<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Public Inbound Traffic not hitting the firewall in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333318#M838</link>
    <description>&lt;P&gt;The public IP should not be defined on the firewall.&amp;nbsp; The firewall interfaces should be configured for DHCP and have static assignments from the trust/untrust VNETS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can optionally have the firewall learn the default route via DHCP or configure it statically.&lt;/P&gt;</description>
    <pubDate>Sat, 13 Jun 2020 19:00:49 GMT</pubDate>
    <dc:creator>claudec</dc:creator>
    <dc:date>2020-06-13T19:00:49Z</dc:date>
    <item>
      <title>Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333306#M837</link>
      <description>&lt;P&gt;Hi Team, I have set-up a Palo Alto appliance in Azure and i am trying to allow public access (RDP) to a server in Azure via the firewall. Here's what I have done:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Attached a public IP to the Untrust interface of the Firewall (NSG attached to allow all traffic)&lt;/LI&gt;&lt;LI&gt;Defined this Public IP in Untrust ethernet in the firewall&lt;/LI&gt;&lt;LI&gt;Defined a NAT and security policy to allow natting to the private IP and these are correct (tested via GUI and SSH)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Now, the issue is when I try to RDP to the public IP, the traffic is not even hitting the firewall. Need urgent help on this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 17:32:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333306#M837</guid>
      <dc:creator>Abhijeet007</dc:creator>
      <dc:date>2020-06-13T17:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333318#M838</link>
      <description>&lt;P&gt;The public IP should not be defined on the firewall.&amp;nbsp; The firewall interfaces should be configured for DHCP and have static assignments from the trust/untrust VNETS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can optionally have the firewall learn the default route via DHCP or configure it statically.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 19:00:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333318#M838</guid>
      <dc:creator>claudec</dc:creator>
      <dc:date>2020-06-13T19:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333322#M839</link>
      <description>&lt;DIV&gt;Hi,&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Ensure that the protocol is set to TCP not UDP. Confirm the TCP port is 3389.&lt;/DIV&gt;&lt;DIV&gt;Thanks&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sat, 13 Jun 2020 19:40:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333322#M839</guid>
      <dc:creator>Ezekoli</dc:creator>
      <dc:date>2020-06-13T19:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333323#M840</link>
      <description>&lt;P&gt;I have this set-up in HA, if I enable DHCP, I cannot define IPs there in the interface.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 19:50:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333323#M840</guid>
      <dc:creator>Abhijeet007</dc:creator>
      <dc:date>2020-06-13T19:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333324#M841</link>
      <description>&lt;P&gt;It is set to any at this point. So, I don't think that should be the issue.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 19:51:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333324#M841</guid>
      <dc:creator>Abhijeet007</dc:creator>
      <dc:date>2020-06-13T19:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333331#M842</link>
      <description>&lt;P&gt;Traditional HA is not typically the preferred solution for high availability in the cloud.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, even with a traditional HA config, the public IP is not configured on the firewall.&amp;nbsp; The interface IP addresses are from the directly connected subnets, including the IP that acts as the "floating" IP when the firewalls fail over.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "floating" IP is a private/static IP defined in azure and configured as a secondary interface IP on the firewall.&amp;nbsp; A public IP is then associated with this "floating" private IP in Azure.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 22:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333331#M842</guid>
      <dc:creator>claudec</dc:creator>
      <dc:date>2020-06-13T22:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333343#M843</link>
      <description>&lt;P&gt;Got the trick. Although the way I defined the Public IP was correct. The Palo does not see the traffic with PIP, I changed the NAT and security policy to land to the Private IP on which the Public was defined and it worked.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 08:09:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333343#M843</guid>
      <dc:creator>Abhijeet007</dc:creator>
      <dc:date>2020-06-14T08:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Public Inbound Traffic not hitting the firewall</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333382#M844</link>
      <description>&lt;P&gt;That is correct.&amp;nbsp; The only time, I recall, that the firewall will see the original, un-translated public destination IP is when you front end the firewall with a public standard load balancer and enable the "floating IP" option.&amp;nbsp; In that configuration, you do reference the public IP associated with the load balancer in the NAT policy of the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It wasn't clear from your original post that you were attempting to use the public IP in your NAT rule so sorry for that assumption on my part.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you associate a public IP to a private IP in Azure it handles the NAT.&amp;nbsp; That is why you don't need a public IP configured on the management interface of the firewall, just like you don't need a public IP configured on the un-trust interface.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 15:36:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/public-inbound-traffic-not-hitting-the-firewall/m-p/333382#M844</guid>
      <dc:creator>claudec</dc:creator>
      <dc:date>2020-06-14T15:36:57Z</dc:date>
    </item>
  </channel>
</rss>

