<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multi-Zone PA-VM in Azure using different Front-End IP in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/multi-zone-pa-vm-in-azure-using-different-front-end-ip/m-p/1235546#M2385</link>
    <description>&lt;P&gt;I'm trying to come up with a architecture design using PA-VM in Azure on a Transit-VNET. I'm familiar with the reference architecture but this limits me to only Trust &amp;amp; Untrust zone. I also understand that doing PA-VM in cloud recommends using Azure service tag with DAG rather than the old mindset of Zone-based.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the sake of discussion, please do entertain me on this design diagram. I'm able to make this work in our POC environment and everything is running as expected. My main concern is the symmetry of traffic on the load balancer. Like I said, I was able to build this on a POC environment however I cant seem to simulate where traffic is becoming asymmetric due to the load-balancer. Well, I can fail one interface on one of the firewalls - this does break symmetry and return traffic is dropped by the other firewall. However this case is less likely to happen in my opinion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to get inputs from others if they have encountered a similar design or have implemented as such in their environment.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Aug 2025 20:26:16 GMT</pubDate>
    <dc:creator>F.Eisma</dc:creator>
    <dc:date>2025-08-06T20:26:16Z</dc:date>
    <item>
      <title>Multi-Zone PA-VM in Azure using different Front-End IP</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/multi-zone-pa-vm-in-azure-using-different-front-end-ip/m-p/1235546#M2385</link>
      <description>&lt;P&gt;I'm trying to come up with a architecture design using PA-VM in Azure on a Transit-VNET. I'm familiar with the reference architecture but this limits me to only Trust &amp;amp; Untrust zone. I also understand that doing PA-VM in cloud recommends using Azure service tag with DAG rather than the old mindset of Zone-based.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the sake of discussion, please do entertain me on this design diagram. I'm able to make this work in our POC environment and everything is running as expected. My main concern is the symmetry of traffic on the load balancer. Like I said, I was able to build this on a POC environment however I cant seem to simulate where traffic is becoming asymmetric due to the load-balancer. Well, I can fail one interface on one of the firewalls - this does break symmetry and return traffic is dropped by the other firewall. However this case is less likely to happen in my opinion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to get inputs from others if they have encountered a similar design or have implemented as such in their environment.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 20:26:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/multi-zone-pa-vm-in-azure-using-different-front-end-ip/m-p/1235546#M2385</guid>
      <dc:creator>F.Eisma</dc:creator>
      <dc:date>2025-08-06T20:26:16Z</dc:date>
    </item>
  </channel>
</rss>

