I have a requirement for almost 100 Virtual PCs for 100 different clients. For security reasons I have to use a basic firewall for all device and I have a PaloAlto Firewall. Also, to maintain privacy and security the virtual pc can’t communicate to eachother as the user of the pc are different. Therefore, I can’t create the same network pool for the all 100 machine and also it is not feasible to create 100 separate network for those machine.<\/p>\n
Advertisement
So how can I create network for the 100 Virtual PCs so that i can implement firewall policy to them and the PCs couldn’t communicate to eachother as well?<\/p>","upvoteCount":7,"answerCount":8,"datePublished":"2023-08-22T14:19:41.000Z","author":{"@type":"Person","name":"spiceuser-a2mmb","url":"https://community.spiceworks.com/u/spiceuser-a2mmb"},"suggestedAnswer":[{"@type":"Answer","text":"
Advertisement
I have a requirement for almost 100 Virtual PCs for 100 different clients. For security reasons I have to use a basic firewall for all device and I have a PaloAlto Firewall. Also, to maintain privacy and security the virtual pc can’t communicate to eachother as the user of the pc are different. Therefore, I can’t create the same network pool for the all 100 machine and also it is not feasible to create 100 separate network for those machine.<\/p>\n
So how can I create network for the 100 Virtual PCs so that i can implement firewall policy to them and the PCs couldn’t communicate to eachother as well?<\/p>","upvoteCount":7,"datePublished":"2023-08-22T14:19:41.000Z","url":"https://community.spiceworks.com/t/network-design-for-data-center/957735/1","author":{"@type":"Person","name":"spiceuser-a2mmb","url":"https://community.spiceworks.com/u/spiceuser-a2mmb"}},{"@type":"Answer","text":"
If the users do not have amin access, use the same LAN, put them all on DHCP in a single subnet (/25 or lower as that would be the first to give >=126 usable hosts), and create a firewall rule to deny access to the DHCP subnet.<\/p>\n
They would still be able to communicate to the DHCP server outside that subnet and any shared resources so long as they too were outside that subnet.<\/p>","upvoteCount":0,"datePublished":"2023-08-22T14:27:55.000Z","url":"https://community.spiceworks.com/t/network-design-for-data-center/957735/2","author":{"@type":"Person","name":"foo","url":"https://community.spiceworks.com/u/foo"}},{"@type":"Answer","text":"
I have the admin access for all switches and firewall. \nBut my main concern is whe all the host are in same subnet doesn’t it allow host to communicate each other in L2 level and it would not hit the gateway (which will be firewall in my case).<\/p>","upvoteCount":0,"datePublished":"2023-08-22T15:24:36.000Z","url":"https://community.spiceworks.com/t/network-design-for-data-center/957735/3","author":{"@type":"Person","name":"spiceuser-a2mmb","url":"https://community.spiceworks.com/u/spiceuser-a2mmb"}},{"@type":"Answer","text":"
Welcome to the community!<\/p>\n
Which hypervisor?<\/p>\n
If these were physical devices, you could put them all on physical switches and use a private VLAN, which prevents devices on the same VLAN from communicating with each other. Put put all on same VLAN in a virtual environment, your virtual switch would need need a similar capability.<\/p>\n
Otherwise, I would say 1 VLAN per VM. That’s easy to build out on any physical switch that has a CLI, and that can also be done via CLI for your Palo Alto firewall. Virtual port groups with VLAN assignments can be done via CLI on ESXi host, and for Hyper-V you just need to assign the correct VLAN ID to the VM.<\/p>","upvoteCount":0,"datePublished":"2023-08-22T16:39:07.000Z","url":"https://community.spiceworks.com/t/network-design-for-data-center/957735/4","author":{"@type":"Person","name":"kevinhsieh","url":"https://community.spiceworks.com/u/kevinhsieh"}},{"@type":"Answer","text":"
Only if you mask them to that subnet, you can create a firewall rule for a subnet that does not use the same mask.<\/p>\n
So for instance subnet 10.1.0.0/23<\/p>\n
Gives you 10.1.0.0-10.1.1.255<\/p>\n
Creating a firewall rule for 10.1.1.0/24 will block anything in 10.1.1.1-255 from seeing one another, but NOT seeing 10.1.0.0-255 so if your DHCP hands out 10.1.1.1-254 with a /23 subnet that’s is perfectly fine, the firewall blocking 10.1.1.0/24 will not care.<\/p>\n
So if you for instance gave it a all IP addresses the subnet of 255.255.254.0 they would have inherit access to them from a routing standpoint, but firewall would block any IP in the 10.1.1.0/24 subnet. Subnet is not actually applied in the firewall other than shorthand for defining ranges, firewall blocks on IP.<\/p>\n
I do it on my labs all the time.<\/p>\n
And correct it does not prevent L2 but what its the concern there?<\/p>\n
Depending on how configured you can potentially get traffic to escape outside VLAN as well, the question is can you do anything threatening with it under normal conditions. Are these random strangers from the internet?<\/p>","upvoteCount":0,"datePublished":"2023-08-22T17:18:30.000Z","url":"https://community.spiceworks.com/t/network-design-for-data-center/957735/5","author":{"@type":"Person","name":"foo","url":"https://community.spiceworks.com/u/foo"}},{"@type":"Answer","text":"