<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using a VM100 at the perimeter in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38668#M28338</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jared,&lt;/P&gt;&lt;P&gt;I will post to VMware.&amp;nbsp; I also think though that Palo Alto should be providing some clear guidance around this.&amp;nbsp; If they support this appliance as a perimeter device or not.&amp;nbsp; If they do what are other considerations etc etc.&amp;nbsp; Like mentioned earlier if I cant trust it as a perimeter device why would i trust it as a device to secure zone within my network?&amp;nbsp; If it isn't supported at the perimeter it is pretty much saying that it isn't actually a security device at all, by my logic anyway. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having said that, this discussion would be very short if/when PA say yes or no, it is/isn't supported as a perimeter device and if it is then these are the caveats.&amp;nbsp; Then we, as customers, can present our recommendations to the decisions makers and have them decide on risk verses cost/functionality etc etc etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that in the VMWare Hardening guide there is a Risk Profiles etc perhaps PA can look at this and say fully supported as long as a Minimum of Risk Profile 2 has been implemented on the host??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Jan 2015 21:26:18 GMT</pubDate>
    <dc:creator>Jason_Mills</dc:creator>
    <dc:date>2015-01-28T21:26:18Z</dc:date>
    <item>
      <title>Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38657#M28327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are looking at deploying a VM-100 at the perimeter of our network. We currently have a PA-500 doing that job.&amp;nbsp; It is incredibly slow on the management side of things and quite frankly, expensive when it comes to support renewals.&amp;nbsp; Hence the thought of going to a VM-100.&amp;nbsp; Our supplier has told us that Palo Alto does not recommend a Virtual Firewall (hosted on VMWARE) at the perimeter however I can't find, any documentation to support this.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone point me at the documentation supports the statement that PA don't recommend this deployment model?&amp;nbsp; Or can someone at PA confirm this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2015 21:10:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38657#M28327</guid>
      <dc:creator>Jason_Mills</dc:creator>
      <dc:date>2015-01-21T21:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38658#M28328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi HDC...The VM-100 can be installed on several VMware products (VM workstation, VM Fusion, VM Player) and the VM platform themselves are not designed to be a firewall at the perimeter.&amp;nbsp; There is a degree of risk when exposing the VM platform to an untrusted segment (the Internet).&amp;nbsp; You should consult with VMware on how to harden the VM platform if it is even possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the slow response on the mgmt of the PA-500, may I recommend that you consider upgrading its memory:&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/docs/DOC-4600"&gt;PA-500 Management Memory Upgrade Procedure&lt;/A&gt;.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2015 21:29:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38658#M28328</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2015-01-21T21:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38659#M28329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello i agree with rmovan in that the VM is not great to be put in a the perimeter since you now have exposed your hypervisor to the internet. I know there are VMWare hardening docs, but I think you are asking for trouble since if the hypervisor gets compromised, the firewall is useless. Stay with physical at the perimeter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2015 23:59:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38659#M28329</guid>
      <dc:creator>oklier</dc:creator>
      <dc:date>2015-01-22T23:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38660#M28330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you wouldn't trust it enough to secure traffic at the perimeter, why would you trust it enough to secure your internal traffic? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Genuine question - like many people I'm wary of putting VMware at the very edge of the network but given the "on paper" specifications of the VM100 you could buy a dedicated host if you wanted to and it would still seem to give a 2000 or entry 3000 series a run for its money.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Palo Alto SE's say it's intended for east-west inspection but nobody really ever explains why it shouldn't be suitable to use at the perimeter especially when you can do HA using VMware vs. having to buy a pair of appliances.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Jan 2015 16:04:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38660#M28330</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2015-01-25T16:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38661#M28331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have isolated vmware boxes in our DMZ.&amp;nbsp; They are hardened and management isn't accessible from the internet.&amp;nbsp; I can't speak to the performance, but the arguments regarding security concerns ring hollow for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you end up pursuing this, please come back and share your results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2015 21:49:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38661#M28331</guid>
      <dc:creator>shamsway</dc:creator>
