<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSec Tunnel is up but not passing traffic (On-Prem to Azure Palo Alto VM) in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225210#M2345</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_1-1743429050105.png" style="width: 539px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66857i50644BDD9E2BB389/image-dimensions/539x334?v=v2" width="539" height="334" role="button" title="CMoore927039_1-1743429050105.png" alt="CMoore927039_1-1743429050105.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Hi guys.&lt;/P&gt;
&lt;P&gt;GOAL:&lt;BR /&gt;I have an office in India with several users. They need to access a server in Azure that sits behind Virtual PA using Global Protect.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I have successfully setup an IPSec Tunnel between my On-prem PA and an Azure PA, however, I am not passing any traffic in either direction.&lt;BR /&gt;I suspect I might be over simplifying this deployment. I chose the "2-Arm" PA deployment in Azure. This gave me 3 Interfaces for which I had to define 3 subnets as shown in the image above.&lt;BR /&gt;This is a new concept for me. I am used to a single Internal subnet NAT'd out to a Public IP.&lt;BR /&gt;&lt;BR /&gt;I feel like I am missing components for this deployment and that a "Single-Arm" Azure VM deployment is probably what I need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regardless, if anyone has some input they can provide, please let me know, I would greatly appreciate it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 31 Mar 2025 14:27:54 GMT</pubDate>
    <dc:creator>C.Moore927039</dc:creator>
    <dc:date>2025-03-31T14:27:54Z</dc:date>
    <item>
      <title>IPSec Tunnel is up but not passing traffic (On-Prem to Azure Palo Alto VM)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225210#M2345</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_1-1743429050105.png" style="width: 539px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66857i50644BDD9E2BB389/image-dimensions/539x334?v=v2" width="539" height="334" role="button" title="CMoore927039_1-1743429050105.png" alt="CMoore927039_1-1743429050105.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Hi guys.&lt;/P&gt;
&lt;P&gt;GOAL:&lt;BR /&gt;I have an office in India with several users. They need to access a server in Azure that sits behind Virtual PA using Global Protect.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I have successfully setup an IPSec Tunnel between my On-prem PA and an Azure PA, however, I am not passing any traffic in either direction.&lt;BR /&gt;I suspect I might be over simplifying this deployment. I chose the "2-Arm" PA deployment in Azure. This gave me 3 Interfaces for which I had to define 3 subnets as shown in the image above.&lt;BR /&gt;This is a new concept for me. I am used to a single Internal subnet NAT'd out to a Public IP.&lt;BR /&gt;&lt;BR /&gt;I feel like I am missing components for this deployment and that a "Single-Arm" Azure VM deployment is probably what I need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regardless, if anyone has some input they can provide, please let me know, I would greatly appreciate it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 14:27:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225210#M2345</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-03-31T14:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel is up but not passing traffic (On-Prem to Azure Palo Alto VM)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225259#M2346</link>
      <description>&lt;P&gt;Do you have any security policy in place to allow traffic from IPSEC tunnel to on-prem zone and vice versa?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 22:38:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225259#M2346</guid>
      <dc:creator>J.Quintero</dc:creator>
      <dc:date>2025-03-31T22:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel is up but not passing traffic (On-Prem to Azure Palo Alto VM)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225848#M2356</link>
      <description>&lt;P&gt;As I am new to Palo Atlo's in Azure, it is important to note that the "outside" Interface is not assigned a Public IP address in the IKE Gateway settings as shown below. Since Azure associates a Public IP to your (non-routable) IP address, but routable in Azure if that makes sense, it it left blank. Typically you would have a Public IP assigned directly to your "outside" interface. After setting the interface to "None" as shown below, traffic started flowing.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_0-1744037770244.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66997i7224B29C9B610A97/image-size/medium?v=v2&amp;amp;px=400" role="button" title="CMoore927039_0-1744037770244.png" alt="CMoore927039_0-1744037770244.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 15:00:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ipsec-tunnel-is-up-but-not-passing-traffic-on-prem-to-azure-palo/m-p/1225848#M2356</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-04-07T15:00:20Z</dc:date>
    </item>
  </channel>
</rss>

