As many of you know at this point, I am working to integrate the Palo Alto
firewall with CloudStack.

More info here:
https://cwiki.apache.org/confluence/display/CLOUDSTACK/Palo+Alto+Firewall+Integration

The problem I am running into right now is that Palo Alto does not allow
any two interfaced to have the same IP (even if they are in different
zones, vrs, vsys and vlans).  This is an issue because CloudStack supports
each account having their own private IP ranges and two accounts can use
the same private IP range.  For example, by default if you create a network
with source nat and you do not specify any gateway or subnet data, it will
give you 10.1.1.0/24 as an IP range.  This means it will be very likely
that two CloudStack accounts will be using the same private IP space.

I am trying to find a work around for this limitation, but so far I have
been having a hard time finding a reasonable solution.  I have discussed
this problem with a few people and there have been a couple suggestions,
but I am not happy with these options:

1. Restrict the available subnets for each account so two accounts can't
create overlapping subnets.
To me, this breaks the whole concept of cloud, but for enterprise customers
this is not a huge limitation because they usually solve this problem this
way.

2. Run multiple Palo Alto VM firewalls and associate one VM firewall per
account.
The management overhead of this is crazy, so this type of implementation
would be very hard to work with.

Since I do not like either of these approaches, I wanted to see if I could
get some feedback on this.  Are there other alternatives that would solve
the problem more elegantly that I have not mentioned?  What would be the
best way to solve this problem in a 'CloudStack way'?

Any feedback on this would be appreciated.

Cheers,

Will

Reply via email to