      <dc:date>2015-01-26T21:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38662#M28332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am curious how a hypervisor can be compromised in a situation like this?&amp;nbsp; Basically your are exposing a virtual port on a virtual switch which is effectively the same as a physical switch.&amp;nbsp; The port is fully controlled by the VM itself which handles all of the traffic.&amp;nbsp; I can't fathom how this is more dangerous than a physical link to a physical Palo Alto.&amp;nbsp; Please feel free to correct me and/or explain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in a similar boat, where the PA-500 may not be able to handle the expansion of our pip to 200 Mbps with all of the options enabled and I am up for renewal.&amp;nbsp;&amp;nbsp;&amp;nbsp; We routinely hit and exceed 100 Mbps on our PA-500.&amp;nbsp; I have a spare server with multiple NICs and dual power supplies.&amp;nbsp; Throw in a couple SSDs in a raid and I am fully redundant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 04:24:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38662#M28332</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2015-01-28T04:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38663#M28333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check on VMware's site for the lists of specific vulnerabilities and their hardening recommendations.&amp;nbsp; The hypervisor software is subject to the same types of exploits that can hit other linux based systems and specific ones based on the hypervisor software.&amp;nbsp; The risks are generally low in known issues but of course there is the unknown.&amp;nbsp; The code base for VMware was stolen and publicly posted back in 2012 so there have been a raft of exploits discovered since then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bigger risk than a switch and appliance is that IF you can compromise the hypervisor you now have access to all of the guest VMs behind the firewall on that same hypervisor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the what is currently known, I think a properly hardened VM host would be low risk for a small or branch office deploy.&amp;nbsp; But you do need to be sure it is a hardened deploy and all due caution is observed.&amp;nbsp; Others will disagree citing that the risk of giving an attack surface of the hypervisor to the public internet would be too high because the consequences of the breach are so high.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 11:48:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38663#M28333</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-01-28T11:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38664#M28334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for replying, but I am still confused how running it on ESXi makes it less secure.&amp;nbsp; Assuming it was setup correctly (no ability to manage it from the outside), the exposed side of the firewall will appear as any other firewall to an outsider.&amp;nbsp; Any ESXi exploits are not valid as you are not exposing ESXi, only the appliance.&amp;nbsp; I just don't get it....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Publish servers through it, as far as anyone knows they just went through a physical firewall.&amp;nbsp; If you are in a position where someone gets in and can pivot around you have a lot more trouble than a virtual firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your patience,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 16:29:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38664#M28334</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2015-01-28T16:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38665#M28335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;BobW wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Steven,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for replying, but I am still confused how running it on ESXi makes it less secure.&amp;nbsp; Assuming it was setup correctly (no ability to manage it from the outside), the exposed side of the firewall will appear as any other firewall to an outsider.&amp;nbsp; Any ESXi exploits are not valid as you are not exposing ESXi, only the appliance.&amp;nbsp; I just don't get it....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Publish servers through it, as far as anyone knows they just went through a physical firewall.&amp;nbsp; If you are in a position where someone gets in and can pivot around you have a lot more trouble than a virtual firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your patience,&lt;/P&gt;
&lt;P&gt;Bob&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;Bob I'm 99% with you, but I must admit there's part of me that, however irrational, I'm not entirely convinced I'd be comfortable with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That said, we run SMTP gateways and VM's on a DMZ virtual switch so I don't really see how this is any different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a heck of a lot of "&lt;EM&gt;what if's&lt;/EM&gt;" needed for something bad to happen I think.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 17:15:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38665#M28335</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2015-01-28T17:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38666#M28336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad this has stimulated some discussion.&amp;nbsp; I must admit that i tend towards same opinion as Bob.&amp;nbsp; I am having issue with what the real technical reason as to why I shouldn't do this.&amp;nbsp; I would appreciate someone form Palo Alto commenting, though maybe they don't read these forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that Juniper openly support Virtual Appliances at the perimeter with there Firefly product, &lt;A href="http://www.juniper.net/us/en/products-services/security/firefly-perimeter/" title="http://www.juniper.net/us/en/products-services/security/firefly-perimeter/"&gt;Firefly Perimeter – Juniper Networks&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help me out here PA, i need some concrete support for this as a solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps I should be posting this to VMware as well to see if they have any comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for commenting people.&amp;nbsp; It is much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 20:17:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38666#M28336</guid>
