Onboard IoT Security on VM-Series Firewalls with Software NGFW Credits
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series Firewalls with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
Onboard IoT Security on VM-Series Firewalls with Software NGFW Credits
Use Software NGFW credits to onboard IoT Security on VM-Series firewalls.
A Palo Alto Networks VM-Series firewall is a virtualized form
factor of a Palo Alto Networks next-generation firewall and is intended for use in a
virtualized or cloud environment. When you use Software NGFW credits to fund VM-Series
firewalls with either fixed or flexible virtual CPUs (vCPUs), you can include IoT
Security in the deployment profile during the firewall registration process.
You can also use Software NGFW credits to fund CN-Series firewalls with an IoT
Security subscription as long as the firewalls are under Panorama management.
For onboarding instructions of a CN-Series firewall with IoT Security, see IoT Security Support for CN-Series
Firewall.
The following onboarding procedure is for VM-Series firewalls with an IoT Security
subscription. It assumes that you have already purchased Software NGFW credits and
activated them. At this point, you can use
the Software NGFW credits to purchase VM-Series firewalls.
- Create one or more deployment profiles for VM-Series firewalls.Create a deployment profile for each type of VM-Series firewall model you want to deploy.
- Log in to the Customer Support Portal (CSP), and—if you have multiple accounts—choose the account you want to use.
- Selectto view the Software NGFW Credits Dashboard.ProductsSoftware NGFW Credits
- Locate your purchased NGFW Credits pool on the dashboard andCreate Deployment Profile.
- SelectVM Seriesand eitherFixed vCPU models (Valid for all currently supported PAN-OS releases)orFlexible vCPUs (PAN-OS 10.0.4 and above)and then clickNext.
- Assuming you selectedFixed vCPU models (Valid for all currently supported PAN-OS releases), configure the following and thenCreate Deployment Profile:Profile Name: Enter a name for the deployment profile.Number of Firewalls: Enter the maximum number of firewalls that can be associated with this deployment profile.Fixed vCPU model: Choose a VM-Series firewall model from the list.Security Use Case: ChooseCustom.Customize Subscriptions: Clear all preselected items and selectIOT.IOT Subscription: Choose the type of IoT Security subscription to activate on the VM-Series firewalls. The different types are based on vertical themes with or without traffic log retention in Cortex Data Lake.Use Credits to Enable VM Panorama: (clear all)After creating the deployment profile, it appears in the Current Deployment Profiles table on thepage.AssetsSoftware NGFW Credits
- (Optional) After you clickCreate Deployment Profile, you can return to the configuration and clickCalculate Estimated Costto see an estimation of how many Flex credits will be deducted from your account and your remaining balance. If you hover your cursor over the question mark next to the estimate, you can see the credit breakdown for each component.
- If you have other types of firewall models to deploy, create additional deployment profiles, one for each type.
- Activate IoT Security subscriptions based on the deployment profile in Common Services.
- Log in to the hub with your Palo Alto Networks Customer Support credentials.The hub fetches available deployment profiles for this account from the CSP.
- Select.Common ServicesSubscriptions & Add-onsThe deployment profile you created appears in the Ready for Activation section at the top of the page.
- ClickActivate Now.The Activate Subscriptions based on Deployment Profile(s) page appears.
- Configure the following IoT Security subscription activation settings:Customer Support Account: Choose your CSP account with the deployment profile.Recipient: Use an existing tenant or create a new one.To create a new tenant, hover your cursor overAll Tenantsat the top of the Select Tenant drop-down list and then click theAddicon (+) that appears on the right. Enter a unique name for the tenant service group (TSG) and choose a business vertical.Select Region: When activating an IoT Security subscription that doesn’t require a Cortex Data Lake, select the region where the logging service will ingest network traffic logs that the VM firewalls send it for IoT Security to access and analyze.When activating an IoT Security subscription that does require a Cortex Data Lake, you must first already have an activated Cortex Data Lake instance in the same tenant service group (TSG). IoT Security will then use this instance by default. The TSG might already have another product with an activated Cortex Data Lake (PA+CDL or AIOps+CDL for example), or you might have migrated an activated standalone Cortex Data Lake instance to the TSG before activating the IoT Security subscription. In either case, the region will be automatically populated based on the region of the existing data lake in the TSG.Select Deployment Profile(s): Select the deployment profile you previously created.There are two sections for deployment profiles:AvailableandUnavailable. Deployment profiles appear in the Unavailable section if a required component is missing. For example, if the IoT Security subscription in the deployment profile requires a Cortex Data Lake but the tenant service group (TSG) doesn’t have one, the deployment profile will be in the Unavailable section. You will need to activate the required Cortex Data Lake before attempting to activate IoT Security in such scenarios.When you create multiple deployment profiles, it's possible that they have different IoT Security subscriptions. When using them in the same IoT tenant, the IoT Security subscription type in the first deployment profile takes precedence over others added afterward.Configure Subscription URL(s): Enter a unique subdomain to complete the <subdomain>.iot.paloaltonetworks.com URL for your IoT Security application. This will be the URL where you log in to the IoT Security portal.
- Agree to the Terms and Conditionsand thenActivate.The hub displays the Tenant Management page where you can see the IoT Security initialization status for the TSG. The initialization generally takes a few minutes to complete.
- Associate firewalls through the deployment profile with the IoT Security subscription in the TSG.
- Register a VM-Series firewall using one of the two methods described in Register the VM-Series Firewall (Software NGFW Credits) and thenSubmitthe registration.When registering a VM-Series firewall that cannot access the CSP, you must enter a UUID, a CPU ID, the number of vCPUs on the firewall, and the amount memory allocated to the firewall. This information is in the General Information section on theDashboardpage of the web interface on your firewall. You can copy it from there and paste it in the Register Firewall form. You can also download this information from the firewall web interface to a text file by selecting. Then on the Register Firewall page in the CSP,DeviceLicensesActivate Feature using Auth CodeDownload Authorization FileUpload a File for UUID & CPUID.After you submit the firewall registration, the CSP associates this firewall through the deployment profile with the TSG. It typically takes a few minutes for the registration and association to complete. When completed, you can see the firewall on thetab in the hub.Common ServicesDevice AssociationsDuring the firewall registration, the number of Software NGFW credits needed to fund the virtual firewall are automatically deducted from your pool of credits.
- Associate more firewalls to the TSG through the same deployment profile or, if they are different types of firewall models, through other deployment profiles you have created for them.It’s not currently possible to extend, renew, or offboard IoT Security licenses that have been activated on VM-Series firewalls funded by Software NGFW credits. In addition, Enterprise License Agreements (ELA) and IoT Security FedRAMP Moderate licenses are not supported.
- Configure the VM-Series firewalls to provide network traffic logs with IoT Security.Now that you’ve onboarded IoT Security onto your VM-Series firewall, follow the steps in Prepare Your Firewall for IoT Security to configure it to log network traffic and forward the traffic logs to the logging service, which then streams network traffic metadata to IoT Security for analysis.