<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/616326#M2295</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/154245"&gt;@patoil&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;VR are not needed. You can just use a single VR to be able to share the public interface. Otherwise you'll need an additional interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using a 2 CPU firewall license on a 4 CPU VM might serve as a workaround to enable the use of additional interfaces and address the architectural challenges with GWLB.&lt;/P&gt;&lt;P&gt;It's frustrating when AWS platform constraints result in increased operational costs.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Enhanced Security:&lt;/STRONG&gt; The VM Series can inspect all inbound and outbound traffic, providing robust security measures.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Improved Performance:&lt;/STRONG&gt; By distributing traffic across multiple instances, GWLB can improve application performance and scalability.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Simplified Network Configuration:&lt;/STRONG&gt; Overlay routing simplifies network configuration and reduces the need for complex routing protocols.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Flexible Deployment Options:&lt;/STRONG&gt; You can deploy the VM Series in various configurations, such as high availability or failover, to meet your specific needs.&amp;nbsp;&lt;A href="https://chitcam.com/" target="_self"&gt;gomeet&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2024 11:01:59 GMT</pubDate>
    <dc:creator>threid</dc:creator>
    <dc:date>2024-11-07T11:01:59Z</dc:date>
    <item>
      <title>AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586130#M2156</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I’m using 2 active VM series firewalls for outbound sessions with overlay routing, with &lt;STRONG&gt;GWLB&lt;/STRONG&gt; and &lt;STRONG&gt;Transit Gateway&lt;/STRONG&gt;&amp;nbsp;(TGW) between the Application VPC and the Security (firewall) VPC. This is working as expected.&amp;nbsp;&lt;BR /&gt;Inbound connections fail to establish. &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;The need for &lt;STRONG&gt;overlay routing&lt;/STRONG&gt; is for managing NAT and VPNs on the firewall.&lt;/P&gt;
&lt;P&gt;An external (3rd party SAAS) load balancer is used for inbound sessions.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Just one &lt;STRONG&gt;GWLBe&lt;/STRONG&gt; is being used inside the Security VPC, for &lt;STRONG&gt;GENEVE&lt;/STRONG&gt; encapsulation into the firewall.&amp;nbsp;&lt;BR /&gt;I can verify the inbound session attempt mapped to the trusted application subinterface. This is the first (Syn) packet.&amp;nbsp;&lt;BR /&gt;I also have pcaps in the application server showing syn-ack (reply) towards the firewall’s trusted IP (the fw is using snat for inbound sessions).&amp;nbsp;&lt;BR /&gt;The firewall receives the syn-ack and drops it with “no matching session” reason.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Did anyone have luck with this setup?&lt;/P&gt;
&lt;P&gt;Does Overlay routing support &lt;STRONG&gt;inbound&lt;/STRONG&gt; and outbound sessions?&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 15:54:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586130#M2156</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-08T15:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586145#M2157</link>
      <description>&lt;P&gt;Afaik Overlay Routing is not needed for inbound inspection.&lt;/P&gt;
&lt;P&gt;You just have to place another GWLBe after the inbound LB (without overlay routung needed).&lt;/P&gt;
&lt;P&gt;Overlay Routing is to save the cost for a NAT GW (outbound)&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 06:55:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586145#M2157</guid>
      <dc:creator>fbee-pan</dc:creator>
      <dc:date>2024-05-08T06:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586164#M2158</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp;&lt;BR /&gt;I understand that’s a good benefit and I also need to have a public IP on each firewall for Inbound NAT and VPNs (L2L and GP). This would save a couple of additional firewalls to afford and manage.&lt;BR /&gt;In addition, my security team would like to have inter-zone instead of intra-zone policies, that’s why we are testing this scenario.&amp;nbsp;&lt;BR /&gt;Anyone knows if it’s possible?&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 11:56:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586164#M2158</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-08T11:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586177#M2159</link>
