Static NAT in Microsoft Azure

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Static NAT in Microsoft Azure

L1 Bithead

Need to Map internal server with Public IP (Static NAT ) with specfic ports exposed to the internet.

 

I belive the public IP needs to be associated with Azure load balancer .

 

Request some one to share the config of azure as well the Palo alto config .

 

 

 

5 REPLIES 5

L1 Bithead

Hi Amaresh,

 

The internal server may not need a public IP as it could be access from By Internet users through NAT.

 

These are the steps to follow:

 

1. assigned a public IP to the public load balancer that front-end the VM-Series FWs

2. add a NAT policy to all the FWs behind the public LB. The policy, I call it "Inbound DNAT". In the original packet section use Untrust in the src and dst zones, and add the IP address of the eth1 FW interface. In the Translater packet section use Dynamic IP and Port as Translation Type, Interface Address as Address Type and ethernet1/2 as Interface (leave IP address as None). Select the Destination Address Translatation and type either the IP address load balancer that front ends the internal server farm or the IP address of the internal server (private IP - make sure is static so if you reboot it does not change)

 

You also need to configure routing on the VM-Series and routing entry in the UDR to direct traffic in the internal server subnet through the VM-Series.

 

Does it require to configure NAT Inbound rule on Azure ?

 

Consider the scenario as mentioned below

 

Public IP (Load balancer ) Front end- 13.182.82.10

 

Unrust Interface - 10.0.1.4

 

Trust Interface - 10.0.2.4

 

Internal server -10.0.5.4

 

Port to be exposed - RDP and 443

 

Could you help me with the NAT rule on palo alto firewall.

Hi Amaresh, there are 2 ways you can do this:

 

1. Create a NAT policy that doesn't filter for inbound port so that you can account for both RDP (3389) and 443 coming into the same host. Then rely on your security policy to allow only the applications/ports you wish.

 

2. Create 2 separate NAT policies, one that filters specifically for port 3389 and one that filters for 443.

 

I've provided an example below of #1

 

Screen Shot 2017-08-30 at 8.39.05 AM.png

 

You will also need a corresponding Security Policy with the source zone of Untrust and the Destination zone of Trust, for the appropriate applictions that you want to allow access to. The Destination IP would be 10.0.1.4 in this case.  You can leave the destionation IP set to any if you prefer to see the destination IP show up in the traffic log, and adjust the Security Policy after the fact.

Thanks for the reply

 

Still am not able to access the server with static nat config.

 

Kindly find the config

 

On Azure

 

loadbalancer.pngpaloalto.JPG

 

Note - From machine 10.0.3.5  able to acces internet . But static nat is not working

Hi Amarash, have you created all of the necessary load balancing rules, probes, etc.?  It might be worth contacting your Palo Alto Networks sales team who may be able to assist and get you up and running.

 

You need:

 

Front Side IP Address

Backend Pool

Health Probe

Load Balancing Rules

Corresponding port open on the firewall or wherever your health probe is going to

Corresponding security rules to allow the health probe to pass

The correct routes on your VM Series to account for the health probe(s)

  • 10405 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!