILB behind the Application Gateway.
In Azure, go to your inbound spoke resource group, view the route table and add a new route
based on the destination service IP. In the following screen, the value in the tov1service
ADDRESS PREFIX column is the service IP.
VM-Series Deployment Guide Version 10.1 770 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 1 | Select Panorama > Azure > Deployments to view the monitoring definition you created
when you configured the deployment. As shown below, if Auto Program Routes is enabled,
the firewall routes are programmed for you.
VM-Series Deployment Guide Version 10.1 771 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 2 | In AKS, tag your Resource Groups. The tags are name/value pairs.
1. Select Home > Resource groups and choose a resource group.
2. Select Tags and define name/value pairs. As shown in the following figure, the tag names
must be inboundgrouprg and HubRG:
• inboundgrouprg—your spoke resource group name
• HubRG—your hub resource group name
The template takes the name of the Spoke resource group as a parameter, and tags the
VNet and AKS cluster with the Spoke resource group name so that it can be discovered
by the Panorama plugin for Azure.
The templates deploy resources in separate VNets. If you manually deploy the AKS
cluster and service in the same VNet as the Spoke firewall set, you must manually
create tags for the spoke resource group name.
VM-Series Deployment Guide Version 10.1 772 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
If you have service names or tags that are not unique across namespaces, use
the label selector to filter both a tag and a namespace so that you get a unique
result.
VM-Series Deployment Guide Version 10.1 773 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 774 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
STEP 2 | Update the UDR rules for the application gateway subnet to add a route for the service
CIDR, with the next hop being the Inbound Firewall Load Balancer from the Spoke firewall
resource group.
STEP 2 | In the Device Group list, choose the device group for your AKS service.
STEP 3 | Add a Security Policy rule. Fill out the form, and on the Destination tab Add the destination
address or address group.
apiVersion: apps/v1
kind: Deployment
metadata:
name: azure-vote-back
spec:
replicas: 1
selector:
matchLabels:
app: azure-vote-back
template:
metadata:
labels:
VM-Series Deployment Guide Version 10.1 775 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
app: azure-vote-back
spec:
containers:
- name: azure-vote-back
image: redis
resources:
requests:
cpu: 100m
memory: 128Mi
limits:
cpu: 250m
memory: 256Mi
ports:
- containerPort: 6379
name: redis
---
apiVersion: v1
kind: Service
metadata:
name: azure-vote-back
labels:
service: backend
spec:
ports:
- port: 6379
selector:
app: azure-vote-back
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: azure-vote-front
spec:
replicas: 5
selector:
matchLabels:
app: azure-vote-front
template:
metadata:
labels:
app: azure-vote-front
spec:
containers:
- name: azure-vote-front
image: microsoft/azure-vote-front:v1
resources:
requests:
cpu: 100m
memory: 128Mi
limits:
cpu: 250m
memory: 256Mi
ports:
- containerPort: 80
env:
- name: REDIS
VM-Series Deployment Guide Version 10.1 776 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
value: "azure-vote-back"
---
apiVersion: v1
kind: Service
metadata:
name: azure-vote-front
labels:
service: "azure-vote-front"
type: "production"
providesecurity: "yes"
a: "value"
b: "value"
c: "value"
tier: "stagingapp"
annotations:
service.beta.kubernetes.io/azure-load-balancer-internal: "true"
spec:
type: LoadBalancer
ports:
- port: 80
selector:
app: azure-vote-front
VM-Series Deployment Guide Version 10.1 777 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 778 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 779 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Azure
VM-Series Deployment Guide Version 10.1 780 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
OpenStack
The VM-Series firewall for OpenStack allows you to provide secure application
delivery along with network security, performance and visibility.
781
Set Up the VM-Series Firewall on OpenStack
Basic Gateway
The VM-Series firewall for OpenStack allows you to deploy the VM-Series firewall on the KVM
hypervisor running on a compute node in your OpenStack environment. This solution uses Heat
Orchestration Templates and bootstrapping to deploy the VM-Series firewall and a Linux server.
The VM-Series firewall protects the deployed Linux server by inspecting the traffic going in and
out of the server. The sample bootstrap files allow the VM-Series firewall to boot with basic
configuration for handling traffic.
These heat template files and the bootstrap files combine to create two virtual machines, the VM-
Series firewall and Linux server, in a network configuration similar to that shown below.
Service chaining is a Contrail feature that deploys a VM-Series firewall as a service instance in
your OpenStack environment. A service chain is a set of service virtual machines, such as firewalls
or load balancers, and each virtual machine in the service chain is a service instance. Service
scaling allows you to dynamically deploy additional instances of the VM-Series firewall. Using
CPU utilization or incoming bytes per second metrics gathered by Ceilometer, OpenStack deploys
or shuts down additional instances of the VM-Series firewall to meet the current needs of your
network.
VM-Series Deployment Guide Version 10.1 782 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
The VM-Series firewall in OpenStack solution leverages heat orchestration templates to configure
and deploy the components required for service chaining and service scaling. The heat templates
provided by Palo Alto networks create a service template, service instance, and service policy (to
direct traffic to the VM-Series firewall) to deploy two Linux servers and the VM-Series firewall
service instance between them.
VM-Series Deployment Guide Version 10.1 783 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Component Description
Software See the Compatibility Matrix for details about supported software
versions.
VM-Series Hardware See VM-Series System Requirements for the minimum hardware
Resources requirements for your VM-Series model.
In OpenStack, flavors define the CPU, memory, and storage
capacity of a compute instance. When setting up your Heat
template, choose the compute flavor that meets or exceeds the
hardware requirements for the VM-Series model.
Fuel Master Fuel is a web UI-driven deployment and management tool for
OpenStack.
OpenStack Controller This node runs most of the shared OpenStack services, such API
and scheduling. Additionally, the Horizon UI runs on this node.
OpenStack Compute The compute node contains the virtual machines, including the
VM-Series firewall, in the OpenStack deployment. The compute
node that houses the VM-Series must meet the following criteria:
• Instance type OS::Nova::Server
• Allow configuration of at least three interfaces
• Accept the VM-Series qcow2 image
• Accept the compute flavor parameter
VM-Series Deployment Guide Version 10.1 784 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Component Description
virtual machines terminate at the gateway node, where packets are
decapsulated and sent to their destinations on IP networks.
Ceilometer (OpenStack In the case of the VM-Series firewall for OpenStack, Ceilometer
Telemetry) monitors CPU utilization for service scaling. When CPU utilization
meets the defined thresholds, a new service instance of the VM-
Series firewall is deployed or shut down.
Heat Orchestration Palo Alto Networks provides a sample Heat template for deploying
Template Files the VM-Series firewall. This template is made up of a main
template and an environment template. These files instantiate one
VM-Series instance with one management interface and two data
interfaces.
In a basic gateway deployment, the template instantiates a Linux
server with one interface. The interface of the server attaches to
the private network created by the template.
In a service chaining or service scaling deployment, the templates
instantiate two Linux servers with one server attached to each
data interface of the firewall.
VM-Series Firewall The VM-Series firewall bootstrap files consist of a init-cfg.txt file,
Bootstrap Files bootstrap.xml file, and VM-Series auth codes. Along with the Heat
template files, Palo Alto Networks provides a sample init-cfg.txt
and bootstrap.xml files. You must provide your own auth codes to
license your VM-Series firewall and activate any subscriptions. See
Bootstrap the VM-Series Firewall for more information about VM-
Series bootstrap files.
VM-Series Deployment Guide Version 10.1 785 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
File injection is no longer supported beginning with OpenStack Queens; you must use user
data instead.
The table below describes resources that the pan_basic_gw.yaml template file creates and
provides the default value, if applicable.
Resource Description
VM-Series Deployment Guide Version 10.1 786 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Resource Description
allow_ssh_https_icmp_secgroup
Security group that allows TCP on ports 22 and 443 and ICMP
traffic.
server_trust_port The trust port of the Linux server Layer 3 mode. The Heat
template provides a default IP address of 192.168.100.10 to this
port.
If you change this IP address in the heat template, you must
change the IP address in the bootstrap.xml file.
The pan_basic_gw.yaml file references the pan_basic_gw_env.yaml for many of the values needed
to create the resources need to deploy the VM-Series firewall and Linux server. The heat template
environment file contains the following parameters.
Parameter Description
public_network Addresses that the OpenStack cluster and the virtual machines in the
cluster use to communicate with the external or public network. The
public network provides virtual IP addresses for public endpoints,
which are used to connect to OpenStack services APIs. The template
does not create the public network; you must create this before
deploying the heat templates. The default value is public_net.
pan_image This parameter specifies the VM-Series base image used by the Heat
template when deploying the VM-Series firewall. The default value is
pa-vm-7.1.4.
VM-Series Deployment Guide Version 10.1 787 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Parameter Description
pan_flavor This parameter defines the hardware resources allocated to the VM-
Series firewall. The default value is m1.medium. This value meets the
VM-Series on KVM System Requirements described in the Set Up the
VM-Series Firewall on KVM chapter.
server_image This parameter tells the Heat template which image to use for the
Linux server. The default value is Ubuntu-14.04.
server_flavor This parameter defines the hardware resources allocated to the Linux
server. The default value is m1.small.
server_key The server key is used for accessing the Linux server through ssh. The
default value is server_key. You can change this value by entering a
new server key in the environment file.
VM-Series Deployment Guide Version 10.1 788 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
The heat template environment file defines the parameters specific to the VM-Series firewall
instance deployed through service chaining or service scaling. The parameters defined in the
environment file are divided into sections described below. There are two versions of the heat
templates for service chaining—vwire and L3— and one for service scaling.
Service chaining requires the heat template files and two bootstrap files to launch the VM-Series
firewall service instance and two Linux servers in the left and right networks.
• Template files—This template defines the resources created to support the VM-Series firewall
and two Linux servers, such as interfaces and IP addresses.
• service_chaining_template_vm.yaml for vwire deployments.
• service_chaining_template_L3.yaml for L3 deployments.
• service_scaling_template.yaml for service scaling deployments.
• Environment file—This environment file defines the environment that the VM-Series firewall
and Linux servers exist in. Many parameters in the template reference the parameters defined
in this file, such as flavor for the VM-Series and the names of the Linux servers.
• service_chaining_env_vm.yaml for vwire deployments.
• service_chaining_env_L3.yaml for L3 deployments.
• service_scaling_env.yaml for service scaling deployments.
• service_instance.yaml—(Service Scaling only) This is a nested heat template that is reference
by Service_Scaling_template.yaml to deploy the service instance. It provides the necessary
information to deploy service instances for scaling events.
• init-cfg.txt—Provides the minimum information required to bootstrap a VM-Series firewall. The
init-cfg.txt provided only includes the operational command to enable DHCP on the firewall
management interface.
• <file_name>_bootstrap.xml—Provides basic configuration for the VM-Series firewall. The
bootstrap.xml file configures the data interfaces. These values must match the corresponding
values in the heat templates files.
For more information about the init-cfg.txt and bootstrap.xml files, see Bootstrap Configuration
Files.
The following tables describe the parameters of the environment file.
• Virtual Network
• Virtual Machine
• Service Template
• Service Instance
• IPAM
• Service Policy
VM-Series Deployment Guide Version 10.1 789 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
• Alarm
Virtual Network
The virtual network configuration paramaters in the heat template environment file define the
virtual network that connects the VM-Series firewall and the two Linux servers deployed by the
heat template.
route_target Edit this value so route target configuration matches that of your
external gateway.
Virtual Machine
The virtual machine parameters define the left and right Linux servers. The name of the port
tuple is defined here and referenced by the heat template. In Contrail, a port tuple is an ordered
set of virtual network interfaces connected to the same virtual machine. With a port tuple, you
can create ports and pass that information when creating a service instance. The heat template
creates the left, right, and management ports and adds them to the port tuple. The port tuple
is then linked to the service instance. When you launch the service instance using the heat
templates, the port tuple maps the service virtual machine to the virtual machine deployed in
OpenStack.
flavor The flavor of the left and right virtual machines. The default value is
m1.small.
left_vm_image or The name of the software image for the left and right virtual machines.
right_vm_image or Change this value to match the file name of the image you uploaded.
image
The default is TestVM, which is a default image provided by
OpenStack.
VM-Series Deployment Guide Version 10.1 790 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
left_vm_name and The name of the left and right virtual machines.
right_vm_name
port_tuple_name The name of the port tuple used by the two Linux servers and the VM-
Series firewall.
server_key The server key is used for accessing virtual machines through SSH. The
default value is server_key. You can change this value by entering a
new server key in the environment file.
Service Template
The service template defines the parameters of the service instance, such as the software image,
virtual machine flavor, service type, and interfaces. Service templates are configured within the
scope of a domain and can be used on all projects within the specified domain.
S_Tmp_version The service template version. The default value is 2. Do not change
this parameter because service template version 2 is required to
support port tuples.
S_Tmp_service_mode Service mode is the network mode used by the VM-Series firewall
service instance. For the L3 network template, the default value is in-
network. For the virtual wire template, the default value is transparent.
S_Tmp_service_type The type of service being deployed by the template. The default value
is firewall and should not be changed when deploying the VM-Series
firewall.
S_Tmp_image_name This parameter specifies the VM-Series base image used by the Heat
template when deploying the VM-Series firewall. Edit this parameter
to match the name of the VM-Series firewall image uploaded to your
OpenStack environment.
S_Tmp_flavor This parameter defines the hardware resources allocated to the VM-
Series firewall. The default value is m1.large.
S_Tmp_interface_type_mgmt
The parameters define the interface type for management, left, and
S_Tmp_interface_type_left
right interfaces.
S_Tmp_interface_type_right
VM-Series Deployment Guide Version 10.1 791 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
domain The domain where this service template is tied to. The default value is
default-domain.
Service Instance
The service instance portion of the heat template environment file provides the name of the
individual instance deployed by the heat template and service template.
S_Ins_name The service instance name. This is the name of the VM-Series firewall
instance in Contrail.
IPAM
IP address management (IPAM) provides the IP address information for the interfaces of the
service instance. Changes these parameters to best suit your environment.
NetIPam_ip_prefix_len_mgmt
The IP prefix length of the management interface on the VM-Series
firewall. The default value is /24.
NetIPam_ip_prefix_left The IP prefix of the left interface on the VM-Series firewall. The
default value is 10.10.1.0.
NetIPam_ip_prefix_len_left
The IP prefix length of the left interface on the VM-Series firewall. The
default value is /24.
NetIPam_ip_prefix_right The IP prefix of the right interface on the VM-Series firewall. The
default value is 10.10.2.0.
NetIPam_ip_prefix_len_right
The IP prefix length of the right interface on the VM-Series firewall.
The default value is /24.
NetIPam_addr_from_start_true
This parameter determines how IP addresses are assigned to VMs
on the subnets described above. If true, any new VM takes the next
available IP address. If false, any new VM is assigned an IP address at
random. The default value is true.
VM-Series Deployment Guide Version 10.1 792 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Service Policy
The service policy defines the traffic redirection rules and policy that point traffic passing
between the left and right virtual machines to the VM-Series firewall service instance.
policy_name The name of the service policy in Contrail that redirects traffic through
the VM-Series firewall. For the L3 template, the default value is
PAN_SVM_policy-L3. For the virtual wire template, the default value is
PAN_SVM_policy-vw.
simple_action The default action Contrail applies to traffic going to the VM-Series
firewall service instance. The default value is pass because the VM-
Series firewall will apply its own security policy to the traffic.
src_port_end and Use this parameter to specify source port(s) that should be associated
src_port_start with the policy rule. You can enter a single port, a list of ports
separated with commas, or a range of ports in the form of <port>-
<port>.
The default value is -1 in the provided heat templates; meaning any
source port.
dst_port_end and Use this parameter to specify destination port(s) that should be
dst_port_start associated with the policy rule. You can enter a single port, a list
of ports separated with commas, or a range of ports in the form of
<port>-<port>.
The default value is -1 in the provided heat templates; meaning any
destination port.
Alarm
The alarm parameters are used in service scaling and are not included in the service chaining
environment files. These parameters define the thresholds used by Contrail to determine when
scaling should take place. This set of parameters is only used the service scaling heat template.
The default time configured under the cooldown parameters is intended to allow the firewall
enough time to boot up. If you change the cooldown values, leave sufficient time for each new
firewall instance to boot up.
VM-Series Deployment Guide Version 10.1 793 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Alarm
cooldown_initial The amount time Contrail waits before launching a additional service
instance after the initial service instance is launched. The default is
1200 seconds.
cooldown_scaledown The amount of time Contrail waits between shutting down additional
service instances after the first scale up service instance shut down.
The default is 1200 seconds.
period_high The interval during which the average CPU load is calculated as high
before triggering an alarm. The default value is 300 seconds.
period_low The interval during which the average CPU load is calculated as low
before triggering an alarm. The default value is 300 seconds.
threshold_high The value of CPU utilization in percentage or bytes per second that
Contrail references before launching a scale up event. The default is
40% CPU utilization or 2800 bytes per second.
threshold_low The value of CPU utilization in percentage or bytes per second that
Contrail references before launching a scale down event. The default is
20% CPU utilization or 12000 bytes per second.
VM-Series Deployment Guide Version 10.1 794 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
STEP 3 | Download Ubuntu 14.04 and upload the image to the OpenStack controller.
The Heat template needs an Ubuntu image for launching the Linux server.
1. Download Ubuntu 14.04.
2. Log in to the Horizon UI.
3. Select Project > Compute > Images > Create Image.
4. Name the image Ubuntu 14.04 to match the parameter in the pan_basic_gw_env.yaml
file.
5. Set Image Source to Image File.
6. Click Choose File and navigate to your Ubuntu image file.
7. Set the Format to match the file format of your Ubuntu image.
8. Click Create Image.
STEP 4 | Upload the VM-Series for KVM base image to the OpenStack controller.
1. Log in to the Horizon UI.
2. Select Project > Compute > Images > Create Image.
3. Name the image to match the image name in your Heat template.
4. Set Image Source to Image File.
5. Click Choose File and navigate to your VM-Series image file.
6. Set the Format to QCOW2-QEMU Emulator.
7. Click Create Image.
VM-Series Deployment Guide Version 10.1 795 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
STEP 5 | Upload the bootstrap files. You have two options for passing bootstrapping files to
OpenStack—file injection (personality files) or user data. To pass the bootstrap files using
user-data, you must place the files in a tar ball (.tgz file) and encode that tar ball with base64.
File injection is no longer supported beginning with OpenStack Queens; you must use
user data instead.
• For file injection, upload the init-cfg.txt, bootstrap.xml, and your VM-Series auth codes to
your OpenStack controller or a web server that the OpenStack controller can access.
• If using the --user-data method to pass the bootstrap package to the config-drive, you
can use the following command to create the tar ball and encode the tar ball (.tgz file) with
base64:
STEP 6 | Edit the pan_basic_gw.yaml template to point to the bootstrap files and auth codes.
• If you are using personality files, specify the file path or web server address to the location
of your files under personality. Uncomment whichever lines you are not using.
pan_fw_instance:
type: OS::Nova::Server
properties:
image: { get_param: pan_image }
flavor: { get_param: pan_flavor }
networks:
- network: { get_param: mgmt_network }
- port: { get_resource: pan_untrust_port }
- port: { get_resource: pan_trust_port }
user_data_format: RAW
config_drive: true
personality:
/config/init-cfg.txt: {get_file: "/opt/pan_bs/init-
cfg.txt"}
# /config/init-cfg.txt: { get_file: "http://
web_server_name_ip/pan_bs/init-cfg.txt" }
/config/bootstrap.xml: {get_file: "/opt/pan_bs/
bootstrap.xml"}
# /config/bootstrap.xml: { get_file: "http://
web_server_name_ip/pan_bs/bootstrap.xml" }
/license/authcodes: {get_file: "/opt/pan_bs/authcodes"}
# /license/authcodes: {get_file: "http://
web_server_name_ip/pan_bs/authcodes"}
• If you are using user-data, specify the file path or web server address to the location of your
files under user_data. If you have more than one
pan_fw_instance:
type: OS::Nova::Server
properties:
VM-Series Deployment Guide Version 10.1 796 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
STEP 7 | Edit the pan_basic_gw_env.yaml template environment file to suit your environment. Make
sure that the management and public network values match those that you created in your
OpenStack environment. Set the pan_image to match the name you assigned to the VM-
Series base image file. You can also change your server key here.
STEP 10 | Verify that the VM-Series firewall is bidirectionally inspecting traffic accessing the Linux
server.
1. Log in to the firewall.
2. Select Monitor > Logs > Traffic to view the SSH session.
VM-Series Deployment Guide Version 10.1 797 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
Deploying the VM-Series firewall through service chaining or service scaling is not
supported on OpenStack Queens.
STEP 3 | Download Ubuntu 14.04 and upload the image to the OpenStack controller.
For service chaining, you can use the default image provided by OpenStack called TestVM.
Skip this step when using TestVM. An Ubuntu image is required for service scaling.
1. Download Ubuntu 14.04.
2. Log in to the Horizon UI.
3. Select Project > Compute > Images > Create Image.
4. Name the image Ubuntu 14.04 to match the parameter in the pan_basic_gw_env.yaml
file.
5. Set Image Source to Image File.
6. Click Choose File and navigate to your Ubuntu image file.
7. Set the Format to match the file format of your Ubuntu image.
8. Click Create Image.
A server key is required when using an Ubuntu image. Ensure that the server key is
added to the environment file.
VM-Series Deployment Guide Version 10.1 798 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
STEP 4 | Upload the VM-Series for KVM base image to the OpenStack controller.
1. Log in to the Horizon UI.
2. Select Project > Compute > Images > Create Image.
3. Name the image to match the image name in your Heat template.
4. Set Image Source to Image File.
5. Click Choose File and navigate to your VM-Series image file.
6. Set the Format to QCOW2-QEMU Emulator.
7. Click Create Image.
STEP 5 | Upload the bootstrap files. The files must be uploaded to the folder structure described here.
The heat template uses this folder structure to locate the bootstrap files.
1. Log in to your OpenStack controller.
2. Create the following folder structure:
/root/bootstrap/config/
/root/bootstrap/license/
3. Using SCP or FTP, add the init-cfg.txt and bootstrap.xml files to the config folder and
add your VM-Series auth codes to the license folder.
