<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simple Policy Question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3048#M2267</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your rule has Zone A to Zone B specified and IP address source and destination of any, then the traffic will be filtered based on zones only regardless of IP. Entering in an IP address is not required, if you want to only filter on zones this can be done as long as your source and destination IPs are "any". Typically you assign interfaces to Zones so you need to understand your network topology to understand what traffic is coming through each zone, but when filtering at the zone level IP addresses do not need to be specified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want all of my internal users to access anything in our DMZ and the web and my DMZ to be able to access the Web I would create 3 zones...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone A = Internal Users, multiple subnets and IPs&lt;/P&gt;&lt;P&gt;Zone B = DMZ multiple subnets and IPs&lt;/P&gt;&lt;P&gt;Zone C = Internet multiple subnets and IPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My rule would go something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" class="jiveBorder" style="width: 100%; border: 1px solid #000000;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;Name&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;S. Zone&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;D. Zone&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;S. Address&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;D. Address&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Application&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;BR /&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Rule 1&lt;/TD&gt;&lt;TD&gt;Zone A&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Zone B&lt;/P&gt;&lt;P&gt;Zone C&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;Any &lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Allow&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Rule 2&lt;/TD&gt;&lt;TD&gt;Zone B&lt;/TD&gt;&lt;TD&gt;Zone C&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Allow&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No Specific IPs need to be listed to put these rules in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Aug 2011 21:46:51 GMT</pubDate>
    <dc:creator>joshsmtech</dc:creator>
    <dc:date>2011-08-24T21:46:51Z</dc:date>
    <item>
      <title>Simple Policy Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3047#M2266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a simple one, but I couldn't find it specifically stated in the manual.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I define a security policy, are the Zone and Address exclusive of each other?&amp;nbsp; In other words, if I select a zone,it requires I put in specific IP's or select Any.&amp;nbsp; If I leave the IP's as any, but select a specific zone, will it only allow IP's from within that zone - or will it allow Any in addition to the zone?&amp;nbsp; Or do I have to select the zone and then specifiy what IP's in that zone I want to have the policy apply to?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that makes sense -&amp;nbsp; the only way I could come up with to explain it seems a bit confusing - even to me....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Aug 2011 19:51:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3047#M2266</guid>
      <dc:creator>cmaier</dc:creator>
      <dc:date>2011-08-24T19:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Policy Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3048#M2267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your rule has Zone A to Zone B specified and IP address source and destination of any, then the traffic will be filtered based on zones only regardless of IP. Entering in an IP address is not required, if you want to only filter on zones this can be done as long as your source and destination IPs are "any". Typically you assign interfaces to Zones so you need to understand your network topology to understand what traffic is coming through each zone, but when filtering at the zone level IP addresses do not need to be specified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want all of my internal users to access anything in our DMZ and the web and my DMZ to be able to access the Web I would create 3 zones...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone A = Internal Users, multiple subnets and IPs&lt;/P&gt;&lt;P&gt;Zone B = DMZ multiple subnets and IPs&lt;/P&gt;&lt;P&gt;Zone C = Internet multiple subnets and IPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My rule would go something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" class="jiveBorder" style="width: 100%; border: 1px solid #000000;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;Name&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;S. Zone&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;D. Zone&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;S. Address&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;D. Address&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Application&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;BR /&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Rule 1&lt;/TD&gt;&lt;TD&gt;Zone A&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Zone B&lt;/P&gt;&lt;P&gt;Zone C&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;Any &lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Allow&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Rule 2&lt;/TD&gt;&lt;TD&gt;Zone B&lt;/TD&gt;&lt;TD&gt;Zone C&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Any&lt;/TD&gt;&lt;TD&gt;Allow&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No Specific IPs need to be listed to put these rules in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Aug 2011 21:46:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3048#M2267</guid>
      <dc:creator>joshsmtech</dc:creator>
      <dc:date>2011-08-24T21:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Policy Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3049#M2268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; font-family: arial, helvetica, sans-serif; font-size: 10pt; background-color: #f8fafd; padding-top: 8px; padding-right: 8px; padding-bottom: 8px; text-align: left;"&gt;OK, just to make sure I understand this correctly...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;If I want traffic to hit a destination IP, I leave the Destination Zone as Any and enter the IP in Destination Address? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 17:07:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3049#M2268</guid>
      <dc:creator>cmaier</dc:creator>
      <dc:date>2011-08-25T17:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Policy Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3050#M2269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you know which zone the destination IP is in, then I would recommend you specify the destination zone and IP address. However, this is not a requirement. You can also leave the zone as any. It depends on your organizations, topology, security policies and best practices but either way will work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 18:29:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/simple-policy-question/m-p/3050#M2269</guid>
      <dc:creator>joshsmtech</dc:creator>
      <dc:date>2011-08-29T18:29:56Z</dc:date>
    </item>
  </channel>
</rss>

