<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PaloAlto Firewall Vsys in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573390#M2464</link>
    <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;i have an 2 no's of physical PAN in HA and in multiple vsys that are splited as an internet firewall and DC Firewall,&amp;nbsp; can i know the disadvantages for the same. can i know the firewall resources are shared example CPU, RAM, if an CPU or RAM consumption based attack happens on the internet fw vsys&amp;nbsp; it will not be having enough resources to run so it will reboot does it will affect the DC firewall vsys as well becz there will be no resources at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i m referring to the below link for the benefits&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/virtual-systems/virtual-systems-overview/benefits-of-virtual-systems" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/virtual-systems/virtual-systems-overview/benefits-of-virtual-systems&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jan 2024 22:26:44 GMT</pubDate>
    <dc:creator>adamgibs</dc:creator>
    <dc:date>2024-01-17T22:26:44Z</dc:date>
    <item>
      <title>PaloAlto Firewall Vsys</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573390#M2464</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;i have an 2 no's of physical PAN in HA and in multiple vsys that are splited as an internet firewall and DC Firewall,&amp;nbsp; can i know the disadvantages for the same. can i know the firewall resources are shared example CPU, RAM, if an CPU or RAM consumption based attack happens on the internet fw vsys&amp;nbsp; it will not be having enough resources to run so it will reboot does it will affect the DC firewall vsys as well becz there will be no resources at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i m referring to the below link for the benefits&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/virtual-systems/virtual-systems-overview/benefits-of-virtual-systems" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/virtual-systems/virtual-systems-overview/benefits-of-virtual-systems&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 22:26:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573390#M2464</guid>
      <dc:creator>adamgibs</dc:creator>
      <dc:date>2024-01-17T22:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto Firewall Vsys</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573794#M2490</link>
      <description>&lt;P&gt;Dear experts&amp;nbsp;&lt;/P&gt;
&lt;P&gt;awaiting your response&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jan 2024 21:58:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573794#M2490</guid>
      <dc:creator>adamgibs</dc:creator>
      <dc:date>2024-01-20T21:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto Firewall Vsys</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573986#M2496</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This is typically used in a multi tennet solution. I would simplify the solution by using Zones instead of a vsys. All inspection is done when traffic flows into or out of a zone and appropriate policies can be made so that blocking or allowing specific traffic as needed.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 20:44:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-firewall-vsys/m-p/573986#M2496</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-22T20:44:09Z</dc:date>
    </item>
  </channel>
</rss>

