Components Required to Secure Kubernetes Clusters with CN-Series Firewall
Know what components you need to deploy the CN-Series in your Kubernetes clusters.
The following is a list of what you need to Deploy the CN-Series Firewalls and secure the applications deployed within Kubernetes clusters.
- Panorama—A hardware-based or virtual appliance that can connect to the Kubernetes clusters where the applications and CN-Series firewalls are deployed. Panorama is required for license management and configuration management of the CN-Series firewalls. For more information, see CN-Series Core Building Blocks.
- Kubernetes Plugin on Panorama—Because of the rate of change with containerized applications, this plugin is required for visibility into container activity within a cluster and for managing the license token allocation for the firewall deployed on each node within a cluster.The Kubernetes plugin connects to Kubernetes clusters using service account credentials. From there it retrieves resource attributes and labels and creates tags and service objects. The tags can be used to create Dynamic address groups and reference them in Security policy for IP traffic enforcement. You can also use the service objects in Security policy to allow or deny traffic based on ports as well as IP addresses. The tags and service objects give you visibility and granular control for traffic enforcement within your Kubernetes cluster.
- Docker Images—To support the distributed architecture, the CN-Series firewall has four docker images that are available on the Palo Alto Networks portal. These images are published as three compressed tar archives (tar.gz format), and you must get these images unzip and do a Docker push to your image registry.Note:Make sure that the images and YAML files versions are compatible. The compressed files are:
- PanOS_cn-10.1.0.tgz—This archive includes the firewall management plane (CN-MGMT) and firewall dataplane (CN-NGFW) images.The unzipped image names are, for example:panos_cn_ngfw:10.1.0-b7andpanos_cn_mgmt:10.1.0-b7
- Pan_cn_mgmt_init-2.0.0.tgz—This archive includes the init container (CN-INIT) that contains the utilities required to deploy the management plane on the firewall. The init container enables secure IPSec communication between the CN-MGMT and CN-NFGW Pods. The unzipped image name is for example:pan_cn_mgmt_init:1.0.0-b1-c1.
- Pan_cni-2.0.0.tgz—This archive includes the CNI plugin that enables connectivity between the CN-MGMT and CN-NFGW and reconfigures the network interfaces on the application pods to redirect traffic to the CN-NGFW pod on each node. The unzipped image name is for example:pan_cni:2.0.0.
The images names listed above are examples and will change to reflect the latest release. You can find the latest images on the Palo Alto Networks portal.
- YAML Files—The YAML files that include the required fields and object specifications for deploying the resources in your Kubernetes clusters, and are published on GitHub.All the YAML files you need, for a supported environment such as native Kubernetes or GKE, are combined and zipped in one folder for your convenience.The YAML files are automatically deployed through HELM charts, which is the recommended method of deploying CN-Series Firewall.
- CN-MGMT has three YAML files—pan-cn-mgmt.yaml,pan-cn-mgmt-configmap.yaml,pan-cn-mgmt-secret.yaml,pan-cn-mgmt-slot-cr.yaml, andpan-cn-mgmt-slot-crd.yaml.
- CN-NGFW as a DaemonSet has two YAML files—pan-cn-ngfw.yaml, andpan-cn-ngfw-configmap.yaml. The CN-NGFW as a Kubernetes Service haspan-cn-ngfw-svc.yamlin addition to the previously mentioned files.
- CNI plugin has three YAML files—pan-cni-configmap.yamlandpan-cni.yamlorpan-cni-multus.yaml.If you are deploying the CN-Series on environments with the Multus CNI that acts as ameta-plugin, and calls other CNI plugins you have to choose eitherpan-cni.yamlorpan-cni-multus.yaml.When deploying the CN-Series on OpenShift, Multus is enabled by default, the pan-cni.yaml is adequate. Whereas, if you are deploying the CN-Series on an environment where the Multus CNI is supported but is optional such as with self-managed (native) environments, use the pan-cni-multus.yaml instead of the pan-cni.yaml.
- There is also apan-cni-serviceaccount.yamlthat is referenced in the service account creation section below.
- For OpenShift deployments there is an additionalpan-cni-net-attach-def.yaml.
- Service Account Creation—Three YAML files,pan-mgmt-serviceaccount.yaml,pan-cni-serviceaccount.yaml, andplugin-serviceaccount.yaml.pan-mgmt-serviceaccount.yamlandpan-cni-serviceaccount.yamlare for the CN-MGMT and CN-NGFW pods to authenticate to the cluster.Theplugin-serviceaccount.yamlis for the Kubernetes plugin on Panorama to authenticate to the cluster.
- Persistent volume YAML for Native Kubernetes deployments—pan-cn-pv-manual.yamlandpan-cn-pv-local.yaml.Thepan-cn-pv-manual.yamlis only provided for PoC with single node clusters. Palo Alto Networks strongly recommends the use of dynamically provisioned persistent volumes for storing the configuration and logs for the CN-MGMT pods that are referenced in thepan-cn-mgmt.yaml. Make sure to set up a persistent volume within the cluster for both the CN-MGMT pods.
- License auth code—The auth code enables you to license each instance of the CN-NGFW pod deployed on each node within a cluster.The license auth code is tied to the CN-Series deployment profile you created on the Palo Alto Network CSP. Additionally, it enables any security subscriptions you selected when creating your deployment profile.
Recommended For You
Recommended videos not found.