Azure: Deploying Palo Alto Networks VM-series Part-1
This is Part 1 of 2-parts article.
Refer to the diagram above for the design description: a Palo Alto Networks VM-series and a Windows virtual machine (VM) are part of the same virtual network (vnet); note that having the Windows VM and Palo Atlo Networks VM-series in the same vnet is for demo only, in production use, it is recommended to have the Palo Alto Networks VM-series in its own vnet. Each virtual network interface card (vNIC) has its own subnet. The VM-series have an out-of-band management interface, associated vNIC, and public IP address resources. The VM-series OUTSIDE interface and associated vNIC also have a public IP address resource. There are two network security groups (NSGs) attached to each of the vNIC with a public IP address resource. The Windows-VM access the internet by routing to the INSIDE interface of the VM-series as shown using user defined route.
Everything in the diagram sits in a singular resource group, all in the same region (see Step 7 of Resource Group for further discussion regarding having resources being in the same region). Having all resources in the same resource group allow ease of maintaining by deleting the resource group when this demo wraps up. Having everything in the same region ensure resource availabilities (US East region was used in this demo). Due to how the VM-series is provided in Azure marketplace, it is not possible to use a resource group that already have other resources in it. The resource group used for deploying VM-series must be empty.
Note that the design diagram above was developed prior to any deployment. It is not possible to move vNIC to a different vnet after deployment; assigning a previously created vnet during VM-series creation may result in reference error when Azure goes through its deployment process.
This part of the article was written using chatGPT.
To deploy a Palo Alto Networks VM-Series firewall in Azure, you can follow these steps:
领英推荐
After the firewall is deployed, you can access the management interface using the public IP address (or domain name; however, this will take some time to replicate to the A-record) that you configured during the deployment process.
From there, you can configure the firewall policies and settings to secure your Azure resources.
Once your VM-series is deployed, create and assign a public IP address and NSG to the untrust (Outside) vNIC as shown in the diagram. Unlike the management vNIC, this will not be done automatically. This is absolutely necessary; otherwise, you will not have two-way internet traffic through this VM-series.
Below lists articles on how to do this for a generic VM. The process works the same as for a VM-series as this is done from within Azure environment.
See vnet, subnets, vNICs, public IP addresses, route table and VM articles.
Phew! You read a lot! Now that you deployed everything, why did it not work? That's part 2 to this. You need to configure the VM-series network and policies to work correctly.
Actively seeking for new Network Engineer Opportunities
1 年Great read! I'm curious to see the benefits of deploying Palo Alto Networks VM-series in Azure.