<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to secure outbound traffic from Azure? in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/515144#M1666</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237071"&gt;@PepsiEComm&lt;/a&gt;&amp;nbsp; Looks like your load balancer is not operational. Have you configured routes for 168.63.129.16/32 on a separate VR pointing towards internal interface or to the gateway of loadbalancer subnet *.*.*.1 , 168.63.129.16 is used by Azure LB and firewall should allow it. Also LB will be using port 22 for health checks.&lt;/P&gt;</description>
    <pubDate>Fri, 16 Sep 2022 19:31:39 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2022-09-16T19:31:39Z</dc:date>
    <item>
      <title>How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/515016#M1665</link>
      <description>&lt;P&gt;This question might sound stupid but I'm banging my head against the wall trying to figure out how to make this work and I cannot find any documentation anywhere on this website that answers this (simple) question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to setup a VM Series Palo Alto firewall in Azure, to secure outbound (not inbound) traffic from my Azure virtual machines to the internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've already deployed the VM Series Firewall according to these instructions here -&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-firewall-on-azure-solution-template#ide37bac08-683a-4245-a412-2f74a56855fa" target="_blank"&gt;Deploy the VM-Series Firewall from the Azure Marketplace (Solution Template) (paloaltonetworks.com)&lt;/A&gt;&amp;nbsp;- right through to the end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I added a load balancer that sits in front of the virtual machine's trust interface, and set a route in the Route Table for the subnets my virtual machines are running on to direct 0.0.0.0/0 traffic to this load balancer's front end. Everything I've read to date says this how to get outbound traffic to go through the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But when I do this, all my connectivity just breaks. I can't make any outbound connections at all. I added a basic rule to whitelist/allow all traffic in the firewall just to test that the traffic is getting forwarded correctly but still, nothing works. I tried looking at the firewall logs but my outbound requests aren't even showing up as going to the firewall at all (logs are completely empty). Is there some additional configuration I'm supposed to do in PaloAlto PAnOS interface to make this work, and if so, what the heck is it? I can't find any documentation anywhere that says what I'm actually supposed to do.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 20:04:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/515016#M1665</guid>
      <dc:creator>PepsiEComm</dc:creator>
      <dc:date>2022-09-15T20:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/515144#M1666</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237071"&gt;@PepsiEComm&lt;/a&gt;&amp;nbsp; Looks like your load balancer is not operational. Have you configured routes for 168.63.129.16/32 on a separate VR pointing towards internal interface or to the gateway of loadbalancer subnet *.*.*.1 , 168.63.129.16 is used by Azure LB and firewall should allow it. Also LB will be using port 22 for health checks.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 19:31:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/515144#M1666</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2022-09-16T19:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516644#M1678</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;Have you configured routes for 168.63.129.16/32 on a separate VR pointing towards internal interface or to the gateway of loadbalancer subnet *.*.*.1 , 168.63.129.16 is used by Azure LB and firewall should allow it. Also LB will be using port 22 for health checks.&lt;/BLOCKQUOTE&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I don't really understand this - there needs be a route configured to 168.63.129.16/32 on palo alto side? or in the load balancer in Azure? If it's on a separate VR how would I get the original VR to work? I'm very confused.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 16:41:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516644#M1678</guid>
      <dc:creator>PepsiEComm</dc:creator>
      <dc:date>2022-10-03T16:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516761#M1679</link>
      <description>&lt;P&gt;I think he was suggesting that traffic was not being forwarded by your internal Load Balancer (LB) to the firewall(s). The LB&amp;nbsp; should be configured with the Palo-Alto's in a backend pool and sending traffic to them if they are 'up' which is done by the LB sending a health probe on port 22. Check the insights/metrics on the LB to see if health probe status is 100%. If not investigate what is blocking the probe.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 13:53:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516761#M1679</guid>
      <dc:creator>slashBack</dc:creator>
