46
VM-Series
Deployment
Guide
VM-Series NSX Edition Firewall Overview
The VM-Series NSX Edition Firewall
3. Establish communication between the VM-Series firewall and Panorama
: The VM-Series firewall then
initiates a connection to Panorama to obtain its license. Panorama retrieves the license from the update server
and pushes it to the firewall. The VM-Series firewall receives the license (VM-1000-HV) and reboots with a valid
serial number.
4. Install configuration/policy from Panorama to the VM-Series firewall
: The VM-Series firewall
reconnects with Panorama and provides its serial number. Panorama now adds the firewall to the device group
that was defined in the registration process and pushes the default policy to the firewall. The VM-Series firewall
is now available as a security virtual machine that can be further configured to safely enable applications on the
network.
5. Push traffic redirection rules from NSX Firewall
: On the Service Composer on the NSX Firewall, create
security groups and define network introspection rules that specify the guests from which traffic will be steered
to the VM-Series firewall. See
Integrated Policy Rules
for details.
6. Receive real-time updates from NSX Manager
: The NSX Manager sends real-time updates on the
changes in the virtual environment to Panorama. These updates include information on the security groups and
IP addresses of guests that are part of the security group from which traffic is redirected to the VM-Series
firewall. See
Integrated Policy Rules
for details.
7. Use Dynamic Address Groups in policy and push dynamic updates from Panorama to the VM-Series
firewalls
: On Panorama, use the real-time updates on security groups to create Dynamic Address Groups, bind
them to security policies and then push these policies to the VM-Series firewalls. Every VM-Series firewall in
the device group will have the same set of policies and is now completely marshaled to secure the SDDC. See
Policy Enforcement using Dynamic Address Groups
for details.
Integrated Policy Rules
The NSX Firewall and the VM-Series firewall work in concert to enforce security; each provides a set of traffic
management rules that are applied to the traffic on each ESXi host. The first set of rules is defined on the NSX
Firewall; these rules determine traffic from which guests in the cluster are steered to the VM-Series firewall. The
second set of rules (Palo Alto Networks next-generation firewall rules) is defined on Panorama and pushed to
the VM-Series firewalls. These are security enforcement rules for the traffic that is steered to the Palo Alto
Networks NGFW service. These rules determine how the VM-Series firewall must process—that is allow, deny,
inspect, and constrain—the application for enabling it safely on your network.