Skip to content

A brief tutorial showing how to use Google Cloud Network Connectivity Center with VM-Series.

License

Notifications You must be signed in to change notification settings

PaloAltoNetworks/google-cloud-vmseries-ncc-tutorial

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

12 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Google Cloud NCC & VM-Series Tutorial

This tutorial shows how to perform cross-region failover by connecting VM-Series as a router appliance to a Network Connectivity Center (NCC) hub.

Beyond cross-region failover, using the VM-Series as a router appliance with NCC supports other use cases, including:

  • Connecting remote networks to Google Cloud while providing full BGP route exchange.
  • Creating a global WAN network secured with VM-Series deployed in Google Cloud.
  • Facilitating disaster recovery network operations with regionally distributed VM-Series.

This tutorial is intended for network administrators, solution architects, and security professionals who are familiar with Compute Engine and Virtual Private Cloud (VPC) networking.

Architecture

Below is a diagram of the tutorial.

  • 3 x VPCs are created (mgmt, untrust, & vpc1), each containing a subnets in us-east1 & us-west1.
  • 1 x VM-Series is created in each region (us-east1-vmseries & us-west1-vmseries) with a NIC in each VPC.
  • The firewall's NIC in vpc1 is connected as a router appliance to a NCC hub.
  • In each region, the firewalls are BGP neighbors with Cloud Routers enabling end-to-end route propagation.
  • In the event of a regional failure, egress traffic from the affected region in vpc1 is automatically rerouted to the firewall in the healthy region through dynamic route propagation.

Requirements

The following is required for this tutorial:

  1. A Google Cloud project.
  2. A machine with Terraform version:" ">= 0.15.3, < 2.0""

Note

This tutorial assumes you are using Google Cloud Shell.

Prepare for Deployment

  1. Enable the required APIs and clone the repository.

    gcloud services enable compute.googleapis.com
    git clone https://github.com/PaloAltoNetworks/google-cloud-vmseries-ncc-tutorial
    cd google-cloud-vmseries-ncc-tutorial
    
  2. Generate an SSH key.

    ssh-keygen -f ~/.ssh/vmseries-tutorial -t rsa
    
  3. Create a terraform.tfvars file.

    cp terraform.tfvars.example terraform.tfvars
    
  4. Edit the terraform.tfvars file and set values for the following variables:

    Key Value
    project_id The Project ID within Google Cloud.
    public_key_path The local path of the public key you previously created
    mgmt_allow_ips A list of IPv4 addresses which require access to the VM-Series MGT NIC.
    vmseries_image_name The VM-Series image to deploy.

Tip

For vmseries_image_name, a full list of public images can be found using gcloud:

gcloud compute images list --project paloaltonetworksgcp-public --filter='name ~ .*vmseries-flex.*'

Note

If you are using BYOL image (i.e. vmseries-flex-byol-*), the license can be applied during or after deployment. To license during deployment, add your VM-Series Authcodes to bootstrap_files/authcodes.

See VM-Series Bootstrap Methods for more information.

Deploy

When no further changes are necessary in the configuration, deploy the resources.

  1. Initialize and apply the Terraform plan.

    terraform init
    terraform apply
    

    Enter yes to create the resources.

  2. After all the resources are created, Terraform displays the following message:

    Apply complete!
    
    Outputs:
    
    SSH_VMSERIES_REGION1 = "ssh admin@<EXTERNAL_IP> -i ~/.ssh/vmseries-tutorial"
    SSH_VMSERIES_REGION2 = "ssh admin@<EXTERNAL_IP> -i ~/.ssh/vmseries-tutorial"
    SSH_VM_REGION1       = "gcloud compute ssh paloalto@us-central1-vm --zone=us-central1-a"
    SSH_VM_REGION2       = "gcloud compute ssh paloalto@us-east4-vm --zone=us-east4-a"
    

Caution

It may take an additional 10 minutes for the firewalls to become fully available.

Access the VM-Series firewall

To access the VM-Series user interface, a password must be set for the admin user on each firewall.

  1. Use the SSH_VMSERIES_REGION1 output to SSH to the mgmt NIC on us-east1-vmseries.

  2. On the VM-Series, set a password for the admin username.

    configure
    set mgt-config users admin password
    
  3. Commit the changes.

    commit
    
  4. Enter exit twice to terminate the session.

  5. Log in to the VM-Series web interface using the username admin and your password.

    https://<EXTERNAL_IP>
    
  6. Repeat the process for us-west1-vmseries by using the SSH_VMSERIES_REGION2 output.

Review Configuration

Confirm BGP has been established between the VM-Series & Cloud Routers in each region. Then, verify routes are exchanged between the peers.

Note

The Terraform plan creates the Cloud Routers for each region within vpc1. It also bootstraps the VM-Series with a configuration to automatically establish BGP with the cloud routers.

