<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guidance on swinging an Exchange 2016 On-Prem server from ASA to PA 820 (vWired currently) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/459707#M102005</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88599"&gt;@s.Konowalchuk&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This changes depending on if you have a security gateway handing traffic prior to it reaching your Exchange servers, if you're just sending it directly to your Exchange server, and if you are going to decrypt traffic. If you're already running things in a virtual-wire deployment you should already see exactly how the firewall will identify the traffic via your existing traffic logs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're running a 2016 or higher Exchange server, you'll see the following App-IDs if you decrypt that inbound traffic. Obviously allow smtp as well if you don't terminate that on a security gateway.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;                    &amp;lt;member&amp;gt;activesync&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;mapi-over-http&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;ms-exchange&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;office365-enterprise-access&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;outlook-web&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;rpc-over-http&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;soap&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;ssl&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;web-browsing&amp;lt;/member&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your internal client communication will look slightly different and really depends on your own deployment. For example I won't see activesync internally because we don't have folks phones joined to our internal network, that might not be the case for you. You may also allow people to send email directly through an SMTP connection outside of Outlook to the server while I limit and control that traffic through additional individual rules. You'll also need to think about other devices in your network, such as printers, that use SMTP directly to the Exchange servers.&lt;/P&gt;
&lt;P&gt;Additionally you'll need to allow SMTP traffic between your security gateway and your Exchange environment if you're using a security gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While Exchange is a standard thing to deploy, each deployment isn't&amp;nbsp;&lt;EM&gt;exactly&amp;nbsp;&lt;/EM&gt;the same so you'll run across some variations. Your existing virtual-wire deployment should be able to allow you to build out those rules looking at your logs. I would spend some time identifying traffic and building out rules while your still in the virtual-wire deployment to get your security rulebase built out.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jan 2022 04:18:11 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2022-01-20T04:18:11Z</dc:date>
    <item>
      <title>Guidance on swinging an Exchange 2016 On-Prem server from ASA to PA 820 (vWired currently)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/459622#M102003</link>
      <description>&lt;P&gt;Hello everyone, currently I've about 3 publicly available servers still running through an old ASA5510 that I would like to move to the PA 820 that we have. 2 of them will be easy as they're basically web servers but its the Exchange server that has me concerned. I'm looking for a guide or some assistance in helping pre-create the security policies and NAT rules to allow the traffic to flow. Is there any such guide out there?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am running the ASA traffic through a vWire on the 820 so I can see all the traffic but again just looking at something to help me pre-configure most of this so as to minimize the downtime.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in adanvance!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 19:12:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/459622#M102003</guid>
      <dc:creator>s.Konowalchuk</dc:creator>
      <dc:date>2022-01-19T19:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance on swinging an Exchange 2016 On-Prem server from ASA to PA 820 (vWired currently)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/459707#M102005</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88599"&gt;@s.Konowalchuk&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This changes depending on if you have a security gateway handing traffic prior to it reaching your Exchange servers, if you're just sending it directly to your Exchange server, and if you are going to decrypt traffic. If you're already running things in a virtual-wire deployment you should already see exactly how the firewall will identify the traffic via your existing traffic logs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're running a 2016 or higher Exchange server, you'll see the following App-IDs if you decrypt that inbound traffic. Obviously allow smtp as well if you don't terminate that on a security gateway.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;                    &amp;lt;member&amp;gt;activesync&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;mapi-over-http&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;ms-exchange&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;office365-enterprise-access&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;outlook-web&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;rpc-over-http&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;soap&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;ssl&amp;lt;/member&amp;gt;
                    &amp;lt;member&amp;gt;web-browsing&amp;lt;/member&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your internal client communication will look slightly different and really depends on your own deployment. For example I won't see activesync internally because we don't have folks phones joined to our internal network, that might not be the case for you. You may also allow people to send email directly through an SMTP connection outside of Outlook to the server while I limit and control that traffic through additional individual rules. You'll also need to think about other devices in your network, such as printers, that use SMTP directly to the Exchange servers.&lt;/P&gt;
