Deploy the Cloud NGFW in a vNET
Table of Contents
Expand all | Collapse all
-
- Cloud NGFW for Azure
- Cloud NGFW Components
- Cloud NGFW for Azure Supported Regions
- Cloud NGFW for Azure Limits and Quotas
- Cloud NGFW for Azure Pricing
- Cloud NGFW for Azure Free Trial
- Cloud NGFW Credit Distribution and Management
- Start with Cloud NGFW for Azure
- Manage Cloud NGFW Roles for Azure Users
- Integrate Single Sign-on
- Monitor Cloud NGFW Health
- Create a Support Case
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for Azure Certifications
- Cloud NGFW For Azure Privacy and Data Protection
-
- About Rulestacks and Rules on Cloud NGFW for Azure
- Create a Rulestack on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Rule Objects
- Create a Prefix List on Cloud NGFW for Azure
- Create an FQDN List for Cloud NGFW on Azure
- Add a Certificate to Cloud NGFW for Azure
- Create Security Rules on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Services
- Enable DNS Security on Cloud NGFW for Azure
- Set Up Outbound Decryption on Cloud NGFW for Azure
- Set Up Inbound Decryption on Cloud NGFW for Azure
-
- Panorama Integration
- Panorama Integration Prerequisites
- Link the Cloud NGFW to Palo Alto Networks Management
- Use Panorama for Cloud NGFW Policy Management
- Enable User-ID on the Cloud NGFW for Azure
- Configure Service Routes for On-Prem Services
- Use XFF IP Address Values in Policy
- View Cloud NGFW Logs and Activity in Panorama
-
- Configure Logging for Cloud NGFW on Azure
- Cloud NGFW for Azure Traffic Log Fields
- Cloud NGFW for Azure Threat Log Fields
- Cloud NGFW for Azure Decryption Log Fields
- Enable Log Settings
- Disable Log Settings
- Enable Activity Logging on Cloud NGFW for Azure
- Multiple Logging Destinations on Cloud NGFW for Azure
- View the Logs
- View Audit Logs on a Firewall Resource
- View Audit Logs on Resource Groups
- What's New
- Cloud NGFW for Azure Known Issues
- Cloud NGFW for Azure Addressed Issues
Deploy the Cloud NGFW in a vNET
Deploy CNGFW in a vNET.
The Cloud NGFW manifests as two private IP
addresses (public and private) in your vNET. Using user-defined routes (with the
Cloud NGFW’s private IP address as the next hop), you can redirect traffic to the
Cloud NGFW for packet inspection and threat prevention.
The Azure Cloud NGFW
communicates with the Cloud NGFW to add rulestacks. The Cloud NGFW continuously meters
the usage of the Cloud NGFW resource, sending usage records for each Azure subscription
to the Azure metering service. This service is
responsible for billing.After deploying the Cloud NGFW in a
vNET, see the sample configuration page for more
information.
Prerequisites
To deploy Cloud NGFW in a vNET, you
will need an Azure subscription. This subscription should have an owner or a
contributor role.
When deploying the Cloud NGFW in a vNET
using an existing vNET hub, the minimum size should be /25. You must have 2
subnets with the minimum size /26; these subnets must be delegated to the
PaloAltoNetworks.Cloudngfw/firewalls service.
For deployments supporting 100Gbps, you need a total of 80
free IP addresses; 40 IP addresses are used for public and 40 IP addresses
are used for private.
- Log into the Azure portal and search for Cloud NGFW. This search displays the Cloud NGFW service, Cloud NGFW by Palo Alto Networks.Click Cloud NGFWs to start creating the Palo Alto Networks Cloud NGFW service for Azure.On the landing screen page for the Cloud NGFW resource, click Create to start creating the Cloud NGFW resource.If your subscription was previously created, the landing page contains information about Cloud NGFW resources.After clicking Create, the Create Palo Alto Networks Cloud NGFW screen appears.Use the information in the following table to provide Basic information, then click Next:Networking:
Field Description Subscription Automatically selected based on the subscription used while logged in. Resource Group Use one of the existing resource groups or create a new one (using the Create New option) in which the Cloud NGFW resource is created. Firewall Name Name of the Cloud NGFW Firewall resource. For Panorama-managed firewalls, do not use all capital letters for the firewall name.Region Region in which Cloud NGFW is provisioned. Provide information for the firewall deployment in the Networking screen:The Networking screen includes fields in the following table:Field Description Type Automatically selected based on the subscription used while logged in. Virtual Network Choose Virtual network. Create a new virtual network or select an existing virtual network. Private Subnet Choose a private subnet. Public Subnet Choose a public subnet. Public IP Address Configuration Specify Public IP addresses. Click Create new to establish a new address, or, click Use existing to specify an existing address. Additional Prefixes to Private Traffic Range If you want to support additional private IP address ranges besides those specified in RFC 1918, use the option for Additional Prefixes to Private Traffic Range. With this support you can use public IP address blocks in your private network without routing traffic to the internet. Click the Additional Prefixes check box. Enter addresses in CIDR format (for example, 40.0.0.0/24). Use a comma delimited list to include multiple addresses.By default, RFC 1918 prefixes are automatically included in the private traffic range. If your organization uses public IP ranges, explicitly specify those IP prefixes. You can specify these public IP prefixes individually, or as aggregates.See the section Edit an Existing Firewall to Add Additional Private Addresses for Non-RFC 1918 Support to add additional prefixes after