<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stealth Rule Question in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1249327#M6750</link>
    <description>&lt;P&gt;In my opinion, a Stealth rule is typically a &lt;STRONG&gt;“deny any any”&lt;/STRONG&gt; rule designed to drop unwanted traffic to the firewall itself. The main benefit of this rule is that any traffic not explicitly allowed by other security rules will be dropped and appear in the traffic logs, giving you visibility into potentially malicious activity.&lt;/P&gt;&lt;P&gt;To implement this safely:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Allow management access first&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Place explicit &lt;STRONG&gt;management-allow rules&lt;/STRONG&gt; (for SSH, HTTPS, GlobalProtect, IPsec, etc.) above the Stealth rule to ensure legitimate administrative or VPN traffic is not blocked.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Use explicit controls in all security rules&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Leverage &lt;STRONG&gt;App-ID&lt;/STRONG&gt;, &lt;STRONG&gt;User-ID&lt;/STRONG&gt;, and &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt; whenever possible.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Build a &lt;STRONG&gt;communication matrix&lt;/STRONG&gt; to map which devices need access to which services and restrict rules accordingly to harden the environment.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Logging and monitoring&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Enable logging on the &lt;STRONG&gt;default intrazone rule&lt;/STRONG&gt; to capture unexpected traffic.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Log all traffic dropped by the Stealth rule for visibility and auditing.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Additional top-of-policy rules&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Blacklist/EDL rules&lt;/STRONG&gt; to block traffic from known malicious IPs.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;URL category blocking rules&lt;/STRONG&gt; to prevent access to malicious websites.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Sink-hole rule&lt;/STRONG&gt; to redirect compromised devices to a sinkhole IP instead of allowing them to resolve malicious domains.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;VPN-specific recommendations&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Restrict VPN access to only the required countries.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Enforce &lt;STRONG&gt;MFA&lt;/STRONG&gt; for all VPN users.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Utilize &lt;STRONG&gt;Host Profiling / Device-ID&lt;/STRONG&gt; to ensure only compliant devices can access critical resources through security rules.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;By following this approach, the Stealth rule acts as a safety net for all other traffic, while legitimate management, VPN, and application traffic remain functional. Combined with the communication matrix and layered controls (sink-hole, EDLs, profiling), this helps secure your environment comprehensively.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2026 11:07:00 GMT</pubDate>
    <dc:creator>abayoumi21</dc:creator>
    <dc:date>2026-03-03T11:07:00Z</dc:date>
    <item>
      <title>Stealth Rule Question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1248098#M6694</link>
      <description>&lt;DIV&gt;&lt;P&gt;&lt;STRONG&gt;Hi everyone,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Could someone please explain the correct way to create a Stealth rule in Palo Alto? My understanding is that it involves creating a rule that denies all traffic destined for the firewall’s public IP addresses.&lt;/P&gt;&lt;P&gt;I’m also unsure whether this will impact IPsec tunnels or GlobalProtect connections that terminate on those same IPs. Additionally, do I need to place a separate management‑allow rule above the Stealth rule to avoid blocking legitimate admin access?&lt;/P&gt;&lt;P&gt;Any guidance would be greatly appreciated.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 13 Feb 2026 06:14:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1248098#M6694</guid>
      <dc:creator>ititsw</dc:creator>
      <dc:date>2026-02-13T06:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule Question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1248157#M6696</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1009134151"&gt;@ititsw&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traffic from the outside going to the outside interface of the NGFW is normally allowed by the intrazone-default rule.&amp;nbsp; You can create a "stealth rule" to block this traffic for an additional layer of security.&amp;nbsp; I do it for my NGFWs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You WILL need to create rules to allow IPsec and GlobalProtect tunnels as you mentioned.&amp;nbsp; My S2S VPN rule allows the ipsec parent application only from known IPsec peers.&amp;nbsp; My GP rule allows ipsec-esp-udp, panos-global-protect, and ping (optional) only from an EDL or known source countries.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After your allow rules, you can create a universal (interzone and intrazone) drop rule for all other traffic coming from the outside zone.&amp;nbsp; If your NGFW uses BGP with your ISP, you will need to allow that also.&amp;nbsp; Make sure you place your stealth rule after all other existing inbound rules.&amp;nbsp; An "inbound" tag for the rules is always a good idea.&amp;nbsp; If you want to allow outbound pings from the outside interface (on the outside zone), you will need to allow that also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Typically, management is not enabled on the outside interface.&amp;nbsp; If you created an Interface Management Profile and attached it to the outside interface, then you would also need to allow management traffic.&amp;nbsp; It is not recommended.&amp;nbsp; The preferred way to manage the NGFW would be onsite or over a VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This rule is very effective and blocks a LOT of hacking attempts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 19:40:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1248157#M6696</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-02-13T19:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule Question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1248264#M6699</link>