      <description>&lt;P&gt;If I understand what you are attempting to accomplish, it should be doable although I have not tested it. From what you describe, the desired traffic flow would be:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;client -&amp;gt; IGW -&amp;gt; GWLBe -&amp;gt; GWLB -&amp;gt; FW (SNAT) -&amp;gt; server -&amp;gt; (SNAT) FW -&amp;gt; GWLB -&amp;gt; GWLBe -&amp;gt; IGW -&amp;gt; client&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since you also have outbound as well, routing could be interesting as the response traffic needs to go back to the FW interface and not the GWLBe (the default for outbound traffic).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Another option would be to configure a couple of additional subnets and use dedicated FW interfaces (non-GWLB) and just handle the inbound traffic completely separately (including separate VRs) from the outbound traffic. I have tested this and it does work but takes a bit of effort to set up.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;It might also be worth contacting your sales team and having them engage a SME to help you understand your options and the best path forward.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 13:49:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586177#M2159</guid>
      <dc:creator>glynn</dc:creator>
      <dc:date>2024-05-08T13:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586204#M2160</link>
      <description>&lt;P&gt;Yes Glynn. That's what I'm trying to do! Your second option: dedicated FW interface (E1/2) non GWLB.&lt;/P&gt;
&lt;P&gt;I'm attaching a detailed diagram.&lt;/P&gt;
&lt;P&gt;I'm very familiar with multiple VRs, but I don't see the need to do so. I have a single VR with default + private routes and routing looks good. In fact, I have 2-way traffic for outbound connections so I think I don't need to change single to double VRs.&lt;/P&gt;
&lt;P&gt;I think the issue might be related to Inbound connections routing out of the Geneve Subinterface and returning from the server without encapsulation (only for Inbound sessions).&lt;/P&gt;
&lt;P&gt;For outbound I route 0.0.0.0/0 towards a GWLBe to get packets encapsulated and delivered to the firewall.&lt;/P&gt;
&lt;P&gt;For inbound, I verify the firewall's private interface encapsulates using the right subinterface (that's what I need) and I think the response towards the firewall's private (snat) IP might arrive without encapsulation, so I have "no matching session" drops in the global counters.&lt;/P&gt;
&lt;P&gt;I tried adding a route to the firewalls private subnet towards the GWLBe but it didn't make any change. That's why I'm not sure if this is a valid scenario, but I'm so close to have the desired architecture running..&lt;/P&gt;
&lt;P&gt;I really appreciate all interactions. All my assumptions might be wrong!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 15:51:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586204#M2160</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-08T15:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586211#M2161</link>
      <description>&lt;P&gt;Ak, ok. If that is the inbound path, then it will not work. The traffic has to hit the GWLB &lt;STRONG&gt;before&lt;/STRONG&gt; going to the FW for the sessions to be set up and tracked correctly. What you need to do is take the inbound traffic coming off of the IGW and route it to the GWLBe and then through the FW out e1/2 to the server. I would guess you are seeing asymmetric traffic due to one side being GENEVE encapsulated whilst the other is not. Hence the FW is not happy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for the multi-interface scenario I mentioned previously, I recall that the routing was easier with separate VRs as I could ensure better separation of the traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 17:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586211#M2161</guid>
      <dc:creator>glynn</dc:creator>
      <dc:date>2024-05-08T17:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586213#M2162</link>
      <description>&lt;P&gt;If I do that I’d have to invert the firewall’s routes or at least move the private route to the untrusted interface, E1/2.&lt;/P&gt;
&lt;P&gt;Currently, the route to private networks is via E1/1.&lt;/P&gt;
&lt;P&gt;I think I’ll also have problems to set up vpns (GP and L2L) in E1/2, don’t you think?&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 17:49:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586213#M2162</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-08T17:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586214#M2163</link>
      <description>&lt;P&gt;Yes, the tunnels terminating on the FW will have the same problems that the inbound traffic from the internet does.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Since you are using the TGW, I would suggest terminating the VPNs on that and just treat it as a spoke (or spokes).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If interzone policies are a hard requirement, setting up an additional pair of FW interfaces outside of the GWLB is probably going to be easier all the way around.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 18:20:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586214#M2163</guid>
