<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VM Series in Azure - Active/Passive or Active/Active in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532282#M1807</link>
    <description>&lt;DIV dir="auto" data-removefontsize="true" data-originalcomputedfontsize="16"&gt;The majority of our customers run their firewalls all active.&amp;nbsp; Active-Passive is not recommended unless you have a specific case for it.&amp;nbsp; Please see the Azure Reference Architecture for details.&amp;nbsp; Utilizing the Azure Load Balancer and running the firewalls active is the recommendation.&amp;nbsp; The Azure Load Balancer maintains symmetry via its algorithm. &amp;nbsp;&lt;/DIV&gt;
&lt;DIV dir="auto"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV dir="auto"&gt;
&lt;DIV&gt;&lt;A href="https://www.paloaltonetworks.com/resources/reference-architectures/azure" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.paloaltonetworks.com/resources/reference-architectures/azure&amp;amp;source=gmail&amp;amp;ust=1677379576239000&amp;amp;usg=AOvVaw1I2EcSMSjwr9HZr6laPnt8" data-removefontsize="true" data-originalcomputedfontsize="16"&gt;https://www.paloaltonetworks.&lt;WBR /&gt;com/resources/reference-&lt;WBR /&gt;architectures/azure&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Feb 2023 13:56:01 GMT</pubDate>
    <dc:creator>sthornton</dc:creator>
    <dc:date>2023-02-25T13:56:01Z</dc:date>
    <item>
      <title>VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532192#M1804</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have currently 1 firewall VM-Series deployed on Azure. We plan to deploy a second for HA. My question is : is-it recommanded to configure the cluster in Active/Passive mode ? Or to configure the 2 VM-Series as active FW with Azure Load Balancer (what is the risk to have assymetric trafic) ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jerome&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 16:51:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532192#M1804</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-02-24T16:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532266#M1805</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This document specifies active/passive only -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClD9CAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClD9CAK&lt;/A&gt;.&amp;nbsp; It has a link to the specific instructions.&amp;nbsp; Active/active is not mentioned with no instructions.&amp;nbsp; So, active/passive is implicitly recommended.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This document -&amp;gt; &lt;A href="https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/azure-architecture-guide" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/azure-architecture-guide&lt;/A&gt; says on page 39, "Although you can configure high availability so that both firewalls are passing traffic, in the majority of deployments, the firewalls operate as an active/passive pair where only one firewall is passing traffic at a time."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 23:02:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532266#M1805</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-02-24T23:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532282#M1807</link>
      <description>&lt;DIV dir="auto" data-removefontsize="true" data-originalcomputedfontsize="16"&gt;The majority of our customers run their firewalls all active.&amp;nbsp; Active-Passive is not recommended unless you have a specific case for it.&amp;nbsp; Please see the Azure Reference Architecture for details.&amp;nbsp; Utilizing the Azure Load Balancer and running the firewalls active is the recommendation.&amp;nbsp; The Azure Load Balancer maintains symmetry via its algorithm. &amp;nbsp;&lt;/DIV&gt;
&lt;DIV dir="auto"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV dir="auto"&gt;
&lt;DIV&gt;&lt;A href="https://www.paloaltonetworks.com/resources/reference-architectures/azure" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.paloaltonetworks.com/resources/reference-architectures/azure&amp;amp;source=gmail&amp;amp;ust=1677379576239000&amp;amp;usg=AOvVaw1I2EcSMSjwr9HZr6laPnt8" data-removefontsize="true" data-originalcomputedfontsize="16"&gt;https://www.paloaltonetworks.&lt;WBR /&gt;com/resources/reference-&lt;WBR /&gt;architectures/azure&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2023 13:56:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532282#M1807</guid>
      <dc:creator>sthornton</dc:creator>
      <dc:date>2023-02-25T13:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532283#M1808</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181403"&gt;@sthornton&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's good information to know that your customers are doing active/active successfully.&amp;nbsp; I like active/active better for Azure, but I would like to see instruction docs and a recommendation from PANW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have configuration instructions for active/active?&amp;nbsp; The one I found is active/passive.&amp;nbsp; Also, my 2nd URL above is a document on the URL page you posted.&amp;nbsp; It does not recommend active/active.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2023 14:08:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532283#M1808</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-02-25T14:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532286#M1809</link>
