<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: East-west traffic within azure single Vnet in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/290873#M683</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91225"&gt;@MalakIbrahim&lt;/a&gt;Persitance is not required only when you use the "HA ports" function.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't have HA Ports (which areonly for internal LB anyway), then you can balancing with or witout session persistance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You second question is regarding a different case: "Backhaul and Management Traffic"&amp;nbsp; and works differently to the "East-West Traffic".&lt;/P&gt;&lt;P&gt;As described in the &lt;A href="https://www.paloaltonetworks.com/resources/guides/azure-single-vnet-common-firewall-deployment-guide" target="_self"&gt;guide&lt;/A&gt; you menitioned (p.13, p162), you will need to configure two way NAT to ensure the return traffic is sent to the correct firewall:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;" Because you configure the load balancer with two front-end IPs and two backend pools for backhaul&amp;nbsp;&lt;/FONT&gt;&lt;FONT size="2"&gt;traffic, the firewall applies source NAT in both directions—from backhaul to private subnets and from private subnets to&amp;nbsp;&lt;/FONT&gt;&lt;FONT size="2"&gt;backhaul. "&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Oct 2019 07:13:48 GMT</pubDate>
    <dc:creator>BatD</dc:creator>
    <dc:date>2019-10-02T07:13:48Z</dc:date>
    <item>
      <title>East-west traffic within azure single Vnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/288473#M675</link>
      <description>&lt;P&gt;Regarding East-west traffic within azure single Vnet, in this &lt;A href="https://www.paloaltonetworks.com/resources/guides/azure-single-vnet-common-firewall-deployment-guide" target="_blank"&gt;Guide&lt;/A&gt; page 127 states&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;FONT color="#808080"&gt;&lt;EM&gt;Azure networking does not require the use of source NAT on the firewall to enforce&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;EM&gt;symmetry if both directions of the flow pass through the same Azure internal loadbalancer&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;EM&gt;front-end IP and backend pool. The private subnets have UDRs directing East/&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#808080"&gt;&lt;EM&gt;West traffic to the firewall layer, so NAT is not required.&lt;/EM&gt;&lt;/FONT&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I don’t understand if you don’t enable session persistence in LB setup (page:97) what forces the return traffic to be load balanced to the same firewall.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Sep 2019 07:20:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/288473#M675</guid>
      <dc:creator>MalakIbrahim</dc:creator>
      <dc:date>2019-09-15T07:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: East-west traffic within azure single Vnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/288523#M676</link>
      <description>&lt;P&gt;To clarify, persistence is not related to symmetry of the return traffic, but determines which firewall &amp;nbsp;packets will be sent to. In theory the return packets can bypass the firewall regardless of the persistence setting. You are asking a valid question though and this is how it was previously with the “basic” Azure load balancer. There used to be a requirement to always configure source NAT behind the firewall’s internal interface for East-West traffic, otherwise the return packets were sent directly to the originating server, bypassing the firewall and creating asymmetric traffic flow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However sometime last year Azure introduced the “Standard” Load Balancer SKU, which fixed a lot of the issues with the basic SKU. One of them is that you no longer need to configure souce NAT and the load balancer takes care of the correct routing of packets, so they are sent to the correct firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also previously we had to configure “session perssistance” on the LB, otherwise different packets &amp;nbsp;of the same session could have been sent to different firewalls, which would have broken the session. Then &amp;nbsp;again in the Standard SKU, they introduce a concept of “HA Ports”, desinged exactly for high availability. One of its attributes is that load balancing is done per flow and not per packet, ensuring that all packets for a session will be sent to a single firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;"The load-balancing decision is made per flow. This action is based on the following five-tuple connection: source IP address, source port, destination IP address, destination port, and protocol. "&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-ha-ports-overview" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-ha-ports-overview&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hope it makes sense. I did not explain it very well, but these are the reasons for no longer configuring persistence and source NAT.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2019 08:06:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/288523#M676</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-09-16T08:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: East-west traffic within azure single Vnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/290808#M681</link>
      <description>&lt;P&gt;Thank you for your reply and sorry for my late reaction.&lt;/P&gt;&lt;P&gt;Two more question in regard&amp;nbsp;&lt;/P&gt;&lt;P&gt;-If so why persistence still exist in standard LB?&amp;nbsp;&lt;/P&gt;&lt;P&gt;-What about the internal traffic (inside zone) going to on-premise (vpn zone) and there's internal LB for every zone? i see in the article that there's no coordination between the two LB and they are working independently hence no guarantee that the traffic will traverse the same firewall back and forth.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 20:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/290808#M681</guid>
      <dc:creator>MalakIbrahim</dc:creator>
      <dc:date>2019-10-01T20:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: East-west traffic within azure single Vnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/290873#M683</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91225"&gt;@MalakIbrahim&lt;/a&gt;Persitance is not required only when you use the "HA ports" function.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't have HA Ports (which areonly for internal LB anyway), then you can balancing with or witout session persistance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You second question is regarding a different case: "Backhaul and Management Traffic"&amp;nbsp; and works differently to the "East-West Traffic".&lt;/P&gt;&lt;P&gt;As described in the &lt;A href="https://www.paloaltonetworks.com/resources/guides/azure-single-vnet-common-firewall-deployment-guide" target="_self"&gt;guide&lt;/A&gt; you menitioned (p.13, p162), you will need to configure two way NAT to ensure the return traffic is sent to the correct firewall:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;" Because you configure the load balancer with two front-end IPs and two backend pools for backhaul&amp;nbsp;&lt;/FONT&gt;&lt;FONT size="2"&gt;traffic, the firewall applies source NAT in both directions—from backhaul to private subnets and from private subnets to&amp;nbsp;&lt;/FONT&gt;&lt;FONT size="2"&gt;backhaul. "&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 07:13:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/290873#M683</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-10-02T07:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: East-west traffic within azure single Vnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/462807#M1445</link>
      <description>&lt;P&gt;Hi, we have deployed Palo-alto firewalls on Azure and a Standard Internal Load Balancer with single front-end IP and single backend pool, does LB maintain session state if -&lt;/P&gt;&lt;P&gt;(1) communication is sourced from Azure VNET destined to On-premise ?&lt;/P&gt;&lt;P&gt;(2) communication is sourced from On-premise destined to Azure VNET ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We don't have a Virtual Network Gateway deployed instead we have a Cisco vRouter in Azure VNET that has GRE tunnel to on-premise, so for on-premise communication we are routing all traffic (after firewall inspection) to Cisco vRouter which further forwards the traffic to on-premise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have read in guide (page 56, &lt;A href="https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/azure-architecture-guide" target="_self"&gt;Securing Application in Azure Reference Architeccture Guide (paloaltonetworks.com)&lt;/A&gt;)&amp;nbsp;&lt;SPAN&gt;"If the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;destination traffic is within the Azure VNet, then the load balancer maintains session state to ensure that&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;return traffic to the resource enters through the firewall that processed the outgoing traffic. If the same&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;front end and back-end pool of the load balancer see both directions of the traffic flow, the load balancer&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;maintains the session state. For destinations outside the VNet, the firewall must translate the source IP&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;address to the IP address of the egress interface. Without this source NAT, routing might send the return&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;traffic to a different firewall."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Request guidance if source NAT is needed or not.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 13:46:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/east-west-traffic-within-azure-single-vnet/m-p/462807#M1445</guid>
      <dc:creator>HarcharanSingh</dc:creator>
      <dc:date>2022-02-02T13:46:43Z</dc:date>
    </item>
  </channel>
</rss>

