You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/partner-solutions/palo-alto/palo-alto-application-gateway.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
-
title: Cloud NGFW for Azure deployment behind Azure Application Gateway
3
-
description: This article describes how to use Azure Application Gateway with Cloud NGFW for Azure by Palo Alto Networks to help secure web applications.
2
+
title: Cloud Next Generation Firewall (NGFW) for Azure deployment behind Azure Application Gateway
3
+
description: Learn how to secure web applications with Cloud NGFW for Azure by Palo Alto Networks.
4
4
5
5
ms.topic: conceptual
6
6
ms.date: 12/09/2024
7
7
8
8
---
9
9
# Cloud NGFW for Azure deployment behind Azure Application Gateway
10
10
11
-
This article describes a recommended architecture for deploying Cloud NGFW for Azure by Palo Alto Networks behind Azure Application Gateway. Cloud NGFW for Azure is a next-generation firewall that's delivered as an Azure Native ISV Service. You can find Cloud NGFW for Azure in Azure Marketplace and consume it in your Azure Virtual Network and Azure Virtual WAN instances.
11
+
This article describes a recommended architecture for deploying Cloud NGFW for Azure by Palo Alto Networks behind Azure Application Gateway. Cloud NGFW for Azure is a next-generation firewall delivered as an integrated service for Azure. You can find Cloud NGFW for Azure in Azure Marketplace and consume it in your Azure Virtual Network and Azure Virtual WAN instances.
12
12
13
13
With Cloud NGFW for Azure, you can access core firewall capabilities from Palo Alto Networks, such as App-ID and Advanced URL Filtering. It provides threat prevention and detection through cloud-delivered security services and threat prevention signatures. The deployment model in this article uses the reverse proxy and web application firewall (WAF) functionality of Application Gateway by using the network security capabilities of Cloud NGFW for Azure.
14
14
@@ -20,7 +20,7 @@ Cloud NGFW for Azure helps secure inbound, outbound, and lateral traffic that tr
20
20
21
21
To help secure ingress connections, a Cloud NGFW for Azure resource supports Destination Network Address Translation (DNAT) configurations. Cloud NGFW for Azure accepts client connections on one or more of the configured public IP addresses and performs the address translation and traffic inspection. It also enforces user-configured security policies.
22
22
23
-
For web applications, you benefit from using Application Gateway as both a reverse proxy and a load balancer. This combination offers the best security when you want to secure both web-based and nonweb workloads in Azure and on-premises ingress connections. Cloud NGFW for Azure allows the use of a single public IP address of Application Gateway to proxy the HTTP and HTTPS connections to many web application back ends. Any non-HTTP connections should be directed through the Cloud NGFW for Azure public IP address for inspection and policy enforcement.
23
+
For web applications, you benefit from using Application Gateway as both a reverse proxy and a load balancer. This combination offers the best security when you want to secure both web-based and nonweb workloads in Azure and on-premises ingress connections. You can use a single public IP address of Application Gateway to proxy the HTTP and HTTPS connections to many web application back ends. Any non-HTTP connections should be directed through the Cloud NGFW for Azure public IP address for inspection and policy enforcement.
24
24
25
25
Application Gateway also offers WAF capabilities to look for patterns that indicate an attack at the web application layer. For more information about Application Gateway features, see the [service documentation](/azure/application-gateway).
26
26
@@ -49,7 +49,7 @@ Here's an example user-defined route:
49
49
- Next hop type: virtual appliance
50
50
- Next hop IP address: 172.16.1.132
51
51
52
-
After you deploy and configure the infrastructure, you must apply a security policy to Cloud NGFW for Azure that allows the connection from the Application Gateway virtual network. Application Gateway proxies the client's TCP connection and creates a new connection to the destination specified in the back-end target. The source IP of this connection is the private IP address from the Application Gateway subnet. Configure the security policy accordingly, by using the Application Gateway virtual network prefix to ensure that it's treated as the inbound flow. The original source IP of the client isn't preserved at layer 3.
52
+
After you deploy and configure the infrastructure, you must apply a security policy to Cloud NGFW for Azure that allows the connection from the Application Gateway virtual network. Application Gateway proxies the client's TCP connection and creates a new connection to the destination specified in the back-end target. The source IP of this connection is the private IP address from the Application Gateway subnet. Ensure the Application Gateway virtual network prefix is treated as the inbound flow. The original source IP of the client isn't preserved at layer 3.
