<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Management Interface outside of firewall in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30797#M22546</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following are the services which you can enable or disable on the management interface. You can locate this on Device tab--&amp;gt; setup --&amp;gt; management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9001_Capture.PNG.png" style="width: 620px; height: 306px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However if you have your management traffic passing through the firewall you can create a security policy to only allow the services that you want. Make sure you still need to get software and dynamic updates from the internet.&lt;/P&gt;&lt;P&gt;Following are the most services which takes management interface for communication unless specified differently. You can access this tab from Device tab--&amp;gt; setup --&amp;gt; services&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9002_Capture.PNG.png" style="width: 620px; height: 323px;" /&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Oct 2013 19:21:44 GMT</pubDate>
    <dc:creator>mbutt</dc:creator>
    <dc:date>2013-10-09T19:21:44Z</dc:date>
    <item>
      <title>Management Interface outside of firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30796#M22545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Knowing that one does not *usually* put a device management interface outside of the firewall, on the public Internet, in the case of PAN gateways is there any severe problem with this? I have a situation where putting the management of these devices on the private management network would require quite a bit of additional configuration, bandwidth use for updates, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only things that I have confirmed/know are listening are https/ssh/snmp, the first two of which are considered "secure". SNMP can be configured read-only easily enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What else would you consider a concern?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:01:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30796#M22545</guid>
      <dc:creator>TimGrossner</dc:creator>
      <dc:date>2013-10-09T18:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface outside of firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30797#M22546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following are the services which you can enable or disable on the management interface. You can locate this on Device tab--&amp;gt; setup --&amp;gt; management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9001_Capture.PNG.png" style="width: 620px; height: 306px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However if you have your management traffic passing through the firewall you can create a security policy to only allow the services that you want. Make sure you still need to get software and dynamic updates from the internet.&lt;/P&gt;&lt;P&gt;Following are the most services which takes management interface for communication unless specified differently. You can access this tab from Device tab--&amp;gt; setup --&amp;gt; services&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9002_Capture.PNG.png" style="width: 620px; height: 323px;" /&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:21:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30797#M22546</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-10-09T19:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface outside of firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30798#M22547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should be ok. Only http, ocsp, https, snmp, ping,telnet, user-id,ssh are available on management interface.&lt;/P&gt;&lt;P&gt;I would not allow 'ping' to allow everyone know its available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart from above services, you can also restrict it to be available from only certain IPs - 'Permitted IPs'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 23:37:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30798#M22547</guid>
      <dc:creator>ukhapre</dc:creator>
      <dc:date>2013-10-09T23:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface outside of firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30799#M22548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its possible to put the management interface on the outside network or on the Internet. The usual considerations apply - expose only the minimum footprint- only allow the traffic that needs to see it. In this case don't set it to respond to ICMP, only use encrypted protocols (SSL, SSH, etc.), and if at all possible limit the addresses that can login via the permitted IP list. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 16:55:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface-outside-of-firewall/m-p/30799#M22548</guid>
      <dc:creator>SMF</dc:creator>
      <dc:date>2013-10-28T16:55:25Z</dc:date>
    </item>
  </channel>
</rss>

