High Availability Support for CN-Series Firewall as a Kubernetes CNF
Focus
Focus
CN-Series

High Availability Support for CN-Series Firewall as a Kubernetes CNF

Table of Contents

High Availability Support for CN-Series Firewall as a Kubernetes CNF

Where Can I Use This?What Do I Need?
  • CN-Series deployment
  • CN-Series 10.2.x or above Container Images
  • Panorama running PAN-OS 10.2.x or above version
  • Helm 3.6 or above version client for CN-Series deployment with Helm
High availability (HA) is a configuration in which two firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down. Setting up the firewalls in a two-device cluster provides redundancy and allows you to ensure business continuity.
You can now deploy the CN-series-as-a-kubernetes-CNF in HA. This mode of deployment supports only active/passive HA with session and configuration synchronization.
When you deploy the CN-Series-as-a-Kubernetes CNF in HA, there will be two PAN-CN-MGMT-CONFIGMAP, PAN-CN-MGMT, and PAN-CN-NGFW YAML files each for active and passive nodes.
To successfully deploy the CN-Series firewall as a Kubernetes CNF in HA with layer 3 support:
  • In HA, each Kubernetes node should have at least three interfaces: Management (default), HA2 interface, and data interface.
  • For CN-Series firewall in L3 mode, there should be at least two interfaces: Management (default) and data interface.
  • Modify the new Network Attachment definition YAML files with the following changes:
    • Ensure that the PAN_HA_SUPPORT parameter value is true in the following YAML files:
      pan-cn-mgmt-configmap-0.yaml
      pan-cn-mgmt-configmap-1.yaml
    • Retrieve the pciBusID value from the hypervisor interface running the following command:
      ethtool -i interface name
      Add the above retrieved pciBusID value to the following Network definition files:
      net-attach-def-1.yaml
      net-attach-def-2.yaml
      net-attach-def-3.yaml
      net-attach-def-ha2-0.yaml
      net-attach-def-ha2-1.yaml
    • Retrieve the static IP address of the HA2 interface from the corresponding node instance on the AWS console and add it to the address parameter of net-attach-def-ha2-0.yaml and net-attach-def-ha2-1.yaml file.
    If you are using Advanced Routing consider that CN-Series firewalls deployed in CNF mode are only supported in EKS and on-prem environments. If you are using Advanced Routing with the Kubernetes 3.0.0 plugin, you must configure it manually on the template stack; in the file pan-cn-mgmt-console.yaml, set the flag PAN_ADVANCED_ROUTING:”true”.