<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help Needed: NAT &amp;amp; Security Policy Configuration for Azure LB → Palo Alto → DMZ Webserver (Public IP) in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242262#M2406</link>
    <description>&lt;P&gt;Need to create NAT rules with source and destination NAT and add a security rule for the destination IP. It should work.&lt;/P&gt;
&lt;P&gt;NAT destination should be your DMZ VM IP/FQDN.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Nov 2025 07:23:13 GMT</pubDate>
    <dc:creator>P.Thakur638081</dc:creator>
    <dc:date>2025-11-20T07:23:13Z</dc:date>
    <item>
      <title>Help Needed: NAT &amp; Security Policy Configuration for Azure LB → Palo Alto → DMZ Webserver (Public IP)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1236721#M2386</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Goal:&lt;/STRONG&gt;&lt;BR /&gt;I want to access the &lt;STRONG&gt;DMZ Webserver (Public IP)&lt;/STRONG&gt; via the &lt;STRONG&gt;Azure Load Balancer Public IP&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Setup:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Azure Public Load Balancer is created with Frontend IP, Backend Pool, and Health Probe.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Palo Alto Firewall VM is added to the backend pool.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;DMZ VM (Webserver) is running with a Public IP.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Load Balancer backend pool is correctly forwarding traffic to the Palo Alto firewall.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;However, due to incorrect &lt;STRONG&gt;NAT policies (inbound/outbound)&lt;/STRONG&gt; on the firewall, the traffic is not reaching the DMZ VM.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;I’m unable to access the DMZ Webserver through the LB Public IP.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Request:&lt;/STRONG&gt;&lt;BR /&gt;Could you please review my Doc attached&amp;nbsp; and help me configure the &lt;STRONG&gt;NAT rules + Security Policies&lt;/STRONG&gt; so that inbound/outbound traffic flows correctly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Expected Traffic Flow:&lt;/STRONG&gt;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":right_arrow:"&gt;➡️&lt;/span&gt; Internet User → Load Balancer Public IP → Palo Alto Untrust NIC → DMZ Webserver Public IP&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":left_arrow:"&gt;⬅️&lt;/span&gt; DMZ → Palo Alto → Untrust → Load Balancer → Internet User&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your guidance!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 14:01:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1236721#M2386</guid>
      <dc:creator>shaik.althaf</dc:creator>
      <dc:date>2025-08-26T14:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Help Needed: NAT &amp; Security Policy Configuration for Azure LB → Palo Alto → DMZ Webserver (Public IP)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242262#M2406</link>
      <description>&lt;P&gt;Need to create NAT rules with source and destination NAT and add a security rule for the destination IP. It should work.&lt;/P&gt;
&lt;P&gt;NAT destination should be your DMZ VM IP/FQDN.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 07:23:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242262#M2406</guid>
      <dc:creator>P.Thakur638081</dc:creator>
      <dc:date>2025-11-20T07:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Help Needed: NAT &amp; Security Policy Configuration for Azure LB → Palo Alto → DMZ Webserver (Public IP)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242497#M2407</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1295093887"&gt;@shaik.althaf&lt;/a&gt;&amp;nbsp; How are you trying to access the Server public IP?&amp;nbsp; from the Internet itself or from the LB?&lt;/P&gt;
&lt;P&gt;Can you ping the Server Public IP from the Firewall, LB or from the Internet?&lt;/P&gt;
&lt;P&gt;Let me know from LB if you can ping the Server public IP or not and then check the logs in the firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If Routing is there then you need Security Rule in the firewall to pass the traffic from firewall to the server public ip.&lt;/P&gt;
&lt;P&gt;You do not need NAT if traffic flow is from LB Public IP to the Server Public IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 22:19:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242497#M2407</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2025-11-24T22:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Help Needed: NAT &amp; Security Policy Configuration for Azure LB → Palo Alto → DMZ Webserver (Public IP)</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242553#M2408</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Update on the Issue&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I’m now able to ping the Load Balancer Public IP, and I can also see the traffic hitting the Palo Alto firewall. This confirms that the flow is working as expected:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet User → LB Public IP → Palo Alto (Untrust) → DMZ Webserver&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The traffic is reaching the DMZ VM, but the application still cannot be accessed from the internet.&lt;/P&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Root Cause Identified&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;The Palo Alto VM and the DMZ VM are deployed in &lt;STRONG&gt;two different VNets&lt;/STRONG&gt;, and due to this separation, the &lt;STRONG&gt;Virtual Router path + SNAT behavior&lt;/STRONG&gt; is preventing the return traffic from properly routing back through the firewall.&lt;/P&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Current Firewall Setup&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Interfaces&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;ethernet1/1 – &lt;EM&gt;untrust&lt;/EM&gt; (DHCP, default route created)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;ethernet1/2 – &lt;EM&gt;trust&lt;/EM&gt; (DHCP, no default route)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Zones&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;untrust&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;trust&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Configuration Implemented&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;1. Address Object&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;dmz-server = Private IP of the DMZ VM (e.g., 10.20.1.10/32)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;2. Static Route (critical for VNet-to-VNet routing)&lt;/STRONG&gt;&lt;BR /&gt;Network &amp;gt; Virtual Router &amp;gt; default &amp;gt; Static Routes&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Destination&lt;/STRONG&gt;: DMZ/VNet prefix (e.g., 10.20.0.0/16)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Interface&lt;/STRONG&gt;: ethernet1/2&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Next Hop&lt;/STRONG&gt;: None&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This ensures the firewall knows how to reach the DMZ spoke.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. NAT Rule (DNAT + SNAT on same rule)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Original Packet&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone: &lt;EM&gt;untrust&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone: &lt;EM&gt;untrust&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Address: Firewall untrust private IP (e.g., 10.10.1.4)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Service: HTTP&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Destination Translation&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Address: dmz-server&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Port: 80&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Source Translation&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Type: Dynamic IP &amp;amp; Port&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Interface: ethernet1/2&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;4. Security Policy&lt;/STRONG&gt;&lt;BR /&gt;Allow traffic from &lt;EM&gt;untrust → trust&lt;/EM&gt; for HTTP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. Commit Completed&lt;/STRONG&gt;&lt;/P&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Current Status&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Inbound traffic reaches the DMZ server, but the web application is still not accessible externally. Based on the routing and SNAT behavior between separate VNets, this appears to be the blocker at the moment.&lt;/P&gt;&lt;P&gt;Any recommendations or best practices for scenarios where the firewall and DMZ spokes are deployed in different VNets would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2025 10:31:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/help-needed-nat-amp-security-policy-configuration-for-azure-lb/m-p/1242553#M2408</guid>
      <dc:creator>shaik.althaf</dc:creator>
      <dc:date>2025-11-25T10:31:02Z</dc:date>
    </item>
  </channel>
</rss>

