Use the ARM Template to Deploy the VM-Series Firewall
In addition to Marketplace based deployments, Palo Alto Networks provides a GitHub repository which hosts sample ARM templates that you can download and customize for your needs. ARM templates are JSON files that describe the resources required for individual resources such as network interfaces, a complete virtual machine or even an entire application stack with multiple virtual machines. ARM templates are for advanced users; refer to the Microsoft documentation on ARM Templates.
To simplify the deployment of all the required resources, the template includes two json files:
- Template File—The azureDeploy.json is the main resources file that deploys all the components within the resource group.
- Parameters File—The azureDeploy.parameters.json is the file that includes the parameters required to successfully deploy the VM-Series firewall in the VNet. It includes details such as the virtual machine tier and size, username and password for the firewall, the name of the storage container for the firewall. You can customize this file for your Azure VNet deployment.
To help you deploy the firewall as a gateway for Internet-facing applications, the template provisions the VM-Series firewall, a database server, and a web server. The VNet uses the private non-routable IP address space 192.168.0.0/16. You can modify the template to use 172.16.0.0/12, or 10.0.0.0/8.
The ARM template also provides the necessary user-defined rules and IP forwarding flags to enable the VM-Series firewall to secure the Azure resource group. For the five subnets—Trust, Untrust, Web, DB, and NAT—included in the template, you have five route tables, one for each subnet with user defined rules for routing traffic to the VM-Series firewall and the NAT virtual machine.
For the four subnets—Trust, Untrust, Web, and DB—included in the template, you have four route tables, one for each subnet with user defined rules for routing traffic to the VM-Series firewall.
ARM templates are for advanced users. Palo Alto Networks provides the ARM template under the community supported policy.
- Download the ARM template from the GitHub repository.
- (Only for Azure China) Copy the VHD image for the VM-Series firewall to your Azure storage account.
- Create a Resource Group on Azure.
- Log in to the Azure CLI using the command: azure
loginIf you need help, refer to the Azure documentation on installing the CLI, or for details on how to access the CLI on Azure Government or Azure China.
- Switch to Resource Manager mode using the command: azure config mode arm
- Create a resource group.
- Log in to the Azure CLI using the command: azure login
- Deploy the ARM template.
- Open the Parameters File with a text editor
and modify the values for your deployment:In Azure China, you must edit the path for the storage account that hosts the VHD image required to deploy the VM-Series firewall. In the variables section of the template file, find the parameter called userImageNameURI and replace the value with the location where you saved the VHD image.
- Deploy the template in the resource group you created.
azure group create -v -n "YourResourceGroupName" -l "YourAzureLocation" -d "GiveASmallDeploymentLabel" -f azureDeploy.json -e azureDeploy.parameters.json
- Check the progress/status of the deployment from the
azure group deployment show "YourResourceGroupName" "YourDeploymentLabel"When the template is successfully deployed the ProvisioningState is Running.If the ProvisioningState is Failed, you must check for errors on the Azure portal at Resource GroupEvents. Filter for only events in the last one hour, select the most recent events, and drill down to find the errors.
- Verify that you have successfully deployed the VM-Series
- Select DashboardResource Groups, select the resource group.
- Select All SettingsDeploymentsDeployment History for detailed status.The address space within the VNet uses the prefix 192.168, which is defined in the ARM template.
- Attach a public IP address to the untrust interface on the firewall.
- Open the Parameters File with a text editor and modify the values for your deployment:
- Configure the firewall as a VNet gateway to protect your
- Log in to the management interface IP address on the firewall.
- Configure the dataplane network interfaces as Layer 3 interfaces on the firewall (NetworkInterfacesEthernet).
- Add static rules to the virtual router on the firewall.
To route traffic through the firewall in this example, you need
three static routes on the firewall (NetworkVirtual Routers, select the
router and click Static Routes):
- Route all outbound traffic through the UnTrust zone, ethernet1/1 to the Azure router at 192.168.1.1.
- Route all inbound traffic destined to the web server subnet through the Trust zone, ethernet1/2 to the Azure router at 192.168.2.1.
- Route all inbound traffic destined to the database server subnet through the Trust zone, ethernet1/2 to the Azure router at 192.168.2.1.
- Create security policy rules (PoliciesSecurity) to allow inbound and outbound traffic on the firewall. You also need security policy rules to allow appropriate traffic from the web server subnet to the database server subnet and vice versa.
- Commit the changes on the firewall.
- Verify that the VM-Series firewall is securing traffic (MonitorLogsTraffic).
About the VM-Series Firewall on Azure
About the VM-Series Firewall on Azure The VM-Series firewall on Azure must be deployed in a virtual network (VNet) using the Resource Manager deployment mode. ...
VM-Series Firewall Templates on Azure
VM-Series Firewall Templates on Azure You can deploy the VM-Series firewall on Azure using templates. Palo Alto Networks provides two kinds of templates: Solution Templates ...
Deploy the VM-Series Firewall from the Azure China Marketplace (Solution Template)
Deploy the VM-Series Firewall from the Azure China Marketplace (Solution Template) The following instructions show you how to deploy the solution template for the VM-Series ...
Deploy the VM-Series Firewall from the Azure Marketplace (Solution Template)
Deploy the VM-Series Firewall from the Azure Marketplace (Solution Template) The following instructions show you how to deploy the solution template for the VM-Series firewall ...
Set up the VM-Series Firewall on Azure
Set up the VM-Series Firewall on Azure VM-Series firewall on Azure brings the security features of Palo Alto Networks next generation firewall as a virtual ...
Start Using the VM-Series & Azure Application Gateway Template
Start Using the VM-Series & Azure Application Gateway Template The VM-Series & Azure Application Gateway template launches all the resources you need to deploy and ...
VM-Series and Azure Application Gateway Template
VM-Series and Azure Application Gateway Template The VM-Series and Azure Application Gateway template launches an Azure Application Gateway (Layer 7 load balancer) and an Azure ...
Deployments Supported on Azure
Deployments Supported on Azure Use the VM-Series firewall on Azure to secure your network users in the following scenarios: Hybrid and VNet to VNet —The ...
Azure Networking and VM-Series
Azure Networking and VM-Series The Azure VNet infrastructure does not require virtual machines to have a network interface in each subnet. The architecture includes an ...