<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Management Interface in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64586#M38694</link>
    <description>&lt;P&gt;Thanks guys; will be configuring it behind a firewall on the OOBM&amp;nbsp;link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 14 Sep 2015 17:14:49 GMT</pubDate>
    <dc:creator>Huddlebuy</dc:creator>
    <dc:date>2015-09-14T17:14:49Z</dc:date>
    <item>
      <title>Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64329#M38590</link>
      <description>Hi, Is it a good idea to connect the mgmt interface directly to wan ? or should it only be accessible locally and via an access server for remote management ?</description>
      <pubDate>Wed, 09 Sep 2015 10:40:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64329#M38590</guid>
      <dc:creator>Huddlebuy</dc:creator>
      <dc:date>2015-09-09T10:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64330#M38591</link>
      <description>&lt;P&gt;It's a very bad idea.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you really want mgmt access directly from WAN; put management profile on some other L3 interface connected to WAN and restrict access within management profile and with firewall rules. This way you can also put security profiles on this rule, zone protection etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 10:47:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64330#M38591</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-09-09T10:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64344#M38601</link>
      <description>&lt;P&gt;Hi Huddlebuy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally I like to setup GlobalProtect for businesses which require remote management to the PA firewalls.. As you get a single free portal and gateway license prior to version 7 (Portal license is free).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setup GlobalProtect and enable HTTPS and/or SSH in an interface&amp;nbsp;management profile and add to&amp;nbsp;the GlobalProtect Tunnel Interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 13:47:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64344#M38601</guid>
      <dc:creator>Ben-W</dc:creator>
      <dc:date>2015-09-09T13:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64371#M38615</link>
      <description>&lt;P&gt;I'd go a step further and restrict access for a specific set of IPs or Networks.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:35:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64371#M38615</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-09-09T18:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64551#M38675</link>
      <description>&lt;P&gt;Yeah, for normal everyday access to firewall VPN client and accessing mgmt interface in LAN is the way to go. But access directly from WAN is&amp;nbsp;typcially needed&amp;nbsp;when something is wrong with the firewall. In that case GP might not be working and you won't be able to use such access. Then a mgmt access to WAN is needed but should only be allowed from a few IPs.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 07:33:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64551#M38675</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-09-14T07:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64586#M38694</link>
      <description>&lt;P&gt;Thanks guys; will be configuring it behind a firewall on the OOBM&amp;nbsp;link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 17:14:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-interface/m-p/64586#M38694</guid>
      <dc:creator>Huddlebuy</dc:creator>
      <dc:date>2015-09-14T17:14:49Z</dc:date>
    </item>
  </channel>
</rss>

