Skip to content

Commit 7fb042e

Browse files
Minor edits.
1 parent d687d0d commit 7fb042e

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

  • articles/partner-solutions/palo-alto

articles/partner-solutions/palo-alto/faq.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ sections:
3232
- name: Deployment
3333
questions:
3434
- question: What deployment options are available for Cloud NGFW?
35-
answer: Cloud NGFW supports two deployment architectures - hub-and-spoke virtual networks and Virtual WAN. For web applications, you can deploy Cloud NGFW behind Azure Application Gateway to combine reverse proxy, load balancing, and web application firewall capabilities with Cloud NGFW network security.
35+
answer: Cloud NGFW supports two deployment architectures, which are hub-and-spoke virtual networks and Virtual WAN. For web applications, you can deploy Cloud NGFW behind Azure Application Gateway to combine reverse proxy, load balancing, and web application firewall capabilities with Cloud NGFW network security.
3636
- question: What is the recommended architecture for securing web applications?
3737
answer: |
3838
The recommended architecture uses Application Gateway as a reverse proxy and load balancer with Cloud NGFW for network security inspection. This combination provides:
@@ -95,14 +95,14 @@ sections:
9595
- name: Security Policy Considerations
9696
questions:
9797
- question: Is the X-Forwarded-For (XFF) HTTP header supported with Azure Rulestacks?
98-
answer: Currently, use of the X-Forwarded-For (XFF) HTTP header field to enforce security policy isn't supported with Azure Rulestacks. This limitation is important to consider when configuring policies for Application Gateway traffic.
98+
answer: Currently, use of the X-Forwarded-For HTTP header field to enforce security policy isn't supported with Azure Rulestacks. This limitation is important to consider when configuring policies for Application Gateway traffic.
9999
- question: How should I configure zone-based policies when using Panorama?
100100
answer: |
101101
When using Panorama with Cloud NGFW, configure two zones: private and public. Traffic flows are:
102102
- **Inbound**: from public to private
103103
- **Outbound**: from private to public
104104
- **East-West**: from private to private
105-
Apply special considerations to zone-based policies to ensure traffic from Application Gateway (private IP source) is treated as inbound with appropriate security rules, threat prevention profiles, and inline cloud analysis.
105+
Apply special considerations to zone-based policies to ensure traffic from Application Gateway private IP source is treated as inbound with appropriate security rules, threat prevention profiles, and inline cloud analysis.
106106
- question: How do I view and manage security rules in Azure Rulestack?
107107
answer: In the Cloud NGFW resource's **Security Policies** settings, select your rulestack name to access the rulestack management page. Select **Rules** to view existing rules and add, edit, or delete them. When editing rules, you can configure parameters and validate the configuration before saving.
108108

@@ -119,7 +119,7 @@ sections:
119119
- name: Billing and Plans
120120
questions:
121121
- question: What billing plan options are available?
122-
answer: Cloud NGFW is available under a pay-as-you-go (PAYG) billing model. Billing through Azure provides unified invoicing for both infrastructure and software costs in a single line item.
122+
answer: Cloud NGFW is available under a pay-as-you-go billing model. Billing through Azure provides unified invoicing for both infrastructure and software costs in a single line item.
123123
- question: Can I change my billing plan after deployment?
124124
answer: Yes. You can change your billing plan by selecting **Change Plan** from the resource overview page in the Azure portal.
125125
- question: How is Cloud NGFW billed?

0 commit comments

Comments
 (0)