<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to check if a specific port/servic is getting passed throgh the firewall to a specific Pu... in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-check-if-a-specific-port-servic-is-getting-passed-throgh/m-p/577556#M2669</link>
    <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/325184"&gt;@PetrosKafkas&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the top of my mind, it comes down to SNMP that is allowed via your security policies or an SNMP trap server profile configured for your actual Palo (Device -&amp;gt; Server Profile -&amp;gt; SNMP).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To verify policies, I would double-check and verify that any internal traffic is not getting out to the questionable public IP. You can filter with any as a source with the destination being the public IP. You can also search with the public address as being the source and destination being any. Other than that, if you don't see SNMP being allowed via policy, don't see it configured as a manager, and see it being blocked then you can be confident that SNMP is not flowing through your Palo.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only other thing that comes into question is if there is a segment of your network that bypasses the Palo and has their own internet gateway. I would reach out to the auditor and see how the testing is being done.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good luck!&lt;/P&gt;</description>
    <pubDate>Fri, 16 Feb 2024 22:51:30 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2024-02-16T22:51:30Z</dc:date>
    <item>
      <title>How to check if a specific port/servic is getting passed throgh the firewall to a specific Public IP address</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-check-if-a-specific-port-servic-is-getting-passed-throgh/m-p/577519#M2664</link>
      <description>&lt;P&gt;An IT Auditor stated that SNMP is listening through the firewall for a specific Public IP Address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been filtering the network traffic on the PaloAlto 3020 for that specific IP address and also filtering with port 161.&amp;nbsp; BUt Id not see any results except that the 'Deny-Deny' catch all group was being used.&amp;nbsp; That is suggesting to me that the auditr's readings are false.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question:&amp;nbsp; How can I verify if port udp-161 is being allowed/used to a pass traffc thorugh the firewall?&amp;nbsp; Thus far I click on the&lt;/P&gt;
&lt;P&gt;Monitor' tab and I only see any traffic from the fiter tab and then traffic is specifically being sent to port 161 and it is being denied (catch all rule).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question:&amp;nbsp; If SNMP is being transfered from the indide world; how may I verify this?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 14:58:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-check-if-a-specific-port-servic-is-getting-passed-throgh/m-p/577519#M2664</guid>
      <dc:creator>PetrosKafkas</dc:creator>
      <dc:date>2024-02-16T14:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to check if a specific port/servic is getting passed throgh the firewall to a specific Pu...</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-check-if-a-specific-port-servic-is-getting-passed-throgh/m-p/577556#M2669</link>
      <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/325184"&gt;@PetrosKafkas&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the top of my mind, it comes down to SNMP that is allowed via your security policies or an SNMP trap server profile configured for your actual Palo (Device -&amp;gt; Server Profile -&amp;gt; SNMP).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To verify policies, I would double-check and verify that any internal traffic is not getting out to the questionable public IP. You can filter with any as a source with the destination being the public IP. You can also search with the public address as being the source and destination being any. Other than that, if you don't see SNMP being allowed via policy, don't see it configured as a manager, and see it being blocked then you can be confident that SNMP is not flowing through your Palo.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only other thing that comes into question is if there is a segment of your network that bypasses the Palo and has their own internet gateway. I would reach out to the auditor and see how the testing is being done.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good luck!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 22:51:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-check-if-a-specific-port-servic-is-getting-passed-throgh/m-p/577556#M2669</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-02-16T22:51:30Z</dc:date>
    </item>
  </channel>
</rss>

