<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Deploying VM-Series on ESXi in Layer 3 Mode in GlobalProtect Articles</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/deploying-vm-series-on-esxi-in-layer-3-mode/ta-p/332043</link>
    <description>&lt;P class="lia-message-template-content-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Deploying VM-Series on ESXi in Layer 3 Mode.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26118i9C01BF86C1EFE42D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Deploying VM-Series on ESXi in Layer 3 Mode.png" alt="Deploying VM-Series on ESXi in Layer 3 Mode.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Palo Alto Networks shares key details about deploying VM-Series Next-Generation Firewall on the ESXi in Layer 3 Mode. Learn more about the requirements, Creating the Network Topology, VM-Series Layer 3 Configuration, and more.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Deploying the VM-Series on ESXi in Layer 3 Mode&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All virtual machines on the ESXi hosts will be segregated from each other on the network by the VM-Series next-generation firewall by IP addressing and Layer 3 gateways. The basis for this design is to provide maximum resiliency with regards to VM-Series HA placement, guest VM protection, and the inherent networking capabilities of the ESXi hypervisor and virtual switching. This technote will cover a multiple ESXi host environment showcasing east/west traffic separation to demonstrate the Layer 3 capabilities of the VM-Series next-generation firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Topology&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;A highly available Active/Passive pair of VM-Series next-generation firewalls are positioned between the physical datacenter network and Guest VM workloads. A single Distributed vSwitch will be used in this example topology. Port Groups are used to segregate traffic between the untrusted side and the trusted side of the firewall. Layer 3 interfaces will be used to provide untrust/trust boundaries on the firewall as well as provide for default IP gateway reachability for the entire subnet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Diagram of uplink ports and Layer 3 HA untrust/trust zone deployment" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26117i90CE9F783E888F27/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Uplink ports and Layer 3 HA.png" alt="Diagram of uplink ports and Layer 3 HA untrust/trust zone deployment" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Diagram of uplink ports and Layer 3 HA untrust/trust zone deployment&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG style="color: inherit; font-family: inherit; font-size: 24px;"&gt;Requirements&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This design was validated with ESXi version 6.7u3, vCenter version 6.7, VM-Series PAN-OS version 9.1.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Creating the Network Topology&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;We often make virtual networking more complicated than it needs to be. ESXi virtual switches work on similar principles as physical network switches. Don’t overcomplicate it. The same principles that you would use to deploy our firewall in a physical Layer 2/3 networking environment is the same methodology that you would use to deploy the VM-Series in a virtualized environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Building the ESXi network topology is a crucial part of any Layer 3 design. Distributed vSwitches by themselves do not necessarily segregate traffic between port groups. The default configuration of a vSwitch, the initial port group configuration, and the vSwitch uplinks create a flat Layer 2 network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a misconception about what port groups are. Port groups are simply a collection of virtual ports that share a common configuration set. A port group is not a VLAN. There are many attributes that can be configured under a port group and the VLAN ID is one of those attributes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This design calls for only a couple of port groups to be configured on the vSwitch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;A single vSwitch was created - tswitch1&lt;/LI&gt;
&lt;LI&gt;2 port groups for the firewall and VM guests
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;untrust (connected to IP Gateway)&lt;/LI&gt;
&lt;LI&gt;trust (for L3 guest: Ubuntu Web &amp;amp; App)&lt;/LI&gt;
&lt;LI&gt;uplink ports, tswitch1-DVUplinks, connect this vSwitch to the physical network switches&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Uplink ports: tswitch1_vDS uplinks" style="width: 213px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26092i8F696AEABF82BA74/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="uplink ports tswitch1 vDS uplinks.png" alt="Uplink ports: tswitch1_vDS uplinks" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Uplink ports: tswitch1_vDS uplinks&lt;/span&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The following image shows the two (distributed) port groups assigned to the VM-Series:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Layer 3 based (distributed) port group: untrust/unprotected zone" style="width: 384px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26093iCBF2A4579C6177D3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Layer 3 based distributed port group untrust unprotected zone.png" alt="Layer 3 based (distributed) port group: untrust/unprotected zone" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Layer 3 based (distributed) port group: untrust/unprotected zone&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Layer 3 based (distributed) port group: trust/protected zone" style="width: 374px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26094i5E9216EA879E641B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Layer 3 based distributed port group trust protected zone.png" alt="Layer 3 based (distributed) port group: trust/protected zone" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Layer 3 based (distributed) port group: trust/protected zone&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG style="font-family: inherit;"&gt;Assign Port Groups to VM-Series&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;VM-Series Firewalls are assigned to the firewall port groups. Network Adapter 1 is used for the firewall’s management interface. Network Adapter 2 is used for the untrusted side of the firewall. Network Adapter 3 is used for the trusted side of the firewall.