<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help understanding how to setup conditions for Firewalls in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449211#M100905</link>
    <description>&lt;P&gt;The policy sequence already kind of does “if then”... &amp;nbsp;&lt;/P&gt;&lt;P&gt;if match policy 1 then do... &amp;nbsp; if not then next policy...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would be more granular on your allow as per&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132521"&gt;@SutareMayur&lt;/a&gt;&amp;nbsp; and only allow those intended..&lt;/P&gt;&lt;P&gt;if this is not possible then move your more specific deny policy above the allow...&lt;/P&gt;&lt;P&gt;that is why we have policy numbering and the ability to move them up or down...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Nov 2021 08:20:18 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2021-11-24T08:20:18Z</dc:date>
    <item>
      <title>Need help understanding how to setup conditions for Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449136#M100901</link>
      <description>&lt;P&gt;As it stands m firewall looks at rules in a sequential sense and applies rules in that way.&amp;nbsp;&lt;/P&gt;&lt;P&gt;meaning if it reaches a Deny it will immediately cancel a packet (which isn't necessarily bad) but it also means if a rule permits a user to do something interferes with another that denies him something - the user will get access to things they shouldn't.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question here is can I make rules that follow the logic of "if ___ then ___" instead of the traditional "when__ do___"&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 21:00:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449136#M100901</guid>
      <dc:creator>TPalo2809</dc:creator>
      <dc:date>2021-11-23T21:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: Need help understanding how to setup conditions for Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449208#M100904</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/200925"&gt;@TPalo2809&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes you can write more granular security policy which will allow only specific traffic request based on the allowed parameters. Now to achieve it, only keeping Source/Dest IP addresses and services based policies won’t help.&lt;/P&gt;
&lt;P&gt;You would need to use different features of palo alto firewalls like USER-ID agent, security profiles like URL filtering, Vulnerability/Anti-Spyware profiles, Data Filtering etc. Such Security Profiles helps to allow only specific traffic and also it blocks traffic if any of threat pattern is observed. With USER-ID agent, you can also add user-id based policy where source user will be checked and then it will allow/deny based on the policy action. Palo Alto App-ID helps you to leverage behavioral characteristics and decide to allow/restrict if exact application is not identified.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The best thing about all these features is it gets updated automatically on the palo alto update server. We just need to configure our firewall to download the updated version and install same.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So by leveraging all such features, you can define strict policy set to achieve your requirement. To get more clarity, you can refer &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmACAS" target="_self"&gt;this&lt;/A&gt; article.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Nov 2021 07:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449208#M100904</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2021-11-24T07:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Need help understanding how to setup conditions for Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449211#M100905</link>
      <description>&lt;P&gt;The policy sequence already kind of does “if then”... &amp;nbsp;&lt;/P&gt;&lt;P&gt;if match policy 1 then do... &amp;nbsp; if not then next policy...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would be more granular on your allow as per&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132521"&gt;@SutareMayur&lt;/a&gt;&amp;nbsp; and only allow those intended..&lt;/P&gt;&lt;P&gt;if this is not possible then move your more specific deny policy above the allow...&lt;/P&gt;&lt;P&gt;that is why we have policy numbering and the ability to move them up or down...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Nov 2021 08:20:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-understanding-how-to-setup-conditions-for-firewalls/m-p/449211#M100905</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-11-24T08:20:18Z</dc:date>
    </item>
  </channel>
</rss>

