<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure deployment.  NAT rule assistance. in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-deployment-nat-rule-assistance/m-p/339071#M881</link>
    <description>&lt;P&gt;I do not know if you are still looking for a resolution, but I have placed answers to some of your questions below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The public load balancer forwards the traffic to the VM-Series.&amp;nbsp; The load balancer itself is comprised of 3 major components.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Frontend IP Address.&amp;nbsp;&lt;UL&gt;&lt;LI&gt;This is the address that is assigned&amp;nbsp;to the public load balancer. This would be 140.242.125.50 in your example.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Backend Pool&lt;UL&gt;&lt;LI&gt;This is the "target" or "destination" of the load balancer.&amp;nbsp; This would be the VM-Series untrust interfaces.&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Load Balancing Rule&lt;UL&gt;&lt;LI&gt;The load balancing rule assigns a frontend address to a backend pool.&amp;nbsp; You can enter the port that you want to allow (i.e. TCP/80).&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The load balancer is just forwarding traffic from 140.242.125.50:80 to the VM-Series untrust interfaces (private IP).&amp;nbsp; When the VM-Series receives the request, the firewall DNATs the traffic to the internal address in Azure.&amp;nbsp; We must also apply a dynami SNAT on the policy.&amp;nbsp; This is required because the public load balancer does not maintain flow symmetry.&amp;nbsp; The SNAT guarantee's synchronous responses for a given request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This post may also answer your question on how to NAT inbound traffic from a public LB:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338455#M879" target="_blank"&gt;https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338455#M879&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jul 2020 21:22:37 GMT</pubDate>
    <dc:creator>mmclimans</dc:creator>
    <dc:date>2020-07-16T21:22:37Z</dc:date>
    <item>
      <title>Azure deployment.  NAT rule assistance.</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-deployment-nat-rule-assistance/m-p/331857#M831</link>
      <description>&lt;P&gt;Howdy Group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a newbie question and wanted to ask the group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe I am thinking too hard about it.&lt;/P&gt;&lt;P&gt;Customer wanted a FW load balancer on both sides… and this was the screen capture of the solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SteveCantwell_0-1591356510602.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26058iC6D1BD9248D7AEB4/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SteveCantwell_0-1591356510602.jpeg" alt="SteveCantwell_0-1591356510602.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a nice easy question about incoming traffic and how it gets to its proper destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is surrounding NAT and the need to use it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a traditional FW, a session is created with a SA/DA pair, that hits the public interface of a FW, and the NAT rules show how the traffic will be evaluated and forwarded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But my experience in Azure and with LB, and how traffic gets from point A to point B is confusing me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets say… I have a web server at &lt;A href="http://www.my" target="_blank"&gt;www.my&lt;/A&gt; company.com, that resolves to a public IP of 140.242.125.50 (some made up IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How does the traffic session get created.&amp;nbsp; Walk me through the setup.&amp;nbsp; What is doing the NAT, to get to the private server IP, where the server resides in Azure, on the internal LB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Confusing pieces for me in Azure (limited experience).&amp;nbsp; You can bind a public IP to a private IP (just like you manage the FW).&lt;/P&gt;&lt;P&gt;So, in this case, Azure “magic” knows when I hit the public IP of my FW, to send traffic to the mgmt. IP.&amp;nbsp; This is perfect and makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now… company.com goes to the public IP as I described above.&lt;/P&gt;&lt;P&gt;My customer believes the external LB will forward the request to the nic-1 of the FW (or in my case 10.5.30.4).&lt;/P&gt;&lt;P&gt;We set up NAT rule to fwd traffic hitting 10.5.30.4:443 to internal server of 10.5.1.4 (DG of 10.5.1.1 or what I call the Azure magic IP)&lt;/P&gt;&lt;P&gt;Traffic failed.&amp;nbsp; Quite simply… as I understood it… my NAT rule did not translate my original src IP of 10.5.30.6 (test computer)&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;When the 10.5.1.4 server saw that the SA was on a different subnet, it fwd to its default gateway, and 10.5.1.1 fwd the packet (around the FW)… Azure magic.. asymmetric routing.&lt;/P&gt;&lt;P&gt;I did a DNAT where I did both a SNAT and a DNAT, so the traffic would respond back to my FW internal IP of 10.5.30.4, and the return traffic worked, and all is good.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But… it gets away from how/IF/why do I need a NAT rule (according to the customer)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My customer really thinks the external LB will fwd traffic to the backend pool (the nic-1 of either FW) and then the FW should have logic (NAT rule) to fwd it through the FW.&lt;/P&gt;&lt;P&gt;But I cannot get my head around… in Azure, not every single packet (from a public FQDN) would have a private IP of the PANW FW nic-1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am missing the logic of how we get the NAT rule defined.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To add complexity (maybe not….lol) is that I am using Panorama to manage both FWs, so now I have 2 devices in the same device group, with different IPs for nic-1… but…. Same NAT policy statement.&lt;/P&gt;&lt;P&gt;So, for example… if my nic-1 is 10.50.30.4 and 30.5, then this is how my NAT policy looks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SteveCantwell_1-1591356510609.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26060i72EB13E3B7552BBF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SteveCantwell_1-1591356510609.png" alt="SteveCantwell_1-1591356510609.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If my FW could be in Vwire mode, (which is what I think the customer believes.) then traffic from the external LB is fwd to the nic-1, which would automatically fwd to nic-2, which would fwd to the internal LB, to get to the web server in the backend pool.&lt;/P&gt;&lt;P&gt;But… that is not how it is… and I cannot find documentation (or have experience) on how it should be setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":squinting_face_with_tongue:"&gt;😝&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jun 2020 11:32:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-deployment-nat-rule-assistance/m-p/331857#M831</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-06-05T11:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Azure deployment.  NAT rule assistance.</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-deployment-nat-rule-assistance/m-p/339071#M881</link>
      <description>&lt;P&gt;I do not know if you are still looking for a resolution, but I have placed answers to some of your questions below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The public load balancer forwards the traffic to the VM-Series.&amp;nbsp; The load balancer itself is comprised of 3 major components.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Frontend IP Address.&amp;nbsp;&lt;UL&gt;&lt;LI&gt;This is the address that is assigned&amp;nbsp;to the public load balancer. This would be 140.242.125.50 in your example.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Backend Pool&lt;UL&gt;&lt;LI&gt;This is the "target" or "destination" of the load balancer.&amp;nbsp; This would be the VM-Series untrust interfaces.&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Load Balancing Rule&lt;UL&gt;&lt;LI&gt;The load balancing rule assigns a frontend address to a backend pool.&amp;nbsp; You can enter the port that you want to allow (i.e. TCP/80).&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The load balancer is just forwarding traffic from 140.242.125.50:80 to the VM-Series untrust interfaces (private IP).&amp;nbsp; When the VM-Series receives the request, the firewall DNATs the traffic to the internal address in Azure.&amp;nbsp; We must also apply a dynami SNAT on the policy.&amp;nbsp; This is required because the public load balancer does not maintain flow symmetry.&amp;nbsp; The SNAT guarantee's synchronous responses for a given request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This post may also answer your question on how to NAT inbound traffic from a public LB:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338455#M879" target="_blank"&gt;https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/active-active-gateways-in-azure-and-panorama/m-p/338455#M879&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 21:22:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-deployment-nat-rule-assistance/m-p/339071#M881</guid>
      <dc:creator>mmclimans</dc:creator>
      <dc:date>2020-07-16T21:22:37Z</dc:date>
    </item>
  </channel>
</rss>

