Hi Jared, I will post to VMware. I also think though that Palo Alto should be providing some clear guidance around this. If they support this appliance as a perimeter device or not. If they do what are other considerations etc etc. Like mentioned earlier if I cant trust it as a perimeter device why would i trust it as a device to secure zone within my network? If it isn't supported at the perimeter it is pretty much saying that it isn't actually a security device at all, by my logic anyway. Having said that, this discussion would be very short if/when PA say yes or no, it is/isn't supported as a perimeter device and if it is then these are the caveats. Then we, as customers, can present our recommendations to the decisions makers and have them decide on risk verses cost/functionality etc etc etc. I see that in the VMWare Hardening guide there is a Risk Profiles etc perhaps PA can look at this and say fully supported as long as a Minimum of Risk Profile 2 has been implemented on the host??
... View more