Skip to content

Commit d687d0d

Browse files
Acrolinx and add FAQ to TOC.
1 parent aa51db8 commit d687d0d

3 files changed

Lines changed: 10 additions & 6 deletions

File tree

articles/partner-solutions/palo-alto/faq.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### YamlMime:FAQ
22
metadata:
33
title: Cloud NGFW by Palo Alto Networks frequently asked questions
4-
description: Answers to common questions about using Cloud NGFW by Palo Alto Networks
4+
description: Answers to common questions about using Cloud NGFW by Palo Alto Networks including deployment, management, and configuration.
55
ms.topic: faq
66
ai-usage: ai-generated
77
ms.date: 12/18/2025
@@ -13,7 +13,7 @@ sections:
1313
- name: General
1414
questions:
1515
- question: What is Cloud NGFW by Palo Alto Networks?
16-
answer: Cloud NGFW by Palo Alto Networks is a next-generation firewall delivered as an integrated service on Azure. It's codeveloped and managed by Microsoft and Palo Alto Networks, and combines the scalability and reliability of Azure with Palo Alto Networks network security expertise. You can find it in Azure Marketplace and manage it through the Azure portal.
16+
answer: Cloud NGFW by Palo Alto Networks is a next-generation firewall delivered as an integrated service on Azure. Microsoft and Palo Alto Networks codeveloped and managed it. The product combines the scalability and reliability of Azure with Palo Alto Networks network security expertise. You can find it in Azure Marketplace and manage it through the Azure portal.
1717
- question: What are the key capabilities of Cloud NGFW?
1818
answer: |
1919
Cloud NGFW by Palo Alto Networks provides core firewall capabilities including:
@@ -74,7 +74,7 @@ sections:
7474
- name: Networking and NAT
7575
questions:
7676
- question: What does DNAT do in Cloud NGFW?
77-
answer: Destination Network Address Translation (DNAT) allows Cloud NGFW to accept client connections on public IP addresses and perform address translation and traffic inspection. This enables inbound connections to be routed to internal resources while enforcing security policies.
77+
answer: Destination Network Address Translation (DNAT) allows Cloud NGFW to accept client connections on public IP addresses and perform address translation and traffic inspection. This approach enables inbound connections to be routed to internal resources while enforcing security policies.
7878
- question: What is Source NAT (SNAT) in Cloud NGFW?
7979
answer: Source Network Address Translation (SNAT) allows you to configure how outbound traffic from your virtual network is translated. You can specify public IP addresses for outbound traffic, and Cloud NGFW can replace the source IP with a trusted firewall IP address through Private Source NAT.
8080
- question: How do I configure traffic routing through Cloud NGFW?
@@ -88,14 +88,14 @@ sections:
8888
answer: Deploy Application Gateway in a separate virtual network and peer it with your hub network containing Cloud NGFW. Create user-defined routes in the Application Gateway subnet to direct traffic through Cloud NGFW for inspection. Application Gateway functions as a reverse proxy and WAF, while Cloud NGFW provides network security inspection.
8989
- question: Should I disable default route propagation when using Application Gateway with Virtual WAN?
9090
answer: |
91-
Yes, when connecting the Application Gateway virtual network to a Virtual WAN hub, disable the **Propagate Default Route** option to prevent asymmetric routing. This allows Application Gateway-sourced traffic to break out locally rather than returning through the virtual hub.
91+
Yes, when connecting the Application Gateway virtual network to a Virtual WAN hub, disable the **Propagate Default Route** option to prevent asymmetric routing. This configuration allows Application Gateway-sourced traffic to break out locally rather than returning through the virtual hub.
9292
- question: What traffic should go through Cloud NGFW versus Application Gateway?
9393
answer: HTTP and HTTPS web traffic should be routed through Application Gateway for reverse proxy, load balancing, and WAF protection. Non-HTTP connections should be directed to Cloud NGFW's public IP address for network inspection and policy enforcement.
9494

9595
- name: Security Policy Considerations
9696
questions:
9797
- question: Is the X-Forwarded-For (XFF) HTTP header supported with Azure Rulestacks?
98-
answer: Currently, use of the X-Forwarded-For (XFF) HTTP header field to enforce security policy is not supported with Azure Rulestacks. This limitation is important to consider when configuring policies for Application Gateway traffic.
98+
answer: Currently, use of the X-Forwarded-For (XFF) HTTP header field to enforce security policy isn't supported with Azure Rulestacks. This limitation is important to consider when configuring policies for Application Gateway traffic.
9999
- question: How should I configure zone-based policies when using Panorama?
100100
answer: |
101101
When using Panorama with Cloud NGFW, configure two zones: private and public. Traffic flows are:
@@ -119,7 +119,7 @@ sections:
119119
- name: Billing and Plans
120120
questions:
121121
- question: What billing plan options are available?
122-
answer: Cloud NGFW is available under a Pay-As-You-Go (PAYG) billing model. Billing through Azure provides unified invoicing for both infrastructure and software costs in a single line item.
122+
answer: Cloud NGFW is available under a pay-as-you-go (PAYG) billing model. Billing through Azure provides unified invoicing for both infrastructure and software costs in a single line item.
123123
- question: Can I change my billing plan after deployment?
124124
answer: Yes. You can change your billing plan by selecting **Change Plan** from the resource overview page in the Azure portal.
125125
- question: How is Cloud NGFW billed?

articles/partner-solutions/palo-alto/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ landingContent:
1919
links:
2020
- text: What is Cloud NGFW by Palo Alto Networks?
2121
url: overview.md
22+
- text: FAQ
23+
url: faq.yml
2224
- linkListType: how-to-guide
2325
links:
2426
- text: Manage your Cloud NGFW by Palo Alto Networks resource

articles/partner-solutions/palo-alto/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ items:
55
items:
66
- name: What is Cloud NGFW by Palo Alto Networks?
77
href: overview.md
8+
- name: FAQ
9+
href: faq.yml
810
- name: Quickstarts
911
expanded: true
1012
items:

0 commit comments

Comments
 (0)