<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Source and Destination NAT for PA-VM on Azure Cloud with VPN tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/332785#M84112</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am working on a project to deploy a Cluster of two Palo Alto VM's on Azure. While designing the solution with an internal and external Loadbalancer (you can see the picture in my post) i don't know if i need to configure Public IP address in both Firewall's external interfaces to handle a source NAT for internal resources and also a destination NAT or just put a public IP address in the external loadbalancer only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need VPN IPSEC tunnels in the external interfaces, Public IP adresses have to be configured directly on the Firewall in this case? if no (only in external loadbalancer), in the VPN configuration the Peer IP address should be the loadbalancer Public IP address ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Louey&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image_Palo_Forum_NAT.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26168i7F23A6EF67DD3D8F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Image_Palo_Forum_NAT.PNG" alt="Image_Palo_Forum_NAT.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jun 2020 13:50:56 GMT</pubDate>
    <dc:creator>louey11</dc:creator>
    <dc:date>2020-06-10T13:50:56Z</dc:date>
    <item>
      <title>Source and Destination NAT for PA-VM on Azure Cloud with VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/332785#M84112</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am working on a project to deploy a Cluster of two Palo Alto VM's on Azure. While designing the solution with an internal and external Loadbalancer (you can see the picture in my post) i don't know if i need to configure Public IP address in both Firewall's external interfaces to handle a source NAT for internal resources and also a destination NAT or just put a public IP address in the external loadbalancer only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need VPN IPSEC tunnels in the external interfaces, Public IP adresses have to be configured directly on the Firewall in this case? if no (only in external loadbalancer), in the VPN configuration the Peer IP address should be the loadbalancer Public IP address ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Louey&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image_Palo_Forum_NAT.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26168i7F23A6EF67DD3D8F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Image_Palo_Forum_NAT.PNG" alt="Image_Palo_Forum_NAT.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 13:50:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/332785#M84112</guid>
      <dc:creator>louey11</dc:creator>
      <dc:date>2020-06-10T13:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT for PA-VM on Azure Cloud with VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/332890#M84126</link>
      <description>&lt;P&gt;You can enable NAT traversal and use internal IPs on the firewall, you can then use FQDN or userFQDN as local identification&lt;/P&gt;
&lt;P&gt;the remote peer will need to use the load balancer public IP (or can even have dynamic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:57:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/332890#M84126</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-09-18T13:57:02Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT for PA-VM on Azure Cloud with VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/556408#M112955</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;any documents which can help me in configuring ipsec vpn tunnels on these palo alto vm-series firewalls configured in HA (Active/Passive) in Azure.&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/145300"&gt;@louey11&lt;/a&gt;&amp;nbsp; any luck on this, were you able to configure IPSEC vpn tunnels?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2023 17:46:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-for-pa-vm-on-azure-cloud-with-vpn/m-p/556408#M112955</guid>
      <dc:creator>BilalMohd</dc:creator>
      <dc:date>2023-09-04T17:46:02Z</dc:date>
    </item>
  </channel>
</rss>

