Skip to content

Creating an Azure Connection for an MVE with Palo Alto VM-Series

You can create a network connection from an MVE (a Palo Alto VM-Series firewall) to Azure ExpressRoute with Virtual Cross Connections (VXCs). You can create either a private connection or a public (Microsoft) connection.


Before you begin, create an MVE (VM-Series). For details, see Creating a VM-Series MVE.

There are three parts to adding an ExpressRoute connection to your MVE and VM-Series.

  1. Set up your ExpressRoute plan and deploy the ExpressRoute circuit in the Azure console. When deployed, you get a service key. For additional details, see the Microsoft ExpressRoute documentation.

  2. In the Megaport ONE Portal, create a connection (VXC) from your MVE to your ExpressRoute location.

  3. In VM-Series, create a new interface and add the details of the ExpressRoute connection.

The instructions in this topic step through the second and third parts.


MVE for Palo Alto requires configuration steps in both VM-Series and the Megaport ONE Portal for all cloud connections.

Adding the ExpressRoute connection in the Megaport ONE Portal

To set up the ExpressRoute connection, you need to create the connection in the Megaport ONE Portal. If you haven’t already created an MVE, see Creating a VM-Series MVE.

To create a connection to ExpressRoute from the Megaport ONE Portal

  1. In the Megaport ONE Portal, choose Networking > Services.

  2. Click the gear icon Gear icon next to the MVE you want to use.

  3. Select Add Connection.
    Add Connection

  4. Specify the General connection details:

    • Connection Type – Select Cloud VXC.
    • Cloud Provider – Select Microsoft Azure. New Connection
  5. Specify the Azure Configuration details:

    • Azure ExpressRoute Service Key – Add the ExpressRoute service key.
      The Portal verifies the key and then displays the available port locations based on the ExpressRoute region. For example, if your ExpressRoute service is deployed in the Australia East region in Sydney, you can select the Sydney targets.
    • Available Azure Ports – Select the connection point for your first connection. To deploy a second connection (and this is recommended), you can create a second VXC - enter the same service key and select the other connection target.
      Configuration details
  6. Specify the VXC Configuration details:

    • VXC Name – The name of your VXC to be shown in the Megaport ONE Portal.
    • Rate Limit – The speed of your connection in Mbps. The rate limit for the VXC will be capped at the maximum allowable based on the ExpressRoute service key.
    • A-End vNIC – Specify a vNIC by using the pre-populated default, or select from the drop-down list.
    • A-End VLAN (optional) – Specify an unused VLAN ID for this connection (for ExpressRoute this is the S-Tag).
      This must be a unique VLAN ID on this MVE and can range from 2 to 4093. If you specify a VLAN ID that is already in use, the system displays the next available VLAN number. The VLAN ID must be unique to proceed with the order. If you don’t specify a value, Megaport ONE will assign one.


      If you do not enable this option, the VXC appears active but it does not recognize traffic.

    • Single Azure peering VLAN (optional) – This option provides a single tag VLAN solution. You configure peering in Azure with the MVE VLAN (A-End) and the peer VLAN set in Azure (B-End). Note, you can have only one peering type (Private or Microsoft) per VXC with this option. This value must match the A-End VLAN. To set up an inner VLAN and Q-n-Q, turn off this option.
      New Connection

  7. Specify the Billing Details:

    • Service Level Reference (optional) – Specify a unique identifying number for the VXC to be used for billing purposes, such as a cost center number or a unique customer ID. The service level reference number appears for each service under the Product section of the invoice. You can also edit this field for an existing service.


      Partner-managed accounts can apply a Partner Deal to a service.

    • Monthly Price – The monthly rate is based on location and size.

    • Promo Code – If you have a promotional code, enter it and click Add Code.

  8. Click Create Connection.

  9. Review the new configuration and pricing then click Confirm.

When the VXC configuration completes, the VXC status is green (Service Is Up).


In the Azure Resource Management console, the provider status will be Provisioned.

Azure Provider Status

When provisioned, you need to configure peerings. You can configure private and Microsoft peering. Click the peer to configure and provide these details:

  • Peer ASN – Enter the ASN for the MVE.
  • IPv4 Subnets – From each of these subnets, MVE uses the first usable IP address and Microsoft uses the second usable IP for its router.
  • VLAN ID – Enter the A-End VLAN from the MVE. (Note, the VLAN ID in the Azure console can be different from the A-End VLAN.)
  • Shared Key – Optionally, enter an MD5 password for BGP.