STEP 6 | Edit the template environment file to suit your environment. Verify that the image names in
the environment file match the names you gave the files when you uploaded them.
parameters:
# VN config
management_network: 'mgmt_net'
left_vn: 'left_net'
right_vn: 'right_net'
left_vn_fqdn: 'default-domain:admin:left_net'
right_vn_fqdn: 'default-domain:admin:right_net'
route_target: "target:64512:20000"
# VM config
flavor: 'm1.small'
left_vm_image: 'TestVM'
right_vm_image: 'TestVM'
svm_name: 'PAN_SVM_L3'
left_vm_name: 'Left_VM_L3'
right_vm_name: 'Right_VM_L3'
port_tuple_name: 'port_tuple_L3'
#ST Config
S_Tmp_name: PAN_SVM_template_L3
S_Tmp_version: 2
S_Tmp_service_mode: 'in-network'
S_Tmp_service_type: 'firewall'
S_Tmp_image_name: 'PA-VM-8.0.0'
S_Tmp_flavor: 'm1.large'
S_Tmp_interface_type_mgmt: 'management'
S_Tmp_interface_type_left: 'left'
S_Tmp_interface_type_right: 'right'
domain: 'default-domain'
# SI Config
VM-Series Deployment Guide Version 10.1 799 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
S_Ins_name: PAN_SVM_Instance_L3
S_Ins_fq_name: 'default-domain:admin:PAN_SVM_Instance_L3'
#IPAM Config
NetIPam_ip_prefix_mgmt: '172.2.0.0'
NetIPam_ip_prefix_len_mgmt: 24
NetIPam_ip_prefix_left: '10.10.1.0'
NetIPam_ip_prefix_len_left: 24
NetIPam_ip_prefix_right: '10.10.2.0'
NetIPam_ip_prefix_len_right: 24
NetIPam_addr_from_start_true: true
#Policy Config
policy_name: 'PAN_SVM_policy-L3'
policy_fq_name: 'default-domain:admin:PAN_SVM_policy-L3'
simple_action: 'pass'
protocol: 'any'
src_port_end: -1
src_port_start: -1
direction: '< >'
dst_port_end: -1
dst_port_start: -1
STEP 7 | Edit the template files to point to the bootstrap files and auth codes. Under Personality,
specify the file path to the location of your files. Uncomment whichever lines you are not
using.
Pan_Svm_instance:
type: OS::Nova::Server
depends_on: [ mgmt_InstanceIp, left_InstanceIp,
right_InstanceIp ]
properties:
name: {get_param: svm_name }
image: { get_param: S_Tmp_image_name }
flavor: { get_param: S_Tmp_flavor }
networks:
- port: { get_resource: mgmt_VirtualMachineInterface }
- port: { get_resource: left_VirtualMachineInterface }
- port: { get_resource: right_VirtualMachineInterface }
user_data_format: RAW
config_drive: true
personality:
/config/init-cfg.txt: {get_file: "/root/bootstrap/config/
init-cfg.txt"}
# /config/init-cfg.txt: { get_file: "http://10.4.1.21/
op_test/config/init-cfg.txt" }
/config/bootstrap.xml: {get_file: "/root/bootstrap/config/
Service_Chaining_bootstrap_L3.xml"}
# /config/bootstrap.xml: { get_file: "http://10.4.1.21/
op_test/config/Service_Chaining_bootstrap_L3.xml" }
# /license/authcodes: {get_file: "/root/bootstrap/license/
authcodes"}
# /license/authcodes: {get_file: "http://10.4.1.21/op_test/
license/authcodes"}
VM-Series Deployment Guide Version 10.1 800 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
STEP 11 | Verify that the VM-Series firewall is bidirectionally inspecting traffic between the Linux
servers.
1. Log in to the firewall.
2. Select Monitor > Logs > Traffic to view the SSH session.
VM-Series Deployment Guide Version 10.1 801 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on OpenStack
VM-Series Deployment Guide Version 10.1 802 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
Google Cloud Platform
You can deploy a VM-Series firewall on a Google Compute Engine instance on the
Google Cloud Platform.
803
Set Up the VM-Series Firewall on Google Cloud Platform
VM-100 Firewall
VM-200 Firewall
VM-300 Firewall
VM-Series Deployment Guide Version 10.1 804 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-1000-HV Firewall
VM-500 Firewall
VM-700 Firewall
The VM-Series firewall supports the predefined standard machine types listed below. You can
choose a higher performing machine type or you can create your own custom machine type if the
resource requirements are compatible with your VM-Series firewall license.
• n1-standard-4
• n1-standard-8
• n1-standard-16
• n2-standard-4
• n2-standard-8
• n2-standard-16
• n2-standard-32
Custom Machine Types:
• e2-standard-4
• e2-standard-8
• e2-standard-16
• e2-standard-32
VM-Series Deployment Guide Version 10.1 805 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
Internet Gateway
The VM-Series firewall secures North/South traffic to and from the internet to protect
applications from known and unknown threats. A Google project can have up to five VPC
networks. For a typical example of an internet gateway, refer to the Google configuration
examples.
In public cloud environments, it is a common practice to use a scale-out architecture (see the
figure below) rather than larger, higher performing VMs. This architecture (sometimes called a
sandwich deployment) avoids a single point of failure and enables you to add or remove firewalls
as needed.
Segmentation Gateway
A segmentation gateway secures East/West traffic between virtual private clouds (VPCs) to
ensure data protection compliance and application access. The following figure shows a firewall
securing both North/South and East/West traffic.
VM-Series Deployment Guide Version 10.1 806 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 807 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
General Requirements
The components in this checklist are common to deploying a VM-Series firewall that you manage
directly or with Panorama. Additional requirements apply for Panorama plugin for services such as
Stackdriver monitoring, VM monitoring, auto scaling or securing Kubernetes deployments.
Always consult the Compatibility Matrix for Panorama plugin information for public clouds.This
release requires the following software:
• GCP account—You must have a GCP user account with a linked email address and you must
know the username and password for that email address.
• Google Cloud SDK—If you have not done so, install Google Cloud SDK, which includes Google
Cloud APIs, gcloud and other command line tools. You can use the command line interface to
deploy the firewall template and other templates.
• PAN-OS on VM-Series firewalls on GCP—VM-Series firewalls running a PAN-OS version
available from the Google Marketplace.
• VM-Series firewalls—VM-Series firewalls that you want to manage from Panorama must
be deployed in Google Cloud Platform using a Palo Alto Networks image from the Google
Marketplace. Firewalls must meet the Minimum System Requirements for the VM-Series
Firewall.
• VM-Series Licenses—You must license a VM-Series firewall to obtain a serial number. A
serial number is required to add a VM-Series firewall as a Panorama managed device. If you
are using the Panorama plugin for GCP to deploy VM-Series firewalls you must supply a
BYOL auth code. The Google Marketplace handles your service billing, but the firewalls you
deploy will directly interface with the Palo Alto Networks licensing server.
• VM-Series plugin on the firewall—VM-Series firewalls running PAN-OS 9.0 and later include
the VM-Series plugin, which manages integration with public and private clouds. As shown
VM-Series Deployment Guide Version 10.1 808 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
in the Compatibility Matrix, the VM-Series plugin has a minimum version that corresponds
to each PAN-OS release.
When there is a major PAN-OS upgrade the VM-Series plugin version is automatically
upgraded. For minor releases it is up to you to determine whether a VM-Series plugin
upgrade is necessary, and if so, perform a manual upgrade. See Install the VM-Series Plugin
on Panorama.
• Panorama running in Management mode—A Panorama physical or virtual appliance running a
PAN-OS version that is the same or later than the managed firewalls. Virtual instances do not
need to be deployed in GCP.
• You must have a licensed version of Panorama.
• Panorama must have network access to the VPCs in which the VMs you want to manage
are deployed.
• If you intend to manage VMs deployed in GCP, or configure features such as auto scaling,
your PAN-OS and VM-Series plugin versions must meet the Public Cloud requirements to
support the Panorama plugin for GCP.
• VM-Series plugin on Panorama. See Install the VM-Series Plugin on Panorama
• Panorama plugin for GCP version 2.0.0—The GCP plugin manages the interactions required to
license, bootstrap and configure firewalls deployed with the VM Monitoring or Auto Scaling
templates. The GCP plugin, in conjunction with the VM Monitoring or Auto Scaling templates,
uses Panorama templates template stacks, and device groups to program NAT rules that direct
traffic to managed VM-Series firewalls.
See Install the Panorama Plugin for GCP.
You cannot upgrade the Panorama Plugin for GCP from version 1.0.0 to version 2.0.x. If
you have installed version 1.0.0, remove it before installing 2.0.x.
If you have a standalone Panorama or two Panorama appliances installed in an HA pair with
multiple plugins installed, plugins might not receive updated IP-tag information if one or more of
the plugins is not configured. This occurs because Panorama will not forward IP-tag information
VM-Series Deployment Guide Version 10.1 809 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
to unconfigured plugins. Additionally, this issue can occur if one or more of the Panorama plugins
is not in the Registered or Success state (positive state differs on each plugin). Ensure that your
plugins are in the positive state before continuing or executing the commands described below.
If you encounter this issue, there are two workarounds:
• Uninstall the unconfigured plugin or plugins. It is recommended that you do not install a plugin
that you do not plan to configure right away
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Verify your Panorama installation.
On Panorama, ensure that your PAN-OS version meets the requirements to support GCP auto
scaling.
STEP 4 | (Optional) If your Panorama appliances are in a high availability configuration, you must
manually install the same version of the Google plugin on both Panorama peers.
Configure the Google plugin on the active Panorama peer only. On commit, the
configuration syncs to the passive Panorama peer. Only the active Panorama peer
polls Google VMs you have configured for VM Monitoring.
VM-Series Deployment Guide Version 10.1 810 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
Users in your organization might have IAM permissions or predefined roles that
are more permissive than required. Ensure that you appropriately restrict VM-Series
firewall access.
You can also restrict access with service accounts, as described in Google Authentication
Methods.
Monitoring Metric Writer—Required for Stackdriver.
VM-Series Deployment Guide Version 10.1 811 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
authenticate instances or applications, you must know the email address for the account(s).
Refer to Creating and Managing Service Account Keys.
Using a service account is necessary if you want to connect to the VM-Series firewall from
outside the project—either from a different project or from the command line. For example, if
you want to enable a physical next generation firewall to monitor your VM-Series firewall, you
must save the VM-Series firewall service account information to a JSON file. In the physical
firewall, you upload the file when you configure the connection.
1. Select IAM & Admin > Service accounts and choose +Create Service Account.
Enter the service account name and description, and click Create.
2. Select a role type from the drop menu, and on the right, select an appropriate access level.
For example, select Project > Editor. You can select multiple roles for a service account.
When you are finished, click Continue.
3. Grant specific users permission to access this service account. Select members from the
Permissions column on the right to give them permission to access the roles in the previous
step.
2. SSH Keys—If you deploy the VM-Series firewall from the Marketplace, you must supply one
Open SSH key in RSA format for the Google Compute Engine instance metadata.
At deployment time, you paste the public key into the Marketplace deployment, as described in
SSH Key Pair. After deployment you use the private key to SSH in to the firewall to configure
the administrator account. To add users, see Manage Firewall Administrators.
You can authenticate in several ways:
• Create service accounts for instances—You can create a service account for a specific instance
or instance group, and grant specific permissions, which in turn can be granted to users.
• Use the default service account for your project—If you are using the Google Cloud Platform
(GCP™) Console, then you logged in with your email address and can access a GCE instance
based on whatever permissions or roles the project administrator assigned to your account.
Every Google Compute Engine instance created with the Google Cloud Console or the gcloud
command line tool has a default service account with the name in email address format:
<project-number>-compute@developer.gserviceaccount.com
To see the service account name for the firewall instance, view the instance details and scroll
to the bottom (refer to the Compute Engine default service account).
The default service account can manage authentication to VMs in the same project as a VM-
Series firewall. Access scopes allow the firewall to initiate API calls to VMs in the Google Cloud
project.
VM-Series Deployment Guide Version 10.1 812 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• Use IAM permissions and the Google APIs—If you use the Google SDK APIs and gcloud, then
you must call the APIs to authenticate.
• You typically use the Google SDK when you want to manage the firewall from a command
line or you want to run a script to configure the firewall.
• You need to access the Google APIs if a virtual machine you connect to has a custom image
with applications that require Google APIs.
Create the key pair according to your key generator documentation. Do not edit the public
key file. Editing risks introducing illegal characters.
The VM-Series firewall manages authentication differently than GCE instances. After deployment,
you first log in with the admin user. The VM-series firewall default user name is accepted only
once. After a successful login you set an administrator username and password for the VM-Series
web interface (see Deploy the VM-Series Firewall from Google Cloud Platform Marketplace).
The Google Marketplace deployment interface SSH key field displays the following placeholder:
admin:ssh-rsa your-SSH-key
admin is the VM-Series firewall Administrator user name required to log in to the firewall for the
first time. You add the admin: prefix into the Marketplace field when you Deploy the VM-Series
Firewall from Google Cloud Platform Marketplace.
You cannot log in to the VM-Series firewall if you do not supply the entire public key, or your key
has illegal characters when you paste the key into the Marketplace SSH key field. When you SSH
in to the VM-Series firewall for the first time, the public key is transferred to the firewall.
If the public key is corrupted, you must delete the deployment and start over. Any networks and
subnetworks remain, but the firewall rules must be recreated.
STEP 1 | Create an SSH key pair and store the SSH Key pair in the default location for your operating
system mentioned in Locating an SSH key.
• Linux or MacOS—Use ssh-keygen to create the key pair in your .ssh directory.
• Windows—Use PuTTYgen to create the key pair.
The content of the Key comment field does not matter to the VM-Series firewall; you can
accept the default (the key creation date) or enter a comment that helps you remember the
name of the key pair. Use the Save private key button to store the private key in your .ssh
directory.
VM-Series Deployment Guide Version 10.1 813 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | Enter the public key in the SSH key field as detailed below.
1. In the Marketplace SSH key field, delete the placeholder text, and type:
admin:
Make sure there are no extra spaces following the colon.
2. Insert the cursor after admin: and choose Paste as plain text. The key must be on a
single line, as shown below:
3. Move the cursor to the end of the key, add a space, and type: admin
The final contents of the SSH key field must be:
admin:ssh-rsa [KEY] admin
If the key is all on one line and the format is admin:ssh-rsa [KEY] admin, you are finished.
VM-Series Deployment Guide Version 10.1 814 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
The Marketplace deployment page displays only networks and subnetworks that exist
when you start the deployment. If a network is missing, you must exit the deployment,
create the network, and start over.
VPC networks—You must create a custom network specifically for each VM-Series firewall
network interface.
See VM-Series Firewall Licenses for Public Clouds to determine the number of network
interfaces needed based on your VM-Series firewall license. At a minimum, set up the three
VPC networks and subnets required to launch the VM-Series firewall.
A GCP project has a default network with preset configurations and firewall rules; you can
delete the default network, if unused.
By default, there are up to five networks in a project. Your GCP administrator can request
additional networks for your project.
To connect to the management interface you must create a GCP firewall rules that allows
access. You can do this during the deployment if you choose Enable GCP Firewall rule
for connections to Management interface then supply a CIDR block for Source IP in GCP
Firewall rule for connections to Management Interface.
VM-Series Deployment Guide Version 10.1 815 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
ephemeral address to a static IP address after you complete the deployment process (see
Promoting an ephemeral external IP address).
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
During the deployment you have the opportunity to name these interfaces.
Interface Order
When you deploy with Marketplace, the order of the network interfaces is predefined. The
Management interface maps to eth0, Untrust to eth1, and Trust to eth2. Marketplace uses this
order because mapping the Management interface to eth0 and the Untrusted interface to eth1 is
a requirement if you need to Swap the Management Interface for load balancing.
Management Interface
The first network interface you add is mapped to eth0 on the firewall and includes the option to
enable IP forwarding. You use this network interface to manage the VM-Series firewall. Typically,
this interface has an external IP address.
VM-Series Deployment Guide Version 10.1 816 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
to the three required to launch your firewall. Ensure that the applications you want to secure are
in networks that connect to the VM-Series firewall.
VM-Series Deployment Guide Version 10.1 817 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 818 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 4 | Upgrade to your preferred PAN-OS version and install software updates.
1. Select Device > Software > Check Now and download your required PAN-OS version.
If you do not see the version you want, download it from the Palo Alto Networks
customer support website as follows.
1. Log in and select Updates > Software Updates.
From the Filter By list, choose PAN-OS for VM-Series.
2. Select a PAN-OS version and download it to your local machine.
3. On your VM-Series firewall, Select Device > Software and Upload your PAN-OS
version from your local machine to your device.
2. Install your chosen version.
3. Upgrade the PAN-OS software version.
4. Select Device > Dynamic Updates and upgrade your Applications and Threats and any
other content you want to include in your base image.
If you do not deactivate the license, you lose the license that you applied on your
firewall instance.
1. Select Device > Licenses and under License Management, select Deactivate VM.
2. Select Complete Manually, and Export the license token.
3. Return to the Palo Alto Networks customer support website, select Assets > VM-Series
Auth-Codes > Deactivate License(s) and upload the license token.
Enter y to confirm.
The firewall reboots to initialize the default configuration.
5. From the GCP console, select Compute Engine > VM instances and STOP the firewall.
VM-Series Deployment Guide Version 10.1 819 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
sourceImage: https://www.googleapis.com/compute/v1/projects/
{{project}}/global/images/pa-vm-8-1-9}
VM-Series Deployment Guide Version 10.1 820 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
VM-Series Deployment Guide Version 10.1 821 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 822 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
Balancing. For details, see Management Interface Swap for Google Cloud Platform Load
Balancing.
3. SSH key—Paste in the public key from an SSH key pair. Follow the instructions for your
OS in SSH Key Pair, to create, copy, and paste the key. Windows users must view the
key in PuTTY, copy from the user interface, and paste into Marketplace deployment.
If the key is not formatted properly, the VM-Series firewall does not allow you to
log in. You must delete the deployment and start over.
4. Click More to reveal additional metadata options. The options blockProjectKeys, and
enableSerialConsole are properties of the instance; you can change these metadata
values after a successful deployment.
• blockProjectKeys (Optional)—If you Block Project Keys, you can use only the public
SSH key you supply to access the instance.
• enableSerialConsole (Optional)—Interacting with the Serial Console enables you to
monitor instance creation and perform interactive debugging tasks.
VM-Series Deployment Guide Version 10.1 823 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 11 | Configure additional interfaces. You must enter the number of dataplane interfaces you want
to add; the default is 0 (none). The deployment page always displays fields for five additional
dataplanes numbered 4 through 8.
1. Additional Dataplane interfaces—Enter the number of additional dataplane instances.
STEP 13 | Use Google Cloud Deployment Manager to view and manage your deployment.
VM-Series Deployment Guide Version 10.1 824 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 14 | Use the CLI to change the administrator password on the firewall.
1. Log in to the VM-Series firewall from the command line. In your SSH tool, connect to the
External IP for the management interface, and specify the path to your private key.
Windows users: Use PuTTY to connect to the VM-Series firewall and issue command
line instructions. To specify the path to the private key, select Connection > SSH > Auth.
In Private key file for authentication: click Browse to select your private key.
2. Enter configuration mode:
VMfirewall> configure
3. Enter the following command:
VMfirewall# set mgt-config users admin password
4. Enter and confirm a new password for the administrator.
5. Commit your new password:
VMfirewall# commit
6. Return to command mode:
VMfirewall# exit
7. (Optional) If you used a bootstrap file for interface swap, use the following command to
view the interface mapping:
VMfirewall> debug show vm-series interfaces all
VM-Series Deployment Guide Version 10.1 825 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
The firewall can receive dataplane traffic on eth0 if the VM-Series firewall is behind the Google
Cloud Platform internal load balancing interface.
• The VM-Series firewalls secure traffic outbound directly to the internet without requiring a
VPN link or a Direct Connect link back to the corporate network.
• The VM-Series firewall secures an internet-facing application when there is exactly one back-
end server, such as a web server, for each firewall. The VM-Series firewalls and web servers
can scale linearly, in pairs, behind the Google internal load balancing address.
To allow the firewall to send and receive dataplane traffic on eth0 instead of eth1, you must swap
the mapping of the internal load balancing network interface within the firewall so that eth0 maps
to ethernet 1/1, and eth1 maps to the MGT interface on the firewall.
If possible, swap the management interface mapping before you configure the firewall and
define policy rules.
Swapping how the interfaces are mapped allows Google Cloud Platform to distribute and route
traffic to healthy instances of the VM-Series firewall located in the same or different zones.
VM-Series Deployment Guide Version 10.1 826 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• Pick one method to specify the interface swap setting— the bootstrap configuration
file, the firewall CLI, or the Google Compute Engine instance Metadata field (accessed
from the Google Cloud Console). Using one method ensures predictable behavior on
the firewall.
From the Google Cloud Console you cannot confirm whether you have swapped eth0
and eth1. After swapping, you must remember that load balancing is on eth0 and the
firewall management interface is eth1 so that you can properly configure Google Cloud
Platform load balancing, and create security policy rules to secure load balancing to
one or more VM-Series firewalls.
• If you configured the VM-Series firewall before swapping, check whether any IP
address changes for eth0 and eth1 impact policy rules.
If you did not specify metadata to swap the management interface (MGT) with the dataplane
interface when you deployed the firewall, you can use the CLI to enable the firewall to receive
dataplane traffic on the primary interface.
STEP 1 | Deploy the VM-Series Firewall from Google Cloud Platform Marketplace.
Before you proceed, verify that the firewall has a minimum of two network interfaces
(eth0 and eth1). If you launch the firewall with only one interface, the interface swap
command causes the firewall to boot into maintenance mode.
STEP 2 | On the Google Cloud Console, view the VM instance details to verify the network interface
IP addresses of the eth1 interface and verify that any security rules allow connections
(HTTPS and SSH) to the new management interface (eth1).
STEP 3 | Log in to the VM-Series firewall CLI and enter the following command:
set system setting mgmt-interface-swap enable yes
You can view the default mapping from the command line interface. The output is similar to
this:
STEP 4 | Confirm that you want to swap the interface (use the eth1 dataplane interface as the
management interface).
VM-Series Deployment Guide Version 10.1 827 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 828 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
2. Set the Update Interval (range is 1 - 60 minutes; default is 5). This is the frequency at
which the firewall publishes the metrics to Stackdriver.
3. Click OK.
3. Commit your changes.
Wait until the firewall starts to publish metrics to Stackdriver before you configure
alarms for PAN-OS metrics.
VM-Series Deployment Guide Version 10.1 829 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | Configure alerts and actions for PAN-OS metrics on Stackdriver. See Monitoring Quickstart
for Google Compute Engine and Stackdriver Introduction to Alerting.
VM-Series Deployment Guide Version 10.1 830 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 831 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• (Optional) To change the number of hours before timeout, check Enable timeout
when the source is disconnected and enter the Timeout (hours) before the
connection to the monitored source is closed (range is 2 to 10; default is 2).
If the firewall cannot access the host and the specified limit is reached, the firewall
closes the connection to the source.
• Click OK and Commit your changes.
VM-Series Deployment Guide Version 10.1 832 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
The labels you create support your strategy for differentiating your resources in ways that are
useful to your Security policy.
VM-Series Deployment Guide Version 10.1 833 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
5. Click OK.
6. Click Commit.
VM-Series Deployment Guide Version 10.1 834 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 5 | Verify that members of the dynamic address group are populated on the firewall.
Policy will be enforced for all IP addresses that belong to this address group and that are
displayed here.
1. Select Policies > Security and select the rule.
2. Select Inspect from the drop-down. You can also verify that the match criteria is
accurate.
3. Click more to verify that the list of registered IP addresses is displayed.
VM-Series Deployment Guide Version 10.1 835 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
vmseries-byol-810 paloaltonetworksgcp-public
READY
https://www.googleapis.com/compute/v1/projects/paloaltonetworksgcp-
public
/global/images/vmseries-bundle1-810
https://www.googleapis.com/compute/v1/projects/paloaltonetworksgcp-
public
/global/images/vmseries-bundle2-810
https://www.googleapis.com/compute/v1/projects/paloaltonetworksgcp-
public
/global/images/vmseries-byol-810
VM-Series Deployment Guide Version 10.1 836 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 837 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 2 | Select IAM & Admin > Service accounts and choose +Create Service Account.
