Create a Rulestack on Cloud NGFW for Azure
Table of Contents
Expand all | Collapse all
-
- Cloud NGFW for Azure
- Cloud NGFW Components
- Cloud NGFW for Azure Supported Regions
- Cloud NGFW for Azure Limits and Quotas
- Cloud NGFW for Azure Pricing
- Cloud NGFW for Azure Free Trial
- Cloud NGFW Credit Distribution and Management
- Start with Cloud NGFW for Azure
- Manage Cloud NGFW Roles for Azure Users
- Integrate Single Sign-on
- Monitor Cloud NGFW Health
- Create a Support Case
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for Azure Certifications
- Cloud NGFW For Azure Privacy and Data Protection
-
- About Rulestacks and Rules on Cloud NGFW for Azure
- Create a Rulestack on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Rule Objects
- Create a Prefix List on Cloud NGFW for Azure
- Create an FQDN List for Cloud NGFW on Azure
- Add a Certificate to Cloud NGFW for Azure
- Create Security Rules on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Services
- Enable DNS Security on Cloud NGFW for Azure
- Set Up Outbound Decryption on Cloud NGFW for Azure
- Set Up Inbound Decryption on Cloud NGFW for Azure
-
- Panorama Integration
- Panorama Integration Prerequisites
- Link the Cloud NGFW to Palo Alto Networks Management
- Use Panorama for Cloud NGFW Policy Management
- Simplify Your Panorama Deployment
- Enable User-ID on the Cloud NGFW for Azure
- Configure Service Routes for On-Prem Services
- Use XFF IP Address Values in Policy
- View Cloud NGFW Logs and Activity in Panorama
- View Traffic and Threat Logs in Strata Logging Service
- Strata Cloud Manager Policy Management
-
- Configure Logging for Cloud NGFW on Azure
- Cloud NGFW for Azure Traffic Log Fields
- Cloud NGFW for Azure Threat Log Fields
- Cloud NGFW for Azure Decryption Log Fields
- Enable Log Settings
- Disable Log Settings
- Enable Activity Logging on Cloud NGFW for Azure
- Multiple Logging Destinations on Cloud NGFW for Azure
- View the Logs
- View Audit Logs on a Firewall Resource
- View Audit Logs on Resource Groups
- What's New
- Cloud NGFW for Azure Known Issues
- Cloud NGFW for Azure Addressed Issues
Create a Rulestack on Cloud NGFW for Azure
In the Cloud NGFW, you can author local rulestacks if you are assigned the
LocalRuleStackAdmin role.
If you are
deploying the firewall for the first time and intend to use Strata Cloud Manager
for policy management, you must deploy a local rulestack first. Deploying a
local rulestack is free.
Complete the following procedure to create a rulestack in Azure Portal.
- In the Azure Portal, use the search bar to locate the Local Rulestack .Click Create.Choose Subscription and Resource Group from their respective drop-downs in the Project details section of the Basics tab.Enter a descriptive Name for your rulestack.Enter the supported Region for your rulestack.Click the Tags tab.
- Enter the Name and Value.Click Review+create.Review the rulestack options you have selected and click Create.After successfully creating the local rulestack, register it in the Azure Portal by creating a customer support case.To register the local rulestack in the Azure portal, navigate to Support + troubleshooting and select Create Case at Customer Support Portal.Consider the following:
- You may have used a different email address to subscribe to Cloud NGFW and a different one to access the Palo Alto Networks Customer Support Portal account.
- Alternatively, you can create a dedicated Palo Alto Networks support account for Cloud NGFW.
- In both of these cases you skip the registration option during the initial login process to the Cloud NGFW tenant but register your tenant in the Customer Support Portal.
When you select the option to Create Case at Customer Support Portal in the Azure portal you're directed to the Customer Support Portal where you will enter your login credentials. You can use your existing Customer Support Portal login credentials, or create a new Customer Support Portal login account. Enter your email address and resolve the Captcha, then click Next.After entering your email address, the Customer Support Portal determines if you have an existing account, or if you need a new one. If you have Palo Alto Networks products associated with the email address you have entered, information for the Cloud Marketplace (Tenant ID and Serial Number) appear. Click Next to log in to the Customer Support Portal and continue with the registration process.Follow the prompts to complete the rest of the registration process.For existing accounts, registration information is prepopulated. For new Customer Support Portal accounts you will be prompted to set up the account (for example, which Palo Alto products you use).Once registration is complete a success message appears. You can use the Customer Support Portal to verify this by selecting Products > Assets. In the Assets page, select the Cloud NGFW tab:You can use the Azure portal to verify that the Cloud NGFW tenant is now registered. In the Azure portal navigate to Support + troubleshooting:The Tenant ID and Product serial number now reflect the link between the Palo Alto Networks Customer Support Portal and Azure portal.