In the previous blog post, we went over the common requirements for partitioning a single physical security appliance into multiple virtual firewalls. We talked about how this logical separation brings a lot of complexity into environments where true data and management plane between different tenants is not required. It was further established that even the full isolation requirements are not truly addressed by the existing virtual firewall solutions.