Enter the service account name and description, and click Create.
STEP 3 | Select a role type from the drop menu, and on the right, select an appropriate access level.
For example, select Project > Editor. You can select multiple roles for a service account.
When you are finished, click Continue.
STEP 4 | Grant specific users permission to access this service account. Select members from the
Permissions column on the right to give them permission to access the roles in the previous
step.
STEP 5 | (Optional) Click +CREATE KEY to create a credential that allows you to authenticate with the
Google Cloud CLI to access VM-Series firewalls, networks, and other VMs associated with
this service account.
The key is downloaded automatically. Be sure to store it in a secure location. The JSON format
for the generated private key is as follows:
{
"type": "service_account",
"project_id": "gcp-xxx",
"private_key_id": "252e1e7a2e9c84b5d4dbb6195b1de074594b6499",
"private_key": "-----BEGIN PRIVATE KEY-----
\nMIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDAd0i+RMKCtrsO
\n4KHnzTAPrgoBjRgpjyNcvQmdUqHr\n-----END PRIVATE KEY-----\n",
"client_email": "dlp-vm-monit-svc-acct@gcp-
xxx.iam.gserviceaccount.com",
"client_id": "108932514695821539229",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com/
oauth2/v1/certs",
"client_x509_cert_url": "https://www.googleapis.com/
robot/v1/metadata/x509/dlp-vm-monit-svc-acct%40gcp-
xxx.iam.gserviceaccount.com"
}
VM-Series Deployment Guide Version 10.1 838 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• Google zone—The zone you selected when you deployed the VM. For example:
google.zone.us-east1-c.
• Google region—The region containing the zone you selected. For example: google.region.us-
east1.
VM-Series Deployment Guide Version 10.1 839 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 2 | Add a Device Group and assign managed devices to it. A Device Group is a group of firewalls
or virtual systems that you want to manage as a group.
A VM can be a member of only one Device Group. Plan your Device Groups carefully.
STEP 3 | Add a template. Name the template and accept the default VPC.
STEP 4 | Add a template stack. Add the stack, Add the template you just created, and select your
devices.
VM-Series Deployment Guide Version 10.1 840 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
Set Up VM Monitoring
STEP 1 | If you have not done so, Install the Panorama Plugin for GCP.
STEP 2 | Log in to the Panorama web interface and select Panorama > Google Cloud Platform.
1. Select Panorama > Google Cloud Platform > Setup > Notify Groups and click Add.
2. Enter a Name to identify the group of firewalls to which Panorama pushes the VM
information (IP address-to-tag mappings) it retrieves.
3. Select the Device Groups to which Panorama will push the VM information (IP
address-to-tag mappings) retrieved from your project. The VM-Series firewalls
use the update to determine the current member list for Dynamic Address Groups
referenced in Security policy.
VM-Series Deployment Guide Version 10.1 841 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
register tags to only one virtual system, if you assign all the virtual systems to one
Device Group.
3. Add a GCP Service Account Credential.
• Name the service account credential.
• (Optional) Enter a description of the service account.
• Browse to upload the JSON file generated when you created the service account.
You must use the Panorama web interface. You cannot use the CLI to add a
service account
You can only use a service account for one credential. Do not create multiple
credentials from a single JSON file.
After you add a service account credential, you can validate the credential from your
Panorama command line:
A project can have only one monitoring definition, and a monitoring definition can
include only one notify group.
1. Select Panorama > Google Cloud Platform > Monitoring Definition and click Add.
2. Name the monitoring definition.
3. Enter an optional Description for the project and assets you are monitoring.
4. Select the Service Account credential you created in the previous step.
5. Select a Notify Group.
6. Enable monitoring for the elements associated with this service account.
VM-Series Deployment Guide Version 10.1 842 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 6 | Verify that you can view the VM information on Panorama, and define the match criteria for
Dynamic Address Groups.
On HA failover, the newly active Panorama attempts to reconnect to Google Cloud Platform
and retrieve tags for all monitoring definitions. If there is an error with reconnecting even one
monitoring definition, Panorama generates a system log message:
If you see this error, fix the issue in Panorama. For example, remove an invalid subscription
or provide valid credentials, and commit your changes to enable Panorama to reconnect and
retrieve the tags for all monitoring definitions.
Even when Panorama is disconnected from Google Cloud Platform, the firewalls have
the list of all tags that had been retrieved before failover, and can continue to enforce
policy on that list of IP addresses. When you delete a monitoring definition, Panorama
removes all tags associated with registered VMs. As a best practice, configure action-
oriented log forwarding to an HTTPS destination from Panorama so that you can
take immediate action.
VM-Series Deployment Guide Version 10.1 843 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
If you previously installed the Panorama plugin for GCP version 1.0.0, remove it before
you install 2.0.X. You cannot upgrade.
VM-Series Deployment Guide Version 10.1 844 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
Palo Alto Networks Auto Scale templates version 1.0—Palo Alto Networks provides the
templates to deploy VM-Series firewall instances in the host project and configure and deploy
a sample application in a service project. See About the Auto Scaling Templates for more about
the templates.
Download the templates from GitHub. The zip file contains separate zip files for the firewall
and application templates.
The Google Cloud SDK must be installed and configured so that you can authenticate
with your host project from the CLI. You will use the command line interface to deploy
the firewall template and the application template, and to attach the service project to
the host project.
VM-Series Deployment Guide Version 10.1 845 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 2 | Enable APIs and services required for auto scaling. The required APIs are:
Cloud Pub/Sub API
Cloud Deployment Manager API
Cloud Storage API
Compute Engine API
Google Compute Engine Instance Group Manager API
Google Compute Engine Instance Group Updater API
Google Compute Engine Instance Groups API
Kubernetes Engine API
Stackdriver API
Stackdriver Logging API
Stackdriver Monitoring API
You can enable APIs from the GCP console or the GCP CLI, as shown below.
Enable APIs from the GCP console
1. Select the host project, and from the Navigation menu, select APIs & Services.
2. Search for and view each required API.
3. ENABLE any APIs that do not display the “API enabled” status.
Enable APIs from the CLI
1. In the CLI, view your configuration to ensure that you are in the correct project.
VM-Series Deployment Guide Version 10.1 846 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | Create a service account for deploying the VM-Series firewall, and assign the IAM roles
required for auto scaling a service or a Kubernetes cluster.
When you configure the firewall templates you add the email address for this service account
to the VM-Series firewall .yaml file. Within the host project, the template uses credentials
VM-Series Deployment Guide Version 10.1 847 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
from this service account to create a host VPC with subnets, deploy VM-Series firewalls in the
VPC, configure Stackdriver custom metrics, create a Pub/Sub topic, and more.
1. In the GCP console select IAM & Admin > Service accounts and select +CREATE SERVICE
ACCOUNT.
Fill in the service account details and click CREATE.
2. Give the service account permission to auto-scale resources in this project.
Select a role type from the drop menu, and on the right, select an appropriate access level.
For example, select Project > Editor. You can select multiple roles for a service account.
Compute Engine > Compute Admin
Compute Engine > Compute Network User
Pub/Sub > Admin
Monitoring > Monitoring Metric Writer
Stackdriver > Stackdriver Accounts Editor
Storage > Storage Admin
(GKE only) Kubernetes > Kubernetes Engine Cluster Admin
(GKE only) Kubernetes > Kubernetes Engine Viewer
VM-Series Deployment Guide Version 10.1 848 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 4 | Create a service account that a Panorama administrator can use to interact with this host
project.
1. In the GCP console select IAM & Admin > Service accounts and select +CREATE SERVICE
ACCOUNT.
2. Fill in the service account details and click CREATE.
3. Grant service account access.
Select a role type from the drop menu, and on the right, select an appropriate access level.
For example, select Project > Editor. You can select multiple roles for a service account.
Compute Engine > Compute Viewer
Deployment Manager > Viewer
Pub/Sub > Admin
Click CONTINUE.
4. Click +CREATE KEY to create a key for the host service account.
• (Optional) Add email addresses to grant other users or administrators access to this
service account.
• Select JSON to download the private key in JSON form.
• Store the key in a safe location. You will need this key when you Configure the
Panorama Plugin for GCP to Secure an Auto Scaling Deployment.
STEP 5 | (optional) In the CLI, ensure you can communicate with your new host project.
1. Set your project to the host project you just created.
gcloud set project <your-autoscale-host-project-name>
2. Create a configuration for auto scaling. Your new configuration is automatically activated
unless you disable activation.
gcloud config configurations create <CONFIGURATION_NAME> gcloud
config list
Only a Super User can view the Enable link to generate this key. See How to Enable,
Regenerate, Extend the Licensing API Key.
VM-Series Deployment Guide Version 10.1 849 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | From the CLI, SSH in to Panorama and issue the following command, replacing <key> with
the API key you copied from the support portal:
Configure the Panorama Plugin for GCP to Secure an Auto Scaling Deployment
In Panorama, create assets to support the auto scaling firewall deployment.
STEP 1 | Create a template, and a template stack that includes the template, and Commit the changes.
STEP 2 | In the Network context, select either the template or the template stack. Select Virtual
Routers and Add a virtual router.
When the firewall template creates static routes, they are added to this virtual router.
VM-Series Deployment Guide Version 10.1 850 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | In the Network context, select the template you created, select Interfaces and Add
Interface.
• On the Config tab, select a slot, select the Interface name and select the Layer3 Interface
Type. From the Security Zone menu, select New Zone, name the zone Untrust and click
OK.
• On the IPv4 tab enable DHCP Client and Automatically create default route pointing to
default gateway provided by server (enabled by default) and click OK.
VM-Series Deployment Guide Version 10.1 851 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 5 | Return to your template stack and the virtual router you created earlier. Place the untrust
and trust interfaces (ethernet1/1 and ethernet1/2) in the virtual router, and click OK.
VM-Series Deployment Guide Version 10.1 852 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 7 | Create a Device Group that references the template or template stack you created in step 1.
This Device Group will contain the VM-Series firewalls you create with the firewall template.
1. Add a security policy that allows web-browsing traffic from Untrust to Trust.
In the Policies context, select the Device Group you just created. Select Security > Pre
Rules and Add the following security policy.
STEP 8 | Set up the GCP service account for the host project.
1. In the Panorama context, expand Google Cloud Platform, select Setup, and click Add.
2. Supply a name and description for the host service account you created in Step 4.
3. Upload the JSON credentials file you created in Step 4.4.
After you add a service account credential, you can validate the credential from your
Panorama command line (you cannot validate from the web interface):
VM-Series Deployment Guide Version 10.1 853 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
4. Chose the Device Group you created in Step 7, and the Template Stack you created in
Step 1.
5. Disable License Management Only to ensure traffic is secured.
STEP 2 | Edit the values in the sample init-cfg.txt file to customize the file for your environment.
The firewall templates include a sample init-cfg.txt file.
type dhcp-client
VM-Series Deployment Guide Version 10.1 854 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | Upload your edited init-cfg.txt file to the /config folder in your bootstrap package.
STEP 4 | If you are using BYOL, create a text file named authcodes (no extension), add your auth
code, and upload the file to the /license folder.
VM-Series Deployment Guide Version 10.1 855 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 856 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
properties:
region: us-east1
zones:
-us-east1-b
# Do not modify the lb-type field.
lb-type: nlb
cloud-nat: yes
forwarding-rule-port: 80
VM-Series Deployment Guide Version 10.1 857 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
- optional
The autoscaling firewall template requires you to enter the value in single quotes and prepend
the key with admin: followed by a space. This is the same convention used for the Google
Marketplace template, as detailed in SSH Key Pair. For example:
bootstrap-bucket: bootstrap-autoscale
image: vmseries-byol-814
machine-type: n1-standard-4
For the service-account, supply the email address for the host project service account you
created earlier (step 3).
service-account: sa-pan@gcp-autoscale-
kk.iam.gserviceaccount.com
The fw-instance-tag value will be the managed instance group name in the deployment.
fw-instance-tag: vm-series-fw
Choose one metric for auto scaling. Possible values are: panSessionActive,
panSessionUtilization, DataPlaneCPUUtilizationPct, DataPlanePacketBufferUtilization, or
panSessionUtilization.
metric: custom.googleapis.com/VMSeries/panSessionActive
max-size: 2
min-size: 1
target-type: GAUGE
util-target: 100
# Greenfield deployment
mgmt-network-cidr: 172.22.2.0/24
untrust-network-cidr: 172.22.1.0/24
trust-network-cidr: 172.22.3.0/24
mgmt-network-access-source-range:
- 199.167.54.229/32
- 199.167.52.5/32
mgmt-network-access-ports:
VM-Series Deployment Guide Version 10.1 858 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
- 22
- 443
Take note of the outputs the CLI prints after the deployment—the subnet names, the
deployment name, and the Panorama Pub/Sub topic name. You need these values to configure
the Shared VPC and for the application template deployment.
The firewall deployment name must be configured in the Panorama plugin for GCP auto scaling
definition.
VM-Series Deployment Guide Version 10.1 859 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 2 | Make the application project a service project for the host project.
Add the service account from Service/application project administrator as a member in host
project with following roles:
• Compute Network User
• Pub/Sub Admin
STEP 3 | If you want to use the sample application template to deploy an application, continue to
Deploy the Application Template.
If you have already deployed an application and you want to secure it in your auto scaling
deployment, go to Manually Onboard an Application to an Existing Auto Scaling Deployment.
If you have deployed a service in a GKE cluster, continue to Onboard a GKE Cluster in a
Shared VPC.
VM-Series Deployment Guide Version 10.1 860 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 2 | In the service project, peer the Trust VPC network of the application deployment with the
Trust VPC network of the Firewall deployment.
STEP 3 | If you want to use the sample application template to deploy an application, continue to
Deploy the Application Template.
If you have already deployed an application and you want to secure it in your auto scaling
deployment, go to Manually Onboard an Application to an Existing Auto Scaling Deployment.
If you have deployed a service in a GKE cluster, continue to Onboard a GKE Cluster in a
Peered VPC.
STEP 3 | Deploy a new application with the application template and define a label for the named
port.
Continue to View the Onboarded Application in the Panorama Plugin for GCP.
VM-Series Deployment Guide Version 10.1 861 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 2 | Update all instance groups named-ports with an additional service name and port values. The
following sample onboards the applications app2 and app3.
STEP 4 | Create a new backend service with the port-name created earlier on the HTTP external load
balancer.
VM-Series Deployment Guide Version 10.1 862 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
--global
STEP 5 | Edit url-maps and add new path rule. For example:
- paths:
- /app3
- /app3/*service:
https://www.googleapis.com/compute/v1/projects/<project-name>/
global/backendServices/fw-template2-backend-app3
STEP 6 | To secure this application with the VM-Series firewall, manually trigger the pub/sub message
through the gcloud CLI. This sends a message to the topic created in the firewall template.
STEP 7 | View the Onboarded Application in the Panorama Plugin for GCP.
STEP 8 | (Optional) To update application attributes, such as ilb-ip, ilb-port, or named-port, issue the
pubsub command:
VM-Series Deployment Guide Version 10.1 863 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 9 | (Optional) To stop securing the application, issue the following command:
The GKE cluster name must not exceed 24 characters. This ensures that if you deploy
auto scaling in a peered VPC configuration the static route name does not exceed 31
characters.
For security reasons, only private clusters should be used in an auto scaling deployment.
See Creating a private cluster.
VM-Series Deployment Guide Version 10.1 864 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | In the Host project, update secondary ranges in the Trust VPC subnet.
STEP 4 | In the Service project, create a private cluster in the shared VPC.
1. Set the Service project ID.
VM-Series Deployment Guide Version 10.1 865 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
If you created your cluster in the GCP console, generate a kubeconfig entry:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: gke-plugin-role
rules:
- apiGroups:
- ""
resources:
- services
verbs:
- list
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: gke-plugin-role-binding
subjects:
- kind: ServiceAccount
name: [SERVICEACCOUNT_NAME]
namespace: default
roleRef:
kind: ClusterRole
name: gke-plugin-role
apiGroup: rbac.authorization.k8s.io
VM-Series Deployment Guide Version 10.1 866 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 15 | In the Panorama plugin for GCP, add the service account information.
Select Panorama > Google Cloud Platform > Setup.
Name the credential, enter a description, and enter the API server address from step 14, and
for GKE Service Account Credential, upload the JSON file you exported in step 13.
After you add a service account credential, you can validate the credential from your
Panorama command line (you cannot validate from the web interface):
VM-Series Deployment Guide Version 10.1 867 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 18 | (Optional) Create and deploy a service template according to Using the Sample GKE Service
Templates, or deploy a GKE service in the GCP console. .
For security reasons, only private clusters should be used in an auto scaling deployment.
See Creating a private cluster.
STEP 3 | Update the service project VPC network with the secondary IP ranges for the pods and
services.
VM-Series Deployment Guide Version 10.1 868 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
--auto-allocate-nat-external-ip
If you created your cluster in the GCP console, generate a kubeconfig entry:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: gke-plugin-role
rules:
- apiGroups:
- ""
resources:
- services
verbs:
- list
VM-Series Deployment Guide Version 10.1 869 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: gke-plugin-role-binding
subjects:
- kind: ServiceAccount
name: [SERVICEACCOUNT_NAME]
namespace: default
roleRef:
kind: ClusterRole
name: gke-plugin-role
apiGroup: rbac.authorization.k8s.io
VM-Series Deployment Guide Version 10.1 870 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 16 | In the Panorama plugin for GCP, add the service account information.
Select Panorama > Google Cloud Platform > Setup.
Name the credential and enter the API server address from Step 15, and upload the JSON file
you exported in Step 14.
After you add a service account credential, you can validate the credential from your
Panorama command line:
STEP 18 | (Optional) In your service project, create and deploy a GKE template according to Using the
Sample GKE Service Templates, or deploy a GKE service use the GCP console. Onboard a
GKE Cluster
VM-Series Deployment Guide Version 10.1 871 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• Show Status— View the details for applications onboarded to a GCP VM-Series firewall
deployment.
The following fields display information obtained from the selected deployment. You specified
these values in the pub/sub message or through GKE cluster service polling.
• Application/GKE Service Name—An application deployment name, or the name of a GKE
service.
• Host Project—The name of the host project.
• Cluster/Namespace—A GKE cluster name followed by the namespace for example,
mycluster/namespace9.
• Named Port—The port assigned to the named port for the service.
• ILB IP—The ILB IP address.
• ILB Port—The ILB port number.
For autoscaling an application, this property is ilb-port in apps.yaml.
For securing a GKE cluster, this value is the port number of the GKE cluster, as specified in
the .yaml file you used to deploy the service in your cluster.
• Configuration Programmed— True if a NAT Rule exists, False if not.
• Protected— True when an application is onboarded successfully, or False if onboarding
failed. If False, see the Not Protected Reason column for an explanation.
• Not Protected Reason— If Protected is False, displays the reason the application is not
protected. Some common reasons are:
• Configuration Programmed—True if a NAT Rule exists, False if not.
• Protected—True when an application is onboarded successfully, or False if onboarding
failed. If False, see the Not Protected Reason column for an explanation.
• Not Protected Reason—If Protected is False, displays the reason the application is not
protected. Some common reasons are:
• You deployed a UDP service in the GKE cluster.
• You specified a named port that is already in use. Only one application can listen on a
specific named port.
• You chose the License management only option, so we do not program the
configuration.
• No matching label found for GKE services.
• Delicense Inactive VMs—Answer Yes to trigger the delicensing function for inactive VMs.
VM-Series Deployment Guide Version 10.1 872 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• Trigger GKE Services Sync—Answer Yes to poll the services running in the clusters, and
program the NAT, address, and service objects, and static routes if necessary. By default,
Panorama automatically polls 10 minutes after the completion of the previous poll.
View the Deployment Status from the CLI
You can use the Panorama CLI to manage deployed applications. The command line actions
parallel those described in View the Onboarded Application in the Panorama Plugin for GCP. In
the following commands, the autoscaling_name is the Firewall Deployment Name you entered
in the auto scaling configuration.
• List the onboarded (protected) applications.
• For a GKE deployment, force the plugin to read the pub-sub messages, and sync NAT rules
that are programmed based on the pub-sub messages.
In all .yaml files, you customize the resources properties for your deployment. Do not change
anything in the imports or outputs sections.
VM-Series Deployment Guide Version 10.1 873 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• Firewall Templates
• Application Template
Firewall Templates
The following sections detail the parameters for the NLB and ALB .yaml files.
• vm-series-fw-nlb.yaml
• vm-series-fw-alb.yaml
vm-series-fw-nlb.yaml
In the vm-series-fw-nlb.yaml template, edit the -properties.
forwarding-rule-port 80 80 or 8080
VM-Series Deployment Guide Version 10.1 874 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
panSessionActive
panSessionUtilizatio
n
DataPlaneCPUUtilizat
ionPct
DataPlanePacketBuffe
rUtilization
panSessionUtilizatio
n
max-size 2
min-size 1
util-target 100
To deploy the VM-Series firewall you need a dedicated network and subnetwork for the
firewall’s managment, untrust, and trust interfaces. Fill out the information for either a
greenfield deployment (configure the template to create new networks) or brownfield
VM-Series Deployment Guide Version 10.1 875 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
Greenfield Deployment: Enter values to create management, untrust, and trust networks and
subnetworks for the firewall.
mgmt-network-cidr 172.22.2.0/24
untrust-network-cidr 172.22.1.0/24
trust-network-cidr 172.22.3.0/24
mgmt-network-access-
source-range- <permitted-ip- mgmt-network-access-source-range
range> - <permitted-ip-range-1>
- <permitted-ip-range-2>
mgmt-network-access-ports-
<port-number> mgmt-network-access
-ports
- 22
- 443
mgmt-network my-mgmt-network
mgmt-subnet my-mgmt-subnet
trust-network my-trust-network
trust-subnet my-trust-subnet
untrust-network my-untrust-network
untrust-subnet my-untrust-subnet
vm-series-fw-alb.yaml
In the vm-series-fw-alb.yaml template, edit the -properties.