      <description>&lt;P&gt;Hi Tom. &amp;nbsp;I want to clarify something on the active/active. &amp;nbsp;This is done with the use of a native Azure Load Balancer acting as a front end device. &amp;nbsp;The firewalls both run active, both process traffic, have the full config, etc. &amp;nbsp;They do NOT however, share state as in a traditional A/P or A/A with an HA4 interface. &amp;nbsp;So this active-active is not stateful. &amp;nbsp;I just want to make sure that is clear so no expectations are missed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure gives us a couple features to make this work. &amp;nbsp;First, we can route traffic to their load balancer, second is with the use of UDRs we can steer our traffic accordingly to said load balancer. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the link I posted in my previous reply, if you choose the Deployment Guide you can see how all of this done. &amp;nbsp;There are some templates available on GitHub as well if you want to spin it up and test. &amp;nbsp;If you need eval licenses I can ask someone to reach out. &amp;nbsp;Also, if you’d just like to have a meeting to discuss as well, your account team can make that happen. &amp;nbsp;If you don’t have one, we can get an SE to speak with you in more detail. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I’m happy to continue this discussion here and try to answer any other questions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enjoy the rest of the weekend.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2023 21:57:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532286#M1809</guid>
      <dc:creator>sthornton</dc:creator>
      <dc:date>2023-02-25T21:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532288#M1810</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181403"&gt;@sthornton&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Excellent!&amp;nbsp; Thank you for pointing me to the specific reference.&amp;nbsp; So, it looks like the 1st URL I referenced above is not recommended any more.&amp;nbsp; The 2nd URL I posted is the same Deployment Guide you recommend.&amp;nbsp; This is what I quoted:&amp;nbsp; "Although you can configure high availability so that both firewalls are passing traffic, in the majority of deployments, the firewalls operate as an active/passive pair where only one firewall is passing traffic at a time."&amp;nbsp; These are the sentences immediately following:&amp;nbsp; "Unlike traditional implementations, this architecture achieves VM-Series resiliency in Azure through the use of native public cloud services. The benefits of configuring resiliency through native public cloud services instead of firewall high availability are faster failover and the ability to scale out the firewalls as needed. However, in a public cloud resiliency model, configuration and state information is not shared between firewalls."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I didn't read far enough!&amp;nbsp; Thank you, again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&amp;nbsp; Please mark &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181403"&gt;@sthornton&lt;/a&gt; 's 2nd response as the solution.&amp;nbsp; That way other people that have the same question can jump straight to the answer.&amp;nbsp; Or please post if still want the asymmetric traffic question answered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Feb 2023 03:01:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532288#M1810</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-02-26T03:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532327#M1812</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Thank you for your answer. So if I understand, the recommanded configuration is to deploy 2 VM-Series "standalone" (without HA configuration) and use Azure Load Balancer feature to route the trafic correctly on each firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I plan to use our VM-Series in Azure with GlobalProtect to connect our users on the network with a vpn SSL. In this configuration, is-it possibleto provide a redundant solution to keep access to the newtwork even if a firewall reboots dûe to an upgrade version for example ? Or, if I restart FW1 for an upgrade version, all GlobalProtect SSL VPN connexions started on this firewall will be cut ? And what's happening for new connexion during the firewall reboots ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 07:40:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532327#M1812</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-02-27T07:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532450#M1816</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, the recommendation in the Deployment Guide is to use the Azure Load Balancer &lt;EM&gt;for cloud services&lt;/EM&gt;, as explained on page 40.