* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Network Security](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/) * [Next-Generation Firewalls](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/) * Secure App Traffic with N... # Secure App Traffic with Nutanix Flow \& Palo Alto Networks VM-Series [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecure-app-traffic-with-nutanix-flow-palo-alto-networks-vm-series%2F) [](https://twitter.com/share?text=Secure+App+Traffic+with+Nutanix+Flow+%26%23038%3B+Palo+Alto+Networks+VM-Series&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecure-app-traffic-with-nutanix-flow-palo-alto-networks-vm-series%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecure-app-traffic-with-nutanix-flow-palo-alto-networks-vm-series%2F&title=Secure+App+Traffic+with+Nutanix+Flow+%26%23038%3B+Palo+Alto+Networks+VM-Series&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/network-security/secure-app-traffic-with-nutanix-flow-palo-alto-networks-vm-series/&ts=markdown) \[\](mailto:?subject=Secure App Traffic with Nutanix Flow \& Palo Alto Networks VM-Series) Link copied By [Jasmine Punia](https://www.paloaltonetworks.com/blog/author/jasmine-punia/?ts=markdown "Posts by Jasmine Punia") and [Sam Ghardashem](https://www.paloaltonetworks.com/blog/author/sam-ghardashem/?ts=markdown "Posts by Sam Ghardashem") Aug 07, 2025 4 minutes [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [VM-Series](https://www.paloaltonetworks.com/blog/tag/vm-series/?ts=markdown) In today's rapidly evolving data centers, seamlessly integrating advanced network security measures into existing infrastructure is critical for maintaining robust protection and efficiency. One such powerful integration is using Palo Alto Networks Next-Generation Firewalls (NGFWs) to protect application flows in the data center. Starting with the Nutanix Cloud Infrastructure (NCI) Release 7.3, the Nutanix Flow Network Security (FNS) solution now provides a seamless, advanced integration with [Palo Alto Networks VM-Series firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls) using service insertion to allow NCI customers to leverage the advanced functionality provided by Palo Alto Networks NGFWs. Nutanix Flow Network Security integration with Palo Alto Networks enables organizations to obtain the level of security they need without complication and operational challenges. # Flow Network Security Flow Network Security is an application-centric microsegmentation solution natively built into the Nutanix AHV hypervisor. It protects east-west traffic within the Nutanix Cloud Infrastructure platform, covering both on-premises AHV and Nutanix Cloud Clusters deployments. Operating as a distributed, stateful virtual firewall, FNS empowers security teams to define granular, policy-driven controls that safeguard business-critical applications and VDI environments. Integrated with the Nutanix Prism Central multicluster manager, FNS uses embedded software-defined networking components in each AHV host for enforcement. Its agentless, zero touch model supports dynamic tagging, avoids the need for physical reconfiguration, and enables scalable, zero-trust-aligned security. # Palo Alto Networks VM-Series Next-Generation Firewalls Palo Alto Networks VM-Series firewalls consistently protect public and private clouds, virtualized data centers and branch environments by delivering inline network security and threat prevention. VM-Series firewalls enhance your security posture with the industry-leading threat prevention capabilities of the Palo Alto Networks Next-Generation Firewall in a VM form factor, making it ideal for deployment in environments where it's difficult or impossible to install a hardware firewall. # Flow Service Insertion with Palo Alto Networks A key challenge of deploying NGFWs in a virtual cloud environment is ensuring they effectively intercept and secure "critical" application traffic---traffic that requires inspection and control---without disrupting the application or increasing the administrative overhead of redesigning the network. This is particularly challenging for east-west traffic flows. Service Insertion by Flow Network Security enables organizations to dynamically integrate advanced Palo Alto Networks Next-Generation Firewall services from Palo Alto Networks VM-Series, such as deep packet inspection, application identification and comprehensive threat prevention, into existing network traffic flows. # How the Integration Works Built on a virtual firewall cluster design, Flow Service Insertion allows the NGFW to be deployed on any managed Nutanix cluster, decoupled from the hosts where protected application VMs reside. This architecture significantly simplifies the deployment and management of firewall instances, particularly in large-scale environments. To identify the critical flows to be protected by the firewall, network security administrators can use familiar Flow Network Security policies to define the critical traffic. The Flow control plane then dynamically manages traffic steering, ensuring the appropriate flows are redirected to the Palo Alto Networks VM-Series firewall. This eliminates the need for routing decisions at the firewall itself and requires no change to network architecture. This dynamic approach reduces the need for manual configuration, provides excellent scalability, and helps simplify policy management. Another one of the standout features of this integration is its built-in high availability. The system is engineered to avoid single points of failure, allowing continuous protection for mission-critical applications even in the event of component disruptions. This robust architecture provides organizations with peace of mind, knowing that their critical workloads remain secure and operational. In summary, integrating Flow Network Security with Palo Alto Networks VM-Series via service insertion combines ease of use, advanced security controls and resilient architecture. Organizations benefit from simplified operations, automated traffic management, application-level visibility and advanced threat detection capabilities, all contributing to a comprehensive and dynamic security strategy tailored for modern data center environments. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/08/word-image-342947-1.png) # Benefits of the Joint Solution at a Glance Enterprises utilizing this solution will find a powerful suite of capabilities designed to deliver tangible security outcomes that align with enterprise risk reduction and compliance goals. The following benefits are strategic enablers tailored to meet the complex needs of modern, high-stakes operational environments: * Streamlined: Simplified operational management through automation * Granular: Application-aware policy enforcement * Insightful: Comprehensive visibility into application flows and network behavior * Proactive: Real-time threat detection and mitigation * Adaptive: Automated scaling capabilities tailored to dynamic workload requirements * Resilient: Built-in resilience and high availability, eliminating single points of failure To learn more, check out the [Nutanix Integration Guide](https://technologypartners.paloaltonetworks.com/English/integration/VM-Series-Nutanix-AHV). *** ** * ** *** ## Related Blogs ### [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Secure Your Cloud: Palo Alto Networks \& AWS LZA for Public Sector](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/secure-your-cloud-palo-alto-networks-aws-lza-for-public-sector/) ### [AI Application Security](https://www.paloaltonetworks.com/blog/network-security/category/ai-application-security/?ts=markdown), [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Palo Alto Networks Announces Support for NVIDIA Enterprise AI Factory](https://origin-researchcenter.paloaltonetworks.com/blog/2026/01/support-nvidia-enterprise-ai-factory/) ### [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### See How VM-Series Virtual Firewalls Pay for Themselves](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/forrester-spotlight-ngfw/) ### [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### VM-Series Virtual Firewalls Top SecureIQLab Cloud Firewall Test](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/secureiqlab-report-adv-cloud-firewall-vmseries/) ### [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### Your Hybrid Cloud Is Under Attack: Explore Zero Trust at Our Event](https://origin-researchcenter.paloaltonetworks.com/blog/network-security/your-hybrid-cloud-under-attack-zero-trust/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### VM-Series Virtual Firewalls Beat Fortinet Fortigate in Miercom Testing](https://origin-researchcenter.paloaltonetworks.com/blog/2023/03/vm-series-virtual-firewalls-in-miercom-testing/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language