ESXi deployment question for Palo -VM series (L3 Mode)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

ESXi deployment question for Palo -VM series (L3 Mode)

L2 Linker

I'm having trouble interpreting this link for deployment scenarios of the vm series Palo Firewalls.  Looking for clarification...

https://docs.paloaltonetworks.com/vm-series/10-1/vm-series-deployment/set-up-a-vm-series-firewall-on...

 

We have an ESXi cluster with 3 hosts running vSphere Distributed Switches.  Our plan is to have one Palo VM-300 in the cluster and it will have the gateways (SVI's) for VM's on all ESXi hosts.  I'm questioning if this will work.  I'm questioning how a VM on host without the Palo will reach it's gateway.

 

Can this one Palo take traffic from all VM's across all hosts? 

 

I feel like I'm missing something here. 

 

 

10 REPLIES 10

Cyber Elite
Cyber Elite

@geewiss,

Can a VM on one ESXi host reach the other VMs running on a different host within your existing network? The answer to that question would really depend on your environment, but the vast majority of environments the answer would be yes. The deployment method that you use really depends on your own network design and actual goals.

Right now I don't have a way to test it as the gateways for all the VM's will be on the Palo VM.  I'm pretty sure all VM's on the physical ESX host with the Palo VM will be fine.  What I'm worried about are the VM's that are on other ESX hosts that do not have the Palo.  

 

Does that make sense?

L2 Linker

I'd like to give some additional details on this as I'm still looking for feedback and am a little confused.

 

See attached picture.  It represents one physical ESXi host of a cluster of 3.  I'm curious if this setup would work and allow network connectivity between VM's on vlans 68 and 69 across all hosts.  Please let me know if more detail is needed to answer this question.  Thank you!

PXL_20211209_223247127.jpg

 

 

Cyber Elite
Cyber Elite

Hello,

From what I remember trying to architect something like this, you would need a PAN on each ESXi host. If you just have one it will/might create major routing issues if the ESXi host the PAN is running on get rebooted etc. 

 

Just another thought. What if instead of your physical switch you had a physical PAN's, 2x in HA,? This way it would all be layer 2 vlans to the PAN and they are all anchored there? Just thinking out loud.

 

Regards,

I agree with your statement about using two physical Palos but that's not an option for us currently.

 

Is there anyway to do this with one PAN?  If not, can you point me to any documentation on the setup for a PAN-VM on each ESXi host?

 

Thanks!

Cyber Elite
Cyber Elite

Cyber Elite
Cyber Elite

Hello,

Also thinking outside the box, how about using Global Protect? This way all the VM's will VPN into the PAN and you now basically have zero trust if you configure the security policies correctly.

Just a thought.

L2 Linker

Thanks for all the replies, I ended up getting my original setup working across all ESXi hosts.  Even performed some vmotions of the VM's and even the Palo.  VM's were fine to vmotion....with the Palo, things were down for about 30 seconds.

 

Now, I'm having issues with the zones.  I can't create any more than 15 even though I have the VM-300 license installed.

Cyber Elite
Cyber Elite

Hello,

Not sure what the limit on Zones is, however what I did was create one zone and used subnets in it. 

 

Zone DNZ-A then use vlan subnets and not allow the subnets to communicate unless they have a reason to.

 

Regards,

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!