- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-23-2022 10:51 PM
hi,
I have set up two palos in different az's in AWS. I have utilized the gw lodbalancers and done the bootstrapping so to get them "healty" etc. The soultion is working fine!!
But I am having a very hard time understanding how to get the panorama access working. I have panorama running on prem, and will be managing the palo's in AWS utilizing the VPN links I have to on prem. (I am not able to manage the firewalls over the internet for this customer and setup.)
Can someone explain how I am to do the routing or setup to get this done properly ? As of now I have had to enable asymetric routing - and then it works fine..
The mgmt nic in AWS is pretty much "useless" when managing the firewalls from "inside" / "not the internet" ?
10-26-2022 02:20 AM
Hi Trond,
I would create management subnets for the management NIC and add static routes to Panorama via the VGW or Transit Gateway.
11-22-2022 03:54 PM
hi,
Yeah, I do have subnets for this. But how will work related to routing ? I come from CheckPoint and Fortinet - so I might be way off here. But is it so that all packets I send to the mgmt nic of the Palo will return back on the same nic - regardless of any routing ? I see that I am unable to actually add in any routing specific for the mgt nic..
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!