      <dc:creator>glynn</dc:creator>
      <dc:date>2024-05-08T18:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586219#M2164</link>
      <description>&lt;P&gt;Thanks again Glynn, but terminating the VPNs through the TGW would be a non Overlay routing scenario.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I'm trying to achieve is interzone policies and inbound VPN &amp;amp; NAT using the public interface.&lt;/P&gt;
&lt;P&gt;Do you think this is possible?&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 19:42:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586219#M2164</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-08T19:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586234#M2165</link>
      <description>&lt;P&gt;What you are looking to achieve is possible; however, I do not think you can do it with the GWLB due to the interzone requirement unless you do some unusual things. I think using separate interfaces separate from the existing GWLB+FW construct for the inbound traffic and VPN termination would be your best bet; however, it would be worth having your PANW sales team engage a SME to review the goals and see what other options might be available.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 23:07:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586234#M2165</guid>
      <dc:creator>glynn</dc:creator>
      <dc:date>2024-05-08T23:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586237#M2166</link>
      <description>&lt;P&gt;I think we (you) are making good progress!&lt;/P&gt;
&lt;P&gt;What do you think about simulating the two firewall model for inbound and outbound by using 2 VRs?&lt;/P&gt;
&lt;P&gt;VR1 for Outbound is already working.&lt;/P&gt;
&lt;P&gt;New VR2 with 2 new non GWLB interfaces for inbound (GP + public services access). Snat to return through the same firewall.&lt;BR /&gt;I’d rather use 2 vsys if possible, but I think VRs might do the trick.&lt;/P&gt;
&lt;P&gt;Now I’m thinking this is what you meant in when you first brought the VRs to the conversation, is it?&lt;/P&gt;
&lt;P&gt;I’d have to give it a try. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 01:18:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586237#M2166</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-09T01:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586240#M2167</link>
      <description>&lt;P&gt;Précisément. Not long after the GWLB went GA, I encountered a customer that was attempting to maximize their investment in VM-Series by using it for inbound connectivity in addition to the GWLB. I set it up using 2 VRs (one for GWLB, one for inbound). On the inbound side, we used a load balancer but it is not a requirement. The use of SNAT should ensure symmetric return. 2 VRs made life easier (routing, troubleshooting, etc.). It took a bit to set up and the diagram looked a little funny but it worked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as I am aware, the VM-Series does not presently support multiple VSYS.&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 02:18:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586240#M2167</guid>
      <dc:creator>glynn</dc:creator>
      <dc:date>2024-05-09T02:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586426#M2171</link>
      <description>&lt;P&gt;Update!&lt;/P&gt;
&lt;P&gt;I found a working setup using a separate interface for inbound connections. The incoming interface (public) can be shared with the outbound sessions. A separate internal interface is required to avoid Geneve encapsulation for inbound sessions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Summary of AWS NICs:&lt;/P&gt;
&lt;P&gt;nic 0: Private for outbound sessions from multiple VPCs (Geneve Endpoints mapped to subinterfaces)&lt;/P&gt;
&lt;P&gt;nic 1: management (interface swap). Remember that Geneve can only be mapped to Nic 0.&lt;/P&gt;
&lt;P&gt;nic 2: public with associated ENI&lt;/P&gt;
&lt;P&gt;nic 3: private for inbound connections. Internal routes go here&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This setup requires a VM supporting 4 NICs. &lt;BR /&gt;Since m5.large (vm100) doesn’t allow 4 NICs, at least m5.xlarge (vm300) is needed, but this image requires a “bigger” credits license from Palo Alto BYOL, and more expensive VM resources running in AWS. Cost is x2 for AWS opex and PAN credits.&lt;/P&gt;
&lt;P&gt;The PAN Deployment guide recommends to use a pair of firewalls for inbound and another pair for outbound. &lt;BR /&gt;It looks like there’s no workaround to use a pair of vm100, or it’s equivalent 2 cpu credits based VM, for inbound and outbound sessions with overlay routing due to AWS GWLB characteristics.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 02:53:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586426#M2171</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-12T02:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586504#M2174</link>