&amp;nbsp; It provides faster failover and scale.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since you plan to use Azure for GlobalProtect (I will abbreviate as GP), your questions are very valid.&amp;nbsp; I will answer them to the best of my knowledge:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;A stateful solution for GP can be provided with the 1st URL I posted, deploying active/passive HA in Azure.&amp;nbsp; It is also linked in the Deployment Guide as an option.&amp;nbsp; This &lt;EM&gt;stateful&lt;/EM&gt; solution should keep GP sessions intact during failover.&lt;/LI&gt;
&lt;LI&gt;With the Azure Load Balancer, the GP sessions will be cut.&amp;nbsp; I know the GP client will try to reconnect on its own, but will probably require re-authentication.&lt;/LI&gt;
&lt;LI&gt;The Azure Load Balancer detects NGFW failure by monitoring cloud services through each NGFW.&amp;nbsp; If you have an application that you can monitor, the the LB will detect the NGFW is down and &lt;EM&gt;not route new connections&lt;/EM&gt; to it.&amp;nbsp; Otherwise, new connections may be routed to the down NGFW.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 12:59:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532450#M1816</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-02-28T12:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532465#M1818</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;If I may also add my personal opinion/experience.&lt;/P&gt;
&lt;P&gt;One think to remember - there is no best practice when comes to cloud networking. You need to define your goals and find the setup that best suites your use case:&lt;/P&gt;
&lt;P&gt;- Will you inspect Outbound traffic&lt;/P&gt;
&lt;P&gt;- Will you inspect east-west (inter-vnet or inter subnet) traffic&lt;/P&gt;
&lt;P&gt;- Will you inspect inbound traffic&lt;/P&gt;
&lt;P&gt;- Will you have GlobalProtect&lt;/P&gt;
&lt;P&gt;- Will you have IPsec tunnels terminated on the PAN FW&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN high-availability (active/passive) will take between 2 and 5 &lt;STRONG&gt;minutes.&lt;/STRONG&gt; This is because in case of failover the IP address needs to be transferred to the secondary member. In Azure (same is for AWS and other public clouds), FWs needs to instruct the cloud to do it. So basically when FWs detect issues and need to failover they will make some API calls to ask Azure to move the IP, which takes time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I said 2-5mins I am quoting the same document that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt; and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181403"&gt;@sthornton&lt;/a&gt;&amp;nbsp; mentioned. For me this is too long for any normal TCP session to survive. For that reason I believe (not really tested, but almost certain) that GP will lose connection and will try to reconnect, while Azure is moving the IPs to the secondary member.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So although active/passive setup will be simpler from GP setup perspective (you will have single IP for GP portal and gateway), it may have cause short interruptions for your GP users in case of failover (like you mentioned for PanOS update).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you can see here another user have consulted with Palo cloud consultant, who recommended to set GP directly to the public IPs for the firewalls. &lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/recommended-config-for-globalprotect-on-azure-active-active-lb/td-p/460180" target="_blank"&gt;https://live.paloaltonetworks.com/t5/globalprotect-discussions/recommended-config-for-globalprotect-on-azure-active-active-lb/td-p/460180&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Which means you don't need external LB, only internal LB if you plan to route outbound traffic (from VMs to internet) over Palo FWs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On other hand I am big advocate for PAN FW + Azure Gateway Load Balancer. With combination of the above link I would suggest:&lt;/P&gt;
&lt;P&gt;- Deploy two standalone PAN FWs&lt;/P&gt;
&lt;P&gt;- Use internal Azure LB behind the PAN FWs which will be used by VMs for outbound traffic&lt;/P&gt;
&lt;P&gt;- Use Gateway Load Balancer for any inbound traffic.&lt;/P&gt;
