Prepare Panorama for CN-Series HSF Deployment
Focus
Focus
CN-Series

Prepare Panorama for CN-Series HSF Deployment

Table of Contents

Prepare Panorama for CN-Series HSF Deployment

Install the Kubernetes plugin 4.0 on Panorama OS 11.0 and set it up to monitor your Kubernetes clusters.
The CN-Series HSF configuration and deployment are done through Panorama. Before deploying the CN-Series HSF, make sure that you have completed the following prerequisites.
  1. Deploy a Panorama with software version 11.0 and install the minimum content version.
    1. Go to
      Panorama
      Dynamic Updates
      for the minimum content release version on PAN-OS 11.0.
    2. Go to
      Panorama
      Software
      for the software version.
      Locate and download the model-specific file for the release version to which you are upgrading. For example, to upgrade an M-Series appliance to Panorama 11.0.0, download the Panorama_m-11.0.0 image; to upgrade a Panorama virtual appliance to Panorama 11.0.0, download the Panorama_pc-11.0.0 image.
      After a successful download, the
      Action
      column changes from Download to Install for the downloaded image.
  2. Verify that your Panorama is in Panorama mode if you want Panorama to collect the firewall logs.
  3. Install the Kubernetes plugin 4.0 version on Panorama. If your Panorama appliances are deployed as an HA pair, you must install the Kubernetes plugin on the primary (active) peer first.
    1. Log in to the Panorama Web Interface and select
      Panorama
      Plugins
      and click
      Check Now
      to get the list of available plugins.
    2. Select
      Download
      and
      Install
      the Kubernetes plugin 4.0 version.
      After you successfully install the plugin, Panorama refreshes and the Kubernetes plugin appears on the
      Panorama
      tab.
      If Panorama is deployed in an HA pair, install the Kubernetes plugin on the secondary (passive) Panorama using the steps described in Step 3.
    3. Click
      Commit to Panorama
      .
      The commit creates a
      K8S-CNF-Clustering-Readonly
      template for use with the CN-Series HSF. It can take up to one minute for the interfaces to display on Panorama. This Template has the network configuration of the preconfigured Cluster Interconnect (CI) link for CN-GW, CN-DB, and CNNGFW pods and Traffic Interconnect (TI) link for CN-GW and CN-NGFW pods. The
      K8S-CNF-Clustering-Readonly
      creates 30 logical routers and two interfaces per logical router. The ethernet x/1 are cluster interconnect (CI) links whereas ethernet x/2 are cluster interconnect (TI) links.
      Make sure that you do not rename the
      K8S-CNG-Clustering-Readonly
      template.
    You can verify the General Information widget on the Panorama
    Dashboard
    General Information
    .
  4. Get the CN-Series HSF license credits on Panorama.
    1. Select
      Panorama
      Plugins
      Kubernetes
      Setup
      Licenses
      .
    2. Select
      Activate/update using authorization code
      , and enter the auth code and the total number of dataplane vCPUs needed. You must Create a Deployment Profile to obtain your CN-Series authcode.
      When the CN-Series is deployed with HSF, if the number of pods (CN-NGFW, CN-GW, and CN-DB) deployed exceeds the number of allocated vCPUs, you have a four-hour grace period to add more vCPUs to your deployment profile or delete enough pods. If you do not allocate additional vCPUs or delete unlicensed pods within the four-hour grace period, the unlicensed pods will restart and create traffic disruption. The already licensed pods remain licensed.
    3. Verify that the number of available license credits is updated.
  5. Create a parent Device Group.
    You must create a device group with necessary policies and objects required for CN-Series HSF. You have to reference this device group when you deploy the CN-Series HSF.
    1. Go to
      Panorama
      Device Groups
      and click
      Add
      .
    2. Enter a unique
      Name
      and a
      Description
      to identify the device group.
    3. Select the
      Parent Device Group
      (default is
      Shared
      ) that will be just above the device group you are creating in the device group hierarchy.
    4. Click
      OK
      .
      The device group name is bootstrapped to the CN-MGMT pod in the cluster. When CN-MGMT pods connect to Panorama with these bootstrap parameters, the device group gets associated with the cluster name in the cluster configuration. For Panorama High Availability (HA), the CN-MGMT pod sends updates to both active and passive Panoramas. Cluster information is automatically populated for the CN-NGFW, CN-DB, and CN-GW pods when they are active.
    5. Select
      Commit
      Commit and Push
      to commit and push the device group configuration to Panorama.
  6. Create variable Template to enable traffic flow.
    1. Go to
      Panorama
      Templates
      and click
      Add
      .
    2. Enter a unique
      Name
      for the template.
    3. Add an optional
      Description
      .
    4. You can configure this template before or after deploying the CN-Series HSF.
  7. Create a Log Collector and add it to a Log Collector Group.
    1. Go to
      Panorama
      Collector Groups
      and
      Add
      a Collector Group.
    2. Enter a
      Name
      for the Collector Group.
    3. Enter the
      Minimum Retention Period
      in days (1 to 2,000) for which the Collector Group will retain firewall logs.
      By default, the field is blank, which means the Collector Group retains logs indefinitely.
    4. Add
      Log Collectors (1 to 16) to the Collector Group Members list.
    5. Select
      Commit
      Commit and Push
      , to commit and push your changes to Panorama and the Collector Group you configured.
    The Panorama authkey will be created and managed by the Kubernetes plugin.

Recommended For You