VM-Series Deployment Guide Version 10.1 876 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
forwarding-rule-port 80 80
VM-Series Deployment Guide Version 10.1 877 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
service-account The unique service account name for the service project.
panSessionActive
panSessionUtilization
DataPlaneCPUUtilizati
onPct
DataPlanePacketBuffer
Utilization
panSessionUtilization
max-size 2
min-size 1
Greenfield Deployment: Enter values to create management, untrust, and trust networks and
subnetworks for the firewall.
mgmt-network-cidr 192.168.12.0/24
untrust-network-cidr 192.168.11.0/24
trust-network-cidr 192.168.11.0/24
VM-Series Deployment Guide Version 10.1 878 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
mgmt-network-access- mgmt-network-access-
ports- <port-number> ports- 22- 443
mgmt-network existing-vpc-mgmt
mgmt-subnet existing-subnet-mgmt
trust-network existing-vpc-trust
trust-subnet existing-subnet-trust
untrust-network existing-vpc-untrust
untrust-subnet existing-subnet-untrust
Application Template
apps.yaml
The application template creates the connection between the host project (which contains the
VM-Series firewalls) and the service project, which contains the application or services that the
firewall deployment secures.
fw-deployment- my-vm-series-firewall-name
name
zones- us-central1-a
-
us-central1-b-
us-central1-c-
us-central1-f
VM-Series Deployment Guide Version 10.1 879 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 880 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
After a deployment, you can delete all services deployed in the service template .yaml
file as follows:
VM-Series Deployment Guide Version 10.1 881 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
gke_cluster_role.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: gke-plugin-role
rules:
- apiGroups:
- ""
resources:
- services
verbs:
- list
gke_cluster_role_binding.yaml
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: gke-plugin-role-binding
subjects:
- kind: ServiceAccount
name: hj-gke-891ca3-cluster1-sa
namespace: default
roleRef:
kind: ClusterRole
name: gke-plugin-role
apiGroup: rbac.authorization.k8s.io
web-deployment.yaml
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: web
namespace: default
spec:
selector:
matchLabels:
run: web
template:
metadata:
labels:
run: web
spec:
containers:
- image: gcr.io/google-samples/hello-app:1.0
imagePullPolicy: IfNotPresent
name: web
ports:
- containerPort: 8080
protocol: TCP
VM-Series Deployment Guide Version 10.1 882 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
web-service.yaml
apiVersion: v1
kind: Service
metadata:
name: web
namespace: default
annotations:
cloud.google.com/load-balancer-type: "Internal"
labels:
panw-named-port-port1: "80"
spec:
ports:
# the port that this service should serve on
- name: port1
port: 80
protocol: TCP
targetPort: 8080
selector:
run: web
type: LoadBalancer
web-deployment-v2.yaml
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: web2
namespace: default
spec:
selector:
matchLabels:
run: web2
template:
metadata:
labels:
run: web2
spec:
containers:
- image: gcr.io/google-samples/hello-app:2.0
imagePullPolicy: IfNotPresent
name: web2
ports:
- containerPort: 8080
protocol: TCP
web-service-v2.yaml
apiVersion: v1
kind: Service
metadata:
name: web2
namespace: default
annotations:
VM-Series Deployment Guide Version 10.1 883 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
cloud.google.com/load-balancer-type: "Internal"
labels:
panw-named-port-port2: "81"
spec:
ports:
# the port that this service should serve on
- name: port2
port: 81
protocol: TCP
targetPort: 8080
selector:
run: web2
type: LoadBalancer
apiVersion: v1
kind: Service
metadata:
name: carts
annotations:
cloud.google.com/load-balancer-type: "Internal"
labels:
panw-named-port-carts-http: "6082"
panw-named-port-carts-https: "6083"
namespace: default
spec:
type: LoadBalancer
ports:
# the port that this service should serve on
- name: carts-http
protocol: TCP
port: 80
targetPort: 80
- name: carts-https
protocol: TCP
port: 443
targetPort: 443
selector:
name: carts
VM-Series Deployment Guide Version 10.1 884 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 885 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 886 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
The architecture is very similar to the traditional Load Balancer(LB) architecture recommended for
GCP in which the external LB points manages the untrust traffic and an internal LB manages the
trust/egress or east-west traffic.
The VM-Series Firewalls are deployed as an active-passive pair and the HA2 interface is dedicated
to the HA2 interface of the VM-Series firewall on NIC 3.
The HA setup on GCP supports connection tracking which tracks the connection between an
external client server through the external LB to the backend of the firewall. During a firewall fail-
over, the LBs carry over the connections to the secondary firewall (which now becomes active)
without any disruptions.
The internal LBs (backend pool) are set to active-active, but the standby firewall will not process
any traffic. The LBs perform a health-check and if they realize that the active firewall is down and
the standby firewall is now active, they run a health check on the new active firewall. The traffic is
now distributed over the firewall which has now become active.
Note: GCP HA supports interface connection tracking. However, in situations beyond interfaces
(such as having rules in google infrastructure to stop health checks), LB health checks are not
tracked as a part of HA transition.
The following are the use-cases for deploying HA in GCP:
• IPSec termination of site to site VPNs.
• Legacy applications that need visibility of the original source client IP (No SNAT solution) for
inbound traffic flows.
• Requirements for session fail-over on failure of the VM-Series firewall.
cp terraform.tfvars.example terraform.tfvars
VM-Series Deployment Guide Version 10.1 887 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 3 | Edit the new terraform.tfvars file and set variables for the following variables:
Variable Description
project_id Set to your Google Cloud deployment
project.
STEP 4 | (Optional) If you are using BYOL image (i.e. vmseries-flex-byol-*), the license can be
applied during deployment by adding your VM-Series authcode to bootstrap_files/
authcodes
terraform init
terraform apply
STEP 2 | Enter yes to start the deployment. After all the resources are created, the Terraform
displays the following message:
Apply complete!
Outputs:
EXTERNAL_LB_IP = "ssh
paloalto@1.1.1.1 -i ~/.ssh/vmseries-tutorial"
EXTERNAL_LB_URL = "https://1.1.1.1"
VMSERIES_ACTIVE = "https://2.2.2.2"
VMSERIES_PASSIVE = "https://3.3.3.3"
VM-Series Deployment Guide Version 10.1 888 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
All the infrastructure should now be deployed and will boot up and configure by itself. Visit the
external_nat_ip by using http://x.x.x.x after a few minutes after the deployment to find the
default webpage from the workload-vm.
STEP 2 | Use the output EXTERNAL_LB_SSH to open an SSH session through the VM-Series to the
workload-vm.
STEP 3 | Run a preloaded script on the workload VM, to test the failover mechanism across the VM-
Series firewalls.
/network-check.sh
You will observe an output similar to the codeblock below, where x.x.x.x is the IP address is
EXTERNAL_LB_IP address.
VM-Series Deployment Guide Version 10.1 889 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 890 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
• You may notice that the SSH session to the workload-vm is still active. This indicates the
session successfully failed over between the VM-Series firewalls. The script output should
also display the same source IP address.
VM-Series Deployment Guide Version 10.1 891 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
name: my-app2
ZONE: us-central1-a
MACHINE_TYPE: f1-micro
PREEMPTIBLE:
INTERNAL_IP: 10.0.2.4
EXTERNAL_IP:
status: RUNNING
STEP 3 | Create a new forwarding rule on the external TCP load balancer.
STEP 4 | Retrieve and record the address of the new forwarding rule.
(output)
34.172.143.223
STEP 5 | On the active VM-Series, click Policies > NAT > Add and enter a name for the rule.
VM-Series Deployment Guide Version 10.1 892 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 893 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 894 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 7 | In the Translated Packet tab, configure the Destination Address Translation as follows:
• Translated Type: Static IP
• Translated Address: Set to the INTERNAL_IP of the sample application (i.e. 10.0.2.4).
VM-Series Deployment Guide Version 10.1 895 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
VM-Series Deployment Guide Version 10.1 896 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
STEP 9 | Access the sample application using the forwarding rule's address.
http://34.172.143.223/
VM-Series Deployment Guide Version 10.1 897 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Google Cloud Platform
--zone=us-central1-a
terraform destroy
STEP 3 | At the prompt to perform the actions, enter yes. After all the resources are deleted,
Terraform displays the following message:
Destroy complete!
VM-Series Deployment Guide Version 10.1 898 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco
ENCS Network
If you have virtualized the traditional appliance-based network infrastructure at your
branch or remote office with the Cisco 5400 Series Enterprise Network Compute
System (ENCS) appliance, you can use Enterprise NFV Infrastructure Software (NFVIS)
to deploy the VM-Series firewall within your Cisco network. The VM-Series firewall
serves as a virtual network function (VNF) with next-generation firewall capabilities
to safely enable all applications and protect your branch or remote office users and
network from threats.
The Cisco Enterprise Network Compute System (ENCS) appliances combine with
Cisco Integrated Services Virtual Routers (ISRV) and NFVIS software to support
Software-Defined Branch (SD-Branch) network architectures.
899
Set Up a VM-Series Firewall on a Cisco ENCS Network
The dataplane interfaces of the VM-Series firewall on Cisco ENCS support Virtio
mode only; ENCS SR-IOV and PCI passthrough modes are not supported.
Set up network connections for VM-Series firewall management access. If you are using
Panorama, ensure that Panorama has network access to manage the firewall you deploy.
Python 2.7. Required on your local machine if you are using the command line to convert.
VM-Series Deployment Guide Version 10.1 900 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
that the Cisco ENCS appliance has adequate resources to support the VM-Series model you
choose.
qcow2 file (the PAN-OS for VM-Series KVM base image) for PAN-OS 9.1 or later. See
Convert a qcow2 File from the Graphical User Interface, Step 2 or Convert a qcow2 File
from the Command Line Interface, Step 2.
VM-Series firewall capacity license and subscription auth codes that meet your
requirements. See VM-Series Model License Types. You enter auth codes in the NFVIS user
interface, or include the auth codes in the authcodes text file in the conversion folder as
described in Convert a qcow2 File from the Command Line Interface, Step 4.
With PAN-OS 9.1, the VM-Series firewall on Cisco ENCS supports Virtio with DPDK mode
enabled by default.
Panorama hardware or virtual appliance. While you can deploy a single VM-Series firewall
in a Cisco SD-Branch network, it is more common to deploy firewalls in many branches and
centrally manage them with Panorama.
Panorama version 9.1 or later. The version must be the same or higher than the version on
your VM-Series firewall.
A VM auth key generated on Panorama. This key allows the VM-Series firewall to
authenticate with Panorama.
VM-Series Deployment Guide Version 10.1 901 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
STEP 2 | Fill in the package information as shown below, supplying your own values.
1. Enter a Package Name and VM Version, and for the VM Type, choose Firewall.
2. Enable the Serial Console.
3. Leave the Sriov Driver(s) field blank, as SR-IOV is not supported.
4. Select Local to choose a qcow2 file you uploaded previously, or click Upload Raw Images to
upload a qcow2 file.
• Log in to the Palo Alto Networks Customer Support Portal.
If you have not already done so, create a support account and register the VM-Series
firewall.
• Select Support > Software Updates and from the Filter By drop-down, select Pan OS for
VM-Series KVM Base Image, for example, version 9.1.
• Download the qcow2 image.
VM-Series Deployment Guide Version 10.1 902 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
VM-Series Deployment Guide Version 10.1 903 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
STEP 6 | Set values for your resource requirements and choose the Default profile, or add a profile for
the current configuration.
Click Submit to save your package.
VM-Series Deployment Guide Version 10.1 904 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
type=static
ip-address=${IP_ADDRESS}
default-gateway=${GATEWAY}
netmask=${NETMASK}
ipv6-address=
ipv6-default-gateway=
hostname=${HOSTNAME}
vm-auth-key=${VM_AUTH_KEY}
panorama-server=${PANORAMA_SERVER}
panorama-server-2=
tplname=
dgname=
dns-primary=${DNS_SERVER}
dns-secondary=
op-command-modes=jumbo-frame, mgmt-interface-swap**
dhcp-send-hostname=yes
dhcp-send-client-id=yes
dhcp-accept-server-hostname=yes
dhcp-accept-server-domain=yes
STEP 4 | Create a text file named authcodes (no extension), and enter the auth codes for the VM-
Series firewall capacity and subscriptions. Save the file in the conversion folder.
<image_properties>
<vnf_type>FIREWALL</vnf_type>
<name>pafw</name>
<version>9.1.0</version>
<bootup_time>-1</bootup_time>
<root_file_disk_bus>virtio</root_file_disk_bus>
<root_image_disk_format>qcow2</root_image_disk_format>
<vcpu_min>2</vcpu_min>
<vcpu_max>8</vcpu_max>
<memory_mb_min>4096</memory_mb_min>
<memory_mb_max>16384</memory_mb_max>
<vnic_max>8</vnic_max>
<root_disk_gb_min>32</root_disk_gb_min>
<root_disk_gb_max>60</root_disk_gb_max>
<console_type_serial>true</console_type_serial>
<sriov_supported>true</sriov_supported>
<pcie_supported>false</pcie_supported>
<monitoring_supported>false</monitoring_supported>
<monitoring_methods>ICMPPing</monitoring_methods>
<low_latency>true</low_latency>
<privileged_vm>true</privileged_vm>
<custom_property>
<HOSTNAME> </HOSTNAME>
</custom_property>
<custom_property>
<IP_ADDRESS> </IP_ADDRESS>
VM-Series Deployment Guide Version 10.1 905 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
</custom_property>
<custom_property>
<NETMASK> </NETMASK>
</custom_property>
<custom_property>
<GATEWAY> </GATEWAY>
</custom_property>
<custom_property>
<PANORAMA_SERVER> </PANORAMA_SERVER>
</custom_property>
<custom_property>
<DNS_SERVER> </DNS_SERVER>
</custom_property>
<custom_property>
<VM_AUTH_KEY> </VM_AUTH_KEY>
</custom_property>
<default_profile>VM-50</default_profile>
<profiles>
<profile>
<name>VM-50</name>
<description>VM-50 profile</description>
<vcpus>2</vcpus>
<memory_mb>5120</memory_mb>
<root_disk_mb>60000</root_disk_mb>
</profile>
<profile>
<name>VM-100-n-200</name>
<description>VM-100 and VM-200 profile</
description>
<vcpus>2</vcpus>
<memory_mb>7168</memory_mb>
<root_disk_mb>60000</root_disk_mb>
</profile>
<profile>
<name>VM-300</name>
<description>VM-300 profile</description>
<vcpus>2</vcpus>
<memory_mb>9216</memory_mb>
<root_disk_mb>60000</root_disk_mb>
</profile>
<profile>
<name>VM-1000-HV</name>
<description>VM-1000-HV profile</description>
<vcpus>4</vcpus>
<memory_mb>9216</memory_mb>
<root_disk_mb>60000</root_disk_mb>
</profile>
<profile>
<name>VM-500</name>
<description>VM-500 profile</description>
<vcpus>4</vcpus>
<memory_mb>16384</memory_mb>
<root_disk_mb>60000</root_disk_mb>
</profile>
</profiles>
<cdrom>true</cdrom>
VM-Series Deployment Guide Version 10.1 906 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
<bootstrap_file_1>/config/init-cfg.txt</bootstrap_file_1>
<bootstrap_file_2>/config/bootstrap.xml</bootstrap_file_2>
<bootstrap_file_3>/license/authcodes</bootstrap_file_3>
</image_properties>
STEP 7 | In the conversion folder that contains the qcow2, the init-config.txt and the
authcodes file, run the nfvpt.py script. See the nfvpt.py image packaging utility
documentation.
The following sample creates the image file Palo-Alto-9.1.0, and a VM-100 profile. Options
are space-separated (the sample shows options on separate lines for clarity only) and custom
options are key-value pairs with a colon separator.
VM-Series Deployment Guide Version 10.1 907 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
VM-Series Deployment Guide Version 10.1 908 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
VM-Series Deployment Guide Version 10.1 909 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
VM-Series Deployment Guide Version 10.1 910 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
STEP 3 | Configure Security policies to safely enable applications and users on your network.
If using Panorama, the following steps show you how to use device groups to centrally manage
policy rules for your managed firewalls.
1. Add a device group and assign the managed firewalls to your device group.
STEP 4 | Verify that the VM-Series firewall is securing traffic on your network.
VM-Series Deployment Guide Version 10.1 911 ©2023 Palo Alto Networks, Inc.
Set Up a VM-Series Firewall on a Cisco ENCS Network
VM-Series Deployment Guide Version 10.1 912 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on
Oracle Cloud Infrastructure
Deploy the VM-Series firewall on Oracle Cloud Infrastructure (OCI) cloud. With the
VM-Series on OCI, you can protect and segment your workloads, prevent advanced
threats, and improve visibility into your applications as you move to the cloud.
OCI is a public cloud computing service that enables you to run your applications in
a highly-available, hosted environment offered by Oracle. You can deploy the VM-
Series firewall to secure your applications and services running your OCI environment.
913
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
• VM-100 VM.Standard2.4
• Software NFGW Credit-based VM-Series
• VM-300 VM.Standard2.4
• Software NFGW Credit-based VM-Series
• VM-500 VM.Standard2.8
• Software NFGW Credit-based VM-Series
• VM-700 VM.Standard2.16
• Software NFGW Credit-based VM-Series
You can deploy the VM-Series firewall on an OCI instance with more resources than the minimum
VM-Series System Requirements. If you chooses a larger shape size for the VM-Series firewall
model. Although the firewall only uses the maximum vCPUs cores and memory listed on the
system requirements page, it does take advantage of the faster network performance that the
larger shape provides.
VM-Series Deployment Guide Version 10.1 914 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
• Inter-VCN Traffic (East-West)—The VM-Series firewall allows you to secure traffic moving
within your cloud environment between VCNs. Each subnet must belong to a different VCN
because, by default, no route rules are used to enable traffic within a VCN. In this scenario, you
configure an interface on the firewall connected to a subnet in each VCN.
In the example below, a user in the Trust Subnet wants to access data in the DB Subnet.
Configure a route on OCI that reaches DB Subnet CIDR next hop, which points to the interface
Trust Subnet network on the VM-Series firewall.
VM-Series Deployment Guide Version 10.1 915 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
If there is no route rule that matches the traffic that is attempting to leave the VCN, the
traffic is dropped.
Each subnet requires a route table and once you have added a route table to a subnet, you cannot
change it. However, you can add, remove, or edit rules in a route table after it has been created.
SSH Keys
You must create an SSH key pair to login to the firewall for the first time. You cannot use the
default username and password to access the firewall for the first time. After the firewall boots
up for the first time, you must access the firewall through the CLI and create a new username and
password.
1. Create an SSH key pair and store the SSH Key pair in the default location for your operating
system.
• On Linux or MacOS, use ssh-keygen to create the key pair in your .ssh directory.
• On Windows, use PuTTYgen to create the key pair.
The content of the Key comment field does not matter to the VM-Series firewall; you can
accept the default (the key creation date) or enter a comment that helps you remember the
name of the key pair. Use the Save private key button to store the private key in your .ssh
directory.
VM-Series Deployment Guide Version 10.1 916 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
The Panorama-related fields are required only if you have a Panorama appliance and want
use Panorama to manage your VM-Series firewall.
Field Description
VM-Series Deployment Guide Version 10.1 917 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
Field Description
Paste the bootstrapping parameters into the OCI console in the following format.
hostname=<fw-hostname>
vm-auth-key=<auth-key>
panorama-server=<panorama-ip>
panorama-server-2=<panorama2-ip>
tplname=<template-stack-name>
dgname=<device-group-name>
authocodes=<firewall-authcode>
op-command-modes=jumbo-frame
VM-Series Deployment Guide Version 10.1 918 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
STEP 2 | Find the VM-Series firewall application in the Oracle Cloud Marketplace.
1. Search for Palo Alto Networks and a list of offerings for the VM-Series firewall will
display.
2. Select an offering.
3. Click Get App.
4. Select your Region and click Sign In.
5. Select the Version and Compartment.
6. Accept the Oracle and Partner terms.
7. Click Launch Instance.
VM-Series Deployment Guide Version 10.1 919 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 6 | Select the shape with the number of CPUs, amount of RAM, and number of interfaces
required for the VM-Series firewall model. See the Compute Shapes page for the amount
resources provided by the different compute shapes. See VM-Series System Requirements
for more information about the resources required for each VM-Series firewall model.
STEP 7 | Under Networking, select your Virtual cloud network compartment, Virtual cloud network,
Subnet compartment, and Subnet for your management interface. You can only add one
interface when creating the VM-Series firewall instance. You will add additional interfaces
later.
STEP 8 | (Optional) Set the boot volume to a size larger than the default. By default, the boot volume
is set to 60GB. Complete this procedure if you require a larger boot volume to support
features such as attaching logs.
1. Select Custom boot volume size (in GB).
2. Enter 60 or greater. 60 GB is the minimum hard drive size required by the VM-Series
firewall.
VM-Series Deployment Guide Version 10.1 920 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
VM-Series Deployment Guide Version 10.1 921 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 13 | Attach a vNIC to your VM-Series firewall instance for each data interface. You must attach
at least two data interfaces to your firewall instance—untrust and trust.
1. Select your newly launched VM-Series firewall instance and select Attached VNICs >
Create VNIC.
2. Enter a descriptive Name for your vNIC.
3. Select your VCN from the Virtual Cloud Network drop-down.
4. Select your subnet from the Subnet drop-down.
5. Specify a Private IP Address. This is only required if your want to choose a particular IP
for the vNIC. If you do not specify an IP, OCI will assign an IP address from the CIDR
block you assigned to the subnet.
6. Select Assign Public IP Address for public facing vNICs such as your untrust subnet.
7. Click Create VNIC.
8. Repeat this procedure for each vNIC your deployment requires.
VM-Series Deployment Guide Version 10.1 922 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 14 | Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.
1. Log in to the firewall.
2. Select Network > Interfaces > Ethernet.
3. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example untrust-zone, and then click OK.
• On the IPv4 tab, select either Static.
• Click Add in the IP section and enter the IP address and network mask for the
interface. Make sure that the IP address matches the IP address that you assigned
to the corresponding subnet in VCN. For example, if you add this interface to your
untrust zone, make sure you assign the untrust vNIC IP address configured in your
VCN.
4. Repeat this procedure for each vNIC configured in your VCN except your management
vNIC.
Always only delete interfaces at the bottom of the interface list. Deleting firewall
interfaces in the wrong order results in a interface mismatch between the firewall and
OCI. For example, say you have five data interfaces, then delete interface two on the
firewall and add a new interface at the bottom. After rebooting the firewall, the newly
added interface will take the place of the deleted interface two instead of taking a
place at the bottom of the list.
VM-Series Deployment Guide Version 10.1 923 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
VM-Series plugin 2.1.11 is required to deploy the VM-Series firewall for OCI as an HA pair
in FIPS mode.
To allow the firewalls to move the floating IP address upon failover, you must place the firewall
instances in a dynamic group on OCI. Dynamic groups allow you to group the firewall instances
as principal actors and create policy to allow the instances in the dynamic group to make API calls
against OCI services. You will use matching rules to add the HA peer instances to the dynamic
group and then create the policy the floating IP from one VNIC to another.
Both VM-Series firewalls in the HA pair must have the same number of network interfaces. Each
firewall requires a minimum of four interfaces—management, untrust, trust, and HA. You can
configure additional data interfaces as required by your deployment.
• Management interface—the private and public IP addresses associated with the primary
interface. You can use the private IP address on the management interface as the IP address
for the HA1 interface between the peers. If you want a dedicated HA interface, you must
attach an additional interface to each firewall, for a total of five interfaces each.
VM-Series Deployment Guide Version 10.1 924 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
• Untrust and trust interfaces—each of these data interfaces on the active HA peer require a
primary and secondary IP address. Upon failover, when the passive HA peer transitions to the
active state, the secondary private IP address is detached from the previously active peer and
attached to the now active HA peer.
• HA2 interface—this interface has a single private IP address on each HA peer. The HA2
interface is the data link peers use to synchronize sessions, forwarding tables, IPsec security
associations, and ARP tables.
STEP 1 | Deploy the VM-Series Firewall From the Oracle Cloud Marketplace and set up the network
interfaces for HA.
1. (Optional) Configure a dedicated HA1 interface on each HA peer.
1. From the OCI Console, select Compute > Instances and click on the name of your
active peer instance.
2. Select Attached VNICs and click Create VNIC.
3. Enter a descriptive name for your HA1 interface.
4. Select the VCN and subnet.
5. Enter a private IP address.
6. Click Create VNIC.
7. Repeat this process on your passive peer instance.
2. Configure an HA2 interface on each HA peer.
1. From the OCI Console, select Compute > Instances and click on the name of your
active peer instance.