&lt;P&gt;- Setup GP portal and gateway directly on the outside interface for each FW. Set your DNS for the GP portal to resolve to the two IPs. Set your GP portal config to assign two external GP gateway and put the two FW addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 14:48:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532465#M1818</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-02-28T14:48:00Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532469#M1819</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank's for your comment. Regarding our VPN site 2 site between our on-prem and Azure, your recommandation is to create our VPN between our local site and the Azure VPN Gateway and forward the trafic to the Azure LB--&amp;gt;FW--&amp;gt;VM and not to create the VPN directly on the VM-Serie to avoid lost connection when I upgrade the first firewall in architecture with 2 VM-Series with LB ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 15:03:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532469#M1819</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-02-28T15:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532476#M1820</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I personally prefer to use Azure VPN gateway and build the the tunnel between on-prem and VPN GW, instead of terminating it on the VM-Series FW. This will eliminate the complexity for handling redundant inbound traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would vouch for such setup instead of terminating the VPN on the FW.&lt;/P&gt;
&lt;P&gt;The only benefit (IMHO) of terminating the VPN on the FW is to reduce the cost, which for us is not worth it.&amp;nbsp; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way you don't really have to route the traffic from VPN GW over VM-Series VM.&lt;/P&gt;
&lt;P&gt;You most probably will use NGFW (Palo or other vendor) to terminate the on-prem side of the tunnel. Which means you already have a way to restrict/inspect traffic on-prem &amp;lt;--&amp;gt; cloud. But to achieve this you will need to add your on-prem IP range as separate route in the UDR (user defined route table) for each vnet/subnet. which means:&lt;/P&gt;
&lt;P&gt;- Outbound traffic: default route pointing to internal LB and traffic flow is VM -&amp;gt; internal LB -&amp;gt; FW -&amp;gt;&amp;nbsp; Internet&lt;/P&gt;
&lt;P&gt;- On-prem traffic: on-prem range route pointing to VPN GW. traffic flow would be VM -&amp;gt; VPN GW -&amp;gt; on-prem FW -&amp;gt; on-prem network&lt;BR /&gt;respecting opposite direction on-prem FW-&amp;gt; VPN GW -&amp;gt; VM&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case we decided to route the on-prem traffic over VM-series firewall (on-prem FW -&amp;gt; VPN GW -&amp;gt; internal LB -&amp;gt; FW -&amp;gt; VM), because we wanted to control/restrict traffic with VM firewall. Mainly our idea was to use the Azure plug-in for Panorama. The plugin will monitor Azure tag and create ip-to-tag mapping, which will be used with dynamic groups and allow VMs automatically after deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 16:00:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532476#M1820</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-02-28T16:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532478#M1821</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why I saided Lan(OnPrem) --&amp;gt; FW (OnPrem) --&amp;gt;Azure VPN Gateway --&amp;gt; AzureLB--&amp;gt;FW VM-Series--&amp;gt;VM, it's to control all traffic to/from our servers in Azure via the VM Series Palo Alto.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 16:14:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532478#M1821</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-02-28T16:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532481#M1822</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;That is exactly our current setup.&lt;/P&gt;
&lt;P&gt;The only problem with this setup it is hard to manage - you will need to allow same traffic on both firewalls. &lt;/P&gt;
&lt;P&gt;That is why you can create "trust all" rule on one of the firewalls. For example on on-prem FW create "any on-prem to/from any azure, any port/app, allow". Then on the VM-series FW you can create specific rules and control the traffic only with one policy.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 16:25:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532481#M1822</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-02-28T16:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532688#M1825</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to have your opinion. My architecture is similar than the below architecture provided by Palo Alto (without VPN gateway at the moment). But in the following configuration, if I understand, all traffic from On-Premisses network to App01 or App02 servers&amp;nbsp; is not controled&amp;nbsp; by the VM-Series (the default route from VPN Gateway is the private LB 10.110.0.21).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I wan't to control all traffic from On-Premisses to our servers zones (10.112.0.0/16 or 10.113.0.0/16 VNet), I need to add 1 network interface on each VM-Series and add one LoadBalancer between or firewalls and the VPN Gateway ? So at the end, we will have 2 LB : 1xLB dedicated to the traffic between the Gateway and firewalls and 1xLB for the traffic between servers networks (10.112.0.0/16 or 10.113.0.0/16) and VM-Series firewall (10.110.0.4 &amp;amp; 10.110.0.5) ? Is-it correct ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jeromecarrier_0-1677685284333.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48278iA42A773BBFD7E611/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jeromecarrier_0-1677685284333.png" alt="jeromecarrier_0-1677685284333.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 15:50:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532688#M1825</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-03-01T15:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532773#M1826</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Quite the opposite actually.&lt;/P&gt;
