<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall rules for IPv6 targets in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528435#M109112</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18576"&gt;@Dereje&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First thinking as always in a possible and safe rollback to use ipv4, I would consider the best option to clone the rules and add the ipv6 sources and destinations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having differentiated rules allows you to have a better tracking, review in log monitoring and check the correct hits of these.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Wed, 25 Jan 2023 00:28:49 GMT</pubDate>
    <dc:creator>Metgatz</dc:creator>
    <dc:date>2023-01-25T00:28:49Z</dc:date>
    <item>
      <title>Firewall rules for IPv6 targets</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528355#M109101</link>
      <description>&lt;P&gt;We are trying to implement IPv6 in our network, and as part of this deployment all our network resources should run on dual-stack (IPv4 &amp;amp; IPv6). Address objects Types in our firewall policy rules have been written based on IP (IP Netmask and IP Range), not with FQDN.&lt;/P&gt;
&lt;P&gt;(Option 1) To make the same firewall policy rule be used (for Ipv4 and IPv6 targets), we need to convert each address objects into FQDN or (Option 2) we have to create a duplicate firewall policy rule with IPv6 targets or add the corresponding IPv6 address object to each firewall rules). What do you think which option we need to go with?&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 15:19:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528355#M109101</guid>
      <dc:creator>Dereje</dc:creator>
      <dc:date>2023-01-24T15:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules for IPv6 targets</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528435#M109112</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18576"&gt;@Dereje&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First thinking as always in a possible and safe rollback to use ipv4, I would consider the best option to clone the rules and add the ipv6 sources and destinations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having differentiated rules allows you to have a better tracking, review in log monitoring and check the correct hits of these.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 00:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528435#M109112</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2023-01-25T00:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules for IPv6 targets</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528529#M109127</link>
      <description>&lt;P&gt;I suggest a combination of both with using FQDNs while still having separate security policies for IPv4 and IPv6 to allow for better visibility in your logging.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 12:41:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528529#M109127</guid>
      <dc:creator>kat3xx</dc:creator>
      <dc:date>2023-01-25T12:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules for IPv6 targets</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528633#M109144</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18576"&gt;@Dereje&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are currently in similar situation, however our goal is to move to IPv6 native instead of dual stack. Although, I do not think I can give you an answer whether to go with option 1 or 2, I would like to share a few points.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- For duplication of the rules if you have any IPv4 rule with GEO location, you will not be able to have exact the same equivalent as currently there is no support for IPv6 GEO database. There is a feature request for it:&amp;nbsp;#2865.&lt;/P&gt;
&lt;P&gt;- Watch out for User-ID mapping if your IPv4 rules are leveraging source user information and you will duplicate this setting to IPv6 rules. This part caused some delay with deployment in our case, as additional tuning, troubleshooting and testing was required.&lt;/P&gt;
&lt;P&gt;- During migration process, we ended up with duplicating of existing IPv4 rules into IPv6, however since deployment of IPv6 apart of business reasons presented a chance of re-design of almost everything for IP addressing, routing design, policies, we aimed to duplicated only standardized policies through Panorama. All legacy local exceptions were not duplicated in an effort to declutter policies. After you enable dual stack end to end, your endpoints will in most cases prefer IPv6 over IPv4, so new IPv6 rules will likely get more hits. This might be a good chance to clean/tune up some of the policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 22:44:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528633#M109144</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2023-01-25T22:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules for IPv6 targets</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528958#M109216</link>
      <description>&lt;P&gt;Thank you for the response and the shared idea. We have the same idea of cloning the rule and modifying it for only v6 rule, but having thousands of rules, cloning that many rules is a daunting task unless we come up with some form of automation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 21:24:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-for-ipv6-targets/m-p/528958#M109216</guid>
      <dc:creator>Dereje</dc:creator>
      <dc:date>2023-01-27T21:24:39Z</dc:date>
    </item>
  </channel>
</rss>