2. Select Attached VNICs and click Create VNIC.
3. Enter a descriptive name for your HA2 interface.
4. Select the VCN and subnet. The HA2 interface should be on a separate subnet from
your data interfaces.
5. Enter a private IP address.
6. Click Create VNIC.
7. Repeat this process on your passive peer instance.
3. Add a secondary IP address to your dataplane interfaces on the active peer.
1. From the OCI Console, select Compute > Instances and click on the name of your
active peer instance.
2. Select Attached VNICs and click on your untrust VNIC.
3. Select IP Addresses and click Assign Private IP Address.
4. Enter the IP address and click Assign.
5. Repeat this procedure for each dataplane interface on your active peer.
VM-Series Deployment Guide Version 10.1 925 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 2 | Create security rules to allow the HA peers to synchronize data and maintain state
information. By default, OCI allows ICMP traffic only. You must open the necessary HA
ports.
1. Open the ports for your HA1 interface.
1. From the OCI Console, select Networking > Virtual Cloud Networks and select your
VCN.
2. Select Subnets and select the subnet containing your HA1 interface.
3. Select Security Lists and click the default security list to edit it.
4. Click Add Ingress Rule.
5. Enter the Source CIDR that includes the HA peer HA1 port IP address.
6. Select TCP from the IP Protocol drop-down.
7. Click +Additional Ingress Rule. You need to create two additional rules for TCP ports
28260 and 28769.
8. If encryption is enabled on your VM-Series firewall for the HA1 link, create an
additional rules for ICMP and TCP port 28.
9. Click Add Ingress Rules.
VM-Series Deployment Guide Version 10.1 926 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
VM-Series Deployment Guide Version 10.1 927 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 3 | Add both HA peers to a dynamic group and create policy that allows the HA peers to move
the floating IP address. You must have the OCID of each HA peer instance to build the
dynamic group matching rules, so have those on hand to past into the rule builder.
1. Create the dynamic group.
1. From the OCI Console, select Identity > Dynamic Groups > Create Dynamic Group.
2. Enter a descriptive Name for your dynamic group.
3. Click Rule Builder.
4. Select Any of the following rules from the first drop-down.
5. Select Match instances with ID: from the Attributes drop-down and paste one of the
peer OCIDs into the Value field.
6. Click +Additional Line.
7. Select Match instances with ID: from the Attributes drop-down and paste the other
peer OCID into the Value field.
8. Click Add Rule.
VM-Series Deployment Guide Version 10.1 928 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 4 | Configure the interfaces on the firewall. You must configure the HA2 data link and at least
two Layer 3 interfaces for your untrust and trust interfaces. Complete this workflow on the
first HA peer and then repeat the steps on the second HA peer.
1. Log in to the firewall web interface.
2. (Optional) If you are using the management interface as HA1, you must set the interface
IP Type to static and configure a DNS server.
1. Select Device > Setup > Interfaces > Management.
2. Set the IP Type to Static.
3. Enter the private IP address of the primary VNIC of your VM-Series firewall instance.
4. Click OK.
5. Select Device > Setup > Services.
6. Click Edit.
7. Enter the IP address of the Primary DNS Server.
8. Click OK.
9. Commit your changes.
3. Select Network > Interfaces > Ethernet and click on your untrust interface. In this
example, the HA2 interface is 1/1, the trust interface is ethernet 1/2, and the untrust
interface is ethernet 1/3.
4. Click the link for ethernet 1/1 and configure as follows:
• Interface Type: HA
5. Click the link for ethernet 1/2 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example trust-zone, and then click OK.
• On the IPv4 tab, select either Static.
• Click Add in the IP section and enter the primary IP address and network mask for the
interface. Make sure that the IP address matches the IP address that you assigned to
VM-Series Deployment Guide Version 10.1 929 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
the corresponding subnet in VCN. For example, if you add this interface to your trust
zone, make sure you assign the trust vNIC IP address configured in your VCN.
• Click Add in the IP section and enter the secondary, floating IP address and network
mask.
6. Click the link for ethernet 1/3 and configure as follows:
• Interface Type: Layer3
• On the Config tab, assign the interface to the default router.
• On the Config tab, expand the Security Zone drop-down and select New Zone.
Define a new zone, for example untrust-zone, and then click OK.
• On the IPv4 tab, select either Static.
• Click Add in the IP section and enter the primary IP address and network mask for
the interface. Make sure that the IP address matches the IP address that you assigned
to the corresponding subnet in VCN. For example, if you add this interface to your
untrust zone, make sure you assign the untrust vNIC IP address configured in your
VCN.
• Click Add in the IP section and enter the secondary, floating IP address and network
mask.
VM-Series Deployment Guide Version 10.1 930 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
5. (Optional) Edit the Control Link (HA1). If you do not plan to use the management
interface for the control link and have added an additional interface (for example
ethernet 1/4), edit this section to select the interface to use for HA1 communication.
6. Edit the Data Link (HA2) to use Port ethernet 1/1 and add the IP address of active peer
and the Gateway IP address for the subnet.
7. Select IP or UDP from the Transport drop-down. Ethernet is not supported.
8. Click OK.
VM-Series Deployment Guide Version 10.1 931 ©2023 Palo Alto Networks, Inc.
Set up the VM-Series Firewall on Oracle Cloud Infrastructure
STEP 8 | After your finish configuring HA on both firewalls, verify that the firewalls are paired in
active/passive HA.
1. Access the Dashboard on both firewalls and view the High Availability widget.
2. On the active HA peer, click Sync to peer.
3. Confirm that the firewalls are paired and synced.
• On the passive firewall: the state of the local firewall should display Passive and the
Running Config should show as Synchronized.
• On the active firewall: the state of the local firewall should display Active and the
Running Config should show as Synchronized.
VM-Series Deployment Guide Version 10.1 932 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM
Cloud
You can use the VM-Series firewall to secure your resources deployed in IBM Cloud.
933
Set Up the VM-Series Firewall on IBM Cloud
Licensing Information
The VM-Series firewall supports the bring-your-own-license (BYOL) model on IBM Cloud. For
more information, see
Bring Your Own License (BYOL).
You can choose a higher performing machine type or create your own custom machine type, if the
resource requirements are compatible with your VM-Series firewall license. A single IBM Cloud
instance supports up to five network interfaces. For more information on machine types, see
Instance Profiles.
VM-Series Deployment Guide Version 10.1 934 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
Prerequisites
To set-up the VM-Series Firewall on IBM Cloud, you will need:
• Access to IBM Cloud Gen 2 VPC
• A VPC with at least two subnets and one IP address unassigned in each subnet. The IP
Addresses to the VM-Series VSI will be assigned from the user provided subnets. For more
information, see
• One of the following regions to install PAN-OS:
• us-east
• us-south
• ca-tor
• eu-gb
• eu-de
• eu-fr2
• au-syd
• jp-osa
• jp-tok
Dependencies
Before you can apply the template in IBM Cloud, complete the following steps:
• Ensure that you have the following permissions in IBM Cloud Identity and Access
Management:
• Manager service access role for IBM Cloud Schematics
• Operator platform role for VPC Infrastructure
VM-Series Deployment Guide Version 10.1 935 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
General Requirements
The components in this checklist are common to deploying a VM-Series firewall that you manage
directly or with Panorama.
Refer to the Compatibility Matrix for Panorama plugin information for public clouds.This release
requires the following software:
• IBM Cloud account—You must have an IBM Cloud user account with a linked email address
and you must know the username and password for that email address.
IBM Cloud SDK—If you have not done so, install the IBM Cloud Software, which includes IBM
Cloud APIs and command line tools. You can use the command line interface to deploy the
firewall template and other templates.
• PAN-OS on VM-Series firewalls on IBM Cloud—VM-Series firewalls running a PAN-OS version
available from the IBM Cloud Catalog.
• VM-Series firewalls—VM-Series firewalls that you want to manage from Panorama must
be deployed in IBM Cloud Platform using a Palo Alto Networks image from the IBM Cloud
Catalog. Firewalls must meet the Minimum System Requirements for the VM-Series
Firewall.
• VM-Series Licenses—You must license a VM-Series firewall to obtain a serial number. A
serial number is required to add a VM-Series firewall as a Panorama managed device. If
you are using the Panorama plugin for IBM Cloud to deploy VM-Series firewalls, you must
supply a BYOL auth code. The IBM Cloud handles your service billing, but the firewalls you
deploy will directly interface with the Palo Alto Networks licensing server.
• VM-Series plugin on the firewall—VM-Series firewalls running PAN-OS 9.0 and later include
the VM-Series plugin, which manages integration with public and private clouds. As shown
VM-Series Deployment Guide Version 10.1 936 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
in the Compatibility Matrix, the VM-Series plugin has a minimum version that corresponds
to each PAN-OS release.
When there is a major PAN-OS upgrade the VM-Series plugin version is automatically
upgraded. For minor releases it is up to you to determine whether a VM-Series plugin
upgrade is necessary, and if so, perform a manual upgrade.
• Panorama running in Management mode—A Panorama physical or virtual appliance running
a PAN-OS version that is the same or later than the managed firewalls. Virtual instances do
not need to be deployed in IBM Cloud.
You must have:
• A licensed version of Panorama.
• Panorama having network access to the VPCs in which the VMs you want to manage are
deployed.
• VM-Series plugin on Panorama. See Install the VM-Series Plugin on Panorama.
VM-Series Deployment Guide Version 10.1 937 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
region VPC region that you want your VPC virtual us-east
servers to be provisioned.
VM-Series Deployment Guide Version 10.1 938 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
You will be prompted to change your password on your first login. You will be
able to access the interface only after logging in with the changed password.
VM-Series Deployment Guide Version 10.1 939 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
VM-Series Deployment Guide Version 10.1 940 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
VM-Series Deployment Guide Version 10.1 941 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
VM-Series Deployment Guide Version 10.1 942 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
Step 1: The ingress routing table directs the traffic towards the LBs in the direction of client to
server. In this case, since the client is in a different zone, the traffic source for the routing table is
the VPC Zone.
Step 2: The Load Balancer sends the packets to one of the firewalls. Since the FW DP subnets and
the server subnet are in the same VPC, they can reach each other through the default gateways.
You need not configure custom routing on the firewall if the DP interface is configured as DHCP.
If the static IP is configured on the DP interface, then the default route needs to be configured on
the FW.
Step 3: Attach the Interface management profile that permits HTTP/HTTPS probes to the DP
interface.
VM-Series Deployment Guide Version 10.1 943 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on IBM Cloud
Step 5: For the return traffic moving in the direction of server to client, there must be an egress
routing table attached to the subnet of the server, directing the traffic (destined to the client) to
the LB. The LB forwards the packet to the same FW as the traffic in the other direction. The FW
will forward the packet via its default gateway to the client.
VM-Series Deployment Guide Version 10.1 944 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
Alibaba Cloud
Deploying the VM-Series firewall on Alibaba Cloud protects networks you create
within Alibaba Cloud. You can deploy VM-Series firewalls to protect internet facing
applications and hybrid cloud deployments.
945
Set Up the VM-Series Firewall on Alibaba Cloud
Securing east-west traffic within the same VPC is not supported because Alibaba Cloud
does not support subnet routing.
The VM-Series firewall on Alibaba Cloud runs on the KVM hypervisor and supports up to 8
network interfaces when you select an Alibaba Cloud instance with sufficient resources (see
Minimum System Requirements for the VM-Series Firewall on Alibaba Cloud).
The VM-Series firewall on Alibaba Cloud supports BYOL licensing and the VM-Series ELA
on Alibaba Cloud International Regions and Mainland China. PAYG licensing is not currently
supported.
In Alibaba Cloud, your VPC logically isolates your virtual network. After creating a VPC, you can
create VSwitches to further segment your virtual private network, as shown in the following
diagram. To secure inbound traffic, both DNAT and SNAT must be configured on the firewall.
Inbound traffic originates from a client outside of your VPC going to the VM-Series firewall
untrust interface. The firewall inspects the traffic and sends it to an application through the trust
interface. Traffic returning from the application must travel through the VM-Series firewall trust
interface, which inspects the return traffic flow and sends it out through the untrust interface.
Outbound traffic typically originates from an external application. Typically you route the internet
facing traffic within a VPC to a NAT gateway (with EIP attached). To do this, add a default
gateway route in the VPC routing table, with the VM-Series firewall IP address of the application
subnet as the next hop. Configure SNAT using the untrust interface IP to ensure traffic originating
from the internet returns through the VM-Series firewall.
Refer to Secure North-South Traffic on Alibaba Cloud for a sample configuration.
VM-Series Deployment Guide Version 10.1 946 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
VM-Series Deployment Guide Version 10.1 947 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
VM-Series Deployment Guide Version 10.1 948 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
STEP 2 | Evaluate your applications and network configurations and calculate the firewall capacity you
need to secure your applications and networks.
Use the VM-Series model you have chosen to choose one of the Alibaba Cloud Instance
Type Recommendations for the VM-Series Firewall.
2. Choose a VM-Series capacity license that meets your needs.
3. Purchase a BYOL subscription bundle (if you do not already have one). You receive
an auth code for your VM-Series subscription, and you must supply it during the
deployment.
STEP 4 | Plan how to configure Alibaba accounts and permissions to access the VM-Series firewall.
For a start, see the Security FAQ, and learn about Instance RAM Roles.
VM-Series Deployment Guide Version 10.1 949 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
aliyun configure
Configuring profile '' in '' authenticate mode...
Access Key Id [*************8rq]: *************8rq
Access Key Secret [***************************tM2]:
***************************tM2
Default Region Id [us-west-1]: us-west-1
Default Output Format [json]: json (Only support json))
Default Language [zh|en] en: en
Saving profile[] ...Done.
available regions:
...
VM-Series Deployment Guide Version 10.1 950 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a
public cloud environment. IPv6 addresses are not supported.
STEP 1 | Open the VPC console and select your region from the menu. Note, the region you select
must provide one of the instance types that Palo Alto Networks supports.
STEP 2 | From the Alibaba Cloud Console home page, select Products and Services > Networking >
Virtual Private Cloud.
Property Value
IPV4 CIDR Bock Your choice. Refer to the CIDR block FAQ.
VM-Series Deployment Guide Version 10.1 951 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
Property Value
Property Value
Template Customize
VM-Series Deployment Guide Version 10.1 952 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
Property Value
Property Value
Action Allow
Priority 100
Authorization Object
• Click Add Security Group Rule to create an inbound rule to allow SSH on the
management interface.
Property Value
Action Allow
VM-Series Deployment Guide Version 10.1 953 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
Property Value
Authorization Object
Property Value
Action Allow
Priority 100
Authorization Object
VM-Series Deployment Guide Version 10.1 954 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
Property Value
Region Your choice. You can also select a Zone. The region you select
must provide one of the required instance types.
VM-Series Deployment Guide Version 10.1 955 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
Property Value
VM-Series Deployment Guide Version 10.1 956 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
type=dhcp-client
hostname=Ca-FW-DC1
vm-auth-key=7550362253****
panorama-server=10.*.*.20
panorama-server-2=10.*.*.21
tplname=FINANCE_TG4
dgname=finance_dg
op-cmd-dpdk-pkt-io=on
dhcp-send-hostname=yes
dhcp-send-client-id=yes
dhcp-accept-server-hostname=yes
dhcp-accept-server-domain=yes
authcodes=I7115398
vm-series-auto-registration-pin-id=abcdefgh1234****
vm-series-auto-registration-pin-value=zyxwvut-0987****
STEP 6 | View the terms of service, and select Create Order to create the VM-Series firewall instance.
View the purchase order and select Subscribe.
STEP 7 | From the console home page, choose > Elastic Compute Service > Networks and Security >
ENIs and select Create ENI in the top right corner. Create elastic network interfaces for the
Untrust and Trust interfaces.
1. Create the Untrust ENI.
In the Actions column, select Bind to Instance and select the instance you just created.
2. Create the Trust ENI and bind it to the instance.
VM-Series Deployment Guide Version 10.1 957 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
STEP 10 | SSH in to the VM-Series firewall with the security key and set the admin password:
admin> configure
Entering configuration mode
[edit]
admin# set mgt-config users admin password
Enter password:<password>
Confirm password:<password>
[edit]
admin# commit
db eth3 192.168.3.0/24
VM-Series Deployment Guide Version 10.1 958 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
In the following diagram, the VM-Series firewall connects to two trusted subnets, web and db.
Inbound traffic is initiated when an external client accesses the VM-Series firewall’s Untrust
interface. The firewall inspects the traffic and sends it to an application. For example, the firewall
sends traffic to a Web server through the Trust interface. The traffic returning from the Web
server must hit the VM-Series firewall’s Trust interface. The firewall inspects the return traffic
flow, and sends it out through the Untrust interface.
To secure inbound traffic, both DNAT and SNAT must be configured on the firewall.
STEP 1 | Create NAT rules for inbound traffic.
Here’s a sample of the NAT rules for inbound traffic protection.
<nat>
<rules>
<entry name="inbound_web">
<source-translation>
<dynamic-ip-and-port>
<interface-address>
<interface>ethernet1/2</interface>
</interface-address>
</dynamic-ip-and-port>
</source-translation>
<destination-translation>
<translated-address>web_server</translated-
address>
</destination-translation>
<to>
<member>untrust</member>
</to>
<from>
<member>any</member>
</from>
<source>
<member>any</member>
</source>
VM-Series Deployment Guide Version 10.1 959 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
<destination>
<member>fw_untrust</member>
</destination>
<service>any</service>
<to-interface>ethernet1/1</to-interface>
</entry>
</rules>
</nat>
<address>
<entry name="fw_untrust">
<ip-netmask>192.168.1.4</ip-netmask>
</entry>
<entry name="fw_trust">
<ip-netmask>192.168.2.201</ip-netmask>
</entry>
<entry name="web_server">
<ip-netmask>192.168.2.203</ip-netmask>
</entry>
</address>
VM-Series Deployment Guide Version 10.1 960 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
traffic within a VPC is routed to a NAT gateway (with an EIP attached). To secure outbound
traffic, you must force outbound traffic to go through the VM-Series firewall.
1. Add a default gateway route in the VPC routing table with firewall IP in the subnet of the
web server as the next hop.
3. Configure SNAT rules using the Untrust interface IP to ensure traffic returning from the
internet goes through the VM-Series firewall.
VM-Series Deployment Guide Version 10.1 961 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
<nat>
<rules>
<entry name="outbound_web">
<source-translation>
<dynamic-ip-and-port>
<interface-address>
<interface>ethernet1/1</interface>
</interface-address>
</dynamic-ip-and-port>
</source-translation>
<to>
<member>untrust</member>
</to>
<from>
<member>trust</member>
</from>
<source>
<member>any</member>
</source>
<destination>
<member>any</member>
</destination>
<service>any</service>
<to-interface>any</to-interface>
</entry>
</rules>
</nat>
VM-Series Deployment Guide Version 10.1 962 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
In Create a VPC and Configure Networks, you created Untrust and Trust ENIs and attached them
to the VM-Series firewall instance as secondary ENIs.
When you use the console to add multiple backend servers to Alibaba Server Load Balancer (SLB),
the SLB sends traffic to the primary ENI of the next-hop backend servers. Because the primary
ENI is the management interface, traffic must go to the Untrust interface (a secondary ENI) for
inspection.
To ensure that internet traffic goes to dataplane interfaces rather than the management interface,
use the Alibaba CLI to attach the VM-Series firewall untrust ENIs to your SLB instance.
You must install the Aliyun command line interface to use the following CLI commands.
STEP 1 | Create the public and private VPCs for a load balancer sandwich configuration, and deploy
the VM-Series firewalls.
The remaining steps are sample CLI commands you can adapt to your environment.
VM-Series Deployment Guide Version 10.1 963 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Alibaba Cloud
"RequestId": "0B8BA2AA-E837-****-****-B82A8A1D5FBB",
"AddressIPVersion": "ipv4",
"LoadBalancerId": "lb-******************mvz",
"VSwitchId": "",
"VpcId": "vpc-*****************r7z"
}
Use the CLI to add interfaces one at a time. The order in which you add the interfaces
determines which NIC receives the interface.
VM-Series Deployment Guide Version 10.1 964 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
Palo Alto Networks integrates as a service with Cisco Application-Centric
Infrastructure (ACI). ACI is a software-defined networking (SDN) solution for easily
deploying new workloads and network services. Using an SDN controller called the
Cisco Application Policy Infrastructure Controller (APIC), you deploy the firewall
service between Endpoint Groups (EPGs). EPGs act as a container for applications or
application tiers. When you place a firewall between EPGs, security policy configured
on the firewall secures the traffic between the EPGs. The APIC provides a single pane
of glass for managing the network topology, network policies, and connectivity for the
entire data center and supports inserting L4 - L7 devices, such as a hardware-based or
VM-Series firewall. Panorama is required for centralized security management.
965
Set Up a Firewall in Cisco ACI
After the firewall services have been deployed, traffic now flows logically as shown below. Traffic
to and from the end users and each tier in the application regardless of where or how each entity
is physically connected to the network.
When the firewall is integrated with Cisco ACI, traffic is sent to the firewall with a policy-based
redirect (PBR). Additionally, configuration of the firewall and configuration of the APIC are
completely separate. Network policy mode does not rely on any other configuration integration
between the firewall and the APIC, so it provides greater flexibility of configuration and
deployment of the firewall.
VM-Series Deployment Guide Version 10.1 966 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
For east-west traffic, define a bridge domain and subnet in the ACI fabric for the firewall.
Configure contracts between EPGs that send traffic to the firewall using a PBR. The PBR forwards
traffic to the firewall based on policy containg the firewall’s IP and MAC address. The firewall
interfaces are always in Layer 3 mode and traffic is received and routed back to the ACI fabric.
You can configure separate interfaces for consumer and provider connections or a single interface
for ingress and egress traffic. The procedure in this document uses a single interface because
it simplifies the integration; you do not need to configure as many interfaces, IP addresses, or
VLANs. However, when using a single interface, you cannot uses zone information in defining
security policy and you must modify the default intra-zone policy on the firewall to deny traffic.
For north-south traffic, you must use a dedicated policy called an L3Out. An L3Out contains the
information required for the tenant to connect to external routing devices and access external
networks. L3Out connections contain an external network EPG that represent the networks
accessible through the L3Out policy. Just as the L3Out can group all external networks into a
single EPG, you can use a vzAny object ACI to represent all EPGs in a VRF. Using a vzAny object
simples the application of the outbound traffic contract because, whenever a new EPG is added to
the VRF, the contract is automatically applied. In this scenario, the external network provides the
contract and the vzAny object (all internal EPGs) consume it.
The following section provide additional details about components and concepts that make up the
integration between the Next-Generation Firewall and Cisco ACI.
• Service Graph Templates
• Multi-Context Deployments
Multi-Context Deployments
Cisco ACI integration supports physical firewalls divided into contexts that are managed by ACI as
individual firewalls. On the firewall, these contexts are the virtual systems (vsys) on the firewalls
and each firewall is licensed to support a certain number of vsys instances. When deploying a
multi-vsys firewall in ACI, you must configure a chassis manager in the tenant and assign it to the
firewall service.
VM-Series Deployment Guide Version 10.1 967 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 968 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 969 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 970 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 1 | Select Network > Interfaces > Ethernet and click Add Aggregate Group.
