<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VM series firewall on AWS | subnet planning in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/569516#M2063</link>
    <description>&lt;P&gt;I'm planning to deploy VM series on AWS cloud, however I need clarification on VM subnet selection.&lt;/P&gt;
&lt;P&gt;As per documentation, we have to attach 3 NIC in the VM , one each for Mgmt,WAN &amp;amp; LAN. My question is whether all NIC have to same AZ, e.g us-west-2a ?&lt;/P&gt;
&lt;P&gt;I've designed 10.100.0.0/16 for VPC and 10.100.0.0/24,10.100.2.0/24,10.100.4.0/24 for 1a-,1b,1c AZ as public subnet an&lt;/P&gt;
&lt;P&gt;10.100.`.0/24,10.100.3.0/24,10.100.5.0/24&amp;nbsp;for 1a-,1b,1c AZ as private subnet. So , if we need to attach 3 NIC , then I've to create additional az for 1a.&lt;/P&gt;
&lt;P&gt;I've doing a POC with similar setup, however internet/google is not reachable from private instance.&lt;/P&gt;
&lt;P&gt;Any help/document link will be helpfull for subnet and routing design and plan for AWS cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TIA,&lt;/P&gt;
&lt;P&gt;Sourav&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Dec 2023 18:02:13 GMT</pubDate>
    <dc:creator>skchakraborty</dc:creator>
    <dc:date>2023-12-12T18:02:13Z</dc:date>
    <item>
      <title>VM series firewall on AWS | subnet planning</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/569516#M2063</link>
      <description>&lt;P&gt;I'm planning to deploy VM series on AWS cloud, however I need clarification on VM subnet selection.&lt;/P&gt;
&lt;P&gt;As per documentation, we have to attach 3 NIC in the VM , one each for Mgmt,WAN &amp;amp; LAN. My question is whether all NIC have to same AZ, e.g us-west-2a ?&lt;/P&gt;
&lt;P&gt;I've designed 10.100.0.0/16 for VPC and 10.100.0.0/24,10.100.2.0/24,10.100.4.0/24 for 1a-,1b,1c AZ as public subnet an&lt;/P&gt;
&lt;P&gt;10.100.`.0/24,10.100.3.0/24,10.100.5.0/24&amp;nbsp;for 1a-,1b,1c AZ as private subnet. So , if we need to attach 3 NIC , then I've to create additional az for 1a.&lt;/P&gt;
&lt;P&gt;I've doing a POC with similar setup, however internet/google is not reachable from private instance.&lt;/P&gt;
&lt;P&gt;Any help/document link will be helpfull for subnet and routing design and plan for AWS cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TIA,&lt;/P&gt;
&lt;P&gt;Sourav&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 18:02:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/569516#M2063</guid>
      <dc:creator>skchakraborty</dc:creator>
      <dc:date>2023-12-12T18:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: VM series firewall on AWS | subnet planning</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/569543#M2064</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Check the logs to see where/why the traffic is getting blocked. I suspect one of the following: routing issue, policy, or NAT issue.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 20:31:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/569543#M2064</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-12-12T20:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: VM series firewall on AWS | subnet planning</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/571576#M2075</link>
      <description>&lt;P&gt;I recently wrote a blog post on the same subject -&amp;nbsp;&lt;A href="https://www.packetswitch.co.uk/aws-gwlb-palo-alto-example/" target="_blank"&gt;https://www.packetswitch.co.uk/aws-gwlb-palo-alto-example/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Feel free to check it out and give me a shout if you need anything.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To answer your question, if you launch the firewall in AZ1 for example, all the interfaces need to be in the same AZ. For AZ redundancy, you will need to launch another firewall in another AZ.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 11:32:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/vm-series-firewall-on-aws-subnet-planning/m-p/571576#M2075</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2024-01-03T11:32:25Z</dc:date>
    </item>
  </channel>
</rss>