VM-Series BGP Configuration

  1. On each VM-Series, go to Network β†’ Virtual Routers.

  2. Next to gcp-vr, select More Runtime Stats.

    πŸ’‘ Information
    The virtual router contains all of routing configurations on the VM-Series. To view the BGP configuration, open gcp-vr and select the BGP tab.


  3. Click BGP β†’ Peer to view the status of the BGP peering sessions with each region's cloud router.

    us-east1

    us-west1

    πŸ’‘ Information
    Both connections should be listed as Established.


  4. Click Local RIB to view the routing information the firewall has learned and selected for use.

    us-east1

    us-west1

    πŸ’‘ Information
    Routes with the * flag are preferred routes.


  5. Click RIB Out to view the routes exported by the VM-Series to the Cloud Routers.

    us-east1

    us-west1

    πŸ’‘ Information
    A default route is exported for each Cloud Router's peering interface.

Network Connectivity Center Configuration

  1. In Google Cloud, go to Network Connectivity β†’ Network Connectivity Center.

  2. Click Spokes and select the vmseries-us-east1-spoke router appliance.

  3. Within each spoke, open peer0 & peer1 to view the peering status along with any advertised routes.

    πŸ’‘ Information
    The Cloud Router in each region automatically propagates subnet routes to the VM-Series firewalls.

  4. Repeat the process for the vmseries-us-west1-spoke router appliance.

Review VPC Route Table

  1. In Google Cloud, go to VPC Network β†’ Routes β†’ Effective Routes.

    πŸ’‘ Information
    This window shows the effective routes for a given VPC, including the propagated routeds. propagated by the VM-Series and Cloud Routers.


  2. Set VPC to vpc1 & Region to us-west1 to view the effective routes for us-east1 traffic.

    πŸ’‘ Information
    The preferred default route (priority 0) for us-east1 uses the us-east1-vmseries as the next hop.


  3. Set Region to us-west1 to view the effective routes for us-west1 traffic.

    πŸ’‘ Information
    The preferred default route (priority 0) for us-west1 uses the us-west1-vmseries as the next hop.


Generate Outbound Traffic

Access the workload VMs in each region to initiate egress internet traffic. Then, verify traffic sourced from us-east1 travereses the us-east1-vmseries and traffic sourced from us-west1 traverses the us-west1-vmseries.

Note

You can redisplay the Terraform output values at anytime by running terraform output from the google-cloud-vmseries-ncc-tutorial directory.

  1. In Cloud Shell, open two additional tabs βž•.

  2. In the 1st tab, paste the SSH_VM_REGION1 output to SSH to us-east1-vm (10.1.0.5).

  3. In the 2nd tab, paste the SSH_VM_REGION2 output to SSH to us-west1-vm (10.1.0.21).

  4. On each VM, run a continuous ping to an internet address.

    ping 4.2.2.2
    

    Keep the pings running.


  5. On each VM-Series, go to Monitor β†’ Traffic and enter the following traffic filter.

    ( zone.src eq 'vpc1' ) and ( addr.dst in '4.2.2.2' )
    

    us-east1

    us-west1

    πŸ’‘ Information
    You should see traffic from us-east1-vm (10.1.0.5) uses the preferred route to us-east1-vmseries & traffic from us-west1-vm (10.1.0.21) uses the preferred route to us-west1-vmseries.


Simulate Cross-Region Failover

Simulate a regional failure event for us-east1 by terminating the BGP connectivity on the us-east1-vmseries. After failover, the dynamic routes using us-east1-vmseries will coverge to use to us-west1-vmseries.

Disable BGP on us-east1-vmseries

  1. On us-east1-vmseries, go to Network β†’ Virtual Routers and select gcp-vr.

  2. Click BGP β†’ uncheck Enable β†’ click OK.

  3. In the top-right corner, click Commit β†’ Commit to apply the changes.

  4. Wait for the commit to complete.

Review VPC Route Table & VM-Series Traffic Logs

  1. In Google Cloud, go to VPC Network β†’ Routes β†’ Effective Routes.

  2. Set Network to vpc1 and Region to us-east1.

    πŸ’‘ Information
    The default route for us-east1 traffic should use us-west1-vmseries as the next hop.


  3. On us-west1-vmseries, go to Monitor β†’ Traffic.

    πŸ’‘ Information
    Pings from us-east1-vm (10.1.0.5) should now appear within the us-west1-vmseries traffic logs indicating a successful failover.


Important

In production environments, it is recommended to have multiple firewalls deployed across different zones in each region. This approach offers higher redundancy for intra-region failure events.

Clean up

Delete all the resources when you no longer need them.

  1. In Cloud Shell,change directories to the Terraform build.

    cd google-cloud-vmseries-ncc-tutorial
    
  2. run the following to delete all the created resources.

    terraform destroy
    

    Enter yes to delete all resources created by the Terraform plan.

  3. After all the resources are deleted, Terraform displays the following message:

    Destroy complete!
    

Additional information

Releases

No releases published

Packages

No packages published

Languages