<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA Azure no public traffic ingressing in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295435#M691</link>
    <description>&lt;P&gt;Looking at the metrics, both firewalls are showing as 100% healthy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The traffic is now coming from outside -&amp;gt; into the load balancer -&amp;gt; into the firewall -&amp;gt; we are sending it from the firewall to the test web server but if we do a pcap on the test web server, it doesn't see anything.&lt;/P&gt;</description>
    <pubDate>Thu, 31 Oct 2019 13:54:05 GMT</pubDate>
    <dc:creator>LukeBullimore</dc:creator>
    <dc:date>2019-10-31T13:54:05Z</dc:date>
    <item>
      <title>PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295405#M687</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've set up a public load balancer, with its respective backend pool pointing to the firewalls untrust interfaces and a test load balancing rule, but no matter what, nothing is ingressing on our public interface! The weird thing is, the untrust interface the firewall has, also has a public IP attached to it, and I'm not seeing any generic scanner traffic ingressing on the untrust interface either?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping from the outside interface to google, and vms within trust can also get out to the internet, so return traffic is working. The health probe status is also 100 for both firewalls. No NSGs attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Help!&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 11:34:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295405#M687</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-10-31T11:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295412#M688</link>
      <description>&lt;P&gt;Did you attach an NSG to the Untrust interface?&amp;nbsp; When you assign a PIP to the interface an NSG is required even if it allows all traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 12:16:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295412#M688</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2019-10-31T12:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295414#M689</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475"&gt;@jmeurer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Didn't originally since I thought no NSG meant allow all. I've applied an allow-all one to the untrust interface now and I'm seeing traffic thats hitting the palos untrust public IP. but not the public ip of the load balancer, any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 12:30:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295414#M689</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-10-31T12:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295418#M690</link>
      <description>&lt;P&gt;Are you seeing the Health probe traffic?&amp;nbsp; Azure's LB does not easily report pool member status, you have to go to Metrics.&amp;nbsp; The easiest way to determine if the Health Probes are working is to ensure you see the traffic in the FW Monitor/Session Browser and ensure it is completing.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 12:42:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295418#M690</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2019-10-31T12:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295435#M691</link>
      <description>&lt;P&gt;Looking at the metrics, both firewalls are showing as 100% healthy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The traffic is now coming from outside -&amp;gt; into the load balancer -&amp;gt; into the firewall -&amp;gt; we are sending it from the firewall to the test web server but if we do a pcap on the test web server, it doesn't see anything.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 13:54:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295435#M691</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-10-31T13:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295438#M692</link>
      <description>&lt;P&gt;Assuming your SNAT/DNAT rules are correct, routes in the firewall send the traffic through proper interface to get to the internal site, Azure route tables and NSGs all correct, I believe you are at the point of reaching out to you Account SE and Support for further eyes on console diagnostics.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 14:02:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/295438#M692</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2019-10-31T14:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA Azure no public traffic ingressing</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/334042#M849</link>
      <description>&lt;P&gt;We ran into this very same issue.&amp;nbsp; The solution for us was to enable the "Floating IP" in the "load balancing rules" section in Azure.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 12:24:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-azure-no-public-traffic-ingressing/m-p/334042#M849</guid>
      <dc:creator>gangqu</dc:creator>
      <dc:date>2020-06-18T12:24:47Z</dc:date>
    </item>
  </channel>
</rss>