      <dc:date>2022-10-04T13:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516762#M1680</link>
      <description>&lt;P&gt;Forgot to say that the 'source' of the health probes is&amp;nbsp;&lt;SPAN&gt;168.63.129.16/32. Check your NSG's on your palo-alto nics and if applicable your subnets to see if this allowed, best practice is to use the source tag 'AzureLoadBalancer' instead of the IP for your NSG rule&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 13:57:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516762#M1680</guid>
      <dc:creator>slashBack</dc:creator>
      <dc:date>2022-10-04T13:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516763#M1681</link>
      <description>&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/guides/azure-architecture-guide" target="_blank"&gt;Reference Architecture Guide for Azure - Palo Alto Networks&lt;/A&gt;&amp;nbsp;- Page 44&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 13:58:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/516763#M1681</guid>
      <dc:creator>slashBack</dc:creator>
      <dc:date>2022-10-04T13:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517145#M1685</link>
      <description>&lt;P&gt;The load balancer is set up with port 22 as the health check, the IP address is correct and everything is in the same virtual network, there is no NSG on the palo alto interfaces, yet the health probe is coming back unhealthy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any configuration I have to do inside palo alto VM to make it accept connections? Is there some resource I can use to figure this out other than having to read a 66 page manual??&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2022 16:21:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517145#M1685</guid>
      <dc:creator>PepsiEComm</dc:creator>
      <dc:date>2022-10-07T16:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517149#M1686</link>
      <description>&lt;P&gt;That page talks about inbound traffic, my use case for paloalto is to have firewall for outbound traffic only.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2022 17:05:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517149#M1686</guid>
      <dc:creator>PepsiEComm</dc:creator>
      <dc:date>2022-10-07T17:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517205#M1689</link>
      <description>&lt;P&gt;Do you have two VR's?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In summary this is how it works&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VR-INT&lt;/P&gt;
&lt;P&gt;point route for 168.63.129.16 towards internal interface&lt;/P&gt;
&lt;P&gt;point route for internal networks of vnet/subnets towards internal interface&lt;/P&gt;
&lt;P&gt;point default route to VR-EXT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VR-EXT&lt;/P&gt;
&lt;P&gt;point default route to external interface&lt;/P&gt;
&lt;P&gt;point internal routes to VR-INT&lt;/P&gt;
&lt;P&gt;If hosting webservers point route to 168.63.129.16 towards external interface for use by external load balancers, if using load balancer on external and have 2 Palos&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assign public IP in Azure to external interface or use NAT gateway&lt;/P&gt;
&lt;P&gt;Setup NAT on Palos&lt;/P&gt;
&lt;P&gt;Setup UDR's correctly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Oct 2022 05:54:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517205#M1689</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2022-10-09T05:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517217#M1692</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237071"&gt;@PepsiEComm&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest you to first carefully go over the whole document from &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/242041"&gt;@slashBack&lt;/a&gt; link. In addition to that I would also suggest to check the deployment guide from here - &lt;A href="https://www.paloaltonetworks.com/resources/reference-architectures/azure" target="_blank"&gt;https://www.paloaltonetworks.com/resources/reference-architectures/azure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But lets take a step back. From your first post you mentioned you have followed the guide how to deploy single VM-Series FW in Azure. If you are deploying standalone FW and not redundant pair, why do you need internal LB behind the trusted interface? You need load-balancer only if you plan to have two firewall for resiliency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do want to have two firewalls in redundant pair (I don't want to call it HA, because there is no sync in config and sessions doing it this way) you need to follow the guides from the links above. The simple task of adding LB to the deployment actually require couple of changes that are not mentioned in the steps you have followed:&lt;/P&gt;
&lt;P&gt;- You need to configure interface management profile to allow FW dataplane interface to response to LB probes&lt;/P&gt;
