<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block the remote desktop acces with Palo Alto Network in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68732#M40036</link>
    <description>&lt;P&gt;hm..maybe another rule above allows the connection. You can check this in your traffic log which rule is triggered. can you post your rule?&lt;/P&gt;</description>
    <pubDate>Fri, 27 Nov 2015 10:48:54 GMT</pubDate>
    <dc:creator>iweltag</dc:creator>
    <dc:date>2015-11-27T10:48:54Z</dc:date>
    <item>
      <title>Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68731#M40035</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In or company i need to block the remote desktp access of a specific address to the critical server like database server.&lt;/P&gt;
&lt;P&gt;I add a security rule in the PA-500 by block (ms-rdp and t.120) applictions to a specific address by without any result.&lt;/P&gt;
&lt;P&gt;How could i blck the remote access&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;Please i need you help&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 10:35:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68731#M40035</guid>
      <dc:creator>RCHAIBI</dc:creator>
      <dc:date>2015-11-27T10:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68732#M40036</link>
      <description>&lt;P&gt;hm..maybe another rule above allows the connection. You can check this in your traffic log which rule is triggered. can you post your rule?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 10:48:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68732#M40036</guid>
      <dc:creator>iweltag</dc:creator>
      <dc:date>2015-11-27T10:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68741#M40037</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You find in the attachment a screnshoot of the recurity rules in the PAN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&amp;nbsp;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/1391iEC90FF5357B9F469/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="security-rules.JPG" title="security-rules.JPG" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 11:28:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68741#M40037</guid>
      <dc:creator>RCHAIBI</dc:creator>
      <dc:date>2015-11-27T11:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68743#M40039</link>
      <description>&lt;P&gt;you want to block same zome traffic? so if your client and server are on the same subnet the traffic will not forward to your palo alto (which is the default gw from your clients i think).&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 12:36:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68743#M40039</guid>
      <dc:creator>iweltag</dc:creator>
      <dc:date>2015-11-27T12:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68744#M40040</link>
      <description>&lt;P&gt;Yes the servers and the clients desktop are in th same subnet , the same security zone . So , I can't block the traffic in this case with the PAN?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 13:06:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68744#M40040</guid>
      <dc:creator>RCHAIBI</dc:creator>
      <dc:date>2015-11-27T13:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68749#M40044</link>
      <description>&lt;P&gt;If you can't put server to seperate subnet then you could&amp;nbsp;do it&amp;nbsp;with virtual wire or layer 2 setup.&lt;/P&gt;
&lt;P&gt;Keep in mind that traffic has to pass the firewall.&lt;/P&gt;
&lt;P&gt;If client and server are both connected to switch then they talk directly and traffic does not pass firewall and you can't block this traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 13:44:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68749#M40044</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-11-27T13:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68752#M40045</link>
      <description>&lt;P&gt;ok thank you, so i can &amp;nbsp;this &amp;nbsp;by configuring a virtual wire in the firewall , i connect the servers directly to the firewall or by usig another switch . It it in the zoe named "serverzone". Then, i add a security rules from "internal" rules to the&amp;nbsp;&lt;SPAN&gt;"serverzone" by restrict the ms-rdp.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 15:04:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68752#M40045</guid>
      <dc:creator>RCHAIBI</dc:creator>
      <dc:date>2015-11-27T15:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68754#M40046</link>
      <description>&lt;P&gt;It is best practise to have users and servers in diferent zones.&lt;/P&gt;
&lt;P&gt;What you could do at the moment is to add another layer 3 interface to same zone you have already (inside) and attach server directly to it.&lt;/P&gt;
&lt;P&gt;Multiple interfaces can be in same zone.&lt;/P&gt;
&lt;P&gt;But in this case your traffic from inside zone to inside zone passes firewall and you can control this traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 15:57:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68754#M40046</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-11-27T15:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Block the remote desktop acces with Palo Alto Network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68797#M40060</link>
      <description>&lt;P&gt;you could split up the user and server space by putting them in different VLANs and then using the firewall as bridge, that way you should be able to keep your subnet configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;please take a look at this guide: &lt;A title="Getting Started: Layer 2 Interfaces" href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Layer-2-Interfaces/ta-p/68229" target="_self"&gt;Getting Started: Layer 2 Interfaces&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 11:11:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-the-remote-desktop-acces-with-palo-alto-network/m-p/68797#M40060</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-11-30T11:11:33Z</dc:date>
    </item>
  </channel>
</rss>

