: Start Using the & Azure Application Gateway Template
Focus
Focus

Start Using the & Azure Application Gateway Template

Table of Contents

Start Using the & Azure Application Gateway Template

Where Can I Use This?What Do I Need?
  • Microsoft Azure
  • Microsoft Azure Stack
  • Azure® Marketplace
  • Azure Government Marketplace
  • License (PAYG or BYOL)
  • plugin
  • Panorama
  • Panorama plugin for Azure
The & Azure Application Gateway template launches all the resources you need to deploy and secure your web workloads for internet facing deployments on Microsoft Azure, excluding Azure China. This section provides details on how to deploy the template, configure the firewalls to route and secure traffic destined to the web servers, and extend the capabilities and resources that this template provides to accommodate your deployment needs.
Deploy the Template to Azure
Use the following instructions to deploy the template to Azure.
All VM-Series firewall interfaces must be assigned an IPv4 address when deployed in a public cloud environment. IPv6 addresses are not supported.
  1. Deploy the template.
    Currently not available for deploying in Azure China.
    1. Click Deploy to Azure.
    2. Fill in the details for deploying the template. See for a description and the default values, if any, for each parameter.
      At a minimum, you have to pick the Azure Subscription, Resource Group, Location, Storage Account Name, and a Username/password or SSH Key for the administrative account on the firewalls.
    3. Click Purchase to accept the terms and conditions and deploy the resources.
      If you have validation errors, click to view the details and fix your errors.
    4. On the Azure portal, verify that you have successfully deployed the template resources, including the firewalls.
      1. Select DashboardResource Groups, select the resource group.
      2. Select Overview to review all the resources that have been deployed. The deployment status should display Succeeded.
      3. Note the Public IP address or the DNS name assigned to eth0-VM-Series0 and eth0-VM-Series1 to access the management interface of the firewalls.
  2. Log in to the firewalls.
    1. Using a secure connection (HTTPS) from your web browser, login to the IP address for eth0-0 or the DNS name for the firewall.
    2. Enter the username/password you defined in the parameters file. You will see a certificate warning; that’s okay. Continue to the webpage.
  3. Configure the firewall.
    You can either configure the firewall manually or import the Sample Configuration File provided in the GitHub repository and customize it for your security needs.
    • Configure the firewall manually—You must do the following at a minimum:
    1. Configure the dataplane network interfaces as Layer 3 interfaces on the firewall (NetworkInterfacesEthernet).
    2. Add a static rule to the virtual router on the firewall. This static rule specifies the firewall’s untrust interface IP address as the next hop address for any traffic destined for ethernet1/1. (NetworkVirtual Routers, select the router and click Static Routes).
    3. Create security policy rules (PoliciesSecurity) to allow inbound and outbound traffic on the firewall.
    4. Add NAT policies (PoliciesNAT). Create destination NAT and source NAT rules on the firewall to send traffic to the web servers and back out to the client who initiated the request.
      The destination NAT rule is for all traffic that arrives on the firewall’s untrust interface. This rule translates the destination IP address on the packet to that of the internal load balancer so that all traffic is directed to the internal load balancer and on to the backend web servers.
      The source NAT rule is for all traffic from the backend web server and destined to the untrust interface on the firewall. This rule translates the source address to the IP address of the trust interface on the firewall.
    5. Commit your changes.
      • Import the sample configuration file:
    6. Download and save the Sample Configuration File to your local client.
    7. Select DeviceSetupOperations, click Import named configuration snapshot, Browse to the sample configuration file that you have saved locally, and click OK.
    8. Click Load named configuration snapshot, select the Name of the sample configuration file you imported, and click OK.
    9. Change the IP address of the address objects and the static route to match the IP address from the CIDR block you used. Update address objects to use the private IP addresses for eth1-0 and eth1-1.
    10. Important Create a new admin user account. Select DeviceAdministrators and Add a new account.
    11. Modify the Hostname in the General Settings widget in DeviceSetupManagement.
    12. Commit your changes, and log out. The commit overwrites the running configuration with the sample configuration file and updates you just made. On commit, the hostname and the administrator user account that you specified when deploying the template are overwritten. You will now need to login using the new admin user account and password.
      • Log in to the firewall—Use the credentials you created and delete the pan demo administrative account imported as part of the sample configuration file.
  4. Log in and configure the other instance of the firewall.
  5. Verify that you have configured the firewalls properly.
    From your web browser, use HTTP to access the IP address or DNS name for the app gateway. Be able to view the default Apache 2 Ubuntu webpage.
    If you have used the sample configuration firewall, login to the firewall and view the Traffic logs generated on session start in MonitorLogsTraffic.