Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CN-Series

Container Firewall
Prevent threats in Kubernetes
CN-Series container ­environments with the industry’s
firewalls deliver:
leading Next-Generation Firewall
• Threat prevention and advanced
network security services to protect The Palo Alto Networks CN-Series container firewall is the
Kubernetes namespace boundaries
industry’s first next-generation firewall (NGFW) delivered
• Automated deployment and
configuration via Kubernetes for in a container form factor and natively integrated into
frictionless network security Kubernetes®. Container firewalls prevent network-based
• Visibility into native Kubernetes threats from spreading across Kubernetes namespace
metadata (e.g., namespace) for
boundaries.
context-based security policies
• Centralized management with
Panorama

Strata by Palo Alto Networks | CN-Series Container Firewall | Datasheet 1


Overview ­ ovement of threats. In many Kubernetes environments, the
m
Kubernetes namespace is the trust boundary. CN-Series fire-
Conventional NGFWs can only be deployed at the edge of a walls can enforce Threat Prevention policies between Kuber-
Kubernetes environment and therefore cannot determine the netes namespaces as well as between a Kubernetes name-
specific pod where traffic originates. To overcome this chal- space and other workload types (e.g., VMs and bare metal
lenge, CN-Series container firewalls are deployed on each servers), to deter threats from moving between your cloud
node of a Kubernetes cluster, giving them precise visibility native applications and your legacy infrastructure.
into container traffic. The CN-Series delivers Layer 7 visibil-
ity and control while enabling the enforcement of advanced Prevent Known and Unknown Inbound Threats
security services. This protection can be enforced on allowed Like many applications, attacks can use any port, which lim-
traffic traversing namespace boundaries—whether out- its the effectiveness of port-based network security con-
bound, inbound, or east-west—between pods, and even be- trols. With application-centric security policies, CN-Series
tween containerized applications and legacy workloads, such firewalls augment basic port-based access controls and in-
as virtual machines (VMs) and bare metal servers. spect network traffic to ensure only allowed applications are
CN-Series firewalls are easy to deploy using Kubernetes or- permitted across open ports.
chestration to simplify integration of network security into By enabling our integrated cloud-delivered subscriptions
continuous integration/continuous development (CI/CD) pro- services, you can enhance your security capabilities with-
cesses. Ongoing management of CN-Series firewalls is central- out compromising productivity. Turning on our Threat
ized in Panorama™ network security management—the same ­Prevention and WildFire® malware prevention services on
management console as all Palo Alto Networks firewalls—giv- the CN-Series firewall protects your Kubernetes environ-
ing network security teams a single pane of glass to manage the ment against any file-based threats, including exploits,
overall network security posture of their organizations. malware, spyware, and previously unknown threats, at-

How the CN-Series Works


tempting to sneak through open ports. In addition, deploy-
ing our URL Filtering and DNS Security services protects your
CN-Series firewalls deploy as two sets of pods: one for the man- environment from web-based threats, including phishing,
agement plane (CN-MGMT) and another for the firewall data- ­command and control, and data theft.
plane (CN-NGFW). The firewall dataplane runs as a daemon set,
allowing a single command from within Kubernetes to deploy
firewalls on all nodes in a Kubernetes cluster at once. The man-
CN-Series Key Capabilities
agement plane simply runs as a Kubernetes service. Whatever the security needs of your container environment,
CN-Series firewalls are managed through the Panorama con- the CN-Series is built to deliver.
sole. A Kubernetes plugin within Panorama provides contex-
tual information about containers in an environment, and this Inline Network Security Visibility and Control
seamlessly enables context-based network security policies. • Threat prevention and sandboxing: Threat Prevention
For example, Kubernetes namespaces can be used to define a and WildFire services can be enabled on CN-Series fire-
traffic source in a firewall policy. walls to block exploits, prevent malware, and stop both
Customers can deploy CN-Series firewalls in ­Kubernetes known and unknown advanced threats.
environments hosted on-premises or in public clouds. • Exfiltration prevention and URL filtering: The CN-Series
CN-­Series firewalls can also be deployed into cloud-­managed enables content inspection and SSL Decryption, prevent-
Kubernetes offerings, including Google ­Kubernetes ­Engine ing sensitive information from leaving your network. URL
(GKE®), Azure Kubernetes Service (AKS), and Amazon ­Elastic Filtering uses machine learning to categorize URLs and
Kubernetes Service (EKS). block access to malicious sites that deliver malware or
Deployment via Kubernetes package managers, such as Helm, steal credentials. Automation ensures protections are al-
is also available and community-supported. ways up to date.
• Flexible tag-based policy model: CN-Series firewall
CN-Series Use Cases ­policies can be defined by application, user, content, na-
tive ­Kubernetes labels, and other metadata to deliver flex-
Prevent Data Exfiltration from Kubernetes
ible ­policies aligned with business needs.
­Environments
CN-Series firewalls offer a multitude of security capabilities to Automated Deployment and Configuration
prevent exfiltration of sensitive data from Kubernetes envi- with Kubernetes
ronments. Traffic content inspection—including inspection of
• Kubernetes orchestrated deployment: CN-Series fire-
TLS-/SSL-encrypted traffic—ensures that packets containing
walls run as a daemon set, allowing a single command
malicious payloads are identified and remediated. URL Filtering
from within Kubernetes to deploy firewalls on all nodes in
bars outbound connections to potentially nefarious websites,
a cluster at once.
including malicious code repositories.
• DevOps-friendly configuration: All configuration of
Prevent Lateral Spread of Threats Across CN-Series firewalls is specified in a YAML file and can be
­Kubernetes Namespace Boundaries easily integrated into infrastructure deployment files for
Trust boundaries between applications are logical locations fast, repeatable deployments. Configuration templates
to enforce segmentation policies that prevent the lateral can be found in our official CN-Series GitHub ­repository.

