CN-Series Firewall for Kubernetes
Focus
Focus
CN-Series

CN-Series Firewall for Kubernetes

Table of Contents

CN-Series Firewall for Kubernetes

Where Can I Use This?
What Do I Need?
  • CN-Series
    deployment
  • CN-Series 10.1.x or above Container Images
  • Panorama
    running PAN-OS 10.1.x or above version
  • Helm 3.6 or above version client
    for CN-Series deployment with Helm
The Palo Alto Networks Container Native Firewalls (CN-Series) are natively integrated into kubernetes (k8s) to provide complete L7 visibility, application level segmentation, DNS Security, and protection from advanced threats for traffic going across trusted zones in public cloud or data center environments. It enables you to isolate and protect workloads, application stacks, and services, even as individual containers scale up, down, or across hosts and consistently apply security policies that are based on kubernetes labels.
Application deployment in a kubernetes environment is dynamic and the following teams are often involved in the container life cycle:
  • Platform (PAAS) Admin
    —Manages the Kubernetes clusters and other infrastructure components in public cloud and data centers.
  • App Teams
    —Deploy their individual containerized and other applications in kubernetes namespaces/projects provided by PAAS admin.
  • Security Admin
    —Provisions security for the entire deployment including kubernetes clusters and individual containerized applications.
In this dynamic scenario and interplay with multiple teams, security management and monitoring pose a challenge. The
CN-Series
enables your security administrator to provision security for the containerized applications across a wide range of environments including Cloud Provider Managed k8s such as GKE, EKS, AKS, AliCloud ACK, and Customer Managed k8s such as Openshift, and Native k8s on the public cloud or on premises data centers. The
CN-Series
uses Kubernetes constructs and metadata driven policy so that the teams can automate the deployment and efficiently enforce security policy to consistently protect from known and unknown threats.

Recommended For You