<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto VM 300 behind AWS ELB with public HTTPS traffic forwarded to it in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191980#M198</link>
    <description>&lt;P&gt;Nithin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To start we need to a bit more about your configuration and topology. You mention 20 load balancers and also some classic load balancers also. just from that statement I am assuming the 20 AWS load balancers are all ALB is this correct? Are all these load balancers in the same AZ? Can you provide a detail of your architecture so we can understand what you are lookingn to accomplish?&lt;/P&gt;&lt;P&gt;Also when you say you are not receiving the expecfted behavior, please elaborate on what type of behavior you are receiving?&lt;/P&gt;&lt;P&gt;What is the difference in the traffic source per load balancer?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also the ethernet swap must happen whether using Application LB's or Classic LB's because Dataplane traffic has to be received on Eth0.&lt;/P&gt;&lt;P&gt;See link below for Details.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/auto-scale-vm-series-firewalls-with-the-amazon-elb/what-components-does-the-vm-series-auto-scaling-template-for-aws-deploy" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/auto-scale-vm-series-firewalls-with-the-amazon-elb/what-components-does-the-vm-series-auto-scaling-template-for-aws-deploy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Management Interface Mapping for Use with Amazon ELB&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/about-the-vm-series-firewall-on-aws/management-interface-mapping-for-use-with-amazon-elb#id7e1c2653-88af-4a85-8bb8-aae1847c0d9f" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/about-the-vm-series-firewall-on-aws/management-interface-mapping-for-use-with-amazon-elb#id7e1c2653-88af-4a85-8bb8-aae1847c0d9f&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just off the top of my head you have to be sure to select the appropriate subnet for the firewall eth0 BUT the eth0 interface has to be swapped.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also how are you swapping the ENI's?&lt;/P&gt;&lt;P&gt;Please answer these questions and provide a diagram of what you are looking to accomplish as well. Once I receive that I can take a look at it and we can go from there. Thanks Nithin.&lt;/P&gt;</description>
    <pubDate>Sun, 17 Dec 2017 23:01:08 GMT</pubDate>
    <dc:creator>jperry1</dc:creator>
    <dc:date>2017-12-17T23:01:08Z</dc:date>
    <item>
      <title>Palo Alto VM 300 behind AWS ELB with public HTTPS traffic forwarded to it</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191944#M196</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;my existing environment have a nearly 20 AWS load balancers which are public facing, now I want to implement Palo Alto VM 300 behind this ELBs, and monitor and trasalate the traffic to the backend instances.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tested this requirement with one load balacners, however when I'm adding my second load balancer, the port trasalation is not working as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Secondly I also have some classic load balacners which are required to send the traffic to the VM 300, as per the Palo Alto knowledge base, we have to do only the interface swapping in the AWS environment for the CLassic ELB, however its not working,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Nithin&lt;/P&gt;</description>
      <pubDate>Sat, 16 Dec 2017 14:31:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191944#M196</guid>
      <dc:creator>NithinN</dc:creator>
      <dc:date>2017-12-16T14:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto VM 300 behind AWS ELB with public HTTPS traffic forwarded to it</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191945#M197</link>
      <description>&lt;P&gt;In order to bring multiple applications through the firewalls, you need to differentiate them in someway.&amp;nbsp; You can either consider adding secondary IPs to the Untrust ENI and have the Load Balancers target the individual IPs if using ALB or NLB or use PAT&amp;nbsp;to use a port per app on the Untrust interface which will be necessary Instance targeting LBs.&amp;nbsp; You then configure the NAT rules per app to destination translate the Untrust port to the application server port with the source translated to the Trust Interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ie.&lt;/P&gt;&lt;P&gt;LB1:443 -&amp;gt; Untrust:1443 -&amp;gt; App1:443&lt;/P&gt;&lt;P&gt;LB2:443 -&amp;gt; Untrust:2443 -&amp;gt; App2:443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a look Autoscale v2.0 model currently in Beta utilizing the method.&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/PaloAltoNetworks/aws-elb-autoscaling/tree/master/Version-2.0" target="_blank"&gt;https://github.com/PaloAltoNetworks/aws-elb-autoscaling/tree/master/Version-2.0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To Answer your interface swap question, whenever you use an Instance as a target on any of the load balancers, you need to perform Interface Swap on the Firewalls.&amp;nbsp; Instance targeting only&amp;nbsp;supports&amp;nbsp;ETH0.&amp;nbsp; If you use IP address targeting, then you can select the correct IP if Inteface Swap is not implemented.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Dec 2017 16:16:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191945#M197</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2017-12-16T16:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto VM 300 behind AWS ELB with public HTTPS traffic forwarded to it</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191980#M198</link>
      <description>&lt;P&gt;Nithin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To start we need to a bit more about your configuration and topology. You mention 20 load balancers and also some classic load balancers also. just from that statement I am assuming the 20 AWS load balancers are all ALB is this correct? Are all these load balancers in the same AZ? Can you provide a detail of your architecture so we can understand what you are lookingn to accomplish?&lt;/P&gt;&lt;P&gt;Also when you say you are not receiving the expecfted behavior, please elaborate on what type of behavior you are receiving?&lt;/P&gt;&lt;P&gt;What is the difference in the traffic source per load balancer?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also the ethernet swap must happen whether using Application LB's or Classic LB's because Dataplane traffic has to be received on Eth0.&lt;/P&gt;&lt;P&gt;See link below for Details.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/auto-scale-vm-series-firewalls-with-the-amazon-elb/what-components-does-the-vm-series-auto-scaling-template-for-aws-deploy" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/auto-scale-vm-series-firewalls-with-the-amazon-elb/what-components-does-the-vm-series-auto-scaling-template-for-aws-deploy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Management Interface Mapping for Use with Amazon ELB&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/about-the-vm-series-firewall-on-aws/management-interface-mapping-for-use-with-amazon-elb#id7e1c2653-88af-4a85-8bb8-aae1847c0d9f" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/virtualization/virtualization/set-up-the-vm-series-firewall-on-aws/about-the-vm-series-firewall-on-aws/management-interface-mapping-for-use-with-amazon-elb#id7e1c2653-88af-4a85-8bb8-aae1847c0d9f&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just off the top of my head you have to be sure to select the appropriate subnet for the firewall eth0 BUT the eth0 interface has to be swapped.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also how are you swapping the ENI's?&lt;/P&gt;&lt;P&gt;Please answer these questions and provide a diagram of what you are looking to accomplish as well. Once I receive that I can take a look at it and we can go from there. Thanks Nithin.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 23:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-300-behind-aws-elb-with-public-https-traffic/m-p/191980#M198</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2017-12-17T23:01:08Z</dc:date>
    </item>
  </channel>
</rss>

