VM Series Evaluation Quickstart Guide
VM Series Evaluation Quickstart Guide
VM-Series Evaluation
July, 2021
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com
Table of Contents
Getting Support 15
Useful Links 15
The VM-Series evaluation version provides an easy way to try and experience
the best-in-class security provided by a Palo Alto Networks software firewall.
The evaluation is based on PanOS version 10.0.4 and is pre-licensed for Next
Generation Firewall, Threat Prevention and the WildFire® cloud-based threat
analysis service, the industry’s most advanced analysis and prevention engine
for highly evasive zero-day exploits and malware. You can also configure URL
filtering and deploy DNS protection. Global Protect and SD-WAN features are
also available as optional features. The evaluation version lets you try these
great security features for a period of 30 days.
The VM-Series evaluation image does not include Panorama licensing. If a licensed
Panorama is available, the VM-Series evaluation instances can be managed with
Panorama.
You can familiarize yourself with the different interface deployment models
supported on VM-Series FWs link.
This evaluation is supported on ESXi and KVM. Follow the links below for system
requirements for deploying on these hypervisors.
The first step in deploying VM-Series on VMware ESXi is to plan the interfaces. We
recommend starting with 3 interfaces at the minimum; one for management and
one each for trust and untrust interfaces. Interface maps to vNICS should be
considered before deployment, as the best practice is to create placeholders for the
10 interfaces that VM-Series supports to avoid reordering when new interfaces are
You will start the deployment with the evaluation ova image.
From the VMware vCenter or vSphere Client, create a new virtual machine and
choose ‘deploy from ovf or ova file.’ Name your VM-Series firewall and upload the
evaluation image.
Once deployment completes, before you ‘power on’ the VM, select and use ‘Edit
settings’ to allocate the desired number CPUs to the VM. Memory should be
assigned as per the table above. At this state you can add additional disk space. Add
the desired number of network adaptors and map them to the standard/distributed
vswitches.
VM-Series can be deployed on a Linux server that is running the KVM hypervisor. The
deployment supports up to 25 interfaces and supports software-based virtual
switches such as the Linux bridge, the Open vSwitch bridge, and direct connectivity
to PCI passthrough or an SR-IOV capable adapter.
As you plan the interfaces, follow our System Requirements for supported
configurations and options for attaching VM-Series to your network.
Next, prepare your Linux environment which includes verifying the Linux distribution
and networking infrastructure. VM-Series can connect using a Linux bridge, the
Open vSwitch, PCI passthrough, or SR-IOV capable network card. Follow the
instructions here to set up the desired options for your environment. Whether you
are going to secure traffic within a single host or across multiple hosts, you will
choose one of these supported deployment models.
When deploying VM-Series on KVM, you will use the qcow image.
To install VM-Series on KVM, you can use any of the following methods.
● virt-manager—Deploy VM-Series using the virt-manager virtual machine
manager. Virt-manager provides a convenient wizard to help you through the
installation process.
● virsh—Deploy VM-Series using the KVM command line. Create an XML file that
defines the virtual machine instance and bootstrap XML file that defines the
initial configuration settings of the firewall. Then install the firewall by
mounting an ISO image as a CD-ROM.
● virt-install—Another option is to use the KVM command line to create the
definition for the VM-Series firewall and install it.
Detailed instructions on deploying on KVM via these methods can be found here.
Commit
Once the Management IP address is configured, use https://<ip address> from your
browser to launch the UI.
To track validity of the evaluation image, use the CLI command: Show System Info
Next, ensure that VM-Series can reach the Palo Alto update server. Navigate to
Device > Dynamic Updates and ensure that the latest packages are downloaded and
installed.
Tap mode deployment allows you to passively monitor traffic flows across a network
by way of a switch SPAN or mirror port. The SPAN or mirror port permits the copying
of traffic from other ports on the switch. By dedicating an interface on the firewall as
a tap mode interface and connecting it with a switch SPAN port, the switch SPAN
port provides the firewall with the mirrored traffic. This provides application visibility
within the network without being in the flow of network traffic.
To start configuring your environment for this, start by identifying the interface that
is connected to the virtual switch that is receiving the mirrored traffic.
To configure a zone, navigate to Network > Zones and use the ‘+’ button to create a
new zone and name the zone.
To set the interface to tap mode, navigate to Network > interface. Select the interface
that will receive the mirrored traffic and set the zone.
Navigate to Monitor > Traffic and you will see traffic logs.