      <description>&lt;P&gt;typically you should set up your 'ingress' rules so you allow only what you absolutely need and drop everything else&lt;/P&gt;
&lt;P&gt;good practice is to put those rules at the very top of your rulebase so an accidental 'any any' further down doesn't let in any bad things from the internet&lt;/P&gt;
&lt;P&gt;a typical layout would be something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-block embargo countries and known malicious IP addresses (from palo EDL for example), &lt;EM&gt;set the service to 'any'&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;-allow inbound server connection (smtp,https,...). make sure you define app-id and ports (app-default is fine, just &lt;EM&gt;don't put 'any' in the service&lt;/EM&gt;)&lt;/P&gt;
&lt;P&gt;-allow in/outbound IPSec&lt;/P&gt;
&lt;P&gt;-allow inbound GlobalProtect&lt;/P&gt;
&lt;P&gt;-drop (this is silent making it 'stealth') all other packets from source untrust (destination ANY so it accounts for NAT rules etc), &lt;EM&gt;set the service to 'any'&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="reaper_2-1771238575520.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70698i466C41586DEED6A8/image-size/large?v=v2&amp;amp;px=999" role="button" title="reaper_2-1771238575520.png" alt="reaper_2-1771238575520.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/6440"&gt;@Tom&lt;/a&gt;&amp;nbsp; mentioned, if you are hosting admin access on your untrust interface, migrate that access to GlobalProtect as soon as possible (#1 top priority) as this is extremely risky&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 11:11:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1248264#M6699</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2026-02-19T11:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule Question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1249327#M6750</link>
      <description>&lt;P&gt;In my opinion, a Stealth rule is typically a &lt;STRONG&gt;“deny any any”&lt;/STRONG&gt; rule designed to drop unwanted traffic to the firewall itself. The main benefit of this rule is that any traffic not explicitly allowed by other security rules will be dropped and appear in the traffic logs, giving you visibility into potentially malicious activity.&lt;/P&gt;&lt;P&gt;To implement this safely:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Allow management access first&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Place explicit &lt;STRONG&gt;management-allow rules&lt;/STRONG&gt; (for SSH, HTTPS, GlobalProtect, IPsec, etc.) above the Stealth rule to ensure legitimate administrative or VPN traffic is not blocked.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Use explicit controls in all security rules&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Leverage &lt;STRONG&gt;App-ID&lt;/STRONG&gt;, &lt;STRONG&gt;User-ID&lt;/STRONG&gt;, and &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt; whenever possible.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Build a &lt;STRONG&gt;communication matrix&lt;/STRONG&gt; to map which devices need access to which services and restrict rules accordingly to harden the environment.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Logging and monitoring&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Enable logging on the &lt;STRONG&gt;default intrazone rule&lt;/STRONG&gt; to capture unexpected traffic.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Log all traffic dropped by the Stealth rule for visibility and auditing.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Additional top-of-policy rules&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Blacklist/EDL rules&lt;/STRONG&gt; to block traffic from known malicious IPs.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;URL category blocking rules&lt;/STRONG&gt; to prevent access to malicious websites.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Sink-hole rule&lt;/STRONG&gt; to redirect compromised devices to a sinkhole IP instead of allowing them to resolve malicious domains.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;VPN-specific recommendations&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Restrict VPN access to only the required countries.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Enforce &lt;STRONG&gt;MFA&lt;/STRONG&gt; for all VPN users.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Utilize &lt;STRONG&gt;Host Profiling / Device-ID&lt;/STRONG&gt; to ensure only compliant devices can access critical resources through security rules.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;By following this approach, the Stealth rule acts as a safety net for all other traffic, while legitimate management, VPN, and application traffic remain functional. Combined with the communication matrix and layered controls (sink-hole, EDLs, profiling), this helps secure your environment comprehensively.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 11:07:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1249327#M6750</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-03-03T11:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule Question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1251126#M6803</link>
      <description>&lt;P&gt;Thank you all for your help. I created the stealth rule as per your recommendations and it appears to be working fine. One thing I noticed was this rule also appears to be blocking the valid Palo Alto updates such as antivirus engine, WildFire updates etc. Can I please know if there is any easy way to create a rule to allow these updates?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 00:23:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/stealth-rule-question/m-p/1251126#M6803</guid>
      <dc:creator>ititsw</dc:creator>
      <dc:date>2026-03-30T00:23:10Z</dc:date>
    </item>
  </channel>
</rss>

