- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
08-23-2017 08:01 AM
Hi, I have deployed redundant PA Firewalls with the internal Azure load balancer to provide resiliance - thos is working however the "internal load balancer has significant limitations.
I am looking to see if anyone has any recommendations for 3rd party load balancer (taking into account cost and operation in this environment)
The limitations of the free Azure load balancer are as far as I can see
a. a limitation of a maximum 250 ports
b. no support for port ranges - therefore each port to be foirwarded bust be statically defined
Any pointers/recommendations would be greatly appreciated
Thanks
Andrew
08-31-2017 05:48 AM - edited 08-31-2017 05:48 AM
Due to the nature of Azure networking, another loadbalancer won't probably fix this problem.
When using another LB solution and making this HA, you probably going to need a Azure Internal LB.
See this reference documentation: https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/dmz/nva-ha
I created a feature request at MS, you can upvote.
https://feedback.azure.com/forums/217313-networking/suggestions/31116808-loadbalancer-multiple-ports...
A (dirty) work-around can be using multiple internal loadbalancer, as far as the client doesn't use over 150 ports (the limit is actually 150).
Unfortunately no (real) solution, but hopefully it will clear things up.
08-31-2017 06:22 AM
Thanks Rob! Just upvoted it several times 😉 Let's hope M$ is going to listen this time. This has been a feature request since 2013 and isput on the feature backlog since november 2016
Regards
Michel van Kessel
09-28-2017 07:33 AM - edited 09-28-2017 07:36 AM
As of September 2017 Azure Load Balancer HA Ports capability is in preview. Allows the use of 0 for port number and All for protocol type which is shorthand for all ports, all protocols -- very useful for forwarding all traffic hitting the load balancer VIP to the back-end VM-series pool members (for both inbound and outbound use cases) -- in a single load balancer rule.
Before HA Ports capability hits GA, request access to it (link above) and mind the regions where it is available.
-John
12-10-2017 02:45 PM
Hello,
The easiest way to synchronize polices on multiple Palo Alto Networks firewalls is to use Panorama (our management station) to push policy. This works for all of our physical and virtual firewalls. Config elements can be shared or completely independant by device groups.
Another option is to use a thrid party tool like Ansible to push configs to multiple firewalls. We have some sample Ansible plabooks available: https://live.paloaltonetworks.com/t5/Ansible/ct-p/Ansible
The VM-Series firewalls can terminate IPsec tunnels very well. The decision to use the VM-Series versus the Azure VPN gateways should be based on the architecture, routing, performance, etc.
HTH,
Warby
12-10-2017 04:23 PM - edited 12-10-2017 07:30 PM
@Warby wrote:Hello,
The easiest way to synchronize polices on multiple Palo Alto Networks firewalls is to use Panorama (our management station) to push policy. This works for all of our physical and virtual firewalls. Config elements can be shared or completely independant by device groups.
Another option is to use a thrid party tool like Ansible to push configs to multiple firewalls. We have some sample Ansible plabooks available: https://live.paloaltonetworks.com/t5/Ansible/ct-p/Ansible
The VM-Series firewalls can terminate IPsec tunnels very well. The decision to use the VM-Series versus the Azure VPN gateways should be based on the architecture, routing, performance, etc.
HTH,
Warby
Hi Warby,
Thanks for the reply the client don’t have Panorama. I guess I will explore the Ansible playbook route. If I have multiple FWs on Azure how would I create the IPSEC tunnel from high level? Wouldn't External LB Break the IPSEC tunnel? I could use multiple public IPs and tunnel monitor but that would mean only one tunnel will be up at a time. Also what is the performance impact of PAN IPSEC tunnel VS Azure VPN Gateway? What about Global Protect? Would it work with External LB? Would you assign two GP pools? One for FW1 and one for FW2 so the destinations know which firewall to return traffic to?
Thanks
12-12-2017 09:10 AM
@junior_r wrote:
@Warby wrote:Hello,
The easiest way to synchronize polices on multiple Palo Alto Networks firewalls is to use Panorama (our management station) to push policy. This works for all of our physical and virtual firewalls. Config elements can be shared or completely independant by device groups.
Another option is to use a thrid party tool like Ansible to push configs to multiple firewalls. We have some sample Ansible plabooks available: https://live.paloaltonetworks.com/t5/Ansible/ct-p/Ansible
The VM-Series firewalls can terminate IPsec tunnels very well. The decision to use the VM-Series versus the Azure VPN gateways should be based on the architecture, routing, performance, etc.
HTH,
Warby
Hi Warby,
Thanks for the reply the client don’t have Panorama. I guess I will explore the Ansible playbook route. If I have multiple FWs on Azure how would I create the IPSEC tunnel from high level? Wouldn't External LB Break the IPSEC tunnel? I could use multiple public IPs and tunnel monitor but that would mean only one tunnel will be up at a time. Also what is the performance impact of PAN IPSEC tunnel VS Azure VPN Gateway? What about Global Protect? Would it work with External LB? Would you assign two GP pools? One for FW1 and one for FW2 so the destinations know which firewall to return traffic to?
Thanks
I would connect the IPSEC tunnel(s) directly on the firewalls. If you have multiple firewalls within Azure, with the same back-end, you can use OSPF and ECMP to utilize both tunnels.
For GP I would use the same approach and terminate the GP GW directly on the firewall and only put the GP Portal behind the LB.
12-12-2017 10:12 AM
ECMP should return traffic on same tunnel correct? How wouldn't the GP gateway need to be behind LB to?
Thanks
12-22-2017 09:50 AM
The Portal will inform the client of the available gateways.
The client will then connect with one of the available gateways, therefore Azure LB is not necessary for this to work.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!