<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA with ELB and ILB in Azure in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240821#M470</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2533"&gt;@jperry1&lt;/a&gt;thanks for your reply. Couple of points here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. IP for health-probe for both ELB and ILB is same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.In our setup we have an ILB where the the PA is in backend pool&amp;nbsp; so that traffic initiating from Azure VM can be send to the Fire&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2533"&gt;@jperry1&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;You have it right in terms of needing 2 VR's to route each health check for your ELB and ILB. you IP probes from the LB's you both come from two separate 168.x.x.x addresses. you have to use a separate VR and static route for the ILB health probe in order for the ILB to work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But i'm a bit confused because the VM-Series should only be in the backend pool of the ELB&amp;nbsp; and the Web servers should be in the backend pool of the ILB. The VM-series should route traffic out of the trust side to the ILB Virtual IP address unless you have a specific reason not to.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;wall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question now will this setup work with one VR on PA because in other firewalls it does work.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Nov 2018 07:28:13 GMT</pubDate>
    <dc:creator>Ansh.mi</dc:creator>
    <dc:date>2018-11-22T07:28:13Z</dc:date>
    <item>
      <title>PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240819#M468</link>
      <description>&lt;P&gt;We have the below setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;internet-&amp;gt;ELB(public ip)-&amp;gt;VM Series(2)-&amp;gt; ILB-&amp;gt;Web Servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where the 2 VM series Firewall in backend pool of both ELB and ILB, the issue here is the Health probe IP for both ELB and ILB is&amp;nbsp;168.63.129.16 so health probes always fails for one of them, I can resolve this issue by happing 2 VR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But my question is I had similar setup on other firewalls (Checkpoint, Fortinet) it works fine with One Routing Instance.But on PA it does not work with one VR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As of now I have route of &amp;nbsp;168.63.129.16 towards external interface, Health probes works fine for ELB. But in case of ILB PA is building 2 sessions and we are never seeing&amp;nbsp;ack back from 168.63.129.16.The reason of building two sessions is that the first session is in INIT&amp;nbsp; state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;== 2018-11-21 21:10:34.174 -0800 ==&lt;BR /&gt;Packet received at fastpath stage, tag 125240, type ATOMIC&lt;BR /&gt;Packet info: len 66 port 17 interface 17 vsys 1&lt;BR /&gt;&amp;nbsp; wqe index 10461 packet 0x0xe05900bb00, HA: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12:34:56:78:9a:bc-&amp;gt;00:0d:3a:30:78:75, type 0x0800&lt;BR /&gt;IP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 168.63.129.16-&amp;gt;10.19.2.4, protocol 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; version 4, ihl 5, tos 0x02, len 52,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id 26606, frag_off 0x4000, ttl 128, checksum 27997(0x5d6d)&lt;BR /&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp; sport 50255, dport 80, seq 3507572149, ack 0,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reserved 0, offset 8, window 8192, checksum 13719,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags 0xc2 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 a0 01 03 03 08&amp;nbsp; 01 01 04 02&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ........ ....&lt;BR /&gt;Flow fastpath, session 125240 (set work 0xe054c8d600 exclude_video 0 from sp 0xe149818200 exclude_video 0)&lt;BR /&gt;IP checksum valid&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;Syn Cookie: pan_reass(new syn): c2s:0 c2s:nxtseq 3507572150 c2s:startseq 3507572150 c2s:win 14600 c2s:st 3 c2s:newsyn 0 :: s2c:nxtseq 2361026633 s2c:startseq 2361026633&lt;BR /&gt;&amp;nbsp;s2c:win 8192 s2c:st 1 s2c:newsyn 0 ack 0 nosyn 0 plen 0&lt;BR /&gt;Forwarding lookup, ingress interface 17&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP 10.19.2.4&lt;BR /&gt;Host route found, forward packet to host&lt;BR /&gt;Host service check passed, transmit to control plane&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;== 2018-11-21 21:10:34.174 -0800 ==&lt;BR /&gt;Packet received at ingress stage, tag 0, type ORDERED&lt;BR /&gt;Packet info: len 66 port 17 interface 17 vsys 1&lt;BR /&gt;&amp;nbsp; wqe index 10461 packet 0x0xe05900bb04, HA: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:0d:3a:30:78:75-&amp;gt;00:70:76:69:66:00, type 0x0800&lt;BR /&gt;IP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.19.2.4-&amp;gt;168.63.129.16, protocol 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; version 4, ihl 5, tos 0x00, len 52,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id 0, frag_off 0x4000, ttl 64, checksum 24069(0x55e)&lt;BR /&gt;TCP:&amp;nbsp;&amp;nbsp;&amp;nbsp; sport 80, dport 50255, seq 2361026632, ack 3507572150,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reserved 0, offset 8, window 14600, checksum 10280,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 b4 01 01 04 02&amp;nbsp; 01 03 03 07&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ........ ....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The similar setup works fine on other firewall where I am seeing&amp;nbsp;3 way handshake compelted&amp;nbsp; and only one session getting build. Now Is it the expected behaviour or some thing we can do to get this resolved?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 06:12:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240819#M468</guid>
