VM-Series is the virtualized form factor of the Palo Alto Networks next-generation firewall. To meet the growing need for inline security across diverse cloud and virtualization use cases, you can deploy the VM-Series firewall on a wide range of private and public cloud computing environments such as VMware, Cisco ACI and ENCS, KVM, OpenStack, Amazon Web Services, Microsoft public and private cloud, OCI, and Google Cloud Platform.
A virtual firewall, aka cloud firewall, is a network security solution designed specifically for environments in which deploying hardware firewalls is difficult or impossible, such as public and private cloud environments; software-defined networks, or SDN; and software-defined wide area networks, or SD-WAN.
The right next-generation virtual firewall can help to provide a consistent network security posture across your IT environment, including private clouds, public clouds and branch locations. Find more information on the core uses cases in 3 Virtual Firewall Use Cases.
The current focus for the VM Series is to secure east-west traffic in the virtualized datacenter. That being said, there are some environments where the VM Series fits rather nicely, such as "branch in a box" architectures. Additionally, any public cloud integrations/implementations will have to be delivered by a virtualized firewall. I think Palo Alto Networks did a great job with the VM Series. it looks just like their hardware firewalls from a software, configuration, and capability standpoint.
I am thinking how this would work physically. The virtual firewall sits on a VM host (shared with other VMs) which plugs directly into the switch. It is a flat network. Therefore both e1/1 and 1/2 on the palo will go into the same VLAN. How would the Palo know how to intercept the traffic with the client machines default gateway being the virtual firewall which also sits in the same VLAN and also on the same switch. I have seen articles that e1/1 and e1/2 should be connected to the same VLAN either side be it an access or trunk port, then I have seen articles were e1/1 and e1/2 are in different VLANs. The physical architecure iof vWIRE in terms how to cable this up is not documented anywhere really.
SANTA CLARA, Calif., Feb. 7, 2017 /PRNewswire/ -- Palo Alto Networks (NYSE: PANW), the next-generation security company, today announced availability of new purpose-built hardware and virtual next-generation firewall appliances that safely enable applications and redefine security performance for both threat prevention and SSL decryption, enabling customers to safely embrace the cloud and prevent successful cyberattacks across network, endpoint and cloud environments.
About Palo Alto Networks Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com.
df19127ead