<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is the best place to deploy the Next-Generation Firewall so that it monitors internal traff in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/204528#M6</link>
    <description>&lt;P&gt;so could we use this solution via internet edge ?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Mar 2018 10:24:15 GMT</pubDate>
    <dc:creator>Fahadvu</dc:creator>
    <dc:date>2018-03-09T10:24:15Z</dc:date>
    <item>
      <title>What is the best place to deploy the Next-Generation Firewall so that it monitors internal traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/198332#M4</link>
      <description>&lt;P&gt;A Palo Alto Networks next-generation firewall must capture network traffic sent between endpoints and data center servers. &lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To monitor internal network traffic, customers may:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use existing inline Next-Generation Firewalls that monitor internal network traffic as sensors to collect network metadata for Logging Service and Cortex XDR (formerly Magnifier).&lt;/LI&gt;
&lt;LI&gt;Deploy a Next-Generation Firewall in inline L3 mode.&amp;nbsp; This deployment will also offer the added benefit of improved network security because of internal segmentation, threat prevention, and visibility.&lt;/LI&gt;
&lt;LI&gt;Deploy another Next-Generation Firewall inline, in VWire mode.&amp;nbsp; This way the Next-Generation Firewall supports multiple VWire interfaces, so the customer’s network does not need to be re-architected, but it will require downtime.&lt;/LI&gt;
&lt;LI&gt;Deploy another Next-Generation Firewall with multiple interfaces configured in TAP or SPAN ports or Network Packet Brokers to send the traffic to these Next-Generation Firewalls.&lt;/LI&gt;
&lt;LI&gt;Configure new or unused interfaces on a perimeter Next-Generation Firewall to receive collected traffic in TAP mode, if the firewall has extra interfaces and can handle the additional traffic. The customer would use a Network Packet Broker to aggregate the east-west traffic to the perimeter firewall.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 26 Feb 2019 18:43:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/198332#M4</guid>
      <dc:creator>kcross</dc:creator>
      <dc:date>2019-02-26T18:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best place to deploy the Next-Generation Firewall so that it monitors internal traff</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/204528#M6</link>
      <description>&lt;P&gt;so could we use this solution via internet edge ?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 10:24:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/204528#M6</guid>
      <dc:creator>Fahadvu</dc:creator>
      <dc:date>2018-03-09T10:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best place to deploy the Next-Generation Firewall so that it monitors internal traff</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/204597#M7</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cortex XDR is a security application cloud based solution relying on Palo Alto Application Frameworks which leverages&amp;nbsp;Palo Alto Networks Logging Service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Logging Service receives data from Palo Alto Networks devices whether they are on premise or in the cloud as well as from Global Protect Cloud Service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get the best out of it, Cortex XDR must see traffic between users and servers and traffic going from internal networks to Internet. Other traffic logs are&amp;nbsp;a nice to have to collect as well but not mandatory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To answer your question, traffic generated at internet edge, which logs are&amp;nbsp;sent to Logging Service, is one of the must-have traffic we recommend but not the only one as described above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this answers your question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bertrand&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 23:32:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/what-is-the-best-place-to-deploy-the-next-generation-firewall-so/m-p/204597#M7</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2019-04-04T23:32:04Z</dc:date>
    </item>
  </channel>
</rss>

