<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-to-Site IPSEC between AWS and Azure (VM-Series) in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-between-aws-and-azure-vm-series/m-p/564176#M2023</link>
    <description>&lt;P&gt;determined its supported, since after double checking the security groups on AWS found that the allow rules for Azure traffic were missing. Now I am able to come across the link from Azure and connect to/ping resources in AWS. Still unable to ping/connect to any resources in Azure though from AWS..ive checked out route tables and nsg's in azure and all appears to be ok though..thoughts?&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2023 20:27:05 GMT</pubDate>
    <dc:creator>sscarola</dc:creator>
    <dc:date>2023-11-02T20:27:05Z</dc:date>
    <item>
      <title>Site-to-Site IPSEC between AWS and Azure (VM-Series)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-between-aws-and-azure-vm-series/m-p/564103#M2022</link>
      <description>&lt;P&gt;I am trying to setup an IPSEC Site-to-Site VPN between our azure and aws environment, both of which have VM-300 series fw's running. I am able to get the tunnel up and see traffic coming across the link, but when i try and reach a resource on either end via PING/TRACE etc.. there is no response. I see the requests for the traffic in the PA going in/out the correct interfaces, but it seems like once its hits the vnet/subnet in Azure/AWS it just dies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the configuration supported, or would it require setting up the respective cloud native VPN components (which i really dont want to). We would prefer to send everything directly through the PA's.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 15:31:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-between-aws-and-azure-vm-series/m-p/564103#M2022</guid>
      <dc:creator>sscarola</dc:creator>
      <dc:date>2023-11-02T15:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site IPSEC between AWS and Azure (VM-Series)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-between-aws-and-azure-vm-series/m-p/564176#M2023</link>
      <description>&lt;P&gt;determined its supported, since after double checking the security groups on AWS found that the allow rules for Azure traffic were missing. Now I am able to come across the link from Azure and connect to/ping resources in AWS. Still unable to ping/connect to any resources in Azure though from AWS..ive checked out route tables and nsg's in azure and all appears to be ok though..thoughts?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 20:27:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-between-aws-and-azure-vm-series/m-p/564176#M2023</guid>
      <dc:creator>sscarola</dc:creator>
      <dc:date>2023-11-02T20:27:05Z</dc:date>
    </item>
  </channel>
</rss>

