Secure 5G With the CN-Series Firewall


Secure 5G With the CN-Series Firewall

Table of Contents

Secure 5G With the CN-Series Firewall

Use the 5G-Native Security capabilities on the CN-Series firewall for visibility and control of 5G traffic.
Where Can I Use This?
What Do I Need?
  • CN-Series Firewall
  • CN-Series 10.1.x or above Container Images
  • Panorama
    running PAN-OS 10.1.x or above version
  • Helm 3.6 or above version client
    for CN-Series deployment with Helm
For visibility and control of 5G traffic for private enterprises and 5G Mobile Packet Core deployments in a Mobile Operator Networks on Kubernetes, review the following sections for supported environments and how to modify the YAML files to unlock GTP Securityand 5G-Native Security on the CN-Series firewall. In addition to enabling these capabilities when you deploy the CN-Series firewall, you must also enable Panorama for GTP Security and/or SCTP Security.
Container runtime
Kubernetes version
1.17 through 1.27
Cloud provider managed Kubernetes
  • AWS EKS (1.17 through 1.27 for CN-Series as a daemonset and CN-Series as a Service mode of deployment. )
  • AWS EKS (1.17 through 1.22 for CN-Series as a CNF mode of deployment.)
  • AWS EKS (1.22 through 1.27 for CN-Series as a CN-Cluster deployment.)
  • EKS on AWS Outpost (1.17 through 1.25)
    CN-Series for EKS on AWS Outpost does not support SR-IOV or Multus.
  • Azure AKS (1.17 through 1.27)
    In Azure AKS, the PAN-OS 11.0.2 is the minimum required version to support kubernetes 1.25 and above.
  • GCP GKE (1.17 through 1.27)
    Includes GKE Dataplane V2.
  • OCI OKE (1.23)
Customer managed Kubernetes
On the public cloud or on-premise data center.
Make sure that the Kubernetes version, CNI Types, and Host VM OS versions are as listed in this table.
VMware TKG+ version 1.1.2
  • Infrastructure Platform—vSphere 7.0
  • Kubernetes Host VM OS—Photon OS
Kubernetes Host VM
Operating System:
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu-22.04
  • RHEL/Centos 7.3 and later
  • CoreOS 21XX, 22XX
  • Container-Optimized OS
Linux Kernel Version:
Linux Kernel Netfilter: Iptables
CNI Plugins
CNI Spec 0.3 and later:
  • Azure
  • Calico
  • Flannel
  • Weave
  • For Openshift, OpenshiftSDN
  • The following are supported on the CN-Series firewall as a DaemonSet.
    • Multus
    • Bridge
    • SR-IOV
    • Macvlan
  • Version 4.2, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9, 4.10, 4.11, 4.12, and 4.13.
    OpenShift 4.7 is qualified on the CN-Series as a DaemonSet only.
    The PAN-OS 11.0.2 is the minimum required version to support 4.12 and above.
  • OpenShift on AWS
Container Runtime
CN-Series firewall
Kubernetes plugin
PAN-OS 10.0.3 or later
1.0.1 or later
10.0.0 or later
The following are list of all the editable Parameters in the YAML file that you use to deploy the CN-Series firewall: For details, see Editable Parameters in CN-Series Deployment yaml files and CN-Series Core building blocks.
Enable GTP
On the pan-cn-mgmt-configmap.yaml set—
, before you deploy the CN-MGMT StatefulSet.
Enable Jumbo Frame Mode
On the pan-cn-mgmt-configmap.yaml set:
, before you deploy the CN-MGMT StatefulSet.
The CN-MGMT pod during bootup uses the "eth0" MTU to auto-detect whether to enable jumbo-frame mode. So, if your secondary CNI uses jumbo frames, while the primary CNI does not, you must define
to enable jumbo frame mode on the CN-Series firewall.
CN-Series currently doesn't support DPDK and it doesn't allow the app pod to use DPDK. You might need to modify the app pod if the app does not automatically adjust to non DPDK mode.
Enable System Resource Flexibility
If you need higher throughput and want to configure more memory to address your deployment needs on the pan-cn-mgmt-configmap.yaml set: PAN_NGFW_MEMORY="48Gi"
For templating (Helm), it can take the same variable as allocated for CN-NGFW pod. When enable a larger memory footprint, the CN-MGMT StatefulSet only supports one CN-NGFW pod.
Configure vCPU, Memory for 5G
The recommended configuration for CN-MGMT pods (in pan-cn-mgmt.yaml) and NGFW pods (in pan-cn-ngfw.yaml) is to have identical values in "request" and "limit" for cpus and memory to achieve guaranteed QoS.
For CN-MGMT pods, recommended values are cpu=4, memory=16Gi. To control placement of CN-MGMT pods, for example on the same or different nodes than where the CN-NGFW pods are deployed, use the node-selector capability in k8s.
For CN-NGFW pods, recommended values are cpu=12, memory=48Gi. To control placement of CN-NGFW pods for example on the same or different nodes than where the CN-NGFW pods are deployed, use the node-selector capability in k8s.
Select the CNI yaml file
The Multus CNI acts as a meta-plugin, that calls other CNI plugins. On OpenShift environments, Multus is enabled by default, so you can use the
. On other environments where Multus is supported but is optional, such as with self-managed (native) environments, use the
instead of the
Also review the System Requirements for CN-Series firewall before you continue to deploy the CN-Series firewall.

Recommended For You