<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wild Fire internet access physical setup in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wild-fire-internet-access-physical-setup/m-p/540643#M110880</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You should follow best practices and have the devices management interfaces protected. As for the 'Special' interfaces for the sandbox traffic, that should be unfiltered. This can be done from behind a Palo Alto, such as virtual wire, for outbound only traffic, etc. This way the appliance can reach out to bad URL's and get additional information on malware and other attribution, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 01 May 2023 18:22:44 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2023-05-01T18:22:44Z</dc:date>
    <item>
      <title>Wild Fire internet access physical setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wild-fire-internet-access-physical-setup/m-p/540550#M110861</link>
      <description>&lt;P&gt;Physical Appliance require a direct internet access or dirty link ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Apr 2023 09:44:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wild-fire-internet-access-physical-setup/m-p/540550#M110861</guid>
      <dc:creator>ABE-Security</dc:creator>
      <dc:date>2023-04-30T09:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: Wild Fire internet access physical setup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wild-fire-internet-access-physical-setup/m-p/540643#M110880</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You should follow best practices and have the devices management interfaces protected. As for the 'Special' interfaces for the sandbox traffic, that should be unfiltered. This can be done from behind a Palo Alto, such as virtual wire, for outbound only traffic, etc. This way the appliance can reach out to bad URL's and get additional information on malware and other attribution, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 18:22:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wild-fire-internet-access-physical-setup/m-p/540643#M110880</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-05-01T18:22:44Z</dc:date>
    </item>
  </channel>
</rss>

