The purpose of this repo is to provide guidance on different VM-Series architectures in Google Cloud and how to deploy them using Terraform. The blueprints directory contains a list of various architectures with complete build guides. The blueprints use the Terraform modules listed in the modules directory.
Below is a summary of the blueprints to help select the best architecture for your use-case.
In this blueprint, VM-Series firewalls are deployed to secure north/south traffic for a single VPC network. The build provides guidance on how to leverage network tags to steer traffic to specific internal TCP/UDP load balancers that frontend VM-Series firewalls. Network tags have a variety of use-cases, including:
This blueprint, demonstrates how to secure internet inbound, internet outbound, and east-west traffic using VPC peering. This build focuses on how traffic flows through the VM-Series firewall (or hub). You will also learn how to leverage Google Cloud network load balancers to provide horizontal scale and redundancy to your VM-Series deployments.
This blueprint's network topology is identical to hub and spoke with VPC peering topology. However, this blueprint deploys the VM-Series through a launch template and into a managed instance group. The managed instance group provides the ability to automatically scale based on PAN-OS metrics delivered to Google StackDriver.
This blueprint, demonstrates how to secure internet inbound, internet outbound, and east-west traffic for two VPC networks using a multi-NIC VM-Series topology. This topology is ideal for environments where VPC peering cannot be used.
This blueprint demonstrates how to use the VM-Series firewall and Google Cloud IDS to provide a layered security approach for a single VPC network. VM-Series firewalls are positioned to provide north-south prevention controls and Cloud IDS provides intra-VPC (east/west) threat detection.
This solution is released under an as-is, best effort, support policy. These scripts should be seen as community supported and Palo Alto Networks will contribute our expertise as and when possible. We do not provide technical support or help in using or troubleshooting the components of the project through our normal support options such as Palo Alto Networks support teams, or ASC (Authorized Support Centers) partners and backline support options. The underlying product used (the VM-Series firewall) by the scripts or templates are still supported, but the support is only for the product functionality and not for help in deploying or using the template or script itself.