Virtual Systems
    
    Learn about Virtual Systems on Palo Alto Networks NGFW.
    
  
    
  
| Where Can I Use This? | What Do I Need? | 
|---|
    
| NGFW (Managed by PAN-OS or Panorama)
 |  | 
 
  
 
  
Virtual systems are separate, logical firewall instances within a single physical Palo
            Alto Networks firewall. Rather than using multiple firewalls, managed service providers
            and enterprises can use a single pair of firewalls (for high availability) and enable
            virtual systems on them. Each virtual system (vsys) is an independent,
            separately-managed firewall with its traffic kept separate from the traffic of other
            virtual systems.
There are many ways to use virtual systems in a network. One common use case is for an
            ISP or a managed security service provider (MSSP) to deliver services to multiple
            customers with a single firewall. Customers can choose from a wide array of services
            that can be enabled or disabled easily. The firewall’s role-based administration allows
            the ISP or MSSP to control each customer’s access to functionality (such as logging and
            reporting) while hiding or offering read-only capabilities for other functions.
Another common use case is within a large enterprise that requires different firewall
            instances because of different technical or confidentiality requirements among multiple
            departments. Like the above case, different groups can have different levels of access
            while IT manages the firewall itself. Services can be tracked and/or billed back to
            departments to thereby make separate financial accountability possible within an
            organization.
Virtual systems provide the same basic functions as a physical firewall, along with
            additional benefits:
- Segmented administration—Different organizations (or customers or business
                    units) can control (and monitor) a separate firewall instance, so that they have
                    control over their own traffic without interfering with the traffic or policies
                    of another firewall instance on the same physical firewall. 
- Scalability—After the physical firewall is configured, adding or removing
                    customers or business units can be done efficiently. An ISP, managed security
                    service provider, or enterprise can provide different security services to each
                    customer. 
- Reduced capital and operational expenses—Virtual systems eliminate the
                    need to have multiple physical firewalls at one location because virtual systems
                    co-exist on one firewall. By not having to purchase multiple firewalls, an
                    organization can save on the hardware expense, electric bills, and rack space,
                    and can reduce maintenance and management expenses. 
- Ability to share IP-address-to-username mappings—By assigning a virtual
                    system as a User-ID hub, you can share the IP-address-to-username mappings
                    across virtual systems to leverage the full User-ID capacity of the firewall and
                    reduce operational complexity.  
    Administrative Roles for Virtual Systems
    A Superuser administrator can create virtual systems and add a
                    Device administrator, vsysadmin,
                or vsysreader. A Device administrator
                can access all virtual systems, but cannot add administrators. When you create an
                Admin Role profile and select the role to be Virtual System,
                the role applies to specific virtual systems on the firewall. From the
                    Command Line tab, the two types of virtual system
                administrative roles are:
- vsysadmin—Has access to specific virtual systems on the firewall to
                        create and manage specific aspects of virtual systems. A vsysadmin doesn’t
                        have access to network interfaces, VLANs, virtual wires, virtual routers,
                        IPSec tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles.
                        Persons with vsysadmin permission can commit configurations for only the
                        virtual systems assigned to them. 
- vsysreader—Has read-only access to specific virtual systems on the
                        firewall and specific aspects of virtual systems. A vsysreader doesn’t have
                        access to network interfaces, VLANs, virtual wires, virtual routers, IPSec
                        tunnels, GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles. 
A virtual system administrator can view logs of only the virtual systems assigned to
                that administrator. A Superuser or Device
                    administrator can view all of the logs, select a virtual system to
                view, or configure a virtual system as a User-ID hub.
 
 
    
    Virtual System Functionality with Other Features
    Many firewall features and functionality are capable of being configured, viewed,
                logged, or reported per virtual system. Therefore, virtual systems are mentioned in
                other relevant locations in the documentation and that information is not repeated
                here. Some of the specific chapters are the following:
- If you are configuring Active/Passive HA, the two firewalls must have the
                        same virtual system capability (single or multiple virtual system
                        capability). See  High Availability- . 
- For information about configuring a firewall with virtual systems in a
                        virtual wire deployment that uses subinterfaces (and VLAN tags), see  Virtual Wire Interfaces- .