<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Paloalto VM Series VPC Peering support on AWS in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521710#M1740</link>
    <description>&lt;P&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Hi @&lt;/SPAN&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(46,46,46);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;&lt;STRONG&gt;nattapong_thi,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;can you check the transit gw route tables to see if traffic from VPC-B is able to reach the security vpc (where the firewall is deployed)? The routes to VPC-A and to the security VPC should be different.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Regards,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Prerna Ahire&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Product Specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions" target="_blank"&gt;https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Nov 2022 16:47:41 GMT</pubDate>
    <dc:creator>psampatahire</dc:creator>
    <dc:date>2022-11-18T16:47:41Z</dc:date>
    <item>
      <title>Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/520886#M1728</link>
      <description>&lt;P&gt;Tested traffic within a same VPC it's working fine, use ENI of paloalto's LAN interface as a target&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But I have no idea, when we have 2 VPC (VPC-A and VPC-B) and we installed paloalto on VPC-A&lt;/P&gt;
&lt;P&gt;How to direct traffic from VPC-B to paloalto and then access to the internet via paloalto?&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="AWS" id="AWS"&gt;&lt;/LI-PRODUCT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2022 06:37:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/520886#M1728</guid>
      <dc:creator>nattapong_thi</dc:creator>
      <dc:date>2022-11-10T06:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521182#M1737</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139105"&gt;@nattapong_thi&lt;/a&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Greetings from Palo Alto Networks!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;I saw your post and have a few recommendations for you. You may want to look at it initially, does this help?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;You could use a Transit Gateway for inter-VPC communication, and then a NAT Gateway in VPC-A for outbound connections to the Internet. Create the below routes for Outbound:&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Forward all traffic from VPC-B to TGW&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Forward all traffic from TGW to FW in VPC-A&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Forward all traffic from FW to NATGW&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Forward all traffic from NATGW to IGW&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;To access the internet, You will need IGW and NAT GW also part of VPC B. Please confirm how the 2 VPCs are connected. are they connected with TGW?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Regards,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Prerna Ahire&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Product Specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions" target="_blank"&gt;https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions&lt;/A&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:12px;"&gt;*Don’t forget to accept the solution provided!*&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 17:04:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521182#M1737</guid>
      <dc:creator>psampatahire</dc:creator>
      <dc:date>2022-11-14T17:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521524#M1738</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/247124"&gt;@psampatahire&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After I used transit gateway, it's seemed client inside VPC-B still unable to access the internet (but can communicate with ec2 inside VPC-A)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VPC-B ec2 --&amp;gt; Transit GW --&amp;gt; Paloalto's LAN eni --&amp;gt; NAT GW --&amp;gt; IGW&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After I test using network reachability, It's look like traffic could not hit IGW&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Route table rtb does not have an applicable route to igw&lt;BR /&gt;Internet gateway igw cannot accept traffic with spoofed addresses from the VPC.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 10:59:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521524#M1738</guid>
      <dc:creator>nattapong_thi</dc:creator>
      <dc:date>2022-11-17T10:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521710#M1740</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Hi @&lt;/SPAN&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(46,46,46);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;&lt;STRONG&gt;nattapong_thi,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;can you check the transit gw route tables to see if traffic from VPC-B is able to reach the security vpc (where the firewall is deployed)? The routes to VPC-A and to the security VPC should be different.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Regards,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Prerna Ahire&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Product Specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(248,248,248);color:rgb(29,28,29);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions" target="_blank"&gt;https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 16:47:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521710#M1740</guid>
      <dc:creator>psampatahire</dc:creator>
      <dc:date>2022-11-18T16:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521940#M1742</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139105"&gt;@nattapong_thi&lt;/a&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Greeting!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Please let us know whether you are still facing the problem.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Regards,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Prerna Ahire&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Product Specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions" target="_blank"&gt;&lt;SPAN style="background-color:hsl(0, 0%, 100%);color:hsl(0, 0%, 0%);font-family:Arial, Helvetica, sans-serif;font-size:14px;"&gt;https://live.paloaltonetworks.com/t5/configuration-discussions/ct-p/Configuration-Discussions&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 00:14:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/521940#M1742</guid>
      <dc:creator>psampatahire</dc:creator>
      <dc:date>2022-11-22T00:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/522709#M1754</link>
      <description>&lt;P&gt;Please help to guide me&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Forward all traffic from TGW to FW in VPC-A&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How to configure this task, from transit gateway routing, it does not have an option to forward to Firewall ENI&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 07:48:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/522709#M1754</guid>
      <dc:creator>nattapong_thi</dc:creator>
      <dc:date>2022-11-29T07:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/522712#M1755</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139105"&gt;@nattapong_thi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can configure a route table which will be used by the TGW subnet(A TGW ENI is attached to this subnet) in VPC-A.&lt;/P&gt;
&lt;P&gt;Then in that route table, create a route to forward all traffic to the Firewall ENI.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_394f6e476f289bMervynChan_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 08:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/522712#M1755</guid>
      <dc:creator>MervynChan</dc:creator>
      <dc:date>2022-11-29T08:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/522721#M1756</link>
      <description>&lt;P&gt;After configuring a route on subnet of transit gateway, traffic can reach the firewall, log generated with source NAT ip&lt;/P&gt;
&lt;P&gt;but it's still unable to connect internet (ping 8.8.8.8)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*** If I change 0.0.0.0 on transit gateway routing table from &lt;STRONG&gt;firewall's eni&lt;/STRONG&gt; to &lt;STRONG&gt;NAT gateway&lt;/STRONG&gt; directly, it's working properly&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 10:53:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/522721#M1756</guid>
      <dc:creator>nattapong_thi</dc:creator>
      <dc:date>2022-11-29T10:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VM Series VPC Peering support on AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/530728#M1796</link>
      <description>&lt;P&gt;Do you have appliance mode enabled on the attachment thats connected to the firewalls VPC?&lt;BR /&gt;&lt;BR /&gt;Also based on your previous reply, you would need to do a NAT destined to internet addresses so the replies passes trough the palo alto, either a NAT or you could create a route(Private addresses or VPC B) from the NAT gateway to reply back to the palo alto.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2023 20:16:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/paloalto-vm-series-vpc-peering-support-on-aws/m-p/530728#M1796</guid>
      <dc:creator>GabrielMontiel</dc:creator>
      <dc:date>2023-02-10T20:16:34Z</dc:date>
    </item>
  </channel>
</rss>

