<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create ACLs for access to AWS workspaces (EDLs don't cover all IPs) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-acls-for-access-to-aws-workspaces-edls-don-t-cover/m-p/999908#M122693</link>
    <description>&lt;P&gt;I need to create ACLs for outbound access to AWS workspaces using the destination IPs / subnets / FQDNs shown on AWS publication&amp;nbsp;&lt;A href="https://docs.aws.amazon.com/workspaces/latest/adminguide/workspaces-port-requirements.html#ip-address-regions" target="_blank"&gt;https://docs.aws.amazon.com/workspaces/latest/adminguide/workspaces-port-requirements.html#ip-address-regions&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN publishes an EDL for AWS workspace, but it only contains a handful of IPs.&amp;nbsp; Some of the IPs listed in the above URL is not found even in the AWS US ALL IP EDL.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suppose the next best thing is to create ACL using static IPs and FQDNs, but some of the FQDNs are wildcards.&amp;nbsp; How would you create rules with these as destinations?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https://&amp;lt;directory id&amp;gt;.awsapps.com/ (where &amp;lt;directory id&amp;gt; is the customer's domain)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;turn:*.us-west-2.rdn.amazonaws.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*.prod.us-west-2.highlander.aws.a2z.com&lt;/P&gt;</description>
    <pubDate>Tue, 31 Dec 2024 19:44:48 GMT</pubDate>
    <dc:creator>Commander_JB</dc:creator>
    <dc:date>2024-12-31T19:44:48Z</dc:date>
    <item>
      <title>How to create ACLs for access to AWS workspaces (EDLs don't cover all IPs)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-acls-for-access-to-aws-workspaces-edls-don-t-cover/m-p/999908#M122693</link>
      <description>&lt;P&gt;I need to create ACLs for outbound access to AWS workspaces using the destination IPs / subnets / FQDNs shown on AWS publication&amp;nbsp;&lt;A href="https://docs.aws.amazon.com/workspaces/latest/adminguide/workspaces-port-requirements.html#ip-address-regions" target="_blank"&gt;https://docs.aws.amazon.com/workspaces/latest/adminguide/workspaces-port-requirements.html#ip-address-regions&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN publishes an EDL for AWS workspace, but it only contains a handful of IPs.&amp;nbsp; Some of the IPs listed in the above URL is not found even in the AWS US ALL IP EDL.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suppose the next best thing is to create ACL using static IPs and FQDNs, but some of the FQDNs are wildcards.&amp;nbsp; How would you create rules with these as destinations?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https://&amp;lt;directory id&amp;gt;.awsapps.com/ (where &amp;lt;directory id&amp;gt; is the customer's domain)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;turn:*.us-west-2.rdn.amazonaws.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*.prod.us-west-2.highlander.aws.a2z.com&lt;/P&gt;</description>
      <pubDate>Tue, 31 Dec 2024 19:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-acls-for-access-to-aws-workspaces-edls-don-t-cover/m-p/999908#M122693</guid>
      <dc:creator>Commander_JB</dc:creator>
      <dc:date>2024-12-31T19:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to create ACLs for access to AWS workspaces (EDLs don't cover all IPs)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-acls-for-access-to-aws-workspaces-edls-don-t-cover/m-p/1000007#M122715</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196270"&gt;@Commander_JB&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the wildcards, I would test out creating a separate policy that enforces a custom url category that includes all the wildcard domains you need for workspaces. Here is a KB on &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oM79CAE&amp;amp;lang=en_US%E2%80%A9" target="_self"&gt;examples of using wildcards&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 23:10:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-acls-for-access-to-aws-workspaces-edls-don-t-cover/m-p/1000007#M122715</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-01-02T23:10:57Z</dc:date>
    </item>
  </channel>
</rss>

