<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure NGFW VNet Deployment - No Outbound Internet Access in Cloud NGFW for Azure Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579407#M35</link>
    <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/257504"&gt;@GraysonDenny&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(28,28,28);font-size:14px;"&gt;Can you access the local firewall and see if there are any logs? Have you assigned Azure Public IP Adresses on network interface of Palo-vm?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Mar 2024 06:52:13 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2024-03-06T06:52:13Z</dc:date>
    <item>
      <title>Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579330#M34</link>
      <description>&lt;P&gt;Deployed a NGFW deployment for a customer. Using the VNet deployment, not VWAN. Everything is green (DG and Template) and healthy from the Panorama aspect.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We have created a UDR in a test application VNET, that points only a default route to the NGFW firewalls.&lt;BR /&gt;&lt;BR /&gt;East/West connectivity works great. We are also able to access everything across the expressroute as well.&lt;BR /&gt;&lt;BR /&gt;However, when we trying to ping or curl a website from the test application linux VM from above, we are not able too. The really weird thing is that we do not see ANY logs in Panorama for this connection. We overwrote the default rules, so we could log all traffic, allowed or denied. The Source NAT is configured in the Azure portal.&lt;BR /&gt;&lt;BR /&gt;We deployed a second VNet, same issue. There are no NSGs applied to the VM NICS. UDR is good, confirmed via Network Watcher connection testing. I am at a complete loss on this.&lt;BR /&gt;&lt;BR /&gt;Also, when opening a ticket on this, do we open it with Microsoft or Palo first (or just do both).&lt;BR /&gt;&lt;BR /&gt;Edit: I confirmed outbound works directly from the VM when I change the UDR to Internet just to validate nothing is wrong with the VM.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2024 19:33:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579330#M34</guid>
      <dc:creator>GraysonDenny</dc:creator>
      <dc:date>2024-03-05T19:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579407#M35</link>
      <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/257504"&gt;@GraysonDenny&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(28,28,28);font-size:14px;"&gt;Can you access the local firewall and see if there are any logs? Have you assigned Azure Public IP Adresses on network interface of Palo-vm?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 06:52:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579407#M35</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-03-06T06:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579497#M36</link>
      <description>&lt;P&gt;You can't access the firewalls locally, these are the SaaS firewalls, where "I" don't have access to them.&lt;BR /&gt;&lt;BR /&gt;Public IP's are on them.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 17:48:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/579497#M36</guid>
      <dc:creator>GraysonDenny</dc:creator>
      <dc:date>2024-03-06T17:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/580037#M37</link>
      <description>&lt;P&gt;Had an similair or same issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traffic north sound started working after i placed an Networks security group on the NGFW SAAS Private subnet.&lt;/P&gt;
&lt;P&gt;The NSG did need an inbound rule from virtualnetwork to Internet -&amp;gt; allow gave it an any any....&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 07:25:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/580037#M37</guid>
      <dc:creator>skorbee</dc:creator>
      <dc:date>2024-03-12T07:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/580937#M38</link>
      <description>&lt;P&gt;This was indeed my issue. According to the Palo documentation, when the SaaS firewalls get deployed in the Azure Portal, the template is supposed to deploy the NSGs and attach them to the private subnet. However, that is not the case, Azure does not deploy the required NSGs like documentation suggests. So would be nice if someone from Palo could add that to the deployment guide, because no where does it mention that, that I can find.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 16:15:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/580937#M38</guid>
      <dc:creator>GraysonDenny</dc:creator>
      <dc:date>2024-03-19T16:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/586222#M40</link>
      <description>&lt;P&gt;Does anyone find the fix for this issue ? am having an similar issue where we are unable to access the internet via Cloud NGFW and no traffic seen on Panorama and no hits on the policy and SNAT&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 20:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/586222#M40</guid>
      <dc:creator>Karthikkumar</dc:creator>
      <dc:date>2024-05-08T20:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/595621#M42</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/257504"&gt;@GraysonDenny&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You mean to tell me that a NSG HAS to be deployed to the vnets in question in order for this to work?&amp;nbsp; &amp;nbsp; So there must be some qualification in the background in Azure itself in order to get this to work?&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Doesn't traffic in Azure vnets just flow with a base NSG either way- Even if you didnt have a palo firewall installed, doesn't a vnet get a "default" nsg that azure just assigns in the background that is basically Any Any?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 13:45:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/595621#M42</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2024-08-22T13:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Azure NGFW VNet Deployment - No Outbound Internet Access</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/1244696#M54</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/157358"&gt;@Sec101&lt;/a&gt;&amp;nbsp;We deployed Cloud NGFW in Azure and we were unable to see the Internet Traffic Inbound to the Cloud NGFW.&lt;/P&gt;
&lt;P&gt;As per PA it use LB and we need to config NSG for Public Subnet to allow 443 traffic.&lt;/P&gt;
&lt;P&gt;Agree there is no public documentation on it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 26 Dec 2025 17:12:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-discussions/azure-ngfw-vnet-deployment-no-outbound-internet-access/m-p/1244696#M54</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2025-12-26T17:12:13Z</dc:date>
    </item>
  </channel>
</rss>

