<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure to OnPrem Connectivity issue in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246511#M6622</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/826846661"&gt;@H.Thiam&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="248" data-end="279"&gt;Thanks for sharing all of that.&lt;/P&gt;
&lt;P data-start="248" data-end="279"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;I’m not aware of any Palo Alto Networks–specific limitation that would prevent P2S-sourced traffic from transiting an Azure-to-on-prem S2S VPN if that traffic actually reaches the firewall. Based on what you’ve shared, the proxy IDs look correct, and static routing on the Palo Alto side is likely in place given that traffic from Azure VMs (10.20.0.0/24) to on-prem is working as expected.&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;What I would do next is validate whether your PA is actually receiving P2S-sourced traffic and double check that your return route for the P2S 10.40.1.0/24 exists in the same VR as the tunnel interface, pointing back to that tunnel int.&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;If decap counters do not increment then that would strongly indicate the traffic from P2S is not being forwarded correctly from the Azure into the S2S.&amp;nbsp;Since the S2S tunnel itself is confirmed working (Azure VM traffic reaches on-prem), this makes me more suspicious of the Azure P2S-to-S2S forwarding or routing config rather than a limitation on the PA end.&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;Please let us know if you find out anything else!&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 25 Jan 2026 17:58:37 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2026-01-25T17:58:37Z</dc:date>
    <item>
      <title>Azure to OnPrem Connectivity issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246441#M6615</link>
      <description>&lt;P class="isSelectedEnd lia-align-justify"&gt;&lt;SPAN&gt;We have migrated our on-premises firewall from FortiGate to Palo Alto and are experiencing an issue with VPN traffic routing that previously worked as expected.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&lt;SPAN&gt;We have an Azure Point-to-Site (P2S) VPN and an Azure-to-Corporate Site-to-Site (S2S) VPN. A P2S client with IP address &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.40.1.2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; is unable to access resources on the Corporate LAN (&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;192.168.62.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, e.g. &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;192.168.62.2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;) via the S2S tunnel.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&lt;SPAN&gt;However, traffic from Azure virtual machines in subnet &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.20.0.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; (e.g. &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.20.0.4&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;) can successfully access &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;192.168.62.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, confirming that the S2S tunnel itself is operational.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;This setup was working correctly prior to the migration when a FortiGate firewall was in place.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&lt;SPAN&gt;The IPsec proxy IDs on the Palo Alto firewall are configured as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="lia-align-justify" data-spread="false"&gt;
&lt;LI&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Local: &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;192.168.62.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, Remote: &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.40.1.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Local: &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;192.168.62.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, Remote: &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.20.0.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&lt;SPAN&gt;Appropriate security policies and static routes are configured on the firewall. The P2S client routing table also contains a route for &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;192.168.62.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, and traffic is sent into the VPN tunnel from the client.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Despite this, no traffic sourced from &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.40.1.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; is observed in the Palo Alto traffic or threat logs, while traffic from &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;10.20.0.0/24&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; is logged and permitted.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&lt;SPAN&gt;Given that Azure VM traffic can reach the Corporate LAN but P2S client traffic cannot, we are trying to determine whether there is a configuration requirement or limitation on the Palo Alto side (e.g. IPsec, routing, or proxy-ID handling) that could prevent P2S-sourced traffic from being processed or logged. The NGFW is managed through Strata Cloud Manager .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;Any guidance on additional configuration or validation steps on the Palo Alto firewall would be appreciated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2026 15:34:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246441#M6615</guid>
      <dc:creator>H.Thiam</dc:creator>
      <dc:date>2026-01-23T15:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to OnPrem Connectivity issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246511#M6622</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/826846661"&gt;@H.Thiam&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="248" data-end="279"&gt;Thanks for sharing all of that.&lt;/P&gt;
&lt;P data-start="248" data-end="279"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;I’m not aware of any Palo Alto Networks–specific limitation that would prevent P2S-sourced traffic from transiting an Azure-to-on-prem S2S VPN if that traffic actually reaches the firewall. Based on what you’ve shared, the proxy IDs look correct, and static routing on the Palo Alto side is likely in place given that traffic from Azure VMs (10.20.0.0/24) to on-prem is working as expected.&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;What I would do next is validate whether your PA is actually receiving P2S-sourced traffic and double check that your return route for the P2S 10.40.1.0/24 exists in the same VR as the tunnel interface, pointing back to that tunnel int.&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;If decap counters do not increment then that would strongly indicate the traffic from P2S is not being forwarded correctly from the Azure into the S2S.&amp;nbsp;Since the S2S tunnel itself is confirmed working (Azure VM traffic reaches on-prem), this makes me more suspicious of the Azure P2S-to-S2S forwarding or routing config rather than a limitation on the PA end.&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;Please let us know if you find out anything else!&lt;/P&gt;
&lt;P data-start="281" data-end="675"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jan 2026 17:58:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246511#M6622</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2026-01-25T17:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to OnPrem Connectivity issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246595#M6626</link>
      <description>&lt;P&gt;Thank you for the feedback and thorough analysis .&amp;nbsp;&lt;SPAN&gt;&amp;nbsp; I am still quite perplexed at how the firewall local configuration would impact the routing in Azure so&amp;nbsp;&lt;/SPAN&gt;I am increasingly thinking&amp;nbsp; that&amp;nbsp;&lt;SPAN&gt;the issue may reside in Azure . I will&amp;nbsp; try to validate your suggestions and see what comes&amp;nbsp; out of it .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 16:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-to-onprem-connectivity-issue/m-p/1246595#M6626</guid>
      <dc:creator>H.Thiam</dc:creator>
      <dc:date>2026-01-26T16:02:25Z</dc:date>
    </item>
  </channel>
</rss>