      <dc:creator>Ansh.mi</dc:creator>
      <dc:date>2018-11-22T06:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240820#M469</link>
      <description>&lt;P&gt;You have it right in terms of needing 2 VR's to route each health check for your ELB and ILB. you IP probes from the LB's you both come from two separate 168.x.x.x addresses. you have to use a separate VR and static route for the ILB health probe in order for the ILB to work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But i'm a bit confused because the VM-Series should only be in the backend pool of the ELB&amp;nbsp; and the Web servers should be in the backend pool of the ILB. The VM-series should route traffic out of the trust side to the ILB Virtual IP address unless you have a specific reason not to.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 06:13:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240820#M469</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-11-22T06:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240821#M470</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2533"&gt;@jperry1&lt;/a&gt;thanks for your reply. Couple of points here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. IP for health-probe for both ELB and ILB is same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.In our setup we have an ILB where the the PA is in backend pool&amp;nbsp; so that traffic initiating from Azure VM can be send to the Fire&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2533"&gt;@jperry1&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;You have it right in terms of needing 2 VR's to route each health check for your ELB and ILB. you IP probes from the LB's you both come from two separate 168.x.x.x addresses. you have to use a separate VR and static route for the ILB health probe in order for the ILB to work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But i'm a bit confused because the VM-Series should only be in the backend pool of the ELB&amp;nbsp; and the Web servers should be in the backend pool of the ILB. The VM-series should route traffic out of the trust side to the ILB Virtual IP address unless you have a specific reason not to.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;wall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question now will this setup work with one VR on PA because in other firewalls it does work.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 07:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240821#M470</guid>
      <dc:creator>Ansh.mi</dc:creator>
      <dc:date>2018-11-22T07:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240877#M471</link>
      <description>&lt;P&gt;Oh ok got it. so you must be using the Azure Standard Load Blancer as the ILB. if not I would suggest this. The reason that you can't use one VR is because of the way we route. The ILB health check needs to go back out of the internet the ILB health check comes but it will take the default route which is more than likely on a different interface.&amp;nbsp; To overcome this you have to have 2 VR's and place the interfaces in each VR.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 17:04:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240877#M471</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-11-22T17:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240974#M472</link>
      <description>&lt;P&gt;I got that part. I currently have one VR setup where a default route from external interface and have assymetric routing allowed on&amp;nbsp; on Palo Alto, so for ILB health proble syn comes on Internal Interface and syn-ack initiates from internal interface and checks the routing and moves out from the external Interface. So for some reason PA is building two session one for Syn packets coming from ILB to PA and other for response with Syn-ACK.The setup works fine&amp;nbsp; with other Firewalls because we are getting ACK back from the LB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: Session with Syn Packet from ILB to PA is in INIT state, so I am also looking for a possible reason behind it.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2018 10:03:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/240974#M472</guid>
      <dc:creator>Ansh.mi</dc:creator>
      <dc:date>2018-11-23T10:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/241016#M473</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/102014"&gt;@Ansh.mi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This issue is a fundamental routing issue not a VM-Series issue. Although you are experiencing this due to using ELB and ILB in Azure this would also happen in physical firewall based on the way the PANW firewall handles routing. If this is a bahavior you are interesting in requesting to change please reach out to your account team and regarding this and they can file a feature request. Thanks for the input and contributing in the AWS/Azure Discussions board.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2018 18:57:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/241016#M473</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-11-23T18:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: PA with ELB and ILB in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/302125#M726</link>
      <description>&lt;P&gt;I am also facing the same issue. The trusted interface is configured as DHCP there there is no issue with Health probe I can see session getting completed in session browser, but while I switch the trust interface to static IP (10.205.96.5/24) the heath probe traffic is in INIT state.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2019 14:22:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-with-elb-and-ilb-in-azure/m-p/302125#M726</guid>
      <dc:creator>sagar.debnath</dc:creator>
      <dc:date>2019-12-04T14:22:27Z</dc:date>
    </item>
  </channel>
</rss>

