<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: POC Plan in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35247#M25893</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the confusion.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Fortinet and Sonicwall&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;- Does not provide user feedback when an application is blocked (page simply times out). Could lead to high numbers call from end users...&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;- Does not allow to use directly AD group name in the policy (need to a group locally then create the mapping between local and AD group)&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;- Does not allow to use AD user in the policy (only groups though group mapping)&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;- Fortinet : Flow based AV does NOT scan compressed files (ZIP, etc). Sonicwall: can't remember...&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;- Exception for SSL Insection must be done in CLI (Fortinet). Sonicwall: can't remember...&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;- Reporting needs an extra box (FortiAnalyzer for Forti and Viewpoint for Sonic).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;HA&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Oct 2012 10:03:54 GMT</pubDate>
    <dc:creator>licenselu</dc:creator>
    <dc:date>2012-10-04T10:03:54Z</dc:date>
    <item>
      <title>POC Plan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35242#M25888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hui&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was wondering if anyone has a POC Plan/Criteria Sheet to test PA5020 against Fortinet &amp;amp; Sonicwall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate alll the help.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manoj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2012 16:51:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35242#M25888</guid>
      <dc:creator>aggeios</dc:creator>
      <dc:date>2012-10-03T16:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: POC Plan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35243#M25889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;To have a POC Plan, you need to read about TAP Mode (with mirror or span port), this mode is the best way to test PA against another firewall, &lt;/P&gt;&lt;P&gt;greetings&lt;/P&gt;&lt;P&gt;Marco.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2012 19:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35243#M25889</guid>
      <dc:creator>arkadios</dc:creator>
      <dc:date>2012-10-03T19:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: POC Plan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35244#M25890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or by plan do you mean things to test which the PA can do and the others might fail at?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope your sales engineer should be able to give you such a list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a (by now somewhat old) document crated by PA in response to Checkpoints various claims of what PA does or do not. This doc will give you some hints on what to verify which at least Checkpoint cannot handle.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also the "techbusters" episodes which might bring you some ideas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://media.paloaltonetworks.com/documents/TechBusters-Episode-1.pdf" title="http://media.paloaltonetworks.com/documents/TechBusters-Episode-1.pdf"&gt;http://media.paloaltonetworks.com/documents/TechBusters-Episode-1.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://media.paloaltonetworks.com/documents/TechBusters-Episode-2.pdf" title="http://media.paloaltonetworks.com/documents/TechBusters-Episode-2.pdf"&gt;http://media.paloaltonetworks.com/documents/TechBusters-Episode-2.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://media.paloaltonetworks.com/documents/TechBusters-Episode-3.pdf" title="http://media.paloaltonetworks.com/documents/TechBusters-Episode-3.pdf"&gt;http://media.paloaltonetworks.com/documents/TechBusters-Episode-3.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://media.paloaltonetworks.com/documents/TechBusters-Episode-4.pdf" title="http://media.paloaltonetworks.com/documents/TechBusters-Episode-4.pdf"&gt;http://media.paloaltonetworks.com/documents/TechBusters-Episode-4.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://media.paloaltonetworks.com/documents/TechBusters-Episode-5.pdf" title="http://media.paloaltonetworks.com/documents/TechBusters-Episode-5.pdf"&gt;http://media.paloaltonetworks.com/documents/TechBusters-Episode-5.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.paloaltonetworks.com/cam/techbusters/" title="http://www.paloaltonetworks.com/cam/techbusters/"&gt;Palo Alto Networks — TechBusters: Check Point Myths Busted!&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know how Sonicwall handles this but I know that Fortinet, at least previously, could only do buffered antivirus scanning. Meaning the whole file must be downloaded first before the scan can proceed. This also meant that various models hade various limits on how large files (and how many concurrent large files) they could scan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA uses streambased scanning which means virtually no upper limit on how large the files which will be scanned can be - but on the other hand not all fileformats can be scanned this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: I forgot about Wildfire. Hopefully in future Wildfire will be available as a local installation (so your sensitive stuff isnt sent to the cloud on internet (currently Amazon) but stays in your datacenter) and by that Wildfire will hopefully be able to deal with antivirusscanning aswell (and not only analyze runnable code).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another hope is when or if PA will support ICAP because then you can get one (or two) ICAP servers running your choice of antivirus (no matter if its Kaspersky or something else) and by that cover the buffer based scanning.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 08:06:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35244#M25890</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-04T08:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: POC Plan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35245#M25891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to clarify :&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;"Fortinet could only do buffered antivirus scanning."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;That's not true ! Fortinet can also do &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;stream based scanning&lt;/SPAN&gt; BUT cannot scan compressed file (like zip file for example).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If application control is key of the project, there's ONLY one way: Palo Alto.&lt;/P&gt;&lt;P&gt;Another benefit is the single path architecture, even if you enable all 'UTM' features like AV, IPS, etc the throughput remains constant&lt;/P&gt;&lt;P&gt;Other brand are based on an overlay model: more features you add, less performance you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA benefit over Fortinet and Sonicwall&lt;/P&gt;&lt;P&gt;- Does not provide user feedback when an application is blocked (page simply times out). Could lead to high numbers call from end users...&lt;/P&gt;&lt;P&gt;- Does not allow to use directly AD group name in the policy (need to a group locally then create the mapping between local and AD group)&lt;/P&gt;&lt;P&gt;- Does not allow to use AD user in the policy (only groups though group mapping)&lt;/P&gt;&lt;P&gt;- Fortinet : Flow based AV does NOT scan compressed files (ZIP, etc). Sonicwall: can't remember...&lt;/P&gt;&lt;P&gt;- Exception for SSL Insection must be done in CLI (Fortinet). Sonicwall: can't remember...&lt;/P&gt;&lt;P&gt;- Reporting needs an extra box (FortiAnalyzer for Forti and Viewpoint for Sonic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it can help you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 09:18:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35245#M25891</guid>
      <dc:creator>licenselu</dc:creator>
      <dc:date>2012-10-04T09:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: POC Plan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35246#M25892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps Fortinet can do this today - not when I evaluated them autumn 2009 and explictly asked them about their scanning capabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And according to your reply it seems that they still have issues regarding this (not able to scan zip files? they could do this back in 2009 - or is this an option if you want streambased or bufferbased today?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway this was to point out that it isnt as simple as "Antivirus? Yes!" because it drills down to how the antivirus scanning is being performed and which limits it might offer based on which major technology is being used (streamed vs buffered).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I dont get your lines in the "PA benefit over Fortinet and Sonicwall", do you mean that the PA doesnt provide user feedback (because they do but of course it depends on which protocol is being used) or do you mean that Fortinet and Sonicwall doesnt provide user feedback? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 09:49:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35246#M25892</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-04T09:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: POC Plan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35247#M25893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the confusion.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Fortinet and Sonicwall&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;- Does not provide user feedback when an application is blocked (page simply times out). Could lead to high numbers call from end users...&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;- Does not allow to use directly AD group name in the policy (need to a group locally then create the mapping between local and AD group)&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;- Does not allow to use AD user in the policy (only groups though group mapping)&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;- Fortinet : Flow based AV does NOT scan compressed files (ZIP, etc). Sonicwall: can't remember...&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;- Exception for SSL Insection must be done in CLI (Fortinet). Sonicwall: can't remember...&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;- Reporting needs an extra box (FortiAnalyzer for Forti and Viewpoint for Sonic).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;HA&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 10:03:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poc-plan/m-p/35247#M25893</guid>
      <dc:creator>licenselu</dc:creator>
      <dc:date>2012-10-04T10:03:54Z</dc:date>
    </item>
  </channel>
</rss>

