<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewalls communicating to public IPs on Management Interface in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/583562#M2969</link>
    <description>&lt;P&gt;I noticed these destinations that PA is communicating with.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EOdeh_0-1712932317125.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59037iD6887BEE7B8895FB/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="EOdeh_0-1712932317125.png" alt="EOdeh_0-1712932317125.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Apr 2024 14:32:14 GMT</pubDate>
    <dc:creator>BlackWater</dc:creator>
    <dc:date>2024-04-12T14:32:14Z</dc:date>
    <item>
      <title>Firewalls communicating to public IPs on Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/517594#M476</link>
      <description>&lt;P&gt;We are currently seeing the Management Plane of our Palo Alto Firewalls communicating to the following IP-Addresses:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;34.96.84.34&lt;/LI&gt;
&lt;LI&gt;107.178.249.217&lt;/LI&gt;
&lt;LI&gt;35.238.108.32&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This communication occurs on different Platforms. We see more activity since PAN-OS 10, currently on PAN-OS 10.2.3&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Disabled all telemetry on the firewall&lt;/LI&gt;
&lt;LI&gt;Disabled PAN-OS Edge Service&lt;/LI&gt;
&lt;LI&gt;Not using Wildfire&lt;/LI&gt;
&lt;LI&gt;Disabled App-ID Cloud Engine (ACE)&lt;/LI&gt;
&lt;LI&gt;Not using Advanced URL Filtering&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Any idea what could be the issue? We like to disable all outgoing communication completely if possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Matthias&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 10:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/517594#M476</guid>
      <dc:creator>mattlede</dc:creator>
      <dc:date>2022-10-12T10:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalls communicating to public IPs on Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/517697#M479</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;These are most likley the update sites the Palo Alto management interface needs to get to for updates, etc., as well as licensing info.&amp;nbsp; The URL&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;updates.paloaltonetworks.com resolves to&amp;nbsp;34.96.84.34.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What I do is create a custom URL category and apply it to the policy that the management interface uses to go external.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1665608551618.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44647i6E4A874F115E3478/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1665608551618.png" alt="OtakarKlier_0-1665608551618.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CljDCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CljDCAS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 21:04:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/517697#M479</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-10-12T21:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalls communicating to public IPs on Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/517939#M485</link>
      <description>&lt;P&gt;Many Thanks for the information. We manage our Palo Alto Firewalls with Panorama in a disconnected environment. Therefore we cannot allow the Palo Alto Firewalls to communicate to the outside world, not even with a proxy. Updates are all provided by panorama.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there an option to disable this communication completely? Or do we just have to live with it and ignore it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Matthias&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 11:44:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/517939#M485</guid>
      <dc:creator>mattlede</dc:creator>
      <dc:date>2022-10-14T11:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalls communicating to public IPs on Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/518256#M494</link>
      <description>&lt;P&gt;This is just an idea, but maybe set the service route configuration to a loopback and block the traffic?&lt;BR /&gt;&lt;BR /&gt;Device&amp;gt;Setup&amp;gt;Services&amp;gt;Global&amp;gt;Services Features&amp;gt;Service Route Configuration&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 19:59:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/518256#M494</guid>
      <dc:creator>Tom.Fenner</dc:creator>
      <dc:date>2022-10-18T19:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalls communicating to public IPs on Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/583562#M2969</link>
      <description>&lt;P&gt;I noticed these destinations that PA is communicating with.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EOdeh_0-1712932317125.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59037iD6887BEE7B8895FB/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="EOdeh_0-1712932317125.png" alt="EOdeh_0-1712932317125.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:32:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewalls-communicating-to-public-ips-on-management-interface/m-p/583562#M2969</guid>
      <dc:creator>BlackWater</dc:creator>
      <dc:date>2024-04-12T14:32:14Z</dc:date>
    </item>
  </channel>
</rss>

