Skip to content

Palo Alto Networks Azure App Gw deployment modified to use Standard Preview Public IPs, Standard LB internal and HA Ports.

Notifications You must be signed in to change notification settings

jasonmeurer/azure-appgw-stdv2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Using VM-Series Firewalls, the Azure Application Gateway and Standard ILB to Secure Internet-Facing Web Workloads v2

Adapted from the Azure Application Gateway ARM template.

Instructions

  1. Deploy the template, link below.
  2. Make note of Internal LB - LoadBalancerFrontend IP
  3. Make note of Firewall Unrust IP - Eth1
  4. If SSH password was used, ssh to the firewall Public IP to set an admin password.
    • configure
    • set mgt-config users "insert admin name" password
    • commit
  5. HTTPS to the Firewall's Public IP and Import/Load - fwconfig.xml
  6. Update firewall-untrust-IP and internal-load-balancer-IP objects to match recorded addresses in steps 1 and 2 and commit.
  7. If default subnets where not used, update the corresponding objects and Virtual Routers accordingly and commit.
  8. Following the commits, credentials may be reset, use pandemo:demopassword to access the FW.
  9. Relavent links
  10. Following along demo outlined here substituting the Application Gateway IP for the web server reference and keep in mind that you have more than one firewall to Monitor. Demo Guide

This ARM template deploys two VM-Series firewalls between a pair of Azure load balancers. The external load balancer is an Azure Application Gateway (a web load balancer) that also serves as the Internet facing gateway, which receives traffic and distributes it to the VM-Series firewalls. The firewalls enforce security policies to protect your workloads, and send the allowed traffic to the internal load balancer which is an Azure Load Balancer (Layer 4) that load balances across a pair of sample Apache web servers. The ILB is utilizes a Standard Preview which can be used with HA Ports for Outbound and East/West traffic.

Standard Load Balancer

HA Ports

Region availability Load Balancer Standard is currently available in all public cloud regions.

Important

For a short period of time, access to regions outside of the initial launch regions (East US 2, Central US, North Europe, West Central US, West Europe, Southeast Asia) requires the registration of additional subscription features (AllowLBPreviewWave2 and AllowLBPreviewWave3). Please follow these steps. Please execute all of them even if you have previously signed up for AllowLBPreview already. This requirement will be removed in the coming weeks. Regional Enrollment

The iLB has two Front End configurations. The first load balances the web servers. The second utilizes the HA Port feature coupled with UDRs to send Web to DB and DB to Web traffic through the firewall.

As demand for your web services increase, you can add more web servers and deploy additional VM-Series firewalls for more capacity. The VM-Series firewalls are deployed in separate Availability Sets for higher availability and redundancy against planned and unplanned outages. Refer to Azure documentation for more information on Availability Sets. A sample configuration file for VM-Series firewall is also included. After you import this configuration file, be sure to (a) customize the security policies to your needs and (b) set a custom password for the firewall instead of the value in the sample file. Refer to the documentation for steps on how to import the sample configuration file.

Documentation

About

Palo Alto Networks Azure App Gw deployment modified to use Standard Preview Public IPs, Standard LB internal and HA Ports.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published