&lt;P&gt;Additionally you'll need to allow SMTP traffic between your security gateway and your Exchange environment if you're using a security gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While Exchange is a standard thing to deploy, each deployment isn't&amp;nbsp;&lt;EM&gt;exactly&amp;nbsp;&lt;/EM&gt;the same so you'll run across some variations. Your existing virtual-wire deployment should be able to allow you to build out those rules looking at your logs. I would spend some time identifying traffic and building out rules while your still in the virtual-wire deployment to get your security rulebase built out.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 04:18:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/459707#M102005</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-01-20T04:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance on swinging an Exchange 2016 On-Prem server from ASA to PA 820 (vWired currently)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/460596#M102092</link>
      <description>&lt;P&gt;Thanks for that BPry, we're using a cloud hosted mail filter so most (if not all) of the SMTP traffic should be to/from those IPs. Some things you've given me to think about there particularly with the printers (which we have a few that we allow to relay out).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you ever stumble across any check lists or other tools that might help?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 15:37:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/460596#M102092</guid>
      <dc:creator>s.Konowalchuk</dc:creator>
      <dc:date>2022-01-24T15:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance on swinging an Exchange 2016 On-Prem server from ASA to PA 820 (vWired currently)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/460699#M102097</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88599"&gt;@s.Konowalchuk&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I've never seen any sort of checklist or anything like that, and it wouldn't really make any sense to have one. Everyone's environment is going to look slightly different depending on a number of factors, so it doesn't really make much sense to create something like that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're in virtual-wire mode though you can already see ever bit of traffic flowing through though right. So what I would personally do it start building out your security rulebase from the logs from your intrazone-default rule and ensure you override that logging to log at session end.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will allow you to build out the security rulebase until the point that you don't have much/any traffic hitting that intrazone-default entry that you don't have a security rulebase entry setup for, or that you at least aren't already aware of. Then once everything is accounted for and you're getting ready to switch away from the old ASA completely, the only thing you have to do from a security rulebase aspect is update the security zones. Then all you need to worry about is routing and NAT rulebase entries during the cutover.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 19:51:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/460699#M102097</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-01-24T19:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance on swinging an Exchange 2016 On-Prem server from ASA to PA 820 (vWired currently)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/460734#M102102</link>
      <description>&lt;P&gt;&lt;FONT size="3"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;I actually created a Zone and security policy for that vWire traffic so I've been using that to filter on to start working on a proper rulebase.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;I put together this really high level "check list" for any of my public facing servers.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;Create network object for internal server&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Create network object for external IP&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Create the security policy (leave disabled)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Create the NAT policy (leave disabled)&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Check to see if it requires a PBF rule&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Some things I'm still trying to sort out - once I pull the old ASA out and just run the traffic through the PA I'm going to have to update my default route on my core switch stack. At that point everything should default out the PA. When its time to cutover I'm thinking I'll just run the WAN connection from my ASA directly into "WAN" port (e1/11) on my&amp;nbsp; PA. Either that or have my ISP route all that traffic to my "new" public IP address space so that everything comes in on e1/1 in which case I don't have to worry about updating any security zones because all the traffic will be coming in from the same zone.?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sKonowalchuk_1-1643060645558.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38757i9165A90381EF7AA5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="sKonowalchuk_1-1643060645558.png" alt="sKonowalchuk_1-1643060645558.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you see any flaws here with my logic or think of anything maybe that I'm forgetting?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 15:43:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/guidance-on-swinging-an-exchange-2016-on-prem-server-from-asa-to/m-p/460734#M102102</guid>
      <dc:creator>s.Konowalchuk</dc:creator>
      <dc:date>2022-01-25T15:43:02Z</dc:date>
    </item>
  </channel>
</rss>

