<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Intrazone-default Rule in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251843#M6827</link>
    <description>&lt;P class=""&gt;&lt;SPAN&gt;This behavior is expected because the &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN&gt; rule is still allowing same-zone traffic. To ensure your “any-any deny” rule applies to all traffic (including intra-zone), you should configure it as a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Universal policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; instead of an Interzone policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_jri98vDabysVOFMOs_VKow.png" style="width: 705px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71149i35A44C9383B5AC92/image-size/large?v=v2&amp;amp;px=999" role="button" title="1_jri98vDabysVOFMOs_VKow.png" alt="1_jri98vDabysVOFMOs_VKow.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Explanation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;In Palo Alto Networks, security policies can be defined as:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Interzone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → applies only to traffic between different zones&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Intrazone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → applies only to traffic within the same zone&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Universal&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → applies to both interzone and intrazone traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;If your “any-any deny” rule is configured as &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Interzone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, it will not match intra-zone traffic. As a result, same-zone traffic will fall through and hit the default:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN&gt; → allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;This explains why you are seeing increasing hit counts on the intrazone-default rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Why You See Traceroute / Incomplete Traffic&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;The traffic showing as:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;CODE&gt;&lt;SPAN&gt;traceroute&lt;/SPAN&gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;SPAN&gt;• unknown / incomplete&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• sent packets with no return&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;is typically:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Probing traffic (traceroute, monitoring tools)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• One-way traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Asymmetric routing scenarios&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Since this traffic is intra-zone and not matched by your deny rule, it is allowed by &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2026 08:11:05 GMT</pubDate>
    <dc:creator>abayoumi21</dc:creator>
    <dc:date>2026-04-08T08:11:05Z</dc:date>
    <item>
      <title>Intrazone-default Rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251828#M6824</link>
      <description>&lt;P&gt;I have a question and would like some advice!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;We currently operate by applying an “any-any deny” policy at the bottom of the stack and opening ports only for necessary traffic.&lt;BR /&gt;I noticed that the hit count is increasing on the “intrazone-default” allow policy at the bottom, even though the “any-any deny” policy is in place.&lt;BR /&gt;I enabled logging for the intrazone policy and checked the traffic logs, but most applications show up as “traceroute” or cannot be verified.&lt;BR /&gt;Also, while packets are being sent, no received packets are being confirmed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could someone explain why the hit count is increasing on the intrazone-default policy even though the any-any deny policy is in place?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 05:55:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251828#M6824</guid>
      <dc:creator>JoohyeongLee</dc:creator>
      <dc:date>2026-04-08T05:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default Rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251832#M6825</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311732"&gt;@JoohyeongLee&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I assume that your "any-any deny" rule is configured with the service "&lt;STRONG&gt;application-default&lt;/STRONG&gt;".&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you select&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="nsc-inline-block nsc-px-1.5 nsc-py-0.5 nsc-bg-[--gen-ui-markdown-code-bg-color] nsc-font-light nsc-text-sm nsc-font-mono nsc-rounded"&gt;'application-default'&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;in the Service field of a security policy rule, it means that the specified applications are allowed or denied exclusively on their default ports as defined by Palo Alto Networks&lt;/SPAN&gt;&lt;SPAN&gt;. For example, if the DNS application uses TCP port 53 and UDP port 53, this setting would only permit DNS traffic on those specific ports&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Palo Alto Networks firewall, using its App-ID technology, continuously identifies applications traversing the network regardless of the port or protocol being used.&amp;nbsp;&lt;SPAN&gt;Even when&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="nsc-inline-block nsc-px-1.5 nsc-py-0.5 nsc-bg-[--gen-ui-markdown-code-bg-color] nsc-font-light nsc-text-sm nsc-font-mono nsc-rounded"&gt;'application-default'&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;is selected, the firewall still checks for all applications on all ports&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Palo Alto Networks firewalls generally require a maximum of&amp;nbsp;&lt;STRONG&gt;4 packets&lt;/STRONG&gt;&amp;nbsp;or&amp;nbsp;&lt;STRONG&gt;2000 bytes&lt;/STRONG&gt;&amp;nbsp;of data in either direction (not including the TCP handshake) to recognize an application using App-ID. In most cases, the application is identified before this amount of data is received.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So, the intrazone traffic will not match your "any-any deny" rule until App-ID engine recognize and label that traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;I recommend that for all your deny rules to setup service "any"&lt;/STRONG&gt; &lt;/EM&gt;and not "application-default".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 06:17:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251832#M6825</guid>
      <dc:creator>CosminM</dc:creator>
      <dc:date>2026-04-08T06:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default Rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251834#M6826</link>
      <description>&lt;P&gt;Hello. Thank you for your reply!&lt;BR /&gt;However, in the policy, everything—including the service port—is set to “any.”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 06:39:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251834#M6826</guid>
      <dc:creator>JoohyeongLee</dc:creator>
      <dc:date>2026-04-08T06:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default Rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251843#M6827</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;This behavior is expected because the &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN&gt; rule is still allowing same-zone traffic. To ensure your “any-any deny” rule applies to all traffic (including intra-zone), you should configure it as a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Universal policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; instead of an Interzone policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_jri98vDabysVOFMOs_VKow.png" style="width: 705px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71149i35A44C9383B5AC92/image-size/large?v=v2&amp;amp;px=999" role="button" title="1_jri98vDabysVOFMOs_VKow.png" alt="1_jri98vDabysVOFMOs_VKow.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Explanation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;In Palo Alto Networks, security policies can be defined as:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Interzone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → applies only to traffic between different zones&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Intrazone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → applies only to traffic within the same zone&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Universal&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → applies to both interzone and intrazone traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;If your “any-any deny” rule is configured as &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Interzone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, it will not match intra-zone traffic. As a result, same-zone traffic will fall through and hit the default:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN&gt; → allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;This explains why you are seeing increasing hit counts on the intrazone-default rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Why You See Traceroute / Incomplete Traffic&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;The traffic showing as:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;CODE&gt;&lt;SPAN&gt;traceroute&lt;/SPAN&gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;SPAN&gt;• unknown / incomplete&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• sent packets with no return&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;is typically:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Probing traffic (traceroute, monitoring tools)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• One-way traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Asymmetric routing scenarios&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Since this traffic is intra-zone and not matched by your deny rule, it is allowed by &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 08:11:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/intrazone-default-rule/m-p/1251843#M6827</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-04-08T08:11:05Z</dc:date>
    </item>
  </channel>
</rss>

