* [Blog](https://www.paloaltonetworks.com.au/blog) * [Network Security](https://www.paloaltonetworks.com.au/blog/network-security/) * [Hybrid Cloud Data Center](https://www.paloaltonetworks.com.au/blog/network-security/category/hybrid-cloud-data-center/) * Cut Complexity -- Get Rapi... # Cut Complexity -- Get Rapid, Automated Firewall Deployment in Azure [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2Fnetwork-security%2Fcut-complexity-get-rapid-automated-firewall-deployment-in-azure%2F) [](https://twitter.com/share?text=Cut+Complexity+%E2%80%93+Get+Rapid%2C+Automated+Firewall+Deployment+in+Azure&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2Fnetwork-security%2Fcut-complexity-get-rapid-automated-firewall-deployment-in-azure%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2Fnetwork-security%2Fcut-complexity-get-rapid-automated-firewall-deployment-in-azure%2F&title=Cut+Complexity+%E2%80%93+Get+Rapid%2C+Automated+Firewall+Deployment+in+Azure&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/network-security/cut-complexity-get-rapid-automated-firewall-deployment-in-azure/&ts=markdown) \[\](mailto:?subject=Cut Complexity – Get Rapid, Automated Firewall Deployment in Azure) Link copied By [Vijay Arumugam Kannan](https://www.paloaltonetworks.com/blog/author/vijay-arumugam-kannan/?ts=markdown "Posts by Vijay Arumugam Kannan") Jan 22, 2021 5 minutes [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown) [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown) [Azure Virtual WAN](https://www.paloaltonetworks.com/blog/tag/azure-virtual-wan/?ts=markdown) [Virtualized Next-Generation Firewall](https://www.paloaltonetworks.com/blog/tag/virtualized-next-generation-firewall/?ts=markdown) Building and operating your firewall deployments in Azure is now significantly more simple with the availability of [Panorama Orchestrated VM-Series Firewall Deployments in Azure](https://docs.paloaltonetworks.com/vm-series/10-0/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/panorama-orchestrated-deployments-in-azure.html). This time-saving workflow feature eliminates the need to manage complex templates for firewall deployments in Azure, which allows you to rapidly deploy, manage, scale, and monitor [VM-Series virtual firewalls](https://www.paloaltonetworks.com/prisma/vm-series) in your Azure environment with just a few clicks in Panorama. We're excited about this development because, until now, you had to use multiple templates to deploy an Azure load balancer to scale and load balance traffic across the stack of firewalls in your hub VNET. In addition to slowing deployment times, these template-based solutions are prone to user error because they are complex to operate and involve multiple components and moving parts. **Speed and Ease Are Critical for Effective Cloud Network Security** Our Azure customers rely on Palo Alto Networks VM-Series virtual firewalls to [augment native public cloud network security controls](https://www.paloaltonetworks.com/resources/webcasts/why-native-public-cloud-network-security-is-not-enough) with next-generation threat protection capabilities. Speed of deployment and ease of use is critical, because VM-Series firewalls prevent exploits, malware, and previously unknown threats from compromising applications. These virtualized NGFWs prevent threats from moving laterally between workloads and stop data in your Azure networks from being exfiltrated. Plus, Palo Alto Networks [Panorama network security management](https://www.paloaltonetworks.com/network-security/panorama) enables you to centrally manage and maintain consistent policies across VM-Series firewalls. **A Single Workflow Speeds Deployment and Operation** The Panorama Orchestrated VM-Series deployment feature offers a simpler alternative to template-based deployment and integration. It consolidates all configuration tasks into a single workflow and removes the complex aspects of deploying, scaling, and provisioning VM-Series in your Azure environment. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/01/word-image-24.png) *Panorama Orchestrated VM-Series Deployments in action* **Significantly Reduce Time-Consuming VM-Series Deployment and Scaling in Azure** The benefits can be significant, because Panorama Orchestrated VM-Series Deployments is designed to help: * \*\*Reduce user error with automated deployment and configurations:\*\*You no longer need to operate complex templates, or require a deeper understanding of Azure networking constructs to deploy firewall stacks and integrate them with your Azure environment. Instead, you use the workflow that Panorama's Azure plugin offers to deploy scalable VM-Series virtual firewalls in your Azure VNets. The Panorama plugin deploys the necessary Azure resources, such as Azure Standard load balancers (ILB), subnets, NAT gateways, Virtual Machine Scale Sets (VMSS), and Public IP address objects. Panorama's