VM-Series Virtual Firewalls Integrate with Azure Gateway Load Balancer

Palo Alto Networks is pleased to announce the integration of VM-Series virtual firewalls with Microsoft Azure Gateway Load Balancer. This integration has been designed to efficiently augment native Microsoft Azure network security capabilities with next-generation threat protection – so customers can more easily attain greater performance and scalability. Now available in beta, the integration is slated for general availability in the very near future.

Realize Both Speed and Security

Load balancing is critical for evenly distributing loads of incoming network traffic across a group of backend resources or servers. With Azure Load Balancer, you can scale your applications and create highly available services.

But as organizations move more and more workloads into the cloud, setting up security becomes a top-of-mind concern. With this integration, VM-Series virtual Next-Generation firewalls augment native Microsoft Azure network security capabilities with next-generation threat protection. This includes preventing exploits, malware, previously unknown threats, and data exfiltration to keep apps and data in Azure safe.

That’s why Palo Alto Networks is proud to offer the VM-Series software firewall integration with Azure Gateway Load Balancer, which provides simplified connectivity while ensuring secure support for critical zone-based policies for Internet ingress traffic.

Improve security and simplify network design with VM-Series virtual firewalls and Azure Gateway Load Balancer.

Figure 1: VM-Series virtual firewalls working in tandem with Azure Gateway Load Balancer

Preserve Full Visibility on Packet Sources

Truly securing traffic ingress requires complete visibility of the traffic source’s identity as it travels to its destination in the cloud. This was previously difficult to achieve with inbound traffic. When VM-Series firewalls are deployed behind a public standard load balancer, the source IP addresses of inbound traffic are replaced with the IP address of the load balancer. As a result, application source identity is obfuscated.

But with the new VM-Series and Azure Gateway Load Balancer integration, traffic packet headers and payload are kept intact, which provides complete visibility of the source’s identity as it travels to its destination.

Discover Zone-Based Policy Support for Internet Ingress Traffic

The integration is designed to be fast and non-disruptive. You can continue to use your Hub VNET for centralizing your security by leveraging the Azure Gateway Load Balancer to scale and load-balance traffic across a stack of VM-Series firewalls. Plus, Gateway Load Balancer helps segment Internet-bound traffic from the VNET-bound traffic.

What this means is that you can now assign a trust zone to the VNET-bound traffic and the untrust-zone for the Internet bound traffic – and enhance security posture by continuing to author next-generation zone-based policies.

In addition, the VM-Series integration with Azure Gateway Load Balancer is also designed to provide the following customer benefits:

  • Scale with ease while managing costs
  • Improve VM-Series availability
  • Flow symmetry

Get a Head Start with the Beta and Find More Resources

We encourage you to try out the beta version of the VM-Series/Azure GWLB integration using PAN-OS version 10.1.2 in Azure Marketplace or on GitHub. We think you’ll be impressed. General availability of integration – along with zone-based policy support – will be available with the upcoming release of PAN-OS 10.1.4.

You can also find more information on how VM-Series adds a critical layer of protection to Azure environments on the Live Community Azure resource page. And to get a personalized demo tailored to your specific needs, sign up here to discover how to secure your Azure investments.