- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-07-2021 03:22 PM
I'm having trouble interpreting this link for deployment scenarios of the vm series Palo Firewalls. Looking for clarification...
We have an ESXi cluster with 3 hosts running vSphere Distributed Switches. Our plan is to have one Palo VM-300 in the cluster and it will have the gateways (SVI's) for VM's on all ESXi hosts. I'm questioning if this will work. I'm questioning how a VM on host without the Palo will reach it's gateway.
Can this one Palo take traffic from all VM's across all hosts?
I feel like I'm missing something here.
12-07-2021 05:10 PM
Can a VM on one ESXi host reach the other VMs running on a different host within your existing network? The answer to that question would really depend on your environment, but the vast majority of environments the answer would be yes. The deployment method that you use really depends on your own network design and actual goals.
12-07-2021 05:14 PM
Right now I don't have a way to test it as the gateways for all the VM's will be on the Palo VM. I'm pretty sure all VM's on the physical ESX host with the Palo VM will be fine. What I'm worried about are the VM's that are on other ESX hosts that do not have the Palo.
Does that make sense?
12-09-2021 02:38 PM
I'd like to give some additional details on this as I'm still looking for feedback and am a little confused.
See attached picture. It represents one physical ESXi host of a cluster of 3. I'm curious if this setup would work and allow network connectivity between VM's on vlans 68 and 69 across all hosts. Please let me know if more detail is needed to answer this question. Thank you!
12-09-2021 03:33 PM
Hello,
From what I remember trying to architect something like this, you would need a PAN on each ESXi host. If you just have one it will/might create major routing issues if the ESXi host the PAN is running on get rebooted etc.
Just another thought. What if instead of your physical switch you had a physical PAN's, 2x in HA,? This way it would all be layer 2 vlans to the PAN and they are all anchored there? Just thinking out loud.
Regards,
12-09-2021 03:40 PM
I agree with your statement about using two physical Palos but that's not an option for us currently.
Is there anyway to do this with one PAN? If not, can you point me to any documentation on the setup for a PAN-VM on each ESXi host?
Thanks!
12-10-2021 12:01 PM
Hello,
Check out this article.
Regards,
12-10-2021 01:50 PM
Hello,
Also thinking outside the box, how about using Global Protect? This way all the VM's will VPN into the PAN and you now basically have zero trust if you configure the security policies correctly.
Just a thought.
12-10-2021 01:56 PM
Thanks for all the replies, I ended up getting my original setup working across all ESXi hosts. Even performed some vmotions of the VM's and even the Palo. VM's were fine to vmotion....with the Palo, things were down for about 30 seconds.
Now, I'm having issues with the zones. I can't create any more than 15 even though I have the VM-300 license installed.
12-10-2021 02:30 PM
Hello,
Not sure what the limit on Zones is, however what I did was create one zone and used subnets in it.
Zone DNZ-A then use vlan subnets and not allow the subnets to communicate unless they have a reason to.
Regards,
12-12-2021 04:59 PM
According to this link
https://www.paloguard.com/VM-Series.asp
I should be able to do 40 zones on the VM-300 but for some reason it only allows 15 as it errors when I get to 16. I'm sure the license is installed as I have a serial number and it shows a VM-300 license. I've tried rebooting but still no joy.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!