53
53
54
54
Nonweb traffic can continue using the public IP addresses and DNAT rules in Cloud NGFW for Azure.
55
55
@@ -86,11 +86,11 @@ When you manage Cloud NGFW for Azure resources by using Panorama, you can use ex
86
86
87
87
:::image type="content" source="media/palo-alto-app-gateway/palo-alto-app-gateway-zones-1.png" alt-text="Diagram that shows zone placement and traffic flows in Cloud NGFW for Azure.":::
88
88
89
-
The ingress traffic that comes through Application Gatewayis forwarded through the private zone to the Cloud NGFW for Azure resource for inspection and security policy enforcement.
89
+
The Application Gateway's ingress traffic is forwarded through the private zone to the Cloud NGFW for inspection and security policy enforcement.
90
90
91
91
:::image type="content" source="media/palo-alto-app-gateway/palo-alto-app-gateway-zones-2.png" alt-text="Diagram that shows zone placement in Cloud NGFW for Azure and traffic flow through Application Gateway.":::
92
92
93
-
You need to apply special considerations to zone-based policies to ensure that the traffic coming from Application Gateway is treated as inbound. These policies include security rules, threat prevention profiles, and inline cloud analysis. The traffic is treated as private-to-private because Application Gateway proxies it, and it's sourced through the private IP address from the Application Gateway subnet.
93
+
You need to apply special considerations to zone-based policies to ensure that the traffic coming from Application Gateway is treated as inbound. These policies include security rules, threat prevention profiles, and inline cloud analysis. The traffic is treated as private-to-private because Application Gateway proxies it, and is sourced through the private IP address from the Application Gateway subnet.
Copy file name to clipboardExpand all lines: articles/partner-solutions/palo-alto/palo-alto-create.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
---
2
-
title: Create a Cloud NGFW by Palo Alto Networks - an Azure Native ISV Service resource
3
-
description: This article describes how to use the Azure portal to create a Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks - an Azure Native ISV Service resource.
2
+
title: Create a Cloud Next Generation Firewall (NGFW) by Palo Alto Networks
3
+
description: This article describes how to use the Azure portal to create a Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks.
4
4
5
5
ms.custom: references_regions
6
6
ms.topic: quickstart
7
7
ms.date: 12/09/2024
8
8
9
9
---
10
10
11
-
# QuickStart: Get started with Cloud NGFW by Palo Alto Networks - an Azure Native ISV Service resource
11
+
# QuickStart: Get started with Cloud NGFW by Palo Alto Networks
12
12
13
-
In this quickstart, you use the Azure Marketplace to find and create an instance of **Cloud NGFW by Palo Alto Networks - an Azure Native ISV Service resource**.
13
+
In this quickstart, you use Azure Marketplace to find and create an instance of **Cloud NGFW by Palo Alto Networks - an Azure Native ISV Service resource**.
14
14
15
15
## Create a new Cloud NGFW by Palo Alto Networks resource
16
16
@@ -44,7 +44,7 @@ In this section, you see how create a Palo Alto Networks resource.
44
44
45
45
### Security Policy
46
46
47
-
1. After setting the DNS values, select the **Next: Security Policy** to see the **Security Policies** tab. You can set the policies for the firewall using this tab.
47
+
1. After setting the Domain Name System (DNS) values, select the **Next: Security Policy** to see the **Security Policies** tab. You can set the policies for the firewall using this tab.
48
48
49
49
:::image type="content" source="media/palo-alto-create/palo-alto-rulestack.png" alt-text="Screenshot of the Rulestack in the Palo Alto Networks create experience.":::
50
50
@@ -105,7 +105,7 @@ Next, you must accept the Terms of Use for the new Palo Alto Networks resource.
105
105
106
106
-[Manage the Palo Alto Networks resource](palo-alto-manage.md)
107
107
108
-
- Get Started with Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service on
108
+
- Get Started with Cloud Next-Generation Firewall by Palo Alto Networks on
Copy file name to clipboardExpand all lines: articles/partner-solutions/palo-alto/palo-alto-manage.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,13 @@
1
1
---
2
-
title: Manage Cloud NGFW by Palo Alto Networks resource through the Azure portal
3
-
description: This article describes management functions for Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks on the Azure portal.
2
+
title: Manage Cloud Next Generation Firewall (NGFW) by Palo Alto Networks resource through the Azure portal
3
+
description: Manage your Cloud NGFW by Palo Alto Networks in Azure portal, including networking, NAT, rulestack settings, logging, Domain Name System (DNS) proxy configuration, and billing plan changes.
