: Configure Service Routes for On-Prem Services
Focus
Focus

Configure Service Routes for On-Prem Services

Table of Contents

Configure Service Routes for On-Prem Services

You can configure Cloud NGFW for Azure to access on-prem, hosted services such as DNS servers, external dynamic lists, log collectors, syslog, dynamic content updates, LDAP, MFA, etc. By default, a Cloud NGFW firewall accesses these types of services using its management interface. However, in some use cases, using the management interface is not recommended. Instead, Palo Alto Networks recommends that you configure a
service route
on the firewall to access these services. When using a service route, service packets exit the firewall using a data port that you assigned to each service. In return, the service sends its response to the configured source IP and source interface.
Panorama and the Panorama plugin for Azure 5.1.1 or later is required to configure a service route on Cloud NGFW for Azure.
You should use a service route in the following scenarios.
  • Services hosted in your on-prem network with a private IP address. Because the Cloud NGFW management interface is not connected to your on-prem network, it cannot access the service’s private IP address.
  • Services are accessible via a public IP address over the internet, but a static source IP is required in an allow-list configuration. The Cloud NGFW management interface uses a source IP that is SNAT-translated to a dynamic public IP address to access the internet, which does not work with an allow list. You can configure the service route to access the on-prem service using a public data interface and the traffic source IP address will be SNAT-translated to the Cloud NGFW public IP address.
By default, each Cloud NGFW Panorama template includes three zones—private, public, and loopback. The loopback zone uses an interface loopback.3, which is used for the service route.
Complete the following procedure to configure a service route on Cloud NGFW for Azure.
  1. Log in to Panorama.
  2. Verify that the Panorama plugin for Azure 5.1.1 or later is installed.
  3. Navigate to
    Templates
    Device
    and select your Cloud NGFW template from the Template drop-down.
    cngfw-az-_DEFAULT_TEMPLATE_
    is only visible after creating the template stack in the Panorama plugin for Azure under Cloud NGFW.
  4. Navigate to
    Setup
    Services
    and click
    Service Route Configuration
    .
  5. Select
    Customize
    and do one of the following to create a service route:
    • For a predefined service:
      1. Select
        IPv4
        or
        IPv6
        and click the link for the service for which you want to customize the service route.
        To easily use the same source address for multiple services, select the checkbox for the services, click
        Set Selected Routes
        , and proceed to the next step.
      2. To limit the list for
        Source Address
        , select a loopback.3 as the
        Source Interface
        ; then select a
        Source Address
        (from that interface) as the service route. An Address Object can also be referenced as a Source Address if it is already configured on the selected interface. Selecting
        Any
        Source Interface makes all IP addresses on all interfaces available in the Source Address list from which you select an address. Do not select
        Use default
        because that tells the firewall to use the management interface for the service route.
        The Service Route Source Address does not inherit configuration changes from the referenced interface and vice versa. Modification of an Interface IP Address to a different IP address or Address Object will not update a corresponding Service Route Source Address. This may lead to commit failure and require you to update the Service Route(s) to a valid Source Address value.
      3. Click
        OK
        to save the configuration.
      4. Repeat this step if you want to specify both an
        IPv4
        and
        IPv6
        address for a service.
    • If the service is not listed, select the Destination tab to specify the target service by IP addresses:
      1. Select
        Destination
        and
        Add
        a
        Destination IP
        address. In this case, if a packet arrives with a destination IP address that matches this configured
        Destination
        address, then the source IP address of the packet will be set to the
        Source Address
        configured in the next step.
      2. To limit the list for
        Source Address
        , select the
        loopback.3
        interface; then select a Source Address (from that interface) as the service route. Selecting
        Any
        Source Interface makes all IP addresses on all interfaces available in the Source Address list from which you select an address. Selecting MGT causes the firewall to use the MGT interface for the service route.
      3. Click
        OK
        to save the configuration.
  6. Commit
    your changes.
  7. Add a
    Security Policy Rule
    allowing the Cloud NGFW to reach the on-prem service.
    The security policy rule can match the service route traffic as:
    • From Any zone to the Public zone or Private zone, depending whether the server has a public or private IP address.
    • Source IP address (172.200.255.253) to Destination IP address (IP address of the service).

Recommended For You