STEP 2 | Enter a number for the aggregate group in the second Interface Name field.
Do not select Same System MAC Address for Active-Passive HA. This option makes
the firewall pair appear as a single device to the switch, so traffic will flow to both
firewalls instead of just the active firewall.
VM-Series Deployment Guide Version 10.1 971 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 8 | Click on the name of an Ethernet interface to configure it and add it to the aggregate group.
1. Select Aggregate Ethernet from the Interface Type drop-down.
2. Select the interface you defined in the aggregate Ethernet group configuration.
3. Click OK.
4. Repeat this step for each other member interface of the aggregate Ethernet group.
STEP 9 | Add a subinterface on the aggregate Ethernet interface for the tenant and VRF.
1. Select the row of your aggregate Ethernet group and click Add Subinterface.
2. In the second Interface Name field, enter a numerical suffix to identify the subinterface.
3. In the Tag field, enter the VLAN tag of the subinterface.
4. Select the virtual router you configured previously from the Virtual Router drop-down.
5. Select the zone you configured previously from the Zone drop-down.
6. Select the IPv4 tab.
7. Select the Static Type.
8. Click Add and enter the subinterface IP address and network mask in CIDR notation.
9. Click OK.
VM-Series Deployment Guide Version 10.1 972 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 5 | From the Interface drop-down, select the aggregate Ethernet group you created previously
in this procedure.
STEP 6 | Select IP Address from the Next Hop drop-down and enter the IP address of the next hop
router.
VM-Series Deployment Guide Version 10.1 973 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 6 | Configure additional security policy rules based on your needs using the address objects and
zone you created for your EPG.
VM-Series Deployment Guide Version 10.1 974 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 975 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
Configure an Interface Policy for LLDP and LACP for East-West Traffic
Create policy that enables LLDP and LACP on the ACI interfaces that connect to your firewall.
LLDP is necessary for forwarding to work correctly in the ACI environment; ACI does not deploy
a subnet router interface on a leaf switch unless it detects an endpoint on the switch that requires
one. LLDP helps determine if a subnet router interface is required.
LACP provides greater resiliency and recovery speed on a link failure.
STEP 1 | Create an LLDP Interface Policy.
1. Select Fabric > Access Policies > Interface Policies > Policies > LLDP Interface.
2. Right-click on LLDP Interface and select Create LLDP Interface Policy.
3. Enter a descriptive Name for your LLDP interface policy.
4. Select Enabled for Receive State.
5. Select Enabled for Transmit State.
6. Click Submit.
VM-Series Deployment Guide Version 10.1 976 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 4 | Select the leaf switch or switches to which you firewall is connected from the Switches
drop-down.
STEP 7 | In the Interfaces field, enter the number of the interface your firewall uses to connect to the
leaf switch.
STEP 8 | Enter a descriptive name into the Interface Selector Name field.
STEP 10 | Select LACP Active from the Port Channel Policy drop-down.
STEP 11 | Select Bare Metal for a physical firewall or ESX Hosts for the VM-Series from the Attached
Device Type drop-down.
STEP 13 | Select the physical domain or VMM domain you created previously in this procedure from
the Domain drop-down.
STEP 16 | Repeat this procedure for the second firewall in your HA pair.
VM-Series Deployment Guide Version 10.1 977 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 978 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 7 | Select Physical for a physical firewall or Virtual for a VM-Series firewall from the Device
Type drop-down.
STEP 8 | Select the physical or VMM domain you created previously from the Domain drop-down.
VM-Series Deployment Guide Version 10.1 979 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 10 | Under Device 1, click the plus (+) icon to the right of Device Interfaces.
STEP 12 | Under Path, select the path to the primary firewall in your HA pair.
STEP 14 | Under Device 2, click the plus (+) icon to the right of Device Interfaces.
STEP 16 | Under Path, select the path to the secondary firewall in your HA pair.
STEP 18 | Under Cluster, click the plus (+) icon to the right of Cluster Interfaces.
STEP 20 | Select the two interfaces you configured above from the list under Concrete Interfaces.
The APIC requires that you configure two interfaces. However, because there is only one
connection between the firewall and the ACI fabric, only one of the interfaces is used.
STEP 21 | Under Encap, enter a VLAN from the from the static VLAN pool you created earlier. Traffic
will be redirected to the firewall on the VLAN assigned here.
VM-Series Deployment Guide Version 10.1 980 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 981 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 982 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
10. Select the service graph template you created in the previous procedure from the
Service Graph Template drop-down.
11. In the consumer and provider pane, select the bridge domain containing your firewall
from the BD drop-downs.
12. Select the policy based redirect you created previously from the Redirect Policy drop-
downs.
13. Select the cluster interface you created with you L4-L7 device from the Cluster Interface
drop-downs.
VM-Series Deployment Guide Version 10.1 983 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 984 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
networks through the firewall. The vzAny managed object allows you to consolidate all EPGs in
a VRF to one or more contracts instead of creating a separate contracts for each EPG. The EPGs
collected in the vzAny managed object consume the contact provided by the external EPG.
Unlike in service manager mode, management if the ACI infrastructure and the firewalls is
completed separately.
On the APIC—
• Create a VLAN Pool and External Routed Domain
• Configure an Interface Policy for LLDP and LACP for North-South Traffic
• Create an External Routed Network
• Configure Subnets to Advertise to the External Firewall
• Create an Outbound Contract
• Create an Inbound Web Contract
• Apply Outbound and Inbound Contracts to the EPGs
On the firewall—
• Create a Virtual Router and Security Zone for North-South Traffic
• Configure the Network Interfaces
• Configure Route Redistribution and OSPF
• Configure NAT for External Connections
VM-Series Deployment Guide Version 10.1 985 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
Configure an Interface Policy for LLDP and LACP for North-South Traffic
Create policy that enables LLDP and LACP on the ACI interfaces that connect to your firewall.
LLDP is necessary for forwarding to work correctly in the ACI environment; ACI does not deploy
a subnet router interface on a leaf switch unless it detects an endpoint on the switch that requires
one. LLDP helps determine if a subnet router interface is required.
LACP provides greater resiliency and recovery speed on a link failure.
STEP 1 | Create an LLDP Interface Policy.
1. Select Fabric > Access Policies > Interface Policies > Policies > LLDP Interface.
2. Right-click on LLDP Interface and select Create LLDP Interface Policy.
3. Enter a descriptive Name for your LLDP interface policy.
4. Select Enabled for Receive State.
5. Select Enabled for Transmit State.
6. Click Submit.
STEP 3 | Right-click External Routed Networks and select Create Routed Outside.
STEP 5 | Select your VRF with external connectivity from the VRF drop-down.
VM-Series Deployment Guide Version 10.1 986 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 6 | Select the external routed domain you created previously form the External Routed Domain
drop-down.
STEP 8 | Enter an OSPF Area ID. The Area ID can be expressed in decimal number or dotted decimal
form. For example, Area 1 is the same as Area 0.0.0.1 or Area 271 is the same as Area
0.0.1.15. The Area ID range is 0 (0.0.0.0) to 4294967295 (255.255.255.255).
STEP 10 | Click the plus (+) button to the right of Nodes and Interface Profiles to create a Node Profile
with a node that for the border-leaf switches that connect to the firewall.
VM-Series Deployment Guide Version 10.1 987 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 17 | Click the plus (+) button to the right of External EPG Networks. This opens the Create
Routed Outside window.
VM-Series Deployment Guide Version 10.1 988 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 2 | Select Networking > Bridge Domains > <your bridge domain>.
STEP 4 | Click the plus (+) button to the right of Associated L3 Outs.
STEP 5 | Select the Layer 3 external routed network connection you created in the previous
procedure from the L3 Out drop-down.
STEP 7 | Select Networking > Bridge Domains > <your bridge domain> > Subnets > <externally
advertised subnet>.
VM-Series Deployment Guide Version 10.1 989 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 990 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 991 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 992 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 2 | Apply the inbound contract so an internal EPG provides it to the external EPG.
1. On the Tenants tab, double-click on the name of your tenant.
2. Select Application Profiles > <your application profile> > Application EPGs > <your
application EPG> > Contracts.
3. Right-click on Contracts and select Add Provided Contract.
4. Select your inbound contract from the Contract drop-down.
5. Click Submit.
6. On the same tenant, select Networking > External Routed Networks > <your external
routed network> > Networks > External.
7. On the Contracts tab, click the plus (+) button to the right of Consumed Contracts.
8. Select your inbound contract from the Name drop-down.
9. Click Update.
VM-Series Deployment Guide Version 10.1 993 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 994 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 1 | Select Network > Interfaces > Ethernet and click Add Aggregate Group.
STEP 2 | Enter a number for the aggregate group in the second Interface Name field.
Do not select Same System MAC Address for Active-Passive HA. This option makes
the firewall pair appear as a single device to the switch, so traffic will flow to both
firewalls instead of just the active firewall.
VM-Series Deployment Guide Version 10.1 995 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 8 | Click on the name of an Ethernet interface to configure it and add it to the aggregate group.
1. Select Aggregate Ethernet from the Interface Type drop-down.
2. Select the interface you defined in the aggregate Ethernet group configuration.
3. Click OK.
4. Repeat this step for each other member interface of the aggregate Ethernet group.
STEP 9 | Add a subinterface on the aggregate Ethernet interface for the tenant and VRF.
1. Select the row of your aggregate Ethernet group and click Add Subinterface.
2. In the second Interface Name field, enter a numerical suffix to identify the subinterface.
3. In the Tag field, enter the VLAN tag of the subinterface.
4. Select the virtual router you configured previously from the Virtual Router drop-down.
5. Select the zone you configured previously from the Zone drop-down.
6. Select the IPv4 tab.
7. Select the Static Type.
8. Click Add and enter the subinterface IP address and network mask in CIDR notation.
9. Click OK.
VM-Series Deployment Guide Version 10.1 996 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 997 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
decimal form. For example, if you entered an Area ID of 10 in the APIC, the equivalent
on the firewall is 0.0.0.10.
7. Select Interface > Add.
8. Enter the interface that connects to your external network EPG and click OK.
9. Select Export Rules > Add.
10. Select the Redistribution Profile you created above from the Name drop-down and click
OK.
11. Select Allow Redistribute Default Route.
12. Click OK.
VM-Series Deployment Guide Version 10.1 998 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 1 | Configure address translation for traffic entering an EPG in your data center.
1. Select Policies > NAT and click Add.
2. Enter a descriptive Name for your NAT policy rule.
3. Select Original Packet and click Add under Source Zone.
4. Select the source zone from the drop-down.
5. Select the destination zone from the Destination Zone drop-down.
6. Select Any for the Source Address.
7. Click Add under Destination Address and enter the external IP address.
8. On the Translated Packet tab, select the Translation Type under Destination Address
Translation.
9. Select an address from the Translated Address drop-down.
10. Click OK.
VM-Series Deployment Guide Version 10.1 999 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
6. On the Translated Packet tab, select the Translation Type under Source Address
Translation.
7. Enter additional required address information.
8. Click OK.
VM-Series Deployment Guide Version 10.1 1000 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
8GB 10,000
16GB 20,000
The Cisco ACI plugin processes the endpoint information and converts it into a set of tags that
can be used as match criteria for placing IP addresses in dynamic address groups. The tags are
constructed in the following format:
cisco.cl_<cluster>.tn_<tenant>.ap_<app-profile>.{epg_<EPG> | uepg_<micro-EPG>}
• cisco.cl_<cluster>—this tag groups IP addresses into a dynamic address group based on the
Cisco ACI cluster and displays the name of your cluster.
• cisco.cl_<cluster>.tn_<tenant>—this tag groups IP addresses into a dynamic address group
based on tenant and displays the name of your cluster and tenant.
• cisco.cl_<cluster>.tn_<tenant>.ap_<app-profile>—this tag groups IP addresses into a dynamic
address group base on application profile and displays the name of your cluster, tenant, and
application profile.
• cisco.cl_<cluster>.tn_<tenant>.ap_<app-profile>.epg_<EPG>—this tag groups IP addresses
into a dynamic address group based on EPG and displays the name of your cluster, tenant,
application profile, and EPG.
• cisco.cl_<cluster>.tn_<tenant>.ap_<app-profile>.uepg_<micro-EPG>—this tag groups IP
addresses into a dynamic address group based on micro-EPG and displays the name of your
cluster, tenant, application profile, and micro-EPG.
• cisco.cl_<cluster>.tn_<tenant>.l2out_<L2-external-endpoint>—this tag groups IP addresses
into dynamic address groups based on L2 external endpoint and displays the name of you
cluster, tenant, and L2 external endpoint.
• cisco.cl_<cluster>.tn_<tenant>.bd_<bridge-domain>.subnet_<subnet>—this tag groups IP
address into a dynamic address group based on subnet and displays the name of you cluster,
tenant, bridge domain, and subnet.
To retrieve endpoint IP-address-to-tag mapping information, you must configure a Monitoring
Definition for each APIC fabric in your Cisco ACI environment. The Monitoring Definition
specifies the username and password that allows Panorama to connect to the APICs. It also
VM-Series Deployment Guide Version 10.1 1001 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
specifies the device groups and corresponding notify groups containing the firewalls to which
Panorama pushes the tags. After you configure the Monitoring Definition and the Cisco ACI
plugin retrieves the tags, you can create dynamic address groups and add the tags as match
criteria.
The Cisco ACI plugin uses two intervals to retrieve information from the APIC. The first is the
monitoring interval.
• Monitoring interval—The monitoring interval is the amount of time that the plugin waits before
querying for changes in the fabric. If no changes occurred, the monitoring interval resets.
If changes are detected, the plugin processes the changes before resetting the monitoring
interval. The default monitoring interval is 60 seconds. You can set the monitoring interval
from 60 seconds to one day (86,400 seconds).
• Full-sync interval—The full-sync interval is the amount of time that the plugin waits before
updating the dynamic objects from all fabrics regardless of any changes occurred. This
ensures that the plugin is synchronized with the fabric even if a change event is missed by
the monitoring interval. The default full-sync interval is 10 minutes. You can set the full-sync
interval from 600 seconds (10 minutes) and 86,400 seconds (one day).
You must configure the full-sync interval through the Panorama CLI.
If you configure a value for the monitoring interval greater than that of the full-sync
interval, the full-sync interval is ignored and a full synchronization is performed at every
monitoring interval.
If Panorama loses its connection with the APIC, Panorama will attempt to reconnect five times.
After five failed attempts, Panorama stops monitoring for changes in your clusters and displays
the reconnection attempts in the system log. To recover and begin monitoring your clusters again,
you must perform a commit on Panorama.
• Install the Panorama Plugin for Cisco ACI
• Configure the Cisco ACI Plugin
• Panorama Plugin for Cisco ACI Dashboard
VM-Series Deployment Guide Version 10.1 1002 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 5 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
STEP 3 | You must add the firewalls as managed devices on Panorama and create Device Groups so
that you can configure Panorama to notify these groups with the VM information it retrieves.
Device groups can include VM-Series firewalls or virtual systems on the hardware firewalls.
VM-Series Deployment Guide Version 10.1 1003 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 4 | Enable monitoring, set the monitoring interval, and enable bypass proxy.
1. Select Panorama > Cisco ACI > Setup > General.
2. Select Enable Monitoring. This enables monitoring for all clusters in your deployment.
3. Set the Monitoring Interval in seconds. The monitoring interval is how often Panorama
retrieves updated network information from the APIC. The default value is 60 seconds
and the range is 60 seconds to 86,400 seconds (one day).
4. (Optional) Select Bypass Proxy to Bypass proxy server settings, configured on Panorama
under Panorama > Setup > Services > Proxy Server, for communication between
Panorama and the APIC. This allows Panorama to communicate directly with the APIC
while maintaining proxied communication for other services.
VM-Series Deployment Guide Version 10.1 1004 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
VM-Series Deployment Guide Version 10.1 1005 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
STEP 9 | Verify that you can view the EPG information on Panorama, and define the match criteria for
Dynamic Address Groups.
Some browser extensions may block API calls between Panorama and the APIC which
prevents Panorama from receiving match criteria. If Panorama displays no match
criteria and you are using browser extensions, disable the extensions and Synchronize
Dynamic Objects to populate the tags available to Panorama.
Panorama does not immediately process new monitoring definitions and populate the
match criteria available to dynamic address. You should wait for the duration of your
configured monitoring interval before verifying that EPG information.
STEP 10 | Verify that addresses in your EPGs are added to dynamic address groups.
1. Select Panorama > Objects > Address Groups.
2. Click More in the Addresses column of a dynamic address group.
Panorama displays a list of IP addresses added to that dynamic address group based on
the match criteria you specified.
STEP 12 | You can update the dynamic objects from the APIC at any time by synchronizing dynamic
objects. Synchronizing dynamic objects enables you to maintain context on changes in the
VM-Series Deployment Guide Version 10.1 1006 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
virtual environment and allows you to enable applications by automatically updating the
Dynamic Address Groups used in policy rules.
1. Select Panorama > Cisco ACI > Monitoring Definition.
2. Click Synchronize Dynamic Objects.
On HA failover, the newly active Panorama attempts to reconnect to the APIC and
retrieve tags for all monitoring definitions. If there is an error with reconnecting even
one monitoring definition, Panorama generates a system log message
When you see this error, you must log in to Panorama and fix the issue, for example
remove an invalid APIC IP or provide valid credentials, and commit your changes to
enable Panorama to reconnect and retrieve the tags for all monitoring definitions. Even
when Panorama is disconnected from the APIC, the firewalls have the list of all tags
that had been retrieved before failover, and can continue to enforce policy on that
list of IP addresses. If you perform a commit before resolving the failover error, the
newly active Panorama will not push any IP-to-tag mapping information and clearing
the mapping information from the firewalls. As a best practice, to monitor this issue,
configure action-oriented log forwarding to an HTTPS destination from Panorama so
that you can take immediate action.
The dashboard only queries for and counts pre-rule security policies configured on
Panorama; it does not include post-rules, default-rules, or NAT rules.
Tenant Tags Displays the total number of tenants Panorama retrieved from the
APIC. Additionally, it displays the number of dynamic address groups
associated with tenants and the number of tenants used in policy.
VM-Series Deployment Guide Version 10.1 1007 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
Application Profiles Displays the total number of application profiles Panorama retrieved
from the APIC. Additionally, it displays the number of dynamic
address groups associated with application profiles and the number of
application profiles used in policy.
Click the tile to drill down and view the following columns.
• Application Profile Name—lists all application profiles retrieved by
Panorama.
• Tenant Name—displays the tenant associated with the listed
application profile.
• Application Profile Tag—the Panorama tag associated with each
application profile.
• Dynamic Address Group—displays the dynamic address groups
associated with the listed tag.
• In Policy—shows if the listed dynamic address group is used in
policy.
VM-Series Deployment Guide Version 10.1 1008 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
End Point Groups Displays the total number of end point groups (EPG) Panorama
retrieved from the APIC. Additionally, it displays the number of dynamic
address groups associated with EPGs and the number of EPGs used in
policy.
Click the tile to drill down and view the following columns.
• EPG Name—lists all EPGs retrieved by Panorama.
• Application Profile Name—lists the EPG’s associated application
profile.
• Tenant Name—displays the tenant associated with the listed
application profile.
• EPG Tag—the Panorama tag associated with each EPG.
• Dynamic Address Group—displays the dynamic address groups
associated with the listed tag.
• In Policy—shows if the listed dynamic address group is used in
policy.
Micro End Point Displays the total number of micro end point groups (EPG) Panorama
Groups retrieved from the APIC. Additionally, it displays the number of dynamic
address groups associated with micro EPGs and the number of micro
EPGs used in policy.
Click the tile to drill down and view the following columns.
• Micro EPG Name—lists all EPGs retrieved by Panorama.
• Application Profile Name—lists the Micro EPG’s associated
application profile.
• Tenant Tag—displays the tenant associated with the listed
application profile.
• Micro EPG Tag—the Panorama tag associated with each Micro EPG.
• Dynamic Address Group—displays the dynamic address groups
associated with the listed tag.
• In Policy—shows if the listed dynamic address group is used in
policy.
Bridge Domains Displays the total number of bridge domains Panorama retrieved from
the APIC. Additionally, it displays the number of dynamic address
groups associated with brdige domains and the number of bridge
domains used in policy.
Click the tile to drill down and view the following columns.
• Bridge Domain Name—lists all bridge domains retrieved by
Panorama.
• Tenant Name—displays the tenant associated with the listed bridge
domain.
VM-Series Deployment Guide Version 10.1 1009 ©2023 Palo Alto Networks, Inc.
Set Up a Firewall in Cisco ACI
Service Graphs Displays the total number of Service Graphs monitored by the plugin
as well as well as the number of firewalls in line with monitored service
graphs.
Click the tile to drill down and view the following columns.
• Service Graph Name—lists all service graphs retrieved by Panorama.
• Producer EPG—displays the producer EPG associated with the
service graph.
• FW InLine—displays the firewall associated with the service graph.
VM-Series Deployment Guide Version 10.1 1010 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Cisco
CSP
You can deploy the VM-Series firewall as a network virtual service on the Cisco Cloud
Security Platform (CSP). Because the Cisco CSP is a RHEL KVM platform, the VM-
Series firewall is deployed using the VM-Series firewall for KVM base image.
With the VM-Series firewall on Cisco CSP, you can protect your workloads, prevent
advanced threats, and improve visibility into the applications on your virtual network.
1011
Set Up the VM-Series Firewall on Cisco CSP
VM-Series Deployment Guide Version 10.1 1012 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Cisco CSP
STEP 4 | Upload the VM-Series firewall qcow2 image and ISO file.
1. Select Configuration > Repository.
2. Click the plus (+) icon.
3. Click Browse and navigate to your qcow2 file.
4. Click Upload.
5. Click Browse and navigate to your ISO file.
6. Click Upload.
VM-Series Deployment Guide Version 10.1 1013 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Cisco CSP
5. Allocate the number of cores and memory required for your VM-Series firewall model.
6. Add enough vNICs to support the number of VM-Series interfaces configured in your
bootstrap ISO file.
See the Cisco Cloud Service Platform documentation for more information about creating and
deploying a service instance.
STEP 6 | After the bootstrap process is complete, log in to your VM-Series firewall using the
management IP address your specified in the bootstrap ISO file.
The firewall should be up and configure based on the parameters you defined in the bootstrap
package.
VM-Series Deployment Guide Version 10.1 1014 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco
TrustSec
Install and configure the Panorama plugin for Cisco TrustSec to retrieve the IP
addresses of endpoints in your environment and build security policy for those
endpoints using Dynamic Address Groups.
1015
Endpoint Monitoring for Cisco TrustSec
The Panorama plugin for Cisco TrustSec currently supports dynamic objects but not static
objects.
The Panorama plugin processes the endpoint information and converts it to a set of tags that you
can use as match criteria for placing IP addresses in dynamic address groups. Panorama creates
a tag for each security group tag (SGT) on your pxGrid servers. The tags are constructed in the
following format:
cts.svr_<pxgrid-server-name>.sgt_<SGT-name>
To retrieve endpoint IP-address-to-tag mapping information, you must configure a Monitoring
Definition for each pxGrid server in your environment. The pxGrid server configuration specifies
the username and password and is referenced by the monitoring definition that allows Panorama
to connect to the pxGrid. Additionally, you can configure the plugin to verify the pxGrid
server identity with a certificate profile on Panorama. It also specifies the device groups and
corresponding notify groups containing the firewalls to which Panorama pushes the tags. After
you configure the Monitoring Definition and the plugin retrieves the tags, you can create dynamic
address groups and add the tags as match criteria.