4
4
5
5
ms.topic: conceptual
6
6
ms.date: 12/09/2024
7
-
7
+
ms.custom:
8
+
- ai-gen-docs-bap
9
+
- ai-gen-desc
10
+
- ai-seo-date:12/09/2024
8
11
---
9
12
10
13
# Manage your Cloud NGFW by Palo Alto Networks through the portal
@@ -26,7 +29,7 @@ From the Resource menu, select your Cloud NGFW by Palo Alto Networks deployment.
26
29
27
30
1. Select the **Type** by checking the **Virtual Network** or **Virtual WAN** options.
28
31
29
-
1. You can see the **Virtual Network** , **Private Subnet** and **Public Subnet** details.
32
+
1. You can see the **Virtual Network** , **Private Subnet**, and **Public Subnet** details.
30
33
31
34
1. From **Source Network Address Translation (SNAT)**, you can select the **Enable Source NAT**.
32
35
@@ -87,7 +90,7 @@ After the account is deleted, logs are no longer sent to Cloud NGFW by Palo Alto
87
90
88
91
- For help with troubleshooting, see [Troubleshooting Palo Alto integration with Azure](palo-alto-troubleshoot.md).
89
92
90
-
- Get Started with Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service on
93
+
- Get Started with Cloud Next-Generation Firewall by Palo Alto Networks on
Copy file name to clipboardExpand all lines: articles/partner-solutions/palo-alto/palo-alto-overview.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,23 @@
1
1
---
2
-
title: What is Cloud NGFW by Palo Alto Networks
3
-
description: Learn about using Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks from the Azure Marketplace.
2
+
title: What is Cloud NGFW by Palo Alto Networks?
3
+
description: Learn about using Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks from Azure Marketplace.
4
4
5
5
ms.topic: conceptual
6
-
ms.date: 07/10/2023
6
+
ms.date: 12/09/2024
7
7
8
8
9
9
---
10
10
11
-
# What is Cloud NGFW by Palo Alto Networks - an Azure Native ISV Service?
11
+
# What is Cloud NGFW by Palo Alto Networks?
12
12
13
13
14
-
Azure Native ISV Services enable you to easily provision, manage, and tightly integrate independent software vendor (ISV) software and services on Azure. This Azure Native ISV Service is developed and managed by Microsoft and Palo Alto Networks.
14
+
Azure Native ISV Services enable you to easily provision, manage, and tightly integrate independent software vendor (ISV) software and services on Azure. Microsoft and Palo Alto Networks developed this service and manage it together.
15
15
16
-
You can find Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service in the [Azure portal](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/PaloAltoNetworks.Cloudngfw%2Ffirewalls) or get it on [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/paloaltonetworks.pan_swfw_cloud_ngfw?tab=Overview).
16
+
You can find Cloud Next-Generation Firewall by Palo Alto Networks in the [Azure portal](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/PaloAltoNetworks.Cloudngfw%2Ffirewalls) or get it on [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/paloaltonetworks.pan_swfw_cloud_ngfw?tab=Overview).
17
17
18
-
Palo Alto Networks is leading provider of cloud security, offering next-generation cybersecurity to thousands of customers globally, across all sectors. With the integration of Cloud Next-Generation Firewall by Palo Alto for Azure into the Azure ecosystem we are delivering an integrated experience and empowering a growing ecosystem of developers and customers to help protect their organizations on Azure.
18
+
Palo Alto Networks is leading provider of cloud security, offering next-generation cybersecurity to thousands of customers globally, across all sectors. The integration of Cloud Next-Generation Firewall by Palo Alto for Azure delivers an integrated experience while empowering developers to protect their organizations on Azure.
19
19
20
-
The Palo Alto Networks offering in the Azure Marketplace allows you to manage the Cloud Next-Generation Firewall by Palo Alto Networks resources in the Azure portal as an integrated service. It enables you to easily utilize Palo Alto Networks best-in-class network security capabilities on Azure, and you can manage it using either Palo Alto Networks Panorama policy management solution or directly from the Azure portal. Cloud Next-Generation Firewall by Palo Alto - an Azure Native ISV Service combines the scalability and reliability of Microsoft Azure with Palo Alto Networks deep expertise in network security.
