<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Thinking of policy PAN-style (instead of Cisco-style) in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9959#M284</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Grant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if jblum ever shared the base template he talks about?&amp;nbsp; I sent him a message but didn't get a response yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 Aug 2012 20:54:51 GMT</pubDate>
    <dc:creator>bill.young</dc:creator>
    <dc:date>2012-08-10T20:54:51Z</dc:date>
    <item>
      <title>Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9949#M274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a document or recommended approach that has been written down that provides a starting point for people building a policy from scratch or when converting from a legacy firewall?&amp;nbsp; I'm referring to recommended approaches for building policy based on least privilege for apps instead of port and protocol. For example, let's say you place apps into 2 or 3 categories such as OK, maybe, and definitely not. Then as apps are identified flowing through they can be placed into the OK category if they are needed by the business. Someone in the past must have grouped the top 10 or 15 legitimate biz apps together into a chunk then implemented as a policy line.&lt;/P&gt;&lt;P&gt;Essentially I'm looking for a doc that is entitled something like, "Building policy PAN style when you're used to Cisco ASA (or Juniper or checkpoint)."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 13:26:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9949#M274</guid>
      <dc:creator>gmoerschel</dc:creator>
      <dc:date>2011-01-04T13:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9950#M275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would *really* like more discussion on this. For me it seems apples-to-oranges when comparing/migrating from anything to PAN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 02:11:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9950#M275</guid>
      <dc:creator>gregory_zill</dc:creator>
      <dc:date>2011-02-02T02:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9951#M276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We started out building port policies. Then after traffic was generated, we converted them to app rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Feb 2011 19:12:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9951#M276</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-02-22T19:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9952#M277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;+1 on that!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 20:49:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9952#M277</guid>
      <dc:creator>LCMember1607</dc:creator>
      <dc:date>2011-02-23T20:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9953#M278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I love &lt;A href="https://live.paloaltonetworks.com/people/gmoerschel" id="jive-307411,355,817,125,141,334" onmouseout="" onmouseover=""&gt;gmoerschel&lt;/A&gt;'s&amp;nbsp; approach.&amp;nbsp; I am a large non-profit in a major arena (extremely high profile)...we too have Cisco ASA's as our perimeter GW's.&amp;nbsp; We have had PAN in our midst for a year and one half.&amp;nbsp; We have had some majore learning issues, but our initial policies were based on app (Category) criteria.&amp;nbsp; Out of the shut came gaming...cut it.&amp;nbsp; Second was&amp;nbsp; (sub category) type - which was file-sharing...cut it (we can make one off decisions about each case later). Third went the "technology" group...equating to peer-to-peer.&amp;nbsp; I really did not want to see any of the p2p that had been working long before PAN to continue.&amp;nbsp; The next day after implementing this....wow, HR tickets rose through the roof.&amp;nbsp; I told HR prior...just route then to me directly.&amp;nbsp; With policy "acceptable use" in hand...I took them on one by by one.&amp;nbsp; No one to date, has come up with a viable defense against said policy.&amp;nbsp; Policy enception date was July 1994. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I take my ASA rule set and convert them? &lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;IF&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; I know what it is (back end programs) that is attempting to be converted?&amp;nbsp; I have yet to find &lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;ONE&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; Cisco SE who can weight in on this matter.&amp;nbsp; How come Cisco has not acquired this company and made it a part of their security division?&amp;nbsp; Layer 7 for most of us is a hindrance.&amp;nbsp; Where are we to go to?&amp;nbsp; Above the nexxus 7K(Cicso propietary) this is by far the best technology leap i've seen over the last 10 years.&amp;nbsp; Join in and see why PAN can revolutionize your perimeter network. I am not a paid spokesman.&amp;nbsp; Their technology is by far the best thing I've seen since heirachy.&amp;nbsp; Don't believe me?&amp;nbsp; I've been in this industry for over 16 years.&amp;nbsp; I love my Cisco firewalls...they are unhampered.&amp;nbsp; However, when it comes to IDS....even with AIP modules for the ASA, at best it's cludgy.&amp;nbsp; PAN however, looks into the packet much like NetGen does.&amp;nbsp; It gives you insight into what comes and goes, even if it's encrypted.&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt;Encrypted did he say?&amp;nbsp; YES.&amp;nbsp; They have the ability to decrypt on the fly.&amp;nbsp; AWESOME!!!!&amp;nbsp; Can I say anymore?&amp;nbsp;&amp;nbsp; One thing that you will note...learning your perimeter takes time...wiht this device (no matter how small or large you go...it will take time to "learn" your environment.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 15:19:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9953#M278</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-03-08T15:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9954#M279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My first step in a mid-sized conversion from another firewall (PIX/ASA/Sonicwall) is to put the new PA's in monitor mode on both the inside and outside interfaces for 2-3 days.&amp;nbsp; Then, I evaluate the inbound flows by filtering for each previosly allowed inbound port to see what applications are running over them.