The Panorama Plugin for Cisco TrustSec version 1.0.2 and later supports Bulk Sync and PubSub
monitoring modes. The plugin selects a mode based on the Panorama version—Bulk Sync mode if
the Panorama version is earlier than 10.0.0, and PubSub mode on Panorama 10.0.0 and later. The
user interface displays the configuration options for the default monitoring mode.
• Bulk Sync
• PubSub
Bulk Sync
Bulk Sync mode uses two intervals to retrieve information from your pxGrid servers—the
monitoring interval and full-sync interval. This mode is the default when the Panorama Plugin
for Cisco TrustSec version 1.0.2 or later is installed on a Panorama version earlier than 10.0.0.
Panorama versions earlier than 10.0.0 support IP-tab updates to configd every 10 seconds.
• Monitoring interval—The monitoring interval is the amount of time that the plugin waits before
querying for changes. If no changes have occurred, the monitoring interval resets. If there are
changes, the plugin processes the changes before resetting the monitoring interval. The default
monitoring interval is 60 seconds. You can set the monitoring interval from 10 seconds to one
day (86,400 seconds).
The minimum monitoring interval is 30 seconds when the Panorama plugin for Cisco
TrustSec 1.0.0 is installed.
VM-Series Deployment Guide Version 10.1 1016 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
• Full-sync interval—The full-sync interval is the amount of time that the plugin waits before
updating the dynamic objects from all pxGrid servers regardless of any changes occurred. This
ensures that the plugin is synchronized with the pxGrid server even if a change event is missed
by the monitoring interval. You can set the full-sync interval from 600 seconds (10 minutes) to
86,400 seconds (one day). You must configure the full-sync interval from the Panorama CLI.
If the monitoring interval is greater than the full-sync interval, the full-sync interval is
ignored and a full synchronization is performed at every monitoring interval.
PubSub
PubSub mode monitors notifications directly from the Cisco ISE server (the subscription daemon),
parses for IP tags, and sends relevant information to the tag processing daemon (tag-proc).
PubSub is the default mode when the Panorama Plugin for Cisco TrustSec version 1.0.2 or later
is installed on Panorama version 10.0.0 or later. Panorama versions 10.0.0 or later support IP-tab
updates to configd every 100 milliseconds.
• Push interval—The push interval is the amount of time between pushes. If the previous push
takes too much time, the next push is triggered as soon as it finishes. The minimum push
interval is 100 milliseconds (0 seconds) and the maximum is 60 seconds. The default push
interval is 0 seconds.
• Enable Full Sync—Enable this option to trigger a complete update. If you enable full sync, you
can set the full-sync interval. Default is no.
• Full-sync interval—The full-sync interval is the amount of time that the plugin waits before
updating the dynamic objects from all pxGrid servers regardless of any changes occurred. The
default full-sync interval is 10 minutes. You can set the full-sync interval from 600 seconds
(10 minutes) to 86,400 seconds (one day). You must configure the full-sync interval from the
Panorama CLI.
• Reconnection interval—The initial reconnection interval is 1 second, and it is doubled if the
previous reconnection failed. The maximum reconnection interval is 64 sec. There is no limit to
the number of reconnection attempts.
VM-Series Deployment Guide Version 10.1 1017 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
If you have a Panorama HA configuration, repeat this installation process on each Panorama
peer. When installing the plugin on Panorama appliances in an HA pair, install the plugin on the
passive peer before the active peer. After installing the plugin on the passive peer, it will transition
to a non-functional state. Installing the plugin on the active peer returns the passive peer to a
functional state.
If you have a standalone Panorama or two Panorama appliances installed in an HA pair with
multiple plugins installed, plugins might not receive updated IP-tag information if one or more of
the plugins is not configured. This occurs because Panorama will not forward IP-tag information
to unconfigured plugins. Additionally, this issue can occur if one or more of the Panorama plugins
is not in the Registered or Success state (positive state differs on each plugin). Ensure that your
plugins are in the positive state before continuing or executing the commands described below.
If you encounter this issue, there are two workarounds:
• Uninstall the unconfigured plugin or plugins. It is recommended that you do not install a plugin
that you do not plan to configure right away
• You can use the following commands to work around this issue. Execute the following
command for each unconfigured plugin on each Panorama instance to prevent Panorama from
waiting to send updates. If you do not, your firewalls may lose some IP-tag information.
request plugins dau plugin-name <plugin-name> unblock-device-push yes
You can cancel this command by executing:
request plugins dau plugin-name <plugin-name> unblock-device-push no
The commands described are not persistent across reboots and must be used again for any
subsequent reboots. For Panorama in HA pair, the commands must be executed on each
Panorama.
STEP 1 | Select Panorama > Plugins.
STEP 2 | Click Check Now to get the latest version of the plugin.
STEP 4 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
VM-Series Deployment Guide Version 10.1 1018 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
The Panorama plugin for Cisco TrustSec currently supports dynamic objects but not static
objects.
The following configuration instructions cover both Bulk Sync and PubSub monitoring modes;
some user interface features are enabled, or visible based on the monitoring mode.
STEP 1 | Configure the full-sync interval if you want to change it from the default 600 seconds (10
minutes).
1. Log in to the Panorama CLI.
2. Enter configure mode.
admin@Panorama> configure
3. Use the following command to set the full-sync interval. The range is 600 seconds to
86,400 seconds (one day).
admin@Panorama# set plugins cisco_trustsec full-sync-interval
<interval-in-seconds>
STEP 3 | You must add the firewalls as managed devices on Panorama and create Device Groups so
that you can configure Panorama to notify these groups with the VM information it retrieves.
Device groups can include VM-Series firewalls or virtual systems on the hardware firewalls.
VM-Series Deployment Guide Version 10.1 1019 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
The plugin selects Bulk Sync mode when it is installed on a Panorama version earlier than
10.0.0:
VM-Series Deployment Guide Version 10.1 1020 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
STEP 6 | (Optional) If enabling server identity verification of the pxGrid server, configure a certificate
profile on Panorama.
STEP 7 | Create, activate, and approve the pxGrid client name and client password.
1. Log in to the Panorama CLI.
2. Execute the following command to create the client name.
• If you have a certificate profile, create the client name as follows:
admin@Panorama> request plugins cisco_trustsec create-account
client-name <client-name> host <ise-server-ip>
• If you skipped Step 6 and you do not have a certificate, enter:
request plugins cisco_trustsec create-account server-cert-
verification-enabled no client-name <client-name>host <host-
name>
3. Execute the following command to create the client name.
AccountCreate in progress...
AccountCreate successful.
client nodename: test
client password: PmVKBmPgf63Hypq
AccountActivate in progress...
AccountActivate successful.
VM-Series Deployment Guide Version 10.1 1021 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
STEP 8 | Add pxGrid server information. The Panorama plugin for Cisco TrustSec supports up to 16
pxGrid (Cisco ISE) servers.
1. Select Panorama > Cisco TrustSec > Setup > pxGrid Server.
2. Enter a descriptive Name for your pxGrid server.
3. In the Host field, enter the IP address or FQDN for your pxGrid server.
4. Enter the client name you created in the previous step.
5. Enter and confirm the client password you generated in the previous step.
6. Verify the pxGrid server identity.
1. Select Verify server certificate.
2. Select your certificate profile from the Cert Profile drop-down.
7. Click OK.
VM-Series Deployment Guide Version 10.1 1022 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
STEP 11 | Create active ISE sessions so that Panorama can learn SGT tags for dynamic address group
definition. To create active sessions, use ISE to authenticate devices.
Panorama does not collect default SGT tags on ISE.
VM-Series Deployment Guide Version 10.1 1023 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
STEP 12 | Create dynamic address groups and verify that addresses are added to dynamic address
groups.
1. Select Objects > Address Groups.
2. Select the Device Group you created for monitoring endpoints in your Cisco TrustSec
environment from the Device Group drop-down.
3. Click Add and enter a Name and Description for the dynamic address group.
The dynamic address group naming convention is: cts.svr_<server-
name>.sgt_<SGT-name>
4. Select Type as Dynamic.
5. Click Add Match Criteria.
6. Select the And or Or operator and click the plus (+) icon next to the security group name
to add it to the dynamic address group.
Panorama can only display security group tags it has learned from active sessions.
Security group tags in live sessions appear in the match criteria list.
7. Select Panorama > Objects > Address Groups.
8. Click More in the Addresses column of a dynamic address group.
Panorama displays a list of IP addresses added to that dynamic address groups based on
the match criteria you specified.
VM-Series Deployment Guide Version 10.1 1024 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
Dynamic address groups are empty until you attach them to a policy. You won’t see
any IP addresses in your dynamic address group unless a policy is using it.
STEP 14 | (Optional) Update the dynamic objects from the pxGrid server at any time by synchronizing
dynamic objects. Synchronizing dynamic objects enables you to maintain context on changes
in the virtual environment and allows you to enable applications by automatically updating
the dynamic address groups used in policy rules.
1. Select Panorama > Cisco TrustSec > Monitoring Definition.
2. Click Synchronize Dynamic Objects.
VM-Series Deployment Guide Version 10.1 1025 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
• Display counters:
Debug Commands
• Check IP addresses in dynamic address groups.
• Fetch the tags of an IP address from a server. The fetched ip-tag mappings are logged in
plugin_cisco_trustsec.log. No ip-tag mappings are pushed to the notify group
associated with the server. No retry if failed.
• Force synchronize with a server and push the mappings to the configd process. No retry if
failed.
• Force synchronize with all servers and push the mappings to the configd process. No retry if
failed.
VM-Series Deployment Guide Version 10.1 1026 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
• Force synchronize the mappings from configd process to VM-Series firewalls. No retry if failed.
Debug Logs
The logs are in the following locations on the disk:
/opt/plugins/var/log/pan/plugin_cisco_trustsec.log
/opt/plugins/var/log/pan/plugin_cisco_trustsec_sub.log
/opt/plugins/var/log/pan/plugin_cisco_trustsec_ret.log
/opt/plugins/var/log/pan/plugin_cisco_trustsec_proc.log
The size limit for a log file (shared by all plugins installed on your Panorama device) is 10 million
bytes. A log file can accept 93,000 session logins. If you configure log rotation, a backup log can
support 186,000 session logins.
• Change the plugin debug level.
• Cisco TrustSec plugin version 1.0.2 or later installed on Panorama version 10.0.0 or later:
VM-Series Deployment Guide Version 10.1 1027 ©2023 Palo Alto Networks, Inc.
Endpoint Monitoring for Cisco TrustSec
VM-Series Deployment Guide Version 10.1 1028 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on
Nutanix AHV
The VM-Series firewall for Nutanix AHV allows you to deploy the VM-Series
firewall on devices capable of running the Nutanix Acropolis Hypervisor. If you are
using Panorama to manage your VM-Series firewalls on Nutanix AHV, you can use
the Panorama plugin for Nutanix to perform VM monitoring. This allows you to
dynamically inform the firewall of changes in your Nutanix environment and ensure
that policy is applied to virtual machines as they join your network.
1029
Set Up the VM-Series Firewall on Nutanix AHV
VM Monitoring on Nutanix
Install and configure the Panorama plugin for Nutanix to monitor changes in your Nutanix
environment and build policy using dynamic address groups.
• About VM Monitoring on Nutanix
• Install the Panorama Plugin for Nutanix
• Configure the Panorama Plugin for Nutanix
In the example above, we have two categories—Dev and HR—with two values within each of
them. And these categories are within the cluster, which is within Prism Central. After you begin
monitoring your Nutanix environment, Panorama uses value, category, cluster, and Prism Central
to form tags. When you view the match criteria for dynamic address groups, the tags are listed in
the following format.
ntnx.PC-<prism-central-name>.CL-<cluster-name>.<category>.<value>
With the information in the example above, Panorama creates the following tags.
ntnx.PC-PrismCentralHQ.CL-ClusterAlpha.Dev.Engineering
ntnx.PC-PrismCentralHQ.CL-ClusterAlpha.Dev.QA
ntnx.PC-PrismCentralHQ.CL-ClusterAlpha.HR.Recruiting
VM-Series Deployment Guide Version 10.1 1030 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Nutanix AHV
ntnx.PC-PrismCentralHQ.CL-ClusterAlpha.HR.Benefits
To secure these workloads in these categories, use tags such as these as match criteria in the
dynamic address groups. You can then use the dynamic address groups as source and destination
address groups in your security policy rules. When a virtual machine joins a dynamic address
group, the policy your created is applied automatically.
STEP 5 | Select the version of the plugin and click Install in the Action column to install the plugin.
Panorama will alert you when the installation is complete.
VM-Series Deployment Guide Version 10.1 1031 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Nutanix AHV
VM-Series Deployment Guide Version 10.1 1032 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Nutanix AHV
If you return to the Nutanix Prism Central Info window after clicking OK, clicking
the Validate button returns a credential validation error message. This is the
expected behavior. Although Panorama displays dots in the password field,
the field is empty; this causes the validation to fail despite Panorama being
successfully connected to Prism Central.
8. Click OK.
VM-Series Deployment Guide Version 10.1 1033 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Nutanix AHV
STEP 7 | Verify that you can view the VM information on Panorama, and define the match criteria for
dynamic address groups.
1. Select Panorama > Objects > Address Groups and click Add.
2. Enter a descriptive Name for your dynamic address groups.
3. Select Dynamic from the Type drop-down.
4. Click Add Match Criteria. You can select dynamic tags as the match criteria to populate
the members of the group. Select the And or Or operator and select the attributes that
you would like to filter for or match against. and then click OK.
5. Commit your changes.
STEP 8 | Verify that addresses in your VMs are added to dynamic address groups.
1. Select Panorama > Objects > Address Groups.
2. Click More in the Addresses column of a dynamic address group.
Panorama displays a list of IP addresses added to that dynamic address group based on
the match criteria you specified.
VM-Series Deployment Guide Version 10.1 1034 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Nutanix AHV
VM-Series Deployment Guide Version 10.1 1035 ©2023 Palo Alto Networks, Inc.
Set Up the VM-Series Firewall on Nutanix AHV
VM-Series Deployment Guide Version 10.1 1036 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Bootstrapping allows you to create a repeatable and streamlined process of deploying
new VM-Series firewalls on your network. It allows you to create a package with the
model configuration for your network and then use that package to deploy VM-Series
firewalls anywhere.
You can bootstrap the firewall with complete configuration so that the firewall is
fully configured at startup. Alternatively, you can begin with a basic configuration—
a minimal initial configuration that enables you to boot the firewall and then register
with Panorama to complete the configuration.
If you choose the basic configuration and you are deploying on AWS, Azure, or GCP,
you can use the bootstrap package and an init-cfg.txt file. Alternatively, you can
bootstrap with user data. Instead of providing bootstrap configuration parameters in
files, you enter them as key-value pairs directly into the AWS or GCP user interface
when you launch a VM-Series firewall. Azure has a similar process with which you
provide the bootstrap parameters in a template or other text file accessed from the
Azure CLI.
If you create the bootstrap package, you deliver it from an external device (such as a
virtual disk, a virtual CD-ROM, or a cloud storage device (such as a bucket).
> Choose a Bootstrap Method > Bootstrap the VM-Series Firewall on
> VM-Series Firewall Bootstrap Azure
Workflow > Bootstrap the VM-Series Firewall on
> Bootstrap Package Azure Stack HCI
1037
Bootstrap the VM-Series Firewall
A basic configuration is a minimal configuration that enables you to launch, license, and register
the VM-Series firewall. The basic configuration does not support plugins, content, software
images, or bootstrap.xml.
After you boot the firewall you can connect with Panorama to complete the configuration, or log
in to the firewall to update content and software manually. The following table briefly contrasts
three ways you can store and access a basic configuration:
AWS Secret Manager Encrypted in AWS Secret • You need an IAM role to
Manager. create a secret. Others can
Enter configuration
be granted permission to get
parameters into the AWS
the secret.
secret manager as key-value
pairs.
VM-Series Deployment Guide Version 10.1 1038 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
See the VM-Series firewall bootstrap workflow to compare the workflow for the basic and
complete configurations.
• Basic Configuration
• Complete Configuration
Basic Configuration
A basic configuration includes the initial configuration and licenses. You can use the bootstrap
package to pass the key-value pairs for the initial configuration, or you can enter the bootstrap
parameters key-value pairs as user data.
If you do not use Panorama, you can use the initial configuration to bootstrap the firewall, then
log in and complete the configuration manually. If you use Panorama, your initial configuration
must include bootstrap parameters for the IP addresses for your Panorama servers and the
VM Auth Key so the bootstrapped firewall can register with Panorama and complete the full
configuration.
• Add a Basic Configuration to the Bootstrap Package
• Enter a Basic Configuration as User Data (Public Clouds)
• Save a Basic Configuration in the AWS Secrets Manager
VM-Series Deployment Guide Version 10.1 1039 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
You can enter configuration parameters as key-value pairs directly into the Alibaba, AWS, GCP
or OCI user interface. You can also define the configuration from a text file or a cloud-native
template, such as an AWS Cloud Formation template, Azure ARM template, a GCP YAML file, or a
Terraform template.
Each cloud has a different term for user data, and uses different separators between bootstrap
parameters.
• Alibaba Cloud User Data —Use a newline (\n) for each parameter, and if a parameter has
multiple options, use commas to separate them.
• AWS User Data—Use a semicolon or newline (\n). If a parameter has more than one option,
separate options with a comma. For example:
type=dhcp-client
hostname=palo1
panorama-server=<PANORAMA-1 IP>
panorama-server-2=<PANORAMA-2 IP>
tplname=STK-NGFW-01
dgname=DG-NGFW-01
dns-primary=169.254.169.253
dns-secondary=8.8.8.8
op-command-modes=mgmt-interface-swap
dhcp-send-hostname=yes
dhcp-send-client-id=yes
dhcp-accept-server-hostname=yes
dhcp-accept-server-domain=yes
vm-auth-key= <YOUR AUTH KEY HERE>
authcodes= <<YOUR AUTH CODE HERE>
VM-Series Deployment Guide Version 10.1 1040 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
If you choose to save your basic configuration in the AWS Secrets Manager, enter the secret
name as a key-value pair in the user data field. For example:
• Azure Custom Data—Use a semicolon. If a parameter has more than one option, separate
options with a comma. For example:
type=dhcp-client; op-command-modes=jumbo-frame;
plugin-op-commands=numa-perf-optimize:enable,set-dp-cores:30
vm-series-auto-registration-pin-id=abcdefgh1234****;
vm-series-auto-registration-pin-value=zyxwvut-0987****
• GCP Custom Metadata—In a file, such as a YAML file or Terraform template, use a newline (\n)
for each parameter, and if a parameter has multiple options, use commas to separate them. For
example:
type=dhcp-client
op-command-modes=mgmt-interface-swap,jumbo-frame
plugin-op-commands=numa-perf-optimize:enable,set-dp-cores:30
vm-series-auto-registration-pin-id=abcdefgh1234****
vm-series-auto-registration-pin-value=zyxwvut-0987****
• Oracle Cloud Infrastructure User Data—Use a newline (\n) for each parameter, and if a
parameter has multiple options, use commas to separate them.
VM-Series Deployment Guide Version 10.1 1041 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
{
"Version": "2012-10-17",
{
"Effect": "Allow",
"Action": "secretsmanager:GetSecretValue",
"Resource":
"arn:aws:secretsmanager:us-east-1:688382******:secret:My_bts-
******"
}
}
Refer to Actions, Resources, and Context Keys You Can Use in an IAM Policy or Secret Policy
for AWS Secrets Manager to see actions that require permission, such as list, get, and rotate
secret.
• (Optional) To encrypt the secret you can use the DefaultEncryptionKey from AWS Secrets
Manager.
STEP 1 | Log in to the AWS console and under Security, Identity and Compliance, select Secrets
Manager and select Store a new secret.
VM-Series Deployment Guide Version 10.1 1042 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::sn-bootstrap"
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::sn-bootstrap/*"
},
{
"Effect": "Allow",
"Action": "secretsmanager:GetSecretValue",
"Resource": "arn:aws:secretsmanager:us-
east-1:688382******:
secret:My_bootstrap"
}
VM-Series Deployment Guide Version 10.1 1043 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
]
}
2. (Optional) You can examine the secret from the command line (if you have permission).
For example:
Complete Configuration
A complete configuration ensures the firewall is fully configured on boot up. The bootstrap.xml
file includes the initial configuration, licenses, software, content, and a version of the VM-Series
plugin. You can create bootstrap.xml manually or you can export an existing configuration, as
described in Create the bootstrap.xml File.
VM-Series Deployment Guide Version 10.1 1044 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 1 | (Optional) For security reasons, you can only bootstrap a firewall when it is in factory default
state. If you want to use the bootstrap package to bootstrap a VM-Series firewall that has
been previously configured, reset the firewall to factory default settings.
VM-Series Deployment Guide Version 10.1 1045 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 3 | (Optional) If you want to use Panorama to manage the VM-Series firewalls being
bootstrapped, generate the VM auth key on Panorama. You must include this key in the
init-cfg.txt file (vm-auth-key) or enter the key-value pair as user data.
STEP 5 | If you choose the basic configuration and you plan to bootstrap with user data, skip to Step
7.
If you plan to use the basic configuration and the bootstrap package, create the init-cfg.txt file
and prepare the bootstrap package.
If you choose the complete configuration, create the bootstrap.xml file and prepare the full
bootstrap package.
STEP 6 | Prepare the bootstrap package and save the bootstrap package in the appropriate delivery
format for your hypervisor.
VM-Series Deployment Guide Version 10.1 1046 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Bootstrap Package
The bootstrap process is initiated only on first boot when the firewall is in a factory default state.
• Bootstrap Package Structure
• Bootstrap Package Delivery
You must include an auth code bundle instead of individual auth codes so that the
firewall or orchestration service can simultaneously fetch all license keys associated
with a firewall. If you use individual auth codes instead of a bundle, the firewall will
retrieve only the license key for the first auth code included in the file.
• /software folder—Contains the software images required to upgrade a newly provisioned
VM-Series firewall to the desired PAN-OS version for your network. You must include all
intermediate software versions between the current version and the final PAN-OS software
version to which you want to upgrade the VM-Series firewall. Refer to VM-Series Firewall
Hypervisor Support in the Compatibility Matrix.
• /content folder—Contains the application and threat updates, WildFire updates, and the
BrightCloud URL filtering database for the valid subscriptions on the VM-Series firewall. You
must include the minimum content versions required for the desired PAN-OS version. If you do
not have the minimum required content version associated with the PAN-OS version, the VM-
Series firewall cannot complete the software upgrade.
• /plugins folder—Optional folder contains a single VM-Series plugin image.
VM-Series Deployment Guide Version 10.1 1047 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
External Device for Bootstrapping AWS Azure ESXi Google Hyper-V KVM
(Bootstrap Package Format)
When you attach the storage device to the firewall, the firewall scans for a bootstrap package
and, if one exists, the firewall uses the settings defined in the bootstrap package.