      <dc:creator>Jason_Mills</dc:creator>
      <dc:date>2015-01-28T20:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38667#M28337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you're right-on there.&amp;nbsp; Check with VMware.&amp;nbsp; I believe most of the uncertainty surrounding the wisdom/security/safety of exposing the hypervisor to the Internet really need to be answered by VMware.&amp;nbsp; If they're cool with it and you've followed their hardening guides, then bring the discussion back here.&amp;nbsp; We'd all love to hear what you find out!&amp;nbsp; There are quite a few interesting "reads" on the internet.&amp;nbsp; Google hypervisor escape, hypervisor breakout, hypervisor security.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One topic not brought up yet is troubleshooting.&amp;nbsp; If Palo Alto Networks sells a hardware appliance, they have the ability to really dig deep into the architecture, identify issues, fix code, etc.&amp;nbsp; When you "roll your own firewall", there are many more moving parts that aren't exposed to Palo Alto Networks' TAC (underlying hypervisor, storage, memory, networking, resource contention, etc.).&amp;nbsp; The information is there, but you'd be digging around in multiple interfaces and potentially working with multiple vendors to find the source of a particularly troublesome issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 21:11:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38667#M28337</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2015-01-28T21:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38668#M28338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jared,&lt;/P&gt;&lt;P&gt;I will post to VMware.&amp;nbsp; I also think though that Palo Alto should be providing some clear guidance around this.&amp;nbsp; If they support this appliance as a perimeter device or not.&amp;nbsp; If they do what are other considerations etc etc.&amp;nbsp; Like mentioned earlier if I cant trust it as a perimeter device why would i trust it as a device to secure zone within my network?&amp;nbsp; If it isn't supported at the perimeter it is pretty much saying that it isn't actually a security device at all, by my logic anyway. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having said that, this discussion would be very short if/when PA say yes or no, it is/isn't supported as a perimeter device and if it is then these are the caveats.&amp;nbsp; Then we, as customers, can present our recommendations to the decisions makers and have them decide on risk verses cost/functionality etc etc etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that in the VMWare Hardening guide there is a Risk Profiles etc perhaps PA can look at this and say fully supported as long as a Minimum of Risk Profile 2 has been implemented on the host??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 21:26:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38668#M28338</guid>
      <dc:creator>Jason_Mills</dc:creator>
      <dc:date>2015-01-28T21:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38669#M28339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/6054"&gt;HDC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is definitely supported and secure depending on the manner you deploy it just as any hardware firewall. The one thing I would do as far as ensuring that your Untrust traffic is isolated from the rest of the traffic is to ensure that the Ingress traffic from the internet comes in through it's own Physical NIC within the ESXi infrastructure. From there the untrust traffic will be as secure as the policies you configure within your firewall just as any other hardware device. There is no issue with deploying the virtual firewall as long as you architect the deployment properly but the same applies to a hardware PA Firewall as well. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2015 17:12:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38669#M28339</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2015-01-29T17:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38670#M28340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I contacted a VAR we use and asked them the same.&amp;nbsp; Their response is as follows.&amp;nbsp; I am still a bit stumped as I can not fathom how the throughput would be an issue if it was put on a piece of hardware with two Intel CPUs with quad&amp;nbsp; cores (or whatever) but here's what they said:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Palo Alto states that the VM firewalls are not recommended for edge use.&amp;nbsp; Can you explain why?&amp;nbsp; If it is the only VM on an ESXi box, I can’t imagine how that would be less secure than a physical box.:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2f5597;"&gt;Architecturally its just not going to deliver what PAN advertises – DoS, throughput are the two largest areas of concern – because everything is just virtualized on a intel CPU – no FPGA or math processor to offload the thinking of the box. – Also security concerns but if it’s the only thing on the box as you said its less of an issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2f5597;"&gt;Complexity in the configuration is also a concern with uptimes of firewalls normally 5 9’s &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any clients running a PA virtualized?&amp;nbsp; Are they happy with it?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2f5597;"&gt;Yes but all in test/dev environments nothing in production like suggested here&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2f5597;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2f5597;"&gt;Bob&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2015 05:48:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38670#M28340</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2015-01-30T05:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38671#M28341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it's supported.