This template deploys two VM-Series firewalls in HA with HAVIP in one Availability Zone (AZ) and a single firewall in another AZ. Failover is controlled by a Function Compute script

Alicloud HAVIP-ENI 2 Zones Architecture

This template deploys two VM-Series firewalls in HA with HAVIP in one Availability Zone (AZ) and a single firewall in another AZ. Failover is controlled by a function. The deployed ennvironment is as shown in the diagram below:

image image image image

This demo environment will allow you to showcase securing of Inbound and Outbound traffic. Pre-built configurations for the firewalls will be loaded to the three VM-Series firewalls.



  • Check and ensure that the instance types are available in the Alicloud region/zones that you are using for both VM-Series and the Linux servers
  • The VM-Series Marketplace image must use one of these instance families: g5, sn2, sn2ne
  • The "admin" password for the VM-Series after the sample config is committed is "PaloAlt0123". Please change the password as soon as the VM-Series comes online
  • Not all Alicloud regions support DPDK. Please, make sure to set the variable "disable_dpdk" to true, otherwise the firewall ethernet interfaces won't come up
  • There seems to be an issue with destroying Alicloud Terraform Provider HAVIP resources. It causes a timeout and requires to run the Terraform destroy command more than once


  1. Update the "terraform.tfvars" file with the necessary information.

    • "access_key", "secret_key" and "region" are mandatory
    • "key_name" is the Alicloud key-pair used for logging into the VM-Series firewalls. It is mandatory
    • "ssh_key_path" is the full path to the private key associated with the above-mentioned Alicloud key-pair. It is mandatory
    • You can use the default values for the rest
    • "linux_password" is the password for the linux instances, and also the temporary password used when the VM-Series admin passowrd is set upon first login. Please ensure it satisfies the complex password requirements for VM-Series
    • If you want to bootstrap the VM-Series firewall and license the firewalls, set "bootstrap" to yes, and provide a valid auth_code to license both firewalls
    • "image_id" is the VM-Series firewalls image to be used. If not specified, an image available in the region will be selected based on the "pan_os_version" selected
    • "pan_os_version" is the version required when not providing a specific image_id. Values could be 10.0.3 or 11.0.0, defaults to 11.0.0
    • "disk_category" is a disk category supported by the Alicloud instance type running the VM-Series firewall
    • "disable_dpdk" is a boolean to decide whether or not to run a script that disables DPDK on the VM-Series firewalls. If set to true, the VM will restart, so account for the boot up time
  2. Run "terraform init"

  3. Run "terraform apply"

  4. Demo environment will be deployed. It takes about 15-20 minutes for the environment to be fully ready.

  5. Access to the various resources will be shown in the terraform outputs.

Removing The Demo Environment

  1. (Only if you licensed the firewalls) De-license the firewalls

  2. Run "terraform destroy"

Support Policy

The code and templates in the repo are released under an as-is, best effort, support policy. These scripts should be seen as community supported and Palo Alto Networks will contribute our expertise as and when possible. We do not provide technical support or help in using or troubleshooting the components of the project through our normal support options such as Palo Alto Networks support teams, or ASC (Authorized Support Centers) partners and backline support options. The underlying product used (the VM-Series firewall) by the scripts or templates are still supported, but the support is only for the product functionality and not for help in deploying or using the template or script itself. Unless explicitly tagged, all projects or work posted in our GitHub repository (at or sites other than our official Downloads page on are provided under the best effort policy.

Developer Sites


Copyright © 2023 Palo Alto Networks, Inc. All rights reserved.