<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: External Data Port Cabling in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46458#M34155</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even if you will configure the service route &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;through &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;through &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Ethernet 1/5-Untrust interface&lt;/SPAN&gt;)&lt;/SPAN&gt;, I hope you have to configure a "Untrust-to Untrust" security rule to allow traffic for management. Which will potentially allow anyone from internet to initiate an attack &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;not recommended). There should be some valid logic, why ADMIN guide suggested to have a L3-Trust interface for service route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to understand the fact, instead of "&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;extra over had" &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Oct 2014 14:09:54 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-10-29T14:09:54Z</dc:date>
    <item>
      <title>External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46453#M34150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hallo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am setting up a new PA 3050 FW. I dont want to use the management port to connect to internet and download updates. So I am following the admin guide to "Set up an External Data Port" for updates. Now as per that:&lt;/P&gt;&lt;P&gt;1. I set up a port, say e1/4 on PA 3050, as an internal port in "L3-Trust&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;" Zone and give it a static IP address 192.168.35.100.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;2. I set up an external facing port, say e1/5, in zone "L3-Untrust". This port is connected to my ISP Router and has a publicly routable IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Where should I cable the internal facing port e1/4 mentioned in point 1 above? Can I somehow NAT the private address to use the Interface e1/5 IP address?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Thanks! &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 09:18:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46453#M34150</guid>
      <dc:creator>Neo.The.One</dc:creator>
      <dc:date>2014-10-29T09:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46454#M34151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ethernet-1/4 should be connected to your LAN segment &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;there is no physical connection required between MGMT interface and L3-Trust interface) and you need a valid NAT &amp;amp; security policy for all outgoing traffic through L3-Untrust (towards internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For an Example: I am using Ethernet 1/3 -192.168.10.100&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;L3-Trust interface) for my service route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="service-route.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16662_service-route.jpg" style="height: 310px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 11:30:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46454#M34151</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-10-29T11:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46455#M34152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Answer&lt;/SPAN&gt; to your last query: &lt;STRONG&gt;Yes,&lt;/STRONG&gt; you can create a source-NAT for all private address&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; to use the Interface 1/5 IP address. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;FYI: In this example, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i&lt;/SPAN&gt; am using ethernet-1/1 as my L3-Untrust interface &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;towards ISP).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;STRONG&gt;NAT RULE:&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="test-NAT.jpg" class="image-0 jive-image" height="44" src="https://live.paloaltonetworks.com/legacyfs/online/16663_test-NAT.jpg" style="font-size: 10pt; line-height: 1.5em; height: 44px; width: 1240px;" width="1240" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 11:39:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46455#M34152</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-10-29T11:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46456#M34153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can achieve this through service route. I would suggest to have PANW updates through untrust interface directly. That way you dont need any special NAT or Security policy. Its much simpler.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device &amp;gt; Setup &amp;gt; Services &amp;gt; Service route Configuration &amp;gt; Customize &amp;gt; Palo Alto Networks Updates through Ethernet 1/5. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 13:48:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46456#M34153</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-29T13:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46457#M34154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And if you want to have updates from ethernet 1/3 than NAT and aditional security policy might require. Which is extra over had.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case in above step select interface Ethernet 1/3 to route the PANW update traffic. I dont see any necessity of it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 13:49:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46457#M34154</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-29T13:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46458#M34155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even if you will configure the service route &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;through &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;through &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Ethernet 1/5-Untrust interface&lt;/SPAN&gt;)&lt;/SPAN&gt;, I hope you have to configure a "Untrust-to Untrust" security rule to allow traffic for management. Which will potentially allow anyone from internet to initiate an attack &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;not recommended). There should be some valid logic, why ADMIN guide suggested to have a L3-Trust interface for service route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to understand the fact, instead of "&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;extra over had" &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 14:09:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46458#M34155</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-10-29T14:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46459#M34156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hulk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a default policy which allows "Untrust to Untrust" Traffic. I dont see any security threat with that. Do you see ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 14:16:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46459#M34156</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-29T14:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: External Data Port Cabling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46460#M34157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most of the customers will not have a default allow rule in their production network, which will allow all unwanted traffic through the firewall. Hence, we should suggest some resolution which will be valid and secure for a production network. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 14:19:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-data-port-cabling/m-p/46460#M34157</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-10-29T14:19:54Z</dc:date>
    </item>
  </channel>
</rss>

