<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Get Started with VM-Series with AWS Gateway Load Balancer - A PoC Playbook Guide in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/ta-p/556300</link>
    <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Cyberpedia_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53489iCB0F97C8A00537C7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Cyberpedia_palo-alto-networks.jpg" alt="Title_Cyberpedia_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This article provides the steps to setup, demonstrate and teardown the Palo Alto Networks' VM-Series Next Generation Firewalls on AWS in integration with the &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;AWS Gateway Load Balancer&lt;/STRONG&gt;&lt;/FONT&gt;. This integration is the recommended design on AWS and you can find more information about the integration on the official documentation portal &lt;A title="VM-Series Integration with an AWS Gateway Load Balancer" href="https://docs.paloaltonetworks.com/vm-series/10-1/vm-series-deployment/set-up-the-vm-series-firewall-on-aws/vm-series-integration-with-gateway-load-balancer" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This article is intended for anyone who wishes to get some hands-on experience with the VM-Series appliance on AWS, an understanding of how automation can be leveraged to easily deploy and bootstrap the firewalls and also how the integration of the Gateway Load Balancer, Transit Gateway and the VM-Series firewall works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Prerequisites&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;An AWS Account with the following permissions:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Subscribe to services on the AWS Marketplace.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Create, Delete all networking resources like VPCs, Subnets, Route tables, etc.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Create, Delete EC2 instances, Elastic IPs.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Optional: AWS CloudShell for executing the setup script.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;If you do not have access to AWS CloudShell, then additionally you would also need:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Git and Terraform installed&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;AWS Access Key and Secret Keys&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;SSH Key-Pair to connect to the EC2 Instances.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Optional: AWS CLI to configure the AWS credentials&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Things to Consider&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;This PoC deploys a PAYG version of the VM-Series appliance from the AWS Marketplace, so there is no additional licensing required. Free trial available for 15 days.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The automation in this PoC bootstraps the VM-Series NGFW with bare minimum configuration. The bootstrapping is done using AWS S3 bucket which is also created as part of the setup.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The VM-Series NGFW deployed in this PoC secures Inbound, Outbound and East-West traffic to 2 Linux servers connected as spokes through a Transit Gateway.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;This PoC can be deployed in any region, provided the VM-Series PAYG Bundle 2 appliance is available in that region.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Autoscaling is not included in this PoC.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Panorama is not included in this PoC.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Steps to Deploy&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;H3&gt;&lt;STRONG&gt;With AWS CloudShell&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Login to your AWS Account&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Open “AWS Marketplace Subscriptions” and Subscribe to the VM-Series PAYG service at the following link.&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://aws.amazon.com/marketplace/pp?sku=hd44w1chf26uv4p52cdynb2o" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://aws.amazon.com/marketplace/pp?sku=hd44w1chf26uv4p52cdynb2o&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Open AWS Cloud Shell and make sure that your workspace is clean.&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;This is because disk size on CloudShell is limited and terraform would need to download modules required for resource deployment.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Clone the GitHub repository.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;git clone https://github.com/PaloAltoNetworks/aws-vmseries-gwlb-poc.git &amp;amp;&amp;amp; cd aws-vmseries-gwlb-poc&lt;/LI-CODE&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Run the setup script.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;./setup.sh&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Without AWS CloudShell&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Login to your AWS Account&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Open “AWS Marketplace Subscriptions” and Subscribe to the VM-Series PAYG service at the following link.&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://aws.amazon.com/marketplace/pp?sku=hd44w1chf26uv4p52cdynb2o" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://aws.amazon.com/marketplace/pp?sku=hd44w1chf26uv4p52cdynb2o&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Create an SSH Key-Pair and download the private key.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Configure the IAM policies for the account and download the Access Key and Secret Key credentials.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Now, on your local workspace, where Git and Terraform has been installed, clone the GitHub repository.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;git clone https://github.com/PaloAltoNetworks/aws-vmseries-gwlb-poc.git &amp;amp;&amp;amp; cd aws-vmseries-gwlb-poc/terraform/vmseries&lt;/LI-CODE&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Open the file named “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;student.auto.tfvars&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;”.&lt;/SPAN&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;vi student.auto.tfvars&lt;/LI-CODE&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Update the following variables on the file with the appropriate values.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;access-key      = ""
secret-key      = ""
region          = ""
ssh-key-name    = ""&lt;/LI-CODE&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Run the following commands.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;terraform init
terraform plan		&amp;lt;&amp;lt;&amp;lt;&amp;lt; Ensure that there are no errors seen in the response of this command.