20
+
The Palo Alto Networks offering in Azure Marketplace allows you to manage the Cloud Next-Generation Firewall by Palo Alto Networks resources in the Azure portal as an integrated service. It enables you to easily utilize Palo Alto Networks best-in-class network security capabilities on Azure, and you can manage it using either Palo Alto Networks Panorama policy management solution or directly from the Azure portal. Cloud Next-Generation Firewall by Palo Alto combines the scalability and reliability of Microsoft Azure with Palo Alto Networks deep expertise in network security.
21
21
22
22
You can create and manage Palo Alto Networks resources through the Azure portal. You can set up the Cloud Next-Generation Firewall by Palo Alto Networks resources through a resource provider named `PaloAltoNetworks.Cloudngfw`. Palo Alto Networks owns and runs the software as a service (SaaS) application including the accounts created.
23
23
@@ -28,20 +28,19 @@ Here are the key capabilities provided by the Palo Alto integration:
28
28
-**Single-Sign on to Palo Alto** - No separate sign-up needed from Palo Alto portal.
29
29
-**Manage VNET and VWAN traffic** to use existing configuration (.conf) files for Palo Alto deployment.
30
30
31
-
## Pre-requisites for Cloud NGFW by Palo Alto Networks
31
+
## Prerequisites for Cloud NGFW by Palo Alto Networks
32
32
33
-
- Subscription owner
34
-
- Cloud NGFW by Palo Alto Networks resource can only be set up by users who have Owner access on the Azure subscription. Ensure you have the appropriate Owner access before starting to set up this integration.
33
+
Only users who have *Owner* access on the Azure subscription can set up Cloud NGFW by Palo Alto Networks. Ensure you have the appropriate Owner access before starting to set up this integration.
35
34
36
-
## Find the Palo Alto Network offerings in the Azure Marketplace
35
+
## Find the Palo Alto Network offerings in Azure Marketplace
37
36
38
-
1. Navigate to the Azure Marketplace page.
37
+
1. Navigate to Azure Marketplace page.
39
38
40
39
1. Search for _Palo Alto_. Select **Cloud Next-Generation Firewall by Palo Alto**.
41
40
42
41
1. In the Marketplace, you see the offer for **Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service**. Select, **Subscribe**.
43
42
44
-
:::image type="content" source="media/palo-alto-overview/palo-alto-marketplace.png" alt-text="Screenshot of Cloud NGFW by Palo Alto Networks in the Azure Marketplace.":::
43
+
:::image type="content" source="media/palo-alto-overview/palo-alto-marketplace.png" alt-text="Screenshot of Cloud NGFW by Palo Alto Networks in Azure Marketplace.":::
45
44
46
45
1. In the working pane, you see the options from Palo Alto Networks. Select **Create** in Cloud NGFW by Palo Alto Networks.
Copy file name to clipboardExpand all lines: articles/partner-solutions/palo-alto/palo-alto-troubleshoot.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,21 @@ title: Troubleshooting your Cloud NGFW by Palo Alto Networks
3
3
description: This article provides information about getting support and troubleshooting a Cloud NGFW (Next-Generation Firewall) by Palo Alto Networks.
4
4
5
5
ms.topic: conceptual
6
-
ms.date: 10/18/2024
6
+
ms.date: 12/09/2024
7
7
8
8
---
9
9
10
-
# Troubleshooting Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service
10
+
# Troubleshooting Cloud Next-Generation Firewall by Palo Alto Networks
11
11
12
12
You can get support for your Palo Alto deployment through a **New Support request**. The procedure for creating the request is here. In addition, you can find troubleshooting for problems you might experience in creating and using a Palo Alto deployment.
13
13
14
14
## Getting support
15
15
16
16
1. To contact support about a Cloud NGFW by Palo Alto Networks resource, select your Cloud NGFW by Palo Alto Networks resource in the Resource menu.
17
17
18
-
1. Select the **New Support request** in Resource menu on the left.
18
+
1. Select the **New Support request**, then **Raise a support ticket**.
19
19
20
-
1.Select **Raise a support ticket** and fill out the details.
20
+
1.Fill in the details for your support request.
21
21
22
22
## Troubleshooting
23
23
@@ -42,7 +42,7 @@ Only users who have Owner access can set up a Palo Alto resource on the Azure su
42
42
43
43
- Learn about [managing your instance](palo-alto-manage.md) of Palo Alto.
44
44
45
-
- Get Started with Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV Service on
45
+
- Get Started with Cloud Next-Generation Firewall by Palo Alto Networks on
0 commit comments