&amp;nbsp; The AWS version of the VM-series firewall is deployed in that fashion... you can't deploy a hardware appliance in front of it.&amp;nbsp; You can't ship hardware to Amazon (at least that's how I understand it).&amp;nbsp; So from that standpoint, it's not only supported, but also highly recommended - even by Palo Alto Networks!&amp;nbsp; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, the datasheet specifies some of the use-cases that the VM series can address, and not all of them are "east-west datacenter traffic".&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; • Private or public cloud computing environments where virtualization is a dependency &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; • Environments where physical space is at a premium &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; • Remote locations where shipping hardware is not practical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DoS and overall performance should definitely be considered, along with all of the other points in this thread.&amp;nbsp; For example, the higher-end appliances leverage dedicated network processors to handle Zone protection functions.&amp;nbsp; And while you could easily build a server and throw enough cores at it to out-perform a PA-200 or PA-500, the performance pendulum swings to the hardware appliances when your requirements start getting into the 1Gbps+ range.&amp;nbsp; The datasheet shows the VM-series capable of about 600Mbps with 4 CPU cores:&lt;/P&gt;&lt;P&gt;- &lt;A href="https://www.paloaltonetworks.com/products/platforms/virtualized-firewalls/vm-series/overview.html" title="https://www.paloaltonetworks.com/products/platforms/virtualized-firewalls/vm-series/overview.html"&gt;https://www.paloaltonetworks.com/products/platforms/virtualized-firewalls/vm-series/overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;It comes down to understanding the considerations involved and making an informed decision.&amp;nbsp; Yes, the management performance increase will be huge compared to a PA-200 and PA-500, and the on-going subscription costs for a VM-100 will be somewhat less expensive than a PA-500.&amp;nbsp; You would need to compare that against the cost of the server hardware and hypervisor, your ability to secure that hypervisor, the added complexity of 3rd party moving parts that Palo Alto Networks won't have control over (server/CPU/storage/memory/virtual switches/network cards/etc), your ability to prevent the "server guys" or "storage guys" from messing with the virtual infrastructure and taking the firewall/Internet down, along the # of potential vendors involved in the troubleshooting process.&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's why you won't see a full, hearty recommendation from Palo Alto Networks to use VM-series instead of hardware appliances.&amp;nbsp; If you feel that the benefits (ongoing maintenance costs and management performance in the case of the original poster) outweigh the potential risks, I say go for it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one customer who uses it in this manner.&amp;nbsp; It's not a huge environment... a PA-500 would have been appropriate for their requirements.&amp;nbsp; They weighed the pros and cons, and went with the virtual firewall.&amp;nbsp; For them it was a fairly easy choice as they had already been using virtual perimeter firewalls from another vendor and had experienced (first-hand!) the pitfalls involved.&amp;nbsp; But they're just one customer compared to many, many more who went with hardware appliances.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jared (who may or may not be using a VM-series as a perimeter firewall in his "lab").&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2015 23:35:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38671#M28341</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2015-01-30T23:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38672#M28342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, we are looking at going from 100 Mbps to 200 Mbps.&amp;nbsp; We are a K-12 school with 100+ boarding students. We have 800+ devices with lots of media streaming after hours.&amp;nbsp; The PA-500 handles 100Mbps very well with it's QOS, but I am concerned about the possibility of it handling 200Mbps with all of the options enabled AND it is roughly three years old.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also something to be said about having the VM run on box&amp;nbsp; which is more redundant than a PA-500 (raid and dual power supply for example) and being able to restore a VM in case of hardware failure.&amp;nbsp; Not to mention,&amp;nbsp; I have a dual Xeon 2.9, quad core with 24 GB sitting around collecting dust.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Feb 2015 22:36:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38672#M28342</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2015-02-01T22:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using a VM100 at the perimeter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38673#M28343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi HDC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have upgraded the memory in all of our PA-500 devices and this does make a noticeable difference to the management interface speed, commit times etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have also been trialling a VM-100.&amp;nbsp; We've had a few reliability issues and I understand that the cause of these is being addressed in 6.1.3.&amp;nbsp; Other than that though, we've been impressed by the general performance of the VM-100 and delighted by the boost in management interface speed / commit times.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Feb 2015 14:40:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-vm100-at-the-perimeter/m-p/38673#M28343</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2015-02-09T14:40:02Z</dc:date>
    </item>
  </channel>
</rss>