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="View of primary VM-300 VM hardware summary" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26095iF6FA3182EEF66681/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="View of primary VM 300 VM hardware summary.png" alt="View of primary VM-300 VM hardware summary" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of primary VM-300 VM hardware summary&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The guest machines are assigned to their respective port-groups.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Layer 3 guest-a (Web) VM hardware summary" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26096iDE92DC2AF987755E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Layer 3 guest A Web VM hardware summary.png" alt="Layer 3 guest-a (Web) VM hardware summary" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Layer 3 guest-a (Web) VM hardware summary&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Layer 3 guest-b (App) VM hardware summary" style="width: 511px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26097iF134C39285EF2CB8/image-dimensions/511x378/is-moderation-mode/true?v=v2" width="511" height="378" role="button" title="Layer 3 guest B App VM hardware summary.png" alt="Layer 3 guest-b (App) VM hardware summary" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Layer 3 guest-b (App) VM hardware summary&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;VM-Series Layer 3 Configuration&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;This section covers the VM-Series next-generation firewall network configuration. All configuration is completed in the PAN-OS web interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Zones&lt;/H3&gt;
&lt;P&gt;Two zones were used in this example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Firewall web interface - Zones: Layer 3" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26098i3CD1CA05464DB937/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Firewall UI zones Layer 3.png" alt="Firewall web interface - Zones: Layer 3" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Firewall web interface - Zones: Layer 3&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN style="font-family: inherit;"&gt;Virtual-Routers&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;For this technote, two virtual routers were employed: both the default virtual router (VR) and a separately configured VR representing an internal trusted network boundary. A VR is a function of the firewall that participates in Layer 3 routing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;The firewall uses virtual routers to obtain routes to other subnets by either manually defining static routes or through participation in one or more Layer 3 routing protocols (dynamic routes). The routes that the firewall obtains through these methods populate the IP routing information base (RIB) on the firewall. When a packet is destined for a different subnet than the one it arrived on, the virtual router obtains the best route from the RIB, places it in the forwarding information base (FIB), and forwards the packet to the next hop router defined in the FIB. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;In addition to routing to other network devices, virtual routers can route to other virtual routers within the same firewall if a next hop is specified to point to another virtual router as illustrated below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Simple VR overview and configuration illustration" style="width: 557px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26099i99A7555BA4F29B4C/image-dimensions/557x299/is-moderation-mode/true?v=v2" width="557" height="299" role="button" title="Simple VR overview and configuration.png" alt="Simple VR overview and configuration illustration" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Simple VR overview and configuration illustration&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;In a Layer 3 deployment, the firewall routes traffic between multiple ports. This deployment requires that you assign an IP address to each interface and configure &lt;A title="Virtual Routers | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/virtual-routers.html" target="_blank" rel="noopener"&gt;&lt;FONT color="#FA582D"&gt;Virtual Routers&lt;/FONT&gt;&lt;/A&gt; to rout the traffic. Choose this option when routing is required.