Skip to content

Connects Security vNets to an Azure Virtual WAN Hub to secure global inbound and cross vWAN traffic through regional transit vNets.

License

Notifications You must be signed in to change notification settings

wwce/azure-arm-virtual-wan

Repository files navigation

Panorama Orchestration & Azure Virtual WAN

Secure Azure Virtual WAN traffic with Palo Alto Networks VM-Series firewalls. Please see the Deployment Guide for more information.

Overview

This build illustrates how to secure Azure Virtual WAN traffic with VM-Series scale sets. The build is broken down into 5 Parts. Depending on existing Azure resources, certain parts may not be required.

  • Part 1. Create Virtual WAN & Virtual Hub
  • Part 2. Connect VM-Series Inbound Scale Set to the Virtual Hub
  • Part 3. Connect VM-Series Outbound Scale Set to the Virtual Hub
  • Part 4. Peer Local VNET to VM-Series Outbound VNET
  • Part 5. Connect Spoke VNET to Virtual Hub

Architecture

The build shows two types of traffic flows through a Virtual WAN hub.

  1. Internet inbound traffic through a VM-Series scale set to directly connected hub virtual network (vwan-spoke)
    • Additional scale sets can be added throughout different Azure regions to achieve a globally scalable inbound security edge.
  2. East-West traffic through a VM-Series scale set from a vwan-spoke to a locally peered virtual network
    • This design can be integrated into larger infrastructures that have regional hub and spoke architectures. The VM-Series in each regional hub VNET, can secure ingress traffic coming from virtual WAN hubs.
    • This can design can also be applied for traffic between ExpressRoute and VNET connections.

drawing

Prerequisites

The following items are required prior to launching the build.

  1. A active Azure subscription with appropriate permissions and resource allocation quota.
  2. Panorama
    • PAN-OS 10.0 or greater
    • Azure Plugin 3.0 or greater
  3. Inbound & Outbound VM-Series scale set within a dedicated VNETs.

If you do not have the VM-Series deployed, please see Deployment Guide for how-to.


Guide

Part 1: Create Virtual WAN & Virtual Hub

In this part, a Virtual WAN is created with a virtual hub. The hub will be used in Parts 2 and 3 to direct traffic from connected spokes to the security VNETs. If you already have a virtual hub, you can skip this step and proceed to part 2.






Deploy To Azure


Part 2: Connect Inbound VM-Series Scale Set to the Virtual Hub

Connects an existing security VNET that contains a VM-Series inbound scale set to the virtual hub created in part 1.







Deploy To Azure


Part 3: Connect Outbound VM-Series Scale Set to the Virtual Hub

Connects an existing security VNET that contains a VM-Series outbound scale set to the virtual hub created in part 1.






Deploy To Azure


Part 4: Peer Local VNET to VM-Series Outbound VNET

Creates a spoke VNET that is peered (via vNet Peering) to the outbound VM-Series VNET. A route table is created to direct all traffic from the spoke VNET to the outbound firewall's interal load balancer. A route is also added to the virtual hub's route table. This route will direct virtual WAN traffic destined to the spoke VNET through the outbound VM-Series VNET connection that was created in part 3.



Deploy To Azure


Part 5: Connect Spoke VNET to Virtual Hub

Creates a spoke VNET that is directly connected to the virtual hub created in part 1. This VNET is used to demonstrate/test internet inbound traffic through the inbound VM-Series and also lateral traffic through the outbound VM-Series its local spoke.





Deploy To Azure

About

Connects Security vNets to an Azure Virtual WAN Hub to secure global inbound and cross vWAN traffic through regional transit vNets.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published