      <description>&lt;P&gt;Awesome. Did you have to use a separate VR?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, you might try changing the instance type and leaving the model at VM-100. IIRC, the instance size is what determines the max number of interfaces, not the VM-Series model&amp;nbsp; so you should be able to have a VM-100 with 8 interfaces. You would not be able to take advantage of the capacity increase but if all you need is interface density, you should be fine.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 14:32:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586504#M2174</guid>
      <dc:creator>glynn</dc:creator>
      <dc:date>2024-05-13T14:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586540#M2175</link>
      <description>&lt;P&gt;VR are not needed. You can just use a single VR to be able to share the public interface. Otherwise you'll need an additional interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using a 2 CPU firewall license on a 4 CPU VM might serve as a workaround to enable the use of additional interfaces and address the architectural challenges with GWLB.&lt;/P&gt;
&lt;P&gt;It's frustrating when AWS platform constraints result in increased operational costs.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 22:45:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/586540#M2175</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-05-13T22:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/590305#M2197</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hey guys, I've been reading this post with interest as I have pretty much the same issue. Slight difference is that traffic I need to NAT comes into the TGW via a site to site vpn before hitting the GWLBe then onto the 2 act/act firewalls. What I can't get my head around at the moment is how this works without removing the load balancing between the 2 firewalls. Any pointers would be much appreciated.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 09:36:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/590305#M2197</guid>
      <dc:creator>AdamHards</dc:creator>
      <dc:date>2024-06-25T09:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/595833#M2219</link>
      <description>&lt;P&gt;I finally did it!&lt;/P&gt;
&lt;P&gt;The trick is to have a full mesh of Private Link Geneve sessions. Just register both gateway load balancer endpoints in each firewall and make sure the GWLB has Cross zone LB enabled.&amp;nbsp;&lt;BR /&gt;I think the documentation from PAN has 1:1 GWLBe-fw mappings within each Availability Zone and that’s why I was receiving unecapsulated packets over the major interface (not subif) due to the lack of the inter zone Geneve sessions.&lt;/P&gt;
&lt;P&gt;Now it works fine and I have full AZ + Firewall fault tolerance. &amp;nbsp;&lt;BR /&gt;• Geneve Session 1: GWLBe1 (AZ1) &amp;lt;–&amp;gt; FW1 (AZ1)&lt;BR /&gt;• Geneve Session 2: GWLBe1 (AZ1) &amp;lt;–&amp;gt; FW2 (AZ2)&lt;BR /&gt;• Geneve Session 3: GWLBe2 (AZ2) &amp;lt;–&amp;gt; FW1 (AZ1)&lt;BR /&gt;• Geneve Session 4: GWLBe2 (AZ2) &amp;lt;–&amp;gt; FW2 (AZ2)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Let me know if this helps anyone!&lt;/P&gt;</description>
      <pubDate>Sat, 24 Aug 2024 23:27:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/595833#M2219</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-08-24T23:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/611196#M2259</link>
      <description>&lt;P&gt;Just curious, what was your configuration for IPsec/ S2S VPN setup ? did you use NIC 4 dedicated for VPN termination ?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 03:32:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/611196#M2259</guid>
      <dc:creator>VSingh26</dc:creator>
      <dc:date>2024-10-22T03:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/612343#M2274</link>
      <description>&lt;P&gt;VPNs terminate on my public interfaces. I only have 2 NICs: management, private, and public. That's why I wanted to use overlay routing. I also use BGP towards the TGW to manage VPN failover.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 15:02:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/612343#M2274</guid>
      <dc:creator>patoil</dc:creator>
      <dc:date>2024-10-22T15:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM Series GWLB with Overlay routing -  outbound and inbound</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/615535#M2292</link>
      <description>&lt;P&gt;for me when enabling NAT for Inbound via GWLBe, my un-trust went not reachable which didn't allow me to setup IPsec on the un-trust interface, did you face this issue / challenge ?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 06:51:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-gwlb-with-overlay-routing-outbound-and-inbound/m-p/615535#M2292</guid>
      <dc:creator>VSingh26</dc:creator>
      <dc:date>2024-10-29T06:51:40Z</dc:date>
    </item>
  </channel>
</rss>

