<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protecting private clouds in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26022#M18980</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe Azure supports standard IPSec VPN site2site, so what you can do is to use PAN firewall to terminate the VPN connection from Azure cloud back to your main office. I have a customer that is deploying a similar solution, but using AWS instead of Azure.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Oct 2013 21:36:22 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2013-10-29T21:36:22Z</dc:date>
    <item>
      <title>Protecting private clouds</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26021#M18979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are in the process of testing the deployment of Internet-facing services into Azure, such that they are accessible from the public Internet via Azure but have a VPN connection back into our environment. Obviously in this scenario we must rely on Microsoft to protect the public-facing service, which removes all visibility and undermines our investment in our firewalls. (We considered deploying Azure as an extension of the DMZ protected by our on-prem firewalls, but for performance reasons decided against it for the moment.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone else considered a similar deployment, and what have been your experiences?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is PAN working on solutions to allow customers to somehow accommodate this scenario using their products/services?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Oct 2013 16:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26021#M18979</guid>
      <dc:creator>KGC</dc:creator>
      <dc:date>2013-10-29T16:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting private clouds</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26022#M18980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe Azure supports standard IPSec VPN site2site, so what you can do is to use PAN firewall to terminate the VPN connection from Azure cloud back to your main office. I have a customer that is deploying a similar solution, but using AWS instead of Azure.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Oct 2013 21:36:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26022#M18980</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-10-29T21:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting private clouds</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26023#M18981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is essentially what we are doing, the challenge is that they want to connect to the Azure-hosted app directly via the MS cloud, and not via our PAN firewall. We obviously can't deploy our own VM PAN out in Azure, so I am looking for options.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2013 15:20:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/protecting-private-clouds/m-p/26023#M18981</guid>
      <dc:creator>KGC</dc:creator>
      <dc:date>2013-10-30T15:20:16Z</dc:date>
    </item>
  </channel>
</rss>

