<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article CN-Series Part 1: What is CN-Series? in CN-Series Articles</title>
    <link>https://live.paloaltonetworks.com/t5/cn-series-articles/cn-series-part-1-what-is-cn-series/ta-p/422659</link>
    <description>&lt;P data-unlink="true"&gt;&lt;SPAN style="font-weight: 400;"&gt;In my &lt;/SPAN&gt;&lt;SPAN style="font-weight: 400;"&gt;previous article,&lt;/SPAN&gt;&lt;SPAN style="font-weight: 400;"&gt;&amp;nbsp;"&lt;A href="https://live.paloaltonetworks.com/t5/cn-series-articles/why-did-we-build-the-cn-series/ta-p/415268" target="_self"&gt;Why Did We Build the CN-Series?&lt;/A&gt;," we discussed the &lt;EM&gt;why &lt;/EM&gt;behind the development of the CN-Series in a world where&amp;nbsp;cloud-native adoption and containerized applications are on the rise.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN style="font-weight: 400;"&gt;Now, we're going to go over what a&amp;nbsp;CN-Series firewall actually does, its functions, and how it can help NetSec teams secure Kubernetes workloads.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;&lt;A href="https://www.paloaltonetworks.com/network-security/cn-series" target="_self"&gt;CN-Series Container Firewalls for Kubernetes&lt;/A&gt;&amp;nbsp;deliver all of our PA-Series (hardware NGFW) and VM-Series (software) firewalls’ capabilities in a container form factor. You can deploy our cloud-delivered security services on top of the CN-Series firewalls, just like our other firewall form factors. This solution gives you the ability to deploy Layer 7 network security and threat protection in your Kubernetes clusters for advanced protection and compliance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;CN-Series has been deeply integrated with Kubernetes for complete visibility and context and ensures that the firewall is automatable and scalable to accommodate DevOps workflows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;So what exactly do you get with CN-Series?&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Specifically, CN-Series provides customers with visibility and control over their Kubernetes traffic. You will gain a contextual understanding of Kubernetes constructs, like namespaces and tags, to define security policies.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;CN-Series also provides deeper traffic visibility than any other firewall form factor. For instance, it can overcome the challenge to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-weight: 400;"&gt;identify the specific pod that traffic originates from, as we&amp;nbsp;discussed in my&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/cn-series-articles/why-did-we-build-the-cn-series/ta-p/415268" target="_self"&gt;previous article on the CN-Series&lt;/A&gt;. It means that you can write security policies more granularly—at the application-level rather than at the cluster-level.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;CN-Series firewalls are managed in Panorama, using the new Kubernetes plugin. A consistent management solution to incorporate Kubernetes context into integrated policies, which provide broader network security posture.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;As I mentioned before, the deep integration we’ve built between CN-Series and Kubernetes ensures that the firewalls can be deployed and configured seamlessly as part of your DevOps team’s workflow. For those of you using Helm to manage your Kubernetes deployments, we’ve built a &lt;/SPAN&gt;&lt;A href="https://github.com/paloaltonetworks/cn-series-helm" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;Helm chart&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-weight: 400;"&gt; for CN-Series.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN style="font-weight: 400;"&gt;Here is a &lt;/SPAN&gt;&lt;A href="https://www.youtube.com/watch?v=IqUUfRfAiSw" target="_self"&gt;&lt;SPAN style="font-weight: 400;"&gt;quick demonstration&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-weight: 400;"&gt;&lt;A href="https://www.youtube.com/watch?v=IqUUfRfAiSw" target="_self"&gt;&amp;nbsp;of how to deploy CN-Series via Helm Charts&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN style="font-weight: 400;"&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FIqUUfRfAiSw%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DIqUUfRfAiSw&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FIqUUfRfAiSw%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="338" scrolling="no" title="Deploying CN-Series Container Firewall Using HELM Charts" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;STRONG&gt;CN-Series —&amp;nbsp;Distributed deployment mode in PANOS 10.0&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;In our PANOS 10.0 release, you have a CN-Series firewall deployed on each node as a Daemon set within your K8S environment to provide maximum visibility and control.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="CN-Series deployment" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/35288iC544751D8A82711E/image-size/large?v=v2&amp;amp;px=999" role="button" title="rapatil_0-1627478401043.png" alt="CN-Series deployment" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;CN-Series deployment&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Technically, the firewalls deploy two sets of pods: one for the management plane (CN-MGMT) and another for the firewall data plane (CN-NGFW). The firewall data plane runs as a daemon set, and the management plane simply runs as a Kubernetes service.