<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA VM-300 Hyper-V as a Gateway of Network in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274706#M75188</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I agree that Layer3 should be the better option. Basically you have 3 interfaces on the VM-300, trust, untrust, and management. So on ESX you would mapp one interface/vswitch to the untrust, and same with the trust and managment (however the management interface can be on a vswitch with other internal networks).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jul 2019 17:41:49 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-07-03T17:41:49Z</dc:date>
    <item>
      <title>PA VM-300 Hyper-V as a Gateway of Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274536#M75169</link>
      <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have requirement to build a permiter gateway firewall under Hyper-V using PA-VM-300.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In practical world this is realy possible to do so, force all traffic (in/out) pass through using Hyper-PA-VM. If it is there help with the documentation and suggestion like pre-requistes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks ,&lt;/P&gt;&lt;P&gt;animesh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 07:40:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274536#M75169</guid>
      <dc:creator>Animesh_Mishra</dc:creator>
      <dc:date>2019-07-03T07:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: PA VM-300 Hyper-V as a Gateway of Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274543#M75170</link>
      <description>when you say force, does this mean you are not able to deploy in layer3 mode?

you still have Layer2 vlan hopping and vwire 'bump in the wire' at your disposal to achieve this, although Layer3 would be preferable

&lt;A href="https://docs.paloaltonetworks.com/vm-series/8-0/vm-series-deployment/set-up-a-vm-series-firewall-on-the-citrix-sdx-server/secure-north-south-traffic-with-the-vm-series-firewall/deploy-the-vm-series-firewall-using-layer-2-l2-or-virtual-wire-interfaces.html#" target="_blank"&gt;https://docs.paloaltonetworks.com/vm-series/8-0/vm-series-deployment/set-up-a-vm-series-firewall-on-the-citrix-sdx-server/secure-north-south-traffic-with-the-vm-series-firewall/deploy-the-vm-series-firewall-using-layer-2-l2-or-virtual-wire-interfaces.html#&lt;/A&gt;</description>
      <pubDate>Wed, 03 Jul 2019 07:46:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274543#M75170</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-07-03T07:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: PA VM-300 Hyper-V as a Gateway of Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274706#M75188</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I agree that Layer3 should be the better option. Basically you have 3 interfaces on the VM-300, trust, untrust, and management. So on ESX you would mapp one interface/vswitch to the untrust, and same with the trust and managment (however the management interface can be on a vswitch with other internal networks).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 17:41:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274706#M75188</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-07-03T17:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: PA VM-300 Hyper-V as a Gateway of Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274800#M75192</link>
      <description>&lt;P&gt;Want to deploy in Layer 3 mode in Hyper-V. where in we can do the DNAT/SNAT easily, IPSec Tunnels creation all stuff that is possible through appliance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Understading this is really possible in that way - spin up VM in Hyper-V and used Untrus and Trust Zone in layer 3 mode. ?&lt;/P&gt;&lt;P&gt;From User to Internet traffic flow would be like this -- Users --&amp;gt; Core Siwtch Layer 3 G/W --&amp;gt; Trust Interface of PA-VM (Hyper-V) --&amp;gt; Untrust Interface of PA-VM (Hyper-V) --&amp;gt; Core Switch Trunk Port --&amp;gt; ILL Router --&amp;gt; Internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share some light here.....&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2019 04:42:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274800#M75192</guid>
      <dc:creator>Animesh_Mishra</dc:creator>
      <dc:date>2019-07-04T04:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: PA VM-300 Hyper-V as a Gateway of Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274815#M75193</link>
      <description>Want to deploy in Layer 3 mode in Hyper-V. where in we can do the DNAT/SNAT easily, IPSec Tunnels creation all stuff that is possible through appliance. Understanding this is really possible in that way - spin up VM in Hyper-V and used Untrus and Trust Zone in layer 3 mode. ? From User to Internet traffic flow would be like this -- Users --&amp;gt; Core Siwtch Layer 3 G/W --&amp;gt; Trust Interface of PA-VM (Hyper-V) --&amp;gt; Untrust Interface of PA-VM (Hyper-V) --&amp;gt; Core Switch Trunk Port --&amp;gt; ILL Router --&amp;gt; Internet. Share some light here.....</description>
      <pubDate>Thu, 04 Jul 2019 06:25:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/274815#M75193</guid>
      <dc:creator>Animesh_Mishra</dc:creator>
      <dc:date>2019-07-04T06:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: PA VM-300 Hyper-V as a Gateway of Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/275130#M75233</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;If you are using the PAN interfaces in layer3, you shouldnt need a Layer3 interface on the switches. However the flow looks correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 16:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vm-300-hyper-v-as-a-gateway-of-network/m-p/275130#M75233</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-07-05T16:59:14Z</dc:date>
    </item>
  </channel>
</rss>