Azure Peering Configuration

Adding the ExpressRoute connection to VM-Series

After you create the connection from your MVE to Azure and set up the connection in the Azure console, you need to configure it in VM-Series. This involves creating an interface and configuring BGP settings, ASNs, VLANs, and MD5 values.

To add the Azure Cloud connection in VM-Series

  1. Collect the connection details from the Azure console.
    Display the details of the connection you created in Azure for this connection. Note the values for the Peer ASN, Shared Key, VLAN ID, and IPv4 Primary Subnet.

  2. Collect the connection details from the Megaport ONE Portal.
    Click the gear icon for the Azure connection from your MVE and click the Details view. Note the value for the A-End VLAN.

  3. Log in to the VM-Series.

  4. Choose Network > Interfaces.

  5. Select the A-End MVE (ethernet1/1).

  6. Click Add Subinterface.

  7. Provide these details:

    • Interface Name – Enter a name for the subinterface. In the adjacent field, enter a number to identify the subinterface.

    • Comment – Enter an alternate name.

    • Tag – Specify the A-End VLAN associated with this Azure Connection in the Megaport ONE Portal.

    • Virtual Router – Select a virtual router to the interface, as required by your network.

  8. Select the IPv4 tab.

  9. Select Static as the Type.
  10. Click +Add to add a new IP address.
  11. Enter the IPv4 address and netmask.
    These values are available in the Azure console. The IP addresses and CIDR appear in the IPv4 Primary Subnet field; MVE uses the first usable IP address and Azure uses the second usable IP for its router. For this field, enter the MVE (first usable) IP address.
  12. Click OK.
  13. Click Commit in the top right corner.
    Commit button
  14. Review the changes and click Commit. Commit changes

The new VLAN interface appears with your ethernet1/1 physical interface.

Next, you will create a security zone so the interface can route traffic.

To create a security zone

  1. Select the ethernet1/1.1010 subinterface.
  2. Select New Zone from the Security Zone drop-down list.
  3. Specify a name for the security zone.
    Security zone settings
  4. Click +Add under Interfaces and add ethernet1/1.1010 to the security zone.
  5. Specify any additional details as required for your network security.
  6. Select New Zone Protection Profile from the Zone Protection Profile drop-down list.
  7. Specify any details as required for your network security. This example uses all the defaults.
    Zone Protection profile
  8. Click OK.
  9. Click OK in the Layer3 Subinterface screen.
  10. Click Commit in the top right corner.
    Commit button
  11. Review the changes and click Commit. Commit changes

At this point, you have created the interface. Next, you need to create the BGP session.

To create the BGP session

  1. In VM-Series, choose Network > Virtual Routers.
  2. Select the virtual router.
    Select virtual router
  3. In the left pane, select BGP.
  4. Provide the following BGP details:

    • Enable – Select this check box to start the BGP session after committing these changes.
    • Router ID – Enter the first usable IP address from the IPv4 Primary Subnet from the Azure console.
    • AS Number – Provide the ASN for the MVE connection. Provide the ASN for the MVE connection. Use the Peer ASN from the Azure console. BGP details
  5. Click +Add under Auth Profiles.

  6. Specify a Profile Name.
    Profile name
  7. Enter and confirm the auth password.
  8. Click OK.
  9. Select the Peer Group tab.
    Peer Group tab
  10. Click +Add to add a peer group.
  11. Specify a name for the peer group. For example, AWS-xxxx.
  12. Specify eBGP as the session type.
  13. Specify any additional details as required for your network.
  14. Click +Add to add a new peer.
  15. Specify the details for the peer:
    • Name – Specify a name for the peer.
    • Peer AS – Specify the Azure-side ASN of 12076. This is a fixed value, and appears in the connection details on the Azure console.
    • Local Address – Select the proper subinterface and IP address from the drop-down list.
    • Peer Address – Enter the second usable IP address from the IPv4 Primary Subnet from the Azure console.
      BGP Peer Group screen

Validating your Azure connection

To check the status of the BGP peer

  1. Choose Network > Virtual Routers.
  2. Locate your virtual router (default).
  3. Click More Runtime Stats in the Runtime Stats column on the right.
    Runtime stats
  4. Select the BGP tab, and then select the Peer tab.
  5. Verify that the peer status is Established.
    Established status

Last update: 2023-09-22