<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI compliance and port 443 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/68096#M39797</link>
    <description>&lt;P&gt;What is the exact statement of problem for this issue in the PCI report?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think they misunderstand what the service running here is, or the issue is with they way you have VPN access configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certainly you can run web services and still be PCI compliant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think they believe you are exposing the web mgmt interface of the firewall to the open internet. &amp;nbsp;This would be flagged as a problem. &amp;nbsp;The scanner cannot know what the content of the web portal is and is probably just assuming this is the firewall mgmt portal because of the address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would push back and explain exactly what the service is. &amp;nbsp;I would think you are compliant without any changes.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Nov 2015 10:41:09 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-11-13T10:41:09Z</dc:date>
    <item>
      <title>PCI compliance and port 443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/67902#M39719</link>
      <description>&lt;P&gt;We are employing GlobalProtect VPN on our PA, which also happens to be our intranet gateway (NAT) to the Internet. Technically speaking, the setup works very well. Because port 443 is typically open on most firewalls, we can connect to the VPN virtually anywhere. Unfortunately, our PCI compliance scan (public side of our PA) flagged the open HTTPS port as a problem that needed fixing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disabling the GlobalProtect portal disables the downloading of the GlobalProtect client (which is okay with us), but naturally the TCP port 443 is still listening. Is there a way to configure the VPN service or craft a policy rule that would keep port 443 open for VPN but close it to port scans? In essence, we want to satisfy PCI requirements with the least impact to our VPN configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 16:44:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/67902#M39719</guid>
      <dc:creator>jasonbailey</dc:creator>
      <dc:date>2015-11-10T16:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: PCI compliance and port 443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/67914#M39723</link>
      <description>&lt;P&gt;You can't run GlobalProtect on port 443 but to hide from scan (unless you check logs from where scan comes from and block those IP's &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ).&lt;/P&gt;
&lt;P&gt;You can't have any port open at all or you can't have any port open on same ip where traffic goes out from?&lt;/P&gt;
&lt;P&gt;You can run GP on some other IP for example.&lt;/P&gt;
&lt;P&gt;Or get other subnet from your ISP to run GP on completely diferent IP range.&lt;/P&gt;
&lt;P&gt;Or run GP on alternative port but this would mean reconfiguring all your clients also.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 19:55:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/67914#M39723</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-11-10T19:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: PCI compliance and port 443</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/68096#M39797</link>
      <description>&lt;P&gt;What is the exact statement of problem for this issue in the PCI report?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think they misunderstand what the service running here is, or the issue is with they way you have VPN access configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certainly you can run web services and still be PCI compliant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think they believe you are exposing the web mgmt interface of the firewall to the open internet. &amp;nbsp;This would be flagged as a problem. &amp;nbsp;The scanner cannot know what the content of the web portal is and is probably just assuming this is the firewall mgmt portal because of the address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would push back and explain exactly what the service is. &amp;nbsp;I would think you are compliant without any changes.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 10:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-and-port-443/m-p/68096#M39797</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-11-13T10:41:09Z</dc:date>
    </item>
  </channel>
</rss>

