<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP List limitations in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/999947#M5310</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/178800"&gt;@ksauer507&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you aggregate multiple IPs into a network address, it will be counted as 1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the appliance in front of Palo Alto network, it may be an option if the device capacity can take the load.&lt;/P&gt;
&lt;P&gt;Regarding the comparison with the other solutions, you should compare apple with apple and not only focus on just the IP number (for instance, does the other solutions inspect for traffic threats?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also one simple option: are you expecting the GP users to connect from every country? If no, you can make a security policy to block traffic to another countries.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Olivier&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jan 2025 08:00:50 GMT</pubDate>
    <dc:creator>ozheng</dc:creator>
    <dc:date>2025-01-02T08:00:50Z</dc:date>
    <item>
      <title>IP List limitations</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/998656#M5261</link>
      <description>&lt;P&gt;We would like to integrate with AbuseIPDB after seeing numerous global protect VPN logon failures.&amp;nbsp; We've greatly slowed this process down but it was a manual process of pulling reports to a list and we have an EDL download this list on a regularly scheduled basis.&lt;BR /&gt;&lt;BR /&gt;Instead of a manual process, we were going to with Panorama API key and scripting report to AbuseIPDB and also ingest from AbuseIPDB.&amp;nbsp; However, if we even decide to pull in IP blocks with a 95% confidence level, that's 67,307 IP addresses (a constantly moving target).&amp;nbsp; If we move that up to 100% confidence level of malicious IPs, that brings it down to about 62,000 IP addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have 4th gen firewalls in our Primary data center, the 1420's.&amp;nbsp; We have 460's in or DR datacenter (which was getting attacked just as hard).&amp;nbsp; When we look at capacities, we see in list type IPs there is only a total capacity of 50,000 IP addresses.&lt;BR /&gt;&lt;BR /&gt;With pfSense and OpnSense - FREE (unless you buy their hardware and support them),&amp;nbsp;the limit for IP address lists, also known as aliases, is defined by the "Firewall Maximum Table Entries" setting, which defaults to &lt;STRONG&gt;400,000&lt;/STRONG&gt; entries; meaning you can store up to 400,000 IP addresses across all your aliases within the firewall tables, and you may need to increase this value if you plan to use large lists of IP addresses in your firewall rules.&amp;nbsp; So with a free solution on a well enough box, you can even set some tunables to go past 400,000.&lt;BR /&gt;&lt;BR /&gt;So is the Palo alto firewalls just cadalac boxes on plastic wheels?&amp;nbsp; Is there any way to overcome this limitation?&lt;BR /&gt;&lt;BR /&gt;Would summarizing IPs count as 1 ip?&amp;nbsp; For example, if entering an IP as a /24, would that count as one entry, or 255 entries (the amount of IP's that CIDR network notation covers?)&lt;BR /&gt;&lt;BR /&gt;Anyone put another appliance in front of Palo Alto, in a highly available way for additional filtering?&lt;BR /&gt;This is just an asinine limitation.&amp;nbsp; These firewalls costs in the 6 figures, granted that includes 5 years of support.&amp;nbsp; Why such a puny IP space?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 15:43:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/998656#M5261</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2024-12-17T15:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: IP List limitations</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/999947#M5310</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/178800"&gt;@ksauer507&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you aggregate multiple IPs into a network address, it will be counted as 1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the appliance in front of Palo Alto network, it may be an option if the device capacity can take the load.&lt;/P&gt;
&lt;P&gt;Regarding the comparison with the other solutions, you should compare apple with apple and not only focus on just the IP number (for instance, does the other solutions inspect for traffic threats?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also one simple option: are you expecting the GP users to connect from every country? If no, you can make a security policy to block traffic to another countries.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 08:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/999947#M5310</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2025-01-02T08:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: IP List limitations</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/1205222#M5440</link>
      <description>&lt;P&gt;Only United States is allowed to connect to GP.&amp;nbsp; Still theres plenty of open VPN servers in the US that attackers use to do credential spraying.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 19:31:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ip-list-limitations/m-p/1205222#M5440</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2025-01-23T19:31:49Z</dc:date>
    </item>
  </channel>
</rss>

