<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: multiple VLANs on one security zone - possible? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50755#M37338</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I stuck with configurations .... help me please. My config look like:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7375" alt="2013-07-23_132802.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7375_2013-07-23_132802.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7376" alt="2013-07-23_132725.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7376_2013-07-23_132725.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7377" alt="2013-07-23_132047.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7377_2013-07-23_132047.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7378" alt="2013-07-23_133613.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7378_2013-07-23_133613.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7380" alt="2013-07-23_134702.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7380_2013-07-23_134702.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Computer connected to VLAN 210 is able to get IP address from DHCP server (got 192.168.210.2) but is unable to ping gateway in this network (192.168.210.1). Of course it can't ping 8.8.8.8 too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's doesnt matter that "any" or "unknown" is chooses in security policy "Other_LAN - internet"&amp;nbsp; - computer cant reach internet or gateway.&lt;/P&gt;&lt;P&gt;User identyfiaction is enabled on "Other_LAN" because I have to do Captive Portal on 192.168.3.0 network (and only on this network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Computer connected to VLAN 210,230,240 getting IP from DHCP (can't ping gateway), but connected to vlan 250 doesn't even getting IP from DHCP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Jul 2013 11:47:33 GMT</pubDate>
    <dc:creator>_slv_</dc:creator>
    <dc:date>2013-07-23T11:47:33Z</dc:date>
    <item>
      <title>multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50749#M37332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need your help with one (probably simple for You problem).&lt;/P&gt;&lt;P&gt;I have PA200 but I have only one "free" security zone and one phisical interfece free.&lt;/P&gt;&lt;P&gt;I need to create 4 local networks (as a subinterfaces/VLAN) that every one has their own adresses, dhcp server, NAT policy to their own IP.&lt;/P&gt;&lt;P&gt;Intervlan traffic shouldn't be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible? Until now I do always one security zone per one network ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 08:12:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50749#M37332</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-16T08:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50750#M37333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can create L3 sub-interfaces and assign them IP subnets ,Zones and create NAT and Security rules.&lt;/P&gt;&lt;P&gt;For reference&amp;nbsp; Page 99 :&lt;A __default_attr="2561" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 08:44:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50750#M37333</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-16T08:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50751#M37334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also look:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1805"&gt;https://live.paloaltonetworks.com/docs/DOC-1805&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2781"&gt;https://live.paloaltonetworks.com/docs/DOC-2781&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 09:24:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50751#M37334</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-07-16T09:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50752#M37335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;I was stuck&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;with&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;one thing, one of this local networks must have Captive Portal on it. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;I can connect proper profile t&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;o interface &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;for CP but the CP policy I need to bind to whole Security Zone. I can do exclussions - but is it a&amp;nbsp; good idea?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;I&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;doubt,&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;and&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I would like to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;ask&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;you&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;whether it is good&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;that&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I am doing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;SPAN class="hps"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;SPAN class="hps"&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;SPAN class="hps"&gt;Slawek&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 10:21:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50752#M37335</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-19T10:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50753#M37336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No profile for CP but Captiv Portal Policy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; then no issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;v.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 10:36:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50753#M37336</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-07-19T10:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50754#M37337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can create a specific Captive Portal rule based on Source IP subnets .&lt;/P&gt;&lt;P&gt;No-CP rules can be created for IPs that do not need CP ,for granularity if certain IPs need exclusion from CP in an address space.&lt;/P&gt;&lt;P&gt;Additionally ,User-Identification Include (/Exclude) ACLs could be created ,if Zone has multiple interfaces/Subnets ,to filter the IP spaces that need (/dont need) User Id via CP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 18:23:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50754#M37337</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-19T18:23:27Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50755#M37338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I stuck with configurations .... help me please. My config look like:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7375" alt="2013-07-23_132802.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7375_2013-07-23_132802.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7376" alt="2013-07-23_132725.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7376_2013-07-23_132725.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7377" alt="2013-07-23_132047.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7377_2013-07-23_132047.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7378" alt="2013-07-23_133613.