<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Virtual Wire DMZ - Help Please in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22535#M16448</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You probably want to check with your SE or Reseller regarding your network architecture, but there is another option that may work for you; a Layer2 to Layer 3 connection.&amp;nbsp; Documentation can be found at the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1067"&gt;https://live.paloaltonetworks.com/docs/DOC-1067&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Apr 2010 22:17:06 GMT</pubDate>
    <dc:creator>nrice</dc:creator>
    <dc:date>2010-04-27T22:17:06Z</dc:date>
    <item>
      <title>Virtual Wire DMZ - Help Please</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22534#M16447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hoping for some clarification on using Virtual Wire to inspect traffic to our DMZ please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now the external interface of our PAN has a public IP of 1.2.3.1/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its default gateway is another firewall in front of it, it's internal interface has a public IP of 1.2.3.2/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both of these interfaces are connected to a switch, and on that switch we also have a webserver/mail relay which have public IP's on the same 1.2.3.0/24 network, kind of like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;PAN (external interface is in dumb switch)&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;Dumb Switch--DMZ Servers&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;Perimeter Firewall (internal interface is in dumb switch)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;Router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I can bring those DMZ servers in behind another interface on the PAN and assign them private IP addresses and have the PAN do the decryption/inspection/forwarding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also believe I can setup a DMZ "virtual wire" which will let me do SSL decryption and threat/virus inspection without having to touch the configuration on any of those DMZ servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'm not clear on is how I'd do this, and as I don't have a PAN I can test on I'd appreciate some clarification before I do anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Equally if every "best practise" out there is to do this using traditional NAT tell me and I'll look at doing it this way (How do I best build up the "new" ruleset on the PAN without committing it until I'm ready, whilst being able to make changes to my running config if I need to?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Apr 2010 09:39:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22534#M16447</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2010-04-25T09:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual Wire DMZ - Help Please</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22535#M16448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You probably want to check with your SE or Reseller regarding your network architecture, but there is another option that may work for you; a Layer2 to Layer 3 connection.&amp;nbsp; Documentation can be found at the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1067"&gt;https://live.paloaltonetworks.com/docs/DOC-1067&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Apr 2010 22:17:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22535#M16448</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2010-04-27T22:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual Wire DMZ - Help Please</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22536#M16449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply.&amp;nbsp; I had a chat with Vadition and they were of the view that the simplest solution (maybe more work to get there but neater/simpler) would be to bring the hosts off a L3 interface and have a DMZ zone and do inbound NAT etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question on that as I only just asked them - can you assign multiple NICs in the PAN to the same L3 interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ask as we only have two DMZ hosts so it'd be nice to be able to plug them directly into the PAN vs. bringing another (small) switch into the equation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Apr 2010 16:51:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-wire-dmz-help-please/m-p/22536#M16449</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2010-04-28T16:51:48Z</dc:date>
    </item>
  </channel>
</rss>

