Microsoft Azure Site-To-Site VPN Configuration (with Palo Alto Firewall)
3 min read
3 hours ago
Published on Nov 06, 2025
This response is partially generated with the help of AI. It may contain inaccuracies.
Table of Contents
Introduction
This tutorial provides a step-by-step guide to configure a site-to-site VPN connection between Microsoft Azure and a Palo Alto Firewall. By following these steps, you will establish a secure connection, allowing for seamless communication between your Azure resources and on-premises networks.
Step 1: Understand the Network Diagram
- Familiarize yourself with the network architecture.
- Identify key components:
- Azure Virtual Network
- Palo Alto Firewall
- Site-to-Site VPN connection
Step 2: Set Up Azure VPN Connectivity
- Follow these main connectivity steps:
- Create a Virtual Network in Azure.
- Set up a Gateway Subnet.
- Create a Local Network Gateway.
- Create a Virtual Network Gateway.
- Establish the VPN Connection.
Step 3: Create a Virtual Network
- Log in to the Azure portal.
- Navigate to "Create a resource" and select "Virtual Network."
- Fill in the required information:
- Name: Choose a name for the virtual network.
- Address space: Define an address space (e.g., 10.1.0.0/16).
- Subnet: Create a subnet within this address space.
- Click "Review + Create" to finalize the virtual network.
Step 4: Create a Gateway Subnet
- Within the virtual network settings:
- Click on "Subnets."
- Add a new subnet called "GatewaySubnet."
- Assign it a subnet range (e.g., 10.1.255.0/27).
- Save the configuration.
Step 5: Create a Local Network Gateway
- In the Azure portal, navigate to "Create a resource."
- Search for "Local Network Gateway" and select it.
- Provide the necessary details:
- Name: Give it a recognizable name.
- IP address: Enter the public IP address of your Palo Alto Firewall.
- Address space: Specify the address space of your on-premises network (e.g., 192.168.1.0/24).
- Review and create the local network gateway.
Step 6: Create a Virtual Network Gateway
- Go to "Create a resource" and find "Virtual Network Gateway."
- Enter the following details:
- Name: Choose a name for your gateway.
- Region: Select the same region as your virtual network.
- Gateway type: Select "VPN."
- VPN type: Choose "Route-based."
- SKU: Select the appropriate SKU based on your requirements.
- Link it to the Virtual Network created in Step 3 and configure the public IP address.
- After reviewing, click "Create."
Step 7: Create the VPN Connection
- After the Virtual Network Gateway is created, navigate to it.
- Select "Connections" and then "Add."
- Enter the connection details:
- Name: Assign a name to the connection.
- Connection type: Choose "Site-to-Site (IPSec)."
- Local network gateway: Select the gateway created in Step 5.
- Shared key: Set a shared key (must match the Palo Alto configuration).
- Review and create the connection.
Step 8: Verify VPN Tunnel Connection
- Once the connection is established, check its status in the Azure portal.
- Ensure the VPN tunnel shows as "Connected."
- Troubleshoot any issues by checking configurations on both Azure and the Palo Alto Firewall.
Conclusion
You have now configured a site-to-site VPN connection between Microsoft Azure and a Palo Alto Firewall. Key steps included creating the virtual network, gateway subnet, local network gateway, virtual network gateway, and the VPN connection itself. For further configuration on the Palo Alto side, refer to the dedicated video tutorial. Ensure both ends are correctly configured to maintain a stable connection.