<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic AWS Setup in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/basic-aws-setup/m-p/297479#M695</link>
    <description>&lt;P&gt;Check the route table on the Web Server.&amp;nbsp;&lt;BR /&gt;I have found that even though you create a route in the route table for the subnet, the route table directly on the web server will still have it's default route pointing to the IGW. If this is the case, this explains why the return traffic from the web server is not showing in the firewall logs.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Nov 2019 00:32:22 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2019-11-10T00:32:22Z</dc:date>
    <item>
      <title>Basic AWS Setup</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/basic-aws-setup/m-p/296489#M694</link>
      <description>&lt;P&gt;So I'm having troubles with a deployment ... seems like it should be super straightforward, but I'm just not getting any traffic through the Palo.&lt;/P&gt;&lt;P&gt;I've got 3 subnet, private, public, mgmt&lt;/P&gt;&lt;P&gt;I swapped the mgmt and eth1/1 interface so the EIP is applied to the public facing interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm able to reach both the EIP and over VPN I'm able to access the 1/1 interface over https.&lt;/P&gt;&lt;P&gt;I've deployed a web server behind the Palo on the private subnet with a route table pointing to the Palo ENI. NAT and Security rules are correct, but I do not get any traffic back from the web server at all. Nothing but SYN's in a pcap. I can ping the web server private IP sourced from the inside interface of the palo.&lt;/P&gt;&lt;P&gt;I'm at a loss as to why this is not working ... Someone please help!&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2019 23:13:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/basic-aws-setup/m-p/296489#M694</guid>
      <dc:creator>BrianFyre</dc:creator>
      <dc:date>2019-11-05T23:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: Basic AWS Setup</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/basic-aws-setup/m-p/297479#M695</link>
      <description>&lt;P&gt;Check the route table on the Web Server.&amp;nbsp;&lt;BR /&gt;I have found that even though you create a route in the route table for the subnet, the route table directly on the web server will still have it's default route pointing to the IGW. If this is the case, this explains why the return traffic from the web server is not showing in the firewall logs.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 00:32:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/basic-aws-setup/m-p/297479#M695</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2019-11-10T00:32:22Z</dc:date>
    </item>
  </channel>
</rss>

