Prepare Panorama for CN-Series HSF Deployment
Table of Contents
11.0
Expand all | Collapse all
-
- CN-Series Key Concepts
- CN-Series Core Building Blocks
- Components Required to Secure Kubernetes Clusters with CN-Series Firewall
- CN-Series Deployment—Supported Environments
- CN-Series System Requirements
- Quickstart- CN-Series Firewall Deployment
- CN-Series Performance and Scaling
- Additional CN-Series Resources
-
- CN-Series Deployment Checklist
- CN-Series Prerequisites
- Install a Device Certificate on the CN-Series Firewall
- Create Service Accounts for Cluster Authentication
- Install the Kubernetes Plugin and Set up Panorama for CN-Series
- Get the Images and Files for the CN-Series Deployment
- Editable Parameters in CN-Series Deployment YAML Files
- Enable Horizontal Pod Autoscaling on the CN-Series
- Secure 5G With the CN-Series Firewall
- Enable Inspection of Tagged VLAN Traffic
- Enable IPVLAN
- Uninstall the Kubernetes Plugin on Panorama
- Features Not Supported on the CN-Series
-
- CN-Series HSF System Requirements
- Configure Traffic Flow Towards CN-Series HSF
- Test Case: Layer 3 BFD Based CN-GW Failure Handling
- View CN-Series HSF Summary and Monitoring
- Validating the CN-Series HSF Deployment
- Custom Metric Based HPA Using KEDA in EKS Environments
- Features Not Supported on the CN-Series
Prepare Panorama for CN-Series HSF Deployment
Install the Kubernetes plugin 4.0 on Panorama OS 11.0 and set it up to monitor your
Kubernetes clusters.
The CN-Series HSF configuration and deployment are done through Panorama. Before
deploying the CN-Series HSF, make sure that you have completed the following
prerequisites.
- Deploy a Panorama with software version 11.0 and install the minimum content version.
- Go tofor the minimum content release version on PAN-OS 11.0.PanoramaDynamic UpdatesSee PAN-OS Release Notes.
- Go tofor the software version.PanoramaSoftwareLocate and download the model-specific file for the release version to which you are upgrading. For example, to upgrade an M-Series appliance to Panorama 11.0.0, download the Panorama_m-11.0.0 image; to upgrade a Panorama virtual appliance to Panorama 11.0.0, download the Panorama_pc-11.0.0 image.After a successful download, theActioncolumn changes from Download to Install for the downloaded image.
- Verify that your Panorama is in Panorama mode if you want Panorama to collect the firewall logs.
- Install the Kubernetes plugin 4.0 version on Panorama. If your Panorama appliances are deployed as an HA pair, you must install the Kubernetes plugin on the primary (active) peer first.
- Log in to the Panorama Web Interface and selectand clickPanoramaPluginsCheck Nowto get the list of available plugins.
- SelectDownloadandInstallthe Kubernetes plugin 4.0 version.After you successfully install the plugin, Panorama refreshes and the Kubernetes plugin appears on thePanoramatab.If Panorama is deployed in an HA pair, install the Kubernetes plugin on the secondary (passive) Panorama using the steps described in Step 3.
- ClickCommit to Panorama.The commit creates aK8S-CNF-Clustering-Readonlytemplate for use with the CN-Series HSF. It can take up to one minute for the interfaces to display on Panorama. This Template has the network configuration of the preconfigured Cluster Interconnect (CI) link for CN-GW, CN-DB, and CNNGFW pods and Traffic Interconnect (TI) link for CN-GW and CN-NGFW pods. TheK8S-CNF-Clustering-Readonlycreates 30 logical routers and two interfaces per logical router. The ethernet x/1 are cluster interconnect (CI) links whereas ethernet x/2 are cluster interconnect (TI) links.Make sure that you do not rename theK8S-CNG-Clustering-Readonlytemplate.
You can verify the General Information widget on the Panorama.DashboardGeneral Information - Get the CN-Series HSF license credits on Panorama.
- Select.PanoramaPluginsKubernetesSetupLicenses
- SelectActivate/update using authorization code, and enter the auth code and the total number of dataplane vCPUs needed. You must Create a CN-Series Deployment Profile to obtain your CN-Series authcode.When the CN-Series is deployed with HSF, if the number of pods (CN-NGFW, CN-GW, and CN-DB) deployed exceeds the number of allocated vCPUs, you have a four-hour grace period to add more vCPUs to your deployment profile or delete enough pods. If you do not allocate additional vCPUs or delete unlicensed pods within the four-hour grace period, the unlicensed pods will restart and create traffic disruption. The already licensed pods remain licensed.
- Verify that the number of available license credits is updated.
- Create a parent Device Group.You must create a device group with necessary policies and objects required for CN-Series HSF. You have to reference this device group when you deploy the CN-Series HSF.
- Go toand clickPanoramaDevice GroupsAdd.
- Enter a uniqueNameand aDescriptionto identify the device group.
- Select theParent Device Group(default isShared) that will be just above the device group you are creating in the device group hierarchy.
- ClickOK.The device group name is bootstrapped to the CN-MGMT pod in the cluster. When CN-MGMT pods connect to Panorama with these bootstrap parameters, the device group gets associated with the cluster name in the cluster configuration. For Panorama High Availability (HA), the CN-MGMT pod sends updates to both active and passive Panoramas. Cluster information is automatically populated for the CN-NGFW, CN-DB, and CN-GW pods when they are active.
- Selectto commit and push the device group configuration to Panorama.CommitCommit and Push
- Create variable Template to enable traffic flow.
- Go toand clickPanoramaTemplatesAdd.
- Enter a uniqueNamefor the template.
- Add an optionalDescription.
- You can configure this template before or after deploying the CN-Series HSF.
- Create a Log Collector and add it to a Log Collector Group.
- Go toandPanoramaCollector GroupsAdda Collector Group.
- Enter aNamefor the Collector Group.
- Enter theMinimum Retention Periodin days (1 to 2,000) for which the Collector Group will retain firewall logs.By default, the field is blank, which means the Collector Group retains logs indefinitely.
- AddLog Collectors (1 to 16) to the Collector Group Members list.
- Select, to commit and push your changes to Panorama and the Collector Group you configured.CommitCommit and Push
The Panorama authkey will be created and managed by the Kubernetes plugin.