<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: logging on intra and interzone in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477360#M103659</link>
    <description>&lt;P&gt;Thank you Astardzhiev, very nice.&lt;/P&gt;</description>
    <pubDate>Thu, 31 Mar 2022 19:05:06 GMT</pubDate>
    <dc:creator>roma</dc:creator>
    <dc:date>2022-03-31T19:05:06Z</dc:date>
    <item>
      <title>logging on intra and interzone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/476643#M103600</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;Hello,&lt;/P&gt;&lt;P class=""&gt;I just turned on logging on my intra and inter zone security rules and noticed that in the security logs a few external ip addresses from zone untrust to zone untrust, with the source of a public ip being allowed, session end reason time out.&lt;/P&gt;&lt;P class=""&gt;How can something be allowed from zone untrust to untrust, that doesnt make sense to me?&lt;/P&gt;&lt;P class=""&gt;the same public ip is also logging from zone untrust to zone trust and policy is denied.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 29 Mar 2022 16:37:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/476643#M103600</guid>
      <dc:creator>roma</dc:creator>
      <dc:date>2022-03-29T16:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: logging on intra and interzone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477134#M103633</link>
      <description>&lt;P&gt;Thank you for post&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116207"&gt;@roma&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is expected, the security rule: intrazone-default has default action allow while&amp;nbsp;interzone-default has default action deny, so the log you are seeing are corresponding with security rule action.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 06:22:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477134#M103633</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-03-31T06:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: logging on intra and interzone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477349#M103657</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116207"&gt;@roma&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just want to add to &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt; great explanation:&lt;/P&gt;&lt;P&gt;- Palo FW will make route lookup to determine the destination zone, when packet without a session hit the firewall. Which means that firewall will check its routing table for the destination address.&lt;/P&gt;&lt;P&gt;- If the destination address is IP assigned on the FW interface, the route look up will return the zone associated with that interface. So and since the traffic is comming from internet from and to will be the same zone - untrust.&lt;/P&gt;&lt;P&gt;- If the destination address is IP that is used in NAT policy, the route lookup will be aware of this and will return the zone associated with the route used to reach the translated/internal address. In this case the source is comming from internet and destination (after NAT trannslation) is reachable through through the internal zone, you will see from untrust to trust zone.&lt;/P&gt;&lt;P&gt;- If the destination address is neither assigned on the FW, nor it is used for NAT, the route lookup will again return untrust zone - this is because in your routing table there will be the directly connected network to internet (or if you have purchased additional public range from your ISP, that will be routed to you, but if not used in NAT route lookup will use the default route)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now having in mind how the destination and source zone are determined, you need to look at the default action for intra and inter-zone rules.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 18:29:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477349#M103657</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-03-31T18:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: logging on intra and interzone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477360#M103659</link>
      <description>&lt;P&gt;Thank you Astardzhiev, very nice.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 19:05:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/477360#M103659</guid>
      <dc:creator>roma</dc:creator>
      <dc:date>2022-03-31T19:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: logging on intra and interzone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/571347#M115043</link>
      <description>&lt;P&gt;Facing a similar issue here:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/packets-retransmission-captured-in-packet-capture-on-firewall/m-p/571345#M2335" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/next-generation-firewall/packets-retransmission-captured-in-pac...&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Any recommendations?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 12:10:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/logging-on-intra-and-interzone/m-p/571347#M115043</guid>
      <dc:creator>mhannan313</dc:creator>
      <dc:date>2024-01-01T12:10:26Z</dc:date>
    </item>
  </channel>
</rss>

