<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA-VM 10.1 (layer 3 interfaces) in a NSX-V IaaS data centre - Add to User Excluded VMs for NSX Firewall settings? in VM-Series in the Private Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/pa-vm-10-1-layer-3-interfaces-in-a-nsx-v-iaas-data-centre-add-to/m-p/563037#M164</link>
    <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I would go straight to PA with this query but the firewall was purchased through and is supported by a 3rd party vendor and we have limited control over it and the DC it's hosted in is similar. Support is terrible to say the least.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;We lease an IaaS data centre which is connected to our ISP provided private WAN. We host 2 PA-VMs in a HA pair and they are used as our perimeter firewall.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;This IaaS data centre is running NSX-V and VMWare 6.7. Important to note that the PA-VM is not running as a service for NSX as discussed here:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="_3t5uN8xUmg0TOwRCOGQEcU" href="https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-nsx/set-up-the-vm-series-firewall-on-vmware-nsx/vm-series-for-nsx-firewall-overview" target="_blank" rel="noopener nofollow ugc"&gt;VM-Series for Firewall NSX-V Overview (paloaltonetworks.com)&lt;/A&gt;. It's not used for protecting the data centre. It's purely our perimeter (internet) firewall for our north / south traffic and running as standard VM in the DC.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Sometime ago we started getting intermittent and inconsistent traffic issues. Basically sometimes a continuous traffic stream will get black holed. Very noticeable for our remote users on Citrix sessions for example. I'm not sure if it started when we migrated to this setup from our old setup or sometime after.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;With investigating, I've ruled out the PA-VM itself as the culprit and have started to focus on the NSX Edge nodes and the DC in general but I have come across articles saying that VMs such as FWs should be added to the "User Excluded VMs for NSX Firewall settings" but then I read that's only necessary if you need to accept Promiscuous Mode, MAC Address Changes and Forged Transmits.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;We have those options set to Reject. We're configured using L3 interfaces and hypervisor assigned MAC addresses.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;So my questions:&lt;/P&gt;
&lt;OL class="_1eJr7K139jnMstd4HajqYP"&gt;
&lt;LI class="_3gqTEjt4x9UIIpWiro7YXz"&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Should our PA-VMs be added to the "User Excluded VMs for NSX Firewall settings"?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="_3gqTEjt4x9UIIpWiro7YXz"&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Should we change Promiscuous Mode, MAC Address Changes and Forged Transmits to Accept?&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Thanks for any assistance.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Oct 2023 03:08:16 GMT</pubDate>
    <dc:creator>boboshen</dc:creator>
    <dc:date>2023-10-25T03:08:16Z</dc:date>
    <item>
      <title>PA-VM 10.1 (layer 3 interfaces) in a NSX-V IaaS data centre - Add to User Excluded VMs for NSX Firewall settings?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/pa-vm-10-1-layer-3-interfaces-in-a-nsx-v-iaas-data-centre-add-to/m-p/563037#M164</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I would go straight to PA with this query but the firewall was purchased through and is supported by a 3rd party vendor and we have limited control over it and the DC it's hosted in is similar. Support is terrible to say the least.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;We lease an IaaS data centre which is connected to our ISP provided private WAN. We host 2 PA-VMs in a HA pair and they are used as our perimeter firewall.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;This IaaS data centre is running NSX-V and VMWare 6.7. Important to note that the PA-VM is not running as a service for NSX as discussed here:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="_3t5uN8xUmg0TOwRCOGQEcU" href="https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-nsx/set-up-the-vm-series-firewall-on-vmware-nsx/vm-series-for-nsx-firewall-overview" target="_blank" rel="noopener nofollow ugc"&gt;VM-Series for Firewall NSX-V Overview (paloaltonetworks.com)&lt;/A&gt;. It's not used for protecting the data centre. It's purely our perimeter (internet) firewall for our north / south traffic and running as standard VM in the DC.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Sometime ago we started getting intermittent and inconsistent traffic issues. Basically sometimes a continuous traffic stream will get black holed. Very noticeable for our remote users on Citrix sessions for example. I'm not sure if it started when we migrated to this setup from our old setup or sometime after.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;With investigating, I've ruled out the PA-VM itself as the culprit and have started to focus on the NSX Edge nodes and the DC in general but I have come across articles saying that VMs such as FWs should be added to the "User Excluded VMs for NSX Firewall settings" but then I read that's only necessary if you need to accept Promiscuous Mode, MAC Address Changes and Forged Transmits.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;We have those options set to Reject. We're configured using L3 interfaces and hypervisor assigned MAC addresses.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;So my questions:&lt;/P&gt;
&lt;OL class="_1eJr7K139jnMstd4HajqYP"&gt;
&lt;LI class="_3gqTEjt4x9UIIpWiro7YXz"&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Should our PA-VMs be added to the "User Excluded VMs for NSX Firewall settings"?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="_3gqTEjt4x9UIIpWiro7YXz"&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Should we change Promiscuous Mode, MAC Address Changes and Forged Transmits to Accept?&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Thanks for any assistance.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2023 03:08:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/pa-vm-10-1-layer-3-interfaces-in-a-nsx-v-iaas-data-centre-add-to/m-p/563037#M164</guid>
      <dc:creator>boboshen</dc:creator>
      <dc:date>2023-10-25T03:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: PA-VM 10.1 (layer 3 interfaces) in a NSX-V IaaS data centre - Add to User Excluded VMs for NSX Firewall settings?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/pa-vm-10-1-layer-3-interfaces-in-a-nsx-v-iaas-data-centre-add-to/m-p/563790#M165</link>
      <description>&lt;P&gt;I've answered my 1st question: We added&amp;nbsp;the PA-VMs to the "User Excluded VMs for NSX Firewall settings" and it did not fix our issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I won't bother with changing Promiscuous Mode, MAC Address Changes and Forged Transmits to Accept as we are running&amp;nbsp;@ Layer 3 and shouldn't need to do that.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The problem is within our NSX IaaS data centre.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 23:01:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/pa-vm-10-1-layer-3-interfaces-in-a-nsx-v-iaas-data-centre-add-to/m-p/563790#M165</guid>
      <dc:creator>boboshen</dc:creator>
      <dc:date>2023-10-31T23:01:10Z</dc:date>
    </item>
  </channel>
</rss>

