<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure Palo Alto - ARP Not Found in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/336480#M84756</link>
    <description>&lt;P&gt;So i ended up raising a ticket with Palo Alto support and they helped with this (seriously impressed with their support!).&lt;/P&gt;&lt;P&gt;It turns out that other post was a big hint - &lt;A href="https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-no-arp/td-p/259088" target="_blank"&gt;https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-no-arp/td-p/259088&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the reference architecture guide (&lt;A href="https://www.paloaltonetworks.com/resources/guides/azure-architecture-guide" target="_blank"&gt;https://www.paloaltonetworks.com/resources/guides/azure-architecture-guide&lt;/A&gt;), on page 29 it says:&lt;/P&gt;&lt;P&gt;"By default, when a firewall interface obtains a default gateway from DHCP, it installs a default route. To ensure proper&lt;BR /&gt;traffic flow, you should modify the firewall configuration so that default routes are static and not obtained through&lt;BR /&gt;DHCP. To allow the firewall to reach virtual machines and services within the VNet, set up static routes to the VNet&lt;BR /&gt;internal networks on the firewall’s private interface. Even though Azure networking does not use traditional forwarding,&lt;BR /&gt;you still configure the route’s next hop as if the network has a default gateway. Azure reserves the first address in the&lt;BR /&gt;subnet (example: .1 in a /24) as the subnet’s default router address."&lt;BR /&gt;&lt;BR /&gt;So all i needed to do was update my virtual routes to point to .1 of the interface subnet. In a subnet, Azure reserves the first 5 IP addresses for themselves. It seems that .1 is the gateway address for the subnet.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26553i3C438741CE1F7C76/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Regarding the outbound internet access, i was pretty close....&lt;BR /&gt;On the reference architecture guide, on page 32 it states:&lt;/P&gt;&lt;P&gt;"For virtual machines behind the firewall to communicate to devices on the internet, the firewall must translate the&lt;BR /&gt;source IP address of the outbound traffic to an IP address on the public subnet. Azure then translates the source IP&lt;BR /&gt;address again as the outbound traffic leaves the VNet. When you associate a public IP address with an internal IP&lt;BR /&gt;address used in the NAT policy, Azure translates the outbound traffic to the public IP address"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what i did was create a Public IP, associate it to my public NIC. Then on PA, i switched to static IP allocation for the public interface. I manually added 10.110.2.4 and the public IP address. Then on my NAT rules, i added Dynamic Host and Port, changed to interface, selected ethernet1/1 and put the 10.110.2.4 address (not the public address) and i then got the outbound working.&lt;BR /&gt;&lt;BR /&gt;Im seriously impressed with the Palo Alto support. 2/3 hours after i raised the ticket, i was on a zoom call and my problems were resolved.&lt;BR /&gt;&lt;BR /&gt;So the answer was in the documentation all along - who'd have guessed!&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jul 2020 16:37:47 GMT</pubDate>
    <dc:creator>ashleyk</dc:creator>
    <dc:date>2020-07-02T16:37:47Z</dc:date>
    <item>
      <title>Azure Palo Alto - ARP Not Found</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/336411#M84754</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im having a problem with my PA deployment in Azure where i get ARP Not Found counters increase. I can normally resolve the issue by manually adding an ARP entry to the interface with the MAC of `12:34:56:78:9a:bc` but its really not a solution, rather a workaround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="arch (2).png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26513iBB5946D67E011668/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="arch (2).png" alt="arch (2).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The architecture is similar to the above. My Azure PointToSite Gateway gives has a client pool of 11.0.0.0/8.&lt;BR /&gt;I can peer the spoke network and setup the routing no problem, however unless i explicitly add the spoke VM IP address (10.120.0.10) to the ARP table for ethernet1/2, the traffic wont get there.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ashleyk_0-1593612662816.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26514i46E3B196997E3F6B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ashleyk_0-1593612662816.png" alt="ashleyk_0-1593612662816.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From a linux VM connected to the Gateway, i get allocated 11.0.0.130. From this VM i can SSH into the spoke machine at 10.120.0.10 via the PA. Only once ive added the 120.120.0.10 12:34:56:78:9a:bc ARP entry to ethernet1/2 and only once ive added my client address 11.0.0.130 mac 12:34:56:78:9a:bc to ethernet1/3. Otherwise the respective interfaces No ARP counters increase when i run `show interface ethernet1/x'.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26515iC3AF9A089A40B693/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;This is just a development environment (for now) so ive disabled most NSGs. Ive set my security policy to allow everything.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Why does my connection not work unless i add in the ARP manually? This isnt going to be feasible long term, I cant add an ARP entry for every endpoint in every spoke.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My entire infrastructure is deployed via Terraform.&lt;/P&gt;&lt;P&gt;Looking at this (unresolved) post, it seems that im not the only person having problems - &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/incomplete-arp-when-deployed-in-azure/td-p/315330" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/incomplete-arp-when-deployed-in-azure/td-p/315330&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also there somebody else was having ARP problems with Azure, but they answered their own question and it didnt really help.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-no-arp/td-p/259088" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-no-arp/td-p/259088&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I dont think the problem is related to my VPN. There is another situation where No ARP appears.&lt;/P&gt;&lt;P&gt;I tried setting up the untrusted subnet access as per &lt;A href="https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/second-public-ip-for-vm-300-hosted-in-azure/td-p/319505" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/second-public-ip-for-vm-300-hosted-in-azure/td-p/319505&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I created an Azure Public IP, added it to the untrusted NIC. I added the private and public (secondary) IPs to the ethernet1/1 configuration. I then setup a NAT rule to translate the traffic to that public IP address.