<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deploy Palo-Alto VMs into AWS ASG with 3 NICs (Trust, untrust and management) in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/deploy-palo-alto-vms-into-aws-asg-with-3-nics-trust-untrust-and/m-p/471276#M1490</link>
    <description>&lt;P&gt;We’re looking for the best way to deploy Palo Alto firewalls with trust, untrust and management NICs in an autoscaling group in AWS that’s aligned to best practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Autoscaling groups for EC2 instances are limited to one network and we see the latest version of the Palo Alto template in Git (ASG with warm pools) caters for this but creates a firewall deployment with two NICs (Data and management) on the same subnet &lt;A title="https://github.com/paloaltonetworks/aws-gwlb-vmseries/tree/main/cft_simplifiedasg_with_warm_pools" href="https://github.com/PaloAltoNetworks/AWS-GWLB-VMSeries/tree/main/cft_simplifiedASG_with_warm_pools" target="_blank" rel="noopener noreferrer"&gt;https://github.com/PaloAltoNetworks/AWS-GWLB-VMSeries/tree/main/cft_simplifiedASG_with_warm_pools&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would need a firewall with 3 NICS on 3 different subnets (management, trust and untrust).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know the best way to deploy Palo Alto VM firewalls with private, public and management NICs in an ASG in AWS please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or is this not possible and are we limited to 2 NICs on the same subnet? (management and data)&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2022 09:50:23 GMT</pubDate>
    <dc:creator>TonyCleveleys</dc:creator>
    <dc:date>2022-03-08T09:50:23Z</dc:date>
    <item>
      <title>Deploy Palo-Alto VMs into AWS ASG with 3 NICs (Trust, untrust and management)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/deploy-palo-alto-vms-into-aws-asg-with-3-nics-trust-untrust-and/m-p/471276#M1490</link>
      <description>&lt;P&gt;We’re looking for the best way to deploy Palo Alto firewalls with trust, untrust and management NICs in an autoscaling group in AWS that’s aligned to best practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Autoscaling groups for EC2 instances are limited to one network and we see the latest version of the Palo Alto template in Git (ASG with warm pools) caters for this but creates a firewall deployment with two NICs (Data and management) on the same subnet &lt;A title="https://github.com/paloaltonetworks/aws-gwlb-vmseries/tree/main/cft_simplifiedasg_with_warm_pools" href="https://github.com/PaloAltoNetworks/AWS-GWLB-VMSeries/tree/main/cft_simplifiedASG_with_warm_pools" target="_blank" rel="noopener noreferrer"&gt;https://github.com/PaloAltoNetworks/AWS-GWLB-VMSeries/tree/main/cft_simplifiedASG_with_warm_pools&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would need a firewall with 3 NICS on 3 different subnets (management, trust and untrust).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know the best way to deploy Palo Alto VM firewalls with private, public and management NICs in an ASG in AWS please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or is this not possible and are we limited to 2 NICs on the same subnet? (management and data)&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 09:50:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/deploy-palo-alto-vms-into-aws-asg-with-3-nics-trust-untrust-and/m-p/471276#M1490</guid>
      <dc:creator>TonyCleveleys</dc:creator>
      <dc:date>2022-03-08T09:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Deploy Palo-Alto VMs into AWS ASG with 3 NICs (Trust, untrust and management)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/deploy-palo-alto-vms-into-aws-asg-with-3-nics-trust-untrust-and/m-p/479496#M1526</link>
      <description>&lt;P&gt;&lt;A title="https://github.com/paloaltonetworks/aws-gwlb-vmseries/tree/main/cft_simplifiedasg_with_warm_pools" href="https://github.com/PaloAltoNetworks/AWS-GWLB-VMSeries/tree/main/cft_simplifiedASG_with_warm_pools" target="_blank" rel="noopener noreferrer nofollow"&gt;cft_simplifiedASG_with_warm_pools&lt;/A&gt;&amp;nbsp;assumes the 2 NIC what is coded is from the same subnet. Additionally AWS ASG + LaunchTemplate based ENI provisioning will support only the subnets that was configured in ASG resource. You will not be able to do the splitting via CloudFormation. But you could achieve what you want by keeping the eth0 in the LaunchTemplate and other 2 (eth1 and eth2) by updating the Lifecycle Hook Lambda code.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Apr 2022 23:44:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/deploy-palo-alto-vms-into-aws-asg-with-3-nics-trust-untrust-and/m-p/479496#M1526</guid>
      <dc:creator>rajworks</dc:creator>
      <dc:date>2022-04-09T23:44:18Z</dc:date>
    </item>
  </channel>
</rss>

