<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Default antivirus profiles on a &amp;quot;deny&amp;quot; policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18394#M13423</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "default-profile" contains all recommended settings on it.&amp;nbsp; Hence, it is advisable to attach that profile with a deny policy. So, even if the packet is getting dropped &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;not matching with any existing policy), you will have more granular visibility of what type of traffic heading towards your firewall &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt; malicious, threat etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Aug 2014 17:40:37 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-08-28T17:40:37Z</dc:date>
    <item>
      <title>Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18392#M13421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does it mean to attach the "default antivirus profile" to a deny policy?&amp;nbsp; Does that mean that traffic matching that rule will be both denied and scanned for viruses?&amp;nbsp; (I have the same question for the other profiles too).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 17:12:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18392#M13421</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-08-28T17:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18393#M13422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say if "AV Profile" is in place with deny policy, than few/one packet will be matched to deny policy before last packet drop by policy and all those packets will be scanned for virus/vulnerability. Its safer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However most likely 16 packets will be scanned for AV, because after that firewall will identify application and either allow or drop it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bottom line is its safer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 17:16:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18393#M13422</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-28T17:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18394#M13423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "default-profile" contains all recommended settings on it.&amp;nbsp; Hence, it is advisable to attach that profile with a deny policy. So, even if the packet is getting dropped &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;not matching with any existing policy), you will have more granular visibility of what type of traffic heading towards your firewall &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt; malicious, threat etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 17:40:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18394#M13423</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-28T17:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18395#M13424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to block traffic from zone A to zone B and you have configured the security rule to block this traffic, lets say the first packet comes from zone A, we do a route lookup and find the destination zone to be zone B. You will then do a policy lookup and see that there is a policy match. But since the action is set to "deny", the packet is dropped immediately. Firewall will only inspect the traffic if the policy it matched has action set to "allow". Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 18:07:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18395#M13424</guid>
      <dc:creator>tshiv</dc:creator>
      <dc:date>2014-08-28T18:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18396#M13425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tsiv,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some times Deny is configured with application, Lets say facebook is blocked between Zone A to Zone B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now policy will alow atleast 16 packets to identify as a facebook and than drop it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now there are two scenarios.&lt;/P&gt;&lt;P&gt;1. No AV Profile : Then this 16 packets are not scanned.&lt;/P&gt;&lt;P&gt;2. With AV Profile : These 16 packets are scanned to check any threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bottom line is its not always a plain drop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 18:10:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18396#M13425</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-28T18:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18397#M13426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello hshah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your understanding is not correct. Flow basic clearly shows that If the action associated with the policy is "deny", we won't even install the session for inspection to happen. We just record a discard log saying that the traffic is dropped.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 18:25:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18397#M13426</guid>
      <dc:creator>tshiv</dc:creator>
      <dc:date>2014-08-28T18:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18398#M13427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tshiv,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are right, in that case there is no significance of profiles in deny rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 18:27:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18398#M13427</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-28T18:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Default antivirus profiles on a "deny" policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18399#M13428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correcting My initial update:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Tshiv&lt;/SPAN&gt; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; is absolutely correct, once the packet with match with a "deny" policy on SLOW-PATH packet processing, PAN firewall will discard that packet immediately &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;before sending that packet for L-7 inspection). Hence, adding &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;a&lt;/SPAN&gt; AV-profile will not make any sense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default deny policy is for logging all dropped packets on the firewall for more visibility, &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;what traffic heading towards your firewall &lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;source IP, protocol, source-country &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;etc&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 21:19:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-antivirus-profiles-on-a-quot-deny-quot-policy/m-p/18399#M13428</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-29T21:19:52Z</dc:date>
    </item>
  </channel>
</rss>