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7378_2013-07-23_133613.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="7380" alt="2013-07-23_134702.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7380_2013-07-23_134702.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Computer connected to VLAN 210 is able to get IP address from DHCP server (got 192.168.210.2) but is unable to ping gateway in this network (192.168.210.1). Of course it can't ping 8.8.8.8 too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's doesnt matter that "any" or "unknown" is chooses in security policy "Other_LAN - internet"&amp;nbsp; - computer cant reach internet or gateway.&lt;/P&gt;&lt;P&gt;User identyfiaction is enabled on "Other_LAN" because I have to do Captive Portal on 192.168.3.0 network (and only on this network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Computer connected to VLAN 210,230,240 getting IP from DHCP (can't ping gateway), but connected to vlan 250 doesn't even getting IP from DHCP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 11:47:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50755#M37338</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-23T11:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50756#M37339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Computer connected to VLAN 210 is able to get IP address from DHCP server (got 192.168.210.2) but is unable to ping gateway in this network (192.168.210.1). &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Could be getting blocked by the rule deny-rest.Configure a rule above deny-rest&amp;nbsp; rule between zones Other_LAN to Other_LAN&amp;nbsp; to allow this traffic.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Of course it can't ping 8.8.8.8 too&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Can you check the Source NAT rule,Shouldn't the Innie siece zone be replaced by OTHER_LAN zone ?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 13:12:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50756#M37339</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-23T13:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50757#M37340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Computer connected to VLAN 210,230,240 getting IP from DHCP (can't ping gateway), but connected to vlan 250 doesn't even getting IP from DHCP server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;STRONG&gt;A: You don't have it enabled. It shows as disabled.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;As Nadir said, your NAT rules need to be from the correct source zone. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 15:27:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50757#M37340</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-07-23T15:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50758#M37341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes - the traffic was blocked by deny-rest rule.&lt;/P&gt;&lt;P&gt;I added policy from Other_LAN to Other_LAN and now I can ping gateway of network where is locted computer. BUT also I can ping other VLAN gateways!! - that's not good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it a solution for "clever" blocking traffic from ie. vlan250 to every other. At the moment I have 4 networks on Other_LAN interface so I had to 4^2 rules of blocking traffic - is it a solution to do it a bit smarter?&lt;/P&gt;&lt;P&gt;Every of this subinterfaces/networks must be separated, and allow only traffic to the internet (exept for DHCP/DNS/CP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for my english ... I hope that you are understand what I want to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craymond - you are right, it was disbaled - it's my fault - thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 06:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50758#M37341</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-24T06:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50759#M37342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have another problems with computer in 192.168.3.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see CaptivePortal, my browser isn't redirected (even when I add rule that allow traffic to it's IP (192.168.110.1) - rule "SCH-CP" - but I can ping it by IP address or name.&lt;/P&gt;&lt;P&gt;I changed dns servers from google dns to my local dns serwers for every of my local network - just for unifications.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_094708.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7386_2013-07-24_094708.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the problem is in NAT (I can't&amp;nbsp; see errors in configuration, picture from yesterday has polish name of Other_LAN - so it's confusing you) - configurations is similar to my others NAT.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_094954.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7387_2013-07-24_094954.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;when I try ping google.pl I see traffic that passes rule "Other_LAN - DNS" but my computer dosn't resolve name to it's IP.&lt;/P&gt;&lt;P&gt;I can't ping or browse internet on every LAN on Other_LAN security zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand what is going here, I have 7 other LANs on my PAN device (every has their own security zone) and everyting is working as I expected. When I started to configure 4 LANs on one security zone something is going creazy ... &lt;/P&gt;&lt;P&gt;Please explain me why I need to allow traffic from Other_LAN to Other_LAN to bo able to ping gateways when without such security rule I was able to get IP from DHCP server??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help me please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 08:20:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50759#M37342</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-24T08:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50760#M37343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default firewall allows ,Intra-Zone traffic.So you can ping all hosts in &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Other_LAN to &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;hosts in O&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;ther_LAN by default if you dont have deny-rest Rule.You can either create separate Zone for each VLAN.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Having deny-rest rule would warrant &lt;/SPAN&gt;creation of specific allow rules from Other LAN to any zone.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;Suggestions : You can alter the deny rest to specific zones instead of any. eg Other Zone to Untrust.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 08:40:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50760#M37343</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-24T08:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50761#M37344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;"&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.5em;"&gt;so the problem is in NAT (I can't&amp;nbsp; see errors in configuration, picture from yesterday has polish name of Other_LAN - so it's confusing you) - configurations &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;is&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.5em;"&gt; similar to my others NAT."