<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA firewall traffic to AWS API gateway in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350846#M1001</link>
    <description>&lt;P&gt;is that screen shot through the firewall, or direct from a test client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Sep 2020 12:27:41 GMT</pubDate>
    <dc:creator>jmeurer</dc:creator>
    <dc:date>2020-09-21T12:27:41Z</dc:date>
    <item>
      <title>PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347245#M938</link>
      <description>&lt;P&gt;Planning to secure AWS infra using a VM firewall Palo Alto. Main AWS components are API Gateway &amp;amp; Lambda.&lt;BR /&gt;Traffic from external network (public) comes to API gateway and to lambda. Is it possible to route incoming traffic via PA firewall to API gateway.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 13:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347245#M938</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-07T13:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347308#M939</link>
      <description>&lt;P&gt;The way I have solved this in the past is to configured the API Gateway with a private endpoint in the firewall VPC. &amp;nbsp;Configure the the firewall pool behind a Public ALB to serve as you front end with your desired app cert. &amp;nbsp;Use a source and destination NAT rule to forward that traffic through the firewalls to the API GW endpoint FQDN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One nuance, if you intend to decrypt the traffic on the way through use a SSL Forward Proxy decryption profile rather than the more intuitive Inbound Decrypt profile. &amp;nbsp;The API gateway does not allow you to load a custom cert when using a private endpoint. &amp;nbsp;By flipping the profile, you can get around the SSL handshake errors. &amp;nbsp;The ALB will ignore the self signed cert warning.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 16:26:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347308#M939</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-07T16:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347452#M940</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475"&gt;@jmeurer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was exploring around the method you said, could not get it done. Could you please help with the steps you followed?&lt;/P&gt;&lt;P&gt;Create Private APi&lt;/P&gt;&lt;P&gt;Private endpoint&lt;/P&gt;&lt;P&gt;......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally how was it linked with Palo Alto/Firewall DNAT.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 09:50:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347452#M940</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-08T09:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347515#M942</link>
      <description>&lt;P&gt;I used this guide.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-apis.html" target="_blank"&gt;https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-apis.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the private endpoint is created, it will have a zone redundant FQDN assigned to it. &amp;nbsp;You use that FDQN as our destination in the NAT rule.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/networking/nat/configure-nat/configure-destination-nat-using-dynamic-ip-addresses.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/networking/nat/configure-nat/configure-destination-nat-using-dynamic-ip-addresses.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You do also need a source nat on the same rule to ensure the proper return path from the api GW to the firewall. &amp;nbsp;That would typically be your trust side interface address.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 13:15:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/347515#M942</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-08T13:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348291#M954</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475"&gt;@jmeurer&lt;/a&gt;&amp;nbsp;your reply is helping. I tried the following;&lt;/P&gt;&lt;P&gt;1. Create a sample lambda function of pet store -&amp;nbsp;&lt;A href="http://petstore-demo-endpoint.execute-api.com/petstore/pets" target="_blank"&gt;http://petstore-demo-endpoint.execute-api.com/petstore/pets&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. Created VPC endpoint&lt;/P&gt;&lt;P&gt;3.&amp;nbsp;Created private REST API and attached endpoint&lt;/P&gt;&lt;P&gt;4. Created DNAT in PA with destination as VPC endpoint&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**PA LAN and VPC endpoint are in same subnet&lt;/P&gt;&lt;P&gt;Now I called the URL http://PAWANIP/petstore/pets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried diff URLs, patterns, https nothing worked. Is there anything wrong in the method done.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 15:59:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348291#M954</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-10T15:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348303#M955</link>
      <description>&lt;P&gt;Did you add a source translation to the NAT rule with the firewall's interface address?&amp;nbsp; Otherwise the endpoint will try to respond directly to the original client IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you spin up a bastion host in the VPC, can you access the end point?&amp;nbsp; It could an SG on the endpoint not allowing the traffic in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 16:29:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348303#M955</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-10T16:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348364#M957</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475"&gt;@jmeurer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did create an SNAT from internal to external with external interface IP.&lt;/P&gt;&lt;P&gt;DNAT from PA to an EC2 in AWS is working&lt;/P&gt;&lt;P&gt;I checked SG of API gateway, endpoint, lamda. It's all full allow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are the steps I followed correct?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the URL I used to call lambda correct?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 17:38:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348364#M957</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-10T17:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348366#M958</link>
      <description>&lt;P&gt;That SNAT flow does not sound correct.&amp;nbsp; &amp;nbsp;The NAT rule that Destination Nats the traffic to Endpoint, should also have source translation set to the internal interface.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would you mind posting screen shots of the nat rule.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 18:07:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348366#M958</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-10T18:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348597#M963</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="APIGW2.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27725i44A8557B519FAF47/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="APIGW2.JPG" alt="APIGW2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="APIGW.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27726i7CADEA213622625A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="APIGW.JPG" alt="APIGW.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AWS2.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27727i580352B0D826F823/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AWS2.JPG" alt="AWS2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AWS1.jpg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27724i1D3D966E4C2D84F0/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AWS1.jpg" alt="AWS1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="endpoint.jpg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27728iE56FB69954E965A5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="endpoint.jpg" alt="endpoint.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SourceNAT1.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27731i0140C25B972F671D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SourceNAT1.JPG" alt="SourceNAT1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DNAt2.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27730i6BAF968BFDB11D0A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="DNAt2.JPG" alt="DNAt2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DNAT1.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27732i889C32F2FD4E9805/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="DNAT1.JPG" alt="DNAT1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SourceNAT2.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27733i5355D91F18D31CA1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SourceNAT2.JPG" alt="SourceNAT2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FWlog.jpg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27734iD818857DAD32E7F2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="FWlog.jpg" alt="FWlog.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FWrule1.jpg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27735i743E38210BA1E2EC/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="FWrule1.jpg" alt="FWrule1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 13:51:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348597#M963</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-11T13:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348599#M964</link>
