A multi-virtual systems (multi-vsys) environment in Palo Alto Networks' PAN-OS allows a single physical firewall to be partitioned into multiple, independent virtual firewalls. Each virtual system (vsys) operates as a separate entity with its own interfaces, security policies, routing instances, and administrative controls. This architecture is particularly beneficial for managed service providers (MSPs) and large enterprises that require logical segmentation for different departments, customers, or security domains.
Key Features of Multi-VSYS
Isolation:
Each vsys maintains separate configurations, ensuring that changes in one do not affect others.
Resource Allocation:
Administrators can allocate specific resources (e.g., sessions, rules) to each vsys, providing control over resource consumption.
Administrative Control:
Different administrators can be assigned to manage individual vsys instances, enhancing security and delegation.
Shared Gateways:
Multiple vsys can share a common interface (shared gateway) for internet access, optimizing IP address usage.
User-ID Sharing:
A designated vsys can act as a User-ID hub, sharing user mapping information with other vsys instances.
Mermaid Sequence Diagram: Traffic Flow in Multi-VSYS Environment
sequenceDiagram
participant User
participant VSYS
participant SharedGateway
participant Internet
User->>VSYS: Initiate Traffic
VSYS->>SharedGateway: Forward Traffic
SharedGateway->>Internet: Route to Destination
Internet-->>SharedGateway: Return Traffic
SharedGateway-->>VSYS: Deliver Response
VSYS-->>User: Provide Response
Shared Gateway
A
Shared Gateway
in PAN-OS allows multiple virtual systems (vsys) to share a common interface to external networks, such as the Internet. This configuration is particularly useful in multi-vsys environments where conserving IP addresses and simplifying external connectivity is desired.
Key characteristics of a Shared Gateway include:
It is configured as a separate virtual system that owns the physical interface connected to the external network.
Other vsys instances can route traffic through the Shared Gateway without having direct access to the physical interface.
Security policies and NAT rules are defined within the Shared Gateway context to control traffic flow.
An
External Zone
is a special type of security zone in PAN-OS used to facilitate communication between different virtual systems within the same firewall. Unlike standard zones, an External Zone is not associated with a specific interface but is linked to another vsys.
Important aspects of External Zones include:
They enable inter-vsys traffic without the need for the traffic to exit and re-enter the firewall physically.
Each vsys can have only one External Zone, which represents the other vsys it needs to communicate with.
Security policies must be explicitly defined to allow or deny traffic between internal zones and the External Zone.
For more information, consult the official documentation on
External Zones
.