<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using VM firewall as &amp;quot;offline&amp;quot; configuration management for ALL models of PAN devices? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6897#M5080</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not think you can simulate any hardware platforms with a VM firewall. Vm-firewall does not implement all the features supported by all the platforms. For example HA; VM does not support Active/Active HA. So loading an Active/Active config from a 5000 platform on to VM firewall not sure what will be the result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sandeep T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Jan 2013 17:50:11 GMT</pubDate>
    <dc:creator>sdurga</dc:creator>
    <dc:date>2013-01-08T17:50:11Z</dc:date>
    <item>
      <title>Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6896#M5079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am pretty sure it can be done (have not tested), but I thought maybe a SE or partner could test and confirm, or provide warnings/pitfalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am thinking that if I offloaded a copy of a customer's FW, for archival purposes and then needed to make changes, when I am not at the customer site, that I could just load their configuration into my blank VM version of the PA FW, and then "see" their configuration in the UI, all rules, policies, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could make changes to the offline version, on behalf of my customer, and then either commit it when I am onsite, or perhaps securely send the configuration to them, and they could load it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure there are a lot of holes in this concept/thought.&amp;nbsp; I am just thinking that perhaps the VM version of the FW could a stepping stone to a remote/offline configuration utility application, which a partner/SE could pre-configure a customer's FW before going onsite (or even before a demo).&amp;nbsp; Imagine the amount of time savings this could be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, I am not sure if the VM could emulate a all hardware platforms, but I wanted to get a response from the community, and if there was enough support, maybe Palo Alto Networks would consider this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide your feedback.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 16:50:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6896#M5079</guid>
      <dc:creator>scantwell</dc:creator>
      <dc:date>2013-01-08T16:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6897#M5080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not think you can simulate any hardware platforms with a VM firewall. Vm-firewall does not implement all the features supported by all the platforms. For example HA; VM does not support Active/Active HA. So loading an Active/Active config from a 5000 platform on to VM firewall not sure what will be the result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sandeep T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 17:50:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6897#M5080</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2013-01-08T17:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6898#M5081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agreed and thanks for the fast response.&amp;nbsp; That is why I was bringing it to the Community.&amp;nbsp; I am wondering just how much could be possibly be configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We know HA would not work, Aggregrate Ports would not work.&lt;/P&gt;&lt;P&gt;What other items would not work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I bet a PA200 could be configured and its config imported into a VM FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need lots of response and we can then generate a working list of what CAN/CANT be done.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 18:02:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6898#M5081</guid>
      <dc:creator>scantwell</dc:creator>
      <dc:date>2013-01-08T18:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6899#M5082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall features not available in VM Series Firewall as of 5.0:&lt;/P&gt;&lt;P&gt; - Jumbo Frames&lt;/P&gt;&lt;P&gt; - Link Aggregation&lt;/P&gt;&lt;P&gt; - A/A High Availability&lt;/P&gt;&lt;P&gt; - A/P High Availability (with session Sync)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One quick note, the VM Series supports HA-Lite (A/P w/o session sync) just like the PA200.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some other things to keep in mind:&amp;nbsp; The VM Series firewall supports 10 Ethernet interfaces (one of them reserved for management), and no dedicated "HA" ports.&amp;nbsp; To move configs between VM Series &amp;amp; hardware devices, be sure that the only interfaces referenced are ethernet1/1 to ethernet1/9, along with the management port.&amp;nbsp; This means if you plan on exporting to a PA200, only use ports e1/1 to e1/4 in the VM Series.&amp;nbsp; And if you plan on exporting to a PA5020, you'll only be able to stage/configure ports e1/1 to e1/9 on the VM Series and any other interface configuration will have to be done on the PA5020 "after-the-fact".&amp;nbsp; This is no different than if you used a PA200 to stage a config for a PA5060.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, since the VM Series is supported starting with 5.0, all configs created/modified by the VM Series will be in the 5.0 format.&amp;nbsp; This will likely cause issues if you try to import one of these configs into a hardware device running a previous version of PAN-OS (4.0.x, 4.1.x, etc.).&amp;nbsp; This is no different than if you were to stage a config on a hardware device running 5.0 and attempt to import on a similar hardware device running 4.1.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All-in-all, I am quite impressed with the VM Series.&amp;nbsp; Other than the few features that are not supported, it is a full implementation of PAN-OS.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 18:19:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6899#M5082</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-01-08T18:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6900#M5083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;However shouldnt it work if you just copy the &amp;lt;rulebase&amp;gt; ... &amp;lt;/rulebase&amp;gt; stuff?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Open the archived config in your VM and make the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Save the config and export it (lets call it modified.xml).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Open modified.xml in a texteditor and copy the stuff in between &amp;lt;rulebase&amp;gt; ... &amp;lt;/rulebase&amp;gt; and insert that into a copy of the archived config in 1) above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And perhaps other xml-blocks aswell (like application-groups etc).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 18:29:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6900#M5083</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-08T18:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6901#M5084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, but i have a question . How can it get VM-Series Firewall , just like ISO file or somthing like that in order to simulate PANOS . My company is partner of Palo Anto. Thank for helping me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 00:45:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6901#M5084</guid>
      <dc:creator>MinhTuan</dc:creator>
      <dc:date>2013-02-28T00:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Using VM firewall as "offline" configuration management for ALL models of PAN devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6902#M5085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Minh, You would need to purchase the VM firewall, just like any other piece of hardware/software. Please have your company submit a purchase order through whatever normal process they would to purchase the VM firewall. You would not want to download the FW without having a license or support attached to it. Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 01:05:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-vm-firewall-as-quot-offline-quot-configuration-management/m-p/6902#M5085</guid>
      <dc:creator>scantwell</dc:creator>
      <dc:date>2013-02-28T01:05:25Z</dc:date>
    </item>
  </channel>
</rss>

