<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Virtual Firewall Platform in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37263#M27333</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is anyone using one of these but as an internet facing firewall vs. firewalling the VM's on the host the firewall is running on?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the pricing and specs and the amount of HA that vSphere can provide, I'm trying to understand what the "catch" is vs. a physical Palo Alto?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 27 Apr 2014 09:18:14 GMT</pubDate>
    <dc:creator>networkadmin</dc:creator>
    <dc:date>2014-04-27T09:18:14Z</dc:date>
    <item>
      <title>Palo Alto Virtual Firewall Platform</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37263#M27333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is anyone using one of these but as an internet facing firewall vs. firewalling the VM's on the host the firewall is running on?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the pricing and specs and the amount of HA that vSphere can provide, I'm trying to understand what the "catch" is vs. a physical Palo Alto?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Apr 2014 09:18:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37263#M27333</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2014-04-27T09:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Virtual Firewall Platform</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37264#M27334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The main "catch" would probably be capacity and HA capabilities.&amp;nbsp; The vm version cannot do any PA HA features.&amp;nbsp; So you could not have an active/passive cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also since the internal v-switch is 1 gig only, you would not be able to have a 10g interface on the PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could see a v-sphere server with a local AD and file server along with a virtual PA being a good option in branch office scenarios.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Apr 2014 17:57:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37264#M27334</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-04-27T17:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Virtual Firewall Platform</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37265#M27335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The current focus for the VM Series is to secure east-west traffic in the virtualized datacenter.&amp;nbsp; That being said, there are some environments where the VM Series fits rather nicely, such as "branch in a box" architectures.&amp;nbsp; Additionally, any public cloud integrations/implementations will have to be delivered by a virtualized firewall.&amp;nbsp; I think Palo Alto Networks did a great job with the VM Series. it looks just like their hardware firewalls from a software, configuration, and capability standpoint.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For most scenarios, I highly recommend a hardware firewall over the VM Series.&amp;nbsp; If the driver is purely "cost" - I don't think that's a good reason to use the VM Series in this manner.&amp;nbsp; That being said, I've run the VM Series as a perimeter firewall in my lab environment and its worked well for me.&amp;nbsp; Here's some of my observations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VM Series supports "HA Lite" (just like the PA-200), which means you can configure it as Active/Passive from a high-availability standpoint.&amp;nbsp; The main difference between Full and Lite "HA" is that you don't get session synchronization during failover in the Lite version.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interfaces are "vmxnet3" interfaces, which are technically 10GbE.&amp;nbsp; Here's the output from "show interface all" on my VM Series:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@pa0(active)&amp;gt; show interface all&lt;/P&gt;&lt;P&gt;total configured hardware interfaces: 12&lt;/P&gt;&lt;P&gt;name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id&amp;nbsp;&amp;nbsp;&amp;nbsp; speed/duplex/state&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mac address&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ethernet1/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16&amp;nbsp;&amp;nbsp;&amp;nbsp; 10000/full/up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:1b:17:00:01:10&lt;/P&gt;&lt;P&gt;ethernet1/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 17&amp;nbsp;&amp;nbsp;&amp;nbsp; 10000/full/up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:1b:17:00:01:11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That doesn't necessarily mean you can firewall/inspect/control 10GbE of traffic.&amp;nbsp; That will be limited by the Type/Speed and Number of CPU cores that you allocate to the VM.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the things to consider are:&lt;/P&gt;&lt;P&gt; - Predictable performance.&amp;nbsp; The hardware firewalls have dedicated resources, CPUs, ASICs, FPGAs, etc.&amp;nbsp; The VM series uses up to 8 x86 CPU cores.&amp;nbsp; This is one of the reasons why the hardware firewalls can scale to 20Gbps and beyond, while the VM Series datasheet rates it around 1Gbps.&amp;nbsp; &lt;/P&gt;&lt;P&gt; - Ease of troubleshooting.&amp;nbsp; If you're running into a problem with a hardware firewall, it's much easier for Palo Alto Networks' TAC to troubleshoot the issue from layer1-to-layer7.&amp;nbsp; On the VM Series side of things, you have Palo Alto, VMware, and the server manufacturer to deal with.&amp;nbsp; &lt;/P&gt;&lt;P&gt; - Complexity.&amp;nbsp; When you power-up a hardware firewall, it loads PAN-OS and is ready to go (for the most part).&amp;nbsp; On the VM Series side of things, you need VMware to boot, and then you need to configure auto-start for the firewall VM.&amp;nbsp; You'll also need to pay special attention to configuration changes and upgrades involving ESXi, vSphere/vCenter, shared storage (NFS/iSCSI/FC), VSS/VDS, etc, also have the potential to disrupt the firewall.&amp;nbsp; I've found that out the hard way a few times. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&amp;nbsp; Let us know if you have any other questions about the VM Series.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Apr 2014 20:21:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-virtual-firewall-platform/m-p/37265#M27335</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2014-04-27T20:21:45Z</dc:date>
    </item>
  </channel>
</rss>