deploying the firewall.Source NAT Settings Include the Source NAT option if Network Address Translation (NAT) is used on traffic going out to the internet. Click Next:Security Policies.On the Security Policies page, create a local rulestack or select an existing rulestack. A new rulestack contains no rules. You can define security rules after deploying the Cloud NGFW resource.As an administrator, you can either manage a security policy using a native Azure rulestack, or you can use Palo Alto Networks Panorama for policy management. For more information, see Link the Cloud NGFW to Palo Alto Networks Management.If you would like to use Palo Alto Networks advanced security services (such as Advanced Threat Prevention and Advanced URL Filtering) you must register your Azure Tenant at the Palo Alto Networks Customer Support Portal after creating your firewall. To learn more about registering a tenant, see Start with Cloud NGFW for Azure.Click Next: DNS Proxy to configure the Cloud NGFW resource as a DNS proxy. You can configure the Cloud NGFW to inspect all DNS traffic by acting as a proxy for vNET resources. When configured, the DNS Proxy forwards the DNS request to the default Azure DNS server, or, a DNS server you specify. By default, DNS Proxy is disabled.Click Next:Tags to specify tags for your Azure requirements. Tags are predefined labels that can help you manage the vulnerabilities in your environment and view consolidated billing related to your Azure account They are centrally defined and can be set to vulnerabilities and as policy exceptions.Tags are used as:- Vulnerability labels. They provide a convenient way to categorize the vulnerabilities in your environment.
- Policy exceptions. They can be a part of your rules in order to have a specific effect on tagged vulnerabilities.
- View consolidated billing for your Azure account.Tags are useful when you have large container deployments with multiple teams working in the same environment. For example, you might have different teams handling different types of vulnerabilities. Then you can set tags in order to define responsibilities over vulnerabilities. Other uses would be to set the status of fixing the vulnerability, or to mark vulnerabilities to ignore when they are a known problem that can’t be fixed in the near future.You can define as many tags as you like. For information about creating tags for your Azure account, see Use tags to organize your Azure resources and management hierarchy.
Click Next:Terms and accept the terms and the conditions for the deploymentClick Next:Review + create to review validate your Azure subscription for the Cloud NGFW resource. The resource is validated first, then created. The screen shows Validation Passed. Click Create to deploy the Cloud NGFW service:Verify the deployment of the Cloud NGFW in the vNET
After creating the Cloud NGFW service, the deployment progress appears.Deploying a Cloud NGFW resource takes approximately 30 minutes to deploy.On a successful deployment, the following screen appears. Click Go to resource group to verify the resources created for this deployment:Five resources are created. They include Cloud NGFW, Local Rulestack, Public IP address, Virtual Network, and security group:Once the Cloud NGFW resource is created, select it to verify that the provisioning state shows Succeeded. This screen also displays the public and private IP addresses associated with the Cloud NGFW service.After deploying the Cloud NGFW in a vNET, see the sample configuration for more information.Edit an Existing Firewall to Add Additional Private Addresses for Non-RFC 1918 Support
To edit an existing firewall to add additional private addresses:- Locate the Cloud NGFW in the Azure Portal.In the Settings section, select Networking & NAT.Click Edit.In the Additional Prefixes to Private Traffic Range section, select the check box for Additional Prefixes.Enter addresses in CIDR format (for example, 40.0.0.0/24). Use a comma delimited list to include multiple addresses.Click Save.
Edit an Existing Firewall to Enable Private Source NAT
Use the Private Source NAT option if you want to perform source network address translation on requests from an instance in a non-routeable subnet. This option allows you to send traffic to a routeable IP address assigned to the Application Load Balancer (ALB). After enabling Private Source NAT, include the destination IP address.Cloud NGFW east-west traffic relies on user defined routes (UDR) to forward traffic to the firewall. This dependency is supported by typical east-west traffic when both ends of the network are part of the private network. However, this poses challenges for a new type of traffic; one side of the deployment is the private network, while the other side of the deployment supports a partner or PaaS service accessible over a private endpoint in the virtual network. In such environments, you may not have management access to the entire (other) network to configure UDR. Traffic is directed to the Cloud NGFW by UDR, but return traffic is sent to the client’s source IP without transiting the Cloud NGFW. As a result, an asymmetric route problem occurs, and the resulting TCP handshake cannot be completed by the firewall. Cloud NGFW uses Private Source NAT to translate the source IP address to the firewall's instance's private interface IP, thus ensuring that return traffic is processed by the Cloud NGFW to the appropriate interface.- Locate the Cloud NGFW in the Azure Portal.In the Settings section, select Networking & NAT.Click Edit.In the Private Source NAT section, select the check box for Enable Private Source NAT.Enter the destination address.Click Save.