<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Shared Policy Zone Check in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4725#M3486</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Shared Policy option in Panorama is most useful, however I have found an issue with it which I think could be resolved in one of two ways, what I need to know is do either of these two ways exist?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario&lt;/P&gt;&lt;P&gt;When using the Panorama Shared Policy to push single policy to three different FW layers I need to include the Source and Destination Zone of all three firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is an example of a single policy with the necisary source and destination zones.&amp;nbsp; The firewall column is for referance only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy 1&lt;/P&gt;&lt;P&gt;Firewall&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source Zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination Zone&lt;/P&gt;&lt;P&gt;Core&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Perimeter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RemoteVPN&lt;/P&gt;&lt;P&gt;Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HQVPN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue&lt;/P&gt;&lt;P&gt;When pushing the above policy I get commit errors on all 3 firewalls for 4 of the zone not recognised.&lt;/P&gt;&lt;P&gt;As one of the FWs is a 5050 with 70 zones configured and one is a 3020 with a zone limit of 40 how can I remove this check or get the panorama to only push the zones that exist on the fw?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an option to turn of the zone policy check on the FW?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an option like &lt;EM&gt;Share Unused Address and Service Objects with Devices &lt;/EM&gt;that I can check or uncheck so before sending the policy the panorama will check to see if the zone exists and if not remove the zone from the policy push?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appriciate your input and any comments/workarounds from SEs as to if there are existing FRs for this issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Feb 2014 13:12:40 GMT</pubDate>
    <dc:creator>CHammock</dc:creator>
    <dc:date>2014-02-25T13:12:40Z</dc:date>
    <item>
      <title>Shared Policy Zone Check</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4725#M3486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Shared Policy option in Panorama is most useful, however I have found an issue with it which I think could be resolved in one of two ways, what I need to know is do either of these two ways exist?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario&lt;/P&gt;&lt;P&gt;When using the Panorama Shared Policy to push single policy to three different FW layers I need to include the Source and Destination Zone of all three firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is an example of a single policy with the necisary source and destination zones.&amp;nbsp; The firewall column is for referance only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy 1&lt;/P&gt;&lt;P&gt;Firewall&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source Zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination Zone&lt;/P&gt;&lt;P&gt;Core&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Perimeter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RemoteVPN&lt;/P&gt;&lt;P&gt;Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HQVPN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue&lt;/P&gt;&lt;P&gt;When pushing the above policy I get commit errors on all 3 firewalls for 4 of the zone not recognised.&lt;/P&gt;&lt;P&gt;As one of the FWs is a 5050 with 70 zones configured and one is a 3020 with a zone limit of 40 how can I remove this check or get the panorama to only push the zones that exist on the fw?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an option to turn of the zone policy check on the FW?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an option like &lt;EM&gt;Share Unused Address and Service Objects with Devices &lt;/EM&gt;that I can check or uncheck so before sending the policy the panorama will check to see if the zone exists and if not remove the zone from the policy push?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appriciate your input and any comments/workarounds from SEs as to if there are existing FRs for this issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 13:12:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4725#M3486</guid>
      <dc:creator>CHammock</dc:creator>
      <dc:date>2014-02-25T13:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Policy Zone Check</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4726#M3487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/24222"&gt;CHammock&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried to use the Target field in each security rule. In this field we only select those firewalls where the change is destined so that we are specifically making some changes to certain firewalls and some other changes to another set of devices so there is no commit errors for unknown zones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 14:14:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4726#M3487</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2014-02-25T14:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Policy Zone Check</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4727#M3488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To clarify the example above is a single policy with three source zones and three destination zones pushed to three firewalls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want this policy to push to all three firewalls, I need it to exist on all three firewalls as traffic will traverse all three firewalls.&amp;nbsp; My issue is that the zones I define in the policy needs to exist before it will commit to the FWs.&amp;nbsp; What I need is a way of either switching off the zone check during the commit process or something where by the panorama only pushes the zone names that exist on each firewall.&lt;/P&gt;&lt;P&gt;To try and clarify the topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I want to get traffic from the Inside of the Core FW to the Internal on the Remote FW traffic flow will be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Inside of the Core FW to Outside of the Core FW&lt;/P&gt;&lt;P&gt;2. Trust of the Perimeter FW to RemoteVPN of the Perimeter FW&lt;/P&gt;&lt;P&gt;3. HQVPN of the Remote FW to Internal of the Remote FW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This could be covered by a single shared policy as below, obviously I have omited ips, services and apps to avoid confusion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy 1&lt;/P&gt;&lt;P&gt;Source Zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination Zone&lt;/P&gt;&lt;P&gt;Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RemoteVPN&lt;/P&gt;&lt;P&gt;HQVPN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 14:31:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4727#M3488</guid>
      <dc:creator>CHammock</dc:creator>
      <dc:date>2014-02-25T14:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Policy Zone Check</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4728#M3489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see that all the zones are defined in single rule and this single rule is planned to be pushed to all firewalls.&lt;/P&gt;&lt;P&gt;At present this is not possible for the reason that the firewall expects a zone to be added only if it is defined locally else it gets the commit errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Out of the 2 solutions provided by you,&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an option to turn of the zone policy check on the FW?&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;nbsp;&amp;nbsp; A. I think this is not feasible as zones play major role in deciding traffic flow and action so zones will be checked.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there an option like &lt;EM style="font-weight: inherit; font-family: inherit;"&gt;Share Unused Address and Service Objects with Devices &lt;/EM&gt;that I can check or uncheck so before sending the policy the panorama will check to see if the zone exists and if not remove the zone from the policy push?&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt; A. This options seems interesting where panorama checks to see if the end firewall does not have the configured zones remove locally on panorama or may be the feature can be checked locally at firewall.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;For this we can approach SE for feature request. That would be the best bet.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 15:40:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/shared-policy-zone-check/m-p/4728#M3489</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2014-02-25T15:40:22Z</dc:date>
    </item>
  </channel>
</rss>