&lt;P&gt;- You need to add static route for 168.63.129.16 pointing to the trust interface, so the firewall can return the traffic in correct direction&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Oct 2022 16:10:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517217#M1692</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-10-09T16:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517518#M1696</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237071"&gt;@PepsiEComm&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest you to first carefully go over the whole document from &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/242041"&gt;@slashBack&lt;/a&gt; link. In addition to that I would also suggest to check the deployment guide from here - &lt;A href="https://www.paloaltonetworks.com/resources/reference-architectures/azure" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/resources/reference-architectures/azure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But lets take a step back. From your first post you mentioned you have followed the guide how to deploy single VM-Series FW in Azure. If you are deploying standalone FW and not redundant pair, why do you need internal LB behind the trusted interface? You need load-balancer only if you plan to have two firewall for resiliency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do want to have two firewalls in redundant pair (I don't want to call it HA, because there is no sync in config and sessions doing it this way) you need to follow the guides from the links above. The simple task of adding LB to the deployment actually require couple of changes that are not mentioned in the steps you have followed:&lt;/P&gt;
&lt;P&gt;- You need to configure interface management profile to allow FW dataplane interface to response to LB probes&lt;/P&gt;
&lt;P&gt;- You need to add static route for 168.63.129.16 pointing to the trust interface, so the firewall can return the traffic in correct direction&lt;/P&gt;
&lt;P&gt;But lets take a step back. From your first post you mentioned you have followed the guide how to deploy single VM-Series FW in Azure. If you are deploying standalone FW and not redundant pair, why do you need internal LB behind the trusted interface? You need load-balancer only if you plan to have two firewall for resiliency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do want to have two firewalls in redundant pair (I don't want to call it HA, because there is no sync in config and sessions doing it this way) you need to follow the guides from the links above. The simple task of adding LB to the deployment actually require couple of changes that are not mentioned in the steps you have followed:&lt;/P&gt;
&lt;P&gt;- You need to configure interface management profile to allow FW dataplane interface to response to LB probes&lt;/P&gt;
&lt;P&gt;- You need to add static route for 168.63.129.16 pointing to the trust interface, so the firewall can return the traffic in correct direction&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I'm using a load balancer because that's what the guide said under Step 8:&lt;/P&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI class="li"&gt;
&lt;DIV&gt;
&lt;DIV&gt;Gateway&lt;/DIV&gt;
—Deploy a third-party load balancer in front of the UnTrust zone.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;Is there a simpler way to do this if you only have one firewall instance and have no need for load balancing or HA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just tried setting the Azure route table to skip the load balancer step entirely, to just send traffic directly to the IP address of the Trust interface as well as trying it again to go direct to the IP address of the Untrust interface and there's still the same problem, nothing routes and nothing shows up in the traffic logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a quick start guide like this one -&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-firewall-on-azure-solution-template#ide37bac08-683a-4245-a412-2f74a56855f" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-firewall-on-azure-solution-template#ide37bac08-683a-4245-a412-2f74a56855f&lt;/A&gt;&amp;nbsp;- for this topic? I'm not trying to do rocket science here, just literally trying to get an Azure virtual machine to use the firewall for outbound traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 22:30:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/517518#M1696</guid>
      <dc:creator>PepsiEComm</dc:creator>
      <dc:date>2022-10-11T22:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure outbound traffic from Azure?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/542161#M1888</link>
      <description>&lt;P&gt;Hi Pepsi EComm,&lt;/P&gt;
&lt;P&gt;I have the same problem as you, I have configured the route table, I have configured everything related to my palo alto. But I have no way to make the outgoing traffic from my VMs go through the Firewall.&lt;/P&gt;
&lt;P&gt;You managed to solve this problem.&lt;/P&gt;
&lt;P&gt;Thank you very much in advance.&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 11:41:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-outbound-traffic-from-azure/m-p/542161#M1888</guid>
      <dc:creator>Nox_Porto</dc:creator>
      <dc:date>2023-05-15T11:41:04Z</dc:date>
    </item>
  </channel>
</rss>