If you have included a Panorama server IP address in the file, the firewall connects with
Panorama. If the firewall has Internet connectivity, it contacts the licensing server to update
the UUID and obtain the license keys and subscriptions. The firewall is then added as an asset
in the Palo Alto Networks Support portal. If the firewall does not have Internet connectivity, it
either uses the license keys you included in the bootstrap package, or it connects to Panorama to
retrieve the appropriate licenses and deploys them to the managed firewalls.
VM-Series Deployment Guide Version 10.1 1048 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
init-cfg.txt
Contains basic information for configuring the management interface on the firewall, such as
the IP address type (static or DHCP), IP address (IPv4 only or both IPv4 and IPv6), netmask, and
default gateway. The DNS server IP address, Panorama IP address and device group and template
stack parameters are optional.
You can use the generic name init-cfg.txt, or to be more specific, you can prepend the UUID
or Serial number of each firewall to the filename (for example: 0008C100105-init-cfg.txt).
When the firewall boots, it searches for a text file that matches its UUID or serial number and,
if none is found, it searches using the generic filename init-cfg.txt. For a sample file, see
Create the init-cfg.txt File.
bootstrap.xml
The optional bootstrap.xml file contains a complete configuration for the firewall. If you are
not using Panorama to centrally manage your firewalls, the bootstrap.xml file provides a way
to automate the process of deploying firewalls that are configured at launch.
You can define the configuration manually or export the running configuration (running-
config.xml) from an existing firewall and save the file as bootstrap.xml. If you export
bootstrap.xml file, make sure to export the XML file from a firewall deployed on the same
platform or hypervisor as your deployment. See Create the bootstrap.xml File.
VM-Series Deployment Guide Version 10.1 1049 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
For example to generate a key that is valid for 24 hrs, enter the following:
VM-Series Deployment Guide Version 10.1 1050 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 2 | Verify the validity term of the VM auth key(s) you generated on Panorama. Make sure that
the validity term allows enough time for the firewall(s) to register with Panorama.
https://<Panorama_IP_address>/api/?
type=op&cmd=<request><bootstrap><vm-auth-key><show></show></vm-
auth-key></bootstrap></request>
STEP 3 | Add the generated VM auth key to the basic configuration (init-cfg.txt) file. See Create the
init-cfg.txt File
VM-Series Deployment Guide Version 10.1 1051 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 2 | Add the basic network configuration for the management interface on the firewall.
If any of the required parameters are missing in the file, the firewall exits the bootstrap
process and boots up using the default IP address, 192.168.1.1. You can view the
system log on the firewall to detect the reason for the bootstrap failure. For errors, see
Licensing API.
There are no spaces between the key and value in each field. Do not add spaces as
they could cause failures during parsing on the mgmtsrvr side.
• To configure the management interface with a static IP address, you must specify the IP
address, type of address, default gateway, and netmask. An IPv4 address is required, IPv6
address is optional. For syntax, see Sample init-cfg.txt File.
• To configure the management interface as a DHCP client, you must specify only the type of
address. If you enable the DHCP client on the management interface, the firewall ignores
the IP address, default gateway, netmask, IPv6 address, and IPv6 default gateway values
defined in the file. For syntax, see Sample init-cfg.txt File.
When you enable DHCP on the management interface, the firewall takes the DHCP assigned
IP address and is accessible over the network. You can view the DHCP assigned IP address on
the General Information widget on the Dashboard or with the CLI command show system
info. However, the default static management IP address 192.168.1.1 is retained in the
running configuration (show config running) on the firewall. This static IP address ensures
that you can always restore connectivity to your firewall, in the event you lose DHCP access to
the firewall.
STEP 3 | Add the VM auth key to register a VM-Series firewall with Panorama.
To add a VM-Series firewall on Panorama, you must add the VM auth key that you generated
on Panorama to the basic configuration (init-cfg.txt) file. For details on generating a key,
see Generate the VM Auth Key on Panorama.
VM-Series Deployment Guide Version 10.1 1052 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 5 | (Recommended) Add the VM-Series registration pin and value for installing the device
certificate.
If you want to install the device certificate on the VM-Series firewall at launch, you must
generate the VM-Series registration pin ID and value on the CSP and include it in the init-
cfg.txt file. This pin and value also applies any site licenses that use the PAYG license.
Field Description
ip-address= IPv4 address. This field is ignored if the type is dhcp-client. If the type
is static, an IPv4 address is required; the ipv6-address field is optional
and can be included.
You cannot specify the management IP address and netmask
configuration for the VM-Series firewall in AWS and Azure. If defined,
the firewall ignores the values you specify.
default-gateway= IPv4 default gateway for the management interface. This field is
ignored if the type is dhcp-client. If the type is static, and ip-address is
used, this field is required.
netmask= IPv4 netmask. This field is ignored if the type is dhcp-client. If the
type is static, and ip-address is used, this field is required.
VM-Series Deployment Guide Version 10.1 1053 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Field Description
ipv6-default-gateway= IPv6 default gateway for the management interface. This field is
ignored if the type is dhcp-client. If the type is static and ipv6-address
is used, this field is required.
panorama-server= IPv4 or IPv6 address of the primary Panorama server. This field is not
required but recommended for centrally managing your firewalls.
panorama-server-2= IPv4 or IPv6 address of the secondary Panorama server. This field is
not required but recommended.
cgname= Panorama collector group name. If you want to bootstrap the firewall
to send logs to a Panorama collector group, you must first configure
a collector group on Panorama and then configure the firewall to
forward logs to Panorama.
On the M-Series appliances, a default Collector Group is predefined
and already contains the local Log Collector as a member. On the
Panorama virtual appliance, you must add the Collector Group and
add the local Log Collector as a member.
vm-auth-key= Virtual machine authentication key for Panorama (see Generate the
VM Auth Key on Panorama). This field is ignored when bootstrapping
hardware firewalls.
VM-Series Deployment Guide Version 10.1 1054 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Field Description
• jumbo-frame—Enables the default MTU size for all Layer 3
interfaces to be set at 9192 bytes.
• mgmt-interface-swap—(VM-Series firewall on AWS, Google,
ESXi, and KVM only) Allows you to swap the management
interface (MGT) with the dataplane interface (ethernet 1/1) when
deploying the firewall. For details, see
• Management Interface Mapping for Use with Amazon ELB
• Management Interface Swap for Google Cloud Platform Load
Balancing
• Use the VM-Series CLI to Swap the Management Interface on
ESXi
• Use the VM-Series CLI to Swap the Management Interface on
KVM
op-cmd-dpdk-pkt-io= The value on or off allows you to enable or disable Data Plane
Development Kit (DPDK) in environments where the firewall supports
DPDK. DPDK allows the host to process packets faster by bypassing
the Linux kernel; interactions with the NIC are performed using
drivers and the DPDK libraries.
VM-Series Deployment Guide Version 10.1 1055 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Field Description
• plugin-op-commands=set-cores:<number-of-cores>—
specify the number of vCPUs that are licensed when using
Software NGFW credits instead of licensing all the vCPUs available
on your chosen compute instance. For more information, see Set
the Number of Licensed vCPUs.
• numa-perf-optimize:enable—enables NUMA performance
optimization on the VM-Series firewall with VM-Series plugin
2.1.2 or later installed. For more information, see Enable NUMA
Performance Optimization on the VM-Series.
dhcp-send-hostname= The value of yes or no comes from the DHCP server. If yes, the
firewall will send its hostname to the DHCP server. This field is
relevant only if type is dhcp-client.
dhcp-send-client-id= The value of yes or no comes from the DHCP server. If yes, the
firewall will send its client ID to the DHCP server. This field is
relevant only if type is dhcp-client.
dhcp-accept-server- The value of yes or no comes from the DHCP server. If yes, the
hostname= firewall will accept its hostname from the DHCP server. This field is
relevant only if type is dhcp-client.
dhcp-accept-server- The value of yes or no comes from the DHCP server. If yes, the
domain= firewall will accept its DNS server from the DHCP server. This field is
relevant only if type is dhcp-client.
vm-series-auto- The VM-Series registration PIN ID and value for installing the device
registration-pin-id certificate on the VM-Series firewall. The PIN ID and value also
enable you to automatically activate the site licenses for AutoFocus
and
and Cortex Data Lake on PAYG instances of the firewall.
vm-series-auto-
You must generate this in registration PIN ID and value on the Palo
registration-pin-value
Alto Networks CSP. See Install a Device Certificate on the VM-Series
Firewall for information on generating PIN ID and value.
Sample init-cfg.txt file (Static IP Address) Sample init-cfg.txt file (DHCP Client)
type=static type=dhcp-client
ip-address=10.*.*.19 ip-address=
default-gateway=10.*.*.1 default-gateway=
VM-Series Deployment Guide Version 10.1 1056 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Sample init-cfg.txt file (Static IP Address) Sample init-cfg.txt file (DHCP Client)
netmask=255.255.255.0 netmask=
ipv6-address=2001:400:f00::1/64 ipv6-address=
ipv6-default-gateway=2001:400:f00::2* ipv6-default-gateway=
hostname=Ca-FW-DC1 hostname=Ca-FW-DC1
vm-auth-key=7550362253**** vm-auth-key=7550362253****
panorama-server=10.*.*.20 panorama-server=10.*.*.20
panorama-server-2=10.*.*.21 panorama-server-2=10.*.*.21
tplname=FINANCE_TG4 tplname=FINANCE_TG4
dgname=finance_dg dgname=finance_dg
dns-primary=10.5.6.6 dns-primary=10.5.6.6
dns-secondary=10.5.6.7 dns-secondary=10.5.6.7
op-command-modes=jumbo-frame,mgmt- op-command-modes=jumbo-frame,mgmt-
interface-swap** interface-swap**
op-cmd-dpdk-pkt-io=*** op-cmd-dpdk-pkt-io=***
plugin-op-commands= plugin-op-commands=
dhcp-send-hostname=no dhcp-send-hostname=yes
dhcp-send-client-id=no dhcp-send-client-id=yes
dhcp-accept-server-hostname=no dhcp-accept-server-hostname=yes
dhcp-accept-server-domain=no dhcp-accept-server-domain=yes
vm-series-auto-registration-pin- vm-series-auto-registration-pin-
id=abcdefgh1234**** id=abcdefgh1234****
vm-series-auto-registration-pin- vm-series-auto-registration-pin-
value=zyxwvut-0987**** value=zyxwvut-0987****
VM-Series Deployment Guide Version 10.1 1057 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
You cannot specify the management IP address and netmask configuration for the VM-
Series firewall on AWS. If defined, the firewall ignores the values you specify because AWS
uses a back-end metadata file to assign the management IP address and netmask.
*The IPv6 default gateway is required if you include an IPv6 address.
**The mgmt-interface-swap operational command pertains only to a VM-Series
firewall on AWS or GCP.
***The op-cmd-dpdk-pkt-io=off is for disabling DPDK on the VM-Series firewall on
ESXi, KVM, and GCP (DPDK is enabled by default).
**** The vm-series-auto-registration-pin-id and vm-series-auto-
registration-pin-value are required for two use cases:
• Activation of site licenses—AutoFocus or Cortex Data Lake—with Pay-As-You-Go
(PAYG) license options of the VM-Series firewall.
• Retrieve and install the device certificate on the VM-Series firewall.
VM-Series Deployment Guide Version 10.1 1058 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1059 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
For a custom script or an orchestration service that can access the Internet on behalf of
firewalls.
The script or service must fetch the CPU ID and the UUID from the hypervisor on which the
firewall is deployed and access the Palo Alto Networks Support portal with CPU ID, UUID, API
key and the auth code to obtain the required keys. See Licensing API.
VM-Series Deployment Guide Version 10.1 1060 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
/config
/content
/software
/license
/plugins
You can leave a folder empty, but you must have /config, /license, /software, and /
content folders. The /plugins folder is optional, and only required if you are upgrading the
VM-Series plugin independent of a PAN-OS release.
Do not place any other files or folders in the bootstrap structure. Adding other files or folders
will result in a bootstrapping failure.
/my-storage
/my-firewalls
/internal /external
/config /config
/content /content
/license /license
/plugins /plugins
/software /software
/config
0008C100105-init-cfg.txt
0008C100107-init-cfg.txt
bootstrap.xml
VM-Series Deployment Guide Version 10.1 1061 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
/content
panupv2-all-contents-488-2590
panup-all-antivirus-1494-1969
panup-all-wildfire-54746-61460
/software
PanOS_vm-10.0.0
/license
authcodes
0001A100110-url3.key
0001A100110-threats.key
0001A100110-url3-wildfire.key
/plugins
vm_series-2.0.2
• If you save the keys to the license folder, you can use a file naming convention
that works for you, but keep the .key extension in the filename. For auth codes,
create a text file named authcodes (without a file extension), add your auth
codes to that file, and save it to the license folder.
• Use an auth code bundle instead of individual auth codes so that the firewall or
orchestration service can simultaneously fetch all license keys associated with
a firewall. If you use individual auth codes instead of a bundle, the firewall will
retrieve only the license key for the first auth code included in the file.
• In the /plugins folder, supply only one VM-Series plugin binary. Do not supply
multiple plugin versions.
VM-Series Deployment Guide Version 10.1 1062 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["s3:ListBucket"],
"Resource": ["arn:aws:s3:::<bucketname>"]
},
{
"Effect": "Allow",
"Action": ["s3:GetObject"],
"Resource": ["arn:aws:s3:::<bucketname>/*"]
}
]
VM-Series Deployment Guide Version 10.1 1063 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
3. Create the folders within the S3 bucket as described in Prepare the Bootstrap Package.
• Create the structure directly in your S3 bucket.
• (Optional) Add content within each folder. You can leave a folder empty, but you
must have all the \config, \content, \license, and \software folders. The \plugins
folder is optional.
If you have enabled logging in Amazon S3, a Logs folder is automatically created
in the S3 bucket. The Logs folder helps troubleshoot issues with access to the S3
bucket.
STEP 3 | Launch the VM-Series firewall on AWS. Choose one of the following.
• init-cfg.txt—If you are using a file to configure the firewall, attach the IAM role you
created in Step 2.1, expand the Advanced Details section, and in the User Data field,
specify the path to an S3 bucket, directory, or subdirectory. For example,
vmseries-bootstrap-aws-s3bucket=<bucketname>
or
vmseries-bootstrap-aws-s3bucket=<bucketname/directoryname>
• User Data—If you are using user data to configure the firewall, expand the Advanced
Details section and in the User Data field enter the initial bootstrap parameters as
described in Enter a Basic Configuration as User Data (Public Clouds).
• AWS Secrets Manager—If you stored your basic configuration as described in Save a Basic
Configuration in the AWS Secrets Manager, expand the Advanced Details section and
VM-Series Deployment Guide Version 10.1 1064 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
in the User Data field choose As text and enter the secret name as a key-value pair. For
example:
Select Review and Launch. For more details, see Launch the VM-Series firewall on AWS.
VM-Series Deployment Guide Version 10.1 1065 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 4 | Verify Bootstrap Completion. Select the firewall instance on the AWS Management console
and choose Actions > Instance Settings > Get Instance Screenshot.
• The screenshot shows bootstrapping in progress. A successful bootstrap is shown below:
• If you are using an S3 bucket and the S3 bucket does not have the correct permissions or
you do not have all four folders in the S3 bucket, you see the following error message:
VM-Series Deployment Guide Version 10.1 1066 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1067 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
following screenshot, you can see that the config folder has the init-cfg.txt
file uploaded to it.
VM-Series Deployment Guide Version 10.1 1068 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 3 | Deploy the VM-Series Firewall from the Azure Marketplace (Solution Template).
• If you are using a file to configure the firewall, continue to Step 3.1
• If you are using custom data to configure the firewall, continue to Step 3.2.
1. If you choose to use the bootstrap package, select Enable Bootstrap: Yes and provide
the information required to access the file share that holds the bootstrap files.
1. Storage Account Name— This is the Azure storage account in which you created the
file share for the bootstrap folders.
2. Storage Account Access Key—The firewall needs this access key to authenticate to
the storage account and access the files stored within. To copy this access key, select
the storage account name, and then select Settings > Access Keys.
VM-Series Deployment Guide Version 10.1 1069 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
type=dhcp-client; op-command-modes=jumbo-frame;
vm-series-auto-registration-pin-id=abcdefgh1234****;
vm-series-auto-registration-pin-value=zyxwvut-0987****
Provide custom data using one of the methods in Custom data and Cloud-Init on Azure
Virtual Machines.
VM-Series Deployment Guide Version 10.1 1070 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1071 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1072 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1073 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 3 | Go to Disks.
VM-Series Deployment Guide Version 10.1 1074 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1075 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1076 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1077 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1078 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
You can use an existing virtual hard disk or ISO image file.
VM-Series Deployment Guide Version 10.1 1079 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1080 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
For more information on steps to bootstrap the VM-Series firewall on Azure Stack HCI, see
Bootstrap the VM-Series Firewall on Hyper-V with an ISO.
If IDE Controller 0 is at location 0, the bootstrap ISO must be under IDE Controller 0 at
location 1
VM-Series Deployment Guide Version 10.1 1081 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1082 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 1 | Create the bootstrap package and the virtual hard disk.
1. Create the bootstrap package.
2. Deploy a Linux virtual machine.
3. On the Linux machine, Prepare the Bootstrap Package. You can leave the folder empty,
but you must have all four folders.
4. Attach a new data disk less than 39 GB to the Linux virtual machine.
5. Partition the disk and format the file system as ext3.
6. Make a directory for the new file system and mount the disk to the Linux virtual
machine.
7. Copy the contents of your bootstrap package to the disk.
8. Unmount the disk.
9. Detach the disk from the Linux virtual machine. Take note of the Disk File describing
the bootstrap disk you created; it shows the datastore name and path to the disk.
Additionally, do not check the Delete Files From Datastore check box; doing so deletes
the disk.
VM-Series Deployment Guide Version 10.1 1083 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
6. (Optional) If you created an init-cfg.txt file, open the config folder. Click Upload
Files, browse to select your init-cfg.txt file, and click Open.
7. Open the license folder and upload the authcodes file.
8. Continue until you have uploaded all the bootstrap files.
VM-Series Deployment Guide Version 10.1 1084 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 4 | Add the initial configuration parameters as metadata. Add each key-value pair as described in
Enter a Basic Configuration as User Data (Public Clouds).
STEP 5 | See Deploy the VM-Series Firewall from Google Cloud Platform Marketplace for deployment
details.
VM-Series Deployment Guide Version 10.1 1085 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
If you have more than one DVD drive, the ISO image must be applied to the first
drive.
3. Under Media, click the Image file radio button.
4. Click Browse and select your uploaded ISO image.
5. Click Apply and Ok to exit the virtual machine settings.
6. Power on the firewall. The firewall will begin with the bootstrapping process, which will
take several minutes. The status messages on the success or failure of the process will
display on the console.
7. Verify Bootstrap Completion.
VM-Series Deployment Guide Version 10.1 1086 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 1 | Create the bootstrap package and the virtual hard disk.
1. Deploy a Linux virtual machine.
2. On the Linux machine, Prepare the Bootstrap Package. You can leave the folder empty,
but you must have all four folders.
3. Attach a new data disk less than 39 GB to the Linux virtual machine.
1. Power of the Linux virtual machine.
2. In Hyper-V, select the Linux virtual machine from the Virtual Machines list.
3. Select Settings > Hardware > IDE Controller.
4. Select Hard Drive and click Add.
5. Select Virtual Hard Disk and click New.
6. Follow the on-screen instructions to create a new VHD. Note the name and path of
the new VHD.
7. Click Apply then OK to exit the virtual machine settings.
8. Power on the Linux virtual machine.
4. Connect to the CLI of the Linux virtual machine.
5. Partition the disk and format the file system as ext3.
6. Make a directory for the new file system and mount the disk to the Linux virtual
machine.
7. Copy the contents of your bootstrap package to the disk.
8. Unmount the disk.
9. Detach the disk from the Linux virtual machine.
1. Power of the Linux virtual machine.
2. Select the Linux virtual machine from the Virtual Machines list.
3. Select Settings > Hardware > IDE Controller.
4. Select the VHD you created.
5. Click Remove. This detaches the VHD but does not delete it.
VM-Series Deployment Guide Version 10.1 1087 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1088 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
VM-Series Deployment Guide Version 10.1 1089 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 1 | Create the bootstrap package and the virtual hard disk.
1. Create the bootstrap package.
2. Create a new disk image less than 39 GB in size and partition the disk and format the
file system as ext3. The tools used to complete this process vary based on your client
operating system.
3. Mount the disk image file and copy the prepared bootstrap package to the disk image
files.
4. Copy the contents of your bootstrap package to the disk.
5. Unmount the disk image.
6. Upload the disk image file to a location accessible to the KVM host.
VM-Series Deployment Guide Version 10.1 1090 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 5 | Create a Dynamic Group to define the permissions needed to allow the VM-Series firewalls
to access the object storage bucket.
STEP 6 | Define the policy statements so your VM-Series firewall can access the bootstrap files.
Your policy must include the following statements.
STEP 7 | Create folders in your previously created object storage bucket. This folder structure must
match the structure of the bootstrap package. You can create the folder structure directly in
VM-Series Deployment Guide Version 10.1 1091 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
the storage bucket or, if you have multiple bootstrap packages, you can create a subfolder
for each one. Each subfolder must follow the structure of bootstrap package folders.
vmseries-bootstrap-oci-bucket=<bucket-name>
If your storage bucket has bootstrap packages in individual folders, use the following.
vmseries-bootstrap-oci-bucket=<bucket-name>/<folder-name>
VM-Series Deployment Guide Version 10.1 1092 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
STEP 2 | Verify the general system settings and configuration. Access the web interface and select
Dashboard > Widgets > System or use the CLI operational commands show system info
and showconfig running.
STEP 3 | Verify the license installation. Select Device > Licenses or use the CLI operational command
request license info.
STEP 4 | If you have Panorama configured, manage the content versions and software versions
from Panorama. If you do not have Panorama configured, use the web interface to manage
content versions and software versions.
VM-Series Deployment Guide Version 10.1 1093 ©2023 Palo Alto Networks, Inc.
Bootstrap the VM-Series Firewall
Bootstrap Errors
If you receive an error message during the bootstrapping process, refer to the following table for
details.
Boot image error (high) • No external device was detected with the bootstrap package.
Or
• A critical error happened while booting from the image on the
external device. The bootstrap process was aborted.
No bootstrap config file The external device did not have the bootstrap configuration file.
on external device (high)
Failed to install license The license key could not be applied. This error indicates that the
key for file <license- license key used was invalid. The output includes the name of
key-filename> (high) the license key that could not be applied.
Failed to install license The license auth code could not be applied. This error indicates
key using authcode that the license auth code used was invalid. The output includes
<authcode> (high) the name of the authcode that could not be applied.
Failed content update The content updates were not successfully applied.
commits (high)
USB media prepared The bootstrap image has been successfully complied on the USB
successfully using given flash device. <username>: Successfully prepared the USB using
bundle (informational) bundle <bundlename>
Successful bootstrap The firewall was successfully provisioned with the bootstrap
(informational) configuration file. The output includes the license keys installed
and the filename of the bootstrap configuration. On the VM-
Series firewalls only, the PAN-OS version and content update
version are also displayed.
Read about the Bootstrap Package and how to Prepare the Bootstrap Package.
VM-Series Deployment Guide Version 10.1 1094 ©2023 Palo Alto Networks, Inc.