      <description>&lt;P&gt;Assuming your IP specified it the Untrust IP and Eth1/2 is your Trust side interface, your NAT rule translated tab should look like this.&amp;nbsp; This indicates that we are sending the traffic on to the API Endpoint and setting the source IP to be the internal interface of the firewall so that they endpoint knows where to respond to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jmeurer_0-1599832887506.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27736iBB671ED085B86DA3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jmeurer_0-1599832887506.png" alt="jmeurer_0-1599832887506.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 14:02:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/348599#M964</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-11T14:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/349794#M979</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;It seems the luck has not turned yet. This is my NAT statement.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="charles07_0-1600263741361.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27772iE65876A93EFA0D95/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="charles07_0-1600263741361.png" alt="charles07_0-1600263741361.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;i used this doc to create private API and endpoint&lt;/P&gt;&lt;P&gt;&lt;A href="https://aws.amazon.com/premiumsupport/knowledge-center/api-gateway-private-cross-account-vpce/" target="_blank"&gt;https://aws.amazon.com/premiumsupport/knowledge-center/api-gateway-private-cross-account-vpce/&lt;/A&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;If i try&amp;nbsp;https://PAWANPublicIP/test/&amp;nbsp;&amp;nbsp;nothing loads&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;I tried creating new APi with this doc (change i created a private API)&lt;/P&gt;&lt;P data-unlink="true"&gt;https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-create-api-as-simple-proxy-for-lambda.html&lt;/P&gt;&lt;P data-unlink="true"&gt;If i try&amp;nbsp;https://PAWANPublicIP/test/helloworld?name=John&amp;amp;city=Seattle&amp;nbsp;&amp;nbsp;nothing loads&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;No idea why is this happening, still trying the luck&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 13:57:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/349794#M979</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-16T13:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/349810#M982</link>
      <description>&lt;P&gt;Watch your security groups on the endpoint.&amp;nbsp; Also, check the firewall to ensure the Virtual Router has routes to the endpoint subnets. Have you tried deploying a bastion into the Trust side subnet to test the endpoint directly?&amp;nbsp; We need to determine if the issue is the firewall routing or the endpoint itself.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 14:22:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/349810#M982</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-16T14:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350605#M998</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475"&gt;@jmeurer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hard word paid off, now am able to load the lamda function result, although it's showing&amp;nbsp;{"message":"Forbidden"}&lt;/P&gt;&lt;P&gt;so happy at-least traffic reaching APiGW.&lt;/P&gt;&lt;P&gt;If&amp;nbsp; you have any idea why forbidden error, please share.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2020 12:42:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350605#M998</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-19T12:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350607#M999</link>
      <description>&lt;P&gt;Good news. &amp;nbsp;Message forbidden could be a result of a iam policy on the gateway. &amp;nbsp;You may need to assign a role to firewall so that it has permission to access the gateway. &amp;nbsp;It could also just be a formatting error in the api call. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;if you deployed a bastion host into the firewall subnet, does it have the same response?&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2020 13:13:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350607#M999</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-19T13:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350723#M1000</link>
      <description>&lt;P&gt;screenshot attached&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AWSapiGW.jpg" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27821i769B57266A7DF13D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="AWSapiGW.jpg" alt="AWSapiGW.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 17:35:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350723#M1000</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-20T17:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350846#M1001</link>
      <description>&lt;P&gt;is that screen shot through the firewall, or direct from a test client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 12:27:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350846#M1001</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-21T12:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350847#M1002</link>
      <description>&lt;P&gt;It's through the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 12:38:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350847#M1002</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-21T12:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350848#M1003</link>
      <description>&lt;P&gt;Test it direct to the endpoint from an instance in the same subnet as the trust side of the firewall. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 12:41:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350848#M1003</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-21T12:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350949#M1004</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475"&gt;@jmeurer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bastion host is not able to resolve the APIgw private URL. I gave 172.31.0.2 as DNS server for bastion host, still not resolving.&lt;/P&gt;&lt;P&gt;FW trust side IP is 172.16.99.x, VPC endpoint too 172.16.99.x and bastion host 172.16.99.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read in various other forums "each endpoint also requires a valid API key supplied on a&amp;nbsp;x-api-key&amp;nbsp;HTTP header. If not present or valid, the APIs will return a&amp;nbsp;403 (Forbidden)&lt;EM&gt;"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A href="https://codeburst.io/aws-api-gateway-by-example-3733d7792635" target="_blank" rel="noopener"&gt;https://codeburst.io/aws-api-gateway-by-example-3733d7792635&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 04:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/350949#M1004</guid>
      <dc:creator>charles07</dc:creator>
      <dc:date>2020-09-22T04:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall traffic to AWS API gateway</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/351013#M1005</link>
      <description>&lt;P&gt;DNS server is the generally second IP of the VPC cidr. Ie, if your vpc is 172.16.0.0/16, dns is 172.16.0.2. &amp;nbsp;Looks like your vpc is 172.16 but you set your dns server to 172.31. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 11:38:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-firewall-traffic-to-aws-api-gateway/m-p/351013#M1005</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-09-22T11:38:38Z</dc:date>
    </item>
  </channel>
</rss>