Strata by Palo Alto Networks | CN-Series Container Firewall | Datasheet 2


• Community-supported Kubernetes Helm chart: For Key Performance Metrics
­development teams using Helm to manage their Kuberne-
tes applications, a CN-Series Helm Chart has been created Testing was conducted on GKE, with traffic directed ­between
to simplify firewall deployment and management. nodes and between pods on the same node in the same cluster.

Flexible and Consistent CNI Integration Table 2: CN-Series Key Performance Metrics
• Simple insertion: The CN-Series supports multiple con-
Feature/Attribute CN-NGFW (1 Core)
tainer network interface (CNI) plugins for use in different
types of Kubernetes deployments.
Firewall Throughput 500 Mbps
(App-ID Enabled)
Kubernetes On-Premises and Cloud Support
• Public cloud: CN-Series firewalls can be deployed in hosted Threat Prevention Throughput 250 Mbps
container environments such as GKE, AKS, ­Amazon EKS,
and Red Hat OpenShift®. For detailed platform ­support in- Max Sessions 20,000
formation, see table 1.
• On-premises: CN-Series firewalls can also be deployed

CPU and Memory Requirements


into Kubernetes environments hosted on-premises.

Centralized Management in Panorama


Table 3 shows system requirements for the cluster in which
• Consistent management: Manage the CN-Series from the CN-Series is deployed. While the CPU, memory, and
Panorama—the same management console you use for disk storage will depend on your needs, these are general
your hardware and virtual form factor Palo Alto Networks guidelines.
firewalls.
• Plugin architecture: Panorama plugins for GKE, AKS, Table 3: CN-Series CPU and Memory Requirements
Amazon EKS, and OpenShift allow you to manage network
­

security for each environment from Panorama. CN-MGMT


(StatefulSet CN-NGFW
• Centralized logging: Panorama centralizes logging to Pod for Fault (DaemonSet
simplify auditing and compliance Resource Tolerance) Pod)

Table 1: CN-Series Support Matrix


Memory (min.) 2 GB 2 GB
Product Version(s)
Memory (max.) 4 GB 2.5 GB
Containerized PAN-OS 9.2.0

CPU (min.) 2 1
Panorama Kubernetes 1.0.0
Plugin
CPU (max.) 2 4
Container Runtime Docker, CRI-O
Disk 50 GB N/A
Native Kubernetes 1.14 – 1.18

Cloud Provider-Managed
­Kubernetes*
OpenShift 4.2, 4.4, 4.5 Scalability of Components
AWS EKS (1.14 – 1.17)
Azure AKS (1.14 – 1.18) Table 4 lists scalability numbers of the different CN-­Series
GCP GKE (1.14 – 1.17) components, and table 5 lists those of the Panorama
­Kubernetes plugin.
Customer-Managed Kubernetes†
Table 4: Scalability of CN-Series Components
Kubernetes Host VM OS Ubuntu 16.04, 18.04, RHEL/­
CentOS 7.3+ Capacity/Attribute CN-Series Scale

CNI CNI Spec 0.3.0 and higher, Max. CN-MGMT Pairs per K8s Cluster 4
which support
CNI chaining (e.g., Calico, Max. CN-NGFW Pods per CN-MGMT
30
Pair
­Flannel, Weave)
* Recommended versions for Kubernetes, Calico, etc. Kubernetes Pods Secured by
† In customer-managed deployments, Kubernetes can be deployed using any CN-NGFW (per Kubernetes Node) 30
­orchestrator (e.g., Rancher, Kubespray) and deployed in a public or private cloud
so far as Kubernetes, CNI, and host OS versions are from table 1.

Strata by Palo Alto Networks | CN-Series Container Firewall | Datasheet 3


Table 4: Scalability of CN-Series Components Table 5: Scalability of Panorama Kubernetes Plugin
Components
Capacity/Attribute CN-Series Scale
Panorama Kubernetes
Max. TCP/IP Sessions on CN-NGFW 20,000 Capacity/Attribute Plugin Scale

Max. Clusters per Panorama 16 (across Native


Max. DAG IP Addresses 2,500 Kubernetes Plugin ­Kubernetes, GKE, EKS, AKS)

Max. Pods per Cluster in


Tags per IP Address 32 900
Panorama Kubernetes Plugin

Max. Services per Kubernetes


40
Cluster (Internal + External)

Max IPs (Pods + ­Services)


Across Clusters per ­Device
1,560 (MP supports 2,500)
Group in Panorama
­Kubernetes Plugin

Find more information about CN-Series container firewalls here.

3000 Tannery Way © 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 ­trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 cn-series-container-firewall-ds-111220
Support: +1.866.898.9087

www.paloaltonetworks.com

You might also like