<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practices for Palo Alto security policy when destination IP/FQDN is dynamic or unknown in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249004#M6733</link>
    <description>&lt;P&gt;Restrict the devices to a Static-IP/Device-ID so that those specific devices can use the "Any" destination. Pick the specific App-ID for the camera traffic so that if the camera get compromised, the fw will block it bc the traffic won't match the app-id signature. I'd also attach a profile to the rule that whitelists the cloud provider's domain and block everything else. Even with the "Any" IP, the fw will inspect the SSL handshake to make sure it's going to the right place. Since the destination is board, my choice would be to apply a Sec. Profile that has antivirus/wildfire/vuln. protection. One more tip, if the cloud provider is aws/azure provides an ip range list, use an EDL so that the fw can auto update the allowed IPs by itself without manual work. I provided a simple template to give you an idea. I hope this sends you in the right direction. Good-luck&lt;/P&gt;</description>
    <pubDate>Wed, 25 Feb 2026 22:07:08 GMT</pubDate>
    <dc:creator>martpdelacruz</dc:creator>
    <dc:date>2026-02-25T22:07:08Z</dc:date>
    <item>
      <title>Best practices for Palo Alto security policy when destination IP/FQDN is dynamic or unknown</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1248693#M6723</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Group Company A is implementing surveillance cameras and requires communication to send data from the cameras to an external cloud server. The cloud server (destination) cannot be restricted by IP address or FQDN (only ports can be restricted), so IP addresses and FQDNs must be opened with ANY. ※ Restricted ports are TCP 443 (HTTPS), UDP 123 (NTP), TCP 31000 (TLS) The policy states that since it is necessary to restrict the destination by IP address or FQDN, communication like the above cannot be permitted. Systems using cloud services like AWS are increasing, and situations where IP addresses and FQDNs fluctuate and cannot be restricted, as described above, are likely to become more common in the future. How should policies be configured on Palo Alto to ensure security&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 11:20:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1248693#M6723</guid>
      <dc:creator>ym-higashi</dc:creator>
      <dc:date>2026-02-20T11:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for Palo Alto security policy when destination IP/FQDN is dynamic or unknown</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1248706#M6724</link>
      <description>&lt;P&gt;Company has policy not to permit traffic to any destination but at the same time permits group of people in the company go and procure cameras without consulting security team who could provide pre-requisites (like requiring camera to use FQDN as destination)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this case you either push back and don't allow the traffic or place those cameras into it's own subnet and permit traffic from camera subnet to any IP on ports you mentioned.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 13:55:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1248706#M6724</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-02-20T13:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for Palo Alto security policy when destination IP/FQDN is dynamic or unknown</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249001#M6731</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would ensure that the cameras are in a separate vlan that is anchored by the PAN. This way if the cameras are compromised there is no lateral movement. You can initially set the policy to allow any destination country and the ports. Then look at the logs to see what IP's they are going to and perform a reverse DNS lookup. This might just return a generic aws dns name or none at all. You can then just use the block of IP's that are the destination. If it changes in the future, you can adjust accordingly.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 19:41:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249001#M6731</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2026-02-25T19:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for Palo Alto security policy when destination IP/FQDN is dynamic or unknown</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249004#M6733</link>
      <description>&lt;P&gt;Restrict the devices to a Static-IP/Device-ID so that those specific devices can use the "Any" destination. Pick the specific App-ID for the camera traffic so that if the camera get compromised, the fw will block it bc the traffic won't match the app-id signature. I'd also attach a profile to the rule that whitelists the cloud provider's domain and block everything else. Even with the "Any" IP, the fw will inspect the SSL handshake to make sure it's going to the right place. Since the destination is board, my choice would be to apply a Sec. Profile that has antivirus/wildfire/vuln. protection. One more tip, if the cloud provider is aws/azure provides an ip range list, use an EDL so that the fw can auto update the allowed IPs by itself without manual work. I provided a simple template to give you an idea. I hope this sends you in the right direction. Good-luck&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 22:07:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249004#M6733</guid>
      <dc:creator>martpdelacruz</dc:creator>
      <dc:date>2026-02-25T22:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for Palo Alto security policy when destination IP/FQDN is dynamic or unknown</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249323#M6748</link>
      <description>&lt;P&gt;My recommendation in this case is to control the traffic using a URL Category within the Security Policy (under the Service/URL Category tab) that for TLS traffic.&lt;/P&gt;&lt;P&gt;In addition to restricting the source IP addresses, you should also limit the allowed applications using App-ID (such as &lt;STRONG&gt;ssl&lt;/STRONG&gt; and &lt;STRONG&gt;ntp&lt;/STRONG&gt;), create EDL, and attach appropriate Security Profiles to strengthen the overall security posture of this rule.&lt;/P&gt;&lt;P&gt;Within the URL Category configuration, you can create a custom URL category and define static entries, for example, by matching &lt;CODE&gt;*.amazonaws.com&lt;/CODE&gt;, to limit access to specific cloud domains rather than allowing unrestricted outbound connections.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 09:39:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practices-for-palo-alto-security-policy-when-destination-ip/m-p/1249323#M6748</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-03-03T09:39:33Z</dc:date>
    </item>
  </channel>
</rss>

