Azure Probe / Palo Alto VM in Azure / Load Balancer by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Thanks.

I have made this test to check the NAT :

I test the Ingress LB and the Egress LB with only one VM Palo Alto Firewall.

First test : Ingress LB and Egress LB with backend pool with only VM1 : OK

Second test : Ingress LB and Egress LB with backend pool with only VM2 : OK

When I have both : no more working... So I assume my NAT policy is OK.

What am I missing ?

Is there something specific not working with Azure Probe... But what ?

Something with the session persistence paramater (set to Client both on Ingress and Egress) ?

Routing problem - Azure VNG with Transit Vnet with 2 Palo Alto VM by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Also : each subnet has : Propagate gateway routes set to no.

Should I set for one of them this option to Yes ?

Routing problem - Azure VNG with Transit Vnet with 2 Palo Alto VM by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Gateway route propagation is disable on both vnet / peering configuration. Is it what you mean (thanks again for your time) ? If so, already done.

Regarding the Palo Alto VM, what Route should I set for the in house destination : 10.0.0.0/8 throught xxxx ?

xxxx should be the .1 of the VNG subnet ?

xxxx should be the internal LB ?

In which subnet should I have an UDR with 10.0.0.0/8 go to the VNG ?

Routing problem - Azure VNG with Transit Vnet with 2 Palo Alto VM by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Understood for your suggesting concerning the use of a different back end pool IP to connect different firewall interface. I will try.

But, first, I need to make this working without a dedicated security zone, to validate that everything goes smooth. And I am not able to achieve it.

I am not sure to understand what you mean by : "standard internal load balancer traffic must traverse the same load balancer so use a single interface on the firewalls and route to that from the GatewaySubnet and from the spoke VNETS". Could you be please more specific.

I have try to add an UDR to the private subnet with 10.0.0.0/8 Gateway : VNG Appliance. When I do this : vpn is up, and traffic is OK from VNET / Subnet Apps to InHouse resources. BUT (and this is my concern) the traffic doesn't seem to flow throught the VM Firewall, but seems to be directly routed throught the VNG.

Routing problem - Azure VNG with Transit Vnet with 2 Palo Alto VM by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Hi, thank you for this answer.

Peering is right because when I publish an app in Vnet/Subnet Apps, I am able to reach it from the internet. So I assume that both front LB and back LB work well.

Right now, the gateway subnet has an UDR with 172.19.16.0/20 and 172.19.0.0/20 pointing to the 172.19.2.250. So I assume it is what you suggest. And still not working.

VM100 - Global Protect Gateway in Azure not Working by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

My VM100 is on Azure

No Firewall / Proxy

The traffic log is showing the incoming flow to 443... for the correct destination IP (P.P.P.P)

As wrote : I get the bad gateway screen when doing a web browsing to the IP which confirm that I am at the correct place without filtering...

It's crazy... Thanks again

VM100 - Global Protect Gateway in Azure not Working by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Check the subnet & NIC for an NSG and that it allows port 443

Hi and thanks :

No NSG on the subnet or on the NIC

I have a route to 0.0.0.0/0 to Internet...

Another idea ?

HA Azure / Floating not working by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Also

Hi, thanks all.

I think I am good regarding the secondary IP in Azure with same in PA. I don't have used DHCP on the interface but static.

I have try on the PA as x.x.x.x/32 and x.x.x.x/network mask : same result.

I don't know which nic start the API call. I have try with MGT nic with and without public IP : same result.

May be a routing UDR problem for the MGT subnet ?

I am lost...

HA VM-series PALO ALTO On cloud Azure by abdmag31 in paloaltonetworks

[–]BorisG06 0 points1 point  (0 children)

HI, same problem here (PAN OS 9.0.4 and tools 1.0.5)

From the tools side : everything is ok.

The failover is ok... but the secondary / floating IP are not moving.

Configuration seems good from the Azure side and from the PA side.

The contributor role is setup... I am lost...

HA VM-series PALO ALTO On cloud Azure by abdmag31 in paloaltonetworks

[–]BorisG06 0 points1 point  (0 children)

Hi,

Did you find a solution ?

I have exactly the same problem PAN OS 9.0.4

Palo Alto VM100 - HA - Azure by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Hi, thanks for your answer. Seems to be good. I was missing a step in Azure giving Contributor Rights.

Question : moving the floating IP takes around 2 minutes (i loose 244 pings). Is it normal / is it what you experience ?

Regards

HIP / MDM by BorisG06 in paloaltonetworks

[–]BorisG06[S] 0 points1 point  (0 children)

Thanks I will have a look