<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to handle firewall self-traffic (management traffic / service routing) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25617#M18681</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rule logging doesn't affect ACC data (&lt;A __default_attr="7378" __jive_macro_name="thread" class="jive_macro jive_macro_thread" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does, however, affect what shows up under Monitor/Logs.&amp;nbsp; As far as reporting is concerned, it depends on which database you use.&amp;nbsp; The summary/statistics databases don't rely on rule logging.&amp;nbsp; Reports generated from the Detailed databases pull from the same database where the rule logging occurs.&amp;nbsp; (As a side-note, this is the reason why it takes more time to run a report against the detailed logs - as the reporting engine must parse through each and every applicable log entry.&amp;nbsp; Reporting from the Summary databases is much quicker, but doesn't have quite as much data as the detailed logs.. ie: src/dst port information, etc.)&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="https://live.paloaltonetworks.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-JV&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Jun 2013 20:44:08 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2013-06-14T20:44:08Z</dc:date>
    <item>
      <title>How to handle firewall self-traffic (management traffic / service routing)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25614#M18678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I have a global clean-up rule that blocks/logs all unwanted traffic, my firewall management traffic (DNS lookups, PAN-DB updates etc) stop working if I configure it to use any other interface but the dedicated management ports.&amp;nbsp; So I added a lot of rules to allow this traffic. Which is really not what I want. I also see inconsistencies. For example, SMTP traffic from the firewall (for sending alarm emails) seems to work without having a security rule for it (destination is directly connected inside a DMZ), while PAN-DB lookups (to the internet) need a security rule. Same for DNS. This is really confusing and inconsistent. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any guidelines or best practices on how to set this up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 17:51:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25614#M18678</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-14T17:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle firewall self-traffic (management traffic / service routing)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25615#M18679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The general recommendation is to not use a clean-up rule at all. The firewall allows all same-zone traffic by default, and denies all intra-zone traffic. Unless you have a specific requirement to log this traffic, a generic "deny all" policy is not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do have that requirement, my recommendation is to make specific policies that exclude same-zone traffic. For example, if you have 3 zones (trust, untrust, dmz) you would make 3 policies:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Src: Trust; Dst: untrust or dmz; Deny&lt;/P&gt;&lt;P&gt;Src: DMZ; dst: untrust or trust; Deny&lt;/P&gt;&lt;P&gt;Src: Untrust; dst: trust or dmz; Deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This gives you the logging, but prevents the issue you are running into by allowing same-zone traffic. When the firewall makes an outbound connection on a public L3 interface, the source and destination are the same zone and thus your cleanup rule denies it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 19:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25615#M18679</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-06-14T19:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle firewall self-traffic (management traffic / service routing)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25616#M18680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Greg, that makes sense. I am going to try that out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question: If it is recommended to not use any cleanup rules at all and you effectively turn off all logging for dropped packets that way, how does this impact reporting and the ACC?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 19:52:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25616#M18680</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-14T19:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle firewall self-traffic (management traffic / service routing)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25617#M18681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rule logging doesn't affect ACC data (&lt;A __default_attr="7378" __jive_macro_name="thread" class="jive_macro jive_macro_thread" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does, however, affect what shows up under Monitor/Logs.&amp;nbsp; As far as reporting is concerned, it depends on which database you use.&amp;nbsp; The summary/statistics databases don't rely on rule logging.&amp;nbsp; Reports generated from the Detailed databases pull from the same database where the rule logging occurs.&amp;nbsp; (As a side-note, this is the reason why it takes more time to run a report against the detailed logs - as the reporting engine must parse through each and every applicable log entry.&amp;nbsp; Reporting from the Summary databases is much quicker, but doesn't have quite as much data as the detailed logs.. ie: src/dst port information, etc.)&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="https://live.paloaltonetworks.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-JV&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 20:44:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25617#M18681</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-06-14T20:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle firewall self-traffic (management traffic / service routing)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25618#M18682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent, thank JV. I think I am going for dedicated cleanup rules in each zone-context to get more details. Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 20:55:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-handle-firewall-self-traffic-management-traffic-service/m-p/25618#M18682</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-14T20:55:34Z</dc:date>
    </item>
  </channel>
</rss>

