<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to site VPN tunnel in Azure in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431575#M1319</link>
    <description>&lt;P&gt;Thank you for posting question&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192678"&gt;@rkbalaguru&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This requirement should be achievable by placing an interface facing Azure VNET and Tunnel interface to different zones and then configuring NAT policy using respective zones and interfaces. With regards to NAT, you can configure Translation Type: static IP, subnet to subnet (For example /24 on one side gets translated to different /24 subnet on the other side) or Translation Type: Dynamic IP And Port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Sat, 04 Sep 2021 00:25:23 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2021-09-04T00:25:23Z</dc:date>
    <item>
      <title>Site to site VPN tunnel in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431336#M1315</link>
      <description>&lt;P&gt;We need to build a site to site tunnel between on premise and Azure cloud so we are planning to use Palo Alto firewall in Azure,&amp;nbsp; since we have a requirement to hide VNET subnet in cloud as well as in on premise subnets from each other while sending traffic between them,&amp;nbsp; can we configure Port address translation.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 09:36:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431336#M1315</guid>
      <dc:creator>rkbalaguru</dc:creator>
      <dc:date>2021-09-03T09:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN tunnel in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431575#M1319</link>
      <description>&lt;P&gt;Thank you for posting question&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192678"&gt;@rkbalaguru&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This requirement should be achievable by placing an interface facing Azure VNET and Tunnel interface to different zones and then configuring NAT policy using respective zones and interfaces. With regards to NAT, you can configure Translation Type: static IP, subnet to subnet (For example /24 on one side gets translated to different /24 subnet on the other side) or Translation Type: Dynamic IP And Port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 00:25:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431575#M1319</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-04T00:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN tunnel in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431924#M1322</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp; Thanks for your input, do you have use case document to refer. Also can we NAT entire VNET subnets with just single public?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 05:23:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/431924#M1322</guid>
      <dc:creator>rkbalaguru</dc:creator>
      <dc:date>2021-09-06T05:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN tunnel in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/436386#M1341</link>
      <description>&lt;P&gt;Thank you for reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192678"&gt;@rkbalaguru&lt;/a&gt;&amp;nbsp; and sorry for getting back to you with delay.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on how I interpret your requirement, I would configure following 2 NAT policies. This would be private subnet to private subnet translation between Azure and Onpremise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_0-1632464678044.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36606iFE58A8728FEEEBBA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PavelK_0-1632464678044.png" alt="PavelK_0-1632464678044.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_1-1632464869739.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36607iCD1E21757362B19D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PavelK_1-1632464869739.png" alt="PavelK_1-1632464869739.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_2-1632465159822.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36608iCE5957284508505E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PavelK_2-1632465159822.png" alt="PavelK_2-1632465159822.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_3-1632465295268.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36609iF62783AC30298DE9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PavelK_3-1632465295268.png" alt="PavelK_3-1632465295268.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An alternative would be a Dynamic NAT + PAT to interface:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_5-1632465820123.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36611iACE1C0FE1965AE20/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PavelK_5-1632465820123.png" alt="PavelK_5-1632465820123.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_6-1632465879261.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36612i1656E9CAFB7F6143/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PavelK_6-1632465879261.png" alt="PavelK_6-1632465879261.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Fri, 24 Sep 2021 06:47:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-tunnel-in-azure/m-p/436386#M1341</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-24T06:47:04Z</dc:date>
    </item>
  </channel>
</rss>

