In this section, you will configure a VM-Series firewall in Strata Cloud Manager, download the corresponding Terraform template, and deploy it
in your cloud environment. This setup will integrate the VM-Series
firewall into your cloud network architecture, enabling comprehensive monitoring and
protection of your assets.
Navigate to Insights Prisma AIRS Prisma AIRS AI Runtime: Network Intercept.
Select Add Protections ("+" icon).
Select Cloud Service Provider and select Next.
In Firewall Placement, select the network traffic type that the VM-Series firewall can inspect. Refer to the following table
showing the network traffic type that the VM-Series firewall can support:
Traffic Type
AI Runtime Security: Network
intercept
VM-Series
AI Traffic - Traffic between your applications
and AI Models
✅
Non-AI Traffic and namespaces (example,
kube-system)
✅
Cluster Traffic
✅
Non-AI and non-cluster traffic
✅
✅
When you select any namespace, the VM-Series firewall option becomes unavailable because only
Prisma AIRS AI Runtime: Network intercept can
secure these namespaces.
Select Next.
In Region & Application(s):
Select your cloud account to secure from the onboarded cloud
accounts list.
Select a region in which you want to protect the
applications.
In Selected applications:
Select the applications to secure from the available list. This list
includes application workloads such as namespaces or VPCs.
The available applications are
determined by the application definition criteria you configured
during cloud account
onboarding in the “Application Definition”
step.
Set the Public IP address on the External Load Balancer (ELB)
for each application by selecting:
Auto generate: Automatically assigns an ephemeral
(temporary) IP address to your application.
Input manually: Create and assign a static IP address to
your application.
Each application is mapped to one public ELB IP address.
Configure Traffic Inspection (to protect your clusters at
namespace-level only):
Traffic inspection is available only when you select namespaces from
the applications list. Select the namespace and configure how to
handle traffic from specific network segments (Limit to 10 CIDRs per
cluster that can be inspected or bypassed at any time):
Inspect certain CIDRs: Only inspect traffic from
specified subnet ranges.
Bypass certain CIDRs: Exclude traffic from specified
subnet ranges from inspection.
For container applications, all traffic to
and from the applications is protected by default. Use
traffic inspection options only when you need granular
control over which network segments are inspected or
bypassed.
When protecting traffic from namespaces
using traffic inspection, select only the namespace
and not its parent VPC to avoid deployment failures.
The same GWLB endpoint can't be used for both VPC
and namespace-level protection in the same
zone.
Select the Undiscovered VPC(s) tab for GCP and AWS, or the
Added vNet tab for Azure.
In Protection Settings:
In the Deployment parameters, select VM-Series firewall
type.
The VM-Series firewall secures traffic from non-containerized
workloads, such as VPCs, non-containerized Serverless and Lambda
functions, and EC2s. Choose the VM-Series instance to analyze
network traffic from AI workloads and containerized
applications.
Enter the Service account attached to security VM.
Enter Number of firewalls to deploy.
Select zones to deploy firewalls from the available zones.
Choose the instance type for the security VM.
Configure the following:
IP addressing scheme
Licensing
SCM management parameters
CIDR value for untrust VPC.
CIDR value for trust VPC.
CIDR value for management VPC.
Enter the following values:
PAN OS version for your image from the
available list.
Flex authentication code (Copy AUTH CODE
for the deployment profile you created for VM-Series firewall in Customer Support
Portal).
Enter a unique Terraform template name. (Use only lowercase
letters, numbers, and hyphens. (Don't use a hyphen at the beginning or
end, and limit the name to under 19 characters).
Create terraform template.
Save and Download Terraform Template.
Close the deployment workflow to exit.
Unzip the downloaded file. Navigate to <unzipped-folder>
with 2 directories: `architecture` and `modules`. Deploy the Terraform templates
in your cloud environment following the `README.md` file in the `architecture`
folder.
Initialize and apply the Terraform for the security_project.
The `security_project` contains the Terraform plan to deploy a VM-Series in your architecture. The Terraform plan creates
the required resources to deploy VM-Series firewall with
inline prevention mode, including the managed instance groups, load
balancers, and health checks.
cd architecture //Change directory to architecture/security_project
cd security_project
terraform init
terraform plan
terraform apply
The security Terraform generates the following output. Ensure to record the IP
addresses within the lbs_external_ips &
lbs_internal_ips
outputs.
The `security_project` Terraform also creates an IP-tag collector service,
enabling you to retrieve IP-tag information from clusters. These tags populate
dynamic address groups (DAGs) for automated security enforcement.
Run the application Terraform to peer the application VPCs.
cd ../application_project
terraform init
terraform plan
terraform apply
The application_security Terraform generates the
following
output:
Configure Strata Cloud Manager or Panorama to secure VM workloads and
Kubernetes clusters and deploy pods. Configure interfaces, zones, NAT policy,
routers, and security policy rules.
Navigate to Workflows→ NGFW Setup → Device Management. The VM-Series
appears under Cloud Managed Devices.
Switch to the Cloud Managed Devices tab to view and
manage the connected state, the configuration sync state, and the deployed VM-Series licenses.
It takes a while before the Device Status shows as
connected.