Can't get to Azure VM from on-prem network, using Palo Alto VM firewall

Joe Grover 526 Reputation points
2024-09-20T18:15:28.0466667+00:00

I have a test Azure virtual network set up with two virtual machines--a vendor's VM firewall and a Windows Server VM.

The virtual network has two subnets:

  • Hub subnet (has firewall's outside interface in it)
  • VM subnet (has firewall's inside interface in it, as well as the Windows Server VM that has its software firewall disabled)

I created a route table to direct traffic in VM subnet to the inside interface of the vendor VM firewall as the default gateway. After doing so the VM can get online fine. What I can't do is get traffic from the outside into the VM. I have the firewall policies set up the same as I have them on my on-prem firewall (albeit using the Azure private IP in the rules), and even tried allowing all traffic from our on-prem network's public IP to the Azure public IP of the firewall. I've had no luck.

At first, I thought this was just some weird bi-directional NAT thing to figure out on the firewall, but at the same time I wound up configuring a site-to-site VPN to the VM firewall from our on-prem network. I was able to get the tunnel up, and I can ping from the Windows Server VM through to my on-prem network...but I can't access the VM from on-prem over the VPN, just like I can't access it over the internet.

This makes me think that both issues have the same root cause, but I'm at a loss to figure it out. I opened up a support case with the vendor and spent the last few hours with them running captures on the on-prem firewall, the VM firewall, and the VM itself.

The traffic seems to be getting to the VM firewall's inside interface, but never makes it to the Windows VM itself. This is odd to me since the firewall can definitely see the VM (or the VM wouldn't be able to get online, or ping through the VPN tunnel to the on-prem network). All policies appear to be good--nothing is getting denied, it just is getting lost before it gets to the VM.

Has anyone seen this before or have any ideas of what to look at? Both myself and the vendor believe there's something in Azure that needs to be looked at/configured properly, but this is my first foray into Azure virtual networks so I'm not sure what to look at. Running the packet captures had us chasing our tails a bit because all of the Azure packets show as coming from 12:34:56:78:9a:bc, so we didn't know if those were the Windows VM or the firewall VM.

My primary concern is the VPN traffic--if I can't get that working, this is all a wash anyway. I need to find out what's happening to the traffic between the inside interface of my firewall and the virtual NIC of my server VM.

Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,509 questions
{count} votes

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.