<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto VM-Series in Azure DMZ - AVS in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-series-in-azure-dmz-avs/m-p/1226224#M2361</link>
    <description>&lt;P&gt;&amp;nbsp;Okay see if I can word this as best as possible. I made up the network IP addresses for this diagram.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are in the progress of migrating one of our on-prem DC to the Azure public Cloud.&amp;nbsp; Obstacle we are facing is with how the DMZ will look and work specifically with DMZ network in AVS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Current design is using the dedicated inbound option pair with another pair for OBEW.&amp;nbsp; VM-Series in A/A (stand-alone). Azure network following the hub-spoke model.&amp;nbsp; So the firewalls are in a 'connectivity/perimeter' vnet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-AVS is setup in another vnet with connectivity back using express route with global reach enabled. We have within AVS a dedicated subnet for DMZ in diagram 10.1.100.0/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-We have a gateway subnet in the connectivity vnet back to our other on-prem (secondary) datacenter. This is relevant because any traffic&amp;nbsp; coming from AVS will hit first the T1 router and then the T0 router. The T0 is fully managed by Microsoft, so any traffic coming from AVS will hit the T0 and then through Global Reach be directed directly to the express route destined for our on-prem secondary data cener. We do not want that as we want any ingress/egress DMZ traffic to use the Palos in Azure&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Simple question how do we accomplish this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had an idea to create IPsec tunnels from each PAFW to the AVS T1 router, that way we can ensure the next hop is the Azure PAFW.&amp;nbsp; Issue with this is we want the traffic to be dynamic and able to utilize both OBEW firewalls at the same time as is the purpose of having these in A/A.&amp;nbsp; Not configuring with PM and having only one active.&lt;/P&gt;
&lt;P&gt;Is it possible to have say 2 'remote' sites (OBEW) connected to another site (AVS) where outbound traffic from AVS can use either route equally?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or another design implementation we just didn't think of?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is almost no guidance in any design document I've seen...other than using NSX or putting a E-W firewall in the AVS vNet.&amp;nbsp; Like to avoid for multiple reasons- cost management overhead.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Apr 2025 14:03:46 GMT</pubDate>
    <dc:creator>Adam_DiMarco</dc:creator>
    <dc:date>2025-04-10T14:03:46Z</dc:date>
    <item>
      <title>Palo Alto VM-Series in Azure DMZ - AVS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-series-in-azure-dmz-avs/m-p/1226224#M2361</link>
      <description>&lt;P&gt;&amp;nbsp;Okay see if I can word this as best as possible. I made up the network IP addresses for this diagram.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are in the progress of migrating one of our on-prem DC to the Azure public Cloud.&amp;nbsp; Obstacle we are facing is with how the DMZ will look and work specifically with DMZ network in AVS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Current design is using the dedicated inbound option pair with another pair for OBEW.&amp;nbsp; VM-Series in A/A (stand-alone). Azure network following the hub-spoke model.&amp;nbsp; So the firewalls are in a 'connectivity/perimeter' vnet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-AVS is setup in another vnet with connectivity back using express route with global reach enabled. We have within AVS a dedicated subnet for DMZ in diagram 10.1.100.0/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-We have a gateway subnet in the connectivity vnet back to our other on-prem (secondary) datacenter. This is relevant because any traffic&amp;nbsp; coming from AVS will hit first the T1 router and then the T0 router. The T0 is fully managed by Microsoft, so any traffic coming from AVS will hit the T0 and then through Global Reach be directed directly to the express route destined for our on-prem secondary data cener. We do not want that as we want any ingress/egress DMZ traffic to use the Palos in Azure&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Simple question how do we accomplish this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had an idea to create IPsec tunnels from each PAFW to the AVS T1 router, that way we can ensure the next hop is the Azure PAFW.&amp;nbsp; Issue with this is we want the traffic to be dynamic and able to utilize both OBEW firewalls at the same time as is the purpose of having these in A/A.&amp;nbsp; Not configuring with PM and having only one active.&lt;/P&gt;
&lt;P&gt;Is it possible to have say 2 'remote' sites (OBEW) connected to another site (AVS) where outbound traffic from AVS can use either route equally?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or another design implementation we just didn't think of?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is almost no guidance in any design document I've seen...other than using NSX or putting a E-W firewall in the AVS vNet.&amp;nbsp; Like to avoid for multiple reasons- cost management overhead.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 14:03:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-series-in-azure-dmz-avs/m-p/1226224#M2361</guid>
      <dc:creator>Adam_DiMarco</dc:creator>
      <dc:date>2025-04-10T14:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto VM-Series in Azure DMZ - AVS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-series-in-azure-dmz-avs/m-p/1226226#M2362</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Adam_DiMarco_0-1744293875237.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67047iB5233AD56C691804/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Adam_DiMarco_0-1744293875237.png" alt="Adam_DiMarco_0-1744293875237.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 14:04:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/palo-alto-vm-series-in-azure-dmz-avs/m-p/1226226#M2362</guid>
      <dc:creator>Adam_DiMarco</dc:creator>
      <dc:date>2025-04-10T14:04:46Z</dc:date>
    </item>
  </channel>
</rss>

