<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PaloAlto and VCS gateway - H323 / SIP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1670#M1231</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Installing a palo on network with VCSExpressway (cisco ToIP) module.&lt;/P&gt;&lt;P&gt;After reading other discussion (&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/7757#7757"&gt;https://live.paloaltonetworks.com/message/7757#7757&lt;/A&gt;, &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/12132#12132"&gt;https://live.paloaltonetworks.com/message/12132#12132&lt;/A&gt;, , for a "full" compatibility between palo and VCS, we have to create app override for disabling the app L7 PA's analyse (for NAT reason). The Cisco argue is our VCS know perfectly H323 and SIP, more than your fw which is just a FW ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have feedback about this archietecture ? what is for you the best practice, disbaling L7 on palo or disabling NAT on VCS ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have create App overide please can you explain which rule you have create.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Sep 2013 09:30:33 GMT</pubDate>
    <dc:creator>VinceM</dc:creator>
    <dc:date>2013-09-19T09:30:33Z</dc:date>
    <item>
      <title>PaloAlto and VCS gateway - H323 / SIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1670#M1231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Installing a palo on network with VCSExpressway (cisco ToIP) module.&lt;/P&gt;&lt;P&gt;After reading other discussion (&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/7757#7757"&gt;https://live.paloaltonetworks.com/message/7757#7757&lt;/A&gt;, &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/12132#12132"&gt;https://live.paloaltonetworks.com/message/12132#12132&lt;/A&gt;, , for a "full" compatibility between palo and VCS, we have to create app override for disabling the app L7 PA's analyse (for NAT reason). The Cisco argue is our VCS know perfectly H323 and SIP, more than your fw which is just a FW ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have feedback about this archietecture ? what is for you the best practice, disbaling L7 on palo or disabling NAT on VCS ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have create App overide please can you explain which rule you have create.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 09:30:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1670#M1231</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-09-19T09:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto and VCS gateway - H323 / SIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1671#M1232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Personally I would go for disabling NAT on the VCS to keep the L7 functionality of your PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise you can just place a switch with an ACL that allows certain ports towards your VCS unit which would be far cheaper than having a real FW such as PA to do the same (which is the case if you disable L7 on the PA via app override).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it also depends on in which order you have connected the devices and such (which flow the packets will take).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Sep 2013 10:41:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1671#M1232</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-09-22T10:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto and VCS gateway - H323 / SIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1672#M1233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One question on this. If you have the firewall policies configured to allow the SIP traffic just based on ports/services and not based on the application of 'SIP' will you still need an override policy? If the rule is based on strictly ports/services, will the SIP traffic still be analyzed and require an override? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see in the logs that it is identified as SIP but the policy is written utilizing only the desired ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 21:41:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-and-vcs-gateway-h323-sip/m-p/1672#M1233</guid>
      <dc:creator>ttanzi</dc:creator>
      <dc:date>2014-04-10T21:41:45Z</dc:date>
    </item>
  </channel>
</rss>

