<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2 VM series HA Setup in Azure with ELB in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/2-vm-series-ha-setup-in-azure-with-elb/m-p/445787#M100502</link>
    <description>&lt;P&gt;For the deployments I've overseen for my customers, most actually went with a dedicated deployment model (1 NGFW for egress, 1 for ingress). This is because Azure is VM-based, so spinning up a passive instance and actively shaping traffic to it does take time as noted, and no public cloud provider puts an SLA on their API calls. I've seen up to 40 minutes, before. Please see our technical documentation on this &lt;A href="https://docs.paloaltonetworks.com/vm-series/8-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/about-the-vm-series-firewall-on-azure/support-for-high-availability-on-vm-series-azure.html" target="_self"&gt;here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The load balancer sandwich allows for horizontal scaling, if you need additional bandwidth/compute resources to scale up. For example, you could active/active an ingress pair for your requirement of "a firewall ready to move traffic during upgrades."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See our detailed template for this deployment &lt;A href="https://docs.paloaltonetworks.com/vm-series/8-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-and-azure-application-gateway-template/vm-series-and-azure-application-gateway-template.html#id2b147556-a0fe-48c4-9174-0ad6475a3193" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically you just need to add interface profiles to each untrust/trust interface allowing ping access for the health polling in Azure. Then you would write rules of 0.0.0.0/0 next hop out the untrust interface and the same for trust. In security policy you would specify which applications, users, IP addresses, etc are allowed to send what traffic where. The NAT should be handled by your external application load balancer.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Nov 2021 15:30:02 GMT</pubDate>
    <dc:creator>LAYER_8</dc:creator>
    <dc:date>2021-11-05T15:30:02Z</dc:date>
    <item>
      <title>2 VM series HA Setup in Azure with ELB</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-vm-series-ha-setup-in-azure-with-elb/m-p/445591#M100487</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've setup 2 VM series in a sandwich topology and want to know the following in terms of the setup:&lt;/P&gt;&lt;P&gt;How to configure the 2 virtual routers being trust and untrust for the static routes that point to the ELB?&lt;/P&gt;&lt;P&gt;How to configure the NAT for outbound traffic?&lt;/P&gt;&lt;P&gt;What are the advantages of having a ILB, if there's no applications that require LB, then is there any advantage?&lt;/P&gt;&lt;P&gt;Is it still best practise to setup HA with the 2 VMs while having the ELB do the failover? I have read that the VM HA failover can take 3-10 mins because of the time it takes for the floating IP to move across.&lt;/P&gt;&lt;P&gt;For the 2 VM series I have them on 10.0.6 and I have also read that any versions higher HA has issues.&lt;/P&gt;&lt;P&gt;The main requirement is to have the secondary VM to take over when the primary is doing a firmware upgrade or any other maintenance tasks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 23:44:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-vm-series-ha-setup-in-azure-with-elb/m-p/445591#M100487</guid>
      <dc:creator>Dynam0</dc:creator>
      <dc:date>2021-11-04T23:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2 VM series HA Setup in Azure with ELB</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-vm-series-ha-setup-in-azure-with-elb/m-p/445787#M100502</link>
      <description>&lt;P&gt;For the deployments I've overseen for my customers, most actually went with a dedicated deployment model (1 NGFW for egress, 1 for ingress). This is because Azure is VM-based, so spinning up a passive instance and actively shaping traffic to it does take time as noted, and no public cloud provider puts an SLA on their API calls. I've seen up to 40 minutes, before. Please see our technical documentation on this &lt;A href="https://docs.paloaltonetworks.com/vm-series/8-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/about-the-vm-series-firewall-on-azure/support-for-high-availability-on-vm-series-azure.html" target="_self"&gt;here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The load balancer sandwich allows for horizontal scaling, if you need additional bandwidth/compute resources to scale up. For example, you could active/active an ingress pair for your requirement of "a firewall ready to move traffic during upgrades."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See our detailed template for this deployment &lt;A href="https://docs.paloaltonetworks.com/vm-series/8-1/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/deploy-the-vm-series-and-azure-application-gateway-template/vm-series-and-azure-application-gateway-template.html#id2b147556-a0fe-48c4-9174-0ad6475a3193" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically you just need to add interface profiles to each untrust/trust interface allowing ping access for the health polling in Azure. Then you would write rules of 0.0.0.0/0 next hop out the untrust interface and the same for trust. In security policy you would specify which applications, users, IP addresses, etc are allowed to send what traffic where. The NAT should be handled by your external application load balancer.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Nov 2021 15:30:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-vm-series-ha-setup-in-azure-with-elb/m-p/445787#M100502</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-11-05T15:30:02Z</dc:date>
    </item>
  </channel>
</rss>