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26517i0DC1165958B7DB5A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have routes on spoke to send all traffic to the PA. On the PA i have a static route which sends traffic to ethernet1/1 by default (0.0.0.0/0). From the spoke VM if i ping 8.8.8.8, i see No Arp counts increating on the ethernet1/1 interface. The NAT rule is getting hit by the looks of it. Its one thing to add a manual ARP entry to the Azure fabric MAC for Azure resources, but i cant manually do that for public internet resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the dashboard to show what verison of the PA i am using:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ashleyk_0-1593673569488.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26529iDA179A93B7619831/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ashleyk_0-1593673569488.png" alt="ashleyk_0-1593673569488.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are the VM Series config values:&lt;/P&gt;&lt;P&gt;```&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;vm_size = "Standard_D3_v2"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;sku = "bundle2"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;publisher = "paloaltonetworks"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;product = "vmseries1"&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;```&lt;/P&gt;&lt;P&gt;Deployed in the UK South region.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PANOS Version seems to be 9.1.0&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 673px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26527i009620E6B3CF4B09/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i run, `show interface all`, all of the interfaces have MAC addresses assigned. They are not the standard `12:34:56:78:9a:bc` address.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 647px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26528iA6CDE449C8A70F90/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im new to PaloAlto, so im hoping there is something simple im missing here. Im finding it a bit tricky as i thought Azure was meant to handle the layer two stuff.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 07:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/336411#M84754</guid>
      <dc:creator>ashleyk</dc:creator>
      <dc:date>2020-07-02T07:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Palo Alto - ARP Not Found</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/336480#M84756</link>
      <description>&lt;P&gt;So i ended up raising a ticket with Palo Alto support and they helped with this (seriously impressed with their support!).&lt;/P&gt;&lt;P&gt;It turns out that other post was a big hint - &lt;A href="https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-no-arp/td-p/259088" target="_blank"&gt;https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-no-arp/td-p/259088&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the reference architecture guide (&lt;A href="https://www.paloaltonetworks.com/resources/guides/azure-architecture-guide" target="_blank"&gt;https://www.paloaltonetworks.com/resources/guides/azure-architecture-guide&lt;/A&gt;), on page 29 it says:&lt;/P&gt;&lt;P&gt;"By default, when a firewall interface obtains a default gateway from DHCP, it installs a default route. To ensure proper&lt;BR /&gt;traffic flow, you should modify the firewall configuration so that default routes are static and not obtained through&lt;BR /&gt;DHCP. To allow the firewall to reach virtual machines and services within the VNet, set up static routes to the VNet&lt;BR /&gt;internal networks on the firewall’s private interface. Even though Azure networking does not use traditional forwarding,&lt;BR /&gt;you still configure the route’s next hop as if the network has a default gateway. Azure reserves the first address in the&lt;BR /&gt;subnet (example: .1 in a /24) as the subnet’s default router address."&lt;BR /&gt;&lt;BR /&gt;So all i needed to do was update my virtual routes to point to .1 of the interface subnet. In a subnet, Azure reserves the first 5 IP addresses for themselves. It seems that .1 is the gateway address for the subnet.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26553i3C438741CE1F7C76/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Regarding the outbound internet access, i was pretty close....&lt;BR /&gt;On the reference architecture guide, on page 32 it states:&lt;/P&gt;&lt;P&gt;"For virtual machines behind the firewall to communicate to devices on the internet, the firewall must translate the&lt;BR /&gt;source IP address of the outbound traffic to an IP address on the public subnet. Azure then translates the source IP&lt;BR /&gt;address again as the outbound traffic leaves the VNet. When you associate a public IP address with an internal IP&lt;BR /&gt;address used in the NAT policy, Azure translates the outbound traffic to the public IP address"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what i did was create a Public IP, associate it to my public NIC. Then on PA, i switched to static IP allocation for the public interface. I manually added 10.110.2.4 and the public IP address. Then on my NAT rules, i added Dynamic Host and Port, changed to interface, selected ethernet1/1 and put the 10.110.2.4 address (not the public address) and i then got the outbound working.&lt;BR /&gt;&lt;BR /&gt;Im seriously impressed with the Palo Alto support. 2/3 hours after i raised the ticket, i was on a zoom call and my problems were resolved.&lt;BR /&gt;&lt;BR /&gt;So the answer was in the documentation all along - who'd have guessed!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 16:37:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/336480#M84756</guid>
      <dc:creator>ashleyk</dc:creator>
      <dc:date>2020-07-02T16:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Palo Alto - ARP Not Found</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/471520#M103113</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/147643"&gt;@ashleyk&lt;/a&gt;&amp;nbsp;for sharing this.&amp;nbsp; Setting up and Azure PA-VM today I made these same initial setup errors.&amp;nbsp; My deployment is almost identical to yours, minus the VPN.&amp;nbsp; Once I moved to Static IP address on the public interface and static routes as prescribed by you, traffic started flowing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 03:08:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-palo-alto-arp-not-found/m-p/471520#M103113</guid>
      <dc:creator>crostron76</dc:creator>
      <dc:date>2022-03-09T03:08:21Z</dc:date>
    </item>
  </channel>
</rss>

