Configure Traffic Flow Towards CN-Series HSF
Table of Contents
11.0
Expand all | Collapse all
-
- CN-Series Key Concepts
- CN-Series Core Building Blocks
- Components Required to Secure Kubernetes Clusters with CN-Series Firewall
- CN-Series Deployment—Supported Environments
- CN-Series System Requirements
- Quickstart- CN-Series Firewall Deployment
- CN-Series Performance and Scaling
- Additional CN-Series Resources
-
- CN-Series Deployment Checklist
- CN-Series Prerequisites
- Install a Device Certificate on the CN-Series Firewall
- Create Service Accounts for Cluster Authentication
- Install the Kubernetes Plugin and Set up Panorama for CN-Series
- Get the Images and Files for the CN-Series Deployment
- Editable Parameters in CN-Series Deployment YAML Files
- Enable Horizontal Pod Autoscaling on the CN-Series
- Secure 5G With the CN-Series Firewall
- Enable Inspection of Tagged VLAN Traffic
- Enable IPVLAN
- Uninstall the Kubernetes Plugin on Panorama
- Features Not Supported on the CN-Series
-
- CN-Series HSF System Requirements
- Configure Traffic Flow Towards CN-Series HSF
- Test Case: Layer 3 BFD Based CN-GW Failure Handling
- View CN-Series HSF Summary and Monitoring
- Validating the CN-Series HSF Deployment
- Custom Metric Based HPA Using KEDA in EKS Environments
- Features Not Supported on the CN-Series
Configure Traffic Flow Towards CN-Series HSF
The upstream/downstream router uses flow-based ECMP algorithm. When traffic reaches
CN-GW, it will distribute the traffic to one of the available CN-NGFWs through the
Traffic Interconnect (TI) link using symmetric hash algorithm. Traffic matching a
session from both directions (client to server and server to client) will always go
through the same CN-NGFW. Once the CN-NGFW process the traffic, and if you have set
a policy to
Allow
traffic, the traffic packet will be sent
back to the CN-GW to reach the server.
- Create a Logical Router on the firewall to participate in Layer 3 routing.
- Go tothen select the variable template from theNetworkRoutingLogical RouterTemplatedrop-down.
- Select a default virtual router or add aNamefor the new logical router.
- SelectGeneral, then add an already definedInterface.Repeat this step for adding all interfaces you want to add to the logical router.The ethernetX/1 and etehrnetX/2 interfaces are reserved for CI and TI links respectively. Select an interface betweenethernet1/3andethernet1/14.
- ClickOK.
- Set Administrative Distance for static routing. Range is 10 to 240; default is 10.Set Administrative Distances for types of routes as required for your network. When the virtual router has two or more different routes to the same destination, it uses administrative distance to choose the best path from different routing protocols and static routes by preferring a lower distance.
- Enable ECMP to leverage multiple equal-cost paths for forwarding.
- ClickOK.
- Configure the Layer 3 interface to enable traffic flow.When you Prepare Panorama for CN-Series HSF Deployment, you might have created a variable Template. To enable traffic flow through the cluster network, you must configure the variable template with necessary network and traffic configuration needed for load balancing the CN-Series HSF. You must configure the Layer 3 Ethernet interface with IPv4 addresses so that the firewall can perform routing on these interfaces. You would typically use the following procedure to configure an external interface that connects to the internet and an interface for your internal network.You can configure this template before or after deploying the CN-Series HSF.Ensure to not overlap the configuration of this template with theK8S-CNF-Clustering-Readonlytemplate created automatically during the Kubernetes plugin installation.
- Go to, then select the variable template from theNetworkInterfacesTemplatedrop-down.
- SelectEthernetinterface toAdd Interface.
- Select aSlotbetween 1 and 30.
- Enter anInterface Namebetweenethernet1/3andethernet1/14.
- ForInterface Type, selectLayer 3.
- On theConfigtab:
- ForLogical Router, select the logical router you are configured in Step 1.
- ForVirtual System, select the virtual system you are configuring if on a multi-virtual system firewall.
- ForSecurity Zone, select the zone to which the interface belongs or create aNew Zone.
- On theIPv4tab, selectDHCP Client.The firewall interface acts as a DHCP client and receives a dynamically assigned IP address. The firewall also provides the capability to propagate settings received by the DHCP client interface into a DHCP server operating on the firewall. For more information, see configure an interface as a DHCP client.
- ClickOK.
- Configure static routes for the logical router.
- Go to, then select the variable template from theNetworkRoutingLogical RouterTemplatedrop-down.
- Select thetab and clickStaticIPv4Add.
- Enter aNamefor the static route.
- Enter theDestinationroute and netmask. For example, 192.168.200.0/24.
- Select the outgoing interface for packets to use to go to the next hop.
- ForNext Hop, selectip-addressand enter the IP address of your internal gateway. For example, 192.168.100.2.
- Enter anAdmin Distancefor the route to override the default administrative distance set for static routes for this logical router (range is 10 to 240; default is 10).
- Enter aMetricfor the route (range is 1 to 65,535).
- Apply aBFD Profileto the static route so that if the static route fails, the firewall removes the route and uses an alternative route. Default isNone.
- ClickOK.