<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Auto Zone Assign - IP range object as source IP in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/524789#M4312</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41152"&gt;@markru114&lt;/a&gt;&amp;nbsp;For checkpoint , Zone will be auto calculated based on route file and the connected interface , if you have the subnet&amp;nbsp;&lt;SPAN&gt;10.3.64.0 - 10.3.255.255 that's specified in the static route , then when you import the checkpoint config and static route file, expedition should auto calculate&amp;nbsp;the zone for you.&amp;nbsp; Or you could add static route entry after import , and re-do autozone , it should also work.&amp;nbsp; If you have two route entries, expedition will evaluate&amp;nbsp;both route statement and choose the most restrict&amp;nbsp;one , for example, if you have below two static routes:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination Gateway Genmask Flags MSS Window irtt Iface&lt;STRONG&gt;&lt;BR /&gt;10.3.64.0 10.3.0.1 255.255.255.0 UGH 0 0 0 eth1-04&amp;nbsp;&lt;BR /&gt;10.3.0.0 10.2.0.1 255.255.0.0 UGH 0 0 0 eth1-03&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then Expedition will auto assign zone for any source or destination that fall under 10.3.64.0/24&amp;nbsp;to &lt;STRONG&gt;eth1-04&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Dec 2022 19:03:04 GMT</pubDate>
    <dc:creator>lychiang</dc:creator>
    <dc:date>2022-12-21T19:03:04Z</dc:date>
    <item>
      <title>Auto Zone Assign - IP range object as source IP</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/524731#M4311</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have recently encountered a very strange issue in Expedition project when trying to make auto-zone assign.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Quick background:&lt;/STRONG&gt;&lt;BR /&gt;- In expedition project I have a config migrated from checkpoint&lt;BR /&gt;- we have around 15 direcly connected interfaces - all with IP somewhere in the range from 10.3.64.0 to 10.3.128.255, and 1 uplink from another range.&lt;BR /&gt;- Virtual router collecting all the interfaces of the firewall has a single default route via this uplink. All other interfaces are added as connected.&lt;BR /&gt;- Some of my security rules are having source address field based on the address-group object that matches following 2 address objects:&lt;BR /&gt;---- IP range address object (10.3.64.0 - 10.6.255.255)&lt;BR /&gt;---- Specific IP (host address object) outside of the firewall (to get there we follow a default route via uplink interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;OBSERVATIONS:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now,when I make auto-zone assign to calculate both source/destination zone (no NAT rules, and I am referring to this specific VR from my config), I am expecting to see ALL the zones under the source address, but I only see an uplink one.&lt;/P&gt;
&lt;P&gt;When I then modified address-group as follows:&lt;/P&gt;
&lt;P&gt;(WAS ALREADY THERE)---- IP range address object (10.3.64.0 - 10.6.255.255)&lt;BR /&gt;(WAS ALREADY THERE)---- Specific IP (host address object) outside of the firewall (to get there we follow a default route via uplink interface)&lt;BR /&gt;(THE NEW ONE I AM ADDING NOW)----- IP range address object (10.3.64.0 - 10.3.255.255)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After this, auto-zone assign resolves and puts all the zones from all interfaces as a source zone inside my security policies. Is anyone away on what is the exact code logic when evaluating zone assignements. The new range I have added is clearly within the already existing one, however it was not matched earlier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this some bug or there are some undocumented limitations of the range objects that I am not aware of? Have anyone seen similar behavior?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot for any hints.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 05:21:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/524731#M4311</guid>
      <dc:creator>markru114</dc:creator>
      <dc:date>2022-12-21T05:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Auto Zone Assign - IP range object as source IP</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/524789#M4312</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41152"&gt;@markru114&lt;/a&gt;&amp;nbsp;For checkpoint , Zone will be auto calculated based on route file and the connected interface , if you have the subnet&amp;nbsp;&lt;SPAN&gt;10.3.64.0 - 10.3.255.255 that's specified in the static route , then when you import the checkpoint config and static route file, expedition should auto calculate&amp;nbsp;the zone for you.&amp;nbsp; Or you could add static route entry after import , and re-do autozone , it should also work.&amp;nbsp; If you have two route entries, expedition will evaluate&amp;nbsp;both route statement and choose the most restrict&amp;nbsp;one , for example, if you have below two static routes:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination Gateway Genmask Flags MSS Window irtt Iface&lt;STRONG&gt;&lt;BR /&gt;10.3.64.0 10.3.0.1 255.255.255.0 UGH 0 0 0 eth1-04&amp;nbsp;&lt;BR /&gt;10.3.0.0 10.2.0.1 255.255.0.0 UGH 0 0 0 eth1-03&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then Expedition will auto assign zone for any source or destination that fall under 10.3.64.0/24&amp;nbsp;to &lt;STRONG&gt;eth1-04&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 19:03:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/524789#M4312</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-12-21T19:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: Auto Zone Assign - IP range object as source IP</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/525592#M4322</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38629"&gt;@lychiang&lt;/a&gt;&amp;nbsp;, I fully agree with what you are saying, but it my case the problem revolves around CONNECTED INTERFACES. For some strange reason the network object used inside security policy that definitely covers the subnet used on the CONNECTED interface -&amp;nbsp; it doesn't add the zone of this connected interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if my original problem description is clear on it, or I should re-word it.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2023 12:14:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/525592#M4322</guid>
      <dc:creator>markru114</dc:creator>
      <dc:date>2023-01-02T12:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Auto Zone Assign - IP range object as source IP</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/525629#M4323</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41152"&gt;@markru114&lt;/a&gt;&amp;nbsp;Autozone should also consider connected interface, can you please open a TAC case to share the checkpoint config , after case is opened, please write an email to &lt;A href="mailto:fwmigrate@paloaltonetworks.com" target="_blank"&gt;fwmigrate@paloaltonetworks.com&lt;/A&gt;&amp;nbsp;mentioned about your case#. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 00:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/525629#M4323</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2023-01-03T00:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Auto Zone Assign - IP range object as source IP</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/526305#M4330</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38629"&gt;@lychiang&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have done it in the last days. Let me know once you find out what is happening there in the background.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 10:10:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/auto-zone-assign-ip-range-object-as-source-ip/m-p/526305#M4330</guid>
      <dc:creator>markru114</dc:creator>
      <dc:date>2023-01-09T10:10:34Z</dc:date>
    </item>
  </channel>
</rss>

