<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active/active gateways in Azure and Panorama in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338417#M878</link>
    <description>&lt;P&gt;For your outbound flows, you can just configure a Panorama based NAT policy that uses a source translation that references the egress interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If for some other reason a NAT policy needs to be different on each firewall in the LB pair you could just use rule targets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="claudec_0-1594732907673.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26769iB5A9E27A561CE5ED/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="claudec_0-1594732907673.png" alt="claudec_0-1594732907673.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Jul 2020 13:23:06 GMT</pubDate>
    <dc:creator>claudec</dc:creator>
    <dc:date>2020-07-14T13:23:06Z</dc:date>
    <item>
      <title>Active/active gateways in Azure and Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338324#M877</link>
      <description>&lt;P&gt;I have two gateways in Azure operating as an active/active pair. They use the load balancer sandwich topology. I'd like to manage the pair from Panorama. Having a shared policy appears to be difficult.&amp;nbsp; The two can share a security policy easily enough. But the rules in a NAT policy reference IP addresses specific to a firewall. Example; a source nat which uses the egress interface (and IP) of a gateway.&lt;/P&gt;&lt;P&gt;Do I need to use individual templates/device-groups/policies in Panorama? Or is there a way for the two gateways to share a policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: I can set variables in a template in Panorama and set the value of those variables for a specific device. Variables can then be used for things like interface IP addresses and route tables. However i dont seem to be able to use a variable as the IP address in a NAT rule.&lt;/P&gt;&lt;P&gt;Thanks Claudec. If i set the interface ip to 'none' on the source nat (interface) rule, the rule still works fine.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 02:12:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338324#M877</guid>
      <dc:creator>JimMcGrady</dc:creator>
      <dc:date>2020-07-15T02:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Active/active gateways in Azure and Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338417#M878</link>
      <description>&lt;P&gt;For your outbound flows, you can just configure a Panorama based NAT policy that uses a source translation that references the egress interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If for some other reason a NAT policy needs to be different on each firewall in the LB pair you could just use rule targets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="claudec_0-1594732907673.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26769iB5A9E27A561CE5ED/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="claudec_0-1594732907673.png" alt="claudec_0-1594732907673.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 13:23:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338417#M878</guid>
      <dc:creator>claudec</dc:creator>
      <dc:date>2020-07-14T13:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Active/active gateways in Azure and Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338455#M879</link>
      <description>&lt;P&gt;The firewalls can be apart of the same Device Group and Template Stack.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For inbound NAT policies, the set the source interface to the untrust NIC and the destination address to "any".&amp;nbsp; The DNAT address must be set to dynamic-destination-translation.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The example below has 2 inbound DNAT policies (jump-server and web-server) and 1 outbound SNAT (for outbound internet).&amp;nbsp; Ethernet1/1 is untrust and Ethernet1/2 is trust.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2020-07-14 at 12.27.39 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26777i5F27F340207D9AC0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2020-07-14 at 12.27.39 PM.png" alt="Screen Shot 2020-07-14 at 12.27.39 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Optional &amp;amp; only if using Azure's public load balancer):&amp;nbsp; If you enable "Floating IP" on the load balancing rule, the original packet's destination address can be set to the load balancer's public IP.&amp;nbsp; This is useful if you have multiple applications that share the same port.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-07-14 at 12.40.38 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26778i88F89B839BF0150F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2020-07-14 at 12.40.38 PM.png" alt="Screen Shot 2020-07-14 at 12.40.38 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 16:43:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338455#M879</guid>
      <dc:creator>mmclimans</dc:creator>
      <dc:date>2020-07-14T16:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Active/active gateways in Azure and Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/541629#M1882</link>
      <description>&lt;P&gt;I don't understand how you d-nat for entire ip address range....whats the purpose of using public load balancer if you have to define sources and ports for all things?&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 00:36:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/541629#M1882</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2023-05-10T00:36:39Z</dc:date>
    </item>
  </channel>
</rss>

