<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need for physical firewalls in Branch Office in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514542#M407</link>
    <description>&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt; mentioned ION devices have some security access list rules and you can review this under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-sd-wan/prisma-sd-wan-admin/prisma-sd-wan-stacked-security-policies/add-stacked-security-policy-rules" target="_blank"&gt;https://docs.paloaltonetworks.com/prisma/prisma-sd-wan/prisma-sd-wan-admin/prisma-sd-wan-stacked-security-policies/add-stacked-security-policy-rules&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Sep 2022 09:21:20 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2022-09-12T09:21:20Z</dc:date>
    <item>
      <title>Need for physical firewalls in Branch Office</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/513982#M401</link>
      <description>&lt;P&gt;Trying to wrap the concept around my head. Once you have subscribed to prisma access and connected all branch office by VPN networks, why do we still need hardware firewalls at each site? Why not have have all branch office and datacenter only traverse through Prisma Access?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am new and may be missing some key elements here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 04:17:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/513982#M401</guid>
      <dc:creator>Jim.wolfowitz</dc:creator>
      <dc:date>2022-09-06T04:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Need for physical firewalls in Branch Office</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514131#M402</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/234348"&gt;@Jim.wolfowitz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for the post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From my&amp;nbsp;Prisma Access PoC, I learned that Palo Alto still recommends to keep on prem firewall for most of the customers. If you are sending all the traffic to Prisma Access where it will break out to internet, I do not think you need to keep on prem firewall, however if your SD-WAN appliance is breaking out some traffic locally instead of through Prisma, then a firewall is still useful for visibility/policy enforcement. Most of the SD-WAN vendors have limited support of IPS features/logging security events, so this is where firewall comes in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2022 06:53:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514131#M402</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-09-07T06:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: Need for physical firewalls in Branch Office</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514187#M403</link>
      <description>&lt;P&gt;Thanks. What if we use Palo's prisma SD-WAN appliance?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2022 19:23:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514187#M403</guid>
      <dc:creator>Jim.wolfowitz</dc:creator>
      <dc:date>2022-09-07T19:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Need for physical firewalls in Branch Office</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514198#M404</link>
      <description>&lt;P&gt;Thank you for reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/234348"&gt;@Jim.wolfowitz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Prisma SD-WAN is re-branded CloudGenix appliance. The overall concept is the same. If you send all the traffic through SD-WAN to Prisma Access where it will break out to internet, then you will not need on prem firewall. Regarding local internet breakout directly through local internet attached to SD-WAN box instead of Prisma Access, while this is easy to setup in Prisma SD-WAN portal, it still can't match all the security features of Palo Alto firewall. You can do simple ACL, but options beyond this for advanced policies/IPS/logging are limited. Both Prisma SD-WAN and Prisma Access can integrate with each other smoothly, both portals are relatively easy to use. Unless you have complicated design/requirements, these 2 solutions should be enough.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2022 21:43:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514198#M404</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-09-07T21:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Need for physical firewalls in Branch Office</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514542#M407</link>
      <description>&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt; mentioned ION devices have some security access list rules and you can review this under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-sd-wan/prisma-sd-wan-admin/prisma-sd-wan-stacked-security-policies/add-stacked-security-policy-rules" target="_blank"&gt;https://docs.paloaltonetworks.com/prisma/prisma-sd-wan/prisma-sd-wan-admin/prisma-sd-wan-stacked-security-policies/add-stacked-security-policy-rules&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 09:21:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/need-for-physical-firewalls-in-branch-office/m-p/514542#M407</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-09-12T09:21:20Z</dc:date>
    </item>
  </channel>
</rss>

