<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS securing outbound communication in private subnet in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196278#M211</link>
    <description>&lt;P&gt;Hi Foobar,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can create custom URL and allow internet traffic for those URL for a specific subnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer the following doc.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-Custom-URL-Categories/ta-p/54355" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-Custom-URL-Categories/ta-p/54355&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-- Hardik Shah&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jan 2018 22:02:32 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2018-01-22T22:02:32Z</dc:date>
    <item>
      <title>AWS securing outbound communication in private subnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196277#M210</link>
      <description>&lt;P&gt;I've a private subnet in AWS that needs to be locked out from Internet access. But the instances in this private subnet need to access specific set of hosts (say update.java.com, update.ubuntu.com etc). Obviously the IP address associated with these hosts are dynamic. Does Palo Alto Networks Firewall (or any other solution) solve this scenario? If so, please provide pointers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2018 21:58:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196277#M210</guid>
      <dc:creator>foobar7</dc:creator>
      <dc:date>2018-01-22T21:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: AWS securing outbound communication in private subnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196278#M211</link>
      <description>&lt;P&gt;Hi Foobar,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can create custom URL and allow internet traffic for those URL for a specific subnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer the following doc.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-Custom-URL-Categories/ta-p/54355" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-Custom-URL-Categories/ta-p/54355&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-- Hardik Shah&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2018 22:02:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196278#M211</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2018-01-22T22:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: AWS securing outbound communication in private subnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196486#M213</link>
      <description>&lt;P&gt;Thanks Hardik.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm assuming this solution is available in Palo Alto Networks VM-series Next-Gen Firewall Bundle 1/2 in AWS Marketplace. Please confirm.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 19:30:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196486#M213</guid>
      <dc:creator>foobar7</dc:creator>
      <dc:date>2018-01-23T19:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: AWS securing outbound communication in private subnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196499#M215</link>
      <description>&lt;P&gt;PAYG2 will have support for URL Filtering&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/AWS-Azure-Articles/VM-Series-for-AWS-and-Azure-Licensing-Considerations/ta-p/125552" target="_blank"&gt;https://live.paloaltonetworks.com/t5/AWS-Azure-Articles/VM-Series-for-AWS-and-Azure-Licensing-Considerations/ta-p/125552&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If all you need to do is create a customer URL category and define the URLs then you shouldn't need a URL filtering license for that. But if you want URL filtering then PAYG2 is the way to go there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 20:03:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196499#M215</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-01-23T20:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: AWS securing outbound communication in private subnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196500#M216</link>
      <description>&lt;P&gt;I Agree ...&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 20:04:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196500#M216</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2018-01-23T20:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: AWS securing outbound communication in private subnet</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196523#M218</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a template readily available to deploy a simple solution for this usecase in AWS?&lt;/P&gt;&lt;P&gt;From &lt;A href="https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/80/vm-series/vm-series-deployment/vm-series-deployment.pdf" target="_self"&gt;link&lt;/A&gt;, I guess I'm trying to implement "Use Case: Secure the EC2 Instances in the AWS Cloud" section. Looking for a template that I leverage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 22:35:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-securing-outbound-communication-in-private-subnet/m-p/196523#M218</guid>
      <dc:creator>foobar7</dc:creator>
      <dc:date>2018-01-23T22:35:25Z</dc:date>
    </item>
  </channel>
</rss>

