<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone protection profile in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996676#M5167</link>
    <description>&lt;P&gt;Thank you for reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it means my reverse natting and server with public ip address in any zone would not be impact by packet based protection&lt;/P&gt;</description>
    <pubDate>Thu, 05 Dec 2024 09:11:15 GMT</pubDate>
    <dc:creator>vishalrsshah</dc:creator>
    <dc:date>2024-12-05T09:11:15Z</dc:date>
    <item>
      <title>Zone protection profile</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996559#M5162</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm planning to implement Zone protection on outside interfaces using&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Strict IP Address Check" or only "Spoofed IP address" in the packet based attack protection of the zone protection profile. Does it drop legitimate traffic as per below points&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1) Configure static one to one Snat and vice versa for reverse natting&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2)&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Does it impact if any one of my Server's (in Dmz) are in same public ip address range as my Outside interface&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 18:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996559#M5162</guid>
      <dc:creator>vishalrsshah</dc:creator>
      <dc:date>2024-12-04T18:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection profile</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996560#M5163</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Please look bellow to see what checks are performed by the firewall when you activate&amp;nbsp;"Spoofed IP address" and "Strict IP Address Check" in Zone Protection:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004LnmCAE" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004LnmCAE&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 18:31:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996560#M5163</guid>
      <dc:creator>CosminM</dc:creator>
      <dc:date>2024-12-04T18:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection profile</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996570#M5165</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That I already gone through. Need to know what will be the impact as per my query&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 18:53:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996570#M5165</guid>
      <dc:creator>vishalrsshah</dc:creator>
      <dc:date>2024-12-04T18:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection profile</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996571#M5166</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/326138"&gt;@vishalrsshah&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You want to know if configuring the NGFW to drop spoofed packets will impact production traffic.&amp;nbsp; Not is you enable "Spoofed IP address" only.&amp;nbsp; As the URL posted by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/197789"&gt;@CosminM&lt;/a&gt; states, dropping spoofed packets relies on the routing table.&amp;nbsp; If your routing is working fine, then IP spoof drops will work fine.&amp;nbsp; The 2 examples that you mention route fine now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you enable "Strict IP Address Check" then you may have production drops &lt;U&gt;if&lt;/U&gt; you have asymmetric routing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I enable "Spoofed IP address" on all my NGFWs, and it works fine.&amp;nbsp; I apply my Zone Protection Profile to all my interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing that many people do not know is that these spoofed IP drops along with other packet-based drops are not logged by default.&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkr7CAA" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkr7CAA&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a good article on troubleshooting spoofed IP drops.&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UuJCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UuJCAU&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 19:01:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996571#M5166</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-12-04T19:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection profile</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996676#M5167</link>
      <description>&lt;P&gt;Thank you for reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it means my reverse natting and server with public ip address in any zone would not be impact by packet based protection&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 09:11:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996676#M5167</guid>
      <dc:creator>vishalrsshah</dc:creator>
      <dc:date>2024-12-05T09:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection profile</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996716#M5171</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/326138"&gt;@vishalrsshah&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I cannot comment on specific configuration that I do not know in detail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the routing is working correctly now, then "Spoofed IP address" packet protection will not break it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 11:38:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-profile/m-p/996716#M5171</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-12-05T11:38:04Z</dc:date>
    </item>
  </channel>
</rss>

