<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow domain services through PAN 2050 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38643#M28313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have any security profiles enabled? (I've noticed that joining a computer to the domain sets of the IPS/IDS if the profile is restrictive.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any service/ports defined in the security policy? I've left mine to any because AD uses some many different ephemeral ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: I checked my rule, and these are all the apps I have allowed for AD:&lt;/P&gt;&lt;P&gt;active-directory&lt;/P&gt;&lt;P&gt;dns&lt;/P&gt;&lt;P&gt;icmp&lt;/P&gt;&lt;P&gt;kerberos&lt;/P&gt;&lt;P&gt;ldap&lt;/P&gt;&lt;P&gt;ms-ds-smb&lt;/P&gt;&lt;P&gt;ms-netlogon&lt;/P&gt;&lt;P&gt;msrpc&lt;/P&gt;&lt;P&gt;netbios-dg&lt;/P&gt;&lt;P&gt;netbios-ss&lt;/P&gt;&lt;P&gt;ntp&lt;/P&gt;&lt;P&gt;ping&lt;/P&gt;&lt;P&gt;rpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Matthew Harding&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Oct 2012 17:51:39 GMT</pubDate>
    <dc:creator>mharding</dc:creator>
    <dc:date>2012-10-19T17:51:39Z</dc:date>
    <item>
      <title>Allow domain services through PAN 2050</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38642#M28312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am trying to allow windows active directory services (2008 domain) through the firewall, in between zones.&amp;nbsp; I have created my policy to allow the following applications:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;active-directory&lt;/P&gt;&lt;P&gt;ms-ds-smb&lt;/P&gt;&lt;P&gt;msrpc&lt;/P&gt;&lt;P&gt;netbios-ss&lt;/P&gt;&lt;P&gt;dns&lt;/P&gt;&lt;P&gt;ms-win-dns&lt;/P&gt;&lt;P&gt;ms-wins&lt;/P&gt;&lt;P&gt;netbios-dg&lt;/P&gt;&lt;P&gt;ms-netlogon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created rules for bi-directional access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am unable to join a server to the domain however.&amp;nbsp; I ran a packet capture and was seeing netbios traffic being dropped (UDP 137) but I have allowed several app-id applications that allow this protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 17:19:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38642#M28312</guid>
      <dc:creator>UncleRico</dc:creator>
      <dc:date>2012-10-19T17:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Allow domain services through PAN 2050</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38643#M28313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have any security profiles enabled? (I've noticed that joining a computer to the domain sets of the IPS/IDS if the profile is restrictive.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any service/ports defined in the security policy? I've left mine to any because AD uses some many different ephemeral ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: I checked my rule, and these are all the apps I have allowed for AD:&lt;/P&gt;&lt;P&gt;active-directory&lt;/P&gt;&lt;P&gt;dns&lt;/P&gt;&lt;P&gt;icmp&lt;/P&gt;&lt;P&gt;kerberos&lt;/P&gt;&lt;P&gt;ldap&lt;/P&gt;&lt;P&gt;ms-ds-smb&lt;/P&gt;&lt;P&gt;ms-netlogon&lt;/P&gt;&lt;P&gt;msrpc&lt;/P&gt;&lt;P&gt;netbios-dg&lt;/P&gt;&lt;P&gt;netbios-ss&lt;/P&gt;&lt;P&gt;ntp&lt;/P&gt;&lt;P&gt;ping&lt;/P&gt;&lt;P&gt;rpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Matthew Harding&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 17:51:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38643#M28313</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2012-10-19T17:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow domain services through PAN 2050</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38644#M28314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&amp;nbsp; It looks like adding kerberos, rpc, and ldap seemed to do the trick.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 20:43:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-domain-services-through-pan-2050/m-p/38644#M28314</guid>
      <dc:creator>UncleRico</dc:creator>
      <dc:date>2012-10-19T20:43:20Z</dc:date>
    </item>
  </channel>
</rss>