&lt;P&gt;1. Traffic from on-prem will travel over the tunnel and reach VPN Gateway (VNG)&lt;/P&gt;
&lt;P&gt;2. VNG needs to be associated with User Defined Routing table (UDR), which should have route for App1 and App2 Vnet ranges pointing to internal LB&lt;/P&gt;
&lt;P&gt;3. Internal LB will select available FW and forward the traffic over the INSIDE interface&lt;/P&gt;
&lt;P&gt;4. FW will receive this traffic, inspect it and should have route for AppX Vnets and on-prem pointing to INSIDE subnet gateway (which means traffic will route the traffic back from the same interface, therefor traffic will be intrazone)&lt;/P&gt;
&lt;P&gt;5. Azure will forward the traffic to the peered AppX Vnet and the corresponding VM instance&lt;/P&gt;
&lt;P&gt;6. When VM send a reply back it will take the default route in the UDR pointing again to internal LB&lt;/P&gt;
&lt;P&gt;7. With the help of the Standard LB with "HA ports" enabled, LB will know that this packet belongs to existing session and route the traffic to the same firewall which processed the request packet.&lt;/P&gt;
&lt;P&gt;8. FW will receive the packet match it with existing session, inspect it and route it INSIDE subnet gateway&lt;/P&gt;
&lt;P&gt;9. Azure will forward the traffic to the VNG (checking the destination and route in the UDR for FW INSIDE subnet) and from there it is back into your on-prem&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The picture you send above it one of the suggested approached by Palo Alto - to have separate firewall for East-West and Outbound/Inbound traffic. As you can imaging this could get quite expensive. The second option is the so called "common firewall"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Astardzhiev_0-1677711104448.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48298iCE130AD1E3415B81/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Astardzhiev_0-1677711104448.png" alt="Astardzhiev_0-1677711104448.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Basically the same I explained above, but here they haven't put the detailed information for the UDRs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 22:54:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532773#M1826</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-03-01T22:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532907#M1827</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The picture sent is based on the "common firewall" architectecture and it's our configuration (we are not on configuration with East-West and North-South architecture).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to be sure : in this configuration based on on "common firewall" with the private LB (10.110.0.21), is-the traffic flow in red in the following picture is correct for traffic coming from On-premisses to App servers ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jeromecarrier_0-1677748193560.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48359i4CCF370118EBB12C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jeromecarrier_0-1677748193560.png" alt="jeromecarrier_0-1677748193560.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 09:10:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/532907#M1827</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-03-02T09:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533109#M1829</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;The green path should be the correct, not the red one.&lt;/P&gt;
&lt;P&gt;When traffic is forwarded to the internal LB (10.10.0.21), it will do what it is designed to do - select VM FW from the pool and forward the traffic to it.&lt;/P&gt;