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Alternate VR creation" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26100iDDE66A23413F0B30/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Alternate VR creation.png" alt="Alternate VR creation" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Alternate VR creation&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Default virtual router static routes (&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; &lt;EM&gt;next-vr next-hop) :&lt;/EM&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Default VR and inter-VR next-hop route configuration" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26101iB71CB20573AE9D95/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="default VR and inter VR next hop route configuration.png" alt="Default VR and inter-VR next-hop route configuration" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Default VR and inter-VR next-hop route configuration&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN style="font-family: inherit;"&gt;Default virtual router static route table (&lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;NOTE:&lt;/STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt; next-vr next-hop) :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Default VR route table" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26102i0111E6BC18E04618/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Default VR route table illustration.png" alt="Default VR route table" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Default VR route table&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Virtual Router 1:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Alternate VR1 and inter-VR next-hop route configuration" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26103iDA00BF5CF4745A58/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Alternate VR1 and inter VR next hop route configuration.png" alt="Alternate VR1 and inter-VR next-hop route configuration" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Alternate VR1 and inter-VR next-hop route configuration&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;VR1 static route table:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="VR1 route table" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26104iB99118C07FF04F29/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="VR1 route table illustration.png" alt="VR1 route table" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;VR1 route table&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3 class="lia-message-template-content-zone"&gt;Interfaces&lt;/H3&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Firewall UI: Interfaces &amp;gt; Ethernet Tab" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26105i773A58FA3D973F6B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Firewall Web Interfaces Ethernet Tab.png" alt="Firewall UI: Interfaces &amp;gt; Ethernet Tab" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Firewall UI: Interfaces &amp;gt; Ethernet Tab&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Interfaces will need to be configured under the Interfaces &amp;gt; Ethernet tab. Assign the Interface Type of the physical interface as Layer 3. Nothing else needs to be configured under the physical interface. Interfaces can be provisioned with either DHCP client or static IP addressing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DHCP Layer 3 interface configuration:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Untrust Ethernet interface configuration. NOTE: interface can be provisioned with either static or DHCP IP addressing." style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26106i6EA7D8C9D49B629A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untrust Ethernet interface configuration.png" alt="Untrust Ethernet interface configuration. NOTE: interface can be provisioned with either static or DHCP IP addressing." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Untrust Ethernet interface configuration. NOTE: interface can be provisioned with either static or DHCP IP addressing.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Static Layer 3 interface configuration:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Static IPv4 interface configuration" style="width: 401px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26107i538A608B3290B447/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Static IPv4 interface configuration.png" alt="Static IPv4 interface configuration" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Static IPv4 interface configuration&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Assign the interface to the correct zone untrust/trust.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Untrust and trust zone interface configuration:&lt;/P&gt;
&lt;TABLE style="border-style: none; width: 100%; border-color: #ffffff;" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Ethernet1/1 untrust zone assignment illustration" style="width: 302px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26108iF55A89D668A08BDB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ethernet 1 1 untrust zone assignment.png" alt="Ethernet1/1 untrust zone assignment illustration" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Ethernet1/1 untrust zone assignment illustration&lt;/span&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Ethernet1/2 trust zone assignment" style="width: 302px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26109i7477FE910817FB93/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ethernet 1 2 trust zone assignment.png" alt="Ethernet1/2 trust zone assignment" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Ethernet1/2 trust zone assignment&lt;/span&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Policy&lt;/H3&gt;
&lt;P&gt;Add a policy to allow packets to traverse the VM-Series next-generation firewall.