<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DMZ in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554317#M112655</link>
    <description>&lt;P&gt;Yes, I will test this out. Thanks for the excellent support!&lt;/P&gt;</description>
    <pubDate>Fri, 18 Aug 2023 14:49:25 GMT</pubDate>
    <dc:creator>CGilbride</dc:creator>
    <dc:date>2023-08-18T14:49:25Z</dc:date>
    <item>
      <title>DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554220#M112633</link>
      <description>&lt;P&gt;We only have one public IP. Can I still set up a DMZ? If so, can someone point me to a good article on setting one up? I have found several but nothing that specifies if it is okay to set up using a single IP.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 21:12:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554220#M112633</guid>
      <dc:creator>CGilbride</dc:creator>
      <dc:date>2023-08-17T21:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554221#M112634</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/226475"&gt;@CGilbride&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is definitely possible to setup a DMZ with 1 public IP address.&amp;nbsp; A DMZ is recommended for all inbound traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would create a private subnet in the DMZ and use NAT to map the 1 public IP to the private IP addresses.&amp;nbsp; You could map different services (e.g., tcp/25, tcp/80, etc.) to different DMZ IP addresses.&amp;nbsp; You could also use other options in the rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 21:23:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554221#M112634</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-17T21:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554222#M112635</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;, thank you. I think I found an article that will help. It looks like I would just add my public IP to the Destination Address field in the security policy I create. I'm new to Palo Alto, and normally deal with internal network infrastructure, so setting up DMZs is not my specialty, working on adding to my skill set.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 21:29:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554222#M112635</guid>
      <dc:creator>CGilbride</dc:creator>
      <dc:date>2023-08-17T21:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554223#M112636</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Any protected subnet is technically a DMZ. Do you have services that are exposed to the internet?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 21:52:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554223#M112636</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-08-17T21:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554227#M112637</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;, we do not.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 22:03:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554227#M112637</guid>
      <dc:creator>CGilbride</dc:creator>
      <dc:date>2023-08-17T22:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554295#M112650</link>
      <description>&lt;P&gt;here's an example NAT rule for a DMZ hosted webserver&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the original packet, you need to set untrust as source AND destination, this is because the original destination IP belongs to the external interface and the source IP originates from the internet. both of these zones are determined by doing a route lookup&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you set a service (in this case https:443) only that port is translated, leaving you with all the other destination ports untranslated and free for additional rules that point to different destinations (smtp, ftp,...)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in the Translated Packet, we set the destination server's private IP so NAT can be applied, and you can also change the final destination port, in case the server is running a service on a different port from the default (ports can both be changed pre- and post NAT e.g. 4443 becomes 443 or 443 becomes 8443 etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2023-08-18_13-31-12.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52909i1C7F123AE7F67A1A/image-size/large?v=v2&amp;amp;px=999" role="button" title="2023-08-18_13-31-12.png" alt="2023-08-18_13-31-12.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 11:36:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554295#M112650</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-08-18T11:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554313#M112652</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Since you are not hosting any services that the people on the internet need to connect to, then all you need to do is create a security zone and vlan on the PAN. From there create the access policies as normal. This is now your protected vlan/DMZ. Also make sure you have a DENY ALL policy so its all allowed by exception.&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 14:32:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554313#M112652</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-08-18T14:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554315#M112654</link>
      <description>&lt;P&gt;Excellent!! thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 14:48:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554315#M112654</guid>
      <dc:creator>CGilbride</dc:creator>
      <dc:date>2023-08-18T14:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554317#M112655</link>
      <description>&lt;P&gt;Yes, I will test this out. Thanks for the excellent support!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 14:49:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz/m-p/554317#M112655</guid>
      <dc:creator>CGilbride</dc:creator>
      <dc:date>2023-08-18T14:49:25Z</dc:date>
    </item>
  </channel>
</rss>

