Configure Palo Alto Networks Cloud NGFW in Virtual WAN

Palo Alto Networks Cloud Next Generation Firewall (NGFW) is a cloud-native software-as-a-service (SaaS) security offering that can be deployed into the Virtual WAN hub as a bump-in-the-wire solution to inspect network traffic. The following document describes some of the key features, critical use cases and how-to associated with using Palo Alto Networks Cloud NGFW in Virtual WAN.

Background

Palo Alto Networks Cloud NGFW integration with Virtual WAN provides the following benefits to customers:

  • Protect critical workloads using a highly scalable SaaS security offering that can be injected as a bump-in-the-wire solution in Virtual WAN.
  • Fully managed infrastructure and software lifecycle under software-as-a-service model.
  • Consumption-based pay-as-you-go billing.
  • Cloud-native experience that has a tight integration with Azure to provide end-to-end Firewall management using Azure portal or Azure APIs. Rule and policy management is also optionally configurable through Palo Alto Network management solution Panorama.
  • Dedicated and streamlined support channel between Azure and Palo Alto Networks to troubleshoot issues.
  • One-click routing to configure Virtual WAN to inspect on-premises, Virtual Network and Internet-outbound traffic using Palo Alto Networks Cloud NGFW.

Screenshot showing hub sample Virtual WAN topology with Cloud NGFW.

Use cases

The following section describes the common security use cases for Palo Alto Networks Cloud NGFW in Virtual WAN.

Private (on-premises and virtual network) traffic

East-west traffic inspection

Virtual WAN routes traffic from Virtual Networks to Virtual Network or from on-premises (Site-to-site VPN, ExpressRoute, Point-to-site VPN) to on-premises to Cloud NGFW deployed in the hub for inspection.

Screenshot showing east-west traffic flows with Cloud NGFW.

North-south traffic inspection

Virtual WAN also routes traffic between Virtual Networks and on-premises (Site-to-site VPN, ExpressRoute, Point-to-site VPN) to on-premises to Cloud NGFW deployed in the hub for inspection.

Screenshot showing north-south traffic flows with Cloud NGFW.

Internet edge

Note

The 0.0.0.0/0 default route does not propagate across hubs. On-premises and Virtual Networks can only use local Cloud NGFW resources to access the Internet. Additionally, for Destination NAT use cases, Cloud NGFW can only forward incoming traffic to local Virtual Networks and on-premises.

Internet egress

Virtual WAN can be configured to route internet-bound traffic from Virtual Networks or on-premises to Cloud NGFW for inspection and internet breakout. You can selectively choose which Virtual Network(s) or on-premise(s) learn the default route (0.0.0.0/0) and use Palo Alto Cloud NGFW for internet egress. In this use case, Azure automatically NATs the source IP of your internet-bound packet to the public IPs associated with the Cloud NGFW.

For more information on internet-outbound capabilities and available settings, see Palo Alto Networks documentation.

Screenshot showing internet-outbound traffic flows with Cloud NGFW.

Internet ingress (DNAT)

You can also configure Palo Alto Networks for Destination-NAT (DNAT). Destination NAT allows a user to access and communicate with an application hosted on-premises or in an Azure Virtual Network via the public IPs associated with the Cloud NGFW.

For more information on internet-inbound (DNAT) capabilities and available settings, see Palo Alto Networks documentation.

Screenshot showing internet-inbound traffic flows with Cloud NGFW.

Before you begin

The steps in this article assume you have already created a Virtual WAN.

To create a new virtual WAN, use the steps in the following article:

Known limitations

Register resource provider

To use Palo Alto Networks Cloud NGFW, you must register the PaloAltoNetworks.Cloudngfw resource provider to your subscription with an API version that is at minimum 2022-08-29-preview.

For more information on how to register a Resource Provider to an Azure subscription, see Azure resource providers and types documentation.

Deploy virtual hub

The following steps describe how to deploy a Virtual Hub that can be used with Palo Alto Networks Cloud NGFW.

  1. Navigate to your Virtual WAN resource.
  2. On the left hand menu, select Hubs under Connectivity.
  3. Click on New Hub.
  4. Under Basics specify a region for your Virtual Hub. Make sure the region is listed in Available Palo Alto Cloud NGFW regions. Additionally, specify a name, address space, Virtual hub capacity and Hub routing preference for your hub. Screenshot showing hub creation page. Region selector box is highlighted.
  5. Select and configure the Gateways (Site-to-site VPN, Point-to-site VPN, ExpressRoute) you want to deploy in the Virtual Hub. You can deploy Gateways later if you wish.
  6. Click Review + create.
  7. Click Create
  8. Navigate to your newly created hub and wait for the Routing Status to be Provisioned. This step can take up to 30 minutes.

