<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: proxy squid in a DMZ in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41933#M30837</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some additional comments on previous points:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) As a test (if possible) you could setup a security rule that acts just on src/dstzone such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: LAN&lt;BR /&gt;dstzone: DMZ&lt;BR /&gt;appid: any&lt;BR /&gt;serviceport: any&lt;BR /&gt;user: any&lt;BR /&gt;action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then (when you identified what was incorrect and fixed it) limit it down to correct appid/serviceport.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If the LAN interface is on the PAN you need to setup a management profile aswell that will allow the LAN interface to be pinged at.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I think the following will work better &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping source 192.168.1.1 host 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) In my experience this is quite common (given the symptomes presented).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify that the client have the LAN-interface of the PAN as defgw (10.155.10.10) and also that the proxy have the DMZ-interface of the PAN as defgw (192.168.1.1). Also verify again that you have correct ip-addresses AND netmasks on both proxy and client (so it doesnt say 192.167.1.2 instead of 192.168.1.2 or such).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest is to just run "netstat -rn" to see current routing table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since both proxy and client are "directly attached" you wont need additional routing rules in the PAN box. However if you have linknets then you would need to add additional routes in "virtual router" in the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Also check the arp entries on the proxy and client itself such as "arp -a" or "arp -an".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 03 Mar 2012 09:16:50 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-03-03T09:16:50Z</dc:date>
    <item>
      <title>proxy squid in a DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41931#M30835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I put a squid proxy in the DMZ zone with address 192.168.1.2&lt;BR /&gt; it is connected to the PAN - 192.168.1.1&lt;BR /&gt; and I trust zone to the untrust lan and another to the internet&lt;BR /&gt; and I can not ping the proxy from the lan&lt;/P&gt;&lt;P&gt;interface pan to lan 10.155.10.10&lt;/P&gt;&lt;P&gt;my ip address 10.155.10.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i dont know the route that i would make it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Feb 2012 19:34:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41931#M30835</guid>
      <dc:creator>adhibioussa</dc:creator>
      <dc:date>2012-02-29T19:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: proxy squid in a DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41932#M30836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please correct me if I am drawing the wrong topology &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proxy (192.167.1.2)------DMZ-----(192.168.1.1) PAN ( 10.155.10.10) -------LAN-------(10.155.10.11) Client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am expecting there is no nat configured in between and the Client has a Gateway as 10.155.10.10 i.e. PAN's trust interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to check the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) There should be security policy allowing the connection to go through from LAN to DMZ&lt;/P&gt;&lt;P&gt;2) Check if you can ping the gateway (i.e. LAN interface) from the client&lt;/P&gt;&lt;P&gt;3) Check if you can ping the proxy server from the PAN, use the following command on CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN&amp;gt; ping source 192.168.1.1 host 192.167.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) If you are note getting any response, you should check the gateway or route on the proxy server, you can also try to ping 192.168.1.1 from the proxy server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Check the arp entries on both the interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN&amp;gt; show arp ethernet1/x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Khubaib &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Mar 2012 01:25:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41932#M30836</guid>
      <dc:creator>kalavi</dc:creator>
      <dc:date>2012-03-03T01:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: proxy squid in a DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41933#M30837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some additional comments on previous points:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) As a test (if possible) you could setup a security rule that acts just on src/dstzone such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: LAN&lt;BR /&gt;dstzone: DMZ&lt;BR /&gt;appid: any&lt;BR /&gt;serviceport: any&lt;BR /&gt;user: any&lt;BR /&gt;action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then (when you identified what was incorrect and fixed it) limit it down to correct appid/serviceport.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If the LAN interface is on the PAN you need to setup a management profile aswell that will allow the LAN interface to be pinged at.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I think the following will work better &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping source 192.168.1.1 host 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) In my experience this is quite common (given the symptomes presented).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify that the client have the LAN-interface of the PAN as defgw (10.155.10.10) and also that the proxy have the DMZ-interface of the PAN as defgw (192.168.1.1). Also verify again that you have correct ip-addresses AND netmasks on both proxy and client (so it doesnt say 192.167.1.2 instead of 192.168.1.2 or such).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest is to just run "netstat -rn" to see current routing table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since both proxy and client are "directly attached" you wont need additional routing rules in the PAN box. However if you have linknets then you would need to add additional routes in "virtual router" in the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Also check the arp entries on the proxy and client itself such as "arp -a" or "arp -an".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Mar 2012 09:16:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/proxy-squid-in-a-dmz/m-p/41933#M30837</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-03-03T09:16:50Z</dc:date>
    </item>
  </channel>
</rss>