&amp;nbsp; I'll add a rule for each, so that 95% of inbound connectivity should work right away.&amp;nbsp; I'll also find the 20-30 most common outbound applications and add them as well to the base configuration.&amp;nbsp; This way, when you first turn on the PA, you have a very good baseline for what should be running.&amp;nbsp; As far as typical categories for outbound connectivity, I do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create base Application Filters:&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;Updates&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;Proxies&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;Peer2Peer&lt;/A&gt; (encrypted-tunnel, file-sharing) for peer-to-peer&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;Games&lt;/A&gt;&lt;/P&gt;&lt;P&gt;SocialNetworking&lt;/P&gt;&lt;P&gt;Audio-Streaming&lt;/P&gt;&lt;P&gt;Video-Streaming&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Application Groups:&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;KnownGood&lt;/A&gt;&lt;/P&gt;&lt;UL class="noindent"&gt;&lt;LI&gt;web-browsing&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;ssl&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;ftp&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;ping&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;ntp&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;dns&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;flash&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;MS-Networking&lt;/A&gt; (for inter-zone traffic as needed later)&lt;/P&gt;&lt;UL class="noindent"&gt;&lt;LI&gt;netbios-dg&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;netbios-ss&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;ms-ds-smb&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/objects.esp#" onclick=""&gt;GoogleApps&lt;/A&gt;&lt;/P&gt;&lt;UL class="noindent"&gt;&lt;LI&gt;google-analytics&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;google-calendar&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;google-docs&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;google-toolbar&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;google-translate&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base Policies would be&lt;/P&gt;&lt;P&gt;Allow-SMTP-Outbound (mail server only)&lt;/P&gt;&lt;P&gt;Deny-SMTP-All (everyone else SMTP on any port)&lt;/P&gt;&lt;P&gt;Deny-KnownBad (Proxies, Peer2Peer)&lt;/P&gt;&lt;P&gt;Deny-HighBandwidth (Audio-Streaming,Video-Streaming)&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.40.9.4/esp/policies.esp#" onclick=""&gt;Deny-BusinessInappropriate&lt;/A&gt; (Games, SocialNetworking)&lt;/P&gt;&lt;P&gt;Allow-Unrestricted (flexnet-installanywhere, soap, ocsp, Updates)&lt;/P&gt;&lt;P&gt;Allow-ByUserGroup (sharepoint-base, silverlight, office-live, linkedin-base, citrix, gotomeeting, facebook-base, gmail-base, gmail-enterprise, citrix-jedi, yahoo-toolbar, netsuite, KnownGood, GoogleApps)&lt;/P&gt;&lt;P&gt;Allow-All (but just temporarily)&lt;/P&gt;&lt;P&gt;Cleanup-Rule to deny all others and log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This covers most of the business needs, and you modify from there.&amp;nbsp; I even built a base template with everything above (and a lot more), and use that when deploying new customer firewalls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Mar 2011 20:18:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9954#M279</guid>
      <dc:creator>jblum_2</dc:creator>
      <dc:date>2011-03-17T20:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9955#M280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice. I like the structure. Care to share that base template?&amp;nbsp; Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2011 19:52:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9955#M280</guid>
      <dc:creator>gmoerschel</dc:creator>
      <dc:date>2011-03-23T19:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9956#M281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would be very helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Mar 2011 12:03:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9956#M281</guid>
      <dc:creator>LCMember1607</dc:creator>
      <dc:date>2011-03-24T12:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9957#M282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Grant: Did you find anything?&amp;nbsp; Can you share?&amp;nbsp; I'm a new user having the same issue with building a policy from scratch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 14:50:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9957#M282</guid>
      <dc:creator>bill.young</dc:creator>
      <dc:date>2012-08-10T14:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9958#M283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you check out jblum.2's answer higher in the thread, that is the way I do it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 18:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9958#M283</guid>
      <dc:creator>gmoerschel</dc:creator>
      <dc:date>2012-08-10T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9959#M284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Grant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if jblum ever shared the base template he talks about?&amp;nbsp; I sent him a message but didn't get a response yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 20:54:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9959#M284</guid>
      <dc:creator>bill.young</dc:creator>
      <dc:date>2012-08-10T20:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Thinking of policy PAN-style (instead of Cisco-style)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9960#M285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice. You could also add "encrypted tunnels" to your block application filter. Another nice application filter is to create an app filter that only contains browser based applications. Restricts general user internet access only to browser based applications and not any of the client server or network protocol applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="browser based applications.PNG" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4031_browser based applications.PNG" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 19:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/thinking-of-policy-pan-style-instead-of-cisco-style/m-p/9960#M285</guid>
      <dc:creator>Quinton</dc:creator>
      <dc:date>2012-09-12T19:06:20Z</dc:date>
    </item>
  </channel>
</rss>