plugin automatically configures all Azure resources it deploys and enables the necessary Panorama and VM-Series configurations for traffic inspection. * \*\*Boost cloud security cost-effectiveness with more deployment flexibility:\*\*To meet your governance model, regional presence, and application requirements, you can use the workflow to create multiple firewall deployments in one or more regions in your Azure environment. Each deployment includes one or two firewall stacks in your VNet. You can also configure each of these stacks to be static or to autoscale by specifying the minimum and the maximum number of firewalls. To meet increased demands and minimize costs whenever possible, the firewall stacks scale in and out along with your application traffic. * \*\*Keep security consistent and effective through simplified operations:\*\*You can now use your familiar Panorama as the tool to orchestrate VM-Series firewall deployments in your Azure networks -- and then centrally manage the security policies of the firewalls. The Panorama plugin also links to your Azure ARM and Azure Monitor portal and helps you gain visibility into VM-Series deployment status, usage, and performance. Additionally, the Panorama plugin auto-populates the required Azure and firewall configurations as you onboard new applications. You just need to configure the VNet route tables to redirect traffic to the deployment's private IP address or addresses. **Deployment Options Meet the Need for Flexibility** Two deployment options are available for the Panorama Orchestrated VM-Series Deployments workflow: * **Common hub model** -- In this option, you use the workflow to create a deployment with a hub stack, which leverages the internal standard load balancer to scale and load balance across a set of firewalls. You can then expose the Azure Standard Load balancer's private IP address for traffic inspection and threat prevention. The hub stack allows you to protect the inbound, outbound, and east-west traffic of your applications. * **Dedicated inbound model** -- Here, you use the workflow to create a deployment with two firewall stacks. As with the common hub model, the hub stack is used to protect outbound and east-west traffic. But now, you use a dedicated inbound stack of firewalls that can scale independently to add visibility and security to all your internet-facing HTTP and non-HTTP applications. **See the Workflow Experience in Action** To find out which option works best for you - and to understand how the workflow will benefit your organization, take a look at this concise [demo video](https://www.youtube.com/watch?v=ZetwRzA-D7I). You can also attach your deployment to the Azure vWan hub as discussed [here](https://github.com/wwce/azure-arm-virtual-wan). We also encourage you to read more about this feature on our [TechDocs portal](https://docs.paloaltonetworks.com/vm-series/10-0/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/panorama-orchestrated-deployments-in-azure.html). You can also find more information on how VM-Series adds a critical layer of protection to Azure environments on the[Live Community Azure resource page](https://live.paloaltonetworks.com/t5/aws/ct-p/Azure). And to get a personalized demo tailored to your specific needs, [sign up here](https://www.paloaltonetworks.com/company/request-demo) to discover how to secure your Azure investments. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Intelligent Traffic Offload Uses SmartNIC/DPU for Hyperscale Security](https://www.paloaltonetworks.com.au/blog/2021/07/intelligent-traffic-offload/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### New: The Industry's Most Flexible Software NGFW Consumption Model](https://www.paloaltonetworks.com.au/blog/2021/02/netsec-flexible-firewall-licensing/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### Why Sacrifice One Vital Cloud Network Security Need for Another?](https://www.paloaltonetworks.com.au/blog/network-security/netsec-choosing-virtual-firewalls/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Strata Network Security Platform](https://www.paloaltonetworks.com/blog/network-security/category/strata-network-security-platform/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Palo Alto Networks Leads the Way with Quantum and Multicloud Security](https://www.paloaltonetworks.com.au/blog/2025/08/paves-way-for-quantum-ready-security/) ### [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### Your Hybrid Cloud Is Under Attack: Explore Zero Trust at Our Event](https://www.paloaltonetworks.com.au/blog/network-security/your-hybrid-cloud-under-attack-zero-trust/) ### [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### New: More Cloud NGFW Scalability Across Multiple AWS VPCs](https://www.paloaltonetworks.com.au/blog/network-security/cloud-ngfw-across-multiple-aws-vpcs/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language