<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN with Active/Active FW Behind LB in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/s2s-vpn-with-active-active-fw-behind-lb/m-p/557958#M1982</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/216194"&gt;@catg80&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;In my humble opinion what you asking is not possible.&lt;/P&gt;
&lt;P&gt;- Azure Load Balancer workin on layer4 and support only TCP and UDP transport protocols&lt;/P&gt;
&lt;P&gt;- IPsec site-to-site VPN usually requries ESP transport protocol, which is not supported by Azure LB&lt;/P&gt;
&lt;P&gt;- As described in the following link you can use Azure LB for outbound connections, but outbound traffic is not actuall passive through the LB. Traffic is just simply tranlated (NAT) to the public IP assigned to the LB. &lt;A href="https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I personally don't like running Site-to-Site tunnels on firewall in Azure or AWS.&lt;/P&gt;
&lt;P&gt;I would preffer to use the cloud native components and establish the tunnel to Azure VPN gateway and if required use routing tables to forward the traffic from/to the tunnel to PAN FW for inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You metioned "between our tenancy and another orgs tenancy" - does this means you want to exchange traffic between your Azure&amp;nbsp; enviroment and another Azure environment? If that is correct, I would recommend to use Azure Private Link and Private Endpoints - &lt;A href="https://learn.microsoft.com/en-us/azure/architecture/guide/multitenant/service/private-link" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/architecture/guide/multitenant/service/private-link&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;Yuo could still route such traffic over your firewall for inspection, but instead of adding the complexity of maintaining IPsec tunnel, just use the cloud native components to send it to the other organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2023 14:29:33 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-09-14T14:29:33Z</dc:date>
    <item>
      <title>S2S VPN with Active/Active FW Behind LB</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/s2s-vpn-with-active-active-fw-behind-lb/m-p/557659#M1981</link>
      <description>&lt;P&gt;Hey all,&lt;/P&gt;
&lt;P&gt;we have 2 active palos in azure that are behind a public load balancer.&lt;/P&gt;
&lt;P&gt;have to create a S2S VPN between our tenancy and another orgs tenancy.&lt;/P&gt;
&lt;P&gt;has anyone done this before?&lt;/P&gt;
&lt;P&gt;not sure how can get this to work as traffic going through the load balancer seems to cause issues as its a long running connection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;anyone know of any design guides that would discuss scenarios on this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 05:59:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/s2s-vpn-with-active-active-fw-behind-lb/m-p/557659#M1981</guid>
      <dc:creator>catg80</dc:creator>
      <dc:date>2023-09-13T05:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN with Active/Active FW Behind LB</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/s2s-vpn-with-active-active-fw-behind-lb/m-p/557958#M1982</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/216194"&gt;@catg80&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;In my humble opinion what you asking is not possible.&lt;/P&gt;
&lt;P&gt;- Azure Load Balancer workin on layer4 and support only TCP and UDP transport protocols&lt;/P&gt;
&lt;P&gt;- IPsec site-to-site VPN usually requries ESP transport protocol, which is not supported by Azure LB&lt;/P&gt;
&lt;P&gt;- As described in the following link you can use Azure LB for outbound connections, but outbound traffic is not actuall passive through the LB. Traffic is just simply tranlated (NAT) to the public IP assigned to the LB. &lt;A href="https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I personally don't like running Site-to-Site tunnels on firewall in Azure or AWS.&lt;/P&gt;
&lt;P&gt;I would preffer to use the cloud native components and establish the tunnel to Azure VPN gateway and if required use routing tables to forward the traffic from/to the tunnel to PAN FW for inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You metioned "between our tenancy and another orgs tenancy" - does this means you want to exchange traffic between your Azure&amp;nbsp; enviroment and another Azure environment? If that is correct, I would recommend to use Azure Private Link and Private Endpoints - &lt;A href="https://learn.microsoft.com/en-us/azure/architecture/guide/multitenant/service/private-link" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/architecture/guide/multitenant/service/private-link&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;Yuo could still route such traffic over your firewall for inspection, but instead of adding the complexity of maintaining IPsec tunnel, just use the cloud native components to send it to the other organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 14:29:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/s2s-vpn-with-active-active-fw-behind-lb/m-p/557958#M1982</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-09-14T14:29:33Z</dc:date>
    </item>
  </channel>
</rss>

