===== Palo Alto VM-Series Interface Mapping in Microsoft Azure =====
^ Azure NIC order ^ PAN-OS name (CLI / GUI) ^ Typical purpose ^ Notes ^
| NIC0 | Management – ''eth0'' / ''mgmt'' | Out-of-band management (HTTPS, SSH, Panorama, HA1 if you want) | Lives in its own management subnet; the marketplace template always assigns a private IP and (optionally) a public IP. |
| NIC1 | Dataplane – ''ethernet1/1'' | //Untrust// / Internet-facing | First dataplane port; the template wires it to an untrust subnet and can attach a public IP. |
| NIC2 | Dataplane – ''ethernet1/2'' | //Trust// / internal side | Second dataplane port; the template puts it in a trust subnet. |
| NIC3, NIC4 … | ''ethernet1/3'', ''ethernet1/4'', … | Extra zones (DMZ, HA2, etc.) | Added in ascending order. For HA you normally use ''ethernet1/3'' as HA2. |
==== Key facts to remember ====
The marketplace template deploys three NICs by default (mgmt, untrust, trust).
For HA you attach a fourth NIC (which becomes ''ethernet1/3'') while the VM is powered off.
Azure numbers NICs sequentially (0, 1, 2 …) and PAN-OS picks them up in that exact order.
Adding a new NIC later: stop the VM → attach NIC → start the VM.
Each NIC must be in its own subnet. Azure won’t allow two NICs from the same VM in the same subnet; plan separate management, untrust, trust, dmz (or ha) subnets.
Management-interface swap is optional.
If you need the first dataplane port to act as management (e.g., behind a Gateway Load Balancer), enable the swap feature (see below).
VM size limits NIC count. Common sizes (D-series, F-series) allow up to 4 NICs; certain families (e.g., Dsv5) allow up to 8. Plan for DMZ and HA links accordingly.
==== Management-interface swap (optional) ====
set system setting mgmt-interface-swap enable yes
request restart system
==== Checking the mapping from the CLI ====
show interface all
show interface management
The MAC addresses shown match the NIC blades in the Azure portal.
==== Quick configuration workflow ====
Deploy the marketplace solution (or ARM/Bicep/Terraform) and point the three default NICs at your management, untrust, and trust subnets.
Power off the VM → add extra NIC(s) for HA2 or DMZ → power on the VM.
In PAN-OS → Network → Interfaces, set:
''ethernet1/1'' → //untrust// zone (public IP optional)
''ethernet1/2'' → //trust// zone
''ethernet1/3'' (if present) → HA2 or DMZ as needed
Create UDRs (user-defined routes) in every spoke subnet so the next hop is the private IP of the relevant firewall interface instead of Azure’s default system route.
Commit and verify with a ping or security-policy test.
Once you remember the mapping NIC0 → mgmt, NIC1 → ''ethernet1/1'', NIC2 → ''ethernet1/2'', everything else falls neatly into place.
===== Configuring Azure Interfaces for Palo Alto VM-Series Firewall =====
This guide explains how to configure Azure network interfaces for Palo Alto Networks VM-Series firewall using the Azure CLI and Palo Alto CLI.
==== 1. Azure CLI: Configuring Network Interfaces ====
=== 1.1. Create a Network Interface ===
To create a network interface in a specific resource group and attach it to a virtual network (VNet):
```bash
az network nic create \
--resource-group \
--name \
--vnet-name \
--subnet