Very new to VM-300 and PA, deploying it in AWS with 2 availability zones. We'd like to have 3 private subnets in each AZ - DMZ, application, and data, as well as a public subnet for the EIP interface. Ideally all traffic between subnets would flow through the VM-300, but this doesn't seem possible to us without multiple NICs, one per subnet. Is that accurate? I'm trying to understand what best practices are with this architecture. Should we simply call public untrust and everything else trusted, and then just have one NIC in each, or is there a way that we can have all traffic between the subnets, or at least between the DMZ and others transit the VM-300? The limitation of course on NICs is cost - the instances with 8 network interfaces are prohibitively expensive for a firewall. Any suggestions would be appreciated.
... View more