<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure VM-300 Firewall subinterfaces and multiple VNETs in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-vm-300-firewall-subinterfaces-and-multiple-vnets/m-p/1234164#M6098</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42888"&gt;@ocejiasa&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You can't use sub-interfaces for something like this in Azure. What a lot of deployments will do is simply have a single interface that acts as the "core" zone for all subnets in Azure. Then you'll create UDRs and apply them to all VNETs that are peered with the VNET the PAN is in. The UDRs will direct all traffic through the PAN across that zone and you can simply override the intrazone-default policy to deny and build out policies however you need it.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Jul 2025 21:50:24 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-07-16T21:50:24Z</dc:date>
    <item>
      <title>Azure VM-300 Firewall subinterfaces and multiple VNETs</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-vm-300-firewall-subinterfaces-and-multiple-vnets/m-p/1233731#M6087</link>
      <description>&lt;P&gt;I am running a VM-300 series firewall in Azure. I currently have 4 interfaces on the device (management, HA, untrust and trust). In Azure I have 8 VNETs. I would like to send all VNET to VNET traffic to the firewall for inspection and policy application. Can I create sub-interfaces (one zone per sub interface) on the VM-300 to accomplish this? If not, what other options do I have?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 13:50:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-vm-300-firewall-subinterfaces-and-multiple-vnets/m-p/1233731#M6087</guid>
      <dc:creator>ocejiasa</dc:creator>
      <dc:date>2025-07-10T13:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VM-300 Firewall subinterfaces and multiple VNETs</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-vm-300-firewall-subinterfaces-and-multiple-vnets/m-p/1234164#M6098</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42888"&gt;@ocejiasa&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You can't use sub-interfaces for something like this in Azure. What a lot of deployments will do is simply have a single interface that acts as the "core" zone for all subnets in Azure. Then you'll create UDRs and apply them to all VNETs that are peered with the VNET the PAN is in. The UDRs will direct all traffic through the PAN across that zone and you can simply override the intrazone-default policy to deny and build out policies however you need it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 21:50:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-vm-300-firewall-subinterfaces-and-multiple-vnets/m-p/1234164#M6098</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-07-16T21:50:24Z</dc:date>
    </item>
  </channel>
</rss>