&lt;P&gt;On the FW (in the PanOS virtual-router) you need route for AppX VNet pointing to the subnet gateway for the private subnet - 10.110.0.1 from where it will follow the routing from the VNet peering and reach the desired Vnet&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 07:43:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533109#M1829</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-03-03T07:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533112#M1830</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to have your opinion. In the digram provided in my last post, if I need to create a DMZ for applications reachable from Internet, what is your recommandation regarding the network design ? To add a dedicated network card on my VM-Series (I can create 8 nic) dedicated for the DMZ and create the same approch than the private zone : a DMZ zone on the transit vnet with an LB (to be able to route the traffic an our 2 Vm-Series) ? Or juste create a new vnet and route the traffic to the current LB&amp;nbsp; (&lt;SPAN&gt;10.110.0.21) but it's more difficule in this case to isolate the traffic between DMZ and the other vnet (App01, App02..) ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 08:45:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533112#M1830</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-03-03T08:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533208#M1832</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241953"&gt;@jeromecarrier&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;For Inbound traffic I would strongly advise to use Azure Gateway LoadBalancer (GWLB).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/vm-series/11-0/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-firewall-with-the-azure-gwlb" target="_blank"&gt;https://docs.paloaltonetworks.com/vm-series/11-0/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-firewall-with-the-azure-gwlb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I could suggest you our current setup:&lt;/P&gt;
&lt;P&gt;- In addition to your current FW interface (inside and outside) you add only one interface&lt;/P&gt;
&lt;P&gt;- The new interface is connected to Azure GWLB (Azure LB health probes are always sourced from the same IP address (168.63.129.16/32). So you will need to configure two separate virtual-routers - your existing one with route for 168.63.129.16 to inside subnet gw and second vr again with route for 168.63.129.16/32 pointing to gwlb subnet gateway)&lt;/P&gt;
&lt;P&gt;- The DMZ application to be put in dedicated Vnet. If you need east-west traffic to that Vnet (on-prem or between vnets), you need to peer it with the security hub vnet (where the fw is)&lt;/P&gt;
&lt;P&gt;- Deploy public LB in front of the VM instances and associate that LB with GWLB&lt;/P&gt;
&lt;P&gt;- In this case you need to configure the LB to be used for outbound traffic for the VMs as well, because you cannot use default route in UDR and GWLB&lt;/P&gt;
&lt;P&gt;If you don't want to use public LB for the inbound traffic you can use single public IP assigned to the VM server and again associate it with GWLB.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In both case (public IP or public LB) when associated with GWLB traffic flow would be:&lt;/P&gt;
&lt;P&gt;public client --&amp;gt; public LB -&amp;gt; GWLB --&amp;gt; PAN FW --&amp;gt; public LB --&amp;gt; VM server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 21:32:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533208#M1832</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-03-03T21:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: VM Series in Azure - Active/Passive or Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533296#M1833</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not sure to understand your last comment. Currently, we have the following design. With this design, the DMZ zone is behind the private zone and it's curious for me to have a DMZ in a "private" zone.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jeromecarrier_0-1678092239032.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48472iFD4CB777AE68BEB2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jeromecarrier_0-1678092239032.png" alt="jeromecarrier_0-1678092239032.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My objective is to move the DMZ to avoid to route the traffic to the private zone to reach server in DMZ but all traffic from Internet or private zone or On-Prem to DMZ must be controlled by our VM-Series. I'm not sure if the bellow evolution is what did you said in your last past. On both VM-Series (who manager east-west and north-south traffic in the common firewall architecture), I add a new interface connected on the DMZ zone inside my vnet DSI_HUB. I create peer between vnet DMZ_Infra / DMZ_Project and the new DMZ zone and I add an LB on the zone (same approach than private zone). The UDR from On-premisses is changed for DMZ network to route the traffic to DMZ_LB.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is you opinion ? Is-it correct ? Is-it not the better ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jeromecarrier_1-1678092485536.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48474i71480D75C7D5631E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jeromecarrier_1-1678092485536.png" alt="jeromecarrier_1-1678092485536.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2023 08:51:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-in-azure-active-passive-or-active-active/m-p/533296#M1833</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2023-03-06T08:51:29Z</dc:date>
    </item>
  </channel>
</rss>

