<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VM-Series-L2 firewall configuration? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9371#M6868</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does anyone have VM series configured like L2 firewall (intra-host communication) and well working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My interface ethernet1/4 is configured like L2 and have leg to portgroup (vlan xx) glued to zone abcd....&lt;/P&gt;&lt;P&gt;Polices was created in way to deny SSH between zones abcd to abcd and allow other traffic, but SSH pass anyway from one guest vm to another in abcd zone. Situation is same with other deny traffic too, so I'm suspect that L2 firewall not working at all. Port group on distributed virtual switch is configured with promiscuous mode to allow, but from underlying infrastructure and VMware perspective that's mean that all traffic was redirected to all ports for monitoring purposes and cannot be filtered with "L2 interface leg" on PAN VM.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Monitor tab, I filtered "interesting" traffic between guest VM's, and by firewall, traffic are filtered "action&amp;gt;deny", unfortunately that is not truth... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Feb 2013 19:49:51 GMT</pubDate>
    <dc:creator>Tician</dc:creator>
    <dc:date>2013-02-12T19:49:51Z</dc:date>
    <item>
      <title>VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9371#M6868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does anyone have VM series configured like L2 firewall (intra-host communication) and well working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My interface ethernet1/4 is configured like L2 and have leg to portgroup (vlan xx) glued to zone abcd....&lt;/P&gt;&lt;P&gt;Polices was created in way to deny SSH between zones abcd to abcd and allow other traffic, but SSH pass anyway from one guest vm to another in abcd zone. Situation is same with other deny traffic too, so I'm suspect that L2 firewall not working at all. Port group on distributed virtual switch is configured with promiscuous mode to allow, but from underlying infrastructure and VMware perspective that's mean that all traffic was redirected to all ports for monitoring purposes and cannot be filtered with "L2 interface leg" on PAN VM.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Monitor tab, I filtered "interesting" traffic between guest VM's, and by firewall, traffic are filtered "action&amp;gt;deny", unfortunately that is not truth... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2013 19:49:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9371#M6868</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-02-12T19:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9372#M6869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post a diagram of your configuration?&amp;nbsp; From the description it sounds like all 3 devices (ethernet1/4, guest1, and guest2) are all in the same portgroup.&amp;nbsp; The VM Series firewall will not filter traffic between two machines connected to the same portgroup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One way to do this would be to configure the environment like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; guest1 connected to portgroup1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; guest2 connected to portgroup2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vm-series firewall ethernet1/4 configured for abcd zone, connected to portgroup1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vm-series firewall ethernet1/5 configured for wxyz zone, connected to portgroup2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, you may now configure zone-based rules permitting/denying traffic from abcd to wxyz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have that working properly, then you can get more adventurous with multiple VLANs on a single VM-Series ethernet interface, "bridging" those vlans together using vlan re-write, etc.&amp;nbsp; I'd start simple, though, with the above configuration. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 18:45:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9372#M6869</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-02-13T18:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9373#M6870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes my configuration is just like you describe, but if you review official doc from Palo Alto Networks "VM-Series_Deploymnt-RevA.pdf", they have example scenario, where have one L2 interface which permit/deny traffic within same security zone.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="5585" alt="sec_policy_samezone.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5585_sec_policy_samezone.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;after while, they filter permited traffic within same sec zone&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="5586" alt="filter_samezone.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5586_filter_samezone.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;You can see that example interface eth1/3 belongs to vlan 300 (supposed one port group), and rule "allow some stuff CustA" with statement between same zones, allow ping. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 20:43:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9373#M6870</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-02-13T20:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9374#M6871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually if you take a step back and look at the configuration, Ethernet 1/1 and Ethernet 1/3 are both in VLAN300, and are part of different zones.&amp;nbsp; CustA-Servers (zone) is permitted to talk to CustA-vDS (zone) and vice-versa through this rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="5590" alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5590_pastedImage_0.jpg" style="width: 500px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This rule can not control traffic from CustA-Servers to CustA-Servers, because that traffic does not traverse the firewall.&amp;nbsp; The only way you'll get traffic to traverse the firewall is to insert it _between_ the two servers.&amp;nbsp; This can be done with v-Wires, Layer2 (recommended in a virtualized datacenter) or Layer3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think of this like a perimeter firewall.&amp;nbsp; You don't just connect one interface to your LAN switch and call it good.&amp;nbsp; You connect one interface to the Internet, and another Interface to your internal network.&amp;nbsp; The firewall will inspect traffic passing from LAN to Internet and vice-versa.&amp;nbsp; But, just because the firewall is plugged into your LAN doesn't mean that all of your LAN-to-LAN traffic goes through the firewall...&amp;nbsp; Same thing with the VM Series.&amp;nbsp; You need to plumb the traffic appropriate so that it passes through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the PDF you referenced, there's a great graphic that illustrates this point:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="5591" alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5591_pastedImage_1.png" style="width: 500px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server A1 and Server A2 can talk to each other directly because they are on the same VDS on the same host.&amp;nbsp; Their traffic does not pass through the firewall.&amp;nbsp;&amp;nbsp; However, traffic from A1 to B1 &amp;lt;must&amp;gt; go through the firewall, and that is where you can enforce policy.&amp;nbsp; Also look at Server B1 and B2, they can talk to each other without traversing the firewall.&amp;nbsp; However, for B1 to communicate with B3, that traffic must pass through 2 different firewalls - one on each ESXi host.&amp;nbsp; In this example, there are 2 different places where you could apply policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 00:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9374#M6871</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-02-14T00:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9375#M6872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi JValentine,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for answer and clarification of this scenario, that was very helpful. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To conclude, if we focus on L2 broadcast domain (one vlan) which span more than one ESX host, in case of host failure if the server B4 has HA coverage, they will be moved to host ESXi3 host (different sec zone), then our policy (deny) will failed because now, we have 2 guest VM's on same physical host and same zone, if I'm right? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 10:41:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9375#M6872</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-02-14T10:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9376#M6873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic must pass through the firewall in order for it to be inspected/secured.&amp;nbsp; If you place 2 guests on the same host in the same port-group &amp;amp; same zone, then they will be able to pass traffic between them without going through the firewall.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your requirement is to secure traffic between guests located on the same host, then make sure you don't place them in the same portgroup / same zone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 23:44:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9376#M6873</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-02-14T23:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: VM-Series-L2 firewall configuration?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9377#M6874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi JValentin,&lt;/P&gt;&lt;P&gt;Just like what you advise:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; guest1 connected to portgroup1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; guest2 connected to portgroup2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vm-series firewall ethernet1/4 configured for abcd zone, connected to portgroup1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vm-series firewall ethernet1/5 configured for wxyz zone, connected to portgroup2&lt;/P&gt;&lt;P&gt;My question is:&lt;/P&gt;&lt;P&gt;1. if guest1 and guest2 is in the same VLAN, then guest1 can directly connect to guest2. vm-series&lt;/P&gt;&lt;P&gt; can receive guest1-2 packets&amp;nbsp; but can not filter.,&lt;/P&gt;&lt;P&gt;2. IN vm-series administratir web, Monitor tab only display 'Deny' or 'Drop' traffic, do not display 'allow' traffic, why?&lt;/P&gt;&lt;P&gt;3.. Can I make l2 filter between ServerA1 and SeverA2&amp;nbsp; ServerA1 and SeverA2 in the same switch and the same vlan.&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 02:30:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-l2-firewall-configuration/m-p/9377#M6874</guid>
      <dc:creator>zhongke</dc:creator>
      <dc:date>2013-08-23T02:30:56Z</dc:date>
    </item>
  </channel>
</rss>

