<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Request for SD-WAN Deployment Documentation in Azure in Advanced SD-WAN for NGFW Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253861#M64</link>
    <description>&lt;P&gt;Hi&amp;nbsp;kiwi&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for the sharing detail information, however ,the current SD-WAN deployment is configured in a full mesh topology (not hub-and-branch). We now need to onboard an Azure VM-Series (VM-500) firewall into the existing SD-WAN setup as a new branch.&lt;/P&gt;&lt;P&gt;To achieve this, I am planning to use the public IP assigned to the untrust interface on the Azure firewall for establishing Auto VPN/IPsec tunnels with the other branch offices.&lt;/P&gt;&lt;P&gt;Please let me know if this approach looks good or if you have any recommendations.&lt;/P&gt;</description>
    <pubDate>Wed, 13 May 2026 03:00:40 GMT</pubDate>
    <dc:creator>kganesh</dc:creator>
    <dc:date>2026-05-13T03:00:40Z</dc:date>
    <item>
      <title>Request for SD-WAN Deployment Documentation in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1252670#M58</link>
      <description>&lt;P&gt;I need to integrate the Palo Alto firewalls deployed in Azure into our existing SD-WAN setup. Currently, seven offices are already connected through SD-WAN. The Azure VM‑500 firewalls are configured in an active‑passive setup and are managed &lt;STRONG&gt;via Panorama&lt;/STRONG&gt;.&lt;BR /&gt;It would be very helpful if you could share any SD-WAN deployment documentation or reference material to guide this integration.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 16:04:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1252670#M58</guid>
      <dc:creator>kganesh</dc:creator>
      <dc:date>2026-04-21T16:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Request for SD-WAN Deployment Documentation in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253063#M59</link>
      <description>&lt;P&gt;At a high level, the recommended approach is to treat Azure as another SD-WAN site (or hub) rather than just a standalone security zone. You can terminate SD-WAN tunnels (IPsec or GRE/IPsec depending on your vendor) directly on the VM-500 firewalls.&amp;nbsp; &amp;nbsp;Each of your seven branch offices would then establish tunnels to the Azure firewalls, allowing centralized inspection and routing. If your SD-WAN solution supports dynamic path selection, you can integrate Azure as an additional path and apply policies for traffic steering (e.g., SaaS via internet breakout, internal apps via Azure).&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 06:07:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253063#M59</guid>
      <dc:creator>lucy98dana</dc:creator>
      <dc:date>2026-04-27T06:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: Request for SD-WAN Deployment Documentation in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253227#M61</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/759979867"&gt;@kganesh&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;On-prem firewalls use Gratuitous ARP (GARP) to handle failover, but Azure doesn't support GARP afaik.&lt;/P&gt;
&lt;UL data-path-to-node="4"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="4,0,0"&gt;Treat Azure as your "Hub." You’ll terminate your SD-WAN tunnels on an Azure Standard Load Balancer (ALB) front-end IP rather than the firewalls directly.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="4,1,0"&gt;Health Probes: The ALB uses health probes to monitor the VM-500s. It only sends SD-WAN traffic to whichever unit is currently "Active," ensuring your branch offices always stay connected to the right gateway.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="6"&gt;Since you’re already using Panorama, do not manually build these IPsec tunnels one by one.&lt;/P&gt;
&lt;UL data-path-to-node="7"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="7,0,0"&gt;The Plugin: Install the SD-WAN Plugin for Panorama.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="7,1,0"&gt;The Workflow: Define your Azure VM-500s as a "Hub" and your seven offices as "Branches". Panorama will then automate the entire mess of IKE gateways, IPsec profiles, and BGP peering across the whole environment.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="9"&gt;For a setup with seven offices, static routes will eventually break your brain so :&lt;/P&gt;
&lt;UL data-path-to-node="10"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="10,0,0"&gt;Use BGP to propagate routes between Azure and your offices.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="10,1,0"&gt;If you want to avoid managing dozens of User-Defined Routes (UDRs) in Azure, look into Azure Route Server (ARS). It allows your firewalls to "talk" directly to the Azure VNet, automatically updating the routing table whenever a new branch subnet is added.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-path-to-node="11" /&gt;
&lt;P data-path-to-node="12"&gt;Some reference links:&lt;/P&gt;
&lt;OL start="1" data-path-to-node="13"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="13,0,0"&gt;Palo Alto SD-WAN Admin Guide: Specifically the &lt;A class="ng-star-inserted" href="https://docs.paloaltonetworks.com/sd-wan/administration/enable-sd-wan-with-auto-vpn/add-sd-wan-branch-or-hub-firewall" rel="noopener" target="_blank"&gt;Enable SD-WAN with Auto VPN&lt;/A&gt; section.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="13,1,0"&gt;Azure Architecture Center: The &lt;A class="ng-star-inserted" href="https://learn.microsoft.com/en-us/azure/architecture/networking/guide/network-virtual-appliance-high-availability" rel="noopener" target="_blank"&gt;Highly Available NVA Guide&lt;/A&gt; explains why you need that Load Balancer.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="13,2,0"&gt;Panorama Plugin Setup: &lt;A class="ng-star-inserted" href="https://docs.paloaltonetworks.com/sd-wan/activation-and-onboarding/install-the-sd-wan-plugin" rel="noopener" target="_blank"&gt;How to install and configure the SD-WAN plugin&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2026 13:58:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253227#M61</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-04-28T13:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Request for SD-WAN Deployment Documentation in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253861#M64</link>
      <description>&lt;P&gt;Hi&amp;nbsp;kiwi&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for the sharing detail information, however ,the current SD-WAN deployment is configured in a full mesh topology (not hub-and-branch). We now need to onboard an Azure VM-Series (VM-500) firewall into the existing SD-WAN setup as a new branch.&lt;/P&gt;&lt;P&gt;To achieve this, I am planning to use the public IP assigned to the untrust interface on the Azure firewall for establishing Auto VPN/IPsec tunnels with the other branch offices.&lt;/P&gt;&lt;P&gt;Please let me know if this approach looks good or if you have any recommendations.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2026 03:00:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-sd-wan-for-ngfw/request-for-sd-wan-deployment-documentation-in-azure/m-p/1253861#M64</guid>
      <dc:creator>kganesh</dc:creator>
      <dc:date>2026-05-13T03:00:40Z</dc:date>
    </item>
  </channel>
</rss>

