<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static NAT in Microsoft Azure in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173847#M108</link>
    <description>&lt;P&gt;Hi Amaresh, there are 2 ways you can do this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a NAT policy that doesn't filter for inbound port so that you can account for both RDP (3389) and 443 coming into the same host. Then rely on your security policy to allow only the applications/ports you wish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Create 2 separate NAT policies, one that filters specifically for port 3389 and one that filters for 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've provided an example below of #1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-08-30 at 8.39.05 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10961i2A4E99D8F9479ED4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-08-30 at 8.39.05 AM.png" alt="Screen Shot 2017-08-30 at 8.39.05 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will also need a corresponding Security Policy with the source zone of Untrust and the Destination zone of Trust, for the appropriate applictions that you want to allow access to. The Destination IP would be 10.0.1.4 in this case. &amp;nbsp;You can leave the destionation IP set to any if you prefer to see the destination IP show up in the traffic log, and adjust the Security Policy after the fact.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Aug 2017 12:54:23 GMT</pubDate>
    <dc:creator>kblackstone</dc:creator>
    <dc:date>2017-08-30T12:54:23Z</dc:date>
    <item>
      <title>Static NAT in Microsoft Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/171844#M101</link>
      <description>&lt;P&gt;Need to Map internal server with Public IP (Static NAT ) with specfic ports exposed to the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I belive the public IP needs to be associated with Azure load balancer .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Request some one to share the config of azure as well the Palo alto config .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2017 12:35:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/171844#M101</guid>
      <dc:creator>Amaresh</dc:creator>
      <dc:date>2017-08-16T12:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in Microsoft Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173717#M106</link>
      <description>&lt;P&gt;Hi Amaresh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The internal server may not need a public IP as it could be access from By Internet users through NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are the steps to follow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. assigned a public IP to the public load balancer that front-end the VM-Series FWs&lt;/P&gt;&lt;P&gt;2. add a NAT policy to all the FWs behind the public LB. The policy, I call it "Inbound DNAT". In the original packet section use Untrust in the src and dst zones, and add the IP address of the eth1 FW interface. In the Translater packet section use Dynamic IP and Port as Translation Type, Interface Address as Address Type and ethernet1/2 as Interface (leave IP address as None). Select the Destination Address Translatation and type either the IP address load balancer that front ends the internal server farm or the IP address of the internal server (private IP - make sure is static so if you reboot it does not change)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You also need to configure routing on the VM-Series and routing entry in the UDR to direct traffic in the internal server subnet through the VM-Series.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 19:59:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173717#M106</guid>
      <dc:creator>marregoces</dc:creator>
      <dc:date>2017-08-29T19:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in Microsoft Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173813#M107</link>
      <description>&lt;P&gt;Does it require to configure NAT Inbound rule on Azure ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Consider the scenario as mentioned below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Public IP (Load balancer ) Front end- 13.182.82.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unrust Interface - 10.0.1.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trust Interface - 10.0.2.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal server -10.0.5.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Port to be exposed - RDP and 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you help me with the NAT rule on palo alto firewall.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 09:09:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173813#M107</guid>
      <dc:creator>Amaresh</dc:creator>
      <dc:date>2017-08-30T09:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in Microsoft Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173847#M108</link>
      <description>&lt;P&gt;Hi Amaresh, there are 2 ways you can do this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a NAT policy that doesn't filter for inbound port so that you can account for both RDP (3389) and 443 coming into the same host. Then rely on your security policy to allow only the applications/ports you wish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Create 2 separate NAT policies, one that filters specifically for port 3389 and one that filters for 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've provided an example below of #1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-08-30 at 8.39.05 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10961i2A4E99D8F9479ED4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-08-30 at 8.39.05 AM.png" alt="Screen Shot 2017-08-30 at 8.39.05 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will also need a corresponding Security Policy with the source zone of Untrust and the Destination zone of Trust, for the appropriate applictions that you want to allow access to. The Destination IP would be 10.0.1.4 in this case. &amp;nbsp;You can leave the destionation IP set to any if you prefer to see the destination IP show up in the traffic log, and adjust the Security Policy after the fact.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 12:54:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/173847#M108</guid>
      <dc:creator>kblackstone</dc:creator>
      <dc:date>2017-08-30T12:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in Microsoft Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/174605#M111</link>
      <description>&lt;P&gt;Thanks for the reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still am not able to access the server with static nat config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly find the config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On Azure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="loadbalancer.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11015iF7D927CFCC308458/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="loadbalancer.png" alt="loadbalancer.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paloalto.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11016i7E7C7563DD98B5FE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paloalto.JPG" alt="paloalto.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note - From machine 10.0.3.5&amp;nbsp; able to acces internet . But static nat is not working&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 13:28:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/174605#M111</guid>
      <dc:creator>Amaresh</dc:creator>
      <dc:date>2017-09-04T13:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in Microsoft Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/174627#M112</link>
      <description>&lt;P&gt;Hi Amarash, have you created all of the necessary load balancing rules, probes, etc.? &amp;nbsp;It might be worth contacting your Palo Alto Networks sales team who may be able to assist and get you up and running.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Front Side IP Address&lt;/P&gt;&lt;P&gt;Backend Pool&lt;/P&gt;&lt;P&gt;Health Probe&lt;/P&gt;&lt;P&gt;Load Balancing Rules&lt;/P&gt;&lt;P&gt;Corresponding port open on the firewall or wherever your health probe is going to&lt;/P&gt;&lt;P&gt;Corresponding security rules to allow the health probe to pass&lt;/P&gt;&lt;P&gt;The correct routes on your VM Series to account for the health probe(s)&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 14:32:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/static-nat-in-microsoft-azure/m-p/174627#M112</guid>
      <dc:creator>kblackstone</dc:creator>
      <dc:date>2017-09-04T14:32:45Z</dc:date>
    </item>
  </channel>
</rss>

