<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPV6 how to protect the hosts in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipv6-how-to-protect-the-hosts/m-p/564590#M114244</link>
    <description>&lt;P&gt;Hi everyone, I learn the palo alto firewalls as I configure them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a PA firewall with 3 vlans, with management allowed over main vlan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My ISP provided the Ipv6/48 block and I have manage to redistribute it over the networks it works great. However considering eveyr ipv6 address is routable and I naturally have no NAT means that the devices with 443 etc ports in theory can be reached over the internet. the the management of the firewall as well. I did edit the mgmt profile only allow my local ipv4 networks I guess it will protect the firewall however what about the other hosts like voip phones, plex etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there are rule i can pur in place to build some generic protection like source is all - dest is all, all ports - block, I guess this is something Nat does by default (not that it's built for that )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you&lt;/P&gt;</description>
    <pubDate>Tue, 07 Nov 2023 06:09:15 GMT</pubDate>
    <dc:creator>nevolex</dc:creator>
    <dc:date>2023-11-07T06:09:15Z</dc:date>
    <item>
      <title>IPV6 how to protect the hosts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipv6-how-to-protect-the-hosts/m-p/564590#M114244</link>
      <description>&lt;P&gt;Hi everyone, I learn the palo alto firewalls as I configure them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a PA firewall with 3 vlans, with management allowed over main vlan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My ISP provided the Ipv6/48 block and I have manage to redistribute it over the networks it works great. However considering eveyr ipv6 address is routable and I naturally have no NAT means that the devices with 443 etc ports in theory can be reached over the internet. the the management of the firewall as well. I did edit the mgmt profile only allow my local ipv4 networks I guess it will protect the firewall however what about the other hosts like voip phones, plex etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there are rule i can pur in place to build some generic protection like source is all - dest is all, all ports - block, I guess this is something Nat does by default (not that it's built for that )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 06:09:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipv6-how-to-protect-the-hosts/m-p/564590#M114244</guid>
      <dc:creator>nevolex</dc:creator>
      <dc:date>2023-11-07T06:09:15Z</dc:date>
    </item>
    <item>
      <title>Re: IPV6 how to protect the hosts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipv6-how-to-protect-the-hosts/m-p/564821#M114274</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/280122"&gt;@nevolex&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If traffic is not specifically allowed or denied by a rule, it will get denied. By default, inter-zone traffic is denied and intra-zone traffic is allowed. If you've configured a wide open security policy before these default policies, I would recommend tightening up your security policies to allow specific source IPs.&amp;nbsp; Here is a &lt;A href="https://docs.paloaltonetworks.com/best-practices/security-policy-best-practices/security-policy-best-practices/deploy-security-policy-best-practices/security-policy-rule-best-practices#:~:text=When%20traffic%20matches%20a%20rule's,the%20traffic%20(implicit%20deny)." target="_self"&gt;Security Policy Rule Best Practices&lt;/A&gt; doc that is very insightful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 15:22:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipv6-how-to-protect-the-hosts/m-p/564821#M114274</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-11-08T15:22:23Z</dc:date>
    </item>
  </channel>
</rss>

