Azure lab configuration used for automatic deployment of Palo Alto virtual firewall appliances in HA mode into the Azure VNet. The automation process uses a mix of bash scripting and Azure ARM templates. Each pair (one interface from each node) of PA interfaces is put into a separate transit subnet. The actual host deployment subnets are attached to those transit subnets by the appropriate configuration of subnet routing tables. Each host subnet has deployed a virtual machine in it. Those are being used to test connectivity over the PA firewalls. One virtual machine is also deployed directly into the WAN transit subnet to test connectivity from on-prem to the LAB before the traffic hits PAs. Ansible reconfigures all virtual hosts after deployment to add lab users and install diagnostic tools like Nmap or IPerf. PaloAlto firewall initial configuration is loaded manually, but in the future, this will be done by the PaloAlto Bootstrap process.
-
Notifications
You must be signed in to change notification settings - Fork 0
Azure lab configuration used for automatic deployment of PaloAlto virtual firewall appliances in HA mode into the Azure VNet. Automation process uses mix of bash scripting and Azure ARM templates. Each pair (one interface from each node) of PA interfaces is put into separate transit subnet and the actual host deployment subnets are attached to t…
ccie18643/Azure-PaloAlto-Automation
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Azure lab configuration used for automatic deployment of PaloAlto virtual firewall appliances in HA mode into the Azure VNet. Automation process uses mix of bash scripting and Azure ARM templates. Each pair (one interface from each node) of PA interfaces is put into separate transit subnet and the actual host deployment subnets are attached to t…
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published