<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PRISMA Access Intrazone Default  - As a firewall engineer this rule gives me the creeps in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/1251144#M1285</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223777"&gt;@gcollins5&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know this is a very very old thread now, but for info I would like to say that adding a default deny to the end of the rule base (before the default rules) is something I have always done, in the context of Prisma Access it would don't affect the SSL vpn as that traffic is handled by a different rule base that we cannot manipulate (with the exception of embargo rules) so as best practice I would drop all traffic and allow by exception.&lt;/P&gt;</description>
    <pubDate>Mon, 30 Mar 2026 05:06:26 GMT</pubDate>
    <dc:creator>laurence64</dc:creator>
    <dc:date>2026-03-30T05:06:26Z</dc:date>
    <item>
      <title>PRISMA Access Intrazone Default  - As a firewall engineer this rule gives me the creeps</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/596144#M840</link>
      <description>&lt;P&gt;Quick on for all you PRISMA SASE heads out there.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally getting stability on macOS (god bless GP version 6.2.3) .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now it's time to harden up a little bit - easy to do with a firewall I manage but not sure of the ramification on PRISMA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So,, Intrazone-Default is allowed by default and it get some farily nasty attacks&amp;nbsp; on the untrust to unstrust interfaces.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bearing in mind I use PROXY &amp;amp; SSLVPN&amp;nbsp; what are the ramification of a untrust to untrust block .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did ask TAC - same answer as always - if you not done it before then it's professional services. Rubbish !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help greatly appreciated,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 09:23:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/596144#M840</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-08-28T09:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA Access Intrazone Default  - As a firewall engineer this rule gives me the creeps</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/596327#M842</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223777"&gt;@gcollins5&lt;/a&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p"&gt;If traffic matches no other rules, two default Security policy rules at the bottom of the rulebase automatically drop all traffic between different zones (&lt;SPAN&gt;interzone-default&lt;/SPAN&gt;) and automatically allow all traffic between the same zone (&lt;SPAN&gt;intrazone-default&lt;/SPAN&gt;&lt;SPAN&gt;). You can modify the interzone-default and intrazone-default rules to log traffic, apply threat inspection, etc. If you add a rule that denies all traffic earlier in the rulebase (local firewall rules or Panorama pre- and post-rules), no traffic matches the default rules.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="p"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p"&gt;&lt;SPAN&gt;For the ramification, you may deny traffic that is supposed to be allowed between untrust zones that didn't match any rules before it hits the default rule. Typically, if untrust to untrust traffic did not hit any rules, then technically it should be allowed. I believe TAC answered the way they did because they are not design experts and are cannot given configuration recommendations based on the design since they would be held accountable if something were to go wrong. PS has the skills required to give that recommendation and help as its their primary focus.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 17:59:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/596327#M842</guid>
      <dc:creator>RSenra</dc:creator>
      <dc:date>2024-08-29T17:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA Access Intrazone Default  - As a firewall engineer this rule gives me the creeps</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/596430#M843</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/256819"&gt;@RSenra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS is ££££ which we just don't have so it will be trial and error .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 15:34:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/596430#M843</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-08-30T15:34:02Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA Access Intrazone Default  - As a firewall engineer this rule gives me the creeps</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/1246296#M1263</link>
      <description>&lt;P&gt;Create a snippet in your prisma access scope, in the snippet, add a block all to all from all any any rule. It will go above the global intrazone-default and hit before any of the default global rules you're worried about. Nothing will hit the intrazone-default rule you're worried about anymore.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mmonette_0-1769103580514.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70433iEEEBA705216F0296/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mmonette_0-1769103580514.png" alt="mmonette_0-1769103580514.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jan 2026 17:40:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/1246296#M1263</guid>
      <dc:creator>mmonette</dc:creator>
      <dc:date>2026-01-22T17:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA Access Intrazone Default  - As a firewall engineer this rule gives me the creeps</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/1251144#M1285</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223777"&gt;@gcollins5&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know this is a very very old thread now, but for info I would like to say that adding a default deny to the end of the rule base (before the default rules) is something I have always done, in the context of Prisma Access it would don't affect the SSL vpn as that traffic is handled by a different rule base that we cannot manipulate (with the exception of embargo rules) so as best practice I would drop all traffic and allow by exception.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 05:06:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-intrazone-default-as-a-firewall-engineer-this-rule/m-p/1251144#M1285</guid>
      <dc:creator>laurence64</dc:creator>
      <dc:date>2026-03-30T05:06:26Z</dc:date>
    </item>
  </channel>
</rss>

