<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic After migration from Checkpoint, any tips? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51167#M37637</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We recently migrated from Checkpoint to PANOS (via the conversion tool) and so far things are looking pretty good. The next step of our project is to convert port based rules to app type rules and I wanted to get some feedback, tips, etc from others that have done the same thing..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have about 550 security rules and would love to be able to consolidate, and generally rework everything going forward..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, what do you think? What should we make sure we do or don't do? Any custom reports we should create to help with the task? Anything else ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any and all help is greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Mar 2012 21:28:26 GMT</pubDate>
    <dc:creator>steveo</dc:creator>
    <dc:date>2012-03-27T21:28:26Z</dc:date>
    <item>
      <title>After migration from Checkpoint, any tips?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51167#M37637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We recently migrated from Checkpoint to PANOS (via the conversion tool) and so far things are looking pretty good. The next step of our project is to convert port based rules to app type rules and I wanted to get some feedback, tips, etc from others that have done the same thing..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have about 550 security rules and would love to be able to consolidate, and generally rework everything going forward..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, what do you think? What should we make sure we do or don't do? Any custom reports we should create to help with the task? Anything else ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any and all help is greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 21:28:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51167#M37637</guid>
      <dc:creator>steveo</dc:creator>
      <dc:date>2012-03-27T21:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: After migration from Checkpoint, any tips?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51168#M37638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my opinion you shouldnt rely entirely on appid but rather appid + service (service is the PAN name for ports). Preferly using custom service but using "default" should be fine too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The point here is to setup your PA device like a SPI firewall and then add application identification to go into the NGFW mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for this is that in order to successfully identify an application the firewall must let some (or more) packet(s) through. If you set "service:any" this means that ALL ports will be forwarded to your device you try to protect and if you are really unlucky this single packet (or these few packets before the flow is successfully identified) will do bad stuff to your device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At first it might seem like climbing mount everest in order to go through 550 rules but I think its still doable. Take them in batches and take short breaks in between and you should be able to go through them all in a day or two &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make it easier to maintain in future a good idea might be to organize your rules by destination ip/network. So rules regarding server X are bundled close to each other. This also means that, depending on taste, it might be good to avoid aggregate too many rules into one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:NMS&lt;/P&gt;&lt;P&gt;dst: server1, server2, server3&lt;/P&gt;&lt;P&gt;appid: snmp&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:Admins&lt;/P&gt;&lt;P&gt;dst: server1, server2, server3&lt;/P&gt;&lt;P&gt;appid: ssh&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:NMS&lt;/P&gt;&lt;P&gt;dst: server1&lt;/P&gt;&lt;P&gt;appid: snmp&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:Admins&lt;/P&gt;&lt;P&gt;dst: server1&lt;/P&gt;&lt;P&gt;appid: ssh&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:NMS&lt;/P&gt;&lt;P&gt;dst: server2&lt;/P&gt;&lt;P&gt;appid: snmp&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:Admins&lt;/P&gt;&lt;P&gt;dst: server2&lt;/P&gt;&lt;P&gt;appid: ssh&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:NMS&lt;/P&gt;&lt;P&gt;dst: server3&lt;/P&gt;&lt;P&gt;appid: snmp&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src:Admins&lt;/P&gt;&lt;P&gt;dst: server3&lt;/P&gt;&lt;P&gt;appid: ssh&lt;/P&gt;&lt;P&gt;service:default&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 22:00:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51168#M37638</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-03-27T22:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: After migration from Checkpoint, any tips?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51169#M37639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So there isn't really a need to turn services off once you have an app rule, more so just add the app rule to your existing service rules, you could remove the service rules later, but it might be better just to leave them in there.. I got ya..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What about reports that were helpful for you to get that stuff under control?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or anything else I need to start looking at?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Mar 2012 22:05:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51169#M37639</guid>
      <dc:creator>steveo</dc:creator>
      <dc:date>2012-03-30T22:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: After migration from Checkpoint, any tips?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51170#M37640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Depends on how well documented your environment already is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A way to (hopefully) need to convert less rules could be to ask each server owner if the rules you currently got in your CP is still valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps some servers have been removed or some port/protocols is no longer in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is for example how I would setup security rules for a webserver running TCP80 (http) and TCP443 (https):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of a single rule which says something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)&lt;/P&gt;&lt;P&gt;dstzone: DMZ&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;serverip&amp;gt;&lt;/P&gt;&lt;P&gt;appid: web-browsing, ssl&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;action: accept&lt;/P&gt;&lt;P&gt;log option: log on session-end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;srczone: any&lt;/P&gt;&lt;P&gt;srcip: any&lt;/P&gt;&lt;P&gt;dstzone: any&lt;/P&gt;&lt;P&gt;dstip: any&lt;/P&gt;&lt;P&gt;appid: any&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;action: deny&lt;/P&gt;&lt;P&gt;log option: log on session-end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would go for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)&lt;/P&gt;&lt;P&gt;dstzone: DMZ&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;serverip&amp;gt;&lt;/P&gt;&lt;P&gt;appid: web-browsing&lt;/P&gt;&lt;P&gt;service: TCP80&lt;/P&gt;&lt;P&gt;action: accept&lt;/P&gt;&lt;P&gt;log option: log on session-end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;dstzone: DMZ&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;serverip&amp;gt;&lt;/P&gt;&lt;P&gt;appid: ssl&lt;/P&gt;&lt;P&gt;service: TCP443&lt;/P&gt;&lt;P&gt;action: accept&lt;/P&gt;&lt;P&gt;log option: log on session-end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3)&lt;/P&gt;&lt;P&gt;srczone: any&lt;/P&gt;&lt;P&gt;srcip: any&lt;/P&gt;&lt;P&gt;dstzone: any&lt;/P&gt;&lt;P&gt;dstip: any&lt;/P&gt;&lt;P&gt;appid: any&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;action: deny&lt;/P&gt;&lt;P&gt;log option: log on session-end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again its a matter of taste along with how strict you wish to protect your golden eggs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding log-option the last "log and deny" rule will only need "on session-end" (since the session ends with the deny &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; ) however the accept rules might need "on session-start" aswell (good for troubleshooting otherwise the client will show up in the logs only after the connection is reset or fin/acked). You need "on session-end" in order to get transmitted volume and some other parameter which I always forgets (appid?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another methology is to place your PA inline (using virtual wire) or in tap-mode (spanned port on the router/switch in front of your current CP setup) for a week or two (or even a month) and then generate reports to see which traffic you actually have in your network and from that build your ruleset (of course at the same time comparing with the old ruleset but this way you will see which ports/protocols (applications) is still in use today in case the server owners isnt helpful regarding documenting what their servers are doing to the network).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Mar 2012 22:25:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51170#M37640</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-03-30T22:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: After migration from Checkpoint, any tips?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51171#M37641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, we've already migrated to the PAs which has been in place for about 2 weeks now.. We're running various reports to see what rules are hit, then the thought was to enter an App rule above then, then disable the service rule... Although you mentioned keeping the service rule in place even after the App has been enaled... That's something else we're looking at too..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lots to do!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a bunch for the pointers!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2012 19:26:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/after-migration-from-checkpoint-any-tips/m-p/51171#M37641</guid>
      <dc:creator>steveo</dc:creator>
      <dc:date>2012-04-05T19:26:14Z</dc:date>
    </item>
  </channel>
</rss>

