You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/partner-solutions/palo-alto/faq.yml
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ sections:
32
32
- name: Deployment
33
33
questions:
34
34
- question: What deployment options are available for Cloud NGFW?
35
-
answer: Cloud NGFW supports two deployment architectures - hub-and-spoke virtual networks and Virtual WAN. For web applications, you can deploy Cloud NGFW behind Azure Application Gateway to combine reverse proxy, load balancing, and web application firewall capabilities with Cloud NGFW network security.
35
+
answer: Cloud NGFW supports two deployment architectures, which are hub-and-spoke virtual networks and Virtual WAN. For web applications, you can deploy Cloud NGFW behind Azure Application Gateway to combine reverse proxy, load balancing, and web application firewall capabilities with Cloud NGFW network security.
36
36
- question: What is the recommended architecture for securing web applications?
37
37
answer: |
38
38
The recommended architecture uses Application Gateway as a reverse proxy and load balancer with Cloud NGFW for network security inspection. This combination provides:
@@ -95,14 +95,14 @@ sections:
95
95
- name: Security Policy Considerations
96
96
questions:
97
97
- question: Is the X-Forwarded-For (XFF) HTTP header supported with Azure Rulestacks?
98
-
answer: Currently, use of the X-Forwarded-For (XFF) HTTP header field to enforce security policy isn't supported with Azure Rulestacks. This limitation is important to consider when configuring policies for Application Gateway traffic.
98
+
answer: Currently, use of the X-Forwarded-For HTTP header field to enforce security policy isn't supported with Azure Rulestacks. This limitation is important to consider when configuring policies for Application Gateway traffic.
99
99
- question: How should I configure zone-based policies when using Panorama?
100
100
answer: |
101
101
When using Panorama with Cloud NGFW, configure two zones: private and public. Traffic flows are:
102
102
- **Inbound**: from public to private
103
103
- **Outbound**: from private to public
104
104
- **East-West**: from private to private
105
-
Apply special considerations to zone-based policies to ensure traffic from Application Gateway (private IP source) is treated as inbound with appropriate security rules, threat prevention profiles, and inline cloud analysis.
105
+
Apply special considerations to zone-based policies to ensure traffic from Application Gateway private IP source is treated as inbound with appropriate security rules, threat prevention profiles, and inline cloud analysis.
106
106
- question: How do I view and manage security rules in Azure Rulestack?
107
107
answer: In the Cloud NGFW resource's **Security Policies** settings, select your rulestack name to access the rulestack management page. Select **Rules** to view existing rules and add, edit, or delete them. When editing rules, you can configure parameters and validate the configuration before saving.
108
108
@@ -119,7 +119,7 @@ sections:
119
119
- name: Billing and Plans
120
120
questions:
121
121
- question: What billing plan options are available?
122
-
answer: Cloud NGFW is available under a pay-as-you-go (PAYG) billing model. Billing through Azure provides unified invoicing for both infrastructure and software costs in a single line item.
122
+
answer: Cloud NGFW is available under a pay-as-you-go billing model. Billing through Azure provides unified invoicing for both infrastructure and software costs in a single line item.
123
123
- question: Can I change my billing plan after deployment?
124
124
answer: Yes. You can change your billing plan by selecting **Change Plan** from the resource overview page in the Azure portal.
0 commit comments