terraform apply -auto-approve
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5" color="#FF6600"&gt;Lab Topology&lt;/FONT&gt;&lt;/H1&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 1_AWS-Gateway-Load-Balancer_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53491iF4D6CA7D439DE871/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 1_AWS-Gateway-Load-Balancer_palo-alto-networks.png" alt="Fig 1_AWS-Gateway-Load-Balancer_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;VM-Series Walkthrough&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;H3&gt;&lt;STRONG&gt;Login&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;On the AWS CloudShell terminal or your local workspace from where you ran the terraform commands, run the following commands to get the VM-Series URL.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;cd ../aws-vmseries-gwlb-poc/terraform/vmseries
terraform output FIREWALL_IP_ADDRESS&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 2_AWS-Gateway-Load-Balancer_palo-alto-networks.png" style="width: 683px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53492i156B110E3D379765/image-dimensions/683x176?v=v2" width="683" height="176" role="button" title="Fig 2_AWS-Gateway-Load-Balancer_palo-alto-networks.png" alt="Fig 2_AWS-Gateway-Load-Balancer_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Copy the URL in the response of the above command and paste it on the browser tab.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Login using the credentials provided.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;Username – admin
Password – Paloalto@1&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;The firewall is bootstrapped with two policies:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;allow-all&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;explicit-deny&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 3_AWS-Gateway-Load-Balancer_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53493i5AC41F3602D57DF0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 3_AWS-Gateway-Load-Balancer_palo-alto-networks.png" alt="Fig 3_AWS-Gateway-Load-Balancer_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Logging&lt;/STRONG&gt;&lt;/H3&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 4_AWS-Gateway-Load-Balancer_palo-alto-networks.png" style="width: 997px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53494iD03E046483D72735/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 4_AWS-Gateway-Load-Balancer_palo-alto-networks.png" alt="Fig 4_AWS-Gateway-Load-Balancer_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5" color="#FF6600"&gt;&lt;STRONG&gt;Connecting to the servers&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;You can connect to the servers directly by selecting the server and clicking in "Connect" on the EC2 console. Ensure that the login name is "ec2-user".&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Alternatively, you can also connect to the servers directly from your terminal using the SSH private key that you downloaded as part of the &lt;/SPAN&gt;&lt;A href="https://docs.google.com/presentation/d/1QNzzB8XQIfxK9Kfz_nNmRpEDnyCnygUeJg_bvM2Itlk/edit#slide=id.g2775313983c_0_157" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Prerequisites&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;You could also use AWS CLI to connect to the servers by running the below command;&lt;/SPAN&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;aws ec2-instance-connect ssh --instance-id &amp;lt;instance-id&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Sample Activities&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Add/Update the Security policies to allow/deny ssh traffic.&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Verify by trying to connect to the servers.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Add/Update the Security policies to allow/deny ICMP traffic.&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Verify by trying to ping one server from the other.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Update the Vulnerability Protection on the allow security policy to “strict”.&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Verify by trying to download the malware file on any one of the servers.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="python"&gt;wget http://www.eicar.org/download/eicar.com.txt&lt;/LI-CODE&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;&lt;SPAN&gt;You should see the Threat log on the Firewall as shown below.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 5_AWS-Gateway-Load-Balancer_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53495iB5C72E1E235B341E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 5_AWS-Gateway-Load-Balancer_palo-alto-networks.png" alt="Fig 5_AWS-Gateway-Load-Balancer_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT size="5" color="#FF6600"&gt;&lt;STRONG&gt;Steps to Teardown&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;Run the following commands to tear down the PoC lab:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;cd ../aws-vmseries-gwlb-poc/terraform/vmseries
