Transit Gateway to Palo Alto VM-Series Workflow

This is not a common scenario. You would only set up this type of connection if you want to connect an Aviatrix Transit gateway to a firewall that is outside your Cloud service provider (for example, in a branch office or warehouse).

This document describes how to build a Transit connection between an Aviatrix Transit Gateway and Palo Alto Networks Firewall. To simulate an on-prem Firewall, we use a VM-Series in an AWS VPC.

Network setup is as following:

  • VPC1 (with Aviatrix Transit Gateway)

    • VPC1 CIDR: 10.5.0.0/16

    • VPC1 Public Subnet CIDR: 10.5.3.0/24

    • VPC1 Private Subnet CIDR: 10.5.2.0/24

  • VPC2 (with Palo Alto Networks VM-series)

    • VPC2 CIDR: 10.0.0.0/16

    • VPC2 Public Subnet CIDR: 10.0.0.0/24

    • VPC2 Private Subnet CIDR: 10.0.1.0/24

  • Sample subnet advertised with the help of BGP - 192.168.0.24/32 (loopback interface on PaloAlto)

Configuration WorkFlow:

  1. In CoPilot, navigate to Cloud Fabric > Gateways > Transit Gateways.

  2. Create a Transit gateway in AWS that will connect to your Palo Alto firewall.

  3. To connect the transit VPC GW to Palo Alto, navigate to Networking > Connectivity > External Connections.

  4. Click +External Connection.

  5. In the Add External Connection dialog, configure the following:

    Field Value

    Connect Public Cloud to

    External Device > BGP over IPsec

    Local Gateway

    Select the Transit gateway you created in step 2 above

    Local ASN

    Enter the BGP AS Number the Transit Gateway will use to exchange routes with the external device.

    Remote ASN

    Enter the BGP AS number configured on the LAN

    Remote Gateway IP

    This is the Palo Alto WAN IP

  1. Click Save.

  2. Download the configuration.

  3. Use the information in the downloaded file to configure the router.

    The following is a sample configuration based on the Site2Cloud configuration above.

    image4

Configuring the Palo Alto VM-Series Firewall

Log into Palo Alto Networks VM Series and configure it as follows:

  1. Navigate to Network > Interfaces > Tunnel.

    paloalto create tunnel

  1. Click Add to create a new tunnel interface. In the Tunnel Interface dialog, on the Config tab, assign the following parameters.

    400
    Field Value

    Interface Name

    Type an ID in the yellow field next to Interface Name (for example, 45; this tunnel will then be named 'tunnel.45')

    Virtual Router

    Select the existing default virtual router

    Security Zone

    Select the layer 3 internal zone from which traffic originates

    If the tunnel interface is in a zone different from the one where the traffic will originate, you must create a policy to allow the traffic to flow from the source zone to the zone containing the tunnel interface.

  2. Click the IPv4 tab and add the tunnel IP address from the configuration downloaded above.

    400
  1. Click OK.

  2. Navigate to Network > Network Profiles > IKE Crypto.

  3. Click Add.

  4. In the IKE Crypto Profile dialog, define the IKE Crypto profile (IKEv1 Phase-1) parameters as shown.

400
  1. Click OK.

  2. Navigate to Network > Network Profiles > IKE Gateways and click Add.

  3. In the IKE Gateway dialog, configure the IKE Phase-1 Gateway as shown below. These parameters should match the Site2Cloud configuration downloaded here.

    image8
    Field Value

    Name

    avx_ike_gw

    Address Type

    IPv4

    Interface

    Palo Alto Networks WAN port (ethernet 1/1)

    Peer IP Address Type

    IP

    Peer Address

    Aviatrix Gateway public IP

    If using remote private IP, the Peer Address should be the remote private IP while Peer Identification should be the remote public IP.

    Authentication

    Pre-Shared Key

    Pre-shared Key / Confirm Pre-shared Key

    Key from downloaded configuration

    Peer Identification

    IP Address & Aviatrix Gateway public IP

  1. On the Advanced Options tab, select the IKE Crypto Profile created in step 6.

  2. Click OK.

  3. Navigate to Network > Network Profiles > IPSec Crypto.

  4. Click Add to create a new profile.

  5. In the IPSec Crypto Profile dialog, define the IPSec crypto profile (IKEv1 Phase-2). These parameters should match the relevant values in the downloaded configuration.

    400
  6. Click OK.

  7. Navigate to Network > IPSec Tunnels and click Add to create a new IPSec Tunnel.

  8. Configure the General tab as follows:

    image11
    Field Value

    Tunnel Interface

    Tunnel interface created in step 3

    IKE Gateway

    IKE gateway created in step 9

    IPSec Crypto Profile

    IPSec crypto profile created in step 14

    There is no need to configure proxy-id. Commit the configuration. The IPSec tunnel should now be green.
    image23
  9. Steps to configure BGP:

    1. Navigate to Network > Virtual Routers.

    2. Click the 'default' link.

    3. In the Virtual Router - default dialog, click the BGP tab, and then the Peer Group tab.

    4. Click Add.

    5. Name the peer group (e.g bgppeering) and then click Add as shown to add BGP peering.

      400
    6. In the Virtual Router-BGP-Peer Group-Peer dialog, enter the information as shown in the below screenshot. Click OK.

      image14
      image15
    7. After everything is created, click OK to commit the configuration. The Router ID is taken from the downloaded config file (it should be the IP address of the tunnel created).

      image16
    8. Click OK.

    9. Navigate to Network > default > Redistribution Profile.

    10. On the IPv4 tab, click Add.

    11. In the Name field, enter 'redis'.

    12. Enter a priority.

    13. Select the connect Source Type to create a redistribution profile.

      image12
    14. Click OK.

    15. On the Virtual Router dialog, click BGP > Redist Rules.

    16. Click Add to add the redistribution rule you just created and click OK.

      image18
    17. On the same Virtual Router dialog, navigate to BGP > Export and click Add.

    18. In the Virtual Router - BGP - Export Rule dialog, add a name in the Rules field, and Enable the Export rule.

    19. Click Add to add the Peer Group from which the routes will be imported. Select Match and define the options used to filter routing information.

      image19
    20. Click OK.

    21. After the BGP route has been advertised it looks like the following image. Navigate to Network → More runtime stats → BGP → RIB out.

      image20
  10. In the AWS portal, configure the VPC Route Table associated with the private subnet of VPC2. Add a route with VPC1 private subnet as the destination and Palo Alto Networks VM LAN port as the gateway.

  11. In CoPilot, go to Diagnostics > Diagnostic Tools > BGP Diagnostics.

  12. Select the gateway name from the dropdown list.

  13. In the Command field, enter the 'show Ip bgp' command.

  14. Click Run to verify the BGP Routes.