<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2 Palo Alto VM-Serie for IPsec VPN in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/522860#M1758</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt;&amp;nbsp; I do not see any issues on configuring the IPSEC tunnel between your DC and Azure PAs as at the end, it will be tunnel between your DC and the Palo Alto only. You just need to make sure about the reachability between the peers and the routing for the encryption domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In regard to your 2nd query, how are the both Palo Altos configured ? Are those in HA or Individual firewalls ?&lt;/P&gt;</description>
    <pubDate>Wed, 30 Nov 2022 12:24:40 GMT</pubDate>
    <dc:creator>SutareMayur</dc:creator>
    <dc:date>2022-11-30T12:24:40Z</dc:date>
    <item>
      <title>2 Palo Alto VM-Serie for IPsec VPN</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/522782#M1757</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We deploy 2 VM-Series on Azure as recommanded by PA. These 2 FW manage Inbound/Outbound traffic and between our internals zones. A public load balancer have been configured. We need to connect our Azure infrastructure with our local datacenter via IPsec VPN between PA on Azure and firewall on our datacenter.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know if it's possible to configure an IPsec tunnel between our FW in datacenter and our 2 VM-Serie on Azure to avoid lost communication between Azure and datacenter&amp;nbsp; when one of PA reboots?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jérôme&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 21:35:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/522782#M1757</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2022-11-29T21:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Palo Alto VM-Serie for IPsec VPN</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/522860#M1758</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt;&amp;nbsp; I do not see any issues on configuring the IPSEC tunnel between your DC and Azure PAs as at the end, it will be tunnel between your DC and the Palo Alto only. You just need to make sure about the reachability between the peers and the routing for the encryption domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In regard to your 2nd query, how are the both Palo Altos configured ? Are those in HA or Individual firewalls ?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 12:24:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/522860#M1758</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2022-11-30T12:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Palo Alto VM-Serie for IPsec VPN</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/523201#M1763</link>
      <description>&lt;P&gt;It's 2 individual firewall with azure LB in Frontend for inbound trafic to our internal Web servers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But for VPN Ipsec HA, I don't see how to configure my 2 FW to keep the communication between our servers in Azure and our local site when I have one FW unavailable...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Sat, 03 Dec 2022 12:59:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/523201#M1763</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2022-12-03T12:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Palo Alto VM-Serie for IPsec VPN</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/523207#M1764</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Any particular reason you want to use the PA FWs in Azure as IPsec peers?&lt;/P&gt;
&lt;P&gt;I would suggest you to use Azure native components - Azure VPN gateway. It is more simple and convenient instead of wondering how to handle firewall failover.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Depending on your Azure setup you may decide to pass this traffic over Azure PA FW, or not.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Dec 2022 17:43:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/2-palo-alto-vm-serie-for-ipsec-vpn/m-p/523207#M1764</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-12-03T17:43:39Z</dc:date>
    </item>
  </channel>
</rss>

