<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GCP VPC Peering in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/gcp-vpc-peering/m-p/572750#M2082</link>
    <description>&lt;P&gt;When the web instance goes to the internet, do you see the request within the VM-Series traffic logs?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do not see the traffic logs:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The trust VPC's firewall rules are not allowing the internet request.&amp;nbsp; Verify the trust VPC has an ingress VPC rule to allow the internet traffic.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The VM-Series VR does not have the correct default route. Check the following:
&lt;OL&gt;
&lt;LI&gt;On the VM-Series, if the interfaces are configured for DHCP:
&lt;OL&gt;
&lt;LI&gt;Verify the trust interface has "&lt;A href="https://raw.githubusercontent.com/PaloAltoNetworks/google-cloud-hub-spoke-tutorial/main/docs/images/image18.png" target="_self"&gt;Automatically create default route&lt;/A&gt;" unchecked.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Verify the untrust interface has "&lt;A href="https://raw.githubusercontent.com/PaloAltoNetworks/google-cloud-hub-spoke-tutorial/main/docs/images/image16.png" target="_self"&gt;Automatically create default route&lt;/A&gt;" checked on.
&lt;UL&gt;
&lt;LI&gt;(You can also leave "Automatically create default route" checked off on both interfaces and create a static default route in the VR that uses the untrust interface as the next hop.)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do see the traffic logs:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;On the VM-Series, verify there is an &lt;A href="https://raw.githubusercontent.com/PaloAltoNetworks/google-cloud-hub-spoke-tutorial/main/docs/images/outbound_nat.png" target="_self"&gt;source NAT policy&lt;/A&gt;&amp;nbsp;to translate the internet request to the untrust interface.&lt;/LI&gt;
&lt;LI&gt;In GCP, verify the untrust NIC has an external IP attached the untrust NIC or has a Cloud NAT is deployed in the untrust network.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jan 2024 16:16:50 GMT</pubDate>
    <dc:creator>mmclimans</dc:creator>
    <dc:date>2024-01-11T16:16:50Z</dc:date>
    <item>
      <title>GCP VPC Peering</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/gcp-vpc-peering/m-p/526882#M1782</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are deploying PA VM in GCP (Common Firewall Deployment Architecture). Deployment Architecture is attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Trust VPC we have configured Internal Load Balance (TCP), Created VPC Peering between Trust VPC &amp;amp; Web VPC.&lt;/P&gt;
&lt;P&gt;From Trust VPC Instance (VM) we are able to ping Web VPC Instance (VM) &amp;amp; Vice Versa.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Web VPC Default route is pointed towards Internal Load Balance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the challenge is Web VPC Instances (VMs) unable to browse the internet.&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;Please note you are posting a public message where community members and experts can provide assistance. Sharing private information such as serial numbers or company information is not recommended.</description>
      <pubDate>Fri, 13 Jan 2023 02:32:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/gcp-vpc-peering/m-p/526882#M1782</guid>
      <dc:creator>Mitesh_Nandu</dc:creator>
      <dc:date>2023-01-13T02:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: GCP VPC Peering</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/gcp-vpc-peering/m-p/572750#M2082</link>
      <description>&lt;P&gt;When the web instance goes to the internet, do you see the request within the VM-Series traffic logs?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do not see the traffic logs:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The trust VPC's firewall rules are not allowing the internet request.&amp;nbsp; Verify the trust VPC has an ingress VPC rule to allow the internet traffic.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The VM-Series VR does not have the correct default route. Check the following:
&lt;OL&gt;
&lt;LI&gt;On the VM-Series, if the interfaces are configured for DHCP:
&lt;OL&gt;
&lt;LI&gt;Verify the trust interface has "&lt;A href="https://raw.githubusercontent.com/PaloAltoNetworks/google-cloud-hub-spoke-tutorial/main/docs/images/image18.png" target="_self"&gt;Automatically create default route&lt;/A&gt;" unchecked.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Verify the untrust interface has "&lt;A href="https://raw.githubusercontent.com/PaloAltoNetworks/google-cloud-hub-spoke-tutorial/main/docs/images/image16.png" target="_self"&gt;Automatically create default route&lt;/A&gt;" checked on.
&lt;UL&gt;
&lt;LI&gt;(You can also leave "Automatically create default route" checked off on both interfaces and create a static default route in the VR that uses the untrust interface as the next hop.)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do see the traffic logs:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;On the VM-Series, verify there is an &lt;A href="https://raw.githubusercontent.com/PaloAltoNetworks/google-cloud-hub-spoke-tutorial/main/docs/images/outbound_nat.png" target="_self"&gt;source NAT policy&lt;/A&gt;&amp;nbsp;to translate the internet request to the untrust interface.&lt;/LI&gt;
&lt;LI&gt;In GCP, verify the untrust NIC has an external IP attached the untrust NIC or has a Cloud NAT is deployed in the untrust network.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 16:16:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/gcp-vpc-peering/m-p/572750#M2082</guid>
      <dc:creator>mmclimans</dc:creator>
      <dc:date>2024-01-11T16:16:50Z</dc:date>
    </item>
  </channel>
</rss>

