End-of-Life (EoL)
Deploy the VM-Series Firewall from the Azure Marketplace
(Solution Template)
The following instructions show you how to
deploy the solution template for the VM-Series firewall that is
available in the Azure Marketplace. To use the customizable ARM
templates available in the GitHub repository, see Use
the ARM Template to Deploy the VM-Series Firewall.

- Set up an Azure account.
- Create a Microsoft account.
- Log in to the Azure portal (https://portal.azure.com) using your Microsoft account credentials.If you are using a trial subscription, you may need to open a support request () to increase the quota of allocated VM cores.Help + SupportNew Support Request
- Find the VM-Series solution template in the Azure Marketplace.
- Select.Azure MarketplaceVirtual Machines
- Search for Palo Alto Networks. The offerings for the VM-Series firewall display. For the differences in the BYOL and PAYG models, see VM-Series Firewall in Amazon Web Services (AWS) and Azure Licenses.
- Select an offering and clickCreate.
- Deploy the firewall.
- Configure basic settings for the firewall.
- Enter aUsernamefor the firewall administrator.
- Enter aPassword(of up to 31 characters) or copy and paste anSSH public keyfor securing administrative access to the firewall.
- Select your AzureSubscription.
- Create a new resource group for holding all the resources associated with the VM-Series firewall for this deployment.Azure has removed the option to select an existing resource group for Marketplace solutions that enable multiple NICs. To deploy the firewall into an existing resource group, use the ARM template in the GitHub Repository or your own custom ARM template.
- Select the AzureLocation. This is the region in which you are deploying the firewall.
- Configure storage and networking.
- Select an existing storage account or create a new one.
- Select an existing VNet or create a new one, and enter the IP address space for the VNet. By default the CIDR is 10.0.0.0/16.
- Configure the subnets for the network interfaces. If you use an existing VNet, you must have defined three subnets, one each for the management, trust and untrust interfaces. If you create a new VNet, verify or change the prefixes for each subnet. The default subnets are 10.0.0.0/24 for the management subnet, 10.0.1.0/24 for the untrust subnet, and 10.0.2.0/24 for the trust subnet.
- Enter the source IP address or IP range (include CIDR) that can access the VNet.Network Security Group: inbound source IPallows you to restrict inbound access to the Azure VNet.
- Define management access to the firewall.
- Use the default variable (new PublicIP) to assign aPublic IP addressto the management interface (eth0) of the firewall.
- Enter a prefix to access the firewall using a DNS name. You must combine the prefix you enter with the suffix displayed on screen for example <yourname>centralus.cloudapp.azure.com to access the web interface of the firewall.
- Enter a display name to identify the VM-Series firewall within the resource group.
- Select the Azure virtual machine tier and size to meet your needs. See Minimum System Requirements for the VM-Series on Azure.
- Review the summary, accept the terms of use and privacy policy, and clickCreateto deploy the firewall.
- Verify that you have successfully deployed the VM-Series firewall.
- Select, select the resource group.DashboardResource Groups
- Selectfor detailed statusAll SettingsDeploymentsDeployment History
- Attach a public IP address for the untrust interface of the VM-Series firewall. When you create a new public IP address you get one from the block of IP addresses Microsoft owns, so you can’t choose a specific one. The maximum number of public IP addresses you can assign to an interface is based on your Azure subscription.
- On the Azure portal, select the network interface for which you want to add a public IP address. For example the eth1 interface.
- Selectand for Public IP address, selectIP ConfigurationsAddEnabled. Create a new public IP address or select one that you have available.
- Verify that you can view the secondary IP address associated with the interface.
When you attach a secondary IP address to a network interface, the VM-Series firewall does not automatically acquire the private IP address assigned to the interface. You will need to manually configure the private IP address using the VM-Series firewall web interface. See Configure the dataplane network interfaces as Layer 3 interfaces on the firewall. - Log in to the web interface of the firewall.
- On the Azure portal, inAll Resources, select the VM-Series firewall and view the full DNS name for the firewall.
