<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: need to ping internet from azure trusted zone in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254588#M2465</link>
    <description>&lt;P&gt;I should also note, took me a long time to figure this out, if you are using an VM-Series Active/Passive HA pair on Azure, the PaloAlto management interface must have direct internet access, you can not send its traffic through the firewalls. This is because when a HA failover occurs, the newly active PaloAlto must contact the Azure API gateway (management.azure.com) to move the secondary IPs assigned to the failed PaloAlto's VM interface(s) to the newly-active PaloAlto's&amp;nbsp; VM interfaces. Azure will not route traffic based on the IPs/ARP configured on the PaloAlto, only based on the IP configuration of Azure interfaces tied to the VM.&lt;/P&gt;</description>
    <pubDate>Fri, 22 May 2026 21:23:11 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2026-05-22T21:23:11Z</dc:date>
    <item>
      <title>need to ping internet from azure trusted zone</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254422#M2461</link>
      <description>&lt;P&gt;Admins trying to install an app that needs to ping Internet app. Is there a work around for this?&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 22:51:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254422#M2461</guid>
      <dc:creator>J.Dorsch</dc:creator>
      <dc:date>2026-05-20T22:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: need to ping internet from azure trusted zone</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254451#M2462</link>
      <description>&lt;P&gt;Treat your untrusted interface the same way you would a physical firewall and set up an outbound source NAT rule (even though your external IP is a private one on the interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2026 10:43:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254451#M2462</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2026-05-21T10:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: need to ping internet from azure trusted zone</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254471#M2463</link>
      <description>&lt;P&gt;I am just getting started with a PaloAlto on Azure, but I have found the only way to do this is to throw out the external load balancer (if you have one) and put the public IP directly on your PaloAlto Untrust (actually, the private NAT of the public IP as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;says). Azure blocks ICMP inbound/outbound by default. Also make sure your app vNet is routing internet traffic to the PaloAlto and not sending it out the Azure default route out Bastion.&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2026 20:52:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254471#M2463</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2026-05-21T20:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: need to ping internet from azure trusted zone</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254588#M2465</link>
      <description>&lt;P&gt;I should also note, took me a long time to figure this out, if you are using an VM-Series Active/Passive HA pair on Azure, the PaloAlto management interface must have direct internet access, you can not send its traffic through the firewalls. This is because when a HA failover occurs, the newly active PaloAlto must contact the Azure API gateway (management.azure.com) to move the secondary IPs assigned to the failed PaloAlto's VM interface(s) to the newly-active PaloAlto's&amp;nbsp; VM interfaces. Azure will not route traffic based on the IPs/ARP configured on the PaloAlto, only based on the IP configuration of Azure interfaces tied to the VM.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2026 21:23:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254588#M2465</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2026-05-22T21:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: need to ping internet from azure trusted zone</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254605#M2466</link>
      <description>&lt;P&gt;Turns out that due to the HA config I had the PAT address setup on the wrong IP.&amp;nbsp; This seemed to solve the issue, Thanks!!&lt;/P&gt;</description>
      <pubDate>Sat, 23 May 2026 13:20:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/need-to-ping-internet-from-azure-trusted-zone/m-p/1254605#M2466</guid>
      <dc:creator>J.Dorsch</dc:creator>
      <dc:date>2026-05-23T13:20:47Z</dc:date>
    </item>
  </channel>
</rss>

