End-of-Life (EoL)
Install the VM-Series Firewall with
Service Chaining or Scaling
Complete the following steps to prepare the
heat templates, bootstrap files, and software images needed to deploy
the VM-Series firewall. After preparing the files, deploy the VM-Series
firewall service and two Linux servers.
- Download the Heat template and bootstrap files.Download the Heat template package from the GitHub repository.
- Download the VM-Series base image.
- Login in to the Palo Alto Networks Customer Support Portal.
- SelectSoftware Updatesand choosePAN-OS for VM-Series KVM Base Imagesfrom theFilter Bydrop-down.
- DownloadPA-VM-KVM-8.0.0.qcow2.
- Download Ubuntu 14.04 and upload the image to the OpenStack controller.For service chaining, you can use the default image provided by OpenStack called TestVM. Skip this step when using TestVM. An Ubuntu image is required for service scaling.
- Download Ubuntu 14.04.
- Log in to the Horizon UI.
- Select.ProjectComputeImagesCreate Image
- Namethe image Ubuntu 14.04 to match the parameter in the pan_basic_gw_env.yaml file.
- Set Image Source toImage File.
- ClickChoose Fileand navigate to your Ubuntu image file.
- Set the Format to match the file format of your Ubuntu image.
- ClickCreate Image.
A server key is required when using an Ubuntu image. Ensure that the server key is added to the environment file. - Upload the VM-Series for KVM base image to the OpenStack controller.
- Log in to the Horizon UI.
- Select.ProjectComputeImagesCreate Image
- Namethe image pa-vm-8.0.0.
- Set Image Source toImage File.
- ClickChoose Fileand navigate to your VM-Series image file.
- Set the Format toQCOW2-QEMU Emulator.
- ClickCreate Image.
- Upload the bootstrap files. The files must be uploaded to the folder structure described here. The heat template uses this folder structure to locate the bootstrap files.
- Log in to your OpenStack controller.
- Create the following folder structure:/root/bootstrap/config//root/bootstrap/license/
- Using SCP or FTP, add the init-cfg.txt and bootstrap.xml files to the config folder and add your VM-Series auth codes to the license folder.
- Edit the template environment file to suit your environment. Verify that the image names in the environment file match the names you gave the files when you uploaded them.parameters: # VN config management_network: 'mgmt_net' left_vn: 'left_net' right_vn: 'right_net' left_vn_fqdn: 'default-domain:admin:left_net' right_vn_fqdn: 'default-domain:admin:right_net' route_target: "target:64512:20000" # VM config flavor: 'm1.small' left_vm_image: 'TestVM' right_vm_image: 'TestVM' svm_name: 'PAN_SVM_L3' left_vm_name: 'Left_VM_L3' right_vm_name: 'Right_VM_L3' port_tuple_name: 'port_tuple_L3' #ST Config S_Tmp_name: PAN_SVM_template_L3 S_Tmp_version: 2 S_Tmp_service_mode: 'in-network' S_Tmp_service_type: 'firewall' S_Tmp_image_name: 'PA-VM-8.0.0' S_Tmp_flavor: 'm1.large' S_Tmp_interface_type_mgmt: 'management' S_Tmp_interface_type_left: 'left' S_Tmp_interface_type_right: 'right' domain: 'default-domain' # SI Config S_Ins_name: PAN_SVM_Instance_L3 S_Ins_fq_name: 'default-domain:admin:PAN_SVM_Instance_L3' #IPAM Config NetIPam_ip_prefix_mgmt: '172.2.0.0' NetIPam_ip_prefix_len_mgmt: 24 NetIPam_ip_prefix_left: '10.10.1.0' NetIPam_ip_prefix_len_left: 24 NetIPam_ip_prefix_right: '10.10.2.0' NetIPam_ip_prefix_len_right: 24 NetIPam_addr_from_start_true: true #Policy Config policy_name: 'PAN_SVM_policy-L3' policy_fq_name: 'default-domain:admin:PAN_SVM_policy-L3' simple_action: 'pass' protocol: 'any' src_port_end: -1 src_port_start: -1 direction: '< >' dst_port_end: -1 dst_port_start: -1
- Edit the template files to point to the bootstrap files and auth codes. Under Personality, specify the file path to the location of your files. Uncomment whichever lines you are not using.Pan_Svm_instance: type: OS::Nova::Server depends_on: [ mgmt_InstanceIp, left_InstanceIp, right_InstanceIp ] properties: name: {get_param: svm_name } image: { get_param: S_Tmp_image_name } flavor: { get_param: S_Tmp_flavor } networks: - port: { get_resource: mgmt_VirtualMachineInterface } - port: { get_resource: left_VirtualMachineInterface } - port: { get_resource: right_VirtualMachineInterface } user_data_format: RAW config_drive: true personality: /config/init-cfg.txt: {get_file: "/root/bootstrap/config/init-cfg.txt"} # /config/init-cfg.txt: { get_file: "http://10.4.1.21/op_test/config/init-cfg.txt" } /config/bootstrap.xml: {get_file: "/root/bootstrap/config/Service_Chaining_bootstrap_L3.xml"} # /config/bootstrap.xml: { get_file: "http://10.4.1.21/op_test/config/Service_Chaining_bootstrap_L3.xml" } # /license/authcodes: {get_file: "/root/bootstrap/license/authcodes"} # /license/authcodes: {get_file: "http://10.4.1.21/op_test/license/authcodes"}
- Upload the heat template files.
- Log in to your OpenStack Controller.
- Use SCP or FTP to add the heat template file and environment file.
- Deploy the Heat template.
- Execute the commandsource openrc
- Execute the commandheat stack-create<stack-name>-f<template>-e ./<env-template>
- Verify that your VM-Series firewall is deployed successfully.You can use the following commands to check the creation status of the stack.
- Check the stack status withheat stack-list
- View a detailed list of events that occurred during stack creation withheat event-list
- View details about your stack withheat stack-show
- Verify that the VM-Series firewall is bidirectionally inspecting traffic between the Linux servers.
- Log in to the firewall.
- Selectto view the SSH session.MonitorLogsTraffic
Recommended For You
Recommended Videos
Recommended videos not found.