- Using a secure connection (https) from your web browser, log in to the DNS name for the firewall.
- Enter the username/password you defined in the parameters file. You will see a certificate warning; that is okay. Continue to the web page.
- Activate the licenses on the VM-Series firewall.For the BYOL version
- On the firewall web interface, selectand selectDeviceLicensesActivate feature using authentication code.
- Enter the capacity auth-code that you registered on the support portal. The firewall will connect to the update server (updates.paloaltonetworks.com), and download the license and reboot automatically.
- Log back in to the web interface and confirm the following on theDashboard:
- A valid serial number displays inSerial#.If the term Unknown displays, it means the device is not licensed. To view traffic logs on the firewall, you must install a valid capacity license.
- TheVM Modedisplays as Microsoft Azure.
For the PAYG version - Configure the dataplane network interfaces as Layer 3 interfaces on the firewall.If you are hosting multiple websites or services with different IP addresses and SSL certificates on a single server, you might need to configure more than one IP address on the VM-Series firewall interfaces.With the support for multiple public IP address for the firewall interfaces, the NAT VM is no longer required. If you have an existing deployment that uses the NAT VM, reassign the public IP address from the NAT VM to the untrust interface on the firewall, and then delete the NAT VM, the UDR, and subnet.
- Select.NetworkInterfacesEthernet
- Click the link forethernet 1/1and configure as follows:
- Interface Type: Layer3 (default).
- On the Config tab, assign the interface to the default router.
- On theConfigtab, expand theSecurity Zonedrop-down and select New Zone. Define a new zone called UnTrust, and then click OK.
- On theIPv4tab, selectDHCP Clientif you plan to assign only one IP address on the interface. The private IP address assigned in the ARM template will be automatically acquired. If you plan to assign more than one IP address selectStaticand manually enter the primary and secondary IP addresses assigned to the interface on the Azure portal.
- Clear theAutomatically create default route to default gateway provided by servercheck box. Disabling this option ensures that traffic handled by this interface does not flow directly to the default gateway in the VNet.
- Click the link forethernet 1/2and configure as follows:
- SetInterface Typeto Layer3 (default).
- Security Zone: Trust
- IP address: SelectDHCP ClientorStatic.
- Clear theAutomatically create default route to default gateway provided by servercheck box. Disabling this option ensures that traffic handled by this interface does not flow directly to the default gateway in the VNet.
- ClickCommit. Verify that the link state for the interfaces is up.
- Add a stati c route on the virtual router of the VM-Series firewall for any networks that the firewall needs to route.For example, to add a default route to the destination subnets for the servers that the firewall secures:
- SelectNetworkVirtual Routerdefault
- Select, and add the next hop IP address for the destination servers. You can set x.x.x.1 as the next hop IP address for all traffic (destined to 0.0.0.0/0 from interface ethernet1/1).Static RoutesIPv4
- Configure the firewall for your specific deployment.
- Gateway—Deploy a 3rd party load balancer in front of the UnTrust zone.
- Hybrid and Inter-VNet—Deploy an Azure VPN Gateway or a NAT virtual machine in front the UnTrust zone.
- Inter-Subnet—On the VM-Series firewall, add an intra-zone security policy rule to allow traffic based on the subnets attached to the Trust interface.
- GlobalProtect—Deploy a NAT virtual machine in front of the UnTrust zone.
- Direct traffic to the VM-Series firewall.
- To ensure that the VM-Series firewall secures all traffic within the Azure resource group, configure static routes on the firewall.
- Configure UDRs to direct all traffic through the interfaces on the VM-Series firewall. Refer to the Azure documentation on UDRs for details.The UDRs on the internal subnets must send all traffic through the Trust interface. The UDRs on the UnTrust side direct all traffic from the Internet through the UnTrust interface on the VM-Series firewall. The traffic from the Internet may be coming from an Azure Application Gateway or Azure Load Balancer, or through the Azure VPN Gateway in case of a hybrid deployment that connects your on-premises network with the Azure cloud.
Recommended For You
Recommended Videos
Recommended videos not found.