terraform destroy -auto-approve&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;While running the 1st command, make sure that you are in the root folder of the cloned Github repository.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;References&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://github.com/PaloAltoNetworks/aws-vmseries-gwlb-poc" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Terraform code for this PoC&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://docs.paloaltonetworks.com/vm-series/11-0/vm-series-deployment/set-up-the-vm-series-firewall-on-aws/vm-series-integration-with-gateway-load-balancer" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;VM-Series integration with the AWS Gateway Load Balancer&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.paloaltonetworks.com/resources/guides/intelligent-architectures-aws-reference-architecture" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;VM-Series on AWS – Reference Architecture&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://registry.terraform.io/modules/PaloAltoNetworks/vmseries-modules/aws/latest" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Terraform modules for VM-Series on AWS&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.youtube.com/watch?v=GH6S3HRGPuI&amp;amp;pp=ygUtcGFsbyBhbHRvIGF3cyBnYXRld2F5IGxvYWQgYmFsYW5jZXIgdm0tc2VyaWVz" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Video – VM-Series with AWS GWLB Integration Overview&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://www.youtube.com/watch?v=c28ZwlhCIWE&amp;amp;pp=ygUtcGFsbyBhbHRvIGF3cyBnYXRld2F5IGxvYWQgYmFsYW5jZXIgdm0tc2VyaWVz" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Video – Step by Step guide to deploy VM-Series with AWS GWLB&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 06 Sep 2023 18:58:57 GMT</pubDate>
    <dc:creator>shv</dc:creator>
    <dc:date>2023-09-06T18:58:57Z</dc:date>
    <item>
      <title>Get Started with VM-Series with AWS Gateway Load Balancer - A PoC Playbook Guide</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/ta-p/556300</link>
      <description>&lt;P&gt;This article provides the steps to setup, demonstrate and teardown the Palo Alto Networks' VM-Series Next Generation Firewalls on AWS in integration with the AWS Gateway Load Balancer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Cyberpedia_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53490i175191517383E828/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Cyberpedia_palo-alto-networks.jpg" alt="Title_Cyberpedia_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 18:58:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/ta-p/556300</guid>
      <dc:creator>shv</dc:creator>
      <dc:date>2023-09-06T18:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Get Started with VM-Series with AWS Gateway Load Balancer - A PoC Playbook Guide</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/tac-p/595512#M742</link>
      <description>&lt;P&gt;kepe getting this error :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error: no matching EC2 Key Pair found&lt;BR /&gt;│&lt;BR /&gt;│ with module.vulnerable-vpc.data.aws_key_pair.key_name,&lt;BR /&gt;│ on ../modules/vpc/main.tf line 154, in data "aws_key_pair" "key_name":&lt;BR /&gt;│ 154: data "aws_key_pair" "key_name" {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can i modify the main.tf ?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 20:17:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/tac-p/595512#M742</guid>
      <dc:creator>VSingh26</dc:creator>
      <dc:date>2024-08-21T20:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Get Started with VM-Series with AWS Gateway Load Balancer - A PoC Playbook Guide</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/tac-p/595579#M743</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/259756473"&gt;@VSingh26&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Absolutely. Once you have downloaded the code,&amp;nbsp; you can make modifications relative to your environment as required.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 05:40:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/get-started-with-vm-series-with-aws-gateway-load-balancer-a-poc/tac-p/595579#M743</guid>
      <dc:creator>shv</dc:creator>
      <dc:date>2024-08-22T05:40:06Z</dc:date>
    </item>
  </channel>
</rss>