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Firewall web interface: Security &amp;gt; Add Policy" style="width: 591px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26110i9200C0E3D074ADB3/image-dimensions/591x105/is-moderation-mode/true?v=v2" width="591" height="105" role="button" title="Firewall UI Security Add Policy.png" alt="Firewall web interface: Security &amp;gt; Add Policy" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Firewall web interface: Security &amp;gt; Add Policy&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN style="font-family: inherit;"&gt;Commit the Configuration&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;Commit the configuration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: inherit;"&gt;Verifying the Environment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;Working with a Layer 3 environment requires investigating the guest VM’s connectivity by testing IP reachability to internal and external Internet hosts. The guest VM IP address information is listed below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;Ubuntu 19.10 Web VM: 172.17.0.724&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;Ubuntu 19.10 App VM: 172.17.0.5/24&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN style="font-family: inherit;"&gt;VM-series Commands&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;The CLI can be used to view MAC/IP address information on the VM-Series. The command is: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;FONT face="courier new,courier"&gt;show interface ethernet 1/&amp;lt;interface #&amp;gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Sample of command results for firewall interface" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26111i9FE6525FC000E84D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Sample of command results for firewall interface.png" alt="Sample of command results for firewall interface" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Sample of command results for firewall interface&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;For the VM-Series routing table, the command is:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;show routing route&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="VM-series separate &amp;quot;default&amp;quot; and &amp;quot;VR1&amp;quot; routing tables including next-hop information" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26112i75CBDF3E4B2DFEC2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="VM-series separate default and VR1 routing tables.png" alt="VM-series separate &amp;quot;default&amp;quot; and &amp;quot;VR1&amp;quot; routing tables including next-hop information" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;VM-series separate "default" and "VR1" routing tables including next-hop information&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN style="font-family: inherit;"&gt;Physical Network Commands&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;The command you are going to use to verify any MAC/IP address learning will differ based on your network switch vendor. This lab utilizes Juniper Networks EX Series Switches:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Sample of a show ethernet switching table output (e.g., Juniper Networks EX Series/Junos OS)" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26113i642881261918D7E9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="show ethernet switching table output.png" alt="Sample of a show ethernet switching table output (e.g., Juniper Networks EX Series/Junos OS)" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Sample of a show ethernet switching table output (e.g., Juniper Networks EX Series/Junos OS)&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Guest VM Commands&lt;/H3&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Sample of guest VM commands: IP reachability" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26114iBA1E582B20283521/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Guest VM commands.png" alt="Sample of guest VM commands: IP reachability" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Sample of guest VM commands: IP reachability&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN style="font-family: inherit;"&gt;Firewall Traffic Log&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;You can view the firewall traffic log by navigating to Monitor Tab &amp;gt; Logs &amp;gt; Traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Firewall Web Interface: Logs" style="width: 611px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26115i511AABC3DC4F00CC/image-dimensions/611x142/is-moderation-mode/true?v=v2" width="611" height="142" role="button" title="Firewall UI logs.png" alt="Firewall Web Interface: Logs" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Firewall Web Interface: Logs&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Firewall Web Interface: Monitoring Traffic" style="width: 609px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26116i19FCDFE193EACDEF/image-dimensions/609x107/is-moderation-mode/true?v=v2" width="609" height="107" role="button" title="Firewall UI monitoring traffic.png" alt="Firewall Web Interface: Monitoring Traffic" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Firewall Web Interface: Monitoring Traffic&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Additional Information&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/virtual-routers.html" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;Virtual Routers Technical Documentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/configure-interfaces/layer-3-interfaces/configure-layer-3-interfaces.html" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;Configure Layer 3 Interfaces Technical Documentation&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000HAGKCA4" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;Video Tutorial: How To Configure a Layer 3 Interface&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 06 Jun 2020 03:17:09 GMT</pubDate>
    <dc:creator>pkofoid</dc:creator>
    <dc:date>2020-06-06T03:17:09Z</dc:date>
    <item>
      <title>Deploying VM-Series on ESXi in Layer 3 Mode</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/deploying-vm-series-on-esxi-in-layer-3-mode/ta-p/332043</link>
      <description>&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;&amp;nbsp;Learn about deployment of the VM-Series Next-Generation Firewall on the ESXi hypervisor in Layer 3 mode.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2020 03:17:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/deploying-vm-series-on-esxi-in-layer-3-mode/ta-p/332043</guid>
      <dc:creator>pkofoid</dc:creator>
      <dc:date>2020-06-06T03:17:09Z</dc:date>
    </item>
  </channel>
</rss>