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.5em;"&gt;Check if you have a zone named inne sieci configured.I dont think Zone names would be translated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.5em;"&gt;Change "I&lt;/SPAN&gt;nne&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; &lt;/SPAN&gt;sieci" in NAT config to &lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.5em;"&gt; Other_LAN &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 08:45:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50761#M37344</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-24T08:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50762#M37345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it's done today morning, now it's looks like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_105524.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7389_2013-07-24_105524.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_105546.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7390_2013-07-24_105546.png" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 08:58:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50762#M37345</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-24T08:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50763#M37346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you see in the traffic logs for the outbound traffic failing ?&lt;/P&gt;&lt;P&gt;Can you include additional columns in the traffic log eg : NAT Source&amp;nbsp; IP,Packets sent Packets received etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have Default route defined ?&lt;/P&gt;&lt;P&gt;Can&amp;nbsp; try to include the Interface in the Source NAT rule instead of the translated address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 09:19:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50763#M37346</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-24T09:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50764#M37347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_121111.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7398_2013-07-24_121111.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-200&amp;gt; show routing route&lt;/P&gt;&lt;P&gt;VIRTUAL ROUTER: rtr_ign (id 3)&lt;/P&gt;&lt;P&gt;&amp;nbsp; ==========&lt;/P&gt;&lt;P&gt;destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nexthop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; metric flags&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; age&amp;nbsp;&amp;nbsp; interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; next-AS&lt;/P&gt;&lt;P&gt;0.0.0.0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XXX.XXX.XXX.XXX&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ethernet1/1&lt;/P&gt;&lt;P&gt;[..........]&lt;/P&gt;&lt;P&gt;192.168.3.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.3.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ethernet1/3.250&lt;/P&gt;&lt;P&gt;192.168.3.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A H&lt;/P&gt;&lt;P&gt;192.168.210.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.210.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ethernet1/3.1&lt;/P&gt;&lt;P&gt;192.168.210.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A H&lt;/P&gt;&lt;P&gt;192.168.230.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.230.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ethernet1/3.2&lt;/P&gt;&lt;P&gt;192.168.230.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A H&lt;/P&gt;&lt;P&gt;192.168.240.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.240.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ethernet1/3.3&lt;/P&gt;&lt;P&gt;192.168.240.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A H&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Can&amp;nbsp; try to include the Interface in the Source NAT rule instead of the translated address.&lt;/P&gt;&lt;P&gt;I dont understnd correctly - I think&lt;/P&gt;&lt;P&gt;I change to:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_122436.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7399_2013-07-24_122436.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;But i still can't ping from 192.168.3.x to 8.8.8.8&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 10:25:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50764#M37347</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-24T10:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50765#M37348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally I found my mistake ...&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-07-24_125216.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7400_2013-07-24_125216.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;After I add "/0" I can reach internet from every LAN (even CP is working too).&lt;/P&gt;&lt;P&gt;So I have to isolate traffic of every network - please give me advice hot to do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't create a lot of policies like:&lt;/P&gt;&lt;P&gt;192.168.3.0/24 to 192.168.210.0/24 deny&lt;/P&gt;&lt;P&gt;192.168.3.0/24 to 192.168.230.0/24 deny&lt;/P&gt;&lt;P&gt;192.168.3.0/24 to 192.168.240.0/24 deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and again&lt;/P&gt;&lt;P&gt;192.168.210.0/24 to 192.168.30.0/24 deny&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to do it in other way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 11:01:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50765#M37348</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-24T11:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50766#M37349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are really trying to isolate the traffic from each subnet, you should really be creating separate zones for each one. You would just add the new zones to the outbound NAT rule and NAT policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 13:15:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50766#M37349</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-07-24T13:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50767#M37350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know ... but&amp;nbsp; I have PA200 and I have only one security zone free ... so I have to make configuration as good as possible in this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This 4 networks will have couple computers, but must be separataed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jul 2013 06:29:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50767#M37350</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-07-25T06:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: multiple VLANs on one security zone - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50768#M37351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry - I forgot the limitation on a 200 is 10 Zones. Unless you want to move the vlans to a layer 3 switch and use ACLs or don't enable forwarding, I think the only viable alternative would be to create the deny policies on the PAN. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jul 2013 13:11:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-vlans-on-one-security-zone-possible/m-p/50768#M37351</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-07-25T13:11:03Z</dc:date>
    </item>
  </channel>
</rss>