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Of course, we also have Panorama represented here since that’s where CN-Series is managed from. The plugin is continually pulling information from Kubernetes and feeding it into Panorama.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;&amp;nbsp;What’s new in PANOS 10.1 for CN-Series?&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Starting with the PANOS 10.1 release, Palo Alto Networks adds a new fw-as-a-k8s-service deployment mode to augment the fw-as-a-daemon-set mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;With CN-Series NGFW running as a k8s service, customers will no longer need to deploy the CN-NGFW on every application node. Instead, you can have dedicated nodes (let’s call them Security nodes ) on which all CN-NGFW firewalls will be deployed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Traffic redirection between Application Pods and CN-NGFW happens via secure VXLAN encapsulation.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CN-Series cluster mode" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/35289i109B775933827763/image-size/large?v=v2&amp;amp;px=999" role="button" title="rapatil_1-1627478401045.png" alt="CN-Series cluster mode" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;CN-Series cluster mode&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;When to go for Daemon set vs. K8s Service deployment?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Daemon set deployment mode needs at least one CPU core and 2G memory per CN-NGFW firewall per node. So, customers with a large footprint and/or high firewall-capacity demands will go for Daemon set deployment for compliance and risk mitigation use cases.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-weight: 400;"&gt;However, the second set of customers with smaller nodes and/or small firewall capacity needs and looking for securing a subset (e.g. database traffic) through CN-Series firewalls will most likely adopt the CN-Series as a k8s service mode (PANOS 10.1) or Cluster mode deployment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;These customers would like to start small (limited firewall capacity with minimum resource needs) and dynamically increase/decrease the firewall capacity as the need changes while minimizing the disruption to the traffic. These customers will benefit from having the ability to run firewall as a shared k8s service, just like any other k8s application, where they could start with 1 or 2 pods and automatically scale the number of firewall pods up/down when the traffic is going through the firewall service increases/decreases.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;CN-Series Autoscaling with Horizontal Pod Autoscaler (&lt;/STRONG&gt;&lt;A href="https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;HPA&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;) feature&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Starting with the 10.1 release, CN-Series in cluster mode will also support the auto-scaling functionality based on standard or custom metrics.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-weight: 400;"&gt;For the standard metrics, customers can scale their Management Pods and the Dataplane Pods based on average CPU or memory utilization across all Pods.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;I hope I was able to provide enough information on CN-Series to get you started. In my third and final article, I’ll go over some of the primary use-cases of CN-Series.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Find more information, visit Palo Alto Networks' page on&amp;nbsp;&lt;SPAN style="font-weight: 400;"&gt;&lt;STRONG&gt;&lt;A href="https://www.paloaltonetworks.com/network-security/cn-series" target="_self"&gt;CN-Series Container Firewalls for Kubernetes&lt;/A&gt;.&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Aug 2021 15:20:54 GMT</pubDate>
    <dc:creator>rapatil</dc:creator>
    <dc:date>2021-08-05T15:20:54Z</dc:date>
    <item>
      <title>CN-Series Part 1: What is CN-Series?</title>
      <link>https://live.paloaltonetworks.com/t5/cn-series-articles/cn-series-part-1-what-is-cn-series/ta-p/422659</link>
      <description>&lt;P&gt;Learn how Palo Alto Networks'&amp;nbsp;CN-Series firewall helps Network Security teams secure Kubernetes workloads.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 15:20:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cn-series-articles/cn-series-part-1-what-is-cn-series/ta-p/422659</guid>
      <dc:creator>rapatil</dc:creator>
      <dc:date>2021-08-05T15:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: CN-Series Part 1: What is CN-Series?</title>
      <link>https://live.paloaltonetworks.com/t5/cn-series-articles/cn-series-part-1-what-is-cn-series/tac-p/452090#M7</link>
      <description>&lt;P&gt;Loved it. Much need firewall at container&amp;nbsp; level.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 13:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cn-series-articles/cn-series-part-1-what-is-cn-series/tac-p/452090#M7</guid>
      <dc:creator>SachinIvanti</dc:creator>
      <dc:date>2021-12-08T13:38:24Z</dc:date>
    </item>
  </channel>
</rss>

