<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Paloalto firewall placement in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50099#M36877</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so even tmg will be removed ?? &lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Sep 2014 14:08:08 GMT</pubDate>
    <dc:creator>atelcom</dc:creator>
    <dc:date>2014-09-30T14:08:08Z</dc:date>
    <item>
      <title>Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50094#M36872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have customer who bought 2 paloalto firewall, with threat prevention and url filtering licences and i want some advice for the placement of&amp;nbsp; paloalto in the architecture to ensure the maximum of security and deploy all necessary fonctionnality &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please find in attach the architecture ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;knowing that : &lt;/P&gt;&lt;P&gt;ASA is used for :&lt;/P&gt;&lt;P&gt;- VPN IPSC&lt;/P&gt;&lt;P&gt;- managing internet traffic between dmz and untrust,&lt;/P&gt;&lt;P&gt;PIX:&lt;/P&gt;&lt;P&gt;-VPN ssl&lt;/P&gt;&lt;P&gt;-manage traffic ( vlan, internet)&lt;/P&gt;&lt;P&gt;TMG:&lt;/P&gt;&lt;P&gt;- publication of servers&lt;/P&gt;&lt;P&gt;-user authentication&lt;/P&gt;&lt;P&gt;-url filtering &lt;/P&gt;&lt;P&gt;-access control( https, http, ftp, smtp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we can remove some equipement (like asa and tmg) &lt;IMG alt="Capture2.PNG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15892_Capture2.PNG" style="height: 378px; width: 620px;" /&gt; and replace it by paloalto , could you please offer me some scenario &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt;Hi&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 11:05:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50094#M36872</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-09-30T11:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50095#M36873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can replace the TMG and ASA with the PA. Also it depents what you like to prevent or use with the PA?&lt;/P&gt;&lt;P&gt;Also you can (you should) configure the PA in L3.&amp;nbsp; In L3 you route each traffic to the PA (and use the PA as a Router as well). I would place it next to the internet (instead of the ASA)...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 11:48:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50095#M36873</guid>
      <dc:creator>Hithead</dc:creator>
      <dc:date>2014-09-30T11:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50096#M36874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is going to be a terribly simplistic reply - mainly because your question could be done so many ways - but I'd collapse edge security in the PAs (including URL filtering and inter-domain communication) and then collapse your VPN functionality into the ASA.&amp;nbsp; ASA's untrusted says external with it's trusted interface passing through the PAs.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 13:42:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50096#M36874</guid>
      <dc:creator>mrsoldner</dc:creator>
      <dc:date>2014-09-30T13:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50097#M36875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we cant' because , if the the pa will placed in the edge , he will not recognise users&amp;nbsp; &lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 14:00:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50097#M36875</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-09-30T14:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50098#M36876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Atelcom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PANW is capable of following functions. So I would suggest you to replace it with ASA and PIX&lt;/P&gt;&lt;P&gt;- managing internet traffic between dmz and untrust,&lt;/P&gt;&lt;P&gt;-VPN ssl&lt;/P&gt;&lt;P&gt;-manage traffic ( vlan, internet)&lt;/P&gt;&lt;P&gt;-url filtering&lt;/P&gt;&lt;P&gt;-access control( https, http, ftp, smtp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it can not perform following functions, you can configure authentication profiles for the same.&lt;/P&gt;&lt;P&gt;- publication of servers&lt;/P&gt;&lt;P&gt;-user authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know your concerns in detail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 14:03:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50098#M36876</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-30T14:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50099#M36877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so even tmg will be removed ?? &lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 14:08:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50099#M36877</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-09-30T14:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50100#M36878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Atelcomm,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User authentication is&amp;nbsp; done by LDAP or Radius normally. So for that you dont need TMG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not familiar with server publications. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say if you replace ASA/PIX with PANW than for what additional purpose you&amp;nbsp; might need TMG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 14:12:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50100#M36878</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-30T14:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50101#M36879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes i indertstand , and i don't thin that is a big deal cause we need athentication just for url filtering and for identify users,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so we can do that in PA with user id agent ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but all this we be so complicated for the migrantion of the old infrascture to the new one , so we need a backup plan to minimize the downtime&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 14:20:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50101#M36879</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-09-30T14:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50102#M36880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest putting the device in Vwire mode 1st. This will just be bump-in-the-wire deployment, where no L3 needs to be changed. In this scenario, you can utilize threat prevention, url filtering, user id capability, captive portal. This should not include any downtime.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once this is done and you have all visibility to your network and traffic, you can start building configuration on the device to mimic that of ASA or tmg. You can configure IPSec, routing, L3 (You are just configuring the device at this point, where as traffic is flowing normal). Once you verify, everything is configured the way you wanted, you can migrate from other device to PA (this will involve certain downtime but will be minimal). Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 14:31:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50102#M36880</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-09-30T14:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50103#M36881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank's for your return, could you please tell me were i should place it in vwire ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cause if we place it before asa , it can't idnetify users passing through TMG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 15:30:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50103#M36881</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-09-30T15:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50104#M36882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would put PA device in between LAN and Cisco switch. This would be least intrusive and yet give you full visibility. You can apply user id, captive portal, url filtering. Once configured for L3, you can replace it with ASA for IPsec, ssl vpn, routing etc. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 16:40:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50104#M36882</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-09-30T16:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50105#M36883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Atelcom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you put firewall TAP Mode than definitely you can see the traffic. After that you will configure firewall in L3 mode for various services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why to take one extra step of TAP mode. I would suggest to migrate one by one all services to PANW firewall. Basically skip TAP and go for direct implementation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 17:16:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50105#M36883</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-30T17:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50106#M36884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks to all for your help, i have some update for this case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the customer want to add a stonsoft to load balance ISP and want to manage the internet traffic by paloalto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the pix and ASA handle the vpn connection and tmg for publication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;were do you think we should place the PA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt;HiH&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 09:26:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50106#M36884</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-10-06T09:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto firewall placement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50107#M36885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you like you can firewall the ASA Clients and TMG publication with vwire&lt;IMG __jive_id="16085" alt="2014-10-06_12-01-04.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16085_2014-10-06_12-01-04.jpg" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 10:01:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-firewall-placement/m-p/50107#M36885</guid>
      <dc:creator>Hithead</dc:creator>
      <dc:date>2014-10-06T10:01:43Z</dc:date>
    </item>
  </channel>
</rss>

