<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Webserver on Network,  Need support references on how the PA devices can help secure your network in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38870#M28502</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can start configuring policies for your web server to protect from Denial of Server Attacks:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2505"&gt;How to protect web-server using DOS policy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not to forget, that you an apply AV, anti-spyware and vulnerability profiles to the security rule which is responsible for allowing traffic. Plus, you granularize your security rule based on allowed applications only.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;Threat Prevention Deployment Tech Note&lt;/A&gt; (page 18-28)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Jun 2014 18:43:36 GMT</pubDate>
    <dc:creator>kadak</dc:creator>
    <dc:date>2014-06-19T18:43:36Z</dc:date>
    <item>
      <title>Webserver on Network,  Need support references on how the PA devices can help secure your network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38869#M28501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a client that is very concerned about having a webserver on a network that is open to the internet.&amp;nbsp; They already use exchange and as such ports 80 and 443 are open to that exchange server on the network.&amp;nbsp; We are hoping to put a webserver on the same network, but are experiencing push back.&amp;nbsp; The client is of the mind that a webserver must never be placed on an internal network with open ports to the internet.&amp;nbsp; I am hoping to find some resources on how the use of some of the features that Palo Alto devices provide can help mitigate that risk.&amp;nbsp;&amp;nbsp; I know that next-gen firewalls such as Palo Alto has cut down on the risk of having a webserver on your network without the use of a DMZ I just need some whitepapers or other trusted resources to back that claim.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 18:03:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38869#M28501</guid>
      <dc:creator>Net_AdminsRDI</dc:creator>
      <dc:date>2014-06-19T18:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver on Network,  Need support references on how the PA devices can help secure your network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38870#M28502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can start configuring policies for your web server to protect from Denial of Server Attacks:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2505"&gt;How to protect web-server using DOS policy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not to forget, that you an apply AV, anti-spyware and vulnerability profiles to the security rule which is responsible for allowing traffic. Plus, you granularize your security rule based on allowed applications only.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;Threat Prevention Deployment Tech Note&lt;/A&gt; (page 18-28)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 18:43:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38870#M28502</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2014-06-19T18:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver on Network,  Need support references on how the PA devices can help secure your network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38871#M28503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Put the webserver in a DMZ and use the security profiles to protect it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 21:14:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38871#M28503</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2014-06-19T21:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver on Network,  Need support references on how the PA devices can help secure your network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38872#M28504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Generally, any subnet that has servers hosting internet facing applications should be in a different security zone than the rest of the internal network.&amp;nbsp; This is the basic definition of the DMZ that has existed from even before the internet when we connected to networks outside our companies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think web servers are any more vulnerable to compromise from the outside than Exchange.&amp;nbsp; But I guess hosting a public web site does give more of an advertisement and invitation to visit than spinning up OWA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in general, I would suggest creating a DMZ to isolate the public web server and setup the necessary network and security policies from there.&amp;nbsp; I would encourage moving the Exchange Frontend at least into the DMZ as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 22:13:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38872#M28504</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-06-19T22:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver on Network,  Need support references on how the PA devices can help secure your network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38873#M28505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Putting a server in a DMZ doesn't have to mean it's fully open. A DMZ zone is no different to any zone to me, I protect all my zones equally.&lt;/P&gt;&lt;P&gt;Because of the nature of webservers, there will always be a bigger risk, that's why you don't want that (directly) in your internal network...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 08:09:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/webserver-on-network-need-support-references-on-how-the-pa/m-p/38873#M28505</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2014-06-20T08:09:31Z</dc:date>
    </item>
  </channel>
</rss>