Deploy Palo Alto Networks Cloud NGFW

Note

You must wait for the routing status of the hub to be "Provisioned" before deploying Cloud NGFW.

  1. Navigate to your Virtual Hub and click on SaaS solutions under Third-party providers.
  2. Click Create SaaS and select Palo Alto Networks Cloud NGFW.
  3. Click Create. Screenshot showing SaaS creation page.
  4. Provide a name for your Firewall. Make sure the region of the Firewall is the same as the region of your Virtual Hub. For more information on the available configuration options for Palo Alto Networks Cloud NGFW, see Palo Alto Networks documentation for Cloud NGFW.

Configure Routing

Note

You can't configure routing intent until the Cloud NGFW is successfully provisioned.

  1. Navigate to your Virtual Hub and click on Routing intent and policies under Routing
  2. If you want to use Palo Alto Networks Cloud NGFW to inspect outbound Internet traffic (traffic between Virtual Networks or on-premises and the Internet), under Internet traffic select SaaS solution. For the Next Hop resource, select your Cloud NGFW resource. Screenshot showing internet routing policy creation.
  3. If you want to use Palo Alto Networks Cloud NGFW to inspect private traffic (traffic between all Virtual Networks and on-premises in your Virtual WAN), under Private traffic select SaaS solution. For the Next Hop resource, select your Cloud NGFW resource. Screenshot showing private routing policy creation.

Manage Palo Alto Networks Cloud NGFW

The following section describes how you can manage your Palo Alto Networks Cloud NGFW (rules, IP addresses, security configurations etc.)

  1. Navigate to your Virtual Hub and click on SaaS solutions.
  2. Click on Click here under Manage SaaS. Screenshot showing how to manage your SaaS solution.
  3. For more information on the available configuration options for Palo Alto Networks Cloud NGFW, see Palo Alto Networks documentation for Cloud NGFW.

Delete Palo Alto Networks Cloud NGFW

Note

You can't delete your Virtual Hub until both the Cloud NGFW and Virtual WAN SaaS solution are deleted.

The following steps describe how to delete a Cloud NGFW offer:

  1. Navigate to your Virtual Hub and click on SaaS solutions.
  2. Click on Click here under Manage SaaS. Screenshot showing how to manage your SaaS solution.
  3. Click on Delete in the upper left-hand corner of the page. Screenshot showing delete Cloud NGFW options.
  4. After the delete operation is successful, navigate back to your Virtual Hub's SaaS solutions page.
  5. Click on the line that corresponds to your Cloud NGFW and click Delete SaaS on the upper left-hand corner of the page. This option won't be available until Step 3 runs to completion. Screenshot showing how to delete your SaaS solution.

Troubleshooting

The following section describes common issues seen when using Palo Alto Networks Cloud NGFW in Virtual WAN.

Troubleshooting Cloud NGFW creation

  • Ensure your Virtual Hubs are deployed in one of the following regions listed in Palo Alto Networks documentation.
  • Ensure the Routing status of the Virtual Hub is "Provisioned." Attempts to create Cloud NGFW prior to routing being provisioned will fail.
  • Ensure registration to the PaloAltoNetworks.Cloudngfw resource provider is successful.

Troubleshooting deletion

  • A SaaS solution can't be deleted until the linked Cloud NGFW resource is deleted. Therefore, delete the Cloud NGFW resource before deleting the SaaS solution resource.
  • A SaaS solution resource that is currently the next hop resource for routing intent can't be deleted. Routing intent must be deleted before the SaaS solution resource can be deleted.
  • Similarly, a Virtual Hub resource that has a SaaS solution can't be deleted. The SaaS solution must be deleted before the Virtual Hub is deleted.

Troubleshooting Routing intent and policies

  • Ensure Cloud NGFW deployment is completed successfully before attempting to configure Routing Intent.
  • Ensure all your on-premises and Azure Virtual Networks are in RFC1918 (subnets within 10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12). If there are networks that are not in RFC1918, make sure those prefixes are listed in the Private Traffic prefixes text box.
  • For more information about troubleshooting routing intent, see Routing Intent documentation. This document describes pre-requisites, common errors associated with configuring routing intent and troubleshooting tips.

Troubleshooting Palo Alto Networks Cloud NGFW configuration

Next steps