<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Some emails not working on iPhone behind PA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523748#M108432</link>
    <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;.&amp;nbsp;Makes perfect sense. This also explains why I kept seeing the default interzone rule hit counts increment, even though I had a deny-all interzone rule ahead of it that for logging purposes.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 09 Dec 2022 22:47:04 GMT</pubDate>
    <dc:creator>LRCAIT</dc:creator>
    <dc:date>2022-12-09T22:47:04Z</dc:date>
    <item>
      <title>Some emails not working on iPhone behind PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/150716#M50007</link>
      <description>&lt;P&gt;I have a weird problem. I installed a VM100 connected via PPPoE to the ISP, standard NAT, DHCP configured on the LAN side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue: unable to receive/send emails from iPhone from SOME providers using inherid IOS app:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Corporate email: working via IOS email app&lt;/LI&gt;&lt;LI&gt;iCloud email: not working via IOS email app&lt;/LI&gt;&lt;LI&gt;Gmail email: not working via IOS email app, but works from "Inbox" app (on the same iPhone!!)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;PS: Web browsing is fine and even my SIP Trunk is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas? I have set MTU to 1480 on the WAN interface. which was my first thought...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 02 Apr 2017 12:02:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/150716#M50007</guid>
      <dc:creator>Hwinter</dc:creator>
      <dc:date>2017-04-02T12:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Some emails not working on iPhone behind PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/150724#M50009</link>
      <description>&lt;P&gt;Turns out iCloud and gmail are using non-standard ports.&amp;nbsp;I had to change the policy (Policies -&amp;gt; Security) &amp;nbsp;from:&lt;/P&gt;&lt;P&gt;- Application: application_default&lt;/P&gt;&lt;P&gt;.to.&lt;/P&gt;&lt;P&gt;- Application: any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose I could have tweeked the application_default to allow the gmail and icloud custom ports too. That will be my next step. However, it is working with any. It looks like there was a change on 7.1:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Articles/PAN-OS-7-1-Policy-behavior-change-application-default/ta-p/75664" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Articles/PAN-OS-7-1-Policy-behavior-change-application-default/ta-p/75664&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Apr 2017 13:51:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/150724#M50009</guid>
      <dc:creator>Hwinter</dc:creator>
      <dc:date>2017-04-02T13:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Some emails not working on iPhone behind PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523737#M108429</link>
      <description>&lt;P&gt;If you're still around,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58964"&gt;@Hwinter&lt;/a&gt;&amp;nbsp;, I wanted to let you know that this old note saved a stranger a bunch of time in the year 2022. Thanks!&lt;/P&gt;
&lt;P&gt;It'd be great if someone could explain to me how or why traffic that was blocked for being on a non-standard port didn't make into the Traffic log as thusly denied. Is there something I can configure to see traffic that is blocked because an app is using a non-standard port?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 19:07:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523737#M108429</guid>
      <dc:creator>LRCAIT</dc:creator>
      <dc:date>2022-12-09T19:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Some emails not working on iPhone behind PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523746#M108430</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/258815"&gt;@LRCAIT&lt;/a&gt;&amp;nbsp; The default "intrazone-default" and "interzone-default" Security policies do not log by default, the interzone policy denies traffic. So if you have allow rules for an Application(s) with "application-default" Service and you do not have your own deny-everything-else Security policy, then the traffic falls thru to the "interzone-default" rule and is blocked without logging. Additionally, if you do have a deny-everything rule, but the Service in the rule is set to "application-default" (with an "any" Application) then you deny rule also won't match as the traffic may have been identified as an application that is on a non-standard port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can update these 2 built-in PaloAlto rules to log by selecting from the policy list and clicking "Override" at the bottom. Then edit to log traffic to your Log Forwarding profile.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/10-2/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/define-the-initial-internet-gateway-security-policy/step-5-enable-logging-for-traffic-that-doesnt-match-any-rules" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/best-practices/10-2/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/define-the-initial-internet-gateway-security-policy/step-5-enable-logging-for-traffic-that-doesnt-match-any-rules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 22:19:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523746#M108430</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-12-09T22:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Some emails not working on iPhone behind PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523748#M108432</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;.&amp;nbsp;Makes perfect sense. This also explains why I kept seeing the default interzone rule hit counts increment, even though I had a deny-all interzone rule ahead of it that for logging purposes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 22:47:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/some-emails-not-working-on-iphone-behind-pa/m-p/523748#M108432</guid>
      <dc:creator>LRCAIT</dc:creator>
      <dc:date>2022-12-09T22:47:04Z</dc:date>
    </item>
  </channel>
</rss>

